Software Systems, Scientific Applications, and Information Security and Assurance programs are accredited by the Computing Accreditation Commission of ABET, 415 N. Charles Street, Baltimore, MD 21201, (410) 347-7700.
Computer Engineering is one option of the Engineering (BSE) program which is accredited under the ABET EAC General Criteria. The Engineering program includes five options: Computer, Environmental, Industrial, and Nuclear Engineering and STEM Education. This program is an interdisciplinary engineering program (ENGR) that focuses on providing depth in engineering applications that tend to cross disciplines.
Annual Student Enrollment and Graduation Data is available at the following link: http://www.utc.edu/planning-evaluation-institutional-research/pdfs/dept-profiles/computer-science-2013.pdf
Program Educational Objectives: Within three years after graduation, our students will be on successful career paths in computer science or closely related fields as evidenced by such items as employment and promotions in a computer science or related position, entry into graduate school, and continuing education in the field.
CSE Computer Science Student Outcomes
|A||Ability to apply knowledge of computing and mathematics appropriate to the discipline|
|B||Ability to analyze a problem, and identify and define the computing requirements appropriate to its solution|
|C||Ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs|
|D||Ability to function effectively on teams to accomplish a common goal|
|E||Understand professional, ethical, legal, security and social issues and responsibilities|
|F||Ability to communicate effectively with a range of audiences|
|G||Ability to analyze the local and global impact of computing on individuals, organizations, and society|
|H||Recognize the need for and be able to engage in continuing professional development|
|I||Ability to use current techniques, skills, and tools necessary for computing practice|
|J||An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices|
|K||An ability to apply design and development principles in the construction of software systems of varying complexity|
|L||An ability to use and apply current information security concepts and practices (for only the Information Security and Assurance (ISA) concentration)|