Difference between revisions of "IB Computer Science 2"

From WLCS
 
Line 1: Line 1:
== Tuesday (3/11/14) ==
+
== [[IBCS2 - Archives]] ==
'''Agenda:'''
 
* Introduction to Web Search
 
* Download: The True Story of the Internet - Search
 
* [http://infolab.stanford.edu/pub/papers/google.pdf http://infolab.stanford.edu/pub/papers/google.pdf] - The Anatomy of a Large-Scale Hypertextual Web Search Engine - Brin & Page
 
* [http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf] The PageRank Citation Ranking:
 
Bringing Order to the Web - Brin & Page
 
* Web Science: Part 2 - Searching the web
 
** [[Media:WebScience_Part2_Search.pptx]]
 
 
 
== Wednesday - Friday (3/5/14 - 3/7/14) ==
 
'''Agenda:'''
 
* Rename your cover page file: '''[cand_no]_[cand_name]_CoverPage.htm'''
 
* Link to your project and give information on how to access/run it
 
** If you made a Scratch project, then you need to be sure to '''share''' your project so that it is viewable publicly
 
** Be sure to also include your Scratch username on the cover page
 
* Complete your Internal Assessment by burning it onto CD
 
** Burn the '''Documentation''' folder, '''Product''' folder, and '''[cand_no]_[cand_name]_CoverPage.htm''',
 
** Test the CD and all its contents on a different computer
 
* Put your '''Name''' and '''Candidate Number''' on the CD
 
* Put your CD in a jewel case
 
 
 
== Monday (3/3/14) ==
 
* Snow Day
 
* Work on your Internal Assessment!
 
 
 
== Friday (2/28/14) ==
 
* Paid Focus Group Opportunity
 
** [http://www.mediabarnresearch.com/ MediaBarn] is having a focus group study at 5:30pm on Tuesday (3/4/14). They are interested to talk with students who are interested in majoring in IT/Computer Science/any related topic.
 
** 90-minute focus group, and the compensation is $100
 
** [http://www.mediabarnresearch.com/infotechstudy Registration Here]
 
** Mediabarn Research Services (near Courthouse metro), 2200 Clarendon Blvd, Suite 1200, Arlington, VA 22201
 
 
 
== Friday - Thursday (2/21/14 - 2/27/14) ==
 
'''Agenda:'''
 
* Internal Assessment - What's Left?
 
* Appendix
 
** Evidence of consultation with the client/advisor (transcription of consultation works)
 
** Evidence of feedback from the client/advisor (transcription of feedback is ok)
 
** Any additional documents or screenshots of the product functioning
 
* Super-checklist rubric for all criteria
 
* 2000 word max for the extended writing sections
 
* Use of the provided [[Media:IBCS_IA_Forms.zip]] and templates
 
* All written sections are saved as '''.rtf''' (RichTextFormat) or '''.odt''' (OpenDocument) files
 
* Correct location and placement of the following:
 
** Criteria A-E documentation should be located in the '''Documentation''' folder
 
** Your video should be located in the '''Documentation''' folder as Criterion D
 
** Your actual product should be located in the Product folder.  The product should work as it sits in the folder.
 
** Cover page
 
* Filling out the cover page
 
** Use relative links
 
** Make sure you fill in every field
 
** Link to a working copy of your product
 
* Burn everything onto a CD
 
 
 
'''FINAL DEADLINE:'''
 
* Monday, March 3rd, 2014
 
 
 
== Wednesday (2/19/14) ==
 
'''Warmup:'''
 
# For each section, write at least one specific concerns or possible attack strategy
 
## Company website page on DoS attacks
 
## Guanjong High School
 
## Western Heights
 
## BYOD (Bring Your Own Device)
 
# We will use the entire's class list of attacks to test out each team's security plan
 
 
 
'''Agenda:'''
 
* Network Security Plan Presentations
 
*# Each team will present their plan
 
*# We will test each plan by going over the class's list of attacks
 
 
 
== Friday (2/14/14) ==
 
* Snow Day
 
 
 
