Wilkes Community College Wilkes Community College
Wilkes Community College
YouTube Shutterfly LinkedIn Twitter Facebook

Computer Information Technology

What is Computer Information Technology? 

The Computer Information Technology curriculum is designed to prepare graduates for employment with organizations that use computers to process, manage, and communicate information. This is a flexible curriculum that can be customized to meet community information systems needs.  

Computer InformationCourse work will develop a student's ability to communicate complex technical issues related to computer hardware, software and networks in a manner that computer users can understand. Classes cover computer operations and terminology, operating systems, database, networking, security, and technical support. Graduates should qualify for employment in entry-level positions with businesses, educational systems, and governmental agencies which rely on computer systems to manage information.  

Graduates should be prepared to sit for industry recognized certification exams. Students will be able to customize the degree by choosing electives in the areas of Computer Programming, Database Design, and Web Technologies.


  • Typical Courses
  • Student Learning Outcomes
  • Additional Information
  • Checksheets
  • Contact Information

Typical Courses

  • Introduction to Programming and Logic
  • Operating System Concepts
  • Security Concepts
  • Hardware/Software Support
  • Database Concepts
  • Windows Single User
  • Windows Administration
  • Networking Basics
  • System Analysis & Design 

Student Learning Outcomes:

Graduates of the WCC Computer Information Technology Program will:

  • Design, implement, test, document and maintain a basic business application in a computer language.
  • Design, implement and maintain a relational database.
  • Utilize an operating system with business-oriented application software such as Microsoft Office.
  • Use appropriate terminology for hardware, software, networking, and computer security in both written and oral communications.
  • Pursue best information by defining a project's boundary conditions and creating a test data set for the evaluation of an application.
  • Analyze differing points of view including the user, the customer, and future programmers.
  • Pose questions to clarify a problem statement.
  • Examine underlying assumptions of a problem statement to determine the implications and consequences in developing a solution for a problem.

Occupational Outlook Handbook icon   Occupational Outlook Handbook

ED.Gov logoGainful Employment Information

  

Additional information and links coming soon.

Contact Information:

Michael Souther Jere Miles
Michael E. Souther
Lead Instructor,
Computer Information Technology
(336) 838-6428
michael.souther@wilkescc.edu
Jere D. Miles
Instructor,
Computer Information Technology
(336) 838-6437
jere.miles@wilkescc.edu