
WEIGHT: 56 kg
Bust: 36
1 HOUR:100$
NIGHT: +80$
Sex services: Photo / Video rec, Female Ejaculation, Role playing, Uniforms, Oral
Candidates who have successfully completed a Professional Technology Diploma or have obtained equivalent qualifications within three years may apply for direct entry into Level 2 of the degree programme, subject to availability of places. Candidates admitted under the above regulation will normally be exempted from level 1 on a module-by-module-basis. No candidate may complete the degree in less than three academic levels. Successful completion of the Work-Related Learning component at level three is compulsory for all candidates.
Orientation: Research and innovation oriented. Teaching and learning are professionally oriented and focused on practical aspects. Distinctive Features: The programme builds the research-technology-innovation continuum and focuses on knowledge development and application using a student-centred approach. Teaching and Learning Methods: Lectures, e-learning, tutorials, seminars, group work, computer laboratory classes, industrial visits, Work-Related Learning, research project and individual independent study.
Assessment Methods: Written and oral examinations, tests, computer project, presentations, Work-Related learning reports, mini WRL research project, final year research project report, and continuous assessments. No continuous assessment shall be carried over to the next semester.
Unless the Academic Board has granted prior permission for an extension of this deadline any candidate who fails to meet this submission deadline shall normally fail the dissertation or project. In such cases, on the recommendation of the Examiners, candidates may be permitted to resubmit the dissertation or project at a later date, normally within three months of the original submission deadline.
IS Introduction to Information Security IS Cyberspace Ethics and Laws IS Research Methods and Statistics IS Organizational Behaviour IS Firewall Fundamentals IS Cryptanalysis and Development of Cryptosystems This module covers the security systems development life cycle, and critical characteristics of information CIA.