Computer Syllabus for Grade 8

In: Computers and Technology

Submitted By johnfrancisco94
Words 2773
Pages 12
PENIEL INTEGRATED CHRISTIAN ACADEMY OF RIZAL, INC.
COMPUTER CURRICULUM MAP
GRADE 8 S.Y 2016-2017

FIRST QUARTER | SECOND QUARTER | THIRD QUARTER | FOURTH QUARTER | BASIC WEB CONCEPTS * Web Design Terminology * History of the Internet * History of the World Wide Web * Accessing the Web * Web Browsers * Web Browsers Elements * Kinds of the Web Browsers * Basic Web Design Principles * Essentials Elements of the Web Contents * Planning Your Web SiteINTRODUCTION TO HTML * What is HTML? * Exploring HTML Text Editors * What is New in HTML5? * Basic Differences between HTML4 and HTML5? * Browser Support for HTML5 * Writing HTML Files * Starting HTML with Notepad * The Notepad Window * What is DocType? * What is Meta? * Attributes for <meta> * Viewing HTML Code in a BrowserTAGS AND ATTRIBUTES * What is Tag? * Structure of Tag * Container and Empty Tags * HTML Tags * New Structural Tags in HTML5 * New Media Elements in HTML5 * New Canvas and Form Elements in HTML5 * Removed Elements * What are Attributes * Common Attributes * Outline Algorithm * Basic Page StructureHEAD AND BODY TAGS * What are Head Tags? * What are Body Tags? * Attributes for <body> * What are Headings? * Attributes for <h1> to <h6> * Grouping HeadingsCREATING AN HTML DOCUMENT * Creating an HTML Document * Saving an HTML Document * Viewing an HTML Page * Using Header * Using Navigation * Creating an Article * Creating a Section * Using Footer * Creating a Generic Container * Printing a Web Page and HTML File * Exiting the Web Page and HTML FilePARAGRAPHS * Creating a New Paragraph * Aligning a Paragraph * Attributes for <p> * Quoting Passages * Adding Line Breaks * Creating Multiple Line Breaks * Adding Horizontal Rule * Attributes for <hr> *…...

Similar Documents

Discovering Computers Chapter 8

...Discovering Computers 2011 Chapter 8 DISCOVERING COMPUTERS 2011 CHAPTER EIGHT: OPERATING SYSTEMS AND UTILITY PROGRAMS PROBLEM SOLVING TIP SHEET Use this Tip Sheet as suggested starting points for the Problem Solving exercises. Problem Solving @ Home 1. Computer Cannot Boot You recently purchased a computer from a friend. When you turn on the computer, a message displays that says, “Operating system not found.” What steps will you take before calling technical support? Insert the installation disc for an operating system and follow the installation / setup 2. Improper Shut Down During the startup process, your computer displays a message indicating that the computer did not shut down properly. You are certain that you shut down the computer properly when you last used it. The message also lists options to start Windows normally or start Windows in safe mode. How will you respond? Why? Start the computer in safe mode and perform a scan to make sure that no files were damaged as a result of the improper shut down 3. Incorrect Display Settings You recently turned on your computer and noticed that the screen resolution, desktop background, and color scheme had changed, even though you have not changed the display settings since purchasing the computer several months ago. What might have caused Windows to change the display settings? What are your next steps? A Windows update might have reverted your display settings back to their defaults 4. Unreadable......

Words: 1218 - Pages: 5

8 Common Types of Computer Viruses

...Howard Mayo NT1230 4/3/12 8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware. * Virus- as defined above, a virus is self-replicating code planted in a computer program. This malware’s sole purpose is to destroy or shut down systems and networks. (“Virus,” 2012). * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers. * Trojans- This malware is designed to look like a useful program while giving control of the computer to another computer. It can be used for several malicious things: * As part of a botnet to use automated spamming or distribute denial-of-service attacks. * Electronic money theft * Data theft * Downloading or uploading of files to the computer * Deletion or modification of files * Crashing the computer * Watching the viewer’s screen * Anonymous...

