You are on page 1of 14

Zukiswa Petse 67822525 EUP1501-Portfolio October 2020

SECTION A – DIGITAL DIVIDE


On our Eup1501 online discussion platform, N. Mthiyane claims that because of the following list of digital
divide variables, the use of technology in other countries such as South Africa is still restricted relative to the
rest of the world (MyUnisa) :

1. Gap in Infrastructure

2. Revenue\Poverty gap

3. Gap in Literacy

4. Gap of Age

1. Gap in Infrastructure

Since the internet relies on infrastructure to transfer data between two or more computers in various parts of
the world, I believe that adequate internet infrastructure such as reliable power supply, water resources and a
robust transportation system should be introduced to minimize this gap so that it does not have an impact on
social networking, online marketing. Based on that factor, K. Mukhese from our online Eup1501 discussion
group argues that it is a good idea to position "infrastructure" at the very top of the list as a number one
priority because there would be no access to the internet without infrastructure. Consequently, I agree with L.
Muliwa when he states that to reduce the digital divide, our government should create more network towers
and other useful infrastructures in rural areas as well
2. Revenue\Poverty gap

Poverty is the main problem since certain individuals would choose to purchase basic needs rather than
adding technology gadgets' extra costs. D Jordaan said that in today's modern life, a lot of people cannot
afford all these different types of technology available. He further notes that there are children who are
underprivileged because their parents cannot pay. P Ngcobo then further adds that they are unable to afford to
buy these digital devices because of unemployment. For these points mentioned, I, therefore, say to close this
gap, the establishment of an Internet Service Provider will be a great initiative and will provide viable and
reliable internet access to low-income areas at a fraction of the price of commercial data prices and also
provide funding to help lower-income earners afford new technology.
3. Gap in Literacy

Literacy and linguistic considerations have a significant effect on the usage of software resources. It is
obvious that one in four young people in developing countries are unable to read a phrase and also lack basic
literacy, computer and technology skills to help them use Web 2.0 technologies, therefore inspiring people
like providing free computer training programs, investing in learning and literacy in the endangered,
indigenous, national and minority languages spoken by most people in our multicultural, multilingual South
African country is the long-term solution to closing this gap.
4. Gap of Age
It is clear that young people are more open to and able to use technology, while older people are resistant to
change and discourage the use of technology, so I support T. Maja's statement that elderly people need to be
updated, trained and use ABET to help narrow this gap so that they will not be left out of the digital
revolution.
Conclusion:
On this basis, it can be inferred that if the economic problems of weak infrastructure growth, literacy, age gap
and low quality of life/ income levels are tackled, the digital divide can be eliminated.
SECTION B
QUESTION 1 - VOICEMAIL SYSTEM

1. Different hardware that are essential for delivering voicemail messages:

A laptop or a personal computer is required. R. Moliea claims that Microsoft's mobile has fantastic features and
that you don't need a laptop or a personal computer because those things are already covered by this handset.
Hardware specifications needed by the producer are listed below:
A screen
Hard drive
Optical drive
Motherboard
CPU, CD-RW, DVD+RW
USB flash drive and power supply
Sound card, video card, controller for network interface
data ports including audio jack and ample RAM and communication memory.
The most critical hardware such as processor, RAM and hard disk is also highlighted in D. Jordaan..

QUESTION 2
1. The physical constraints that the mobile technology is likely to face
➢ LOSS OR THEFT OF DEVICES
➢ SECONDARY STORAGE DEVICES
➢ POOR OR NO AUTHENTICATION

What I would recommend as a solution.


If a computer is hacked, it may lose confidential information, so it is necessary to have the files encrypted and
to have these problems removed by the wiping system as well.
Screen locking and screen time-out are methods that can be used because mobile devices do not have passwords
or PINS in most situations.

QUESTION 3

2. The social and cultural barriers to the use of mobile phones for delivering voice mail messages
➢ DISADVANTAGED COMMUNITIES IGNORED
➢ PHONE CHARGING AND UNSTABLE BATTERY LIFESPAN
➢ LACK OF SKILLS TO USE A MOBILE PHONES
➢ COMPLEX REGULATORY FRAMEWORKS
➢ GENDER INEQUALITY
➢ LACK OF PERSONAL IDENTITY DOCUMENT
Potential solutions
In most cases, the poorest communities go through the most as they often seem to be left out, especially with
regard to items such as lower incomes, weak infrastructure and the recent growth of mobile network operators,
so it will be necessary to give them priority for coverage, discounts or special pricing.
Another challenge will be mobile battery drainage in a short period of time and D.Jordaan from our EUP1501
discussion group, commented that most laptops have problems when it comes to batteries, especially when
stuck in an area without electricity or during power black-outs, so electricity backup provision is important.
Smartphone usability has always been a concern since the purchase of the phone does not contain any further
instruction manuals.
Regulators are very specific on concerns on money laundering as well as the danger of deposits, as it is
understood that regulation is a key obstacle to be tackled so that mobile banking can be inclusive on a
larger scale.

