8.3 Identify the proper configuration for client email including client setup parameters (username and password),protocols and port numbers, and security issues
16.3 Apply the principle of usability in design (user experience)
19.1 Explain the need for understanding a target audience in order to create appropriate marketing strategies for a successful website
16.3 Apply the principle of usability in design (user experience)
19.1 Explain the need for understanding a target audience in order to create appropriate marketing strategies for a successful website
Reflection: On Monday the whole class participated in an activity to introduce ourselves to each other. We went around the class, and each person stood up, said their name, and then said their favorite animal. After discussing the importance of interaction within the classroom, Mr. Larsen then told all the students to get up and move to the tiled area of the room. There we all participated in an activity that required us to both shake hands and introduce ourselves to several people we had never met.
On Tuesday, Mr. Larsen informed us that we would be creating and maintaining a blog throughout the year. We began by either signing into gmail or creating a gmail account. Then we navigated to the Blogger website, where we created the blog and named it after ourselves. WE then were told to send an email that included the web address of our blogs to Mr. Larsen. For the remainder of the class, we were allowed to design and customize the blog to suit our own personal style.
Future Plans:
5.1 Investigate components of the internet
5.2 Examine the impact of the internet on the world
5.4 Examine cloud-based computing and how it works
7.1 Identify the hardware and software of a server
7.4 Differentiate among shared hosting, dedicated server, and virtual private server
9.2 Explain the steps necessary to post content to a server
10.3 Demonstrate appropriate HTML coding including elements, attributes, values, and syntax
12.3 Explain how to control DOM using client-side scripting
12.4 Demonstrate how to use JavaScript libraries and frameworks (e.g., jQuery, AngularJS, Node.js)
12.5 Create event triggers using JavaScript (e.g., onclick and onmouseover)
12.7 Demonstrate the proper way to write an embedded, inline, and external script
13.1 Explain the purpose of server-side programming language such as PHP, RUBY, and ASP.net to create dynamic web pages
13.3 Develop a dynamic web page
17.1 Explain procedures and concepts used to maintain data integrity and security (e.g., access control, authentication, encryption, secure socket layers, access security tools, auditing, and secure electronic transactions via log in after access control
17.2 Describe security issues related to the network, computer hardware, software, and data
17.3 Identify computer threats and methods to protect a computer (e.g., viruses, phishing, e-mail, social engineering, spoofing, identify theft, spamming)
17.4 Explain concepts such as denial of service, hacking/cracking, intrusion, detection, and prevention (e.g., two-step authentication, biometrics, captias)
5.1 Investigate components of the internet
5.2 Examine the impact of the internet on the world
5.4 Examine cloud-based computing and how it works
7.1 Identify the hardware and software of a server
7.4 Differentiate among shared hosting, dedicated server, and virtual private server
9.2 Explain the steps necessary to post content to a server
10.3 Demonstrate appropriate HTML coding including elements, attributes, values, and syntax
12.3 Explain how to control DOM using client-side scripting
12.4 Demonstrate how to use JavaScript libraries and frameworks (e.g., jQuery, AngularJS, Node.js)
12.5 Create event triggers using JavaScript (e.g., onclick and onmouseover)
12.7 Demonstrate the proper way to write an embedded, inline, and external script
13.1 Explain the purpose of server-side programming language such as PHP, RUBY, and ASP.net to create dynamic web pages
13.3 Develop a dynamic web page
17.1 Explain procedures and concepts used to maintain data integrity and security (e.g., access control, authentication, encryption, secure socket layers, access security tools, auditing, and secure electronic transactions via log in after access control
17.2 Describe security issues related to the network, computer hardware, software, and data
17.3 Identify computer threats and methods to protect a computer (e.g., viruses, phishing, e-mail, social engineering, spoofing, identify theft, spamming)
17.4 Explain concepts such as denial of service, hacking/cracking, intrusion, detection, and prevention (e.g., two-step authentication, biometrics, captias)
No comments:
Post a Comment