Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 54 in total
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
Paper ID #12150Something to Write Home(work) About: An Analysis of Writing Exercises inFluid Mechanics TextbooksNatascha M Trellinger, Purdue University, West Lafayette Natascha Trellinger is a second year Ph.D. student in the School of Engineering Education at Purdue University. She received her B.S. in Aerospace Engineering from Syracuse University where her interest in the teaching and learning aspects of engineering began. At Purdue, Natascha is a member of the Global Engineering Education Collaboratory (GEEC) and is particularly interested in graduate level engineering education.Ms. Rebecca R Essig, Purdue University
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
for her work, including the prestigious US National Academy of Engineering Gordon Prize for innovations in engineering education in 2006. Recognized as one of the Engineering Education Pioneers in the US in 2014, Lueny is passionate about engineering education and innovation as fundamental pillars for economic and social well-being. She is co-founder of IFEES (Past President), GEDC and SPEED. Lueny maintains a blog on topics associated with innovation and engineering education (www.luenymorell.com; www.innovahied.com). Page 26.1354.1 c American Society for Engineering Education
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
are challenged to write a program to get the light patterns and sound effects of the “fluxcapacitor” to perform correctly. The speed of the ‘car’ as it accelerates is displayed on aspeedometer on a browser screen. Using a browser screen enables a discussion of networkingcommunications together with the experience of getting the sensors and actuators to respondappropriately. The details of this laboratory experiment and the student learning have beendiscussed in previously published reports18, 19Another example is in a computer architecture class. Computer architecture is a staple of ITprograms. To help students grasp the basics of discrete algebra the class has been structuredaround a series of design laboratories. Each laboratory experience
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tatiana Teslenko, University of British Columbia, Vancouver
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
Paper ID #11869Focus on Social Learning in a First-Year Technical Writing Class: a Cana-dian Case-studyProf. Tatiana Teslenko, University of British Columbia, Vancouver Prof. Tatiana Teslenko (Kandydat of Philological Sciences, 1989, PhD, 2000) lives in Vancouver, Canada. She is Professor of Teaching at the Department of Mechanical Engineering in the Faculty of Applied Sci- ence, the University of British Columbia. Her research interests include transformative learning pedagogy, engineering communication, education for sustainable development, and community service learning. Her recent publications include articles and
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Bryan A. Jones, Mississippi State University; M. Jean Mohammadi-Aragh, Mississippi State University; Amy K. Barton, Mississippi State University; Donna Reese, Mississippi State University; Hejia Pan, Mississippi State University
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
Amy Barton is Technical Writing Instructor in the Shackouls Technical Communication Program at Mis- sissippi State University. In 2013, she was inducted into the Academy of Distinguished Teachers for the Bagley College of Engineering. She is an active member of the Southeastern Section of ASEE. Her research focuses on incorporating writing to learn strategies into courses across the curriculum.Dr. Donna Reese, Mississippi State University Donna Reese has served as head of the Computer Science and Engineering Department at Mississippi State University since 2010. Prior to that she served for six years as associate dean in the Bagley College of Engineering. Her research interests are in recruitment and retention of
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles
Tagged Divisions
Computing & Information Technology
small and medium-sized wireless networks areassigned to students regularly accompanying to their homework assignments to help studentsestablish the direct experience using wireless technologies and help them to better understandand master the subject matter of the topics. Students can even use their home network facilitiesto fulfill the hands-on projects. In addition, a group project is required of students, which buildsupon and complementing the material covered in class.We have chosen the text books with the writing style for non-major undergraduate students andwhich were tried by non-technical writing language. Such references include Fundamentals ofWireless Networking by Ron Price, McGraw-Hill/Irwin, Business Data Networks
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/City University of New York
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
used pseudocode,flowcharting and Alice (www.alice.org) to learn basic procedural and object-orientedprogramming concepts. The goal of the problem-solving course is to teach programmingconcepts without the burden of learning a full-fledge programing language. Basic Javaprogramming is introduced in the last three weeks of the problem-solving course to facilitate thetransition to the Programming Fundamentals course.3.2 Exploratory Factor AnalysisComputer programming concepts assessments were grouped into seven different categories:assignment, repetition (for/while structures), selection (if/else structures), methods, arrays,classes and general syntax. Student performance in concepts and skills (i.e. ability to write viablecomputer programs) was
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
