Monday, August 8, 2011

Quiz 9 - Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

3. Discuss techniques to prevent unauthorized computer access and use

4. Identify safeguards against hardware theft and vandalism

5. Explain the ways software manufacturers protect against software piracy.

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.

Monday, August 1, 2011

Quiz 8 - Database Management

1. Define the term, database, and explain how a database interacts with data
and information.

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

5. Differentiate between a file processing approach and the database
approach.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.

7. Explain how to access Web databases.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use

Thursday, July 21, 2011

Quiz 7 Communications and Networks

1. Discuss the components required for successful communications.

2. Identify various sending and receiving devices.

3. Describe uses of computer communications.

4. List advantages of using a network.

5. Differentiate among client/server, peer-to-peer, and P2P networks.

6. Describe the various network communications standards.

7. Explain the purpose of communications software.

8. Describe various types of lines for communications over the telephone network.

9. Describe commonly used communications devices.

10. Discuss different ways to set up a home network.

11. Identify various physical and wireless transmission media.

Tuesday, July 19, 2011

Quiz 6 - Operating Systems and Utility Programs

1.Define system software and identify the two types of system software.
2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.
3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
4.Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and
restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.


Monday, July 18, 2011

Quiz 5 - Storage

1. Differentiate between storage devices and storage media.
2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.
3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.
4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.
5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers




Friday, July 15, 2011

Quiz 4 Internet/Web/Ebooks/Documents

In your Google email account try to browse Google books and add to your library.

example: Accounting Technology, Input Devices, Output Devices.


Create also a word processing, presentation, and spreed sheets applications in Google documents.

Thursday, July 14, 2011

Quiz 3

1. Describe the four categories of output.
2. The characteristics of LCD monitors, LCD screens, plasma monitors, and HDTVs.
3. What are the components inside the systems units.
4. The components of a processor and how they complete a machine cycle.
5. Define a bit and describe how a series of bits represents data.
6. Identify the categories of application software.
7. Identify the key features of widely used business programs.
8. What are the advantages of using application software on the Web.
9. History of the Internet.
10. What are diferent storage devices.