Their relative costs


3G innovations are getting slower to take off, and consumers are so cost-conscious about how much they pay,
so new mobile services that will add to their bill will not be easy to implement.

ADVANTAGES - on exploring the use of voice mail technologies to deliver messages.


Higher delivered rate.
They are convenient.
Unlimited access to information.

DISADVANTAGES - on exploring the use of voice mail technologies to deliver messages


Connotations of spam-can be confused with scam service.
Very unsecure-it is possible to track and monitor one 's position and data.
Voicemail can be viewed by many clients as irritating and intrusive, particularly if the messages are
constantly coming.
REFERENCES
https://fitsmallbusiness.com/whatisvoicemaildrop/
https://mg.co.za
PRESENTATION TO THE EUP1501 PORTFOLIO
ON THE DEVELOPMENT OF SMART PUBLIC
Wi-Fi IN SOUTH AFRICA

ISIZWE PROJECT
Prepared by:

Zukiswa Beauty Petse

Student number: 67822825

University of South Africa


OUTLINE OF THE PRESENTATION

▪ The presentation will cover the following:


• Website addresses that provide information about the project
• Introduction & Background, including details on the project.
• Project description including ICT4D Solutions used on the project
• Strengths and Weaknesses of the project
• Major partners
• Who initiated the project? How did the project work?
• Target beneficiaries and service providers.
• Conclusion

2
WEBSITE ADDRESSES THAT PROVIDE
INFORMATION ABOUT THE PROJECT

https://researchictafrica.net/publications/Other_publications/2016_Public_Wi-Fi_Policy_Paper_-
_Developing_Smart_Public_Wi-Fi_in_South_Africa.pdf

https://www.itweb.co.za/content/p6GxRKMYaeAMb3Wj

https://1worldconnected.org/project/africa_communitynetwork_projectisizwesouthafrica/africa_communitynetwork_pr
ojectisizwesouthafrica.pdf

Mkhwanazi, D (2017, May 20) Personal Interview Project website: http://www.projectisizwe.org/ Project videos:
https://www.youtube.com/watch?v=Wmx1iULyg80 https://www.youtube.com/watch?v=cTYfYZMa0A8
https://www.youtube.com/watch?v=tf2Z8dAWCQ0

3
INTRODUCTION & BACKGROUND,
INCLUDING DETAILS ON THE PROJECT
▪ The free WiFi Project Sizwe was founded by former Mxit owner Alan Knott-Craig Jnr in 2013 and is
active, based in Johannesburg.
▪ It is a NON- PROFIT ORGANISATION that brings internet access to low income communities.
▪ It was initiated to help bridge the digital divide and its main objective is to provide a base for impoverished
communities to have free internet access to use online educational facilities, facilitating free learning for
those that cannot afford the cost of other forms of education.
▪ Isizwe has helped the Government plan and maintain Free Wi-Fi networks, serving to rapidly make a
‘multiplier effect’ on the financial system and create employment.

4
PROJECT DESCRIPTION
• Project Isizwe aims to bring free Wi-Fi within walking distance to every South African through public Wi-
Fi hotspots.
• Project Isizwe partners with municipalities to plan, install, and launch free Wi-Fi for low-income
communities using existing infrastructure, and work with local companies who provide the necessary
labour and resources.
• The project is able to purchase bandwidth at discounted rates, which drives down costs to less than 1
rand (US$ 0.072) per day per user. This discount is consequential as it makes it affordable for the
government to subsidize free Wi-Fi. Users’ daily data limit is 500 megabytes (MB) per day per device on
the network.
• While Internet access is free, content is restricted – the hotspots do not allow people to stream violent
programs or view pornographic images or videos.
• Due to high demand on the part of the community of Pretoria, Project Isizwe has expanded to 1,050
hotspots.
• Hotspots were deployed strategically in order to increase the effectiveness of Wi-Fi usage by the public.
• Project Isizwe placed hotspots at calculated locations (such as parks, next to schools, in libraries,
hospitals, and police stations) where the public can easily gather and access the network .

ICT4D Solutions that was used in the project


Deployment of wifi hotspots throughout public spaces in low-income communities.

