Monday, August 8, 2011
Quiz 9 - Computer Security and Safety, Ethics, and Privacy
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.
3. Discuss techniques to prevent unauthorized computer access and use
4. Identify safeguards against hardware theft and vandalism
5. Explain the ways software manufacturers protect against software piracy.
6. Discuss how encryption works, and explain why it is necessary
7. Discuss the types of devices available that protect computers from
system failure
8. Explain the options available for backing up computer resources.
9. Identify risks and safeguards associated with wireless communications.
10. Discuss ways to prevent health-related disorders and injuries due to
computer use.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
Monday, August 1, 2011
Quiz 8 - Database Management
and information.
2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
3. Discuss the terms character, field, record, and file
4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
5. Differentiate between a file processing approach and the database
approach.
6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
7. Explain how to access Web databases.
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.
10. Discuss techniques to prevent unauthorized computer access and use
Thursday, July 21, 2011
Quiz 7 Communications and Networks
2. Identify various sending and receiving devices.
3. Describe uses of computer communications.
4. List advantages of using a network.
5. Differentiate among client/server, peer-to-peer, and P2P networks.
6. Describe the various network communications standards.
7. Explain the purpose of communications software.
8. Describe various types of lines for communications over the telephone network.
9. Describe commonly used communications devices.
10. Discuss different ways to set up a home network.
11. Identify various physical and wireless transmission media.
Tuesday, July 19, 2011
Quiz 6 - Operating Systems and Utility Programs
2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.
3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
4.Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and
restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.
Monday, July 18, 2011
Quiz 5 - Storage
2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.
3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.
4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.
5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers
Friday, July 15, 2011
Quiz 4 Internet/Web/Ebooks/Documents
example: Accounting Technology, Input Devices, Output Devices.
Create also a word processing, presentation, and spreed sheets applications in Google documents.
Thursday, July 14, 2011
Quiz 3
2. The characteristics of LCD monitors, LCD screens, plasma monitors, and HDTVs.
3. What are the components inside the systems units.
4. The components of a processor and how they complete a machine cycle.
5. Define a bit and describe how a series of bits represents data.
6. Identify the categories of application software.
7. Identify the key features of widely used business programs.
8. What are the advantages of using application software on the Web.
9. History of the Internet.
10. What are diferent storage devices.
Friday, July 8, 2011
Quiz 2
1. Describe various types of pen input, and identify other types of input for smart phones.
2. The purpose of various game controllers: gamepads, joysticksand wheels, light guns, dance pads,
and motion-sensing game controllers.
3. Explain how resolution affects the quality of a picture captured on a
digital camera.
4. Describe the uses of voice recognition, Web cams, and video conferencing.
5. Discuss how various scanners and reading devices work: optical scanners,
optical readers, bar code readers, RFID readers, magnetic stripe card
readers, MICR readers, and data collection devices.
6. Summarize the various biometric devices: fingerprint reader, face
recognition system, hand geometry system, voice verification system,
signature verification system, and iris recognition system
Wednesday, July 6, 2011
Quiz July 5, 2011
Quiz:Post this in your blogs!
1.Define input and differentiate among a program, command,and user response.
2.Identify the keys and buttons commonly found on desktop computer keyboards,
and describe how keyboards for mobile computers and devices differ
from desktop computer keyboards
3.Describe different mouse types and explain how to use a mouse.
4.Describe various types of touch screens and explain how a touch-sensitive
pad works
Monday, July 4, 2011
My Pix Something
Blue Hills is a community in Hartford County, Connecticut, encompassing the northwest corner of the city of Hartford and the southwest corner of the town of Bloomfield. The Bloomfield portion is listed by the U.S. Census Bureau as a census-designated place (CDP). The population of the Bloomfield CDP portion was 3,020 at the 2000 census.
Blue Hills is home to many schools and homes. It has roughly 10,000 residents, and has several schools and one university located there. Its main thoroughfares are Granby Street, Blue Hills Avenue (Route 187), Plainfield Street, Bloomfield Avenue (Route 189) and Albany Avenue (Route 44). Connecticut Transit operates several bus routes through the neighborhood, such as the 50 and 52, which run on Blue Hills Avenue, the 56 and 58, which run up on Albany Avenue and Bloomfield Avenue, the 74, which runs through Westbrook Village on its way to Copaco Shopping Center via Granby Street, and the 76, which runs on Cornwall Street towards Bowles Park. Blue Hills has a majority of West Indian and African American people living there. Education wise Annie Fisher School, Mountain Laurel School (Annie Fisher School Annex), Rawson School, Mark Twain School, Weaver High School, Watkinson School, and the University of Hartford.
Wednesday, June 29, 2011
My Dear CompEd321 Class Blog List
Add this URL in the Blog list. Thank you!
http://abillonaviegel.blogspot.com/
http://aldejoiceabegail.blogspot.com/
http://antoquemyraflor.blogspot.com/
http://avilamylene.blogspot.com/
http://bahidisheryl.blogspot.com/
http://balondozahrra.blogspot.com/
http://bandibaslloyd.blogspot.com/
http://baroykristine.blogspot.com/
http://batojonalyn.blogspot.com/
http://besinanlaysa.blogspot.com/
http://caacogeecris.blogspot.com/
http://cabreraeunnyjean.blogspot.com/
http://cariomarialyn.blogspot.com/
http://delacruzlyka.blogspot.com/
http://delarosafpemaj.blogspot.com/
http://gigershiva.blogspot.com/
http://gonzalescharissajane.blogspot.com/
http://alicejeanlayon.blogspot.com/
http://clydon-leonor.blogspot.com/
http://lingaolingaoshiela.blogspot.com/
http://madrigal.blogspot.com/
http://manulatmelody.blogspot.com/
http://molinajoseph.blogspot.com/
http://ogoskristel.blogspot.com/
http://ordanezarechel.blogspot.com/
http://darkietamara.blogspot.com/
http://pantinopleharrahjane.blogspot.com/
http://romerareymund.blogspot.com/
http://sarabiamartlee.blogspot.com/
http://selgasherbert.blogspot.com/
http://torculasrosemarie.blogspot.com/
http://villamorjenny.blogspot.com/
http://villartajunmar.blogspot.com/
http://vintaremedith.blogspot.com/
Ask me if your blog is not included or some changes of your blog url!
Welcome to Blog Class CompEd 321L
A blog (a blend of the term web log)is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. Blog can also be used as a verb, meaning to maintain or add content to a blog.
This is a way to express your idea and knowledge. I hope in future maybe we have place for our success in the different location but we always be in technology trend. Thank you class for the patient to create your own personal blog.
Keep up the good work class and God bless!