• No results found

OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS

N/A
N/A
Protected

Academic year: 2021

Share "OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

IT Architecture and Networking

IS-3040-001

Spring 2015

Office

:

523 Lindner Hall

Telephone

:

513-556-7058

E-mail

:

Robert.Rokey@uc.edu

Office Hours

:

by appointment.

TEXT:

Englander, Irv. The Architecture of Computer Hardware and Systems

Software, & Networking, (4th ed.) John Wiley, New York, 2009

ISBN 978-0-471-71542-9

COURSE DESCRIPTION:

This course introduces some building blocks of IS/IT Architecture – hardware, software, data formats and communication channels – and their role in an information system. The course is designed as a technical introduction to the inner workings of modern computer systems. The structure and interaction of hardware, data and communication channels in an information system is used to form an understanding of the architecture of information systems.

PEDAGOGICAL APPROACH:

The class will be a combination of lectures and class

discussions. Your participation is not only requested but is necessary to provide effective class sessions. There is no such thing as a silly question, I encourage all

(2)

GRADING POLICY:

Students will be evaluated on the following basis:

Participation  

10%  

Homework  

20%  

Team  Project  

25%  

Midterm  

20%  

Final  Exam  

25%  

The grading scale is as Follows:

94%-­‐100%   A  

90%-­‐93.9%   A-­‐  

86%-­‐89.9%   B+  

83%-­‐85.9%   B    

80%-­‐82.9%   B-­‐  

76%-­‐79.9%   C+  

73%-­‐75.9%   C  

70%-­‐72.9%   C-­‐  

66%-­‐69.9%   D+  

63%-­‐65.9%   D  

60%-­‐62.9%   D-­‐  

under  60%   F  

(3)

Grade Revisions:

If you think an error has been made in computing your homework or exam grade, you should appeal the grade within one week after the work has been returned to you. Each week you should check the grade sheets posted on the Blackboard to see that your grades have been recorded correctly.

Missed Exam: Should you not take an exam, no makeup exam

will be given; a grade of zero will be recorded unless there is an academically valid reason for missing the exam.

Incomplete Grade Policy: An "I" grade will be awarded only

for truly exceptional circumstances that occur after the University deadline for dropping the course has passed.

ATTENDANCE POLICY:

You are expected to attend class. If you miss a class, you still will be responsible for all the announcements made and all the material covered in that class. Graded

assignments will be returned in class; however, I will bring them to class just once. After that time, you may pick up graded assignments from 523 Lindner during office hours.

CLASSROOM ETIQUETTE:

Please turn off all cell phones, pagers and other noise generating devices. If you use a laptop/PDA/tablet PC, do not use it for any other purpose in class other than to take notes.

ASSIGNMENTS:

Will be due at the beginning class on the day due.

Assignments turned in up to 24 hours late lose 20% of the total points. Assignments turned in 24 to 48 hours late lose 40% of the total points. Assignments will not be

accepted after they are 48 hours late. All days, Saturdays, Sundays, holidays count as part of late hours! There will be additional assignments for the graduate students in the class.

(4)

PLAGIARISM/CHEATING POLICY:

As with all Lindner College of Business efforts, this course will uphold the highest ethical standards, critical to building character (the C in PACE). Ensuing your

integrity is vital and your responsibility. LCB instructors are required to report ANY incident of academic misconduct (e.g., cheating, plagiarism) to the college review process, which could result in severe consequences, including

potential dismissal from the college. For further

information on Academic Misconduct or related university policies and procedures, please see the UC Code of Conduct (http://www.uc.edu/conduct/Code_of_Conduct.html).

You must do your own work in this course. Plagiarism includes, but is not limited to, copying or using someone else’s work or planning document. If you make use of another’s work, your instructor will assume that both parties have knowledge of the act.

UNAUTHORIZED USE OR ABUSE OF COMPUTER ACCOUNTS;

Use of computer: You may use any computer facilities to which you have valid access. Microcomputer labs are located in 209 Lindner and 211 Lindner.

Abuse of Privileges: You and only you are authorized to use the account assigned to you. You may not use, copy, or tamper with the programs or data files of others on the network. Unauthorized use or abuse of computer accounts, programs, or data files will be dealt with severely; both criminal and administrative penalties may be applied. Administrative penalties may include failing the course expulsion from school, and/or losing the privilege of using the College or University computing facilities.

(5)

Tentative Class Schedule

Topics and pace may vary depending on class needs

WEEK   TOPIC      

READING  

ASSIGNMENTS  

1.   Introduction to 3040 Introduction to systems architecture concepts Chapt. 1 2. Number systems and data representation

Little Man Computer Chapts. 2-5 Chapt. 6

3.

Fundamental CPU design, instruction cycles and bus and memory concepts

Modern CPU design, CISC/RISC, paging

Chapt. 7 Chapt. 8

4.   I/O, interrupts, and DMA Chapt. 9

5. Computer Peripherals Chapt. 10 Project

proposal due 6. Systems concepts, multiprocessing, clusters Chapt. 11 7.   Review

Midterm

8. Networking and data communications Protocols

Communication Fundamentals

Chapt. 12 Chapt. 13 Chapt. 14 9.   Introduction to Operating Systems Chapt. 15 10.   Spring Break

11. User Interfaces Interface Chapt. 16

12. Process concepts; scheduling, memory management File Management Programming Tools

Chapt. 17 Chapt. 18 13. Examples of Operating Systems

14. Presentations 15. Presentatins

Review

References

Related documents

The course also covers software and hardware components, information structures, basic business organization and processes, information system security, and

hardware, software, and networking architecture and for planning for systems growth and change. 

The present study explores if and how parents and other adult family members communicate with young people (in and out-of-school) about SRH (pubertal development, sexu- ally

Everything is included, stunning furniture, office storage, modern telephone systems, internet, all your services, business rates, even your drinks stations with instant hot water

Our as-fabricated 3D RGO/Alg scaffolds showed enhanced ADSC support and osteogenic differentiation compared to 2D RGO substrates, as proof-of-concept for bone-engineering and

Accreditations around information security are a key indicator of a data center provider’s security management procedures; organizations should seek providers that can

The IBX Cloud-based solution was implemented easily by Capgemini without SEB’s direct involvement, allowing their procurement department to focus on improving the content of their

In summary, we have reported the cases of two Portuguese patients with IAS who had different HLA- DR4 subtypes and insulin autoantibodies: DRB1*0406 and a polyclonal antibody in