College of Computer Studies
Mission
Provide students with quality education with the use of the best resources to become globally competitive and responsive to the needs of the community and industry.
Vision
The College envisions producing students who are imbued with adequate competencies and standard skills in Information and Communication Technology (ICT).
Goals and Objectives
- To advance the frontiers of knowledge and technology through quality instructions, research, and training that encourage maximum use of all resources and facilities available.
- To act ethically, demonstrate problem-solving skills, and think critically with multiple learning pathways for continued effectiveness in the ICT profession.
- To prepare students for an increasingly challenging world in the field of ICT
The College of Computer Studies or CCS offers two baccalaureate programs, namely:
- BS in Computer Science
The Software Technology (ST) specialization trains students to have the ability to develop and manage complex and reliable software systems. It provides a comprehensive and in-depth treatment of the different bodies of knowledge in Computer Science. The program trains students in the discipline of software engineering, focusing on the design of efficient, reliable, and quality software products. This makes ST students more capable of doing intensive ICT research.
The Software Technology program prepares students to become mature software engineers and researchers. - BS in Information Technology (Technopreneurship)
The Information Technology (IT) specialization aims to produce quality graduates who have the knowledge and skills to understand business and organizational problems, as well as to analyze, formulate, and evaluate IT and business solutions. The program includes 500 hours on-the-job training program that is supported by strategic alliances with cutting-edge IT partners in the ICT Industry.
- BS in Computer Science
Admission Policy
Appropriate to the fact that all students of Pamantasan ng Lungsod ng Pasig (PLPasig) are considered ‘Iskolar Ng Bayan’ and that the College of Computer Studies (CCS) require skills on Information and Communication Technology (ICT) from its students; a stringent and more suitable skills-based admission process for CCS is necessary.
Pre-requisites:
- 85.0 Graded Weighted Average (GWA) for both BS in Information Technology and BS in Computer Science programs.
- STEM strand graduate for BS in Computer Science program
- STEM or ICT strand graduate for BS in Information Technology program
The college adheres to the procedures mandated by the University on the admission process.
Retention and Migration Policy
As mandated by the University code
Use of Computer Laboratory Policy
In an effort to protect the resources of the school and the city government of Pasig. The following are the persons allowed to use the computer laboratories assigned to CCS:
- Current faculty members of CCS
- Current students of CCS
- Students from other colleges who have obtained a special schedule from the CCS, including their professors
- MIS personnel
Computer laboratory use policy consists of the following rules and policies listed below. The use of computer lab workstations is also governed by University and CCS policies:
Any person found violating computer lab rules or policies may lose their lab privileges together with a penalty imposed by the University based on the University code of conduct.
- Students are to wait for their professor outside the laboratory and should leave the room immediately after class hours.
- Students are required to use shoe cover upon entering the facility.
- Bags and other personal belongings placed only at the designated location inside the Laboratory.
Students are not allowed to use their mobile devices during class.
- Students are not allowed to use and connect external storage (e.g. USB drives) to PC units and workstations.
- Students are not allowed to charge electronic devices inside the computer laboratory, other than a laptop.
- Students are not allowed to work on things not related to current the subject, including playing games, music or videos.
- Students are not allowed to access work of other students without any permission.
- Students are not allowed to install software programs without any permission from authorities.
- Attempting to get access to other computers or files within the network is strictly not allowed.
- Students must always observe proper handling of equipment. In failure of such case, the student will be penalized based on the university code of conduct.
- After use, students should properly shut down the pc unit and push back the chairs.
- In case of computer malfunctions, students shall notify the professors of it. In no case shall the student is allowed to rectify or correct problems related to hardware failure.
- Students are not allowed to operate AC units in the computer laboratory, including changing the thermostat settings.
- The instructor will always observe the First In Last Out policy. Upon entering the computer laboratory, the instructor shall be the first person to enter, facilitate students to their respective workstation, and monitor student’s activity throughout the class period.
- Instructors will check the computer units and peripherals before and after using the computer laboratory.
The following are classified as MINOR Offence:
- Smoking, eating and drinking inside the computer laboratory
- Playing computer games or using programs not related to subject
- Using unsafe external storage devices
- Failure to inform professors of computer problems or damages
- Bringing and using unauthorized materials or electronic gadgets
- Transferring and roaming around the computer laboratory without permission
- Turning on and changing the thermostat setting of AC units
- Tampering of other student’s files
- Tampering of computer settings (e.g. desktop settings)
- Installation of unauthorized software programs
The following are classified as MAJOR Offense:
- Tampering of computer units and or its peripherals, regardless of intention
- Theft of computer units and or its peripherals
- Damaging computer units and or its peripherals, regardless of intention
- Unauthorized access to computer networks, computers, and computer files