Assembly Language A human-readable, low-level computer language that is a symbolic representation of binary machine language.
Compiled Language A computer programming language, such as C and C++, that uses a software tool called a compiler to translate the code into binary machine language.
Interpreted Language A computer programming language, such as Python, JavaScript, and Ruby, that requires a program called an interpreter to execute the instructions written in the source code each time the application is run.
Runtime Engine A special interpreter that translates bytecode into computer specific machine language. Bytecode is a platform independent, low-level language that is compiled from source code.
Flowchart A visual representation of the logic in a program.
Branching The logic in a program that tells the computer to execute a different part of the program rather than executing statements one-by-one, in order.
Looping The login in a program that tells the computer to repeatedly execute a sequence of instructions until a condition is reached.
Algorithm Specific, step-by-step procedures that illustrate how a problem will be solved.
Hypertext Markup Language (HTML) A markup language interpreted by web browsers.
Cascading Style Sheet (CSS) A file associated with a web page that describes how HTML elements are to be displayed.
JavaScript A programming language commonly used to create interactive effects within a web browser.
Topics Discussed:
Why
must computer programs be precise in giving instructions to the computer?
What
products and services that I use were created by programmers?
How
do popular programming languages help programmers create software for multiple
platforms?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.3: Introduction to Programming, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: December 11th, 2019 Teacher Pacing Due Date: December 12th, 2019
This section introduces you to database access methods, big data, and careers in working with databases. After finishing this section, you should be able to:
Explain what SQL is and interpret a basic SQL query.
Compare and contrast different methods of accessing data from a database.
Define the term Big Data and describe its related challenges and opportunities.
Describe various careers in working with databases
Use Microsoft Access to perform basic queries on a database.
Data Definition Language (DDL) Database commands that change the structure, or schema, of the database.
Data Manipulation Language (DML) Database commands that modify the records within the database and not the schema itself.
Direct Access A method of accessing a database directly using the database management system itself.
Query Builder A method of accessing a database using a graphical user interface that allows users to select what actions they want to perform on a database.
User Interface Access A method of accessing a database using forms that allow users to interact with the database.
Programmatic Access A method of accessing a database using custom computer programs.
Data Extraction The process of gathering and organizing big data.
Data Mining A broad and open-ended analysis of extracted big data.
Big Data Analytics The process of asking specific questions to help interpret big data.
NoSQL Nonrelational databases that arise from big data.
Database Administrator A person who is responsible for designing, maintaining, backing up, and securing an organization’s databases.
Database Developer A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.
Data Analyst A person who specializes in gathering and analyzing data to inform business decisions.
Data Scientist A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions require even more advanced programming and analytical skills.
Topics Discussed:
How
can you access and analyze data that’s stored in a relational database?
What
kinds of questions can be answered by analyzing Big Data?
What
career opportunities are available in working with databases?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.2: Interfacing with Databases, and achieve a score of 80% or higher on the 10 question Exam to complete the Section.
Assigned: December 9th, 2019 Teacher Pacing Due Date: December 10th, 2019
This section introduces you to databases and gives you practice using a relational database management system. After finishing this section, you should be able to:
Describe
the purposes of a relational database.
Define
basic relational database terminology, including fields, records, primary keys,
foreign keys, and one-to-many relationships.
Describe
the basic functions of a non-relational database.
Describe
the purpose of a database management system.
Use
Microsoft Access to explore database objects and create table relationships.
Database A structured set of data held in a computer, usually in a way that that is accessible in multiple ways.
Relational Database A database that is structured to recognize relationships between items of information.
Table A container in a relational database that is comprised of fields (columns) and records (rows).
Field A single attribute of each record in a table.
Record A single instance of an object stored in a database table.
Primary Key A field in a table that uniquely identifies a row.
Foreign Key A field in a second table that matches the primary key in another table.
Query A method of asking questions about the data stored in a database.
Form A graphical interface that allows users to query a database by filling in information on the form.
Report An easy-to-read listing of the results of a query.
Structured Query Language (SQL) A computer language used by most relational databases for creating queries.
Structured Data Data that can be divided into discrete categories.
Unstructured Data Data that doesn’t follow a clear pattern.
