Questions

1. Explain different types of SQL (DDL, DML & DCL) with suitable examples based on the ERD model attached to this.

2. What is a view? What is it used for? Give examples when a view can be used

APA format, in-text citation, references include, 1 1/2 pages

PH =9

 

Question #1. Review the interactive titled “Our Solar System” located at http://solarsystem.nasa.gov/planets/index.cfmLinks to an external site.. Pick two planets from our solar system. Compare and contrast the two planets in terms of composition, location, environment, and potential to harbor life.

Question #2. Watch the video titled “Sun 101” (3 min 22 sec). Video Source: WGBH (2013). Sun 101 [Video file]. Retrieved from http://www.pbs.org/wgbh/nova/labs/lab/sun/1/1Links to an external site./. Analyze the processes that occur in each layer of the sun, and how researchers study these layers using indirect methods.

introduction to information systems – 1

 

Submit a paper with one and a half to two pages of information. Use APA format, including a cover page, an abstract statement, and references (five pages total,  including a separate title page, a separate abstract page, a separate references page, and two pages with your research findings.)

Include these topics in your paper:

People rely on data and information to make decisions.

1. Explain what each of these terms mean and give examples for each.

2. Explain how data is processed into useful information. 

Question 20

  

Question 1 of 20 

Select the first step in the Information Processing Cycle.

A. Storage 

B. Output 

C. Input 

D. Processing 

 

Question 2 of 20 

Data and instructions are temporarily stored in which of the following devices?

A. ROM 

B. RAM 

C. CD-ROM 

D. Diskettes 

 

Question 3 of 20 

Which of the following types of memory contain data that cannot be modified by the user?

A. SIMM 

B. DIMM 

C. RAM 

D. ROM 

 

Question 4 of 20 

A printer, a flat panel monitor, and a speaker system are all examples of which type of device?

A. Input 

B. Output 

C. Processing 

D. Storage 

 

Question 5 of 20 

Which of the following types of computers is considered a portable computer?

A. Workstation 

B. Minicomputer 

C. Server 

D. Notebook 

 

Question 6 of 20 

Which type of mouse uses a beam of light to record the movements of the mouse?

A. Optical 

B. Opto-mechanical 

C. Mechanical 

D. Touchpad 

 

Question 7 of 20 

Activating the secondary mouse button is called:

A. pointing. 

B. clicking. 

C. double-clicking. 

D. right-clicking. 

 

Question 8 of 20 

What is the term for the study of the physical interaction between people and their tools?

A. Ergometrics 

B. Form and Function studies 

C. Mechametrics 

D. Ergonomics 

 

Question 9 of 20 

A __________ printer uses a print head composed of short pins to form letters and images by pressing an inked ribbon against the paper.

A. dot matrix 

B. ink-jet 

C. laser 

D. non-impact 

 

Question 10 of 20 

Which of the following types of printers prints fastest?

A. Wax-transfer 

B. Laser 

C. Ink jet 

D. Dot matrix 

 

Question 11 of 20 

How is image quality measured in printers?

A. PPM 

B. LPH 

C. DPI 

D. CPS 

 

Question 12 of 20 

How is the speed of an ink jet printer measured?

A. PPM 

B. LPI 

C. DPI 

D. CPS 

 

Question 13 of 20 

What is the term for the software that communicates between the OS and your printer?

A. Webware 

B. Printerware 

C. Peripheral packages 

D. Driver 

 

Question 14 of 20 

What does the acronym RISC stand for?

A. Reduced Instruction Set Computing 

B. Rapid Investigation Standard Control 

C. Repeat Item Standing Count 

D. Redundant Information Salvage Concept 

 

Question 15 of 20 

Which of the following ports is most commonly used to connect older printers to the computer?

A. Serial 

B. Network 

C. Parallel 

D. Modem 

 

Question 16 of 20 

Which of the following ports allows daisy chaining of multiple devices but does not require any CPU cycles to move data?

A. Parallel 

B. SCSI 

C. Serial 

D. USB 

 

Question 17 of 20 

On most Windows systems, where is the file location data stored?

A. Boot sectors 

B. DAT 

C. FAT 

D. Folders 

 

Question 18 of 20 

Which of these methodologies allows long file names?

A. FAT 

B. FAT16 

C. HPDFS 

D. NTFS 

 

Question 19 of 20 

CDs and DVDs belong to which family of storage types?