== Monday - Wednesday (2/10/14 - 2/12/14) ==
 
'''Warmup:'''
 
* Be sure that you have read the Case Study: Network Security - [[Media:IBCS_CaseStudy2014.pdf]]
 
*# Begin preparing a Google document that has 4 sections:
 
*## Company website page on DoS attacks
 
*## Guanjong High School
 
*## Western Heights
 
*## BYOD (Bring Your Own Device)
 
*# For each section, write at least one specific concerns or possible attack strategy
 
*# We will use the entire's class list of attacks to test out each team's security plan
 
 
 
'''Agenda:'''
 
* Turn in Criterion E drafts
 
* Network Security Teams
 
*# We will break up into teams, and each team will be given one challenge scenario to "lockdown" and create a security plan
 
*# In your teams, create a Google Presentations one for your security plan
 
*# In your lockdown presentation, each slide should be a different attack or concern for which you prepare
 
*#* Title the slide the common name of the attack (e.g. DDOS, ping of death, etc.)
 
*#* Briefly describe what it is
 
*#* Describe how you would prevent or mitigate the attack
 
* Additional Resources
 
** [http://technet.microsoft.com/en-us/library/cc959354.aspx Microsoft - Common Types of Network Attacks]
 
** [http://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks Symantec - Various Types of Network Attacks]
 
** [http://computernetworkingnotes.com/network-security-access-lists-standards-and-extended/types-of-attack.html Computer Networking Notes - Types of Attack]
 
** [http://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks Wikipedia - Type of Attacks]
 
* Presentations and Testing on '''Friday (2/14/14)'''
 
 
 
== Thursday (2/6/14) ==
 
'''Agenda:'''
 
* Criterion E: Evaluation - Due '''Monday (2/10/14)'''
 
** [http://xmltwo.ibo.org/publications/DP/Group4/d_4_comsc_tsm_1201_1/IA3en/MarkedCrit_E_Evaluation03_en.pdf Criterion E Example]
 
* This criterion should be completed as two parts (headings)
 
*'''Evaluation of the product''' (you should be able to do some of this by Monday)
 
** The evaluation of the product should refer directly to the success criteria in Criterion A, feedback from the client/adviser, as well as any other appropriate feedback obtained.
 
** You should basically demo your product to multiple people and have them comment on each success criteria
 
* '''Recommendations for the future development of the product''' (you should be able to do this by Monday)
 
** The student will use the feedback and the evaluation of the specific performance criteria to recommend possible future developments to the product. These recommendations should explain the benefits of these developments.
 
** You should basically ask in your feedback, suggestions for extending or enhancing the project.  Explain why each new development would be good.
 
** You should have at least 2 minor improvements and 2 major improvements
 
* Case Study: Network Security - [[Media:IBCS_CaseStudy2014.pdf]]
 
*# Highlight any/all special terms in your reading
 
*# As you read, look up any terms that you do not understand or if you need more information
 
*# We will break up into groups next week to simulate network security teams.  Each team will address one of the scenarios in the '''Challenges Faced''' section at the end of [[Media:IBCS_CaseStudy2014.pdf]]
 
*# Begin preparing a Google document that has 4 sections:
 
*## Company website DoS attacks
 
*## Guanjong High School
 
*## Western Heights
 
*## BYOD (Bring Your Own Device)
 
*# For each section, list a bulleted description of 3 different concerns/possible attacks
 
* Crash Course in Symmetric and Asymmetric Cryptography
 
 
 
== Tuesday (2/4/14) ==
 
'''Agenda:'''
 
* Share your Terms & Definitions presentation with Mr. Bui
 
* Continued Introduction to Web Science
 
** [[Media:WebScience_Part1.pptx]]
 
* ???
 
 
 
== Archives ==
 
* [[IBCS2 - 1314 - January]]
 
* [[IBCS2 - 1314 - December]]
 
* [[IBCS2 - 1314 - November]]
 
* [[IBCS2 - 1314 - October]]
 
* [[IBCS2 - 1314 - September]]
 

Latest revision as of 08:28, 13 September 2023