0% found this document useful (0 votes)
5 views

Computer Applicatioons Assignment

The document outlines key concepts related to computer applications in education, including evaluating online resources, factors for purchasing computers and software for schools, and the benefits of educational websites. It also discusses computer networks, internet components, data protection on mobile devices, and IT codes of conduct for educational institutions. Additionally, it highlights the advantages and disadvantages of using cloud services for data backup.

Uploaded by

paak0236
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer Applicatioons Assignment

The document outlines key concepts related to computer applications in education, including evaluating online resources, factors for purchasing computers and software for schools, and the benefits of educational websites. It also discusses computer networks, internet components, data protection on mobile devices, and IT codes of conduct for educational institutions. Additionally, it highlights the advantages and disadvantages of using cloud services for data backup.

Uploaded by

paak0236
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

EPS 825AD: COMPUTER APPLICATION IN EDUCATION.

ED/ DGC/24/0010, MRS BEATRICE BADOE. CAPE COAST CENTER.

ASSIGNMENT 1

1. Explain five ways of evaluating online resources for academic work


a. Authority: Identify the author or organization behind the website. Check their credentials, expertise,
and reputation. Look for an "About Us" section or author biography.

b. Accuracy of the source: Verify the information presented. Look for evidence-based claims, citations,
and references. Check if the information is supported by other reliable sources.

c. Objectivity of the source: Assess the purpose of the website. Consider multiple sources with different
perspectives to get a well-rounded understanding. Look for any potential biases or conflicts of interest.

d. Coverage of the information: Evaluate the scope and depth of the information to check whether it
cover the topic comprehensively. Evaluate the resource's depth and level of detail and validate if it does
provide sufficient information for your needs.

e. Relevance of the information: Determine if the information is suitable to your research question or
topic. Verify the information if it provides valuable insights or evidence to the topic.

2. Discuss five factors to consider when buying computer for a school's laboratory
a. Purpose and Usage

Consider the primary purpose of the laboratory computers. Will they be used for general education,
specialized courses like graphic design or video editing, or STEM programs? This will help determine the
necessary hardware and software specifications.

b. Operating System

Choose an operating system that aligns with the school's curriculum and software requirements,
Windows, macOS, Chrome OS, Linux

c. Durability and build quality

Select computers with a sturdy build and durable components to withstand frequent use. Components
such as metal or high-quality plastic construction, spill-resistant keyboards, reliable cooling systems,
which will protect the computer.

d. Security and Management


Consider the security and management features such as built-in antivirus software, firewall protection,
remote management capabilities (e.g., Chrome Management Console), encryption and secure boot
options

e. Budget and Warranty

Determine the budget for the computers and consider the warranty and support options. There is a
need to establish a budget per computer, evaluate warranty options (e.g., 3-year, 5-year). Consider the
availability of on-site support or repair services

3. Discuss any five benefits of a website for an educational institution

a. It helps increased visibility and accessibility

A website provides a platform for the institution to showcase its programs, services, and achievements
to a global audience. This increases visibility, making it easier for prospective students, parents, and
partners to find and access information about the institution.

b. It helps improved communication and engagement

A website helps the institution to communicate effectively with its stakeholders, including students,
parents, teachers, and alumni. It provides a platform for sharing news, events, and announcements,
fostering engagement and building a sense of community.

c. Enhanced Reputation and Credibility

A professional and well-maintained website reflects positively on the institution, enhancing its brand
image as well as improving it's prestige. It demonstrates the institution's commitment to quality,
innovation, and excellence.

d. Resource Sharing and Collaboration

A website can serve as a repository for educational resources, such as e-books, articles, and multimedia
content. This facilitates resource sharing and collaboration among students, teachers, and researchers.

e. Streamlined Admissions and Enrollment Processes: Online application portals, course catalogs, and
fee payment systems simplify the admissions process, making it more convenient for prospective
students and reducing administrative burden.

4a. Define computer network.

A computer network is a system where multiple devices, like computers, are interconnected and can
communicate with each other, allowing them to share data, resources like printers, and access
information across the network.
b. Distinguish between the internet and intranet

Internet is a global interconnection of computer networks and servers while intranet is a private
network within an organization.

c. Provide three reasons why educational institution might use computer network

1. It helps improve access to information and resources

2. It enhances communication.

3. It helps in administrative works and operations


EPS 825AD: COMPUTER APPLICATION IN EDUCATION.

ED/DGC/24/0010, MRS BEATRICE BADOE. CAPE COAST CENTER.

ASSIGNMENT 2

1. List four internet components and explain their main function of each component

a. Internet Service Provider

b. Router

c. Servers

d. Modems

a. Internet Service Provider (ISP)

Provides users with access to the internet by offering connectivity services, such as dial-up, DSL, cable,
or fiber-optic connections.

b. Routers:

Connects multiple networks together, directing traffic between them and ensuring data packets reach
their intended destinations.

c. Servers

Hosts and manages websites, applications, and data, providing access to users through the internet.

d. Modems:

Modulates and demodulates digital signals, allowing data to be transmitted over analog telephone lines
or other communication media.

