SlideShare uma empresa Scribd logo
1 de 21
Computer Science @umbc.edu ,[object Object],[object Object],[object Object],[object Object]
CSEE at a glance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSEE Degree Programs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSEE Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why computer science? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Why CS@UMBC? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BS in Computer Science ,[object Object],[object Object],[object Object],[object Object],[object Object]
CS Course Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Programming Courses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intermediate Courses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Required Advanced Courses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advanced Electives (selected) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advanced Electives (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Special Topics Courses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Departmental Honors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Minor in Computer Science ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Co-op and internship ,[object Object],[object Object],[object Object],[object Object],[object Object]
For more information... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The End ,[object Object]

Mais conteúdo relacionado

Mais procurados

A Degree in Computer Science
A Degree in Computer Science A Degree in Computer Science
A Degree in Computer Science IdilBilgic
 
Module 3
Module 3 Module 3
Module 3 EX28
 
Careers in computer engineering
Careers in computer engineeringCareers in computer engineering
Careers in computer engineeringentranzz123
 
Higher studies after B.Tech in CSE
Higher studies after B.Tech in CSE Higher studies after B.Tech in CSE
Higher studies after B.Tech in CSE CheggIndia1
 
Transcript Translation for Bachelor Studies
Transcript Translation for Bachelor StudiesTranscript Translation for Bachelor Studies
Transcript Translation for Bachelor StudiesDado Bajramović
 
Computer science and engineering
Computer science and engineeringComputer science and engineering
Computer science and engineeringsreeLekha51
 
Resume_20160610_MarcusGohm
Resume_20160610_MarcusGohmResume_20160610_MarcusGohm
Resume_20160610_MarcusGohmMarcus Gohm
 
Computer systems technician – networking is a popular option at centennial co...
Computer systems technician – networking is a popular option at centennial co...Computer systems technician – networking is a popular option at centennial co...
Computer systems technician – networking is a popular option at centennial co...jasonw93
 
Signal and system theory sheets
Signal and system theory sheetsSignal and system theory sheets
Signal and system theory sheetsmarwaeng
 
Making Sense of Computer Science Requirements Texas STEM Jan 2017
Making Sense of Computer Science Requirements Texas STEM Jan 2017Making Sense of Computer Science Requirements Texas STEM Jan 2017
Making Sense of Computer Science Requirements Texas STEM Jan 2017Hal Speed
 
ICT Needs and Trends in Engineering Education
ICT Needs and Trends in Engineering Education ICT Needs and Trends in Engineering Education
ICT Needs and Trends in Engineering Education Manuel Castro
 
Panjab University UIET IT Syllabus 2014-15
Panjab University UIET IT Syllabus 2014-15Panjab University UIET IT Syllabus 2014-15
Panjab University UIET IT Syllabus 2014-15Rai Gourav Singh
 

Mais procurados (18)

A Degree in Computer Science
A Degree in Computer Science A Degree in Computer Science
A Degree in Computer Science
 
Ayat General CV
Ayat General  CVAyat General  CV
Ayat General CV
 
Module 3
Module 3 Module 3
Module 3
 
CSE Orientation
CSE Orientation CSE Orientation
CSE Orientation
 
Basics of Information Science
Basics of Information ScienceBasics of Information Science
Basics of Information Science
 
Careers in computer engineering
Careers in computer engineeringCareers in computer engineering
Careers in computer engineering
 
Higher studies after B.Tech in CSE
Higher studies after B.Tech in CSE Higher studies after B.Tech in CSE
Higher studies after B.Tech in CSE
 
Transcript Translation for Bachelor Studies
Transcript Translation for Bachelor StudiesTranscript Translation for Bachelor Studies
Transcript Translation for Bachelor Studies
 
Meena_Girgis CV
Meena_Girgis CVMeena_Girgis CV
Meena_Girgis CV
 
Computer science and engineering
Computer science and engineeringComputer science and engineering
Computer science and engineering
 
Preda Marius CV EN
Preda Marius  CV ENPreda Marius  CV EN
Preda Marius CV EN
 
Resume_20160610_MarcusGohm
Resume_20160610_MarcusGohmResume_20160610_MarcusGohm
Resume_20160610_MarcusGohm
 
Computer systems technician – networking is a popular option at centennial co...
Computer systems technician – networking is a popular option at centennial co...Computer systems technician – networking is a popular option at centennial co...
Computer systems technician – networking is a popular option at centennial co...
 
