SlideShare una empresa de Scribd logo
1 de 8
THE UNIVERSITY OF LAHORE
Course Outline
FALL Semester September 2017
Session 2017-18
CS-3327 Professional Practices
Effective Date: 18 September, 2017
SCU 3 Credit(s)
Co-requisite (s) None
Pre-requisite(s) Introduction to computing (CS-1010)
Weekly tuition pattern 2 sessions (90 min session)
Teaching Team
Syed Saqib Raza Rizvi
saqib.raza@cs.uol.edu.pk
1- Course Description
A Computing graduate as professional has some responsibilities with respect to the
society. This course develops student understanding about historical, social, economic,
ethical, and professional issues related to the discipline of Computing. It identifies key
sources for information and opinion about professionalism and ethics. Students analyze,
evaluate, and assess ethical and professional computing case studies.
2- Objectives
The course mainly aims to achieve the following objectives:
1. Defines that why students want to graduate in computing field and what are the
common things in every organization?
2. Describe in detail the field of computing and its subfields.
3. Describes what a profession is and what makes a profession.
4. Define the structure and little history of the engineering.
5. Describes the professional ethics, definitions, types, and standards, and social
responsibilities.
6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses.
7. Describe computer misuse act, intellectual property rights, and cyber law.
8. Describe the importance of information security and how we can secure it by
using various methods.
9. Defines the need and brief introduction about the software contracts.
10. Defines the anatomy of software house organizations.
3- Student Learning Outcomes
By the completion of this course, the students should able to:
1. Know the scope of computing field after graduating in it and what are the
common things in every organization.
2. Distinguish between the various fields of computing.
3. Describe the core of any profession.
4. Know that how business and professional environment of computing field work.
5. Adhere his responsibilities according to profession, organization, and himself.
6. Know that how broadly code of ethics will affect his actions during employment.
7. Know the standards and rules about intellectual property, computer misuse, and
cyber law.
8. Know the standards/tools/models/polices/principles to secure information.
9. Write and analyze software contracts as an employer or an employee.
10. Know the business and professional environment of software house.
4- Course Structure
1. Presentation by lecturer
2. Group discussion
3. Assignments
4. Presentations
5. Quiz
6. Mid Term and Final Term Exams
5- Course Duration
This course will be held twice a week of 3 hours (each 60 min session) class duration.
6- Course style
The course will be delivered in a classroom environment.
7- Additional Course Requirement
In addition to the objectives of this course, students are expected to gain skills which
would be needed in the professional work environment. These skills include but not
limited to: Writing, Presentation, Decision Making and Teamwork.
8- Text and Other Resources
8.1 Text
1. Professional Issues in Software Engineering, M.F. Bott et al.
8.2 Other Resources
1. Information Security: Principles and Practices, Mark Merkow et al.
9- Course Outline
The lecturers are supposed to complete the following topics/sub-topics before the
mid/final term examination as prescribed in the course outline below:
Week Lecture Topics/Sub-Topics Reading Material
1
1
Introduction to Ethics, Philosophies regarding to
Ethics and morals, Introduction to Computer and
Cyber Ethics
1. Intro to Ethics.ppt
2
Computer Ethics History, Sample Case studies, Ten
commandments, Sample topics to study in this
subject
1. Intro to Ethics.ppt
2
1
Types of Ethics, Relationship of different types
of ethics Ethics ,Essential Components of
Personal Ethics, ACM code of Conduct,
Netiquette
2. Types of Ethics.ppt
2
Business Ethics, Relationship between law and
ethics, Deontology theory, Unitarianism theory,
Right Model
3. Business Ethics.ppt
3
1
Application of Deontology, Unitarianism
theory, Right Model, Examples, Code of
Conduct for Employees and Employers
3. Business Ethics.ppt
2
Definition of Cyber Crime, General Types of
Cyber Crime, Cyber Crime Statistics
4. Cyber Ethics.ppt
4 1
Types of Cyber Crime Technically specified by
Australian Institute of Criminology
4. Cyber Ethics.ppt
2 QUIZ-1, Intellectual Property, Categories of IP
5
1
World Intellectual PropertyOrganization
5. IP.ppt
2
Trade Secrets, Protection for Software
Copyright, Violation of Software Copyright,
5. IP.ppt
6
1
Reverse Engineering, Open Source Software,
Benefits of Open Source Software
5. IP.ppt
2
Introduction to Software Contracts, Structure of
Software Contracts, Clauses of Software
Contracts, Sample Software Agreement
6. Contracts.ppt
7
1
Introduction to Profession, History of
Engineering Profession, Software House
Structure
7. Profession.ppt
2
Common Roles in Software Organization
QUIZ-II
8
1
MID TERMS2
9
1
Management Hierarchy, IT Organization Structure,
Staff Management, Five Golden rules of Staff
management
7. Profession.ppt
2
Definition of Team, Team Management, Four C’s
of Team Management, Elements of Healthy Teams,
Way to Inspire and Motivate team, Ethical issues in
team management, Characteristics of High
Performance Teams
8. Team Management.ppt
10
1
Stages of Team development, Barriers to Team
Building, characteristics of High Performance
Teams,How to manage conflicts in team,
8. Team Management.ppt
2
What is SEEP? Software Engineering Profession,
Roles in Software Engineering Professions, Need
of Code of Ethics
9. SEEP.ppt
11
1
Introduction to IEEE and ACM, Eight
Principles Related to Software Engineering
Code of Ethics and Profession Practice, Case
Studies
9. SEEP.ppt
2
Definition of Software Risks, Introduction to
