SlideShare a Scribd company logo
THE UNIVERSITY OF LAHORE
Course Outline
FALL Semester September 2017
Session 2017-18
CS-3327 Professional Practices
Effective Date: 18 September, 2017
SCU 3 Credit(s)
Co-requisite (s) None
Pre-requisite(s) Introduction to computing (CS-1010)
Weekly tuition pattern 2 sessions (90 min session)
Teaching Team
Syed Saqib Raza Rizvi
saqib.raza@cs.uol.edu.pk
1- Course Description
A Computing graduate as professional has some responsibilities with respect to the
society. This course develops student understanding about historical, social, economic,
ethical, and professional issues related to the discipline of Computing. It identifies key
sources for information and opinion about professionalism and ethics. Students analyze,
evaluate, and assess ethical and professional computing case studies.
2- Objectives
The course mainly aims to achieve the following objectives:
1. Defines that why students want to graduate in computing field and what are the
common things in every organization?
2. Describe in detail the field of computing and its subfields.
3. Describes what a profession is and what makes a profession.
4. Define the structure and little history of the engineering.
5. Describes the professional ethics, definitions, types, and standards, and social
responsibilities.
6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses.
7. Describe computer misuse act, intellectual property rights, and cyber law.
8. Describe the importance of information security and how we can secure it by
using various methods.
9. Defines the need and brief introduction about the software contracts.
10. Defines the anatomy of software house organizations.
3- Student Learning Outcomes
By the completion of this course, the students should able to:
1. Know the scope of computing field after graduating in it and what are the
common things in every organization.
2. Distinguish between the various fields of computing.
3. Describe the core of any profession.
4. Know that how business and professional environment of computing field work.
5. Adhere his responsibilities according to profession, organization, and himself.
6. Know that how broadly code of ethics will affect his actions during employment.
7. Know the standards and rules about intellectual property, computer misuse, and
cyber law.
8. Know the standards/tools/models/polices/principles to secure information.
9. Write and analyze software contracts as an employer or an employee.
10. Know the business and professional environment of software house.
4- Course Structure
1. Presentation by lecturer
2. Group discussion
3. Assignments
4. Presentations
5. Quiz
6. Mid Term and Final Term Exams
5- Course Duration
This course will be held twice a week of 3 hours (each 60 min session) class duration.
6- Course style
The course will be delivered in a classroom environment.
7- Additional Course Requirement
In addition to the objectives of this course, students are expected to gain skills which
would be needed in the professional work environment. These skills include but not
limited to: Writing, Presentation, Decision Making and Teamwork.
8- Text and Other Resources
8.1 Text
1. Professional Issues in Software Engineering, M.F. Bott et al.
8.2 Other Resources
1. Information Security: Principles and Practices, Mark Merkow et al.
9- Course Outline
The lecturers are supposed to complete the following topics/sub-topics before the
mid/final term examination as prescribed in the course outline below:
Week Lecture Topics/Sub-Topics Reading Material
1
1
Introduction to Ethics, Philosophies regarding to
Ethics and morals, Introduction to Computer and
Cyber Ethics
1. Intro to Ethics.ppt
2
Computer Ethics History, Sample Case studies, Ten
commandments, Sample topics to study in this
subject
1. Intro to Ethics.ppt
2
1
Types of Ethics, Relationship of different types
of ethics Ethics ,Essential Components of
Personal Ethics, ACM code of Conduct,
Netiquette
2. Types of Ethics.ppt
2
Business Ethics, Relationship between law and
ethics, Deontology theory, Unitarianism theory,
Right Model
3. Business Ethics.ppt
3
1
Application of Deontology, Unitarianism
theory, Right Model, Examples, Code of
Conduct for Employees and Employers
3. Business Ethics.ppt
2
Definition of Cyber Crime, General Types of
Cyber Crime, Cyber Crime Statistics
4. Cyber Ethics.ppt
4 1
Types of Cyber Crime Technically specified by
Australian Institute of Criminology
4. Cyber Ethics.ppt
2 QUIZ-1, Intellectual Property, Categories of IP
5
1
World Intellectual PropertyOrganization
5. IP.ppt
2
Trade Secrets, Protection for Software
Copyright, Violation of Software Copyright,
5. IP.ppt
6
1
Reverse Engineering, Open Source Software,
Benefits of Open Source Software
5. IP.ppt
2
Introduction to Software Contracts, Structure of
Software Contracts, Clauses of Software
Contracts, Sample Software Agreement
6. Contracts.ppt
7
1
Introduction to Profession, History of
Engineering Profession, Software House
Structure
7. Profession.ppt
2
Common Roles in Software Organization
QUIZ-II
8
1
MID TERMS2
9
1
Management Hierarchy, IT Organization Structure,
Staff Management, Five Golden rules of Staff
management
7. Profession.ppt
2
Definition of Team, Team Management, Four C’s
of Team Management, Elements of Healthy Teams,
Way to Inspire and Motivate team, Ethical issues in
team management, Characteristics of High
Performance Teams
8. Team Management.ppt
10
1
Stages of Team development, Barriers to Team
Building, characteristics of High Performance
Teams,How to manage conflicts in team,
8. Team Management.ppt
2
What is SEEP? Software Engineering Profession,
Roles in Software Engineering Professions, Need
of Code of Ethics
9. SEEP.ppt
11
1
Introduction to IEEE and ACM, Eight
Principles Related to Software Engineering
Code of Ethics and Profession Practice, Case
Studies
9. SEEP.ppt
2
Definition of Software Risks, Introduction to
