From cd2e881e5b7ed2845604836722364babc125c731 Mon Sep 17 00:00:00 2001 From: Charlie Date: Thu, 9 Apr 2026 08:48:52 -0700 Subject: [PATCH] csis1: add implementation plan and initial content structure --- IMPLEMENTATION-PLAN.md | 200 ++++++++++ content/announcements/week-1-announcements.md | 68 ++++ content/announcements/week-2-announcements.md | 66 ++++ content/announcements/week-3-announcements.md | 64 ++++ content/announcements/week-4-announcements.md | 62 ++++ content/announcements/week-5-announcements.md | 70 ++++ content/announcements/week-6-announcements.md | 75 ++++ content/discussions/all-discussions.md | 112 ++++++ content/early-alerts.md | 96 +++++ content/quizzes/final-exam-bank.md | 341 ++++++++++++++++++ content/quizzes/week-1-graded.md | 111 ++++++ content/quizzes/week-1-practice.md | 111 ++++++ content/quizzes/week-2-graded.md | 111 ++++++ content/quizzes/week-2-practice.md | 111 ++++++ content/quizzes/week-3-graded.md | 111 ++++++ content/quizzes/week-3-practice.md | 111 ++++++ content/quizzes/week-4-graded.md | 111 ++++++ content/quizzes/week-4-practice.md | 111 ++++++ content/quizzes/week-5-graded.md | 111 ++++++ content/quizzes/week-5-practice.md | 111 ++++++ content/quizzes/week-6-graded.md | 111 ++++++ content/quizzes/week-6-practice.md | 111 ++++++ content/rubrics/all-rubrics.md | 278 ++++++++++++++ 23 files changed, 2764 insertions(+) create mode 100644 IMPLEMENTATION-PLAN.md create mode 100644 content/announcements/week-1-announcements.md create mode 100644 content/announcements/week-2-announcements.md create mode 100644 content/announcements/week-3-announcements.md create mode 100644 content/announcements/week-4-announcements.md create mode 100644 content/announcements/week-5-announcements.md create mode 100644 content/announcements/week-6-announcements.md create mode 100644 content/discussions/all-discussions.md create mode 100644 content/early-alerts.md create mode 100644 content/quizzes/final-exam-bank.md create mode 100644 content/quizzes/week-1-graded.md create mode 100644 content/quizzes/week-1-practice.md create mode 100644 content/quizzes/week-2-graded.md create mode 100644 content/quizzes/week-2-practice.md create mode 100644 content/quizzes/week-3-graded.md create mode 100644 content/quizzes/week-3-practice.md create mode 100644 content/quizzes/week-4-graded.md create mode 100644 content/quizzes/week-4-practice.md create mode 100644 content/quizzes/week-5-graded.md create mode 100644 content/quizzes/week-5-practice.md create mode 100644 content/quizzes/week-6-graded.md create mode 100644 content/quizzes/week-6-practice.md create mode 100644 content/rubrics/all-rubrics.md diff --git a/IMPLEMENTATION-PLAN.md b/IMPLEMENTATION-PLAN.md new file mode 100644 index 0000000..a774901 --- /dev/null +++ b/IMPLEMENTATION-PLAN.md @@ -0,0 +1,200 @@ +# CSIS 1 Summer 2026 — Research-Backed Implementation Plan + +Source: `projects/gav-outreach/research/student-success-proposal.md` (Ranks 1–9) + +This plan applies the top 9 evidence-based practices to CSIS 1, a 6-week compressed summer course. The course is fully online, asynchronous, with Monday evening Zoom demos. + +--- + +## Practice → CSIS 1 Application Map + +### Rank 1: Structured Weekly Modules with Consistent Layout +**Evidence:** DFW dropped 48% → 24% with consistent module structure. + +**CSIS 1 Implementation:** +Every week follows the exact same sequence: +1. **Welcome Announcement** (Monday morning) — what's this week about, what to do first +2. **Learning Objectives** — 3–5 measurable outcomes per week +3. **Readings** — OpenStax chapters + supplementary links (already in syllabus) +4. **Monday Demo Recording** — posted Tuesday if students miss live session +5. **Practice Quiz** (low-stakes, 10 questions, unlimited attempts) +6. **Discussion** — one prompt per week, metacognitive where possible +7. **Real-World Task** — hands-on assignment due Sunday 11:59 PM +8. **Weekly Check-In Quiz** (graded, 10 questions, 2 attempts) +9. **Friday Wrap-Up Announcement** — what went well, common mistakes, preview of next week + +Module prerequisites: must complete Week N quiz before Week N+1 unlocks. + +--- + +### Rank 2: Frequent Low-Stakes Quizzing (Retrieval Practice) +**Evidence:** Meta-analysis d=0.42–0.51 effect size. Quiz submission rate predicts lower DFW. + +**CSIS 1 Implementation:** +- **Practice Quiz** (per week): 10 questions, unlimited attempts, not graded (or 5% total). Purpose: retrieval practice before graded quiz. +- **Weekly Check-In Quiz** (per week): 10 questions, 2 attempts, graded. Mix of factual recall and applied scenarios. +- **Final Exam**: 30 questions drawn from a bank of 60+ (all weekly questions reshuffled + new synthesis questions). +- Questions drawn from OpenStax chapter content, GCFGlobal modules, and the imported Summer 2025 course quiz bank. +- Target: students encounter 20+ quiz questions per week across practice + graded. + +**Quiz Design Principles:** +- Mix question types: factual recall (30%), applied scenarios (40%), "which of these is the best practice" (30%) +- Include "all of the above" and "none of the above" sparingly +- Write wrong answers that are plausible (common misconceptions), not absurd +- For security/scam questions: use real-world scenarios + +--- + +### Rank 3: Regular Announcements (2–3 per Week) +**Evidence:** Optimal frequency 2–3/week. Beyond 3/week shows diminishing returns. + +**CSIS 1 Implementation:** +3 announcements per week, consistent schedule: +- **Monday AM: "This Week in CSIS 1"** — overview, objectives, what to do first, Zoom demo reminder +- **Wednesday: Mid-Week Check-In** — tips, common questions from Canvas inbox, encouragement, "here's what I'm seeing so far" +- **Friday: Week Wrap-Up** — what to finish by Sunday, common mistakes on the quiz, preview of next week + +Plus situational announcements: assignment clarifications, demo recording posted, grade updates. + +**Tone:** Conversational, not corporate. Short paragraphs. Direct. Peter's voice. + +--- + +### Rank 4: Transparent Gradebook with Visible Rubrics +**Evidence:** Gradebook use correlated with lower DFW (F=7.7, p=0.005). + +**CSIS 1 Implementation:** +- Rubrics attached and visible on every Real-World Task assignment +- Simple 4-level rubrics: Excellent / Good / Needs Work / Missing +- Criteria categories: Completeness, Accuracy, Formatting/Presentation, Critical Thinking +- Gradebook updated within 48 hours of due date (see Rank 5) +- Grade breakdown visible in syllabus: Quizzes 30%, Discussions 15%, Real-World Tasks 30%, Final 20%, Participation/Practice 5% + +--- + +### Rank 5: Prompt Feedback Turnaround (≤48h Communication, ≤7 Days Grading) +**Evidence:** Slow grading is consistently cited as a withdrawal driver. + +**CSIS 1 Implementation:** +- Canvas messages answered within 24 hours (weekdays), 48 hours (weekends) +- Weekly quizzes auto-graded immediately +- Discussion posts graded within 3 days +- Real-World Tasks graded within 5 days (before next week's task is due) +- Stated in syllabus as a commitment, not just a goal + +--- + +### Rank 6: Embedded Metacognitive Prompts +**Evidence:** +6.1 and +4.2 points on successive exams. Explains 25.3% of variance in final exam scores. + +**CSIS 1 Implementation:** +Metacognition woven into discussions and assignments: +- **Week 1 Discussion:** "What does being 'digitally literate' mean to you? What do you already know vs. what feels unfamiliar?" (self-assessment) +- **Week 2 Discussion:** "What was hardest about the document/spreadsheet work this week? What strategy did you use to figure it out?" (process reflection) +- **Week 3 Discussion:** "Look at your quiz scores so far. What topics do you feel confident about? What do you need to review?" (self-monitoring) +- **Week 4 Discussion:** "How do you decide if a website is trustworthy? Walk us through your actual process." (metacognitive modeling) +- **Week 5 Discussion:** "After the security audit, what surprised you most about your own digital habits? What will you change?" (transfer) +- **Week 6 Discussion:** "You just used an AI tool. How did you decide what to trust and what to verify? What would you do differently next time?" (critical evaluation) + +Every Real-World Task includes a short reflection paragraph: "What was the hardest part? What would you do differently?" + +--- + +### Rank 7: Proactive Early Alert Outreach +**Evidence:** RCT: +0.33 GPA, 80% higher persistence. + +**CSIS 1 Implementation:** +- After Week 1: personal Canvas message to anyone who hasn't submitted the quiz or discussion +- After Week 2: message to anyone with <60% quiz average — offer help, Zoom office hours +- After Week 3 (midpoint): mid-course check-in to entire class; personal outreach to anyone missing 2+ assignments +- Template messages drafted in advance, personalized with name and specific missing items +- Tone: "I noticed you haven't turned in X yet — I want to make sure you're okay. Can I help?" + +--- + +### Rank 8: Authentic Engagement Over Performative Discussion Boards +**Evidence:** "Post once, reply twice" universally despised. Instructor must participate visibly. + +**CSIS 1 Implementation:** +- NO "post once, reply twice" requirement +- Instead: "Post your response (150–250 words). Then read at least 2 classmates' posts and leave a meaningful comment — ask a question, share a related experience, or respectfully disagree." +- Instructor (Peter) replies to 3–5 posts per discussion with substantive comments +- Prompts designed to invite genuine sharing, not regurgitation (see metacognitive prompts above) +- Some discussions are scenario-based: "Your grandmother calls and says Microsoft told her to buy gift cards. What do you say?" +- Grading: Complete/Incomplete based on effort and substance, not word count + +--- + +### Rank 9: Multimedia Integration with Chunked Content +**Evidence:** Chunked content with interactive elements: DFW 16% → 7% in developmental math. + +**CSIS 1 Implementation:** +- Monday demo recordings chunked into segments (≤15 min each) with chapter markers +- Reading assignments broken into specific sections (not "read chapters 1–2" but specific URLs to sections) +- GCFGlobal tutorials used as interactive supplements (they're already chunked and interactive) +- Code.org video series (Week 4) is 6 short videos — naturally chunked +- Each module page lists content in order with time estimates: "📖 Reading (~30 min) → 🎥 Video (~15 min) → ✅ Practice Quiz (~10 min)" + +--- + +## Deliverables to Build + +| Deliverable | Agent | Output Location | +|-------------|-------|-----------------| +| Weekly quiz questions (practice + graded, 6 weeks × 20 Qs) | Agent 1: Quiz Writer | `projects/csis1/content/quizzes/` | +| Weekly announcements (3 per week × 6 weeks = 18) | Agent 2: Announcement Writer | `projects/csis1/content/announcements/` | +| Discussion prompts with rubrics (6 weeks) | Agent 3: Discussion Writer | `projects/csis1/content/discussions/` | +| Early alert message templates | Charlie (inline) | `projects/csis1/content/early-alerts.md` | +| Assignment rubrics (6 Real-World Tasks) | Agent 3 (or Charlie) | `projects/csis1/content/rubrics/` | + +--- + +## Grade Breakdown + +| Category | Weight | Items | +|----------|--------|-------| +| Weekly Check-In Quizzes (graded) | 30% | 6 quizzes, drop lowest | +| Discussions | 15% | 6 discussions, complete/incomplete | +| Real-World Tasks | 30% | 6 assignments with rubrics | +| Final Exam | 20% | 30 questions from bank | +| Practice Quizzes + Participation | 5% | Completion credit | + +--- + +## Module Template (Every Week) + +``` +Module N: [Topic] (Date Range) + +📋 Learning Objectives + - Students will be able to... + - Students will be able to... + - Students will be able to... + +📖 Readings & Resources + - [OpenStax chapter link] + - [Supplementary resource] + - Estimated time: X minutes + +🎥 Monday Demo + - Recording link (posted Tuesday) + - Segments: [topic 1] (0:00–12:00), [topic 2] (12:00–25:00) + +✅ Practice Quiz (unlimited attempts) + - 10 questions, not graded + - Purpose: check your understanding before the real quiz + +💬 Discussion + - [Prompt] + - Due: Wednesday 11:59 PM (post) / Friday 11:59 PM (replies) + +🛠 Real-World Task + - [Assignment description] + - Rubric attached + - Due: Sunday 11:59 PM + +📝 Weekly Check-In Quiz (2 attempts) + - 10 questions, graded + - Covers this week's readings + demo + - Due: Sunday 11:59 PM +``` diff --git a/content/announcements/week-1-announcements.md b/content/announcements/week-1-announcements.md new file mode 100644 index 0000000..a903a9d --- /dev/null +++ b/content/announcements/week-1-announcements.md @@ -0,0 +1,68 @@ +# Week 1 Announcements + +## Monday: This Week in CSIS 1 — Hardware, Software & Operating Systems + +Hey everyone - + +Welcome to Week 1. We're jumping right in with the fundamentals — what computers actually are, how they work, and what all the pieces do. + +**This week you'll be able to:** +- Identify the main hardware components of a computer (CPU, RAM, storage, I/O devices) +- Explain the difference between system software and application software +- Navigate your computer's file system — create folders, move files, find things +- Convert between units of digital storage (bits, bytes, KB, MB, GB) +- Describe what an operating system does and name the major ones + +**What's due this week (all due Sunday 11:59 PM):** +- Practice Quiz (unlimited attempts, ungraded — do this first) +- Discussion: "What does being 'digitally literate' mean to you?" +- Real-World Task: Hardware & software identification +- Weekly Check-In Quiz (2 attempts, graded) + +**Where to start:** Open Module 1 in Canvas. Read the OpenStax chapters first (Ch. 1 and 2), then watch the GCFGlobal Computer Basics tutorials if you want extra help. + +**Monday Demo tonight on Zoom** — I'll be taking apart a computer (well, showing you what's inside one) and walking through the OS basics. These are optional but I really recommend them, especially in Week 1 when everything is new. Link is in the Module 1 page. + +If anything's confusing, message me on Canvas. I'm here. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +A couple things I want to flag: + +**Tip: Know where your files go.** When you download something, do you know where it ends up? On most computers it's a "Downloads" folder. Get in the habit of saving things to a specific folder you create — not just dumping everything on the desktop. This sounds basic but it'll save you headaches all semester. + +**Keyboard shortcut of the week:** Ctrl+Z (undo). Messed something up? Ctrl+Z. Changed your mind? Ctrl+Z. It works in almost every program. Start building that muscle memory now. + +**Common question I'm getting:** "Do I need Microsoft Office?" Nope. Google Docs/Sheets/Slides works fine for everything in this course. So does LibreOffice (free). The textbook covers both Microsoft and Google — use whatever you have. + +Don't forget the discussion post is due soon. It's a low-pressure intro — just share what you already know and what you're hoping to learn. + +-peter + +--- + +## Friday: Week Wrap-Up + +Hey everyone - + +Quick reminders as we wrap up Week 1: + +**Everything is due Sunday at 11:59 PM.** Quiz, discussion, and the hardware/software task. Don't wait until 11:55 — Canvas doesn't care about your internet connection dying. + +**Mistakes I'm seeing on the practice quiz:** +- Mixing up RAM and storage. RAM is temporary (wiped when you shut down). Storage is permanent (your hard drive or SSD). Think of RAM as your desk and storage as your filing cabinet. +- Confusing the operating system with applications. Windows is the OS. Word is an application that runs on it. + +**Make sure you did the practice quiz first** — it's unlimited attempts and ungraded. It's there to help you figure out what you know before the real quiz. + +**Next week:** We're getting hands-on with Word and Excel (or Google Docs and Sheets). You'll build a formatted document and a budget spreadsheet. If you haven't used a spreadsheet before, don't panic — we'll start from zero. + +Have a good weekend. See you Monday. + +-peter h diff --git a/content/announcements/week-2-announcements.md b/content/announcements/week-2-announcements.md new file mode 100644 index 0000000..c9f204e --- /dev/null +++ b/content/announcements/week-2-announcements.md @@ -0,0 +1,66 @@ +# Week 2 Announcements + +## Monday: This Week in CSIS 1 — Word Processing & Spreadsheets + +Hey everyone - + +Week 2. This is the hands-on week — you're going to build things. + +**This week you'll be able to:** +- Create, format, and save a document with proper paragraph styles, headers, and page layout +- Use Find & Replace, spell check, and basic editing tools +- Build a spreadsheet with formulas (SUM, AVERAGE, COUNT, IF) +- Explain the difference between relative and absolute cell references +- Create a chart from spreadsheet data + +**What's due this week (all due Sunday 11:59 PM):** +- Practice Quiz (unlimited attempts) +- Discussion: "What was hardest this week? What strategy did you use to figure it out?" +- Real-World Task #1: Create a formatted document (letter or resume) +- Real-World Task #2: Build a personal budget spreadsheet with formulas and a chart +- Weekly Check-In Quiz (2 attempts) + +Two assignments this week — start early. The spreadsheet one takes longer than you think. + +**Readings:** OpenStax Ch. 3 (Creating Documents), Ch. 4 (Document Preparation), and Ch. 9 (Spreadsheets). Links are in the Module 2 page. + +**Monday Demo tonight** — I'll build a document and a spreadsheet from scratch, live. This is probably the most useful demo of the whole course. Zoom link in Module 2. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +Two tips for this week: + +**The #1 document formatting mistake:** Using the spacebar or Enter key to position things on the page. If you're hitting Enter 15 times to get to a new page, use a Page Break instead (Ctrl+Enter). If you're using spaces to line up columns, use tab stops. The document will look right on your screen but break on someone else's — or when you change one thing and everything shifts. + +**Spreadsheet formulas:** Start every formula with `=`. If you type `SUM(A1:A5)` without the equals sign, it's just text. Also — when your formula isn't working, check for typos in cell references. `A1` is not the same as `A 1`. + +**Question I keep getting:** "Can I use Google Docs instead of Word?" Yes. Absolutely. Either one works. The concepts are the same — just the menus look a little different. + +Start the budget spreadsheet soon if you haven't. It takes a bit of setup and the formulas can be tricky the first time. + +-peter + +--- + +## Friday: Week Wrap-Up + +Hey everyone - + +Week 2 wrap-up: + +**Due Sunday 11:59 PM:** Both assignments (document + spreadsheet), the discussion, and the quiz. + +**Common mistakes I'm seeing:** +- On the document: not using paragraph styles (Heading 1, Heading 2, etc.). Manually making text big and bold isn't the same thing — styles give your document structure. +- On the spreadsheet: using a calculator to get the answer and then typing it into the cell. The whole point is letting the spreadsheet do the math. Use `=SUM(B2:B10)`, not `=247`. +- On the quiz: people are confusing "Save" with "Save As." Save overwrites the current file. Save As lets you create a new copy with a different name or format. + +**Next week:** Presentations, databases, and networking. You'll build a short presentation, learn what databases actually are (spoiler: they're everywhere), and find out how your computer talks to the internet. Also — heads up — July 4th is Friday, so enjoy the holiday. + +-peter h diff --git a/content/announcements/week-3-announcements.md b/content/announcements/week-3-announcements.md new file mode 100644 index 0000000..855d966 --- /dev/null +++ b/content/announcements/week-3-announcements.md @@ -0,0 +1,64 @@ +# Week 3 Announcements + +## Monday: This Week in CSIS 1 — Presentations, Databases & Networks + +Hey everyone - + +We're at the halfway point. This week covers three different topics, so it moves fast — but none of them go super deep. + +**This week you'll be able to:** +- Design a presentation that works as a visual aid (not a wall of text) +- Explain what a database is and how it differs from a spreadsheet +- Describe the basics of computer networking: LAN, WAN, IP addresses, DNS +- Identify common network hardware (router, modem, switch) + +**What's due this week (all due Sunday 11:59 PM):** +- Practice Quiz (unlimited attempts) +- Discussion: "Look at your quiz scores so far. What do you feel confident about? What needs more work?" +- Real-World Task: Create a short presentation on a topic of your choice +- Weekly Check-In Quiz (2 attempts) + +**Readings:** OpenStax Ch. 6 (Presentations), Ch. 13 (Databases — skim for concepts), and re-read Ch. 1 Sec. 1.2 (Networks). All linked in Module 3. + +**Monday Demo tonight** — I'll show good vs. bad presentations side by side (the bad ones are fun), and we'll do a live network demo. I'll run a traceroute so you can see your data hopping across the country. Zoom link in Module 3. + +**Note:** Friday is July 4th. Happy Independence Day. I'll still post the Friday wrap-up, but take some time off if you can. Just make sure everything's submitted by Sunday night. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +**Presentation tip:** The biggest mistake people make is putting too much text on a slide. Your slides aren't a script — they're a visual aid. If your audience is reading your slides, they're not listening to you. Aim for 5 items or fewer per slide. Use images. Leave white space. + +Also: go easy on the animations. A slide transition is fine. Having every bullet point fly in from a different direction is... not fine. + +**On databases:** Don't overthink this one. You don't need to build a database. You just need to understand what they are (organized collections of data in tables), where they're used (Amazon, Netflix, your bank, your phone's contacts), and how they're different from spreadsheets (databases handle relationships between tables; spreadsheets are flat). That's it. + +Enjoy the holiday weekend. Get your work done before the fireworks start. + +-peter + +--- + +## Friday: Week Wrap-Up + +Happy 4th of July 🇺🇸 + +Quick wrap-up: + +**Due Sunday 11:59 PM:** Presentation assignment, discussion, and quiz. Don't let the holiday sneak up on you. + +**Common mistakes so far:** +- Presentations with paragraphs of text on every slide. Less is more. Seriously. +- On the quiz: confusing a modem and a router. Your modem connects you to your ISP (the internet). Your router shares that connection with your devices. Most people have a combo box from their ISP that does both — but they're different jobs. +- Mixing up LAN and WAN. LAN = your home or office network. WAN = the big network connecting everything (the internet is the biggest WAN). + +**Next week:** The Internet, email, and the web. How does a website actually get to your screen? What happens when you type a URL? What's the deal with cookies? And we'll talk about email — specifically, how to spot the shady stuff in your inbox. This is where things start to get really practical. + +Have a great weekend. Eat something off a grill for me. + +-peter h diff --git a/content/announcements/week-4-announcements.md b/content/announcements/week-4-announcements.md new file mode 100644 index 0000000..3b0c90e --- /dev/null +++ b/content/announcements/week-4-announcements.md @@ -0,0 +1,62 @@ +# Week 4 Announcements + +## Monday: This Week in CSIS 1 — Internet, Email & The Web + +Hey everyone - + +Week 4. We're talking about the thing you use every day but probably haven't thought much about — the internet. How it works, how the web works, how email works, and what "the cloud" actually means. + +**This week you'll be able to:** +- Explain how a web request travels from your browser to a server and back +- Identify common internet protocols (HTTP, HTTPS, SMTP, DNS) +- Evaluate a website's credibility using specific criteria +- Describe cloud computing and name common cloud services +- Spot the signs of a phishing email + +**What's due this week (all due Sunday 11:59 PM):** +- Practice Quiz (unlimited attempts) +- Discussion: "How do you decide if a website is trustworthy? Walk us through your actual process." +- Real-World Task #1: Internet & web concepts quiz +- Real-World Task #2: Evaluate 3 websites for credibility +- Weekly Check-In Quiz (2 attempts) + +**Readings:** OpenStax Ch. 1 Sec. 1.3 (Internet & Cloud), Ch. 8 (CMS & Social Media). Also watch the Code.org "How the Internet Works" videos — they're short (about 5 min each) and really well done. Links in Module 4. + +**Monday Demo tonight** — I'll trace a web request from browser to server and back so you can see all the steps. Then we'll look at the actual source code of a web page. It's not as scary as it sounds. Zoom link in Module 4. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +**Tip: Check the URL before you trust a website.** The domain name tells you who owns the site. `bankofamerica.com` is legit. `bankofamerica.secure-login.xyz` is not — look at what comes right before the `.xyz`. That's the real domain. Scammers rely on you not noticing. + +Also: HTTPS (the lock icon) means your connection is encrypted. It does NOT mean the site is safe. A phishing site can have HTTPS too. The lock just means nobody can eavesdrop on the data between you and the site — it doesn't tell you whether the site itself is trustworthy. + +**On the website evaluation assignment:** Don't just say "it looks professional." That's not a reason to trust a site. Look at who wrote it, when it was last updated, whether it cites sources, and whether you can verify the claims elsewhere. Three of these, due Sunday. + +-peter + +--- + +## Friday: Week Wrap-Up + +Hey everyone - + +Week 4 wrap-up: + +**Due Sunday 11:59 PM:** Website evaluation, internet quiz, discussion, and the weekly quiz. + +**Mistakes I'm seeing:** +- On the quiz: people saying HTTP and HTTPS are the same thing. They're not. The S stands for Secure — it means your data is encrypted in transit. Always look for HTTPS, especially when entering passwords or payment info. +- On the website evaluation: "The site looks professional" isn't evidence of credibility. A scam site can look beautiful. Look for author credentials, date of publication, cited sources, and whether other reputable sites say the same thing. +- Confusing "the internet" and "the web." The internet is the network (the pipes). The web is one thing that runs on it (websites, accessed via browsers using HTTP). Email, streaming, and gaming also use the internet — they're not "the web." + +**Next week:** Security, scams, and protecting yourself. This is the week that might actually save you money someday. We're covering phishing, malware, social engineering, AI-powered threats, password managers, 2FA — all of it. I'll show you real scam examples and we'll tear apart a phishing email live in the demo. + +This is my favorite week to teach. See you Monday. + +-peter h diff --git a/content/announcements/week-5-announcements.md b/content/announcements/week-5-announcements.md new file mode 100644 index 0000000..022ff4c --- /dev/null +++ b/content/announcements/week-5-announcements.md @@ -0,0 +1,70 @@ +# Week 5 Announcements + +## Monday: This Week in CSIS 1 — Security, Scams & Protecting Yourself + +Hey everyone - + +This is the week I think about all year. If you only pay attention to one week of this course, make it this one. + +We're covering cybersecurity, phishing, scams, malware, AI-generated threats, and what you can actually do to protect yourself. This stuff is real and it's happening to people every day. + +**This week you'll be able to:** +- Identify common types of malware and how they spread +- Spot phishing emails, texts, and phone scams using specific red flags +- Explain how AI is being used to create more convincing scams (deepfakes, voice cloning, AI-written phishing) +- Set up multi-factor authentication and understand why it matters +- Evaluate your own digital security and create a plan to improve it + +**What's due this week (all due Sunday 11:59 PM):** +- Practice Quiz (unlimited attempts) +- Discussion: "After the security audit, what surprised you most about your own digital habits?" +- Real-World Task #1: Security audit — evaluate your own digital security and make an action plan +- Real-World Task #2: Scam identification — analyze 5 real-world scam examples +- Weekly Check-In Quiz (2 attempts) + +**Readings:** Intro to CS Ch. 14 (Cybersecurity), WSS Ch. 1 Sec. 1.4 (Ethics & Security), plus the GCFGlobal Internet Safety module. Also — go to haveibeenpwned.com and check your email address. Yes, really. You'll probably be surprised. + +**Monday Demo tonight** — Live phishing teardown, deepfake examples, and I'll walk through setting up a password manager and 2FA. If you do nothing else, do those two things. Zoom link in Module 5. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +Two things from this week that I want to make sure land: + +**1. Your password is probably terrible.** I'm not trying to be rude — almost everyone's is. If you're using the same password on multiple sites, or if your password is shorter than 12 characters, you're at risk. Get a password manager (Bitwarden is free and good). Let it generate random passwords for everything. You only have to remember one master password. Do this today. + +**2. If someone contacts you urgently asking for money or gift cards — stop.** It doesn't matter if it sounds like your boss, your grandkid, or your bank. Scammers create urgency on purpose so you don't think. Hang up. Call the person back on a number you already have. Never use the number they give you. + +AI makes this worse now. A 3-second clip of someone's voice is enough to clone it. So "it sounded just like them" isn't proof of anything anymore. Verify before you trust. + +Check haveibeenpwned.com if you haven't yet. It's part of the assignment but it's also just a good thing to know. + +-peter + +--- + +## Friday: Week Wrap-Up + +Hey everyone - + +Week 5 wrap-up: + +**Due Sunday 11:59 PM:** Security audit, scam identification, discussion, and quiz. + +**Mistakes I'm seeing:** +- On the quiz: people think antivirus software makes you safe. It helps, but it's one layer. Updates, strong passwords, 2FA, and not clicking sketchy links matter just as much — probably more. +- On the scam identification: some of you are saying "I would never fall for this." Respectful pushback — the people who get scammed also thought that. The whole point of social engineering is that it works on smart people who are busy, distracted, or emotional. Stay humble about this. +- Confusing encryption with security. Encryption protects data in transit or at rest. It doesn't mean a service is trustworthy. A criminal can encrypt their files too. + +**The security audit assignment:** If doing the audit made you realize you need to change some passwords or turn on 2FA — do it. For real. Don't just write about it and move on. This is the one assignment where the real-world payoff is immediate. + +**Next week (our last week):** AI, emerging tech, information literacy, and the final exam. We'll talk about ChatGPT, deepfakes, misinformation, and how to think critically when you can't trust your eyes or ears anymore. Plus you'll get to use an AI tool and then fact-check it — which is honestly kind of fun. + +Almost done. One more week. Let's finish strong. + +-peter h diff --git a/content/announcements/week-6-announcements.md b/content/announcements/week-6-announcements.md new file mode 100644 index 0000000..b2b8c3d --- /dev/null +++ b/content/announcements/week-6-announcements.md @@ -0,0 +1,75 @@ +# Week 6 Announcements + +## Monday: This Week in CSIS 1 — AI, Emerging Tech, Info Literacy & Final Exam + +Hey everyone - + +Last week. You made it. + +This week we're talking about AI, emerging technology, and information literacy — basically, how to navigate a world where computers can write essays, clone voices, and generate fake photos that look completely real. We'll also cover blockchain, IoT, and other buzzwords you've probably heard but maybe couldn't explain. + +**This week you'll be able to:** +- Explain what AI and machine learning are in plain language +- Use an AI tool (ChatGPT, Gemini, Claude, etc.) and critically evaluate its output +- Identify misinformation, disinformation, and AI-generated content +- Describe emerging technologies (IoT, blockchain, VR/AR) at a high level +- Reflect on your own digital literacy and what you've learned + +**What's due this week:** +- Practice Quiz (unlimited attempts) +- Discussion: "You just used an AI tool. How did you decide what to trust?" +- Real-World Task: Use an AI tool to research a topic, then fact-check its output +- Weekly Check-In Quiz (2 attempts) +- **Final Exam** — opens Wednesday, due Sunday 11:59 PM + +**All due Sunday 11:59 PM.** No extensions on the final. + +**Readings:** WSS Ch. 15 (selected sections) and the GCFGlobal Digital Media Literacy module. Links in Module 6. + +**Monday Demo tonight** — We're going hands-on with AI tools live. I'll ask them questions, we'll see what they get right and wrong, and I'll show you how to fact-check the output. This one's fun. Zoom link in Module 6. + +-peter h + +--- + +## Wednesday: Mid-Week Check-In + +Hey everyone - + +**On the AI assignment:** The point isn't to prove that AI is bad or good. It's to use it and then think critically about the output. Ask it something you already know about and see what it gets wrong. Ask it for sources and check if they're real (sometimes they're completely made up). Ask it the same question twice and see if you get different answers. + +The skill here isn't using the AI — that part's easy. The skill is knowing when to trust it and when not to. + +**Reminder: The final exam opens today.** It's 30 questions, comprehensive, covering all 6 weeks. You can start it any time between now and Sunday 11:59 PM. Once you start, you'll have a time limit (check the exam page for details). Don't start it at 11:30 PM Sunday. + +**Quick study tip:** Go back through your practice quizzes. The questions on the final come from similar material. If there's a topic you struggled with earlier in the course, now's the time to review it. + +You're almost there. + +-peter + +--- + +## Friday: Week Wrap-Up + +Hey everyone - + +That's it. We're done. + +**Final exam is due Sunday at 11:59 PM.** If you haven't started it, do it this weekend. Don't wait until the last hour. + +Also due Sunday: the AI assignment, discussion, and weekly quiz. Get everything in. + +**A few things before we go:** + +Six weeks ago, most of you walked in knowing how to use a computer but not necessarily understanding how it works. Now you know what's inside the machine, how files and software work, how the internet moves data around the planet, how to build documents and spreadsheets, how to spot a scam, and how to think critically about AI-generated content. That's a lot. + +The security stuff from Week 5 — password managers, 2FA, spotting phishing — that's going to matter for the rest of your life. Keep using it. + +The critical thinking from this week — questioning sources, verifying claims, not trusting something just because it sounds confident — that matters even more. Especially now. + +If you need to reach me after the course ends, phowell@gavilan.edu still works. + +Thanks for a great six weeks. I mean it. + +-peter h diff --git a/content/discussions/all-discussions.md b/content/discussions/all-discussions.md new file mode 100644 index 0000000..cf2aea4 --- /dev/null +++ b/content/discussions/all-discussions.md @@ -0,0 +1,112 @@ +# CSIS 1 — Discussion Prompts (Summer 2026) + +All discussions follow the same structure and grading. See the **Discussion Rubric** at the end of this document. + +**Standard Instructions (included with every discussion):** + +> Post your response (150–250 words) by **Wednesday at 11:59 PM**. Then read at least 2 classmates' posts and leave a meaningful comment by **Friday at 11:59 PM** — ask a question, share a related experience, or respectfully disagree. "I agree!" by itself doesn't count. + +**Grading:** Complete/Incomplete based on effort and substance (see rubric below). + +**Instructor participation:** Peter will reply to 3–5 posts per discussion. + +--- + +## Week 1: What Do You Already Know? +**Theme:** Hardware/Software — Self-Assessment + Digital Literacy *(Metacognitive)* + +**Prompt:** + +Before we get into the material this week, let's figure out where you're starting from. Think about everything you do with technology on a normal day — texting, streaming, schoolwork, gaming, work, whatever. Now honestly ask yourself: how much do you actually understand about *how* it works? There's no wrong answer here. Some people can build a PC from parts; some people couldn't tell you the difference between RAM and a hard drive. Both are fine — the point is knowing where you stand so you can track your own progress. + +**In your post, answer these three things:** +1. What's one thing about computers or technology you already feel confident about? +2. What's one thing from this week's reading or lecture that was genuinely new to you? +3. When you don't understand something technical, what do you usually do — Google it, ask someone, skip it, mess around until it works? Be honest. + +--- + +## Week 2: How Did You Figure It Out? +**Theme:** Documents/Spreadsheets — Process Reflection *(Metacognitive)* + +**Prompt:** + +This week you built a professional document and a budget spreadsheet. Some of that probably felt straightforward, and some of it probably made you want to throw your laptop. That's normal — formatting and formulas have a learning curve. What I'm interested in isn't whether you nailed it on the first try, but how you worked through the parts that tripped you up. + +**In your post, answer these three things:** +1. What was the single hardest part of this week's assignment — the document, the spreadsheet, or something specific within one of them? +2. Walk me through what you actually did when you got stuck. Did you re-read instructions? Watch a YouTube video? Try random things? Ask someone? There's no judgment here — I want to know your real process. +3. Did your strategy work? Would you do something different next time? + +--- + +## Week 3: Checking In With Yourself +**Theme:** Presentations/Networks — Self-Monitoring *(Metacognitive)* + +**Prompt:** + +We're halfway through the course. Take a minute and look at your grades so far — your quiz scores, your assignment feedback, your discussion participation. Not to stress about them, but to actually *notice* patterns. Are there topics where you breezed through? Areas where you lost points and aren't sure why? This kind of self-check is something most students skip, but the ones who do it consistently tend to finish stronger. + +**In your post, answer these three things:** +1. What topic or skill from the first three weeks do you feel most solid on? Why do you think that is — was it familiar, did you study more, did it just click? +2. What's one area where your quiz scores or assignment feedback surprised you (either better or worse than expected)? +3. What's one specific thing you'll do differently in the second half of the course? Be concrete — "study harder" doesn't count. Something like "I'll actually read the chapter before the quiz instead of skimming after" counts. + +--- + +## Week 4: How Do You Know What's Real Online? +**Theme:** Internet/Web — Applied Critical Thinking + +**Prompt:** + +You evaluate websites and online information every single day, whether you realize it or not. Every time you Google a health question, read a news article someone shared, or look up a product review, you're making a judgment call: *Can I trust this?* Most of us have some gut instinct about it, but we rarely stop to think about what that instinct is actually based on. + +**In your post, walk us through your real process:** +1. Pick a specific example — a website, article, social media post, or search result you saw recently. What was it about? +2. How did you decide whether to trust it? Be specific. Did you check who wrote it? Look at the URL? See if other sources said the same thing? Just go with your gut? +3. After this week's material on web credibility, would you evaluate that same source differently now? What would you add to your process? + +--- + +## Week 5: "Grandma, Don't Buy Those Gift Cards" +**Theme:** Security/Scams — Scenario-Based + +**Prompt:** + +Here's the situation: Your grandmother calls you, upset. She says someone from "Microsoft Support" called her and told her that her computer has been hacked. They said she needs to buy $500 in gift cards from Target and read them the numbers over the phone to "secure her account." She hasn't done it yet, but she's about to drive to the store. She trusts these people because they "knew her name and her computer type." + +**In your post:** +1. What do you actually say to her? Don't just say "it's a scam" — walk through how you'd explain it in a way that a non-technical person would understand and believe. Remember, she thinks these people are legit. +2. What specific red flags in this scenario would you point out? +3. What would you help her do *after* the call to protect herself going forward? Think about concrete steps, not just "be more careful." + +--- + +## Week 6: Did the AI Get It Right? +**Theme:** AI/Emerging Tech — Critical Evaluation *(Metacognitive)* + +**Prompt:** + +You just used an AI tool to research a topic and fact-checked what it told you. That experience is the prompt for this discussion. AI tools like ChatGPT, Gemini, and Copilot are confident — they'll give you a polished answer whether they're right or completely making things up. The skill isn't using AI; it's knowing when to trust it and when to push back. + +**In your post:** +1. What topic did you ask the AI about, and what did it get right vs. wrong? (Even one small error counts.) +2. How did you figure out what was accurate and what wasn't? What sources did you check it against? +3. Thinking about how you approached this: what would you do differently next time you use an AI tool? Did this assignment change how much you trust AI output? + +--- + +## Discussion Rubric (All Weeks) + +This single rubric applies to every weekly discussion. + +| Level | Criteria | +|---|---| +| **Complete** (full credit) | Substantive post of 150+ words that directly and thoughtfully addresses the prompt. Shows genuine thinking — not just restating the question or giving a surface-level answer. Plus 2 replies to classmates that engage with their ideas (ask a follow-up question, share a related experience, offer a different perspective, or respectfully push back). | +| **Incomplete** (half credit) | Post is under 150 words, only loosely related to the prompt, or lacks substance (e.g., vague generalizations without specific examples). OR replies are superficial — "Great post!", "I agree!", or one-sentence responses that don't move the conversation forward. | +| **Missing** (0) | No post submitted, or post is a single sentence / clearly off-topic. No meaningful participation. | + +**Notes for students:** +- You don't need to be a great writer. Effort, honesty, and specifics matter more than polish. +- Replies should feel like a real conversation. If you wouldn't say it to someone's face in a study group, rethink it. +- Late posts (after Friday) may receive Incomplete at the instructor's discretion. diff --git a/content/early-alerts.md b/content/early-alerts.md new file mode 100644 index 0000000..bfa8b6d --- /dev/null +++ b/content/early-alerts.md @@ -0,0 +1,96 @@ +# Early Alert Message Templates — CSIS 1 Summer 2026 + +## After Week 1: Missing Quiz or Discussion + +Subject: Checking in — CSIS 1 + +Hi [Name] - + +I noticed you haven't submitted [the Week 1 quiz / your Week 1 discussion post] yet. I just want to make sure everything is okay and you're able to access the course. + +Summer classes move fast — we cover a full week of material every 6 days, so falling behind even a little can snowball quickly. + +If you're having trouble with Canvas, the readings, or anything else, let me know. I'm here to help. You can also drop into my Zoom office hours — times are posted in the Start Here module. + +-peter h + +--- + +## After Week 2: Low Quiz Scores (<60%) + +Subject: Quick note about your quizzes — CSIS 1 + +Hi [Name] - + +I'm looking at quiz scores from the first two weeks and wanted to reach out. Your scores are a bit lower than I'd like to see, and I want to make sure you have what you need to do well in this class. + +A couple of things that might help: +- The **Practice Quizzes** have unlimited attempts — use them to test yourself before the graded quiz +- Re-read the specific OpenStax sections the questions come from (they're linked in each module) +- Come to the Monday demo — seeing the material demonstrated live makes a big difference +- Message me with specific questions — I'll get back to you within 24 hours + +You're not behind yet. A few adjustments now can make the rest of the course much smoother. + +-peter h + +--- + +## After Week 3 (Midpoint): Missing 2+ Assignments + +Subject: Midpoint check-in — CSIS 1 + +Hi [Name] - + +We're at the halfway point of the semester, and I see you're missing [specific items: Quiz 2, Discussion 3, etc.]. I want to be straight with you — in a 6-week class, missing two or more assignments puts you in a tough spot for passing. + +Here's where things stand: +- Your current grade: approximately [X]% +- To pass with a C, you'll need to [complete all remaining work / score at least X on remaining items] + +I'd rather help you catch up than see you withdraw. If something came up — life happens, especially in summer — let's talk about it. I have some flexibility on late work if you communicate with me. + +Can you message me back or come to office hours this week? Even a quick "I'm still here" helps. + +-peter h + +--- + +## Whole-Class Midpoint Announcement + +Subject: Week 3 — Halfway there 🎉 + +Hey everyone - + +We're at the midpoint. Three weeks done, three to go. + +Quick status check — if you're current on everything, you're in great shape. If you're behind on an assignment or two, NOW is the time to catch up. The second half of the course (security, AI, and the final) builds on everything we've covered so far. + +A few things: +- If you're struggling, message me. I can help. +- If life happened and you need a day or two extra on something, message me. I'm reasonable. +- If you're thinking about dropping — message me first. Let's see if there's a path forward. + +Office hours are [day/time]. The Monday demos are [time]. Both are there for you. + +-peter h + +--- + +## Week 5: At-Risk Students (Failing or Close to It) + +Subject: Important — your grade in CSIS 1 + +Hi [Name] - + +I want to give you an honest update on where you stand. With two weeks left, your current grade in CSIS 1 is approximately [X]%, which [is below passing / puts you at risk of not passing]. + +Here's what's missing: [list specific items] + +To pass with a C (70%), you would need to [specific requirements — e.g., "score 80%+ on the remaining quiz, discussion, task, and the final exam"]. + +I'm not saying this to discourage you — I'm saying it because I'd rather you know now than be surprised at the end. If you want to push through, I'll help you. If you need to consider your options (late withdrawal deadline is [date]), I understand that too. + +Either way, let me know what you're thinking. + +-peter h diff --git a/content/quizzes/final-exam-bank.md b/content/quizzes/final-exam-bank.md new file mode 100644 index 0000000..8627435 --- /dev/null +++ b/content/quizzes/final-exam-bank.md @@ -0,0 +1,341 @@ +# Final Exam Question Bank + +30 questions: 10 new cross-topic synthesis questions + 20 selected from weekly graded quizzes. + +--- + +## NEW SYNTHESIS QUESTIONS (Q1–Q10) + +## Q1: Hardware Meets Security +Jasmine's laptop is stolen from a coffee shop. She had full-disk encryption enabled, a strong login password, and her files backed up to cloud storage. Which statement BEST describes her situation? + +A. She's lost everything — the thief has full access to all her data +B. The thief has the hardware, but full-disk encryption prevents data access without the password; her files are safe in the cloud and she can restore them on a new device +C. Full-disk encryption only works on desktop computers, not laptops +D. Cloud backups are automatically deleted when a laptop is stolen + +**Answer:** B +**Explanation:** This combines hardware (Week 1), cloud storage (Week 4), and encryption (Week 5). Full-disk encryption renders the drive unreadable without the password, protecting her data even though the physical device is gone. Cloud backups ensure she can restore her work on a replacement device. + +## Q2: Spreadsheets and Security +Coach Williams shares his team's stats spreadsheet via a public Google Sheets link so parents can view game results. He doesn't realize the spreadsheet also contains a hidden tab with players' home addresses and phone numbers. What risks and concepts are involved? + +A. No risk — hidden tabs can't be seen by anyone +B. Anyone with the link can see ALL tabs including hidden ones; this is both a privacy violation and poor data management — sensitive data should be in a separate, access-controlled file +C. Google Sheets automatically encrypts hidden tabs +D. Only the visible tab is shared; hidden tabs are always private + +**Answer:** B +**Explanation:** This crosses spreadsheet skills (Week 2) and security/privacy (Week 5). Hidden tabs in shared spreadsheets can be unhidden by anyone with access. Sensitive personal data should never be in the same file as publicly shared information. Proper data management means separating public and private data. + +## Q3: Phishing Meets Web Literacy +Daniela receives an email appearing to be from her bank with the link "https://secure-mybank.account-verify.net/login." The email has perfect grammar, the bank's logo, and a professional layout. What combination of knowledge helps her identify this as phishing? + +A. She should trust it because HTTPS makes it secure and the grammar is perfect +B. URL analysis (the real domain is account-verify.net, not her bank), email skepticism (unexpected requests for login), and knowing that AI can generate flawless phishing emails — multiple literacy skills work together +C. Perfect grammar proves it's legitimate since phishing always has typos +D. Bank logos can only be used by the real bank, so it must be authentic + +**Answer:** B +**Explanation:** This synthesizes web literacy (Week 4 — URL structure, HTTPS misconceptions), security awareness (Week 5 — phishing identification), and AI awareness (Week 6 — AI-generated phishing no longer has telltale typos). Modern phishing requires layered critical thinking, not just looking for obvious red flags. + +## Q4: Database Design for a Real Problem +A small library wants to track its books, members, and checkouts. They currently use one giant spreadsheet with columns for book title, author, member name, member phone, checkout date, and return date — with the member's info repeated on every checkout row. What is the BEST improvement? + +A. Add more columns to the spreadsheet for additional member details +B. Switch to a database with separate tables for Books, Members, and Checkouts — linked by IDs — to eliminate redundant data and improve searchability +C. Create a separate spreadsheet for each member +D. Delete the old checkout records to keep the spreadsheet small + +**Answer:** B +**Explanation:** This connects spreadsheet limitations (Week 2) with database concepts (Week 3). Repeating member info on every row is data redundancy — it wastes space and creates inconsistencies. A relational database with linked tables (Books, Members, Checkouts) stores each piece of data once and connects records through IDs. + +## Q5: Network Security at Work +A company's employee connects a personal smart speaker (IoT device) to the office WiFi network. The device has a default password and hasn't been updated since purchase. What layers of risk does this introduce? + +A. No risk — personal devices can't affect a business network +B. The IoT device with a default password is an easy entry point for attackers; once on the network, they could potentially access company resources, intercept data, or launch further attacks +C. Smart speakers only connect to Bluetooth, not WiFi +D. Default passwords are more secure than custom ones because they're random + +**Answer:** B +**Explanation:** This combines networking (Week 3 — LAN, device connectivity), security (Week 5 — authentication, default passwords), and IoT awareness (Week 6). An unsecured IoT device on a corporate network is a common real-world vulnerability. It demonstrates why network segmentation and device security policies matter. + +## Q6: AI in the Productivity Suite +A marketing manager uses AI to generate a first draft of a quarterly report, formats it in a word processor with heading styles, pulls sales data from a spreadsheet using formulas, and creates a presentation with key findings. Which statement BEST captures what she should verify? + +A. Nothing — AI and software tools are always accurate +B. She should fact-check the AI-generated content for hallucinations, verify the spreadsheet formulas produce correct results, and ensure the presentation distills complex data accurately without misleading simplifications +C. She only needs to check the spelling and grammar +D. She should re-do everything manually because AI tools can't be trusted at all + +**Answer:** B +**Explanation:** This integrates AI literacy (Week 6 — hallucinations), spreadsheets (Week 2 — formula accuracy), word processing (Week 2 — formatting), and presentations (Week 3 — clear communication). Each tool layer introduces potential errors. The human's job is verification and quality control across the entire workflow. + +## Q7: Cloud Computing and File Management +Ravi saves all his college work exclusively in Google Drive. His laptop breaks during finals week. Which statement is MOST accurate about his situation? + +A. All his work is permanently lost because it was in the cloud +B. He can access all his files from any device with internet access by logging into his Google account — cloud storage is independent of any single device +C. He needs to buy the exact same laptop model to recover his files +D. Google Drive only works on the device where files were first created + +**Answer:** B +**Explanation:** This connects file management (Week 1), cloud computing (Week 4), and backup strategy (Week 1). Cloud storage's key advantage is device independence — files live on remote servers, not on your hardware. However, this also means internet access is required, and relying solely on one cloud provider has its own risks. + +## Q8: Evaluating AI-Generated News +A news article about a local election goes viral on social media. It features a video of a candidate making controversial statements. You want to determine if the article and video are trustworthy. Which approach is MOST thorough? + +A. If the article has many shares and comments, it's credible +B. Check if the article comes from a recognized news outlet, verify the video hasn't been deepfaked (check official candidate channels, look for visual artifacts), use fact-checking sites, and consider whether the source has a bias or agenda +C. Check only the article's publication date — if it's recent, it's accurate +D. Ask ChatGPT if the article is true + +**Answer:** B +**Explanation:** This synthesizes information literacy (Week 6 — evaluating sources, detecting misinformation), AI awareness (Week 6 — deepfakes), web credibility (Week 4), and security mindset (Week 5 — skepticism toward unexpected claims). Thorough verification requires checking multiple angles: source credibility, media authenticity, and independent corroboration. + +## Q9: Complete Security Scenario +Maya is starting college. She gets a new laptop, creates accounts for email, Canvas, and social media, and connects to campus WiFi. What set of actions would BEST protect her digital life from the start? + +A. Use one easy-to-remember password for everything so she doesn't get locked out +B. Set up a password manager with unique passwords for each account, enable 2FA everywhere, install OS and software updates promptly, use HTTPS-only browsing, enable full-disk encryption, and be cautious with campus WiFi for sensitive transactions +C. Avoid creating any online accounts to stay completely safe +D. Only use her phone, never her laptop, because phones can't get viruses + +**Answer:** B +**Explanation:** This is a comprehensive security scenario drawing from passwords and 2FA (Week 5), encryption (Week 5), software updates (Week 5), HTTPS (Week 4), WiFi risks (Week 5), and general digital literacy. Layered security from day one is far easier than recovering from a breach later. + +## Q10: Technology Choices +A small nonprofit needs to: track 500 donors (names, addresses, donation history), send professional newsletters, manage a budget, and present annual results to its board. Which combination of tools is MOST appropriate? + +A. Use a single Word document for everything +B. A database or CRM for donor tracking, a word processor or email marketing tool for newsletters, a spreadsheet for the budget with formulas, and a presentation tool for the annual board report +C. Print everything on paper — technology isn't necessary for nonprofits +D. Use only a spreadsheet for all four tasks + +**Answer:** B +**Explanation:** This integrates knowledge across the entire course: databases for structured relational data (Week 3), word processing for documents (Week 2), spreadsheets with formulas for financial tracking (Week 2), and presentations for communicating results (Week 3). Choosing the right tool for each task is a core digital literacy skill. + +--- + +## SELECTED FROM WEEKLY GRADED QUIZZES (Q11–Q30) + +## Q11: Choosing the Right Component (Week 1) +Maria's laptop is running slowly when she has multiple browser tabs and applications open. Which component upgrade would most directly help? + +A. A larger SSD +B. More RAM +C. A better graphics card +D. A faster internet connection + +**Answer:** B +**Explanation:** RAM handles data for active applications. When you run out of RAM, the computer uses slower storage as overflow (virtual memory), causing sluggish performance. More RAM lets you multitask smoothly. + +## Q12: File Management Scenario (Week 1) +Kenji downloads a file called "project_final_v2.docx.exe" from an email. What should concern him most? + +A. The file has "v2" in the name, meaning it's outdated +B. The .exe extension means it's actually a program, not a document — it could be malware +C. Files with two extensions are always corrupted +D. The .docx part means it can only be opened in Google Docs + +**Answer:** B +**Explanation:** The actual file type is determined by the last extension. A file ending in .exe is an executable program. Attackers often disguise malware with names like "document.docx.exe" to trick people into running it. + +## Q13: Absolute vs Relative References (Week 2) +Rosa has a spreadsheet where cell B1 contains a tax rate (8.5%). She wants every row to multiply the item price by this same tax rate. Which formula in C2 would work correctly when copied down? + +A. =A2*B1 +B. =A2*$B$1 +C. =$A$2*$B$1 +D. =A2*B2 + +**Answer:** B +**Explanation:** $B$1 is an absolute reference — the dollar signs lock it so it won't change when the formula is copied. A2 is relative and will update to A3, A4, etc. This way, each row multiplies its own price by the fixed tax rate in B1. + +## Q14: IF Function (Week 2) +What does the formula =IF(B2>=60, "Pass", "Fail") do? + +A. It checks if B2 is greater than or equal to 60; if yes, it displays "Pass"; otherwise, "Fail" +B. It adds 60 to the value in B2 +C. It counts how many cells contain the word "Pass" +D. It changes the value in B2 to 60 + +**Answer:** A +**Explanation:** The IF function has three parts: a condition (B2>=60), a value if true ("Pass"), and a value if false ("Fail"). It's one of the most useful spreadsheet functions for making decisions based on data. + +## Q15: Slide Design Scenario (Week 3) +Tomás has a slide with a bright red background, yellow text, and a 200-word paragraph. Which change would MOST improve this slide? + +A. Change the text color to orange for better contrast +B. Add an animation to each line of text so it appears one word at a time +C. Reduce the text to 4–5 key bullet points and use a high-contrast color scheme +D. Make the font smaller so more text fits on the slide + +**Answer:** C +**Explanation:** The slide has two problems: too much text and poor color contrast. Reducing to key bullet points keeps the audience engaged, and high-contrast colors ensure readability. Making text smaller or adding distracting animations would make things worse. + +## Q16: Database Query Thinking (Week 3) +An advisor wants to see all students enrolled in Biology 101 who have a GPA above 3.5. This is an example of: + +A. A Delete operation +B. A query — asking the database a specific question to filter and retrieve data +C. A backup +D. A Create operation + +**Answer:** B +**Explanation:** A query asks the database to find records matching specific criteria — filtering by course AND GPA. Queries are the "Read" part of CRUD and are how we extract useful information from large datasets. + +## Q17: Cloud Service Models (Week 4) +A startup wants to write their code and have someone else handle servers and infrastructure. Which cloud model fits? + +A. SaaS +B. IaaS +C. PaaS — it provides a platform for developing and deploying apps without managing underlying infrastructure +D. They must buy physical servers + +**Answer:** C +**Explanation:** PaaS (Platform as a Service) provides a development environment where you deploy your code without managing servers, operating systems, or networking. IaaS gives bare virtual machines; SaaS gives finished software. + +## Q18: URL Analysis (Week 4) +Mei receives a link to "https://secure-bankofamerica.login-verify.com/account." Should she trust it? + +A. Yes — it says "secure" and "bankofamerica" in the URL +B. Yes — it uses HTTPS +C. No — the actual domain is "login-verify.com," not bankofamerica.com +D. No — all bank emails are scams + +**Answer:** C +**Explanation:** The actual domain is determined by reading right-to-left from the