universities of computer studies the syllabus for 2018 ...ucspyay.edu.mm/upload/syllabus/cs/fourth...
TRANSCRIPT
1
UNIVERSITIES OF COMPUTER STUDIES
THE SYLLABUS FOR 2018-2019 ACADEMIC YEAR
(Five-year-academic Plan)
English
Fourth Year ( B.C.Sc. / B.C.Tech. )
Objectives: To improve students’ proficiency in four skills and help them complete
preparation for the IELTS test.
Students Learning Outcomes: Getting motivation in their language learning and applying
what they have learnt in their real life situation
Topic covered: Four skills with grammar, vocabulary input and skills practice to help
students to deal successfully with the tasks
Credit unit: 3 credits
(a) Course Description
1. Cambridge ESOL IELTS 9 Examination Papers
Test 1: Listening, Reading – William Henry Perkin, Is there anybody out there?,
The history of the tortoise, Writing, Speaking
Test 2: Listening, Reading – Reading Passage 1: Venus in transit, A neuroscientist
reveals how to think differently, Writing, Speaking
Test 3: Listening, Reading – Attitudes to language, Tidal Power, Information
theory – the big idea, Writing, Speaking
Test 4: Listening, Reading – The life and work of Marie Curie, Young children’s
sense of identity, The Development of Museums, Writing, Speaking
(Teachers should emphasize on Speaking and Listening Activities in IELTS Text Book.)
2. Cambridge Grammar for IELTS
Unit 9 – Pronouns and Referencing
Unit 10 – Adjectives and Adverbs
Unit- 11 – Comparing things
Unit- 12 – The noun phrase
(b) Syllabus
1. Cambridge ESOL IELTS 9 Examination Papers
2. Test 1: Listening, Reading – William Henry Perkin, Is there anybody out
there?, The history of the tortoise, Writing, Speaking
3. Test 2: Listening, Reading – Reading Passage 1: Venus in transit, A
neuroscientist reveals how to think differently, Writing, Speaking
4. Test 3: Listening, Reading – Attitudes to language, Tidal Power, Information
theory – the big idea, Writing, Speaking
2
5. Test 4: Listening, Reading – The life and work of Marie Curie, Young
children’s sense of identity, The Development of Museums, Writing, Speaking
(Teachers should emphasize on Speaking and Listening Activities in IELTS Text Book.)
2.Cambridge Grammar for IELTS
Unit 9 – Pronouns and Referencing
Unit 10 – Adjectives and Adverbs
Unit- 11 – Comparing things
Unit- 12 – The noun phrase
3. Communications in 21st Century (for Second Semester)
Teacher’s Guide
( c) Textbooks
4. Cambridge ESOL IELTS 8 Examination Papers
5. Cambridge Grammar for IELTS: Grammar reference and practice by Diana Hopkins
and Pauline Cullen
(d) References
1.Cambridge ESOL IELTS 8 Examination Papers
2.Cambridge Grammar for IELTS: Grammar reference and practice by Diana Hopkins
and Pauline Cullen
3.Communications in 21st Century
**********************************************************************
Page 2 of 2
2018-19 Academic Year
English Department Course Description
Fourth Year (Second Semester) Department Code: ENG
Subject Code: E 402
Course Title 1. IELTS 9 ( Examination Papers) Cambridge ESOL
2. CAMBRIDGE GRAMMAR for IELTS
Course Coordinator Daw Aye Aye Khine
Credit Unit 3 credits ( lecture 2+ Tuto 1+ Lab 1)
1 Lecture = 1 credit 1 Tutorial= 0.5 credit
1 Lab = 0.5 credit
Prerequisite/s None
Objectives 1. to motivate students in English Language learning
2. to develop four skills in English Language learning
Student Learning Outcomes Students are motivated in their language learning and
are positioned right at the edge of their competence are pushing it forward.
Topics Covered 1. Proficiency skill based on CLT
2. Four skills with grammar and vocabulary input are informed by publications related to the Common
European Framework of Reference.
Text book and Reference 1. IELTS 9 ( Examination Papers) Cambridge ESOL
2. CAMBRIDGE GRAMMAR for IELTS (By DIANA
HOPKINS with PAULINE CULLEN)
Lesson Plan First Semester - IELTS- Test 1, 2 - IELTS Grammar Unit 9, 10
Second Semester - IELTS- Test 3, 4
- IELTS Grammar Unit 11, 12
Assessment Plan Second Term - Exam (50%)
Listening Test (10%)
Speaking (10%) (Assignment) Writing (10%)
Attendance (10%)
Quiz (10%)
E English
2. CAMBRIDGE GRAMMAR for IELTS
(By DIANA HOPKINS with PAULINE CULLEN)
No. Page Period
1 56 to 62 3.5
2 63 to 66 3.5
3 67 to 70 3.5
4 71 to 75 3.5
5 76 to 78 3.5
6 90 to 97 3.5
7 90 to 97 3.5
8 79 to 86 3.5
9 87 to 90 3.5
10 91 to 95 3.5
11 96 to 100 3.5
12 101 to 103 3.5
13 98 to 106 3.5
14 98 to 106 3.5
15 3.5
Note: Grammar folder is suggested for teachers to study in advance and description of graphs, bar charts,
pie charts must be taught for Academic Writing task.
Communication in 21st Century may be taught as extra curriculum.
Grammar for IELTS: Unit 12 ( The noun phrase)
UNIVERSITIES OF COMPUTER STUDIES
LECTURE PLAN FOR 2018-2019 ACADEMIC YEAR
IELTS 9: Test 3: - Reading Passage 3 (Information theory - the big idea)
Grammar for IELTS: Unit 12 ( The noun phrase)
Revision
IELTS 9: Test 4 - Reading Passage 3 (The Development of Museums)
IELTS 9: Test 3: - Writing & Speaking
Grammar for IELTS: Unit 11 ( Comparing things)
Grammar for IELTS: Unit 11 ( Comparing things)
IELTS 9: Test 4 - Listening
B.C.Sc. / B.C.Tech. Fourth Year
Second semester
1. IELTS 9 ( Examination Papers) Cambridge ESOL
Period : 15 weeks
IELTS 9: Test 3: - Reading Passage 2 (Tidal Power)
Textbooks:
Chapter
IELTS 9: Test 3: - Listening
IELTS 9: Test 3: - Reading Passage 1 (Attitudes to language)
IELTS 9: Test 4 - Reading Passage 1 (The life and work of Marie Curie)
IELTS 9: Test 4 - Reading Passage 2 (Young Children's sence of identity)
IELTS 9: Test 4 - Writing & Speaking
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
CS – 406 : Computer Vision and Interactive Computer Graphics Second Semester
Text Books : Computer Graphics C Version, Second Edition, Donald Hearn and M.
PaulineBaker,1997.
Course Code
Number CS-406
Second Semester
Course Title Computer Vision and
Interactive Computer
Graphics
Semester Hours 3 Hours No of Credit Units 3
Prerequisite None Course
Coordinator
Dr. Ahnge Htwe
Course Aim
The aim of this course is to provide the concept of computer graphics application, 2D
computer graphics techniques and the overview of 3D computer graphics.
Course Objectives
• To study the general concepts of 3D computer graphics.
• To understand and apply 2D computer graphics techniques
• To design and create program using graphics programming techniques
Learning Outcomes
On successfully completing the course, students will be able to demonstrate
knowledge and understanding of fundamental principles in 2D computer graphics, and apply
them to the design of algorithms for graphics applications. Students will be able to develop
graphics programs to model various types of two-dimensional scenes. Students will also gain
skills necessary for the study of advanced concepts and techniques in the field of computer
graphics.
Course Contents:
Overview of computer graphics system and applications
Output primitives
Attributes of output primitives
2D geometric transformations
2D viewing
3D basic concepts
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
References
1. Computer Graphics (Second Edition) Schaum's Outlines by Zhigang Xiang, Roy A. Plastock
2. Interactive Computer Graphics A Top-down Approach with Shader-Based OPENGL (6th
Edition) by Edward Angel, Dave Shreiner
Course Organization
Your participation in the course will involve six forms of activity:
1. Attending the lectures.
2. Preparing for and participating in the recitations.
3. Laboratory assignments.
4. Reading the text.
5. Exams
6. Quiz
Exam Assessment
Practical 10%
Tutorial 10%
Assignment 10%
Attendance/Quiz 10%
Moodle test 10%
Exam 50%
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
Period : 64 Periods (55 minutes) for 16 Weeks
No. Chapter Page Period
1 Chapter 1
A Survey of Computer Graphics
2 1-1 Computer-Aided Design
1-2 Presentation Graphics
1-3 Computer Art
1-4 Entertainment
1-5 Education and Training
1-6 Visualization
1-7 Image Processing
1-8 Graphical User Interfaces
4-34
2
3 Tutorial+Discussion 2
4 Chapter 2
Overview of Graphics Systems
5 2-1 Video Display Devices
Refresh Cathode-Ray Tubes
Raster-Scan Displays
Random-Scan Displays
Color CRT Monitors
Direct-View Storage Tubes
Flat-Panel Displays
Three-Dimensional Viewing Devices
Stereoscopic and Virtual-Reality Systems
36-52
3
6 2-2 Raster-Scan System
Video Controller
53-56 1
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
Raster-Scan Display Processor
2-3 Random-Scan Systems
Exercises 4-13
7 Tutorial + Discussion 2
8 Chapter 3
Output Primitives
9 3-1 Points and Lines
3-2 Line-Drawing Algorithms
DDA Algorithm
Bresenham's Line Algorithm
84-88
3
10 3-3 Loading the Frame Buffer
3-5 Circle-Generating Algorithms
Properties of Circles
Midpoint Circle Algorithm
94
97-98 3
11 3-11 Filled-Area Primitives
Scan-Line Polygon Fill Algorithm
Inside-Outside Tests
117-
125 4
12 3-11 Boundary-Fill Algorithm
Flood-Fill Algorithm
Exercises 3.8 and 3.9
127-
130 1
13 Practical + Tutorial 6
14 Chapter 4
Attributes of Output Primitives
15 4-1Line Attributes
Line Type
Line Width
144-
146 1
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
16 4-3 Color and Grayscale Levels
Color Tables
Grayscale
Exercises 4.17 and 4.18
154-
157
2
17 4-4 Area-Fill Attributes
Fill Styles
Pattern Fill
Soft Fill
158-
162
2
18 4-8 Antialiasing
Supersampling Straight Line Segments
Area Sampling Straight Line Segments
Pixel Phasing
171-
175
3
19 Practical + Tutorial 3
20 Chapter 5
Two-Dimensional Geometric Transformations
21 5-1 Basic Transformations
Translation
Rotation
Scaling
5-2 Matrix Representations and Homogeneous
Coordinates
184-
188
2
22 5-3 Composite Transformations
Translations
Rotations
Scalings
General Pivot-Point Rotation
191-
194
6
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
General Fixed-Point Scaling
General Scaling Directions
Concatenation Properties
23 5-4 Other Transformations
Reflection
Shear
Exercises 5.2 -5.13
201-
203
4
24 Practical + Tutorial 5
25 Chapter 6
Two-Dimensional Viewing
26 6-1 The Viewing Pipeline
6-2 Viewing Coordinate Reference Frame
6-3 Windowto Viewport Coordinate Transformation
217-
222 2
27 6-7 Line Clipping
Cohen-Sutherland Line Clipping
6-8 Polygon Clipping
Sutherland-Hodgeman Polygon Clipping
225-
226
4
28 Practical + Tutorial 2
29 Chapter 9
Three-Dimensional Concepts
30 9-1 Three-Dimensional Display Methods
Parallel Projection
Perspective Projection
Depth Cueing
Visible Line and Surface Identification
Surface Rendering
297-
300
2
University of Computer Studies
B.C.Sc. (Fourth Year)
Lecture Plan (2018-2019)
Exploded and Cutaway Views
Three-Dimensional and Stereoscopic Views
31 Tutorial 1
CS-401
Digital Business and E-Commerce Management
COURSE DESCRIPTION
Department,
Number
CS-401
Course Title Digital Business and E-
Commerce Management
Semester
Hours
Course
Coordinator
Daw Khin Mya Mya Zin
Current Catalog Description
The aim of this subject is to present and discuss concepts and challenges of e-business,
including a balanced coverage of both the technical and the management aspects of
successful e-business. It covers business strategies, and technologies involved in the
design and deployment of business on the Internet and World Wide Web.
Textbook: Digital-Business and E-Commerce Management (Sixth Edition)
by Dave Chaffey
References:
E- Business and E-Commerce Management by Dave Chaffey
Course Outcomes
Students should be able to discuss modern computing infrastructure from the
perspective of the internet and organizations. They would have the knowledge of
theoretical and practical issues of conducting business over the internet and Web. Also
gain the general principles revealed through practical exploration of specific tools,
techniques and methods in e-business.
Major Topics Covered in the Course
1 Introduction to digital business and e-commerce
2 Marketplace analysis for e-commerce
3 Managing digital business infrastructure
4 E-environment
5 Digital business strategy
6 Supply chain management 7 E-procurement
8 Digital marketing
9 Customer relationship management
10 Change management
11 Analysis and design
12 Digital business service implementation and optimization
Grading Procedures: (Second Semester)
Your performance in this class will be evaluated using your scores for attendance,
assessments/quiz, tutorials/assignments and examination.
Assessment Plan for the Course (Second Semester)
Business Application Area
Attendance 10%
Quiz 10%
Tutorial /Assignment 30%
Exam 50%
University of Computer Studies
B.C.Sc. (Forth year)
Digital-Business and E-Commerce Management
CS-401:Digital-Business and E-Commerce Management Second Semester
Text Book: Digital-Business and E-Commerce Management (Sixth Edition) by Dave
Chaffey
Periods: (50 minutes) 60 periods for 15 Weeks
No. Content Page
No.
Period Detail Lecture
Plan
1. Chapter 1: Introduction to Digital-Business and E-
Commerce
a. Introduction to Digital-Business and E-
Commerce
b. E-Business opportunities
c. E-Business risks and barriers
Tutorial
Exercises
4
2. Chapter 2: Marketplace analysis for e-commerce
a. Introduction
b. E-Commerce micro-environment
2
3. Chapter 2:
c. Business models for E-commerce
Tutorial
Exercises
2
4. Chapter 3: Managing Digital Business Infrastructure
a. Introduction
b. Digital-Business Infrastructure Components
c. Web Technology
2
5. Chapter 3:
d. Managing digital-business infrastructure
e. Web Services SaaS and service-oriented
architecture(SOA)
Tutorial
Exercises
2
6. Chapter 4: E-Environment
a. Introduction(Overview)
b. Social and Legal Factors
2
7. c. Political Factors
d. E-government
Exercises
2
8. Chapter 5:Digital-business Strategy
a. Introduction (Overview)
b. What is e-business strategy?
2
9. c. Strategic Analysis
d. Strategic objectives
e. Strategy definition
Decision 1 to Decision 8 (Overview)
2
10. f. Strategy Implementation
Exercises
2
11. Chapter 6: Supply Chain Management
a. Introduction (Overview)
b. What is Supply Chain Management
2
12. c. Options for Restructuring supply chain
d. Using e-business to restructure the supply chain
2
13. e. Supply Chain Management implementation
Exercises
2
14. Chapter 7: E-procurement
a. What is e-procurement?
b. Type of procurement
4
15. c. Barriers and risk of e-procurement adoption
d. Implementing e-procurement
Exercises
4
16. Chapter 8: Digital-marketing
a. Introduction
b. What is e-marketing?
c. Digital-marketing planning
d. Characteristics of digital media communications
Exercises
8
17. Chapter 9: Customer relationship management
a. Introduction
b. What is e-CRM?
4
18. c. The online buying process
d. Technology solutions for CRM
Exercises
4
University of Computer Studies, Yangon
B.C.Sc. / B.C.Tech (Fourth Year)
CST-402 Second Semester
COURSE DESCRIPTION
Course code number CST-402 Course Title Mathematics of Computing IV
Semester hours 4 hours No. of Credit Units 3
Course Coordinator Daw Ni Ni Hla
Course Description
This course covers Applications of Recurrence Relations, Solving Linear Recurrence
Relations, Generating Functions, Modeling Computation: Languages and Grammars,
Finite-State Machines with Output, Finite-State Machines with No Output, Language
Recognition and Turing Machines.
Textbook
Discrete Mathematics and its Applications (Seventh Edition) by KENNETH H. ROSEN
Course Outcomes
After completing the course, the student will be able to:
1. Model, compare and analyse different computational models using combinatorial
methods.
2. Apply rigorously formal mathematical methods to prove properties of languages,
grammars and automata.
3. Construct algorithms for different problems and argue formally about correctness
on different restricted machine models of computation.
4. Identify limitations of some computational models and possible methods of
proving them.
Major Topics Covered in the Course
1. Modeling With Recurrence Relations, Solving Linear Homogeneous and
Nonhomogeneous Recurrence Relations, Counting Problems and Generating
Functions
2. Phrase Structure Grammars, Derivation Trees, Backus-Naur Form, Finite State
Machines with output and no output.
3. Deterministic and Nondeterministic Finite State
4. Using Turing Machines to Recognize Sets
University of Computer Studies, Yangon
B.C.Sc. / B.C.Tech (Fourth Year)
Assessment Plan for the Course
Attendance - 10%
Quizzes - 10%
Assignment - 10 %
Test - 10%
Final Exam - 60%
Class Attendance and Participation Policy:
Attendance
Class attendance is mandatory. Most of the material you will learn will be covered in
the lectures, so it is important that you not miss any of them. You are expected to show
up on time for class, and stay for the whole lecture. Students are expected to attend each
class, to complete any required preparatory work (including assigned reading) and to
participate actively in lectures, discussions and exercises.
• Mobile phones must be silenced and put away for the entire lecture unless use is
specified by the instructor. You may not make or receive calls on your cell phone, or send
or receive text messages during lectures.
• You are responsible for all material sent as email. Ignorance of such material is no
excuse. You are responsible for all materials presented in the lectures.
• Your conduct in class should be conducive towards a positive learning environment for
your class mates as well as yourself.
Quizzes, assignments, tests and Exam
Your performance in this class will be evaluated using your scores for attendance,
quizzes, homework assignments, two tests and one final examination. There are no
planned extra credit projects or assignments to improve your grade.
We will take a short quiz for every lecture.
There will be 11 homework assignments, roughly one per week. Please show all
your work and write or type your assignments neatly. Credit cannot be given for answers
without work (except on true-false, always-sometimes-never, or other multiple choice
questions).
Test will start after two or three chapters finished and the coordinator will
announce the date for the test.
Any assignment or quiz or test is simply missed, regardless of the reason why
(e.g. illness, work, traffic, car trouble, computer problems, death, etc.), and earns a
University of Computer Studies, Yangon
B.C.Sc. / B.C.Tech (Fourth Year)
grade of zero. You are strongly encouraged to complete all assignments and attend all
quizzes so that you can check that you understand the material and can throw out bad
grades, or grades for which you had to miss an assignment or quiz for a valid reason.
Late submissions will not be accepted for any graded activity for any reason.
There are no extra credit opportunities.
Students may not do additional work nor resubmit any graded activity to raise a
final grade.
Exam
The exam will be conducted on-campus, in a classroom. The dates/times/locations
will be posted on Board as soon as possible.
For this course, the following additional requirements are specified:
All work submitted for a grade must have been prepared by the individual student.
Students are expressly prohibited from sharing any work that has been or will be
submitted for a grade, in progress or completed, for this course in any manner with a
person other than the instructor and teaching assistant(s) assigned to this course).
Specifically, students may not do the following, including but not limited to:
Discuss questions, example problems, or example work with another person that
leads to a similar solution to work submitted for a grade.
Give to, show, or receive from another person (intentionally, or accidentally
because the work was not protected) a partial, completed, or graded solution.
Ask another person about the completion or correctness of an assignment.
Post questions or a partial, completed, or graded solution electronically (e.g. a
Web site).
All work must be newly created by the individual student for this course. Any
usage of work developed for another course, or for this course in a prior semester,
is strictly prohibited without prior approval from the instructor.
Posting or sharing course content (e.g. instructor provided lecture notes,
assignment directions, assignment questions, or anything not created solely by the
student), using any non-electronic or electronic medium (e.g. web site, FTP site,
any location where it is accessible to someone other than the individual student,
instructor and/or teaching assistant(s)) constitutes copyright infringement and is
strictly prohibited without prior approval from the instructor.
University of Computer Studies, Yangon
B.C.Sc. / B.C.Tech (Fourth Year)
Tentative Lesson
No Topics Week Remark
I Chapter 8 Advanced Counting Techniques
1 8.1 Applications of Recurrence Relations Week 1+2
2 Introduction; Modeling With Recurrence
Relations
Assignment 1
3 8.2 Solving Linear Recurrence Relations Week 3+4
4 Introduction;
Solving Linear Homogeneous Recurrence
Relations with Constant Coefficients
Assignment 2
Assignment 3
5 Linear Nonhomogeneous Recurrence Relations
with Constant Coefficients Week 5 Assignment 4
6 8.4 Generating Functions Week 6+7
7 Introduction;
Useful Facts About Power Series
Assignment 5
8 Counting Problems and Generating Functions
9 Using Generating Functions to Solve
Recurrence Relations
Assignment 6
10 Proving Identities via Generating Functions
11 Test I Test I
12 Chapter 13 Modeling Computation
II 13.1 Languages and Grammars Week 8
13 Introduction;
Phrase-Structure Grammars
14 Types of Phrase-Structure Grammars Assignment 7
15 Derivation Trees Week 9
16 Backus–Naur Form Assignment 8
17 13.2 Finite-State Machines with Output Week 10+11
18 Introduction;
Finite-State Machines with Outputs
Assignment 9
19 13.3 Finite-State Machines with No Output
Introduction;
Set of Strings
Week 12+13
20 Finite-State Automata
21 Language Recognition by Finite-State
Machines
22 Nondeterministic Finite-State Automata Assignment 10
University of Computer Studies, Yangon
B.C.Sc. / B.C.Tech (Fourth Year)
No Topics Week Remark
23 13.4 Language Recognition Week 14
24 Introduction;
Kleene’s Theorem
25 Regular Sets and Regular Grammars
26 A Set Not Recognized by a Finite-State
Automaton
27 More Powerful Types of Machines Assignment 11
28 13.5 Turing Machines Week 15
29 Introduction;
Definition of Turing Machines
30 Using Turing Machines to Recognize Sets
31 Computing Functions with Turing Machines
32 Different Types of Turing Machines
33 The Church–Turing Thesis
34 Computational Complexity, Computability,
and Decidability
35 Test II Test II
36 Revision
University of Computer Studies, Yangon
Faculty of Information Science
2018-2019 Academic Year
Department Name FIS Course Title
CS-404 (50%)
Information
Assurance and
Security
Semester hours
2 lectures per week
(1 for Lecture & 1 for
Lab)
Course
Coordinator
Dr. Nyein Myint
Myint Aung
Lecturer
Semester Second Semester
Course Description
The course aims to motivate fourth year students the topic of information security
awareness. At the outset, the professional environment of information security and brief history of
security are introduced. After this, the basic model of information security consisting of assets,
vulnerabilities, threats, and controls are explained. The rest of the course is devoted to
characterizing assets, vulnerabilities and threats and responding to them using security controls. At
the end of the course, students will have an awareness of how information security concerns have
evolved in our society and how they can use contemporary frameworks to respond to these
concerns in a professional environment.
The course comes with a full set of end-of-chapter exercises. There are four kinds of
exercises at the end of every chapter:
1. Traditional end of chapter questions are designed to improve student understanding and recall of common topics in information security.
2. An example case at the end of each chapter allows students to apply the knowledge in the chapter
to business contexts.
3. A critical thinking exercise introduces students to analogous situations and relates the ideas from
the chapter to this situation.
4. Finally each chapter has a detailed hands-on activity using a customized distribution of the
CentOS Linux OS to be installed as a virtual machine using virtual box.
Course Outcomes
Students who complete the course will be able to
Understand how information security and assurance is important and impact of
organizations, and the importance of system administration for information security.
Provide the element of basic security model, relationships between the elements of the basic
information security model and common classification of information security controls.
Get clear understanding of the different aspects of threats including: threat models, and
vulnerabilities and their relevance to threats.
Describe the important of assets in organizations and to examine how these assets can be
identified and classified based on their alignment to the organization’s mission.
Be aware of asset management issues including life cycle and ownership.
Prerequisites by Topic
None
Major Topic Covered in the Course
Introduction
The Basic Information Security Model
Asset Identification and Characterization
Threats and Vulnerabilities
Textbook
INFORMATION SECURITY and IT RISK MANAGEMENT, 1st Edition, Wiley. Manish
Agrawal, Alex Campoe and Eric Pierce, 2014
Reference Book
INFORMATION SECURITY: The Complete Reference, 2nd
Edition, McGraw Hill, Mark
Rhodes-Ousley, 2013
Network Security : A Beginner’s Guide, 3rd
Edition, Eric Maiwald, ISBN:9780071785715,
McGraw-Hill, 2013
Learning Assessment
Paper Exam : 30%
Tutorial Test : 10%
Assignment : 5%
Class Participation : 5%
Course Policy
Individual deliverables are to be submitted individually and group work is collaborative.
All exams and assignments are to be completed by the student alone with no help from any
other person.
Students are allowed to discuss about homework and project problems with others.
Students are not allowed to copy the solutions from another colleague.
If so, all students (with same answers) must be deducted 1% of their marks(assignment).
If you hand in a late assignment, you must identify (1) how late this assignment is and (2)
how many total slip days you have left.
After you have used up your slip time, any assignment handed in late will be marked off
0.5% per day. That is, after 5 days, the mark must be zero.
University of Computer Studies, Yangon
B.C.Sc.(Fourth Year)
CS-404 : Information Security and Assurance
Textbook : Information Security and IT Risk Managementby ManishAgrawal, Alex Campoe,
Eric Pierce
Period : 15 periods for 15 weeks (1 period * 15 weeks) – ISA (50%)
No. Chapter Page Period Detailed
Lecture
1. Chapter 1 – Introduction 5-21
Brief History
Definition of Information Security
Chapter Review Questions
2 Explain Details
Hands-On Activity 2 Lab
Critical Thinking Exercise Assignment
Oriented
2. Chapter 4 - The Basic Information Security Model 82-103
Components of the Basic Information Security Model 1 Explain Details
Common Vulnerabilities, Threats, and Controls 1 Definitions
Chapter Review Questions 1
Hands-On Activity
1 Lab
Example Case - ILOVEYOU virus
Critical Thinking Exercise
Assignment
Oriented
3. Chapter 5 - Asset Identification and Characterization 104-133
Assets Overview
Assets Types
Assets Characterizations
1 Definitions
IT Assets Life Cycle and Asset Identification
Asset Ownership and Operational Responsibilities
1
Chapter Review Questions
Hands-On Activity
1
Example Case – Stuxnet
Critical Thinking Exercise
Assignment
Oriented
4. Chapter 6 - Threats and Vulnerabilities 135-174
Introduction
Threat Models
Thread Agent
1 Definitions
Threat Action
Vulnerabilities
1 Explain Details
Chapter Review Questions 1
Hands-On Activity
1 Lab
Example Case – Gozi
Critical Thinking Exercise
Assignment
Oriented
Page 1 of 3
University of Computer Studies, Yangon
Faculty of Information Science
2018-2019 Academic Year
Department
Name FIS Course Title
CS – 404 (50%)
Management Information
System
Semester
hours
1 Periods per week
Course
Coordinator Daw Khaing
Semester Second Semester
Course Description
The main purpose of this course is to describe the importance role of management
information system in business today and present the process stage how to organize to become the
management information system. This course also provides the ethics and discipline concerning
with the information system.
Course Objective
To understand the role of information system in business today
To understand the different kind of approaches to information system
To understand how information system impact organizations and business firms
To understand the ethical and social issues related to information systems.
Learning Outcomes
The students who complete the course will be able to
Get knowledge how are information systems transforming business and their relationship to
globalization
Demonstrate the feature of organization and the impact of information system on
organization
Identify the opportunities for strategic information system on organization
Explain the relation of ethical, social and political issues and information system
Prerequisite for the Course
None
Major Topic covered in the course
Information Systems in Global Business Today
Information Systems, Organizations and Strategy
Ethical and Social Issues in Information System
Page 2 of 3
Textbook
Kenneth C.Laudon, Jane P.Laudon “Management Information System”, 12th
Edition
Learning Assessment
Final Exam : 30%
Tutorial Test : 10%
Quiz : 10%
Assignment : 5%
Class Participation : 5%
Course Policies
Students will need to prepare for the class sessions ahead of time by reading the materials
provided, and working on questions and problems that are to be discussed in class - either
individually or as part of a team.
Class sessions will be interactive, though guided by the instructor with the help of a number of
questions, as well as small cases and problems.
Individual deliverables are to be submitted individually and group work is collaborative.
Make-up exams, tutorial and assignments are not available.
University of Computer Studies, Yangon
B.C.Sc. (Fourth Year)
(Second Semester)
CS-404 : Management Information System (50%)
Text Book : Management Information System – Managing the digital firm
(Kenneth C. Laudon, Jane P. Laudon)
Reference : Experiencing MIS (3rd
Edition, PEARSON)
Foundation of Information System (ZWASS)
Period : 15 periods for 15 Weeks (1 period *15weeks) - MIS
No. Chapter Pages Peri
od Remark
Chapter 1. Information system in Global Business Today
1 1.1 The Role of Information Systems in Business Today
37-44 1 Detail
2 1.2 Perspectives on Information Systems 47-58 1 Detail
3 1.3 Contemporary Approaches to Information Systems 60-61 1 Detail
4 1.4 Hands on MIS projects 63-64 1 Detail
5 Case Study: The National Bank of Kuwait 68 1
Detail
6 Chapter End Discussion
Page 3 of 3
Chapter 3. Information Systems, Organizations, and
Strategy
10 3.1. Organizations and Information Systems
111-114
1 Detail
11 3.2 How Information Systems Impact Organizations and
Business Firms 119-124 1 Detail
12 3.3. Using Information Systems to Achieve Competitive
Advantage 124-129 1 Detail
13 3.4. Using Systems for Competitive Advantages:
Management Issues Sustaining Competitive Advantage 141-142 1 Detail
14 3.5 Hands on MIS projects 143
1
Detail
Case Study: Soundbuzz’s Music Strategy for Asia-Pacific 148
Chapter End Discussion
Chapter 4. Ethical and Social Issues in Information
Systems
4.1 Understanding Ethical and Social Issues Related to
Systems 153-156 1 Detail
4.2 Ethics in an Information Society 159-161 1 Detail
4.3 The Moral Dimensions of Information Systems 161-173 1 Detail
4.4 Hands on MIS projects 183 1
Case Study: When Radiation Therapy Kills 1
Chapter End Discussion
Page 1 of 4
University of Computer Studies, Yangon
Faculty of Information Science
2018-2019 Academic Year
Department
Name FIS Course Title CS - 405
Semester
hours 3 Hours (3 Credits) Course Name
Unified Modeling
Language
Semester Second Semester Course Coordinator Dr. Khine Khine Oo
Course Description
Regardless of the software development approach, from the classic waterfall to extreme
programming (XP), all of the experts agree that quality software development requires both analysis
and design. The Unified Modeling Language (UML) provides a common, standard notation for
recording both analysis models and design artifacts. This course delves into the processes of both
object-oriented analysis and object-oriented design using UML as the notation language. The course
will be supported by practical lectures involving the development of object-oriented design for a real
world application.
Course Objective
To understand the importance of modeling in the software development life cycle
To understand the usage of UML notation and symbols
To analyze and design systems and software solutions using the object-oriented approach
To Employ the UML notation to create effective and efficient system designs
Learning Outcomes
Gain a working knowledge Star UML
Apply knowledge of OOAD to design an object-oriented system which can be implemented in
an object-oriented language
Learn the meaning of every UML notation and when to use them
Learn the industry best practices to build UML
Interpret any UML diagram effectively
Increase the knowledge of software development productivity
Major Topic covered in the course
Introduction to UML
Modelling with Objects
Class and Object Diagrams
Interaction Diagrams
Business Modelling
Analysis
Design
Implementation
State Charts
Component Diagram
Page 2 of 4
Overview of Learning Activities
Lectures: Key concepts will be explained in lectures in which course material will be
presented and the subject matter will be illustrated with examples.
Tutorial sessions: Focus on analyzing and problem solving of given system.
Practical sessions: Provide practice for developing the design with Star UML software
TextBook
Mark Priestley, “Practical Object-oriented Design with UML” 2nd
Edition
Reference Book
GradyBooch ,James Rumbaugh ,Ivar Jacobson, “Unified Modeling Language User Guide”,
Addison Wesley ,First Edition October 20, 1998, ISBN: 0-201-57168-4.
Tools
1. Star UML
Learning Assessment
Paper Exam : 60%
Practical Assessment : 10%
Project : 10%
Quiz : 10%
Assignment : 5%
Class Participation : 5%
Course Policies
Individual deliverables are to be submitted individually and group work is collaborative.
Class sessions will be interactive, though guided by the instructor with the help of a number of
questions, as well as small cases and problems.
All assignments are to be completed by the student alone with no help from any other person.
Students are allowed to discuss about homework and project problems with others.
Students are not allowed to copy the solutions from another colleague.
CS-405 : Unified Modeling Languages Second Semester
Text Book : Practical Object Oriented Design with UML (2nd
Edition)
Period : 45 periods for 15 Weeks (3 period * 15 weeks)
No. Chapter Page Period Remark
Chapter 1 Introduction to UML
1. 1.1 Model and modelling
1.2 Methodology
1.3 Unified Modeling Language
1.4 Design model and code
1-11 1 Detail
Chapter 2 Modelling with objects
Page 3 of 4
2. 2.1 The object model
2.2 Classes and Objects
2.3 Object properties
14-19 1 Detail
3. 2.4Avoiding data replication
2.5 Link
2.6 Association
2.7 Message passing
21-25 1 Detail
4. 2.8 Polymorphism
2.9 Dynamic binding
Exercise
27-32 1 Detail
Chapter 8 Class and Object Diagram
5 8.1 Data type
8.2 Classes
8.3 Describing objects with classes
142-145 1 Detail
6.
8.4 Association
8.5 Generalization and Specialization
150-156 1 Detail
7. 8.6 Inheritance of attributes and operation
8.7 Aggregation
8.8 Composition
160-166 1 Detail
8. 8.9 Association classes
8.10 N-ary association
8.11 Qualified Association
8.12 Interfaces
8.13 Template
168-176 1 Detail
9. Exercise 178 1 Draw Class Diagram
Chapter 9 Interaction Diagram
10. 9.1 Collaboration
9.2 Classifier Rule
9.3 Association Rule
187-190 1 Detail
11. 9.4 Interaction diagram
9.5 Object creation
9.6 Object destruction
192-196 1 Detail
12. 9.7 Role multiplicity and iterated messages
9.8 Multi object
9.9 Conditional message
9.10 Messages to self
Exercise
197-203
2 Draw Sequence and
Collaboration
Diagrams
Chapter 4 Business modelling
13. 4.1 Informal requirement
4.2UsecaseModelling
4.3 Describing Usecase
53-58 1 Detail
14. 4.4 Structuring the Usecase Model
4.5 Completing the Usecase Model
61-65 1 Detail
15. 4.6 Domain Modelling
4.7 Glossaries
Exercises
67-72 1 Draw Usecase
Diagram
Chapter 5 Analysis
16. 5.1 Purpose of Analysis
5.2 Object design
5.3 Software Architecture
75-78 1 Detail
17. 5.4Usecase Realization 82 1 Detail
18. 5.5 Recording new booking
5.6 Canceling booking
5.7 Updating booking
88-92 1 Detail
19.
5.8 Completing the analysis model 94 1 Detail
20. Exercises 96 1
Chapter 6 Design
21. 6.1 Receiving input from the user
6.2 Producing output
6.3 Persistent data storage
98-104 2 Should Know
22. 6.4 The design model
6.5 Detail class diagram
6.6 Dynamic modeling behavior,
Exercise
109-111
119
1 Should Know
Chapter 7 Implementation
23. 7.1 Implementation diagram
7.2 Implementation strategy
7.3 Application framework
121-125 1 Should Know
24. 7.5 Implementation of classes
7.6Implementation of association
7.7Implementation of operation
Exercises
130-137
140
1 Should Know
Chapter 10 State Chart
25. 10.1 State dependent behavior
10.2 State event and transition
209-210 1 Detail
26. 10.3 Initial and final state
10.4 Guard condition
211-212 1 Detail
Page 4 of 4
27. 10.5 Action
10.6 Activity
10.7 Composite states
10.8History state
214-221 1 Detail
28. 10.10 Dynamic modeling in practice
10.11 Time events
10.12 Activity state
221-228 1 Detail
29. Exercises 231 2 Draw State Chart Diagram
Chapter 11 Component diagram
30. 11.1 Dependencies
11.2 Component and Artifacts
11.3 Component diagrams
236-239 1 Detail
31. 11.4 Some common physical relationships
11.5 Compilation dependency
Exercises
239-241
246
1 Detail
32. Revision 1
33
Project 8
34. Review 2
University of Computer Studies
B.C.Sc. (Fourth Year )
Lecture Plan (2018-2019)
CS - 403 : Operating Systems Second Semester
Text Books : Operating Systems Internals and Design Principles (7th
Edition) by
William Stallings
Course Code
Number CS-403
Second Semester
Course Title Operating System
Semester Hours 4 Hours No of Credit Units 3
Prerequisite CST-301 Course Coordinator Dr. Khine Moe Nwe
Course Description
This course is about the concepts, structure, and mechanisms of operating systems.