2.Discuss any five factors to consider when buying a software for an educational institution.

a. Alignment with Curriculum and Learning Objectives:

Ensure the software aligns with the institution's curriculum, learning objectives, and educational
standards. Verify that it supports the teaching methods and philosophies of the institution.
b. User Experience and Interface:

Consider the software's user interface, ease of use, and navigation. Ensure it is intuitive and accessible
for students, teachers, and administrators with varying levels of technical expertise.

c. Scalability and Flexibility:

Assess the software's ability to adapt to changing institutional needs, such as growing student
enrollment or evolving curriculum requirements. Ensure it can scale to meet future demands.

d. Integration with Existing Systems:

Evaluate the software's compatibility with existing systems, such as student information systems,
learning management systems, or library management systems. Ensure seamless integration to avoid
data silos and redundant workflows.

e. Functionality of the software.

Free up man power. Works without destruction. Serve the purpose for which it was bought.

3a. As the number of smartphones and mobile devices in use increases, the possibility of security
breaches and lost devices increases proportionally. Explain four (4) steps to protect sensitive and
personal data on smartphones and mobile devices.

1. Use Strong Passwords/Biometrics


Strong passwords coupled with biometric features, such as fingerprint authenticators, make
unauthorized access nearly impossible. Your passwords should be eight or more characters long
and contain alphanumeric characters. If your mobile device allows two-factor authentication,
don’t hesitate to use it. You don’t want to be subject to unforeseen attacks.
2. Ensure Public or Free Wi-Fi Is Protected
Everybody loves free Wi-Fi, especially when the data plan is inexpensive. But cheap can turn
expensive in a very devastating manner. That’s because most of the free Wi-Fi points are not
encrypted. These open networks allow malicious people to eavesdrop on the network traffic and
easily get your passwords, usernames and other sensitive information.
3. Encrypt Your Device
Most mobile devices are bundled with a built-in encryption feature. Encryption is the process of
making data unreadable. Decryption is converting the unreadable data into normal data. This is
important in case of theft, and it prevents unauthorized access. You simply need to locate this
feature on your mobile device and enter a password to encrypt your device.
4. Install An Antivirus Application
The files you download and the apps you install on your mobile device might be packed with
malicious code. Once launched, this code could send your data to hackers, thereby making you
unsecured and robbing you of your privacy. To avoid that, installing a reputable antivirus
application will guarantee your security. Some antivirus applications also offer more
functionalities, such as erasing your data if you lose your mobile device, tracking and blocking
unknown callers who might be a threat, and telling you which applications are not safe.
3b. A code of conduct is a written guideline that helps determine whether an action is ethical or
unethical. Explain any four (4) Information Technology (IT) code of conduct that will be useful for
educational institutions in Ghana.

1. Harmful Activities - One must not use an institution’s computing resources to cause harm to any
individual or to harm any resources, whether internal or external to the university. Examples of
harmful activities, include (but are not limited to):
a. Degrading performance or otherwise disabling Information Technology Resources.
b. Destroying, altering, copying, or compromising information integrity (e.g., student
records, personnel information, etc.)
c. Email spamming.
d. Threatening or intimidating email, postings, or other harmful forms of communication.
2. Illegal Activities - Members must refrain from any conduct that is illegal. Illegal activities that
are prohibited include (but are not limited to):
a. Copyright infringement, including publishing copyrighted material such as papers,
software, music, musical scores, movies, and artistic works. Divulging information that is
confidential, private, or proprietary information.
b. Misrepresentation of one’s identity to gain access to systems, software, or other
services to which one does not have authorized access.
3. Offensive, rude, obscene or harassing material is strictly forbidden.
4. An educational institution’s computing resources are not to be used for political or commercial
purposes.

4 Discuss two (2) advantages and two (2) disadvantages of backing up data using cloud services
such as Google Drive, Microsoft OneDrive and Apple iCloud.

Advantages

1. Cost saving - Perhaps, the most significant cloud computing benefit is in terms of IT cost savings.
Businesses, no matter what their type or size, exist to earn money while keeping capital and
operational expenses to a minimum. With cloud computing, you can save substantial capital
costs with zero in-house server storage and application requirements.
2. Reliability - With a managed service platform, cloud computing is much more reliable and
consistent than in-house IT infrastructure. Most providers offer a Service Level Agreement which
guarantees 24/7/365 and 99.99% availability. Your organization can benefit from a massive pool
of redundant IT resources, as well as quick failover mechanism.
Disadvantages

1. Internet access – you need internet to access resources - Although disaster recovery is one of
the key advantages of using cloud storage services, if the purported disaster is an internet
outage, then you would be out of luck. However, there are several avenues for getting online
these days and the chances of all of them not being available at the same time are slim to none.
2. Cloud storage is susceptible to attack - While using a cloud storage provider, you are placing
your trust in a third party to secure your data. For personal users, this is usually a blanket
upgrade irrespective of the provider; however, for businesses, this can be a little nerve racking.
A comparative study of the security features of multiple cloud storage providers is imperative
before selecting a vendor.

You might also like