How many drives are there in your computer

Assignment Help Basic Computer Science
Reference no: EM131227767

Mashaw Take Home

Read Chapter1 of Computers, Ch 1, 5 Simplified, and Ch 1, 2, 4 of Office. Go over the review questions at the end of the chapter, though you don't need to turn it in. Read also a few pages of chapter 2.

Your points on each assignment will be based on 1) completeness, 2) professionally prepared work, 3) your efforts and accuracy. Treat a Take-Home assignment as a part of your test. Each assignment is designed for one student -- you must not work together, or get help from anybody to do an assignment. If you use any material, not your own, make sure that you give proper references. Again, No cooperation, no copy/paste is allowed on this TH. It is due on Thursday

Part I Discuss, explain, create space to write the answers.

Discuss briefly, explain (Prefer your own words. Try to type the answer, create more space if you need.

1. What is a Computer System? What are its components?

2. List some of the information system used in Business

3. List some of the productivity tool that you can use for your work

4. What is the unit of measurement for storing data?

Approximately how much storage do you need to store this line (hint: count the number of characters)?

5. In computer terminology, how do you read:

1,000

1,000,000

1,000,000,000

6. Try to purchase a Flash drive (called also travel drive, USB drive, etc.)

a. What is the capacity of your Flash drive?

b. How much did you pay for it?

c. Approximately, how many characters can be stored on it?

Part II Hands on Make a note to show that you did whatever is asked, or explain how to do it. Use snipping tool to show samples. (Handwriting this part is ok, though professionally typed is preferred.)

1. Open "My Computer" Practice Resizing , Moving, Maximizing, Minimizing, and others. Explore the View option. Change the view to Tile, thumbnail, Icon, list, and detail. Report briefly what you did

2. Regarding your Auxiliary Storage Devices:

a. How many "drives" are there in your computer?

b. Enter into one of the drives, and list some of the subdirectories:

c. List some of the files in the subdirectories:

3. Create a Hierarchy of directories, and sub-directories for storing documents for your courses. (In your computer or in your flash drive.) Show, through a chart (see the picture), the hierarchy that you created for this course.

4. Use the MS-word and type a few paragraphs. Make a note of what you see in each of the item in the Standard Toolbar (If

File

Home

Insert

Page Layout

View

?

?

 

 

 

 

 

 

 

5. Explain briefly how to do, or how you can do the following. Use abbreviation, to explain the toolbar, menu, submenu or the option you can use to do the following.

[Use abbreviation like this example: for saving as a text-file, do: office -> File -> save as -> text -> a-name]

a. Making a word or a paragraph Bold face; or Changing a bold face to normal
highlight the word or paragraph -> Home -> Bold

b. Changing the font, font size

c. Changing the font, font size with a preformatted Style

d. Centering a heading

e. Making a bulleted list; Changing a bullet list to normal

f. Viewing the page in different sizes (zooming), -- print view, page view, zoomed 100%, or zoomed 200%

g. Changing the margins

h. Changing the page orientation of a document. What choices do you have?

i. Counting the number of words in a paragraph, or the number of characters used in a document.

j. Saving a copy for backup purposes

k. Saving a document as "Text" (can you do that?), Saving a document as pdf?

Part III, Applications # 1 (mini-mini Project)

Use one of your previously written paper/report, and prepare it with proper format.

Note: Your report should be a minimum of five pages, should have proper

Titles (or Major Heading),
sub titles, and
sub-sub-titles

Use proper font and sizes. Your report should be professionally prepared and formatted. Minimum: 5 pages, 1 titles, 5 Major headings, 5 subheadings. Also pay attention to the margin and font face and sizes as discussed in the class.

Reference no: EM131227767

Questions Cloud

Construct the multiplication table : Construct the multiplication table for Z2[X] (mod X3 + X + 1). Make sure to label the rows and columns with the field elements from part (a). Also make sure that all of the entries in the table are listed in part (a).
How algorithm scales up and try to work with large step-size : Study the algorithm, write something about the algorithm's expected complexity or copy it from Wikipedia. Explain how the algorithm scales up and try to work with large step-sizes.
Discuss the art of reading for the conversation : Identify three specific pieces of advice (i.e., strategies or basic moves) for more effective reading - choose one of these strategies-perhaps the one you think is best-to reflect on in more detail.
How can both assessments inform instructional decisions : What are the strengths of your peer's chosen assessment? What are the weaknesses of your peer's chosen assessment? How can both assessments inform instructional decisions?
How many drives are there in your computer : How many "drives" are there in your computer? Create a Hierarchy of directories, and sub-directories for storing documents for your courses.
Variables represent the independent variables : Given the scores for x1 and x2 that represent scores in two subjects, these two variables represent the independent variables while y is the dependent variables that represents the achievement score. what will be the predicted values for y if x1=8..
Purpose of the logical network perimeter mechanism : Describe the purpose of the logical network perimeter mechanism and how it establishes a logical boundary. Further, list the components commonly used to create a logical network perimeter. How does this get implemented? Find a company who uses it..
Prepare a project on molded clay bricks : 1.1 Background of the research. 1.2 Background of the research. .1.3 General objective. 1.3.1 Specific objectives. 1.4 Research questions. 1.5 Justification. 1.6 Research assumptions and operational definitions. 1.6.1 Research Assumptions.. 1.6.2 Ope..
What is an advanced persistent threat : What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Be sure to cite sources.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What type of recovery mechanism is used

Analyze the DBMSs that you are currently using. What concurrency control protocol does each DBMS use? What type of recovery mechanism is used?

  Component interface for an emergency control room

As the lead software engineer for a medium-sized hospital, you have been asked to spearhead an effort to improve the tracking of Voice Over IP (VOIP) calls made within the hospital system.

  Large volume of works of art

An art museum owns a large volume of works of art. Each work of art is described by an item code (identifier), title, type, and size; size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist fo..

  Write down the vbscript code that employs a do until loop

question 1. write the vbscript code that uses a do until loop to display all of the integer values stored in the array

  Creae a concept of an info system

Creae a concept of an info system (make it up). Then create a: 1. Data Flow Diagram and Entity Relationship Diagram 2. Activity Diagram

  Discussion board mis

Discussion board mis.

  What security threats from social networking

What security  threats from social networking  also apply to other businesses? Which do not? Why do you think so?

  Describe digital forensics and process management.

Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security.

  List best practices in staffing future organizational needs

Having staff with the proper skill sets is immensely important to accomplishing corporate objectives. List and support three best practices in staffing future organizational needs.

  Discuss three tools used for windows backup and restore

DISCUSS three tools used for Windows Backup and Restore using the text, Internet, and/or your job as reference.

  When users move the mouse

When users move the mouse over each thumb image of the item, an enlarged picture of the item will appear to the right of the thumb image. For each listed item, you should allow user to specify the numbers he/she intends to buy

  Discuss the initial- and extensive-response field kits

Discuss the initial- and extensive-response field kits describe in this chapter. What do you think about the kits. Would you add or remove something from the kits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd