180 likes | 352 Views
Introduction to Information Technology IT 101 Week One. Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology. Course Syllabus. Instructor’s name: Professor Foster Contact Info: http://www.it.njit.edu/foster
E N D
Introduction to Information TechnologyIT 101Week One Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology (c) Stephen W. Foster
Course Syllabus • Instructor’s name: Professor Foster • Contact Info: http://www.it.njit.edu/foster • Section 003 at 8:30 – 9:55 AM, KUPF 105 • Section 001 at 1 – 2:25 PM, CULM 111 • Office hours: Tuesdays and Thursdays, 10:30 AM – 11:30 AM, GITC Bldg, IT Department, 3rd floor, Room 3803, by appointment • Class room decorum (courtesy and respect for each other count) • Tardiness - (Prof. reserves the right not to admit you after the class room door closes) (c) Stephen W. Foster
Course Syllabus • Please do not use cell phones, PDA’s or Blackberries (e-mails) in class • Laptop’s are permitted in class for note taking only – not games, e-mail, etc • HW will be collected regularly • Chapter work also includes sections on “Spotlight” at the end of each chapter • Group Project (4 students) research paper of 25 - 30 pages, power point presentation 10-12 slides covering the project • You will be responsible for all material presented in class, which may not be in your text books and will appear on your exams (c) Stephen W. Foster
Course Syllabus • Thomas Jeffersonsaid “That the purpose of a good teacher is to prescribe what books are to be read and in what order” • If the Professor can not answer your question in class he will promptly find the answer for you • Make sure you take good class notes • I hope to make your course interesting by providing my knowledge, experiences and wisdom on related IT subjects • Student introductions for Today: please stand at your seat when recognized and provide your name, home town, major, computer experience • Good Luck and have fun learning! (c) Stephen W. Foster
Course Syllabus • Home work: Information about HW will be either announced in class or found on the IT HW web site at www.it.njit.edu/foster Hands on projects will be assigned in class by your professor Submit your HW in time as per professor’s instructions HW must be completed independently Bring to class relevant newspaper and magazine articles concerning chapter material • General Course Notes: All exams are closed books and will include instructors class notes (usually in Blue) There will be no make-up exams (unless you miss it due to an illness, serious circumstances, active duty demand, etc) Ready/study the class notes & book (chapter and “spotlight”) due every week Basic language skills such as: grammar, spelling and legibility will count 5 % on all gradable work such as HW, exams, reports and projects – please type all work (c) Stephen W. Foster
Course Syllabus • Week 1: Overall Course discussion and Computers and You (Ch. 1) • Week 2: Projects Assigned and The Internet and The World Wide Web (Ch. 2) • Week 3: Wired and Wireless Communications (CH. 3) • Week 4: Submit Project Topic & Sources and System Software (Ch. 4) • Week 5: Application Software: Tools for Productivity (Ch. 5) • Week 6: Inside The System Unit (Ch. 6) • Week 7: Midterm Exam (first six weeks) and Input/Output and Storage (Ch. 7) • Week 8: Networks: Communicating and Sharing Resources (Ch. 8) • Week 9: Piracy, Crime and Security (Ch. 9) • Week 10: Programming Languages & Program development (Ch. 11) • Week 11: Databases and Information Systems (Ch. 12) • Week 12: Project Report Due& Project PresentationsBegin System Analysis and Design (Ch. 13) • Week 13: Project Presentations and Enterprise Computing (Ch. 14) plus • Week 14: Project Presentations and Careers and Certifications (Ch. 10) • Week 15: Final Exam (c) Stephen W. Foster
Course Syllabus 90 <= A < 100 85 <= B+ < 90 75 <= B < 85 70 <= C+ < 75 60 <= C < 70 50 <= D < 60 F < 50 • Letter Grading: • Grading Policy: Attendance and Class Participation: 5% Homework: 15% Midterm: 25% Project: 25% Final: 30% (c) Stephen W. Foster
