An orbital manifest of twenty assignments transmitted from D2L. All dropboxes registered NOT_SUBMITTED. No due-dates surfaced. Mark items complete to deorbit them from the queue.
Early-computing terms; explain computer origins in 2 sentences; choose 3 major developments and explain why they matter.
Make a timeline artifact on integrated circuits. Moore's Law, vacuum tubes, transistors, CPUs, clean rooms.
Screenshot/document tour of the OS. OS metaphor, memory, security, CLI, shortcuts.
Programming languages, binary, why ADD/LOAD/JUMP/HALT instructions matter.
Complete sections 1.1–1.4 notes/questions, intro video and section videos.
Chain of file systems, networks, hardware, packets, servers behind an online submission.
Memory vs storage, SSD vs HDD, evolution from punch cards to thumb drives.
Internet vs WWW; how a video reaches your device; packet routing.
Web standards, browsers, webpages, search engines — research artifact.
All sections 2.1–2.4. Crash Course videos: file systems, networks, memory, internet, WWW.
Poster about graphical user interfaces; why GUIs helped casual users.
Create 2D graphic + connect to monitor/graphics concepts. CRT/LCD, vectors, CAD, RAM.
Compare. 3D modeling, wireframes, scanline, GPUs, meshes, anti-aliasing, Z-buffering.
Propose a CV idea. AI, deep learning, OCR/ICR, biometrics, grayscale, present-day limits.
All sections 3.1–3.4. Videos: GUI, screens/2D, 3D, computer vision.
Mind map: Church–Turing, Turing Test, Enigma, Bombe, contributions.
Plaintext/ciphertext, ciphers, AES/asymmetric, historical crypto, key protection.
Viruses, spyware, phishing, IoT, updates, WPA2, DDoS, 2FA, data protection.
Ecommerce, cloud, crypto, bots, auth, firewalls, breaches, VPNs, ransomware, injection, social engineering.
All sections 4.1–4.4. Videos: Turing, cryptography, cybersecurity, hackers.