Page 12.275.8track of their learning experiences, faculty members use the electronic portfolio as a tool tomeasure the level of student understanding. The electronic portfolio can also provide importantinformation on the effective implementation of key concepts in the overall IS curriculum. Figure1 shows the components that are used to monitor the IS program effectiveness. Z U L e a r n in g O u tc o m e s C IS M a jo r C ritic a l T h in k in g a n d R e a s o n in g (C T R ) P ro b le m Id e n tific a tio n a n d A n a ly s is G lo b a l A w a re n e s s (G A ) ( P IA ) In fo rm a tio n L ite ra c y a n
such game is Dyads. Participants write outa question on the material covered during the class, then pair up with another member of theclass. Each one of the pair asks the other his/her question. If the answer is correct, thequestioner writes his/her initials on the other person’s card. If it is incorrect, (s)he explains thecorrect answer. After finishing the first question, the members each find another partner andattempt to answer the new partner’s question. The winner is the member with the highest score.ii. Row competitions. Among the simplest of games is just to pass out index cards to the classmembers, and have them answer a set of review questions. Each student’s answers are checkedby a neighboring student. Then the cards are passed to
thisis to deploy a passive tap with minimal effect on network operations. The sensor is deployed onthis tap between the external firewall and the internal network such that it can monitor all thetraffic that enters (and departs) over that connection. This allows the sensor to examine all of thedata associated with the external link so that it can be effectively used to monitor incoming (andoutgoing) attacks. The snort machine is located at the main router on campus, which is connectedto the Internet by a 100Mb/s full-duplex Ethernet link. Data was collected on the network tapover a period of one week by running Snort in a stealthy packet logging mode.The goal of the analysis is to create descriptive information from the raw TCPDUMP files, thento
WLAN and Bluetooth etc. Other futuredirections include exploring the physical characteristics for WLAN and Bluetooth and theirrespective performance in an interference-limited environment.References[1] Ennis, Greg, “Impact of Bluetooth on 802.11 Direct Sequence,” IEEE 802.11. Working Group Contribution, IEEE 802.11-98/319, September 1998.[2] Haartsen J.C. and Zurbes S., “Bluetooth voice and data performance in 802.11 DS WLAN environment,” SIG Publication, 1999.[3] Punnoose R. J., Tseng R. S., Stancil D. D. Experimental Results for Interference between Bluetooth and IEEE 802.11b DSSS Systems. In Proceedings of IEEE Vehicular Society Conference, October 2001.[4] Golmie, N. and Mouveaux F., Interference in the 2.4 GHz
overall average of their ranking. Columns threethrough five are responses to the same statements given for Table 3 above. The abbreviationsused were defined previously in Table 2. It is interesting to note that this same table may be usedas the ranking by how widely familiar each conference is, as the sort by Overall Average isexactly the same as a sort by Not Familiar. As with the publications, respondents were given the opportunity to enter otherconference(s) they wished to include, along with their ranking. There were nine other Page 12.1216.10conferences mentioned; only the Consortium for Computing Sciences in College (CCSC) wasmentioned
. Figure 1. Percentage of Network Outage after Katrina’s Landfall1Response to the Affected AreaFrom across the U. S. volunteers traveled to affected areas such as Waveland and Bay St. Louis,Mississippi and recognized the numerous critical needs such as communication services. Asvolunteers arrived in the Waveland and Bay St. Louis area, they began setting up camps in anyopen area such as ballparks, campgrounds or parking lots. Volunteers assisted with debris cleanup, repairs, social services and soup kitchens. These volunteers needed to contact their familiesand host organizations. Residents needed to contact FEMA for assistance with their losses.FEMA requested that residents contact the agency through their website by completing an online
web testing and development, as was shown in Figure 1, or anexternal client can be used to probe both the Windows and Linux web servers, as was also shownin the figure.In addition to functionality, the speed of the portable hard drive was also tested. USB 2.0 isn't asfast as an internal hard drive connection such as ATA, and this interface is the most obviousbottleneck in an externally booted system. USB 2.0 is rated at 60 MB/s, while the Serial ATAdrives common in new desktop computers can reach at least 150 MB/s, depending on whichversion of SATA is being used. While it seems that this speed difference should severely affectsystem performance, the only time that testers noted a difference was during boot time, probablydue to caching. To
provides students with functionality beyondthat which is available through the JDBC API. Persistence frameworks can make datapersistence less error prone than JDBC alone, but it is time consuming and can add additionalcomplexity and frustration. However, in many situations a persistence framework may be worththe additional effort.Bibliography1. Riccardi, G. Principles of Database Systems with Internet and Java Applications, Addison Wesley, 2001.2. Fussel, M. Foundations of O-R Mapping: Conlcusion, 2000, available Jan. 16, 2007 at: http://www.chimu.com/publications/objectRelational/part0008.html3. Armstrong, E., J. Ball, S. Bodoff, Et al., Dec. 5, 2005, available Jan. 16, 2007 at: http://java.sun.com/j2ee/1.4/docs/tutorial/doc
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non
. Reynolds, C. “ An Undergraduate Information Assurance Curriculum.” Proceedings of the 2003 IEEEWorkshop on Information Assurance, 2003.5. McTighe, J., G. Wiggins. Understanding by Design. Association for Supervision and Curriculum Development,Alexandria, Virginia, 1998.6. Anwar, S. and P. Ford. “Use of a Case Study Approach to Teach Engineering Technology Students.”International Journal of Electrical Engineering Education, 38 (1), January 2001, pp 1-10. Page 12.226.10
Specialized in 2010,” IT Pro Published by the IEEE Computer Society,November/December 2004.[5] Zhang, L., Shao, S., Zeng, X., Cai, X., “Development of Remote Learn System on Mobile Internet,”Proceedings of the 4th World Congress on Intelligent Control and Automation, June 10-14, 2002. Shanghai, China.[6] Ramirez, J., Segura, J.C., Gorriz, J.M., Benitez, C., Rubio, A., “GAIALAB: A Weblab Project for DigitalCommunications Distributed Learning,” ICASSP, 2006.[7] Sypin, E., Syvopliasov, A. A., “Statement of the Problem on Laboratory Work through Internet,” 4th SiberianRussian Workshop and Tutorials EDM’2003, Section III, 1-4 July, Erlagol.[8] Zhao, X., Zhong, Y., Matsumoto, M., “A Real-Time Interactive Shared System for Distance Learning,” Multi-Media