Documente Academic
Documente Profesional
Documente Cultură
FDEME3L
Semester 1 & 2
IMPORTANT INFORMATION:
1 INTRODUCTION ……………………………………………………………………….. 3
8 ASSESSMENT …………………………………………………………………............ 7
8.1 Assessment plan ………………………………………………………………………. 7
8.2 General assignment numbers…………………………………………………………. 8
8.2.1 Unique assignment numbers ………………………….......................................... 9
8.2.2 Due dates of assignments…….. ……………………………………………………... 8
8.3 Submission of assignments……………………………………………………………. 9
8.4 Assignments ……………………………………………………………………………. 9
10 EXAMINATIONS………………………………………………………………………… 9
12 SOURCES CONSULTED……………………………………………………………… 10
13 CONCLUSION …………………………………………………………………………… 10
14 ADDENDUM
ASSIGNMENT 01 ……………………………………………………………………..... 11
Assignment 02 …………………………………………………………………….......... 17
2
FDEME3L/101
1 INTRODUCTION
Dear Student
We are pleased to welcome you to the module FDEME3L and hope that you will find it both
interesting and rewarding. We will do our best to make your study of this module successful. You
will be well on your way to success if you start studying early in the year and resolve to do the
assignments properly.
You will receive a number of tutorial letters during the year. A tutorial letter is our way of
communicating with you about teaching, learning and assessment.
This tutorial letter (101) contains important information about the scheme of work, resources and
assignments for this module. We urge you to read it carefully and to keep it at hand when working
through the study material, preparing the assignments, preparing for the examination and
addressing questions to your lecturers.
In this tutorial letter you will find the assignments and assessment criteria, as well as instructions
on the preparation and submission of the assignments. It also provides all the information you
need with regard to the prescribed study material and other resources and how to obtain them.
Please study this information carefully and make sure that you obtain the prescribed material as
soon as possible.
We have also included certain general and administrative information about this module. Please
study this section of the tutorial letter carefully.
Right from the start, we would like to point out that you must read all the tutorial letters you
receive during the year immediately and carefully as they always contain important, and
sometimes urgent, information.
We hope that you will enjoy this module and wish you all the best!
Prof MZ Ramorola
FDEME3L lecturer
3
2 PURPOSE OF AND OUTCOMES FOR THE MODULE
2.1 Purpose
The purpose of this module is to open the modern world of computer and related technologies to
you and to train you to become a computer literate teacher. You will learn: the vocabulary of
computers in terms of hardware, software, processing and networks (including the internet); the
various applications of computer and related technologies in education; and how to use computer
technology in the classroom to enhance your own teaching and your learners’ learning.
2.2 Outcomes
computer literate, in other words have a knowledge and understanding of computers and their
uses
information literate, in other words have a knowledge and understanding of how to find,
analyse, select and use information
integration literate, in other words have a knowledge and understanding of how to use
computer and related technologies in combination with teaching and learning strategies to
enhance learners’ learning
All queries that are not of a purely administrative nature, but are about the content of this
module, should be directed to your lecturer. Please have your study material with you when you
contact him or her.
IMPORTANT NOTE: Letters to lecturers may not be enclosed with or inserted into
assignments.
4
FDEME3L/101
3.2 Department
3.3 University
If you need to contact the University about matters not related to the content of this module,
please consult the brochure my Studies @ Unisa, which you received with your study material.
This brochure contains information on how to contact the University (e.g. to whom you can write
for different queries, important telephone and fax numbers, addresses and details of the times
certain facilities are open).
Always have your student number at hand when you contact the University. The details are as
follows:
4 MODULE-RELATED RESOURCES
4.1 Tutorial letters
The Department of Despatch should supply you with the following study material:
Tutorial Letter FDEME3L/101/3/2015. It contains the scheme of work, study resources and
assignments for this module.
Other tutorial letters that may follow later in the year to discuss further tutorial issues, for
example guidelines for examination preparation.
Some of this tutorial matter may not be available when you register. Tutorial matter that is not
available when you register will be posted to you as soon as possible. However, it is important to
remember that all the tutorial letters and other additional resources for this module are always
available on myUnisa.
Shelly, GB, Gunter, GA & Gunter, RE. 2012. Teachers discovering computers: integrating
technology in a connected world. 7th edition. USA: Cengage Learning.
ISBN: 1-133-52657-8
5
IMPORTANT NOTES REGARDING THE TEXTBOOK:
(a) The sixth edition of the prescribed textbook may also be used for this year’s studies in
FDEME3L.
