Free Essay

Discovering Computers 2011

In:

Submitted By OmarAbaHaji
Words 1808
Pages 8
JOHN A. LOGAN COLLEGE
CIS 101

INTRODUCTION TO COMPUTERS

C. Minor – SP 13
IAI – BUS 902
3 cr. (2-2)

COURSE DESCRIPTION:
This course provides an overview of the computing field and its typical applications.
Key terminology and components of computer hardware, application software, and system software (including operating systems) are covered along with the development and management of information systems. Other topics include computer career opportunities, various networks (including the Internet), and World Wide Web technologies. This course also provides students with training in the use of business productivity software, including word processing, database management, spreadsheet, and presentation graphics along with web browser software.
PREREQUISITES: None
COURSE OBJECTIVES:
At the completion of the course, the student will be able to:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.

Recognize the importance of computer literacy.
Utilize computers and the Internet effectively and understand the issues associated with their use.
Describe the capabilities of today’s computers and explain how various hardware components work.
Explain the different software categories and what each can do.
Identify various computer files and describe how to keep them organized and protected. Compare the characteristics of various networks.
Describe the technologies that power the Web.
Outline the development of today’s computer technology.
Identify computer professional career opportunities.
Describe how information systems enhance organizational activities and how information systems are developed, implemented, and maintained.
Explain the basics of computer programming.
Compare the capabilities of large-scale computing systems to personal computers. Access and display Web pages using Web browser software.
Locate information on the Web by using search engines.
Create and edit text documents using word processing software.
Analyze data, perform calculations, and create charts using spreadsheet software. Arrange and analyze data using database software.
Develop slides for visual presentations using presentation graphics software.

2
COURSE OUTLINE:
I.
II.
III.
IV.
V.
VI.
VII.
VIII.
IX.
X.
XI.
XII.

Introduction to Computers
The Internet and World Wide Web
Application Software
Components of the System Unit
Input and Output
Storage
Operating Systems and Utility Programs
Communications and Networks
Database Management
Computers and Society, Security, Privacy, and Ethics
Information System Development and Programming Languages
Enterprise Computing

COURSE SCHEDULE:

CIS 101 Tentative Schedule—Spring 2013
Schedule
Week 1

Week 2
Week 3
Week 4

Week 5

Week 6

Week 7

Week 8

Week 9

Introductions, Syllabus, Blackboard, Paint exercise
Discovering Computers Chapter 1 (view lecture and know terms before class)
Preview Word Chapter 1
Discovering Computers Chapter 1 Quiz
Assignment 1 (Word Chapter 1): due Friday, 2/1
Assignment 2 (Word Chapter 1): due Friday, 2/8
Discovering Computers Chapter 2 (view lecture and know terms before class)
Preview Word Chapter 2
Discovering Computers Chapter 2 Quiz
Assignment 3 (Word Chapter 2): due Friday, 2/14
Word Quiz (review terms prior to quiz)
Discovering Computers Chapter 3 (view lecture and know terms before class)
Preview PowerPoint Chapter 1
Discovering Computers Chapter 3 Quiz
Assignment 4 (PowerPoint Chapter 1): due Friday, 2/22
Discovering Computers Chapter 7 (view lecture and know terms before class)
Preview PowerPoint Chapter 2
Assignment 5 (PowerPoint Chapter 2): due Friday, 3/1
Discovering Computers Chapter 7 Quiz
Assignment 6 (PowerPoint Chapter 2): due Friday, 3/8
PowerPoint Quiz (review terms prior to quiz)
Discovering Computers Chapter 4 (view lecture and know terms before class)
Preview Excel Chapter 1
Discovering Computers Chapter 4 Quiz
Assignment 7 (Excel Chapter 1): due Friday, 3/22
Assignment 8 (Excel Chapter 1): due Friday, 3/29
Preview Excel Chapter 2
Assignment 9 (Excel Chapter 2): due Friday, 4/5

