CPSC 1100 Fundamental of Computer Science

(Non-IA course)

Course Description

(4) Credit Hours

An introduction to computer science concepts and computer software development using a higher level language. Algorithms, flowcharting, programming, and documentation of numerical and non-numerical problems. Introduction to computer science terminology and concepts such as computer hardware and computer application areas. Lecture 2 hours, laboratory 3 hours. Prerequisite: MATH 1130 or MATH 1710 or MATH 1720 or MATH 1830 or MATH 1910 or MATH 1920 with a minimum grade of C or department head approval.


  • A guide to Working with Visual Logic, Thad Crews & Chip Murphy, Course Technology (available at www.course.com), ISBN-10: 0-324-60119-0
  • Visual Logic, ISBN-10: 1-4188-3773-3 (software)
  • Big Java, Cay Hortsman, Wiley, ISBN: 978-0-470-50948-7

Lecture Notes

CPSC 1100 Labs




  • ACM SIGCOMM Computer Communication Review. ACM, New York, NY, USA.
  • Computer science. (2008). Berlin: Springer.
  • Computer science review. (2007). New York: Elsevier Inc.
  • (n.d.). Journal of Computer Science and Technology. http://www.intute.ac.uk/sciences/cgi-bin/fullrecord.pl?handle=lesa.1110376257.
  • (1988). Social science computer review. [Thousand Oaks, Calif.], Sage Publications.
  • (1981). Science of computer programming. [Amsterdam], Elsevier Science. http://www.sciencedirect.com/science/journal/01676423.
  • IEEE Computer Society., & American Institute of Physics. (1999). Computing in science & engineering. College Park, Md: AIP.


  • Computability, complexity, and languages: fundamentals of theoretical computer science. (September 01, 1994). Choice Reviews Online, 32, 1, 32-356.
  • Denning, P. J., & McGettrick, A. (January 01, 2005). Recentering computer science. Communications of the Acm, 48, 11.)
  • Technology, knowledge and learning. (2011). Dordrecht: Springer.


  • Saff, E. B., & Snider, A. D. (1976). Fundamentals of complex analysis for mathematics, science, and engineering. Prentice-Hall.
  • Cardenas, A. F., Presser, L., & Marin, M. A. (1972). Computer science. New York: Wiley-Interscience.
  • Reilly, E. D., Ralston, A., & Hemmendinger, D. (2000). Encyclopedia of computer science. London: Nature Pub. Group.
  • Henderson, H. (2003). Encyclopedia of computer science and technology. New York, NY: Facts On File.
  • Dale, N. B., & Lewis, J. (2011). Computer science illuminated. Sudbury, Mass: Jones and Bartlett Publishers.


Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition

General Procedures: Inference

Inference Definition

General Procedures: Rainbow Series

Rainbow Series

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary

General Countermeasures and Safeguards: Computer Law

Computer Law

General Countermeasures and Safeguards: Computer Media

Computer Media

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools

Administrative Countermeasures/Safeguards: Control Management

Change Control
Control Management

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery


Policy and Procedures: Incident Response

Incident Response

Policy and Procedures: Witness Interrogation

Witness Interrogation

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks
Computer Virus Timeline

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams



Administrative Policies/Procedures: Approval to Operate

Approval to Operate

Administrative Policies/Procedures: Configuration/Change Control

Change Control

Administrative Policies/Procedures: Copyright Protection

Copyright Protection

Administrative Policies/Procedures: Patch Management

Patch Management

Administrative Policies/Procedures: Records Management

Records Management

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy

Anomalies and Integrity

General Risk Management: Computer System Risk Management

Risk Management

Access Control Safeguards: Computer System Access Control

Access Control

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions


Access Control Mechanisms: KMI Applications

Key Management

Access Control Mechanisms: Single Sign-on

Single Sign On

IA Sites