Difference between revisions of "Slides"

From WLCS
(Case Study: Network Security)
(Current Case Study)
(17 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Syllabus Content Guide ==
 
== Syllabus Content Guide ==
 
* [[Media:IBCS_SyllabusContent.pdf]]
 
* [[Media:IBCS_SyllabusContent.pdf]]
 +
 +
== Additional Resources ==
 +
* [http://ib.compscihub.net/topics IB CS @ DGS] (Lot of PDFs, but not all are complete)
 +
* [http://en.wikibooks.org/wiki/IB/Group_4/Computer_Science IB Computer Science WikiBook] (Incomplete, but has some decent additional reading)
  
 
== Topic 1: System fundamentals ==
 
== Topic 1: System fundamentals ==
Line 33: Line 37:
  
 
== Topic 5: Abstract data structures ==
 
== Topic 5: Abstract data structures ==
* 5.1.1 - 5.1.3 - Recusion - [[Media:Recursion.ppt]]
+
* 5.1.1 - 5.1.3 - Recusion - [[Media:Recursion_Java.ppt]]
 
* 5.1.4 - 5.1.5 - Two-dimensional arrays
 
* 5.1.4 - 5.1.5 - Two-dimensional arrays
 +
** [[Media:JavaArrays_Basic.ppt]]
 
* 5.1.6 - 5.1.7 - Stacks - [[Media:Stacks.ppt]]
 
* 5.1.6 - 5.1.7 - Stacks - [[Media:Stacks.ppt]]
 
* 5.1.8 - 5.1.9 - Queues - [[Media:Queues.ppt]]
 
* 5.1.8 - 5.1.9 - Queues - [[Media:Queues.ppt]]
Line 56: Line 61:
 
* C.6 - The intelligent web - [[Media:WebScience_Part6_IntelligentWeb.pptx]]
 
* C.6 - The intelligent web - [[Media:WebScience_Part6_IntelligentWeb.pptx]]
  
== Case Study: Network Security ==
+
== Option D: Object-oriented Programming ==
* [[Media:IBCS_CaseStudy2014.pdf]]
+
* [[Media:IntroObjects.ppt]]
* Period 2 - Case Study Presentations
+
* [[Media:OOP.pptx]]
** [[Media:BringYourOwnDevice2.pptx]]
+
* [[Media:UML_Diagrams.pptx]]
** [[Media:DOSAttacks2.pptx]]
+
* [[Media:Recursion_Java.ppt]]
** [[Media:GuanjongHighSchool2.pptx]]
+
* Abstract Data Structures Intro --> Go to [[Media:Stacks.ppt]]
** [[Media:WesterHeightsPharmaceuticals2.pptx]]
+
** See Topic 5 and notes
* Period 4 - Case Study Presentations
+
 
** [[Media:BringYourOwnDevice4.pptx]]
+
== Current Case Study ==
** [[Media:DOSAttacks4.pptx]]
+
* [[Media:IBCS_CaseStudy2017.pdf]]
** [[Media:GuanjongHighSchool4.pptx]]
+
* Case Study Slides
** [[Media:WesterHeightsPharmaceuticals4.pptx]]
+
** [https://docs.google.com/a/apsva.us/presentation/d/1e-jf-6mFlLPzg_IPt5BZ-y8F-j81WHq3oNRL8pgJX5s/edit?usp=sharing Period 4 Case Study Terms]
* Additional Resources
+
** [https://docs.google.com/a/apsva.us/presentation/d/1FJSwaQnwZNiKsDpURywkH3MGL8DhZF3LAnkn9S9Ew5M/edit?usp=sharing Period 6 Case Study Terms]
** [http://technet.microsoft.com/en-us/library/cc959354.aspx Microsoft - Common Types of Network Attacks]
+
* If you see anything wrong with the above Case Study Terms, then please notify Mr. Bui
** [http://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks Symantec - Various Types of Network Attacks]
+
 
** [http://computernetworkingnotes.com/network-security-access-lists-standards-and-extended/types-of-attack.html Computer Networking Notes - Types of Attack]
+
== Archived Case Studies ==
** [http://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks Wikipedia - Type of Attacks]
+
* [[IBCS2 - 1516 - Case Study]]
 +
* [[IBCS2 - 1415 - Case Study]]
 +
* [[IBCS2 - 1314 - Case Study]]

Revision as of 10:16, 1 May 2017

Syllabus Content Guide

Additional Resources

Topic 1: System fundamentals

Topic 2: Computer organization

Topic 3: Networks

Topic 4: Computational thinking, problem-solving, & programming

Topic 5: Abstract data structures

Topic 6: Resource management

Topic 7: Control

Option C: Web science

Option D: Object-oriented Programming

Current Case Study

Archived Case Studies