Sunteți pe pagina 1din 25

FDEME3L/101/3/2015

Tutorial Letter 101/3/2015


Computer Integration in the classroom

FDEME3L

Semester 1 & 2

Department of Science and Technology


Education

IMPORTANT INFORMATION:

This tutorial letter contains important


information about your module.
CONTENTS

1 INTRODUCTION ……………………………………………………………………….. 3

2 PURPOSE OF AND OUTCOMES FOR THE MODULE ………………………….. 4


2.1 Purpose …………………………………………………..…………………………….. 4
2.2 Outcomes ………………………………………………………………………………. 4

3 LECTURER(S) AND CONTACT DETAILS …………………………………………. 4


3.1 Lecturer(s) ………………………………………………….………………………….... 4
3.2 Department ………………………………………………..……………....................... 5
3.3 University …………………………………………………..…………………………… 5

4 MODULE-RELATED RESOURCES ………………………………………………… 5


4.1 Tutorial letter …………………………………………………………………………… 5
4.2 Prescribed books ……………………………………………………………………… 5
4.3 Recommended books …………………………………………………………………. 6
4.4 Electronic reserves (e-reserves) ……………………………………………………… 6

5 STUDENT SUPPORT SERVICES FOR THE MODULE ………………………….. 6

6 MODULE-SPECIFIC STUDY PLAN ………………………………………………… 7

7 MODULE PRACTICAL WORK AND WORK-INTEGRATED LEARNING……… 7

8 ASSESSMENT …………………………………………………………………............ 7
8.1 Assessment plan ………………………………………………………………………. 7
8.2 General assignment numbers…………………………………………………………. 8
8.2.1 Unique assignment numbers ………………………….......................................... 9
8.2.2 Due dates of assignments…….. ……………………………………………………... 8
8.3 Submission of assignments……………………………………………………………. 9
8.4 Assignments ……………………………………………………………………………. 9

9 OTHER ASSESSMENT METHODS ………………………………………………… 9

10 EXAMINATIONS………………………………………………………………………… 9

11 FREQUENTLY ASKED QUESTIONS ……………………………………………….. 10

12 SOURCES CONSULTED……………………………………………………………… 10

13 CONCLUSION …………………………………………………………………………… 10

14 ADDENDUM

ASSIGNMENT 01 ……………………………………………………………………..... 11

Assignment 02 …………………………………………………………………….......... 17

2
FDEME3L/101

1 INTRODUCTION

Dear Student

We are pleased to welcome you to the module FDEME3L and hope that you will find it both
interesting and rewarding. We will do our best to make your study of this module successful. You
will be well on your way to success if you start studying early in the year and resolve to do the
assignments properly.

You will receive a number of tutorial letters during the year. A tutorial letter is our way of
communicating with you about teaching, learning and assessment.

This tutorial letter (101) contains important information about the scheme of work, resources and
assignments for this module. We urge you to read it carefully and to keep it at hand when working
through the study material, preparing the assignments, preparing for the examination and
addressing questions to your lecturers.

In this tutorial letter you will find the assignments and assessment criteria, as well as instructions
on the preparation and submission of the assignments. It also provides all the information you
need with regard to the prescribed study material and other resources and how to obtain them.
Please study this information carefully and make sure that you obtain the prescribed material as
soon as possible.

We have also included certain general and administrative information about this module. Please
study this section of the tutorial letter carefully.

Right from the start, we would like to point out that you must read all the tutorial letters you
receive during the year immediately and carefully as they always contain important, and
sometimes urgent, information.

We hope that you will enjoy this module and wish you all the best!

Prof MZ Ramorola
FDEME3L lecturer

3
2 PURPOSE OF AND OUTCOMES FOR THE MODULE
2.1 Purpose

The purpose of this module is to open the modern world of computer and related technologies to
you and to train you to become a computer literate teacher. You will learn: the vocabulary of
computers in terms of hardware, software, processing and networks (including the internet); the
various applications of computer and related technologies in education; and how to use computer
technology in the classroom to enhance your own teaching and your learners’ learning.

