0% found this document useful (0 votes)
364 views69 pages

IADCS Handbook V3 - Oct 2004

IADCS hanbook 2004 of NCC Education Ltd.

Uploaded by

Romel Shiblu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
364 views69 pages

IADCS Handbook V3 - Oct 2004

IADCS hanbook 2004 of NCC Education Ltd.

Uploaded by

Romel Shiblu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

International Advanced Diploma in Computer Studies Syllabus and Course Handbook

NCC Education
International Advanced
Diploma in Computer
Studies (IADCS)
Syllabus & Course
Handbook

V3.0 October 2004 1


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Modification History

Version Date Description


V1.0 Sept-98 For Issue
V2.0 Oct-01 Syllabus revised to match marketplace demands
V2.1 April-02 Modifications include:
• Exam weightings revised
• Prerequisites for Enterprise Networking module altered
• Database Design and Development module - objective G
expanded
• Internet stream released
V2.2 May-02 Practical project updated
V2.3 July-02 Where to purchase recommended student books altered.
V2.5 March-03 Modifications include:
• Enterprise Networking objective weightings altered
• Database Development and Design weightings altered
• Advanced Java objectives A and B amended
• Accessing of all elective tutor materials amended
V3.0 October 2004 Modifications include:
• Expansion of syllabi for all modules
• Addition of new elective modules
• Addition of case study for Business Systems Design and
Business Systems Analysis Module
• Update of topics to various modules to reflect technology
updates

© NCC Education Limited, 2004

All Rights Reserved

The copyright in this document is vested in NCC Education Limited. The document must not be
reproduced by any means, in whole or in part, except with the prior written permission of NCC
Education Limited and then only on condition that this notice is included in any such reproduction.

Information contained in this document is believed to be accurate at the time of publication, but no
liability whatsoever can be accepted by NCC Education Limited arising out of any use made of this
information.

2 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

CONTENTS

PAGE

IADCS STRUCTURE..................................................................................................................... 6

INTRODUCTION........................................................................................................................... 7

PROFILE OF STUDENTS .................................................................................................................. 7


DELIVERY MODEL......................................................................................................................... 7
COURSE DURATION AND ASSESSMENT......................................................................................... 7
ENTRY REQUIREMENTS................................................................................................................. 7
ENGLISH LANGUAGE REQUIREMENTS .......................................................................................... 8
REGULATIONS ............................................................................................................................... 8
MODULES ...................................................................................................................................... 8
WEIGHTING OF MODULES ............................................................................................................. 9
1 BUSINESS SYSTEMS ANALYSIS (COMPULSORY MODULE)................................................... 10
1.1 INTRODUCTION ..................................................................................................... 10
1.2 GENERAL OBJECTIVES ............................................................................................. 10
1.3 SPECIFIC OBJECTIVES............................................................................................... 11
1.4 PRACTICAL WORK .................................................................................................. 13
1.5 NOTES ON BUSINESS SYSTEMS ANALYSIS .................................................................. 13
1.6 RECOMMENDED TEXTBOOK .................................................................................... 13
1.7 TUTOR RESOURCES ................................................................................................ 13
2 BUSINESS SYSTEMS DESIGN (COMPULSORY MODULE)....................................................... 14
2.1 INTRODUCTION ..................................................................................................... 14
2.2 GENERAL OBJECTIVES ............................................................................................. 14
2.3 SPECIFIC OBJECTIVES............................................................................................... 15
2.4 PRACTICAL WORK .................................................................................................. 17
2.5 NOTES ON BUSINESS SYSTEMS DESIGN..................................................................... 17
2.6 RECOMMENDED TEXTBOOK .................................................................................... 17
2.7 TUTOR RESOURCES ................................................................................................ 17
3 ENTERPRISE NETWORKING (COMPULSORY MODULE)......................................................... 19
3.1 INTRODUCTION ..................................................................................................... 19
3.2 GENERAL OBJECTIVES ............................................................................................. 19
3.3 SPECIFIC OBJECTIVES............................................................................................... 20
3.4 PRACTICAL WORK .................................................................................................. 23
3.5 NOTES ON ENTERPRISE NETWORKING ...................................................................... 23
3.6 RECOMMENDED TEXTBOOK .................................................................................... 24
3.7 TUTOR RESOURCES ................................................................................................ 24
4 DATABASE DESIGN AND DEVELOPMENT (COMPULSORY MODULE) ................................... 25
4.1 INTRODUCTION ..................................................................................................... 25
4.2 GENERAL OBJECTIVES ............................................................................................. 25
4.3 SPECIFIC OBJECTIVES............................................................................................... 25
4.4 PRACTICAL WORK .................................................................................................. 28
4.5 NOTES ON DATABASE DESIGN AND DEVELOPMENT .................................................. 28

V3.0 October 2004 3


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

4.6 RECOMMENDED TEXTBOOK .................................................................................... 28


4.7 TUTOR RESOURCES ................................................................................................ 28
5 PRACTICAL PROJECT (COMPULSORY MODULE) .................................................................. 29
5.1 INTRODUCTION ..................................................................................................... 29
5.2 DURATION ............................................................................................................ 29
5.3 GENERAL PRINCIPLES .............................................................................................. 29
6 C++ PROGRAMMING (ADVANCED PROGRAMMING ELECTIVE STREAM) ............................ 31
6.1 INTRODUCTION ..................................................................................................... 31
6.2 GENERAL OBJECTIVES ............................................................................................. 31
6.3 SPECIFIC OBJECTIVES............................................................................................... 32
6.4 PRACTICAL WORK .................................................................................................. 35
6.5 NOTES ON C++PROGRAMMING............................................................................ 35
6.6 RECOMMENDED TEXTBOOK .................................................................................... 35
6.7 TUTOR RESOURCES ................................................................................................ 35
7 ADVANCED JAVA (ADVANCED PROGRAMMING ELECTIVE STREAM).................................. 36
7.1 INTRODUCTION ..................................................................................................... 36
7.2 GENERAL OBJECTIVES ............................................................................................. 36
7.3 SPECIFIC OBJECTIVES............................................................................................... 37
7.4 PRACTICAL WORK .................................................................................................. 40
7.5 NOTES ON JAVA ................................................................................................... 40
7.6 RECOMMENDED TEXTBOOK .................................................................................... 40
7.7 TUTOR RESOURCES ................................................................................................ 40
8 ADVANCED VB .NET (ADVANCED PROGRAMMING ELECTIVE STREAM)........................... 41
8.1 INTRODUCTION ..................................................................................................... 41
8.2 GENERAL OBJECTIVES ............................................................................................. 41
8.3 SPECIFIC OBJECTIVES............................................................................................... 42
8.4 PRACTICAL WORK .................................................................................................. 45
8.5 NOTES ON ADVANCED VB .NET............................................................................. 45
8.6 RECOMMENDED TEXTBOOK .................................................................................... 45
8.7 TUTOR RESOURCES ................................................................................................ 45
9 INTERNET SYSTEMS ADMINISTRATION (INTERNET SYSTEMS ELECTIVE STREAM) .......... 46
9.1 INTRODUCTION ..................................................................................................... 46
9.2 GENERAL OBJECTIVES ............................................................................................. 46
9.3 SPECIFIC OBJECTIVES............................................................................................... 47
9.4 NOTES ON INTERNET SYSTEMS ADMINISTRATION ...................................................... 49
9.5 RECOMMENDED TEXTBOOK .................................................................................... 49
9.6 TUTOR RESOURCES ................................................................................................ 49
10 INTERNET SECURITY (INTERNET SYSTEMS ELECTIVE STREAM) ......................................... 50
10.1 INTRODUCTION ................................................................................................. 50
10.2 GENERAL OBJECTIVES .......................................................................................... 50
10.3 SPECIFIC OBJECTIVES ........................................................................................... 51
10.4 PRACTICAL WORK .............................................................................................. 52
10.5 NOTES ON INTERNET SECURITY ............................................................................ 53
10.6 RECOMMENDED TEXTBOOK ................................................................................. 53
10.7 TUTOR RESOURCES............................................................................................. 53
11 COMPUTER FORENSICS (INTERNET SYSTEMS ELECTIVE STREAM)...................................... 54
11.1 INTRODUCTION ................................................................................................. 54
11.2 GENERAL OBJECTIVES .......................................................................................... 54
11.3 SPECIFIC OBJECTIVES ........................................................................................... 55
11.4 PRACTICAL WORK .............................................................................................. 56
11.5 NOTES ON COMPUTER FORENSICS ....................................................................... 57

4 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

11.6 RECOMMENDED TEXTBOOK ................................................................................. 57


11.7 TUTOR RESOURCES............................................................................................. 57
12 BUSINESS MANAGEMENT (BUSINESS MANAGEMENT ELECTIVE STREAM) ......................... 58
12.1 INTRODUCTION ................................................................................................. 58
12.2 GENERAL OBJECTIVES .......................................................................................... 58
12.3 SPECIFIC OBJECTIVES ........................................................................................... 59
12.4 PRACTICAL WORK .............................................................................................. 61
12.5 NOTES ON INTERNET SECURITY ............................................................................ 61
12.6 RECOMMENDED TEXTBOOK ................................................................................. 61
12.7 TUTOR RESOURCES............................................................................................. 61
13 MANAGING BUSINESS PROJECTS (BUSINESS MANAGEMENT ELECTIVE STREAM) ........... 62
13.1 INTRODUCTION ................................................................................................. 62
13.2 GENERAL OBJECTIVES .......................................................................................... 62
13.3 SPECIFIC OBJECTIVES ........................................................................................... 63
13.4 PRACTICAL WORK .............................................................................................. 64
13.5 NOTES ON MANAGING BUSINESS PROJECTS .......................................................... 65
OBJECTIVE .................................................................................................................. 65
13.6 RECOMMENDED TEXTBOOK ................................................................................. 65
13.7 TUTOR RESOURCES............................................................................................. 65
14 PRINCIPLES OF WEB DESIGN (MULTIMEDIA ELECTIVE STREAM) ....................................... 66
14.1 INTRODUCTION ................................................................................................. 66
14.2 GENERAL OBJECTIVES .......................................................................................... 66
14.3 SPECIFIC OBJECTIVES ........................................................................................... 67
14.4 PRACTICAL WORK .............................................................................................. 68
14.5 NOTES ON PRINCIPLES OF WEB DESIGN ............................................................... 69
14.6 RECOMMENDED TEXTBOOK ................................................................................. 69
14.7 TUTOR RESOURCES............................................................................................. 69

V3.0 October 2004 5


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

IADCS Structure
Compulsory:

Business Systems
Analysis

Business Systems
Design

Enterprise
Networking

Database Design and


Development

Choose four Electives:

Advanced Internet Systems Business Multimedia


Programming Management
C++ Programming Internet Systems Business
Administration Management
Advanced Java Principles of Web
Managing Business Design
Advanced VB .NET Internet Security
Projects
Computer Forensics

Compulsory: Practical Project

Hours: All compulsory and elective modules are 120 hours


in duration. The Practical Project is 240 hours.

6 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

Introduction
The International Advanced Diploma in Computer Studies (IADCS) is designed to
prepare students for a career in Information and Communication Technology (ICT).
It is a practical course designed to meet the needs of employers worldwide. The
IADCS is recognised by universities in the UK, USA, and Australia as having credit
towards degree courses. In particular, students who achieve the IADCS qualification
may go on to the joint NCC Education/London Metropolitan University External BSc
(Hons) in Computing and Information Systems programme awarded by the London
Metropolitan University.

Profile of Students
The IADCS is intended for students who have achieved the International Diploma in
Computer Studies (IDCS).

Delivery Model
The IADCS is a fully modular course, consisting of 10 modules – 8 taught modules
and a Practical Project, which is a double module. The taught modules are divided
into compulsory modules and electives grouped into topic streams. To achieve the
IADCS, students must pass, as a minimum, 4 compulsory modules and 4 elective
modules and the Practical Project.
Each module is designed as a self-standing professional course, covering a specific IT
topic in detail.
Note: NCC Education supplies accredited training partners with the set texts for
the compulsory modules only. Students must purchase the set texts for the
elective modules.

