Thursday, November 25, 2010

Final Exam

Please answer all of the following questions, and then email them to itgs.sass@gmail.com

DO NOT LEAVE THE ROOM UNTIL YOU CHECK WITH ME THAT I HAVE RECEIVED THE EXAM IN MY ACCOUNT.


1- A businessman has just launched a new online service, by which he sells school uniforms to interested families. Families can access the website, select their school and the related items of clothing and order online to be delivered to their homes.
Explain in detail:
a. How a search engine like Google gets to know of the existence of this page so that when users eventually search for school uniforms they are able to find this new service.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. How the owner of the firm can try to get his page to appear higher in the search engine rankings.
d. How, in the future, users might search for these services taking advantages of developments in search engine capabilities.

2- A school student is on the Internet in one if the school labs.
a. How can she and many other students be accessing at the same time a single cable modem connection from the school?
b. How are users prevented from accessing unauthorized web sites?
c. What technical measures could be in place for making sure that outside hackers do not get access to the network?

3- You are hired to design an access system for customers of a bank. Customers would be able to access their accounts online and also their security boxes in the bank where they store their valuables. Determine, for each of the needed accesses, what the best method would be and explain why you have chosen it. Include, within your answer, possible use of encrypted information.

4- Choose one of these topics and comment how technology can enhance activities within that sector, as well as the impact that these technological applications may have on individuals and society.
a. Health
b. Arts, Entertainment and Leisure
c. Science and the environment
d. Politics and government

5- Give an account of what specific functions are performed by the operating system from the moment in which the computer is turned on until it is ready to receive user input. How does the CPU/Operating System achieve multitasking?

6- Give three specific examples of how hackers can access computers and/or networks, and explain, for each of those examples, how they may benefit from it. How can a web site prevent a denial of service attack?

7- A multinational company has branches in Argentina and the US. The Argentina branch has 8 networked computers that are used to handle customer requests and post-sale service, whereas the US office deals with sales and production through 12 computers. Each branch has two network printers and a file server, and they must be connected to each other. Design a network that satisfies the requirements and explain which hardware and/or software solutions you need to adopt.

8- Treasure Hunt
There is a famous quote that reads “It was the best of times, it was the worst of times…”, which is the first line of a famous book. In the year that another writer was born, a close friend and influence of the author of the book where the quote can be found, a very important battle takes place in October. On the same day that the loser of that battle attempted to commit suicide, but 161 years later, an actress and singer died. Give the name of the actress.

Wednesday, November 3, 2010

Your own blog

From now until the end of our regular classes, we will be working, in an attempt to revise and consolidate what we have learnt throughout the year, on creating your own ITGS blog, focused on the social impact of the use of technology.
Working in pairs, you will create a new blog in Blogspot. This blog will feature news articles, videos and any other resources that deal with the social and ethical impact of the use of technology. The theme of your blog will be the impact of technology on individuals and societies, and your target audience are web surfers who are interested in analyzing those implications and want to know more about the impact of technology.
You are expected to write a short commentary on the resources posted, and create a discussion thread for each article that you publish. You will be expected to respond to user comments on each of these threads.
You will be assessed on the quality of the posts, how they successfully cover the syllabus, and how you respond to user comments, thus encouraging a positive discussion on the topic.
Your blog must contain at least one post per topic posted on the ITGS Blog.
Individually, you are expected to post at least three comments per lesson on other people’s blogs, and send a copy of each comment to itgs.sass@gmail.com
By the end of the lesson today, you have to send an email that contains:
- Names of the students in the group and the URL of the newly created blog.
- User name or Google account which you will use to post comments.

Your games in the classroom

After having reviewed the suggested games for classroom implementation, it is time to go the teachers themselves. You will select one classroom teacher who will be, in your assessment, the most likely to be able to use the game in the classroom.

By Wednesday next week, you should submit, in a Word file:
- The name and grade level of the teacher you have interviewed.
- A summary of the interview.
- A specific reference with regards to whether the teacher thinks the game is applicable or not, and the reasons for that.