Words: 642 - Pages: 3

Syllabus

...Syllabus for 1309CMIS1026388 -------------------------------------------------------------------------------- Faculty Contact Information The primary means of contacting me is via Private Messaging in the classroom. Secondly would be UMUC email. I check both every day. abaird@faculty.umuc.edu I will be hosting periodic chat sessions on Skype. My Skype name is Professor.Baird. I am online quite often so if you do not have a Skype account, it is really easy to get one. If you have questions related to the course content or any of the graded deliverables, please contact me by the email listed above or via private message in the classroom. I hope to be very approachable. For questions and concerns related to advising, please write to ugadvising@umuc.edu or call 301-985-7000 (toll-free: 800-888-8682) For other questions and concerns, you can contact your academic director by writing to computing_dept@umuc.edu or by calling (240) 684-2882. Please be sure to mention the course name, course number, and your section number in the “Subject:” field of your email. Your email will be treated confidentially. Course Materials Click here to view the required and recommended materials to be purchased and to access ordering information. Course Description A study of techniques for finding solutions to problems through structured programming and step-wise refinement. The objective is to design programs using pseudocode and participate...

Words: 5381 - Pages: 22

Syllabus

... poisson sections, pp 204-212) 7 Continuous Probability Distributions.4 (Emphasis Normal) (Omit uniform and exponential distributions, pp223-227, 246-250) 8. Sampling Methods and Central Limit Theorem ………………….. 4 MIDTERM (September 30, 2013) ……… 5 9 Estimation and Confidence Intervals ….. 6 10 One Sample Test of Hypothesis ………. 7 (Omit Type II error, pp 359- 362) 13 Regression and Correlation ……….. 8 and 9 (Omit Transforming Data, pp 495-497) 14 Multiple Regression & Correlation …… 8 and 9 16 Introduction to Time Series (If time permits) ….. 9 FINAL (November 4, 2013) ………….. 10 ALL SELF – REVIEW problems should be reviewed! Suggested Problems: (The following selected problems will be Graded – Hand in Section I Problems the night of the midterm and Section II Problems the night...

Words: 1377 - Pages: 6

Syllabus

...Official TCC Course Syllabus Discipline Prefix: ITD Credit Hours: 4 Contact Hours: 4 Course Number: 260 Course Section: H01B Lecture Hours: 4 Studio Hours: Clinical Hours: Semester: Fall 2014 Lab Hours: Course Title: Database Modeling and Design Meeting Days/Time/Location: Wednesday, 8:00 pm – 9:40 pm, ATC – H207 Instructor Information Name: John Clary Office Location: ATC – H207 Office Hours: Immediately before and after class, other times and locations by appointment Contact Information: jclary@tcc.edu Blackboard site: http://learn.vccs.edu Course Information Course Description Introduces life cycle application development methodologies in a systematic approach to developing relational databases and designing applications. Presents content introducing functional and business process modeling, using modeling information to produce application designs, analyzing data requirements as entities, attributes, and relationships and map an entity relationship diagram to an initial database design. Identifies the available automated development tools and software to perform practical applications of these concepts. Prerequisites and/or Co-requisites ITD132 – Structured Query Language General Education Core Competencies Supported by this Course • Critical Thinking A competent critical thinker evaluates evidence carefully and applies reasoning to decide what to believe and how to act. Page 1 of 8 • Information Literacy A person who is competent in......

