Assignment 8 - Introduction To Computers
Assignment 8 - Introduction To Computers
1)
● To show the total expenses for each day, Bill should type =SUM(B5:E5) in cell
F5 and repeat this formula all the way down to cell F11, putting in the necessary
● To show the total expenses for the week in each category, Bill should type
=SUM(B5:B11) in cell B13 and repeat this formula all the way across to cell E13,
2)
Bill has two networking options. The first is ad-hoc networking. It is a collection of two
or more computers connected wirelessly. (Mishra & Awerbuch, 2008) This type of networking,
also known as peer-to-peer, is easy to set up, especially if all three computers have Windows 7 or
8. This enables the network to use the homegroup settings to share files, printers and other
all that is needed is internet access. Users sign in with their username and password to access the
network, which seems secure enough. However, this is a weakness, as anyone who has access to
C10 INTRODUCTION TO COMPUTERS
usernames and passwords will be able to access the computer, and therefore, the network files.
With low security, Bill will have to seek security options to be able to use this network safely.
Another networking option for Bill is a client/server network. This network allows many
users to have access to the same database at the same time, and the database will store much
information. (Sulyman, 2014) The computers within the network are connected through a
domain and all files and applications are centralized on a server. An admin account determines
what should or should not be shared. Although this makes the network much more secure,
especially for large enterprises, Bill will have to spend more money to maintain this network.
Servers are expensive and expert training will be required to run this network properly.
Since Bill’s network only has three computers, an ad-hoc network will meet most of his
needs. Bill will have to ensure that the computers have wireless Network Interface cards installed
into the motherboards, as well as Windows 7 or 8 (the latter more preferable as it is the most
recent version). An internet router with cable bandwidth should also be installed for local
internet access so that he does not have to use his telephone line. His security needs will be
addressed.
2)
Bill needs to consider how he can secure his network properly. Several issues can occur if
For example, his computer or that of one of his employees may be stolen. To ensure that
his files will not be accessed, Bill can use the Bitlocker software to encrypt his hard drive.
Without the password or the key on his usb stick, the thieves will be unable to access the drive,
Another issue that may arise is hacking via the internet. Competitors may attempt to
break into the network to cause issues for Bill’s company or his network system. Bill needs to
ensure Windows Firewall is always active and set up within a domain, which is more secure that
private or public networking. He can also install ZoneAlarm for additional security. These
measures ensure that hackers do not access his network and do damage to his files.
Apart from firewall security, Bill’s network needs protection from viruses that will harm
his system. Microsoft Security Essentials is a software he can install to help protect his network.
Should a virus enter the network before the software is used, he can start the computer in safe
mode, then run the antivirus to get rid of the virus, since the virus is not active in this mode.
Since viruses are very destructive, Bill should be aware of antivirus programs that he needs to
install.
Moreover, Bill should consider installing an application like SpyBot to remove spyware
from his computers. His competitors can use spyware to track his activities and slow his
computers down. Therefore, the installation of this program just as critical as all the other
security software.
Finally, it is imperative that Bill’s computers are always up-to-date with the latest
software and drivers. Microsoft Windows Update helps to keep the computers updated so that if
there are any issues with the operating system, they will be corrected. Once Bill has set up the
computer to update itself automatically, then his system will be fine. If the correct action is
known, then it may be safe to make a decision without user involvement. (Cranor, 2008) This
means Bill can rest assured that his computer is installing the right updates on its own without
References
https://www.cs.jhu.edu/~cs647/intro_adhoc.pdf
3) Lorrie Faith Cranor. 2008. A Framework for Reasoning About the Human in the Loop.