(b) The assignments (refer to Addendum) clearly indicate which parts of the prescribed textbook
you have to study for this module.
(c) Unisa does not provide the prescribed textbook together with your other study
material. YOU HAVE TO BUY THE PRESCRIBED TEXTBOOK YOURSELF AT AN
OFFICIAL UNISA BOOKSELLER. Please refer to the list of official booksellers and their
addresses in the brochure my Studies @ Unisa. If you have difficulties in obtaining the book
from these booksellers, please contact Unisa’s Prescribed Book Section at 012 429 4152 or
e-mail them at vospresc@unisa.ac.za.
For information on the various student support systems and services available at Unisa (e.g.
student counseling, tutorial classes, language support), please consult the brochure my Studies @
Unisa.
It is advisable to have contact with fellow students. One way to do this is to form study groups. The
addresses of students in your area may be obtained from the following department:
If you have access to a computer that is linked to the internet, you can also join discussion forums
about any issue relating to this module on myUnisa. Please consult the brochure my Studies @
Unisa for more information on how to join myUnisa and get access to its facilities.
You will be linked to the e-tutor who will be supporting you in your studies.
6
FDEME3L/101
It is suggested that you note down the due dates for all the assignments that you have to submit
this semester and compile a study plan according to these dates. You can use the following as a
guideline for planning your studies for FDEME3L:
Period Activity
Semester 1: January and Familiarise yourself with the assignments due in this semester
February 2015 and the required study material by scanning through the
assignments in this tutorial letter and the relevant parts of the
Semester 2: July 2015 prescribed textbook.
Join myUnisa and meet your fellow students on the discussion
forum of the FDEME3L web page.
Semester 1: March 2015 Study the relevant study material in the prescribed textbook for
Assignment 01 (see Addendum).
Prepare and submit Assignment 01 before the due date.
Semester 2: August 2015 Remember to visit and participate in the discussion forum on
myUnisa at least once this month.
Semester 1: April 2015 Study the relevant study material in the prescribed textbook for
Assignment 02 (see Addendum). Complete and submit
Assignment 02 on time.
Semester 2: September Remember to take part in the discussion forum on myUnisa at
2015 least once this month.
Semester 1: May and Ensure that you get a copy of the tutorial letter with the
June 2015 guidelines for the FDEME3L examination.
Prepare for and write the examination.
Semester 2: October and
November 2015
8 ASSESSMENT
8.1 Assessment plan
The assessment plan for this module consists of two assignments and an examination per
semester.
7
The assignments are numbered 01 and 02. Your assignments must be numbered exactly as
specified. Even though Assignment 02 may be the first assignment completed by you, it must be
numbered 02 and not 01.
You will receive admission to the examination if your first assignment is submitted before the final
date of 27 March 2015 for the first semester or 31 August 2015 for the second semester.
Assignment 01 is compulsory because this will indicate that you are an active student – Unisa
needs this information for subsidy purposes. Furthermore, Assignment 01 also contributes to your
year mark for this module.
Assignment 02 is also compulsory because, together with Assignment 01, it will determine your
year mark.
Final mark = 20% of the semester mark + 80% of the examination mark
The examination mark must be more than the subminimum of 40% (if not, the semester mark
will not count and the examination mark becomes the final mark).
Assignments 01are marked by a computer and each has its own unique number that must be
indicated on the mark-reading sheet on which it is answered.
First semester
Assignment 01 588843
Assignment 02 556699
Second semester
Assignment 01 526855
Assignment 02 526950
The assignments are given in the Addendum. The due dates, study material and format for the
assignments are as follows:
8
FDEME3L/101
You should submit your typed assignments electronically via myUnisa. Assignments may neither
be submitted by fax nor e-mail, nor be submitted directly to your lecturer. Refer to the brochure my
Studies @ Unisa for detailed information about the submission of assignments.
Please be aware that you need to supply a unique number for every assignment that you submit.
You will find these at the assignments in the Addendum.
Go to myUnisa (https://my.unisa.ac.za).
Log in with your student number and password.
Select the module.
Click on Assignments in the menu on the left-hand side of the screen.
Click on the assignment number you wish to submit.
Follow the instructions.
8.4 ASSIGNMENTS
10 EXAMINATIONS
For general information and requirements regarding examinations, refer to the brochure my
Studies @ Unisa, which you received with your study material.
This module is a semester module in 2015. This means there is an examination in May/June and
another one in October/November. The Examination Section will provide you with information
regarding the examination in general, examination venues and examination dates and times.