Words: 2570 - Pages: 11

Syllabus

...COURSE SYLLABUS: ACC 1002 Financial Accounting 2 CRN 71163 SECTION: 02 PLATFORM DELIVERY MODE: Blended TERM SESSION: Fall 2014 Second Half COURSE MEETING TIME This is a 7-week hybrid course meeting on the main campus on Tuesdays from 5:50 to 8:00 Pm as well as online. PROFESSOR: Prof. Edward Dinan E-MAIL: e.dinan@neu.edu Telephone: 207-650-4000 REQUIRED TEXBOOK Financial Accounting, 7/e Kimmel, Weygandt, Kieso, Wiley ISBN: 978-1118162286 All students are required to obtain the exact book edition in order to complete the course appropriately. This book is available through the campus bookstore, and should be purchased from this location to assure timely delivery of the correct textbook. Extensions on assignments will not be granted because of backordered or late arriving textbooks that were purchased from outside sources other than the campus bookstore. If considering the E-Textbook option, it is recommended that you read the information on the following websites: http://northeastern.bncollege.com/eBooks/EBooksFAQNEW.html http://www.coursesmart.com/ Course Prerequisites: ACC 1001 Course Description: Continues ACC 1001.The course continues with financial reporting, valuation and income measurement. Topics include inventories, property and equipment, bonds, present value and stockholders’ equity. Course Outcomes: Upon completion of the course, the student will have the opportunity to learn an in depth knowledge of:   Accounting: The language of business. Internal......

Words: 2249 - Pages: 9

Syllabus

...TROY UNIVERSITY eTROY IS2241 Section XTIC Computer Concepts and Applications COURSE SYLLABUS Term 1, 2014 August 11 – October 12 INSTRUCTOR INFORMATION: onn Dr. Joe Teng Troy University Chair, Information Systems and Quantitative Methods Office Location/Hours: Mailing Address: via email; within 24 238B Bibb Graves Hall Troy University Troy, Alabama 36082 Office: 334-670-3195 office jteng@troy.edu Dr. Joe Teng Troy University Chair, Information Systems and Quantitative Methods 334-670-3195 jteng@troy.edu Telephone: E-Mail: Troy Department Chair: The syllabus for this class includes the TROY Department Chair contact information for Dr. Teng. This is provided in the event you cannot resolve a situation with me, your instructor. PLEASE do not contact (e-mail or phone) Dr. Teng with a question, problem, or concern unless you have first contacted me and you have not received a response from me within 24-48 hours, or if you do not agree with my response. Thank you for your help in this matter. Students: Please place IS 2241 XTIC in the subject line of any emails sent to me. NOTE: For a course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via email or Blackboard announcement, when changes are made in the requirements and/or grading of the course. INSTRUCTOR EDUCATION: Ph.D., Management Information Systems. The University of Memphis, Memphis,......

Words: 5096 - Pages: 21

Classroom Observation/ 8 Th Grade

...‫بسم هللا الرحمن الرحيم‬ Hebron University Faculty of Graduate Studies English Department Classroom Observation/ 8th Grade Zeef Coeducational Secondary School BY Hamada Dawood 2013/2014 Teacher: A. Classroom Settings - The number of students is 31, thirteen females and eighteen males. - All of them are eighth graders (13 years old). - The school (or the class) is located in a quiet area far away from noises. The classroom is clean and tidy. Lesson Objectives (Unit 5 Period 3= People and games) The following objectives are copied from the teacher’s lesson plan. The timing of which is subject to the activities. However, the teacher gave a concise introduction at the beginning of the lesson which aims at discussing these objectives: - to understand and use possessive pronouns; - to understand and use too and either to dis/agree with an opinion; The teacher thoroughly covered the objectives. Timing The time of the whole lesson is 40 minutes. Three activities are done and given 30 minutes. The procedures are timed by the teacher as the following: - The introduction of the lesson is given 5 minutes. - Activity one & two seized 15 minutes, and the last activity, activity 3, seized 15 minutes. - Five minutes were specialized for feedback and questions. Materials In addition to the student’s book and the chalkboard, the teacher used posters, flashcards and wordcards. To give extra activities like listening, the teacher used his laptop. Organization & Procedures -......

Words: 477 - Pages: 2

Should a Computer Grade Your Essays?