Risk management, RM Strategies, Types of
Risks, Categories of Risks
10. Risk Management.ppt
12
1
Steps of Risk Management, Risk Mitigation,
Monitoring and Management Plan
10. Risk
Management.ppt
2 Risk Mitigation, Monitoring and Management Plan QUIZ-III
13
1
Introduction to Computer Privacy, Email
Privacy, TCP/IP and Security, Introduction to
Encryption, Virus, Worms and Trojan Horses,
Working of Anti-Virus Programs, Un-authorize
access
11. Computer
Security.ppt
2
Introduction to Firewalls, Bio-metric devices
and security, Software theft, System failures
and data backup policies
11. Computer
Security.ppt
14
1
, Web browsers and data security, Privacy laws
Content Filtering, Ergonomics, Green
Computing, Potential Computer Risks and
Security measures
11. Computer
Security.ppt
2
Introduction to Security Policies, History of
Information Security, Information Security
policy life cycle, laws and regulations of
Information Security, Standards of IS.
12. Information
Security Policy
15
1
Basic Information Security Principles,
Information Security Architecture
12. Information
Security Policy
2
Policy and Process, Access Control, QUIZ-IV
16
1
Ethical Hacking, Types of Hackers, Model of
Ethical Hacking, Process of Ethical Hacking,
Ethical hacking Skills and knowledge
13. Ethical Hacking
2
Group Presentations
17
1
FINAL TERM EXAMINATION
2
10- AssessmentCriteria
No. Assessment Percentage
1. Mid Exam 20%
2. Final Exam 50%
3. Assignments 10%
4. Quizzes 10%
5. Presentation 5%
6. Project 5%
Total 100%
11- Attendance Requirements
You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other
classroom activity. Where you fail to attend classes, you cannot expect the lecturer to
brief you on what you have missed. You are responsible for your attendance, not the
academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and
failure to attend will be taken into account.
12- Submission and Collectionof Assignment
All assignments should be handed in at the beginning of the class sessions when they are
due. All assignments may be handed back during scheduled classes.
13- GeneralInformation
Students are required to be familiar with the university code Conduct, and to abide by its
terms and conditions.
13.1 Copying of Copyright Material by Student
A condition of acceptance as a student is the obligation to abide by the University’s
policy on the copying of copyright material. This obligation covers photocopying of any
material using the University’s photocopying machines, and the recording off air, and
making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
Students who flagrantly disregard University policy and copyright requirements will be
liable to disciplinary action under the Code of Conduct.
13.2 Academic Misconduct
Please refer to the Code of Conduct for definitions and penalties for Academic
Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty.
Academic honesty is crucial to a student's credibility and self-esteem, and ultimately
reflects the values and morals of the University as a whole. A student may work together
with one or a group of students discussing assignment content, identifying relevant
references, and debating issues relevant to the subject. Academic investigation is not
limited to the views and opinions of one individual, but is built by forming opinion based
on past and present work in the field. It is legitimate and appropriate to synthesize the
work of others, provided that such work is clearly and accurately referenced. Plagiarism
occurs when the work (including such things as text, figures, ideas, or conceptual
structure, whether verbatim or not) created by another person or persons is used and
presented as one’s own creation, unless the source of each quotation or piece of borrowed
material is acknowledged with an appropriate citation. Encouraging or assisting another
person to commit plagiarism is a form of improper collusion and may attract the same
penalties. To prevent Academic Misconduct occurring, students are expected to
familiarize themselves with the University policy, the Subject Outline statements, and
specific assignment guidelines.
13.3 Guidelines to Avoid Plagiarism
Whenever you copy more than a few words from any source, you must acknowledge that
source by putting the quote in quotation marks and providing the name of the author. Full
details must be provided in your bibliography. If you copy a diagram, statistical table,
map, etc., you must acknowledge the source. The recommended way is to show this
under the diagram. If you quote any statistics in your text, the source should be
acknowledged. Again full details must be provided in your bibliography. Whenever you
use the ideas of any other author you should acknowledge those, using the APA
(American Psychological Association) style of referencing.
Students are encouraged to co-operate, but collusion is a form of cheating. Students may
use any sources (acknowledged of course) other than the assignments of fellow students.
Unless your Subject Leader informs you otherwise, the following guideline should be
used: Students may work together in obtaining references, discussing the content of the
references and discussing the assignment, but when they write, they must write alone.
13.4 Referencing For Written Work
Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow
readers to access those others’ ideas. Referencing should:
1. Acknowledge others' ideas
2. Allow readers to find the source
3. Be consistent in format and
4. Acknowledge the source of the referencing format
To attain these qualities, the school recommends use of either the Harvard or American
Psychological Association style of referencing, both of which use the author/date.
13.5 Referencing Standards
APA style referencing
Approval
Prepared By :
Syed Saqib Raza Rizvi
Assistant Professor
(University Of Lahore)
Approved by,
Dr. Amin Ur Rehman
Course Mentor
Dept. Computer Science & IT