Risk management, RM Strategies, Types of
Risks, Categories of Risks
10. Risk Management.ppt
12
1
Steps of Risk Management, Risk Mitigation,
Monitoring and Management Plan
10. Risk
Management.ppt
2 Risk Mitigation, Monitoring and Management Plan QUIZ-III
13
1
Introduction to Computer Privacy, Email
Privacy, TCP/IP and Security, Introduction to
Encryption, Virus, Worms and Trojan Horses,
Working of Anti-Virus Programs, Un-authorize
access
11. Computer
Security.ppt
2
Introduction to Firewalls, Bio-metric devices
and security, Software theft, System failures
and data backup policies
11. Computer
Security.ppt
14
1
, Web browsers and data security, Privacy laws
Content Filtering, Ergonomics, Green
Computing, Potential Computer Risks and
Security measures
11. Computer
Security.ppt
2
Introduction to Security Policies, History of
Information Security, Information Security
policy life cycle, laws and regulations of
Information Security, Standards of IS.
12. Information
Security Policy
15
1
Basic Information Security Principles,
Information Security Architecture
12. Information
Security Policy
2
Policy and Process, Access Control, QUIZ-IV
16
1
Ethical Hacking, Types of Hackers, Model of
Ethical Hacking, Process of Ethical Hacking,
Ethical hacking Skills and knowledge
13. Ethical Hacking
2
Group Presentations
17
1
FINAL TERM EXAMINATION
2
10- AssessmentCriteria
No. Assessment Percentage
1. Mid Exam 20%
2. Final Exam 50%
3. Assignments 10%
4. Quizzes 10%
5. Presentation 5%
6. Project 5%
Total 100%
11- Attendance Requirements
You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other
classroom activity. Where you fail to attend classes, you cannot expect the lecturer to
brief you on what you have missed. You are responsible for your attendance, not the
academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and
failure to attend will be taken into account.
12- Submission and Collectionof Assignment
All assignments should be handed in at the beginning of the class sessions when they are
due. All assignments may be handed back during scheduled classes.
13- GeneralInformation
Students are required to be familiar with the university code Conduct, and to abide by its
terms and conditions.
13.1 Copying of Copyright Material by Student
A condition of acceptance as a student is the obligation to abide by the University’s
policy on the copying of copyright material. This obligation covers photocopying of any
material using the University’s photocopying machines, and the recording off air, and
making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
Students who flagrantly disregard University policy and copyright requirements will be
liable to disciplinary action under the Code of Conduct.
13.2 Academic Misconduct
Please refer to the Code of Conduct for definitions and penalties for Academic
Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty.
Academic honesty is crucial to a student's credibility and self-esteem, and ultimately
reflects the values and morals of the University as a whole. A student may work together
with one or a group of students discussing assignment content, identifying relevant
references, and debating issues relevant to the subject. Academic investigation is not
limited to the views and opinions of one individual, but is built by forming opinion based
on past and present work in the field. It is legitimate and appropriate to synthesize the
work of others, provided that such work is clearly and accurately referenced. Plagiarism
occurs when the work (including such things as text, figures, ideas, or conceptual
structure, whether verbatim or not) created by another person or persons is used and
presented as one’s own creation, unless the source of each quotation or piece of borrowed
material is acknowledged with an appropriate citation. Encouraging or assisting another
person to commit plagiarism is a form of improper collusion and may attract the same
penalties. To prevent Academic Misconduct occurring, students are expected to
familiarize themselves with the University policy, the Subject Outline statements, and
specific assignment guidelines.
13.3 Guidelines to Avoid Plagiarism
Whenever you copy more than a few words from any source, you must acknowledge that
source by putting the quote in quotation marks and providing the name of the author. Full
details must be provided in your bibliography. If you copy a diagram, statistical table,
map, etc., you must acknowledge the source. The recommended way is to show this
under the diagram. If you quote any statistics in your text, the source should be
acknowledged. Again full details must be provided in your bibliography. Whenever you
use the ideas of any other author you should acknowledge those, using the APA
(American Psychological Association) style of referencing.
Students are encouraged to co-operate, but collusion is a form of cheating. Students may
use any sources (acknowledged of course) other than the assignments of fellow students.
Unless your Subject Leader informs you otherwise, the following guideline should be
used: Students may work together in obtaining references, discussing the content of the
references and discussing the assignment, but when they write, they must write alone.
13.4 Referencing For Written Work
Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow
readers to access those others’ ideas. Referencing should:
1. Acknowledge others' ideas
2. Allow readers to find the source
3. Be consistent in format and
4. Acknowledge the source of the referencing format
To attain these qualities, the school recommends use of either the Harvard or American
Psychological Association style of referencing, both of which use the author/date.
13.5 Referencing Standards
APA style referencing
Approval
Prepared By :
Syed Saqib Raza Rizvi
Assistant Professor
(University Of Lahore)
Approved by,
Dr. Amin Ur Rehman
Course Mentor
Dept. Computer Science & IT

