CICT Syllabus July 2018
CICT Syllabus July 2018
o.
.c
pi
ho
.c
w
w
Certified Information Communication
Technologists w
(CICT)
Examination Syllabus
PART I
Section 1
Paper No. 1 Introduction to Computing 1
Paper No. 2 Computer Applications - Practical 4
Paper No. 3 Entrepreneurship and Communication 7
Section 2
Paper No. 4 Operating Systems - Practical 10
Paper No. 5 Principles of Accounting 13
Paper No. 6 Computer Support and Maintenance 16
PART II
Section 3
Paper No. 7 Database systems 19
ke
Paper No. 8 Systems Analysis and Design 22
o.
.c
Paper No. 9 Structured Programming 24
pi
ho
Section 4
.c
w
w
Paper No. 10 Object Oriented Programming 26
Paper No. 11 Web Design and e-Commerce
w 29
Paper No. 12 Data Communication and Computer Networks - Practical 32
PART III
Section 5
Paper No. 13 Strategy, Governance and Ethics 35
Paper No. 14 Software Engineering 38
Paper No. 15 Mobile Application Development 41
Section 6
Paper No. 16 Systems Security 43
Paper No. 17 Information Systems Project Management 45
Paper No. 18 Research Methods 48
ICT Project 50
PART I
SECTION 1
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to apply computing skills in an organisation.
CONTENT
1.1 Introduction to information communication technology (ICT)
- Components of a computer system
- Classification of computers
- Evolution of computers
- Computer peripherals and interfaces
- Application areas of computer systems
- Impact of ICT in society
- Careers in ICT
ke
o.
.c
1.2 Computer hardware
pi
- Input devices
ho
- Processing devices
.c
w
- Memory
w
w
- Storage devices
- Output devices
- Communication devices
- Selection of computer hardware
ke
- Data input, output and control
o.
- File organisation and access
.c
pi
- Data collection methods
ho
- Data capture methods
.c
- Methods of data processing
w
w
- Data processing systems
w
- Data processing modes
- Data hierarchy
- Data security
ke
o.
.c
pi
ho
.c
w
w
w
ke
- Keyboard ergonomics
o.
.c
- Touch screen
pi
- Adding / removing printer
ho
- Setting up default printer
.c
w
- Projectors
w
w
2.3 Word processing software
- Using features of a word processor window
- Creating and retrieving existing documents
- Setting page setup features
- Using toolbars
- Formatting and editing text
- Manipulating a document using shortcut keys
- Creating and formatting tables
- Creating and formatting images and drawing
- Inserting and editing headers and footers
- Inserting footnote, endnotes, citation and bibliography
- Proofreading tools
- Using mail merge tool
- Tracking changes and comments
- Converting documents
- Linking and embedding
- Creating table of content, list of figures and list of tables
- Saving a document
- Using templates
- Automating simple tasks
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-4-
- Printing a document
2.4 Spreadsheet software
- Using features of a spreadsheet window
- Creating , saving and retrieving existing workbook
- Cell editing and navigation
- Freezing and unfreezing pane
- Formatting worksheets
- Manipulating data using different cell referencing methods
- Using formulae and functions
- Sorting, filtering and data validation
- Analysing data using “what if” analysis
- Inserting charts and graphs including pivot tables
- Summarising, consolidating and outlining data
- Automating simple tasks
- Protecting and sharing workbooks
- Printing worksheets
ke
- Reviewing presentation
o.
- Saving, copying and deleting slides
.c
pi
- Presentation views
ho
- Automating simple tasks
.c
- Printing handouts and slides
w
w
w
2.6 Database software
- Overview of databases
- Using features of a database window
- Creating, saving and retrieving existing database
- Identifying tables, fields, data types and records
- Establishing relationships between tables
- Creating forms and queries
- Manipulating data
- Searching data
- Sorting and filtering
- Adding charts, diagrams, tables and attachments
- Securing a database
- Automating simple tasks
- Configuring database start up options
- Printing from a database
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper intends to equip the candidate with knowledge, skills and attitudes that will enable
him/her to apply entrepreneurship knowledge in business and other environments.
CONTENT
3.1 Entrepreneurial mindset
- Definition of entrepreneurship
- Historical development of entrepreneurship
- Characteristics of entrepreneurs
- Types of entrepreneurs
- Distinction between entrepreneurs and small business owners
- Approaches to entrepreneurship
- Importance of entrepreneurs to development
ke
o.