first slash: "login-verify.com" is the real domain. "secure-bankofamerica" is just a subdomain anyone can create. HTTPS only means the connection is encrypted — it doesn't verify who owns the site. + +## Q19: AI Voice Cloning (Week 5) +Marcus receives a voicemail that sounds exactly like his boss, urgently requesting a $5,000 wire transfer. What should he do FIRST? + +A. Wire the money immediately +B. Reply to the voicemail number +C. Contact his boss directly using a known, trusted phone number to verify the request +D. Ignore it entirely + +**Answer:** C +**Explanation:** AI voice cloning can replicate someone's voice with just a few seconds of sample audio. Always verify unusual financial requests through a separate, trusted communication channel. Calling the voicemail number back could connect you to the scammer. + +## Q20: Password Manager Justification (Week 5) +Kai's friend uses the same password everywhere because they "can't remember different ones for 50 accounts." What is the BEST counter-argument? + +A. Write each password on paper and keep it in a drawer +B. A password manager generates and stores unique passwords — you only remember one master password +C. Add a number to the end for each site (password1, password2) +D. Browsers remember passwords, so don't worry about it + +**Answer:** B +**Explanation:** Password managers securely store unique, complex passwords for every account. Reusing passwords means one breach compromises all your accounts. Sequential variations are easily guessed. + +## Q21: Comprehensive Security (Week 5) +Which set of practices represents the STRONGEST overall personal security posture? + +A. Same strong password everywhere, no 2FA, weekly antivirus +B. Unique passwords via password manager, 2FA on all important accounts, regular updates, encrypted 3-2-1 backups, and skepticism toward unexpected messages +C. Avoiding the internet entirely +D. 2FA but never updating software and clicking links freely + +**Answer:** B +**Explanation:** Strong security is layered — no single measure is enough. Unique passwords prevent credential stuffing, 2FA adds a second barrier, updates patch vulnerabilities, backups protect against ransomware, and skepticism defends against social engineering. + +## Q22: AI Hallucinations in Practice (Week 6) +Amara asks ChatGPT for three academic sources on renewable energy. It returns three legitimate-looking citations. What should she do BEFORE using them? + +A. Use them immediately +B. Search for each citation in a library database or Google Scholar to verify they exist +C. Ask ChatGPT if they're real +D. Change the author names + +**Answer:** B +**Explanation:** LLMs frequently hallucinate citations — generating plausible but fabricated references. Always verify citations independently through library databases or Google Scholar. + +## Q23: Echo Chambers (Week 6) +Kevin only follows commentators he agrees with, and the algorithm keeps recommending similar content. Over time he becomes more extreme in his views. This is an example of: + +A. Digital literacy +B. An echo chamber — algorithmic curation reinforces beliefs and limits diverse perspectives +C. Effective research +D. Social engineering + +**Answer:** B +**Explanation:** Echo chambers form when algorithms feed content matching existing views, creating a feedback loop. Actively seeking diverse, credible sources is the antidote. + +## Q24: Backup Strategy (Week 1) +Amir keeps all his college work on his laptop with no backup. His roommate suggests the 3-2-1 rule. What does it recommend? + +A. Back up 3 times a day, to 2 drives, keeping 1 copy at school +B. Keep 3 copies of data, on 2 different media types, with 1 copy off-site +C. Use 3 cloud services, 2 flash drives, and 1 external hard drive +D. Save files in 3 formats across 2 folders on 1 computer + +**Answer:** B +**Explanation:** The 3-2-1 rule: 3 total copies, 2 different media types (e.g., internal drive + external), 1 off-site (e.g., cloud). This protects against hardware failure, theft, and disasters. + +## Q25: Formatting Strategy (Week 2) +Tanya wants consistent headings in a 20-page paper and an automatic table of contents. What is the BEST approach? + +A. Manually format each heading +B. Use built-in heading styles (Heading 1, Heading 2) consistently +C. Type all headings in ALL CAPS +D. Bold every heading and hope the TOC generator finds them + +**Answer:** B +**Explanation:** Built-in heading styles ensure consistent formatting AND enable automatic features like table of contents, navigation panes, and document outlines. + +## Q26: Network Troubleshooting (Week 3) +Jasmine can access other websites but can't reach one specific site. Her friend can access it from a different network. What's the MOST likely explanation? + +A. Her computer doesn't have a browser +B. The website is permanently deleted +C. A DNS or routing issue between her network and that server +D. She needs more RAM + +**Answer:** C +**Explanation:** If other sites work and someone else can reach the site, the issue is likely DNS resolution or routing between her specific network and that server. + +## Q27: Cookie Privacy (Week 4) +After searching for running shoes on one site, Elena sees shoe ads on unrelated websites. What explains this? + +A. Her computer has a virus +B. Third-party tracking cookies followed her browsing activity across websites +C. The shoe company hacked those sites +D. All websites show the same ads + +**Answer:** B +**Explanation:** Third-party cookies from ad networks track browsing across sites to enable targeted advertising. This is why privacy tools like cookie blockers exist. + +## Q28: Smishing Scenario (Week 5) +Tyler gets a text: "USPS: Package undeliverable. Fee of $1.95 required. Pay here: bit.ly/usps-fee." He's not expecting a package. What's the BEST response? + +A. Pay the $1.95 — it's small +B. Click the link to check +C. Delete it — it's smishing designed to steal payment info +D. Reply "STOP" to unsubscribe + +**Answer:** C +**Explanation:** USPS doesn't request fees via text with shortened URLs. The small amount is intentional — the goal is capturing credit card information, not $1.95. + +## Q29: Responsible AI Use (Week 6) +Which scenario represents the BEST use of AI for a class assignment? + +A. Having AI write your entire essay and submitting it +B. Using AI to brainstorm ideas and outline arguments, then writing the essay yourself +C. Asking AI for quiz answers and copying them +D. Using AI to generate a fake bibliography + +**Answer:** B +**Explanation:** AI is most valuable as a thinking partner. The learning happens when YOU do the writing and critical thinking. Using AI to bypass learning defeats the purpose of education. + +## Q30: Scam Recognition (Week 5) +Rosa's grandmother receives a crying phone call from someone claiming to be Rosa, saying she needs $2,000 in gift cards for bail. What type of scam is this? + +A. Tech support scam +B. Impersonation / emergency scam ("grandparent scam") +C. Romance scam +D. Fake job offer + +**Answer:** B +**Explanation:** The "grandparent scam" exploits family bonds and urgency. The caller pretends to be a loved one in crisis, requesting untraceable payment (gift cards, wire transfers). The defense: hang up and call the real person directly. diff --git a/content/quizzes/week-1-graded.md b/content/quizzes/week-1-graded.md new file mode 100644 index 0000000..90b15e8 --- /dev/null +++ b/content/quizzes/week-1-graded.md @@ -0,0 +1,111 @@ +# Week 1 Graded Quiz: Hardware, Software & Operating Systems + +## Q1: Choosing the Right Component +Maria's laptop is running slowly when she has multiple browser tabs and applications open. Which component upgrade would most directly help? + +A. A larger SSD +B. More RAM +C. A better graphics card +D. A faster internet connection + +**Answer:** B +**Explanation:** RAM handles data for active applications. When you run out of RAM, the computer uses slower storage as overflow (virtual memory), causing sluggish performance. More RAM lets you multitask smoothly. + +## Q2: Port Identification +David needs to connect his laptop to a projector for a class presentation AND charge his laptop using a single cable. Which port type supports this? + +A. USB Type-A +B. HDMI +C. USB-C / Thunderbolt +D. Ethernet (RJ-45) + +**Answer:** C +**Explanation:** USB-C (especially with Thunderbolt) can carry video, data, and power simultaneously through a single cable. HDMI only carries audio/video, USB-A doesn't support video output, and Ethernet is for networking. + +## Q3: System Software vs Application Software +Which of the following is the BEST example of the relationship between system software and application software? + +A. Google Chrome runs inside Microsoft Word +B. Windows manages hardware resources so that Photoshop can use the camera and display +C. Linux is a type of application that runs on top of Chrome OS +D. The CPU is system software and RAM is application software + +**Answer:** B +**Explanation:** The operating system (system software) manages hardware resources and provides services that application software relies on. Photoshop doesn't talk to the camera directly — it asks the OS to do it. + +## Q4: File Management Scenario +Kenji downloads a file called "project_final_v2.docx.exe" from an email. What should concern him most? + +A. The file has "v2" in the name, meaning it's outdated +B. The .exe extension means it's actually a program, not a document — it could be malware +C. Files with two extensions are always corrupted +D. The .docx part means it can only be opened in Google Docs + +**Answer:** B +**Explanation:** The actual file type is determined by the last extension. A file ending in .exe is an executable program. Attackers often disguise malware with names like "document.docx.exe" to trick people into running it. + +## Q5: Binary Conversion +How many different values can be represented with 8 bits (1 byte)? + +A. 8 +B. 16 +C. 128 +D. 256 + +**Answer:** D +**Explanation:** Each bit has 2 possible values (0 or 1). With 8 bits, you can represent 2^8 = 256 different values (0 through 255). This is why one byte can store one of 256 characters in ASCII. + +## Q6: Storage Technology +A photographer is choosing between an HDD and an SSD for storing thousands of high-resolution photos while traveling. Which is the BEST reason to choose an SSD? + +A. SSDs can store more data per dollar than HDDs +B. SSDs have no moving parts, making them more durable for travel +C. SSDs are the only type of drive that works with cameras +D. HDDs cannot store image files + +**Answer:** B +**Explanation:** SSDs use flash memory with no moving parts, making them resistant to bumps and drops — ideal for travel. HDDs have spinning platters that can be damaged by movement. While SSDs are also faster, durability is the key advantage for a traveling photographer. + +## Q7: Operating System Functions +Fatima opens Task Manager on her Windows laptop and sees that one application is using 95% of her CPU. What is the BEST course of action? + +A. Immediately uninstall Windows and reinstall it +B. Use Task Manager to end the unresponsive application +C. Remove the CPU and replace it with a faster one +D. Delete all her files to free up processing power + +**Answer:** B +**Explanation:** Task Manager lets you see which programs are using resources and end unresponsive applications. This is a core OS function — managing running processes. You don't need to reinstall the OS or replace hardware for a frozen app. + +## Q8: Analog vs Digital +Which statement BEST explains the difference between analog and digital data? + +A. Analog data is newer and more accurate than digital data +B. Digital data uses continuous signals while analog data uses discrete values +C. Analog data uses continuous signals while digital data represents information as discrete values (0s and 1s) +D. There is no practical difference — they are interchangeable terms + +**Answer:** C +**Explanation:** Analog signals are continuous (like a vinyl record's grooves or a mercury thermometer), while digital data is represented as discrete values using binary (0s and 1s). Computers convert analog information (sound, light) into digital form for processing. + +## Q9: Backup Strategy +Amir keeps all his college work on his laptop's internal SSD with no backup. His roommate suggests the 3-2-1 backup rule. What does this rule recommend? + +A. Back up 3 times a day, to 2 drives, keeping 1 copy at school +B. Keep 3 copies of your data, on 2 different types of media, with 1 copy off-site +C. Use 3 cloud services, 2 flash drives, and 1 external hard drive +D. Save every file in 3 different formats across 2 folders on 1 computer + +**Answer:** B +**Explanation:** The 3-2-1 rule means: 3 total copies of your data, stored on 2 different types of media (e.g., internal drive + external drive), with 1 copy stored off-site (e.g., cloud storage). This protects against hardware failure, theft, and disasters. + +## Q10: Putting It All Together +Sonia is buying a new computer for college. She plans to write papers, use spreadsheets, attend Zoom classes, and browse the web. She does NOT do gaming or video editing. Which configuration is the BEST fit for her needs? + +A. High-end gaming GPU, 64 GB RAM, 256 GB HDD +B. Basic integrated graphics, 8 GB RAM, 256 GB SSD +C. No GPU, 2 GB RAM, 1 TB HDD +D. Workstation CPU, 128 GB RAM, 4 TB SSD + +**Answer:** B +**Explanation:** For everyday college tasks (documents, spreadsheets, video calls, web browsing), 8 GB of RAM and integrated graphics are sufficient. An SSD provides fast boot and load times. Options C has too little RAM, while A and D are overpowered and expensive for basic tasks. diff --git a/content/quizzes/week-1-practice.md b/content/quizzes/week-1-practice.md new file mode 100644 index 0000000..db4c532 --- /dev/null +++ b/content/quizzes/week-1-practice.md @@ -0,0 +1,111 @@ +# Week 1 Practice Quiz: Hardware, Software & Operating Systems + +## Q1: What CPU Stands For +What does CPU stand for? + +A. Central Processing Unit +B. Computer Personal Utility +C. Central Program Updater +D. Computer Power Unit + +**Answer:** A +**Explanation:** CPU stands for Central Processing Unit — it's the "brain" of the computer that executes instructions and processes data. + +## Q2: RAM vs Storage +What happens to the data stored in RAM when you shut down your computer? + +A. It gets saved to the hard drive automatically +B. It is erased — RAM is volatile memory +C. It stays in RAM until you delete it manually +D. It gets compressed and archived + +**Answer:** B +**Explanation:** RAM (Random Access Memory) is volatile, meaning it only holds data while the computer is powered on. When you shut down, everything in RAM is lost. + +## Q3: Input Device Identification +Which of the following is an input device? + +A. Monitor +B. Printer +C. Keyboard +D. Speakers + +**Answer:** C +**Explanation:** A keyboard sends data into the computer, making it an input device. Monitors, printers, and speakers are output devices — they receive data from the computer. + +## Q4: Storage Comparison +Carlos needs to transfer a 2 GB presentation file to a classmate who doesn't have internet access. Which device would work best? + +A. A stick of RAM +B. A USB flash drive +C. An HDMI cable +D. A CPU + +**Answer:** B +**Explanation:** A USB flash drive is portable storage that can hold files and be physically handed to someone. RAM is volatile memory, HDMI transfers video signals, and a CPU processes data — none of these transfer files. + +## Q5: Operating System Purpose +What is the main purpose of an operating system? + +A. To create documents and spreadsheets +B. To manage hardware and software resources on a computer +C. To connect the computer to the internet +D. To protect the computer from viruses + +**Answer:** B +**Explanation:** An operating system (like Windows, macOS, or Linux) manages hardware resources, runs applications, handles file storage, and acts as the intermediary between you and the computer's hardware. + +## Q6: File Extensions +Priya downloaded a file called "report.pdf" from her email. What does the .pdf extension tell her? + +A. The file is a photo +B. The file is a spreadsheet +C. The file is a Portable Document Format file, typically for viewing and printing +D. The file is an executable program + +**Answer:** C +**Explanation:** The .pdf extension indicates a Portable Document Format file, which is designed for sharing documents that look the same on any device. File extensions tell your computer (and you) what type of file it is. + +## Q7: Binary Basics +In computing, what is a "bit"? + +A. A single binary digit — either 0 or 1 +B. A group of 8 bytes +C. A measure of internet speed +D. A type of computer virus + +**Answer:** A +**Explanation:** A bit (binary digit) is the smallest unit of data in computing, representing either a 0 or a 1. Eight bits make up one byte. + +## Q8: HDD vs SSD +Which type of storage has no moving parts and is generally faster? + +A. HDD (Hard Disk Drive) +B. SSD (Solid State Drive) +C. Optical disc (CD/DVD) +D. Floppy disk + +**Answer:** B +**Explanation:** SSDs use flash memory with no moving parts, making them faster, quieter, and more durable than HDDs, which use spinning magnetic platters to read and write data. + +## Q9: System vs Application Software +Which of the following is an example of system software? + +A. Microsoft Word +B. Google Chrome +C. Windows 11 +D. Adobe Photoshop + +**Answer:** C +**Explanation:** System software includes operating systems like Windows 11 that manage hardware and run other programs. Word, Chrome, and Photoshop are all application software — programs you use to do specific tasks. + +## Q10: Data Size Units +Put these storage units in order from smallest to largest: GB, KB, TB, MB. + +A. KB, MB, GB, TB +B. MB, KB, GB, TB +C. KB, GB, MB, TB +D. TB, GB, MB, KB + +**Answer:** A +**Explanation:** The order from smallest to largest is: Kilobyte (KB) → Megabyte (MB) → Gigabyte (GB) → Terabyte (TB). Each step up is roughly 1,000 times larger than the previous. diff --git a/content/quizzes/week-2-graded.md b/content/quizzes/week-2-graded.md new file mode 100644 index 0000000..b3a3cdf --- /dev/null +++ b/content/quizzes/week-2-graded.md @@ -0,0 +1,111 @@ +# Week 2 Graded Quiz: Word Processing & Spreadsheets + +## Q1: Style Consistency +Marcus is writing a 20-page research paper in Word. He manually changes the font, size, and color of each section heading one by one. His professor tells him to change all headings from blue to black. What should Marcus have done from the start? + +A. Used copy-paste for each heading so they all match +B. Used built-in heading styles so he could update all headings at once by modifying the style +C. Made all text the same size so headings aren't needed +D. Used bold on every heading instead of changing colors + +**Answer:** B +**Explanation:** Heading styles let you format all headings consistently and update them globally in one step. Manually formatting each heading creates extra work every time you need to make a change. + +## Q2: Cell References in Formulas +In a spreadsheet, cell B2 contains the formula `=A2*$D$1`. If you copy this formula to cell B5, what will the formula become? + +A. `=A2*$D$1` +B. `=A5*$D$4` +C. `=A5*$D$1` +D. `=A2*$D$4` + +**Answer:** C +**Explanation:** `A2` is a relative reference, so it shifts down 3 rows to `A5` when copied. `$D$1` is an absolute reference (dollar signs lock both column and row), so it stays `$D$1` no matter where the formula is copied. + +## Q3: Choosing the Right Chart +Priya has a spreadsheet showing each department's percentage of the company's total budget. She wants to show how the whole budget is divided up. Which chart type is BEST? + +A. Line chart +B. Bar chart +C. Pie chart +D. Scatter plot + +**Answer:** C +**Explanation:** Pie charts are ideal for showing parts of a whole — in this case, how the total budget is split among departments. Line charts show trends over time, scatter plots show relationships between variables, and bar charts are better for comparing separate values. + +## Q4: SUM vs AVERAGE +Kenji's spreadsheet has test scores in cells C2 through C31 for 30 students. He wants to find the class average. Which formula should he use? + +A. `=SUM(C2:C31)` +B. `=AVERAGE(C2:C31)` +C. `=COUNT(C2:C31)` +D. `=SUM(C2:C31)/100` + +**Answer:** B +**Explanation:** `AVERAGE` calculates the mean by adding all values and dividing by the count automatically. `SUM` would give the total of all scores, not the average. Dividing SUM by 100 would also be wrong since there are 30 students, not 100. + +## Q5: Sorting vs Filtering +Elena has a spreadsheet of 500 customer orders. She only wants to see orders from California that are over $100, without removing any data. What should she use? + +A. Sort the data by state, then manually scroll to find California +B. Delete all rows that aren't California orders over $100 +C. Apply filters to the State and Amount columns to show only matching rows +D. Create a separate spreadsheet and copy the California rows into it + +**Answer:** C +**Explanation:** Filtering temporarily hides rows that don't match your criteria without deleting any data. You can filter by state and amount to see exactly what you need, then remove the filters to see everything again. + +## Q6: IF Function Logic +A teacher uses the formula `=IF(B2>=60,"Pass","Fail")` in cell C2. Student Jamie has a 58 in cell B2. What will cell C2 display? + +A. Pass +B. Fail +C. 58 +D. An error message + +**Answer:** B +**Explanation:** The IF function checks whether B2 is greater than or equal to 60. Since 58 is less than 60, the condition is FALSE, so the formula returns "Fail." + +## Q7: Formatting for Readability +Amir is preparing a quarterly sales report in Word to present to his manager. Which combination of formatting choices would make the document MOST professional and readable? + +A. Use five different fonts to make each section visually distinct +B. Use one or two fonts consistently, with heading styles, page numbers, and clear section breaks +C. Maximize the amount of text per page by using 8pt font and no margins +D. Underline all important words throughout the document and use ALL CAPS for emphasis + +**Answer:** B +**Explanation:** Professional documents use consistent formatting — one or two fonts, heading styles for structure, and page numbers for navigation. Multiple fonts, tiny text, and excessive underlining or ALL CAPS make documents harder to read and look unprofessional. + +## Q8: Formula Error Diagnosis +Fatima enters `=SUM(A1:A10)` in a spreadsheet and gets the result 0, even though she can see numbers in cells A1 through A10. What is the MOST likely problem? + +A. The SUM function is broken in her version of the spreadsheet software +B. The numbers in A1:A10 are stored as text, not as actual numbers +C. She needs to use AVERAGE instead of SUM +D. The formula should use semicolons instead of a colon + +**Answer:** B +**Explanation:** When numbers are stored as text (often from imports or copy-paste), formulas like SUM treat them as empty. This is a common spreadsheet issue — you can usually fix it by converting the cells to number format. + +## Q9: Page Layout for Printing +David needs to print a wide spreadsheet with 15 columns on a single page. The data currently spills onto a second page width-wise. What is the BEST approach? + +A. Delete columns until it fits on one page +B. Change the page orientation to landscape and/or use "Fit to Page" scaling +C. Make the font size 4pt so everything fits +D. Print it as-is and tape the two pages together + +**Answer:** B +**Explanation:** Landscape orientation gives you more horizontal space, and "Fit to Page" (or "Fit All Columns on One Page") automatically scales the content to fit. These are standard print layout tools designed for exactly this situation. + +## Q10: Combining Concepts +Sonia manages inventory for a small shop. She has a spreadsheet with columns: Product (A), Quantity (B), Price (C), and Total (D). She wants column D to multiply quantity by price, she needs to highlight any product with fewer than 10 items in stock, and she wants to sort by total value. Which set of features should she use? + +A. A formula in column D (`=B2*C2`), conditional formatting on column B for values under 10, and sort by column D +B. A chart in column D, a filter on column B, and sort by column A +C. Manual calculation for column D, bold text for low stock, and sort by column C +D. An IF function in column D, a pie chart for column B, and filter by column D + +**Answer:** A +**Explanation:** A multiplication formula calculates totals automatically, conditional formatting visually highlights cells meeting a condition (like stock under 10), and sorting by column D arranges products by total value. This combination uses the right tool for each task. diff --git a/content/quizzes/week-2-practice.md b/content/quizzes/week-2-practice.md new file mode 100644 index 0000000..654a9ad --- /dev/null +++ b/content/quizzes/week-2-practice.md @@ -0,0 +1,111 @@ +# Week 2 Practice Quiz: Word Processing & Spreadsheets + +## Q1: Save vs Save As +What is the difference between "Save" and "Save As"? + +A. "Save" creates a backup; "Save As" deletes the original +B. "Save" updates the current file; "Save As" lets you create a new copy with a different name or location +C. They do the same thing — the names are interchangeable +D. "Save As" only works for PDF files + +**Answer:** B +**Explanation:** "Save" overwrites the current file with your changes. "Save As" lets you specify a new filename, location, or format — keeping the original intact. This is useful when you want to create a new version without losing the old one. + +## Q2: Formatting Basics +Which keyboard shortcut applies bold formatting to selected text in most word processors? + +A. Ctrl + I +B. Ctrl + B +C. Ctrl + U +D. Ctrl + S + +**Answer:** B +**Explanation:** Ctrl + B toggles bold formatting. Ctrl + I is italic, Ctrl + U is underline, and Ctrl + S saves the document. These shortcuts work in Word, Google Docs, and most other text editors. + +## Q3: Cell References +In a spreadsheet, what does the cell reference "B3" mean? + +A. The third row of page B +B. The cell at column B, row 3 +C. A formula that multiplies B times 3 +D. The second sheet, third column + +**Answer:** B +**Explanation:** Spreadsheet cell references use the column letter followed by the row number. B3 means column B, row 3. This addressing system lets you refer to specific cells in formulas. + +## Q4: SUM Function +What does the formula =SUM(A1:A5) do? + +A. Counts how many cells in A1 through A5 contain numbers +B. Finds the largest value in cells A1 through A5 +C. Adds up all the values in cells A1 through A5 +D. Calculates the average of cells A1 through A5 + +**Answer:** C +**Explanation:** SUM adds all values in the specified range. A1:A5 means "from cell A1 to cell A5." If those cells contained 10, 20, 30, 40, and 50, the formula would return 150. + +## Q5: Paragraph vs Character Formatting +What is the difference between character formatting and paragraph formatting? + +A. Character formatting affects selected text (bold, font size); paragraph formatting affects entire paragraphs (spacing, alignment, indents) +B. Character formatting is permanent; paragraph formatting is temporary +C. They are the same thing with different names +D. Paragraph formatting only works in spreadsheets + +**Answer:** A +**Explanation:** Character formatting (bold, italic, font size, color) applies to individual characters or words. Paragraph formatting (alignment, line spacing, indentation, bullets) affects the entire paragraph. Understanding this distinction helps you format documents efficiently. + +## Q6: Chart Types +Which chart type is BEST for showing how a budget is divided among categories (rent, food, transportation, etc.)? + +A. Line chart +B. Scatter plot +C. Pie chart +D. Bar chart + +**Answer:** C +**Explanation:** Pie charts are ideal for showing parts of a whole — like how a total budget is split among categories. Each slice represents a category's proportion. Line charts show trends over time, and scatter plots show relationships between two variables. + +## Q7: Spell Check Limitations +Why shouldn't you rely solely on spell check to proofread a document? + +A. Spell check doesn't work on documents longer than 5 pages +B. Spell check can miss correctly spelled words used in the wrong context (like "their" vs "there") +C. Spell check automatically changes all your words without asking +D. Spell check only works in English + +**Answer:** B +**Explanation:** Spell check catches misspelled words but can't reliably catch words that are spelled correctly but used incorrectly — like "form" instead of "from" or "their" instead of "there." Always proofread your work manually too. + +## Q8: Relative Cell References +If you type the formula =A1+B1 in cell C1, then copy that formula down to cell C2, what formula will appear in C2? + +A. =A1+B1 (it stays the same) +B. =A2+B2 +C. =A1+B2 +D. =C1+C2 + +**Answer:** B +**Explanation:** By default, cell references in spreadsheets are relative — they adjust when you copy a formula to a new location. Moving down one row shifts all row references by one, so A1 becomes A2 and B1 becomes B2. + +## Q9: File Formats +Marcus wants to share a document with someone who may not have Microsoft Word. Which format should he use to ensure the recipient can open it? + +A. .docx +B. .xlsx +C. .pptx +D. .pdf + +**Answer:** D +**Explanation:** PDF (Portable Document Format) can be opened on virtually any device without needing specific software like Word. It also preserves formatting exactly as intended. While .docx is Word-specific, PDF readers are free and built into most operating systems and browsers. + +## Q10: Spreadsheet vs Word Processor +Which task is BEST suited for a spreadsheet rather than a word processor? + +A. Writing a cover letter +B. Tracking monthly expenses and calculating totals +C. Creating a research essay with footnotes +D. Writing a thank-you note + +**Answer:** B +**Explanation:** Spreadsheets are designed for organizing numerical data in rows and columns, performing calculations, and creating charts. Tracking expenses with running totals is a classic spreadsheet task. Documents with mostly text (letters, essays) are better suited for word processors. diff --git a/content/quizzes/week-3-graded.md b/content/quizzes/week-3-graded.md new file mode 100644 index 0000000..ad77769 --- /dev/null +++ b/content/quizzes/week-3-graded.md @@ -0,0 +1,111 @@ +# Week 3 Graded Quiz: Presentations, Databases & Networks + +## Q1: Slide Design Scenario +Tomás is building a presentation for his biology class. He has one slide with 300 words of text, a complex diagram, two photos, and an animated GIF. What is the BEST way to improve this slide? + +A. Remove all images and keep only the text so people can read it +B. Split the content across multiple slides — one idea per slide — using visuals to support key points +C. Make the font smaller so everything fits without scrolling +D. Add a background video to make the slide more dynamic + +**Answer:** B +**Explanation:** The "one idea per slide" principle keeps presentations focused and readable. Overcrowding a single slide overwhelms the audience. Each slide should support one key point with relevant visuals. + +## Q2: Database Design +A small library wants to track books, members, and checkouts. They need to know which member checked out which book and when. What is the BEST database design approach? + +A. Put all information in one big table with columns for book title, member name, and checkout date +B. Create three separate tables (Books, Members, Checkouts) linked by ID fields +C. Create a separate database for each book in the library +D. Store everything in a spreadsheet with one row per book + +**Answer:** B +**Explanation:** Relational database design separates data into related tables to avoid redundancy. A Checkouts table links to both Books and Members via their IDs, so you don't repeat book or member details for every checkout. + +## Q3: Network Troubleshooting +Lisa's laptop connects to her home WiFi but she can't load any websites. She can't ping google.com but CAN ping 8.8.8.8 (Google's IP address). What is MOST likely the problem? + +A. Her WiFi router is completely broken +B. DNS is not working — her computer can't translate domain names to IP addresses +C. Her laptop's network card has failed +D. Google's servers are down worldwide + +**Answer:** B +**Explanation:** If she can reach an IP address but not a domain name, the network connection works fine — the issue is DNS resolution. Her DNS server may be down or misconfigured, preventing domain names from being translated to IP addresses. + +## Q4: Query Scenario +A school database has a Students table with fields: StudentID, Name, Major, GPA, and EnrollmentYear. The registrar wants a list of all Computer Science majors who enrolled after 2023 with a GPA above 3.0. Which approach describes the correct query logic? + +A. Select all records, then manually scan for matching students +B. Query where Major = "Computer Science" AND EnrollmentYear > 2023 AND GPA > 3.0 +C. Query where Major = "Computer Science" OR EnrollmentYear > 2023 OR GPA > 3.0 +D. Sort the table by GPA and pick the top results + +**Answer:** B +**Explanation:** Using AND ensures all three conditions must be true simultaneously. Using OR would return any student meeting any one condition (far too many results). Sorting alone doesn't filter — it just reorders. + +## Q5: Presentation Delivery +During a team presentation, Anaya reads every word directly from her slides while facing the projector screen. What are TWO problems with this approach? + +A. She should use more animations and transitions to keep the audience engaged +B. Reading slides word-for-word and not facing the audience reduces engagement and makes the slides redundant +C. The problem is that she should have memorized the slides completely +D. She should have printed the slides as handouts instead of presenting them + +**Answer:** B +**Explanation:** Facing away from the audience breaks eye contact and kills engagement. Reading slides verbatim makes the presenter unnecessary — the audience could just read the slides themselves. Slides should prompt the speaker, not replace them. + +## Q6: Network Architecture +A company has offices in San Francisco, New York, and London, all connected so employees can share files and access the same internal systems. What type of network connects these offices? + +A. LAN — since they're all part of the same company +B. PAN — it's a personal network for the CEO +C. WAN — it connects multiple locations across large geographic distances +D. WiFi — all modern offices use wireless + +**Answer:** C +**Explanation:** A WAN (Wide Area Network) connects networks across large geographic distances. Each office likely has its own LAN, and the WAN links them together. LAN only covers a single location, and WiFi is a connection method, not a network type. + +## Q7: Data Integrity +In a Customers database table, the admin accidentally enters the same customer twice with slightly different spellings — "Jon Smith" and "John Smith" — both with different CustomerID values. What database concept would have helped prevent this? + +A. Making the CustomerID column auto-increment +B. Input validation and duplicate-checking rules, along with good data entry procedures +C. Deleting the CustomerID column since names should be the primary key +D. Using a smaller database that only allows 100 records + +**Answer:** B +**Explanation:** Input validation (standardized formats, required fields) and duplicate-checking can catch potential duplicates before they enter the system. Using names as primary keys wouldn't help since the misspelling would make them look like different records. + +## Q8: Router Scenario +At home, Carlos has a modem from his internet provider and a separate router. His laptop connects to WiFi but has no internet access. The router's admin page shows the WAN port has no IP address. What is MOST likely the issue? + +A. The laptop's WiFi adapter is broken +B. The router is not properly connected to the modem — the WAN/internet port has no signal +C. Carlos needs to buy a switch to connect the router to the modem +D. The laptop needs a static IP address assigned manually + +**Answer:** B +**Explanation:** If the router's WAN port has no IP address, it's not receiving a connection from the modem. This usually means the cable between the modem and router's WAN port is disconnected, damaged, or the modem needs a restart. + +## Q9: Database vs Spreadsheet +A growing business has 50,000 customer records that five employees need to access simultaneously. They're currently using a shared spreadsheet. Why should they consider switching to a database? + +A. Databases have prettier formatting than spreadsheets +B. Databases handle large datasets, concurrent multi-user access, and data validation better than spreadsheets +C. Spreadsheets cannot store more than 100 rows +D. Databases are free while spreadsheet software costs money + +**Answer:** B +**Explanation:** Databases are designed for large-scale data management with features like multi-user access controls, data validation rules, relationships between tables, and efficient querying. Spreadsheets work well for smaller datasets but struggle with concurrent access and data integrity at scale. + +## Q10: Network Security Basics +A coffee shop offers free WiFi with no password. Why should customers be cautious when using it? + +A. Free WiFi is always slower than paid WiFi +B. Unencrypted public WiFi lets attackers potentially intercept data transmitted between your device and the router +C. The coffee shop can see what you're buying online and charge you extra +D. Public WiFi networks automatically install viruses on your device + +**Answer:** B +**Explanation:** On an open (unencrypted) WiFi network, data travels without encryption between your device and the access point. An attacker on the same network could intercept this traffic (a "man-in-the-middle" attack). Using HTTPS sites and a VPN helps mitigate this risk. diff --git a/content/quizzes/week-3-practice.md b/content/quizzes/week-3-practice.md new file mode 100644 index 0000000..f8067e6 --- /dev/null +++ b/content/quizzes/week-3-practice.md @@ -0,0 +1,111 @@ +# Week 3 Practice Quiz: Presentations, Databases & Networks + +## Q1: Slide Design Best Practice +What is the recommended best practice for text on presentation slides? + +A. Include full paragraphs so the audience can read along +B. Use short bullet points with key ideas — elaborate verbally +C. Use as many fonts and colors as possible to keep the audience interested +D. Put all your content on one slide to save time + +**Answer:** B +**Explanation:** Effective slides use short bullet points as visual support while the speaker provides detail. Overcrowded slides cause the audience to read instead of listen, reducing engagement. + +## Q2: Database Table Structure +In a relational database, what is a "record"? + +A. A single column in a table +B. A single row in a table, representing one complete entry +C. The name of the database +D. A type of query + +**Answer:** B +**Explanation:** A record (row) represents one complete entry in a table — for example, one student's information. Columns represent fields (attributes) like name, ID, or email. + +## Q3: LAN vs WAN +What is the main difference between a LAN and a WAN? + +A. LANs are wireless and WANs use cables +B. LANs cover a small area like a building; WANs cover large geographic areas +C. LANs are faster than WANs because they use newer technology +D. WANs are only used by governments + +**Answer:** B +**Explanation:** A LAN (Local Area Network) covers a limited area like a home, office, or school. A WAN (Wide Area Network) spans large distances — the internet itself is the largest WAN. + +## Q4: DNS Purpose +What does DNS (Domain Name System) do? + +A. Blocks malicious websites automatically +B. Translates human-readable domain names (like google.com) into IP addresses +C. Encrypts all web traffic +D. Assigns physical addresses to network cables + +**Answer:** B +**Explanation:** DNS is like the internet's phone book — when you type "google.com," DNS translates it to an IP address (like 142.250.80.46) so your computer can find and connect to the right server. + +## Q5: CRUD Operations +In database terminology, what does CRUD stand for? + +A. Copy, Read, Undo, Delete +B. Create, Read, Update, Delete +C. Connect, Retrieve, Upload, Download +D. Compile, Run, Update, Debug + +**Answer:** B +**Explanation:** CRUD stands for Create, Read, Update, and Delete — the four basic operations you can perform on data in a database. Almost every database application revolves around these actions. + +## Q6: Router vs Switch +What is the PRIMARY difference between a router and a switch? + +A. A router connects different networks together; a switch connects devices within the same network +B. A switch is wireless and a router uses cables +C. Routers are used at home and switches are only for businesses +D. There is no difference — they are the same device + +**Answer:** A +**Explanation:** A switch connects devices within a single local network (like computers in an office). A router connects different networks together (like your home network to the internet) and directs traffic between them. + +## Q7: Database Queries +What is the purpose of a query in a database? + +A. To delete the entire database +B. To ask the database a question and retrieve specific data that matches your criteria +C. To create a backup of all tables +D. To