2 Page CV
2 Page CV2 Page CV
2 Page CV
 
Signal and system theory sheets
Signal and system theory sheetsSignal and system theory sheets
Signal and system theory sheets
 
Making Sense of Computer Science Requirements Texas STEM Jan 2017
Making Sense of Computer Science Requirements Texas STEM Jan 2017Making Sense of Computer Science Requirements Texas STEM Jan 2017
Making Sense of Computer Science Requirements Texas STEM Jan 2017
 
ICT Needs and Trends in Engineering Education
ICT Needs and Trends in Engineering Education ICT Needs and Trends in Engineering Education
ICT Needs and Trends in Engineering Education
 
Panjab University UIET IT Syllabus 2014-15
Panjab University UIET IT Syllabus 2014-15Panjab University UIET IT Syllabus 2014-15
Panjab University UIET IT Syllabus 2014-15
 

Semelhante a CS@UMBC Overview

Computer-Science-Department-PowerPoint-Presentation.ppt
Computer-Science-Department-PowerPoint-Presentation.pptComputer-Science-Department-PowerPoint-Presentation.ppt
Computer-Science-Department-PowerPoint-Presentation.pptImXaib
 
GEorge mason MS _EE .ppt
GEorge mason MS _EE .pptGEorge mason MS _EE .ppt
GEorge mason MS _EE .pptvaseemkazia
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
Information Session for Engineering Master Degrees
Information Session for Engineering Master DegreesInformation Session for Engineering Master Degrees
Information Session for Engineering Master Degreesrobertslaughter
 
Future Prospects of Computer Engineering in India | Marwadi University
Future Prospects of Computer Engineering in India | Marwadi UniversityFuture Prospects of Computer Engineering in India | Marwadi University
Future Prospects of Computer Engineering in India | Marwadi Universitymarwadiuniversity
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university CybersecurityAbhishek Bajaj
 
The Ultimate Guide to C2090 650 ibm info sphere information governance catalog
The Ultimate Guide to C2090 650 ibm info sphere information governance catalogThe Ultimate Guide to C2090 650 ibm info sphere information governance catalog
The Ultimate Guide to C2090 650 ibm info sphere information governance catalogSoniaSrivastva
 
M.sc cs annual_2019-20
M.sc cs annual_2019-20M.sc cs annual_2019-20
M.sc cs annual_2019-20Pankaj Dadhich
 
degree requirement completion form csc
degree requirement completion form cscdegree requirement completion form csc
degree requirement completion form cscchangeyourlifecycle
 
GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact SheetWilliam Roman
 
Masters in Computer Applications (MCA)
Masters in Computer Applications (MCA)Masters in Computer Applications (MCA)
Masters in Computer Applications (MCA)JNU Jaipur
 
future of a computer litrate
future of a computer litratefuture of a computer litrate
future of a computer litratePooja Tanwar
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014Mina Hatami
 
Computer Organisation and Architecture Teaching Trends
Computer Organisation and Architecture Teaching TrendsComputer Organisation and Architecture Teaching Trends
Computer Organisation and Architecture Teaching Trendsyogesh1617
 
Computer Oraganisation and Architecture
Computer Oraganisation and ArchitectureComputer Oraganisation and Architecture
Computer Oraganisation and Architectureyogesh1617
 
Query Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxQuery Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxmakdul
 

Semelhante a CS@UMBC Overview (20)

Computer-Science-Department-PowerPoint-Presentation.ppt
Computer-Science-Department-PowerPoint-Presentation.pptComputer-Science-Department-PowerPoint-Presentation.ppt
Computer-Science-Department-PowerPoint-Presentation.ppt
 
GEorge mason MS _EE .ppt
GEorge mason MS _EE .pptGEorge mason MS _EE .ppt
GEorge mason MS _EE .ppt
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
Information Session for Engineering Master Degrees
Information Session for Engineering Master DegreesInformation Session for Engineering Master Degrees
Information Session for Engineering Master Degrees
 
Compe
CompeCompe
Compe
 
Future Prospects of Computer Engineering in India | Marwadi University
Future Prospects of Computer Engineering in India | Marwadi UniversityFuture Prospects of Computer Engineering in India | Marwadi University
Future Prospects of Computer Engineering in India | Marwadi University
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university Cybersecurity
 
The Ultimate Guide to C2090 650 ibm info sphere information governance catalog
The Ultimate Guide to C2090 650 ibm info sphere information governance catalogThe Ultimate Guide to C2090 650 ibm info sphere information governance catalog
The Ultimate Guide to C2090 650 ibm info sphere information governance catalog
 
M.sc cs annual_2019-20
M.sc cs annual_2019-20M.sc cs annual_2019-20
M.sc cs annual_2019-20
 
degree requirement completion form csc
degree requirement completion form cscdegree requirement completion form csc
degree requirement completion form csc
 
GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact Sheet
 
Masters in Computer Applications (MCA)
Masters in Computer Applications (MCA)Masters in Computer Applications (MCA)
Masters in Computer Applications (MCA)
 
future of a computer litrate
future of a computer litratefuture of a computer litrate
future of a computer litrate
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014
 
Portfolio
PortfolioPortfolio
Portfolio
 
Computer Organisation and Architecture Teaching Trends
Computer Organisation and Architecture Teaching TrendsComputer Organisation and Architecture Teaching Trends
Computer Organisation and Architecture Teaching Trends
 
Computer Oraganisation and Architecture
Computer Oraganisation and ArchitectureComputer Oraganisation and Architecture
Computer Oraganisation and Architecture
 
cs.pdf
cs.pdfcs.pdf
cs.pdf
 
37.%20 m.e.%20cse%20
37.%20 m.e.%20cse%2037.%20 m.e.%20cse%20
37.%20 m.e.%20cse%20
 
Query Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxQuery Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docx
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

CS@UMBC Overview

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.  
  • 7.  
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.