cuspof another revolution, as linear, printed textbooks may soon give way to hyperlinkedelectronic ones [2]. The earlier revolution was driven by technology (the growingavailability of blackboards, and more affordable pens and paper) as well as pedagogy. Thenew revolution is being driven by technology, but also by pedagogy. One aspect of thischange is the idea that students should be more actively involved in interacting with theirtextbook.Taking the idea of interaction one step further is the student-authored textbook movement—the idea that students will benefit from writing all or part of their textbook. There are manyadvantages to this approach: It forces students to confront the primary literature, readingtechnical articles about the subject
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Kundan Nepal, Bucknell University
Tagged Divisions
Computing & Information Technology
reflected signal to the ground station (amplitude scaling and timeshift, and echo), and be the total signal at the ground station (fading).Also, let us assume that 0≤t≤T+2τ where x(t) is transmitted over [0,T].The first part of this project was aimed at getting the students to apply the concepts of phasorsand Euler identities that they have studied in their previous courses in circuit theory. Usingphasors, Euler identities, and trigonometric identities as well as simulation, students were askedto derive the amplitude and phase of and envelope of as varies. The intent herewas to help the students see the different fundamental techniques that they can apply to come tothe same solution. Also, students were
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
a robot usingmobile based applications.In addition to this, as mobile platform especially Android is a growing trend in the field ofsoftware design and development as well as a great attraction in STEM learning to the students,from this work, students can learn several aspects of mobile application development. Though,this is basically on Android platform but it will help them to grab the fundamental concept ofmobile application development and make them aware of various development facts. As theRobot Control System works based on both Bluetooth and Wi-Fi communication, they will grabthe idea about several communication protocols. Besides, the software testing area of this workwill have a fruitful impact on developing their skill for
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
setEnabled:TRUE]; // Since we are closed also disables the close button: [mCloseButton setEnabled:FALSE]; }The following are all of the methods that are called when “things” happen on the Bluetoothconnection. The rfcommChannelOpenComplete method is there to enable the close button oncea successful Bluetooth connection is established. Following the open complete method is themethod that took the longest time to get working. This method is required to tell the RFCOMMchannel which data to send and how long the data is expected to be. In this case one only needsto send one number to the development board so the code was mRFCOMMChannelwriteSync:"1" length:1. This conforms to the method by writing “1” to the current RFCOMMchannel and the data length
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo
Tagged Divisions
Computing & Information Technology
for at least two ABET 6-year evaluationcycles. The primary focus of this paper is on accreditation of computer science, but issues fromsoftware engineering accreditation will also be taken into consideration where appropriate.Nationally there are a large number of computer science and software engineering degree pro-grams that are ABET accredited. As of this writing, there are 287 four-year degree programs incomputer science that are accredited by ABET in the United States [1]. For software engineer-ing, there are 26 such programs [1].It is difficult to obtain a precise national estimate of the percentage of computer science programsthat are accredited compared to those that are not. In the state of California, in which our owninstitution
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
we have is our students, and the market had really voted [for] that product. One participant mentioned that since computer science departments have become verybroad, courses that are extensively taught vary between departments based on the current faculty 8Formal Education and Computing Professionals’ Needsmembers’ backgrounds, causing coverage of the fundamentals to be uneven. As this emeritusfaculty member explained, Computer Science has gotten very broad. If you came here in 1970s or 80s, we knew exactly what to teach. Every student had to learn about compliers, operating systems, a little bit about numerical
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Cheryl Xu, Florida A&M University/Florida State University; Seyed Mousavinezhad, Idaho State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
DC sources these conditions are computed by opening the capacitor and shorting theinductor. Then for the t > 0 the circuit consists of the RLC + DC source (12 V source.) At thispoint they can either write the differential equation for solving for voltages or currents in thecircuit or recognizing that the natural response of the circuit for positive time is that of theparallel RLC system. There are 2 parameters needed to find this response:αp = 1/(2RC) = 1 1/sec. ___ω0 = 1/(LC) = √ 5 1/2 rad./sec.So the response is under-damped. If we select capacitor’s voltage as the main unknown we have: vc(t) = A exp(-t) cos(2t) + B exp(-t) sin(2t) + vfwhere A
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, Quinnipiac University
Tagged Divisions
Computing & Information Technology
Matlab);• Senior level undergraduate level Numerical Methods course in the School of Computer Science (required using N.I. LabVIEW).The rest of this section is devoted to the three questions that are related to participants’ technologypreference. Majority of participants’ written responses to these questions as well as the interviewresponses will be displayed for each question.Research Question 1Sketching the graph of a function is one of the fundamental calculus concepts that all STEM majorseither learned prior to their undergraduate education or during their freshman year. Use oftechnology to sketch the graph of a function is not taught by every calculus professor at universitiesand use of technology can have an important role in the
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
provides an interrupt to the operating system when the processorencounters a soft correctable error or a hard error. Virtualization systems tend to explicitly maskthis information from guest operating systems. In VMware, for example, the hypervisor willconfirm the existence of MCE banks to the guest VM when it boots and queries the processorcapabilities, but indicates that it supports no MCE banks when the kernel tries to access them.Subtle differences such as this example can complicate the process of exploring and usinghardware features of the physical system.Another fundamental difference between virtual and physical systems is in the approach tosystems management. For physical systems without virtualization, the mapping of host toservice and
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
(WSNs) are possibly one of the most important technologies of thiscentury and have the potential to make human life more comfortable. WSNs have emerged as aneffective solution applied to a wide array of problems. The increasing popularity of WSN hasmotivated computer engineering programs to provide students with a foundation in the area. Inorder to integrate wireless sensor networks concepts into our computer engineering curriculum,we have decided to integrate wireless sensor concepts in our Embedded Systems Design IIcourse. A requirement for this course is to write a research paper on the topic of Wireless SensorNetworks. As a result of this assignment, many students have started to do their senior designproject on this subject. This paper
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
gateway courses with low passing grades, which may resultin student attrition and transfers out of engineering and computer science degrees. Barriers tosuccess include a good understanding of programming concepts and the ability to apply thoseconcepts to write viable computer programs.In this paper, we analyze the determinants of the transition from concepts to skills in computerprogramming courses using factor and cluster analysis. The purpose of this study is to answer thefollowing questions related to computer programming teaching and learning: 1) Which are thecorrelations and interdependencies in student understanding of different computer programmingconcepts?; 2) Which are the cognitive challenges that students find when learning
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eric John Wilson; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
) Page 26.123.4 plt.grid() plt.show() When we import a package, the key word to use this package is the name of the package itself. When importing NumPy, we would need to use the keyword “numpy” every time you wanted to use this package. To shorten how much you actually type you can name the package when you import it. The import statement in the code snippet previously stated begins with the line “import numpy as np”. The ‘np’ can be any name and can be abbreviated. For example instead of writing “numpy.sin” to use sine function, we can simply write “np.sin”.  Highly efficient algorithms for computing the DFT were first developed in the 1960s. Collectively known as Fast Fourier Transforms (FFTs), they all rely upon
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
students at DeVry University took the course “programming environments and java withlab”, we had the opportunity to introduce them with Android programming concurrently. As partof the course work, first two weeks they were introduced to fundamental data types, usingobjects, designing and implementing classes, and arrays in java. Week three starts with GUIdevelopment, this is when they were presented with an overview of the technologies and thearchitecture used to build smart phone applications.Android’s Java versus Objective-CThe language of choice for iPhone development is Objective-C, while Java is primarily used onthe Android platform. An Android user interface is composed of hierarchies of objects calledViews. A View is a drawable object used
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
deliveredan IPv6 Foundations course during the Summer 2012 Semester that prepared students for theIPv6 Forum Certified Engineer (Silver) Exam.8 The Nephos6 academy program is designed tointroduce students to IPv6 and Cloud technologies and equip them with technical skills thatcomplement their chosen fields of study. The partnership with the Nephos6 Academy wasinstrumental in the success of the IPv6 Fundamentals course. Feedback from the students at theend of the course indicated a strong demand for more in-depth IPv6 knowledge and labs, Page 23.834.3specifically in the area of IPv6 Security.IPv6 Security CourseWhile there are many examples in the
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
, simply taking a message andcoding with a key that the sender and the receiver share. This method works if the sender and thereceiver manage to keep the key secret. This method was by far the most popular seenthroughout history. A more recent example of this is the Enigma machine used during WorldWar II by the Germans to encrypt and decrypt their messages. While this was a much morecomplex version of using an encryption and decryption method, the fundamentals are the same6.With the advent of computers and the need to connect them, an issue was soon discovered thatmade the traditional methods of encryption no longer viable. Often when devices arecommunicating over the internet the two users have never met and as such have never exchangedsecurity
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
