Sort by AttachmentsUse SHIFT+ENTER to open the menu (new window).
DescriptionFilter
  
This course is intended for the students who should be familiar with the concepts of databases. By the end of the course, among other learning objectives, students would have: 1. Developed further knowledge and experience about Structured Query Language (SQL). 2. Examined advanced concepts and issues in database modeling and design. 3. Used a relational database and its management system under the Oracle environment. 4. Become familiar with Oracle development products, specifically SQL*Plus, PL/SQL, Oracle Developer Forms Builder and Reports Builder. 5. Gained practical experience through planning, analyzing, designing, developing, and implementing of an Oracle database project using Oracle developer products.
2014/2015
  
The course deals with the impact of computers, information technology, and information systems on us as individuals and on the society we are living in. The widespread use of technologies has changed the way we work, think, and interact with each other. For example, technologies, such as the mobile devices, Facebook, music sharing sites, and Wikis have created a flood of new social, legal, and ethical issues that demand close examination and critical discussion. Here are just a few examples of the issues that we will be talking about in this subject: 1. There is a great deal of information about all of us recorded in computer databases. What rules should govern how this information is accessed, used, and reused? We all get privacy notices in fine print from our banks, credit card companies, universities, etc. What do they really mean? Hacking, identity theft, and credit card fraud have increased in the recent years. What are the appropriate responses to these types of fraud and what precautions can we take to prevent them from happening? 2. New encryption methods make it possible now to keep our emails and phone conversations secret from others. How should our desire for privacy be balanced with the need of law enforcement agencies (e.g. police) to intercept the communications of suspected criminals or terrorisms? 3. How serious are the problems created by Websites that contain pornography, ‘hate’, or racism material directed at various groups? Bomb-making information, etc.? Should be there any restrictions on material or content that is put on the Web? 4. Computers are increasingly used to control medical devices, airplanes, nuclear power plants, and other safety-critical systems. How safe are such systems? How safe is ‘safe enough’? What can we do to manage the potential threats and risks involved? 5. It is easy now to use computers to copy music, software, books, etc., in violation of copyright laws. What is the real extent of this issue? What can or should be done about it? What is meant by free software? Should all software be free? There are, at least, two sides to almost all of the questions we will consider in this subject. We will spend much of our time discussing the issues and exploring different perspectives and points of view.
2014/2015