|Instructor:||Dr. Adrienne Bloss||Office Hours:||Mon, Wed 2:40-3:40|
|Office:||365-C Trexler||Tu, Th: 10:00 - 11:00|
|Phone:||375-2434||Also by appointment|
Course Objectives: The general objectives of the Computer Science Senior Seminar are to increase the student's ability to do the independent reading and research necessary to keep up with developments in the computing field, to increase the student's experience and skills in written and oral communications, and to increase the student's understanding of the ethical responsibilities of computing professionals. These objectives are met through a seminar style course that focuses on an area or areas of computer science not in the regular curriculum. This year the seminar is subtitled "The Age of the Internet," providing an overview of three areas that have heightened importance because of the growth of the Internet: cryptography, network security, and information storage and retrieval. We will also discuss related topics including privacy and professional ethics.
Text: Cryptography and Network Security, Principles and Practice, 3rd Edition, by William Stallings, Prentice-Hall, 2003.
A variety of other resources will be identified and/or distributed in class.
Course Topics (subject to change with notice)
Grading Policy: The course grade will
be based on two tests, a final exam, programming and homework assignments,
at least two oral presentations, and a final project.
The course grade will be
determined using the following
Make-up Policy: Everyone is expected to take tests and the exam at the scheduled time. Make-ups will be given only for legitimate, documented absences that the instructor has been notified of ahead of time. Make-up tests, if given, may be oral.
Late Policy: Unless otherwise specified, assignments will not be accepted late. This is to allow us to discuss completed assignments in class while the topic is still relevant.
Academic Integrity: All tests, exams, and programming projects are to be the work of the individual student unless otherwise specified by the instructor. You are encouraged to get help from the instructor if you need help with any aspect of the course. In group work, all members of the group are expected to contribute substantially to the final product. Failure to do so while accepting the group grade is a violation of academic integrity. Always remember that using someone else's work or ideas as your own is plagiarism and is a violation of academic integrity.
Computer Use Policies: All students must abide by the Computer Use policies of Roanoke College. Failure to do so will result in involuntary withdrawal from the course.