redesign the table structure + +**Answer:** B +**Explanation:** A query lets you search, filter, and retrieve specific information from a database. For example, you could query a student database to find all students with a GPA above 3.5. + +## Q8: IP Addresses +What does an IP address identify? + +A. The brand of computer you're using +B. A specific device on a network +C. The speed of your internet connection +D. The physical location of a cable + +**Answer:** B +**Explanation:** An IP (Internet Protocol) address is a unique numerical label assigned to each device on a network. It's how devices find and communicate with each other — similar to a mailing address for your computer. + +## Q9: WiFi Standards +What does it mean when a WiFi network is described as "802.11ac" or "WiFi 5"? + +A. It can only connect 5 devices at a time +B. It refers to the wireless standard/generation, which determines speed and capabilities +C. The network costs $5 per month +D. It uses 5 different passwords for security + +**Answer:** B +**Explanation:** WiFi standards (like WiFi 5/802.11ac or WiFi 6/802.11ax) define the generation of wireless technology. Newer standards generally offer faster speeds, better range, and improved performance with multiple devices. + +## Q10: Primary Key +In a database table of students, why would you use a Student ID number as the primary key instead of the student's name? + +A. Numbers are always smaller than text in a database +B. Names can be duplicated, but a primary key must uniquely identify each record +C. Databases cannot store text fields +D. Student IDs are required by law to be primary keys + +**Answer:** B +**Explanation:** A primary key must be unique for every record. Two students could share the same name (e.g., two "Maria Garcia"), but each Student ID is unique. This ensures every record can be identified without ambiguity. diff --git a/content/quizzes/week-4-graded.md b/content/quizzes/week-4-graded.md new file mode 100644 index 0000000..84e9541 --- /dev/null +++ b/content/quizzes/week-4-graded.md @@ -0,0 +1,111 @@ +# Week 4 Graded Quiz: Internet, Email & Web + +## Q1: Secure Browsing Scenario +Naomi is buying textbooks online. She notices the website URL starts with "http://" (no S) and there's no padlock icon in the address bar. She's about to enter her credit card number. What should she do? + +A. Proceed — the padlock icon is just decorative and doesn't affect security +B. Do NOT enter payment information — the site isn't using HTTPS, so her data could be intercepted in transit +C. Switch to a different browser, which will automatically make the connection secure +D. It's fine as long as she's on her home WiFi network + +**Answer:** B +**Explanation:** Without HTTPS, data travels unencrypted between her browser and the server. Anyone intercepting the traffic could read her credit card number. She should look for the same product on a site that uses HTTPS, or check if the site has an HTTPS version. + +## Q2: Email Scenario +David receives an email from "IT-Department@his-company.com" asking him to click a link and verify his password within 24 hours or his account will be locked. The link goes to `http://his-company-verify.sketchy-site.com/login`. What should David do? + +A. Click the link quickly since his account will be locked +B. Forward it to 10 coworkers so they can verify their passwords too +C. Do NOT click the link — the urgency, external domain, and password request are classic phishing red flags. Report it to actual IT. +D. Reply to the email and ask if it's legitimate + +**Answer:** C +**Explanation:** This has multiple phishing red flags: artificial urgency ("24 hours"), a request for credentials, and a link to an external domain disguised to look legitimate. Legitimate IT departments don't ask for passwords via email. David should report it through official channels. + +## Q3: Cloud Service Models +A startup needs servers to run their custom application. They don't want to buy physical hardware, but they want full control over the operating system, storage, and networking configuration. Which cloud model fits? + +A. SaaS — they can just use an existing web app +B. PaaS — the platform manages everything automatically +C. IaaS — they rent virtual infrastructure and configure it themselves +D. On-premises — cloud can't provide this level of control + +**Answer:** C +**Explanation:** IaaS (Infrastructure as a Service) provides virtualized computing resources (servers, storage, networking) that the customer manages. They get full control over the OS and configuration without buying physical hardware. AWS EC2 and Azure VMs are common IaaS examples. + +## Q4: URL Analysis +A user sees the URL `https://accounts.google.com.login-verify.net/signin`. Is this actually a Google page? + +A. Yes — it contains "accounts.google.com" so it must be Google +B. No — the actual domain is "login-verify.net," not google.com. The "accounts.google.com" part is a subdomain trick. +C. Yes — HTTPS guarantees the site is owned by Google +D. It's impossible to tell from the URL alone + +**Answer:** B +**Explanation:** The actual domain is determined by reading right-to-left from the first single slash. Here, the domain is `login-verify.net`, and `accounts.google.com` is just a misleading subdomain. HTTPS means the connection is encrypted, not that the site is trustworthy or legitimate. + +## Q5: Browser Developer Tools +Marcus is learning web design and wants to temporarily change the color of a heading on a live webpage to test how it looks — without editing the actual website files. Which browser feature lets him do this? + +A. Bookmark the page and change the color in the bookmark settings +B. Use the browser's Developer Tools (Inspect Element) to modify the CSS in real time +C. Take a screenshot and edit it in Photoshop +D. Email the website owner and ask them to change it + +**Answer:** B +**Explanation:** Browser Developer Tools (accessed via right-click → Inspect or F12) let you view and temporarily edit a page's HTML, CSS, and JavaScript in real time. Changes only affect your local view and disappear when you refresh — they don't modify the actual website. + +## Q6: SMTP Journey +When you send an email from your Gmail to a friend's Outlook account, what is the correct order of protocols used? + +A. IMAP sends it → SMTP receives it +B. Your Gmail uses SMTP to send it to Outlook's server → your friend's Outlook uses IMAP (or POP3) to retrieve it +C. HTTP sends the email directly to your friend's browser +D. FTP uploads the email to Outlook's server + +**Answer:** B +**Explanation:** SMTP handles the outgoing journey — pushing your email from server to server until it reaches the recipient's mail server. Then your friend's email client uses IMAP or POP3 to pull (retrieve) the message from their server to their device. + +## Q7: Cookie Scenario +After browsing for running shoes on an online store, Jasmine notices shoe advertisements appearing on completely different websites she visits. What technology is MOST likely responsible? + +A. Viruses that the shoe website installed on her computer +B. Third-party tracking cookies that follow her browsing activity across multiple sites +C. The shoe company hacked the other websites to show her ads +D. Her ISP is selling her browsing history to shoe companies + +**Answer:** B +**Explanation:** Third-party cookies are placed by advertisers and ad networks (not the site you're visiting) to track your browsing across multiple websites. This enables "retargeting" — showing you ads related to products you previously viewed. Many browsers now block third-party cookies by default. + +## Q8: Web Architecture +When you type "canvas.gavilan.edu" into your browser and press Enter, what happens FIRST? + +A. Your browser sends the HTML directly to the server +B. Your browser asks a DNS server to look up the IP address for "canvas.gavilan.edu" +C. The Canvas login page starts loading immediately +D. Your browser checks if you have a cookie, and only then contacts the server + +**Answer:** B +**Explanation:** Before your browser can contact any server, it needs to know WHERE to send the request. DNS resolution happens first — translating the human-readable domain name into an IP address. Only then can your browser establish a connection and request the web page. + +## Q9: Professional Email Composition +Rina needs to email her professor about a grade question. Which email is MOST appropriate? + +A. Subject: "hey" / Body: "yo prof whats up with my grade?? fix it asap thx" +B. Subject: "Grade Question — CSIS 1, Section 01" / Body: "Dear Professor Lee, I have a question about my grade on the Week 3 quiz. Could we discuss this during your office hours? Thank you, Rina Patel" +C. Subject: (blank) / Body: "I think there's a mistake. Please check." +D. Subject: "URGENT!!! GRADE EMERGENCY!!!" / Body: "My grade is wrong. I need this fixed NOW or I'll fail." + +**Answer:** B +**Explanation:** Professional emails include a clear, specific subject line; a respectful greeting; enough context for the recipient to understand the issue; a specific request; and a professional closing. This demonstrates email etiquette that's expected in academic and professional settings. + +## Q10: SaaS vs PaaS vs IaaS +Match these real-world scenarios: (1) A teacher uses Google Docs to write a syllabus. (2) A developer deploys a Python web app to Heroku without managing any servers. (3) A company rents virtual machines from AWS and installs their own operating systems. Which cloud models do these represent? + +A. (1) IaaS, (2) SaaS, (3) PaaS +B. (1) SaaS, (2) PaaS, (3) IaaS +C. (1) PaaS, (2) IaaS, (3) SaaS +D. All three are SaaS + +**Answer:** B +**Explanation:** Google Docs is SaaS — a complete application used through a browser. Heroku is PaaS — developers deploy code without managing infrastructure. AWS virtual machines are IaaS — the company manages everything above the hardware. Each model gives a different level of control and responsibility. diff --git a/content/quizzes/week-4-practice.md b/content/quizzes/week-4-practice.md new file mode 100644 index 0000000..d3216e6 --- /dev/null +++ b/content/quizzes/week-4-practice.md @@ -0,0 +1,111 @@ +# Week 4 Practice Quiz: Internet, Email & Web + +## Q1: HTTP vs HTTPS +What does the "S" in HTTPS stand for, and why does it matter? + +A. "Speed" — HTTPS loads pages faster than HTTP +B. "Secure" — HTTPS encrypts data between your browser and the website +C. "Server" — HTTPS is only used by web servers, not regular users +D. "Simple" — HTTPS is a simplified version of HTTP + +**Answer:** B +**Explanation:** HTTPS stands for HyperText Transfer Protocol Secure. It uses encryption (TLS/SSL) to protect data in transit, preventing attackers from reading information like passwords or credit card numbers as they travel between your browser and the server. + +## Q2: URL Components +In the URL `https://www.example.com/products/shoes?color=red`, which part is the domain name? + +A. https:// +B. www.example.com +C. /products/shoes +D. ?color=red + +**Answer:** B +**Explanation:** The domain name (`www.example.com`) identifies which server to connect to. `https://` is the protocol, `/products/shoes` is the path to a specific page, and `?color=red` is a query parameter that passes additional information. + +## Q3: Email Protocols +Which protocol is used to SEND email from your email client to the mail server? + +A. IMAP +B. POP3 +C. SMTP +D. FTP + +**Answer:** C +**Explanation:** SMTP (Simple Mail Transfer Protocol) handles sending outgoing email. IMAP and POP3 are used for receiving/retrieving email from the server. FTP is for file transfers, not email. + +## Q4: Browser Cookies +What is the primary purpose of cookies in a web browser? + +A. To speed up your internet connection +B. To store small pieces of data (like login status or preferences) from websites you visit +C. To block advertisements on web pages +D. To scan websites for viruses before loading them + +**Answer:** B +**Explanation:** Cookies are small text files that websites store on your computer to remember things like your login session, language preferences, or shopping cart contents. They help websites provide a personalized experience across visits. + +## Q5: Top-Level Domains +What does a Top-Level Domain (TLD) like .edu, .gov, or .org indicate about a website? + +A. The speed of the website's server +B. The general category or type of organization that owns the domain +C. The programming language the website was built with +D. The country where the website's users live + +**Answer:** B +**Explanation:** TLDs indicate the type of organization: `.edu` for educational institutions, `.gov` for government agencies, `.org` for organizations (often nonprofits), and `.com` for commercial entities. Country-code TLDs (like `.uk` or `.jp`) indicate the country. + +## Q6: Cloud Service Models +A company uses Gmail for email, Dropbox for file storage, and Zoom for video calls — all through web browsers, with no software installed locally. What type of cloud service model is this? + +A. IaaS (Infrastructure as a Service) +B. PaaS (Platform as a Service) +C. SaaS (Software as a Service) +D. On-premises computing + +**Answer:** C +**Explanation:** SaaS delivers complete applications over the internet that you use through a browser. Gmail, Dropbox, and Zoom are all SaaS products — the provider handles all the infrastructure, and users just log in and use the software. + +## Q7: Phishing Basics +Which of the following is the BEST indicator that an email might be a phishing attempt? + +A. The email includes the company's official logo +B. The email comes from a slightly misspelled domain like "arnazon.com" instead of "amazon.com" +C. The email was received during business hours +D. The email is written in English + +**Answer:** B +**Explanation:** Phishing emails often use domains that look similar to legitimate ones (like "arnazon" vs "amazon"). Always check the actual sender address carefully. Logos can be copied easily, so the presence of a logo doesn't mean the email is legitimate. + +## Q8: HTML/CSS/JS Overview +In web development, what are the roles of HTML, CSS, and JavaScript? + +A. HTML styles the page, CSS adds interactivity, JavaScript provides structure +B. HTML provides structure/content, CSS handles styling/layout, JavaScript adds interactivity/behavior +C. They are three competing languages — you only need to learn one +D. HTML is for mobile sites, CSS is for desktop sites, JavaScript is for apps + +**Answer:** B +**Explanation:** HTML defines the structure and content of a web page (headings, paragraphs, images). CSS controls the visual presentation (colors, fonts, layout). JavaScript adds interactive behavior (dropdown menus, form validation, dynamic content). + +## Q9: Email Etiquette +When is it appropriate to use "Reply All" on an email? + +A. Always — it's the default and should be used for every response +B. Only when your response is relevant to everyone on the original recipient list +C. Never — it's considered rude in all professional settings +D. Only when the email has fewer than 3 recipients + +**Answer:** B +**Explanation:** "Reply All" sends your response to every recipient of the original email. It should only be used when everyone needs to see your reply. Unnecessary Reply All messages clutter inboxes and are a common workplace annoyance. + +## Q10: IMAP vs POP3 +What is the main advantage of IMAP over POP3 for managing email? + +A. IMAP is faster at sending emails +B. IMAP keeps emails on the server, so you can access them from multiple devices and they stay in sync +C. IMAP blocks spam more effectively than POP3 +D. IMAP doesn't require an internet connection + +**Answer:** B +**Explanation:** IMAP (Internet Message Access Protocol) keeps emails on the server and syncs across all your devices. POP3 typically downloads emails to one device and removes them from the server, making multi-device access difficult. diff --git a/content/quizzes/week-5-graded.md b/content/quizzes/week-5-graded.md new file mode 100644 index 0000000..c2bde7d --- /dev/null +++ b/content/quizzes/week-5-graded.md @@ -0,0 +1,111 @@ +# Week 5 Graded Quiz: Security, Scams & Protecting Yourself + +## Q1: AI-Powered Threats +Marcus receives a voicemail from what sounds exactly like his boss, urgently requesting he wire $5,000 to a vendor. The voice, tone, and speech patterns sound perfect. What should Marcus do FIRST? + +A. Wire the money immediately — it sounds just like his boss +B. Reply to the voicemail number and confirm the request +C. Contact his boss directly using a known, trusted phone number (not the one from the voicemail) to verify the request +D. Ignore it — his boss would never call about money + +**Answer:** C +**Explanation:** AI voice cloning can replicate someone's voice with just a few seconds of sample audio. A convincing voicemail is no longer proof of identity. Always verify unusual financial requests through a separate, trusted communication channel. Calling the voicemail number back could connect you to the scammer. + +## Q2: Breach Analysis +In the 2017 Equifax breach, attackers accessed Social Security numbers, birth dates, and addresses of 147 million Americans. Which response by an affected individual would be MOST protective? + +A. Change their Facebook password and move on +B. Freeze their credit with all three bureaus, monitor financial accounts, set up fraud alerts, and consider identity theft protection +C. Delete their email account so hackers can't contact them +D. Stop using the internet entirely + +**Answer:** B +**Explanation:** When SSNs and personal data are exposed, the risk is identity theft — someone opening credit accounts in your name. Credit freezes prevent new accounts from being opened, fraud alerts add verification steps, and monitoring helps catch unauthorized activity quickly. Changing a social media password doesn't address the exposed SSN. + +## Q3: Password Manager Justification +Kai's friend says, "I just use the same password everywhere — I can't remember different ones for 50 accounts." What is the BEST counter-argument? + +A. "You should write each password on a piece of paper and keep it in a drawer" +B. "A password manager generates and stores unique passwords for every account — you only remember one master password" +C. "Just add a number to the end of your password for each site, like password1, password2, password3" +D. "Browsers remember passwords, so you don't need to worry about it at all" + +**Answer:** B +**Explanation:** Password managers (like Bitwarden, 1Password, or KeePass) securely store unique, complex passwords for every account. You only need to remember one strong master password. Reusing passwords means one breach compromises all your accounts. Sequential variations (password1, password2) are easily guessed. + +## Q4: Phishing vs Legitimate +Which email characteristic is the STRONGEST indicator that a message is legitimate rather than phishing? + +A. It has a company logo and professional formatting +B. You initiated the interaction (e.g., you requested a password reset moments ago and immediately received the email) +C. The email says "This is not a scam" in the subject line +D. It doesn't ask for personal information + +**Answer:** B +**Explanation:** Context is the strongest indicator. If you just requested a password reset and immediately receive one from the expected address, that's legitimate. Phishers can easily copy logos and professional formatting. "This is not a scam" is itself suspicious. And some legitimate emails do ask for information (like appointment confirmations). + +## Q5: Malware Scenario +Daniela downloads a free game from an unofficial website. The game works fine, but her computer starts running slowly, and she notices unfamiliar programs in her task manager. What MOST likely happened? + +A. The game is too graphically demanding for her computer +B. The game came bundled with malware (likely a trojan) that installed additional unwanted programs +C. Her internet provider is throttling her connection +D. She needs to restart her computer to complete the game installation + +**Answer:** B +**Explanation:** A trojan disguises itself as legitimate software (like a free game) but carries hidden malware. Unfamiliar programs appearing in the task manager after installing software from an unofficial source is a classic sign of a trojan infection. Always download software from official sources. + +## Q6: Two-Factor Authentication +Why is SMS-based 2FA (receiving a code via text message) considered less secure than an authenticator app (like Google Authenticator)? + +A. Text messages are too slow to receive in time +B. SMS messages can be intercepted through SIM-swapping attacks, where an attacker convinces your carrier to transfer your number to their device +C. Authenticator apps require an internet connection, which is more secure +D. SMS codes use more battery power than authenticator apps + +**Answer:** B +**Explanation:** SIM-swapping is a real attack where criminals social-engineer your phone carrier into transferring your number to a new SIM card, intercepting all your text messages including 2FA codes. Authenticator apps generate codes locally on your device and aren't vulnerable to this attack. SMS-based 2FA is still better than no 2FA, however. + +## Q7: AI Deepfake Detection +A video circulates on social media showing a celebrity endorsing a cryptocurrency investment. Which approach is BEST for determining if it's real? + +A. It looks real and sounds real, so it must be legitimate +B. Check if the celebrity posted it from their verified official accounts, search for news coverage, and look for visual artifacts (unnatural blinking, lip sync issues, odd lighting) +C. Trust it if it has more than 1,000 likes +D. If the video is in high definition, it can't be a deepfake + +**Answer:** B +**Explanation:** Deepfakes can produce convincing video and audio. Verification requires checking multiple sources: was it posted from verified accounts? Do reputable news outlets report it? Are there visual tells (unnatural movement, inconsistent lighting, audio sync issues)? Popularity (likes) doesn't equal legitimacy, and high resolution doesn't prevent deepfakes. + +## Q8: Encryption in Practice +When you see a lock icon and "https://" in your browser's address bar, what is being protected? + +A. The website itself is guaranteed to be trustworthy and virus-free +B. The data traveling between your browser and the website's server is encrypted in transit +C. Your computer's hard drive is encrypted +D. No one can ever see which website you're visiting + +**Answer:** B +**Explanation:** HTTPS encrypts the data in transit between your browser and the server — protecting passwords, credit card numbers, and personal data from interception. It does NOT guarantee the website itself is trustworthy (phishing sites can use HTTPS), and your ISP can still see which domains you visit. + +## Q9: Scam Identification +Tyler receives a text saying: "USPS: Your package cannot be delivered. Delivery fee of $1.95 required. Pay here: bit.ly/usps-fee-pay." He isn't expecting any packages. What is the BEST response? + +A. Pay the $1.95 — it's a small amount and worth it to get his package +B. Click the link to check what package it might be +C. Delete the message — it's a smishing (SMS phishing) attempt designed to steal payment information +D. Reply "STOP" to unsubscribe from USPS notifications + +**Answer:** C +**Explanation:** This is smishing (SMS phishing). USPS doesn't request delivery fees via text with shortened URLs. The small dollar amount is intentional — it seems harmless, but the goal is to capture your credit card information. The link leads to a fake payment page. Don't click, don't reply — just delete. + +## Q10: Comprehensive Security +Which set of practices represents the STRONGEST overall personal security posture? + +A. Using the same strong password everywhere with no 2FA, but updating antivirus weekly +B. Unique passwords via a password manager, 2FA on all important accounts, regular software updates, encrypted backups following the 3-2-1 rule, and skepticism toward unexpected messages +C. Avoiding the internet entirely +D. Using 2FA but never updating software and clicking links freely since 2FA protects everything + +**Answer:** B +**Explanation:** Strong security is layered — no single measure is enough. Unique passwords prevent credential stuffing, 2FA adds a second barrier, updates patch known vulnerabilities, backups protect against ransomware, and skepticism defends against social engineering. Each layer covers weaknesses in the others. diff --git a/content/quizzes/week-5-practice.md b/content/quizzes/week-5-practice.md new file mode 100644 index 0000000..9fb307d --- /dev/null +++ b/content/quizzes/week-5-practice.md @@ -0,0 +1,111 @@ +# Week 5 Practice Quiz: Security, Scams & Protecting Yourself + +## Q1: Authentication Factors +Multi-factor authentication (MFA) requires two or more types of verification. Which combination represents two DIFFERENT authentication factors? + +A. A password and a PIN (both things you know) +B. A password and a fingerprint scan +C. A fingerprint scan and a face scan (both things you are) +D. Two different passwords for the same account + +**Answer:** B +**Explanation:** The three authentication factors are: something you know (password, PIN), something you have (phone, security key), and something you are (fingerprint, face scan). True MFA requires factors from different categories. A password (know) + fingerprint (are) = two different factors. + +## Q2: Types of Malware +What type of malware encrypts your files and demands payment to unlock them? + +A. Spyware +B. Ransomware +C. Adware +D. Worm + +**Answer:** B +**Explanation:** Ransomware encrypts your files (making them inaccessible) and demands a ransom payment — often in cryptocurrency — for the decryption key. It has affected hospitals, schools, governments, and businesses. Regular backups are the best defense. + +## Q3: Password Best Practices +According to current security guidance, which is the BEST password practice? + +A. Use a short, complex password like "X#9k" and change it every 30 days +B. Use a long passphrase with 2FA enabled and a password manager +C. Use the same strong password across all accounts so you only need to remember one +D. Write your passwords on a sticky note attached to your monitor + +**Answer:** B +**Explanation:** Modern security guidance emphasizes length over complexity — a long passphrase (like "correct-horse-battery-staple") is harder to crack than a short complex one. A password manager stores unique passwords for each account, and 2FA adds a second layer of protection. + +## Q4: Phishing Identification +Which of the following is MOST likely a phishing email? + +A. An email from your professor's verified address reminding you about an assignment due date +B. An email from "Arnazon.com" saying your account is suspended and you must click a link immediately to verify your identity +C. A newsletter you subscribed to with an unsubscribe link at the bottom +D. A password reset email you requested 30 seconds ago + +**Answer:** B +**Explanation:** "Arnazon.com" (with an 'r' and 'n' mimicking an 'm') is a spoofed domain designed to look like Amazon. Combined with urgency ("immediately") and a request to click a link to verify your identity, this is classic phishing. Always check the sender's domain carefully. + +## Q5: Encryption Basics +What does encryption do? + +A. Deletes sensitive files so no one can access them +B. Converts data into a coded format that can only be read with the correct decryption key +C. Makes your internet connection faster +D. Compresses files to save storage space + +**Answer:** B +**Explanation:** Encryption scrambles data using mathematical algorithms so that only someone with the correct key can decode it. HTTPS encrypts web traffic, full-disk encryption protects your hard drive if your laptop is stolen, and end-to-end encryption protects messages in transit. + +## Q6: Social Engineering +What is social engineering in the context of cybersecurity? + +A. Building social media platforms +B. Manipulating people psychologically to trick them into giving up confidential information or access +C. Engineering software to be more social and user-friendly +D. Connecting devices on a social network + +**Answer:** B +**Explanation:** Social engineering exploits human psychology rather than technical vulnerabilities. Attackers use trust, urgency, fear, or helpfulness to manipulate people into revealing passwords, clicking malicious links, or granting access. Phishing is one type of social engineering. + +## Q7: Public WiFi Risks +Why should you avoid logging into your bank account while connected to public WiFi at a coffee shop? + +A. Coffee shop WiFi is always too slow for banking +B. Public WiFi is shared and unencrypted — attackers on the same network could potentially intercept your data +C. Banks don't allow connections from public locations +D. Public WiFi automatically saves your password to the router + +**Answer:** B +**Explanation:** Public WiFi networks are typically unencrypted and shared with strangers. An attacker on the same network could use tools to intercept unencrypted traffic (a "man-in-the-middle" attack). If you must use public WiFi for sensitive tasks, use a VPN to encrypt your connection. + +## Q8: Software Updates +Why are software updates important for security? + +A. They change the color scheme to look more modern +B. They patch known security vulnerabilities that attackers could exploit +C. They increase your internet speed +D. They are optional and only add new features + +**Answer:** B +**Explanation:** Software updates frequently include security patches that fix vulnerabilities discovered since the last version. Attackers actively target known, unpatched vulnerabilities. Delaying updates leaves your system exposed to threats that have already been identified and solved. + +## Q9: Data Breach Response +You receive a notification that a company where you have an account has been breached, and your email and password were exposed. What should you do FIRST? + +A. Ignore it — breaches happen all the time and aren't serious +B. Change your password on that account immediately, and on any other accounts where you used the same password +C. Delete your email account entirely +D. Call the police and report the company + +**Answer:** B +**Explanation:** Your first priority is changing the compromised password — and any other accounts using the same password (credential stuffing attacks try leaked passwords on many sites). Also enable 2FA if available, monitor your accounts for suspicious activity, and consider a credit freeze if financial data was involved. + +## Q10: Scam Recognition +Rosa's grandmother receives a phone call from someone crying, claiming to be Rosa, saying she's been arrested and needs $2,000 in gift cards for bail. What type of scam is this? + +A. Tech support scam +B. Impersonation / emergency scam (sometimes called a "grandparent scam") +C. Romance scam +D. Fake job offer + +**Answer:** B +**Explanation:** The "grandparent scam" or emergency impersonation scam exploits family bonds and urgency. The caller pretends to be a loved one (or their "lawyer") in crisis, requesting immediate payment — usually via gift cards or wire transfers, which are untraceable. The defense: hang up and call the real person directly. diff --git a/content/quizzes/week-6-graded.md b/content/quizzes/week-6-graded.md new file mode 100644 index 0000000..5fe575c --- /dev/null +++ b/content/quizzes/week-6-graded.md @@ -0,0 +1,111 @@ +# Week 6 Graded Quiz: AI, Emerging Tech & Information Literacy + +## Q1: AI Tool Limitations +Amara asks ChatGPT for three academic sources on renewable energy policy. It returns three citations with authors, titles, and journal names that look legitimate. What should she do BEFORE using them in her paper? + +A. Use them immediately — AI wouldn't fabricate academic citations +B. Search for each citation in a library database or Google Scholar to verify they actually exist +C. Ask ChatGPT if the citations are real — if it confirms, they're trustworthy +D. Change the author names to avoid plagiarism + +**Answer:** B +**Explanation:** LLMs frequently hallucinate citations — generating plausible-sounding but completely fabricated author names, titles, and journal references. Always verify citations independently. Asking the AI to confirm its own output is unreliable — it will typically reaffirm the fabrication. + +## Q2: Echo Chambers and Filter Bubbles +Kevin only follows political commentators he agrees with on social media, and the algorithm keeps recommending similar content. Over time, he becomes more extreme in his views and can't understand how anyone disagrees. This is an example of: + +A. Digital literacy — he's well-informed because he consumes a lot of content +B. An echo chamber — algorithmic curation reinforces existing beliefs and limits exposure to diverse perspectives +C. Effective research — focusing on one viewpoint helps him go deeper +D. Social engineering — the algorithm is trying to hack his account + +**Answer:** B +**Explanation:** Echo chambers form when algorithms feed you content matching your existing views, creating a feedback loop that reinforces beliefs and reduces exposure to alternative perspectives. This can distort understanding of complex issues. Actively seeking diverse, credible sources is the antidote. + +## Q3: Responsible AI Use +Which scenario represents the BEST use of AI as a tool for a class assignment? + +A. Having the AI write your entire essay, then submitting it +B. Using the AI to brainstorm ideas and outline arguments, then writing the essay yourself in your own words with proper research +C. Asking the AI for the answers to your quiz, then copying them +D. Using the AI to generate a fake citation list to make your bibliography look more impressive + +**Answer:** B +**Explanation:** AI is most valuable as a thinking partner — brainstorming, outlining, explaining concepts, or getting feedback on drafts. The learning happens when YOU do the writing and critical thinking. Using AI to bypass the learning process defeats the purpose of education and violates academic integrity. + +## Q4: Fact-Checking Strategies +A viral social media post claims that a major tech company is giving away free laptops to anyone who shares the post. What is the BEST fact-checking strategy? + +A. Share it quickly before the offer expires — you don't want to miss out +B. Check the company's official website and verified social media accounts; search reputable news sources for confirmation; use fact-checking sites like Snopes or PolitiFact +C. If 10,000 people shared it, it must be real +D. Check the comments — if no one says it's fake, it's probably real + +**Answer:** B +**Explanation:** Viral giveaway posts are almost always scams or engagement bait. Verify with official sources (the company's website, verified accounts), search reputable news outlets, and consult fact-checking sites. Popularity (shares, likes) doesn't indicate truth, and comment sections are unreliable verification. + +## Q5: AI and the Job Market +Which statement BEST describes how AI is affecting the job market? + +A. AI will replace all human jobs within five years +B. AI is automating some tasks within jobs, creating new types of jobs, and making skills like critical thinking, creativity, and AI literacy more valuable +C. AI has no impact on employment — it's just a trend +D. Only programmers need to understand AI; everyone else can ignore it + +**Answer:** B +**Explanation:** AI is transforming work by automating routine tasks (data entry, basic analysis, content generation) while creating demand for new skills (AI training, prompt engineering, AI ethics). Jobs aren't disappearing wholesale — they're changing. Adaptability, critical thinking, and understanding how to work with AI are increasingly important across all fields. + +## Q6: Blockchain Basics +Which statement BEST describes blockchain technology at a basic level? + +A. A type of antivirus software +B. A distributed digital ledger that records transactions across many computers, making records very difficult to alter +C. A social media platform for cryptocurrency investors +D. A faster replacement for WiFi + +**Answer:** B +**Explanation:** A blockchain is a chain of data "blocks" linked together cryptographically, distributed across many computers (nodes). Because no single entity controls it and altering any block would require changing all subsequent blocks across the network, it's highly resistant to tampering. Cryptocurrency is one application; supply chain tracking and digital contracts are others. + +## Q7: Critical Thinking Scenario +A classmate shares an article claiming that 5G cell towers cause health problems. The article is on an unfamiliar website, cites no peer-reviewed research, and includes dramatic language like "EXPOSED" and "what THEY don't want you to know." How should you evaluate this? + +A. Trust it — it sounds like an insider exposé +B. The dramatic language, lack of peer-reviewed sources, anonymous website, and conspiracy framing are all red flags for misinformation — seek credible scientific sources instead +C. It must be true because someone went through the effort of writing a whole article +D. If a search engine shows the article, it must be vetted and accurate + +**Answer:** B +**Explanation:** Credible health claims are supported by peer-reviewed research, published by identifiable experts, and use measured language. Dramatic framing, appeals to hidden knowledge ("what THEY don't want you to know"), and absence of scientific citations are hallmarks of misinformation. Search engines index content without verifying its accuracy. + +## Q8: IoT Security Concerns +Yuki has a smart home with connected cameras, door locks, a thermostat, and a refrigerator — all controlled from her phone. What is the BIGGEST security concern? + +A. Smart devices use too much electricity +B. Each connected device is a potential entry point for hackers — if poorly secured, attackers could access her home network, spy through cameras, or even unlock her doors +C. Smart devices make her WiFi faster +D. IoT devices can't be updated, but that's fine since they don't need security + +**Answer:** B +**Explanation:** Every IoT device on your network is a potential attack surface. Many IoT devices have weak default passwords, receive infrequent security updates, and can be entry points to your entire home network. Secure them with strong, unique passwords, keep firmware updated, and consider putting IoT devices on a separate network. + +## Q9: Reverse Image Search +You see a social media profile with photos of an attractive person claiming to live in your city. You're suspicious it might be a fake profile. What digital literacy tool can help you investigate? + +A. Spell check — run their messages through spell check to see if they're real +B. Reverse image search — upload their photos to Google Images or TinEye to see if the pictures appear on stock photo sites or other profiles +C. Check their follower count — more followers means more legitimate +D. Send them money to see if they're real — a real person would return it + +**Answer:** B +**Explanation:** Reverse image search lets you upload an image and find where else it appears online. Fake profiles (catfishing, romance scams) typically use stolen photos from models, stock photo sites, or other people's social media. If the photo appears on multiple unrelated profiles or stock sites, it's likely fake. + +## Q10: Digital Citizenship +Which action BEST represents responsible digital citizenship? + +A. Sharing every piece of content you see without checking if it's true +B. Using strong passwords, thinking critically about information before sharing it, being respectful online, and understanding that your digital actions have real-world consequences +C. Spending as much time online as possible to stay informed +D. Creating multiple anonymous accounts to say things you wouldn't say in person + +**Answer:** B +**Explanation:** Digital citizenship means engaging with technology responsibly and ethically. This includes protecting yourself (security), evaluating information (literacy), treating others with respect (etiquette), and understanding that your online behavior — posts, comments, shares — creates a permanent record and affects real people. diff --git a/content/quizzes/week-6-practice.md b/content/quizzes/week-6-practice.md new file mode 100644 index 0000000..ba3a1dd --- /dev/null +++ b/content/quizzes/week-6-practice.md @@ -0,0 +1,111 @@ +# Week 6 Practice Quiz: AI, Emerging Tech & Information Literacy + +## Q1: What Is AI? +Which statement BEST describes artificial intelligence (AI)? + +A. Any computer program that runs automatically +B. Technology that enables machines to perform tasks that typically require human intelligence, such as learning, reasoning, and problem-solving +C. A robot that looks and acts exactly like a human +D. A search engine that finds information on the internet + +**Answer:** B +**Explanation:** AI refers to systems designed to perform tasks associated with human intelligence — recognizing speech, making decisions, translating languages, generating text. Not all software is AI, and AI doesn't require a physical robot form. + +## Q2: AI Hallucinations +What does it mean when people say an AI "hallucinates"? + +A. The AI is broken and needs to be rebooted +B. The AI generates confident-sounding information that is factually incorrect or completely made up +C. The AI can see images that don't exist +D. The AI is dreaming while processing data + +**Answer:** B +**Explanation:** AI hallucination refers to when a language model generates text that sounds authoritative and plausible but is factually wrong — inventing citations, statistics, or events that never happened. This is why you should always fact-check AI-generated content. + +## Q3: Machine Learning vs Traditional Programming +How does machine learning differ from traditional programming? + +A. Machine learning doesn't use computers +B. In traditional programming, a human writes explicit rules; in machine learning, the system learns patterns from data +C. Machine learning is always more accurate than traditional programming +D. Traditional programming can't run on modern computers + +**Answer:** B +**Explanation:** In traditional programming, developers write specific rules (if X, then Y). In machine learning, the system is trained on large datasets and learns to identify patterns itself. For example, instead of writing rules to identify spam, you train a model on thousands of spam and non-spam emails. + +## Q4: Misinformation vs Disinformation +What is the key difference between misinformation and disinformation? + +A. Misinformation is online; disinformation is on TV +B. Misinformation is spread without intent to deceive; disinformation is deliberately created to mislead +C. Misinformation is always true; disinformation is always false +D. There is no difference — they are synonyms + +**Answer:** B +**Explanation:** Misinformation is false or inaccurate information shared by people who believe it's true (like forwarding a rumor). Disinformation is deliberately crafted and spread to deceive (like propaganda or intentional hoaxes). The key difference is intent. + +## Q5: IoT (Internet of Things) +Which of the following is an example of an IoT device? + +A. A traditional desktop computer +B. A smart thermostat that adjusts your home's temperature based on your schedule and can be controlled from your phone +C. A printed textbook +D. A USB flash drive + +**Answer:** B +**Explanation:** IoT (Internet of Things) refers to everyday physical objects connected to the internet that can collect data and be controlled remotely. Smart thermostats, fitness trackers, smart speakers, and connected security cameras are all IoT devices. + +## Q6: Academic Integrity and AI +A student uses ChatGPT to generate an entire essay, then submits it as their own work without disclosure. This is: + +A. Fine — using tools is part of being productive +B. A violation of academic integrity, equivalent to plagiarism, unless the instructor explicitly permits it +C. Acceptable as long as the AI's grammar is correct +D. Only a problem if the essay gets a bad grade + +**Answer:** B +**Explanation:** Submitting AI-generated work as your own without disclosure is academically dishonest. It misrepresents who created the work. Some instructors allow AI use with disclosure; others prohibit it. Always check your course's academic integrity policy and ask your instructor when in doubt. + +## Q7: LLM Basics +What does "LLM" stand for in the context of AI tools like ChatGPT? + +A. Logical Learning Machine +B. Large Language Model +C. Linked Library Module +D. Local Learning Memory + +**Answer:** B +**Explanation:** LLM stands for Large Language Model — an AI system trained on vast amounts of text data that can generate, summarize, translate, and analyze text. ChatGPT, Gemini, and Claude are all LLMs. They predict the most likely next words based on patterns in their training data. + +## Q8: Digital Footprint +What is a digital footprint? + +A. The amount of storage space you use on your computer +B. The trail of data you leave behind through your online activities — posts, searches, purchases, location data +C. A footprint-shaped icon used in web design +D. The physical space a computer takes up on your desk + +**Answer:** B +**Explanation:** Your digital footprint includes everything you do online: social media posts, search history, online purchases, app usage, and even metadata (location, timestamps). This data can be permanent and visible to employers, colleges, and others. Managing your digital footprint is an important life skill. + +## Q9: Evaluating AI Output +What is the BEST approach when using AI to help research a topic? + +A. Copy the AI's response directly into your paper — it's always accurate +B. Use the AI's output as a starting point, then verify claims and check cited sources independently +C. Assume the AI is always wrong and ignore its output +D. Ask the AI to confirm its own accuracy — if it says it's correct, trust it + +**Answer:** B +**Explanation:** AI tools are useful for brainstorming, drafting, and exploring topics, but they can hallucinate facts and fabricate sources. Always verify key claims against reliable sources. And never ask an AI to confirm its own accuracy — it will confidently affirm incorrect information. + +## Q10: Algorithmic Bias +What is algorithmic bias? + +A. When a computer runs too slowly because of a programming error +B. When an AI system produces unfair or discriminatory outcomes because of biased training data or flawed design +C. When users prefer one search engine over another +D. When a website loads differently on different browsers + +**Answer:** B +**Explanation:** Algorithmic bias occurs when AI systems reflect or amplify biases present in their training data or design. For example, a hiring AI trained mostly on data from male applicants might unfairly disadvantage female candidates. Recognizing and addressing bias is a critical challenge in AI development. diff --git a/content/rubrics/all-rubrics.md b/content/rubrics/all-rubrics.md new file mode 100644 index 0000000..63af2b1 --- /dev/null +++ b/content/rubrics/all-rubrics.md @@ -0,0 +1,278 @@ +# CSIS 1 — Assignment Rubrics (Summer 2026) + +All Real-World Task assignments use a 4-level rubric: **Excellent (100%) / Good (80%) / Needs Work (60%) / Missing (0%)** + +Every assignment includes a **Reflection** component worth 25% of the grade. This is the metacognitive piece — it's not optional filler. + +--- + +## Week 1: Tech Self-Audit + Risk Assessment + +*List your devices/platforms, define 3 new terms, describe a digital citizenship example.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | All three sections present: device/platform inventory, 3 term definitions, and digital citizenship example (100–150 words). Nothing missing. | +| **Good** | All three sections attempted, but one is thin — e.g., only lists 2 devices, or citizenship example is under 100 words. | +| **Needs Work** | One entire section missing, or two sections are too brief to be useful. | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Term definitions are correct and in the student's own words (not copy-pasted). Digital citizenship example shows real understanding of what responsible online behavior looks like. | +| **Good** | Definitions are mostly correct but one may be vague or slightly off. Citizenship example is reasonable but generic. | +| **Needs Work** | One or more definitions are wrong or clearly copied from a glossary without understanding. Citizenship example is too vague to show comprehension. | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Document uses clear headings for each section. Easy to read. Proper spelling/grammar (doesn't need to be perfect — just clear). Submitted as .docx or PDF. | +| **Good** | Organized but headings are missing or inconsistent. Minor formatting issues. | +| **Needs Work** | Wall of text with no structure. Hard to tell where one section ends and another begins. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part of this assignment? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Genuine, specific reflection (3–5 sentences). Names a specific challenge ("I didn't know what 'digital citizenship' meant and had to look it up three times") and a concrete takeaway. | +| **Good** | Reflection is present and honest but stays general ("the definitions were hard"). | +| **Needs Work** | One sentence or clearly phoned in ("nothing was hard"). | +| **Missing** | No reflection included. | + +--- + +## Week 2: Professional Document Build + +*Create a formatted document (resume or business letter) + a personal budget spreadsheet with formulas and a chart.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Both parts submitted: (1) a resume OR business letter with all required elements, and (2) a budget spreadsheet with at least 5 line items, working formulas (SUM at minimum), and a chart. | +| **Good** | Both parts present, but one is missing a required element — e.g., spreadsheet has no chart, or resume is missing a section like Skills. | +| **Needs Work** | Only one of the two parts submitted, or both are incomplete (e.g., spreadsheet with no formulas, document with no formatting). | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Document formatting is professional — appropriate font, consistent headings, aligned content. Spreadsheet formulas actually work and produce correct results. Chart accurately represents the data. Budget categories make sense. | +| **Good** | Document looks reasonable but has minor formatting inconsistencies. Formulas work but may be overly simple (e.g., only one SUM). Chart is present but doesn't clearly match the data. | +| **Needs Work** | Document formatting is messy or unprofessional. Formulas are broken or missing. Chart is unrelated to the data or unreadable. | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Resume/letter looks like something you'd actually send to an employer — clean, polished, no typos in key areas. Spreadsheet is organized with labeled columns and a clear chart title. Both files are properly named (include your name). | +| **Good** | Mostly professional but a few rough spots — misaligned text, unlabeled chart axes, generic file name like "Document1.docx". | +| **Needs Work** | Looks like a rough draft. Multiple formatting problems, hard to read, or unprofessional appearance. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Specific reflection on the process — names which part was harder (document vs. spreadsheet), what specific skill they struggled with (e.g., "getting the chart to show the right data range"), and what they'd change. | +| **Good** | Honest reflection but stays at a surface level ("the spreadsheet was harder than the document"). | +| **Needs Work** | One sentence or generic ("it was fine"). | +| **Missing** | No reflection included. | + +--- + +## Week 3: Presentation Project + +*Create a short presentation (8–12 slides) on a topic of your choice.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | 8–12 slides covering: title slide, introduction, at least 4 content slides with information, a conclusion or summary slide. Includes at least 2 images/graphics and speaker notes on at least 3 slides. | +| **Good** | Meets the slide count but missing one element — e.g., no speaker notes, or only 1 image, or no clear conclusion. | +| **Needs Work** | Under 8 slides, or slides are mostly blank/placeholder text. Missing multiple required elements. | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Content is factually correct and shows the student actually researched or knows the topic. Information is organized logically — each slide builds on the last. Speaker notes show what the student would actually say during a presentation (not just repeating slide text). | +| **Good** | Content is mostly accurate. Organization makes sense but could flow better. Speaker notes are present but thin. | +| **Needs Work** | Contains factual errors, or slides are disorganized (jumping between unrelated points). No speaker notes, or notes are copy-pasted from slides. | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Slides are visually clean — consistent color scheme, readable fonts (not 8pt text walls), good use of whitespace. Images are relevant and not blurry/stretched. Text is concise (bullet points, not paragraphs). Looks like a real presentation, not a Word doc crammed into slides. | +| **Good** | Generally readable but has some design issues — inconsistent fonts, one or two text-heavy slides, or a cluttered layout. | +| **Needs Work** | Hard to read. Walls of text on slides, clashing colors, stretched/irrelevant images, or default template with no customization. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Reflects on specific presentation design choices — why they picked that topic, what they struggled with visually or structurally, what they'd improve if they presented it for real. | +| **Good** | Honest but general ("picking a topic was hard" without explaining why). | +| **Needs Work** | One sentence or generic. | +| **Missing** | No reflection included. | + +--- + +## Week 4: Website Credibility Evaluation + +*Evaluate 3 websites for credibility — explain your reasoning.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Three distinct websites evaluated. For each: the URL, a description of what the site claims, a credibility verdict (trustworthy, questionable, unreliable), and a clear explanation of *why*. At least one site should be questionable or unreliable — evaluating three obviously trustworthy sites (Wikipedia, BBC, NASA) doesn't demonstrate critical thinking. | +| **Good** | Three sites evaluated but one analysis is thin (verdict without explanation), or all three sites are clearly trustworthy with no challenge. | +| **Needs Work** | Fewer than 3 sites, or evaluations are just "this site looks good" / "this site looks bad" without reasoning. | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Credibility reasoning uses specific criteria from the course material — author credentials, domain type, date, sourcing, bias indicators, cross-referencing with other sources. Verdicts are well-supported. Student can articulate *why* a site is or isn't trustworthy beyond gut feeling. | +| **Good** | Uses some credibility criteria but relies heavily on one factor (e.g., only looks at domain type) or reasoning is correct but shallow. | +| **Needs Work** | Reasoning is based on appearance only ("the site looks professional") or contradicts the evidence. | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Well-organized — each website clearly separated with its own heading or section. URLs are included and clickable. Writing is clear and easy to follow. | +| **Good** | Organized but could be cleaner — maybe URLs are missing or sections run together. | +| **Needs Work** | Disorganized. Hard to tell which analysis goes with which website. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Reflects on how this exercise changed their thinking — maybe they realized they usually trust sites without checking, or they found it harder than expected to tell trustworthy from untrustworthy. Specific and honest. | +| **Good** | Some reflection but stays surface-level ("I learned to check sources"). | +| **Needs Work** | One sentence or generic. | +| **Missing** | No reflection included. | + +--- + +## Week 5: Security Audit + Scam Analysis + +*Evaluate your own digital security and create an action plan. Analyze 5 real scam examples.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Two complete parts: (1) Personal security audit — reviews password habits, 2FA status, privacy settings on at least 2 accounts, and software update status. Includes a concrete action plan with at least 3 specific steps. (2) Scam analysis — identifies 5 real scam examples (phishing emails, fake texts, social media scams, etc.) with a brief description and red flags for each. | +| **Good** | Both parts present but one is light — e.g., action plan has only 1–2 steps, or only 3–4 scam examples analyzed. | +| **Needs Work** | One entire part missing, or both parts are too brief to be meaningful. | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Security assessment is honest and specific (not "my passwords are fine" when they're the same one everywhere). Action plan steps are realistic and actionable ("enable 2FA on my email account this week" not "be more secure"). Scam red flags are correctly identified — student can explain *why* something is a scam, not just label it as one. | +| **Good** | Assessment is reasonable but vague in places. Action plan is present but some steps are too general. Scam analysis correctly identifies scams but explanations of red flags are thin. | +| **Needs Work** | Assessment doesn't show real self-evaluation. Action plan is wishful thinking. Scam examples are mislabeled or red flags are incorrect. | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Clear separation between the two parts. Security audit uses a structured format (checklist or table works well). Scam examples are numbered or sectioned. Screenshots welcome but not required — if included, sensitive info is blurred. | +| **Good** | Organized enough to follow but could benefit from better structure. | +| **Needs Work** | Both parts blended together. Hard to distinguish security audit from scam analysis. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Reflects on what surprised them about their own security habits ("I didn't realize I reuse the same password on 12 sites") or what they learned from analyzing scams ("the phishing email looked way more legit than I expected"). Specific and honest about what they'll actually change. | +| **Good** | Reflection present but general ("I learned security is important"). | +| **Needs Work** | One sentence or generic. | +| **Missing** | No reflection included. | + +--- + +## Week 6: AI Fact-Check Report + +*Use an AI tool to research a topic, then fact-check its output. Write up what it got right and wrong.* + +### Completeness (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | All parts present: (1) The topic and the AI tool used. (2) The AI's response (screenshot or copy-paste). (3) Fact-check results — at least 3 specific claims checked against real sources, with sources cited. (4) A verdict: what the AI got right, what it got wrong or made up, and what was misleading even if technically true. | +| **Good** | All parts attempted but fact-checking is light — only 1–2 claims verified, or sources aren't cited. | +| **Needs Work** | Missing the AI's original response, or "fact-check" is just "it seemed right" without actually verifying anything. | +| **Missing** | Not submitted. | + +### Accuracy (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Fact-checking is thorough and honest. Student found real sources (not just other AI tools) to verify claims. Correctly identifies errors, fabrications, or misleading statements. Doesn't just confirm — actually looks for what might be wrong. If the AI was accurate, student explains how they verified that. | +| **Good** | Fact-checking is correct but only surface-level — checked obvious claims, didn't dig into nuanced or harder-to-verify statements. | +| **Needs Work** | "Fact-check" is just agreeing with the AI without real verification, or student misidentifies correct info as wrong (or vice versa). | +| **Missing** | Not submitted. | + +### Presentation (25%) + +| Level | Criteria | +|---|---| +| **Excellent** | Clear structure: the AI's claims are listed, each with a fact-check verdict and source. Easy to follow the comparison between what AI said vs. what's actually true. Sources are specific (links or publication names, not just "I Googled it"). | +| **Good** | Organized but sources are vague, or the comparison between AI output and fact-check isn't clearly laid out. | +| **Needs Work** | Disorganized, no clear structure, or no sources cited. | +| **Missing** | Not submitted. | + +### Reflection (25%) + +*"What was the hardest part? What would you do differently?"* + +| Level | Criteria | +|---|---| +| **Excellent** | Reflects on how this changed their relationship with AI tools — are they more skeptical now? Less? What surprised them? What would they do differently next time they use ChatGPT/Gemini/etc. for anything? Connects to real future behavior, not abstract principles. | +| **Good** | Some reflection but generic ("AI isn't always right"). | +| **Needs Work** | One sentence or clearly not thought through. | +| **Missing** | No reflection included. | + +--- + +## Grading Notes for All Assignments + +- **Reflection is 25% of every assignment.** This is intentional. Students who think about their own learning process perform better on assessments. Take it seriously. +- **"Excellent" doesn't mean perfect.** It means complete, thoughtful, and showing genuine effort. A student with a few typos but a great reflection gets Excellent. +- **"Missing" means zero, not "I'll accept it late."** Late policy is separate from the rubric. +- **Specific > generic, always.** The difference between Good and Excellent is almost always specificity. "I learned a lot" is Good. "I didn't know what phishing was and now I check sender addresses on every email" is Excellent.