Más contenido relacionado

La actualidad más candente

COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
05 professional practice
05 professional practice05 professional practice
05 professional practiceSulman Ahmed
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw houseHamza Cheema
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONFAREED UR RAHMAN .
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptxTechBasti
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of EthicsSuji Priya J
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 

La actualidad más candente (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
05 professional practice
05 professional practice05 professional practice
05 professional practice
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTION
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 

Similar a Professional Practice Course Outline

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...ma7808766
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxReneeRosePaunil1
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docxalinainglis
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfhsingh5201
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degreesERAUWebinars
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxSANSKAR20
 
Ethical Issues in Computing.pptx
Ethical Issues in Computing.pptxEthical Issues in Computing.pptx
Ethical Issues in Computing.pptxTasnim
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
 
COA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for studentCOA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for studentmohitmehra75
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.docAvinash Avuthu
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxkaushalmunish77
 
SENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptxSENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptxVatsalPatel147291
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 

Similar a Professional Practice Course Outline (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdf
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Ethical Issues in Computing.pptx
Ethical Issues in Computing.pptxEthical Issues in Computing.pptx
Ethical Issues in Computing.pptx
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
COA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for studentCOA RKGITM #sem education purpose ppt good for student
COA RKGITM #sem education purpose ppt good for student
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.doc
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptx
 
SENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptxSENG8060_Lesson00_CourseInfo.pptx
SENG8060_Lesson00_CourseInfo.pptx
 
AIML-MODULE1.pdf
AIML-MODULE1.pdfAIML-MODULE1.pdf
AIML-MODULE1.pdf
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 

Más de Saqib Raza

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfSaqib Raza
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...Saqib Raza
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfSaqib Raza
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSaqib Raza
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering ProfessionSaqib Raza
 
6 software contracts
6 software contracts6 software contracts
6 software contractsSaqib Raza
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business EthicsSaqib Raza
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of EthicsSaqib Raza
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management ConceptsSaqib Raza
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-EngineeringSaqib Raza
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSaqib Raza
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design Saqib Raza
 
Architecture Design
Architecture DesignArchitecture Design
Architecture DesignSaqib Raza
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGSaqib Raza
 
Capability Maturity Model Integartion
Capability Maturity Model IntegartionCapability Maturity Model Integartion
Capability Maturity Model IntegartionSaqib Raza
 

Más de Saqib Raza (20)

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
12 security policies
12 security policies12 security policies
12 security policies
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Capability Maturity Model Integartion
Capability Maturity Model IntegartionCapability Maturity Model Integartion
Capability Maturity Model Integartion
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Último (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Professional Practice Course Outline