...Study 11: Should a Computer Grade Your Essays? The case study discusses the April 2013 launch of Harvard/MIT’s joint venture MOOC (massively open online course) essay scoring program, utilizing AI (artificial intelligence) technology to grade educational essays and short answers, with immediate feedback and ability to revise, resubmit, and improve grades. In 2012, a group of colleagues, Les Perleman, Mark Shermis, and Ben Hamner, introduced over 16,000, K7-12 standardized school tests to the AES (automated essay scoring software) to compare results of hand-scored essays; the results appeared to produce a more accurate grade, however, no official statistical studies were performed to accurately maintain the claim. Essay Raters (e-Rater), developed by the Educational Testing Service (ETS), allowed Perelman to access, and analyze the technology. ETS uses vocabulary and content to score criteria, such as essay length, conjunctive adverb usage, and large word usage, in combination with paper and word length, words per sentence, and word complexity. The downside is the programs’ inability to differentiate factual from nonfactual information, intent, or meaning. Some educators banned to form the group, Professionals Against Machine Scoring of Student Essays in High-Stakes Assessment; they are concerned educators will reduce writing standards to conform to software constraints. Laudon & Laudon further discuss the probability of lost jobs due to computers taking the......

Words: 1500 - Pages: 6

Syllabus

...Perspective When you read a business publication website such as the Wall Street Journal, Fortune, Business Week, or even a general publication such as the Washington Post or the New York Times, you will see a large number of stories directly related to the use of information systems in business and government. Business people get excited because Information Systems (IS) have the power to create and restructure industries, empower individuals and firms, and dramatically reduce costs. Business people get scared because they know, when poorly implemented, IS can squander shareholder wealth, taxpayer money, and destroy firms and careers. Every manager in business, non-profits and government has to pay attention to the impact on their BMGT301(Syllabus(McCue(2014 Fall for 0601, 0701 v4.docx Page 1 of 12 business and career of information systems, information technology, and the innovations in that technology. Finance majors will fund investments in technology. They will lend to technology firms, will buy and sell technology stocks, and will try to understand how shifts in technology will affect investments. Investment bankers will finance startup technology companies and need to understand topics such as Cloud, Software Defined Networks, and Digital Presence. Marketing majors will use information systems to figure out what customers want and how to sell it to them. New roles such as the Chief Marketing Officer and Chief Digital Officer will have success defined by how......

Words: 4524 - Pages: 19

Syllabus

...Perspective When you read a business publication website such as the Wall Street Journal, Fortune, Business Week, or even a general publication such as the Washington Post or the New York Times, you will see a large number of stories directly related to the use of information systems in business and government. Business people get excited because Information Systems (IS) have the power to create and restructure industries, empower individuals and firms, and dramatically reduce costs. Business people get scared because they know, when poorly implemented, IS can squander shareholder wealth, taxpayer money, and destroy firms and careers. Every manager in business, non-profits and government has to pay attention to the impact on their BMGT301(Syllabus(McCue(2014 Fall for 0601, 0701 v4.docx Page 1 of 12 business and career of information systems, information technology, and the innovations in that technology. Finance majors will fund investments in technology. They will lend to technology firms, will buy and sell technology stocks, and will try to understand how shifts in technology will affect investments. Investment bankers will finance startup technology companies and need to understand topics such as Cloud, Software Defined Networks, and Digital Presence. Marketing majors will use information systems to figure out what customers want and how to sell it to them. New roles such as the Chief Marketing Officer and Chief Digital Officer will have success defined by how......

Words: 4524 - Pages: 19

Hcr 210 Week 8 Checkpoint ( a+Grade )

...HCR 210 Week 8 CheckPoint ( A+Grade ) Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser http://hwguiders.com/downloads/hcr-210-week-8-checkpoint-agrade/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) HCR 210 Week 8 CheckPoint ( A+Grade ) Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser http://hwguiders.com/downloads/hcr-210-week-8-checkpoint-agrade/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) HCR 210 Week 8 CheckPoint ( A+Grade ) Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser http://hwguiders.com/downloads/hcr-210-week-8-checkpoint-agrade/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) HCR 210 Week 8 CheckPoint ( A+Grade ) Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser http://hwguiders.com/downloads/hcr-210-week-8-checkpoint-agrade/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our......

