Tag Archives: Term 2

Section 2.4 Lab – DIY Directional Antennas Project 2019: Build Phase and Testing

Objective:

I can demonstrate my understanding of computer networks, network operating systems and wireless networking by assembling a directional antenna with the intent of establishing and sustaining a 2.4 GHz wireless signal at a distance of greater than 100 yards.

Links:

Do It Yourself Wireless Antenna (Pringles Can Yagi): https://www.makeuseof.com/tag/how-to-make-a-wifi-antenna-out-of-a-pringles-can-nb/

How to Build a Tin Can Waveguide WiFi Antenna: https://www.turnpoint.net/wireless/cantennahowto.html

DIY Bi-Quad Directional Wi-Fi Antenna:  https://lifehacker.com/5964111/diy-wi-fi-antenna-cheaply-extends-your-wireless-network

$10 Wi-Fi 16dBi Super Antenna: https://www.instructables.com/id/10–WIFI-16dBi-Super-Antenna-Pictorial/

Topics Discussed:

Wireless Networking
802.11 Wi-Fi spec
Directional Antennas
Waveguide Antenna
Yagi Antenna
Flickenger design Antenna

Assignment:

Today, we will continue the build phase of our directional antenna project. Remember that the goal is to sustain a 2.4 GHz Wi-Fi signal over a minimum distance of 100 yards (300 ft or ~92m).

All tools and equipment are on the metal cart in the front of Room 225. The transmitter testing cart is in the front of Room 225, and the username and password is on a piece of tape on the side of the cart. Use the velcro strap to secure your can to the tripod and use the tripod handles to angle your can to point at the upright antennas on the target router located on the receiver cart. The receiver cart (with the target router) is in the back of the room, and the username and password is located on a stickynote on the PC case.

Please use this time to make progress on your project. On Friday, November 21st, I will set up the testing carts on both ends of the hallway outside my room in the 200 building so we can test all completed antennas to allow those with working products to see the results and modify their designs if necessary. You should have a finished antenna prepared to test at that time so you can tweak the design if necessary before the final test on the week of the 25th!

We will conduct final tests on Tuesday, November 25th. To be considered a success (and receive credit for the project), your antenna design must be able to sustain at least a -67 dBm wireless signal over a 100 yard distance (the length of the football field).

Reminder: The team (or individual) that produces the antenna that can reliably sustain the highest quality signal (as measured by Signal Quality percentage and Signal as measured in decibels) over the longest distance will receive a personal pizza and wings party, to be held on Wednesday, November 26th while everyone else writes a four paragraph personal reflection describing their participation in this project.

Good luck, and remember: Your antenna doesn’t have to be perfect, it just has to be better than everyone else’s.

Posted: November 21st, 2019
Due Date: November 26th, 2019

Section 2.4 Lab – DIY Directional Antennas Project 2019

Objective:

  • I can demonstrate my understanding of computer networks, network operating systems and wireless networking by assembling a directional antenna with the intent of establishing and sustaining a 2.4 GHz wireless signal at a distance of greater than 100 yards.

Links:

Do It Yourself Wireless Antenna (Pringles Can Yagi): https://www.makeuseof.com/tag/how-to-make-a-wifi-antenna-out-of-a-pringles-can-nb/

How to Build a Tin Can Waveguide WiFi Antenna: https://www.turnpoint.net/wireless/cantennahowto.html

DIY Bi-Quad Directional Wi-Fi Antenna:  https://lifehacker.com/5964111/diy-wi-fi-antenna-cheaply-extends-your-wireless-network

$10 Wi-Fi 16dBi Super Antenna: https://www.instructables.com/id/10–WIFI-16dBi-Super-Antenna-Pictorial/

Topics Discussed:

  • Wireless Networking
  • 802.11 Wi-Fi spec
  • Directional Antennas
  • Waveguide Antenna
  • Yagi Antenna
  • Flickenger design Antenna

Assignment:

Today, we are going to begin a focused short-term project that is to be completed before the Thanksgiving Break. The goal is simple: design and build a directional antenna that will sustain a 2.4 GHz Wi-Fi signal over a minimum distance of 100 yards (300 ft or ~92m).

The stretch goal is a little more complex: design and build a directional antenna that will extend that 2.4 GHz Wi-Fi signal as far as possible.

  1. Use the links I have provided to learn about do-it-yourself directional antenna designs. There are many designs to choose from, so do your research and select the design that you think will be most effective in extending and sustaining the Wi-Fi signal over the longest range.
  2. You may work with a partner, or choose to go it alone. If you choose to work with a partner, you will need to pick up and complete both a Project Team Contract and a Project Team Work Plan (available in the Student Pickup Folder in the Marmolejo NetOp 1-2 subfolder on the StudentsTempFiles network share).
  3. Even if you are working by yourself, use the Project Team Work Plan to identify and prepare for the steps of this project (i.e. research, acquisition of materials, installation, configuration, building, testing, modification and upgrades). Submit a completed Project Team Work Plan to the instructor as soon as it is completed.
  4. Proceed with the first identified steps in your Project Team Work Plan. Do your best to follow the plan, but don’t be afraid to amend or alter the plan as the need arises.
  5. You may work in Room 225, but you will need to notify the instructor if you need access the tools in Room 212.
  6. All tools and equipment are located in Room 212. Testing PCs (sender and recipient) will be provided on rolling carts to allow for testing of antennas.
  7. Please use this time to make progress on your project. We have time provided to complete the project, but no time to waste. It is highly likely that your first antenna design may not be your final design, and you will need time to test and make adjustments to your design to achieve optimal results. Use the time given to build, test, modify and retest to get the best results!
  8. We will conduct initial tests the week of November 18th. To be considered a success (and receive credit for the project), your antenna design must be able to sustain at least a -67 dBm wireless signal over a 100 yard distance (the length of the football field).
  9. Upon completion of initial tests, you will have a week to revise and retest your design before the final testing during the week of November 25th.
  10. The team (or individual) that produces the antenna that can reliably sustain the highest signal strength over the longest distance on the final testing day will receive a personal pizza and wings party, to be held while everyone else writes a four paragraph personal reflection describing their participation in this project.

Good luck, and remember: the best way to eat an elephant is one bite at a time.

Posted: November 12th, 2019
Due Date: November 27th, 2019

Section 2.5 – Application Delivery – TestOut

Objective: 

This section introduces you to application delivery methods, software licensing, and software installation. After finishing this section, you should be able to:

  • Compare and contrast different methods of delivering applications to users.
  • Describe various ways software applications can be designed for greater scalability and maintenance.
  • Compare and contrast different software licensing models.
  • Use various methods to install and use software applications.
  • Install software patches and updates.
  • Configure a Windows system for automatic updates.

Links:

Key Terms:

  • Local Installation The traditional method for delivering applications by installing them on individual desktop computer systems.
  • Network Hosting A method of delivering applications by installing them in the local network.
  • Cloud Hosting A method of delivering applications by hosting them in the cloud.
  • Software as a Service (SaaS) A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.
  • One Tier An application architecture model where programs run as standalone applications on a single computer.
  • Two Tier An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.
  • Three Tier An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database server.
  • n-Tier An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.
  • Platform Compatibility A concern with using enterprise software in a network with multiple computer platforms and operating systems.
  • Proprietary Software Software that isn’t owned but requires the purchase of a license to use the software.
  • Personal License A software license given to home and small business customers that allows them to install the software on a limited number of systems.
  • Enterprise License A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.
  • Open Source Software Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit.
  • Software Subscription Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.
  • Windows Update A feature of the Windows operating system that keeps the operating system up to date.

Topics Discussed:

  • What are the advantages and disadvantages of hosting applications on the cloud?
  • What are the advantages and disadvantages of software subscription licenses?
  • Why is it important to keep system and application software up to date?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 2.5: Application Delivery, and achieve a score of 80% or higher on the 12 question Exam to complete the Section.

Assigned: November 7th, 2019
Teacher Pacing Due Date: November 8th, 2019

Section 2.4 – Networking Standards and Protocols – TestOut

Objective: 

This section introduces you to networking protocols and standards and gives you practice connecting to a secure wireless network. After finishing this section, you should be able to:

  • Describe basic Internet protocols.
  • Compare and contrast wireless network standards.
  • Describe how networking devices transmit data to the right location on a network.
  • Connect to a public WiFi network.
  • Connect to a secure wireless network.
  • Describe various careers in computer networking.

