Computer Applicatioons Assignment
Computer Applicatioons Assignment
ASSIGNMENT 1
b. Accuracy of the source: Verify the information presented. Look for evidence-based claims, citations,
and references. Check if the information is supported by other reliable sources.
c. Objectivity of the source: Assess the purpose of the website. Consider multiple sources with different
perspectives to get a well-rounded understanding. Look for any potential biases or conflicts of interest.
d. Coverage of the information: Evaluate the scope and depth of the information to check whether it
cover the topic comprehensively. Evaluate the resource's depth and level of detail and validate if it does
provide sufficient information for your needs.
e. Relevance of the information: Determine if the information is suitable to your research question or
topic. Verify the information if it provides valuable insights or evidence to the topic.
2. Discuss five factors to consider when buying computer for a school's laboratory
a. Purpose and Usage
Consider the primary purpose of the laboratory computers. Will they be used for general education,
specialized courses like graphic design or video editing, or STEM programs? This will help determine the
necessary hardware and software specifications.
b. Operating System
Choose an operating system that aligns with the school's curriculum and software requirements,
Windows, macOS, Chrome OS, Linux
Select computers with a sturdy build and durable components to withstand frequent use. Components
such as metal or high-quality plastic construction, spill-resistant keyboards, reliable cooling systems,
which will protect the computer.
Determine the budget for the computers and consider the warranty and support options. There is a
need to establish a budget per computer, evaluate warranty options (e.g., 3-year, 5-year). Consider the
availability of on-site support or repair services
A website provides a platform for the institution to showcase its programs, services, and achievements
to a global audience. This increases visibility, making it easier for prospective students, parents, and
partners to find and access information about the institution.
A website helps the institution to communicate effectively with its stakeholders, including students,
parents, teachers, and alumni. It provides a platform for sharing news, events, and announcements,
fostering engagement and building a sense of community.
A professional and well-maintained website reflects positively on the institution, enhancing its brand
image as well as improving it's prestige. It demonstrates the institution's commitment to quality,
innovation, and excellence.
A website can serve as a repository for educational resources, such as e-books, articles, and multimedia
content. This facilitates resource sharing and collaboration among students, teachers, and researchers.
e. Streamlined Admissions and Enrollment Processes: Online application portals, course catalogs, and
fee payment systems simplify the admissions process, making it more convenient for prospective
students and reducing administrative burden.
A computer network is a system where multiple devices, like computers, are interconnected and can
communicate with each other, allowing them to share data, resources like printers, and access
information across the network.
b. Distinguish between the internet and intranet
Internet is a global interconnection of computer networks and servers while intranet is a private
network within an organization.
c. Provide three reasons why educational institution might use computer network
2. It enhances communication.
ASSIGNMENT 2
1. List four internet components and explain their main function of each component
b. Router
c. Servers
d. Modems
Provides users with access to the internet by offering connectivity services, such as dial-up, DSL, cable,
or fiber-optic connections.
b. Routers:
Connects multiple networks together, directing traffic between them and ensuring data packets reach
their intended destinations.
c. Servers
Hosts and manages websites, applications, and data, providing access to users through the internet.
d. Modems:
Modulates and demodulates digital signals, allowing data to be transmitted over analog telephone lines
or other communication media.
2.Discuss any five factors to consider when buying a software for an educational institution.
Ensure the software aligns with the institution's curriculum, learning objectives, and educational
standards. Verify that it supports the teaching methods and philosophies of the institution.
b. User Experience and Interface:
Consider the software's user interface, ease of use, and navigation. Ensure it is intuitive and accessible
for students, teachers, and administrators with varying levels of technical expertise.
Assess the software's ability to adapt to changing institutional needs, such as growing student
enrollment or evolving curriculum requirements. Ensure it can scale to meet future demands.
Evaluate the software's compatibility with existing systems, such as student information systems,
learning management systems, or library management systems. Ensure seamless integration to avoid
data silos and redundant workflows.
Free up man power. Works without destruction. Serve the purpose for which it was bought.
3a. As the number of smartphones and mobile devices in use increases, the possibility of security
breaches and lost devices increases proportionally. Explain four (4) steps to protect sensitive and
personal data on smartphones and mobile devices.
1. Harmful Activities - One must not use an institution’s computing resources to cause harm to any
individual or to harm any resources, whether internal or external to the university. Examples of
harmful activities, include (but are not limited to):
a. Degrading performance or otherwise disabling Information Technology Resources.
b. Destroying, altering, copying, or compromising information integrity (e.g., student
records, personnel information, etc.)
c. Email spamming.
d. Threatening or intimidating email, postings, or other harmful forms of communication.
2. Illegal Activities - Members must refrain from any conduct that is illegal. Illegal activities that
are prohibited include (but are not limited to):
a. Copyright infringement, including publishing copyrighted material such as papers,
software, music, musical scores, movies, and artistic works. Divulging information that is
confidential, private, or proprietary information.
b. Misrepresentation of one’s identity to gain access to systems, software, or other
services to which one does not have authorized access.
3. Offensive, rude, obscene or harassing material is strictly forbidden.
4. An educational institution’s computing resources are not to be used for political or commercial
purposes.
4 Discuss two (2) advantages and two (2) disadvantages of backing up data using cloud services
such as Google Drive, Microsoft OneDrive and Apple iCloud.
Advantages
1. Cost saving - Perhaps, the most significant cloud computing benefit is in terms of IT cost savings.
Businesses, no matter what their type or size, exist to earn money while keeping capital and
operational expenses to a minimum. With cloud computing, you can save substantial capital
costs with zero in-house server storage and application requirements.
2. Reliability - With a managed service platform, cloud computing is much more reliable and
consistent than in-house IT infrastructure. Most providers offer a Service Level Agreement which
guarantees 24/7/365 and 99.99% availability. Your organization can benefit from a massive pool
of redundant IT resources, as well as quick failover mechanism.
Disadvantages
1. Internet access – you need internet to access resources - Although disaster recovery is one of
the key advantages of using cloud storage services, if the purported disaster is an internet
outage, then you would be out of luck. However, there are several avenues for getting online
these days and the chances of all of them not being available at the same time are slim to none.
2. Cloud storage is susceptible to attack - While using a cloud storage provider, you are placing
your trust in a third party to secure your data. For personal users, this is usually a blanket
upgrade irrespective of the provider; however, for businesses, this can be a little nerve racking.
A comparative study of the security features of multiple cloud storage providers is imperative
before selecting a vendor.