You are on page 1of 6

IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

2/3/2022 1:37 PM

IT SKILLS AND APPLICATIONS


"The study, design, development, implementation,
maintenance, or management of computer-based
information systems, notably software applications and
computer hardware," according to the Information
Technology Association of America (ITAA).

Types of Computers

Mainframe Computer
Mini-computer
Personal Computer or desktop computer
Laptop and notebook computers
Hand-held computers – PDA

A network is a collection of computers and computing


devices that are linked together in order to interact. It is
possible to connect via a wired or wireless connection.
The types of network can be classified
1) Based on the type of communication medium:
wired network and wireless network.
Cables were used to connect the various computing
equipment in a wired network.
The signals are transmitted across the air using a
wireless network.
2) The area of coverage (or distance).
Under this classification, the networks can be
divided into four broad categories.

PAN – Personal Area Network


A personal area network is a computer network
dedicated to a single user.

Page | 1
IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

LAN – Local Area Network


A local area network is a network that links
network devices over a small distance.
MAN – Metropolitan Area Network
A metropolitan area network often covers a larger
area than a local area network but less than a wide
area network. It usually encompasses an area up to
the city limits.
WAN – Wide Area Network
A wide area network connects multiple computers
across a long distance. It can span the entire
country or multiple countries.

Physical security is concerned with preventing

unwanted access to the network's physical

equipment or the systems connected to it.

Logical Security is known as the specific controls


put in place to manage access to computer systems
and physical spaces within the data center.

A strong password is a password that is difficult to


“crack” or break in to.

Guidelines that will assist in enforcing strong


passwords are Passwords that are at least eight
characters long, contain both letters and numbers,
include symbols (!,#,$, percent,&,,@), or do not
contain common .

Page | 2
IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

User level security Share level security

involves using access


controls in the file Involves securing
system and does not stop connections to a
at placing a single network share point
password on an entire by a password.
tree of resources.

Page | 3
IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

1. The major computer operations include Input,


processing and output. (b)

2. The programmer’s most important task before


planning the logic of a program is to understand
the problem. (d)

3. Which of the following is a term used as a


synonym for module” in any programming
language?
(c) both of these

4. Not only encompassed the uses of computers


but also deals with how data is transmitted from
one computer to another is called networking.
(c)

5. A variable’s data type describes all of the


following except the scoop of the variable. (d)

6. The three structures of structured programming


are sequence, selection and loop. (c)

7. What is output for the following pseudo code


segments.
g=4
h=6
while g < h
g=g+1
endwhile
output g, h

Page | 4
IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

a) 4, 6
b) 6, 6
c) 6, 4
d) No output

8. Placing a structure within another structure is


called nesting the structures. (d)

9. Each variable in an array must have the same


data type as the others. (a)

10. You can access every element of an array


using a both or the a

Page | 5
IT ASSIGNMENT (IT SKILLS AND APPLICATION) COURSE

Page | 6

You might also like