3
Week 10

Week 11

Week 12

Week 13

Week 14

Week 15
Final Exam Week

Discovering Computers Chapter 5 (view lecture and know terms before class)
Discovering Computers Chapter 5 Quiz
Excel Quiz (review terms prior to quiz)
Preview Access Chapter 1
Assignment 10 (Access Chapter 1): due Friday, 4/12
Discovering Computers Chapter 6 (view lecture and know terms before class)
Discovering Computers Chapter 6 Quiz
Discovering Computers Chapter 8 (view lecture and know terms before class)
Preview Access Chapter 2
Assignment 11 (Access Chapter 2): due Friday, 4/19
Discovering Computers Chapter 8 Quiz
Access Quiz (review terms prior to quiz)
Discovering Computers Chapter 10 (view lecture and know terms before class)
Final Project Topics
Discovering Computers Chapter 10 Quiz
Start working on Final Project
Final Project
Present Final Project

COURSE REQUIREMENTS:
The student is required to read and study the textbook material. Students are responsible for all discussion, assignments, and announcements made in class and posted on the course Web site.
Quizzes. There will be 13 quizzes during the semester. All quizzes will be announced in advance. Makeup quizzes are not allowed. The lowest quiz score will be dropped.
Assignments. Students will have 11 assignments to complete throughout the semester. Assignments turned in after the due dates will not earn points. The lowest assignment score will be dropped.
Final Project/Exam. A final project/exam will take place at the end of the semester.
Student Success Center. Tutors may be obtained through the Student Success Center.
Contact the staff in C219 if this service is desired. John A. Logan College will make reasonable accommodations for students with documented disabilities under Section
504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990.
Any student with a disability that may have some impact on work in this class, who feels she/he needs an accommodation, should make an appointment with the Coordinator of
Services for Students with Disabilities on campus, Room C219B, Ext. 8516. Before services can be provided, this advisor must determine eligibility and arrange appropriate academic adjustments. It is the student’s responsibility to register in advance of a school term with this office and to turn in a schedule each term to ensure that there is every opportunity for success in this class.

4
English Writing Center/Tutoring. For assistance with writing assignments in any college course, students are encouraged to visit “The Write Place” in Room C215. English instructors are available for one-on-one tutoring each semester during hours posted at the center.
Financial Aid. Students who receive financial assistance and completely withdraw from classes prior to 60% of the semester being completed (approximately 2-3 weeks after midterm) could be responsible to return a portion of their Federal Pell Grant award.
Prior to withdrawing from courses, students should contact the Financial Aid Office.
Course Withdrawal Information. It is expected that you will attend this class regularly.
If you stop attending for any reason, you should contact your advisor and withdraw officially to avoid the posting of a failing grade (an E) to your transcript. It is also advisable to discuss the situation with your instructor before dropping.
Administrative Withdrawal. A student may be withdrawn from a class for lack of attendance/participation as defined below. Logging into an online course is not sufficient to be considered participation. Participation for online courses is defined as an active process and may include posting/sending assignments to the drop box or instructor’s email, participating in online discussion boards, taking quizzes or exams, or otherwise communicating and/or participating in some manner that is approved by the instructor. A student who has been administratively withdrawn from class will receive an email notification from the Admissions Office. This notification will outline the student’s appeal options if the student wishes to re-enroll in the course.
Face-to-Face Class
(8 or 16 weeks)
Online Class
(8 week)
Online Class
(16 week)

Student may be withdrawn from class if the student has missed four (4) consecutive class periods without prior notification to the instructor of the absences.
Student may be withdrawn from class if the student has not participated (as indicated by activity reports) in the online class for the equivalent of one week.
Student may be withdrawn from class if the student has not participated (as indicated by activity reports) in the online class for the equivalent of two weeks.

Safety Review Request. Our safety at JALC is everyone’s responsibility!
Faculty, staff, and students are encouraged to use the Safety Review Request, https://secure.jalc.edu/campus_safety/safety_review_request_form.php, link on the
JALC home page or contact Campus Safety directly (Ext. 8218 or Room E105) to report safety concerns or questions. This statement comes from the John A. Logan College
Campus Violence Prevention Committee.

