Engineering Exploration I EGR 101

Introduces students to the engineering and computer science professions, College of Engineering degree programs, and opportunities for career path exploration. Topics and assignments include study skills, team development, ethics, problem solving and basic engineering tools for modeling, analysis and visualization.

Correlated Learning Outcomes

  • SE-04 Illustrate common behaviors that contribute to the effective functioning of a team. [Applying]
  • SF-01 Illustrate the basic building blocks of computers and their role in the historical development of computer architecture. [Applying]
  • SP-01 Investigate both positive and negative ways in which computing technology impacts information exchange and social interaction. [Applying]
  • SP-02 Examine developers’ assumptions and values embedded in hardware and software design, especially with respect to underrepresented groups and diverse populations. [Analyzing] See also HCI-06.
  • SP-03 Analyze the impact of diversity on the computing profession. [Analyzing]
  • SP-04 Investigate social engineering attacks and the types of bad actors who might perform them. [Applying]
  • SP-05 Contrast stakeholder positions in a given scenario. [Analyzing]
  • SP-06 Analyze social tradeoffs in technical decisions. [Analyzing]
  • SP-07 Examine various ethics scenarios in computing. [Analyzing]
  • SP-08 Support the ethical responsibility of ensuring software correctness, reliability, and safety. [Evaluating]
  • SP-09 Compare professional codes of conduct from the ACM, IEEE Computer Society, and other organizations. [Analyzing]
  • SP-10 Differentiate the terms among intellectual property, fair-use, copyright, patent, trademark, and plagiarism. [Understanding]
  • SP-11 Discuss the rationale for legal protection of intellectual property. [Understanding]
  • SP-12 Outline the need for legal protection of personal privacy. [Analyzing]
  • SP-13 Investigate threats to privacy rights in personally identifiable information (PII). [Applying]
  • SP-14 Illustrate the role of data collection in the implementation of pervasive surveillance systems. [Applying]
  • SP-15 Analyze technological solutions to privacy concerns. [Analyzing]
  • SP-16 Use effective oral, written, electronic, and visual communication techniques with stakeholders. [Applying]
  • SP-17 Interpret the impact of both verbal and nonverbal cues during communication among team members. [Understanding]
  • SP-18 Develop technical artifacts. [Creating]
  • SP-19 Analyze case studies related to sustainable computing efforts. [Analyzing]
  • SP-20 Investigate laws applicable to computer crimes. [Appying]
  • SP-21 Examine the motivation and ramifications of cyber terrorism and criminal hacking. [Analyzing]
  • SP-22 Write a company-wide security policy. [Applying]