Key features of PC-based systems: Motherboards, hub chips, processors, RAM and cache.
Basic processor operation: the fetch execute cycle and interrupts.
Principles of operating systems: virtual memory and multitasking.
Case study: the Windows operating system.
Main features of local area networks and the Internet: Ethernet, wireless networks, the Internet Protocol. Introduction to some of the main network devices, such as switches and routers.
The challenges of contemporary data acquisition and analysis have been characterised as “the four V’s of Big Data” (volume, variety, velocity and validity). These require the use of specialised data storage, aggregation and processing techniques. This module introduces a range of tools and techniques necessary for working with data in a variety of formats with a view to developing data driven applications. The module focuses primarily on developing applications using the Python scripting language and associated libraries and will also introduce a range of associated data storage and processing technologies and techniques.
The module covers the following topics:
• Data types and formats: numerical and time series, graph, textual, unstructured,
• Data sources and interfaces: open data, APIs, social media, web-based
• NoSQL databases such as document (MongoDB), graph and key value pair
• Techniques for dealing with large data sets, including Map Reduce
• Developing Data Driven Applications in Python
The Benchmark Statement for Computing specifies the range of skills and knowledge that should be incorporated in computing courses. This module encompasses cognitive skills in Computational Thinking, Modelling and Methods and Tools, Requirements Analysis and practical skills in specification, development and testing and the deployment and use of tools and critical evaluation in addition to providing useful generic skills for employment.
Database architecture and functionality, data analysis and entity-relationship modelling
Normalisation to third normal form
SQL and relational algebra
The role of a Database Administrator (DBA)
Practical exposure to current software tools
Current trends in database technology
Digital Business Environments
Digital business models and revenue models.
Digital business strategy process models and their use.
Online marketplace analysis.
The role of ‘Search’ and ‘Social’ ecosystems in the online environment.
Assessment of e-Procurement and digital supply chains.
Mobile platforms and location-based services.
Design approaches for online channels and touchpoints.
Privacy and trust issues.
Legal and regulatory frameworks for digital business.
Enterprise Information Systems with SAP
The aim of this module is to develop a deep understanding of enterprise information systems and their role in business processes. It includes
• Evaluation of the impact that Enterprise Information Systems can have within organisation business processes
• As an assessment of the impact that they have on the efficiency and effectiveness of organisations and supply chains
• Fundamentals of business intelligence, such as data warehousing and data mining
The module uses SAP R/3 to give students an appreciation of the nature of large scale integrated information systems, and to consider aspects of their use and characteristics. It also provides an opportunity to practise data analytical techniques.
Information Systems Engineering
Approach: Lectures will present both theory and practical examples. Tutorial exercises will support the development of modelling skills and practical, computer-based sessions will develop both modelling and development skills
Project overview, life cycles and methodologies, with emphasis on Agile Application Development Requirements elicitation, modelling and specification, including functional and non-functional requirements, and using techniques such as CRC modelling, and functionality prioritisation technique
The Unified Modelling Language (UML), such as Use Case Modelling, Activity Diagrams, Object Modelling, Class Diagrams, Sequence Diagrams, State Charts,
Test Driven Design and Development
Security by Design, and Misuse case Modelling Issues of Computer Ethics, Professionalism, and Legislation relating to Information Systems Development
Developing and assessing simple applications using system construction tools such as Visual Studio C# .Net
Management of Software Projects
Managing project start-up through project requirements evaluation and project planning techniques.
Comparing and contrasting big up front and appropriate design approaches
Comparative analysis of software project management approaches and Bodies of Knowledge (BoK) applied to software development projects
The assessment of project risk management approaches and metrics for project monitoring and control within an agile project management approach.
Analysis of software development process improvement approaches through Agile software standards and maturity models
Evaluation of software development teams and group dynamics as key factors in the successful delivery of projects
Utilisation of a tailored project management methodology such as Scrum or XP to manage the delivery of an assessment instrument
The work for this module comprises the completion of an individual research project. Each student is assigned a personal Supervisor, and an Internal Examiner who monitors progress and feedback, inputs advice, examines the dissertation and takes the lead at the viva.
There are three preliminary deliverables prior to the submission of the final dissertation:
(1) Project proposal
(2) Initial Report including time plan and dissertation outline
Security Audit & Compliance
The aim of the module is to let you develop a deep understanding of the framework that information security operates in, and to give you an opportunity to express this in the form of professional written reports. Topics covered include:
• Overview of relevant laws and regulations: national and international, covering Data Protection, computer misuse and other legal issues.
• The relation between governance models and frameworks including: ISACA’s COBIT and ISO Standards (ISO27000 in particular)
• Role of the professions; difference between audit, forensics and security management. Professional ethics and codes of practice
• Risk management, contingency and continuity planning
• Understanding and application of the COBIT domains
Strategic Information Systems Management
Evolving role of strategic IS/IT systems; Management of strategic IS/IT systems; Processes for developing effective IS/IT strategies; Alignment of IS/IT strategies with business strategies; Innovating with IS/IT systems; Strategic IS/IT systems for competitive advantage; Tools & techniques for building IS/IT strategic capabilities; Evaluating & justifying IS/IT systems; Managing a portfolio of IS/IT applications. Positioning & managing strategic IS/IT systems.