5
METHOD OF EVALUATION:
Final grades for the course will be determined as follows:
Assignments .............................. 30% ...............................300 points
Quizzes
.............................. 60% ...............................600 points
Final Project/Exam ..................... 10% ...............................100 points
1000 possible points
1,000 - 900 points = A
800 - 899 points = B
700 - 799 points = C
600 - 699 points = D
Academic Dishonesty: Academic dishonesty will not be tolerated. If it is found that a student has been dishonest regarding academics, a zero will be given for said exercise, assignment, project, or test. In addition, academic dishonesty may result in expulsion, suspension, probation, or reprimand by the vice-president for administration. Please refer to Article IV, p. 35-37, of John A. Logan College’s Student Rights and
Responsibilities Manual.
NOTE: Always begin your computer lab exercises from a new, blank file. One form of academic dishonesty occurs when a student starts an exercise from another student’s file or copies all or a portion of another student’s file and represents the file as his or her own. Information attached to computer files you create will be used to monitor your work. Attendance Policy:
Attendance is mandatory in this class and will be taken. Frequent absences will result in poor grades on tests and missing assignments. The student must be in class to successfully understand the material and to complete the assignments on time. This is an introductory class and many concepts build on one another. Excessive absences will result in a failing grade. Certain class periods will be strictly lab.
METHOD OF PRESENTATION:
The course material will be presented through classroom lecture, discussion, demonstration, and supervised lab work including hands-on lab assignments and
Internet exercises.
TEXT:
Microsoft Office 2010. Shelly/Vermaat. Boston, Massachusetts: Course Technology,
Cengage Learning, 2011. ISBN: 978-1-4390-7842-6
Discovering Computers – Fundamentals, 2011, Edition. Shelly/Vermaat. Boston,
Massachusetts: Course Technology, Cengage Learning, 2011.
ISBN: 978-1-4390-7945-4
Bundle ISBN: 1111868824

6
INSTRUCTOR:

Cindy Minor
Office: C259G
Telephone/Voice Mail: (618) 985-2828, Ext. 8580
Email: cindyminor@jalc.edu

DATE:

Spring, 2013

John A. Logan College Telephone Numbers
Carterville and Williamson County ................................ (618) 985-3741, (618) 985-2828
Carbondale and Jackson County .................................. (618) 549-7335, (618) 457-7676
Du Quoin .................................................................................................. (618) 542-8612
West Frankfort .......................................................................................... (618) 937-3438
Crab Orchard, Gorham, and Trico Areas ................................................. 1-800-851-4720
John A. Logan College does not discriminate on the basis of race, religion, color, national origin, disability, age, sexual orientation, or gender orientation.

12-04-12 9a SP 13

Similar Documents

Free Essay

Computer

...Discovering Computers 2011 Living in a Digital World Objectives Overview See Page 257 for Detailed Objectives Discovering Computers 2011: Living in a Digital World Chapter 5 2 Objectives Overview See Page 257 for Detailed Objectives Discovering Computers 2011: Living in a Digital World Chapter 5 3 What Is Input? • Input is any data and instructions entered into the memory of a computer Pages 258 – 259 Figure 5-1 Discovering Computers 2011: Living in a Digital World Chapter 5 4 What Is Input? • Instructions can be entered into the computer in the form of programs, commands, and user responses Pages 258 - 259 Discovering Computers 2011: Living in a Digital World Chapter 5 5 What Are Input Devices Page 260 Discovering Computers 2011: Living in a Digital World Chapter 5 6 The Keyboard • A keyboard is an input device that contains keys users press to enter data and instructions into a computer Page 260 Figure 5-2 Discovering Computers 2011: Living in a Digital World Chapter 5 7 The Keyboard • Most desktop computer keyboards have… Pages 260 - 261 Discovering Computers 2011: Living in a Digital World Chapter 5 8 The Keyboard • The insertion point, also known as the cursor, is a symbol on the screen that indicates where the next character you type will appear Page 261 Figure 5-3 Discovering Computers 2011: Living in a Digital World Chapter 5 9 The Keyboard ...

