Students will be able to describe how a computer operates in processing data. We will discuss transistors and microchips, show how data is represented electronically in the computer, explore the inside of the system unit—including the power supply, the motherboard, and microprocessors—and outline the operations of the central processing unit and the machine cycle. We will then discuss the different kinds of main memory and conclude this unit by showing how expansion cards, bus lines, and ports give a computer more versatility.
Students will also be able to describe the various devices used to store data before and after it is processed—hard disks, optical disks (CD, DVD, Blu-ray), flash and solid-state memory, smart cards, and cloud-based (online) storage.
This week we will be working in the lab with a specialized Operating System installation. We will be repartitioning the hard drives of our lab PCs to prepare for a Dual Boot configuration, and installing a specialized OS (Kali Linux) that we will use in the second half of our course.
Use the link to the Kali Documentation: Making a Kali Bootable USB website to discover the process for producing a Live Boot USB for Kali Linux. Note the differences, advantages and disadvantages of a Live Boot OS versus a Hard Disk installation. You will be provided with a USB in class, and we will walk through the steps of producing a Live Boot USB drive that we will use to complete the Kali installation.
Next, visit the Kali Documentation: Dual Boot Kali with Windows to get an overview of how we will use our newly created Kali USB to perform a hard drive installation of Kali alongside Windows 7.
You will be directed in class how to Live Boot from the Kali USB installation, and use the gparted utility software to repartition and format a 30 GB secondary partition on your hard drive. Once the hard drive is prepared with this second partition, you may proceed with the installation process.
Reboot from the Kali USB, and select the GUI Installer.
Use the information provided by the instructor for the username and password. Make sure you set the time zone correctly (no DST), use the information on the board for the Host name and Domain, and choose “no” when asked to use a network mirror.
Remove the Kali USB and reboot to test your installation. Your installation is complete when the PC automatically reboots to the GRUB loader and boots into Kali without prompting.
Assigned: November 6th, 2017
Due Date: November 13th, 2017
This week we will be working in the lab with Operating Systems installation. We will be wiping and repartitioning the hard drives of our lab PCs, performing a basic operating system installation (Windows 7), and installing a specialized OS (Kali Linux) that we will use in the second half of our course.
Collect your PC from the storage shelf and assemble it on the tables in Lab 212. Connect all peripherals and test it to ensure that it still boots to the desktop login window. You do not need to log in.
Windows 7 installation disks will be distributed. Boot from the Windows 7 installation disk to begin the installation process.
You will be directed in class how to partition and format your hard drive. Once the hard drive is formatted to a single active partition, you may proceed with the installation process.
Follow the installation process, paying close attention to all instructions and prompts.
The required Account Name, Password and Machine Name naming convention will be written on the whiteboard in front of the room. Please make sure you type the Account Name and Password correctly, using capitals where indicated. Also, please take care to follow the correct Machine Name convention. DO NOT MAKE UP YOUR OWN INFORMATION FOR THESE STEPS.
Your Windows 7 installation is nearly complete when your machine boots to the desktop, and you have successfully logged into the Admin account. You should then browse to the Dell Support page, where you will download and install all required device drivers and support software. You will also be required to install the Microsoft Security Essentials virus and malware protection utility from the Microsoft website.
Once all device drivers and the Microsoft Security Essentials application is installed, proceed to the Windows Control Panel, and click System and Security to access the Windows Update settings. Click the Check for Updates button to search for updates and service packs. Install all require service packs and updates that are available.
Your Windows 7 installation is complete when all required device drivers, security software, service packs and system updates are complete. Next week, we will install a specialized OS called Kali Linux, that is specifically designed for offensive security and penetration testing
Assigned: October 31st, 2017
Due Date: November 3rd, 2017
Students will be able to identify and describe system software and application software, discuss the operating system and its principal functions, the characteristics of device drivers and utility programs, common features of the graphical software environment and how they relate to the keyboard and the mouse. Students will also be able to identify and describe common desktop, network, and portable (embedded) operating systems.
Students will also be able to describe the seven ways of obtaining application software and the tools to help learn it, as well as data files, program files, filename extensions, the purposes served by export/import, and data compression. Students will be able to identify and discuss several kinds of application software: word processing, spreadsheet, database, office suites, integrated packages, and specialty application software.
Click the https://connect.mheducation.com/ link to connect to the online testing website. Log in with your credentials that we set up in the second week of class.
Navigate to the “Test Your Might – Chap. 3 Quiz”.
The quiz is 100 questions, all multiple choice, and includes questions from Chapters 1, 2 and 3.
Please put away all notes, study guides and other materials before starting the quiz.
Please close all other documents and webpages and do not open any new tabs or windows until after you have submitted the quiz.
Please remain silent until everyone has completed the quiz.
Submit your test answers before the end of the class period today.
When you have completed your quiz, you may begin reading Chapter 4 in the online textbook.
Assigned: October 27th, 2017
Due Date: October 27th, 2017
Students will be able to identify and describe system software and application software, discuss the operating system and its principal functions, the characteristics of device drivers and utility programs, common features of the graphical software environment and how they relate to the keyboard and the mouse. Students will also be able to identify and describe common desktop, network, and portable (embedded) operating systems.
Students will also be able to describe the seven ways of obtaining application software and the tools to help learn it, as well as data files, program files, filename extensions, the purposes served by export/import, and data compression. Students will be able to identify and discuss several kinds of application software: word processing, spreadsheet, database, office suites, integrated packages, and specialty application software.
Students will be able to identify and describe system software and application software, discuss the operating system and its principal functions, the characteristics of device drivers and utility programs, common features of the graphical software environment and how they relate to the keyboard and the mouse. Students will also be able to identify and describe common desktop, network, and portable (embedded) operating systems.
Students will also be able to describe seven ways of obtaining application software and the tools to help learn it, as well as data files, program files, filename extensions, the purposes served by export/import, and data compression. Students will be able to identify and discuss several kinds of application software: word processing, spreadsheet, database, office suites, integrated packages, and specialty application software.
I can demonstrate my understanding of Networking fundamentals by organizing and assembling a local area network in accordance with OSHA regulations and best practices.
TCP/IP – Transport Connect Protocol/Internet Protocol
Occupational Safety and Health Administration
Cable Management
Assignment:
This week, we will be working in one of the Computer Studies labs, where we will organize and assemble a local area network to function in a working classroom.
Observe the lab that we are working in. Section 1910.22(b)(1) of the Occupational Safety and Health Act states: “Aisles and passageways shall be kept clear and in good repairs, with no obstruction across or in aisles that could create a hazard.” Do you see any conditions in the lab that might violate this standard?
Each student collect their Dell PC from the shelf where they are stored, as well as all of the necessary cables and peripherals, taking care to keep the cables organized and close to the PC. Students should also take note of the collection of network cables, as they will be called upon to select one of an appropriate length when it is time to assemble the network.
Refer to the in-class discussion on Network Hardware and Network Topologies – which would be the best physical topology for the proposed class configuration, given the networking equipment we have on hand?
As a class, we will decide on the best arrangement for the desks and tables, given the room’s existing network infrastructure and the technical and physical requirements of our class, as well as OSHA regulations and best practices.
With these requirements in mind, reassemble the network according to the instructor’s directions. Take care to bundle network and power cables and to ensure that they do not protrude from the desks and present a snag hazard, or cross walkways and present a tripping hazard.
Are the networking devices we are using hubs or switches? How can you tell the difference? Can you tell just by looking at the device?
What type of cable are we using? Why are we using this type of cable? Why are we even using cable instead of connecting the workstations to the Wi-Fi network? What are the benefits of wired networking over wireless?
As the network takes shape, can you see why the topology selected was the best to suit the classroom conditions?
Participation points will be awarded for participating in the lab rebuild. You must be in attendance and participate each day of the lab to receive credit, so don’t miss class and don’t miss out on some easy lab points!
Assigned: September 25th, 2017
Due Date: September 29th, 2017
Students will be able to describe the Internet and the World Wide Web, and the difference between the two. We discuss the ways of connecting to the Internet, both narrowband and broadband, and the types of Internet access providers. We cover the basic structure of the Internet and who controls it. We also consider the parts of the World Wide Web—websites, web pages, browsers, URLs, web portals, search tools, and search engines. We probe the mysteries of HTML and hyperlinks.
In the second half of the chapter, we consider the riches of Internet use, and then we look at the risks. Among the riches are email, instant messaging, FTP, newsgroups, and mailing lists. We also have telephone, multimedia, webcasting, blogs, e-commerce, and social networking. Among the risks: snoopers, spam, spoofing, phishing, pharming, cookies, spyware, and malware such as viruses..
Students will be able to describe the Internet and the World Wide Web, and the difference between the two. We discuss the ways of connecting to the Internet, both narrowband and broadband, and the types of Internet access providers. We cover the basic structure of the Internet and who controls it. We also consider the parts of the World Wide Web—websites, web pages, browsers, URLs, web portals, search tools, and search engines. We probe the mysteries of HTML and hyperlinks.
In the second half of the chapter, we consider the riches of Internet use, and then we look at the risks. Among the riches are email, instant messaging, FTP, newsgroups, and mailing lists. We also have telephone, multimedia, webcasting, blogs, e-commerce, and social networking. Among the risks: snoopers, spam, spoofing, phishing, pharming, cookies, spyware, and malware such as viruses..