SP Computing 3rd Edition
SP Computing 3rd Edition
COMPUTING
h
Septem
ber 201
Page
FOREWORD i
ABBREVIATIONS iii
1. INTRODUCTION 1
4. STUDENT SELECTION 39
5. ACADEMIC STAFF 45
6. EDUCATIONAL RESOURCES 50
7. PROGRAMME MANAGEMENT 52
REFERENCES 56
APPENDICES
GLOSSARY 111
FOREWORD
The Malaysian Qualifications Agency (MQA) has published numerous quality assurance
documents such as the Malaysian Qualifications Framework (MQF), Code of Practice for
Programme Accreditation (COPPA), Code of Practice for Institutional Audit (COPIA), Code of
Practice for TVET Programme Accreditation (COPTPA), Code of Practice for Programme
Accreditation: Open and Distance Learning (COPPA: ODL), Standards, Programme
Standards (PS) and Guidelines to Good Practices (GGP), to ensure that the programmes
offered by Higher Education Providers (HEPs) in Malaysia meet international practices. It is
imperative that these documents are read together with this PS for the development and
delivery of Computing programmes in Malaysia.
This PS document outlines sets of characteristics that describe the minimum levels of
acceptable practices in the Computing programmes based on the seven quality assurance
areas: programme development and delivery, assessment of student learning, student
selection and support services, academic staff, educational resources, programme
management, programme monitoring, review and continual quality improvement. Accordingly,
the PS covers different levels of standards leading to the award of individual qualifications
prescribed in the MQF 2nd Edition, ranging from Certificate (Level 3, MQF) to Doctoral Degree
(Level 8, MQF) levels.
This PS document was developed by the MQA in collaboration with the Ministry of Higher
Education. It represents the significant contribution from panel members (as listed in
Appendix 1) from both public and private HEPs and the industry, in consultation with various
HEPs, relevant government and statutory agencies, industries, alumni and students (as listed
in Appendix 2) through stakeholders’ workshops and online feedback. Hence, the standards
developed reflect national and international best practices to ensure Computing graduates
from HEPs in Malaysia are on par with those in other countries.
That being said, the standards do not attempt to provide specific characteristics for Computing
programmes, particularly those related to the framing of curricula and provision of educational
resources. This PS document encourages diversity and allows programme providers to be
innovative in creating their niches. HEPs should ensure that they produce graduates that meet
the current and future needs of the industry and at the same time fulfil their obligations to
society. Among others, this document includes statements of programme educational
objectives and learning outcomes, which are intended to give clarity and are not intended to
be adopted in a verbatim manner.
i
The MQA would like to express appreciation to all the panel members, the various
stakeholders for their valuable input and to all the MQA officers who contributed to the
development of this PS for Computing. It is hoped that this PS document is beneficial to
different stakeholders for the development of the competencies required in our students, for
both job and higher education prospects.
ii
ABBREVIATIONS
PS Programme Standards
iii
1. INTRODUCTION
One of the primary objectives of the MQA is to monitor the quality of delivery, the systems,
and the processes used by HEPs to achieve learning outcomes. The prepared outlines have
processes to ensure the quality of education, and fair and ethical practices for learners to
achieve the skills they need from the HEPs. This provides qualifications that are relevant and
valuable for the quality assurance areas of the students’ intended disciplines and practices in
the disciplinary areas of Computing.
Computing, for the purposes of this Programme Standards, involves the study of computers
and their applications. Thus, Computing includes designing and building hardware and
software systems for a wide range of purposes; processing, structuring, analysing, securing
and managing various kinds of information; carrying out scientific studies using computers;
making computer systems behave intelligently; integrating emerging technologies; creating
finding and gathering information relevant to any particular purpose.
This Programme Standard (PS) measures the performance of other impacts and aspects of
education, such as decentralization, providing HEPs in various areas of autonomy and greater
accountability for outcomes, which are equally important functions. Even though PS structures
form a part of the higher education system within this tract, this given guidance is intended to
formulate excellent programmes. Most of the areas measure performance; however, their
precision, effectiveness, and efficiency are dependent upon the HEP’s manner of governance.
The availability of a framework, political will, capacity of concerned personnel, accessibility
and reliability of evidence, etc., are the other critical issues that influence the level of impact
and sustainability.
This PS need to prescribe a set of minimum criteria to ensure consistency in the quality of
programmes offered by various HEPs, the PS should also encourage diversity and innovation.
This will allow the HEPs to craft their niches to meet the dynamics of the targeted employment
markets and to meet the needs of society, in addition to the ethical responsibilities of the HEP
and the students to engage in the direction toward Sustainable Development Goals (SDG).
The involvement of all stakeholders in the making of this PS process would greatly enhance
its ownership. HEPs, as in the other sectors of development, have gone through stages of
evolution over the years, starting from broad input‐output monitoring, to project‐based
monitoring systems to meet the needs of the stakeholders, and onto the current discourse with
1
its focus on providing timely and reliable data on evidence‐based indicators of progress at the
different levels of implementation, including at the industry and community levels. The ultimate
aim of this PS initiative is to help the HEPs develop and implement their programme which
would not only help to systematically monitor and evaluate the key issues of the education
sector but would also be timely, reliable and tailored to meet their own needs of improving the
quality, relevance and coverage of their education sectors.
The minimum criteria in the PS are based on what is considered the minimum level that should
be attained by the HEPs to ensure that a programme can be adequately delivered. This,
however, does not imply that the HEPs should ultimately aim to satisfy these minimum criteria.
Instead, they should strive for continual quality improvement.
In the Malaysian context, Information and Communication Technology (ICT) is widely used as
a phrase to describe Computing. As a result, Computing degrees have always been referred
to as ICT degrees.
For the purpose of Malaysian higher education sectors, the learning framework is based on
the Association for Computing Machinery (ACM) Problem Space of Computing at the
Bachelor’s level. Computing is broadly categorised into five (5) major disciplines namely
Computer Science, Software Engineering, Information Technology, Information Systems and
Data Science:
2
iii. Information Technology: Graduates of this discipline should be able to work
effectively at planning, implementing, configuring and maintaining an
organisation’s computing infrastructure; prepared to succeed in roles involving
planning and managing technology infrastructure.
The five (5) disciplines provide the basic platform for the placement of computing programmes.
It is worth clarifying that Computer Science and Software Engineering programs prepare
students for computing technology creation, while Information Technology and
Information Systems are more designed for roles as experts in using technologies. Data
Science prepares students to be data scientists. The other disciplines such as Computer
Engineering and Creative Multimedia programmes are not covered by this standard since it
falls under different fields. Cybersecurity is a multidisciplinary field that can only be
offered as a specialization for any computing discipline according to the program’s
aims. Any programmes that do not comply with this standard should not use the naming
conventions specified in this programme standards.
Further, potential employers of new Computing Certificate, Diploma and Bachelor’s Degree
graduates must be clear that each of the five (5) disciplines is different. For this reason, the
nomenclature in Computing must be prefixed by these five (5) disciplines to avoid confusion
except for the Certificate and Diploma level which does not offer a Data Science
programme. Any of the five (5) disciplines should not be a specialization. Consistent
nomenclature will reduce the gap between the fresh graduates’ capabilities and the
expectations of employers. However, for the postgraduate programmes, HEPs may determine
the specific nomenclature for their awards based on existing national and international best
practices. For Computing as an extension to different fields such as Business, Accounting,
Biology, Arts and others, the nomenclature of Computing should remain using the five (5)
disciplines mentioned above.
3
To help employers select the right graduates for the ICT job role, Malaysia Digital Economy
Corporation (MDEC) has developed the Skills Competency Matrix (SCM). This enables the
learning outcomes of the five (5) disciplines to be mapped to the job functions in ICT as shown
Computer Science spans a wide range, from its theoretical and algorithmic foundations to
cutting-edge developments in Robotics, Computer Vision, Artificial Intelligence, Cloud
Computing, Internet of Things, Bioinformatics, Cybersecurity and other exciting the areas. It
involves designing and implementing software, devising new ways to use computers and
developing effective ways to solve computing problems.
Computer Science offers a comprehensive foundation that permits graduates to adapt to new
technologies and ideas. Computer scientists extend theories and practice for the
implementation of computer systems which has grown to include aspects of web development,
interface design, security issues, edge computing, cloud computing and involvement in
devising new ways to use computers. Computer scientists are expected to be flexible in
performing all types of computer tasks including software development, system administration,
information analysis and others.
Software Engineering is the discipline of developing and maintaining software systems that
behave reliably and efficiently, are affordable to develop and maintain as well as built to
customers’ specifications. It has evolved in response to factors such as the growing impact of
large-scale software systems in a wide range of situations and the increased importance of
software in safety-critical applications.
Information Technology in the broadest sense refers to all aspects of computing. However,
in academia, it often refers to meeting the technological needs of business, government,
healthcare, schools and other kinds of organisations through the selection, creation,
application, integration and administration of computing technologies.
IT graduates are trained to focus on the application, deployment, and configuration needs of
organisations and people over a wide spectrum. IT Professionals have a special focus on
4
satisfying organisational needs that arise from Computing Technology. They assume
responsibility for selecting hardware and software appropriate for an organisation, integrating
these with organisational needs and its infrastructure, and installing, customising and
maintaining those applications for the computer users in the organisation.
Information Systems integrate Information Technology solutions and business processes to
meet the information needs of businesses and other enterprises, enabling them to achieve
their objectives in effective and efficient ways. This discipline’s perspective on Information
Technology emphasises Information and views technology as an instrument for generating,
processing and distributing information.
Data Science concerns the confluence of the availability of data and increasing tools,
processes, and algorithms for analysing and drawing knowledge and insight from data has
impacted every area of scientific engagement. It has also opened up exciting new
opportunities for interdisciplinary work across many fields including (but certainly not limited
to) computer science, mathematics, statistics, and information science from which it draws
foundational knowledge.
Data Science graduates acquire basic knowledge in computing and a strong foundation in
mathematics and statistics; able to program using relevant programming languages and
common libraries when needed; able to use scientific methods to extract, process and analyse
data; to produce and visualise meaningful information;
As a whole, the Programme Standards for Computing describes the different levels of
standards leading to the award of individual qualifications, namely Certificate (Level 3, MQF),
Diploma (Level 4, MQF), Bachelor’s Degree (Level 6, MQF), Master’s Degree (Level 7, MQF)
and Doctoral Degree (Level 8, MQF). These standards are designed to encourage a diversity
of approaches within a framework that is compatible with the national and global human
resource requirements and socio-economic needs. HEPs are expected to combine, teach and
assess the subject matter creatively. The PS provides an inventory of content; delivery and
5
assessment of programs, thus enabling the identification of vital components of qualifications
from Certificate to Doctoral awards.
