Google Doc URL: https://goo.gl/IvCgtW
This book is freely redistributable for non-commercial use, with thanks to James M. Fiore via http://dissidents.com/books.htm.
For students having trouble signing into Chrome with their DSBN account, enter this address directly into the Chrome address bar and you should be able to sign in properly:
Why sign into Chrome?
It will sync your bookmarks and Chrome extensions so wherever you are logged into Chrome (other classes, at home, on your laptop) everything will be sync’d.
When installing/removing computer hardware and other peripherals:
- Wear proper apparel. Avoid acrylic or wool sweaters when working with electronic parts. Do not wear loose fitting clothing, rings, bracelets etc.
- Unplug all computer equipment and peripherals before opening any covering cases.
- Keep your work area clean and well lit.
- Check for damaged parts.
- Do not force components into computer ports.
- Use an anti-static wrist strap or discharge yourself by touching a grounded metal object such as a computer casing.
- Power supplies produce several levels of voltage. Read the information on the power supply carefully and make sure that the power supply you are using is appropriate for the application.
- Replace all cases or coverings after inspections or installations.
- Check all circuits and installations with the instructor before power is applied.
- Retain all screws during disassembly in containers such as film canisters for proper reassembly.
- Electronic components should never become hot. Hot components means that there is a problem with the circuit. Disconnect any power immediately.
The most important safety rule of all: Always Be Careful! (ABC)
(from ICE4M Supplemental Profile Unit 1, Appendix 1.1.1)
(image from https://pixabay.com/p-624558/?no_redirect)
|Color||Digit value||Multiplier||Multiplied Out||Tolerance|
See also http://www.eeweb.com/toolbox/4-band-resistor-calculator for an online resistance calculator.
This design process model is based on the Ontario 2008 Technological Education curriculum.
From the curriculum:
“Although processes such as this involve a framework of sequential steps, they are typically iterative processes that may require a retracing of steps, diversions to solve specific problems along the way, or even a return to the start of the process if it becomes clear that the situation needs to be clarified and the problem redefined. Problem solvers soon discover that the process calls for an open mind, the freedom to be creative, and a great deal of patience and persistence.”
The graphic above is based on one created by Jackie Griffith. Thanks to Jackie for allowing me to adapt it.
Click here to take a comical look at the design process!
What is a “Professional Use” Email Account?
A professional use email account is one that you would not be embarrassed to use with your employer or with the public. It must also be an accurate representation of your full name, not a nickname. Also, it must be an email address that is not related to your ISP (Internet Service Provider). Good, permanent email hosts are Gmail, Hotmail, or Yahoo. My own preference is Gmail because it integrates with tools like Picasa, Google Drive and Docs, the Google Group we may be using in this class, Google Keep, and other products.
Class Email Protocol
Be sure to include the course code in the subject line as well as some indication of what the subject is. Do not leave the subject line blank. An appropriate subject for this assignment would be:
TGJ2O Email Assignment
When replying, please include any previous dialog we have already had.
Send me (firstname.lastname@example.org) an email from your “permanent and professional use” email account. In it, please tell me:
- why you took this course,
- what you are hoping to do in this course,
- whether or not you are pursuing a career related to this course,
- what background you have in this subject (hobbies, previous courses), and
- what mark you hope to get.
(It might help to copy-and-paste the questions into your email.)
Note: be sure to read the Class Email Protocol above so you know what is expected in the subject line.
After I receive your email, I will send a quick reply so you are added to my address book.
In the spirit of yesterday’s Safer Internet Day…
I often get asked which is better — Gmail or Hotmail (or its derivative outlook). The answer for me is so easy: Gmail, and one of the reasons is because it handles phishing attempts so much better than Hotmail.
I only log into my Hotmail account once a month or so, just to keep it alive. This time, there were approximately 20 emails in my inbox. A few were legitimate security alerts created by my Google account, a few were from Microsoft trying to sell me something or other, but the rest (over half) were phishing attempts — bogus emails attempting to get me to click a link where they would prompt me to reveal private details such as account numbers or passwords. Continue reading “Let’s Go Phishing!”