|HIP* - For office use Only||DGL|
|Office: 244 Advanced Technology & Science Hall
Phone: (724) 738-4850
M&F 1:00-3:00 and W 2:00-3:00
Additional times by arrangement
HTML-Kit (v2.92) is free to download and has a support page that includes tutorials
A Balanced Introduction to Computer Science, 3rd Edition, Reed,Prentice Hall, Copyright 2011.
Additional material, as introduced in class, class notes or as assigned reading.
Other content: As covered in class or as assigned reading.
This class will make use of D2L, the CS department "java-drive," and ROCKmail. Flash (thumb) drive recommended.
You are required to add a picture, appropriate for all of classes, to your D2L profile... contact me for help or with any concerns.
Grading Policy & Scale
|Quizzes||20 pts each||140||~8 quizzes (drop lowest)||90-100%||A||
Grades may be adjusted at the discretion of the instructor. Except in the most unusual of circumstances, for example cheating, plagiarism or unacceptable attendance, grades will only be adjusted upward. Unacceptable attendance – more than three unexcused absences – will result in losing a letter grade. Cheating or plagiarism is cause for failure.
Quizzes may take the form of in-class lab assignments, paper & pencil, or be TF/MC style tests on D2L.
|Projects||20 pts each||140||~8 assignments (drop lowest)||80-89%||B|
|Other||0-10 pts each||0||Optional "pop quizzes" or
You are expected to keep any returned work and keep track of your own scores until final grades are determined.
Attendance: You are expected to attend and participate in all classes. You do not need to receive "permission" to miss class – stuff happens. However, missing more than a week (3 days of class) total is unacceptable without legitimate reason. Unacceptable attendance will reduce your score by a letter grade.
You are responsible for finding out what went on in class, including announcements and all material covered.
Make up exams and assignments are available for legitimate reasons only (as determined by University policy and the Instructor). Make arrangements ahead of time if at all possible. Be prepared to submit evidence to support your request. Late assignments are generally not accepted. All assignments will require completion outside of class time.
Work on these assignments must be entirely your own, or in the case of group assignments, the members of the group. Cite any help received, including other students, tutors, books and web sites! Be specific. (Help or code provided by the instructor, the class web site and/or notes, or the course text is considered part of the course itself and need not be explicitly acknowledged in your assignments.) Use of material from another book or downloaded from the Internet or copying code from another person are all examples of plagiarism. Citations must appear in the required comments at the beginning of each assignment.
Typically, assignments are structured to enhance and assess your understanding of the material covered in class, in the text, or as assigned. For this reason, you must complete assignments using the methods and techniques covered in class and as specified in the assignment. Presume that each assignment is intended to exercise the most recent material covered. (That is, you can't just Google a way to do whatever it is or use material from chapters not yet covered in class. It's like learning and doing "long division" as opposed to using a calculator.) You may use more advanced (different) techniques which you have learned on your own only with explicit permission from the Instructor.
If you are being tutored, make sure the tutor is helping you to understand what we have learned in class (or the text), not alternate techniques. While group tutoring on classroom topics is perfectly acceptable, group tutoring on the completion of an assignment is not. This amounts to working together, which is only acceptable for group members and assignments set up by the instructor. I encourage tutors to meet with me — you should also encourage him or her. Tutors should never be showing you how to complete the assignment. Rather, they should be helping you understand the material and methods covered in class so you can complete the assignment yourself.
Class Preparation and Decorum
Read the material before attending "lecture" on it. Disruptive (or abusive) behavior will not be tolerated at any time.
Academic honesty is expected and required.
You are required to adhere to all Department and University policies related to academic integrity. Plagiarism, cheating on exams or copying assignments will be cause for failure of the course and may result in dismissal from the University. For our purposes, plagiarism is defined as presenting anyone else's work as your own, including the use of source code (in any language) or algorithms (program design) that are not your own original creation. Academic dishonesty will minimally result in a zero on the assignment or test, and possibly an F for the course, at the Instructor's discretion.
Course Description: An introductory course devoted to programming and to a description of hardware and software concepts. Programming concepts covered include top-down program development using pseudocode, algebraic notation, standard control structures, and arrays, in an appropriate programming language. Other topics include binary representation, storage, and general architecture and functioning of a computer system. (3 credits)
Required IT, IS, Liberal Studies Science Enrichment Course
This course and its outcomes support the Information Technology Learning Outcomes of Problem Solving and Critical Thinking (PS&CT), Communication and Interpersonal Skills (C&IS), and Ethical and Professional Responsibilities (E&PR). These Information Technology Learning Outcomes are tied directly to the University Wide Outcomes of Critical Thinking and Problem Solving, Communication, and Values and Ethics.
|Degree||Program Objective||Assessed Course Objective|
|IT||I.b. Integrate design and implementation principles to develop effective web pages||1. Write structured web pages that utilize sequential, conditional, and iterative programming constructs.|
|IT||I.e. Create efficient, graphical client/server applications|
|IT||II.a. Document all aspects of a system precisely and clearly||2. Make web pages that are understandable and appropriately documented.|
|IT||III.a. Determine the economic and organizational effects of information technology on global society||3. Recognize the ethical, legal, and social implications of information processing.|
|IT||III.b. Recognize important legal issues and demonstrate appropriate social responsibilities in information technology|
|IT||III.c. Demonstrate an understanding of the Association of Computing Machinery (ACM) Code of Professional Ethics|
Additional Course Objectives include:
The student will be able to:
This is an Enhancement Course in the Science, Technology and Mathematics area of the Liberal Studies Program.
This course will satisfy the SRU requirement for Computer Comptency.
Students shall adhere to the laws governing the use of copyrighted materials. They must ensure that their activities comply with fair use and in no way infringe on the copyright or other proprietary rights of others. Additional information regarding copyright can be found here www.copyright.gov and information about fair use can be found here www.copyright.gov/help/faq/faq-fairuse.html.
Slippery Rock University and its faculty are committed to assuring a safe and productive educational environment for all students. In order to meet this commitment and to comply with Title IX of the Education Amendments of 1972 and guidance from the Office for Civil Rights, the University requires faculty members to report incidents of sexual violence shared by students to the University's Title IX Coordinator. The only exceptions to the faculty member's reporting obligation are when incidents of sexual violence are communicated by a student during a classroom discussion, in a writing assignment for a class, or as part of a University-approved research project. Faculty members are obligated to report sexual violence or any other abuse of a student who was, or is, a child (a person under 18 years of age) when the abuse allegedly occurred to the person designated in the University protection of minors policy. Information regarding the reporting of sexual violence and the resources that are available to victims of sexual violence is set forth at: http://www.sru.edu/offices/diversity-and-equal-opportunity/sexual-misconduct-and-victim-resources.
Lectures are the sole property of the Instructor. Text or audio notes may not be sold or distributed without permission. Copyright 2012, Dr. Paul Mullins