Words: 1765 - Pages: 8

Syllabus

...CIS4361C IT Security Course Syllabus Version 1 FALL 2015 Course Description This course introduces students to information security. Security often involves social and organizational skills as well as technical understanding. In order to solve the practical security problems, we must balance real-world risks and rewards against the cost and bother of available security techniques. During this course we will use continuous process improvement to investigate these elements. Security is a very broad field. Some people may excel in the technical aspects, while others may do better in more social or process-oriented aspects. Others will successfully succeed between these poles. This course applies to all students, and help you find where you will excel. To learn a solid understanding of security technology, look must look closely at the underlying strengths and weakness of information technology itself. This requires particularly in cryptography (diagram or in mathematical notation). The book will use both, but is bias toward diagrams. Prerequisites COP2253 Java Programming or COP2830 Script Programming Student Learning Outcomes Upon completion of this course, students will be able to: * Describe the common treats of information and communication systems * Identify safeguards for securing data and systems * Gather and analyze digital evidence after a security breach * Develop an IT security program based upon a risk assessment Course Objectives ...

Words: 1802 - Pages: 8

Syllabus

...Syllabus Page 1 of 34 Draft: Please download latest upon course launch. Syllabus This is a single, concatenated file, suitable for printing or saving as a PDF for offline viewing. Please note that some animations or images may not work. Course Description This module (allpages.htm) is also available as a concatenated page, suitable for printing or saving as a PDF for offline viewing. MET CS669 Database Design and Implementation for Business This course uses the latest database tools and techniques for persistent data and object-modeling and management. Students gain extensive hands-on experience with exercises and a term project using Oracle, SQL Server, and other leading database management systems. Students learn to model persistent data using the standard Entity-Relationship model (ERM) and how to diagram those models using EntityRelationship Diagrams (ERDs), Extended Entity-Relationship Diagrams (EERDs), and UML diagrams. Students learn the standards-based Structured Query Language (SQL) and the extensions to the SQL standards implemented in Oracle and SQL Server. Students learn the basics of database programming, and write simple stored procedures and triggers. The Role of this Course in the MSCIS Online Curriculum This is a core course in the MSCIS online curriculum. It provides students with an understanding and experience with database technology, database design, SQL, and the roles of databases in enterprises. This course is a...

Words: 10777 - Pages: 44

Syllabus

...PSYCHOLOGY 1301 INTRODUCTION TO PSYCHOLOGY Fall 2015 Syllabus Section: 001 Time: T & TH 12:30-1:45 Room: LLCT2 Instructor: Office: Office Hours: Tuesday & Thursday from 8:30-9:20 & 10:50-12:00 & Wednesday from 1:00-2:00. E-Mail: Text: The Science of Psychology: An Appreciative View 3rd ed. By Laura A. King Course Description and Objectives: This course is designed to teach the student basic principles that effect the behavior of animals and humans. The wide varieties of topics found in psychology today are introduced and the underlying theories discussed. The course is meant to be a foundation course for those planning to major in psychology as well as an interesting elective for non-majors. This class also completes a general education requirement. Course Objectives: to help you expand your abilities and knowledge in the following broad areas as they pertain to psychology: the process of inquiry, critical reasoning, major concepts and methodologies, current developments within psychology, applications of psychological principles to the real world, comprehension and understanding of psychological theory and research design, and respect for the commonality and diversity of human experience. Learning Objectives: By the end of this course, students should have a basic understanding of: the dynamics of psychological research, how the science of psychology has come to be a field of its own, the importance and contribution of the......

Words: 2186 - Pages: 9

Hughes' Paragraph | VitaminC | The Leftovers (34)