120 likes | 334 Views
Exam 1 Preparation Guide Use to BEGIN your preparation for exam 1 You should add content where you feel you may be lacking Get together in groups if necessary to discuss the exam and various methods for studying for it. BCIS 2610. Chapter 1.
E N D
Exam 1 Preparation Guide Use to BEGIN your preparation for exam 1 You should add content where you feel you may be lacking Get together in groups if necessary to discuss the exam and various methods for studying for it BCIS 2610
Chapter 1 • Define a computer and describe its primary operations: • A programmable electronic device that accepts data (input), performs operations (processing) on the data, presents the results (output), and can store the data or results as needed (storage). (Plus communications) • List some important milestones in computer evolution: • Pre-computers and Early Computers (before approximately 1945) • First-Generation Computers (approximately 1946-1957) • Second-Generation Computers (approximately 1958-1963) • Third-Generation Computers (approximately 1964-1970) • Fourth-Generation Computers (approximately 1971-present) • Fifth-Generation Computers (now and the future) • PC stands for Personal Computer
Chapter 2 • Random Access Memory (RAM) stores data and programs temporarily while they are being used • The system unit is composed of hardware such as the motherboard, memory, cpu, and so on • Unlike other storage systems, flash memory has no moving parts • A computer uses digital signals to represent binary numbers (0s & 1s) which are grouped together in bytes (8 bits) to form characters, numbers, and so on
Chapter 3 • The Internet developed from a network known as ARPANET • Web Pages are located on Web servers which are continually connected to the Internet • Messages posted in discussion groups are called “threads” • Secure Web pages have a locked padlock or unbroken key at the bottom of the Web browser screen • Identity theft is accomplished by someone gaining enough personal information that they can pose as another person
Chapter 4 • Logic bombs refer to a virus activated by a certain conditions such as a particular keystroke • All types of malware are generally referred to as viruses though there are distinctions • UPSs are used to provide battery backup • Authentication systems help to determine that a person is who they claim to be • Hot sites act as a backup facility with computers, desk and so on in case the primary facility becomes incapacitated • Biometric readers authenticate users by measuring biological characteristics of a user • Firewalls protect a PC by closing down ports
Power Point Tutorial 1 & 2 • Power Point is a powerful presentation graphics program • Power Point can be used to create 35 mm slides, on-screen slides, and color overheads • Slide Show view fills the screen and is used to present the slide to an audience • Outline tab displays the titles and text of each the slides • The notes pane contains any notes that you might prepare on each slide • Footers are useful for displaying date, time, slide numbers and so on, on all slides • Power Point wizards help you to quickly develop effective presentations
Front Page Tutorial 1 • Front Page is a Web page authoring and site management program • HTML uses tags to define characteristics about text, images, hyperlinks and so on • The WWW is a collection of electronic documents connected to related documents via hyperlinks • A Web page can contain text, images, sound, video and so on • A browser is used to access web pages
Front Page Tutorial 2 • Front Page allows you to import image files, manage existing web sites, and publish Web pages • Each Web page has a unique Uniform Resource Locator (URL) • New Web pages can be added from Design view, Navigation view, or from Folder view • Table properties can adjust where a table sits in a web page, the width of the table, as well as various other border properties of the table • Images are measured in terms of bits. An 8-bit image can contain up to 256 colors
Front Page Tutorial 3 • Shared borders can be used in a web site to make sure that multiple pages contain identical information such as a menu • Images are resized using sizing handles • Broken hyperlinks occur for a number of reasons including a file’s name being changed or moved or deleted, the web server having issues, or the web server’s Internet address could have changed
Exam Breakdown • Chapter 1 (15 Questions) • Pages 6, 8, 8, 9, 10, 11, 11, 11, 12, 16, 18, 18, 20, 21, 23 • Chapter 2 (15 Questions) • Pages 40, 40, 40, 40, 40, 48, 55, 61/62, 52, 57, 57, 58, 48, 48, 50 • Chapter 3 (15 Questions) • Pages 78, 78, 80, 94, 95, 95, 99, 87, 83, 88, 89, 104, 85, 98, 95
Exam Breakdown (Continued) • Chapter 4 (15 Questions) • Pages 124, 125, 146, 143, 127, 128, 145, 130, 140, 143, 146, 144, 131, 125, 136 • PowerPoint (16 Questions) • Pages PPT 4, PPT 4, PPT 7, PPT 7, PPT 5, PPT 6, PPT 6, PPT 7, PPT 7, PPT 10, PPT 10, PPT 10, PPT 24, PPT 19, PPT 19, PPT 50
Exam Breakdown (Continued) • FrontPage (14 Questions) • FP 4, FP 6, FP 6, FP 6, FP 8, FP 4, FP 10, FP 89, FP 54, FP 117, FP 156, FP 169/170, FP 203, FP 216