Course Duration and Assessment


Each module requires 120 hours of study, comprising lectures, tutorials, practical
assignment and private study.
The full IADCS therefore comprises 10 modules of 120 hours, making 1200 hours in
total.
Assessment is by practical assignment/s and/or formal examination for each of the
taught modules, and the project is individually assessed. To achieve the IADCS,
students must pass each element of the assessment.

Entry Requirements
Applicants who wish to enter the International Advanced Diploma in Computer
Studies will need:
• an NCC Education IDCS or IDEC qualification, or

• any local or international qualification deemed to be a similar level to either


IDCS or IDEC – these shall be agreed in advance with NCC Education.

V3.0 October 2004 7


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

English Language Requirements


All tuition, examinations and subject materials for the IADCS are in English. In order
to benefit from the course of study, students will need a good understanding of the
English language. Thus, students are required to have achieved one of the following
qualifications, or be able to demonstrate ability at an equivalent level, before joining
the course of study:
• NCC Education English Language Framework Level 4.
• TOEFL® score of at least 500.
• IELTS 5.0.
• Another equivalent level.

Regulations
The NCC Education document entitled ‘Regulations for Diploma and Graduate
Qualifications’ details the regulations governing the course.

Modules
Compulsory Modules
• Business Systems Analysis
− Methods and techniques for analysing business systems.
• Business Systems Design
− Methods and techniques for designing business systems.
• Enterprise Networking
− Technologies and protocols used in the design of network systems.
• Database Design and Development
− The design of databases in an operational environment.
Elective Modules (Advanced Programming Stream)
• C++ Programming
− Advanced programming design in C++ using object-oriented techniques.
• Advanced Java
− Advanced programming design in Java.
• Advanced VB .NET
− Advanced programming design in Visual Basic.
Elective Modules (Internet Systems Stream)
• Internet Systems Administration
− Managing Internet infrastructures.
• Internet Security
− Avoiding security breaches and developing strategies for secure systems.
• Computer Forensics
− Applying computer forensics skills and techniques.

8 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

Elective Modules (Business Management Stream)


• Business Management
− Developing business strategies and using management techniques.
• Managing Business Projects
− The principles of project management and control for IT business systems.
Elective Modules (Multimedia Stream)
• Principles of Web Design
− Providing knowledge and skills to plan and develop well-designed
websites.

Weighting of Modules
The following table shows the weightings for modules of the IADCS, and the ratio of
marks between assignments and examination.

Module Title Assignments Local Exam Global Exam % of Final


Mark
Module 1 – Business
Systems Analysis 100% 10% Compulsory
Module 2 – Business
Systems Design 100% 10% Compulsory
Module 3 – Enterprise
Networking 100% 10% Compulsory
Module 4 – Database
Design and 100% 10% Compulsory
Development

C++ Programming 75% 25% 10%

Advanced Java 75% 25% 10%

Advanced VB .NET 75% 25% 10%


Any four of
Internet and Intranet
75% 25% 10%
Security these
Internet Systems electives
75% 25% 10%
Administration
(Minimum)
Computer Forensics 75% 25% 10%
Business Management 75% 25% 10%
Managing Business
75% 25% 10%
Projects
Principles of Web
75% 25% 10%
Design

Practical Project 100% - - 20% Compulsory

V3.0 October 2004 9


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

1 Business Systems Analysis (Compulsory Module)


1.1 Introduction
The business systems analyst is responsible for the investigation, analysis and
outline design stages of the system development life cycle. These phases of
work are critical to the final design and successful implementation of the
resultant system, so it is essential that they are undertaken in a professional
manner. This module is intended to provide an overview of the more
common analysis techniques and guidance on how to use them most
effectively. It also addresses the mix of business, technical and interpersonal
skills required by the successful systems analyst.

1.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Systems and Organisations
Changing organisations, functional areas, data, information, information
systems, documentation, benefits of structured methods, features (e.g.
SSADM), costs and justifications.
B. Role of the Systems Analyst
Skills and personality, other roles and relationships relevant to systems
development, and the user.
C. Systems Development Life Cycle (SDLC)
Stages and models, feasibility studies, terms of reference, systems analysis
deliverables, acceptance criteria.
D. Systems Investigation
Scope, nature, problems, techniques, recording results, user requirements
specification.
E. Data Flow Diagrams (DFDs)
Purpose, use, levels, physical and logical DFDs.
F. Data Dictionary
Purpose, content, automation.
G. Mini-specs
Forms (flowcharts, decision tables, decision trees, structured English),
documentation.
H. Entities and Relationships
Entity-Relationship (E-R) diagrams, events and their effects.
I. Data Normalisation.
J. Entity Life Histories.
K. System Constraints and System Specification.

10 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

1.3 Specific Objectives

Objective A: Systems and Organisations


A1. Define what is meant by a system, in terms of its component parts and
their interrelationships, its boundaries and its environment.
A2. Explain how an organisation works as a system.
A3. Identify external influences that may lead to change in a system.
A4. Discuss the nature of change in business organisations within their
environments.
A5. Describe the main activities of the principal functional areas and the
relationships between them in different types of organisation.
A6. Describe the role and nature of data in organisations and describe how
data may be manipulated and processed to provide information.
A7. Explain the purpose of an information system.
A8. Explain the need for standard documentation in systems analysis and
design.
A9. Describe the benefits of using a structured method in systems analysis
and design.
A10. Outline the features and facilities of a method in common use, such as
SSADM.
A11. Identify the costs of introducing a structured method and justify the
expenditure

Objective B: Role of the Systems Analyst


B1. Describe the role of the systems analyst in systems development.
B2. Identify appropriate abilities, skills and personal characteristics of the
professional systems analyst.
B3. Describe the role of the user in systems development.
B4. Identify other roles in systems development, e.g. quality assurance
manager, statistician.
B5. Identify the important relationships between individuals, groups and
organisations essential to successful system development

Objective C: Systems Development Life Cycle


C1. Identify the different stages in the Systems Development Life Cycle.
C2. Define the purpose of each stage in the Systems Development Life
Cycle.
C3. Describe at least two models of the SDLC.
C4. Describe the purpose of a feasibility study.
C5. Define the terms that should be covered in the analyst’s terms of
reference.
C6. Describe the main deliverables from the process of systems analysis.
C7. Specify effective acceptance criteria.

V3.0 October 2004 11


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective D: Systems Investigation


D1. Describe the scope and nature of the investigation stage and the
problems associated with investigation.
D2. Use appropriate investigation techniques to determine user
requirements.
D3. Describe methods of recording the results of an investigation in order to
produce a clear and unambiguous specification of user requirements.
D4. Use appropriate tools and techniques to analyse the current system, with
its associated problems and requirements.

Objective E: Data Flow Diagrams


E1. Describe the purpose and use of Data Flow Diagrams (DFDs) in systems
analysis.
E2. Define levels of DFDs.
E3. Develop physical DFDs for a system.
E4. Develop logical DFDs for a system.

Objective F: Data Dictionary


F1. Describe the purpose and contents of a Data Dictionary.
F2. Describe ways in which the Data Dictionary can be automated.

Objective G: Mini-specs
G1. Describe the forms (flowcharts, decision tables, decision trees and
structured English) that the lowest level of DFD (the mini-spec) can take.

Objective H: Entities and Relationships


H1. Identify the entities in a system.
H2. Determine relationships between entities.
H3. Construct a logical model – an Entity-Relationship diagram – of the data
in the system.
H4. Identify events and their effects.

Objective I: Data Normalisation


I1. Perform normalisation of data.

Objective J: Entity Life Histories


J1. Construct Entity Life Histories.

Objective K: System Constraints and System Specification


K1. Identify the constraints within which the system will be designed and
implemented.
K2. Prepare a system specification.

12 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

1.4 Practical Work


A practical case study is included as part of this module. The case study
covers both the systems analysis and systems design activities that would
typically be undertaken as part of an IT system development. There is a clear
division between the analysis and design stages, so whilst they are sequential,
the two stages of the case study can be undertaken separately. The intention is
that the case study should provide the student with practical experience in the
use of the systems analysis approach covered by this module.

1.5 Notes on Business Systems Analysis


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 5
C 10
D 10
E 10
F 5
G 5
H 10
I 10
J 10
K 15
1.6 Recommended Textbook
Business Systems Analysis, NCC Education, ISBN: 1-90234-348-4.
This recommended textbook is supplied to NCC Accredited Centres in an
electronic format.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

1.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook. In addition, NCC Education has
compiled a working case study for students and lecturers to follow alongside
their studies of the Business Systems Analysis and Design modules. It is highly
recommended that lecturers utilise this resource in order to provide a practical
understanding of the concepts to students. Detailed guidelines on how to use
this case study can be found in the introductory pages of the case study
document. This document is available on the materials CD of the IADCS
programme.

V3.0 October 2004 13


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

2 Business Systems Design (Compulsory Module)


2.1 Introduction
The business systems designer is responsible for the development of an
operational computer system, taking the logical statement of requirements
developed by the business systems analyst, and translating it into a system that
delivers the functions required. This module provides the student with an
overview of the key stages required to move from the logical to the physical
design, taking full account of the hardware and software constraints. It also
covers the introduction of controls to ensure the privacy and integrity of
systems and addresses the key aspects of systems implementation.

2.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Systems and Organisations
Changing organisations, functional areas, data, information, information
systems, documentation, benefits of structured methods, features, for
example, Structured Systems Analysis and Design Methodology (SSADM),
Object-Oriented (OO), costs and justifications.
B. The Systems Development Life Cycle
Stages and models, roles of people involved in systems development,
ergonomic principles for systems design.
C. Storage and Access
Logical data storage and access requirements, file organisations,
optimisation of access paths.
D. Programme Specifications
Timing of procedures (on-line, batch), response times and run times,
performance testing and tuning.
E. User Interface
Screen design, layouts, dialogues, forms design, human/computer
interface, ergonomic techniques.
F. System Requirements
Relate system requirements to constraints (technology, organisation),
input/output media.
G. Data Entry
Data entry procedures, coding and user documentation, system
documentation standards.
H. Security
Threats, failure, causes, responsibilities, risk analysis, countermeasures,
control procedures, contingency plans, recovery, audit trail, data
protection, disaster recovery planning.
I. System Implementation
Education and training requirements, systems testing, develop test plan,
acceptance testing, data conversion, system changeover, system review.
14 October 2004 V3.0
International Advanced Diploma in Computer Studies Syllabus and Course Handbook

2.3 Specific Objectives

Objective A: Systems and Organisations


A1. Define what is meant by a system, in terms of its component parts and
their interrelationships, its boundaries and its environment.
A2. Explain how an organisation works as a system.
A3. Identify external influences that may lead to change in a system.
A4. Discuss the nature of change in business organisations within their
environments.
A5. Describe the main activities of the principal functional areas and the
relationships between them in different types of organisation.
A6. Describe the role and nature of data in organisations and describe how
data may be manipulated and processed to provide information.
A7 Explain the purpose of an information system.
A8. Explain the need for standard documentation in systems analysis and
design.
A9 Describe the benefits of using a structured method in systems analysis
and design.
A10. Outline the features and facilities of a method in common use, such as
SSADM.
A11. Identify the costs of introducing a structured method and justify the
expenditure.

Objective B: The Systems Development Life Cycle


B1. Define the purpose of each stage in the Systems Development Life Cycle
(SDLC).
B2. Identify the different stages in the SDLC.
B3. Describe at least two models of the SDLC.
B4. Identify the roles of people involved in systems development.
B5. Apply ergonomic principles to systems design and development.

Objective C: Storage and Access


C1. Determine logical data storage and access requirements.
C2 Select appropriate file organisations to meet both data storage and data
access requirements.
C3. Optimise access to meet user requirements.

Objective D: Programme Specifications


D1. Produce program specifications.
D2. Describe the timing of procedures for both on-line and batch
applications.
D3. Calculate response times and run times.
D4. Identify methods for testing and tuning performance.