Links:

Key Terms:

  • Physical Address The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device’s MAC address.
  • Logical Address An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.
  • Default Address Class A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
  • Internet Protocol (IP) The principal communications protocol in the internet protocol suite that is used to route information over the Internet.
  • Transmission Control Protocol (TCP) An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.
  • User Datagram Protocol (UDP) An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn’t verify that the packets were correctly received.
  • Domain Name System (DNS) A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.
  • Hypertext Transfer Protocol (HTTP) A protocol that governs the transfer of web content between computers.
  • Hypertext Transfer Protocol Secure (HTTPS) A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.
  • Simple Mail Transfer Protocol (SMTP) A protocol used to send email.
  • Post Office Protocol 3 (POP3) A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.
  • Internet Message Access Protocol (IMAP) A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.
  • IEEE 802 Standards A family of standards that deal mostly with how data is transferred between hosts in a local area network (LAN).
  • IEEE 802.11 Standards A family of standards under the 802 standards that deal with how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
  • IEEE 802.11 Encryption Protocols Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
  • Frequency A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.
  • Attenuation A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.
  • Speed A characteristic of 802.11 protocols that require protocols to transfer data at a specific number of bits per second.
  • Network Architect A person that develops and implements an organization’s communication network, including the hardware and software components needed for both physical and wireless connections.
  • Network Administrator A person that maintains and expands a company’s network. They install and configure network media, create and manage user accounts, implement firewalls and other network security, manage an organization’s mail system, configure network printers, and maintain Internet connectivity.
  • Network Technician A person that works closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company’s IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings.

Topics Discussed:

  • Why is it important that computers on a network use the same protocols?
  • How do computer networks locate specific devices on the network?
  • What career opportunities are available in computer networking?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 2.4: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.

Assigned: November 4th, 2019
Teacher Pacing Due Date: November 6th, 2019

Section 2.3 Lab – Ethernet Cat5e Patch Cable Assembly

Objective

  • I can demonstrate my understanding of physical networking media by assembling a Cat5e network cable to the Ethernet EIA/TIA 568A and 568B standards.

Links:

Topics Discussed:

  • Networking Basics
  • Networking Fundamentals
  • Ethernet
  • EIA/TIA
  • 568A & 568B Standards
  • Cat5, 5e & 6
  • Local Area Network
  • Cable Management

Assignment:

  1. This week, we will be working on our Ethernet Cabling exercise, where we will assemble an Ethernet Cat5e cable to the EIA/TIA 568A and 568B standards.
  2. Visit the web links provided above for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
  3. Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends (with load bars), and a crimper tool.
  4. Follow the instructions to build your passthrough patch cable.
  5. Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for extra credit.
  6. Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
  7. Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.

Assigned: October 31st, 2019
Due Date: November 1st, 2019

Section 2.3 – Networking Basics – TestOut

Objective: 

This section introduces you to computer networking and gives you practice setting up wired network connections. After finishing this section, you should be able to:

  • Use a web browser to access the World Wide Web.
  • Define some advantages of computer networking.
  • Describe the relationship between ISPs and the Internet.
  • Explain the role of clients and servers on a network.
  • Compare and contrast different Internet Service options.
  • Use a cable modem to connect a small home office network to the Internet.
  • Use an Ethernet cable to connect a workstation to a local area network.

Links:

Key Terms:

