OCCC Course List

From

(Difference between revisions)
Jump to: navigation, search
m (Course List)
m (Course List)
Line 14: Line 14:
== Course List ==
== Course List ==
<center>
<center>
-
{| border="1" cellspacing="2" cellpadding="3" align="center" width="600" align="center"
+
{| border="1" cellspacing="2" cellpadding="3" align="center" width="600"
|-
|-
-
! bgcolor="#336699" align="center" width="65" | '''<font color="#FFFFFF">Number</font>'''  
+
! bgcolor="#336699" align="center" width="65" | '''<font color="#FFFFFF">Number</font>'''
-
! bgcolor="#336699" align="center" width="211" | '''<font color="#FFFFFF">Title</font>'''  
+
! bgcolor="#336699" align="center" width="211" | '''<font color="#FFFFFF">Title</font>'''
-
! bgcolor="#336699" align="center" width="60" | '''<font color="#FFFFFF">Max.<br> Credits</font>'''  
+
! bgcolor="#336699" align="center" width="60" | '''<font color="#FFFFFF">Max.<br> Credits</font>'''
-
! bgcolor="#336699" align="center" width="76" | '''<font color="#FFFFFF">Date<br> Approved</font>'''  
+
! bgcolor="#336699" align="center" width="76" | '''<font color="#FFFFFF">Date<br> Approved</font>'''
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 100  
+
| align="center" width="65" bgcolor="#CCCCCC" | 100
-
| align="center" width="211" bgcolor="#CCCCCC" | Computer Careers Exploration  
+
| align="center" width="211" bgcolor="#CCCCCC" | Computer Careers Exploration
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 10/19/01  
+
| align="center" width="76" bgcolor="#CCCCCC" | 10/19/01
|-
|-
| align="center" width="65" |  
| align="center" width="65" |  
Line 173: Line 173:
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 151(c)  
+
| align="center" width="65" bgcolor="#CCCCCC" | 151(c)
-
| align="center" width="211" bgcolor="#CCCCCC" | Network Essentials  
+
| align="center" width="211" bgcolor="#CCCCCC" | Network Essentials
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#FFFFFF" | 152(c)  
+
| align="center" width="65" bgcolor="#FFFFFF" | 152(c)
-
| align="center" width="211" bgcolor="#FFFFFF" | Network Router Configurations  
+
| align="center" width="211" bgcolor="#FFFFFF" | Network Router Configurations
-
| align="center" width="60" bgcolor="#FFFFFF" | 4  
+
| align="center" width="60" bgcolor="#FFFFFF" | 4
-
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02  
+
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 153(c)  
+
| align="center" width="65" bgcolor="#CCCCCC" | 153(c)
-
| align="center" width="211" bgcolor="#CCCCCC" | LAN's and Internetwork Design  
+
| align="center" width="211" bgcolor="#CCCCCC" | LAN's and Internetwork Design
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#FFFFFF" | 154(c)  
+
| align="center" width="65" bgcolor="#FFFFFF" | 154(c)
-
| align="center" width="211" bgcolor="#FFFFFF" | WAN Design  
+
| align="center" width="211" bgcolor="#FFFFFF" | WAN Design
-
| align="center" width="60" bgcolor="#FFFFFF" | 4  
+
| align="center" width="60" bgcolor="#FFFFFF" | 4
-
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02  
+
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 155(c)  
+
| align="center" width="65" bgcolor="#CCCCCC" | 155(c)
-
| align="center" width="211" bgcolor="#CCCCCC" | Advanced Routing Configuration  
+
| align="center" width="211" bgcolor="#CCCCCC" | Advanced Routing Configuration
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#FFFFFF" | 156(c)  
+
| align="center" width="65" bgcolor="#FFFFFF" | 156(c)
-
| align="center" width="211" bgcolor="#FFFFFF" | Remote-Access Networks  
+
| align="center" width="211" bgcolor="#FFFFFF" | Remote-Access Networks
-
| align="center" width="60" bgcolor="#FFFFFF" | 4  
+
| align="center" width="60" bgcolor="#FFFFFF" | 4
-
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02  
+
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 157(c)  
+
| align="center" width="65" bgcolor="#CCCCCC" | 157(c)
-
| align="center" width="211" bgcolor="#CCCCCC" | Multi-Layer Switching  
+
| align="center" width="211" bgcolor="#CCCCCC" | Multi-Layer Switching
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
|-
|-
-
| align="center" width="65" bgcolor="#FFFFFF" | 158(c)  
+
| align="center" width="65" bgcolor="#FFFFFF" | 158(c)
-
| align="center" width="211" bgcolor="#FFFFFF" | Network Troubleshooting  
+
| align="center" width="211" bgcolor="#FFFFFF" | Network Troubleshooting
-
| align="center" width="60" bgcolor="#FFFFFF" | 4  
+
| align="center" width="60" bgcolor="#FFFFFF" | 4
-
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02  
+
| align="center" width="76" bgcolor="#FFFFFF" | 11/1/02
|-
|-
| align="center" width="65" bgcolor="#CCCCCC" |  
| align="center" width="65" bgcolor="#CCCCCC" |  
Line 227: Line 227:
|-
|-
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
-
 