More Related Content

What's hot

Software project management
Software project managementSoftware project management
Software project managementR A Akerkar
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
Uc Man
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
shahmansoor109
 
Software scope
Software scopeSoftware scope
Software scope
Shubham Dubey
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
Hamza Cheema
 
software engineering
software engineeringsoftware engineering
software engineering
Azad public school
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 
Assignment 1
Assignment 1Assignment 1
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1Siddharth Ayer
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Software reuse ppt.
Software reuse ppt.Software reuse ppt.
Software reuse ppt.
Sumit Biswas
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
Context model
Context modelContext model
Context model
Ubaid423
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
Saqib Raza
 
Algorithmic problem solving
Algorithmic problem solvingAlgorithmic problem solving
Algorithmic problem solving
Prabhakaran V M
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
TechBasti
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
jaswinder singh thind
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
Research & Development LAB QUEST Nawabshah
 

What's hot (20)

Software project management
Software project managementSoftware project management
Software project management
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Software scope
Software scopeSoftware scope
Software scope
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
software engineering
software engineeringsoftware engineering
software engineering
 
System engineering
System engineeringSystem engineering
System engineering
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Software reuse ppt.
Software reuse ppt.Software reuse ppt.
Software reuse ppt.
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Context model
Context modelContext model
Context model
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Software quality
Software qualitySoftware quality
Software quality
 
Algorithmic problem solving
Algorithmic problem solvingAlgorithmic problem solving
Algorithmic problem solving
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
 

Similar to Professional Practice Course Outline

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
ma7808766
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
ReneeRosePaunil1
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
alinainglis
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
IshratFatima288747
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdf
hsingh5201
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
ERAUWebinars
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
SANSKAR20
 
