Articles in this section
Category / Section

Bachelor of Science in Information Technology

Published:
Updated:
Code Offered By
IT School of Information Technology (SoIT)

Description

The BS Information Technology Program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization.

The program prepares graduates to address various user needs involving the selection, development, application, integration, and management of computing technologies within an organization.

Program Educational Objectives

Within three (3) to five (5) years after graduation, graduates of the program shall have:

  • Been able to manage as a team leader and/or participate as a team member in undertaking information technology projects whose results will lead to significant societal, organizational, national, and/or global benefits.
  • Engaged in lifelong learning toward the pursuit of graduate and/or post-graduate degrees and/or professional development.
  • Demonstrated utmost standards of professionalism, attitude, and ethics to achieve excellence in the practice of his/her profession

Program Outcomes

By the time of graduation, the student shall have developed:

  1. Analyze complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.
Was this article useful?
Like
Dislike
Help us improve this page
Please provide feedback or comments
Comments (0)
Access denied
Access denied