Study the
Objectives and Your Completed Notes
Intro, Basics, History
Looking at Computers
Understanding Hardware and Software
Networks and Networking
The Internet and how it works
Basics of HTML
What is a tag?
How is it recognized? What are its
delimiters? What software interprets tags?
What tag starts an HTML document?
What tag ends it? What is proper nesting of tags?
What are the major parts of an HTML document?
What tags begin/end each?
Where do you put information you want to appear on the main
part of your webpage?
Be able to create a link. Know what is printed on the page and what is not.
What are the tag, attribute, and protocols for creating
links (to hyperlinks, e-mail, other files).
How do you insert extra spaces on a webpage? What are the
delimiters for special characters?
What tag(s) breaks a line of text and forces it to go to
the beginning of the next line?
What does a heading or header tag look like?
What tag starts/ends a paragraph?
What are some special characters and how are they
represented in HTML?
What is an attribute? Distinguish between tags and
attributes. What are the delimiters
for attributes (what characters surround the value)? What is the general format
for tags and attributes?
What is the difference in using title tags versus header
tags?
Identify three empty tags (tags that do not have a
beginning and ending pair).
Style and Lists
What is the difference between internal styles and inline
styles? Know purpose, format and location.
What character separates attribute-value pairs from other
attribute-value pairs in stylesheet rules?
What are the types of lists and what tags create each?
What tags begin and end an individual list item? The term
and definition in a definition list?
What are the defaults for lists (Numbers/ Bullets and Type?)
When would you use inline versus an internal style?
Tables and Images
What tags begin and end an entire table?
A single table row? A single
data entry?
What does the border attribute do in a table tag?
width?
How do you merge rows in a table? Columns? What is the
default value for colspan? Rowspan? Ext Credit
What is the tag to place an image in an HTML document? What
is the purpose of the src & title attributes?
Computer Security
·
Identify the major computer security points of
vulnerability.
·
Define the following terms: virus, denial of
service, worm, firewall, antivirus software, UPS, tailgating, spam, update
·
Distinguish among the various types of hackers:
white-hat, black-hat, script kiddies
·
Give examples of network security threats.
·
Give examples of network security
measures/protections.
·
Define the following terms: fault tolerance,
backup (explain types)
· Give examples of ways to protect the following from unauthorized access, damage, or loss: data, software
· What is encryption?
Software Development and GameMaker
•
Identify
at least 3Types of Software (in addition to system software)
•
Name at
least 3 steps in the software creation process:
•
Software
terminology:
•
Define
Algorithm, Programming, Debugging. What is another name for programming?
•
What do the following GameMaker terms mean?
Scripts, Rooms, Sprites, Objects, Sounds, Instances, Background
•
How do you create an executable GameMaker file?
Protecting Yourself and Others
·
What is a social network?
Give an example. What are associated risks?
·
List the major types of electronic commerce and
give an example of each.
·
Define the following terms: spam, spyware,
pop-up, cookie, hoax, phishing, pharming
o
How can you protect yourself?
·
List some criteria you can use to evaluate the
information you find on a web site.
·
Define the following terms: software piracy,
pilferage, copyright, site license
·
What is the Business Software Alliance and what
do they do?
·
What is green computing? Give examples of “green”
computing.
·
What is ergonomics?
How is it relevant to computing? What is carpal tunnel syndrome?
·
What is workplace monitoring and why is it done?
Is it legal? What employee
abuses might cause an employer to do monitoring?
·
What is some personal information that is
important to protect?
·
What is identity theft?
What are some ways to protect against it?
·
List some of the “ten commandments” of computer
ethics.