0% found this document useful (0 votes)
24 views8 pages

Information and Digital Literacy Exam Guide

Uploaded by

princefamily877
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

Information and Digital Literacy Exam Guide

Uploaded by

princefamily877
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Information and Digital Literacy

6/4/2023 Information and Digital


Literacy
Lab-Exam Sample

Information Science
HARAMAYA UNIERSITY
0
We build the basis for development
Information and Digital Literacy

Sample 1: cover page


Haramaya University

College of Computing and Informatics

Department of Information Science

Assignments of Information and Digital literacy

Group Name [Link]


1. John Abrahm  156/12
2. Ahmed Belay  125/12
3. Chala Obsa  126/12
4. Abebe Adam  156/13
5. Helen Worku  455/13

Submitted to: John X

June 4, 2023

Haramaya, Ethiopia

i
We build the basis for development
Information and Digital Literacy

Sample 2: symbol and formula


1. Symbols
 This is Beta symbol: β
 This is Alpha symbol: α
 This is sum symbol: ∑
 This is infinity symbol: ∞

2. Formulas (Equations)
 Area of circle equation: 𝐴 = 𝜋𝑟 2

ℎ∗𝑏
 Area of Triangle: where b=base & h=height
2

−𝑏±√𝑏2 −4𝑎𝑐
 Radical:
2𝑎

 Logarithm: log 2 200

ii
We build the basis for development
Information and Digital Literacy

Sample 3: Paragraph
What Is Cyber Science?
As our lives have become increasingly digitized, those working in data science have become aware
of ever-evolving issues surrounding security and privacy. In our individual lives, this means
keeping our personal information out of the hands of anyone who is not supposed to have access
to it a growing challenge given our expanding uses of digital devices and the need to use digital
archiving to store most of our sensitive information. On the national and global stage, it means
protecting a country’s citizens from the interference of adversaries, as well as refining and
developing responses to attacks.

Indeed, the field of robotics is growing at a rapid pace, already profoundly influencing industries
including manufacturing, finance, logistics, healthcare, and more. However, many of these
machines have not been designed with cybersecurity in mind, partly because the standards of
cybersecurity – including not only technological capabilities but legal frameworks and precedents
are constantly changing. This means that it falls upon cybersecurity analysts to stay aware of
important developments in the field of robotics and continuously formulate new solutions to ever-
expanding problems in cyber security.

1
We build the basis for development
Information and Digital Literacy

Sample Page column Page

Computational Thinking Secure Communications


Beyond learning the ins and outs of how In addition to protecting vulnerable
coding and programming work, it’s critical information such as financial data and other
that those with cyber science jobs have a personal records that can be compromised by
grounding in the problem solving methods outside interference, cybersecurity experts
that cybersecurity experts must use in their are frequently focused on ensuring secure
day to day work. This is called computational communications for their employers. This is
thinking, and is a key discipline in shaping an instance where the convenience of
cybersecurity strategy. information technology – which allows users
to stay better connected and greatly improves
Algorithm Design
possibilities of archiving is also a weakness,
The most sophisticated cybersecurity
as it has moved many companies and
technologies draw heavily from algorithms,
agencies’ most private discussions onto
which can be used for a huge number of
digital platforms, making it easy for outsiders
defensive tactics including (but not limited
to surveil others and compromise their
to) predictive analytics used to anticipate the
internal correspondence. In particular, this is
capabilities of adversaries. Consequently,
one of the greatest cyber threats to national
algorithm design and machine learning
security, though it is applicable in many
(M.L.) are typically a part of cyber science
fields.
coursework. This is yet another area of cyber
science that is continuously evolving and Different programming language contributes
changing, with many developments likely to to this area:
take place even within the span of a few
Python
years. This makes it all the more imperative
for cybersecurity experts to stay on top of JavaScript

these developments to ensure that their own R language


strategies are keeping up with the latest
technology.

2
We build the basis for development
Information and Digital Literacy

Sample 3: Using Shapes

Haramaya University CCI Departments

Department of Department of
Department of
Information Information
Computer Science
Science Technology

Department of Department of
Software Information
Engineering System

The following is the list of CCI departments:

 Computer Science

 Information Science

 Information System
CCI
 Information Technology

 Software Engineering

 Statistics

3
We build the basis for development
Information and Digital Literacy

Sample 4: Using Tables

Student Information Course Information


Student Father Age Department

Course

Course
Name

Code
Name Name

John Smith 25 Information Science Internet INSC202


Programming

Abdi Ahmed 20 Computer Science JavaScript INSC201

Abebe Alemu 25 Information System C++ INSC104

Letu Leta 23 Statistics Python INSC203

List of Ethiopian Universities

University Name City Logos

Haramaya University Haramaya

Jimma University Jimma

Addis Ababa University Addis Ababa/Finfinnee

4
We build the basis for development
Information and Digital Literacy

Sample 5: Font formatting


1. Hello I am underline style
2. Hello I am Italics style
3. Hello I am Bold style
4. Hello I am highlighted text
5. Hello I am colored text by blue color

Left align
Hello I am left aligned text
Hello I am left aligned
Left aligned text
Right align
Hello I am right aligned text
Hello I am right aligned
Right aligned text

Center align
Hello I am center aligned text
Hello I am center aligned
Center aligned text

5
We build the basis for development

You might also like