EPN-V2

ITPE3200 Web Application Course description

Course name in Norwegian
Webapplikasjoner
Weight
10.0 ECTS
Year of study
2021/2022
Course history
Curriculum
FALL 2021
Schedule
  • Introduction

    The students shall acquire knowledge of and insight into relevant technologies and techniques used in business and industry for the development of advanced web applications. The course uses Microsoft.Net as the framework for highlighting important concepts in application development. The course will be a useful foundation for students who wish to work on web applications in connection with their bachelor’s thesis.

  • Recommended preliminary courses

    Lectures and supervisory sessions. The students will work in groups. Each group normally comprises three students.

  • Required preliminary courses

    No requirements over and above the admission requirements.

  • Learning outcomes

    After completing the course, the student is expected to have achieved the following learning outcomes defined in terms of knowledge, skills and general competence:

    Knowledge

    The student is capable of:

    • explaining application layers and the importance of good application architecture
    • explaining the importance of testing applications
    • explaining different design patterns
    • explaining server-side authentication and sessions
    • explaining how web services can be developed in web applications

    Skills

    The student is capable of:

    • developing advanced web applications with database connectivity
    • using the Model View Controller (MVC) framework
    • setting up automatic unit tests
    • developing rich user interfaces in Ajax
    • developing applications that use database abstraction and SQL dialect neutrality
    • developing security mechanisms in web applications

    General competence

    The student:

    • has a general understanding of web application development in .NET, making it easy to become familiar with other equivalent frameworks
  • Teaching and learning methods

    Lectures and supervisory sessions. The students work both individually and in groups. The groups normally comprise 3 to 5 students.

  • Course requirements

    None.

  • Assessment

    The exam consist of two parts that counts 50 % each.

    • Grouproject 1 (3-5 students, program code) counts 50 %
    • Grouproject 2 (3-5 student, program code) counts 50 %

    Both parts must be passed in order to pass the course.

    The exam result can be appealed. If a student fails, the student will be given another assignment that must be submitted within three weeks of receiving the fail grade.

  • Permitted exam materials and equipment

    The students will acquire theoretical and practical skills in the setup, operation and maintenance of computers in a network. The course builds on the course Operating Systems.

  • Grading scale

    None.

  • Examiners

    After completing the course, the student is expected to have achieved the following learning outcomes defined in terms of knowledge, skills and competence:

    Knowledge

    The student is capable of:

    • explaining the benefits and limitations of different operating systems
    • explaining the installation and configuration of an operating system
    • understanding the principles of user management
    • recognising the security aspects of computers and networks

    Skills

    The student is capable of:

    • installing and configuring an operating system
    • installing and configuring a monitoring system
    • maintaining the operating system and other software
    • installing and configuring a monitoring system
    • collecting data from the monitoring system and analysing collected data
    • using troubleshooting methods in a network
    • developing and implementing backup procedures to prevent loss of data

    Competence

    The student is capable of:

    • developing, maintaining and operating an internal computer network in the enterprise
    • documenting installation procedures and server configurations
    • managing new, existing and terminated users based on the enterprise’s policy
    • managing the robustness and security of a computer network
  • Overlapping courses

    None.