- Qualities of entrepreneurial firms
.c
- Social enterprises and sustainability
pi
ho
- Entrepreneurial ethics, responsibility and leadership
.c
- Case study on corporate entrepreneurship
w
w
w
3.3 Opportunity identification and development
- Methods of generating ideas
- Sources of innovative ideas
- Qualities of viable business opportunities
- Evaluating business opportunities
- Challenges of starting new ventures
- Why new ventures fail
- Business incubation
- Role of government in promoting entrepreneurship
ke
o.
.c
3.8 Written communication
pi
- Rules of effective writing
ho
- Business correspondence
.c
w
- Reports
w
- Memorandum
w
- Proposal writing
- Forms and questionnaire design
- Circulars and newsletters
- Notices and advertisements
- Publicity materials
- Press releases
- Graphic communication
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to administer operating systems.
CONTENT
4.1 Introduction to operating systems
- Definition of an operating system
- History of operating systems
- Types of operating systems
- User Interfaces
- Functions of operating systems
- System calls
ke
- Operating system structures
o.
.c
- Selecting an operating system
pi
ho
4.2 Installing an operating system
.c
w
- Installation procedure
w
Pre installation tasks
w
Installation tasks
Installation methods
Installation process
- Uninstalling operating systems
- Reinstalling operating systems
- Upgrading operating systems
- Multibooting
- Troubleshooting operating systems
4.4 Deadlocks
- Resources
- Introduction to deadlocks
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-10-
- The Ostrich algorithm
- Deadlock detection and recovery
- Deadlock avoidance
- Deadlock prevention
4.5 Workgroups and domains
- Overview of workgroups and domains
- Workgroups
- Joining a workgroup
- Domains
- Joining a domain
- Creating user accounts
4.6 Using management console and scheduler
- Overview of management consoles
- Snap-ins
- Using consoles
- Using schedulers
4.7 Control panel
- Overview of control panels
- Accessing control panel items
- Changing the settings of the control panel items
4.8 Configuring hardware settings
- Viewing hardware profiles
- Creating or modifying hardware profiles
- Activating and deactivating hardware profiles
- Plug and play hardware
ke
- Add/remove hardware
o.
- Troubleshooting hardware
.c
pi
ho
4.9 Configuring the display
.c
- Setting display properties
w
w
- Setting multiple display
w
- Using multiple display
- Troubleshooting
4.10 Configuring operating system settings
- Performance option
- Environment variables
- Start up and recovery settings
- Error reporting
- Updates
- Troubleshooting operating systems
4.11 Using registry
- Accessing the registry
- Structure of the registry
- Using the registry editor
4.12 Disk management
- Installing a hard disk
- Formatting a hard disk
- Setting up hard drives
- Analysing hard disks
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-11-
- Defragmenting hard disks
- Partitioning a hard disk
- Working with different volume types
- Upgrading a hard disk
- Managing disks on a remote computer
- Managing disk quarters
4.13 File systems management
- Overview of file systems
- Creating files and directories
- Mounting drives on different file systems
- Sharing files and folders
- Securing files and folders
- Securing resources using NTFS permissions
4.14 Emerging issues and trends
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with knowledge, skills and attitudes that will
enable him/her to prepare and interpret financial statements for different entities.
CONTENT
5.1 Introduction to Accounting
- The nature and purpose of accounting
- Users of accounting information and their respective needs
- Accounting Standards and their purposes
- Regulatory framework (ICPAK, IASB, IAESB, IPSASB)
- Professional ethics
- Principles; concepts and conventions underlying the preparation of accounting
statements
ke
5.2 Accounting procedures and techniques
o.
- Double entry book-keeping
.c
- The cash book; two and three column including cash journal
pi
ho
- The ledger and their role in recording and summarising, classifying accounting
.c
data
w
- Books of original entry
w
w
- Petty cash book
- Balancing accounts and preparing the trial balance
- Introduction to simple statements of financial performance
- Statements of financial position
ke
- Share capital and reserve
o.
- Issue of shares at par; premium; discount
.c
- Over and under subscriptions
pi
ho
- Allotment and calls on shares, forfeiture of shares
.c
- Preparation of statements of financial performance and appropriation
w
w
account and the statement of financial position
w
- Published accounts: Components of a complete set of published financial
statements only
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her support and maintain computers.
CONTENT
6.1 Introduction to computer support and maintenance
- Computer electronic components
- The physics of electronics
- The use of maintenance tools and equipment
- Standard operating and maintenance procedures
- Safety precautions
ke
6.2 Power supply
o.
.c
- Overview of power supply
pi
- Power supply protection devices
ho
-
.c
Power supply sources
w
- Power supply protection devices
w
w
- Using power supply devices
- Power supply problems and trouble shooting
6.3 Motherboards
- Computer cases
- Types of motherboards
- Motherboard components
- Installing Motherboard
- Using expansion slots and connectors
6.4 Microprocessors
- Microprocessor overview
- Types of processors
- Processor modes
- Selecting and upgrading a processor
6.5 Memory
- Memory characteristics
- Memory types and packages
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-16-
- Memory mapping
- BIOS Set up
- Selecting and upgrading memory
ke
- Printers
o.
- Upgrading computers
.c
pi
- Electronic waste management
ho
.c
w
6.9 Hardware and software installation
w
- Installation concepts
w
- Installing hardware components
- Installing peripheral devices
- Installing operating systems
- Installing application programs
- Installing utility software
- Upgrading utility software
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes
that will enable him/her to design, develop, administer and manage databases.
CONTENT
7.1 Introduction to databases
- Overview of records, files and databases
- History of database systems
- Traditional file systems versus the database approach
- Characteristics, importance and limitations of database systems
ke
- Database components and architecture
o.
.c
pi
7.2 File organisation techniques
ho
- Storage structures and blocking
.c
w
- Structured and unstructured data
w
w
- Unordered files
- Sequential files
- Indexing
ke
o.
7.8 Database administration
.c
pi
- Overview of database administration
ho
- Types of database users
.c
w
- Functions and roles of database administrators
w
w
- Monitoring database performance
- Database tuning
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her analyse and design information systems.
CONTENT
8.1 Introduction to systems analysis and design
- Elements of information systems
- Systems theory
- Types of information systems
- Personnel involved in systems analysis and design
- Systems analysis and design concepts
ke
- Soft systems methodology
o.
- Applications of soft and hard systems
.c
pi
ho
8.3 Systems development life cycle (SDLC)
.c
- Definition of systems development life cycle
w
w
- Phases of SDLC
w
- Advantages and disadvantages of SDLC
ke
- Security requirements, precautions and procedures in SAD
o.
- System maintenance
.c
pi
- Integration problems
ho
.c
8.11 Emerging issues and trends
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to apply structured programming to develop programs.
CONTENT
9.1 Introduction to structured programming
- Overview of programming
- Types of programming languages
- Generations of programming languages
- Programming approaches
- Program translators
- Basic concepts of structured programming
- Problem definition, structure and design
- Integrated development environment (IDE)
ke
- Identifiers
o.
.c
- Namespaces
pi
- Comments
ho
- Program formatting
.c
w
- Pre-processor directives
w
w
- Expressions and operators
- Control structures
- Writing simple programs
- Testing and debugging
9.3 Functions/sub-programs
- Functions versus procedures
- Function declaration
- Function definition
- Recursion
- Function calls
- Arguments and parameters
- Parameter passing
- Writing and running a program using functions
9.7 Documentation
- Developing user manuals
- Developing technical manuals
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to develop object oriented programs using Java.
CONTENT
10.1 An overview of programming techniques and paradigms
- Introduction to object oriented programming
- Strengths of object oriented programming over other paradigms
ke
- Methods and messages
o.
.c
- Abstract data types
pi
- Classes
ho
- Objects
.c
w
- Class relationships
w
w
- Encapsulation
- Abstraction
- Inheritance
- Polymorphism
- Interfaces
10.4 Functions/methods
- Function declaration
- Function prototype and type checking
- Arguments and parameters
- Inline functions
- Function overloading
- Pure virtual functions
- Reference and argument passing
- Writing programs using functions
ke
- Inheritance for modelling and reuse
o.
.c
- Class derivation
pi
- Access control
ho
- Base class initialisation
.c
w
- Composition
w
- Initialising class type members
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to develop a web application and implement e-commerce.
CONTENT
11.1 Introduction to web application development
- Web application development concepts
- Web application design principles
- Overview of web application development languages
- Introduction to mark-up language
- Phases of web application development process
- Mobile web applications
ke
11.2 HTML
o.
