The document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists 140 credits that must be completed, including 30 credits of general education courses and 104 credits of major requirements. The major requirements include introductory programming and calculus courses, as well as more advanced courses in algorithms, data structures, operating systems, databases, and software engineering.
The document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists 138 required credit hours, including core courses in mathematics, science, and 30 credit hours of computer science courses. It also lists 6 credit hours of free electives and requires a total of 138 credit hours to complete the degree.
The document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists 137 required credit hours, including core courses in mathematics, science, computer science, and general education. Major requirements include courses in calculus, linear algebra, data structures, algorithms, operating systems, databases, and software engineering. The curriculum is divided into two levels, with 101 credits required for level one and 31 credits for level two, which includes more advanced computer science courses.
This document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists the required courses in three categories: general education requirements, core computer science requirements, and technical electives. The general education courses include subjects like English, math, chemistry and physics. The core computer science courses cover topics such as programming, algorithms, operating systems, and databases. Students must also complete six credit hours of technical electives in addition to the other requirements.
This document outlines the course requirements for a Bachelor of Science in Computer Science. It lists 137 required courses totaling 30 credit hours for the core requirements and 101 additional credit hours of major requirements. The major requirements are grouped into categories including mathematics, basic sciences, and computer science courses.
Army ammunition data_sheets_for_rocketsAditya Tulus
This document is a technical manual that provides data sheets for rockets, rocket systems, rocket fuzes, and rocket motors used by the US Army. It includes illustrations and descriptions of the items as well as their characteristics, dimensions, performance specifications, and logistics information. The manual covers both ground-based and aircraft-mounted rockets and their components.
El documento resume la influencia de la mitología griega en la literatura y el cine. Explica que autores como Homero, Hesíodo y Ovidio se inspiraron en los mitos antiguos para sus obras literarias. También señala que películas modernas como Percy Jackson y el Ladrón del Rayo y Hércules toman historias y personajes de la mitología griega como base para sus argumentos fílmicos. La mitología sigue siendo una fuente de inspiración para diferentes formas artísticas a través de los años.
Uma princesa vai viver com uma serpente num palácio para salvar o pai da morte. Ela cuida da serpente e eles tornam-se amigos. Quando a princesa chora sobre o peito da serpente, esta transforma-se num príncipe, revelando que era vítima de um encanto de uma bruxa. O príncipe pede a princesa em casamento.
The document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists 138 required credit hours, including core courses in mathematics, science, and 30 credit hours of computer science courses. It also lists 6 credit hours of free electives and requires a total of 138 credit hours to complete the degree.
The document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists 137 required credit hours, including core courses in mathematics, science, computer science, and general education. Major requirements include courses in calculus, linear algebra, data structures, algorithms, operating systems, databases, and software engineering. The curriculum is divided into two levels, with 101 credits required for level one and 31 credits for level two, which includes more advanced computer science courses.
This document outlines the curriculum requirements for a Bachelor of Science in Computer Science. It lists the required courses in three categories: general education requirements, core computer science requirements, and technical electives. The general education courses include subjects like English, math, chemistry and physics. The core computer science courses cover topics such as programming, algorithms, operating systems, and databases. Students must also complete six credit hours of technical electives in addition to the other requirements.
This document outlines the course requirements for a Bachelor of Science in Computer Science. It lists 137 required courses totaling 30 credit hours for the core requirements and 101 additional credit hours of major requirements. The major requirements are grouped into categories including mathematics, basic sciences, and computer science courses.
Army ammunition data_sheets_for_rocketsAditya Tulus
This document is a technical manual that provides data sheets for rockets, rocket systems, rocket fuzes, and rocket motors used by the US Army. It includes illustrations and descriptions of the items as well as their characteristics, dimensions, performance specifications, and logistics information. The manual covers both ground-based and aircraft-mounted rockets and their components.
El documento resume la influencia de la mitología griega en la literatura y el cine. Explica que autores como Homero, Hesíodo y Ovidio se inspiraron en los mitos antiguos para sus obras literarias. También señala que películas modernas como Percy Jackson y el Ladrón del Rayo y Hércules toman historias y personajes de la mitología griega como base para sus argumentos fílmicos. La mitología sigue siendo una fuente de inspiración para diferentes formas artísticas a través de los años.