  • 1. THE UNIVERSITY OF LAHORE Course Outline FALL Semester September 2017 Session 2017-18 CS-3327 Professional Practices Effective Date: 18 September, 2017 SCU 3 Credit(s) Co-requisite (s) None Pre-requisite(s) Introduction to computing (CS-1010) Weekly tuition pattern 2 sessions (90 min session) Teaching Team Syed Saqib Raza Rizvi saqib.raza@cs.uol.edu.pk 1- Course Description A Computing graduate as professional has some responsibilities with respect to the society. This course develops student understanding about historical, social, economic, ethical, and professional issues related to the discipline of Computing. It identifies key sources for information and opinion about professionalism and ethics. Students analyze, evaluate, and assess ethical and professional computing case studies. 2- Objectives The course mainly aims to achieve the following objectives: 1. Defines that why students want to graduate in computing field and what are the common things in every organization? 2. Describe in detail the field of computing and its subfields. 3. Describes what a profession is and what makes a profession. 4. Define the structure and little history of the engineering. 5. Describes the professional ethics, definitions, types, and standards, and social responsibilities. 6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses. 7. Describe computer misuse act, intellectual property rights, and cyber law. 8. Describe the importance of information security and how we can secure it by using various methods.
  • 2. 9. Defines the need and brief introduction about the software contracts. 10. Defines the anatomy of software house organizations. 3- Student Learning Outcomes By the completion of this course, the students should able to: 1. Know the scope of computing field after graduating in it and what are the common things in every organization. 2. Distinguish between the various fields of computing. 3. Describe the core of any profession. 4. Know that how business and professional environment of computing field work. 5. Adhere his responsibilities according to profession, organization, and himself. 6. Know that how broadly code of ethics will affect his actions during employment. 7. Know the standards and rules about intellectual property, computer misuse, and cyber law. 8. Know the standards/tools/models/polices/principles to secure information. 9. Write and analyze software contracts as an employer or an employee. 10. Know the business and professional environment of software house. 4- Course Structure 1. Presentation by lecturer 2. Group discussion 3. Assignments 4. Presentations 5. Quiz 6. Mid Term and Final Term Exams 5- Course Duration This course will be held twice a week of 3 hours (each 60 min session) class duration. 6- Course style The course will be delivered in a classroom environment. 7- Additional Course Requirement In addition to the objectives of this course, students are expected to gain skills which would be needed in the professional work environment. These skills include but not limited to: Writing, Presentation, Decision Making and Teamwork. 8- Text and Other Resources 8.1 Text
  • 3. 1. Professional Issues in Software Engineering, M.F. Bott et al. 8.2 Other Resources 1. Information Security: Principles and Practices, Mark Merkow et al. 9- Course Outline The lecturers are supposed to complete the following topics/sub-topics before the mid/final term examination as prescribed in the course outline below: Week Lecture Topics/Sub-Topics Reading Material 1 1 Introduction to Ethics, Philosophies regarding to Ethics and morals, Introduction to Computer and Cyber Ethics 1. Intro to Ethics.ppt 2 Computer Ethics History, Sample Case studies, Ten commandments, Sample topics to study in this subject 1. Intro to Ethics.ppt 2 1 Types of Ethics, Relationship of different types of ethics Ethics ,Essential Components of Personal Ethics, ACM code of Conduct, Netiquette 2. Types of Ethics.ppt 2 Business Ethics, Relationship between law and ethics, Deontology theory, Unitarianism theory, Right Model 3. Business Ethics.ppt 3 1 Application of Deontology, Unitarianism theory, Right Model, Examples, Code of Conduct for Employees and Employers 3. Business Ethics.ppt 2 Definition of Cyber Crime, General Types of Cyber Crime, Cyber Crime Statistics 4. Cyber Ethics.ppt 4 1 Types of Cyber Crime Technically specified by Australian Institute of Criminology 4. Cyber Ethics.ppt 2 QUIZ-1, Intellectual Property, Categories of IP
  • 4. 5 1 World Intellectual PropertyOrganization 5. IP.ppt 2 Trade Secrets, Protection for Software Copyright, Violation of Software Copyright, 5. IP.ppt 6 1 Reverse Engineering, Open Source Software, Benefits of Open Source Software 5. IP.ppt 2 Introduction to Software Contracts, Structure of Software Contracts, Clauses of Software Contracts, Sample Software Agreement 6. Contracts.ppt 7 1 Introduction to Profession, History of Engineering Profession, Software House Structure 7. Profession.ppt 2 Common Roles in Software Organization QUIZ-II 8 1 MID TERMS2 9 1 Management Hierarchy, IT Organization Structure, Staff Management, Five Golden rules of Staff management 7. Profession.ppt 2 Definition of Team, Team Management, Four C’s of Team Management, Elements of Healthy Teams, Way to Inspire and Motivate team, Ethical issues in team management, Characteristics of High Performance Teams 8. Team Management.ppt 10 1 Stages of Team development, Barriers to Team Building, characteristics of High Performance Teams,How to manage conflicts in team, 8. Team Management.ppt 2 What is SEEP? Software Engineering Profession, Roles in Software Engineering Professions, Need of Code of Ethics 9. SEEP.ppt