Syllabus Continued • You are responsible for all information contained in the assigned chapters of your textbook and any other assigned readings or presentations. Come to class prepared, which means having read previously assigned chapters and brining questions with you to the lecture. When there is a guest speaker, your job is to listen attentively in order to ask specific questions pertaining to the content of the presentation, as well as write a review of the presentation, commenting on its content and the delivery. • Lectures I will use PowerPoint slides for the main points in my presentations, augmented with board-work when necessary. You can find a copy of the slides that I’ll use on my web site at: www.it.njit.edu/foster Historically, actively participating students who regularly attend classes score a half to a full grade higher than they’re less frequently attending counterparts. Role will be taken at the start of class and attendance reported to the department. Frequent absences may affect your enrollment/scholarships/etc. (c) Stephen W. Foster
Syllabus Continued • Assessment The midterm and final will constitute a significant portion of your overall grade. Exam times will be announced as they become available. Both exams will be in a closed book/notes format and will contain information from the text, as well as lectures and speakers. The final will be cumulative. As a general rule, I do not give makeup exams without a legitimate reason (e.g., jury duty, serious medical problem) or allow students to take exams on alternate dates. If you have an emergency, I will make allowances as long as you provide proper documentation (e.g., a note from your doctor). I will not accept excuses such as having too heavy a workload or having too many exams the same week. I also do not give out extra-credit assignments. If for some reason you must miss an exam, you must inform me immediately. You can send email or leave a phone message on my answering machine at any hour of any day. You should then come to see me in my office to discuss the reason. If you must miss a class, lab, or exam because of a religious observance, it is your responsibility to report to me within the first two weeks of classes which days you will be missing and make arrangements to re-schedule. (c) Stephen W. Foster
Syllabus Continued • Collaboration You are encouraged to work together with your classmates in order to help your high-level understanding of the material presented in the course. Any solutions to assignments/exams/projects presented for credit must be work created on your own. Plagiarism, cheating, or any other anti-intellectual behavior will be dealt with as per the NJIT Honor Code. You can find a copy of the Honor Code here: http://www.njit.edu/academics/honorcode.php Please read the Code prior to our first class. In the instance that a student’s work appears to be a derivative of another’s, both will receive zero credit for the work and will be referred to the Dean of Students. There will be NO exceptions. • NJIT Campus Schedule Information regarding important dates during the semester may be found at: http://www.njit.edu/v2/directory/admin/registrar/calendar/2006fl.htm (c) Stephen W. Foster
Syllabus Continued • And Finally… This is probably your first semester at NJIT. Although you’ll hear this later, I’d like to share two of the most important secrets to success that I’ve learned in my many years as both a student and a teacher: I. If you have a question, ASK IT! Contrary to popular belief, your professor is not psychic and can’t guess what you’re thinking, but he’d love to answer any question you might have. That’s why he’s here! II. If you’re not comfortable asking a question in class, just let me know and I’ll arrange time to meet with you either before or after class. You are welcome to stop by to discuss anything from class, IT, or other topics such as CS, etc. The only time I can say that people come by regularly is the week before midterm and final exams. If you’ve waited that long to ask about something that we’ve covered weeks or months in the past, it’s probably too late (that doesn’t mean that you still shouldn’t stop by – I’ll still try to help as best I can). (c) Stephen W. Foster
IT Computers 101Lets Go!Chapter One – Basic Computers (c) Stephen W. Foster
ARPAnet (Advanced Research Projects Agency Network - DoD packet switching network) • As a result of poor information security controls our most important national secrets were stolen by Soviet Union spies in the 1950’s and the U.S.S.R eventually produced its own nuclear weapon. This event along with the launching of the Soviet Union’s first space satellite in 1957 called “Sputnik” propelled America into a deep cold war, which was shrouded with both suspicion and paranoia on both sides. In 1962 as a result of this concern the U.S Air Force called for the decentralization of the militaries academic and business research capabilities to withstand any possible nuclear attack on the U.S. infrastructure. By 1969 the ARPANET was born with packet switching capabilities, which is the technical basis for how information flows over the Internet today and in 1972 electronic e-mail was first created. Fast forwarding ahead to 1982, the Department of Defense (DoD) and ARPA proclaimed that TCP/IP was the official and established protocol of the ARPANet. By the mid 1980’s the Internet was off and running as we know it today. (c) Stephen W. Foster