There is no supplementary examination for semester modules. The implication is that if you fail an
examination, the earliest next examination opportunity is the examination of the next semester.
9
10.2 Previous examination papers
Previous examination papers are available on myUnisa under Official Study Material. We advise
you, however, not to focus on old examination papers only, as the content of modules and
therefore examination papers changes from year to year. You may, however, accept that the type
of questions that will be asked in the examination will be similar to those asked in the
assignments.
To help you in your preparation for the examination, you will receive a tutorial letter that explains
the format of the examination paper, gives you examples of questions that you may expect and
sets out clearly what material you have to study for examination purposes.
The brochure my Studies @ Unisa contains an A–Z guide of the most relevant study information.
12 SOURCES CONSULTED
Shelly, GB, Gunter, GA & Gunter, RE. 2012. Teachers discovering computers: integrating
technology in a connected world. 7th edition. USA: Cengage Learning.
13 CONCLUSION
We wish you all the best with your preparation for the examination. Please get in touch with us if
you are experiencing any problems with the study material.
Kind regards
Prof MZ Ramorola
Telephone: 012 429 6965
ramormz@unisa.ac.za
10
FDEME3L/101
14 ADDENDUM
Use a HB pencil to answer all the questions on an optical mark-reading sheet on which your
name, address, student number, module code, assignment number and the assignment’s unique
number are clearly indicated.
Questions 1–15: Determine for each of the questions whether the statement is true or false.
Mark the number “1” on the mark-reading sheet to indicate “True” and a “2” to indicate
“False”.
1. Computer technology and mobile devices play an essential role in how individuals work, live,
play, and more importantly, learn.
2. Organisations rely on technology to help them operate more efficiently and effectively.
4. Information literacy entails knowledge and understanding of computers and their uses.
5. As an educator, technology will not affect your work and your life every day.
7. A communications protocol specifies the rules that define how devices connect to each other
and transmit data over a network.
8. Data sent over the internet travels over networks and communication lines owned and
operated by a single company.
9. The fees for using an online service provider are slightly lower than the fees for an internet
service provider.
10. The world wide web and the internet are the same.
11
11. When working on the computer, the title bar of the document window usually displays a
document’s file name.
12. Spreadsheet software allows teachers and students to create, edit and format documents.
15. A software suite is a collection of multiple application software packages sold as a single
package.
Questions 16–19: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
16. The mechanism used to record and retrieve educational software to and from a medium
where it is stored
17. Nonvolatile memory that stores instructions that are permanently recorded on memory chips
(i.e. cannot change)
18. The contents of this memory are lost when a computer’s power is turned off
19. The type of memory on which educational programs are kept when they are not being
processed or executed
Questions 20 to 23: Choose from the list below the term that best matches the description
in each question. On the mark-reading sheet, mark the digit that corresponds with the digit
of the option you have selected.
21. The ability to match appropriate technology with subject material and teaching strategies in
order to achieve learning outcomes optimally
22. Software that controls the operation of a computer and its devices
12
FDEME3L/101
23. Knowledge and understanding of computers and how to use it to support teaching and
learning in the classroom
Questions 24–27: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
24. A uniform resource locator where information about a mathematics tutorial can be found
25. A program that helps you to find mathematics tutorials on the internet
Questions 28–31: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
(1) desktop
(2) icon
(3) button
(4) menu
(5) command
29. A graphical element that, when selected, causes a specific action to take place
Questions 32–50: Choose for each of the questions the most appropriate answer from the
list of possible answers. On the mark-reading sheet, mark the digit that corresponds with
the digit of the option you have selected.
32. As the world of computers and computer-related technologies advances, it is essential that
teachers gain some level of ____________.
(1) information fluency
(2) integration literacy
(3) computer literacy
(4) information literacy
13
33. Information literacy means ____________.
(1) knowledge and understanding of computers and their uses
(2) the ability to gather information from multiple sources
(3) the ability to use computers
(4) the ability to use other technologies
34. The ability to understand how to match appropriate technology to learning objectives, goals,
and outcomes is referred to as ____________.
(1) computer literacy
(2) integration literacy
(3) information literacy
(4) technology literacy
36. A (n) ____________ is a computer that has the capability to perform input, processing, output
and storage activities.
(1) game console
(2) supercomputer
(3) embedded computer
(4) personal computer
37. A process in which two or more devices transfer data, instructions and information is known
as ____________.
(1) a communications channel
(2) a communications network
(3) communications
(4) communications software
39. When a computer sends data over the internet, the computer’s software divides the data into
small pieces called ____________.
(1) routers
(2) packets
(3) output
(4) input
40. The sent data over the internet travel along the fastest path available to the recipient’s
computer via hardware devices called ___________.
(1) destination
(2) a file
(3) graphics
(4) routers
14
FDEME3L/101
41. ____________ is the main communications line, having the heaviest amount of data packet
on the internet.
(1) Internet address
(2) The world wide web
(3) Internet backbone
(4) Dial-up access
42. A web page often contains __________, which are built-in connections to other documents.
(1) affiliations
(2) junctions
(3) links
(4) coalitions
43. Spellcheckers in many word-processing programs allow the user to check the spelling of
__________.
(1) a whole document
(2) a single word
(3) single words as you type them
(4) All of the above.
44. Using __________ software, an individual can create newsletters, brochures and
advertisements; postcards and greeting cards; letterheads and business cards; banners,
calendars and logos.
(1) CAD
(2) GUI
(3) URL
(4) DTP
46. A(n) ____________ combines text, graphics and other visual cues to make software easier
to use.
(1) operating system
(2) user interface
(3) graphical user interface
(4) system software
47. ____________ consists of programs that control the operations of the computer and its
devices.
(1) The operating system
(2) System software
(3) Application software
(4) Windows 7
15
48. Three popular embedded operating systems include ____________.
(1) Blackberry OS, Windows 7 and Mac OS X
(2) Mac OS X Lin, Google Android and Windows 7
(3) Apple’s iOS, Google Android and Blackberry OS
(4) All of the above.
49. The process of making changes to the document’s existing content is referred to as
____________.
(1) formatting
(2) copying
(3) editing
(4) creating
50. To ____________ involves developing the document by entering text or numbers, designing
graphics and performing other tasks using an input device.
(1) edit
(2) insert
(3) format
(4) create
16
FDEME3L/101
QUESTION 1 [25]
One of the challenges faced by schools today is how to secure critical information on their
information systems. Around 16:30 in the afternoon, Mrs. Raisibe, the principal of Lesedi High
School, is in her classroom making last-minute adjustments to the Excel spreadsheet she plans to
use the following day in the third period mathematics class. As she opens the spreadsheet file to
make one last change, the top of the spreadsheet displays the following message: “Something
wonderful has happened, your PC is alive.” Dismayed, she realises that a computer virus has
corrupted her spreadsheet and she has lost all her work.
In your own words and using practical examples, define the following concepts:
(a) computer security risk (5)
(b) computer literacy (5)
(c) information literacy (5)
(d) integration literacy (5)
(e) computer ethics (5)
QUESTION 2
(a) List five (5) risks that might affect the school’s information system. (5)
(b) For each of the risks in (a), discuss how schools can safeguard their equipment. (20)
QUESTION 3
(a) List and discuss five (5) areas of computer ethics. (20)
(b) Discuss five (5) examples of computer ethics for educators. (5)
QUESTION 4
(a) List five (5) software packages that teachers and learners can use in the classroom.(5)
(b) Discuss the basic purpose of each of the abovementioned packages. (10)
(c) Describe uses of such packages that are unique and specific to teaching and
learning. (10)
Total: [100]
17
SEMESTER 2
Use a HB pencil to answer all the questions on an optical mark-reading sheet on which
your name, address, student number, module code, assignment number and the
assignment’s unique number are clearly indicated.
Questions 1–15: Determine for each of the questions whether the statement is true or false.
Mark the number “1” on the mark-reading sheet to indicate “True” and a “2” to indicate
“False”.
1. On a personal computer, the electric components and most storage devices usually are
located outside the system unit.
2. The random access memory is volatile. Therefore, the program and data stored in it are not
erased when the computer is off.
3. A flash memory card is a non-removable flash memory device that users insert into a
computer device.
4. An input device is a software component that allows the user to enter data, programs,
commands and user responses into a computer.
5. A keyboard is an output device that contains keys users press to enter data and instructions
into a computer.
7. A boot sector virus replaces the boot program used to start the computer with a modified,
infected version of the boot program.
8. Antivirus programs work by looking for programs that attempt to modify the boot program, the
operating system and other programs.
9. A rescue disc is a CD that contains an uninfected copy of key operating system commands
and startup information.
10. Before using any flash drive (memory stick), it should be scanned for viruses.
11. Unlike in many businesses, hardware theft and vandalism in schools do not present difficult
security challenges.
12. In-service means training teachers before they enter the profession of teaching.
18
FDEME3L/101
13. Learning centres allow students to rotate around the classroom to complete projects or
activities.
