About the Department

The department offers the following degree programs:

  • BS in Information Technology

The Amharic translation of BS in Information Technology is የሳይንስ ባችለር ዲግሪ በኢንፎርሜሽን ቴክኖሎጂ

Program History

The Information Technology undergraduate program, established in 2002 by the College of Business and Economics, was later moved to the College of Engineering and Technology in 2005. It initially had 5 instructors and admitted 21 students. The department now has 19 instructors, including 1 PhD, 3 PhD candidates, and 15 MSc holders. In 2013, the department introduced the Masters of Science in Information Technology program. The number of students admitted has increased over the years.

Program Educational Objectives

The BS in information technology program supports the mission of Jimma University (JU) as stated previously in the mission statement. The course selection and content remain current through continuous assessment by faculty, alums, Advisor Board (AB) members, and industry employers. To accomplish this mission, the program educational objectives (PEO) of the BS Information Technology program faculty, with advice from alums, AB members, and industry employers, are:

  • Alums will excel in their careers in industry, academia, and government.
  • Alums will engage in life-long and continuous learning, including advanced degrees.
  • Alums will have a major role in activities leading to the economic development of the local, national, and global communities.

Student Outcomes

By the time of graduation, the graduates of the BS Information Technology program will have the ability to:

  1. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.