Skip to content
CISS 100 – Computing & Information Sciences
Prof James G. Looby – Site/Servers 100% Wind Powered
Menu
Home
Lecture Modules
PowerPoint Slides/Notes
LM1 – Introduction & Syllabus
Prof Looby CISS 100 Syllabus
Contacting your Professors (Email Requirements)
Emergent & Disruptive Change
Definitions, Publications & Resources
LM2 – System Architecture & Processing
Computer Numbering Systems
Symbolic Representation & Coding
Fetch Execute Cycle
Mobile Computing Architecture
Emergent Hardware
LM3 – Storage
Digital Forensics Intro
RAID
LM4 – I/O
Input
Output
Mobile I/O
Augmented Reality
Virtual Reality
3D Printing
LM5 – System Software & OS
Digital Forensics Intro
PC USB Drive
LM6 – Application Software
LM7 – Networking
Physical Layer Media
Network Topologies
Ethernet & CSMA/CD
TCP/IP and UDP
OSI Reference Model
Wide Area Networking
LM8 – Internet (and some WWW)
Web Design
Search
Social Networking/Media
Censorship
Deep or Dark Web
Internet of Things (IoT)
Spam
Net Neutrality
AI & the Web
Social Media
LM9 – Security & Privacy
Security & Wifi Tips
Hacking
Malware & Cybercrime
Privacy: Profiling, Big Data & Predictive Analytics
Security Tech
Security & Privacy Resources
Phishing
LM10 – Systems Analysis & Design
Emergent & Disruptive Change
Cloud Computing
Conflict and Change Management
Decision Support Systems (DSS)
JIT & TOC
LM11 – Programming
Prolog – Logic Programming
Prolog Theory
Prolog Mac Installation
Game Design
Extreme/Agile Java Programming w/Eclipse
Recursion
LM12 – Database (DBMS)
Relations
Normal Forms
Structured Query Language (SQL)
Advanced DBMS
DBMS Performance Tuning
Indexing Structures & Performance
Object Relational Model
OLAP
Query Optimization
Recursive Relations
SQL User Authorization & Security
Views and Indices
3-tier Web Architecture (w/DBMS core)
LM13 – Computer Ethics
Advanced Topics
Artificial Intelligence
Big Data & Analytics
Blockchain & Cryptocurrency
Cloud Computing
E-Commerce
Marketing, IT & the Web
BlockChain
SMB Web Design
Virtual Customer Experience (VCE)
E-Commerce Examples
Robotics
Nano Robotics
Web Design
Search Engine Optimization (SEO)
History of SEO
SEO Tips
Landing Page Optimization
Web Development Life Cycle (WDLC)
Mobile Web Design
Abstract User Centered Web Design
Democratization of Content
Open Source
Health & Green Computing
Renewable Energy
Linux Labs
LL1 – Ubuntu Linux Introduction
LL2a – HVCC AcadNX Ubuntu Server Access
LL2b – CLI/Terminal/Files Intro
LL3 – Files, Directories, Wildcards & Help
LL4 – Viewing, Searching and Redirection
LL5 – File & Directory Access Control
LL6 – Process Management
LL7 – Networking
Linux Mail
LL8 – More SysAdmin Commands & Variables
LL9 Virtualization
1. Virtual Machine Installation
VMWare Brightspace Workstation and Fusion
Virtual Box (VB) Virtual Machine (VM)
Optional – VB Guest Additions & Shared Folders
VMWare Player (Workstation & Fusion)
Win7 Microsoft Virtual PC Option
Windows 8 Hyper-V Option
Mac UTM Debian Linux VM – Under Construction
ChromeBook VMs – Under Construction
2. Ubuntu Download
3. Cryptographic Hashes
4. VM Ubuntu Guest OS Installation
LL10 – Managing Users
LL11 – Shell Scripting & Cron
Final Projects Due Wed May 8 @ 5 p.m.
Advanced Scripting
LAMP & WordPress Installation
WordPress Installation
Kali Linux Security & Penetration Testing
Backtrack Linux – Security & Penetration Testing
Extreme/Agile Java Programming w/Eclipse
Other Advanced Options
Extra Credit
Linux USB Utility Drive
PC USB Drive
Linux Media Server
Linux Backup Final Project
Linux Resources
Discussion Boards
DB1 – Classmate Introductions
DB 6 – Personal Systems/Information Management
DB 9 – Ubuntu VM, Desktop & Software Center
DB – Emergent Technology, Business & Society
DB – Ethics & Professional Conduct
DB – Final Project
CISS 260 Internship
CISS 260 Syllabus
Registration and Requirements
Journal Entries
Finding your own Internship
Interview & Employment Advice
CISS 260 Internship Site Evaluation Criteria
Internship Term Paper
Internship Supervisor Evaluation Form
NYS Agency Paid Apprenticeship Program
SUNY Covid Recommendations
CISS 260 Internship Student Waiver
Yelp
Facebook
Twitter
Instagram
Email
Tag:
Credit
Lenders may eye smartphone use before giving you a loan | Computerworld