V3.0 October 2004 15


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective E: User Interface


E1. Specify screen layouts and design screen dialogues for both applications
and users.
E2. Design forms and define the factors to be considered in forms design.
E3. Define the human/computer interface and apply appropriate ergonomic
techniques to its design.

Objective F: System Requirements


F1. Relate system requirements to available technology and organisational
constraints.

Objective G: Data Entry


G1. Establish procedures to ensure accurate and timely data entry.
G2 Construct codes to meet system requirements.
G3. Prepare user documentation (for manual procedures).
G4. Prepare necessary system documentation to agreed standards.

Objective H: Security
H1. Identify possible threats to, and sources of failure in, computer-based
systems.
H2. Identify the security responsibilities of both IT and senior management.
H3. Perform a risk analysis.
H4. Describe countermeasures to protect a system from risk and use this
knowledge to design more secure systems.
H5. Specify and design control procedures in a system.
H6. Outline control procedures to protect systems from unauthorised access.
H7. Describe contingency plans and recovery procedures.
H8. Design audit trails and carry out system reviews to prevent error and
fraud.
H9. Apply data protection principles to systems design (such as those
specified by the European Union).
H10. Identify the data protection requirements of the state or country
concerned.
H11. Specify the elements to be included in a disaster recovery plan.

Objective I: System Implementation


I1. Design and plan the activities essential in preparing for implementation.
I2. Specify the education and training requirements essential to
implementation of a system, particularly for users.
I3. Define the scope of test data and systems testing.
I4. Develop a test plan for a computer-based system.
I5. Describe procedures for acceptance testing.

16 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

I6. Highlight the problems associated with data conversion and file set-up.
I7. Describe the main options for changeover to new system procedures.
I8. Produce the documentation needed to specify the changeover.
I9. Conduct a system review and evaluate the effectiveness of the system in
relation to cost and meeting user requirements.

2.4 Practical Work


A practical case study is included as part of this module. The case study
covers both the systems analysis and systems design activities that would
typically be undertaken as part of an IT system development. There is a clear
division between the analysis and design stages, so whilst they are sequential,
the two stages of the case study can be undertaken separately. The intention is
that the case study should provide the student with practical experience in the
use of the systems design approach covered by this module.

2.5 Notes on Business Systems Design


The suggested breakdown of the teaching times for the objectives is shown
below.

Objective % of total time


A 5
B 5
C 10
D 15
E 15
F 10
G 10
H 15
I 15

2.6 Recommended Textbook


Business Systems Design, NCC Education, ISBN: 1-90234-349-2.
This recommended textbook is supplied to NCC Accredited Centres in an
electronic format.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

2.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook. In addition, NCC Education has
compiled a working case study for students and lecturers to follow alongside
their studies of the Business Systems Analysis and Design modules. It is highly
recommended that lecturers utilise this resource in order to provide a practical
understanding of the concepts to students. Detailed guidelines on how to use

V3.0 October 2004 17


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

this case study can be found in the introductory pages of the case study
document. This document is available on the materials CD of the IADCS
programme.

18 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

3 Enterprise Networking (Compulsory Module)


3.1 Introduction
Effective communications, both internally and with external customers,
business partners and associates, is vital to the success of the modern
business. The Internet and a range of emerging network and
telecommunications technologies are all playing a critical role in addressing
these communications requirements. This module provides the student with
the necessary skills to understand the networking options that are available to
a business, evaluate their requirements, and determine the most appropriate
networking solution to meet their data and voice requirements.

3.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Networking Fundamentals
Introduce the service and bearer networks, and the various network
configurations.
B. Transmission Principles
Describe analogue and digital transmission systems and the various
modulation techniques.
C. Telecommunications Principles
Define the different types of signalling systems and basic
telecommunications traffic theory.
D. Networking Media
Describe packet switching, Integrated Services Digital Network (ISDN) and
broadband technologies.
E. The Internet
Describe the roles of the various protocols in the development and use of
the Internet.
F. Mobile and Wireless
Describe the equipment used and the standards and business benefits
associated with the use of mobile and wireless technologies.
G. Onsite Networking
List the data and telecommunications equipment used in the provision of
onsite networking services.
H. Network Management
List the significant aspects of network management and their importance to
network users and operators.
I. Network Security
Discuss the security threats posed to a secure network and the range of
countermeasures that can be employed.

V3.0 October 2004 19


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

J. Network Planning
Describe the main activities associated with the planning and design of
networks.

3.3 Specific Objectives

Objective A: Networking Fundamentals


A1. Identify the different types and characteristics of networks.
A2. Explain the relationship between ‘service’ and ‘bearer’ networks.
A3. Explain the main functions of the ISO seven-layer model.
A4. List the main functions of a telecommunications network from the point
of view of a user of the network.
A5. List the types of bearers used in today’s telecommunications networks
and briefly describe the main benefits of each.
A6. Demonstrate the differences between fully interconnected, bus and ring
network configurations.
A7. Explain the difference between star and interconnected star networks.
A8. Explain what is meant by a through-connected circuit.
A9. Explain the concept of a carrier’s carrier.

Objective B: Transmission Principles


B1. Differentiate between analogue and digital transmission systems.
B2. Explain the reasons for the adoption of digital transmission techniques as
opposed to analogue.
B3. Explain the meaning of the expression ‘bandwidth’.
B4. Describe the various modulation techniques used in
telecommunications.
B5. Explain the difference between Frequency and Time Division
Multiplexing.
B6 Outline current developments in data transmission and digital
networking hierarchies.
B7. Describe the principles of Dense Wave Division Multiplexing (DWDM).
B8. Define UDP-based Data Transport (UDT)

Objective C: Telecommunications Principles


C1. Identify the different types of signalling systems.
C2. Explain the difference between forward and backward signals.
C3. Describe the principles of common-channel signalling.
C4. Explain the differences between common-channel and channel
associated signalling.
C5. Explain the structure of the Common Channel Signalling System No. 7.
C6. Explain basic telecommunications traffic theory.

20 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

C7. Explain the terms ‘Erlang’, ‘Grade of Service’, ‘Availability’ and


‘Probability’.
C8. Explain the difference between lost call and delayed call systems.
C9. Describe the problems of congestion and overload.
C10. Explain the implications of automatic alternative routing.

Objective D: Networking Media


D1. Compare and contrast packet switching with circuit and message
switching.
D2. Describe the equipment and techniques needed for packet switching.
D3. Describe in outline the X.25 standard.
D4. Describe Frame Relay in outline.
D5. Explain the importance of packet switching for the Internet.
D6. Describe the services provided by Voice over IP (VoIP).
D7. Explain the principal elements of an Integrated Services Digital Network
and describe some of the major services that it could provide.
D8. Explain the two principal access structures for ISDN which have been
defined by the ITU-T.
D9. Describe the ISDN services that are available and the advantages they
offer to data communications and telephony users.
D10. Describe the main features of broadband technology and the reasons for
its growth.
D11. Explain the key features of the Asynchronous Transfer Mode of data
transmission.
D12. Describe the various types of copper based broadband, including ADSL,
RADSL and cable broadband.

Objective E: The Internet


E1. Describe the background to the development of the Internet.
E2. Explain the organisations and mechanisms that guide the development of
the Internet.
E3. Explain the role played by various protocols, especially TCP/IP.
E4. Describe the development and application of the World Wide Web.
E5. Explain the reasons for the development of IPv6.
E6. Describe the two parts of the IPv6 protocol.
E7. Describe the role of ICANN in managing Internet addresses.

Objective F: Mobile and Wireless


F1. Identify the major types of mobile communications networks.
F2. Distinguish cellular radio from private mobile radio by indicating the
features of each one.
F3. Compare mobile networks to traditional terrestrial networks, stating the
advantages and disadvantages of using them for transferring data.

V3.0 October 2004 21


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

F4. Describe the basic types of paging services and their limitations.
F5. Explain the benefits of the General Packet Radio Service (GPRS).
F6. List the potential benefits of wireless connectivity.
F7. Describe the communication equipment used by wireless networking.
F8. Define the standards used in wireless networking.
F9. Identify the range over which radio signals can be transmitted.
F10. Describe the role of wireless hotspots.
F11. Discuss the major security issues associated with the use of wireless
technology.
F12. Describe how Bluetooth technology operates.

Objective G: Onsite Networking


G1. Describe the main equipment or systems likely to be adopted by users
for connection to public telecommunications networks.
G2. List the main functions of a telephone instrument and explain the key
features they offer to users.
G3. Explain the main differences between a PBX and a KTS.
G4. Describe the key features of Voice Processing and the systems that use it.
G5. Define what is meant by Digital Enhanced Cordless Telecommunications
(DECT).
G6. List the characteristics of a Local Area Network (LAN) and state how a
LAN differs from a Wide Area Network (WAN).
G7. Describe various types of physical network cabling used for LANs.
G8 Describe Ethernet and list the standards that apply.
G9 Describe the CSMA/CD access method and explain its importance.
G10. Describe Token Ring and list the standards that apply.
G11. Describe the characteristics of peer-to-peer and client/server networking.
G12. Explain what is meant by the terms Intranet and Extranet.

Objective H: Network Management


H1. List the most significant aspects of network management, and explain the
importance of each.
H2. Explain why network management is important to network users.
H3. Explain why network management is important to network operators.
H4. Explain the functions of fault management in a network management
system.
H5. Explain the benefits of domain based networking in managing and
supporting a network system.

Objective I: Network Security


I1. Explain what is meant by a secure network.
I2. Identify the major threats to the security of networks.

22 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

I3. Describe what countermeasures might be used to counteract those


threats.
I4. Explain what a Denial of Service (DoS) attack seeks to achieve.
I5. Discuss the security benefits provided by Virtual Private Networks
(VPNs).
I6. Describe the Secure IP (IPSEC) protocol suite.
I7. Explain the role of the Point-to-Point Tunnelling Protocol (PPTP) in
network security.

Objective J: Network Planning


J1. Briefly describe the five main areas involved in network planning.
J2. Explain the importance of traffic analysis to network design and the role
played by queuing theory.
J3. List the factors to be considered in balancing network cost and network
resilience.
J4. Discuss the importance of budgeting in the network planning process.
J5. Outline a typical project planning cycle for implementing a LAN.

3.4 Practical Work


There is no case study included within this module. However, there are a
number of practical exercises contained within all chapters of the student
workbook, all designed to reinforce the major points covered in the
associated chapter of the book.

3.5 Notes on Enterprise Networking


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 10
C 15
D 15
E 10
F 10
G 10
H 5
I 10
J 5

V3.0 October 2004 23


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

3.6 Recommended Textbook


Enterprise Networking, NCC Education, ISBN: 1-90234-350-6.
This recommended textbook is supplied to NCC Accredited Centres in an
electronic format.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

3.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook.

24 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

4 Database Design and Development (Compulsory Module)


4.1 Introduction
This module is intended to provide the student with a basic understanding of
database concepts and an appreciation of the key issues in successful database
development. It will also provide an awareness of the architecture of a
DataBase Management System (DBMS) and the associated issues of physical
design and database administration.

4.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Database Fundamentals
Storage structures, data types, databases, data dictionaries, data models,
DBMS, database administration, integrity, independence, concurrency.
B. Data Models
Features of relational, hierarchical and network models, Object-Oriented
(OO) data model, post relational data model.
C. DBMS Interface (SQL) and Commercial Systems
Structured Query Language (SQL) interface, relational algebra, commercial
databases (e.g. ORACLE).
D. Data Organisation, Access Mechanisms and Transaction Management
Distinguish between logical and physical organisation of data, main forms
of data organisation used in DBMS, indexes and transactions.
E. Database Development
Normalisation, TNF, E-R diagrams, tables, relational schemas physical
design.
F. Data Administration and Data Security Management
Data dictionary, database security issues, role of Database Administrator,
control access to DBMS features.
G. Distributed Databases, Intelligent Databases, Decision Support, Data
Warehousing and OLAP.
Understand concepts of distributed DBMS, client-server, data warehouse,
On-Line Analytical Processing (OLAP) and data mining.
4.3 Specific Objectives

Objective A: Database Fundamentals


A1. Explain the concept of a database.
A2. Describe and define the key properties of a database system.
A3. Explain the concept and purpose of a database management system
(DBMS).
A4. Explain what is meant by the terms ‘concurrency’ and ‘transaction’.

V3.0 October 2004 25


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

A5. Explain the concept of redundancy, in terms of a database.


A6. Distinguish between a database, a DBMS and a data model.
A7. Describe the main properties of a database – data sharing, data
integration, data integrity, data security, data abstraction and data
independence.
A8. Distinguish between a ‘conceptual model’, a ‘logical model’ and a
‘physical model’.
A9. Distinguish between ‘logical’ and ‘physical’ database design.
A10. Define what is meant by ‘data analysis’
A11. Describe the key phases in the database development process.
A12. Distinguish between ‘data’, ‘information’ and ‘knowledge’.
A13. Distinguish between a production database and a decision-support
database.
A14. Describe the three-level architecture of a DBMS, as set out in the
ANSI/SPARC model.
A15. Explain the key functions in a DBMS.

Objective B : Data Models


B1. Describe the key features of the relational data model in terms of data
definition, data manipulation and data integrity.
B2. Describe the key features of the hierarchical and network models in
terms of data definition, data manipulation and data integrity.
B3. Compare the hierarchical and network data models with the relational
data model.
B4. Describe the key features of the Object-Oriented (OO) data model in
terms of data definition, data manipulation and data integrity.
B5. Describe the main differences between the OO data model and the
relational data model.
B6. Describe some of the key features of the post-relational data model.

Objective C: DBMS Interface (SQL) and Commercial Systems


C1. Describe the key features of SQL in terms of data definition, data
manipulation and data integrity.
C2. Construct SQL statements to define and manipulate data and to maintain
the integrity of data in a database.
C3. Outline the major end-user interfaces available in current DBMS.
C4. Explain what is meant by Query By Example (QBE) and Graphical User
Interfaces (GUI)
C5. Gain practical experience of using a commercial DBMS such as MS
Access or Oracle.
C6. Describe the main features of MS Access or Oracle.

26 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

0bjective D: Data Organisation, Access Mechanisms and Transaction


Management
D1. Distinguish between logical and physical organisation of data.
D2. Describe the major features of the physical organisation of data.
D3. Describe the main types of file organisation.
D4. Investigate the forms of data organisation used in a DBMS.
D5. Explain the concept of an access mechanism.
D6. Define the concept of an index.
D7. Describe a number of different types of access mechanism.
D8. Explain the principle of a B-tree index.
D9. Investigate how a DBMS uses indexes.
D10. Explain the concept of a transaction.
D11. Give examples of the types of transaction problems introduced by
concurrency, such as the ‘lost update’ problem and how these problems
may be resolved.

Objective E: Database Development


E1. Explain the purpose of normalisation in database design.
E2. Produce Third Normal Form (TNF) structures from a given set of data.
E3. Describe the key elements of the Entity-Relationship (E-R) approach to
data analysis.
E4. Describe the three basic constructs in the E-R model.
E5. Explain the concepts of ‘cardinality’ and ‘participation’ (or ‘optionality’).
E6. Produce an E-R diagram from a given scenario.
E7. Simplify ‘many-to-many’ relationships in an E-R diagram.
E8. Identify potential pitfalls in entity modelling.
E9. Describe the major activities of physical database design.
E10. Explain the techniques you could use to obtain a reasonable level of
performance from a specific scenario – overview only.

Objective F: Database Administration and Data Security Management


F1. Explain the difference between ‘data administration’ and ‘database
administration’.
F2. Define the concept of a data dictionary.
F3. Consider the issue of database security.
F4. Explain the role of the Database Administrator (DBA).
F5. Explain how the DBA can allocate and control access to DBMS
functions.

V3.0 October 2004 27


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective G: Distributed Databases, Intelligent Databases, Decision


Support, Data Warehousing and OLAP.
G1. Understand the concept of a distributed DBMS.
G2. Understand the concept of a client-server database system.
G3. Define the concept of a data warehouse and that of a data mart.
G4. Discuss some of the benefits and challenges of data warehousing.
G5. Define the concept of On-line Analytical Processing Applications
(OLAP).
G6. Define the concept of Data Mining.

4.4 Practical Work


There is no formal case study associated with this module. However, the
student workbook contains practical exercises at the end of some chapters,
designed to reinforce the main points covered in the chapter.

4.5 Notes on Database Design and Development


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 20
B 15
C 15
D 10
E 25
F 10
G 5

4.6 Recommended Textbook


Database Systems, Macmillan, ISBN: 1-90234-351-4.
This recommended textbook is supplied to NCC Accredited Centres in an
electronic format.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

4.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook.

28 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

5 Practical Project (Compulsory Module)


5.1 Introduction
The purpose of the Practical Project module is to provide students with
practical experience in the application of the subjects studied as Electives. All
work done for a project MUST BE ADDITIONAL to any work done during the
course or as assignments.
The following rules should apply to the selection of a Practical Project.
If a candidate majors in:

• Advanced Programming – then the project will be a programming project


using one of the languages studied.
• Internet Systems – then the project will be based around the development
of security or administration of an Internet system.

• Business Management – then the project will be to based on the


integration of techniques and process principles by business organisations,
such as:
Strategic planning Finance techniques
Change management Systems development
Risk management Quality assurance
5.2 Duration
The size of the project should be such that an average student will take 240
hours to complete it. The project requires a minimum of 240 hours work.

5.3 General Principles


Students who are employed may present a ‘live’ project, or part of a project,
which meets a need of their employer. If there is any doubt as to the
acceptability or scale of such a project the advice of the NCC Education
Regional Moderator should be sought.
Students must make a bona fide attempt at each element of a project but it is
not stipulated that every element should attain a pass mark.
Projects must be appropriate. Tutors/lecturers must counsel and supervise
students, especially in the selection of projects in the first instance. If a project
is found not to be practicable it should be abandoned at the earliest possible
moment.
The formal start of the project should be an agreed statement of requirements
along with a specification.
Students should produce a plan for their project, indicating the effort and
elapse time they expect to spend on each activity. The plan should be
assessed and approved by the project supervisor and a work record
maintained to show progress against the plan. This will enable both the
students and their tutor/lecturer to assess how they are progressing and any

V3.0 October 2004 29


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

potential problems that might arise relating to the final submission date for the
project.
Group projects are acceptable. However, groups should not consist of more
than 3 people. Within a group project, although some division of labour
might be sensible, each student will still be marked for each element. It will
often be the case that students within a group will receive different marks for
the project. Where there is a sub-division of work, this must be specified in
detail.
A group project requires a minimum of 240 hours of work from each student,
and group projects must be increased pro rata.

30 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

6 C++ Programming (Advanced Programming Elective Stream)


6.1 Introduction
The overriding aim of this module is to teach C++ through a large range of
programming problems. The second aim of this module is to focus on the
Object-Oriented Programming concepts which are supported by C++.
Although some familiarity with other High Level Programming Language is
assumed, this module provides a comprehensive coverage of C++. In
addition, problem solving is one of the skills, which is further developed in
this module due to the practical approach which is adopted. The task of
programming cannot be separated from the Software Development Life Cycle
concepts, which also receive some attention in the context of this module.

6.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. The basic Data Types and a Simple Program
Explain the meaning of the terms such as variable, operator, expression
and statement in the context of a simple program. Make effective use of
program style and the standard input/output.
B. Program Control Statements
Explain how programs are developed using control constructs called
sequence, selection and repetition. Have a knowledge of conditional
expressions and statements and their relationship with the selection and
iteration.
C. Arrays and Strings
Define and use an array as an example of a simple data structure. Describe
the meaning of string and its associated operations as an array of
characters. Make use of the data structure in an appropriate programming
context.
D. Functions
Use a function and differentiate between a function declaration and a
function definition.
Define functions with and without parameters covering parameter passing
and optional parameter.
Define and use overloaded and recursive functions.
E. Pointers and Linked Structures
Use pointers to access array elements, passing argument to a function,
passing arrays and strings to functions, obtaining memory from the system
and creating data structures such as linked lists or trees.
F. Objects and Classes
Discuss Object Orientation in program design and be able to define a
class and create objects.
Distinguish between member functions, member data items, inline
member functions.
Discuss the role of constructors, destructors and information hiding.

V3.0 October 2004 31


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

G. Inheritance and Polymorphism


Explain the benefits of using class hierarchies and inheritance in program
development.
Make effective use of base and derived classes and the access control.
Discuss the relationship between virtual functions, polymorphism and
multiple inheritance.
H. Templates and Exceptions
Discuss and use function templates and class templates in the context of
larger programs.
Discriminate between exceptions, multiple exceptions, exception with
arguments and built-in exceptions.
I. Streams and Files
Comprehend the general principles behind the C++ stream class
hierarchy, ios and error handling.
Make use of the overload operators << and >> for writing or reading
objects to disk files.
J. Graphics
Explain setting up for graphics mode, text-mode graphics and text in
graphics mode.
Take advantage of simple graphics components such as shapes, lines,
colour, pattern or windows as C++ objects.

6.3 Specific Objectives

Objective A: The basic Data Types and a Simple Program


A1. Gain an insight into problem solving and programming.
A2. Differentiate between the program structure and layout.
A3. Explain the source text components.
A4. Understand the concepts of variable, type and constants.
A5. Use the appropriate operators and expressions to obtain the correct
result.
A6. Utilise assignment statement, casting and short-hand notations where
needed
A7. Take advantage of simple input/output and formatting I/O using
manipulators.
A8. Understand and explain a program as a sequence of statements.

Objective B: Program Control Statements


B1. Explain the relationship between the relational operators and logical
expressions.
B2. Make effective use of for loop, while loop and do loop in the
implementation of iteration.
B3. Use if statement, if…else statement, switch statement to control flow of
control within a program.

32 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

B4. Discuss the issues related to nested loops and nested conditional
statements.
B4. Understand and use the statements exit, go to, continue and break in
directing the flow of control within a program.
Objective C: Arrays and Strings
C1. Understand the rationale behind the array data structure and make
effective use of it in appropriate programming context.
C2. Explore the various searching and sorting techniques based on arrays.
C3. Utilise multi-dimensional arrays where an array of arrays is involved.
C4. Do string processing which is based on an array of characters and its
associated functions.
C5. Organise a program's data as an array of structures or objects where
appropriate.
Objective D: Functions
D1. Understand the role of functions in modular programming.
D2. Define and use functions to give a program a better or cleaner structure.
D3. Make use of parameter passing to maintain safe communication between
the calling and called subprograms.
D4. Explain the advantages of function overloading and optional arguments
and use them where appropriate.
D5. Take advantage of recursive functions where it could provide a cleaner
structure.
Objective E: Pointers and Linked Structures
E1. Understand and explain the use of pointers in C++ programs.
E2. Learn and exploit the relationship between addresses and pointers,
pointers and arrays, pointers and functions and pointers and strings
within a program.
E3. Use pointers to create data structures such as liked lists and trees.
E4. Store and retrieve a linked structure onto a secondary storage.
E5. Explain the role of pointer in memory management through the use of
the functions new or delete.
E6. Appreciate the insecurity of pointer manipulation and difficulty of
program debugging.
Objective F: Objects and Classes
F1. Distinguish between a class and an object.
F2. Use a class name as a type to declare simple objects or a structure of
objects.
F3. Distinguish between reference to an object and state of an object.
F4. Explain the structure of a class including data members, member
functions, constructors and destructors.

V3.0 October 2004 33


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

F5. Appreciate that a member function has access to all the member data
items within its class and it can also take an object as its argument and
return an object as a value.
F6. Take advantage of static member data or member function where
appropriate.
Objective G: Inheritance and Polymorphism
G1. Understand the significance of inheritance in programming and the
concept of information hiding and re-usability.
G2. Understand the relationship between the base class, derived class,
accessing base class members and the protected access specifier.
G3. Use derived class constructors and overriding member functions where
appropriate.
G4. Explain the role of abstract base class and virtual functions within a class
hierarchy.
G5. Appreciate the role of polymorphism and program extensibility within a
larger programming context.
G6. Explain the ambiguity in multiple inheritances, advantages of having
classes within classes and the effect of access verifiers within a class
hierarchy.
Objective H: Templates and Exceptions
H1. Design and use function and class templates in a larger programming
context.
H2. Describe the role of exceptions in relation to error handling within a
program.
H3. Take advantage of built-in exceptions within C++ programming
language.
H4. Understand and use multiple exceptions and exceptions with arguments
within a wider programming context.
Object I: Streams and Files
I1. Explain the need for input and output procedures.
I2. Gain insight into the system of classes in the iostream library.
I3. Describe the role of formatted I/O in programming and use it where
appropriate.
I4. Explain how the stream input and output operators work and use them
within a program.
I5. Make use of text files and objects files within a program.
I6. Understand and how to do formatted I/O, how to overload the input and
output operators and how to attach streams to files.
Objective J: Graphics
J1. Understand, set up and use text-mode graphics or graphic modes in a
program.

34 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

J2. Explore the use of shapes, lines, colour and pattern within a
programming context.
J3. Appreciate graphics shapes as C++ objects.
J4. Exploit the use of text in graphics mode where appropriate.
6.4 Practical Work
The practical component of this module is made up of a number of
programming problems. Between them, they cover the programming concepts
enumerated above. Some of the problems are deliberately open-ended in
order to provide a level of challenge or sophistication in design and
implementation. In addition, the entire module's emphasis is on sound
Software Engineering Principles.

6.5 Notes on C++Programming


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 5
B 10
C 10
D 10
E 15
F 15
G 15
H 5
I 10
J 5

6.6 Recommended Textbook


Object-Oriented Programming Using C++, Galatea Training Services, ISBN:
1-90234-360-3.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

6.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook. This book also has its own website
that has numerous resources for lecturers. To access/download these
additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-619-03361-4
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

V3.0 October 2004 35


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

7 Advanced Java (Advanced Programming Elective Stream)


7.1 Introduction
The overriding aim of this module is to teach JAVA through a large range of
programming problems. The second aim of this module is to focus on the
Object-Oriented Programming concepts which are supported by JAVA.
Although some familiarity with other High Level Programming Language is
assumed, this module provides a comprehensive coverage of JAVA. In
addition, problem solving is one of the skills which are further developed in
this module due to the practical approach which is adopted. The task of
programming cannot be divorced from the Software Development Life Cycle
concepts which also receive some attention in the context of this module. In
addition, the entire module's emphasis is on sound Software Engineering
Principles.

7.2 General Objectives


Upon successful completion of this module, the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. The Building Blocks
The meaning of the terms such as variable, constant, operator, expression
and statement in the context of a simple program are explained and
demonstrated. Effective use of program style and the standard input/output
also receive attention.
The use of control constructs such as sequence, selection and repetition
demonstrated through examples. Conditional expressions and statements
and their relationship with the selection and iteration will be covered.
B. Arrays and Strings
One-dimensional and multi-dimensional arrays are studied and used in
practical work. The String class provided by the Java language and its
associated operations are also covered.
C. Classes and Objects
Classes form the heart of object-oriented programming. Here we explore
how a class is created and used. Class variables, instance variables,
constructors, destructors, methods are among the class components which
are studied.
D. Inheritance and Polymorphism
Inheritance and polymorphism and object-oriented programming are
intrinsically linked. These concepts are explored through the use of class
hierarchies, abstract classes, interface and inner classes. The two topics of
access attributes and multiple inheritance are also discussed.
E. Exceptions
Java uses exceptions to signal serious problems as a program executes.
The topics of built-in exceptions and user defined exceptions are studied
and their use demonstrated.

36 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

F. Streams and Files


Input/output facilities of Java are composed of a relatively large number of
classes which exploits the two concepts of inheritance and polymorphism.
Creating, managing the varying type of files and their error handling will
be covered to sufficient depth.
G. Utility Classes
This package provides a set of general purpose classes that covers a wide
variety of applications. Due to their large number, this section covers
some of the classes which manage numerous data structures such as stack,
queues, trees, etc.
H. Threads
Java programs can have several independent sequences of executions, or
threads. This section focuses on the creation of threads, communication
among threads and sharing of common resources.
I. Graphics, Applets and Web Programming
The Java language provides a rich set of graphical operations. Some of the
topics which are going to be covered and used are colours, fonts, images
and animation.
J. Network Programming
Network programming involves applications running on two or more
computers working in a cooperative fashion to solve particular problems.

7.3 Specific Objectives

Objective A: The building blocks


A1. Gain an insight into problem solving and programming within an object-
oriented paradigm.
A2. Differentiate between the program structure and layout.
A3. Handle various types and their operations, expressions, assignment and
casting.
A4. Take advantage of simple input/output and formatting I/O.
A5. Make effective and efficient use of loops and conditional statements.
A6. Discuss the issues related to nested loops and nested conditional
statements.
A7. Understand and use the statements exit, go to, continue and break in
directing the flow of control within a program.

Objective B: Arrays and Strings


B1. Understand the rationale behind the array data structure and make
effective use of it in appropriate programming context.
B2. Explore the various searching and sorting techniques based on arrays.
B3. Utilise multi-dimensional arrays where an array of arrays is involved.
B4. Use string processing which is based on Java String class.

V3.0 October 2004 37


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

B5. Explain the array storage allocation, the class Arrays and an array having
Object as its type.

Objective C: Classes and Objects


F1. Distinguish between a class and an object.
F2. Use a class name as a type to declare simple objects or a structure of
objects.
F3. Distinguish between reference to an object and state of an object.
F4. Define class methods which may be overloaded or recursive.
F5. To explain the purpose of a constructor which may be overloaded.
F6. Understand the role of access attributes and information hiding.

Objective D: Inheritance and Polymorphism


G1. Understand the significance of inheritance in programming and the
concept of information hiding and re-usability.
G2. Understand the relationship between the super class, sub-class,
accessing super class members and the access attributes.
G3. Use super class constructors and overriding member functions where
appropriate.
G4. Explain the role of an abstract class, abstract methods and access
attributes within a class hierarchy.
G5. Understand and use inner classes where the intricacies of the problem
demand.
G6. Appreciate the role of polymorphism and program extensibility within a
larger programming context.
G7. Explain the issue of multiple inheritances in relation to Java interface

Objective E: Exceptions
E1. Describe the role of exceptions in relation to error handling within a
program.
E2. Take advantage of built-in exceptions within JAVA programming
language.
E3. Understand and use multiple exceptions and exceptions with arguments
within a wider programming context.
E4. Guarantee that a particular block of code in a method will always be
executed.

Objective F: Streams and Files


F1. Explain what a stream is and what classes Java provides to support
stream.
F2. Use file objects to create and test files and directories.
F3. Read and write from a stream.
F4. Read the value of basic Java types from the keyboard.

38 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

F5. Read or write to any position in a file (random access).


F6. Write objects to a file and read them back.
F7. Obtain formatted input from a character stream.
F8. Concatenate several streams so that it can read them as a single stream.

Objective G: Utility Classes


G1. Learn and use the data structures sets, lists and maps.
G2. Explain the significance of container classes in design and
implementation.
G3. Manage Vector objects so that storing and retrieving elements is type
safe.
G4. Store and retrieve objects in a hash table represented by HashMap
objects.
G5. Generate hash codes for class objects where appropriate.
G6. Discuss the role of Observable class and the Observer interface to
communicate between objects.

Objective H: Threads
H1. Explain what a thread is and how it is created and used.
H2. Control interactions between threads.
H3. Use synchronisation methods to manage sharing of common resources
among threads.
H4. Explain what deadlocks are and how to avoid them in a program.
H5.. Take advantage of thread priorities where appropriate.

Objective I: Graphics, Applets and Web Programming


I1. Understand graphics contexts and graphics objects.
I2. Manipulate colours, fonts and geometrical shapes.
I3. Understand the design principles of graphical user interfaces (GUI).
I4. Discuss the packages containing GUI components and event handling
classes and interfaces and make effective use of them.
I5. Create and manipulate components such as buttons, labels, lists, text
fields and panels.
I6. Understand and be able to use layout managers.
I7. Design and implements Applets

Objective J: Network Programming


J1. Understand Java networking with URLs, sockets and datagrams.
J2. Implement Java networking applications by using sockets and diagrams.
J3. Understand how to implement Java clients and servers that communicate
with one another.
J4. Understand how to implement network-based collaborative applications.
J5. To construct a multi-threaded server.
V3.0 October 2004 39
Syllabus and Course Handbook International Advanced Diploma in Computer Studies

7.4 Practical Work


The practical component of this module is made up of a number of
programming problems. Between them, they cover the programming concepts
enumerated above. Some of the problems are deliberately left rather vague or
open-ended in order to provide a level of challenge or sophistication in
design and implementation.

7.5 Notes on JAVA


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 10
C 10
D 10
E 5
F 10
G 10
H 10
I 15
J 10
7.6 Recommended Textbook

Java Programming: Advanced Topics, Galatea Training Services, ISBN: 1-


90234-361-1.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

7.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook. This book also has its own website
that has numerous resources for lecturers. To access/download these
additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-7600-1098-6
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

40 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

8 Advanced VB .NET (Advanced Programming Elective Stream)


8.1 Introduction
Visual Basic (VB) has revolutionised the development of software, and the
release of VB .NET has increased the range of features and functionality
available. This module is intended to provide the student with the capability
to exploit these features and to create programs that meet the requirement of
real-world business applications.
The syllabus covers many of the advanced features of Visual Basic .NET, so
the student should already be familiar with the fundamentals of this
programming language.

8.2 General Objectives


Upon successful completion of this module the student will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Visual Studio .NET
Discuss the design philosophies behind .NET and how the elements of
Visual Studio .NET are related.
B. Core Concepts of Desktop Applications
Examine the core concepts necessary to implement a desktop Windows
application.
C. Core Syntax Concepts of Desktop Applications
Describe the types that comprise a VB .NET application and how these
types are used and organised.
D. Inheritance and Overloading
Explain the concepts of overloaded members, and inheritance and
constructors.
E. Working with the Windows File System
Discuss how to work with the Windows file system by navigating between
directories.
F. Interface-Based Programming
Describe how to implement predefined .NET interfaces and create custom
interfaces.
G. ADO.NET
Define ADO.NET and the essential ADO.NET classes.
H. Working with Data from Multiple Tables
Describe how to use Toolbox controls and tools supplied by the Visual
Studio .NET IDE to create OleDbConnections and OleDbDataAdapters.
I. Crystal Reports
Explain how to create and print reports using Crystal reports.
J. Common Window Controls
Discuss how to use the Windows common controls, including the
ToolBar, StatusBar, TreeView and ListView controls.

V3.0 October 2004 41


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

K. Creating .NET Controls


Discuss the supported techniques to create custom .NET controls.
L. Drawing and the Graphical Device Interface
Explain how to draw graphical shapes such as lines and rectangles to
various output devices.
M. MDI Programming
Describe MDI programming concepts and how to implement MDI
programs.

8.3 Specific Objectives

Objective A: Visual Studio .NET


A1. Discuss the features of Visual Studio .NET.
A2. Describe the services supplied by the Common Language Runtime,
(CLR).
A3. Understand the concept of assemblies and the organisation of
namespaces.
A4. Understand the .NET Framework class library.
A5. Discuss the syntax of Intermediate Language (IL).

Objective B: Core Concepts of Desktop Applications


B1. List the types of Visual Basic .NET applications.
B2. Describe the organisation of a Visual Basic .NET application.
B3. List the windows that comprise the Visual Studio .NET IDE.
B4. Describe the basic operation of Windows forms.
B5. Understand the purpose of VB .NET controls.
B6. Understand the operation of VB .NET event handlers.

Objective C: Core Syntax Concepts of Desktop Applications


C1. Understand the concept of component programming.
C2. Describe how to organise data through the use of structures.
C3. Explain how to work with module blocks and classes.
C4. Discuss how to work with shared data and shared methods.

Objective D: Inheritance and Overloading


D1. Understand the basics of OOP design.
D2. Describe the role of overload members.
D3. Describe how derived classes inherit from base classes.
D4. Explain how to override properties and methods from a base class.
D5. Describe how to work with inheritance and constructors.
D6. Describe how to declare and raise events for a class.
D7. Explain how VB .NET handles runtime errors through the use of the Try,
Catch, Finally and End Try statements.

42 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

Objective E: Working with the Windows File System


E1. Describe the organisation of the Windows file system and how to
manage directories and files.
E2. Explain how to read and write sequential files using the StreamReader
and StreamWriter classes.
E3. Discuss how the ArrayList class can be used to create and manage lists of
data.
E4. Explain how the SortedList class can be used to create and manage
sorted lists of data.
E5. Discuss how a queue is used to store a list of objects.
E6. Show how a stack is used as a last in, first out list.

Objective F: Interface-Based Programming


F1. Discuss the concept of an interface.
F2. Describe how to implement and declare predefined .NET interfaces.
F3. Explain the key differences between the IComparer and IComparable
interfaces.
F4. Explain the key differences between the IEnumerator and IEnumerable
interfaces.
F5. Describe the relationship between the IEnumerable and ICollection
interfaces.
F6. Discuss the concept of cloning.

Objective G: ADO.NET
G1. Discuss the fundamental concepts of ADO.NET and its essential classes.
G2. Describe the OLeDbConnection class.
G3. Explain how the OleDbDataAdapter class is used to retrieve and save
database data.
G4. Describe how the DataSet and DataTable classes are used to store an in-
memory representation of database information.
G5. Discuss SQL query parameters.
G6. Explain how to record DataSet changes to a database.

Objective H: Working with Data from Multiple Tables


H1. Describe how to use Toolbox controls to create an OleDbConnection
and OleDBDataAdapter.
H2 Explain how to work with DataSets containing multiple tables and one-
to-many relationships between these tables.
H3. Discuss the role of the DataGrid control.
H4. Understand the two forms of DataReader class.
H5. Explain how to execute scalar queries.

V3.0 October 2004 43


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective I: Crystal Reports


I1. Discuss the role of Crystal Reports as a reporting tool.
I2. Describe how to create a report using Crystal Reports.
I3. List the controls and fields supported by Crystal Reports.
I4. Explain how to create reports based on the data from multiple database
tables.
I5. Describe how to export reports to other formats such as HTML, Excel
workbooks, and Word documents.
Objective J: Common Window Controls
J1. Discuss the controls common to Windows applications.
J2 List the buttons contained on the ToolBar control.
J3. Describe the StatusBar control.
J4. Explain how the Treeview control displays information in a hierarchical
manner.
J5. Describe how the ListView control works with the Details view.
Objective K: Creating .NET Controls
K1. Discuss the reasons for creating a custom control designed for use by
other developers.
K2. Describe how to create a control by inheriting from an existing control.
K3. Describe how to create a control by inheriting from
System.Windows.Forms.UserControl.
K4. Describe how to create a control from System.Windows.Forms.Control.
K5. Explain how to create a custom property editor.
K6. List the two options to supply licensing for a control.
Objective L: Drawing and the Graphical Device Interface
L1. Discuss the features provided by the Graphical Device Interface (GDI+).
L2. List the drawing methods supported by the Graphics class.
L3. Describe how to draw lines, rectangles, text and polygons.
L4. Explain how to use the Graphics class to draw images to a graphical
device.
L5. Describe how to send graphical output to a printer.
Objective M: MDI Programming
M1. Discuss the characteristics of MDI programming.
M2. Understand the role of standard forms in an MDI application.
M3. Describe how to integrate menus in an MDI application and create
context menus.
M4. Explain how to manage and organise the forms that make up an MDI
application.
M5. Explain the features provided by the Rich TextBox control.
M6. Show how to detect links to web pages.

44 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

8.4 Practical Work


A number of hands-on projects are included, each related to major topics
within the syllabus. They are designed to enable the student to apply the
programming skills covered in the various parts of this module.

8.5 Notes on Advanced VB .NET


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 5
B 5
C 15
D 15
E 10
F 5
G 10
H 10
I 5
J 5
K 5
L 5
M 5

8.6 Recommended Textbook


Advanced Guide to Programming with Visual Basic .NET, Galatea Training
Services, ISBN: 0-619-15970-7
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

8.7 Tutor Resources


This book has its own website that has numerous resources for lecturers. To
access/download these additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-619-15970-7
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

V3.0 October 2004 45


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

9 Internet Systems Administration (Internet Systems Elective


Stream)
9.1 Introduction
This course is designed to introduce students to the task of Internet Systems
Administration i.e. looking after and maintaining complex Internet-based
computer systems. It is aimed at developing understanding of how Internet
enabled computer systems are developed and to train students to design and
build them. The target audiences include network managers and system
administrators who are responsible for setting up and running computers and
networks, but it also includes any user who wants to write programs for
his/her website or for any other reason wants to understand how networked
computers communicate.

9.2 General Objectives


Upon successful completion of this program students will be able to
demonstrate a satisfactory understanding and performance in the following
topic areas:
A. Client/Server Software Architectures and Internet Protocols
The two-tier client/server network architecture distinguishing it from peer-
to-peer network architecture and centralised computing based on ‘dumb’
terminal communicating with the host. Appreciate that TCP is a
‘connection oriented’ or ‘reliable’ protocol while UDP packets are
considered ‘unreliable’ and do not attempt to correct errors nor negotiate a
connection before sending to a remote host.
B. Web Hosting
Host a web server effectively.
C. Electronic Publishing
Basics of creating hypertext documents.
D. Internet Client Infrastructure
Tools and techniques to develop and maintain client-side software.
E. Internet Infrastructure
The key protocols include (TCP/IP) Transmission Control Protocol/Internet
Protocol. It is in affect a collection of protocols and services used for
communicating over the network.
F. Hardware and Software Connection Devices, Internet Bandwidth
Technologies.
G. Internet Application Development
Used properly, the Server Side Programming can help make web pages
more responsive and can even help make maintaining your site an easier
task. Different programming techniques are discussed.
H. Web-Related Servers
Functionality of different types of servers.

46 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

I. Support Activities for the web:


Learn to solicit desirable visitors to your website.
J. Monitoring processes, Services and Events:
The status of system resources and usage can change dramatically over
time. Services may stop running. File systems may run out of space.
Applications may throw exceptions. Unauthorised users may try to break
into the system. Diagnostic tools, log files, visitor information and statistics
are used to ensure smooth working of the system.

9.3 Specific Objectives

Objective A: Client/Server Software Architectures and Internet Protocols


A1. Benefits of the client/server architecture over the legacy architectures.
A2. Describe the basic functionality of web servers.
A3. Define network connections and ports.
A4. Identify different types of protocols used in various Internet services e.g.
HTTP, TCP, IP and SMTP.
A5. Understand client/server concepts e.g. URL (Uniform Resource Locator),
IP address, translation of Host name into IP address.
A6. Identify the parts of an HTTP transaction.
A7. Identify HTTP request methods.
A8. Identify HTTP headers, and server responses.

Objective B: Web Hosting


B1. Understand the options available for hosting your site.
B2. Identify issues involved in hosting a server.
B3. Appreciate role of an ISP (Internet Server Provider).
B4. Determine size and bandwidth requirements for a server.
B5. Spot and resolve performance problems.

Objective C: Electronic Publishing


C1. Understand the basics of hypertext documents.
C2. Understand the difference between ASCII and Binary files.
C3. Understand different Image file format.
C4. Understand the role of MIME (Multipurpose Internet Mail Extensions) in
mail messaging.

Objective D: Internet Client Infrastructure


D1. Describe web clients – browsers.
D2. Configure the desktop.
D3. Understand functionality of browser plug-ins.

V3.0 October 2004 47


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective E: Internet Infrastructure


E1. Identify connectivity problems.
E2. Understand domain names and DNS.
E3. Domain Name Registration.
E4. Describe TCP/IP protocol suite.
E5. Identify salient features of the of TCP/IP which distinguish it from other
data communication protocols.

Objective F: Hardware and Software Connection devices, Internet


Bandwidth Technologies (Overview)
F1 Firewalls.
F2 Modems.
F3 ISDN.
F4 DSL.

Objective G: Internet Application Development


G1. Dynamic documents.
G2. Understand how CGI programs work.
G3. Understand HTML forms.
G4. Server-side Includes.
G5. Active server pages.
G6. Servlet and Java server pages.

Objective H: Web-Related Servers


H1. Understanding functionality of proxy servers.
H2. Benefits of cashing in a proxy server.
H3. FTP (File Transfer Protocol).
H4. Functionality of SSL (Secure Socket Layer).

Objective I: Support Activities for the Web


I1. Publicising your site effectively.
I2. Registering site with major search engines and directories.
I3. Using ways to publicise your site other than search engines.
I4. Using spiders and robots.
I5. Control how search engines access your site.

Objective J: Monitoring processes, Services and Events


J1. Common Logfile Format (CLF) and Extended Logfile Format (ELF).
J2. Understanding how to configure logging.
J3. Reading server log files.
J4. Error logs.
J5. Using logs to debug server side programs.

48 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

9.4 Notes on Internet Systems Administration


The suggested breakdown of the teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 12.5
C 10
D 10
E 10
F 10
G 10
H 10
I 12.5
J 5

9.5 Recommended Textbook


Internet Systems Administration, Galatea Training Services, ISBN 1-90234-
358-1.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

9.6 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook.

V3.0 October 2004 49


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

10 Internet Security (Internet Systems Elective Stream)


10.1 Introduction
Information security is the fastest growing segment of IT. Couple this with the
explosive growth of the Internet and the major security problems it presents,
and we are seeing Internet Security becoming one of the major challenges
facing corporations of all sizes. This module is intended to provide the student
with the necessary skills to develop a security programme that will protect
data and react to threats posed by Internet users. It illustrates how to defend a
network environment by developing the necessary security policies and
processes, secure networks and systems, and undertake proactive testing of
the network’s defences.

10.2 General Objectives


Upon successful completion of this module, students will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Security Policy and Processes
Introduce the components of a security policy and the processes that
accompany it.
B. Protecting IT Assets
Describe the various types of IT security threats and the role of encryption
technologies in countering these threats
C. Threats to Network Security
Discuss the security implications of using network technologies and
describe the security weaknesses associated with the underlying
technologies necessary to transfer data over a network.
D. Intrusion Detection
Describe the various technologies that help detect malicious activity
traversing a network or conducted on computer systems.
E. Fundamentals of System Security
Introduce the various techniques and technologies used to protect
computer systems.
F. UNIX System Security
Discuss the specific security issues associated with UNIX systems.
G. Windows System Security
Discuss the specific security issues associated with Windows platforms.
H. Security Standards and Compliance
Describe a number of information security standards and discuss the need
to audit the security of an IT environment.
I. Security Testing
Learn how to use various techniques to probe network security defences
and identify weaknesses.

50 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

10.3 Specific Objectives

Objective A: Security Policy and Processes


A1. Define the basic security concepts that need to be taken into account for
effective Internet security.
A2. Describe the main components of an information security policy and
explain how it should be monitored.
A3. Review the basic components of a security education programme.
A4. Describe the procedures for assessing security risk and responding to
security incidents.

Objective B: Protecting IT Assets


B1. Explain the general categories of attacks on IT assets.
B2 Describe the main threats that pose an indirect danger to the information
stored on IT systems.
B3 Describe the main threats that pose a direct danger to the information
stored on telephone and computer systems.
B4. Define the ways in which security threats can be classified into a
hierarchy in order to apply the necessary preventative measures.
B5. Discuss the role of encryption technology in network security.
B5. Recognise popular symmetric and asymmetric encryption algorithms.
B6 Describe a variety of cryptanalytic attacks.

Objective C: Threats to Network Security


C1. Specify the function of network protocols and devices in efficient
network communication.
C2. Discuss the various forms of network addressing.
C3. Describe the TCP, UDP and IP protocols and their weaknesses.
C4. Identify other protocols within the TCP/IP protocol suite and their
weaknesses.
C5. Recognise the security threats to wireless networks.

