Introduction to computer technology

Assignment Help Basic Computer Science
Reference no: EM133047640

UNIT 1

Question 1.

Why is the knowledge of basic Excel skills crucial for success in the workplace or businesses within your field of study? How could this knowledge be applied in your chosen or future career field? Provide two examples. In replies to peers, consider the commonalities and differences you see in how this knowledge is applied across career fields, and explain how lack of working knowledge in Excel could negatively impact the business.

Question 2.

Discuss software solutions most commonly used within your current workplace or within your field of study. Describe how working knowledge of these applications can create a competitive advantage for you as an employee or potential employees. Explain how the use of these software solutions can help you execute your job more efficiently and effectively. In replies to peers, consider the following, discuss whether their chosen software solutions could be useful in your current workplace or within your field of study and provide relevant example.

STUDY MATERIALS

Gaskin, S., Vargas, A., Goeghan, D., & Graviett, N. (2017). GO! All in one: Computer concepts and applications (3rd ed.). New York, NY: Pearson. ISBN-13: 9780134505749

UNIT 2

Question 1.

In your own words, can you explain the difference between system and application software? How does your business or organizations within your field of study use both system and application software? Are there constraints between using one type of system software with different application products? In replies to peers, explain whether you agree with the differences and constraints your peers discussed?

Question 2.

Other than Microsoft Office and Quicken, what are two common software products that are used in your workplace or organizations within your field of study? Can you provide an explanation and practical examples of how the software is used? In replies to peers, consider one of the following:

1. Your experience with the identified software

2. Advantages and disadvantages

3. Available alternate software that could be considered?

UNIT 3

Question 1.

What is the importance of system security within the organization where you currently work or at an organization within your field of study? What are the legal and ethical implications the organization could face for failing to protect systems and information? Identify and explain three strategies the organization could implement to protect its systems and information against threats. In replies to peers, consider whether the three identified strategies are the best defense against threats. Justify your response.

Question 2.

What is your perception of the current threats presented by social media or Internet sites that you frequent? How can you protect your personal information to minimize these threats? In replies to peers, provide additional ways to protect personal information on social channels and the Internet through providing examples found in your own research or by citing the topic Resources.

UNIT 4

Question 1.

How does utilizing the Internet and the cloud help a business achieve organizational and operational goals or competitive advantage? Use two specific examples to support your ideas. In replies to peers, provide additional examples of how the Internet and cloud computing can be employed.

Question 2.

Identify and explain two ways you use the cloud as a consumer. Identify potential risks associated with using the cloud in such ways. What are the pros and cons consumers must consider when using the cloud to store and share information? Choose a peer that has used the cloud in a manner different from your post and comment on your experiences with using the cloud in this way, including advantages and disadvantages of this type of use.

UNIT 5

Question 1.

If you had the technical capability, what type of app would you create for the business where you currently work or your selected field of study that is completely new or significantly different from an existing app? Explain how your app would change the way the business operates or gains competitive advantage and why you think others might adopt and pay for the app. In replies to peers, provide feedback about the app proposal and the additional competitive advantages it could potentially produce if adopted.

Question 2.

The evolution of smart phones has opened up a new venue for organizations and businesses to communicate and conduct commerce. Research and discuss an emerging mobile technology trend that can further enhance the way organizations in your line of work or field of study use mobile technology. Include a link to your research with your post. In replies to peers, explain how the mobile technologies recommended by peers could be applied to your business or field of study.

UNIT 6

Question 1.

Search two blogging and two microblogging social media channels that businesses can use to gain competitive advantage and explain how has each changed the way information is communicated and used to influence social perception? In replies to peers, identify whether your organization or businesses within your field of study are using the social media channels identified. Are these channels effective in communicating with consumers and creating competitive advantage? Provide specific examples to illustrate your ideas.

Question 2.

How do companies use social media channel "influencers" to promote their product? Discuss any legal or ethical issues associated with this type of promotion? Provide a link to a specific example that illustrates your idea. In replies to peers, elaborate on the legal and ethical issues presented by peers by researching and discussing actual cases that illustrate the ideas presented. Include links to relevant articles in your reply.

UNIT 7

Question 1.

Consider some of the new and emerging technologies you have used recently or learned in the topic and identify which of the technologies you like. Which do you not like? Provide some specific examples of how you used any of these technologies and justify your like or dislike of the technology. In replies to peers, state whether you agree or disagree with the assessment provided? Share your own experience with the use of that technology.

Question 2.

Using the Tech Trends Report for the current year (available at https://futuretodayinstitute.com), topic Resources, and your own experience, consider current technology that you use as a part of your job or that is used within your field of study. Articulate ways it could be changed, upgraded, or improved by emerging technologies, such as those presented in the topic Resources, to help you do your job/future job more efficiently or effectively. Provide specific examples to support your ideas. In replies to peers, provide additional examples of similar emerging technologies and their workplace application.

Reference no: EM133047640

Questions Cloud

Performance changes leadership behaviors : Evaluate how organizational performance changes leadership behaviors.
Introduction to computer technology : Define employee privacy/security issue and explain why it could be a risk for organization. Provide specific workplace scenario to illustrate employee privacy
COMPUTER TECHNOLOGY- Excel skills crucial for success : Why is the knowledge of basic Excel skills crucial for success in the workplace or businesses within your field of study?
Performance management-process : Research paper on performance management, process , effective performance management-, companies that use performance management tools
Introduction to computer technology : Why is the knowledge of basic Excel skills crucial for success in the workplace or businesses within your field of study?
National culture can rub up against corporate culture : The management of ethical behavior is one area where national culture can rub up against corporate culture.
Describing any comparative traditional crime : Discuss it by describing any comparative traditional crime-e.g., trespass as compared to DDoS.
Develop disaster recovery plan : Develop a disaster recovery plan for an organization.
Buffer overflows in widely used software : Viruses and other malware often exploit bugs known as buffer overflows in widely used software.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate 95 percent and 99 percent confidence intervals

Calculate 95 percent and 99 percent confidence intervals for µ. (Round answers to 3 decimal places.) 95 percent confidence intervals for µ

  Regardless of the value of the input k

Suppose the DES F function mapped every 32-bit input R, regardless of the value of  the input K,

  Digital investigative project

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project.

  Create all inetaddress objects associated with the computer

You want to create all InetAddress objects associated with the computer you are working with. Write statements in Java in order to do so.

  Explain how characters are represented in computers

List and describe the various ways of entering alphanumeric data into computers. Explain how characters are represented in computers. For a given computer instruction, what are the factors that determine how binary digits are interpreted

  Two separate buildings aproximately

If you want to connect two networks that are both IOBase T Ethernet networks and are in two separate buildings aproximately 1000 mtrs apart which media would you use?

  Effectiveness of infomercials to market products

What characteristics of a product must you consider when determining whether to us an informercial to promote it?

  What is the minimum processing gain of the fhss system

What is the maximum transmission power for the digital broadcasting service that allows the performance of the TV station to remain acceptable?

  Design a function that takes a book and returns

Design a function that takes a book and returns a string that describes the book. (You can describe what to include in a description.)

  Problem regarding the normalization and sql ddl statements

Discuss what normalization is and why it is important. Normalize the database design in Module 2, and describe whether the tables are all normalized. Explain whether the tables satisfy the requirements of 1NF, 2NF, and 3NF.

  Write a program for decoding of an english text

Experiment with your encoding program to find out how sensitive the compression ratios are to using standard estimates of frequencies instead of actual frequencies of symbol occurrences in English texts.

  Define the it organizational structure

Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd