Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Week 14 -15
1.11.1: Define and identify Boolean operators and their relationship to search engines.
1.11.2: Conduct searches using operators common to search engines (e.g., quotation
marks, minus sign).
1.11.3: Identify the importance of keywords and conduct keyword searches.
1.11.4: Distinguish among search sites, information portals, and pages automatically
provided when an error occurs.
1.11.5: Evaluate research for soft and hard-copy resources, and verify factuality.
1.11.6: Identify meta search engines, as well as search engine ranking techniques.
1.11.7: Explain how search engine sites use spiders to enhance search results.
1.11.8: Cite references to information obtained from Internet-based searches using
accepted citation standards (e.g., MLA).
1.11.9: Search additional Internet resources to fulfill job-role duties.
1.11.10: Distinguish between authoritative peer-reviewed and open peer-reviewed
sources.
1.11.11: Provide examples of both primary and secondary resources, as well as indexes.
1.11.12: Explain key differences between popular and scholarly journals.
1.16.1: Distinguish between relational and non-relational databases.
1.16.2: Define common relational database concepts, including table, row, record,
column, field, data value, join.
1.16.3: Identify relationships between tables, including one-to-one, one-to-many,
many-to-many.
1.16.4: Explain the purpose of SQL in querying databases.
1.16.5: Identify common database vendors.
Firefox, and
Google chrome
1.5.14: Explain the function of a CAPTCHA when requesting services from the Web.
1.6.1: Configure an e-mail client to send and receive e-mail, including SMTP, POP3,
IMAP, Web-based e-mail support.
1.6.2: Distinguish between MIME, S/MIME and PGP/GPG.
1.6.3: Configure an appropriate e-mail signature and identify its usefulness in a
business setting.
1.6.4: Identify the usefulness of an e-mail thread, and when it is appropriate.
1.6.5: Identify spam and take steps to manage it, including creation of client-side
filters and SMTP authentication.
1.6.6: Define blind copying (BCC).
1.6.7: Distinguish e-mail forwarding from replying.
1.6.8: Identify e-mail etiquette, including emoticons, ALL CAPS type.
1.6.9: Identify ways that e-mail is used in the workplace, including elements of a
successful e-mail message (e.g., greeting, central message, action items, conclusion).
1.6.10: Identify common e-mail issues in the workplace, including harassment, when
to use e-mail, e-mail message storage.
1.6.11: Use "Out of Office" messages for e-mail automatic reply (i.e., autoresponder)
services.
1.6.12: Attach files to e-mail messages.
1.6.13: Use e-mail to share files and documents within and across organizations.
1.6.14: Identify concerns for Web-based and IMAP-based e-mail.
1.6.15: Identify situations in business environments when e-mail is more appropriate
than texting for communicating, and vice-versa.
1.7.6: Identify privacy concerns related to network communications (e.g., e-mail,
instant messaging, P2P).
1.12.1: Identify ways that calendar and scheduling software helps organize IT-based
activities.
1.12.2: Identify Personal Information Management (PIM) productivity applications,
including tools for PCs and smartphones.
2016-2017(IBA)
Digital Tech
Austin, Faulkingham
Agenda- Monday- eq and hook 1 review practice 103 objective 2 read ageda and create action plan 3 team presentation of L#5 objectives 4 start exercises/Mastery a-b/labs 5 reading 6 homework study f/test finish all exercises and mastery activities.
Tuesday: 1 finish objective presentation 2 continue reading and summarizing lesson#5 3 complete all labs 4 start exercises 5 discuss what you learned
Week 12 Days 49-52
Question
Can you compare and contrast you
answer with mine? LAN and WAN. LAN's are local area network (LAN) A group of computers connected within a confined geographic area. WAN is wide area network (WAN) A group of computers connected over an expansive geographic area so their users can share
files and services.
The two main types of network structures are L.A.N and W.A.N. L.A.N are local area networks. W.A.N are wide area networks and it is like a system of computers the around a county. Internet-A worldwide network of interconnected networks. The Internet was created in 1969 when the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) funded what would become the first global computer network, the Advanced Research Projects Agency Network (ARPANET). Backbones-The highest level in the computer network hierarchy, to which smaller networks typically connect. Gateway-A node on a network that serves as a portal to other networks. The World Wide Web got its name to from European Particle Physics Laboratory in Geneva, Switzerland when scientists wanted to keep their ideas secret and share them more efficiently. Every computer connected to the Internet uses a protocol suite called Transmission Control Protocol/Internet Protocol (TCP/IP), which enables computers to communicate with one another. TCP enables two computers to establish a
communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets.
1.2.1: Distinguish between a client and a server.
1.2.2: Explain Internet history, define current protocols (e.g., IPv4, IPv6, related
protocols), and identify timelines and models for technology adoption curves (e.g.,
Moore's Law, Geoffrey Moore's technology adoption life cycle, Kuhn's concept of
paradigm shifts).