+
<br> <font color="#FF0000">'''161'''</font>
-
 
+
-
<font color="#FF0000">'''161'''</font>
+
| align="center" width="211" bgcolor="#FFFFFF" |  
| align="center" width="211" bgcolor="#FFFFFF" |  
-
 
+
<br> <font color="#FF0000">'''Computer Science I'''</font>
-
 
+
-
<font color="#FF0000">'''Computer Science I'''</font>
+
| align="center" width="60" bgcolor="#FFFFFF" |  
| align="center" width="60" bgcolor="#FFFFFF" |  
-
 
+
<br> <font color="#FF0000">'''4'''</font>
-
 
+
-
<font color="#FF0000">'''4'''</font>
+
| align="center" width="76" bgcolor="#FFFFFF" |  
| align="center" width="76" bgcolor="#FFFFFF" |  
-
 
+
<br> <font color="#FF0000">'''3/3/89'''</font>
-
 
+
-
<font color="#FF0000">'''3/3/89'''</font>
+
|-
|-
Line 264: Line 256:
| align="center" width="211" bgcolor="#FFFFFF" |  
| align="center" width="211" bgcolor="#FFFFFF" |  
-
'''<font color="#FF0000">Assembly Language&nbsp;</font>''''''<font color="#FF0000">Programming</font>'''
+
'''<font color="#FF0000">Assembly Language&nbsp;Programming</font>
| align="center" width="60" bgcolor="#FFFFFF" |  
| align="center" width="60" bgcolor="#FFFFFF" |  
Line 312: Line 304:
|-
|-
-
| bgcolor="#FFFFFF" | 184  
+
| bgcolor="#FFFFFF" | 184
-
| bgcolor="#FFFFFF" | Workstation Security  
+
| bgcolor="#FFFFFF" | Workstation Security
-
| bgcolor="#FFFFFF" | 4  
+
| bgcolor="#FFFFFF" | 4
-
| bgcolor="#FFFFFF" | 10/20/06  
+
| bgcolor="#FFFFFF" | 10/20/06
|-
|-
-
| align="center" width="65" bgcolor="#CCCCCC" | 185  
+
| align="center" width="65" bgcolor="#CCCCCC" | 185
-
| align="center" width="211" bgcolor="#CCCCCC" | Computer Ethics  
+
| align="center" width="211" bgcolor="#CCCCCC" | Computer Ethics
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
-
| bgcolor="#FFFFFF" align="center" | 188  
+
| bgcolor="#FFFFFF" align="center" | 188
-
| bgcolor="#FFFFFF" align="center" | Wireless I  
+
| bgcolor="#FFFFFF" align="center" | Wireless I
-
| bgcolor="#FFFFFF" align="center" | 4  
+
| bgcolor="#FFFFFF" align="center" | 4
-
| bgcolor="#FFFFFF" align="center" | 4/25/03  
+
| bgcolor="#FFFFFF" align="center" | 4/25/03
|-
|-
-
| bgcolor="#CCCCCC" align="center" | 189  
+
| bgcolor="#CCCCCC" align="center" | 189
-
| bgcolor="#CCCCCC" align="center" | Wireless II  
+
| bgcolor="#CCCCCC" align="center" | Wireless II
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 4/25/03  
+
| bgcolor="#CCCCCC" align="center" | 4/25/03
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
195
195
Line 347: Line 339:
|-
|-
-
| bgcolor="#CCCCCC" align="center" | 196  
+
| bgcolor="#CCCCCC" align="center" | 196
-
| bgcolor="#CCCCCC" align="center" | Web Authoring II  
+
| bgcolor="#CCCCCC" align="center" | Web Authoring II
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 10/24/08  
+
| bgcolor="#CCCCCC" align="center" | 10/24/08
|-
|-
-
| bgcolor="#FFFFFF" align="center" | 197x  
+
| bgcolor="#FFFFFF" align="center" | 197x
-
| bgcolor="#FFFFFF" align="center" | Web Authoring III  
+
| bgcolor="#FFFFFF" align="center" | Web Authoring III
-
| bgcolor="#FFFFFF" align="center" | 1-4  
+
| bgcolor="#FFFFFF" align="center" | 1-4
-
| bgcolor="#FFFFFF" align="center" | 10/24/08  
+
| bgcolor="#FFFFFF" align="center" | 10/24/08
|-
|-
| align="center" width="65" bgcolor="#CCCCCC" |  
| align="center" width="65" bgcolor="#CCCCCC" |  
Line 383: Line 375:
|-
|-
-
| bgcolor="#CCCCCC" align="center" | 200  
+
| bgcolor="#CCCCCC" align="center" | 200
-
| bgcolor="#CCCCCC" align="center" | Computer Systems I  
+
| bgcolor="#CCCCCC" align="center" | Computer Systems I
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 5/7/04  
+
| bgcolor="#CCCCCC" align="center" | 5/7/04
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
-
| bgcolor="#FFFFFF" align="center" | 201  
+
| bgcolor="#FFFFFF" align="center" | 201
-
| bgcolor="#FFFFFF" align="center" | Computer Systems II  
+
| bgcolor="#FFFFFF" align="center" | Computer Systems II
-
| bgcolor="#FFFFFF" align="center" | 4  
+
| bgcolor="#FFFFFF" align="center" | 4
-
| bgcolor="#FFFFFF" align="center" | 5/7/04  
+
| bgcolor="#FFFFFF" align="center" | 5/7/04
|-
|-
| align="center" width="65" bgcolor="#CCCCCC" |  
| align="center" width="65" bgcolor="#CCCCCC" |  
Line 449: Line 441:
| align="center" width="211" bgcolor="#CCCCCC" |  
| align="center" width="211" bgcolor="#CCCCCC" |  
-
'''<font color="#FF0000">Computer Languages&nbsp;</font>''''''<font color="#FF0000">II</font>'''
+
'''<font color="#FF0000">Computer Languages&nbsp;II</font>
| align="center" width="60" bgcolor="#CCCCCC" |  
| align="center" width="60" bgcolor="#CCCCCC" |  
Line 501: Line 493:
| align="center" width="211" bgcolor="#CCCCCC" |  
| align="center" width="211" bgcolor="#CCCCCC" |  
-
Essentials of Information&nbsp;Systems /  
+
Essentials of Information&nbsp;Systems /
E-Commerce
E-Commerce
Line 525: Line 517:
|-
|-
-
| bgcolor="#CCCCCC" align="center" | 245  
+
| bgcolor="#CCCCCC" align="center" | 245
-
| bgcolor="#CCCCCC" align="center" | Project Management  
+
| bgcolor="#CCCCCC" align="center" | Project Management
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 10/21/05  
+
| bgcolor="#CCCCCC" align="center" | 10/21/05
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
246
246
Line 620: Line 612:
10/16/92
10/16/92
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
-
| bgcolor="#CCCCCC" align="center" | 253  
+
| bgcolor="#CCCCCC" align="center" | 253
-
| bgcolor="#CCCCCC" align="center" | Computation for Computer Graphics  
+
| bgcolor="#CCCCCC" align="center" | Computation for Computer Graphics
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 11/2/07  
+
| bgcolor="#CCCCCC" align="center" | 11/2/07
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
<font color="#FF0000">'''260'''</font>
<font color="#FF0000">'''260'''</font>
Line 691: Line 683:
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
-
| align="center" width="65" bgcolor="#CCCCCC" | 277x  
+
| align="center" width="65" bgcolor="#CCCCCC" | 277x
-
| align="center" width="211" bgcolor="#CCCCCC" | Advanced Database Topics  
+
| align="center" width="211" bgcolor="#CCCCCC" | Advanced Database Topics
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02  
+
| align="center" width="76" bgcolor="#CCCCCC" | 11/1/02
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
Line 713: Line 705:
| align="center" width="211" bgcolor="#CCCCCC" |  
| align="center" width="211" bgcolor="#CCCCCC" |  
-
Network Management
+
Network Management&nbsp;I
-
 
