Demonstrate an awareness of the nature of computer systems

Assignment Help Basic Computer Science
Reference no: EM13936565

Semester: E14 Module Code: PF008 Module Title: Computer Literacy Programme BSc and BA (Honours) Level: Level 3 Awarding Body: University of Plymouth Module Leader Tex Dunstan Format:

Report Presentation: No Any special requirements: Your work should be presented clearly and professionally, in the various formats specified in the individual assignment tasks. Word Limit: 1,000 words (with 10% plus or minus leeway). This DOES NOT include the cover page, table of contents, references, bibliography and appendices. Deadline date for submission: Should be submitted to the portal by 12pm, Wednesday 10th December 2014. Learning outcomes to be examined in this assessment

• Demonstrate an awareness of the nature of computer systems and the ways in which they assist individuals effectively to undertake their responsibilities both personally and within business contexts;

• Explain the scope of hardware and software currently in use and the technological advances taking place;

• Describe the use of computers to store and retrieve data and demonstrate the use of the World Wide Web;

• Identify the nature of business systems and legal data which are supported by computers and the development of networking and communication. Percentage of marks awarded for module:

This assignment is worth 50% of the total marks for the module Assessment criteria Explanatory comments on the assessment criteria Maximum marks for each section Content, accuracy, relevance, originality Relevant and accurate content, demonstrating research, as required by assessment tasks below. Emphasis will be placed on accuracy and originality; work which is clearly student's own. See Criteria Below Evidence of understanding of task requirements Well structured, clear and professional attempts to deliver what has been specified in the requirements document See Criteria Below Demonstrable knowledge of the module syllabus applied to the assignment tasks Demonstration of a clear understanding of hardware and software, relevant Microsoft applications and the deployment of ICT in a business environment See Criteria Below Assignment Background Short Hand Graphic Design is a new business that you have formed with a business partner, each with a 50% share. You need money to finance your business. Your assignment is to prepare a business case to borrow money from the bank. You will apply what you have learnt about online search, hardware, software, MS Word, Ms Excel and Ms PowerPoint to deploy ICT within a business environment. You need money for the following:

• Hardware: two different types of high-end PCs (e.g. Macs) and two different types of A3 colour printers

• Software: general-purpose and graphic design (either purchase or lease)

• Business premises: you will rent office space for two people near to where you live

• Business insurances: employer's liability and professional indemnity

• Website: register a domain name (e.g. .uk, .co.uk, .com) and arrange a business or professional web hosting package

• Company formation: the cost to start as a UK company with Companies House (e.g. use of accountant) You must now complete all the numbered tasks below: 1) Business Case:?Microsoft Word Use a web browser to research and write the business case in Microsoft Word. The following sections are required: a) Cover page b) Table of Contents c) Executive summary d) Introduction e) Findings and Analysis: discuss and analyse the graphic design business with Harvard references f)

Findings and Analysis: describe and explain the business costs you have researched with Harvard references. Show the individual and total costs. Use tables if you wish. g) Conclusion h) Appendices containing screenshots from 2) and 3) below. 2) ?Finance:?Microsoft Excel Accurate and realistic financial forecasting for your business will help the bank to trust you. Use MS Excel to complete the following tasks:

a) Four worksheets: Titled Business Case, Loans, Tax and Profit Share. Each worksheet must contain professionally formatted labels, cells, rows and columns with the company name, current date and worksheet title set out clearly.

b) Business Case: Complete workings for all start-up cost calculations. Include individual costs (hardware, software, etc.) and total cost.

c) Loans: Two different monthly loan repayment schedules for the total borrowed capital; one repayable over twenty-four months at 7.99% pa and the other repayable over thirty-six months at 6.99%.

d) Tax: The business will earn £100,000 in its first year. You can claim tax relief against purchase of computers and printers. Calculate the relief based on total equipment costs over three years: first year at 100%, second year at 50%, and third year at 25%

e) Tax: The remainder after tax relief is profit taxed at 21%. Calculate the tax liability.

f) Profit Share: With the remaining amount divide the profit between yourself and your partner 50:50 if the remainder is less than £20,000 or 70:30 in your favour if more than £20,000. 3)?Presentation:?Microsoft PowerPoint You are to meet the bank manager to present a summary of your business case and financial forecasts - i.e.

1) and 2) above. Use a few slides creatively to build your arguments and figures. Include different content elements and effects only if they support your goal to secure the financial investment. Provide the following:

a) Introductory and concluding messages

b) Summary of borrowing requirements

c) Summary of repayment profiles

d) Your chosen repayment profile with reasons for your choice. Screenshots: Provide screenshots (use Snipping Tool or Print Screen) of all work in Excel and PowerPoint. For Excel, display both formulas and functions (use Show Formulas) and the formula results. Put screenshots in two Appendices after your Bibliography, titled Appendix A: Excel and Appendix B: PowerPoint. Marking Criteria 1) Business Case:?Microsoft Word - Cover Page: Assignment title, module code, full name and student number and submission date. The cover page tool should be used.