  • 5. 11 1 Introduction to IEEE and ACM, Eight Principles Related to Software Engineering Code of Ethics and Profession Practice, Case Studies 9. SEEP.ppt 2 Definition of Software Risks, Introduction to Risk management, RM Strategies, Types of Risks, Categories of Risks 10. Risk Management.ppt 12 1 Steps of Risk Management, Risk Mitigation, Monitoring and Management Plan 10. Risk Management.ppt 2 Risk Mitigation, Monitoring and Management Plan QUIZ-III 13 1 Introduction to Computer Privacy, Email Privacy, TCP/IP and Security, Introduction to Encryption, Virus, Worms and Trojan Horses, Working of Anti-Virus Programs, Un-authorize access 11. Computer Security.ppt 2 Introduction to Firewalls, Bio-metric devices and security, Software theft, System failures and data backup policies 11. Computer Security.ppt 14 1 , Web browsers and data security, Privacy laws Content Filtering, Ergonomics, Green Computing, Potential Computer Risks and Security measures 11. Computer Security.ppt 2 Introduction to Security Policies, History of Information Security, Information Security policy life cycle, laws and regulations of Information Security, Standards of IS. 12. Information Security Policy 15 1 Basic Information Security Principles, Information Security Architecture 12. Information Security Policy 2 Policy and Process, Access Control, QUIZ-IV
  • 6. 16 1 Ethical Hacking, Types of Hackers, Model of Ethical Hacking, Process of Ethical Hacking, Ethical hacking Skills and knowledge 13. Ethical Hacking 2 Group Presentations 17 1 FINAL TERM EXAMINATION 2 10- AssessmentCriteria No. Assessment Percentage 1. Mid Exam 20% 2. Final Exam 50% 3. Assignments 10% 4. Quizzes 10% 5. Presentation 5% 6. Project 5% Total 100% 11- Attendance Requirements You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other classroom activity. Where you fail to attend classes, you cannot expect the lecturer to brief you on what you have missed. You are responsible for your attendance, not the academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and failure to attend will be taken into account. 12- Submission and Collectionof Assignment All assignments should be handed in at the beginning of the class sessions when they are due. All assignments may be handed back during scheduled classes. 13- GeneralInformation Students are required to be familiar with the university code Conduct, and to abide by its terms and conditions. 13.1 Copying of Copyright Material by Student A condition of acceptance as a student is the obligation to abide by the University’s policy on the copying of copyright material. This obligation covers photocopying of any material using the University’s photocopying machines, and the recording off air, and making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
  • 7. Students who flagrantly disregard University policy and copyright requirements will be liable to disciplinary action under the Code of Conduct. 13.2 Academic Misconduct Please refer to the Code of Conduct for definitions and penalties for Academic Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty. Academic honesty is crucial to a student's credibility and self-esteem, and ultimately reflects the values and morals of the University as a whole. A student may work together with one or a group of students discussing assignment content, identifying relevant references, and debating issues relevant to the subject. Academic investigation is not limited to the views and opinions of one individual, but is built by forming opinion based on past and present work in the field. It is legitimate and appropriate to synthesize the work of others, provided that such work is clearly and accurately referenced. Plagiarism occurs when the work (including such things as text, figures, ideas, or conceptual structure, whether verbatim or not) created by another person or persons is used and presented as one’s own creation, unless the source of each quotation or piece of borrowed material is acknowledged with an appropriate citation. Encouraging or assisting another person to commit plagiarism is a form of improper collusion and may attract the same penalties. To prevent Academic Misconduct occurring, students are expected to familiarize themselves with the University policy, the Subject Outline statements, and specific assignment guidelines. 13.3 Guidelines to Avoid Plagiarism Whenever you copy more than a few words from any source, you must acknowledge that source by putting the quote in quotation marks and providing the name of the author. Full details must be provided in your bibliography. If you copy a diagram, statistical table, map, etc., you must acknowledge the source. The recommended way is to show this under the diagram. If you quote any statistics in your text, the source should be acknowledged. Again full details must be provided in your bibliography. Whenever you use the ideas of any other author you should acknowledge those, using the APA (American Psychological Association) style of referencing. Students are encouraged to co-operate, but collusion is a form of cheating. Students may use any sources (acknowledged of course) other than the assignments of fellow students. Unless your Subject Leader informs you otherwise, the following guideline should be used: Students may work together in obtaining references, discussing the content of the references and discussing the assignment, but when they write, they must write alone. 13.4 Referencing For Written Work Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow readers to access those others’ ideas. Referencing should: 1. Acknowledge others' ideas 2. Allow readers to find the source 3. Be consistent in format and 4. Acknowledge the source of the referencing format
  • 8. To attain these qualities, the school recommends use of either the Harvard or American Psychological Association style of referencing, both of which use the author/date. 13.5 Referencing Standards APA style referencing Approval Prepared By : Syed Saqib Raza Rizvi Assistant Professor (University Of Lahore) Approved by, Dr. Amin Ur Rehman Course Mentor Dept. Computer Science & IT