A. Disk 

B. Magnetic 

C. Optical 

D. Solid-state 

 

Question 20 of 20 

Flash memory is an example of which type of storage medium?

A. Magnetic 

B. Optical 

C. ROM 

D. Solid-state 

 

Question 1 of 20 

Which of the following operating system types is used in medical equipment or a cash register?

A. Multi-user/multi-tasking 

B. Real-time 

C. Single-user/multi-tasking 

D. Single-user/single-tasking 

 

Question 2 of 20 

Which of the following operating system types is used in PDAs?

A. Multi-user/multi-tasking 

B. Real-time 

C. Single-user/multi-tasking 

D. Single-user/single-tasking 

 

Question 3 of 20 

The Macintosh OS and Windows are examples of which of the following types of operating systems?

A. Multi-user/multi-tasking 

B. Real-time 

C. Single-user/multi-tasking 

D. Single-user/single-tasking 

 

Question 4 of 20 

Unix and Linux are examples of which of the following types of operating systems?

A. Multi-user/multi-tasking 

B. Real-time 

C. Single-user/multi-tasking 

D. Single-user/single-tasking 

 

Question 5 of 20 

What is the small graphic found on a desktop that represents an object called?

A. Cursor 

B. GUI 

C. Icon 

D. Shortcut 

 

Question 6 of 20 

Which of the following always appears at the bottom of a Windows desktop?

A. Cursor 

B. My Computer symbol 

C. Recycle bin 

D. Task bar 

 

Question 7 of 20 

What is the name for the temporary holding area in a Windows computer that holds data being copied or moved?

A. Clipboard 

B. Holding area 

C. Scrap book 

D. Temporary storage 

 

Question 8 of 20 

Which of the following command sets will move a block of text from one place in a document to another?

A. Copy and Paste 

B. Cut and Paste 

C. Delete and Replace 

D. Remove and Move 

 

Question 9 of 20 

What software tools can you use to add functions to the operating system?

A. Windows extensions 

B. Utilities 

C. Updates 

D. Accessory packages 

 

Question 10 of 20 

Which of the following security tools can prevent your computer from being infected by hostile software included in an e-mail?

A. Antivirus 

B. Anti-email 

C. Intrusion detection 

D. Malicious software detection 

 

Question 11 of 20 

Which of the following security tools will scan incoming connections from the Internet to keep out hackers?

A. Antivirus 

B. Anti-user 

C. Firewall 

D. Malicious user detection 

 

Question 12 of 20 

What software package can you use to prevent damage to an older CRT when it is left on too long on the same page?

A. Firewall tool 

B. Refreshing package 

C. Screen saver 

D. Screen wiper software 

 

Question 13 of 20 

Which of these operating systems is the ideal choice for artists and multimedia developers?

A. Unix 

B. Windows 2000 

C. Mac OS 

D. Linux 

 

Question 14 of 20 

Which of the following is very popular due to its low cost and excellent support?

A. Linux 

B. Mac OS 

C. Windows 

D. Unix 

 

Question 15 of 20 

Which of the following server systems is considered most stable?

A. Netware 

B. Linux 

C. Windows 2000 

D. Unix 

 

Question 16 of 20 

What technique can a company use to keep data sent over the Internet secure?

A. Archival 

B. Compression 

C. Syllabification 

D. Tunneling 

 

Question 17 of 20 

What technique uses a network access server to allow employees to connect to a corporate network from remote geographical locations?

A. Active matrix network 

B. Geographical distribution network 

C. Overland corporate network 

D. Remote access VPN 

 

Question 18 of 20 

What technology allows two different companies to transmit data using a standardized format?

A. EDI 

B. ROI 

C. VPN 

D. WBM 

 

Question 19 of 20 

Which RAID technology stores parts of each file on different disks?

A. RAID 0 

B. RAID 1 

C. RAID 2 

D. RAID 4 

 

Question 20 of 20 

What is the general term for using networked devices to store data?

A. Ancillary storage technology 

B. Data warehouse 

C. Network storage 

D. Web based storage 

 

Question 1 of 20 

__________ is applications software designed to help users be more efficient.

A. Assistance software 

B. Efficiency software 

C. Productivity software 

D. Software suites 

 

Question 2 of 20 

What type of software is provided with the expectation that the users will change it to meet their particular needs?