Uma princesa vai viver com uma serpente num palácio para salvar o pai da morte. Ela cuida da serpente e eles tornam-se amigos. Quando a princesa chora sobre o peito da serpente, esta transforma-se num príncipe, revelando que era vítima de um encanto de uma bruxa. O príncipe pede a princesa em casamento.
This document discusses using strategy games like Civilization to teach history and 21st century skills. It describes how Seann Dikkers uses games in his classroom lessons to engage students in learning about topics like geography, conflict, and historical eras. Students play rounds of the games in class and discuss strategies and themes that emerge. Dikkers believes this "pwning" approach helps students master passions and curiosities while developing skills like problem solving, communication, and global awareness.
Airin is a 6-year-old girl whose favorite color is yellow. When asked her name, she spelled it out as A-i-r-i-n. She said she was fine when asked how she was doing today.
This document discusses ideas for a gangster genre film, including possible characters, settings, target audience, and basic information. It describes two main characters - one who is violent and intimidating, and another who is rude and charms women. It also mentions filming chase scenes in back streets and exploring a character's childhood home life. The target audience is described as mainly men ages teens to 40s who enjoy streetwise and working class characters. Locations would likely be set in London with cockney accents, and involve drugs, alcohol, stolen goods, and trouble with the police.
Tony Stark es un filántropo millonario que creó su propia armadura, conocida como Iron Man, para combatir fuerzas malignas. Su mejor amigo James Rhodes también usa una armadura llamada War Machine como enlace entre Industrias Stark y la Fuerza Aérea de los Estados Unidos. Stark ha creado varias versiones de su armadura Iron Man a lo largo de los años para mejorar su capacidad de lucha.
The document discusses choosing right over wrong through examples like staying away from drugs, practicing good sportsmanship, and helping others in need. It encourages donating to charity, getting involved in politics to make a difference, being accepting of others, avoiding drugs, never quitting, having a positive outlook, being honest, and choosing right will lead to a better life filled with positive people and outcomes that could inspire others.
During workout you feel that, performing barbell curls with a straight bar began to hurt. It feels like sharp pain along the pinkie side of your hand and wrist. It hurts when you move your wrist, and there may also be swelling and a feeling of heat, tingling, or numbness. Avoid straight bars for biceps curls and triceps extensions. If possible, incorporate kettlebell exercises such as swings and cleans to strengthen the wrist and grip.
The document provides feedback on costumes for a song performance. It recommends simpler costumes inspired by Taylor Swift's style rather than Katy Perry's more elaborate outfits, since the group does not have the same resources as major artists. Taylor Swift and Kesha are presented as alternatives who portray everyday fashion that would appeal to the teenage girl target audience. The costumes should keep the serious tone of the chosen Katy Perry song "The One That Got Away" in mind.
Benchmark Lag Plumbing Modeling Gwcc Demobenchmarklag
The document is a progress report from Dimeo Construction regarding mechanical, plumbing, and heating coordination services for a $200 million construction project at Gateway Community College in New Haven, Connecticut. It provides an overview of the project scope, schedule, deliverables, and current status as of March 15, 2010. Key tasks completed include the 2D to 3D design conversion, shop drawings, linking the plumbing model to the structural model through a shared origin point, and pre-construction clashing of the piping network against other trades.
Holes, chapters 1-6 provide a list of names to thank for help. Stanley is excited at the prospect of meeting his hero Sweet Feet despite everything. He is relieved to be left alone but is very thirsty. Stanley never leaves food on his plate no matter the taste.
The document analyzes three magazine advertisements for music albums. It discusses design elements like bold colors, fonts, imagery, and information included that would encourage readers to buy the albums. Key points made include using the artist's recognizable branding fonts and imagery for continuity, highlighting popular tracks and bonus content, and including links to purchase and the artist's website. Overall, the document examines how the advertisements grasp attention, entice readers, and promote the albums and artists effectively through their layout, composition, and inclusion of relevant details.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
The document discusses how the media product challenges conventions of drama films in its opening scene. It begins with the character ill in the hospital, then cuts to her healthy on the beach with friends, out of chronological order. This establishes the genre and story quickly. It includes a monologue and hospital setting shots to immerse the audience emotionally. While most openings are outdoors, the ghost effect challenges conventions but fits the story by showing the character's point of view. The production name and song choice aim to keep within drama film conventions.