- Basic structure of HTML
.c
- Basic tags and corresponding attributes
pi
ho
- HTML elements
.c
- HTML coding
w
Text
w
w
Links
Lists
Images
Tables
Forms
Frames
URLs
ke
o.
.c
11.7 Scripting
pi
- Overview of script development
ho
- Scripting languages
.c
w
- Overview of client side and server side scripting
w
w
- Incorporating script into HTML
- Basic command syntax/blocks
- Functions and objects
- Built in objects and functions
- Looping
- Frames, documents and windows
- Events and cookies
- Page redirect and page printing
- Void keyword
- Database connectivity
ke
o.
11.13 Electronic transactions law
.c
pi
- Internet applications
ho
- e-commerce and e-marketing approach
.c
- Digital technology
w
w
- e-contracts
w
- e-signatures
- Electronic records
- Electronic data
- Electronic messages
- Third parties
- Data protection laws
11.14 Cloud computing
- Overview of cloud computing
- Cloud computing models
- Cloud computing security
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
- Business Process as a Service (BPaaS)
- Enterprise cloud based high performance computing (HPC) application
- Implementing cloud based solutions
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to set up, configure and maintain computer networks.
CONTENT
12.1 Data communication concepts
- Overview of data communication concepts
- Data terminology
- Data transmission technologies
- OSI (open system interconnection) models and layer protocols
- TCI/IP model and layer protocols
- Types of networks
- Network topologies
- Roles of network personnel
ke
o.
.c
12.2 Networking components
pi
ho
- Hardware
.c
- Software
w
w
- Bounded media
w
- Server/clients
- Wireless media
ke
o.
.c
12.8 Implementing security and audit policies
pi
- Setting up security controls
ho
- Configuring password policy
.c
w
- Configuring account lock out policy
w
- Planning for audit policy
w
- Using audit policy
- Using event viewer
- Auditing access to files and folders
- Auditing access to printers and other network resources
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with knowledge, skills and attitudes that will
enable him/her to formulate and implement strategies and demonstrate good governance and
ethical practices.
CONTENT
13.1 Overview of management
- Importance of management
- Principles of management
- Management as a science, an art or a profession
- Functions and roles of management
- Levels of management and managerial skills
- Management and administration
- Overview of management functions
ke
o.
13.2 Development of management thought
.c
pi
- Pre-industrial revolution management theories
ho
- Classical theories, neo-classical theories
.c
- Contemporary theories
w
w
w
13.3 Overview of corporate strategy, governance and ethics
- Meaning of strategy, management and strategic management
- Scope of strategic management
- Levels of strategic management
- Benefits of strategic management
- Limitations of strategic management
- Meaning of Governance and Ethics
- Importance of Governance and Ethics
- Principles of good governance
- Overview of theories in governance and ethics
ke
- Board performance evaluation
o.
.c
- Board remuneration
pi
- Term limits for non-executive Board members
ho
- Succession planning
.c
w
- Liability and insurance indemnity
w
- Appointment of the Chief Executive Officer
w
- Appointment of the Certified Secretary
- Separation of roles
- Role of the board in performance management
- Role of the Board in stakeholders management
ke
o.
.c
13.11 Case studies in strategy, governance and ethics
pi
ho
13.12 Emerging issues and trends
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to implement and manage the software engineering process.
CONTENT
14.1 Introduction to software engineering
- Overview of software engineering
- Software engineering concepts
- Software development life cycle (SDLC)
- Legal aspects in software process models
ke
- Evolutionary models
o.
- Component based models
.c
pi
- Other models
ho
.c
14.3 Software requirements analysis
w
w
- Overview of requirements concepts
w
- Requirement analysis process
- Stakeholders analysis
- Need for requirement gathering techniques
- Gap analysis
- Prioritization of requirements
- Requirements specification
ke
- Control and assurance
o.
- Software quality factors and metrics
.c
pi
- Formal technical reviews
ho
- Verification and validation
.c
- Cost of quality
w
w
w
14.9 Software acquisition methods
- Software outsourcing
- Open-source software engineering and customisation
- In- house development
- Commercial off the- shelf software (COTS)
- Factors to consider in software acquisition
14.10 Budgeting for information systems
- Financial cost benefit analysis
- Business case approach
- Total cost of ownership
- Balance score card
- Activity based costing and expected value
- Tracking and allocations costs
14.11 Documentation and commissioning
- Objectives of systems documentation
- Use of systems documentation
- Qualities of a good documentation
- Types of documentation
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to develop and deploy mobile applications
CONTENT
15.1 Mobile devices and applications
- Overview of mobile computing
- Types of mobile devices
- Uses of mobile devices
- Overview of mobile applications
- Mobile browsers
ke
- Overview of mobile database management systems
o.
