OCCC Course List
From
m (→Course List) |
m (→Course List) |
||
Line 14: | Line 14: | ||
== Course List == | == Course List == | ||
<center> | <center> | ||
- | {| border="1" cellspacing="2" cellpadding="3" align="center" width="600 | + | {| border="1" cellspacing="2" cellpadding="3" align="center" width="600" |
|- | |- | ||
- | ! bgcolor="#336699" align="center" width="65" | '''<font color="#FFFFFF">Number</font>''' | + | ! bgcolor="#336699" align="center" width="65" | '''<font color="#FFFFFF">Number</font>''' |
- | ! bgcolor="#336699" align="center" width="211" | '''<font color="#FFFFFF">Title</font>''' | + | ! bgcolor="#336699" align="center" width="211" | '''<font color="#FFFFFF">Title</font>''' |
- | ! bgcolor="#336699" align="center" width="60" | '''<font color="#FFFFFF">Max.<br> Credits</font>''' | + | ! bgcolor="#336699" align="center" width="60" | '''<font color="#FFFFFF">Max.<br> Credits</font>''' |
- | ! bgcolor="#336699" align="center" width="76" | '''<font color="#FFFFFF">Date<br> Approved</font>''' | + | ! bgcolor="#336699" align="center" width="76" | '''<font color="#FFFFFF">Date<br> Approved</font>''' |
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 100 | + | | align="center" width="65" bgcolor="#CCCCCC" | 100 |
- | | align="center" width="211" bgcolor="#CCCCCC" | Computer Careers Exploration | + | | align="center" width="211" bgcolor="#CCCCCC" | Computer Careers Exploration |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 10/19/01 | + | | align="center" width="76" bgcolor="#CCCCCC" | 10/19/01 |
|- | |- | ||
| align="center" width="65" | | | align="center" width="65" | | ||
Line 173: | Line 173: | ||
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 151(c) | + | | align="center" width="65" bgcolor="#CCCCCC" | 151(c) |
- | | align="center" width="211" bgcolor="#CCCCCC" | Network Essentials | + | | align="center" width="211" bgcolor="#CCCCCC" | Network Essentials |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#FFFFFF" | 152(c) | + | | align="center" width="65" bgcolor="#FFFFFF" | 152(c) |
- | | align="center" width="211" bgcolor="#FFFFFF" | Network Router Configurations | + | | align="center" width="211" bgcolor="#FFFFFF" | Network Router Configurations |
- | | align="center" width="60" bgcolor="#FFFFFF" | 4 | + | | align="center" width="60" bgcolor="#FFFFFF" | 4 |
- | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 | + | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 153(c) | + | | align="center" width="65" bgcolor="#CCCCCC" | 153(c) |
- | | align="center" width="211" bgcolor="#CCCCCC" | LAN's and Internetwork Design | + | | align="center" width="211" bgcolor="#CCCCCC" | LAN's and Internetwork Design |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#FFFFFF" | 154(c) | + | | align="center" width="65" bgcolor="#FFFFFF" | 154(c) |
- | | align="center" width="211" bgcolor="#FFFFFF" | WAN Design | + | | align="center" width="211" bgcolor="#FFFFFF" | WAN Design |
- | | align="center" width="60" bgcolor="#FFFFFF" | 4 | + | | align="center" width="60" bgcolor="#FFFFFF" | 4 |
- | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 | + | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 155(c) | + | | align="center" width="65" bgcolor="#CCCCCC" | 155(c) |
- | | align="center" width="211" bgcolor="#CCCCCC" | Advanced Routing Configuration | + | | align="center" width="211" bgcolor="#CCCCCC" | Advanced Routing Configuration |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#FFFFFF" | 156(c) | + | | align="center" width="65" bgcolor="#FFFFFF" | 156(c) |
- | | align="center" width="211" bgcolor="#FFFFFF" | Remote-Access Networks | + | | align="center" width="211" bgcolor="#FFFFFF" | Remote-Access Networks |
- | | align="center" width="60" bgcolor="#FFFFFF" | 4 | + | | align="center" width="60" bgcolor="#FFFFFF" | 4 |
- | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 | + | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 157(c) | + | | align="center" width="65" bgcolor="#CCCCCC" | 157(c) |
- | | align="center" width="211" bgcolor="#CCCCCC" | Multi-Layer Switching | + | | align="center" width="211" bgcolor="#CCCCCC" | Multi-Layer Switching |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#FFFFFF" | 158(c) | + | | align="center" width="65" bgcolor="#FFFFFF" | 158(c) |
- | | align="center" width="211" bgcolor="#FFFFFF" | Network Troubleshooting | + | | align="center" width="211" bgcolor="#FFFFFF" | Network Troubleshooting |
