Information Technology ABET Outcomes

The Bachelor of Science in Information Technology (IT) degree prepares students to install, manage, and maintain the computing infrastructure on which organizational systems run. The network administration and security emphasis prepares students to work as data communication consultants, information security analysts, and network administrators. The computer forensics and security emphasis provides students with a solid foundation for employment by government or corporate sector to work in a computer forensics lab as a forensic analyst or in information security. The core of the B.S. in Information Technology degree prepares students to have strong foundations in computer architecture, data communication, information security, networks, and system administration.

In order to continually improve the curriculum, the information technology program at Utah Valley University, in collaboration with students, faculty, alumni, the advisory board, and employers, uses various assessment tools to measure achievement of student outcomes and program educational objectives.

The B.S. in Information Technology is accredited by the Computing Accreditation Commission of ABET.

Learn More About ABET Accreditation

ABET computing logo
IT Majors 2015 2016 2017 2018 2019 2020 2021
Number of Students 334 351 393 392 367 352 318
Graduation Numbers 46 46 33 48 65 69 75

Program Educational Outcomes

Within three to five years of graduation, alumni of the computer science program are expected to:

  • Practice core competencies in computing to analyze, design, develop, and implement secure information technology solutions.
  • Advance professionally with increased workplace contributions.
  • Adapt to change through continued professional development.
  • Serve in professional organizations and local communities.

Student Outcomes

  1. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.