The development and implementation of this PS are to ensure that the graduates meet the
professional requirements and expectations in their respective fields. HEPs must take into
consideration the balance between the fundamental body of knowledge and the rapidly
evolving subject matter and introduce effective and sustainable program improvement. In
doing so, the providers should also ensure that the graduates obtain the necessary skills to
function effectively.
Since 2010, the MQA’s PS: Computing has been a reference for HEPs in developing and
offering Computing programmes. This review process is to ensure that the document is
updated with current policies and the development of computing transformations. Assessors
and Auditors are guided by these standards in arriving at their recommendations and
conclusions.
This PS covers all the seven quality assurance areas: (i) programme development and
delivery, (ii) assessment of student learning, (iii) student selection and support services, (iv)
academic staff, (v) educational resources, (vi) programme management, and (vii) programme
monitoring, review and continual quality improvement. This document describes the different
levels of standards leading to the award of individual qualifications prescribed in the MQF
based on different modes of study, which are:
6
As the purpose of this PS is to provide minimum requirements pertaining to the development
and conduct of different levels of Computing programmes within the core areas described, it
is paramount that this document is read together with other quality assurance documents and
policies issued by MQA, Professional Bodies and other related agencies which include, but
are not limited to the following:
7
2. PROGRAMME DEVELOPMENT AND DELIVERY
2.1 PROGRAMME EDUCATIONAL OBJECTIVES (PEO)
Programme educational objectives (PEOs) are broad statements that describe the career and
professional accomplishments that the programme is preparing students to achieve after they
graduate.
“The quality of a programme is ultimately assessed by the ability of its graduates to carry out
their expected roles and responsibilities in society. This requires the programme to have a
clear statement of the competencies, which are the practical, intellectual and soft skills
expected to be achieved by the students at the end of the programme" (COPPA 2nd Edition,
2017).
As indicated in the Introduction, the Computing programmes can be broadly classified into five
(5) main disciplines that are defined by ACM Curricular 2020 Computer Science, Software
Engineering, Information Technology, Information Systems and Data Science. These have a
bearing upon specific PEOs in the curriculum design for a high-quality learning environment
that maximises the opportunity for all students to succeed and provides them with an inclusive,
intellectually challenging and transformative educational experience.
Guidance of the PEOs is provided under each level of study from the certificate to the doctoral
level. The flexibility in describing the PEOs remains with the Higher Education Providers
(HEPs), provided that the PEOs are consistent with the vision and mission of the HEP.
It should be noted that the PEO provided describes the minimum requirement, and the HEPs
may provide additional objectives where appropriate.
8
with the industry technical skills in in the field of study
requirements. the discipline to provide
according to the innovative
industry solutions in
requirements. computing.
9
2.2 PROGRAMME LEARNING OUTCOMES
“A programme is designed and delivered to facilitate the attainment of a set of desired learning
outcomes. It starts with a clear definition of the intended outcomes that students are to achieve
by the end of the programme and supported by appropriate instructional approaches and
assessment mechanisms” (COPPA 2nd Edition, 2017).
The learning outcomes in the field of Computing should cumulatively reflect the five (5)
clusters1 of learning outcomes aimed to develop well-balanced individuals with a holistic
set of competencies.
Table 2.2 shows the mapping of learning outcomes based on MQF learning outcomes for
Computing fields. The flexibility in describing the learning outcomes remains with the
HEPs as long as they are sufficiently covered.
1
Malaysian Qualifications Agency. (2017). Malaysian Qualifications Framework 2 nd Edition. Cyberjaya, Malaysia.
10
Table 2.2: PLO BASED ON MQF 2.0’s LO FOR COMPUTING FIELDS
INFORMATION TECHNOLOGY
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
INFORMATION SYSTEM
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
11
COMPUTER SCIENCE
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
SOFTWARE ENGINEERING
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
12
GENERIC LEARNING OUTCOMES FOR CERTIFICATE
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Demonstrate effective interaction with stakeholders and society in a work-
X
related environment;
1-Knowledge and Understanding; 2-Cognitive Skills; 3-Practical Skills; 4-Interpersonal Skills; 5-Communication Skills; 6-Digital Skills; 7-Numeracy Skills;
8-Leadership, Autonomy and Responsibility; 9-Personal Skills; 10-Entrepreneurial Skills; 11-Ethics and Professionalism
13
DIPLOMA (LEVEL 4, MQF)
At the end of the programme, graduates will be able to:
INFORMATION TECHNOLOGY
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Explain concepts, principles, and theories relating to Information
Technology; X
Apply design and architecture to IT solutions using appropriate tools and
techniques; X
INFORMATION SYSTEM
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Explain concepts, principles, and theories relating to Information System; X
Apply tools and techniques to IS solutions;
X
Perform support and development tasks on IS solutions related to job
X
functions;
14
COMPUTER SCIENCE
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Explain concepts, principles, and theories relating to Computer Science;
X
Apply computing tools and techniques to solve well-defined and routine
problems and develop solutions; X
SOFTWARE ENGINEERING
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Explain concepts, principles, and theories relating to Software
Engineering; X
15
GENERIC LEARNING OUTCOMES FOR DIPLOMA
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Demonstrate effective interaction with stakeholders and society in a work-
related environment; x
1-Knowledge and Understanding; 2-Cognitive Skills; 3-Practical Skills; 4-Interpersonal Skills; 5-Communication Skills; 6-Digital Skills; 7-Numeracy Skills;
8-Leadership, Autonomy and Responsibility; 9-Personal Skills; 10-Entrepreneurial Skills; 11-Ethics and Professionalism
16
BACHELOR’S DEGREE (LEVEL 6, MQF)
At the end of the programme, graduates will be able to:
INFORMATION TECHNOLOGY
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Analyse concepts, principles, and theories relating to Information
Technology; X
INFORMATION SYSTEM
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Analyse concepts, principles, and theories relating to Information System; X
Apply appropriate principles of Information Systems in providing
enterprise solutions; X
Execute principles of Information Systems in providing enterprise
solutions; X
17
COMPUTER SCIENCE
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Analyse concepts, principles, and theories relating to Computer Science;
X
SOFTWARE ENGINEERING
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Analyse facts, concepts, principles, and theories relating to Software
Engineering; X
18
DATA SCIENCE
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Analyse data, concepts, principles, and theories relating to Data Science; X
Apply appropriate concepts and methods for optimised data science
solutions; X
Produce Data Science solutions using appropriate concepts and
X
methods;
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Demonstrate effective interaction with diverse stakeholders;
X
Exhibit effective communication with diverse stakeholders; X
19
MASTER’S DEGREE (LEVEL 7, MQF)
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Integrate advanced knowledge related to research issues in computing;
X
Recommend innovative solutions that are at the forefront of developments
in the fields of study; X
1-Knowledge and Understanding; 2-Cognitive Skills; 3-Practical Skills; 4-Interpersonal Skills; 5-Communication Skills; 6-Digital Skills; 7-Numeracy Skills;
8-Leadership, Autonomy and Responsibility; 9-Personal Skills; 10-Entrepreneurial Skills; 11-Ethics and Professionalism
20
DOCTORAL DEGREE (LEVEL 8, MQF)
MQF 2.0
PLO
1 2 3 4 5 6 7 8 9 10 11
Integrate state-of-art knowledge through a systematic comprehension and
in-depth understanding of the field of study; X
21
Uphold professional and ethical practices in conducting research and
X
delivering solutions related to the field of study.
1-Knowledge and Understanding; 2-Cognitive Skills; 3-Practical Skills; 4-Interpersonal Skills; 5-Communication Skills; 6-Digital Skills; 7-Numeracy Skills;
8-Leadership, Autonomy and Responsibility; 9-Personal Skills; 10-Entrepreneurial Skills; 11-Ethics and Professionalism
22
2.3 CURRICULUM DESIGN AND DELIVERY2
Learning and teaching can only be effective when the curriculum content and the programme
structure are kept abreast with the most current development in its field of study (COPPA 2nd
Edition, 2017). The curriculum structure should identify the objectives and learning outcomes of
the programme and incorporate a schema that would map the curriculum to the stated objectives
and learning outcomes (Guidelines to Good Practice: Curriculum Design and Delivery, 2011).
This section outlines the minimum credits of each curriculum component for all levels of
qualifications as stated in Table 2.3. Specific requirements as to the body of knowledge of the
various core areas are in Appendix 3. HEPs have the flexibility to design their programme.
However, they should cover the body of knowledge indicated in this PS.
In addition, HEPs are encouraged to develop their programmes to reflect the current best
practices and to offer a high-quality academic programme. Computing programmes may vary
in their nomenclature; however, the programme nomenclature must reflect the content of the
programme as indicated in the MQF. Examples for each level are in Appendix 4.
Table 2.3: Minimum credits of each curriculum component for all levels of qualifications
2
Standards in this area are best read together with Guidelines to Good Practices: Curriculum Design and Delivery,
which is available on the MQA Portal: www.mqa.gov.my.
23
CORE COMPUTING COURSES
1. Computer Architecture
2. Database Fundamentals
3. Basic Mathematics
4. Network and Data Communication
5. Operating System
6. Programming Fundamentals
7. Cybersecurity Fundamentals
8. System Analysis and Design
Notes:
* General courses refer to Mata Pelajaran Pengajian Umum (MPU) courses which are
mandatory. Please refer to Garis Panduan Mata Pelajaran Pengajian Umum (MPU)
Edisi Kedua for the minimum credit requirement as stipulated by the Ministry of Higher
Education (MOHE). HEP has an option to offer its own compulsory courses in addition
to the general courses.
** The Discipline Core of Knowledge Area Courses is representing the core knowledge
area for a specific area of computing except for Data Science.
*** ● Industrial training must be in a relevant industry and is allocated at a minimum
number, according to the formula of 1 credit = 2 weeks of training. It is
recommended to be placed in the final year.
● The minimum recommendation is 4 credits (2 months).
**** ● Free elective representing the non-computing courses.
● Flexibility is given to HEPs to determine the appropriate range.
