This document contains information about a written computer administration assessment. It includes instructions, sections on multiple choice and short answer questions, and questions testing knowledge of topics like backups, software piracy, and virus protection policies. The assessment contains two sections - multiple choice questions worth two marks each, and short answer questions requiring explanations on topics such as suitable backup types for an organization with daily data changes, differences between word processors and desktop publishing programs, and safety features and training for new software.
1) SMC provides pneumatic equipment, automation solutions, and engineering services for various industries including mining.
2) They have a large network of local branches across Australia to provide demonstrations, assistance with cost savings, and support.
3) SMC can customize solutions for specialized applications and harsh environments through their engineering division and manufacturing capabilities.
The document contains a test bank with multiple choice and fill-in-the-blank questions about operating system components and concepts such as processes, memory management, file management, device drivers, scheduling, and multitasking. It tests knowledge of the roles of different operating system parts like the file manager, memory manager, and dispatcher. It also covers topics like critical regions, mutual exclusion, deadlock conditions, and real-time processing.
This document discusses Microsoft's remote administration lab which involves several exercises: creating a custom MMC console, configuring remote desktop access, connecting to a remote workstation, and creating an RDP file. The lab scenario has students testing various remote administration technologies in Windows 7 as newly hired desktop technicians. The estimated time to complete the lab is 60 minutes.
There are 14 Shopping/Patching Days remaining until Christmas and only one more Patch Tuesday before Windows 7 and Server 2008/2008 R2 reach their inevitable end of support, unless you're among the 59% of IT professionals who still don’t have all of their users on Windows 10. Also make sure you update your Acrobat, Acrobat Reader, and Chrome versions as there are 21 CVEs in the Adobe release and 51 CVEs in Google’s releases this month.
This document provides a guide for ACC 340's final exam, which includes 20 multiple-choice questions covering various accounting and information systems topics. It also includes 2 knowledge checks with additional multiple-choice questions and 2 discussion questions related to internal controls and information systems requirements. The exam guide is intended to help students prepare for the final assessment in the ACC 340 course.
The document discusses why some organizations continue to use both manual and computerized accounting systems. Younger, more tech-savvy individuals may see computerized systems as faster and more accurate, while older accountants who learned on manual systems may disagree. Additionally, a lack of training can cause reluctance to fully adopt new computerized systems that are not well understood. The document goes on to discuss how technology has helped CPAs by providing accounting software, applications, and devices that save time and money.
1) SMC provides pneumatic equipment, automation solutions, and engineering services for various industries including mining.
2) They have a large network of local branches across Australia to provide demonstrations, assistance with cost savings, and support.
3) SMC can customize solutions for specialized applications and harsh environments through their engineering division and manufacturing capabilities.
The document contains a test bank with multiple choice and fill-in-the-blank questions about operating system components and concepts such as processes, memory management, file management, device drivers, scheduling, and multitasking. It tests knowledge of the roles of different operating system parts like the file manager, memory manager, and dispatcher. It also covers topics like critical regions, mutual exclusion, deadlock conditions, and real-time processing.
This document discusses Microsoft's remote administration lab which involves several exercises: creating a custom MMC console, configuring remote desktop access, connecting to a remote workstation, and creating an RDP file. The lab scenario has students testing various remote administration technologies in Windows 7 as newly hired desktop technicians. The estimated time to complete the lab is 60 minutes.
There are 14 Shopping/Patching Days remaining until Christmas and only one more Patch Tuesday before Windows 7 and Server 2008/2008 R2 reach their inevitable end of support, unless you're among the 59% of IT professionals who still don’t have all of their users on Windows 10. Also make sure you update your Acrobat, Acrobat Reader, and Chrome versions as there are 21 CVEs in the Adobe release and 51 CVEs in Google’s releases this month.
This document provides a guide for ACC 340's final exam, which includes 20 multiple-choice questions covering various accounting and information systems topics. It also includes 2 knowledge checks with additional multiple-choice questions and 2 discussion questions related to internal controls and information systems requirements. The exam guide is intended to help students prepare for the final assessment in the ACC 340 course.
The document discusses why some organizations continue to use both manual and computerized accounting systems. Younger, more tech-savvy individuals may see computerized systems as faster and more accurate, while older accountants who learned on manual systems may disagree. Additionally, a lack of training can cause reluctance to fully adopt new computerized systems that are not well understood. The document goes on to discuss how technology has helped CPAs by providing accounting software, applications, and devices that save time and money.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides instructions for completing a computer basics worksheet. It includes 12 sections covering topics like input/output devices, computer components, storage, programs, operating systems, and the Windows desktop. Learners are asked to review powerpoint presentations for each section and answer accompanying questions that test their understanding. The goal is to help students learn foundational computer concepts in a hands-on way through interactive study and assessment.
1. A business area can be used for many company codes, must be assigned to company codes in IMG, and are used for internal P&L and balance sheets. A company code can have many business areas.
2. A chart of accounts can be assigned to multiple company codes.
3. Balance sheets and profit and loss statements can be drawn up for business areas. A company code can have many business areas, and a business area can be across company codes.
4. The use of business area is optional in SAP.
This document is an assignment cover sheet for a student named A. Thuvarahan for the module HND IN COMPUTING / HND IN SOFTWARE ENGINEERING SEC4101 - Fundamentals in Computer Systems. It provides details of the assessment such as the learning outcomes covered, scenario, tasks, assessment criteria, and total marks. The tasks involve recommending suitable hardware and software components, producing a system design specification and network diagram, and developing a health and safety policy.
The document discusses application software and its uses. It describes horizontal applications that are popular with consumers, like word processing and spreadsheet programs, and vertical applications that are tailored to specific industries. It also covers different types of software licenses, versions, and how to install, use, and manage application programs.
This lesson discusses customizing Windows operating systems through the Control Panel. It describes how to change settings like display, sound, networking, security and user accounts. The lesson also covers installing and uninstalling software, setting up printers, and troubleshooting common software issues.
This document contains a series of questions and answers about various topics related to computers and IT. Some of the key points covered include:
- A CPU is an example of computer hardware.
- The type of graphics card installed can influence computer performance while the type of input device like a mouse does not.
- Common computer input devices are keyboards and joysticks, and common output devices include printers and monitors.
- Touch screens can be used for both input and output of data.
- Disks need to be formatted before storing files, and formatting erases existing data.
- An operating system controls devices and instructs how to display entered data.
- A graphical user interface uses windows, icons and a
This document provides instructions for a lab exercise on using an integrated development environment (IDE) for writing and debugging C programs. Students are asked to:
1. Write two C programs - one to display a person's name and age over years, and another to calculate the average of 5 numbers.
2. Compile and run the programs, noting and correcting any errors.
3. Use the IDE's debugging tools like breakpoints, stepping, and watches to debug errors in calculations or output.
The goal is to practice using an IDE for writing, compiling, running and debugging C programs from within the IDE's interface.
Industrial Report - Ndlovu Kevin MehluliKevin Ndlovu
This document is an industrial attachment report submitted by Ndlovu Kevin Mehluli for their Diploma in Computer Science from Swaziland College of Technology. The report provides details of Kevin's 12-week internship at Informatics Africa, including an overview of the company, descriptions of their main work areas in customer care, testing, networking and other duties, and highlights of major tasks completed in networking, testing and server technology. The report is organized into chapters with an introduction, general outline of the company, work area descriptions and details of major completed tasks.
This document provides instructions on how to use the Reliability Monitor and Performance Monitor tools in Windows to monitor system reliability and performance. It describes how Reliability Monitor calculates a System Stability Index and provides a stability report. It also explains how to open Performance Monitor to view performance data in real time or from log files, and how to connect to remote computers to monitor them. The document recommends increasing monitoring capabilities using Data Collector Sets to store log and trace information as well as general alerts.
This document contains a 60-item multiple choice test on information and communication technology (ICT) concepts. The test covers topics like computer hardware, software, operating systems, networking, security, and health and safety issues related to working with technology. It aims to assess recent high school students' understanding of fundamental ICT concepts.
This document summarizes the analysis of Windows event log files. It discusses how to view event logs using the Event Viewer and export logs. It also describes using log parsing tools like Log Parser Lizard and Log Parser 2.2 to query error, warning and other event types from system logs. Specific event IDs are analyzed, like DCOM errors, service failures, DNS issues and hard disk errors. Methods to resolve issues causing these events are provided.
5 assessment instrument evidence_ tos_ written t_est_etcMCabz1
1. The document outlines an evidence plan and assessment for the qualification of Computer System Servicing – NC II.
2. It details the units of competency that will be covered, including installing and configuring computer systems.
3. Evidence of skills will be collected through observation, demonstration, questioning, and portfolios.
4. The assessment includes a written test covering operating systems, installation procedures, multimedia, peripherals, and software application.