14. All teaching strategies only have learning theories embedded within the instructional
framework.
15. Teachers learn to combine the different strategies and integration methods suitable and
appropriate for teaching.
Questions 16–19: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
17. firewall
19. the theft of a file that contains a co-learner’s data of a science experiment
Questions 20–23: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
(1) executing
(2) operating
(3) decoding
(4) storing
(5) fetching
20. The process of obtaining a program instruction or data item from memory
21. The process of translating the instruction into commands the computer understands
19
Questions 24–27: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.
24. A digital media application that accepts input from the user and performs an action in
response
25. Software that allows you to create the application or presentation by controlling the
placement of text and graphics and the duration of sounds, video and animation
26. A device that projects the image onto a large screen so an audience can see the image
27. A popular teaching tool which turns a computer and data projector into a powerful tool for
teaching and learning
Questions 28–50: Choose for each of the questions the most appropriate answer from the
list of possible answers. On the mark-reading sheet, mark the digit that corresponds with
the digit of the option you have selected.
29. The ____________ interprets and carries out the basic instructions that operate a computer.
(1) system unit
(2) mother board
(3) central processing unit
(4) All of the above.
31. A series of instructions that tells a computer how to perform the tasks necessary to process
data into information is referred to as a(n) ____________.
(1) input device
(2) program
(3) command
(4) output device
20
FDEME3L/101
32. All of the following are commonly used output devices, except __________.
(1) display devices and printers
(2) pointing devices and keyboards
(3) data projectors and speakers
(4) facsimile machines and headsets
37. To work with a saved file, the file must be removed from ________.
(1) storage and placed in memory
(2) memory and placed in storage
(3) storage and placed in ROM
(4) ROM and placed in storage
38. All of the following are types of non-impact printers, except __________ printers.
(1) dot-matrix
(2) ink-jet
(3) laser
(4) thermal
39. A(n) _____________ projects the image that appears on a computer screen onto a large
screen.
(1) NTSC converter
(2) data projector
(3) LCD projector panel
(4) digital light processing (DLP) projector
21
40. A person who tries to break into a computer system is called a __________.
(1) cracker
(2) hacker
(3) cookie
(4) Both (1) and (2).
44. __________ is the process of converting readable data into unreadable characters.
(1) Ciphertext
(2) Plain text
(3) Encryption
(4) Call-back
45. ________ software prevents your browser from displaying materials from targeted sites or
sites that contain keywords or phrases.
(1) Controlling
(2) Preventing
(3) Filtering
(4) Monitoring
46. A security system consisting of hardware and/or software that prevents unauthorised access
to data and information on a network is called a(n) __________
(1) proxy
(2) firewall
(3) blocker
(4) defender
47. A ___________ virus replaces the program that is used to start the computer system with a
modified, infected version of the startup program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro
22
FDEME3L/101
48. A __________ virus hides within or is designed to look like a legitimate program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro
49. A __________ virus hides virus code within an application such as a word processing or
spreadsheet document.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro
50. The role of a technology committee at school is to help make the decisions on
____________
(1) what new technologies to be purchased
(2) where technologies will be placed
(3) All of the above.
(4) None of the above.
23
ASSIGNMENT 02 (Compulsory) [100]
QUESTION 1 [25]
Today, students are wired for cheating with smartphones, graphing calculators, pagers, tablet
computers, notebook computers, iPods, and other electronic devices. During a test, you
notice that a student is using a cellphone. As you approach the student, you realise that the
student is looking at a picture on the screen of his smartphone. The student puts away the
phone and apologises, indicating that he had forgotten to turn off the phone when a call came
in. After class, another student informs you that the student you caught with the phone was
making calls to another student in the classroom, and they were taking pictures of the
equations. This student was almost positive the two students were cheating by sending each
other pictures of the answers over their smartphones.
QUESTION 2 [25]
(b) Name five types of technology tools (application packages) that you think teachers
should be able to use in teaching activities. (5)
(c) Mention the general use or function of each package and a specialised use of such a
package. Give an example of a teaching task that a teacher can perform with each tool. (15)
QUESTION 3 [25]
QUESTION 4 [25]
(a) Some websites, newsgroups and chat rooms contain content or discussions that are
unsuitable for children. Name and discuss measures schools can take to ensure that
learners do not gain access to inappropriate or objectionable materials. (5)
(b) A school’s records and technology equipment may be exposed to security threats.
Name five such threats that the school could be exposed to. (5)
(c) For each of the given threats, provide the security measure that you will consider in
securing the school’s records and equipment. (15)
Total: [100]
25