Preview

Information Technology

Satisfactory Essays
Open Document
Open Document
283 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
TCT0113
INTRODUCTION TO INFORMATION TECHNOLOGY
MICROSOFT WORD
LAB 1: Article Writing

Select ONE (1) question only. The article must not exceed more than 1000words. Student should be able to apply all the selected MENU BAR inside Microsoft Word example: font setting, size, paragraph, styles, table, clip art, shapes and others related.

Task:

1. Using one of the advance technology Web sites, search information about the latest communications applications in this digital age. Example: Wechat, Whatsapp, Viber and others. Write a paragraph about your findings. You must describe the content; insert several related picture or applications that will describe the selected topic.

2. Visit one of the travel and city guides Web sites and choose a destination for a gateway this coming school holiday. Write a one page paper giving details about this location, such as popular hotels and lodging, parks and recreation, ancient and modern history and tours. Include also a map or satellite photograph of this place.

3. What are your favorite movies? Use the Internet Movie Database Web site example; yahoo! entertainment, world radio network, e!online, ,MSN entertainment, tgv cinemas and entertainment and others to search for information about these films and write a brief description of the biographies of the major stars either actor or actress. Then provide some gallery about the selected actor/actress.

Assessment:

i. Format 2 marks

ii. Text with suitable font and setting arrangement 4 marks

iii. Picture/image related to the topic with a tools implementation. 4 marks

iv. Use of style, pages, illustrations, header& footer tools 4 marks

v. Clear explanation/discussion on the topic with example. 6 marks

Submission:

Print the article and submit by Friday 28.June. 13 before

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Information Systems

    • 1117 Words
    • 5 Pages

    Ultimately, our success is determined not by the buildings we construct, but by the investment we make in the people and programs that bring each new facility to life. We are providing a broad framework of support that enables…

    • 1117 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Information Systems

    • 386 Words
    • 2 Pages

    d) Explain how the two tables are related. Which table contains the foreign key? What is the foreign key?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Info Technology

    • 461 Words
    • 2 Pages

    Today’s families are living in an age where technology plays a major role. One can expect to encounter different options when it comes to choosing a cable provider. In the paragraphs to come, we will discuss the Cable Communications Act of 1984. Fair Credit Reporting Act, 1970 will also be discussed when answering the question what were the advances in information technology that resulted in new ethical issues necessitating the creation of each act.…

    • 461 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 4224 Words
    • 17 Pages

    6. If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?…

    • 4224 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Information Systems

    • 558 Words
    • 3 Pages

    The CNO as project manager chooses a team to provide input in evaluating what type of EMR that will be chosen. The team consists of nursing informatics specialist, the IT department, and the CFO. The nursing informatics specialists will decide what information should be incorporated within the system. The CNO and the informatics specialist will…

    • 558 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Info Tech

    • 946 Words
    • 4 Pages

    * has a negative effect on outside world contact with others (just stay at home and chat with friends)…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Systems

    • 893 Words
    • 4 Pages

    Still, it is possible to affect positive ROI when it comes to Enterprise 2.0. It’s a matter of shaping the tools to the needs of your organization, knowing what you’re trying to achieve before you begin and taking an active approach to adoption. It’s about recognizing adoption not as something that happens, but as something you create.…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 826 Words
    • 4 Pages

    In military strategy, business strategy resembles a framework or an approach to obtaining an advantageous position.…

    • 826 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Technology

    • 1523 Words
    • 6 Pages

    IT or Information technology is a term that encompasses all forms of technology used to create, store, exchange, and use information in its various forms of business data, voice conversations, still images, motion pictures, multimedia presentations, and other forms, including those not yet conceived. It's a convenient term for including both telephony and computer technology in the same word. It is the technology that is driving what has often been called "the information revolution." The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones…

    • 1523 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Informations Technology

    • 1492 Words
    • 6 Pages

    1. Uncertain global economy: The Indian IT outsourcing industry gets about 75% of its revenues from US and Europe. The renewed concern regarding the European sovereign debt has led to companies slowing down their IT spending. BFSI segment has been the biggest contributor to Indian IT revenues. As shown in the figure below, the recent turmoil in Europe & US has resulted in slowing demand in BFSI segment.…

    • 1492 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Information Technology

    • 15960 Words
    • 64 Pages

    In his foreword to the new NASSCOM-McKinsey Report (2002), India’s Minister for Communications and Information Technology calls for a joint industry-government effort to “ensure that the Indian IT sector remains a dominant player in the global market, and that we emerge as one of the leading countries of the new millennium”. The first of these goals remains a challenge, but it is one for which India’s information technology (IT) industry seems to be well prepared. The second stated goal is much broader, much deeper, and much harder to achieve. Does it make sense to pin so much hope on India’s IT industry? What contribution can it make to India’s overall economic development? Can it help change the country, reduce poverty, change people’s lives for good? Or will the benefits be restricted to an educated elite with access to jobs and power? This paper offers some perspectives that can help answer these questions, using concepts and analysis from economic theory.…

    • 15960 Words
    • 64 Pages
    Powerful Essays