CGS 1555 e-Learning Schedule | ||
---|---|---|
Week | Date | Summer Term 2005 Assignments |
0 |
E-Learning: |
e-Learning
Orientation-BTECH 217 Saturday 8:00-10:30 a.m.
5/21
purchase textbook and optional Web Yoda courseware: test Tutorial Zero Quiz from your ISP at Home Your WebCT ID will be the first initial of your first name and the first initial of your last name, combined with your seven digit Student ID number (NOT Your SS#) for example: Your password is your six digit birthday. For example if you were born on July 7, 1977, your password would be 070777
fill-out data card Power Read Tutorials 1,2,3,4 |
1.0 |
E-Learning: |
read in detail Tutorial 1:Introduction to the Internet and the World Wide Web
View Video #2 Nerds 2.01 View Video #3 Nerds 2.01 Read in Detail Tutorial 3: Basic Communication on the Internet: E-mail
Body: describe your background, your major, why you are taking this course, if you have a web site, include the URL After receiving the first group email (~ May 24) from John Taylor: set up Group email in address book (p 133-137) Also in this first group email request from instructor and the Group your
states for the Community College Web Site Review Project. You must select
enough states so that you review at least 50 to 60 college web sites. The
date and time of the email sent will determine who is assigned to which
states. conduct Search #1: one word-one search engine |
1.5 |
E-Learning: |
Over the next two weeks (Weeks 2&3) finish watching the Internet videos:
View Video #2 Nerds 2.01 View Video #3 Nerds 2.01 Select categories for judging community college web sites Review: Spring 2003 e_learning Project results Optional Download (and revise with your criteria): Community College Criteria Spreadsheet Send 2nd Group Email by February 1with your criteria: Power Read Tutorial 9. Then read in detail Pages 436-442
Search and find articles on PC World and PC Magazine's web sites about
protecting your computer. Share with the
class any great articles you find (group email the URL) download and install: Ad-Aware http://www.lavasoft.de/support/download/Pull the plug on adware and spyware with the latest version of this free tool. Ad-aware scans your system--including removable drives--for the most common types of advertising spyware and safely removes offending software. The program works through intuitively designed wizards. Currently, the utility detects small ad programs from Adware, Aureate/Radiate, OnFlow, Comet-Cursor, Cydoor, Doubleclick, EverAd, Flyswat, OnFlow, TimeSink 5.0, and others. This latest version (6.181) features a redesigned user interface as well as safeguards for users who may be overzealous in removing adware/spyware components. Because many ad-supported programs won't function if you remove their ad modules, you may occasionally want to overrule an earlier decision to remove one of these components. This latest release addresses this problem in two ways: It stores adware components in your Recycle Bin, where you can later retrieve them; and it provides a backup archive viewer for reviewing--and if necessary, restoring--components you've removed. One other neat feature in this latest release: it lets you search for new reference files automatically when Ad-aware is started. As many of us know, "spyware" refers to small, hidden programs that are embedded in larger applications to report information to advertisers. These programs are included in some shareware and freeware programs because, unfortunately, that's the only way some software developers can pay their bills. If you don't want any part of this--and feel that these hidden programs invade your privacy--you should definitely consider downloading Ad-aware. Ad-aware is free for noncommercial use only. If you want to use it in a commercial, educational, or governmental environment, Lavasoft asks that you purchase Ad-aware Plus or Ad-aware Professional at its Web site. You have data to report in Search #10 about your experiences this term with Ad-aware and other spyware products. This search is due the last week of the term. Spybot Search and Destroy v1.2Search your hard disk for so-called spybots or adbots, the modules that are responsible for showing ads and transmitting information back to vendors. If Spybot Search and Destroy finds such modules, it will remove them or replace them with empty dummies. In most cases, the host software still runs after removing the bot. Among the adbots Spybot targets: Aureate, CLPRS, Comet Cursors, eZula HotText, Gator, GoHip, Radiate, WebHancer, and WildTangent. The program allows you to update by subscribing to the author's mailing list. Finally, Spybot removes your usage tracks (last visited Web sites, opened files, started programs, and cookies), so even spybots that are unknown can't transmit this private information. The program supports all three major browsers: Internet Explorer, Netscape Communicator, and