Ethical Issues in Computing.pptx
Ethical Issues in Computing.pptxEthical Issues in Computing.pptx
Ethical Issues in Computing.pptx
Tasnim
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
stilliegeorgiana
 
COA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for studentCOA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for student
mohitmehra75
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.doc
Avinash Avuthu
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptx
kaushalmunish77
 
SENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptxSENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptx
VatsalPatel147291
 
AIML-MODULE1.pdf
AIML-MODULE1.pdfAIML-MODULE1.pdf
AIML-MODULE1.pdf
ssuser502329
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
IMAD HASSAN
 

Similar to Professional Practice Course Outline (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdf
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Ethical Issues in Computing.pptx
Ethical Issues in Computing.pptxEthical Issues in Computing.pptx
Ethical Issues in Computing.pptx
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
COA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for studentCOA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for student
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.doc
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptx
 
SENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptxSENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptx
 
AIML-MODULE1.pdf
AIML-MODULE1.pdfAIML-MODULE1.pdf
AIML-MODULE1.pdf
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 

More from Saqib Raza

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
Saqib Raza
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
Saqib Raza
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Saqib Raza
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
Saqib Raza
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Saqib Raza
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
Saqib Raza
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
Saqib Raza
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
Saqib Raza
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
Saqib Raza
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
Saqib Raza
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
Saqib Raza
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
Saqib Raza
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
Saqib Raza
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
Saqib Raza
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
Saqib Raza
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
Saqib Raza
 
Capability Maturity Model Integartion
Capability Maturity Model IntegartionCapability Maturity Model Integartion
Capability Maturity Model Integartion
Saqib Raza
 
Lean Software Development
Lean Software DevelopmentLean Software Development
Lean Software Development
Saqib Raza
 

More from Saqib Raza (20)

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
12 security policies
12 security policies12 security policies
12 security policies
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Capability Maturity Model Integartion
Capability Maturity Model IntegartionCapability Maturity Model Integartion
Capability Maturity Model Integartion
 
Lean Software Development
Lean Software DevelopmentLean Software Development
Lean Software Development
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Professional Practice Course Outline

