18
(c) Stephen W. Foster 1 (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology Introduction to Information Technology IT 101 Week One Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology

(c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

Embed Size (px)

Citation preview

Page 1: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 1 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Introduction to Information Technology

IT 101

Week One

Professor, Stephen W. FosterInformation Technology Program New Jersey Institute of Technology

Page 2: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 2 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Instructor’s name: Professor Foster

Contact Info: http://www.it.njit.edu/foster

Section 003 at 8:30 – 9:55 AM, KUPF 105

Section 001 at 1 – 2:25 PM, CULM 111

Office hours: Tuesdays and Thursdays, 10:30 AM – 11:30 AM, GITC Bldg, IT Department, 3rd floor, Room 3803, by appointment

Class room decorum (courtesy and respect for each other count)

Tardiness - (Prof. reserves the right not to admit you after the class room door closes)

Page 3: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 3 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Please do not use cell phones, PDA’s or Blackberries (e-mails) in class

Laptop’s are permitted in class for note taking only – not games, e-mail, etc

HW will be collected regularly

Chapter work also includes sections on “Spotlight” at the end of each chapter

Group Project (4 students) research paper of 25 - 30 pages, power point presentation 10-12 slides covering the project

You will be responsible for all material presented in class, which may not be in your text books and will appear on your exams

Page 4: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 4 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Thomas Jefferson said “That the purpose of a good teacher is to prescribe what books are to be read and in what order”

If the Professor can not answer your question in class he will promptly find the answer for you

Make sure you take good class notes

I hope to make your course interesting by providing my knowledge, experiences and wisdom on related IT subjects

Student introductions for Today: please stand at your seat when recognized and provide your name, home town, major, computer experience

Good Luck and have fun learning!

Page 5: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 5 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Home work:

Information about HW will be either announced in class or found on the IT HW web site atwww.it.njit.edu/fosterHands on projects will be assigned in class by your professorSubmit your HW in time as per professor’s instructionsHW must be completed independentlyBring to class relevant newspaper and magazine articles concerning chapter material

General Course Notes:

All exams are closed books and will include instructors class notes (usually in Blue)There will be no make-up exams (unless you miss it due to an illness, serious circumstances, active duty

demand, etc)Ready/study the class notes & book (chapter and “spotlight”) due every weekBasic language skills such as: grammar, spelling and legibility will count 5 % on all gradable work such

as HW, exams, reports and projects – please type all work

Page 6: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 6 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Week 1: Overall Course discussion and Computers and You (Ch. 1) Week 2: Projects Assigned and The Internet and The World Wide Web (Ch. 2)Week 3: Wired and Wireless Communications (CH. 3)Week 4: Submit Project Topic & Sources and System Software (Ch. 4)Week 5: Application Software: Tools for Productivity (Ch. 5)Week 6: Inside The System Unit (Ch. 6)Week 7: Midterm Exam (first six weeks) and Input/Output and Storage (Ch. 7)Week 8: Networks: Communicating and Sharing Resources (Ch. 8) Week 9: Piracy, Crime and Security (Ch. 9)Week 10: Programming Languages & Program development (Ch. 11)Week 11: Databases and Information Systems (Ch. 12)Week 12: Project Report Due & Project Presentations Begin System Analysis and Design (Ch. 13)Week 13: Project Presentations and Enterprise Computing (Ch. 14) plusWeek 14: Project Presentations and Careers and Certifications (Ch. 10) Week 15: Final Exam

Page 7: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 7 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Course Syllabus

Letter Grading:

Grading Policy:Attendance and Class Participation: 5%Homework: 15%Midterm: 25%Project: 25%Final: 30%

90 <= A < 10085 <= B+ < 9075 <= B < 8570 <= C+ < 7560 <= C < 7050 <= D < 60 F < 50

Page 8: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 8 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Syllabus Continued

You are responsible for all information contained in the assigned chapters of your textbook and any other assigned readings or presentations. Come to class prepared, which means having read previously assigned chapters and brining questions with you to the lecture. When there is a guest speaker, your job is to listen attentively in order to ask specific questions pertaining to the content of the presentation, as well as write a review of the presentation, commenting on its content and the delivery.

LecturesI will use PowerPoint slides for the main points in my presentations, augmented with board-work when necessary. You can find a copy of the slides that I’ll use on my web site at: www.it.njit.edu/fosterHistorically, actively participating students who regularly attend classes score a half to a full grade higher than they’re less frequently attending counterparts. Role will be taken at the start of class and attendance reported to the department. Frequent absences may affect your enrollment/scholarships/etc.

Page 9: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 9 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Syllabus Continued

Assessment

The midterm and final will constitute a significant portion of your overall grade. Exam times will be announced as they become available. Both exams will be in a closed book/notes format and will contain information from the text, as well as lectures and speakers. The final will be cumulative. As a general rule, I do not give makeup exams without a legitimate reason (e.g., jury duty, serious medical problem) or allow students to take exams on alternate dates. If you have an emergency, I will make allowances as long as you provide proper documentation (e.g., a note from your doctor). I will not accept excuses such as having too heavy a workload or having too many exams the same week. I also do not give out extra-credit assignments.If for some reason you must miss an exam, you must inform me immediately. You can send email or leave a phone message on my answering machine at any hour of any day. You should then come to see me in my office to discuss the reason. If you must miss a class, lab, or exam because of a religious observance, it is your responsibility to report to me within the first two weeks of classes which days you will be missing and make arrangements to re-schedule.

Page 10: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 10 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Syllabus Continued

CollaborationYou are encouraged to work together with your classmates in order to help your high-level understanding of the material presented in the course. Any solutions to assignments/exams/projects presented for credit must be work created on your own. Plagiarism, cheating, or any other anti-intellectual behavior will be dealt with as per the NJIT Honor Code. You can find a copy of the Honor Code here: http://www.njit.edu/academics/honorcode.php

Please read the Code prior to our first class. In the instance that a student’s work appears to be a derivative of another’s, both will receive zero credit for the work and will be referred to the Dean of Students. There will be NO exceptions.

NJIT Campus ScheduleInformation regarding important dates during the semester may be found at:http://www.njit.edu/v2/directory/admin/registrar/calendar/2006fl.htm

Page 11: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 11 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Syllabus Continued

And Finally…

This is probably your first semester at NJIT. Although you’ll hear this later, I’d like to share two of the most important secrets to success that I’ve learned in my many years as both a student and a teacher:I. If you have a question, ASK IT! Contrary to popular belief, your professor is not psychic and can’t guess what you’re thinking, but he’d love to answer any question you might have. That’s why he’s here!

II. If you’re not comfortable asking a question in class, just let me know and I’ll arrange time to meet with you either before or after class. You are welcome to stop by to discuss anything from class, IT, or other topics such as CS, etc. The only time I can say that people come by regularly is the week before midterm and final exams. If you’ve waited that long to ask about something that we’ve covered weeks or months in the past, it’s probably too late (that doesn’t mean that you still shouldn’t stop by – I’ll still try to help as best I can).

Page 12: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 12 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

IT Computers 101

Lets Go!

Chapter One – Basic Computers

Page 13: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 13 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

ARPAnet (Advanced Research Projects Agency Network - DoD packet switching network)

As a result of poor information security controls our most important national secrets were stolen by Soviet Union spies in the 1950’s and the U.S.S.R eventually produced its own nuclear weapon. This event along with the launching of the Soviet Union’s first space satellite in 1957 called “Sputnik” propelled America into a deep cold war, which was shrouded with both suspicion and paranoia on both sides. In 1962 as a result of this concern the U.S Air Force called for the decentralization of the militaries academic and business research capabilities to withstand any possible nuclear attack on the U.S. infrastructure. By 1969 the ARPANET was born with packet switching capabilities, which is the technical basis for how information flows over the Internet today and in 1972 electronic e-mail was first created. Fast forwarding ahead to 1982, the Department of Defense (DoD) and ARPA proclaimed that TCP/IP was the official and established protocol of the ARPANet. By the mid 1980’s the Internet was off and running as we know it today.