Opera. Instructor comment: Some students complain that Spybot and ZoneAlarm slow down their machine. You are not required to use these products, but should investigate what they can and can not do for you. These products do what McAfee AntiVirsus or Norton's Antivirsus do tootect your machine. Remember that if you use a constant connection like road runner you are more succeptible to intruders. ZoneAlarm v3.7.202Another program that you may want to consider to protect your computer from unwanted intrusion is Zone Alarm. If you have DSL or a cable modem, your IP address is permanent. Although this has benefits, it also carries the serious shortcoming of rendering your PC vulnerable to attacks. A firewall, in this respect, becomes not just desirable but a necessity. ZoneAlarm is a top choice, and best of all, the basic version is free. You can block uninitiated and unwanted traffic, even while your PC is unattended or while you're not using your connection. You can also limit your exposure to attack by specifying which applications can access the Internet. The program also lets you stop e-mail-borne Visual Basic Script worms. Free Zone Alarm Download from PCWorld Magazine complete Tutorial 1 Quiz and |
|
||
2.0 |
E-Learning: |
HCC Closed Monday May 30: Memorial Day read in Detail Tutorial 2: Browser
Basics
set up favorites in at least five groups: |
2.5 |
E-Learning: |
read Tutorial 4: Searching the Web
complete Search #2: two or more words/two
different engines
start and complete the review of at least 15 CC web sites in the
CC Project, please also review Search #12. You must answer the two
questions from each CC web site complete at least 15 more cc web sites for CC Project |
3.0 |
|
complete
Search #3: two or more groups of words with Boolean Operator: "and" begin Search #4 (People) read Tutorial 5: Information Resources on
the Web complete Tutorial 4 Quiz
|
3.5 |
|
read Tutorial 7: Mass Communication on the Internet complete and submit Search 9: Multimedia Radio/Audio and/or
video read at least seven of Bob Cringely’s articles by the end of the
course: Subscribe to News letters such as Kim Komando's weekly column, Bob Cringley's From the Pulpit notification, or other informational newsletters read Tutorial 8: Real-time Communication on the Internet
complete at least 15 more CC web sites in the CC Project
complete Tutorial 5 Quiz
complete Mid Term-"Who Wants to Be a Computer Genius" |
|
||
4.0 |
|
complete Part I CC Research Project read Tutorial 9: Securing and Enhancing
Your Use of the Internet complete Search #12: Cyber Security at
Community Colleges The 12th major search will be carried over from the above community college search. It will aid the student in completing the Cyber Security Term Paper. While researching the community colleges for searches 5/6, the student will look into their catalog or lists of courses to see if that college offers a cyber security course and a specific course for the use of the internet like this course CGS 1555. Include the course name and number. Send a Group email every time you surf through many of the college web sites and find a specific course at a college with a copy of the course description from the catalog. (125 points)
complete Tutorial 7 Quiz (not available in Taylor format--but use ExamView format)
complete Tutorial 8 Quiz (ExamView)
|
4.5 |
E-Learning: |
read HTML Tutorial 1: Developing a Basic
Web Page
complete resume, vita, or informational page with image using NotePad read Tutorial 6 FTP Basics: Downloading and Storing Data complete Tutorial 9 Quiz (ExamView)
|
5.0/5.5 |
E-Learning: |
submit three scavenger hunt questions to instructor only by 6/26 read HTML Tutorial 2: Adding Hypertext Links to a Web Page Continue developing About Me Web Site. Send links to instructor and class read HTML Tutorial 3 Handout: Design, Graphics (no
Test) (If provided student) Use HomeSite to:
Create Favorites Page complete Tutorial 6 Quiz
complete search #11: Domain Name Search/Registrars read Tutorial 10: Web Portals and Electronic Commerce start searches 5, 6, 7, 8 concerning e-commerce |
6.0 |
E-Learning: |
submit three scavenger hunt questions to instructor only by 6/26 complete Search 5: E-Commerce: Travel
create Phase I: CC Research Project Summary Page and
post on web site Include:
submit group email with link to web site complete and submit Term Paper by 7/1
|
6.5 |
E-Learning: |
complete and submit Search #10 report: Ad-AWare, Trojan Horses, etc add to and post your Phase 2: Community College Research Project with
your five best cc web sites in the nation to your Phase 1 page complete Tutorial 10 (ExamView) Quiz
|
7.0 |
|
heading into last week--need to finish all projects and exams by 7/10 |
7.0 |
E-Learning: |
HCC closed 7/4 for Fourth of July Holiday complete Scavenger Hunt in class 7/10 or online by no later than Sunday 7/11 11pm (all grades must be submitted by noon Tuesday 7/13) |