Page 18 - IJTSRD.com - Special Issue - 2nd International Congress of Engineering
P. 18

Computer Systems EngineeringComputer Systems Engineering


         Background

         Engineering  in  Computer  Systems  is  in  high  demand  today. Engineering  in  Computer  Systems  is  in  high  demand  today.  Programs  dedicated  to  this  career  must  be Programs  dedicated  to  this  career  must  be
         designed  with  the  goal  of  staying  aware  of  scientific  advances  and  the  demands  of  society  in  which staying  aware  of  scientific  advances  and  the  demands  of  society  in  which staying  aware  of  scientific  advances  and  the  demands  of  society  in  which
         professionals have to develop. For this reason, programs in this field are constantly updating.professionals have to develop. For this reason, programs in this field are constantly updating.ofessionals have to develop. For this reason, programs in this field are constantly updating.
         pr

         Professional Profile

         An Engineer in Computer Systems is a professional capable of:An Engineer in Computer Systems is a professional capable of:


         1.  Analyze, develop and program mathematical, statistical and simulation models.Analyze, develop and program mathematical, statistical and simulation models.
         2.  Recognize and be guided by social, professional and ethical aspects in their environment.Recognize and be guided by social, professional and ethical aspects in their environment.Recognize and be guided by social, professional and ethical aspects in their environment.

         3.  Lead and coordinate multi and interdisciplinary work teams.e multi and interdisciplinary work teams.
         4.  Coordinate and carry out research that strengthens cultural, scientific and technological developments.Coordinate and carry out research that strengthens cultural, scientific and technological developments.Coordinate and carry out research that strengthens cultural, scientific and technological developments.

         5.  Apply new technologies to solve problems in their work environment.Apply new technologies to solve problems in their work environment.
         6.  Develop and manage information systems, coDevelop and manage information systems, computer networks and distributed applications.mputer networks and distributed applications.

         7.  Have a business vision, identify areas of opportunity to undertake this vision, and develop projects with Have a business vision, identify areas of opportunity to undertake this vision, and develop projects with Have a business vision, identify areas of opportunity to undertake this vision, and develop projects with
             new information and communication technologies.new information and communication technologies.

         8.  Be able to select and manage the human and computer resoBe able to select and manage the human and computer resources for different units of computation.urces for different units of computation.
         9.  Be  committed  to  sustainable  developmentBe  committed  to  sustainable  development,  respecting  the  social  and  cultural  environment  where ,  respecting  the  social  and  cultural  environment  where
             organizations are developed.
         10. Develop and administer applications and base softwares.Develop and administer applications and base softwares.

         11. Develop Man-Machine interfaces.

         12. Develop and integrate basic machineDevelop and integrate basic machine-machine architecture solutions.
         13. Provide consulting to users of different levels in an organization.Provide consulting to users of different levels in an organization.
         14. To know and apply norms and standards to different technologies of information and communications.To know and apply norms and standards to different technologies of information and communications.To know and apply norms and standards to different technologies of information and communications.

         15. Identify risks and apply security techniques throughout information and communication technologies.ply security techniques throughout information and communication technologies.ply security techniques throughout information and communication technologies.
         16. Understand and apply the legacy of the use and exploitation of computer systems.Understand and apply the legacy of the use and exploitation of computer systems.
















                                                                                                                       15
   13   14   15   16   17   18   19   20   21   22   23