  • 1. THE UNIVERSITY OF LAHORE Course Outline FALL Semester September 2017 Session 2017-18 CS-3327 Professional Practices Effective Date: 18 September, 2017 SCU 3 Credit(s) Co-requisite (s) None Pre-requisite(s) Introduction to computing (CS-1010) Weekly tuition pattern 2 sessions (90 min session) Teaching Team Syed Saqib Raza Rizvi saqib.raza@cs.uol.edu.pk 1- Course Description A Computing graduate as professional has some responsibilities with respect to the society. This course develops student understanding about historical, social, economic, ethical, and professional issues related to the discipline of Computing. It identifies key sources for information and opinion about professionalism and ethics. Students analyze, evaluate, and assess ethical and professional computing case studies. 2- Objectives The course mainly aims to achieve the following objectives: 1. Defines that why students want to graduate in computing field and what are the common things in every organization? 2. Describe in detail the field of computing and its subfields. 3. Describes what a profession is and what makes a profession. 4. Define the structure and little history of the engineering. 5. Describes the professional ethics, definitions, types, and standards, and social responsibilities. 6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses. 7. Describe computer misuse act, intellectual property rights, and cyber law. 8. Describe the importance of information security and how we can secure it by using various methods.
  • 2. 9. Defines the need and brief introduction about the software contracts. 10. Defines the anatomy of software house organizations. 3- Student Learning Outcomes By the completion of this course, the students should able to: 1. Know the scope of computing field after graduating in it and what are the common things in every organization. 2. Distinguish between the various fields of computing. 3. Describe the core of any profession. 4. Know that how business and professional environment of computing field work. 5. Adhere his responsibilities according to profession, organization, and himself. 6. Know that how broadly code of ethics will affect his actions during employment. 7. Know the standards and rules about intellectual property, computer misuse, and cyber law. 8. Know the standards/tools/models/polices/principles to secure information. 9. Write and analyze software contracts as an employer or an employee. 10. Know the business and professional environment of software house. 4- Course Structure 1. Presentation by lecturer 2. Group discussion 3. Assignments 4. Presentations 5. Quiz 6. Mid Term and Final Term Exams 5- Course Duration This course will be held twice a week of 3 hours (each 60 min session) class duration. 6- Course style The course will be delivered in a classroom environment. 7- Additional Course Requirement In addition to the objectives of this course, students are expected to gain skills which would be needed in the professional work environment. These skills include but not limited to: Writing, Presentation, Decision Making and Teamwork. 8- Text and Other Resources 8.1 Text
  • 3. 1. Professional Issues in Software Engineering, M.F. Bott et al. 8.2 Other Resources 1. Information Security: Principles and Practices, Mark Merkow et al. 9- Course Outline The lecturers are supposed to complete the following topics/sub-topics before the mid/final term examination as prescribed in the course outline below: Week Lecture Topics/Sub-Topics Reading Material 1 1 Introduction to Ethics, Philosophies regarding to Ethics and morals, Introduction to Computer and Cyber Ethics 1. Intro to Ethics.ppt 2 Computer Ethics History, Sample Case studies, Ten commandments, Sample topics to study in this subject 1. Intro to Ethics.ppt 2 1 Types of Ethics, Relationship of different types of ethics Ethics ,Essential Components of Personal Ethics, ACM code of Conduct, Netiquette 2. Types of Ethics.ppt 2 Business Ethics, Relationship between law and ethics, Deontology theory, Unitarianism theory, Right Model 3. Business Ethics.ppt 3 1 Application of Deontology, Unitarianism theory, Right Model, Examples, Code of Conduct for Employees and Employers 3. Business Ethics.ppt 2 Definition of Cyber Crime, General Types of Cyber Crime, Cyber Crime Statistics 4. Cyber Ethics.ppt 4 1 Types of Cyber Crime Technically specified by Australian Institute of Criminology 4. Cyber Ethics.ppt 2 QUIZ-1, Intellectual Property, Categories of IP
  • 4. 5 1 World Intellectual PropertyOrganization 5. IP.ppt 2 Trade Secrets, Protection for Software Copyright, Violation of Software Copyright, 5. IP.ppt 6 1 Reverse Engineering, Open Source Software, Benefits of Open Source Software 5. IP.ppt 2 Introduction to Software Contracts, Structure of Software Contracts, Clauses of Software Contracts, Sample Software Agreement 6. Contracts.ppt 7 1 Introduction to Profession, History of Engineering Profession, Software House Structure 7. Profession.ppt 2 Common Roles in Software Organization QUIZ-II 8 1 MID TERMS2 9 1 Management Hierarchy, IT Organization Structure, Staff Management, Five Golden rules of Staff management 7. Profession.ppt 2 Definition of Team, Team Management, Four C’s of Team Management, Elements of Healthy Teams, Way to Inspire and Motivate team, Ethical issues in team management, Characteristics of High Performance Teams 8. Team Management.ppt 10 1 Stages of Team development, Barriers to Team Building, characteristics of High Performance Teams,How to manage conflicts in team, 8. Team Management.ppt 2 What is SEEP? Software Engineering Profession, Roles in Software Engineering Professions, Need of Code of Ethics 9. SEEP.ppt
  • 5. 11 1 Introduction to IEEE and ACM, Eight Principles Related to Software Engineering Code of Ethics and Profession Practice, Case Studies 9. SEEP.ppt 2 Definition of Software Risks, Introduction to Risk management, RM Strategies, Types of Risks, Categories of Risks 10. Risk Management.ppt 12 1 Steps of Risk Management, Risk Mitigation, Monitoring and Management Plan 10. Risk Management.ppt 2 Risk Mitigation, Monitoring and Management Plan QUIZ-III 13 1 Introduction to Computer Privacy, Email Privacy, TCP/IP and Security, Introduction to Encryption, Virus, Worms and Trojan Horses, Working of Anti-Virus Programs, Un-authorize access 11. Computer Security.ppt 2 Introduction to Firewalls, Bio-metric devices and security, Software theft, System failures and data backup policies 11. Computer Security.ppt 14 1 , Web browsers and data security, Privacy laws Content Filtering, Ergonomics, Green Computing, Potential Computer Risks and Security measures 11. Computer Security.ppt 2 Introduction to Security Policies, History of Information Security, Information Security policy life cycle, laws and regulations of Information Security, Standards of IS. 12. Information Security Policy 15 1 Basic Information Security Principles, Information Security Architecture 12. Information Security Policy 2 Policy and Process, Access Control, QUIZ-IV
  • 6. 16 1 Ethical Hacking, Types of Hackers, Model of Ethical Hacking, Process of Ethical Hacking, Ethical hacking Skills and knowledge 13. Ethical Hacking 2 Group Presentations 17 1 FINAL TERM EXAMINATION 2 10- AssessmentCriteria No. Assessment Percentage 1. Mid Exam 20% 2. Final Exam 50% 3. Assignments 10% 4. Quizzes 10% 5. Presentation 5% 6. Project 5% Total 100% 11- Attendance Requirements You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other classroom activity. Where you fail to attend classes, you cannot expect the lecturer to brief you on what you have missed. You are responsible for your attendance, not the academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and failure to attend will be taken into account. 12- Submission and Collectionof Assignment All assignments should be handed in at the beginning of the class sessions when they are due. All assignments may be handed back during scheduled classes. 13- GeneralInformation Students are required to be familiar with the university code Conduct, and to abide by its terms and conditions. 13.1 Copying of Copyright Material by Student A condition of acceptance as a student is the obligation to abide by the University’s policy on the copying of copyright material. This obligation covers photocopying of any material using the University’s photocopying machines, and the recording off air, and making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
  • 7. Students who flagrantly disregard University policy and copyright requirements will be liable to disciplinary action under the Code of Conduct. 13.2 Academic Misconduct Please refer to the Code of Conduct for definitions and penalties for Academic Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty. Academic honesty is crucial to a student's credibility and self-esteem, and ultimately reflects the values and morals of the University as a whole. A student may work together with one or a group of students discussing assignment content, identifying relevant references, and debating issues relevant to the subject. Academic investigation is not limited to the views and opinions of one individual, but is built by forming opinion based on past and present work in the field. It is legitimate and appropriate to synthesize the work of others, provided that such work is clearly and accurately referenced. Plagiarism occurs when the work (including such things as text, figures, ideas, or conceptual structure, whether verbatim or not) created by another person or persons is used and presented as one’s own creation, unless the source of each quotation or piece of borrowed material is acknowledged with an appropriate citation. Encouraging or assisting another person to commit plagiarism is a form of improper collusion and may attract the same penalties. To prevent Academic Misconduct occurring, students are expected to familiarize themselves with the University policy, the Subject Outline statements, and specific assignment guidelines. 13.3 Guidelines to Avoid Plagiarism Whenever you copy more than a few words from any source, you must acknowledge that source by putting the quote in quotation marks and providing the name of the author. Full details must be provided in your bibliography. If you copy a diagram, statistical table, map, etc., you must acknowledge the source. The recommended way is to show this under the diagram. If you quote any statistics in your text, the source should be acknowledged. Again full details must be provided in your bibliography. Whenever you use the ideas of any other author you should acknowledge those, using the APA (American Psychological Association) style of referencing. Students are encouraged to co-operate, but collusion is a form of cheating. Students may use any sources (acknowledged of course) other than the assignments of fellow students. Unless your Subject Leader informs you otherwise, the following guideline should be used: Students may work together in obtaining references, discussing the content of the references and discussing the assignment, but when they write, they must write alone. 13.4 Referencing For Written Work Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow readers to access those others’ ideas. Referencing should: 1. Acknowledge others' ideas 2. Allow readers to find the source 3. Be consistent in format and 4. Acknowledge the source of the referencing format
  • 8. To attain these qualities, the school recommends use of either the Harvard or American Psychological Association style of referencing, both of which use the author/date. 13.5 Referencing Standards APA style referencing Approval Prepared By : Syed Saqib Raza Rizvi Assistant Professor (University Of Lahore) Approved by, Dr. Amin Ur Rehman Course Mentor Dept. Computer Science & IT