FUNDAMENTALS OF COMPUTING

SHE Level 1
SCQF Credit Points 20.00
ECTS Credit Points 10.00
Module Code M1I325087
Module Leader Dawn Carmichael
School School of Computing, Engineering and Built Environment
Subject Computing
Trimester
  • A (September start)-B (January start)

Pre-Requisite Knowledge

n/a

Summary of Content

This module introduces students to the fundamental aspects of computer systems appropriate and complementary to their programme of study: architectures; applications; computer networks; computer network interconnectivity; computer security. The module is accessed by several different programme suites and the module's learning outcomes and syllabus for each suite are tailored to complement other level 1 learning experiences for each suite. Students will gain practical experience in the investigation of computer systems and architecture through a programme of laboratory work and tutorial study. The percentage of Work Based Learning for this module, as represented by the proportion of the Activity Types which take place off campus is 79%. The percentage of Work Based Assessment for this module is 0%.

Syllabus

Representation of data in programming languages. The architectural building blocks of a simple CPU including registers, ALU, control unit and data-paths. The fundamentals of instruction fetch, interpretation and execution. How a program works and how it is stored on hard disc, high level languages, compiling a program. Bootstrap process. Operating systems, software and applications: Connecting to memory and other typical I/O subsystems such as disk storage and networking devices. File systems and directories: Mapping files onto disc blocks, file structures and their advantages and disadvantages. Systems organization including distributed-systems, parallel and multi-core techniques. Introduction to the wide range of processors available, their performance-levels and typical application areas. Organisation and performance of the memory/storage hierarchy. This overview ranges from CPU-based memory technology through to network-attached storage technologies. Client/Server Architectures, N-Tier Architectures Overview of representative computer systems, their characteristics and constraints and software applications. The overview ranges from parallel supercomputers, servers and desktop machines through to embedded systems, personal devices and wireless-sensor networks. Cyber Security Players Describe the characteristics of criminals and professionals in the cyber security realm. Confidentiality, Integrity & Availability Describe how these principles relate to data states and cyber security countermeasures. Cyber Security Threats, Vulnerabilities and Attack Describe the tactics, techniques and procedures used by cyber criminals. The Art of Protecting Secrets Describe how technologies, products and procedures are used to protect confidentiality. The Art of Ensuring Integrity Describe how technologies, products and features are used to ensure integrity. The Art of Ensuring Availability Describe how technologies, products and features provide high availability. Network Defence Explain cybersecurity professionals use technologies, processes and procedures to defen all components of the network. Law and Ethics Explain the purpose of laws and how ethics provide guidance in cyber security.

Learning Outcomes

On successful completion of this module a student should be able to:1- Describe the key components of a computer system hardware and software architectures used to provide computer system functionalityUnderstand how data is represented and manipulated by representative computer languages and CPU instruction sets within a computer system.2- Describe the characteristics, constraints and performance capabilities of a representative and wide range of computer-based systems.3- Describe the characteristics of criminals, and professionals in the cyber security realm.4- Explain the principles of confidentiality, integrity and availability as they relate to data states and cyber security countermeasures.5- Explain how cyber security professionals use technologies, processes and procedures to defend all components of a network.

Teaching / Learning Strategy

Work based Education aims to maximise the direct and digitally mediated contact time with students by practicing teaching and learning strategies that use authentic work based scenarios and encourage action learning, enquiry based learning, problem based learning and peer learning. All these approaches aim to directly involve the students in the process of learning and to encourage sharing of learning between students. The module team will determine the level and accuracy of knowledge acquisition at key points in the delivery, inputting when necessary either directly or with the support of external experts who will add to the authenticity, the credibility and application of the education and learning in the workplace. The course material is introduced through lectures in the form of online presentations, which covers the fundamentals of computing. Students will engage with practical assignments and online tutorial material which may include instructor and peer-created content, and there will be tutorials on campus which will allow students to discuss key concepts and issues with peers and with instructors. Students will be expected to undertake a significant level of independent study within the workplace, including practical activities, and links may be provided to appropriate external material such as podcasts, MOOCs, videos and literature to supplement the module content. Students will also be encouraged to reflect upon the theoretical learning within the work place and the application of newly learned concepts to the work environment. Students will receive feedback on their performance during the module through undertaking the practical assignments and online tutorial exercises and participating in the on-campus tutorials.

Indicative Reading

Brookshear, J G, Computer Science: An overview, Prentice hall, April 2014, ISBN-10: 0133760065 ISBN- 13: 9780133760064 Reed, D Balanced Introduction to Computer Science, Pearson, Nov 2010, ISBN-10: 0132594447 ISBN-13: 9780132594448 Gollman, D, Digital Security, Forensics & Ethical Hacking and Networked Systems for Engineering Students: Computer Security, 2nd edition. Wiley, 2006. ISBN-13: 978-0-470-86293-3 Kurose, J f; Ross KW. Computer Networking: A Top-down Approach, 6 th Edition, May 2012, ISBN-10: 0273768964 Spengler, E; Wayne, L, Switched Networks Companion Guide, May 2014, ISBN-10: 1587133296 Cyber Security Essentials, Cisco Networking Academy Programme.

Transferrable Skills

Logical thinking and problem solving Critical analysis Communication skills (Electronic, written, oral and listening) necessary to make effective presentation of a technical nature (information, ideas, problems and their solutions) to a range of audiences. Numeracy in both understanding and presenting cases involving a quantitative dimension. Creativity, innovation and independent thinking. Appreciating and desiring the need for reflection and planning for self -learning and improving performance as the foundation for CPD and Life long learning. Ability to prioritise tasks and time management (organising and planning work). Interpersonal skills, the ability to work as a member of a team (work with and relate effectively to others) recognising

Module Structure

Activity Total Hours
Assessment (FT) 18.00
Independent Learning (FT) 122.00
Practicals (FT) 24.00
Lectures (FT) 24.00
Tutorials (FT) 12.00

Assessment Methods

Component Duration Weighting Threshold Description
Coursework 1 2.00 50.00 35% Continuous assessment through tests and practical and reflective assignments
Coursework 2 1.00 50.00 35% Continuous assessment through tests and practical and reflective assignments