Semi-Structured Data Data that has some discrete categories but also other information that doesn’t follow a clear pattern.
Database Management System (DBMS) Software that allows users to define, manipulate, retrieve, and manage data stored in a database. Examples are Microsoft SQL Server, Oracle Database, MySQL, and Microsoft Access.
Topics Discussed:
What
databases do you interact with in your everyday life?
What
are the advantages to storing data in a relational database? Are there
disadvantages?
What
is the purpose of a database management system?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.1: Databases, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: December 4th, 2019 Teacher Pacing Due Date: December 6th, 2019
This section introduces you to application delivery methods, software licensing, and software installation. After finishing this section, you should be able to:
Compare
and contrast different methods of delivering applications to users.
Describe
various ways software applications can be designed for greater scalability and
maintenance.
Compare
and contrast different software licensing models.
Use
various methods to install and use software applications.
Local Installation The traditional method for delivering applications by installing them on individual desktop computer systems.
Network Hosting A method of delivering applications by installing them in the local network.
Cloud Hosting A method of delivering applications by hosting them in the cloud.
Software as a Service (SaaS) A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.
One Tier An application architecture model where programs run as standalone applications on a single computer.
Two Tier An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.
Three Tier An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database server.
n-Tier An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.
Platform Compatibility A concern with using enterprise software in a network with multiple computer platforms and operating systems.
Proprietary Software Software that isn’t owned but requires the purchase of a license to use the software.
Personal License A software license given to home and small business customers that allows them to install the software on a limited number of systems.
Enterprise License A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.
Open Source Software Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit.
Software Subscription Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.
Windows Update A feature of the Windows operating system that keeps the operating system up to date.
Topics Discussed:
What are the advantages and disadvantages of hosting applications on the cloud?
What are the advantages and disadvantages of software subscription licenses?
Why is it important to keep system and application software up to date?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.5: Application Delivery, and achieve a score of 80% or higher on the 12 question Exam to complete the Section.
Assigned: November 7th, 2019 Teacher Pacing Due Date: November 8th, 2019
This section introduces you to networking protocols and standards and gives you practice connecting to a secure wireless network. After finishing this section, you should be able to:
Describe basic Internet protocols.
Compare and contrast wireless network standards.
Describe how networking devices transmit data to the right location on a network.
Physical Address The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device’s MAC address.
Logical Address An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.
Default Address Class A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
Internet Protocol (IP) The principal communications protocol in the internet protocol suite that is used to route information over the Internet.
Transmission Control Protocol (TCP) An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.
User Datagram Protocol (UDP) An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn’t verify that the packets were correctly received.
Domain Name System (DNS) A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.
Hypertext Transfer Protocol (HTTP) A protocol that governs the transfer of web content between computers.
Hypertext Transfer Protocol Secure (HTTPS) A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.
Simple Mail Transfer Protocol (SMTP) A protocol used to send email.
Post Office Protocol 3 (POP3) A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.
Internet Message Access Protocol (IMAP) A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.
IEEE 802 Standards A family of standards that deal mostly with how data is transferred between hosts in a local area network (LAN).
IEEE 802.11 Standards A family of standards under the 802 standards that deal with how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
IEEE 802.11 Encryption Protocols Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
Frequency A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.
Attenuation A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.
Speed A characteristic of 802.11 protocols that require protocols to transfer data at a specific number of bits per second.
Network Architect A person that develops and implements an organization’s communication network, including the hardware and software components needed for both physical and wireless connections.
Network Administrator A person that maintains and expands a company’s network. They install and configure network media, create and manage user accounts, implement firewalls and other network security, manage an organization’s mail system, configure network printers, and maintain Internet connectivity.
Network Technician A person that works closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company’s IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings.
Topics Discussed:
Why
is it important that computers on a network use the same protocols?
How
do computer networks locate specific devices on the network?
What
career opportunities are available in computer networking?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.4: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: November 4th, 2019 Teacher Pacing Due Date: November 6th, 2019
This section introduces you to computer networking and gives you practice setting up wired network connections. After finishing this section, you should be able to:
Use a web browser to access the World Wide Web.
Define some advantages of computer networking.
Describe the relationship between ISPs and the Internet.
