ASSESSMENT OF THE REHABILITATION AND FURNISHING OF COMPUTER LABORATORYS
No of pages
|MS Word & PDF
The custom academic work that we provide is a powerful tool that will facilitate and boost your coursework, grades and examination results. Professionalism is at the core of our dealings with clients
For more project materials and info!
Call us here
A Computer is a device that can be instructed to carry out an arbitrary set of arithmetic or logical operations automatically, their ability to follow a sequence operations, called a program.
Make computer very flexible and popular. Such computer are used as control systems for a very wide variety of industrial and consumer devices.
This include simple special purpose devices like microwave ovens and remote controls, but more importantly in general purpose devices like personal computers and mobile devices.
The internet is run on computers and connects millions of these other computer.
Since ancient times, simple manual device like the abacus aided people in doing calculation.
Early in the industrial Revolution, some mechanical devices were built to automate long tedious tasks, such as patterns for looms.
More sophisticated electrical machines did specialized analog calculation in the early 20th century.
The first digital electronic calculating machines were developed during the world war II.
The speed, power and versatility of computers increased continuously and dramatically since then, to the point of possible artificial intelligence in the near future.
A computer laboratory is a space which provides computer services to a defined community.
Computer labs are typically provided by libraries to the public, by academic institutions to students who attend the institution, or by other institutions to the public or to people affiliated with that institution, uses typically must follow a certain user policy to retain access to the computer.
This generally consists of the user not engaging in illegal activities or attempting to circumvent any security or content-control software while using the computers.
In public settings, compute lab users are often subject to time limits, in order to allow more people a chance to use the lab, whereas in other institutions, computer access typically requires valid personal login credentials, which may also allow the institution to track the users activities.
Computers in computer labs are typically equipped with internet access, while scanners and printers may augment the lab setup.
Computers in computer labs are typically arranged either in rows, so that every workstation has a similar view of one end of the room to facilitate Lecturing or presentations, or in clusters, to facilitate small group work.
In some cases generally in academic institution, students laptops carts take the place of dedicated computer labs, although computer labs still have a place in applications requiring special software or hardware not practically implantable in personal computers.
1.1 AIM AND OBJECTIVES OF THE PROJECT
The aim of the project is to rehabilitate and furnish computer laboratory.
The objectives include the following;
To create effective, modern learning facilities providing infrastructure, renowned resources person, access for student and faculty members to electronic and library resources and current teaching and learning technologies.
To create a cadre of leaders capable of advancing education, research and practice in the field of disability and rehabilitation and participating countries of the region.
1.2 REASON FOR THE PROJECT
To strengthen the technological background of the nation and been expose to practical work.
To hasten the level of understanding of the students since they were been exposed to practical aspect of their course of study.
To enlighten the students on practical aspect of their course of study.
To strengthen the technological background of the nation since students are been exposed to practical work.
1.3 SCOPE OF THE PROJECT
The following are the scope of computer laboratory policy that is applied to all users of computers laboratories:
To Identify and protect sensitive or propriety information and computer application from unauthorized alteration or disclosure or physical damage, whether deliberate or accidental.
To protect the laboratory from serious hardware failure or destruction through appropriate backup procedures and contingency plan to assure continuity of laboratory operations.
To prevent the use of university-owned computing and networking resources for unauthorized purpose.
To provide training to the user, operators and laboratory assistants regarding their responsibilities in protecting these laboratory assets.