Words: 1696 - Pages: 7

Premium Essay

Discovering Computers Chapter 8

...Discovering Computers 2011 Chapter 8 DISCOVERING COMPUTERS 2011 CHAPTER EIGHT: OPERATING SYSTEMS AND UTILITY PROGRAMS PROBLEM SOLVING TIP SHEET Use this Tip Sheet as suggested starting points for the Problem Solving exercises. Problem Solving @ Home 1. Computer Cannot Boot You recently purchased a computer from a friend. When you turn on the computer, a message displays that says, “Operating system not found.” What steps will you take before calling technical support? Insert the installation disc for an operating system and follow the installation / setup 2. Improper Shut Down During the startup process, your computer displays a message indicating that the computer did not shut down properly. You are certain that you shut down the computer properly when you last used it. The message also lists options to start Windows normally or start Windows in safe mode. How will you respond? Why? Start the computer in safe mode and perform a scan to make sure that no files were damaged as a result of the improper shut down 3. Incorrect Display Settings You recently turned on your computer and noticed that the screen resolution, desktop background, and color scheme had changed, even though you have not changed the display settings since purchasing the computer several months ago. What might have caused Windows to change the display settings? What are your next steps? A Windows update might have reverted your display settings back to their defaults 4. Unreadable Taskbar...

Words: 1218 - Pages: 5

Free Essay

Computer

...Discovering Computers 2011 Chapter 4 DISCOVERING COMPUTERS 2011 CHAPTER FOUR: THE COMPONENTS OF THE SYSTEM UNIT PROBLEM SOLVING TIP SHEET Use this Tip Sheet as suggested starting points for the Problem Solving exercises. Problem Solving @ Home 1. Malfunctioning Speakers While working on a homework assignment, you decide to listen to one of your favorite music CDs through your computer speakers. The media player program on your computer automatically starts when you insert the CD. Although it looks like the CD is playing, no sound is coming from your speakers. What might be causing this? What is the first step that you will take to correct this problem? The sound might be muted or the volume turned down; adjust accordingly There may be a problem with your computer recognizing the sound card; check the drivers 2. Optical Disc Drive Stuck While using your computer, you attempt to open the optical disc drive to insert an installation disc for a program you wish to install. The drive, however, does not open when you press the eject button. The drive opened a few minutes prior, when you removed a music CD. What steps will you take to open the drive before calling technical support? Restart the computer. If the problem persists after restarting the computer, shut the computer down and insert the end of a paperclip into the small hole in the optical disc drive (if one exists) to open the drive manually. If necessary, check with technical support or your computer’s documentation...

Words: 1370 - Pages: 6

Free Essay

Critical Information Systems

...Critical Information Systems Lance Kaea Carson BSA 310 May 15, 2011 Rich Harrell Critical Information Systems An Information System is an organizations framework for efficiency, productivity, and functionality. It “is a collection of hardware, software, data, people and procedures that are designed to generate and disseminate information and data that supports the activities of an organization” (International Graduate, 2011). Kudler Fine Foods is an organization specializing in providing domestic and imported sustenance to consumers. This paper clarifies an information system critical to their business process and examines how this system has an effect on the organization’s intricate structure. Information Systems Information systems used by organizations often follow a “traditional hierarchical structure” (Turban & Volonino, 2010. p.42). The structure commonly consists of seven functional types (1) Personal and Productivity Systems, (2) Transaction Processing Systems, (3) Functional and Management Information Systems, (4) Enterprise Systems, (5) Inter-organizational Systems, (6) Global Systems, and (7) Special Systems. Each category plays an essential role in the overall function of an organization when utilized. The development of an application program is used to execute or support a specific organization task or business process through the use of that information system. Although system types and applications can be independent of each other, most...

Words: 830 - Pages: 4

Free Essay

Data and Privacy

...Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless. In this prospect, many people control their routine lives by means of their personal computers. However, at the present computer security has become a very critical issue. Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer. In this scenario, some preventive measures enable us to stop criminal users (as well known as "intruders") from accessing and using some part of our computer system. In addition, recognition of such intrusions helps us in deciding whether or not somebody tried to gain access into our computer system, if they were successful in their attempt, as well as what they could have acquired from the system (ComputerSecurityService, 2011), (Armor2net Software Ltd., 2004) and (Norton, 2001). In addition, the term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems...