The document provides location details, prop lists, character details, and production roles for filming a short film. Locations include a church, park, street, and houses to film scenes showing Flora's abnormal behavior, a chase scene, family interactions, and a scene in a mental institution. Props include Halloween makeup and a doll. Characters include Flora, her sister Megan, father James, mother Jean, and friend Daisy. The shooting schedule is in January and production roles include the producers, directors, camerapeople, and editors.
This document discusses using strategy games like Civilization to teach history and 21st century skills. It describes how Seann Dikkers uses games in his classroom lessons to engage students in learning about topics like geography, conflict, and historical eras. Students play rounds of the games in class and discuss strategies and themes that emerge. Dikkers believes this "pwning" approach helps students master passions and curiosities while developing skills like problem solving, communication, and global awareness.
Airin is a 6-year-old girl whose favorite color is yellow. When asked her name, she spelled it out as A-i-r-i-n. She said she was fine when asked how she was doing today.
This document discusses ideas for a gangster genre film, including possible characters, settings, target audience, and basic information. It describes two main characters - one who is violent and intimidating, and another who is rude and charms women. It also mentions filming chase scenes in back streets and exploring a character's childhood home life. The target audience is described as mainly men ages teens to 40s who enjoy streetwise and working class characters. Locations would likely be set in London with cockney accents, and involve drugs, alcohol, stolen goods, and trouble with the police.
Tony Stark es un filántropo millonario que creó su propia armadura, conocida como Iron Man, para combatir fuerzas malignas. Su mejor amigo James Rhodes también usa una armadura llamada War Machine como enlace entre Industrias Stark y la Fuerza Aérea de los Estados Unidos. Stark ha creado varias versiones de su armadura Iron Man a lo largo de los años para mejorar su capacidad de lucha.
The document discusses choosing right over wrong through examples like staying away from drugs, practicing good sportsmanship, and helping others in need. It encourages donating to charity, getting involved in politics to make a difference, being accepting of others, avoiding drugs, never quitting, having a positive outlook, being honest, and choosing right will lead to a better life filled with positive people and outcomes that could inspire others.
During workout you feel that, performing barbell curls with a straight bar began to hurt. It feels like sharp pain along the pinkie side of your hand and wrist. It hurts when you move your wrist, and there may also be swelling and a feeling of heat, tingling, or numbness. Avoid straight bars for biceps curls and triceps extensions. If possible, incorporate kettlebell exercises such as swings and cleans to strengthen the wrist and grip.
The document provides feedback on costumes for a song performance. It recommends simpler costumes inspired by Taylor Swift's style rather than Katy Perry's more elaborate outfits, since the group does not have the same resources as major artists. Taylor Swift and Kesha are presented as alternatives who portray everyday fashion that would appeal to the teenage girl target audience. The costumes should keep the serious tone of the chosen Katy Perry song "The One That Got Away" in mind.
Benchmark Lag Plumbing Modeling Gwcc Demobenchmarklag
The document is a progress report from Dimeo Construction regarding mechanical, plumbing, and heating coordination services for a $200 million construction project at Gateway Community College in New Haven, Connecticut. It provides an overview of the project scope, schedule, deliverables, and current status as of March 15, 2010. Key tasks completed include the 2D to 3D design conversion, shop drawings, linking the plumbing model to the structural model through a shared origin point, and pre-construction clashing of the piping network against other trades.
Holes, chapters 1-6 provide a list of names to thank for help. Stanley is excited at the prospect of meeting his hero Sweet Feet despite everything. He is relieved to be left alone but is very thirsty. Stanley never leaves food on his plate no matter the taste.
The document analyzes three magazine advertisements for music albums. It discusses design elements like bold colors, fonts, imagery, and information included that would encourage readers to buy the albums. Key points made include using the artist's recognizable branding fonts and imagery for continuity, highlighting popular tracks and bonus content, and including links to purchase and the artist's website. Overall, the document examines how the advertisements grasp attention, entice readers, and promote the albums and artists effectively through their layout, composition, and inclusion of relevant details.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
The document discusses how the media product challenges conventions of drama films in its opening scene. It begins with the character ill in the hospital, then cuts to her healthy on the beach with friends, out of chronological order. This establishes the genre and story quickly. It includes a monologue and hospital setting shots to immerse the audience emotionally. While most openings are outdoors, the ghost effect challenges conventions but fits the story by showing the character's point of view. The production name and song choice aim to keep within drama film conventions.
The document provides location details, prop lists, character details, and production roles for filming a short film. Locations include a church, park, street, and houses to film scenes showing Flora's abnormal behavior, a chase scene, family interactions, and a scene in a mental institution. Props include Halloween makeup and a doll. Characters include Flora, her sister Megan, father James, mother Jean, and friend Daisy. The shooting schedule is in January and production roles include the producers, directors, camerapeople, and editors.
1. The document outlines the curriculum requirements for a Bachelor of Science in Computer Science, including required courses in English, mathematics, science, and computer science.
2. Students must complete a total of 136 credit hours, including core requirements in general education, mathematics, science, and 42 credit hours of computer science courses.
3. The computer science courses cover topics like programming techniques, data structures, algorithms, operating systems, databases, and programming language principles.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
1. F
( . . 2553)
- F F F F 140 F
30 F
F F 3 F
F F 3 F
F F F 3 F
F F 3 F
F F
F 12 F
5500111 F 1 3(2-2-5)
EXPERIENTIAL ENGLISH I
5500112 F 2 3(2-2-5)
EXPERIENTIAL ENGLISH II
5500204 F1 3(2-2-5)
ENGLISH FOR ACADEMIC PURPOSE I
5500496 F 3(2-2-5)
COMMUNICATION IN SCIENCE AND TECHNOLOGY
F F 6 F
2301170 F 3(3-0-6)
COMPUTER AND PROGRAMMING
F 3 F
F F F 104 F
F F F 31 F
2301117 1 4(4-0-8)
CALCULUS I
2301118 2 4(4-0-8)
CALCULUS II
2301286 F 3(2-3-4)
PROBABILITY AND STATISTICS
2. 2301399 1(1-0-2)
PROJECT PROPOSAL
2301490 1(1-0-2)
SEMINAR
2301499 F 2(2-0-4)
SENIOR PROJECT
2302113 1(0-3-0)
GENERAL CHEMISTRY LABORATORY
2302167 3(3-0-6)
GENERAL CH EMISTRY
2303107 3(3-0-6)
GENERAL BIOLOGY
2303108 1(0-3-0)
GENERAL BIOLOGY LABORATORY
2304103 F 1 3(3-0-6)
GENERAL PHYSICS I
2304104 F 2 3(3-0-6)
GENERAL PHYSICS II
2304183 F 1 1(0-3-0)
GENERAL PHYSICS LABORATORY I
2304184 F 2 1(0-3-0)
GENERAL PHYSICS LABORATORY II
F 58 F
F 49 F
43 F
2301172 F 1(0-2-1)
COMPUTER AND PROGRAMMING LABORATORY
2301217 3 3(3-0-6)
CALCULUS III
2301223 F F 3(3-0-6)
MATHEMATICAL MODELS AND REASONING
2301233 F 3(3-0-6)
DISCRETE MATHEMATICS
2301234 F 1 3(3-0-6)
LINEAR ALGEBRA I
3. 2301250 F 3(3-0-6)
COMPUTER ETHICS
2301260 4(3-2-7)
PROGRAMMING TECHNIQUES
2301263 F F 4(3-2-7)
DATA STRUCTURES AND FUNDAMENTAL ALGORITHMS
2301274 F 3(3-0-6)
COMPUTER SYSTEMS
2301365 F 4(3-2-7)
ALGORITHM DESIGNS AND ANALYSIS
2301371 3(3-0-6)
OPERATING SYSTEMS
2301375 F 3(3-0-6)
DATABASE SYSTEMS
2301379 3(3-0-6)
THEORY OF COMPUTATION
2301380 3(3-0-6)
PROGRAMMING LANGUAGE PRINCIPLES AND PROCESSING
6 F
F F 6 F F
2301361 F 3(3-0-6)
SYSTEMS ANALYSIS AND DESIGN
2301367 F F 3(3-0-6)
SOFTWARE ENGINEERING METHODOLOGY AND DEVELOPMENT
2301369 F 1 3(3-0-6)
DATA COMMUNICATION I
• 9 F
F F 9 F F CS I ( F
F F F )
F F F F 15 F
F
6 F
F F F F 6 F