+
-
I
+
| align="center" width="60" bgcolor="#CCCCCC" |  
| align="center" width="60" bgcolor="#CCCCCC" |  
Line 763: Line 753:
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
-
| bgcolor="#CCCCCC" align="center" | 285  
+
| bgcolor="#CCCCCC" align="center" | 285
-
| bgcolor="#CCCCCC" align="center" | Network Security II  
+
| bgcolor="#CCCCCC" align="center" | Network Security II
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 10/24/03  
+
| bgcolor="#CCCCCC" align="center" | 10/24/03
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
-
| bgcolor="#FFFFFF" align="center" | 286  
+
| bgcolor="#FFFFFF" align="center" | 286
-
| bgcolor="#FFFFFF" align="center" | Network Security III  
+
| bgcolor="#FFFFFF" align="center" | Network Security III
-
| bgcolor="#FFFFFF" align="center" | 4  
+
| bgcolor="#FFFFFF" align="center" | 4
-
| bgcolor="#FFFFFF" align="center" | 10/24/03  
+
| bgcolor="#FFFFFF" align="center" | 10/24/03
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
-
| align="center" width="65" bgcolor="#CCCCCC" | 287x  
+
| align="center" width="65" bgcolor="#CCCCCC" | 287x
-
| align="center" width="211" bgcolor="#CCCCCC" | Network Applications  
+
| align="center" width="211" bgcolor="#CCCCCC" | Network Applications
-
| align="center" width="60" bgcolor="#CCCCCC" | 4  
+
| align="center" width="60" bgcolor="#CCCCCC" | 4
-
| align="center" width="76" bgcolor="#CCCCCC" | 10/19/01  
+
| align="center" width="76" bgcolor="#CCCCCC" | 10/19/01
|- bgcolor="#CCCCCC"
|- bgcolor="#CCCCCC"
| align="center" width="65" bgcolor="#FFFFFF" |  
| align="center" width="65" bgcolor="#FFFFFF" |  
Line 816: Line 806:
10/24/97
10/24/97
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
-
| bgcolor="#CCCCCC" align="center" | 296  
+
| bgcolor="#CCCCCC" align="center" | 296
-
| bgcolor="#CCCCCC" align="center" | Web Development II  
+
| bgcolor="#CCCCCC" align="center" | Web Development II
-
| bgcolor="#CCCCCC" align="center" | 4  
+
| bgcolor="#CCCCCC" align="center" | 4
-
| bgcolor="#CCCCCC" align="center" | 10/24/08  
+
| bgcolor="#CCCCCC" align="center" | 10/24/08
-
|- bgcolor="#CCCCCC" align="center"  
+
|- bgcolor="#CCCCCC" align="center"
-
| bgcolor="#FFFFFF" align="center" | 297  
+
| bgcolor="#FFFFFF" align="center" | 297
-
| bgcolor="#FFFFFF" align="center" | Capstone  
+
| bgcolor="#FFFFFF" align="center" | Capstone
-
| bgcolor="#FFFFFF" align="center" | 4  
+
| bgcolor="#FFFFFF" align="center" | 4
-
| bgcolor="#FFFFFF" align="center" | 10/21/05  
+
| bgcolor="#FFFFFF" align="center" | 10/21/05
|-
|-
| align="center" width="65" bgcolor="#CCCCCC" |  
| align="center" width="65" bgcolor="#CCCCCC" |  

Revision as of 23:10, 24 April 2010


One of the tasks/goals of the OCCC is the development, maintenance, and coordination of a list of common course numberings. Below is the current list of courses. The following link (a Word document) provides current offerings at each of the Oregon Community Colleges. Course Crosswalk (8/24/2005)

The following list of computer courses has meet the approval of the OCCC. Course numbers ending with the 'x' suffix means that a college may attach their own letter(s) to signify the application or language being taught. The course prefix may also vary slightly, depending on individual college requirements (see note below), but should signify the Computer Science or Computer Information Systems discipline. 200-level courses are considered to have a 100-level course(s) prerequisite.

Courses in RED have been approved for the "AAOT" and the "Oregon Transfer Module" Science/Mathematics/Computer Science distribution requirement as non-lab science courses. All other courses may be used as general electives. [approved: 10/21/2005]

A definition of Computer Literacy as been approved as the competencies and outcomes specified by the IC3 (Internet and Computing Core Certification). It was also approved that CS/CIS 120 is to be the course that will include these competencies and outcomes. [approved: 10/21/2005]

2003 Agreement on CIS/CS listings

Course List

Number Title Max.
Credits
Date
Approved
100 Computer Careers Exploration 4 10/19/01

101

Computer Fundamentals I

4

10/26/89

102x

Computer Fundamentals II

4

10/26/89

103

Computer Fundamentals III

4

10/26/89

120

Digital Literacy

4

3/3/89

10/24/08

122

Introduction to Programming Concepts

4

3/3/89

10/24/08

125x

Software Applications

4

5/4/90

131

Intro. to Business Computing

4

10/13/89

 133x

Computer Language I

4

2/23/90

135x

Advanced Software Applications

4

5/4/90

140x 

Intro. to Operating Systems

4

2/23/90

145

Hardware Installation Support

4

5/4/90

151(c) Network Essentials 4 11/1/02
152(c) Network Router Configurations 4 11/1/02
153(c) LAN's and Internetwork Design 4 11/1/02
154(c) WAN Design 4 11/1/02
155(c) Advanced Routing Configuration 4 11/1/02
156(c) Remote-Access Networks 4 11/1/02
157(c) Multi-Layer Switching 4 11/1/02
158(c) Network Troubleshooting 4 11/1/02

160

Introduction/Orientation/Survey of Computer Science

4

4/22/99


161


Computer Science I


4


3/3/89

162

Computer Science II

4

3/3/89

171

Assembly Language Programming

4

3/3/89

178

Introduction to Internet

4

10/21/94

179

Introduction to Networks

4

10/21/94

180

Supervised CS/CIS Practicum

4

10/23/98

184 Workstation Security 4 10/20/06
185 Computer Ethics 4 11/1/02
188 Wireless I 4 4/25/03
189 Wireless II 4 4/25/03

195

Web Authoring I

4

5/12/00

10/24/08

196 Web Authoring II 4 10/24/08
197x Web Authoring III 1-4 10/24/08

198

Independent Study

4

4/9/93

199

Special Studies

4

2/23/90

200 Computer Systems I 4 5/7/04
201 Computer Systems II 4 5/7/04

225

Computer End-User Support I

4

5/4/90

226

Computer End-User Support II

4

4/21/95

227x

System Support I

4

10/13/96

228x

System Support II

4

10/25/96

233x

Computer Languages II

4

2/23/90

234x

Computer Languages III

4

2/23/90

235x

Advanced Software Applications

4

4/22/99

240x

Advanced Operating Systems

4

2/23/90

243

Essentials of Information Systems /

E-Commerce

4

4/22/99

244

Systems Analysis

4

2/23/90

245 Project Management 4 10/21/05

246

Systems Design

4

2/23/90

247

Information Analysis

4

10/24/97

248 

UNIX/C

4

2/23/90

249

Advanced UNIX/C

4

2/23/90

250

Discrete Structures

4

10/16/92

251

Logical Structures

4

10/16/92

252

Computational Structures

4

10/16/92

253 Computation for Computer Graphics 4 11/2/07

260

Data Structures

4

3/3/89

261

Programming Systems

4

10/24/97

271

Computer Architecture

4

3/3/89

275

Database I

4

2/23/90

276

Database II

4

4/10/96

277x Advanced Database Topics 4 11/1/02

278

Data Communications

4

2/23/90

279

Network Management I

4

2/23/90

280

CWE Computer Science

4

2/23/90

281

Robotics

4

4/25/03

284

Network Security I

4

10/24/03

285 Network Security II 4 10/24/03
286 Network Security III 4 10/24/03
287x Network Applications 4 10/19/01

288

Network Management II

4

10/21/94

289x

Advanced Network Topics

4

10/23/98

295

Web Development I

4

10/24/97

296 Web Development II 4 10/24/08
297 Capstone 4 10/21/05

298

Independent Research

4

2/23/90

299

Special Topics

4

2/23/90

Personal tools
MediaWiki Appliance - Powered by TurnKey Linux