A. Commercial Software 

B. Open Source Software 

C. Public Domain Software 

D. Shareware 

 

Question 3 of 20 

A collection of integrated software is called a software:

A. congregation. 

B. family. 

C. office. 

D. suite. 

 

Question 4 of 20 

What type of application is designed to create text documents?

A. Authoring package 

B. Document processor 

C. Text processor 

D. Word processor 

 

Question 5 of 20 

When using an application to create a text document, where do you view and modify the text?

A. Document area 

B. Rulers 

C. Scroll bars 

D. Toolbars 

 

Question 6 of 20 

When using an application to create a text document, what tool do you use to see areas of the screen that are not initially visible?

A. Document area 

B. Rulers 

C. Scroll bars 

D. Toolbars 

 

Question 7 of 20 

When using an application to create a text document, where are the margins, indents, and tabs shown?

A. Document area 

B. Rulers 

C. Scroll bars 

D. Toolbars 

 

Question 8 of 20 

The __________ is the insertion point in a word processing document.

A. cursor 

B. icon 

C. inserter 

D. text entry bar 

 

Question 9 of 20 

The process called __________ marks a particular part of the document for special processing.

A. blocking 

B. editing 

C. identifying 

D. selecting 

 

Question 10 of 20 

What is the name for a set of characters like Arial or Courier?

A. Font 

B. Points 

C. Style 

D. Type 

 

Question 11 of 20 

How large is a 10 point font?

A. 1/720 of an inch 

B. 1/72 of an inch 

C. 10/72 of an inch 

D. 7/10 of an inch 

 

Question 12 of 20 

What is the area of the screen in which you interact with a spreadsheet called?

A. Cell 

B. Cell address 

C. Formula bar 

D. Worksheet 

 

Question 13 of 20 

What is the intersection of a row and a column in a spreadsheet called?

A. Cell 

B. Cell address 

C. Formula bar 

D. Worksheet 

 

Question 14 of 20 

__________ are the text areas in a spreadsheet.

A. Cells 

B. Labels 

C. Text boxes 

D. Values 

 

Question 15 of 20 

When you buy software, what are you buying?

A. The rights to use, copy, and distribute the software 

B. The right to use the software on one of your computers, and make one backup copy 

C. The right to use the software on all of your computers, and make backup copies 

D. The right to copy, modify, and share your version of the software 

 

Question 16 of 20 

Most presentation packages have pre-built formats you can use; these are called:

A. cells. 

B. frames. 

C. monitors. 

D. templates. 

 

Question 17 of 20 

What part of a presentation enables you to add graphics?

A. Animations 

B. Frames 

C. Text boxes 

D. Video areas 

 

Question 18 of 20 

What part of a presentation allows you to add character data?

A. Animations 

B. Frames 

C. Text boxes 

D. Video areas 

 

Question 19 of 20 

What is the term for an application that handles your contacts, to-do lists, etc.?

A. Address Manager 

B. Contact-handler 

C. Personal Information Manager 

D. World Database Manager 

 

Question 20 of 20 

When using a spreadsheet or word processor, you use __________ to store and then replay a set of keystrokes.

A. macros 

B. formulas 

C. compound commands 

D. automation tools 

 

Question 1 of 20 

What part of a presentation allows you to add character data?

A. Animations 

B. Frames 

C. Text boxes 

D. Video areas 

 

Question 2 of 20 

What part of a presentation enables you to add graphics?

A. Animations 

B. Frames 

C. Text boxes 

D. Video areas 

 

Question 3 of 20 

Most presentation packages have pre-built formats you can use; what are they called?

A. Cells 

B. Frames 

C. Monitors 

D. Templates 

 

Question 4 of 20 

Which of the following is the primary disadvantage of using a large-format monitor to show a presentation?

A. Compatibility may be a problem. 

B. These are typically large and expensive. 

C. The monitor will not display high resolution graphics. 

D. It will only work for small audiences. 

 

Question 5 of 20 

Which of the following statements is a true statement about presenting slide shows to a large audience?

A. The only reasonable way to present a slide show is to use a projector and screen. 

B. The best way to present to a large audience is to simply use your laptop. 

C. It is possible to use presentation software to show a slide show on a TV screen. 

D. LCD monitors are not big enough for large audiences to view. 

 

Question 6 of 20 

Which of the following types of bitmap graphics is most commonly used on the World Wide Web?