24
DIPLOMA (LEVEL 4, MQF)
Notes:
* General courses refer to Mata Pelajaran Pengajian Umum (MPU) courses which are
mandatory. Please refer to Garis Panduan Mata Pelajaran Pengajian Umum (MPU)
Edisi Kedua for the minimum credit requirement as stipulated by the Ministry of
Higher Education (MOHE). HEP has an option to offer its own compulsory courses
in addition to the General courses.
** The Discipline Core of Knowledge Area Courses is representing the core knowledge
area for a specific area of computing except for Data Science.
*** ● Industrial training must be in a relevant industry and is allocated at a minimum
number, according to the formula of 1 credit = 2 weeks of training. It is
recommended to be placed in the final year.
● The minimum recommendation is 6 credits (3 months).
**** ● Free elective representing the non-computing courses.
● Flexibility is given to HEPs to determine the appropriate range.
25
Recommended Delivery Methods:
● Lectures / Tutorials
● Practical classes / Practical workshop / Studio / Laboratory work / Demonstration
technique
● WBL (conventional, 2u2i, incubation, technopreneurship)
● Blended learning
● Industry speaker
● Field / Industry visits
● Apprenticeship
● Industrial training
● Exhibition
Double Major
Double Major
(Within Non-Computing
(Within Computing
Single Major with Major- Discipline)
Discipline)
Major Specialisation Minor
Major 1 Major 2 Major 1 Major 2
Compulsory
Courses
8
(General* &
HEPs courses)
Core
Computing 18
Courses
Discipline Core 45 Based on
of Knowledge the
33 33 33 33
Area discipline
Courses*** requirement
Field Elective 18 - 12 18
- -
Specialisation - 18
- -
Minor - 31
Industrial Based on
6 the
Training
discipline
Final Year requirement
6
Project
Free Module -
(Non- 12 - 12
Computing)
Subtotal
101 113 134
Credits
Remaining -
19 7 - - -
Credits
Graduating 140
120 134
Credits
26
CORE COMPUTING COURSES
1. Computer Architecture
2. Database Fundamental
3. Network and Data Communication
4. Operating Systems-
5. Programming Fundamentals
6. System Analysis and Design
Specialisation Programme
27
Major - Minor Programme
28
Double Major from With Non-Computing Discipline
Notes:
* General courses refer to Mata Pelajaran Pengajian Umum (MPU) courses which are
mandatory. Please refer to Garis Panduan Mata Pelajaran Pengajian Umum (MPU)
Edisi Kedua for the minimum credit requirement as stipulated by the Ministry of
Higher Education (MOHE). HEP has an option to offer its own compulsory courses
in addition to the general courses.
** ● Industrial training must be in a relevant industry and is allocated at a minimum,
according to the formula of 1 credit = 2 weeks of training. It is recommended to
be placed in the final year.
● At a Bachelor’s degree level, industrial training is COMPULSORY with a
minimum of 6 credits (3 months).
● Final Year Project and Industrial Training must reflect both major
disciplines.
*** ● Free elective representing the non-computing courses.
● Flexibility is given to HEPs to determine the appropriate range.
**** For a double major programme, if the majors are governed by programme standards
(PS), the minimum core requirements can be based on the respective PS. However,
the minimum graduating credit specified in this PS must be fulfilled.
29
Recommended Delivery Methods:
● Lectures / Tutorials
● Interactive Learning
● Blended learning
● Practical classes / Practical workshop / Studio / Laboratory work / Demonstration
technique
● Field / Industry visits
● Fieldwork
● Apprenticeship
● Industrial training
● Industry speaker
● Task-based learning
● Problem-based learning
● Project-based learning
● WBL (conventional, 2u2i, incubation, technopreneurship)
● Experiential learning
● Final year project
● Seminar
● Empirical studies
● Case study
● Exhibition
Note:
Coursework components must include research methodology. (Refer to Standards:
Master’s and Doctoral Degree).
Master Dissertation 20
Subtotal Credits 32
To complete the minimum requirement of 40 credits, the remaining 8 credits can be placed
according to the ratio of coursework and dissertation which is 50:50, 40:60 and 30:70.
GRADUATING CREDITS 40
Notes:
i. Coursework components must include research methodology.
ii. The ratio of coursework to the dissertation is within the range of 50:50 or 40:60 or
30:70. (Refer to the Standards: Master’s and Doctoral Degree).
iii. Students are required to undertake research in a related field of study and submit a
dissertation.
iv. The minimum number of recommended words is 20000
31
MASTER’S DEGREE by RESEARCH (LEVEL 7, MQF)
Notes:
i. Students are required to undertake research in a related field of study and submit a
thesis.
ii. The HEP must have a set of procedures and guidelines pertaining to:
a) The minimum and a maximum period of study.
b) Format of the thesis (refer to the Standards: Masters and Doctoral Degree)
c) The minimum number of recommended words is 40,000
Doctoral Dissertation 40
Subtotal Credits 64
To complete the minimum requirement of 80 credits, the remaining 16 credits can be
placed according to the ratio of coursework and dissertation which is 50:50 or 40:60 or
30:70
GRADUATING CREDITS 80
*The selection of core modules consists of appropriate topics inside or outside the fields based
on an agreement between supervising committee to help the students in preparing for the
doctoral degree dissertation minimum at degree level.
32
Notes:
i. The candidate should achieve a grade point of at least 3.0 for each of the core
modules to proceed with the doctoral dissertation.
ii. Students are required to undertake research in a related field of study and submit a
doctoral dissertation.
iii. The ratio of coursework to a dissertation is within the range of 50:50 or 40:60 or 30:70
(refer to the Standards: Master’s and Doctoral Degree).
iv. The programme must include appropriate training in research methodology.
v. The HEP must have a set of procedures and guidelines pertaining to the format of
the thesis (refer to the Standards: Master’s and Doctoral Degree) or format of the
dissertation.
vi. The minimum number of recommended words is 40,000
33
Notes:
i. Students are required to undertake research in a related field of study and submit
a thesis.
ii. The HEP must have a set of procedures and guidelines pertaining to:
a) Minimum and maximum periods of study.
b) Format of the thesis doctoral degree. (refer to the Standards: Master’s
and Doctoral)
c) The minimum number of recommended words is 80000.
Notes:
a) a minimum of five (5) publications or equivalent works in alignment with the theme
of the specialization;
34
3. ASSESSMENT OF STUDENT LEARNING3
“Assessment of students learning is a key aspect of quality assurance and it is one of the most
important measures to show the achievement of learning outcomes. Hence, it is crucial for an
appropriate assessment method and mechanism to be in place. Qualifications are awarded
based on the results of the assessment. The methods of student assessment must be clear,
consistent, effective, reliable and in line with current practices. They must clearly measure the
achievement of the intended learning outcomes” (COPPA 2nd Edition, 2017).
The methods of assessment depend on the specific requirements of each course. Nonetheless,
the following must be considered as a general guide:
3
Standards in this area are best read together with Guidelines to Good Practices: Assessment of Students, which is
available on the MQA Portal: www.mqa.gov.my.
35
The types of the assessments indicated below are suggested range of percentages. HEPs
are encouraged to use a variety of methods and tools appropriate for measuring learning
outcomes and competencies. The type of assessments for each level of study is presented in
Table 3.
Table 3: Type of assessment for each level of study
CONTINUOUS FINAL
SUGGESTED FORMS OF
LEVEL ASSESSMENT ASSESSMENT
ASSESSMENT
(%) (%)
CERTIFICATE 50 to 70 30 to 50 o Assignment
(LEVEL 3, MQF) o Quiz / Test
o Demonstrations
DIPLOMA 50 to 70 30 to 50 o Observation
(LEVEL 4, MQF) o Presentations
o Practical assessment
BACHELOR’S 40 to 70 30 to 60 o Reflective module
DEGREE assessment
(LEVEL 6, MQF) o Self-reflective report
o Peer assessment
o Portfolio / Log book
o Final examination
(written / oral)
o Project
o Simulation
36
MASTER’S DEGREE 0 100 o Proposal defence
(LEVEL 7, MQF) (Thesis) o Research Progress
o Thesis
RESEARCH o Viva voce
o Presentation
o Seminar
o Simulation
Notes:
i. The HEPs should have a clear policy on the appointment of external and internal
examiners.
ii. The examiners should be from the relevant field of study.
iii. The composition of the dissertation / thesis examiners is prescribed as follows:
37
c. Doctoral Degree by Mixed Mode / Research/Prior Publication
The thesis is to be examined by at least two examiners, one of whom is an external
examiner (with one external examiner from an academic or industry related to the
candidate’s field of discipline). More than two examiners may be necessary in the
case of multidisciplinary dissertation.
iv. The assessment for master and doctoral programme for any specialisation in the
computing areas (Without Prefixed) should follows the following requirements:
a. must have a rubric to reflect the knowledge area of the defined discipline/s.
38
4. STUDENT SELECTION
This section of the Programme Standards relates to the selection of students for programme of
study.
“In general, admission to a programme needs to comply with the prevailing policies of the
Ministry of Higher Education (MOHE). There are varying views on the best method of student’s
selection. Whatever method is used, the HEP must be able to defend the consistency of the
method it utilises. The number of students to be admitted to a programme is determined by the
capacity of the HEP and the number of qualified applicants. HEP admission and retention
policies must not be compromised for the sole purpose of maintaining the desired enrolment. If
a HEP operates geographically separated campuses or if the programme is a collaborative one,
the selection and assignment of all students must be consistent with national policies” (COPPA
2nd Edition, 2017).
The standards for the selection of students into the Computing programmes are formulated by
keeping in mind the generic national Higher Education policies pertaining to minimum student
entry requirement.
ENGLISH COMPETENCY
REQUIREMENT
LEVEL ENTRY REQUIREMENTS
(INTERNATIONAL
STUDENTS)
i. A pass in Sijil Pelajaran Malaysia (SPM) or its
equivalent with ONE (1) credit and a pass in
Mathematics; OR
39
in any subject or any equivalent qualification
and a credit in Mathematics at SPM level or its
equivalent; OR
40
iv. Diploma in Computing (Level 4, MQF) or its
equivalent with minimum CGPA of 2.50;
OR
The candidate can sit for any subjects that did not
indicate Mathematics as a pre-requisite.
41
admitted subject to a thorough internal evaluation
process.
43
4*
DOCTORAL Doctoral Degree by Mixed Mode / Research / International students must
DEGREE **Industrial Doctoral Degrees / PhD by have proof of good proficiency
(LEVEL 8, MQF) Retrospective or Prior Publications in verbal and written English.
For example, International
English Language Testing
i. A Master’s degree (Level 7, MQF) in fields of System (IELTS) score of 6.0 or
Computing or related fields accepted by the HEP its equivalent.
Senate; OR
If a student does not meet this
ii. A Master’s degree (Level 7, MQF) from non- requirement, HEPs must offer
Computing fields with minimum 5 years working English proficiency courses to
experience in field of computing or related fields ensure that the student’s
must undergo appropriate prerequisite courses proficiency is sufficient to meet
determined by the HEP; OR the needs of the programme.
Note:
i. For the candidate who had not passed the internal rigorous assessment; HEP can determine
for the candidate to be re-assessed for the entry to the programme to pass preparatory
courses determined by the HEP before entering the programme; subjected to HEP’s Senate/
Academic Board’s approval.
ii. Working experience can be cumulative industry engagement even before acquiring required
qualification for a particular level of study, however it must be relevant to the level of study
as well as the content.
iii. Bachelor’s degree candidates who are registered for master’s degree programmes may
apply to convert to the doctoral degree programmes subjected to the Standard: Master’s and
Doctoral Degree.
iv. A Bachelor’s degree who are applying to the doctoral programmes subjected to the Standard:
Master’s and Doctoral Degree.
4*
Applicable to all Doctoral programmes including Doctoral Degree by Retrospective or prior publication and TVET.
**Refer to Standard: Master’s and Doctoral Degree
44
5. ACADEMIC STAFF5
“As the quality of the academic staff is one of the most important components in assuring the
quality of higher education, a HEP is expected to search for and appoint the best-suited
candidates, to serve its programmes, in an open, transparent and fair manner. To achieve this,
HEPs are expected to design and implement an academic staff search and recruitment practice
that is as efficient as it is effective to achieve the desired results. Every programme must have
an appropriately qualified and sufficient number of academic staffs, working in a conducive
environment that attracts talented individuals. The numbers recruited have to be adequate for,
and appropriate to, the needs of the programmes. The role of the academic staff in various
activities has to be clarified in order to reflect a fair distribution of responsibilities. It is important
for the HEP to provide a continuous staff development programme for its academic staff, for
them to be current in their knowledge and skills, both in their chosen discipline as well as in their
pedagogical skills” (COPPA 2nd Edition, 2017).
Table 5 provides the minimum requirements of the qualifications of academic staff and relevant
staff ratios for the various Malaysian Qualifications Framework (MQF) different qualification
levels in Computing. Besides possessing qualifications in the related field, HEPs must also
ensure that academic staff are assigned courses based on their areas of expertise or relevant
industry experience.
5
Standards in this area are best read together with Guidelines to Good Practices: Academic Staff and Guidelines:
Academic Staff Workload, which are available on the MQA Portal, www.mqa.gov.my.
45
● A Master’s degree (Level 7, MQF) in ● At least 60% of the academic
BACHELOR’S related fields AND Bachelor’s (Level 6, staff are full-timers.
DEGREE MQF) in Computing; OR ● Part-time staff may consist of
(LEVEL 6, MQF) industry practitioners or from
● A Bachelor’s degree (Level 6, MQF) in academia.
Computing with five (5) years of related
industry experience in the subject Student ratio:
taught (the programme should not ● Overall staff-student ratio -
employ more than 30% of the staff in 1:15 per programme.
this category).
46
(Co-Supervisor)
By Research
(Principal supervisor)
(Co-supervisor)
47
of project consultation / industry ● The supervisors must go
experience with required approval by through structured supervisor
the Senate of the HEP. (only for training.
teaching staff from industry /
practitioner). Student Ratio:
● Overall Principal supervisor
*for computing courses only. to student ratio – 1:7 for both
**for research method course must has a master and doctoral students
Doctoral degree in Computing or related by research and mixed mode.
fields with at least two (2) years of teaching ● Maximum number of
experience. postgraduate students by
research per supervisor
Supervision should not exceed 15.
(Principal supervisor)
(Co-supervisor)
48
Notes:
i. HEPs can hire full-time Subject Specialists for all levels, who have at least a minimum
of 10 years’ industry experience, and notable or exceptional talent in the Computing
discipline approved by the Board of Faculty / Senate.
ii. A candidate without a Bachelor’s degree but with a Master’s degree through APEL,
for access the APEL.A route, may be accepted as an academic staff considering the
related industry experience gained.
iii. Experience can be cumulative experience even before acquiring the required
qualification for a particular level of study, however it must be relevant to the level of
study as well as the content.
iv. Related fields refer to any discipline from Science, Technology, Engineering and
Mathematics.
It would also be an advantage for the HEPs to hire those with certain years of working
experience to reflect on their intellectual maturity and enrich learning experience of students.
The HEPs must commit to providing staff with development opportunities to ensure that their
staff are able to contribute fully to their vision and mission. Therefore, the HEPs must provide
the academic staff with at least 40 hours per year of Continuous Professional
Development (CPD) programmes to enhance their expertise and skills in teaching, learning,
assessment and research. The CPD may include participating in training, workshops and
conferences; pursuing academic / professional qualifications; engaging in self-directed studies;
coaching / mentoring / tutoring; and performing industrial attachments, consultancies and
community services. Part-time and / or contract staff should also be considered in the CPD
programmes.
49
6. EDUCATIONAL RESOURCES
“Adequate educational resources are necessary to support the teaching and learning activities
of a programme. These include all the required academic and instructional expertise, physical
facilities, information and communication technologies, research facilities, and finance” (COPPA
2nd Edition, 2017).
For Computing programmes, the HEPs are required to provide sufficient resources conducive
to support teaching and learning in the field. Lecture and tutorial rooms, and technical support /
facilities, sufficient space to accommodate student-centred learning must be provided according
to the current needs. For research in postgraduate programmes, candidates should be provided
with a conducive work area.
50
Notes:
All above mentioned facilities must meet minimum health and safety standards and special
needs.
All studios / workshops / classrooms / labs / workstations must be equipped with appropriate
space, accessories, equipment with enough number of computers (if related to the courses),
and working areas and must meet minimum safety standards.
All Computing programmes run by the HEP must have the appropriate reading references and
materials accessible to the staff and students, related to the programmes in the HEP’s library or
resource room.
The programme must have sufficient, relevant and appropriate physical facilities and training
resources at the commencement of the programme to ensure its effective delivery including
facilities for practical-based programmes and those with special needs.
Opens the facilitation from the industry to collaborate and facilitate on the needs of HEPs
programme through appropriate Memorandum of Understanding (MoU) / Memorandum of
Agreement (MoA) / Letter of Agreement (LoA); MQA verified and approved facilities.
51
7. PROGRAMME MANAGEMENT
“There are many ways of administering an educational institution and the methods of
management differ between Higher Education Providers (HEPs). Nevertheless, governance
that reflects the collective leadership of an academic organisation must emphasise excellence
and scholarship. At the departmental level, it is crucial that the leadership provides clear
guidelines and direction, builds relationships amongst the different constituents based on
collegiality and transparency, manages finances and other resources with accountability, forges
a partnership with significant stakeholders in educational delivery, research and consultancy,
and dedicates itself to academic and scholarly endeavours. Whilst formalised arrangements can
protect these relationships, they are best developed by a culture of reciprocity, mutuality and
open communication” (COPPA 2nd Edition, 2017).
This document will not raise issues pertaining to governance and administration as these are at
the institutional rather than at the programme level. In this programme, academic leadership is
largely focused on suitably qualified persons in the Computing field to carry out the necessary
curriculum monitoring, review and assessment. The leaders of the programme should
demonstrate knowledge of the field and the attributes of good ethical values in work practices.
It is advisable that leader of the programme to have industry experiences or relevant
professional certification.
52
The programme leaders, i.e. Programme Coordinator, Head of Programme or equivalent
position, must meet the qualification and experience requirements as stated in Table 7.
CERTIFICATE
(LEVEL 3, MQF)
Bachelor’s degree (Level 6, MQF) in Computing and five (5)
years of academic experience.
DIPLOMA
(LEVEL 4, MQF)
The programme must be supported by sufficient support staff. The criteria and responsibilities
of the school, faculty or department academic leadership must be well documented. The
management must institute a quality assurance system that is supported by sufficient
administrative and support staff and the effective deployment of available resources to
implement academic and non-academic activities.
Remarks: The Appointment for the Management of the Faculty, Academic Center, Department,
School, etc.; requires the HEPs’ organisation’s policy to be appointed accordingly to support its
structural frameworks and to be appropriated towards the governing of the programme.
53
8. PROGRAMME MONITORING, REVIEW AND CONTINUAL QUALITY
IMPROVEMENT6
“Quality enhancement calls for programmes to be regularly monitored, reviewed and evaluated.
These include the responsibility of the department to monitor, review and evaluate the structures
and processes, curriculum components as well as the student’s progress, employability and
performance.
Feedback from multiple sources; students, alumni, academic staff, employers, professional
bodies and informed citizens to assists in enhancing the quality of the programme. Feedback
can also be obtained from an analysis of students’ performances and longitudinal studies.
Measures of student’s performances include the average study duration, assessment scores,
passing rate in examinations, success and dropout rates, students’ and alumni’ reports about
their learning experience, as well as time spent by students in areas of special interest.
Evaluation of student’s performances in examinations can reveal very useful information. For
example, if student selection has been correctly done, a high failure rate in a programme
indicates something amiss in the curriculum content, teaching-learning activities or assessment
system. The programme committees need to monitor the performance rate in each course and
investigate if the rate is too high or too low.
One method to evaluate programme effectiveness is a longitudinal study of the graduates. The
department should have mechanisms for monitoring the performance of its graduates and for
obtaining the perceptions of society and employers on the strengths and weaknesses of the
graduates and to respond appropriately” (COPPA 2nd Edition, 2017).
“Comprehensive monitoring and review of the programme for its improvement are to be carried
out with a proper mechanism, considering feedback from various parties. The committee
responsible for this should be granted adequate autonomy to carry out its responsibility
6
Standards in this area are best read together with Guidelines to Good Practices: Monitoring, Reviewing and
Continually Improving Institutional Quality and Guidelines on Terms Used for External Examiner, External Advisor
and Advisory Board, which are available on the MQA Portal: www.mqa.gov.my.
54
effectively. It is desirable that the departments work in association with the HEP’s central Quality
Assurance Unit to ensure objectivity” (COPPA 2nd Edition, 2017).
The HEPs are expected to provide evidence of their ability to keep pace with changes in the
field of Computing and the requirements of the stakeholders. These may be demonstrated by,
but are not limited, to the following:
i. The department must have a Quality Assurance (QA) unit for internal quality assurance of
the department to work hand-in-hand with the QA unit of the HEP.
ii. A comprehensive curriculum review should be conducted at least once every 3 to 5 years.
However, updating the curriculum to keep pace with current developments should be
conducted at more regular intervals.
iii. Compulsory appointment of external advisors and examiner (academicians) who are
qualified in the relevant fields to assure quality of Bachelor’s degree (Level 6, MQF) and
above.
iv. Continual benchmarking against top universities at national and international levels.
v. Linkages with related professional bodies, government agencies and industry.
vi. Engagement with industry practitioners through appointment as a member of Board of
Studies, appointment of adjunct positions, guest speakers, etc.
vii. Annual dialogue sessions with stakeholders.
viii. Active participation of academic staff at relevant conferences, seminars, workshops and
short courses.
ix. Presentations by invited speakers, local or international.
x. Organising conferences, seminars and workshops.
xi. Encouraging international exchange among students and staff.
xii. Continuous review of industrial attachment practices and records.
55
REFERENCES
Malaysian Qualifications Agency (2018). Malaysian Qualifications Framework, MQF 2nd Edition.
Cyberjaya, Malaysia.
Malaysian Qualifications Agency (2019). Code of Practice for TVET Programme Accreditation,
(COPTPA). Cyberjaya, Malaysia.
Malaysian Qualifications Agency (2011). Guidelines to Good Practices: Curriculum Design and
Delivery, (GGP: CDD). Petaling Jaya, Malaysia.
Malaysian Qualifications Agency (2021). Standards: Master’s and Doctoral Degree 2nd Edition.
Cyberjaya, Malaysia.
Ministry of Higher Education (2016). Garis Panduan Mata Pelajaran Pengajian Umum (MPU)
Edisi Kedua. Putrajaya, Malaysia.
Ministry of Higher Education (2017). Garis Panduan Pelaksanaan Mod Pengajian 2u2i.
Putrajaya, Malaysia.
Surat Makluman MQA Bil. 7/2014 – Garis Panduan Beban Staf Akademik, rujukan (MQA100-
1/7/2(9)), dated 1st October 2014.
56
APPENDIX 1
Professor Dr. Hjh Azlinah Mohamed Fakulti Sains Komputer dan Matematik
1. (Chairman) Universiti Teknologi MARA, Shah Alam
Associate Professor Ts. Dr. Jafreezal Fakulti Sains dan Teknologi Maklumat
4.
Jaafar Universiti Teknologi Petronas
9. Mr. Nik Naharuddin Mohd Nasir Malaysia Digital Economy Corporation (MDEC)
Jabatan Pembangunan
10. Mr. Ts. Lee Hwee Hsiung
Profesional Keselamatan Siber (Cybersecurity)
57
APPENDIX 2
2. Government Agency
3. Industry
5. MQA’s Officer
58
APPENDIX 3
59
results to a group of
peers.
● Explain database ● Use an appropriate tool ● Design a relational
Database concept, technology to design a relational database system for a
Fundamentals and application. database system for a substantial problem.
● Describe the substantial problem. ● Develop a fully-
appropriate tool to ● Manage a fully- functional relational
design a relational functional relational and non-relational
database system for a database system database system
simple problem. based on an existing based on an existing
● Show feasibility of the system design system design.
design. ● Implement database ● Configure and Deploy
systems project. database systems
● Produce technical project.
documentation. ● Produce technical
documentation.
● Secure a database.
● Identify problems in ● Identify problems in NA
Basic any domain of interest any computing domain
Mathematics that can be addressed that can be addressed
mathematically mathematically
● Find a mathematical ● Apply mathematical
formulation for formulation for
identified problems. identified problems.
● Demonstrate the ● Use logical thought
ability to use basic processes to divide a
techniques of counting problem into smaller
and algorithms in components and make
computer science. inferences based on
problem components.
● Select and implement
an effective
mathematical strategy.
60
● Explain different main
issues related to
network management.
61
● Apply the debugging
process.
62
APPENDIX 4
KNOWLEDGE AREA
Discipline Core of Knowledge Area Courses for all areas of Computing. Choose any
Discipline Core of Knowledge Area based on the specific requirements of the
programme:
● INFORMATION TECHNOLOGY
63
an environmental ● Develop IT policies
context. within an organization
that include privacy,
legal, and ethical
considerations as they
relate to a corporate
setting.
● Evaluate related issues
facing an IT project and
develop a project plan
using a cost/benefit
analysis including risk
considerations in
creating an effective
project plan from its start
to its completion.
Information NA ● Express how the ● Express how the growth
Management growth of the internet of the internet and
and demands for demands for information
information have have changed data
changed data handling handling and
and transactional and transactional and
analytical processing analytical processing
and led to the creation and led to the creation of
of special-purpose special-purpose
databases. databases.
● Design and implement ● Design and implement a
a physical model based physical model based on
on appropriate appropriate organization
organization rules for a rules for a given
given scenario scenario including the
including the impact of impact of normalization
normalization and and indexes.
indexes. ● Create working SQL
● Create working SQL statements for simple
statements for simple and intermediate queries
and intermediate to create and modify
queries to create and data and database
modify data and objects to store,
database objects to manipulate, and Analyse
store, manipulate, and enterprise data.
Analyse enterprise ● Analyse ways data
data. fragmentation,
replication, and
allocation affect
database performance
in an enterprise
environment.
● Perform major database
administration tasks
such as create and
manage database users,
roles and privileges,
backup, and restore
database objects to
ensure organizational
64
efficiency, continuity,
and information security.
Integrated ● Describe concept of ● Illustrate how to code ● Illustrate how to code
Systems integration at the and store characters, and store characters,
Technology system level. images, and other images, and other forms
● Identify how to code forms of data in of data in computers and
and store computers show why data
characters, images, ● show why data conversion is often a
and other forms of conversion is often a necessity when merging
data in computers. necessity when disparate computing
merging disparate systems.
● Show why data computing systems. ● Show how a commonly
conversion is often a used intersystem
necessity when ● Show how a commonly communication protocol
merging disparate used intersystem works, including its
computing systems. communication advantages and
protocol works, disadvantages.
● Show how a including its ● Design, debug and test a
commonly used advantages and script that includes
intersystem disadvantages. selection, repetition, and
communication ● Design, debug and test parameter passing.
protocol works, a script that includes ● Illustrate the goals of
including its selection, repetition, secure coding and show
advantages and and parameter how to use these goals
disadvantages. passing. as guideposts in dealing
with preventing buffer
overflow, wrapper code,
and securing method
access.
Networking ● Analyse and ● Analyse and compare ● Analyse and compare
compare the the characteristics of the characteristics of
characteristics of various communication various communication
various protocols and how they protocols and how they
communication support application support application
protocols and how requirements within a requirements within a
they support telecommunication telecommunication
application system. system.
requirements within ● Analyse and compare ● Analyse and compare
a several networking several networking
telecommunication topologies in terms of topologies in terms of
system. robustness, robustness,
● Analyse and expandability, and expandability, and
compare several throughput used within throughput used within a
networking a cloud enterprise. cloud enterprise.
topologies in terms ● Describe different ● Describe different
of robustness, network standards, network standards,
expandability, and components, and components, and
throughput used requirements of requirements of network
within a cloud network protocols protocols within a
enterprise. within a distributed distributed computing
● Describe different computing setting. setting.
network standards, ● Produce managerial
components, and policies to address
requirements of server breakdown
network protocols issues within a banking
system.
65
within a distributed ● Explain different main
computing setting. issues related to network
management.
Platform NA ● Describe how the ● Describe how the
Technologies historical development historical development
of hardware and of hardware and
operating system operating system
computing platforms computing platforms
produced the produced the computing
computing systems we systems we have today.
have today. ● Show how to choose
● Show how to choose among operating system
among operating options and install at
system options and least an operating
install at least an system on a computer
operating system on a device.
computer device. ● Justify the need for
power and heat budgets
within an IT
environment, and
document the factors
needed when
considering power and
heat in a computing
system.
● Produce a block
diagram, including
interconnections, of the
main parts of a
computer, and illustrate
methods used on a
computer for storing and
retrieving data.
Cloud NA ● Analyse the meaning of ● Analyse the meaning of
Computing cloud computing and cloud computing and
understand the understand the different
different cloud service cloud service categories.
categories. ● Categorize cloud service
● Categorize cloud types and be aware of
service types and be privacy regulation
aware of privacy impact on cloud
regulation impact on application
cloud application requirements.
requirements. ● Consider contract
negotiations needed for
cloud service delivery
and develop the skills
necessary to assess
security breaches and
their impact on the
organization.
● Analyse when to use
cloud applications and
how architecture affects
performance.
66
● Develop a cloud
application with a user
interface and
understand data
components.
Discrete NA ● Present to a peer group ● Present to a peer group
Structure some practical some practical examples
examples of an of an appropriate set,
appropriate set, function, or relation
function, or relation model, and interpret the
model, and interpret associated operations
the associated and terminology in
operations and context.
terminology in context. ● Use symbolic
● Use symbolic propositional and
propositional and predicate logic to model
predicate logic to a real-life industry
model a real-life application by applying
industry application by formal methods (e.g.,
applying formal calculating the validity of
methods (e.g., formulae and computing
calculating the validity normal forms to the
of formulae and symbolic logic).
computing normal ● Apply rules of inference
forms to the symbolic to construct proofs and
logic). present results to a
● Apply rules of inference group of professionals,
to construct proofs and appropriate proofs, or
present results to a logical reasoning to
group of professionals, solve a strategic
appropriate proofs, or problem.
logical reasoning to ● Map real-world
solve a strategic applications to
problem. appropriate counting
formalisms and apply
basic counting theories
(e.g., counting
arguments, the
pigeonhole principle,
modular arithmetic as
well as compute
permutations and
combinations of a set) to
solve an industry
problem.
● Analyse an industry
problem to determine
underlying recurrence
relations and present the
solution to professionals
by using a variety of
basic recurrence
relations.
● Model a real-world
problem using
appropriate graphing
67
strategies (e.g., trees,
traversal methods for
graphs and trees,
spanning trees of a
graph) and determine
whether two graph
approaches are
isomorphic.
● Calculate different
probabilities of
dependent or
independent events and
expectations of random
variables to solve a
problem and present to a
group of peers the ways
to compute the variance
for a given probability
distribution.
System ● Demonstrate a ● Justify the way IT ● Justify the way IT
Paradigms procurement systems within an systems within an
process for software organization can organization can
and hardware represent stakeholders represent stakeholders
acquisition. using different using different
architectures and the architectures and the
● Explain the ways these ways these architectures
procedures one architectures relate to a relate to a system
might use for testing system lifecycle. lifecycle.
the critical issues ● Demonstrate a ● Demonstrate a
that could affect IT procurement process procurement process for
system for software and software and hardware
performance. hardware acquisition acquisition and explain
and explain the the procedures one
procedures one might might use for testing the
use for testing the critical issues that could
critical issues that affect IT system
could affect IT system performance.
performance. ● Evaluate integration
● Evaluate integration choices for middleware
choices for middleware platforms and
platforms and demonstrate how these
demonstrate how these choices affect testing
choices affect testing and evaluation within the
and evaluation within development of an IT
the development of an system.
IT system. ● Use knowledge of
information technology
and sensitivity to the
goals and constraints of
the organization to
develop and monitor
effective and appropriate
system administration
policies within a
government
environment.
68
● Develop and implement
procedures and employ
technologies to achieve
administrative policies
within a corporate
environment.
● Organize personnel and
information technology
resources into
appropriate
administrative domains
in a technical center.
● Use appropriate and
emerging technologies
to improve the
performance of systems
and discover the cause
of performance
problems in a system.
Software NA ● Use multiple levels of ● Use multiple levels of
Fundamentals abstraction and select abstraction and select
appropriate data appropriate data
structures to create a structures to create a
new program that is new program that is
socially relevant and socially relevant and
requires teamwork. requires teamwork.
● Evaluate how to write a ● Evaluate how to write a
program in terms of the program in terms of
program style, intended program style, intended
behavior on specific behavior on specific
inputs, the correctness inputs, the correctness
of program of program components,
components, and and descriptions of
descriptions of program program functionality.
functionality. ● Develop algorithms to
solve a computational
problem and explain
how programs
implement algorithms in
terms of instruction
processing, program
execution, and running
processes.
User ● Describe user ● Design an interactive ● Design an interactive
Experience interface design application, applying a application, applying a
Design concept based on user-centered design user-centered design
stakeholder needs. cycle and related tools cycle and related tools
and techniques (e.g., and techniques (e.g.,
● Apply interactive prototyping), aiming at prototyping), aiming at
techniques in an usability and relevant usability and relevant
application with user experience within user experience within a
related tools. a corporate corporate environment.
environment. ● For a case of user-
● For a case of user- centered design,
centered design, Analyse and evaluate
Analyse and evaluate the context of use,
69
the context of use, stakeholder needs,
stakeholder needs, state-of-the-art
state-of-the-art interaction opportunities,
interaction and envisioned
opportunities, and solutions, considering
envisioned solutions, user attitude and
considering user applying relevant tools
attitude and applying and techniques (e.g.,
relevant tools and heuristic evaluation),
techniques (e.g., aiming at universal
heuristic evaluation), access and
aiming at universal inclusiveness, and
access and showing a responsive
inclusiveness, and design attitude,
showing a responsive considering assistive
design attitude, technologies and
considering assistive culture-sensitive design.
technologies and ● For evaluation of user-
culture-sensitive centered design,
design. articulate evaluation
● For evaluation of user- criteria and compliance
centered design, to relevant standards.
articulate evaluation ● In design and analysis,
criteria and compliance apply knowledge from
to relevant standards. related disciplines
including human
information processing,
anthropology and
ethnography, and
ergonomics/human
factors.
● Apply experience design
for a service domain
related to several
disciplines, focusing on
multiple stakeholders
and collaborating in an
interdisciplinary design
team. (Application
design)
Web and Mobile ● Explain concept of ● Design a responsive ● Design a responsive
Systems web and mobile web application web application utilizing
framework and utilizing a web a web framework and
technologies. framework and presentation
presentation technologies in support
● Identify a responsive technologies in support of a diverse online
web application of a diverse online community.
utilizing a web community. ● Develop a mobile app
framework and ● Develop a mobile app that is usable, efficient,
technologies. that is usable, efficient, and secure on more than
and secure on more one device.
● Show a mobile app than one device. ● Analyse a web or mobile
that is usable, system and correct
efficient, and secure security vulnerabilities.
on more than one ● Implement storage,
device. transfer, and retrieval of
70
digital media in a web
application with
appropriate file,
database, or streaming
formats.
● Describe the major
components of a web
system and how they
function together,
including the web server,
database, analytics, and
front end.
71
● INFORMATION SYSTEM
72
● Compare trade-offs of
different concurrency
modes
● Develop non-relational
models
IT ● Explain key ● Explain key ● Explain key infrastructure
Infrastructure infrastructure infrastructure concepts, concepts, including how it
concepts, including including how it functions, how to define
how it functions, how functions, how to define critical functions, and how
to define critical critical functions, and to plan and manage
functions, and how to how to plan and infrastructure
plan and manage manage infrastructure ● Explain the principles of
infrastructure ● Explain the principles of layered network
● Explain the layered network architectures
components of IT architectures ● Explain the components
infrastructure ● Explain the of IT infrastructure
solutions from components of IT solutions from
client/server, infrastructure solutions client/server, network
network hardware, from client/server, hardware, (including
(including wireless network hardware, wireless and wired)
and wired) (including wireless and ● Explain the principles of
wired) network software and
● Explain the principles of configuration
network software and ● Explain network protocols
configuration and their configuration
● Explain network ● Illustrate a clear
protocols and their understanding of security
configuration principles as they pertain
to networks
● Examine and critique IT
infrastructure for
organizations
● Examine and critique IT
server architecture (both
physical or cloud-based)
● Explain concepts of
Enterprise Architecture
Secure NA ● Explain the purpose of ● Explain the purpose of
Computing cryptography and how it cryptography and how it
can be used in data can be used in data
communications communications
● Describe the concepts ● Describe the concepts of
of authentication, authentication,
authorization, access authorization, access
control, and data control, and data integrity
integrity and how it and how it helps to
helps to enhance data enhance data security
security ● Explain the security
● Explain the security requirements that are
requirements that are important during software
important during design
software design ● Analyse the concepts of
● Describe risk identification,
management authentication, and
techniques to identify access authorization in
and prioritize risk
73
factors for information the context of protecting
assets and how risk is people and devices
assessed ● Analyse the importance
of social media privacy
and security
● Illustrate how
cyberattacks work, how to
avoid them and how to
counteract their malicious
consequences
● Describe risk
management techniques
to identify and prioritize
risk factors for information
assets and how risk is
assessed
● Illustrate the types of
security laws,
regulations, and
standards within which an
organization operates
Systems NA ● Explain what systems ● Explain what systems are
Analysis & are and how they are and how they are
Design developed developed
● Demonstrate the SDLC ● Demonstrate the SDLC
phases and activities phases and activities
● Identify SDLC Models ● Identify SDLC Models
(Agile, Waterfall, V- (Agile, Waterfall, V-
shaped, iterative, spiral, shaped, iterative, spiral,
etc.) etc.)
● Work effectively in a ● Work effectively in a team
team environment environment
● Describe data ● Describe data modelling
modelling techniques techniques
● Describe the role and ● Describe the role and
responsibilities of the responsibilities of the
participants in the participants in the SDLC
SDLC ● Explain the common
ways projects fail and
how to avoid these
failures
● Identify Enterprise
Architecture concepts
related to SDLC phases
Application Programming Programming
development / Programming
programming ● Develop data storage ● Develop data storage
● Develop data strategies using strategies using primitive
storage strategies primitive data types in a data types in a
using primitive data computer’s volatile computer’s volatile
types in a computer’s memory memory
volatile memory ● Apply data ● Apply data
● Apply data transformations using transformations using
transformations arithmetic, assignment, arithmetic, assignment,
using arithmetic, and trans positional and trans positional
assignment, and operators operators
74
trans positional ● Develop predicate ● Develop predicate
operators expressions using expressions using
● Develop predicate relational and logical relational and logical
expressions using operators operators
relational and logical ● Express algorithmic ● Express algorithmic
operators problem-solving using problem-solving using
● Express algorithmic sequence, selection, sequence, selection, and
problem-solving and repetition repetition structures
using sequence, structures ● Modularize the
selection, and ● Modularize the algorithmic and operating
repetition structures algorithmic and capabilities of a program
operating capabilities of using functions, methods,
a program using subroutines, or similar
Application functions, methods, organizing structures.
Development subroutines, or similar ● Select and utilize
organizing structures. appropriate linear and
● Conduct a non-linear data structures
systematic to maintain and manage
requirements Application sets of related data in
analysis to Development non-volatile memory.
determine the basic ● Utilize Object-Oriented
facts used to ● Conduct a systematic concepts in the
organize the requirements analysis organization and
application of to determine the basic structuring of programs
programming effort facts used to organize for behaviour and
to solve a problem or the application of concept management
reach a goal programming effort to
● Formalize and solve a problem or
communicate reach a goal Application Development
requirements in a ● Formalize and
manner that is communicate ● Conduct a systematic
comprehensible for requirements in a requirements analysis to
all stakeholders that manner that is determine the basic facts
will determine the comprehensible for all used to organize the
success of the stakeholders that will application of
software system determine the success programming effort to
● Develop the of the software system solve a problem or reach
programming code ● Specify the software a goal
implementation that system architecture ● Formalize and
realizes the system such that the principal communicate
architecture and components and requirements in a manner
design. dependencies of the that is comprehensible for
system are visible and all stakeholders that will
comprehensible for all determine the success of
involved in shaping the the software system
materials of design and ● Specify the software
construction system architecture such
● Identify the lateral that the principal
components and components and
libraries that the dependencies of the
designed and system are visible and
developed system will comprehensible for all
depend on involved in shaping the
● Develop the materials of design and
programming code construction
implementation that
75
realizes the system ● Identify the lateral
architecture and components and libraries
design. that the designed and
● Test all developed developed system will
programming code depend on
components to ensure ● Develop the
fidelity, consistency, programming code
and fit. implementation that
realizes the system
architecture and design.
● Test all developed
programming code
components to ensure
fidelity, consistency, and
fit.
● Maintain software
throughout deployment
and utilization such that
extant or new intentions
and requirements are
accommodated such that
the intended purpose will
function.
● Adopt, or adapt, an
appropriate software
system process
methodology such that
people, resources,
design requirements and
other dynamic
considerations allow for
correctness and utility.
● Establish and maintain
the appropriate dialog
among stakeholders that
ensure a degree of
communication and
information transparency
to maintain the viability of
the software system.
76
● Create and manage the evaluates, directs, and
oversight mechanisms monitors organizational
by which an information technology –
organization evaluates, managing decision rights
directs, and monitors and organizational
organizational information technology
information technology decision-making
– managing decision practices
rights and ● Implement strategic plans
organizational that have been created
information technology for the delivery and use of
decision-making organizational
practices information systems
● Ensure organizational
information systems
comply with policies,
applicable laws and
regulations
● Manage organizational
risk and develop risk
mitigation plans
● Create IT procurement
policies and understand
and negotiate IT
contracts
● Develop plans for
workforce development,
training, talent
acquisition, and
employee retention
● Apply leading service
management
frameworks, such as ITIL
and CMMI
● Identify commonly used
governance frameworks,
such as COBIT and
TOGAF, to align
information systems with
organizational
requirements.
77
● Identify aspects of adaptive systems and
sustainability and data
adaptive systems and ● Categorize ethical
data stakeholders and their
● Categorize ethical importance to Information
stakeholders and their Systems
importance to ● Investigate sustainable
Information Systems processes, actions, and
performance to support
organizations
● Investigate sustainable
processes, actions, and
performance to support
the individual
● Investigate sustainable
processes, actions, and
performance to support
society at large
IS Project ● Explain basic project ● Explain basic project ● Explain basic project
Management management management concepts management concepts
concepts and terms and terms and terms
● Apply integration ● Use integration ● Use integration
management tools, management tools, management tools,
techniques, and techniques, and techniques, and
processes in IS processes processes
projects. ● Use scope ● Use scope management
management tools, tools, techniques, and
techniques, and processes
processes ● Develop estimates and
● Develop estimates and time tracking using
time tracking using appropriate tools,
appropriate tools, techniques, and
techniques, and processes
processes ● Develop estimates and
● Develop estimates and cost tracking using
cost tracking using appropriate tools,
appropriate tools, techniques, and
techniques, and processes
processes ● Utilize the change control
● process to maintain and
control quality
● Implement human
resource management
tools, techniques, and
processes
● Define and implement a
communication
management plan
● Predict and manage
project risk through the
use of tools, techniques,
and processes
● Define and explain
procurement
management
78
● Identify and manage
stakeholders within the
phases of a project
● Utilize tools, techniques,
and processes to manage
project performance
● Apply agile project
management principles
and methods in practice
● Apply the Scrum
development process
● Select an appropriate
project management
methodology based on
project characteristics
79
● COMPUTER SCIENCE
● Determine an appropriate
algorithmic approach to an
industry problem and use
appropriate techniques
(e.g., greedy approach,
divide-and-conquer
algorithm, recursive
backtracking, dynamic
programming, or heuristic
approach) that considers
the trade-offs between the
80
brute force to solve a
problem.
● Implement basic
numerical algorithm
methods (e.g., search
algorithms, common
quadratic and O(N log N)
sorting algorithms,
fundamental graph
algorithms, string-
matching algorithm) to
solve an industry problem
and select the appreciate
algorithm for a particular
context.
● Design a deterministic
finite state machine for a
local engineering firm that
accepts a specified
language and generates a
regular expression to
represent the language.
Architecture and ● Explain the ● Explain the ● Use simulation tools for
Organization relationships relationships between capture, synthesis, and
between hardware hardware components simulation to evaluate
components and the and the subsystems in simple building blocks of a
subsystems in a a computer system simple computer design
computer system ● Use simulation tools for for a local engineering
● Explain the capture, synthesis, and company.
differences between simulation to evaluate ● Evaluate the timing
data simple building blocks
diagram behavior of a
representations – of a simple computer
simple processor-
signed numbers, design.
fixed and floating ● Evaluate the timing implemented at the logic
numbers and diagram behavior of a circuit level and develop a
characters simple processor- report expressing the
● Use simulation tools implemented at the findings.
for capture and logic circuit level and ● Write a simple program at
simulate a simple develop a report the assembly/machine
computer design. expressing the findings. level for string processing
● Write a simple program and manipulation and for
at the converting numerical data
assembly/machine into hexadecimal form.
level. ● Implement a fundamental
high-level construct in both
machine and assembly
languages and present the
results to a group of peers.
81
● Calculate the average
memory access time
under a variety of cache
and memory
configurations and
develop a short report of
the findings.
Computational NA NA ● Create a simple, formal
Science mathematical model of a
real-world situation and
use that model in a
simulation for a local
technology company.
82
to solve an industry
problem.
● Analyse an industry
problem to determine
underlying recurrence
relations and present the
solution to professionals
by using a variety of basic
recurrence relations.
● Model a real-world
problem using appropriate
graphing strategies (e.g.,
trees, traversal methods
for graphs and trees,
spanning trees of a graph)
and determine whether
two graph approaches are
isomorphic.
● Calculate different
probabilities of dependent
or independent events and
expectations of random
variables to solve a
problem and present to a
group of peers the ways to
compute the variance for a
given probability
distribution.
83
state-of-the-art state-of-the-art response
response interaction interaction times, design
times, design modalities taking into
modalities taking into consideration universal
consideration universal access, inclusiveness,
access, inclusiveness, assistive technologies,
assistive technologies, and culture-sensitive
and culture-sensitive design.
design. ● Design and develop an
● Design and develop an interactive application for a
interactive application local charity, applying a
for a local charity, user-centered design
applying a user- cycle with related
centered design cycle vocabulary, tools, and
with related vocabulary, techniques that optimize
tools, and techniques usability and user
that optimize usability experience.
and user experience. ● Create and conduct a
simple usability test to
Analyse and evaluate a
user interface that
considers the context of
use taking into
consideration universal
access and culturally
sensitive design.
● Create a simple
application, together with
help and documentation,
that supports a graphical
user interface for an
enterprise and conduct a
quantitative evaluation
and report the results.
84
Information NA NA ● Contrast information with
Management data and knowledge and
describe to a group of
professionals the
advantages and
disadvantages of
centralized data control.
● Demonstrate to a group of
peers a declarative query
language to elicit
information from a
database.
● Contrast appropriate data
models, including internal
structures, for different
types of data, and present
an application to a group
of professionals for the
use of modeling concepts
and notation of the
relational data model.
87
Parallel and NA ● Design a scalable ● Design a scalable parallel
Distributed parallel computing algorithm for a computer
Computing algorithm firm by applying task-
● Write a program for based decomposition or
appropriate parallel and data-parallel
distributed computing decomposition.
applications. ● Write a program for a
client that correctly
terminates when all
concurrent tasks terminate
by considering actors
and/or reactive processes,
deadlocks, and properly
synchronized queues.
● Write a test program for a
company that reveals a
concurrent programming
error (e.g., missing an
update when two activities
both try to increment a
variable).
● Present computational
results of the work and
span in a program by
identifying independent
tasks that may be
parallelized and
determining the critical
path for a parallel
execution diagram.
● Implement a parallel
divide-and-conquer
(and/or graph algorithm)
for a client by mapping and
reducing operations for the
real industry problem and
empirically measure its
performance relative to its
sequential analog.
Programming ● Explain the ● Write event handlers for ● Present the design and
Languages behaviour of simple a web developer for use implementation of a class
programs involving in reactive systems considering object-
the fundamental such as GUIs. oriented encapsulation
programming ● Demonstrate program mechanisms (e.g., class
construct. pieces (such as hierarchies, interfaces,
● Compare various functions, classes, and private members).
problem-solving
methods) that use ● Produce a brief report on
tools in the problem-
generic or compound the implementation of a
88
solving process for types, including for basic algorithm
computers. collections to write considering control flow in
● Revise short programs. a program using dynamic
programs that use ● Write a program for a dispatch that avoids
standard conditional client to process a assigning to a mutable
and iterative control representation of code state (or considering
structures and that illustrates the reference equality) for two
functions.
incorporation of an different languages.
interpreter, an ● Present the
expression optimizer, implementation of a useful
and a documentation function that takes and
generator. returns other functions
considering variables and
lexical scope in a program
as well as functional
encapsulation
mechanisms.
● Use iterators and other
operations on aggregates
(including operations that
take functions as
arguments) in two
programming languages
and present to a group of
professionals some ways
of selecting the most
natural idioms for each
language.
● Contrast and present to
peers (1) the
procedural/functional
approach (defining a
function for each operation
with the function body
providing a case for each
data variant) and (2) the
object-oriented approach
(defining a class for each
data variant with the class
definition providing a
method for each
operation).
● Write event handlers for a
web developer for use in
reactive systems such as
GUIs.
● Demonstrate program
pieces (such as functions,
classes, methods) that use
89
generic or compound
types, including for
collections to write
programs.
● Write a program for a
client to process a
representation of code that
illustrates the
incorporation of an
interpreter, an expression
optimizer, and a
documentation generator.
● Use type-error messages,
memory leaks, and
dangling-pointer to debug
a program for an
engineering firm.
90
functions, and parameter
passing.
● Present the costs and
benefits of dynamic and
static data structure
implementations,
choosing the appropriate
data structure for modeling
a given engineering
problem.
● Apply consistent
documentation and
program style standards
for a software engineering
company that contribute to
the readability and
maintainability of software,
conducting a personal and
small-team code review on
program component using
a provided checklist.
● Demonstrate common
coding errors, constructing
and debugging programs
using the standard
libraries available with a
chosen programming
language.
● Refactor an industry
program by identifying
opportunities to apply
procedural abstraction.
● SOFTWARE ENGINEERING
Software ● Explain the software ● Identify and document ● Identify and document
Requirements requirements software requirements software requirements
concept. by applying a known by applying a known
● Identify the type of requirements requirements elicitation
requirements such elicitation technique in technique in work
as functional and work sessions with sessions with
non-functional stakeholders, using a stakeholders, using
requirements. facilitative skill, as a facilitative skills, as a
● Describe software contributing member of contributing member of a
requirement a requirements team. requirements team.
processes ● Analyse software ● Analyse software
(elicitation, requirements for requirements for
specification, consistency, consistency,
verification/ completeness, and completeness, and
validation and feasibility, and feasibility, and
management) for a recommend improved recommend improved
simple project. requirements requirements
documentation, as a documentation, as a
contributing member of contributing member of a
a requirements team. requirements team.