This document provides information and tasks for two units on a BTEC course in Creative Digital Media Production: Unit 14 on Writing for Digital Media Products and Unit 15 on Digital Games Testing. It outlines eight tasks for students to complete, including exploring writing styles and purposes, researching digital magazines, testing games for bugs, and producing articles for a digital games magazine. Deadlines for completing the tasks are also listed. Recommended reading materials on media studies and video games are provided to support students' work.
CONactor - Estate Agent - Documentation of a software solution for Sales / Exit / Estate Agents.
- mulitple languages
- integration in CashflowSync - a
Active Directory is a directory service created by Microsoft for Windows domain networks. It allows for centralized administration of users, groups, computers, policies, and other network resources. Some key functions of Active Directory include:
- User authentication - Active Directory provides a central location to store user credentials and authenticate logins to network resources.
- Centralized administration - Administrative tasks like adding/removing users, resetting passwords, applying security group policies can be performed from one central location rather than having to manage each computer individually.
- Single sign-on - Once authenticated to Active Directory, users have access to authorized network resources without needing additional logins.
- Group policy management - Administrative templates allow for centralized application of settings, preferences, rules
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.docPeter Garrido
This document contains a daily lesson log for an 8th grade ICT class covering Computer System Servicing from August 31 to September 2. Over the three days, the teacher covered the following topics:
1) Discussing the relevance of the course and explaining basic concepts in Computer System Servicing.
2) Identifying and discussing the basic components of a computer like the CPU, keyboard, mouse, monitor, power supply, hard disk, USB ports, CD/DVD ROM, RAM, and motherboard.
3) Explaining the importance of Computer System Servicing and exploring opportunities in the field. Students participated in group activities to discuss computer characteristics and components.
The teacher evaluated students based
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides instructions for completing a computer basics worksheet. It includes 12 sections covering topics like input/output devices, computer components, storage, programs, operating systems, and the Windows desktop. Learners are asked to review powerpoint presentations for each section and answer accompanying questions that test their understanding. The goal is to help students learn foundational computer concepts in a hands-on way through interactive study and assessment.
1. A business area can be used for many company codes, must be assigned to company codes in IMG, and are used for internal P&L and balance sheets. A company code can have many business areas.
2. A chart of accounts can be assigned to multiple company codes.
3. Balance sheets and profit and loss statements can be drawn up for business areas. A company code can have many business areas, and a business area can be across company codes.
4. The use of business area is optional in SAP.
This document is an assignment cover sheet for a student named A. Thuvarahan for the module HND IN COMPUTING / HND IN SOFTWARE ENGINEERING SEC4101 - Fundamentals in Computer Systems. It provides details of the assessment such as the learning outcomes covered, scenario, tasks, assessment criteria, and total marks. The tasks involve recommending suitable hardware and software components, producing a system design specification and network diagram, and developing a health and safety policy.
The document discusses application software and its uses. It describes horizontal applications that are popular with consumers, like word processing and spreadsheet programs, and vertical applications that are tailored to specific industries. It also covers different types of software licenses, versions, and how to install, use, and manage application programs.
This lesson discusses customizing Windows operating systems through the Control Panel. It describes how to change settings like display, sound, networking, security and user accounts. The lesson also covers installing and uninstalling software, setting up printers, and troubleshooting common software issues.
This document contains a series of questions and answers about various topics related to computers and IT. Some of the key points covered include:
- A CPU is an example of computer hardware.
- The type of graphics card installed can influence computer performance while the type of input device like a mouse does not.
- Common computer input devices are keyboards and joysticks, and common output devices include printers and monitors.
- Touch screens can be used for both input and output of data.
- Disks need to be formatted before storing files, and formatting erases existing data.
- An operating system controls devices and instructs how to display entered data.
- A graphical user interface uses windows, icons and a
This document provides instructions for a lab exercise on using an integrated development environment (IDE) for writing and debugging C programs. Students are asked to:
1. Write two C programs - one to display a person's name and age over years, and another to calculate the average of 5 numbers.
2. Compile and run the programs, noting and correcting any errors.
3. Use the IDE's debugging tools like breakpoints, stepping, and watches to debug errors in calculations or output.
The goal is to practice using an IDE for writing, compiling, running and debugging C programs from within the IDE's interface.
Industrial Report - Ndlovu Kevin MehluliKevin Ndlovu
This document is an industrial attachment report submitted by Ndlovu Kevin Mehluli for their Diploma in Computer Science from Swaziland College of Technology. The report provides details of Kevin's 12-week internship at Informatics Africa, including an overview of the company, descriptions of their main work areas in customer care, testing, networking and other duties, and highlights of major tasks completed in networking, testing and server technology. The report is organized into chapters with an introduction, general outline of the company, work area descriptions and details of major completed tasks.
This document provides instructions on how to use the Reliability Monitor and Performance Monitor tools in Windows to monitor system reliability and performance. It describes how Reliability Monitor calculates a System Stability Index and provides a stability report. It also explains how to open Performance Monitor to view performance data in real time or from log files, and how to connect to remote computers to monitor them. The document recommends increasing monitoring capabilities using Data Collector Sets to store log and trace information as well as general alerts.
This document contains a 60-item multiple choice test on information and communication technology (ICT) concepts. The test covers topics like computer hardware, software, operating systems, networking, security, and health and safety issues related to working with technology. It aims to assess recent high school students' understanding of fundamental ICT concepts.
This document summarizes the analysis of Windows event log files. It discusses how to view event logs using the Event Viewer and export logs. It also describes using log parsing tools like Log Parser Lizard and Log Parser 2.2 to query error, warning and other event types from system logs. Specific event IDs are analyzed, like DCOM errors, service failures, DNS issues and hard disk errors. Methods to resolve issues causing these events are provided.
5 assessment instrument evidence_ tos_ written t_est_etcMCabz1
1. The document outlines an evidence plan and assessment for the qualification of Computer System Servicing – NC II.
2. It details the units of competency that will be covered, including installing and configuring computer systems.
3. Evidence of skills will be collected through observation, demonstration, questioning, and portfolios.
4. The assessment includes a written test covering operating systems, installation procedures, multimedia, peripherals, and software application.
This document provides information and tasks for two units on a BTEC course in Creative Digital Media Production: Unit 14 on Writing for Digital Media Products and Unit 15 on Digital Games Testing. It outlines eight tasks for students to complete, including exploring writing styles and purposes, researching digital magazines, testing games for bugs, and producing articles for a digital games magazine. Deadlines for completing the tasks are also listed. Recommended reading materials on media studies and video games are provided to support students' work.
CONactor - Estate Agent - Documentation of a software solution for Sales / Exit / Estate Agents.
- mulitple languages
- integration in CashflowSync - a
Active Directory is a directory service created by Microsoft for Windows domain networks. It allows for centralized administration of users, groups, computers, policies, and other network resources. Some key functions of Active Directory include:
- User authentication - Active Directory provides a central location to store user credentials and authenticate logins to network resources.
- Centralized administration - Administrative tasks like adding/removing users, resetting passwords, applying security group policies can be performed from one central location rather than having to manage each computer individually.
- Single sign-on - Once authenticated to Active Directory, users have access to authorized network resources without needing additional logins.
- Group policy management - Administrative templates allow for centralized application of settings, preferences, rules
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.docPeter Garrido
This document contains a daily lesson log for an 8th grade ICT class covering Computer System Servicing from August 31 to September 2. Over the three days, the teacher covered the following topics:
1) Discussing the relevance of the course and explaining basic concepts in Computer System Servicing.
2) Identifying and discussing the basic components of a computer like the CPU, keyboard, mouse, monitor, power supply, hard disk, USB ports, CD/DVD ROM, RAM, and motherboard.
3) Explaining the importance of Computer System Servicing and exploring opportunities in the field. Students participated in group activities to discuss computer characteristics and components.
The teacher evaluated students based
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.doc
CA_TST2
1. Computer Administration
Page No 1
COMPUTER ADMINISTRATION - 3601L
WRITTEN ASSESSEMENT 60%
NAME:______________________________________________________________
GROUP NO:___________________COURSE NO:__________________________
TIME ALLOWED: 90 MINUTES
READING TIME: 5 MINUTES
ATTEMPT ALL QUESTIONS
WHEN COMPLETED HAND IN-
- THIS TEST PAPER
PC, BOOKS OR OTHER REFERENCE MATERIAL MAY NOTBE
USED
SECTION A: MULTIPLE CHOICE 40
SECTION B: SHORT WRITTEN ANSWERS 60
PASS MARK 70%
2. Computer Administration
Page No 2
SECTION A - MULTIPLE CHOICE
Circle the correct answers
SAMPLE:
e.g.:
Which of the following groups are input devices only?
a/ printer, keyboard, scanner
b/ keyboard, scanner, mouse
c/ monitor, printer, mouse
d/ printer, keyboard, monitor
THE FIRST 20 QUESTIONS ARE WORTH TWO MARKS EACH
1 Wordprocessors, data-bases and spreadsheet programs are examples of:
a/ operating systems
b/ custom-build software
c/ application packages
d/ firmware
2 Which of the following has the least in common with the other three ?
a/ CD-ROM
b/ mouse
c/ magnetic disk
d/ memory
3 You are to supply software for checking the profits and losses on daily
trading on the stock exchange. The formula and base figures change
frequently depending on market activity. Which of the following would you
recommend as the most suitable package to meet this requirement ?
a/ wordprocessor
b/ spreadsheet
c/ graphics package
d/ CAD package
3. Computer Administration
Page No 3
4 You are to supply hardware to an architect who designs house plans. The
architect already has an industry-standard PC. Which of the following would
you recommend as the most suitable hardware/software combination to meet
this requirement ?
a/ CMS package and dot-matrix printer
b/ CAD package and plan driver
c/ CAD package and plotter
d/ Drawing package and OCR
5 Which of the following is an effect of a virus ?
a/ slows down the system
b/ prevents access to programs
c/ destroys programs
d/ all of the above
6 Which of the following is not usually affected by a virus ?
a/ data files
b/ program files
c/ boot sector
d/ memory
7 When using virus protection software, which of the following should the
computer user do ?
a/ keep the virus protection software in a virus protected disk area
b/ load the virus protection software in high memory area
c/ copy the virus protection software to another virus-free disk
d/ load the watch version of the software as a resident program
8 Select one word in the list below that refers to virus activity ?
a/ polymorphic
b/ polygraphic
c/ polyphase
d/ polyoptic
9 From the list below, select the duty which is most likely to be carried out by a
computer administrator:
a/ keeps records of computer purchases
b/ maintain records of help desk calls
c/ provide user support and advise
d/ all of the above
4. Computer Administration
Page No 4
10 An author’s exclusive right to print, publish and sell work is called :
a/ legal copy
b/ copyright
c/ software license
d/ property rights
11 A key role for a computer administrator is to:
a/ write system requirement specifications
b/ change software when needed
c/ assist users to make the most out of their computer resources
d/ deliver the main lectures at software training sessions
12 A major reason why companies unknowingly infringe copyright laws is:
a/ they purchase large volumes of software
b/ they purchase at discount prices
c/ they don’t monitor the number of machines on which software is
installed
d/ employees bring their own software to work
e/ company records get into a mess
TRUE/FALSE QUESTIONS
13 A virus is data stored on a computer disk T F
14 Diskettes are a cheap and easy medium for backups T F
15 Software piracy is a way of breaking copyright law T F
16 In most situations a restoration of files from backup copies is required if a new
hard disk is installed T F
17 The word modem is made from the first letters of the words method of
depacking modules T F
18 Fixing first-level (simple) hardware faults is done by a computer administrator
T F
19 Software Integration is undesirable because it slows down the user’s
productivity T F
20 A dot-matrix printer is usually used for high quality graphic output
T F
5. Computer Administration
Page No 5
SECTION B - WRITTEN ANSWERS
21 You are employed as a computer administrator for a small financial
institution.
They have over 200,000 records which 30% of they records are altered daily.
What type or types of backup would you implement to be suitable for such an
organisation. Give your reason. (10)
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
21 You have been asked by your superior what is the difference between a word
processor and a desktop publishing program. Write down your answer stating
advantages and disadvantages for each program. (5)
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
6. Computer Administration
Page No 6
22 You have been requested to set up a stand-alone computer system for the
supervisors secretary. The computer is to be ‘modern’ with the latest
‘ease of use’ software. Accountancy records and word processing are the
computers main functions
Fill in the table below what equipment should be purchased and it’s
approximate cost. (10)
Hardware App Cost
Computer Hardware
Input Devices
Output devices
Other Devices
Software
Operating System
Software Applications
Other Items
Total
7. Computer Administration
Page No 7
23 Explain what rights a person acquires on a purchasing a software package. (5)
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
24 In a five-point form, present a policy to be given to a company’s employees to
protect the company’s computers from viruses. (5)
1______________________________________________________________
2______________________________________________________________
3______________________________________________________________
4______________________________________________________________
5______________________________________________________________
25 List several factors (minimum four) that must be considered when purchasing
computer software for an organisation. (5)
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
8. Computer Administration
Page No 8
26 In a six-point form what safety features would you implement in a computer
based office environment. (10)
1__________________________________________________________
2__________________________________________________________
3__________________________________________________________
4__________________________________________________________
5__________________________________________________________
6__________________________________________________________
27 What is the significance of keeping and maintaining Hardware and Software
Inventory forms ? (5)
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
28 A special ‘In-house’ software is being developed for your business and is near
completion. What type of training procedure should be implemented for your
staff.- Give reasons. (5)
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________