Explain the role of clients and servers on a network.
Compare and contrast different Internet Service options.
Use a cable modem to connect a small home office network to the Internet.
Use an Ethernet cable to connect a workstation to a local area network.
Network Interface A computer component that provides a port (usually RJ-45) where a network cable can be connected.
Network Cable A cable that provides connectivity between network devices. A common network cable connects a computers network interface with a wall jack.
Wall Jack A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.
Local Area Network (LAN) A group of networked computers that are physically close together, usually in the same building.
Wide Area Network (WAN) A network of interconnected LANs across a large geographical location.
Client-Server Model A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.
File Server A computer that provide network access to shared disk storage.
Mail Server A computer that provides email services to a network.
Web Server A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.
Database Server A computer that stores databases, which are huge repositories of organized data.
Gaming Server A computer that provides a gaming environment that tracks events in multiplayer video games.
Modem Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable tv lines.
Router A network device that moves traffic between two different IP networks.
Switch A network device that moves traffic within an IP network.
Access Point A network device that connects wireless devices to a wired network.
Firewall A network security device that protects a network by examining the traffic before transferring it to the network.
Home Router A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.
Registered Jack 11 (RJ-11) Interface A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.
Registered Jack 45 (RJ-45) Interface A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.
Bluetooth A technology used to create wireless connections between computers and devices.
Near Field Communications (NFC) A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.
Dial-Up A technology used in the early days of the internet where a computer would make a phone call to the ISP to establish internet connectivity.
Digital Subscriber Line (DSL) A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.
Cable A technology that uses cable tv lines to establish high-speed connectivity to the internet through an ISP.
Fiber Optic A technology that used fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.
Satellite A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP.
Cellular A technology that uses cellular radio signals to establish connectivity to the internet through an ISP.
Wi-Fi A technology that uses radio signals to connect a device to an access point.
Topics Discussed:
What hardware components are needed for a wired network? A wireless network?
What roles do servers play on a network?
What is the difference between a LAN and a WAN?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.3: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: October 28th, 2019 Teacher Pacing Due Date: October 30th, 2019
This section introduces you to Web browsers and gives you practice using search engines, navigating web pages, and configuring basic browser settings. After finishing this section, you should be able to:
Use a web browser to access the World Wide Web.
Use browser features such as private browsing, bookmarks, and downloading files.
Use a search engine to find and evaluate web content.
Identify reliable academic sources online.
Distinguish between primary, secondary, and tertiary sources.
Describe key browser and website features, including plug-ins, client-side scripting, certificates, caching, and proxy settings.
Configure browser privacy and security features such as pop-up blockers, location tracking, and cookies.
Web Browser An application for accessing information on the World Wide Web.
Web Search A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.
Academic Source Books or articles written by experts who have credentials in a particular field of study.
Consumer-level Source Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information — people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.
Primary Source Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.
Secondary Source Resources such as articles or books that review, analyze, or describe primary sources.
Tertiary Source Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.
Citation Style The format used for citing academic sources, including author, date of publication, and journal title.
Cookie A small piece of data sent from a website and stored on a user’s computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.
Browser Extension Software that adds functionality to a web browser.
Client-Side Scripting The process of transferring source code from a web server to a web browser and running that code directly in the browser.
Certificate A digital document that contains encryption keys and is used for encryption and identification.
Caching The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.
Proxy Server A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.
Pop-up Blocker A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.
Topics Discussed:
What web browser settings are most important for online safety and security?
How can you evaluate online information and determine if it’s reliable?
What can you do to troubleshoot common web browser problems?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.2: Web Browsers, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: October 21st, 2019 Teacher Pacing Due Date: October 22nd, 2019
This section introduces you to basic concepts associated with the Internet and the World Wide Web. After finishing this section, you should be able to:
Define the Internet and the World Wide Web.
Describe the essential components of the Web, including websites, URLs, hyperlinks, web browsers, and search engines.
Identify technologies that use the Internet, including the Web, email, instant messaging, VoIP, and the Internet of Things.
Identify common web applications, including Webmail, Google Docs, Facebook, and YouTube.
Define and describe the uses of cloud computing.
Define social media and describe its uses.
Recognize the risks and responsibilities of using social media.
Describe the differences between downloading, live streaming, and on-demand streaming.
Copy files from the local Windows file system to OneDrive.
Internet An internetwork, or a connection between networks.
The Web Short for World Wide Web, the digital content that is delivered over the Internet, usually through a web browser.
The Internet Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet.
Internet Service Providers (ISP) A company that provides individuals and businesses access to the internet and other related services.
IP Address A numerical label that is assigned to devices so they can connect and communicate on a network.
Hypertext Transfer Protocol (HTTP) A set of rules that govern the transfer of web content between computers.
File Transfer Protocol (FTP) A set of rules that govern the transfer of files between computers.
Universal Resource Locator (URL) The reference or address to a resource on the Internet. Example: https://www.testout.com/home/about/privacy
Domain Name System (DNS) A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.
Transmission Control Protocol/Internet Protocol (TCP-IP) A set of rules that facilitates internet communication.
Hypertext Markup Language (HTML) A programming language that web pages use to display content through web browsers.
Intranet A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.
Voice over IP (VoIP) A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.
Wi-Fi A technology that allows computers, smartphones, and other devices to communicate on a wireless network.
Internet of Things (IoT) A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.
Social Media Platform A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.
Cloud Computing The use of remote services hosted on the internet to store, manage, and process data.
Cloud Storage A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.
Streaming A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.
Live Streaming A streaming method that transmits data in real time as it is created.
On-Demand Streaming A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.
Buffering The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.
Topics Discussed:
What
is the relationship between the Internet, the World Wide Web, and web browsers?
What
are some benefits of using social media? What are some drawbacks?
What
are the most common uses of cloud computing?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.1: The Internet, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Remember that Wednesday, October 16th is a District Late Start, and that Thursday, October 17th is Pre-ACT Testing with 20 minute classes starting at 12:40pm for everyone but sophomores. Please plan your week accordingly.
Assigned: October 14th, 2019 Teacher Pacing Due Date: October 16th, 2019
This section introduces you to various categories of application software and gives you practice managing Windows applications. After finishing this section, you should be able to:
Identify application software that increases personal productivity.
Identify application software that facilitates collaboration.
Identify some common business application software.
Run Windows applications.
Pin applications to the Start Menu and the taskbar.
Unpin applications from the Start Menu and the taskbar.
Create application shortcuts on the Windows desktop.
Productivity Software Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.
Collaboration Software Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.
Business Software Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.
Netiquette The rules of etiquette that should be observed while using computer networks, such as the Internet.
Windows Application A traditional desktop application or program.
Windows 10 App A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.
Shared Printer A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.
Print Job A file or set of files that have been submitted to a printer.
Print Queue A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.
Print Server A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.
Topics Discussed:
How can software applications increase your productivity at home or at the office?
What software applications can assist you in collaborating with other people?
What components are required to send a document to a printer?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 1.7: Application Software, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Remember that Friday, October 4th is the end of the term. All past due work must be turned in by Thursday, October 3rd to receive credit. Please plan accordingly.
Assigned: October 1st, 2019 Teacher Pacing Due Date: October 3rd, 2019
This section introduces you to computer file system features and gives you practice managing files and folders on Windows. After finishing this section, you should be able to:
Describe common file system features, including compression, encryption, permissions, journaling, and file naming rules.
Compare and contrast common file systems, such as NTFS, FAT32, HFS, and Ext4.
Create folders in the Windows file system.
Copy, rename, and delete files in Windows.
Share a Windows folder with other users and grant them specific access to files within the folder.
File The smallest container within a computer’s storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.
File Format The way in which a file is organized. Often, a file type is indicated by the file extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.
File System The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.
Compression The process of making data consume less storage space.
Encryption The process of converting information so that it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.
File Permissions The use of user and file attributes that control which users can read, write, move, or delete each file.
Journaling The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.
Topics Discussed:
How do operating systems keep track of documents and other files?
What are the most common file system features?
What is the main purpose of Windows file extensions?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 1.6: File Management, and achieve a score of 80% or higher on the 8 question Exam to complete the Section.
Assigned: September 23rd, 2019 Teacher Pacing Due Date: September 25th, 2019