.c
pi
15.3 Mobile platforms and architectures
ho
.c
- Internet protocols for mobile applications
w
- Mobile application distribution platforms and environments
w
w
- Mobile application development architectures
- Styles of mobile architecture
ke
o.
.c
pi
ho
.c
w
w
w
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to secure ICT systems.
16.0 LEARNING OUTCOMES
A candidate who passes this paper should be able to:
Identify types of threats to ICT systems
Adopt different security mechanisms
Prepare business continuity planning (BCP) strategies
Develop and implement a systems security policy
Undertake basic computer forensic audits
Demonstrate social-ethical and professional values in computing.
CONTENT
16.1 Introduction to systems security
- Overview of systems security
- Principles of system security
- Classifications of systems security
- Security core concepts
- Security mechanisms
16.2 Security threats and controls
- Sources of threats
- Types of threats
- Crimes against ICT and computer criminals
ke
- Controlling security threats
o.
.c
- Ethical hacking
pi
ho
16.3 Systems security errors
.c
- Overview of system security errors
w
w
- Human errors
w
- Procedural errors
- Software errors
- Electromechanical problems
- Dirty data
16.4 Systems security measures
- Physical security
- Logical security(authentication, access rights, passwords, others)
16.5 Data and software security
- Overview of data and software security
- Data and software security precautions
- Vulnerability assessment
- Employing virus security precautions
16.6 Network security
- Overview of network security
- Duplicate and alternate routing
- Network intrusion, detection and prevention
- Secure socket layer and transport layer security
- IPv4 and IPv6 security
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-43-
- Wireless network security
- Mobile device security
- Wireless protected access
ke
- System security policy implementation
o.
.c
- Systems security strategies
pi
- Systems audit
ho
.c
16.11 Introduction to computer forensics
w
w
- Computer forensics concepts
w
- Incidence handling
- Investigating desktop incidents
- Investigating network incidents
- Securing and preserving evidence
16.12 Professional values and ethics in computing
- Intellectual property and fraud
- Information systems ethical and social concerns
- Telecommuting and ethical issues of the worker
- Codes of ethics for IT professionals
- Professional ethics and values on the web and Internet
- Objectivity and integrity in computing
- The role of professional societies in enforcing professional standards in
computing
- Vetting of ICT employees
16.13 Emerging issues and trends
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to manage information systems projects.
17.0 LEARNING OUTCOMES
A candidate who passes this paper should be able to:
Manage project scope using various techniques
Use information systems project management software
Initiate, develop and manage information systems projects
Identify, monitor and control project risks
Prepare project schedules using project management software tools
Manage information systems project procurement process
CONTENT
17.1 Introduction to information systems project
- Overview of a project
- Characteristics of project
- Examples of information systems projects
- Project management principles
- Purpose of project management
- Information systems project environment
- Project personnel roles and responsibilities
17.2 Information systems project lifecycle
- Project identification and selection
- Project planning
ke
- Feasibility study
o.
.c
- Project objectives
pi
ho
- Project proposal
.c
- Project design
w
- Project development
w
w
- Project implementation
- Project monitoring and control
- Project review and evaluation
17.3 Project scope management
- Scope definition
- Scope verification
- Scope control
- Constraints and assumptions
- Using software tools to assist in project scope management
17.4 Project planning and scheduling
- Overview of project planning and scheduling
- Features of a good project plan
- Work breakdown structures
- Determining project tasks
- Schedule milestones
- Establishing task dependencies and relationships
- Materials and equipment management
- Tools and techniques for project planning and scheduling
- Using software tools to assist in project planning and scheduling
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-45-
17.5 IS project estimation
- Concepts of information systems project estimation
- Problems of overestimation and underestimation
- Basis for information systems project estimation
- Tools and techniques for project estimation
- Using software tools to assist in project estimation
17.6 IS project resource management
- Overview of information systems project resources
- Resource planning
- Resource allocation framework
- Information resource portfolio management
- Resource schedules
- Cost management
- Materials and equipment management
- Using software tools to assist in resource management
17.7 IS project organisational structures
- Overview of organisational structures
- Integrating project work and project organisational structures
- Project team lifecycle
- Team management
- Using software tools to assist in project organisation
17.8 IS project quality management
- Overview of IS project quality management
- Project quality factors
- Quality planning, assurance and control
- Tools and techniques for quality control
ke
- Overview of project management standards (PRINCE 2)
o.