- | | align="center" width="60" bgcolor="#FFFFFF" | 4 | + | | align="center" width="60" bgcolor="#FFFFFF" | 4 |
- | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 | + | | align="center" width="76" bgcolor="#FFFFFF" | 11/1/02 |
|- | |- | ||
| align="center" width="65" bgcolor="#CCCCCC" | | | align="center" width="65" bgcolor="#CCCCCC" | | ||
Line 227: | Line 227: | ||
|- | |- | ||
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
- | + | <br> <font color="#FF0000">'''161'''</font> | |
- | + | ||
- | <font color="#FF0000">'''161'''</font> | + | |
| align="center" width="211" bgcolor="#FFFFFF" | | | align="center" width="211" bgcolor="#FFFFFF" | | ||
- | + | <br> <font color="#FF0000">'''Computer Science I'''</font> | |
- | + | ||
- | <font color="#FF0000">'''Computer Science I'''</font> | + | |
| align="center" width="60" bgcolor="#FFFFFF" | | | align="center" width="60" bgcolor="#FFFFFF" | | ||
- | + | <br> <font color="#FF0000">'''4'''</font> | |
- | + | ||
- | <font color="#FF0000">'''4'''</font> | + | |
| align="center" width="76" bgcolor="#FFFFFF" | | | align="center" width="76" bgcolor="#FFFFFF" | | ||
- | + | <br> <font color="#FF0000">'''3/3/89'''</font> | |
- | + | ||
- | <font color="#FF0000">'''3/3/89'''</font> | + | |
|- | |- | ||
Line 264: | Line 256: | ||
| align="center" width="211" bgcolor="#FFFFFF" | | | align="center" width="211" bgcolor="#FFFFFF" | | ||
- | '''<font color="#FF0000">Assembly Language | + | '''<font color="#FF0000">Assembly Language Programming</font> |
| align="center" width="60" bgcolor="#FFFFFF" | | | align="center" width="60" bgcolor="#FFFFFF" | | ||
Line 312: | Line 304: | ||
|- | |- | ||
- | | bgcolor="#FFFFFF" | 184 | + | | bgcolor="#FFFFFF" | 184 |
- | | bgcolor="#FFFFFF" | Workstation Security | + | | bgcolor="#FFFFFF" | Workstation Security |
- | | bgcolor="#FFFFFF" | 4 | + | | bgcolor="#FFFFFF" | 4 |
- | | bgcolor="#FFFFFF" | 10/20/06 | + | | bgcolor="#FFFFFF" | 10/20/06 |
|- | |- | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 185 | + | | align="center" width="65" bgcolor="#CCCCCC" | 185 |
- | | align="center" width="211" bgcolor="#CCCCCC" | Computer Ethics | + | | align="center" width="211" bgcolor="#CCCCCC" | Computer Ethics |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 188 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | Wireless I |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 4 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 4/25/03 |
|- | |- | ||
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 189 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Wireless II |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4/25/03 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
195 | 195 | ||
Line 347: | Line 339: | ||
|- | |- | ||
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 196 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Web Authoring II |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 10/24/08 |
|- | |- | ||
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 197x |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | Web Authoring III |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 1-4 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 10/24/08 |
|- | |- | ||
| align="center" width="65" bgcolor="#CCCCCC" | | | align="center" width="65" bgcolor="#CCCCCC" | | ||
Line 383: | Line 375: | ||
|- | |- | ||
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 200 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Computer Systems I |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 5/7/04 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 201 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | Computer Systems II |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 4 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 5/7/04 |
|- | |- | ||
| align="center" width="65" bgcolor="#CCCCCC" | | | align="center" width="65" bgcolor="#CCCCCC" | | ||
Line 449: | Line 441: | ||
| align="center" width="211" bgcolor="#CCCCCC" | | | align="center" width="211" bgcolor="#CCCCCC" | | ||
- | '''<font color="#FF0000">Computer Languages | + | '''<font color="#FF0000">Computer Languages II</font> |
| align="center" width="60" bgcolor="#CCCCCC" | | | align="center" width="60" bgcolor="#CCCCCC" | | ||
Line 501: | Line 493: | ||
| align="center" width="211" bgcolor="#CCCCCC" | | | align="center" width="211" bgcolor="#CCCCCC" | | ||
- | Essentials of Information Systems / | + | Essentials of Information Systems / |
E-Commerce | E-Commerce | ||
Line 525: | Line 517: | ||
|- | |- | ||
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 245 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Project Management |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 10/21/05 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
246 | 246 | ||
Line 620: | Line 612: | ||
10/16/92 | 10/16/92 | ||
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 253 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Computation for Computer Graphics |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 11/2/07 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
<font color="#FF0000">'''260'''</font> | <font color="#FF0000">'''260'''</font> | ||
Line 691: | Line 683: | ||
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 277x | + | | align="center" width="65" bgcolor="#CCCCCC" | 277x |
- | | align="center" width="211" bgcolor="#CCCCCC" | Advanced Database Topics | + | | align="center" width="211" bgcolor="#CCCCCC" | Advanced Database Topics |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 | + | | align="center" width="76" bgcolor="#CCCCCC" | 11/1/02 |
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
Line 713: | Line 705: | ||
| align="center" width="211" bgcolor="#CCCCCC" | | | align="center" width="211" bgcolor="#CCCCCC" | | ||
- | Network Management | + | Network Management I |
- | + | ||
- | I | + | |
| align="center" width="60" bgcolor="#CCCCCC" | | | align="center" width="60" bgcolor="#CCCCCC" | | ||
Line 763: | Line 753: | ||
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 285 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Network Security II |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 10/24/03 |
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 286 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | Network Security III |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 4 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 10/24/03 |
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
- | | align="center" width="65" bgcolor="#CCCCCC" | 287x | + | | align="center" width="65" bgcolor="#CCCCCC" | 287x |
- | | align="center" width="211" bgcolor="#CCCCCC" | Network Applications | + | | align="center" width="211" bgcolor="#CCCCCC" | Network Applications |
- | | align="center" width="60" bgcolor="#CCCCCC" | 4 | + | | align="center" width="60" bgcolor="#CCCCCC" | 4 |
- | | align="center" width="76" bgcolor="#CCCCCC" | 10/19/01 | + | | align="center" width="76" bgcolor="#CCCCCC" | 10/19/01 |
|- bgcolor="#CCCCCC" | |- bgcolor="#CCCCCC" | ||
| align="center" width="65" bgcolor="#FFFFFF" | | | align="center" width="65" bgcolor="#FFFFFF" | | ||
Line 816: | Line 806: | ||
10/24/97 | 10/24/97 | ||
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 296 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | Web Development II |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 4 |
- | | bgcolor="#CCCCCC" align="center" | + | | bgcolor="#CCCCCC" align="center" | 10/24/08 |
- | |- bgcolor="#CCCCCC" align="center" | + | |- bgcolor="#CCCCCC" align="center" |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 297 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | Capstone |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 4 |
- | | bgcolor="#FFFFFF" align="center" | + | | bgcolor="#FFFFFF" align="center" | 10/21/05 |
|- | |- | ||
| align="center" width="65" bgcolor="#CCCCCC" | | | align="center" width="65" bgcolor="#CCCCCC" | |
Revision as of 23:10, 24 April 2010
One of the tasks/goals of the OCCC is the development, maintenance, and coordination of a list of common course numberings. Below is the current list of courses. The following link (a Word document) provides current offerings at each of the Oregon Community Colleges. Course Crosswalk (8/24/2005)
The following list of computer courses has meet the approval of the OCCC. Course numbers ending with the 'x' suffix means that a college may attach their own letter(s) to signify the application or language being taught. The course prefix may also vary slightly, depending on individual college requirements (see note below), but should signify the Computer Science or Computer Information Systems discipline. 200-level courses are considered to have a 100-level course(s) prerequisite.
Courses in RED have been approved for the "AAOT" and the "Oregon Transfer Module" Science/Mathematics/Computer Science distribution requirement as non-lab science courses. All other courses may be used as general electives. [approved: 10/21/2005]
A definition of Computer Literacy as been approved as the competencies and outcomes specified by the IC3 (Internet and Computing Core Certification). It was also approved that CS/CIS 120 is to be the course that will include these competencies and outcomes. [approved: 10/21/2005]
2003 Agreement on CIS/CS listings
Course List
Number | Title | Max. Credits |
Date Approved |
---|---|---|---|
100 | Computer Careers Exploration | 4 | 10/19/01 |
101 |
Computer Fundamentals I |
4 |
10/26/89 |
102x |
Computer Fundamentals II |
4 |
10/26/89 |
103 |
Computer Fundamentals III |
4 |
10/26/89 |
120 |
Digital Literacy |
4 |
3/3/89 10/24/08 |
122 |
Introduction to Programming Concepts |
4 |
3/3/89 10/24/08 |
125x |
Software Applications |
4 |
5/4/90 |
131 |
Intro. to Business Computing |
4 |
10/13/89 |
133x |
Computer Language I |
4 |
2/23/90 |
135x |
Advanced Software Applications |
4 |
5/4/90 |
140x |
Intro. to Operating Systems |
4 |
2/23/90 |
145 |
Hardware Installation Support |
4 |
5/4/90 |
151(c) | Network Essentials | 4 | 11/1/02 |
152(c) | Network Router Configurations | 4 | 11/1/02 |
153(c) | LAN's and Internetwork Design | 4 | 11/1/02 |
154(c) | WAN Design | 4 | 11/1/02 |
155(c) | Advanced Routing Configuration | 4 | 11/1/02 |
156(c) | Remote-Access Networks | 4 | 11/1/02 |
157(c) | Multi-Layer Switching | 4 | 11/1/02 |
158(c) | Network Troubleshooting | 4 | 11/1/02 |
160 |
Introduction/Orientation/Survey of Computer Science |
4 |
4/22/99 |
|
|
|
|
162 |
Computer Science II |
4 |
3/3/89 |
171 |
Assembly Language Programming |
4 |
3/3/89 |
178 |
Introduction to Internet |
4 |
10/21/94 |
179 |
Introduction to Networks |
4 |
10/21/94 |
180 |
Supervised CS/CIS Practicum |
4 |
10/23/98 |
184 | Workstation Security | 4 | 10/20/06 |
185 | Computer Ethics | 4 | 11/1/02 |
188 | Wireless I | 4 | 4/25/03 |
189 | Wireless II | 4 | 4/25/03 |
195 |
Web Authoring I |
4 |
5/12/00 10/24/08 |
196 | Web Authoring II | 4 | 10/24/08 |
197x | Web Authoring III | 1-4 | 10/24/08 |
198 |
Independent Study |
4 |
4/9/93 |
199 |
Special Studies |
4 |
2/23/90 |
200 | Computer Systems I | 4 | 5/7/04 |
201 | Computer Systems II | 4 | 5/7/04 |
225 |
Computer End-User Support I |
4 |
5/4/90 |
226 |
Computer End-User Support II |
4 |
4/21/95 |
227x |
System Support I |
4 |
10/13/96 |
228x |
System Support II |
4 |
10/25/96 |
233x |
Computer Languages II |
4 |
2/23/90 |
234x |
Computer Languages III |
4 |
2/23/90 |
235x |
Advanced Software Applications |
4 |
4/22/99 |
240x |
Advanced Operating Systems |
4 |
2/23/90 |
243 |
Essentials of Information Systems / E-Commerce |
4 |
4/22/99 |
244 |
Systems Analysis |
4 |
2/23/90 |
245 | Project Management | 4 | 10/21/05 |
246 |
Systems Design |
4 |
2/23/90 |
247 |
Information Analysis |
4 |
10/24/97 |
248 |
UNIX/C |
4 |
2/23/90 |
249 |
Advanced UNIX/C |
4 |
2/23/90 |
250 |
Discrete Structures |
4 |
10/16/92 |
251 |
Logical Structures |
4 |
10/16/92 |
252 |
Computational Structures |
4 |
10/16/92 |
253 | Computation for Computer Graphics | 4 | 11/2/07 |
260 |
Data Structures |
4 |
3/3/89 |
261 |
Programming Systems |
4 |
10/24/97 |
271 |
Computer Architecture |
4 |
3/3/89 |
275 |
Database I |
4 |
2/23/90 |
276 |
Database II |
4 |
4/10/96 |
277x | Advanced Database Topics | 4 | 11/1/02 |
278 |
Data Communications |
4 |
2/23/90 |
279 |
Network Management I |
4 |
2/23/90 |
280 |
CWE Computer Science |
4 |
2/23/90 |
281 |
Robotics |
4 |
4/25/03 |
284 |
Network Security I |
4 |
10/24/03 |
285 | Network Security II | 4 | 10/24/03 |
286 | Network Security III | 4 | 10/24/03 |
287x | Network Applications | 4 | 10/19/01 |
288 |
Network Management II |
4 |
10/21/94 |
289x |
Advanced Network Topics |
4 |
10/23/98 |
295 |
Web Development I |
4 |
10/24/97 |
296 | Web Development II | 4 | 10/24/08 |
297 | Capstone | 4 | 10/21/05 |
298 |
Independent Research |
4 |
2/23/90 |
299 |
Special Topics |
4 |
2/23/90 |