Main Frame Computers • Early Main Frames were called Nodes and people used dumb terminals to connect to them.“Time Sharing” allowed us to leverage the early use of mainframe computers(computers running research, government and business processes) • Mainframes have been around for approximately forty years and they are just starting to make a come back, after their demise in the 1980’s. They are making this come back thanks to the creative and innovative thinking by IBM. In the 1980’s IBM lost contact with business reality, but they have re-invented themselves and now as we say “They get it”. During that early mainframe period 1962 – 1986, a handful of influential viruses or self replicating codes seem to have had their origins. The Morris Worm made its début in 1988 when it disabled large chunks of the Internet and became the most influential worm up to that time. Since that time worm growth has accelerated through the 90’s and into the new millennium with infamous worms such as Melissa, Lovebug, Code Red, Nimda, SQL Slammer and Networm. All of these worms have spread quickly across the Internet and caused a lot of damage to IT environments. McAfee currently (2005 statistics) reports approx. 150,000 known Malware threats (mostly to distributed PC computer systems). (c) Stephen W. Foster
Desktop PC Timeline • 1974 Intel designed 8080 Processor and produced “Altair” the first desktop PC • MS-DOS and IBM form short lived partnership • 1978 Intel produced 8086-8088 processors, which evolved into the 286, 386, 486, etc • 1990 Windows 3.0 • 1993 Intel Pentium series: A 32-bit microprocessor introduced by Intel in 1993. It contains 3.3 million transistors, nearly triple the number contained in its predecessor, the 80486 chip. Though still in production, the Pentium processor has been superseded by the Pentium Pro and Pentium II microprocessors. Since 1993, Intel has developed the Pentium III and more recently the Pentium 4 microprocessors Until the late 80s, Intel was essentially the only producer of PC microprocessors. Increasingly, however, Intel is facing competition from other manufacturers who produce "Intel-compatible " chips. These chips support the Intel instruction set and are often less expensive than Intel chips. In some cases, they also offer better performance. Two of the leading manufacturers of Intel-compatible chips are Cyrix and AMD. (Webopedia) • 1995 Windows 95, etc (c) Stephen W. Foster
Stolen military data for sale in AfghanistanDespite crackdown, USB computer drives found with names of alleged spies MSNBC staff and news service reports April 13, 2006 (c) Stephen W. Foster
Other Discussions • Discuss Distributed Computing (Intel) vs. Main Frames (IBM) A type of computing in which different components and objects comprising an application can be located on different computers connected to a network. So, for example, a word processing application might consist of an editor component on one computer, a spell-checker object on a second computer, and a thesaurus on a third computer. In some distributed computing systems, each of the three computers could even be running a different operating system. One of the requirements of distributed computing is a set of standards that specify how objects communicate with one another. There are currently two chief distributed computing standards: CORBA and DCOM. (Webopedia) • Discuss “Thin Clients” A thin client is a network computer without a hard disk drive, whereas a fat client includes a disk drive. (Webopedia) • Review and discuss text book material chapter one • Show David Lawrence video clip on Ethics – discuss ethics • Discuss ethics in class • HW this week will include Chapter 1: the first 5 questions of Matching, Multiple Choice, Fill-In the Blank and only question #5 from Short Answer (provide answers only). (c) Stephen W. Foster
Good Luck! www.it.njit.edu/foster NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university. (c) Stephen W. Foster