Sunteți pe pagina 1din 5

Duné Gouws Schutte FDEME3L Examinatation summary 2015

FDEME3L Examination summary

1. Define the following concepts:


a. Computer literacy

When you have knowledge and understanding of computers and their uses.

Its Educational use is installing programs on the computer, replacing ink cartridges and using a
spreadsheet.

b. Information literacy

Knowing how to find, analyse, use and communicate information. The ability to gather
information from multiple sources, select relevant material and organise it into a form that
will allow the user to make decisions or take spesific actions.

Its educational use is to search/evaluate information on the web and use it in a lesson /
subject.

c. Integration literacy

The ability to use computers and other technologies combined with a variety of teaching and
learning strategies to enhance students learning.

It’s educational use is to use computers and other technlogies combined with a variety of
teaching and learning strategies to enhance students learning.

2. For each of the concepts above, mention the type of knowledge a literate teacher
has to demonstrate.

Computer literate teacher should be able to install a new legitimate program on a computer(or
copy a file from a hard disk to a memory stick, or replace the ink cartridge of a printer, or
know how to use a spreadsheet or send and e-mail.)

An information literate teacher should be able to search and evaluate information on the Web
and use it in a lesson in his/her spesific subject.

An integration literate teacher should be able to use information found on the Web to prepare
a presentation for a group discussion in perhaps a LO lesson.
Duné Gouws Schutte FDEME3L Examinatation summary 2015

3. List five software packages that teachers can use in the classroom.
 Word processor
 Spreadsheets
 Presentation graphics
 Database
 Web browser
 E-mail

4. Name three measures schools can take to ensure that learners do not gain access
to inappropriate or objectionable materials.

Filtering software:

Schoold should install internet filtering software on their networks & constantly update the
software.

Acceptable use policies(AUP):

School should set rules that manage the use of school computers, networks and internet by
teachers and students.

Curriculum Resource Pages(CRP):

Teachers should create teacher-created documents or web pages that contains hyperlinks to
teacher selected websites.

Teacher observation:

Teachers monitor their students actively and continuously while they are on the internet.

5. Name three components of the system unit:


 Motherboard
 CPU
 Memory
 Removable memory devices
 Ports and connections
 Expansion slots and cards

6. What is the difference between RAM and ROM?

RAM is volatile memory. ROM is non-volatile memory.

7. What is the difference between ink-jet and laser printers?


Duné Gouws Schutte FDEME3L Examinatation summary 2015

Ink jet printers:

 Can produce high-quality text and graphics in Black, White and colour.
 Forms marks by spraying tiny drops of liquid ink onto a piece of paper.
 Use small ink cartridges that are replaced easily or may be refilled using inexpensive
ink-jet refill kits.

Laser printers:

 Print high-quality Black and white, text and graphics quickly.


 Uses powdered ink called toner in a cartridge. Use xerographic process in which an
image is digitally transferred to paper.
 When the toner runs out, you simply replace the cartridge, it costs more than ink-jet.

8. Draw and complete the table below. Do not include the example in your table.

Application package Specialised type General use Teaching activity


Word processor MS Word Create and edit The teacher creates a
documents question paper.
Spreadsheet MS Excel Allows user to Teacher created a
organise numeric grade book usingh
data in rows and formulas to calculate
columns the marks of the
learners.
Database MS Access Allows user to Teacher organise
create a information about
computerized students in her class,
database, create date of birth, address
forms and reports etc.
using the database.
Web browser Internet Explorer Link the user to Teacher searches for
Google Chrome web sites on the info on the Internet for
internet a certain subjects
Presentation MS Powerpoint Teacher creates Teacher uses slide-
documents using shows to explain
slides to concepts.
communicate ideas,
messages and info
to the learners.
E-mail Gmail To send and Teacher communicated
Yahoo receive messages with experts to get info
on a certain topic.
Duné Gouws Schutte FDEME3L Examinatation summary 2015

9. A school’s records and technology equipment may be exposed to security threats.


Name five threats that it could be exposed to. (safeguard equipment)
 Computer viruses
o Install antivirus programs with reguklar updates.
 Unauthorized access & use by hackers/crackers
o Install a firewall
o Install access control systems
o Create a username & password system
 Hardware theft & vandalism
o Install burglar proofing
o Install alarm systems
 Information theft
o Encrypt the data
o Back up your information
 System failure
o Make regular back-ups
 Software theft
o Lock original package away
o Purchase software licenses.

10. Computer ethics are the moral guidelines that govern the use of computer’s,
networks and information systems. Name and describe FIVE areas of computer
ethics.

Unauthorized use of computers:

Use of computer or network without any permission.

Hardware, software and information theft

Information privacy

The right of individuals & organisations to reject or limit the collection & use of information
about them.
Duné Gouws Schutte FDEME3L Examinatation summary 2015

Copyright

The original author of the the work holds the ownership and has the right to copy the creative
work.

Existence of objectionable materials on the Internet.

Offensive pictures and videos, gambling and age restricted items such as ciggs and alcohol.

S-ar putea să vă placă și