1.2.3: Identify the infrastructure needed to support an Internet client, including
TCP/IP stack software, operating system, network connection, Web browser, e-mail,
hardware platform (PC, laptop, tablet, smartphone, smart TV).
1.2.4: Identify hardware and software connection devices and their uses, including
various types of modems (e.g., analog, ISDN, DSL/ADSL, cable), and connect systems
to the Internet and other networks using basic cable/ADSL and wireless equipment.
1.2.5: List elements, benefits and drawbacks of cloud computing, including Software
as a Service (SaaS), grid computing, offline computing features.
1.3.1: Define the purpose of remote access protocols, including Point-to-Point
Protocol (PPP), Point-to-Point Protocol over Ethernet (PPPoE).
1.3.2: Identify various types of Internet bandwidth technologies (link types), including
T and E carriers, fractional T and E lines, and common DSL/ADSL, wireless and
cable speeds.
1.3.3: Map protocols to specific business services (e.g., SMTP, IMAP and POP3 to email;
HTTP and HTTPS to Web browsers; FTP to file transfer).
1.4.1: Define the purpose of the Domain Name System (DNS).
1.4.2: Identify Internet domain names, including top-level or original domains (edu,
com, net, gov, org), country-level domains (e.g., uk, ch, tv) and newer domains (e.g.,
biz, info).
1.4.3: Describe the hierarchical structure of DNS.
1.4.4: Identify basic domain name server roles.
3-2 Internet Business Associate
© 2014 Certification Partners, LLC. — All Rights Reserved. Version 2.1
1.4.5: Describe Internet addresses.
1.4.6: Define shared domains.
1.19.6: Define essential social networking terms, including crowdsourcing, social
tagging (e.g., Delicious) and semantic Web, and identify social networking sites and
resources (e.g., Facebook, MySpace).
Austin Faulkingham
SEPTEMBER, MONDAY, DAY 32
E.Q.-What was your homework?
Hook-Did you complete your
homework? why? Why Not?
Austin Faulkingham
1.1.1: Distinguish between individual job roles within the IT industry and the IT
profession as a whole. End users only work with each other.
1.1.2: Identify responsibilities, tasks and skills of a Web site designer for both
traditional and mobile Web sites.They create the look and feel for web sites on the World Wide Web.
1.1.3: Distinguish between a Web architect and a Web application developer.The Web application developer develops the languages or product of the web site as the Architect is the over view plan of the web site.
1.1.4: Identify responsibilities, tasks and skills of a Web site analyst.They are tasked to look at the web sites effectiveness.
1.1.5: Identify responsibilities, tasks and skills of a Web site manager. Manages a web site development team.
1.1.6: Identify responsibilities, tasks and skills of a database administrator.Responesable Maintenance and Security of an organizations database.
1.1.7: Identify responsibilities, tasks and skills of a server administrator, including email/groupware administrator, Web server administrator, cloud-based server
administrator.Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Cloud computing is
software services that are provided over the Internet, rather than at a company site
1.1.8: Identify responsibilities, tasks and skills of a network engineer.Network engineers focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization.
1.1.9: Distinguish between a security manager and a security analyst/consultant.Security managers are responsible for managing the security measures used to protect
electronic data. Security analysts/consultants are responsible for examining an organization's security
requirements and determining the hardware, communications and software capabilities
needed to satisfy the requirements.
1.1.10: Identify responsibilities, tasks and skills of a PC and mobile device repair
technician. PC repair technicians install, modify and repair personal computer hardware components, such as PCs, disk drives, CD/DVD drives, tape devices, monitors, keyboards, data input devices and other peripheral equipment.
1.1.11: Identify responsibilities, tasks and skills of a help desk technician.Help Desk Technician diagnose and resolve users' technical hardware and software
problems.
1.1.12: Identify responsibilities, tasks and skills of a Web marketing professional.Web marketing managers are responsible for developing and implementing plans to take
advantage of the sales and marketing opportunities available through the Internet.
1.1.13: Identify responsibilities, tasks and skills of a mobile Web application
developer.
1.1.14: Interpret a common business organization chart, including identifying duties
of a Chief Executive Officer (CEO) versus a Chief Operations Officer (COO).Chief Executive
Officer (CEO) The highest-ranking corporate officer in charge of the total management of
an organization, reporting to the board of directors. Chief Operations Officer (COO) In charge of the operations management of the domain and is responsible for the design, development and operation of the systems that create and deliver the enterprise's products and services.
1.2.2: Explain Internet history, define current protocols (e.g., IPv4, IPv6, related
protocols), and identify timelines and models for technology adoption curves (e.g.,
Moore's Law, Geoffrey Moore's technology adoption life cycle, Kuhn's concept of
paradigm shifts). In 1962, Thomas Kuhn defined and popularized the concept of a "paradigm shift" in reference to the philosophy of science.Moore's Law continues to hold true for almost every measure of the capabilities of digital electronic devices, including computer processing speed, memory capacity and so forth.
1.15.6: Explain common models for information flow and reporting between IT and
upper management, as well as IT and other areas of the organization, including
identifying project approval steps, SWOT analysis, data modeling vs. business
ontology. Business ontology is meant to describe how a business (i.e., domain) is organized and how it processes data
1.15.15: Identify the importance of quality management and assurance, including
ISO 9000 standards. ISO is a grouping of national standards bodies from 157 countries. ISO develops technical specifications for intellectual, scientific, technological and economic activities worldwide.
1.20.1: Identify and explore career opportunities in the IT industry that relate to
personal career goals.Web marketing managers because you want to try and become a manager
1.20.2: Conduct job searches.Attending job or career fairs.
1.20.3: Use Internet technology to obtain employment, including employment sites
and networking sites such as Linked In.CareerBuilder (www.careerbuilder.com)
• Yahoo! Careers (http://careers.yahoo.com) • Indeed (www.indeed.com)
1.20.4: Create a résumé and place it in an appropriate file format (e.g., ASCII, HTML,
RTF, PDF).Unless the recipient has the same program you used to create the résumé, he or she may not be able to view it electronically. The résumé's formatting may render inconsistently on different computers. Résumés sent as e-mail attachments are vulnerable to viruses, which may infect the recipient's computer.
1.20.5: Determine the relevance and necessity of education as job roles,
responsibilities and technologies change.Technology becomes more sophisticated and complex, employers will demand a high level of technical expertise
1.21.1: Communicate technical issues and concerns to an end user. communicate a technical response or concept in terms that end users can understand so that they can implement your solution.
1.21.2: Demonstrate the value of IT-related expenses to management and stakeholders. Your understanding of networking technologies will help you communicate these concerns, and may help your company profit in the future.
Day 37 Monday
E.Q.- In computer science and Web technology, what is ontology?
Hook- Why in the IT industry do you have to have good communication skills?
Day 39 Wesnday
Day 31 week 7
EQ-Reflect on this week's lesson,
what did you learn?
Hook-Describe two facts that
contributed to your learning this week.
Explain using complete sentences.
EQ And Hooks
Day 30 of week 7
EQ-
Hook-
Day 28 of week 7
EQ-Evaluate 2 strategies, how did they
compare in being effective in preparing for the
lesson's Quiz?
Hook-
Lesson 2 Objectives
1.7.3: Use remote-assistance clients and servers, including Microsoft Remote Services.
1.7.4: Configure and use instant messaging clients.
1.7.6: Identify privacy concerns related to network communications (e.g., e-mail, instant messaging, P2P).
1.7.8: Identify the benefits and drawbacks of text messaging and Short Message Service (SMS) applications (e.g., mobile phone services, Twitter).SMS gateways are services that allow you to send text messages to an instant messaging (IM) service, phones that support SMS, the World Wide Web and desktop computers.
1.8.1: Define etiquette for Internet-based services and identify common communications aids.Netiquette has been coined to encourage common sense and politeness, and to establish general rules for Internet etiquette
1.8.2: Identify ethical issues when communicating with others using Internet-based technology.The ethical issues that apply to face-to-face communication also apply to Internet based
communications.
1.8.3: Recognize and avoid sexual harassment.OK
1.8.4: Create pertinent, appropriate and brief messages.When sending e-mail or instant messages, or posting messages to newsgroups, be sure to create messages that are pertinent, appropriate and brief.
1.8.5: Define convergence and unified communications technologies, including Voice over IP (VoIP), presencing, mobile computing, call/contact centers, conversion of voice to text.Convergence technology is the integration of voice and data networks to create a unified means of exchanging and storing electronic information. Unified communications (UC) is a business trend that seeks to simplify and integrate all forms of communication.
1.19.1: Identify common elements of a blog (e.g., creating an entry, posting replies, common features of blogging services).
It consists of brief, informal thoughts focused on a specific topic.
It reflects the personality of the author in a unique way.
It can contain links to other authors or sites.
It is written in chronological order and commonly displayed in reverse chronological order.
1.19.2: Define the concept of a mashup.Mashup is a Web page that merges content and scripts.
1.19.3: Distinguish between traditional categories and folksonomies.Folksonomy is the practice of categorizing online content through tags.
1.19.4: Identify key elements of a wiki. Edit button,Wikis provide users with both author and editor privileges, and information that all other users can access as well as populate.
1.19.5: Identify elements of a news feed service (e.g., syndication, RSS-to-e-mail services, Feedblitz, Feedburner).
1.19.6: Identify social networking sites and resources (e.g., Facebook, Google+), and define essential social networking terms, including crowdsourcing, social tagging (e.g., Delicious), semantic Web.it refers to the changing trends in
the use of World Wide Web technology and Web design since the early days of the Web when most Web pages were static.
Day 29 of week 7
EQ-Evaluate 2 strategies,
how did they compare in
being effective in preparing
for the lesson's Quiz?
Hook-Describe your overall opinion
of the sub yesterday. Did she carry
out the agenda as stated? Explain
Day 27
Week 7
EQ-What are two differences between objective 1.1.12 and 1.1.13?