information technology with business strategies, goals, and needs. While the study of and research in computer science is his prime objective, his interests in literature, music, travel, and nature help him to maintain a sense of perspective in life. He likes to write and has published some articles and is a co-author of a published book. He believes that each of us must give something back to society, so he contributes to local organizations that focus on the environment of his hometown.Dr. Ibraheem A. Kateeb, North Carolina A&T State University Ibraheem Kateeb received his B.S. in physics and mathematics from Yarmouk University in Jordan, and M.S.E.E. and Ph.D. from NCA&TSU in North Carolina in electrical and
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
digitalcircuits. Most of the examples presented in this paper were implemented on the microcontrollerStellaris LM3S8962 based on ARM processor. LabVIEW based classwork explained in thispaper has been implemented in several courses and has helped students further theirunderstandings on the fundamentals of computer hardware and software.1-IntroductionComputer programming in languages such as Visual Basic, C++, or JAVA follow a control flowmodel of program execution. In control flow, the sequential order of program elementsdetermines the execution order of a program. A program written in LabVIEW uses a slightlydifferent approach to than programs written in other languages1,2. This is called dataflowprogramming and, when a function such as addition or
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
Education, 2013 Introducing Information Technology Students to Cyber-Physical Systems Using a Lab ExperienceAbstractCyber-Physical Systems (CPS), or embedded computers, are not traditionally emphasized inInformation Technology (IT) majors. However as these systems evolve they include more andmore topics that are of fundamental interest to IT majors. Some key areas include networking,security and human-computer interaction. They are also evolving into large, heterogeneousdistributed systems requiring significant integrative design skills to implement successfully;integration is another key area of interest to IT designers. In addition to including multipleaspects of interest to IT, CPS is rapidly growing to take ever
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
 This section describes what a Cloud­Based Education is and how it can utilize cloud services. To better illustrate the concept, fundamentals of Cloud Computing is presented first, then e­learning and Virtual Classrooms are explored. After the common features of a CBE have been established here, Section 4 presents CBE­CS in details and how it can be mapped into the Cloud. Page 25.318.43.1. Cloud Fundamentals NIST and other organizations define Cloud Computing as Internet­based technology 2,  6,  8  which offers  computational  resources  via  a  computer  network  and  delivers  flexible,  scalable,  and  on­ demand  services  to  the
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
education in 2007. He became a Computer Science teacher and Technology Coordinator at St. Catherine of Siena School in the Archdiocese of New Orleans where he also taught English, social studies, and Latin. In 2012, Mr. Taffaro joined the faculty and staff of New Orleans Military and Maritime Academy located aboard Federal City in Algiers, Louisiana, a suburb of New Orleans. He is currently the school’s business and data manager and teaches Creative Writing and Cyber Science.Mr. Marvin Nelson, Benton High School Page 23.967.1 c American Society for Engineering Education, 2013
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy
Tagged Divisions
Computing & Information Technology
experience. ELEE4400/5400 Computational Intelligence Techniques is anelective course offered for upper-level undergraduates and graduate students. Undergraduatestudents have the opportunity to undertake postgraduate-level elective curriculums in their finalyear of study. Concepts and algorithms are introduced in the classroom. However, projects willsubsequently be assigned to students to provide them practical research experience.The fundamental idea of on-going multi-project course teaching and learning through an on-goingmultiple-project is to decompose a large project into a series of projects that have synergisticconnection. The previous project lays the foundation for the subsequent projects. Most importantly,the following research skills
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
also found in othercountries. Particular technologies to provide fixed wireless or satellite access do not offer thesame fundamental quantum leap that the change from copper to optical fibre provides for fixedline access. In fact this has the potential to create an even larger digital divide, as there are noobvious technological limits to the amount of bandwidth that can be offered to the premise viaoptical access; the bandwidth is unlimited from a current perspective. Rural and fringe areas onthe other hand will have to rely on wireless access, mainly because of the high cost of deployingfibre.It is expected that the deployment of the FTTH component will lead to new bandwidth hungryapplications in the learning and teaching space. Concrete
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
positiveprogress, the real measure of success in this course is how students react when they are presentedwith a situation in which they are able to successfully apply the knowledge that they havelearned.6. AssessmentAssessment of learning is derived directly from the established learning objectives of the course.The learning objectives were formed based on the premise that this course is a true introductorycourse and that the intended audience – university students that regularly use informationtechnology – have little to no knowledge of practical computer security topics. At the conclusionof the course, students will be able to: • Define computer security terms and mechanisms • Describe fundamental security concepts • State