Words: 2264 - Pages: 10

Free Essay

Ipad Security Breach

...iPad’s Security Breach Zul-Jalaal Abdullah Strayer University Shelby Oaks campus Business Enterprise-508 April 21, 2011 Dr. Carolyn Tippett Discuss Goatse Security firm possible objective when they hacked into AT&T’s Website. Here’s what happened: Goatse Security discovered a rather stupid vulnerability on the AT&T site that returned a customer email if a valid serial number for the iPAD sim card was entered. (Arrington, 2010, para. 2). An invalid number returned nothing, a valid number returned a customer email address. Goatse created a script and quickly downloaded 114,000 customer emails. It was then turned over to Gawker, after, they say, AT&T was notified and the vulnerability was closed (Arrington, 2010, para. 2). Gawker published some of the data with the emails removed. Stated Goatse: “All data was gathered from a public web server with no password, accessible by anyone on the Internet. There was no breach, intrusion, or penetration, by any means of the word. ”(Arrington, 2010, para. 2). AT&T is characterizing the incident as “unauthorized computer “hackers” maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service (Arrington, 2010, para. 3). ”We don’t see much hacking here, and we don’t see anything really malicious (Arrington, 2010, para. 3). AT&T was effectively publishing the information on the open...

Words: 1778 - Pages: 8

Premium Essay

Comprehensive Classroom Technology Plan

...Statement & Rationale VISION STATEMENT Demonstrating technology supportive curriculum in a multicultural classroom to meet, and encourage global, creativity, critical thinking, communication, curriculum, and innovation skills to enhance, the needs of every student in different core subjects for the 21st. century. MISSION STATEMENT To facilitate 21st. century innovation skills; so all students can prepare themselves to the future by improving his/her creativity, critical thinking skills, communication skills, and collaboration skills, so all students can exhibit technological leadership in a safe environment, while demonstrating his/her accomplishments in a global community. RATIONALE Computer Technology and digital media will enhance and provide our students with all the resources available for the 21st. century. Demonstrating technology supportive curriculum in a multicultural Christian classroom will meet, and encourage global awareness, creativity, critical thinking, communication, and innovation skills to enhance, the needs of every student in different core subjects so he/she can develop the content needed to excel in the 21st. century (Shelly, Gunter, & Gunter 2010). The NETS-S will provide students with educational content that will help him/her excel in six areas, which include: “technology operations and concepts; digital citizenships; decision making; problem solving; critical thinking;...

Words: 5871 - Pages: 24

Premium Essay

None

...Mario Noguera , ID: 2058067 Q1: Characterize and analyze the following actual security breaches which occurred in 2011. Indicate if they involved physical or digital attacks. If physical, were they destructive or non-destructive breaches? Using the C-I-A and A-A-A principles, what type(s) of attack was each breach? | Date | Organization | Description | Physical (destructive or non-destructive) or Digital? | Attack on which C-I-A and/or A-A-A principles? | A. | Nov. 16, 2011 | Union Bank Trust Co, Bright Directions Program (Illinois Treasurer's Office) | SSNs of people enrolled in a college savings program appeared on the outside of envelopes mailed to participants | | CIA Principle:Confidentially: avoidance of Unauthorized disclosure of Information | B. | Dec. 16, 2011 | JP Morgan Chase (Chase Bank) | At least 3 employees stole customer account info and/or allowed fraudulent transfers to occur | | AAA Principle Assurance: refers to how trust is provided and managed in computer systems | C. | Nov. 27, 2011 | Unknown Organization, 101Domain.com | Phishing attempt on vendor resulted in a number of customers' accounts being at risk of compromise of personal and payment info | | AAA Principle Anonymity: the property that certain records or transactions are not to be attributable to any individual. | D. | Nov. 23, 2011 | Save Mart Supermarkets , Lucky Supermarkets | Supermarket chain notifies customers after skimmers were found in...

Words: 858 - Pages: 4

Free Essay

Three Laws That Change Ict Industry

...of individuals around the world, engaging innovations across the registering continuum—from the smallest handheld devices to the largest cloud-based server. (Intel 2013) Progressing improvements empower the joining of more transistors on each one chip to boost profit and execution while cutting the cost per transistor—inspiring smarter, more versatile technologies that improve capacity mix at more prominent speeds while decreasing vitality consumption. The proof of Moore's Law is all over, embedded in devices millions of individuals use consistently, such as laptops and personal computers, cellular phones, and consumer electronics and normal household appliances—as well as inspiring, essential mechanical innovations in automobiles, life-saving restorative devices, and spacecraft. Moore’s Law keeps opposing the pessimists because a detachment of materials scientists like Mayberry keep on discovering ways of stretching today's silicon transistor innovation even as they...

Words: 1094 - Pages: 5

Premium Essay

The Effects of Computer Game in the Academic Performance of the Elementary Pupils

...THE EFFECTS OF COMPUTER GAMES TO THE ACADEMIC PERFORMANCE OF THE GRADE VI PUPILS IN ___________ELEMENTARY SCHOOL S. Y. 2010 - 2011 A Research Proposal Presented to the Faculty of the College Department ________________________________ Quezon In partial fulfillment of the Requirements for Research 2 ________________________ October 2010 Chapter I INTRODUCTION Background of the Study Computers are ubiquitous. As computers have become less expensive they have been purchased by more and more families for their homes. Because of this, many children begin to use computers at an early age. Even if computers are not available in their home, children almost certainly will begin to come into contact with computers in school. Some adults are amazed by how readily young children use computers. Many children find that using computers gives them a sense of power and accomplishment. And, unlike many adults whose first or primary contact with computers is work related, most children first use computers for entertainment purposes and games. This is by no means the only use that children have for computers. Because computer use is promoted in schools, and because computers are so ubiquitous, children have a great deal of exposure to them. Not everyone, however, is comfortable with the use of computers by young children. Some, including the Alliance for Childhood, have called for a halt to the...

Words: 2444 - Pages: 10

Premium Essay

Stid

...MALAYSIA SCHOOL OF COMPUTING ------------------------------------------------- COURSE CODE : STID1103 COURSE NAME : COMPUTER APPLICATIONS IN MANAGEMENT PRE-REQUISITES : NONE ------------------------------------------------- 1.0 SYNOPSIS This is an introductory course targeting to create awareness on various popular computer applications which are being used in organizations. Application such as accounting management, communications, and project management will be covered in this course. In addition, students will also be exposed to proper method of report writing, data gathering and compilation, as well as database management. The students will also be exposed to the methods in converting data to charts and graphs, preparing presentations, and presenting data. Besides using Internet applications, the students are required to build and maintain simple web pages. 2.0 OBJECTIVES Upon completion of this course, students are expected to 2.1. acquire basic knowledge on current ICT technology. 2.2. develop competency in using several management-related applications, which are popular among the professionals and entrepreneurs. 3.0 LEARNING OUTCOME Upon completion of this course, students will be able to 4.1 apply basic knowledge on computer technology in order to make a good decision when acquiring a computer . 4.2 use Internet technology to find required information 4.3 identify the use of different software applications...

Words: 831 - Pages: 4

Premium Essay

The Effects of Computer Games to the Academic Perpils

...THE EFFECTS OF COMPUTER GAMES TO THE ACADEMIC PERFORMANCE OF THE GRADE VI PUPILS IN ___________ELEMENTARY SCHOOL S. Y. 2010 - 2011 A Research Proposal Presented to the Faculty of the College Department ________________________________ Quezon In partial fulfillment of the Requirements for Research 2 ________________________ October 2010 Chapter I INTRODUCTION Background of the Study Computers are ubiquitous. As computers have become less expensive they have been purchased by more and more families for their homes. Because of this, many children begin to use computers at an early age. Even if computers are not available in their home, children almost certainly will begin to come into contact with computers in school. Some adults are amazed by how readily young children use computers. Many children find that using computers gives them a sense of power and accomplishment. And, unlike many adults whose first or primary contact with computers is work related, most children first use computers for entertainment purposes and games. This is by no means the only use that children have for computers. Because computer use is promoted in schools, and because computers are so ubiquitous, children have a great deal of exposure to them. Not everyone, however, is comfortable with the use of computers by young children. Some, including the Alliance for Childhood, have called for a halt to the...

Words: 2444 - Pages: 10

Free Essay

Sec 572 Week 1 Ilab Draft

...SEC 572 iLAB 1 Denial of Service Attacks Student Name: Aloysius Jallah Professor: Mark Merkow Name of the attack Denial of service attack (DoS): According to Week 1 TCO, denial of service attack is an attack that considerably reduces the power of the network from appropriately communicating with other networks and/or endpoint users (Merkow 2015). Hence, the end result of the attack is the incapacitation of the target network … rendering it inaccessible to its anticipated end-users through the application of flooding technique. Additionally, if the attacker understands and/or discovers that an intermediary network can give off excessive traffic capacity than the victim network can manage and/or process, the attacker uses the flooding technique to transmit an enormous batch of UDP packets headed for the victim; thus, the end result of this activity can cause flooding traffic congestion and exhaustion of the connection resources of the victim. In cunning attacks, “attacking hosts can flood packets in a burst to congest and disrupt existing TCP connections” (Kuzmanovic et al, 2005). However, for every action, there is equal and opposite reaction. As knowing denial of service (DoS) attack comes into play, software developers and system administrators also come up with the mechanisms and/or solutions to combat, reduce and prevent the potential impact of malicious criminal and/or attackers. Attack discovery and resolution dates: Denial of service (DoS) attacks can be identify...

Words: 1368 - Pages: 6

Premium Essay

There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97).

...reflective and inquisitive minds, and are prone to the commission of errors, it is certain that nothing can be done to perfection. In spite of the fact that many discoveries, developments and inventions seem to be perfect, research has always proved that they can be improved upon. In the light of these lines, I do agree with Griffith on the statement that there is no hope of doing perfect research. The definition of the term research by the Merriam-Webster dictionary is a devoted and systematic study, investigation or examination of previously done work, with an aim of establishing or developing new inventions or conclusions. The term may also be used to imply to the revision of already existing laws, theories or experiments with a target of discovering new facts and findings. This makes the hope of doing perfect research unfeasible. The various developments and transformations, which the world has gone through since the dawn of civilization, satisfy the statement that there is no hope in doing perfect research. In this paper, I am going to support my line of reasoning by referring to two research examples. The marked improvements and developments in the fields of medicine, diagnostic and therapeutic science are vastly attributed to the doing of research. Cancer is one of life’s threatening diseases, which has enabled the doing of...

Words: 1033 - Pages: 5

Premium Essay

Sunzi Assignment- Ibm

...1.0 Introduction International Business Machines, abbreviated IBM and nicknamed "Big Blue" (for its official corporate color) was incorporated in the State of New York on June 16, 1911, is a multinational computer technology and IT consulting corporation headquartered in Armonk, New York, United States. Now, the chairman and CEO of IBM Company is Samuel J Palmisano. IBM manufactures and sells computer hardware and software, and offers infrastructure services, hosting services, and consulting services in areas ranging from mainframe computers to nanotechnology. IBM has been well known as one of the world's largest computer companies and systems integrators. With over 388,000 employees worldwide, IBM is one of the largest and most profitable information technology employers in the world. IBM holds more patents than any other U.S. based Technology Company and has eight research laboratories worldwide. The company has scientists, engineers, consultants, and sales professionals in over 170 countries. IBM employees have earned Five Nobel Prizes, four Turing Awards, five National Medals of Technology, and five National Medals of Science. IBM competitors IBM's main competitors are Hewlett-Packard Company (HPQ) and Dell (DELL) but each of these companies has a different focus area. Dell makes most of its money on PC and server hardware, while Hewlett-Packard is more diversified as the leader in PCs and Imaging & Printing as well as offering IT services. Since IBM relies heavily on...

Words: 4643 - Pages: 19