Difference between revisions of "AY Honors/Computing IV - Advanced/Requirements"

From Pathfinder Wiki
< AY Honors‎ | Computing IV - AdvancedAY Honors/Computing IV - Advanced/Requirements
(Bot: Automated import of articles *** existing text overwritten ***)
m (- Category of Honor Requirements)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{HonorSubpage}}
 
{{HonorSubpage}}
 
 
  
 
<section begin=Body />
 
<section begin=Body />
  
 
+
<b>1. <section begin=req1 /><noinclude><translate><!--T:1-->
<b>1. <section begin=req1 /><noinclude><translate></noinclude>Have the Computing III - Regular honor.  
+
</noinclude>Have the Computing III - Regular honor.
 
<noinclude></translate></noinclude><section end=req1 /></b>
 
<noinclude></translate></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude><translate></noinclude>Submit a report of at least 2000 words about fourth generation computers.  
+
<b>2. <section begin=req2 /><noinclude><translate><!--T:2-->
 +
</noinclude>Submit a report of at least 2000 words about fourth generation computers.
 
<noinclude></translate></noinclude><section end=req2 /></b>
 
<noinclude></translate></noinclude><section end=req2 /></b>
  
<b>3. <section begin=req3 /><noinclude><translate></noinclude>Define the following terms:  
+
<b>3. <section begin=req3 /><noinclude><translate><!--T:3-->
 +
</noinclude>Define the following terms:
 
<noinclude></translate></noinclude><section end=req3 /></b>
 
<noinclude></translate></noinclude><section end=req3 /></b>
  
:<b>a. <section begin=req3a /><noinclude><translate></noinclude>Bit  
+
:<b>a. <section begin=req3a /><noinclude><translate><!--T:4-->
 +
</noinclude>Bit
 
<noinclude></translate></noinclude><section end=req3a /></b>
 
<noinclude></translate></noinclude><section end=req3a /></b>
  
:<b>b. <section begin=req3b /><noinclude><translate></noinclude>Kilobyte  
+
:<b>b. <section begin=req3b /><noinclude><translate><!--T:5-->
 +
</noinclude>Kilobyte
 
<noinclude></translate></noinclude><section end=req3b /></b>
 
<noinclude></translate></noinclude><section end=req3b /></b>
  
:<b>c. <section begin=req3c /><noinclude><translate></noinclude>Megabyte  
+
:<b>c. <section begin=req3c /><noinclude><translate><!--T:6-->
 +
</noinclude>Megabyte
 
<noinclude></translate></noinclude><section end=req3c /></b>
 
<noinclude></translate></noinclude><section end=req3c /></b>
  
:<b>d. <section begin=req3d /><noinclude><translate></noinclude>Gigabyte  
+
:<b>d. <section begin=req3d /><noinclude><translate><!--T:7-->
 +
</noinclude>Gigabyte
 
<noinclude></translate></noinclude><section end=req3d /></b>
 
<noinclude></translate></noinclude><section end=req3d /></b>
  
:<b>e. <section begin=req3e /><noinclude><translate></noinclude>Terabyte  
+
:<b>e. <section begin=req3e /><noinclude><translate><!--T:8-->
 +
</noinclude>Terabyte
 
<noinclude></translate></noinclude><section end=req3e /></b>
 
<noinclude></translate></noinclude><section end=req3e /></b>
  
<b>4. <section begin=req4 /><noinclude><translate></noinclude>What are viruses? How can we be safe from them?  
+
<b>4. <section begin=req4 /><noinclude><translate><!--T:9-->
 +
</noinclude>What are viruses? How can we be safe from them?
 
<noinclude></translate></noinclude><section end=req4 /></b>
 
<noinclude></translate></noinclude><section end=req4 /></b>
  
<b>5. <section begin=req5 /><noinclude><translate></noinclude>Describe in detail three famous viruses and the havoc they cause to a computer.  
+
<b>5. <section begin=req5 /><noinclude><translate><!--T:10-->
 +
</noinclude>Describe in detail three famous viruses and the havoc they cause to a computer.
 
<noinclude></translate></noinclude><section end=req5 /></b>
 
<noinclude></translate></noinclude><section end=req5 /></b>
  
<b>6. <section begin=req6 /><noinclude><translate></noinclude>What is the Internet? How can it influence us in modern life?  
+
<b>6. <section begin=req6 /><noinclude><translate><!--T:11-->
 +
</noinclude>What is the Internet? How can it influence us in modern life?
 
<noinclude></translate></noinclude><section end=req6 /></b>
 
<noinclude></translate></noinclude><section end=req6 /></b>
  
<b>7. <section begin=req7 /><noinclude><translate></noinclude>Enter and describe the content of five educational sites on the Internet. Submit a one-page report about what was learned in each of the sites.  
+
<b>7. <section begin=req7 /><noinclude><translate><!--T:12-->
 +
</noinclude>Enter and describe the content of five educational sites on the Internet. Submit a one-page report about what was learned in each of the sites.
 
<noinclude></translate></noinclude><section end=req7 /></b>
 
<noinclude></translate></noinclude><section end=req7 /></b>
  
<b>8. <section begin=req8 /><noinclude><translate></noinclude>Log as an agenda the data of at least 25 people with a database and submit a report that contains the name, address, telephone number, and email address of each person.  
+
<b>8. <section begin=req8 /><noinclude><translate><!--T:13-->
 +
</noinclude>Log as an agenda the data of at least 25 people with a database and submit a report that contains the name, address, telephone number, and email address of each person.
 
<noinclude></translate></noinclude><section end=req8 /></b>
 
<noinclude></translate></noinclude><section end=req8 /></b>
  
<b>9. <section begin=req9 /><noinclude><translate></noinclude>Research in specialized magazines and submit a two-page report on what the Y2K bug was.  
+
<b>9. <section begin=req9 /><noinclude><translate><!--T:14-->
 +
</noinclude>Research in specialized magazines and submit a two-page report on what the Y2K bug was.
 
<noinclude></translate></noinclude><section end=req9 /></b>
 
<noinclude></translate></noinclude><section end=req9 /></b>
  
<b>10. <section begin=req10 /><noinclude><translate></noinclude>Describe the function of the following equipment:  
+
<b>10. <section begin=req10 /><noinclude><translate><!--T:15-->
 +
</noinclude>Describe the function of the following equipment:
 
<noinclude></translate></noinclude><section end=req10 /></b>
 
<noinclude></translate></noinclude><section end=req10 /></b>
  
:<b>a. <section begin=req10a /><noinclude><translate></noinclude>Keyboard  
+
:<b>a. <section begin=req10a /><noinclude><translate><!--T:16-->
 +
</noinclude>Keyboard
 
<noinclude></translate></noinclude><section end=req10a /></b>
 
<noinclude></translate></noinclude><section end=req10a /></b>
  
:<b>b. <section begin=req10b /><noinclude><translate></noinclude>Monitor  
+
:<b>b. <section begin=req10b /><noinclude><translate><!--T:17-->
 +
</noinclude>Monitor
 
<noinclude></translate></noinclude><section end=req10b /></b>
 
<noinclude></translate></noinclude><section end=req10b /></b>
  
:<b>c. <section begin=req10c /><noinclude><translate></noinclude>Printer  
+
:<b>c. <section begin=req10c /><noinclude><translate><!--T:18-->
 +
</noinclude>Printer
 
<noinclude></translate></noinclude><section end=req10c /></b>
 
<noinclude></translate></noinclude><section end=req10c /></b>
  
:<b>d. <section begin=req10d /><noinclude><translate></noinclude>Driver  
+
:<b>d. <section begin=req10d /><noinclude><translate><!--T:19-->
 +
</noinclude>Driver
 
<noinclude></translate></noinclude><section end=req10d /></b>
 
<noinclude></translate></noinclude><section end=req10d /></b>
  
:<b>e. <section begin=req10e /><noinclude><translate></noinclude>CPU  
+
:<b>e. <section begin=req10e /><noinclude><translate><!--T:20-->
 +
</noinclude>CPU
 
<noinclude></translate></noinclude><section end=req10e /></b>
 
<noinclude></translate></noinclude><section end=req10e /></b>
  
:<b>f. <section begin=req10f /><noinclude><translate></noinclude>Cables  
+
:<b>f. <section begin=req10f /><noinclude><translate><!--T:21-->
 +
</noinclude>Cables
 
<noinclude></translate></noinclude><section end=req10f /></b>
 
<noinclude></translate></noinclude><section end=req10f /></b>
  
:<b>g. <section begin=req10g /><noinclude><translate></noinclude>Modem  
+
:<b>g. <section begin=req10g /><noinclude><translate><!--T:22-->
 +
</noinclude>Modem
 
<noinclude></translate></noinclude><section end=req10g /></b>
 
<noinclude></translate></noinclude><section end=req10g /></b>
  
:<b>h. <section begin=req10h /><noinclude><translate></noinclude>CD/DVD ROM  
+
:<b>h. <section begin=req10h /><noinclude><translate><!--T:23-->
 +
</noinclude>CD/DVD ROM
 
<noinclude></translate></noinclude><section end=req10h /></b>
 
<noinclude></translate></noinclude><section end=req10h /></b>
  
 
<section begin=challenge />
 
<section begin=challenge />
<b>11. <section begin=req11 /><noinclude><translate></noinclude>Teach the honor of Computing I to a regular class.  
+
<b>11. <section begin=req11 /><noinclude><translate><!--T:24-->
 +
</noinclude>Teach the honor of Computing I to a regular class.
 
<noinclude></translate></noinclude><section end=req11 /></b>
 
<noinclude></translate></noinclude><section end=req11 /></b>
 
<section end=challenge />
 
<section end=challenge />
 
<section end=Body />
 
<section end=Body />
 
<noinclude><translate>
 
[[Category:Honor Requirements|{{#titleparts:{{PAGENAME}}|1|2}}]]
 
[[Category:Honor Requirements Revision 3|{{#titleparts:{{PAGENAME}}|1|2}}]]
 
<noinclude></translate></noinclude>
 

Latest revision as of 21:40, 20 July 2022

Other languages:
English • ‎español • ‎português do Brasil
Computing IV - Advanced

Skill Level

3

Year

2012

Version

10.05.2024

Approval authority

South American Division

Computation IV - Advanced AY Honor.png
Computing IV - Advanced
Vocational
Skill Level
123
Approval authority
South American Division
Year of Introduction
2012
See also



1. Have the Computing III - Regular honor.

2. Submit a report of at least 2000 words about fourth generation computers.

3. Define the following terms:

a. Bit

b. Kilobyte

c. Megabyte

d. Gigabyte

e. Terabyte

4. What are viruses? How can we be safe from them?

5. Describe in detail three famous viruses and the havoc they cause to a computer.

6. What is the Internet? How can it influence us in modern life?

7. Enter and describe the content of five educational sites on the Internet. Submit a one-page report about what was learned in each of the sites.

8. Log as an agenda the data of at least 25 people with a database and submit a report that contains the name, address, telephone number, and email address of each person.

9. Research in specialized magazines and submit a two-page report on what the Y2K bug was.

10. Describe the function of the following equipment:

a. Keyboard

b. Monitor

c. Printer

d. Driver

e. CPU

f. Cables

g. Modem

h. CD/DVD ROM


11. Teach the honor of Computing I to a regular class.