Nothing Special   »   [go: up one dir, main page]

Assignment 8 - Introduction To Computers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

C10 INTRODUCTION TO COMPUTERS

Program: Early Childhood Education

1)

● To show the total expenses for each day, Bill should type =SUM(B5:E5) in cell

F5 and repeat this formula all the way down to cell F11, putting in the necessary

changes to selected cells.

● To show the total expenses for the week in each category, Bill should type

=SUM(B5:B11) in cell B13 and repeat this formula all the way across to cell E13,

putting in necessary changes to selected cells.

● Type =IF(F5>100, “Yes”, “ “) in cell G5 and repeat down to G11, putting in

necessary changes to selected cell.

2)

Bill has two networking options. The first is ad-hoc networking. It is a collection of two

or more computers connected wirelessly. (Mishra & Awerbuch, 2008) This type of networking,

also known as peer-to-peer, is easy to set up, especially if all three computers have Windows 7 or

8. This enables the network to use the homegroup settings to share files, printers and other

devices. No training is necessary to manage this network. Additionally, it is cost-effective since

all that is needed is internet access. Users sign in with their username and password to access the

network, which seems secure enough. However, this is a weakness, as anyone who has access to
C10 INTRODUCTION TO COMPUTERS

usernames and passwords will be able to access the computer, and therefore, the network files.

With low security, Bill will have to seek security options to be able to use this network safely.

Another networking option for Bill is a client/server network. This network allows many

users to have access to the same database at the same time, and the database will store much

information. (Sulyman, 2014) The computers within the network are connected through a

domain and all files and applications are centralized on a server. An admin account determines

what should or should not be shared. Although this makes the network much more secure,

especially for large enterprises, Bill will have to spend more money to maintain this network.

Servers are expensive and expert training will be required to run this network properly.

Since Bill’s network only has three computers, an ad-hoc network will meet most of his

needs. Bill will have to ensure that the computers have wireless Network Interface cards installed

into the motherboards, as well as Windows 7 or 8 (the latter more preferable as it is the most

recent version). An internet router with cable bandwidth should also be installed for local

internet access so that he does not have to use his telephone line. His security needs will be

addressed.

2)

Bill needs to consider how he can secure his network properly. Several issues can occur if

the network is vulnerable to outside threats.

For example, his computer or that of one of his employees may be stolen. To ensure that

his files will not be accessed, Bill can use the Bitlocker software to encrypt his hard drive.

Without the password or the key on his usb stick, the thieves will be unable to access the drive,

thereby keeping the information protected.


C10 INTRODUCTION TO COMPUTERS

Another issue that may arise is hacking via the internet. Competitors may attempt to

break into the network to cause issues for Bill’s company or his network system. Bill needs to

ensure Windows Firewall is always active and set up within a domain, which is more secure that

private or public networking. He can also install ZoneAlarm for additional security. These

measures ensure that hackers do not access his network and do damage to his files.

Apart from firewall security, Bill’s network needs protection from viruses that will harm

his system. Microsoft Security Essentials is a software he can install to help protect his network.

Should a virus enter the network before the software is used, he can start the computer in safe

mode, then run the antivirus to get rid of the virus, since the virus is not active in this mode.

Since viruses are very destructive, Bill should be aware of antivirus programs that he needs to

install.

Moreover, Bill should consider installing an application like SpyBot to remove spyware

from his computers. His competitors can use spyware to track his activities and slow his

computers down. Therefore, the installation of this program just as critical as all the other

security software.

Finally, it is imperative that Bill’s computers are always up-to-date with the latest

software and drivers. Microsoft Windows Update helps to keep the computers updated so that if

there are any issues with the operating system, they will be corrected. Once Bill has set up the

computer to update itself automatically, then his system will be fine. If the correct action is

known, then it may be safe to make a decision without user involvement. (Cranor, 2008) This

means Bill can rest assured that his computer is installing the right updates on its own without

his constant monitoring.


C10 INTRODUCTION TO COMPUTERS

References

1) Mishra, Amitabh & Awerbuch, Baruch (2008) Introduction to Ad hoc Networks

https://www.cs.jhu.edu/~cs647/intro_adhoc.pdf

2) Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering.

16. 57-71. 10.9790/0661-16195771.

3) Lorrie Faith Cranor. 2008. A Framework for Reasoning About the Human in the Loop.

UPSEC 8 (2008), 1–15.

You might also like