2.2 Outcomes

On completion of this module, you should be:

 computer literate, in other words have a knowledge and understanding of computers and their
uses

 information literate, in other words have a knowledge and understanding of how to find,
analyse, select and use information

 integration literate, in other words have a knowledge and understanding of how to use
computer and related technologies in combination with teaching and learning strategies to
enhance learners’ learning

3 LECTURER(S) AND CONTACT DETAILS


3.1 Lecturers

The lecturers responsible for this module are as follows:

Lecturer’s name: Prof MZ Ramorola


Building and office number: AJH van Der Walt Building, Room 7-53
E-mail address: ramormz@unisa.ac.za
Telephone number: 012 429 6965

Lecturer’s name: Mr RAC Raseale


Building and office number: AJH van Der Walt Building, Room 7-23
E-mail address: rasearca@unisa.ac.za
Telephone number: 012 429 4089

All queries that are not of a purely administrative nature, but are about the content of this
module, should be directed to your lecturer. Please have your study material with you when you
contact him or her.

IMPORTANT NOTE: Letters to lecturers may not be enclosed with or inserted into
assignments.

4
FDEME3L/101

3.2 Department

The departmental secretary’s phone number is 012 429 4594.

3.3 University

If you need to contact the University about matters not related to the content of this module,
please consult the brochure my Studies @ Unisa, which you received with your study material.
This brochure contains information on how to contact the University (e.g. to whom you can write
for different queries, important telephone and fax numbers, addresses and details of the times
certain facilities are open).

Always have your student number at hand when you contact the University. The details are as
follows:

 Fax number (RSA): 012 429 4150


 Fax number (international): +27 12 429 4150
 E-mail: study-info@unisa.ac.za

4 MODULE-RELATED RESOURCES
4.1 Tutorial letters

The Department of Despatch should supply you with the following study material:

 Tutorial Letter FDEME3L/101/3/2015. It contains the scheme of work, study resources and
assignments for this module.

 Other tutorial letters that may follow later in the year to discuss further tutorial issues, for
example guidelines for examination preparation.

Some of this tutorial matter may not be available when you register. Tutorial matter that is not
available when you register will be posted to you as soon as possible. However, it is important to
remember that all the tutorial letters and other additional resources for this module are always
available on myUnisa.

4.2 Prescribed textbook

The following textbook is prescribed for this module:

Shelly, GB, Gunter, GA & Gunter, RE. 2012. Teachers discovering computers: integrating
technology in a connected world. 7th edition. USA: Cengage Learning.

ISBN: 1-133-52657-8

5
IMPORTANT NOTES REGARDING THE TEXTBOOK:

(a) The sixth edition of the prescribed textbook may also be used for this year’s studies in
FDEME3L.

(b) The assignments (refer to Addendum) clearly indicate which parts of the prescribed textbook
you have to study for this module.

(c) Unisa does not provide the prescribed textbook together with your other study
material. YOU HAVE TO BUY THE PRESCRIBED TEXTBOOK YOURSELF AT AN
OFFICIAL UNISA BOOKSELLER. Please refer to the list of official booksellers and their
addresses in the brochure my Studies @ Unisa. If you have difficulties in obtaining the book
from these booksellers, please contact Unisa’s Prescribed Book Section at 012 429 4152 or
e-mail them at vospresc@unisa.ac.za.

4.3 Recommended books

There are no recommended books for this module.

4.4 Electronic Reserves (e-reserves)

There are no electronic reserves (e-reserves) for this module.

5 STUDENT SUPPORT SERVICES FOR THE MODULE

For information on the various student support systems and services available at Unisa (e.g.
student counseling, tutorial classes, language support), please consult the brochure my Studies @
Unisa.

5.1 Contact with fellow students

5.1.1 Study groups

It is advisable to have contact with fellow students. One way to do this is to form study groups. The
addresses of students in your area may be obtained from the following department:

Directorate: Student Administration and Registration


PO Box 392
UNISA
0003

5.1.2 Discussion forums on myUnisa

If you have access to a computer that is linked to the internet, you can also join discussion forums
about any issue relating to this module on myUnisa. Please consult the brochure my Studies @
Unisa for more information on how to join myUnisa and get access to its facilities.

5.2 Other support

You will be linked to the e-tutor who will be supporting you in your studies.

6
FDEME3L/101

6 MODULE SPECIFIC STUDY PLAN


The brochure my Studies @ Unisa contains valuable information on general time management
and planning skills, and where to begin with your studies. Please take some time to read through
the 11 steps suggested in this document.

It is suggested that you note down the due dates for all the assignments that you have to submit
this semester and compile a study plan according to these dates. You can use the following as a
guideline for planning your studies for FDEME3L:

Period Activity

Semester 1: January and  Familiarise yourself with the assignments due in this semester
February 2015 and the required study material by scanning through the
assignments in this tutorial letter and the relevant parts of the
Semester 2: July 2015 prescribed textbook.
 Join myUnisa and meet your fellow students on the discussion
forum of the FDEME3L web page.
Semester 1: March 2015  Study the relevant study material in the prescribed textbook for
Assignment 01 (see Addendum).
 Prepare and submit Assignment 01 before the due date.
Semester 2: August 2015  Remember to visit and participate in the discussion forum on
myUnisa at least once this month.
Semester 1: April 2015  Study the relevant study material in the prescribed textbook for
Assignment 02 (see Addendum). Complete and submit
Assignment 02 on time.
Semester 2: September  Remember to take part in the discussion forum on myUnisa at
2015 least once this month.
Semester 1: May and  Ensure that you get a copy of the tutorial letter with the
June 2015 guidelines for the FDEME3L examination.
 Prepare for and write the examination.
Semester 2: October and
November 2015

7 MODULE PRACTICAL WORK AND WORK-INTEGRATED LEARNING


Apart from the assignments and examination, no other practical work or work-integrated learning
is required.

8 ASSESSMENT
8.1 Assessment plan

The assessment plan for this module consists of two assignments and an examination per
semester.

7
The assignments are numbered 01 and 02. Your assignments must be numbered exactly as
specified. Even though Assignment 02 may be the first assignment completed by you, it must be
numbered 02 and not 01.

You will receive admission to the examination if your first assignment is submitted before the final
date of 27 March 2015 for the first semester or 31 August 2015 for the second semester.

Assignment 01 is compulsory because this will indicate that you are an active student – Unisa
needs this information for subsidy purposes. Furthermore, Assignment 01 also contributes to your
year mark for this module.

Assignment 02 is also compulsory because, together with Assignment 01, it will determine your
year mark.

Your final mark for this module is calculated as follows:

Final mark = 20% of the semester mark + 80% of the examination mark

The semester mark is the average of Assignment 01 and Assignment 02.

The examination mark must be more than the subminimum of 40% (if not, the semester mark
will not count and the examination mark becomes the final mark).

8.2 General assignment numbers

8.2.1 Unique assignment numbers

Assignments 01are marked by a computer and each has its own unique number that must be
indicated on the mark-reading sheet on which it is answered.

First semester

Assignment 01 588843

Assignment 02 556699

Second semester

Assignment 01 526855

Assignment 02 526950

8.2.2 Due dates of assignments

The assignments are given in the Addendum. The due dates, study material and format for the
assignments are as follows:

8
FDEME3L/101

Assignment Semester 1 Semester 2 due Study


Format
no due dates dates material
Multiple-choice questions
Chapters 1–4
answered on an optical mark-
01 28 March 2015 29 August 2015 and 8 of the
reading sheet or online on
textbook
myUnisa.
Chapters 1–5
Word-processed document
02 25 April 2015 26 September 2015 and 8 of the
submitted on myUnisa.
textbook

8.3 Submission of assignments

You should submit your typed assignments electronically via myUnisa. Assignments may neither
be submitted by fax nor e-mail, nor be submitted directly to your lecturer. Refer to the brochure my
Studies @ Unisa for detailed information about the submission of assignments.