● Specify software ● Specify software
requirements using requirements using
standard specification standard specification
formats and languages formats and languages
that have been that have been selected
selected for the project for the project and be
and be able to describe able to describe the
the requirements in an requirements in an
understandable way to understandable way to
non-experts such as non-experts such as
end-users, other end-users, other
stakeholders, or stakeholders, or
administrative administrative
managers, as managers, as
contributing members
94
Areas of Certificate Diploma Bachelor
Software
Engineering
incorporates grammar-
based inputs and
concurrency primitives
for a medium size project
and then conduct a
performance analysis to
fine-tune the system, as
a member of a project
team.
Software Testing ● Describe the type of ● Conduct a test utilizing ● Perform an integrative
software testing. appropriate testing test and analysis of
● Identify software tools focused on software components by
testing life cycle from desirable quality using black-box and use
analysis of attributes specified by case techniques in
requirements until the quality control collaboration with the
test closure phase. team and the client. clients.
● Apply the concept of ● Plan and conduct ● Conduct a regressive
software testing to process to design test test of software
measure the usability cases for an components for a client
of the software. organization using that considers
both clear- and black- operational profiles and
box techniques to quality attributes specific
measure quality to an application
metrics in terms of following empirical data
coverage and and the intended
performance. usages.
● Conduct a test utilizing
appropriate testing tools
focused on desirable
quality attributes
specified by the quality
control team and the
client.
● Plan and conduct
process to design test
cases for an
organization using both
clear- and black-box
techniques to measure
quality metrics in terms
of coverage and
performance.
97
Areas of Certificate Diploma Bachelor
Software
Engineering
98
Areas of Certificate Diploma Bachelor
Software
Engineering
99
Areas of Certificate Diploma Bachelor
Software
Engineering
internal design of
subsystems.
● Work effectively with
engineers and
developers from other
disciplines to ensure
effective interaction.
evaluation when
performed on software
execution; develop,
deploy, and implement
approaches to collect
statistical usage and
testing outcome data;
compute and Analyse
statistics on outcome
data.
● Interact with external
entities including clients,
users, and auditing
agencies in conveying
quality goals for
processes and products.
contributing member of a
software project team.
● Develop software that
supports the project’s
quality goals and
adheres to quality
requirements.
Software Safety ● Describe the ● Describe the principal ● Describe the principal
concept of software activities with the activities with the
safety. development of development of software
● Explain the software software systems, systems, which involve
safety processes. which involve safety safety concerns
concerns (activities (activities related to
related to requirements, design,
requirements, design, construction, and
construction, and quality).
quality). ● Create and verify
preliminary hazard lists;
perform hazard and risk
analyses, identify safety
requirements.
● Implement and verify
design solutions, using
safe design and coding
practices, to assure that
the hazards are
mitigated, and the safety
requirements are met.
● Be aware of the
consequences of the
development of unsafe
software, that is, the
negative effect on those
who use or receive
services from the
software
102
Areas of Certificate Diploma Bachelor
Software
Engineering
appropriate methods,
tools, and abilities.
Project ● Explain the principal ● Explain the principal ● Explain the principal
Management elements of project elements of elements of
management. management for a management for a small
small project team. project team.
● Assist in the ● Assist in the managerial
managerial aspects of aspects of a small
a small project team, project team, including
including software software estimation,
estimation, project project planning,
planning, tracking, tracking, staffing,
staffing, resource resource allocation, and
allocation, and risk risk management.
management. ● Develop and implement
plans for the
measurement of
software processes and
work products using
appropriate methods
and tools.
● Work effectively with
other team members in
project management
activities.
Behavioural ● Engage with team ● Engage with team ● Engage with team
Attributes members to members to members to collaborate
collaborate in collaborate in solving a in solving a problem,
solving a problem. problem, effectively effectively applying oral
applying oral and/or and/or written
● Work done towards written communication communication skills.
team effort is skills ● Work done towards
accomplished on team effort is
time; it complies ● Work done towards accomplished on time; it
with the role played team effort is complies with the role
in the team. accomplished on time; played in the team: it
it complies with the uses established quality
role played in the procedures, and it
team: it uses advances the team
established quality effort.
procedures, and it
103
Areas of Certificate Diploma Bachelor
Software
Engineering
104
● DATA SCIENCE
Artificial ● Explain the concept, method and major areas of AI needed in Data Science.
Intelligence ● Represent information in a logical formalism.
● Represent information in a probabilistic formalism.
● Apply relevant reasoning methods.
● Explain methods and strategies for planning and search.
• Describe ethical considerations around AI systems, as well as mechanisms
to mitigate problems.
Big Data ● Describe the knowledge and technology needed to address Big Data
Systems applications.
● Explain theoretical and methodological issues employed in the context of
Big Data.
● Explain the method and approaches used in developing Big Data
applications.
● Instil confidence in dealing with the problems of Big Data.
Computing and ● Describe the basic computer architecture required for Data Science.
Computer ● Explain the different types of operating systems functions and
Fundamentals vulnerabilities.
● Perform the creation, organization, and protection of files.
● Explain network structure and communication.
● Use the web to gather information and build useful applications.
105
Data Mining ● Explain the range of techniques available for mining data as well as the
related algorithms and their suitability.
● Identify the tools and techniques for mining data.
● Apply the tools and techniques in mining data for a well-defined problem.
Data Security
● Describe the purpose of cryptography and list ways it is used in data
communications.
● Explain cryptography concepts, approaches, algorithms and its
limitations/vulnerabilities.
● Analyse threats to real-time applications.
Data Integrity
● Explain the differences of data integrity, data security, and data privacy.
● Describe the main strands of knowledge needed to address data integrity.
● Apply appropriate methods in dealing with security threats to ensure data
integrity.
106
● Write clear and correct code in a programming language that includes
primitive data types, references, variables, expressions, assignments, I/O,
control structures, functions, and recursion.
● Use techniques of decomposition to modularize a program.
● Use standard libraries for a given programming language.
● Write appropriate database queries.
● Identify an appropriate data structures for a given problem.
● Identify appropriate algorithms for a given problem.
● Discuss the importance of time and space complexity on the practical utility
of an algorithm.
● Implement good documentation practices in programming.
*The key competencies of data science are interdisciplinary in nature with a strong focus on mathematics
and statistics.
For any programme that encompasses two programme standards, the HEPs are to refer to the
Body of Knowledge of both the programme standards. In terms of the other components of
standards, the HEPs are to adopt whichever is higher.
The BOK’s mapping must factor in: the HEP’s infrastructure, manpower, the unique selling point
of the HEP, the programme level offered by the quality MQF level, and the mapping of PLO
proposed.
For details cybersecurity knowledge areas can be referred to ACM Cybersecurity curricular.
107
APPENDIX 5
EXAMPLES OF NOMENCLATURES
Programme
Structure / Explanation Example***
Level
Certificate Must be prefixed by IT, IS, SE and CS
disciplines
● Certificate in Information
The programme structure for Certificate Technology
programmes shall not include
specialisation.
108
Bachelor- A double major programme should Double Major (Same Discipline)
Double Major consist of an equal percentage (50%) of • Bachelor in Information System
the body of knowledge from two different and Data Science
disciplines.
Double Major (Different
The conjunction 'and' is used in naming Discipline)
this type of programme where both • Bachelor in Information System
disciplines are mentioned. and Marketing
109
Doctoral Nomenclatures for a general computing With Prefixed
Degree (Without Prefixed) should follows the Must be prefixed by IT, IS, SE, CS
by Research following requirements: and Data Science disciplines. Eg:
- must have a rubric to reflect the • Doctor of Philosophy in
knowledge area of the defined Computer Science
discipline/s.
- the title of research should reflect Without Prefixed
the defined discipline/s. Can be computing as a general
- the supervisors and examiners area. Eg:
must be in the defined discipline/s. • Doctor of Philosophy in
Computing
Notes:
If the percentage of courses offered in the programme structure is less than 25% of the body of
knowledge of the major discipline, it should not be stated in the programme nomenclature.
However, it can be stated in the transcript.
(Refer to the Guidelines on Nomenclature of the Malaysian Higher Education Programme for
further reference).
* Calculation of the percentage of major, specialisation and minor is based on credit hours.
** Discipline refers to the major field of the programme.
*** Example given is for guidance only.
110
GLOSSARY
10. Industrial Training / A period of time within the programme when students
Industrial Attachment are required to be placed in the industry to
experience the real working environment.
111
11. Interview The interview is designed to assess a student’s
academic potential. Decisions are generally based
on the student’s ability to think independently and to
engage with new ideas.
13. Open and Distance Learning The provision of flexible educational opportunities in
(ODL) terms of access and multiple modes of knowledge
acquisition.
15. Programme Educational Broad statements that describe the career and
Objectives professional accomplishments that the programme is
preparing graduates to achieve after they have
graduated.
112
18. Rigorous Internal Assessments This process is to evaluate the suitability of an
applicant for the programme with the purpose that
cover the following criteria:
Demonstration candidates’ academic and personal
development’s experience in the relevant fields for
the required basic skills and acquired knowledge of
the programme.
The aptitude of the candidate suited towards the
provided programme through these recommended
measured tests (list is not limited to): Interview or
formulated assessments for Verbal Reasoning,
Diagrammatic Reasoning, Situational Judgement, E-
tray Exercise, Error Checking, Personality Tests,
Cognitive Ability, Spatial Awareness.
These assessments, can be done via conventional
meet, online (both synchronous, or asynchronous
manner)
For Postgraduate level (Masters and Doctoral
Degree); the Internal Rigorous Assessments, it is
recommended to include as well for research
proposal as a part of this process by the candidate.
The assessment of the proposals would require the
articulation of the proposition or question
underpinning and guiding the academic inquiry with
clear structured argument in support of the
proposition.
19. Summative Assessment The assessment of learning, which summarises the
progress of the learner at a particular time and is
used to assign the learner a course grade.
113
21. Viva Voce An oral examination on a student’s communication
skills and knowledge of relevant facts from their
thesis or dissertation.
114