A. BMP 

B. PICT 

C. JPEG 

D. TIFF 

 

Question 7 of 20 

Which type of graphics file format keeps track of each individual point in the image?

A. Bitmap 

B. Detailed image 

C. Pointilated 

D. Vector 

 

Question 8 of 20 

What are the individual parts of a bit mapped image called?

A. Bits 

B. Bytes 

C. Pixels 

D. Rasters 

 

Question 9 of 20 

If you want to create images that can be easily resized, or one that looks like it was created with a pencil or pen, you should choose a __________ graphics package.

A. bitmap-based 

B. colorized 

C. raster-based 

D. vector-based 

 

Question 10 of 20 

Which graphical input source acts like a copy machine but copies the image to the computer instead of paper?

A. Clip art 

B. Digital camera 

C. Digital video camera 

D. Scanner 

 

Question 11 of 20 

Which graphical input source started in the print medium and moved to digital?

A. Clip art 

B. Digital Camera 

C. Digital Video Camera 

D. Scanner 

 

Question 12 of 20 

Which graphical input source captures and stores images in a bitmap form for transfer to a computer?

A. Clip art 

B. Digital Camera 

C. Digital Video Camera 

D. Scanner 

 

Question 13 of 20 

What graphics program would you use to create a vector-based graphic that is easily resizable?

A. CAD 

B. Draw 

C. Paint 

D. Photo-editing 

 

Question 14 of 20 

What graphics program would you use to create an image that resembles a traditional artist’s work?

A. CAD 

B. Draw 

C. Paint 

D. Photo-editing 

 

Question 15 of 20 

What graphics program would you use to repair damage to a scanned image or a poorly taken picture?

A. CAD 

B. Draw 

C. Paint 

D. Photo-editing 

 

Question 16 of 20 

What graphics program would you use to create a blueprint of a house or the design for a new windmill?

A. CAD 

B. Draw 

C. Paint 

D. Photo-editing 

 

Question 17 of 20 

What type of software application can create multi-dimensional images using tools much like wood working tools?

A. Animation 

B. CAD 

C. 3-D modeling 

D. Tool based imagery 

 

Question 18 of 20 

What is a single image from an animation called?

A. Animatron 

B. Frame 

C. Pict 

D. Window 

 

Question 19 of 20 

How does a computer generated animation work?

A. The computer creates constant movement in the characters. 

B. The computer, along with human workers, moves the characters on the screen. 

C. The computer creates a set of continuous movements, one character at a time. 

D. The computer creates a set of still images that are then projected one at a time, like conventional animation. 

 

Question 20 of 20 

What is the term for computer generated images that appear to be pictures of real objects?

A. Hyper-real 

B. Photorealistic 

C. Reality 

D. Virtual reality 

 

Need to analyze, design, and document

    

Need to analyze, design, and document a simple program that utilizes a good design process and incorporates sequential, selection and repetitive programming statements as well as at least one function call and the use of at least one array. The specific problem you need to solve for the final project is:
Design a program that will allow a user to Input a list of your family members along with their age and state where they reside. Determine and print the average age of your family and print the names of anyone who lives in Texas.
There are 4 components of your submission including:
Note: The Program Description and Analysis were most likely delivered last week. Please resubmit those with any modifications based on the grade and feedback from the professor.
Program Description- A detailed, clear description of the program you are building.
Analysis- Demonstrates your thought process and steps used to analyze the problem. Be sure to include the required input and output and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe the necessary formulas and sample calculations that might be needed. Talk about the functions you plan to use and how you will use arrays. Be sure to talk about the types of programming statements that will be used on why.
Test plan – Prepare at least 3 sets of input data (Test data) along with their expected output for testing your program. Your test data can be presented in the form of a table as follows (note: feel free to adapt to your design)
Pseudocode- Provide pseudocode of your overall design that fulfills the requirements of the project
All of these components should be placed in word document for submission.
Additional details about the program you need to write:
Family sizes vary, however you should design to be able to enter at least 50 Family members.
Your test cases should have at least 5 family members.
Be sure to separate some functionality into functions or submodules. Having all functionality in the main module is not a good design.
Your design should consider how to indicate the family member entry is complete.
Carefully consider the best data type for each of your variables. (e.g. when to use Float versus Integers versus Strings)
Example application test data:
Test Case #:
1
Input:
Fred, Age: 82, State: MD
Mary, Age:75, State: OH
Joe, Age: 45, State: TX
Julie, Age: 47, State: TX
Beth, Age: 9, State: TX
Expected Output:
Average Age: 51.6
Members who live in TX:
Joe
Julie
Beth
2
Your input data
Your expected output
3
Your input data
Your expected output
Submission requirements:
Your completed assignment should be saved as Word document and submitted to your LEO assignment area no later than the due date listed in the syllabus. Your document should be neat, well-written with minimal grammatical and spelling errors. Your name should be clearly listed on the first page along with the class/section, professor and due date. Your document should contain page numbers at the bottom of each page. Single or double space line formatting is acceptable.