- Table of Contents: A list of all of the sections, headings and sub-headings. Appendices and Figures should be provided. The automatic Table of Contents tool should be used with styled headings.

- Executive Summary: A clear and concise overview of the purpose of your business case.

- Introduction: Show that you have understood the brief and will cover everything

- Findings and Analysis: The main body of the business case with required sections described above.

- Conclusion: Summarise what you have covered previously, what you have learned and which learning outcomes you have achieved.

- References: All sources quoted from or reproduced in your document. The automatic citations and bibliography tool should be used to create in-text references and a list of all references in Harvard.

- Appendices: place screenshots of Excel and PowerPoint workings here.

2) ?Finance:?Microsoft Excel Five marks are available for each task in this section. Use references (relative, absolute), formulas, functions and formatting to address the requirements. At a minimum, use mathematical operators (e.g. + - * /) and the SUM, TODAY() functions. Extra credit is available for use of MIN, MAX when presenting equipment costs. Further credit is available for use of PMT for repayment of loans, IF statements for profit share and use of charts generally. Worksheets and worksheet data should be sorted and formatted professionally.

?Presentation:?Microsoft PowerPoint Requirements are set out above. Explain your business proposition and funding needs. Apply learning from PowerPoint lectures about slide design and content, styles and transition effects to produce a convincing communications strategy.

Reference no: EM13936565

Questions Cloud

Make it on platform research on hypervisors : Assignment is done already but the proposal is for a hypervisor - ie: Hyper-V, VMWare, FreeBSD Jail, etc... Which has been done but there is no supporting evidence for that platform.
How the intervention will be measured and evaluated : Write a 1,050- to 1,400-word comprehensive treatment plan and interview questions that you could use when interviewing a client. Items to consider for your plan include the following: Client background or history and  Physical or visual state of th..
Read the assigned articles and find a current event : Read the assigned articles and find a current event about an organizational change effort. Create a two-paragraph synopsis to explain that change effort to your classmates, post a link to the current event article, and make sure to answer the followi..
What type of selection do they impose on tobacco plants : Wild tobacco plants with a single, dominant mutation are resistant to herbivory by hornworms (sphynx moth larvae). As a result, they grow larger and set many more seed. In areas where hornworms are present, what type of selection do they impose on..
Demonstrate an awareness of the nature of computer systems : Semester: E14 Module Code: PF008 Module Title: Computer Literacy Programme BSc and BA (Honours) Level: Level 3 Awarding Body: University of Plymouth Module Leader Tex Dunstan Format:
Contribution to society : Contribution to Society: Describe how your project will contribute to society. Explain why the topic is of interest to the field. Describe a current practice or intervention that the study addresses. Explain how the study might be new and different f..
Review the brief intervention flow chart : Review the brief intervention flow chart. What would be easy for you to adapt and what would be more challenging for you to adapt as a SUD counselor
Write table_avg function to find the average of an array. : Write table_print function to print out a table of size. Print output on one line.table_print(array, size);
Feasibility analysis for this proposed project : A business analyst working for a small business that is considering a project to implement a Customer Relationship Management (CRM) system for use by field sales personnel. The system will use the ACT! software application from Sage Software, Inc. Ma..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the number of comparisons

Determine the number of comparisons (as a function of n and m) that are performed in merging two ordered files a and b of sizes n and m, respectively, by the merge method presented in the lecture.

  Explain how that characteristic may be exploited

Describe how top-down and bottom-up methods of threat/fault analysis can be used in identifying assets relevant to a scenario. You do not need to be exhaustive but do enough of the analysis to demonstrate you understand the processes.

  Assignment on university database

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records ..

  Capacity as a systems analyst

In your capacity as a systems analyst, you may face situations in which you encounter an ethical dilemma. For example, you may be asked to design a system that supports an activity with which you personally disagree

  Build a decision tree by applying hunts algorithm

build a decision tree by applying Hunt's algorithm

  How many data links will there be along

How many data links will there be along the way when Host R transmits a packet to Host S - How many routes?

  What is the position of the first character in a string

1. What is the position of the first character in a string? 2. Which C++ function(s) return(s) the number of characters currently in a string? 3. Is the data type string part of the C++ language? 4. How many parameters does the substr function hav..

  The concept of ethical obligations

Based on the case study, George Tenet and the Last Great Days of the CIA, in Stillman, Chapter 16, write a 45 page paper in which you

  Describe various types of dos attacks and techniques for pre

Describe various types of DoS attacks and techniques for preventingthem

  Find the sum of the elements of an array called list1

Write a program to find the sum of the elements of an array called list1. The size of list1 is four bytes. The values of list1 are $FF, $1, $FE, and $02. To check your work, the sum should become $0200.

  Compare signature-based and anomaly-based network

Compare and contrast signature-based and anomaly-based network intrusion detection systems. In your analysis, describe at least three ways in which the two types of IDS are similar, and at least three ways in which they differ.

  How offset potential negative implications of the adoption

Develop a virtualization adoption plan applicable to the scenario by doing the following.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd