and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain
Words: 12527 - Pages: 51
Unit: 2 Assignment 1: Strengths & Challenges Reflection Letter Hello, It’s a pleasure to be in class GS1145 on Monday evenings. Especially being out of school since 2005. I can see that this program has lots to offer for student. The course I’m taking is Electrical Engineering, and I’m very thrilled to further my education at ITT-Tech. In this letter I’ll discuss my past challenges from being in school, to my strengths as a student. Also I’ll be going over plans and ideas
Words: 489 - Pages: 2
Lena Cruz GS1145 Strategies for the Technical Professional Unit 1 Assignment 2: Change Wheel Reflection After moving from San Bernardino, California to Salem, Oregon, there have been many changes in my life. My boyfriend and I seem to be happier living in a nice, small town community rather than the crowded and long winded commute we once had in California. The environment here is fresh and clean, and the people nicer. We do miss the food in California, but other than that we are happier
Words: 421 - Pages: 2
Week 7 assignments Task 1: Consider the following table of costs for the Winsome Widget Factory, which operates in a perfectly competitive market. The market price faced by this firm is $6.00 per widget. a. Fill in the formula for AFC, AVC, ATC, MC, TR, MR, and Total Profit at the top of the column in the gray section within the table. b. Fill in the missing values for TFC, TVC, AFC, AVC, ATC, MC, TR, MR, and Total Profit in the blue sections of the table. | Winsome
Words: 1770 - Pages: 8
Introduction to Web Applications Unit 3 Homework The following homework is designed to cover the course objectives for this unit. Assignment 3.1: For the following questions, fill in the blank or name the thing described. 1. This color palette displays in a similar manner in the Mac and PC platforms: _________ 2. CSS selector that applies to one and only one object on a Web page: _________ 3. CSS rules are comprised of ____________ and declarations. 4. CSS property that configures the background
Words: 302 - Pages: 2
Name:__________________ Introduction to Programming Winter 2014/2015 Instructor: Martin Remmele Unit 7 Homework Assignment Due by end of first break February 10, 2015 Learning Objectives and Outcomes NOTE: This section lists concepts and techniques to be understood from this unit. The actual assignment that you are to complete is found in the next section: “Assignment Requirements”. * Be able to Use pseudocode/flowcharts to represent repetition structures. *
Words: 310 - Pages: 2
ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit,
Words: 530 - Pages: 3
Annotated Bibliography GE217 Composition II Team Topic: __________________________________ Name: ______________________________ Position: Pro or Con (circle one) The assignment due was the following: | Date Due | 1. Use the ITT Virtual Library to find at least 4 articles pertaining to your topic. 2. Skim-read more than 4 articles, but select 4 that discuss your topic’s position. 3. Make notes about each of the 4 articles 4. Write an MLA citation for each. 5. Create an
Words: 277 - Pages: 2
ShaneDerek Rios Date: 7/20/2015 Unit 5 Assignment 1: Exploring LAN Switches Assignment Requirements Using Internet sources located in the ITT Tech Virtual Library or other sites, find three models of LAN switches that would be appropriate for each of the following scenarios. Try to find switches from more than one manufacturer (e.g., Cisco, Juniper, Brocade, Netgear, etc.). 1. Home use for a family of four people who have broadband Internet access (e
Words: 340 - Pages: 2
IS3340 —Windows Security E-mail: E-mail: VShafer@itt-tech.edu Cell Phone#: 865-236-1869 Title: Analyzing Windows Application Software for Security Vulnerabilities Learning Objective ▪ Design techniques to protect given Windows application software from security vulnerabilities. Key Concepts ▪ Vulnerabilities to Microsoft server and client applications ▪ Strategies for securing Microsoft server and client applications ▪ Procedures for securing Microsoft applications
Words: 630 - Pages: 3