Computer Science IT505 assignment 6

Company Name: New-Trust Bank, Dallas TX

The bank is helping companies to do online transactions with the customers who hold their credit cards (New-Trust Bank Credit Card). The Bank has a headquarters in Dallas TX with 300 employees.

FDIC regulations require that  Banks must keep customer information (including contact, identification, and transactions) for five years after the account is closed.
Question 1: 

Client/Server  Network for  Intranet.

New-Trust Bank’s IT system is cable of processing 15,000 customers a day. All Customer accounts are kept in the Customer Accounts database and there is a backup system to fulfill the FDIC regulations. Customer transaction information has to be moved to the long-term memory (archive) for backup and to fulfill the FDIC regulations. This database is within the New-Trust Bank IT data center.  All company employees will be connected to the Customer Accounts database via the intranet.

Task: Develop a Client/Server diagram for the Bank’s management office intranet only. You should present the client computers (office PCs), network devices, the customer accounts database, and long-term data storage (archive) in your Intranet diagram.  You should not be specific about the number of computers in the LAN, you can use generic numbers for presentation purposes. For security reasons; there is no requirement for wireless devices. All connections must be via cable.

Your Intranet diagram has to have the following components

Bank’s management office intranet:

  • Client Computers (Office PCs),
  • Network Devices (switch, router, etc.)
  • Server(s)
  • Customer Accounts Database
  • Employee Database
  • Long-term Data storage (archive) for Customer Accounts
  • Connections /cables

You may use DRAW.IO for your Client/Server diagram.

You should write at Top right corner Meet Patel and New Trust Bank  name on your diagrams.

Question 2: 

Cloud Computing

It looks like New-Trust Bank Credit Card will become very popular in near future. And there will be more companies that will accept Bank Credit Cards in the future. Each company will bring more customers for the Bank. This growth in customer numbers is of course good for the Bank, but the Bank managers are worried about the current data center and the FDIC regulations. The current data center cannot handle this fast growth of customer numbers. They need your help with the solution.

Consider the Bank’s IT system and the expectations from the Bank Management to accommodate the expansion of the customer numbers and FDIC regulations. Which sections/components/services would be achieved by Cloud Computing?

  • List the IT components that can be moved to Cloud. So, the Cloud service provider can help the growth of the company
  • List the IT components that can NOT be moved to Cloud. These are the section(s), you would not move to the cloud. List the IT components that can be done by the on-site data center (not Cloud Computing) and write the reason for not caring over to the cloud. 

 
Question 3:  

Web Page Structure

New-Trust Bank’s website has three different sections for three different business interactions.

Section 1 Personal accounts are accessible via the internet and open to the public. And should have the following subsections 

  • Opening page/ welcome/opening page
  • Locations and business hours
  • User Login page
  • Latest rates for the loans
  • Incentives for new customers

Section 2 Employees can access via the intranet, employee accesses only and is not open to the public. And should have the following subsections

  • Opening page/ welcome/opening page
  • This week’s upcoming activities/projects
  • Link to the Human Resources department’s webpage
  • Link to the Marketing department’s webpage
  • Link to IT department’s webpage 

Section 3 Corporate accounts are accessible via the internet and open to only partner companies. And should have the following subsections

  • Opening page/ welcome/opening page
  • Locations and business hours
  • Login page for the corporate accounts

Task: Develop the Bank’s Website structure for Intranet only.  You should first decide which sections should be under this Website and then draw the Website Structure using a block diagram. Please refer to the lecture notes for a similar case. This section of the website should not be open to the public.

You should write at Top right corner Meet Patel and New Trust Bank  name on your diagrams.

ETC W 2 D

 

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Lin assignment3

 

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder.