Information and Digital Literacy
6/4/2023 Information and Digital
Literacy
Lab-Exam Sample
Information Science
HARAMAYA UNIERSITY
0
We build the basis for development
Information and Digital Literacy
Sample 1: cover page
Haramaya University
College of Computing and Informatics
Department of Information Science
Assignments of Information and Digital literacy
Group Name [Link]
1. John Abrahm 156/12
2. Ahmed Belay 125/12
3. Chala Obsa 126/12
4. Abebe Adam 156/13
5. Helen Worku 455/13
Submitted to: John X
June 4, 2023
Haramaya, Ethiopia
i
We build the basis for development
Information and Digital Literacy
Sample 2: symbol and formula
1. Symbols
This is Beta symbol: β
This is Alpha symbol: α
This is sum symbol: ∑
This is infinity symbol: ∞
2. Formulas (Equations)
Area of circle equation: 𝐴 = 𝜋𝑟 2
ℎ∗𝑏
Area of Triangle: where b=base & h=height
2
−𝑏±√𝑏2 −4𝑎𝑐
Radical:
2𝑎
Logarithm: log 2 200
ii
We build the basis for development
Information and Digital Literacy
Sample 3: Paragraph
What Is Cyber Science?
As our lives have become increasingly digitized, those working in data science have become aware
of ever-evolving issues surrounding security and privacy. In our individual lives, this means
keeping our personal information out of the hands of anyone who is not supposed to have access
to it a growing challenge given our expanding uses of digital devices and the need to use digital
archiving to store most of our sensitive information. On the national and global stage, it means
protecting a country’s citizens from the interference of adversaries, as well as refining and
developing responses to attacks.
Indeed, the field of robotics is growing at a rapid pace, already profoundly influencing industries
including manufacturing, finance, logistics, healthcare, and more. However, many of these
machines have not been designed with cybersecurity in mind, partly because the standards of
cybersecurity – including not only technological capabilities but legal frameworks and precedents
are constantly changing. This means that it falls upon cybersecurity analysts to stay aware of
important developments in the field of robotics and continuously formulate new solutions to ever-
expanding problems in cyber security.
1
We build the basis for development
Information and Digital Literacy
Sample Page column Page
Computational Thinking Secure Communications
Beyond learning the ins and outs of how In addition to protecting vulnerable
coding and programming work, it’s critical information such as financial data and other
that those with cyber science jobs have a personal records that can be compromised by
grounding in the problem solving methods outside interference, cybersecurity experts
that cybersecurity experts must use in their are frequently focused on ensuring secure
day to day work. This is called computational communications for their employers. This is
thinking, and is a key discipline in shaping an instance where the convenience of
cybersecurity strategy. information technology – which allows users
to stay better connected and greatly improves
Algorithm Design
possibilities of archiving is also a weakness,
The most sophisticated cybersecurity
as it has moved many companies and
technologies draw heavily from algorithms,
agencies’ most private discussions onto
which can be used for a huge number of
digital platforms, making it easy for outsiders
defensive tactics including (but not limited
to surveil others and compromise their
to) predictive analytics used to anticipate the
internal correspondence. In particular, this is
capabilities of adversaries. Consequently,
one of the greatest cyber threats to national
algorithm design and machine learning
security, though it is applicable in many
(M.L.) are typically a part of cyber science
fields.
coursework. This is yet another area of cyber
science that is continuously evolving and Different programming language contributes
changing, with many developments likely to to this area:
take place even within the span of a few
Python
years. This makes it all the more imperative
for cybersecurity experts to stay on top of JavaScript
these developments to ensure that their own R language
strategies are keeping up with the latest
technology.
2
We build the basis for development
Information and Digital Literacy
Sample 3: Using Shapes
Haramaya University CCI Departments
Department of Department of
Department of
Information Information
Computer Science
Science Technology
Department of Department of
Software Information
Engineering System
The following is the list of CCI departments:
Computer Science
Information Science
Information System
CCI
Information Technology
Software Engineering
Statistics
3
We build the basis for development
Information and Digital Literacy
Sample 4: Using Tables
Student Information Course Information
Student Father Age Department
Course
Course
Name
Code
Name Name
John Smith 25 Information Science Internet INSC202
Programming
Abdi Ahmed 20 Computer Science JavaScript INSC201
Abebe Alemu 25 Information System C++ INSC104
Letu Leta 23 Statistics Python INSC203
List of Ethiopian Universities
University Name City Logos
Haramaya University Haramaya
Jimma University Jimma
Addis Ababa University Addis Ababa/Finfinnee
4
We build the basis for development
Information and Digital Literacy
Sample 5: Font formatting
1. Hello I am underline style
2. Hello I am Italics style
3. Hello I am Bold style
4. Hello I am highlighted text
5. Hello I am colored text by blue color
Left align
Hello I am left aligned text
Hello I am left aligned
Left aligned text
Right align
Hello I am right aligned text
Hello I am right aligned
Right aligned text
Center align
Hello I am center aligned text
Hello I am center aligned
Center aligned text
5
We build the basis for development