  • Network Interface A computer component that provides a port (usually RJ-45) where a network cable can be connected.
  • Network Cable A cable that provides connectivity between network devices. A common network cable connects a computers network interface with a wall jack.
  • Wall Jack A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.
  • Local Area Network (LAN) A group of networked computers that are physically close together, usually in the same building.
  • Wide Area Network (WAN) A network of interconnected LANs across a large geographical location.
  • Client-Server Model A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.
  • File Server A computer that provide network access to shared disk storage.
  • Mail Server A computer that provides email services to a network.
  • Web Server A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.
  • Database Server A computer that stores databases, which are huge repositories of organized data.
  • Gaming Server A computer that provides a gaming environment that tracks events in multiplayer video games.
  • Modem Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable tv lines.
  • Router A network device that moves traffic between two different IP networks.
  • Switch A network device that moves traffic within an IP network.
  • Access Point A network device that connects wireless devices to a wired network.
  • Firewall A network security device that protects a network by examining the traffic before transferring it to the network.
  • Home Router A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.
  • Registered Jack 11 (RJ-11) Interface A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.
  • Registered Jack 45 (RJ-45) Interface A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.
  • Bluetooth A technology used to create wireless connections between computers and devices.
  • Near Field Communications (NFC) A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.
  • Dial-Up A technology used in the early days of the internet where a computer would make a phone call to the ISP to establish internet connectivity.
  • Digital Subscriber Line (DSL) A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.
  • Cable A technology that uses cable tv lines to establish high-speed connectivity to the internet through an ISP.
  • Fiber Optic A technology that used fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.
  • Satellite A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP.
  • Cellular A technology that uses cellular radio signals to establish connectivity to the internet through an ISP.
  • Wi-Fi A technology that uses radio signals to connect a device to an access point.

Topics Discussed:

  • What hardware components are needed for a wired network? A wireless network?
  • What roles do servers play on a network?
  • What is the difference between a LAN and a WAN?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 2.3: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.

Assigned: October 28th, 2019
Teacher Pacing Due Date: October 30th, 2019

Section 2.2 Lab – Kali Linux in VirtualBox VM Installation

Objective:

Students will install and configure a specialized desktop operating system in a VirtualBox VM environment.

Links:

Topics Discussed:

  • Software
  • System Software
  • Operating Systems
  • Linux
  • Kali Linux
  • Specialized OS
  • VirtualBox VM
  • Virtual Machine

Assignment:

  1. This week we will be working in the classroom with a specialized Operating System installation. We will be using a Virtual Machine software called VirtualBox to installing a specialized OS (Kali Linux) in a virtual environment that we will use in the second half of our course.
  2. I will distribute the required files in class today. If you did not receive the files or if you were not in attendance today, you will need to see me and I will show you where to download the files directly.
  3. In your Downloads folder, you should have a subfolder called “VirtualBox 6.0”. Inside this folder, you should have four files: a VirtualBox .dmg file, a Kali Linux 2019 .ova file, an Oracle_VM .vbox-extpack file, and a UserManual.pdf file. If you are missing any of these files, please see me immediately to get them.
  4. I will instruct you in-class on Thursday how to install VirtualBox VM in OSX, and how to load the VirtualBox extension pack and the preconfigured Kali Linux package.
  5. We will walk through the configuration and testing of Kali on Friday, and I will explain some of the unique and powerful features of this specialized flavor of the Linux operating system.
  6. Kali Linux will be required for the second half of the class, and you must complete your VirtualBox VM Kali Linux installation in class by Friday, October 25th to receive credit for this Lab Activity.

Assigned: October 23rd, 2019
Due Date: October 25th, 2019

Section 2.1 – The Internet – TestOut

Objective: 

This section introduces you to basic concepts associated with the Internet and the World Wide Web. After finishing this section, you should be able to:

  • Define the Internet and the World Wide Web.
  • Describe the essential components of the Web, including websites, URLs, hyperlinks, web browsers, and search engines.
  • Identify technologies that use the Internet, including the Web, email, instant messaging, VoIP, and the Internet of Things.
  • Identify common web applications, including Webmail, Google Docs, Facebook, and YouTube.
  • Define and describe the uses of cloud computing.
  • Define social media and describe its uses.
  • Recognize the risks and responsibilities of using social media.
  • Describe the differences between downloading, live streaming, and on-demand streaming.
  • Copy files from the local Windows file system to OneDrive.

Links:

Key Terms:

  • Internet An internetwork, or a connection between networks.
  • The Web Short for World Wide Web, the digital content that is delivered over the Internet, usually through a web browser.
  • The Internet Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet.
  • Internet Service Providers (ISP) A company that provides individuals and businesses access to the internet and other related services.
  • IP Address A numerical label that is assigned to devices so they can connect and communicate on a network.
  • Hypertext Transfer Protocol (HTTP) A set of rules that govern the transfer of web content between computers.
  • File Transfer Protocol (FTP) A set of rules that govern the transfer of files between computers.
  • Universal Resource Locator (URL) The reference or address to a resource on the Internet. Example: https://www.testout.com/home/about/privacy
  • Domain Name System (DNS) A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.
  • Transmission Control Protocol/Internet Protocol (TCP-IP) A set of rules that facilitates internet communication.
  • Hypertext Markup Language (HTML) A programming language that web pages use to display content through web browsers.
  • Intranet A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.
  • Voice over IP (VoIP) A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.
  • Wi-Fi A technology that allows computers, smartphones, and other devices to communicate on a wireless network.
  • Internet of Things (IoT) A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.
  • Social Media Platform A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.
  • Cloud Computing The use of remote services hosted on the internet to store, manage, and process data.
  • Cloud Storage A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.
  • Streaming A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.
  • Live Streaming A streaming method that transmits data in real time as it is created.
  • On-Demand Streaming A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.
  • Buffering The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

Topics Discussed:

  • What is the relationship between the Internet, the World Wide Web, and web browsers?
  • What are some benefits of using social media? What are some drawbacks?
  • What are the most common uses of cloud computing?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 2.1: The Internet, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
  3. Remember that Wednesday, October 16th is a District Late Start, and that Thursday, October 17th is Pre-ACT Testing with 20 minute classes starting at 12:40pm for everyone but sophomores. Please plan your week accordingly.

Assigned: October 14th, 2019
Teacher Pacing Due Date: October 16th, 2019

BOSS BATTLE! NetOp1 Semester Exam 2018

Objective:

Students will demonstrate their understanding of hardware and software basics through a summative quiz.

Link:

Topics Discussed:

  • Information Technology
  • The Internet & The World Wide Web
  • Software
  • Hardware – The CPU & Storage
  • Hardware – Input & Output
Assignment:

  1. Click the https://connect.mheducation.com link, log in and look for the “Boss Battle! Semester Exam Fall 2018” test.
  2. The exam consists of 100 multiple choice questions.
  3. Before starting the quiz, please put away all notes, study guides and other materials.
  4. Please close all other documents and webpages and do not open any new tabs or windows until after you have submitted the quiz.
  5. Please remain silent until everyone has completed the quiz.
  6. You have sixty-five minutes to complete the test. Be sure to submit your test answers before the end of the class period today, and be forewarned that the test will auto-submit itself at the end of the class period, so work quickly!
  7. Congratulations on completing the first half of Networking and Operating Systems! I’ll see you in 2019 with a completely new set of projects focused on the fundamentals of networking and cybersecurity!

Have the Merriest of Christmases, the Happiest of New Years’, the Happiest of Hanukkahs, the most Peaceful of Kwanzaas – whatever you may celebrate, enjoy it to the fullest!

Assigned: December 18th, 2018
Due Date: December 19th, 2018

Midterm Exam Review

Objective:

Students will review for the comprehensive midterm exam, covering material presented in chapters 1 through 5.

Link:

Topics Discussed:

  • Microchips
  • Transistors
  • Integrated circuits
  • Chips
  • Microprocessors
  • Machine language
  • System Unit
  • Power Supply
  • Motherboard
  • Central Processing Unit
  • The Machine Cycle
  • Memory
  • RAM
  • ROM
  • CMOS
  • Flash Memory
  • Expansion Cards
  • Bus Lines
  • Ports
  • Secondary Storage
  • Hard disks
  • Optical disks
  • Smart cards
  • Cloud storage

Assignment:

  1. Review the “Midterm Exam Practice” document on the McGraw Hill Connect site. The 100 question Midterm Final quiz will be drawn from the pool of 354 questions contained in the Practice document.
  2. The Midterm Exam Practice document will not be graded.
  3. You may bring in up to five (5) 3″ x 5″ notecards to the Midterm Final Exam on Wednesday. No other notes or webpages may be accessed during the Midterm Final Exam.
  4. Bear in mind that the Midterm Quiz will consist of material from Chapters 1 through 5. This practice quiz contains all the questions from our previous four quizzes, plus questions from Chapter 5, any of which could appear on Wednesday’s Midterm Quiz.
  5. Use your class time to review the questions and refresh your memories of everything we’ve studied to maximize your potential for a high score on the Midterm!
Assigned: December 17th, 2018
Teacher Pacing Due Date: December 19th, 2018