Please be aware that you need to supply a unique number for every assignment that you submit.
You will find these at the assignments in the Addendum.

To submit an assignment via myUnisa, do the following:

 Go to myUnisa (https://my.unisa.ac.za).
 Log in with your student number and password.
 Select the module.
 Click on Assignments in the menu on the left-hand side of the screen.
 Click on the assignment number you wish to submit.
 Follow the instructions.

8.4 ASSIGNMENTS

There are two assignments to be completed in each semester (see Addendum).

9 OTHER ASSESSMENT METHODS


There are no other assessment methods.

10 EXAMINATIONS
For general information and requirements regarding examinations, refer to the brochure my
Studies @ Unisa, which you received with your study material.

10.1 Examination period

This module is a semester module in 2015. This means there is an examination in May/June and
another one in October/November. The Examination Section will provide you with information
regarding the examination in general, examination venues and examination dates and times.

There is no supplementary examination for semester modules. The implication is that if you fail an
examination, the earliest next examination opportunity is the examination of the next semester.

9
10.2 Previous examination papers

Previous examination papers are available on myUnisa under Official Study Material. We advise
you, however, not to focus on old examination papers only, as the content of modules and
therefore examination papers changes from year to year. You may, however, accept that the type
of questions that will be asked in the examination will be similar to those asked in the
assignments.

10.3 Tutorial letter with examination guidelines

To help you in your preparation for the examination, you will receive a tutorial letter that explains
the format of the examination paper, gives you examples of questions that you may expect and
sets out clearly what material you have to study for examination purposes.

11 FREQUENTLY ASKED QUESTIONS

The brochure my Studies @ Unisa contains an A–Z guide of the most relevant study information.

12 SOURCES CONSULTED
Shelly, GB, Gunter, GA & Gunter, RE. 2012. Teachers discovering computers: integrating
technology in a connected world. 7th edition. USA: Cengage Learning.

13 CONCLUSION

We wish you all the best with your preparation for the examination. Please get in touch with us if
you are experiencing any problems with the study material.

Kind regards

Prof MZ Ramorola
Telephone: 012 429 6965
ramormz@unisa.ac.za

10
FDEME3L/101

14 ADDENDUM

ASSIGNMENT 01 (Compulsory) [50]

Due date Semester 1: 27/03/2015


Unique number: 588843

Study material: Chapters 1 to 4 and 8 of the textbook

Use a HB pencil to answer all the questions on an optical mark-reading sheet on which your
name, address, student number, module code, assignment number and the assignment’s unique
number are clearly indicated.

Questions 1–15: Determine for each of the questions whether the statement is true or false.
Mark the number “1” on the mark-reading sheet to indicate “True” and a “2” to indicate
“False”.

1. Computer technology and mobile devices play an essential role in how individuals work, live,
play, and more importantly, learn.

2. Organisations rely on technology to help them operate more efficiently and effectively.

3. In the classroom, computers and computer-related technologies do not have a profound


influence on the way teachers teach and students learn.

4. Information literacy entails knowledge and understanding of computers and their uses.

5. As an educator, technology will not affect your work and your life every day.

6. Data is a collection of organised facts.

7. A communications protocol specifies the rules that define how devices connect to each other
and transmit data over a network.

8. Data sent over the internet travels over networks and communication lines owned and
operated by a single company.

9. The fees for using an online service provider are slightly lower than the fees for an internet
service provider.

10. The world wide web and the internet are the same.

11
11. When working on the computer, the title bar of the document window usually displays a
document’s file name.

12. Spreadsheet software allows teachers and students to create, edit and format documents.

13. A function is a predefined formula that performs common calculations.

14. The intersection of columns and rows in a spreadsheet is called a chart.

15. A software suite is a collection of multiple application software packages sold as a single
package.

Questions 16–19: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) random access memory (RAM)


(2) storage device
(3) read-only memory (ROM)
(4) storage medium
(5) storage

16. The mechanism used to record and retrieve educational software to and from a medium
where it is stored

17. Nonvolatile memory that stores instructions that are permanently recorded on memory chips
(i.e. cannot change)

18. The contents of this memory are lost when a computer’s power is turned off

19. The type of memory on which educational programs are kept when they are not being
processed or executed

Questions 20 to 23: Choose from the list below the term that best matches the description
in each question. On the mark-reading sheet, mark the digit that corresponds with the digit
of the option you have selected.

(1) computer literacy


(2) system software
(3) integration literacy
(4) application software
(5) utility software

20. Software a teacher uses to prepare an examination paper

21. The ability to match appropriate technology with subject material and teaching strategies in
order to achieve learning outcomes optimally

22. Software that controls the operation of a computer and its devices
12
FDEME3L/101

23. Knowledge and understanding of computers and how to use it to support teaching and
learning in the classroom

Questions 24–27: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) web browser


(2) web address
(3) web page
(4) world wide web (WWW)
(5) search engine

24. A uniform resource locator where information about a mathematics tutorial can be found

25. A program that helps you to find mathematics tutorials on the internet

26. A basic internet service

27. A program that displays the web pages of a school

Questions 28–31: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) desktop
(2) icon
(3) button
(4) menu
(5) command

28. A list of commands from which you can make a selection

29. A graphical element that, when selected, causes a specific action to take place

30. Instructions that cause a computer program to perform a specific action

31. A small image that represents a program, an instruction, or an object

Questions 32–50: Choose for each of the questions the most appropriate answer from the
list of possible answers. On the mark-reading sheet, mark the digit that corresponds with
the digit of the option you have selected.

32. As the world of computers and computer-related technologies advances, it is essential that
teachers gain some level of ____________.
(1) information fluency
(2) integration literacy
(3) computer literacy
(4) information literacy
13
33. Information literacy means ____________.
(1) knowledge and understanding of computers and their uses
(2) the ability to gather information from multiple sources
(3) the ability to use computers
(4) the ability to use other technologies

34. The ability to understand how to match appropriate technology to learning objectives, goals,
and outcomes is referred to as ____________.
(1) computer literacy
(2) integration literacy
(3) information literacy
(4) technology literacy

35. ____________ is data that is organised, has meaning, and is useful.


(1) software
(2) input
(3) output
(4) information

36. A (n) ____________ is a computer that has the capability to perform input, processing, output
and storage activities.
(1) game console
(2) supercomputer
(3) embedded computer
(4) personal computer

37. A process in which two or more devices transfer data, instructions and information is known
as ____________.
(1) a communications channel
(2) a communications network
(3) communications
(4) communications software

38. A basic communications system consists of __________.


(1) two computers, one to send and one to receive data
(2) communications devices that send and receive data
(3) a communications channel over which data is sent
(4) All of the above.

39. When a computer sends data over the internet, the computer’s software divides the data into
small pieces called ____________.
(1) routers
(2) packets
(3) output
(4) input

40. The sent data over the internet travel along the fastest path available to the recipient’s
computer via hardware devices called ___________.
(1) destination
(2) a file
(3) graphics
(4) routers

14
FDEME3L/101

41. ____________ is the main communications line, having the heaviest amount of data packet
on the internet.
(1) Internet address
(2) The world wide web
(3) Internet backbone
(4) Dial-up access

42. A web page often contains __________, which are built-in connections to other documents.
(1) affiliations
(2) junctions
(3) links
(4) coalitions

43. Spellcheckers in many word-processing programs allow the user to check the spelling of
__________.
(1) a whole document
(2) a single word
(3) single words as you type them
(4) All of the above.

44. Using __________ software, an individual can create newsletters, brochures and
advertisements; postcards and greeting cards; letterheads and business cards; banners,
calendars and logos.
(1) CAD
(2) GUI
(3) URL
(4) DTP

45. One type of system software, the operating system, _______________________.


(1) contains instructions that coordinate a computer's activities
(2) is only important when a computer processes information
(3) is not loaded into memory when a computer is first turned on
(4) is loaded into memory from a floppy disk each time a computer is turned on

46. A(n) ____________ combines text, graphics and other visual cues to make software easier
to use.
(1) operating system
(2) user interface
(3) graphical user interface
(4) system software

47. ____________ consists of programs that control the operations of the computer and its
devices.
(1) The operating system
(2) System software
(3) Application software
(4) Windows 7

15
48. Three popular embedded operating systems include ____________.
(1) Blackberry OS, Windows 7 and Mac OS X
(2) Mac OS X Lin, Google Android and Windows 7
(3) Apple’s iOS, Google Android and Blackberry OS
(4) All of the above.

49. The process of making changes to the document’s existing content is referred to as
____________.
(1) formatting
(2) copying
(3) editing
(4) creating

50. To ____________ involves developing the document by entering text or numbers, designing
graphics and performing other tasks using an input device.
(1) edit
(2) insert
(3) format
(4) create

16
FDEME3L/101

ASSIGNMENT 02 (Compulsory) [100]

Due date Semester 1: 23/04/2015


Unique number: 556699

Study material: Chapters 1 to 5 and 8 of the textbook

QUESTION 1 [25]

SCENARIO: COMPUTER SECURITY AND SAFEGUARDING

One of the challenges faced by schools today is how to secure critical information on their
information systems. Around 16:30 in the afternoon, Mrs. Raisibe, the principal of Lesedi High
School, is in her classroom making last-minute adjustments to the Excel spreadsheet she plans to
use the following day in the third period mathematics class. As she opens the spreadsheet file to
make one last change, the top of the spreadsheet displays the following message: “Something
wonderful has happened, your PC is alive.” Dismayed, she realises that a computer virus has
corrupted her spreadsheet and she has lost all her work.

Answer the following questions:

In your own words and using practical examples, define the following concepts:
(a) computer security risk (5)
(b) computer literacy (5)
(c) information literacy (5)
(d) integration literacy (5)
(e) computer ethics (5)

QUESTION 2

(a) List five (5) risks that might affect the school’s information system. (5)
(b) For each of the risks in (a), discuss how schools can safeguard their equipment. (20)

QUESTION 3

(a) List and discuss five (5) areas of computer ethics. (20)
(b) Discuss five (5) examples of computer ethics for educators. (5)

QUESTION 4

(a) List five (5) software packages that teachers and learners can use in the classroom.(5)
(b) Discuss the basic purpose of each of the abovementioned packages. (10)
(c) Describe uses of such packages that are unique and specific to teaching and
learning. (10)

Total: [100]

17
SEMESTER 2

ASSIGNMENT 01 (Compulsory) [50]

Due date Semester 2: 31/08/2015


Unique number: 526855

Study material: Chapters 1 to 4 and 8 of the textbook

Use a HB pencil to answer all the questions on an optical mark-reading sheet on which
your name, address, student number, module code, assignment number and the
assignment’s unique number are clearly indicated.

Questions 1–15: Determine for each of the questions whether the statement is true or false.
Mark the number “1” on the mark-reading sheet to indicate “True” and a “2” to indicate
“False”.

1. On a personal computer, the electric components and most storage devices usually are
located outside the system unit.

2. The random access memory is volatile. Therefore, the program and data stored in it are not
erased when the computer is off.

3. A flash memory card is a non-removable flash memory device that users insert into a
computer device.

4. An input device is a software component that allows the user to enter data, programs,
commands and user responses into a computer.

5. A keyboard is an output device that contains keys users press to enter data and instructions
into a computer.

6. Viruses commonly infect computers through e-mail attachments.

7. A boot sector virus replaces the boot program used to start the computer with a modified,
infected version of the boot program.

8. Antivirus programs work by looking for programs that attempt to modify the boot program, the
operating system and other programs.

9. A rescue disc is a CD that contains an uninfected copy of key operating system commands
and startup information.

10. Before using any flash drive (memory stick), it should be scanned for viruses.

11. Unlike in many businesses, hardware theft and vandalism in schools do not present difficult
security challenges.

12. In-service means training teachers before they enter the profession of teaching.

18
FDEME3L/101

13. Learning centres allow students to rotate around the classroom to complete projects or
activities.

14. All teaching strategies only have learning theories embedded within the instructional
framework.

15. Teachers learn to combine the different strategies and integration methods suitable and
appropriate for teaching.

Questions 16–19: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) a computer/data security risk


(2) a computer/data protection precaution
(3) software theft
(4) vaccines
(5) information theft

16. anti-virus software

17. firewall

18. computer vandalism

19. the theft of a file that contains a co-learner’s data of a science experiment

Questions 20–23: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) executing
(2) operating
(3) decoding
(4) storing
(5) fetching

20. The process of obtaining a program instruction or data item from memory

21. The process of translating the instruction into commands the computer understands

22. The process of carrying out the commands

23. The process of writing the result to memory

19
Questions 24–27: Choose from the list below the term that best matches the description in
each question. On the mark-reading sheet, mark the digit that corresponds with the digit of
the option you have selected.

(1) data projector


(2) interactive whiteboard
(3) software
(4) digital media authoring software
(5) interactive digital media

24. A digital media application that accepts input from the user and performs an action in
response

25. Software that allows you to create the application or presentation by controlling the
placement of text and graphics and the duration of sounds, video and animation

26. A device that projects the image onto a large screen so an audience can see the image

27. A popular teaching tool which turns a computer and data projector into a powerful tool for
teaching and learning

Questions 28–50: Choose for each of the questions the most appropriate answer from the
list of possible answers. On the mark-reading sheet, mark the digit that corresponds with
the digit of the option you have selected.

28. A single point is about ____________ of an inch in height.


(1) 10/72
(2) 1/72
(3) 10.5 pts
(4) 15’’

29. The ____________ interprets and carries out the basic instructions that operate a computer.
(1) system unit
(2) mother board
(3) central processing unit
(4) All of the above.

30. Clock speed is measured in ____________.


(1) megabytes
(2) kilobytes
(3) megahertz
(4) gigahertz

31. A series of instructions that tells a computer how to perform the tasks necessary to process
data into information is referred to as a(n) ____________.
(1) input device
(2) program
(3) command
(4) output device

20
FDEME3L/101

32. All of the following are commonly used output devices, except __________.
(1) display devices and printers
(2) pointing devices and keyboards
(3) data projectors and speakers
(4) facsimile machines and headsets

33. Three commonly used audio output devices are ____________.


(1) text, graphics and video
(2) speakers, headphones and earphones
(3) graphics, speakers and headphones
(4) None of the above.

34. Storage devices can function as sources of ___________.


(1) input
(2) output
(3) input and output
(4) None of the above.

35. A compact disc-rewritable (CD-RW) is an erasable disc. Users can ____________.


(1) write multiple times to different parts of the disc
(2) write to each part of the disc only once
(3) not erase the content of the disc
(4) write to the disc multiple times

36. Memory stores __________.


(1) the operating system and other system software
(2) application programs for specific tasks
(3) the data being processed by application programs
(4) All of the above.

37. To work with a saved file, the file must be removed from ________.
(1) storage and placed in memory
(2) memory and placed in storage
(3) storage and placed in ROM
(4) ROM and placed in storage

38. All of the following are types of non-impact printers, except __________ printers.
(1) dot-matrix
(2) ink-jet
(3) laser
(4) thermal

39. A(n) _____________ projects the image that appears on a computer screen onto a large
screen.
(1) NTSC converter
(2) data projector
(3) LCD projector panel
(4) digital light processing (DLP) projector

21
40. A person who tries to break into a computer system is called a __________.
(1) cracker
(2) hacker
(3) cookie
(4) Both (1) and (2).

41. The most common type of software theft is __________.


(1) stealing a CD-ROM
(2) stealing a flash drive (memory stick)
(3) software piracy
(4) All of the above.

42. Software licenses are agreements that __________.


(1) provide specific conditions for use of the software
(2) users must accept before using the software
(3) outline the rights to use the software
(4) All of the above.

43. A single-user license typically includes the condition that __________.


(1) users may install the software on only one computer
(2) users may make one backup copy of the software
(3) users may not give copies to friends
(4) All of the above.

44. __________ is the process of converting readable data into unreadable characters.
(1) Ciphertext
(2) Plain text
(3) Encryption
(4) Call-back

45. ________ software prevents your browser from displaying materials from targeted sites or
sites that contain keywords or phrases.
(1) Controlling
(2) Preventing
(3) Filtering
(4) Monitoring

46. A security system consisting of hardware and/or software that prevents unauthorised access
to data and information on a network is called a(n) __________
(1) proxy
(2) firewall
(3) blocker
(4) defender

47. A ___________ virus replaces the program that is used to start the computer system with a
modified, infected version of the startup program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro

22
FDEME3L/101

48. A __________ virus hides within or is designed to look like a legitimate program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro

49. A __________ virus hides virus code within an application such as a word processing or
spreadsheet document.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro

50. The role of a technology committee at school is to help make the decisions on
____________
(1) what new technologies to be purchased
(2) where technologies will be placed
(3) All of the above.
(4) None of the above.

23
ASSIGNMENT 02 (Compulsory) [100]

Due date Semester 2: 25/09/2015


Unique number: 526950

Study material: Chapters 1 to 5 and 8 of the textbook

QUESTION 1 [25]

SCENARIO: POSSIBLE CHEATING

Today, students are wired for cheating with smartphones, graphing calculators, pagers, tablet
computers, notebook computers, iPods, and other electronic devices. During a test, you
notice that a student is using a cellphone. As you approach the student, you realise that the
student is looking at a picture on the screen of his smartphone. The student puts away the
phone and apologises, indicating that he had forgotten to turn off the phone when a call came
in. After class, another student informs you that the student you caught with the phone was
making calls to another student in the classroom, and they were taking pictures of the
equations. This student was almost positive the two students were cheating by sending each
other pictures of the answers over their smartphones.

Answer the following questions by citing relevant examples:


(a) Define the term “digital students” and give reasons why these students are different
from previous generations of students. (5)
(b) Referring to the scenario, how would you handle this situation? (5)
(c) Do you know of a way to gather proof of this incident? Explain your views. (5)
(d) What is your feeling about smartphones in schools? Should they be banned in
classrooms? Give reasons for your arguments. (10)

QUESTION 2 [25]

(a) Define the following concepts:


(i) computer literacy (1)
(ii) information literacy (2)
(iii) integration literacy (2)

(b) Name five types of technology tools (application packages) that you think teachers
should be able to use in teaching activities. (5)

(c) Mention the general use or function of each package and a specialised use of such a
package. Give an example of a teaching task that a teacher can perform with each tool. (15)

QUESTION 3 [25]

(a) What are the components of the system unit? (6)


(b) What is the purpose of the central processing unit and system clock? (4)
(c) Name the similarities and differences between RAM and ROM. (2)
(d) Which type of printer is used commonly in schools? (1)
(e) Name some differences and similarities between ink-jet and laser printers. (5)
(f) What is an optical disc? (4)
24
FDEME3L/101

(g) What are the general categories of optical discs? (2)


(h) Which optical disc has the largest storage capacity? (1)

QUESTION 4 [25]

(a) Some websites, newsgroups and chat rooms contain content or discussions that are
unsuitable for children. Name and discuss measures schools can take to ensure that
learners do not gain access to inappropriate or objectionable materials. (5)

(b) A school’s records and technology equipment may be exposed to security threats.
Name five such threats that the school could be exposed to. (5)

(c) For each of the given threats, provide the security measure that you will consider in
securing the school’s records and equipment. (15)

Total: [100]

25