Page 14: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 14 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Main Frame Computers

Early Main Frames were called Nodes and people used dumb terminals to connect to them. “Time Sharing” allowed us to leverage the early use of mainframe computers (computers running research, government and business processes)Mainframes have been around for approximately forty years and they are just starting to make a come back, after their demise in the 1980’s. They are making this come back thanks to the creative and innovative thinking by IBM. In the 1980’s IBM lost contact with business reality, but they have re-invented themselves and now as we say “They get it”. During that early mainframe period 1962 – 1986, a handful of influential viruses or self replicating codes seem to have had their origins. The Morris Worm made its début in 1988 when it disabled large chunks of the Internet and became the most influential worm up to that time. Since that time worm growth has accelerated through the 90’s and into the new millennium with infamous worms such as Melissa, Lovebug, Code Red, Nimda, SQL Slammer and Networm. All of these worms have spread quickly across the Internet and caused a lot of damage to IT environments. McAfee currently (2005 statistics) reports approx. 150,000 known Malware threats (mostly to distributed PC computer systems).

Page 15: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 15 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Desktop PC Timeline 1974 Intel designed 8080 Processor and produced “Altair” the first desktop PC MS-DOS and IBM form short lived partnership 1978 Intel produced 8086-8088 processors, which evolved into the 286, 386, 486, etc1990 Windows 3.01993 Intel Pentium series:A 32-bit microprocessor introduced by Intel in 1993. It contains 3.3 million transistors, nearly triple the number contained in its predecessor, the 80486 chip. Though still in production, the Pentium processor has been superseded by the Pentium Pro and Pentium II microprocessors. Since 1993, Intel has developed the Pentium III and more recently the Pentium 4 microprocessorsUntil the late 80s, Intel was essentially the only producer of PC microprocessors. Increasingly, however, Intel is facing competition from other manufacturers who produce "Intel-compatible " chips. These chips support the Intel instruction set and are often less expensive than Intel chips. In some cases, they also offer better performance. Two of the leading manufacturers of Intel-compatible chips are Cyrix and AMD. (Webopedia)1995 Windows 95, etc

Page 16: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 16 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Stolen military data for sale in AfghanistanDespite crackdown, USB computer drives found with names of alleged spies

MSNBC staff and news service reportsApril 13, 2006

Page 17: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 17 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Other Discussions

Discuss Distributed Computing (Intel) vs. Main Frames (IBM)A type of computing in which different components and objects comprising an application can be located on different computers connected to a network. So, for example, a word processing application might consist of an editor component on one computer, a spell-checker object on a second computer, and a thesaurus on a third computer. In some distributed computing systems, each of the three computers could even be running a different operating system. One of the requirements of distributed computing is a set of standards that specify how objects communicate with one another. There are currently two chief distributed computing standards: CORBA and DCOM. (Webopedia)

Discuss “Thin Clients” A thin client is a network computer without a hard disk drive, whereas a fat client includes a disk drive. (Webopedia)

Review and discuss text book material chapter one Show David Lawrence video clip on Ethics – discuss ethicsDiscuss ethics in classHW this week will include Chapter 1: the first 5 questions of Matching, Multiple Choice, Fill-In the Blank and only question #5 from Short Answer (provide answers only).

Page 18: (c) Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) Stephen W. Foster 1 Introduction to Information Technology IT 101 Week

(c) Stephen W. Foster 18 (c) Stephen W. Foster

The Edge in Knowledge

New Jersey Institute of Technology

Good Luck!www.it.njit.edu/foster

NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university.

2003 Top 10 Technology Universities by R&D Expenditure

1. Massachusetts Institute of Technology

2. Georgia Institute of Technology

3. California Institute of Technology

4. Virginia Polytechnic Institute

5. Carnegie Mellon University

6. Texas Tech University

7. New Jersey Institute of Technology

8. Rensselaer Polytechnic Institute

9. Northeastern University

10. Michigan Technological University