Unformatted text preview:

ITE 100 Oral Presentation Topics Spring 2011 (10 Minutes) 200 Points The purpose of this assignment is to enrich your learning experience by acquiring moreinformation about information technology at a level of detail not covered in the coursetextbook and to give you an opportunity to practice your oral communications skills. Youmay use the Internet as a source of your information. You may NOT use articles alreadywritten in the textbook. Note: Two students may NOT do the same topic. Select atopic and inform your instructor on or before April 6 Dates for oral presentationsare in course schedule. Order of presentations: Alphabetically by last name. YOUMAY USE POWERPOINT & THE INTERNET IN CLASS. POSSIBLE TOPICS:1. Wireless LANs: Home RF, Ethernet, Powerline, Phone Line 2. Wireless Access Protocols IEEE 802.11g , 802.11n, WiMax 802.16 (31 miles) 3. Cell phones: How does the cellular phone system really work ? 4. Networking: Bridges, gateways, hubs, routers, switches (Pick one)5. USB 2.0 (480 Mbps) How does the Universal Serial Bus work?6. E-mail systems and programs: How do they work ? Spam Filtering software7. Firewalls for networks and personal computers. How do they work ?8. Computer security techniques. Computer viruses: Detection & removal.9. Optical Storage: CD-R, CD-RW, DVD+RW, DVD+RAM, Blu-Ray storage10. Data encryption used on the Internet. Secure Sockets Layer (SSL)11. Personal Communications Systems (e.g. Sprint PCS) Web Enabled PDAs12. Digital cameras. How do they work ? Digital Camcorders: How do they work?13. Cable modems or Digital Subscriber Line (DSL) technologies What works ?14. HTML (HyperText markup Language) ? WML (Wireless Markup Language)15. XML (Extensible Markup Language) eXtensible HTML (XHTML) ?16. Home computer networks Java Server Pages (JSPs) JavaScript, Active Server Pages (ASPs) Perl, PHP, CGI Scripts (Common Gateway Interfaces)17. What is AGP graphics ? Why is it fast ? IEEE 1394 Firewire Bus18. Nanotechnology What is it ? Will it make computers even faster ?19. Polymorphic computer viruses. How do they change their virus signatures ?20. Gigabit Ethernet technologies. Dense Wave Division Multiplexing (DWDM)21. Internet Telephony (Net2Phone, PhoneFree.com , DialPad.com, Vonage.com)22. RAM memory (SDRAM, Rambus RAM, DDR3 SDRAM) Magnetic RAM23. Novell Networks Ethernet ATM IBM Token Ring networks. 24. Cisco Routers and Switches Microsoft’s .NET strategy & software25. Windows 2007 (Vista) Operating System 26. Windows 7 Operating System27. Network Security and Hacking 28. RISC operating system architecture on iMac computers29. Intel microprocessors: Dual-core, Quad-core, Multi-core microprocessors 30. Microprocessor fabrication technologies: How are microprocessors made ?31. Linux Red Hat Operating System Is is better than Windows ? More stable ?32. Internet communications protocols: TCP/IP, SMTP, FTP, Telnet33. MAC OS X Operating System for Apple iMac computers 34. How do you build a Web site ? Tools: Dreamweaver, Fireworks, Flash35. Database technology: Coldfusion, SQL, MySQL, Oracle, MS-Access 1836. Programming languages: Java, J# (J-Sharp), Visual Basic .NET, C++, C# (C-Sharp)37. Networking: Blade Servers IBM System z10 mainframe computer 38. Mobile Hand-held computer operating systems: Symbian OS39. RFID tags (Radio Frequency Identifiers) EPC (Electronic Product Codes)40. Conductive Ink (a new technology)41. New IBM Power 5 microprocessor for big businesses42. Bagle Computer Virus How does it function ?43. Accoona.com A relatively new search engine on the Web44. Google Desktop Search software for PCs: How fast ? How does it work ?45. XM satellite radio. Sirius satellite radio. How do they work ?46. Microsoft Office 2007 or Office 2010 Features of Word, Excel, Access, PowerPoint47. Features of Microsoft Windows Vista operating system48. Broadband over PowerLine (BPL) for Internet transmissions49. Hand-held computers (e.g. BlackBerry from Research In Motion) How do they work ? Internet Explorer Version 9.0 from Microsoft 50. Firefox 3.5 browser from http://www.mozilla.org51. Computer Crime and Computer Forensics http://www.AccessData.com52. Hacking and cracking into Web sites. Software tools used by hackers.53. Steganography (the science of writing hidden messages as applied to computers)54. Kindle Electronic (ebook) book from www.amazon.com55. Data encryption, decryption, and ciphertext56. Computer Forensics and techniques for discovery of digital evidence57. Telecommunications binary codes, bit patterns and characters58. Will flash memory Solid State Drives (SSDs) replace computer hard drives ?59. Phase Change Memory (PCM) to replace flash memory ?60. Will Magnetic RAM (MRAM) memory replace computer hard drives ?61. DVD (Digital Video Disks): Blu-Ray DVDs .vs. HD-DVDs62. Google.com (What is this company doing in high tech ?)63. AJAX programming language (http://java.sun.com) Ruby on Rails language64. Cascading Style Sheets (CSS) used in HTML/Web pages ReXX language65. Web widgets ? What are they ? How are they used on Web pages ?66. Podcasting: How do you prepare a Podcast for iPod users ?67. The Apple iPhone and its features Blackberry PDA from www.rim.com68. Windows 7 Operating System69. Cloud computing (Internet)70. Virtualization of operating systems71. USB 3.0 SuperSpeed flash drives 72. Apple’s iPad Tablet PC73. Office 2010: features of Word, Excel, Access, PowerPoint74. Verizon FiOS (for Internet, Phone, TV)75. High Definition (HD) TV and 3-D TV by Sony LED-backed LCD 3-D TVs76. Microsoft’s Bing search engine77. Dreamweaver software to develop Web sites78. Python programming language79. Touch and Surface computing1980. Atomic Quantum Computers What is a Quantum Computer ?81. Optical computers (Using laser beams for digital computations)82. Using Computers to control home systems (intelligent home networks)83. Google’s Chrome browser81. Google Docs: http://docs.google.com84. Virtual Private Networks (VPNs)85. Social Networking Web sites: MySpace, FaceBook, Twitter; choose one: Explainin technical detail how it works.86.Automobile license plate recognition technology87. Facial Recognition technology88.Any other high tech topic. Ask/tell your instructor.Good Web sites for technical


View Full Document

NOVA ITE 100 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?