Psychologist Eric Byrne lays out a series of painful relationship games in his seminal book, “Games People Play.” Let’s You and Him Fight is among the more famous. A character who wants to start a fight says to one potential “dance” partner, “Are you gonna take that from him?” Then says something similarly meddlesome to the other party. Then sits back and admires the chaos he or she has started. You probably have a friend like this.
The technique sounds charming in that form — which Byrne points out is copied over and over in the world of fiction. But it’s also used by dictatorial regimes to suppress speech. Want to crack down on a peaceful demonstration? Hire a few thugs to make their way into the middle and start pushing people around. It never fails. Someone overreacts. Then someone over-over-reacts. Then a big brawl brakes out and “peacekeepers” seem justified in the use of tear gas. Or, hatred is stoked on both sides, creating social chaos that wears down the enemy.
--------
They’ve won many of the early battles in this war. They started small, tricking you by changing half-gallon boxes of ice cream into 56 ounce boxes. But that was child’s play. Now, they track your every computer click and notice you often fly to Florida in winter, so they charge you more for your plane ticket. They send you important notices in letters designed to be misplaced and discarded; they send email bills in the middle of the night so you miss them and they can charge a late fee. They know which colors make you buy, they know what music makes you leave, they recognize your cellphone when you walk by their stores.
-Bob Sullivan
--------
Advertising news
"Nearly all the shows on the fall schedule will attract a disproportionate number of viewers too old for the demographics that advertisers covet. The median age of the audience that tuned in to last season's highest-rated freshman drama, 'The Good Doctor,' was 60.8 years old, or nearly 12 years beyond the upper limit of ABC's target demo."
MARKETING
Obj 1 Test pushed to Friday
Explore the other car sales in the
US and Foreign markets
Let's play with the numbers
Look - http://carsalesbase.com/us-car-sales-analysis-2018-q2-premium-mid-sized-segment/
Look - http://carsalesbase.com/us-car-sales-analysis-2018-q2-premium-mid-sized-suv-segment/
Compare - https://www.cargurus.com/Cars/compare/BMW-X3-vs-BMW-X4_d392_d2271
Let's play with the numbers
Look - http://carsalesbase.com/us-car-sales-analysis-2018-q2-premium-mid-sized-segment/
Look - http://carsalesbase.com/us-car-sales-analysis-2018-q2-premium-mid-sized-suv-segment/
Compare - https://www.cargurus.com/Cars/compare/BMW-X3-vs-BMW-X4_d392_d2271
What data is monitored for marketing decision making?
What Marketing Careers could you be interested in?
1.02 Employment opportunities in Marketing [5-7]
a. Identify types of businesses that offer careers in marketing.
b. Contrast marketing careers with careers in medicine.
c. Explain why jobs in marketing provide career potential.
d. Describe the following marketing careers:
- Marketing research
- Advertising
- Product management
- Distribution/Warehousing
- Sales
- Retailing
- Service marketing
- Customer service
- Public relations
Obj 1 Study Guide (can be used on the test if filled out)
-----------------
2.01 Selling
EQ Have you ever purchased anything? Did the salesperson assist you in your purchasing decision?
Have you ever had bad service? Was the bad experience related to a salesperson? Briefly explain your negative experience.
Vocab 2.01 - Sept 26
CCPI.GTCC.EDU
Middle and Early Colleges of GCS
GAPNC.org
NCVPS.org
Powerpoint:
2.01 Nature and Scope of Selling [5-21]
a. Define the term selling.
b. Identify individuals, groups, or agencies that sell.
c. Explain reasons that customers buy goods and services.
d. Identify types of items that are sold.
e. Explain where selling occurs.
f. Describe how products are sold.
g. Describe the role of selling in a market economy.
h. Explain personal characteristics of salespeople that are essential to selling.
AP COMPUTER SCIENCE PRINCIPLES
Note the reopening of the Unit 1, Chapter 1 assessment - best you look over in your spare time.
