Evaluation of a computer networking class in information technology

  • Authors:
  • C. Richard G. Helps;J J. Ekstrom

  • Affiliations:
  • Brigham Young University, Provo, UT, USA;Brigham Young University, Provo, UT, USA

  • Venue:
  • SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information Technology (IT) is a rapidly-developing discipline. IT instructors often design new courses to meet changing needs. There is also a need to evaluate courses once they have been designed and implemented. Evaluation of courses leads to improvements in the learning experiences for students and better understanding of the educational process and outcomes for course designers and instructors. Evaluation and improvement of quality is a requirement for programs accredited under ABET (and other accrediting bodies). A networking class in IT was selected for evaluation. Networking was selected because it is one of the core required topics in the IT curriculum. The course was compared to national standards for curriculum in the networking area. A single class was evaluated but methods were developed which can be applied to other courses in the IT discipline. The evaluation study included evaluation of the course content and the course structure. Student input was obtained through a survey instrument and the validity of the input was considered. Several questions were identified for this evaluation: Did the networking class meet student needs and expectations in terms of content and teaching approach; What are the students preferred learning styles; What coursework should a networking class include compared to what was actually taught; Did success in the earlier foundation class lead to success in the networking class; How well did students perform in this class relative to their performance in the IT major as a whole? Pursuing these questions involved data gathering from students as well as researching student records. Appropriate mechanisms were developed to protect student privacy. The evaluation of this class led to a number of useful insights and recommendations into technical class content, teaching and learning styles, and into the evaluation process. The methods of the study can be used for other courses and for other IT programs.