5
OVERVIEW

Strengths of the project:


• Quick deployment
• Costs agreed upfront for 3 years
• Tried and tested and has demonstrated success
• Open network (fosters innovation, competition and private sector involvement)
• Supports private sector investment from the star

Weaknesses of the project:


• Considered expensive
• Not “open access”
• Top-down philosophy – users are not regarded as mature, contributing adults
• Does not position Isizwe to bid for combined Fibre/Wi-Fi deployment project
• Network elements expensive
• Deployment relatively slow
6
MAJOR PARTNERS
The project partnered with municipalities to help subsidize the cost of the network, and with local NGOs to
improve outreach for their programs.
Project Isizwe also works with international companies like Microsoft, Facebook, and Mozilla to provide
infrastructure and technical support.
They partnered with many companies across Southern Africa to bring Affordable or Free Wi-Fi to those who
need it most.
They also partnered with Government to spread awareness.

7
OVERVIEW
Who initiated the process?

NPO announced its pilot project for the City of Tshwane - the first metropolitan municipality in SA to provide free
WiFi.

Target beneficiaries: Low-income communities all across South Africa

Service providers:

Project Isizwe partnered with telecommunications company Hero Telecoms to provide the hardware,
installation, support and maintenance for all sites at costs that wouldn’t be possible in a regular commercial.

Neotel has provided additional bandwidth at no cost as part of their Corporate Social Responsibility
programme.

How did the initiative work?

Free wi-fi access with no login or passwords required. You connect, click and surf in municipal spaces such as
libraries, sports and recreation centres, schools, universities, community centres and parks. Each user is given
250MB per day per device.

When Wi-Fi was launched, the city described the Internet


service as a useful tool for research, starting a business, accessing specialised educational
content online and allowing job-seekers to
browse for work opportunities, adding it formed part of the strategy to build a robust ICT infrastructure.
29 October 2020 8
SECTION D – ETHICS, COPYRIGHT AND IPR IN COMPUTER LABS

1. THE ETHICAL AND IPR ISSUES THAT THE FACULTY ARE CONFRONTED WITH.
The Faculty is faced with legal and intellectual property rights issues such as:
General Copyright
• Faculty copying or sharing the original work of another for their class(s).
Plagiarism
• Students that breach parts of the Academic Honor Code.
Canvas
• Uploading photos or information for student assignments without quotation.
• Post copies of something that is not your intellectual property without quotation or commitment
to prohibitions on fair use.
Copying
• Copying papers for students in your class(s).
• Copying parts of an e-book or book for your class(s).
Handouts
• The use of copyrighted content in classroom handouts.
• Faculty to recognize the Equal Use and Teaching Act.
Students using intellectual property of others in their assignments.
• Student assignments using Internet copyrighted content.
• Students who use copyrighted material on PowerPoint slides without quotation.
https://askus.baker.edu/faq/218195

2. THE STEPS THAT THE FACULTY SHOULD TAKE TO ADDRESS THE ETHICAL AND
IPR ISSUES.
• The Faculty should ensure that all material posted online to students is of equal use in education.
• The Faculty should have a copyright guide to the Faculty 's study of fair use in teaching.
• The faculty should teach students about public domain material or graphics or pictures.
• The faculty should have details on the public domain faculty.
• The faculty should teach students that some of the material and photographs on the Internet are
subject to copyright restrictions.The faculty should explain to students the ethical issues in an
academic setting such as the Academic Honor Code.
https://askus.baker.edu/faq/218195
3. THE CONSEQUENCES THAT THE STUDENT EXPECT TO FACE WHEN CAUGHT FOR
PLAGIARISM.
Students caught cheating can be expelled or dropped from a course.
Student might get a failing grade on a paper.
Student may face disciplinary probation, which includes a behavioral contract by which you must abide.
Cheating can rise to the level of a legal violation when students steal other people's copyrighted work.

The consequences of cheating can be truly dire and range from temporary academic difficulties to
serious legal problems and permanent reputation damage.

https://education.seattlepi.com/effect-plagiarism-students-1195.html
Plagiarism declaration

DECLARATION STATEMENT FOR ASSIGNMENT 01/02

Student number: 67822525

I declare that this portfolio is my own original work. Where secondary material has been used (either from a
printed source or from the internet), this has been carefully acknowledged and referenced in accordance with
departmental requirements. I understand what plagiarism is and am aware of the department’s policy in this
regard. I have not allowed anyone else to borrow or copy my work.

…………………………………………
ZUKISWA BEAUTY PETSE
…………………………………………

(Full Names)

----------------------------------------------------------------------------------------------------------------
End

You might also like