CSCE 190 Computing in the Modern World

Fall 2011


Monday 4:00-4:50 pm

Main 300, B201


Instructor:        John Rose

Office:             Swearingen 3A67

Office Hours:  Tuesday and Thursday 3:30 -5:00 pm or electronically any time or by appointment

Telephone:       777-2405




Course Requirements:

·         Follow the course requirements on this website.

·         You are expected to turn in hard copy of the assignments on time.  Late penalty is 5% for every day. 

·         You are expected to attend class. Attendance will be taken, and it will affect your grade


Pre (co)requisites:

This course has a corequisite of CSCE 145, 204, or 206.



This course is intended to provide you with the bigger picture of how computing fits into the modern world and why there is more to "computing" than just "programming." Unlike nearly everything else taught in the department, this will not be a highly technical course. We encourage you to participate in the discussions and ask questions.  The course will involve several other faculty members at the department and external professionals working in the field of computer science.





There is a CSE department email alias for CSCE 190, namely CSCE190-001 in the domain This alias sends email to the CSE departmental login that you get with this course. A mass mailing to the entire class will be done through these mail aliases. Actually, any of you can send mail to this alias.


The mail alias of the previous paragraph sends mail to the CSE departmental login that you get with this course. You are responsible for reading mail sent to this account. You can set the forwarding to any other account you wish, whether it be an,,, or similar account, but you are responsible for reading the mail that gets sent to your account.


Texts and References:

This course will be taught with multiple materials provided to you during the semester. In addition, there are a number of books and papers that are worth reading about computing, its past, and its future. 

Unless otherwise specified, all essays are 2 pages, double spaced, 12 points fonts. 

It should have a title, author, date, 250-300 words summary, main discussion, and a conclusion.  References should be listed after the conclusion and appropriately cited in the main text. 


Lecture schedule:






John Rose

Introduction to CSCE 190

HW 1: Based on today's lecture and your readings, describe how you feel about your job prospects after your graduation. Due Sept. 12. Bureau of Labor Job Projections presentation


John Rose




Labor Day

No Class


Helen Fields


College of Engineering and Computing Career Center:

Components of a resume

Links to pages for sample resumes, sample cover letters and a program called Optimal Resume

Additional links for cover letters and resumes.

How to write cover letters and resumes,

Resume Tips for Technology Professionals,

Rockport Inst., How to write a resume,

HW2: Resume

Choose an IT organization that you find interesting. Look for information about

·  The type of services/products the organization is marketing

·  The expertise of the IT people employed

·  Educational requirements for the employees

·  Current hiring searches in IT positions, including title, education, experiences, salary, etc.

Based your research, choose a company where you would like to apply for a position. Write:

·        1 page overview of the company

·        1 page overview of the position you are “applying for”

·        1 page cover letterthat gets the attention of the hiring staff

·        1 page Resume that demonstrates why you are the right candidate for the position

·        ½-1 page on what you need to learn/do to be competitive for the position

Due Sept. 26.



Jason O’Kane




Jose Vidal

The Internet



Csilla Farkas

Computer Security



Jiangying Zhou

Research at Teledyne Scientific



Jerry Heyman

IBM’s Watson



Jeremiah Shepard

Careers in the Computer Game Field

Stefanie Olsen, "Social networks--future portal or fad?"

Bernard Lunn, "Social Network Types, Motivations, and the Future"

Michael Pinto, "2016: A Peek at Our Internet Future"

HW 3: In addition to the three articles at least 3 articles above, identify 3 more articles addressing the future of computing, in particular, Internet-based technologies. Write your own version of "2016: A Peek at Our Internet Future" based on the reading materials and your own experiences. However, base your essay on a look 10 years into the future. Consequently, your essay should be titled “2021: A Peek at Our Internet Future”. For full credit, be sure to include the 3 papers above as well as the three additional papers that you find in your discussion of the future of the internet. Also, be sure to include all of you references sources on a separate page. The length of your essay should minimally be two complete double spaced pages, not including the separate reference page.

Due Nov. 7


Dr. John Bowles

Software Engineering



Steve Lariviere

Career Opportunities at SPAWAR



Dr. Jason Bakos

Research with GPUs

HW 4: Research Interests -- 3 page research proposal Choose an area of research interest (you can look at faculty web pages for possible research areas) Write a research proposal organized as follows:

Page 1: title, your name, overview of the proposed project including its importance

Page 2: Detailed discussion of the problem and a motivating example

Page 3: Proposed approach to solve the problem, expected results, and your qualifications to work on the project.

References should be listed on a separate page. Due November 28.

Academic Honesty:

Assignments and examination work are expected to be the sole effort of the student submitting the work. Students are expected to follow the University of South Carolina Honor Code and should expect that every instance of a suspected violation will be reported. Students found responsible for violations of the Code will be subject to academic penalties under the Code in addition to whatever disciplinary sanctions are applied.


On the Proper Use of Computing Resources:

Students are expected to be aware of the university policy on use of computing resources, including the Student Guidelines for Responsible Computing, as well as the college and departmental policies on proper use of computing resources. Every instance of a suspected violation will be reported. Students should be aware that neither the instructor nor the department are responsible for making alternative arrangements should improper use leading to revocation of access to departmental or college resources make it impossible for you to complete the programming assignments on time.