Ask me - will only open for 24 hours at a time
Check out the calendar for the Unit 1, chapter 2 assessment coming up next week.
https://studio.code.org/s/express-2018
Ask me - will only open for 24 hours at a time
Check out the calendar for the Unit 1, chapter 2 assessment coming up next week.
https://studio.code.org/s/express-2018
Vocab - unit 2 - Sept 21
-----------------------------
Bonus :
------------------------------------
1.12 Need for DNS
- Activity 2
- Rapid Research: DNS and DDoS attacks
- Worksheet - Read and report
- Articles ListGrowing Threat of DDoS on DNSThe Details Behind a Denial of Service Attack: What it is, Why it Matters, and What You can do to Stop itHow to Launch a 65Gbps DDoS, and How to Stop OneHow DNS Workshttp://www.pcworld.com/article/2889392/like-google-in-vietnam-lenovo-tripped-up-by-a-dns-attack.htmlDDoS Attacks Against NATO Likely DNS Amplification or NTP Reflection, Expert SuggestsDNS Flood DDoS Attack Hit Video Gaming Industry with 90 Million Requests per SecondSt. Louis Federal Reserve Suffers DNS BreachChina Great Firewall Causing DDoS AttacksTurkish ISPs Intercept Google DNS Service to Spy on Internet UsersDDoS Attacks Double But Could go Bigger Still With IPv6New Zealand Internet Providers Threatened with Legal Action for Providing Access to US Netflix
- Wrap-up
- What is DNS?
- Why does the Internet use IP addresses?
- Why don’t we need to know IP addresses?
- Why do we need a Domain Name System?
- Why don’t we all maintain our own DNS?
- Is there one big DNS for the entire Internet?
- How do you think all these DNS Servers are maintained?
Security
What is one vulnerability of DNS and how is that vulnerability attacked?
What are the implications of an attack on a DNS server (or servers) - how does this affect your life?
- Assessment
- Code Studio: Assessment questions are available on the Code Studio
- Extended Learning
Due Friday by 8pm est - no late assignments will be accepted - send to murphyk2@gcsnc.com:
Dive Deeper on DNS: Check out this article. It provides a deeper look into the DNS and what one sees when communicating with the DNS from the command prompt or terminal. Give me you impressions, your fears, your actions on what you will now do with this information. 1 well written paragraph will be enough. Leave no doubt you read the article---------------------------
1.13: HTTP and Abstraction on the Internet
Objectives
Explain how layers of protocols allow the Internet to function.
Use developer tools in a modern browser to explore the HTTP traffic associated with visiting common websites.
Identify abstractions used in the development of Internet protocols.
Describe how a protocol or layer of the internet acts as an "abstraction" for other layers.
Vocabulary
DNS - The service that translates URLs to IP addresses.
HTTP - HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
IP Address - A number assigned to any item that is connected to the Internet.
TCP - Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
URL - An easy-to-remember address for calling a web page (like www.code.org).
-----
- Getting Started (15 mins)
The Internet Protocol Stack
-We want to think of the protocols as working in "layers".
-This picture here (also on first 2 pages of HTTP and Abstraction on the Internet - Resource) is a simplified version of what's known as the "Internet Protocol Stack." We've studied each layer separately but now you can begin to see how they work together.
- Activity (25 mins)
- -HTTP is an ASCII text based protocol.
- -It's somewhat remarkable to note that many "high level" protocols, like HTTP, are just computers sending ASCII text messages back and forth. Each protocol simply defines the rules of the "conversation" between two machines.
- -In the case of HTTP it is the protocol used for sending and receiving web pages and other web content.
- -Today we'll look under the hood and see HTTP in action.
Show Video: "The Internet: HTML and HTTP."
The Internet: HTTP and HTML - Really pay attention to the HTTP portions
Investigate HTTP traffic on your computer
Worksheet - HTTP in Action
5 blank windows
3 dots ->More tools -> developer tools
Network tab (ALL)
Type in the name of the site as directed on the handout
Gleefully sit back and watch the action
compare
During the activity, students will:
-Access the developer tools of their browser.
-Monitor the HTTP traffic generated by visiting a variety of websites.
-Record their findings, using the resource as a guide.
- Wrap-up (10 mins)
-What surprised you about the HTTP traffic you observed?
-What does it mean to say that high-level layers of the Internet use low-level layers “abstractly”?
-What other examples of abstraction have we seen in this course? Hint: Unit 1 is basically all about abstraction.
- Assessment
Code Studio: Assessment questions are available on the Code Studio.
- Extended Learning
-Research SMTP, a high-level protocol for formatting email messages.
-An excellent resource for explaining the many layers of protocols that make up the Internet: Internet Techniques and Web Formats.
HW -
Blown to Bits - pp 309-316 (The Internet Spirit)
The layers of protocols used in network communication is an example of abstraction. Can you give other examples of abstraction in everyday life?
When you browse to a web page, maybe with some animated advertisements embedded on it, describe in detail what happens behind the scenes to display that page on your browser.
Blown to Bits - pp 73 - 77
Discuss how not knowing some basics of how a software tool or computer works, and the abstractions they use, could lead to bad outcomes.
Due Tuesday, Sept 25, 5pm - email to murphyk2@gcsnc.com
No comments:
Post a Comment