Objective D: Intrusion Detection


D1. Discuss the basic methodologies that can be adopted for intrusion
detection.
D2. Describe the approaches that can be taken to intrusion detection on a
network.
D3. Explain the role of honeypots in intrusion detection.
D4. Understand how to monitor intrusion detection systems and respond to
events.

Objective E: Fundamentals of System Security


E1. Discuss the trade-offs between security, performance and ease of use.

V3.0 October 2004 51


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

E2. Describe the preventive controls such as security tools and hardening
that can be used for systems security.
E3. Specify the detective measures that can be used to identify malicious
users of networks.
E4. Define the back-up strategies that should be out in place to counteract
any potential problems caused by system or network attacks.

Objective F: UNIX System Security


F1. Use preventive security controls to protect user accounts, passwords,
groups, and software.
F2. Describe the detective controls that are available to Unix systems.
F3. Specify the corrective controls that can be used to recover from a
security incident.

Objective G: Windows System Security


G1. Discuss the security concerns with default Windows configurations.
G2. Use preventive security controls to protect user accounts, passwords,
groups, data and software.
G3. Describe the detective controls that are available to Windows systems.
G4. Specify the corrective controls necessary to recover from a serious
security incident.

Objective H: Security Standards and Compliance


H1. Discuss the differences between auditing and policy verification.
H2. Describe the better known governmental and commercial security
standards that can be used in audits.
H3. Understand the key differences between a compliance review and a
security review.
H4. Define the methodical process that should be followed when
undertaking an audit.

Objective I: Security Testing


I1. Discuss the main benefits of security testing.
I2. Describe the reconnaissance techniques used by attackers prior to
targeting an IT infrastructure.
I3. Specify the technical tools that can be used to probe a network perimeter
and its defences.
I4. Explain the various forms of attack that can take place once the security
vulnerabilities of a network have been identified.
10.4 Practical Work
A number of hands-on projects are included, each related to major topics
within the syllabus. They are designed to give the student practical experience
of the various concepts and ideas discussed. In addition several case projects
are also included, which are intended to help the student apply the lessons

52 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

learnt to real-world situations. They give the students the opportunity to


independently gather and evaluate information, examine potential solutions,
and make recommendations, just as they would in an actual business
situation.

10.5 Notes on Internet Security


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 5
C 15
D 10
E 20
F 10
G 10
H 10
I 10

10.6 Recommended Textbook


Web Security, Galatea Training Services, ISBN: 0-619-06495-1.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

10.7 Tutor Resources


This book also has its own website that has numerous resources for lecturers.
To access/download these additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-619-06495-
1&CFID=3624622&CFTOKEN=50163601
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

V3.0 October 2004 53


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

11 Computer Forensics (Internet Systems Elective Stream)


11.1 Introduction
The growth of the Internet and the proliferation of computers worldwide has
increased the need to conduct computer investigations. The result is that
computer forensics is increasingly used to investigate situations where
computers have been used to commit crimes, or to identify where computer
usage is not meeting corporate acceptable use policies. This module will
provide the student with an appreciation of current and past operating systems
such as Windows 9x, Mac OS and Linux, together with a range of computer
hardware, from basic PC workstations to high-end network servers. Some
emphasis is placed upon the operation of PCs in a networked environment
and the use of a computer from the command line, so it is advantageous if the
student has qualifications or training in networking and A+.

11.2 General Objectives


Upon successful completion of this module students will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Basics of Computer Forensics
Describe the main stages of a computer investigation.
B. File Systems and Disk Structures
Provide an overview of computer data and disk drives
C. Computer Forensics Tools
Describe the tools and environment required to undertake a computer
forensics investigation.
D. Collecting Digital Evidence
Discuss the main procedures for systematically collecting digital evidence.
E. Acquiring Digital Evidence from Disk Drives
Describe the tools and methods used to acquire and preserve digital
evidence from disk drives.
F. Computer Forensics Analysis
Apply computer forensics skills and techniques to a computing
investigation in order to analyse recovered evidence.
G. E-Mail Investigations
Describe the techniques for identifying and investigating e-mail crimes and
violations.
H. Recovering Image Files
Describe the techniques for recovering and analysing graphic image files.
I. Presenting the Findings of the Forensics Investigation
Discuss the approaches to written and verbal presentation of the findings
of a computer forensics investigation.

54 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

11.3 Specific Objectives

Objective A: Basics of Computer Forensics


A1. Discuss the basic reasons for undertaking a computer forensics
investigation.
A2. Describe a systematic approach to preparing for a computer forensics
case.
A3. Describe the main phases of a computer investigation.
A4. Explain the need for effective report writing at the conclusion of the
case.

Objective B: File Systems and Disk Structures


B1. Understand the basics of file systems.
B2. Review how data is stored and managed on Microsoft operating systems.
B3. Understand Microsoft boot tasks and start-up tasks.
B4. Understand Macintosh disk structures.
B5. Review UNIX and Linux disk structures and boot processes.
B6. Describe Compact Disc (CD) data structures.

Objective C: Computer Forensics Tools


C1. Discuss the physical environment required to examine digital evidence.
C2. Explain how to select a basic forensic workstation.
C3. Specify the computer forensics software requirements.
C4. Describe the benefits of command-line forensics tools.
C5. Discuss the use of open source, freeware and shareware forensics tools.
C6. Describe hardware tools used as part of a computer investigation.

Objective D: Collecting Digital Evidence


D1. Explain how to identify and secure digital evidence.
D2. Describe how to catalogue and store digital evidence.
D3. Describe how to obtain a digital signature.
D4. Discuss how to prepare for a computer search and seizure.

Objective E: Acquiring Digital Evidence from Disk Drives


E1. Explain how to determine the most appropriate method for acquiring
digital evidence.
E2. Describe how to use MS-DOS acquisition tools.
E3. Describe how to use Windows acquisition tools.
E4. Discuss the methods for acquiring data on Linux computers.

V3.0 October 2004 55


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective F: Computer Forensics Analysis


F1. Explain how to apply computer forensics skills and techniques to a
computing investigation.
F2. Utilise utilities to analyse recovered data.
F3. Describe the basic steps in performing a computer forensic analysis.
F4. Discuss data hiding techniques that can be used to conceal information.

Objective G: E-Mail Investigations


G1. Explain fundamental Internet connection methods and protocols.
G2. Discuss the role of the client and server in e-mail.
G3. Describe the basic procedures for identifying and investigating e-mail
crimes.
G4. Define the tasks performed by e-mail servers and how these might be of
use in a computer investigation.
G5. Discuss the use of specialised e-mail forensics tools.

Objective H: Recovering Image Files


H1. Define bitmap images, raster images, vector images, metafile graphics
and image file formats.
H2. Explain the theory of data compression.
H3. Describe how to locate and recover mage files.
H4. Describe how to analyse image file headers.
H5. Discuss the copyright issues associated with the use of graphics.

Objective I: Presenting the Findings of the Forensics Investigation


I1. Discuss the importance of effective report writing.
I2. Describe the key considerations in writing good technical reports.
I3. Explain how to integrate a computer forensic tool log file or report
generator into an official report.
I4. Specify the role of a technical witness and an expert witness.
I5. Describe how to prepare to give evidence in the role of a technical or
expert witness.
11.4 Practical Work
A number of hands-on projects are included, designed to familiarise the
student with the use of computer forensic software. The student is encouraged
to explore a variety of ways to acquire evidence and to understand the ways
in which evidence can be hidden.
In addition there are a variety of case projects which encourage the student to
draw upon real-world common sense as well as the knowledge of the
technical topics covered by the syllabus. The intention is to put the student in
the position of a computer forensic investigator and enable him/her to come
up with solutions to problems that would be faced in such a role.

56 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

11.5 Notes on Computer Forensics


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 20
C 10
D 15
E 10
F 10
G 10
H 10
I 5

11.6 Recommended Textbook


Computer Forensics and Investigations, Galatea Training Services, ISBN: 0-
619-13120-9.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

11.7 Tutor Resources


This book has its own website that has numerous resources for lecturers. To
access/download these additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-619-13120-
9&CFID=3624622&CFTOKEN=50163601
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

V3.0 October 2004 57


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

12 Business Management (Business Management Elective Stream)


12.1 Introduction
Organisations are placing increasing emphasis on the use of professional
business management to control and direct their structure, strategy and
operations. It is important, therefore, that IT practitioners fully understand the
basics of effective management, not just from the perspective of developing
effective business information systems, but also in the way that they interact
with both their staff and clients. This module will help students develop their
management techniques and competencies. It covers the organisational and
people issues, and stresses the importance of managing corporate information
and finance effectively.

12.2 General Objectives


Upon successful completion of this module, students will be able to
demonstrate a satisfactory performance in the following topic areas:
A. The Business Environment
Introduce the overall concepts of an organisation in terms of the mission
and purpose of the business, and its associated culture.
B. Organisation Structures
Describe the various organisational structures typically found in a
business, together with the features and benefits of each.
C. Business Strategic Planning
Discuss the main components of a strategic plan.
D. Finance in Business
Describe the standard business practices used to manage money and
finance within organisations.
E. Human Communication
Introduce the various communication techniques used within business.
F. General People Management
Discuss the life cycle of people management, including recruitment,
appraisal, discipline and redundancy.
G. Managing Change and Reorganisation
Discuss the various reasons for change within an organisation, and the
approaches that can be taken to manage it effectively.
H. Managing Technology
Discuss the changing approach to managing technology and the demands
which this places upon business managers.
I. Managing Information
Describe the importance of information to a business, and the roles and
responsibilities associated with managing it effectively.
J. Managing Knowledge in the Internet Age
Explain the ways in which Internet-related technologies are enabling
information and knowledge to be exploited more successfully within
organisations.
58 October 2004 V3.0
International Advanced Diploma in Computer Studies Syllabus and Course Handbook

12.3 Specific Objectives

Objective A: The Business Environment


A1. Define the mission and purpose of an organisation.
A2. Describe the importance of understanding the customer when defining
the aims and objectives of the business.
A3. Describe the importance of an organisation’s culture.
A4. Describe the different types of organisational culture.

Objective B: Organisation Structures


B1. Describe the various classical organisation models.
B2. Explain the main benefits of each different type of organisation model.
B3. Explain the importance of power and influence within an organisation’s
structure.

Objective C: Business Strategic Planning


C1. Describe the purpose of a strategic plan.
C2. Define the basic steps in constructing a strategic plan.
C3. Explain how strategic planning is affected by the complexity and
structure of an organisation.
C4. Describe the main issues in implementing a strategic plan at the
functional department level.

Objective D: Finance in Business


D1. Define the main issues in managing cash flow within an organisation.
D2. Describe the impact of cash flow and costing upon the profitability of an
organisation.
D3. Explain the various types of business report that are commonly produced
as an aid to managing a company’s finance.
D4. Describe the main purposes for creating business budgets.
D5. Understand the main methods of monitoring and adjusting budgets.
D6. Explain the role of investment appraisal.
D7. Describe the principal of financial ratio analysis.

Objective E: Human Communication


E1. Describe the main types of human communication used within business.
E2. Explain the importance of effective communication in management and
leadership.
E3. Describe how to plan, prepare, deliver and review a presentation.
E4. Describe the main considerations in running a successful meeting.

V3.0 October 2004 59


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective F: General People Management


F1. Define the main steps to be taken when recruiting new staff.
F2. Describe the formal appraisal approach commonly used within
organisations.
F3. Explain the different types of disciplinary action that may be required as
a result of poor or unacceptable performance, or misconduct, by staff.
F4. List the procedures to be followed when planning and preparing for
redundancies.

Objective G: Managing Change and Reorganisation


G1. Discuss the various reasons for change or reorganisation within a
business.
G2. Explain the approaches that can be taken to ensure that a programme of
change is implemented successfully within an organisation.

Objective H: Managing Technology


H1. Discuss the management challenges posed by the decentralisation of IT
systems.
H2. Describe the reasons why an organisation may choose to outsource the
development or management of its IT
H3. Describe the key operational management issues associated with the
delivery and support in IT systems to support the business.
H4. Explain the management challenges posed by the implementation of
new IT systems.
H5. Describe the importance of integrating IT systems with the business.

Objective I: Managing Information


I1. Describe the different types of information assets typically found within a
business.
I2. Discuss the main challenges associated with managing corporate
information assets effectively.
I3. Specify the approaches that can be taken to ensure that information is
protected and secure within an organisation.

Objective J Managing Knowledge in the Internet Age


J1. Explain the role of intranets and extranets in making corporate
information more accessible to internal staff and business partners.
J2. Describe the role of a content management system in managing the
content of an intranet or website.
J3. Explain the role of metadata in effective content management.
J4. Explain the features provided by a knowledge management system and
the benefits that it can deliver.

60 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

12.4 Practical Work


There is no project associated with this module. However, many of the
chapters of the student textbook incorporate practical exercises designed to
reinforce the main points covered within the content of the syllabus.

12.5 Notes on Internet Security


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 10
C 15
D 15
E 15
F 10
G 10
H 5
I 5
J 5

12.6 Recommended Textbook


Business Management (Third Edition), Galatea Training Services, ISBN: 0-
9543071-6-X.
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

12.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook.

V3.0 October 2004 61


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

13 Managing Business Projects (Business Management Elective


Stream)
13.1 Introduction
In a highly competitive global environment, where traditional business
processes may no longer be enough, organisations increasingly are
implementing projects to initiate business change. Knowing how to manage
business projects successfully is becoming a key skill. This module will help
students to understand and appreciate the principles of project management
and how those principles may be applied to systems development or other
business objectives.

13.2 General Objectives


Upon satisfactory completion of this module, students will be able to
demonstrate a satisfactory performance in the following topics:
A. Systems Development Processes; Roles and Interactions of People within
Projects
Present an overview of processes and personnel commonly associated
with business projects.
B. Human Communication Techniques
Introduce the various techniques available for written, visual or verbal
communications.
C. Project Initiation, Stakeholders, Success Criteria
Discuss factors for assessment prior to project start-up.
D. Business Requirement Specification – Information Systems, Project
justification, feasibility study, invitation to tender
Describe the documented forms of analysis and specification that
contribute to the business case.
E. Estimation – Cost, Duration, Resources, Methods
Discuss a range of approaches to estimation and the components and
contexts that differentiate them.
F. Planning – Management, Technical and quality plans, planning techniques
and Tools, Network Analysis
Describe a variety of plan types and ways in which to plan effectively.
G. Identify Risks and Develop Contingency Plans
Discuss techniques of risk assessment and responses to risk.
H. Monitoring and Control
Outline the functions associated with project monitoring and control.
I. Quality Assurance Methods And Techniques
Identify the various checking processes that contribute to quality
assurance.
J. Procurement Management, Managing Implementation
Describe formal supplier selection processes and implementation issues.

62 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

K. Project Evaluation, Post-Implementation Review


Outline the factors for evaluation in post-project reviews.

13.3 Specific Objectives

Objective A: Systems development processes; roles and interactions of


people within projects
A1. Identify the distinctive characteristics that define a project and project
processes.
A2. List the working principles behind any project management method.
A3. Present an overview of the roles and representations to be found in
projects.

Objective B: Human communication techniques


B1 List the variety of written, visual and verbal methods of communication
available to a project manager
B2. Evaluate the appropriateness of a means of communication to a
particular context

Objective C: Project initiation, stakeholders, success criteria


C1. Define potential sources of analysis and assessment prior to project
initiation.
C2. Explain the purpose and value of stakeholder analysis.
C3. Describe the importance of defining what constitutes a successful
project.

Objective D: Business requirement specification – information systems,


project justification, feasibility study, invitation to tender
D1. Summarise the range of tools and techniques that inform management
decision-making about the viability of projects.
D2. Explain the process of analysing project costs and benefits.
D3. Describe good practice in dealing with third-party suppliers.

Objective E: Estimation – cost, duration, resources, methods


E1. Identify the strengths and weaknesses of a range of estimating
approaches.
E2. Describe the types of information and knowledge that contribute to
successful estimation.

Objective F: Planning – management, technical and quality plans, planning


techniques and tools, network analysis
F1. Describe the benefits derived from effective planning.
F2. Describe the structures, inputs and constraints of the planning process.

V3.0 October 2004 63


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

F3. Explain the techniques behind activity networks and other visual
representations of project plans.

Objective G: Identify risks and develop contingency plans


G1. Define the concept of risk in relation to projects.
G2. Explain how risks can be assessed.
G3. Explain how risks can be managed through contingency planning.

Objective H: Monitoring and control


H1. Define the purpose of project monitoring and control.
H2. Describe the management mechanisms that allow projects to progress in
a controlled fashion.
H3. Identify key participants in the decision-making process.

Objective I: Quality assurance methods and techniques


I1. Define the concept and practices of configuration management.
I2. Place configuration management within the context of overall project
quality assurance.
I3. Explain the significance of controlled change to project quality
assurance.
I4. Describe the importance of quality planning, testing and inspection to
product quality assurance.

Objective J: Procurement management, managing implementation


J1. Explain the importance of formal procurement processes to successful
project outcomes.
J2. Describe the components of an effective approach to procurement.
J3. Define the project management issues and tasks most commonly
associated with implementation.

Objective K: Project evaluation, post-implementation review


K1. Define the key components of an end-of-project report.
K2. Explain the business benefits to be derived from post-project reviews.

13.4 Practical Work


There is no project associated with this module. However, many of the
chapters of the student textbook incorporate practical exercises designed to
reinforce the main points covered in the syllabus.

64 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

13.5 Notes on Managing Business Projects


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 10
B 5
C 5
D 15
E 10
F 10
G 10
H 10
I 10
J 10
K 5

13.6 Recommended Textbook


Managing Business Projects (Second Edition), Galatea Training Services, ISBN
1-90234-353-0
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for a
password the following may be entered: learning

13.7 Tutor Resources


NCC Education supplies all accredited training partners with tutor resources to
support the syllabus and the textbook.

V3.0 October 2004 65


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

14 Principles of Web Design (Multimedia Elective Stream)


14.1 Introduction
The purpose of the Web Design module is to give the student the knowledge
and skills to plan and develop well-designed websites that combine effective
navigation with appropriate use of graphics, text and colour. The intention is
to create websites that enable users to access information quickly and easily,
regardless of browser type, connection speed, or computing platform.
The student will be expected to understand the basics of HTML at the code
level, as well as having basic knowledge of an operating system, whether
Windows, Macintosh or UNIX.

14.2 General Objectives


Upon successful completion of this module students will be able to
demonstrate a satisfactory performance in the following topic areas:
A. Web Design Environment
Discuss the variable factors that affect web design, in particular the HTML
and XML languages.
B. Website Design Principles
Define and apply the basic design principles for web page design.
C. Website Planning
Describe and implement the initial planning phase carried out at the
outset of a website design project, including the creation of usable
navigation.
D. Creating Page Templates
Use HTML table elements to create templates and explain how this helps
in building more visually interesting pages.
E. Web Typography
Describe how Cascading Style Sheets (CSS) can be used to manipulate a
variety of text properties and demonstrate practical competence in their
application.
F. Graphics and Colour
Discuss how the use of graphics and colour can produce an attractive and
engaging website, together with the problems created by their incorrect
use.
G. HTML Frames
Explain how the effective use of frames can allow consistent simultaneous
display of navigation information and content on a website and
demonstrate practical competence in their application.
H. HTML Forms
Define the ways in which forms can be used to build interactive web
pages that collect information from users and process it on a web server
and demonstrate practical competence in their application.

66 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

I. Publishing and Maintaining a Website


Describe the processes that need to be undertaken in order to publish a
website, together with the subsequent updating and refining of the
content.

14.3 Specific Objectives

Objective A: Web Design Environment


A1. Describe the current state of HTML.
A2. Describe the current state of XML.
A3. Explain the benefits of using XHTML.
A4. Discuss the challenge of designing web pages for multiple browsers.
A5. Understand the implications of bandwidth on web design.

Objective B: Website Design Principles


B1. Discuss the considerations in designing web pages for a computer
medium.
B2. Specify a unifying theme and structure that will hold web pages together.
B3. Describe the basic principles that apply to designing web pages with
user and screen requirements in mind.
B4. Apply good website design principles in the construction of a website.

Objective C: Website Planning


C1. List the ways in which the content of the website can be presented to
reflect the requirements of the audience.
C2. List the range of skills and experience required in a website development
team.
C3. Describe how conventions can be created for filenames and URLs.
C4. Explain the importance of creating a flowchart that shows the structure
and logic behind the content presentation and navigation choices of the
site.
C5. Describe how to build text-based navigation, with links via a text
navigation bar.
C6. Explain the role of contextual linking in website navigation.
C7. Discuss the role of graphics for navigation and linking in a website.

Objective D: Creating Page Templates


D1. Discuss the basics of HTML table elements and attributes.
D2. Describe how to build fixed and flexible tables.
D3. List the guidelines for creating effective HTML tables.
D4. Create and test an effective page template.

V3.0 October 2004 67


Syllabus and Course Handbook International Advanced Diploma in Computer Studies

Objective E: Web Typography


E1. List the principles for typeface design on a website.
E2. Describe the options for controlling typography.
E3. Explain the basics of Cascading Style Sheets (CSS).
E4. Specify CSS font properties and block-level space values.
E5. Describe how to create a style sheet for a document using a variety of
font properties.
E6. Design a CSS for a typical website.

Objective F: Graphics and Colour


F1. Discuss the three image file formats used on the web: GIF, JPG, and
PNG.
F2. Describe the basic ways in which colour works on a computer monitor.
F3. Explain the role of the <img> element in displaying image files.
F4. Explain how HTML uses hexadecimal numbers to express colour values.

Objective G: HTML Frames


G1. Discuss the benefits and drawbacks of using frames.
G2. Describe frame syntax.
G3. Explain the importance of targeting in framesets.
G4. List the main planning considerations when building a framed website.
G5. Demonstrate practical competence in the use of HTML frames.

Objective H: HTML Forms


H1. Describe the different input elements used by a form to gather
information from users.
H2. List the five basic form elements commonly used and supported by
major browsers.
H3. Discuss the benefits of building forms within tables.
H4. Demonstrate practical competence in the use of HTML forms.

Objective I: Publishing and Maintaining a Website


I1. Describe the main issues to consider when going live with a website.
I2. Discuss the approaches to testing a website after going live.
I3. Describe the ways in which website content and presentation can be
refined based upon user feedback.
I4. List the approaches that can be taken to attracting visitors to a website.

14.4 Practical Work


A number of hands-on projects are included, each related to major topics
within the syllabus. They are designed to give the student practical experience
of the various concepts and ideas discussed. They include researching

68 October 2004 V3.0


International Advanced Diploma in Computer Studies Syllabus and Course Handbook

information from people, printed resources, and the Internet, as well as


installing and using some of the technologies discussed.
In addition several case projects are also included, which are intended to help
the student apply the lessons learnt to real-world situations. They give the
students the opportunity to independently gather and evaluate information,
examine potential solutions, and make recommendations, just as they would
in an actual design situation.

14.5 Notes on Principles of Web Design


The suggested breakdown of teaching times for the objectives is shown
below.
Objective % of total time
A 5
B 15
C 25
D 10
E 10
F 10
G 10
H 10
I 5

14.6 Recommended Textbook


Principles of Web Design, Galatea Training Services, ISBN: 0-619-06451-X
Students must purchase this or another book recommended by the tutor.
To purchase this book, contact Mr Steve Newton at Galatea Training Services
Limited. E-mail address: [email protected] or visit:
http://www.galatea-services.co.uk/NCCShop/index.asp – when prompted for
a password the following may be entered: learning

14.7 Tutor Resources


This book has its own website that has numerous resources for lecturers. To
access/download these additional resources go to:
http://www.course.com/catalog/product.cfm?isbn=0-619-06451-x
When prompted for a username and password the following details may be
entered:
Username: nccedu Password: IAD

V3.0 October 2004 69

You might also like