Modern operating systems are complex and sophisticated. Presenting these concepts has
been challenging, however fundamentals remain consistent. The intent of this course is to
provide students with an opportunity to learn and discuss certain fundamentals of the
operating system design, which depends on the current state of technology.
Objectives
• To understand the nature and characteristics of modern computer systems.
• To provide a thorough discussion of the fundamentals of operating system design and
to relate these to contemporary design issues and to current directions in the
development of operating systems.
• To understand the key aspects of concurrency on a single system, with emphasis on
issues of mutual exclusion and deadlock.
• To provide a comprehensive survey of techniques for memory management, including
virtual memory.
• To discuss the various approaches to process scheduling, Thread scheduling, SMP
scheduling, and real-time scheduling are also examined.
• Embedded systems far outnumber general purpose computing systems and present a
number of unique OS challenges.
• Provides a survey of threats and mechanisms for providing computer and network
security.
Learning Outcomes
University of Computer Studies
B.C.Sc. (Fourth Year )
Lecture Plan (2018-2019)
• An understanding of an operating system’s objectives and functions, developments
leading to modern operating systems, virtual machines, OS design considerations and
modern operating systems
• An understanding of process and threads and the issues involving their management,
communication and concurrency.
• An understanding of memory management, memory partitioning, paging,
segmentation and the concept of virtual memory.
• An understanding of how multiprocessor scheduling works and its main issues.
• An understanding of embedded operating system concepts
• An understanding of computer security concepts
References:
1. Operating Systems Internals and Design Principles (5th
Edition) by William Stallings
2. A. Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Principles, 7th edition,
2006.
Course Organization
Student participation in the course will involve the following activities:
Attending the lectures
Assignment / Test
Practical
Exams
Assessment Pattern
Class Participation 10%
Assignment / Test 10%
Lab 20%
Final Exam 60%
Periods : 30 periods for 15 weeks (50 minutes for 1 period)
No. Chapter Page Period Detail Lecture Plan
Chapter 5 Concurrency: Mutual
Exclusion and Synchronization 198 to 257 10
Lectures + Assignement
+Tutorial /Test +Exercises
University of Computer Studies
B.C.Sc. (Fourth Year )
Lecture Plan (2018-2019)
1. 5.1 Principle of Concurrency
Race Condition
Operating System Concerns
Process Interaction
Requirements for Mutual Exclusion
201 to 209 2
2. 5.2 Mutual Exclusion: Hardware
Support
Interrupt Disabling
Special Machine Instruction
209 to 213 1
3. 5.3 Semaphores
Mutual Exclusion
The Producer/ Consumer Problem
Implementation of Semaphore
213 to 226 2
4. 5.4 Monitors
Monitor with Signal
Alternate Model of Monitors with
Notify and Broadcast
226 to 232 1
5. 5.5 Message Passing
Synchronization
Addressing
Message Format
Queuing Discipline
Mutual Exclusion
233 to 239 1
6. 5.6 Readers/Writers Problem
Reader Have Priority
Writer Have Priority
239 to 243 2
7. Summary and End Chapter Test 1 All review questions
8. Chapter 6 Concurrency: Deadlock
and Starvation 258 to 304 5
Lectures + Assignement
+Tutorial /Test +Exercises
9. 6.1 Principle of Deadlock
Reusable Resources
Consumable Resources
Resource Allocation Graph
The Condition for Deadlock
6.2 Deadlock Prevention
259 to 269 1
10. 6.3 Deadlock Avoidance 270 to 275 1
11. 6.4 Deadlock Detection
6.5 An Integrated Deadlock Strategy
6.6 Dining Philosophers Problem
276 to 281 1
12. Summary and End Chapter Test 2 All review questions
13. Chapter 8 Virtual Memory 340 to 394 6
Lectures + Assignement
+Tutorial /Test +Exercises
14. 8.1 Hardware and Control Structures
Locality and Virtual Memory 341 to 360 2
University of Computer Studies
B.C.Sc. (Fourth Year )
Lecture Plan (2018-2019)
Paging
Segmentation
Combine Paging and Segmentation
Protection and Sharing
15. 8.2 Operating System Software
Fetch Policy
Placement Policy
Replacement Policy
Resident Set Management
Cleaning Policy
Load Control
360 to 379 2
16. Summary and End Chapter Test 2 All review questions
17. Chapter 10 Multiprocessor and Real-
Time Scheduling 430 to 473 5
Lectures + Assignement
+Tutorial /Test +Exercises
18. 10.1 Multiprocessor Scheduling
Thread Scheduling 431 to 442 2
19. 10.2 Real-Time Scheduling 442 to 457 2
20. Summary and End Chapter Test 1 All review questions
21. Chapter 13 Embedded Operating
Systems 573 to 579 2
Lectures + Assignement
+Tutorial /Test +Exercises
22. 13.1 Embedded Systems
13.2 Characteristics of Embedded
Operating Systems
1
23. Summary and End Chapter Test 1
Review questions: 13.1 to
13.5
24. Chapter 14 Computer Security
Threats 607 to 633 2
Lectures + Assignement
+Tutorial /Test +Exercises
14.1 Computer Security Concepts
14.2 Threats, Attacks and Assets
14.3 Intruders
14.4 Malicious Software Overview
14.5 Virus, Worms and Bots
14.6 Rootkits
396 to 400
1
Explain Detail methods of
Scheduling
25. Summary and End Chapter Test 1 All review questions
26. Appendix B Programming and Operating
System Project
Assignment