.c
- ISO certification
pi
- Using software tools to assist in quality management
ho
.c
w
17.9 IS project communication management
w
- Overview of communication management
w
- Establishing effective project communication
- Progress reporting
- Report writing
- Managing communication with stakeholders
- Using software tools to assist in project communication management
17.10 IS project risk management
- Common sources of risk
- Risk identification process
- Risk management tools and techniques
- Risk analysis
- Risk monitoring and control
- Using software tools in risk management
17.11 IS project procurement management
- Overview of procurement planning process, tools and methods
- Requesting for proposal and quotations
- Evaluation of proposals and quotations
- Contracting and contract administration
- Using software tools in project procurement management
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-46-
17.12 IS project implementation, completion and evaluation
- Project evaluation
- Team evaluation
- Project documentation
- Change management
- Using software tools to assist in project evaluation
17.13 Emerging issues and trends
ke
o.
.c
pi
ho
.c
w
w
w
GENERAL OBJECTIVE
This paper is intended to equip the candidate with the knowledge, skills and attitudes that will
enable him/her to design and carry out research on information systems.
ke
18.2 The research problem
o.
.c
- Problem identification
pi
- Salient features of a good problem statement
ho
- Background and context of the problem
.c
w
- Problem statement
w
w
- Research objectives: General and specific objectives
- Research questions
- Research hypothesis/formulation of hypothesis
- Development of theoretical/conceptual framework
18.3 Literature review
- Meaning and importance of literature review
- Theoretical review and empirical review
- Critical review of major issues
- Theoretical and conceptual framework
18.4 Research methodology
- Target population
- Sampling techniques and sample size
- Data collection
- Data collection method
- Reliability and validity of data
18.5 Analysis and presentation of findings
- Analysis of findings
- Presentation of findings
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-48-
- Testing of hypothesis
- Summary, conclusions and recommendations
ke
o.
.c
pi
ho
.c
w
w
w
The ICT Project will be undertaken by a candidate after completing Paper Nos. 1 to 18 of the
CICT examination.
GENERAL OBJECTIVE
To prepare a candidate to apply research, analytical and practical skills in solving real life
information systems problems, using ICT tools and technologies.
CONTENT
19.1 Project proposal
- Overview of project proposals
- Identification and statement of a real life ICT problem
- Investigation of the problem, stakeholder, system and user requirements
- Analysis of project feasibility and scope
- Statement of problem and project objectives
- Overview of the literature and possible solutions
ke
- Selection of project implementation methodologies and techniques
o.
.c
- Project resource scheduling (budget, schedule, Gantt chart)
pi
ho
19.2 Project and system analysis
.c
w
- Limitations of the existing system
w
- Potential user requirements
w
- Project and software inputs, processes and outputs
- Functional and non-functional requirements
- Analysis of user classes and characteristics
- Analysis of system features
- Project and system objectives
- Project and system constraints
- Assumptions and dependencies
- Writing the analysis report
19.3 System design
- Establishing conventions and rules for naming system objects
- Input, process and output design
- Developing the conceptual model
- Input content, format and validation
- Normalisation and design of the database schema
- Data validation strategy
- Module design
- User interface design
- Security and backup design
- Test design
Certified Information Communication Technologists (CICT) Examination Syllabus – July 2018
-50-
19.4 System development
- Establishing the development approach and environment
- Demonstration and description of program functional requirements
- Demonstration and description of program non-functional requirements
- Coding and code documentation
ke
- Appendices
o.
.c
Input documents
pi
Administrative documents (terms of reference, permissions,
ho
questionnaires, etc.)
.c
w
System installation and maintenance manual
w
User manual
w
Annotated program listings
Test runs, annotated and cross-referenced test plan
Note: Candidates are advised to obtain the “ICT Project Guidelines” from the offices
of kasneb or download the guidelines from the kasneb website
(www.kasneb.or.ke)