100%(5)100% found this document useful (5 votes) 5K views188 pagesProgress in Computer Studies Grade 9
a good for grade nine to pass with flying colors
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
ACTIVITIES
POD Ul
FLOYD CHANDA
es ALN
Baan tol OXFORDSEAN
REPUBLIC OF ZAMBIA
MINISTRY OF GENERAL EDUCATION
TAGS. came
ve [Link] 220
DEPUTY HEAD |
HOFMEYR DAY SECO
P.O, BOX
OXFORD
‘UNIVERSITY PRESSOXFORD
UNIVERSITY PRESS
Oxford University
It furthers the University’
and education by publishing
‘Oxford University Press in
Published for
Oxford University Press ORBIS (Pty) Limited
‘Vasco Boulevard, Goodwood, N1 City, P O Box 12119, Cape’
South Africa
‘Oxford University Press ORBIS (Pty) ‘Ltd 2013, ¥
“The moral rights ofthe author have been asserted
First published 2018
worldwide, Oxford is a regi
the UK and in certain other:
Zambia by
‘All rights reserved. No part of this
a retrieval system, or transmitted,
prior permission in writing of
or us expressly permitted by law, by licence, or under tse
with the appropriate reprographic rights onganisation. Engines
reproduction outside the scope ofthe above should be seit te the R
‘Onford University Press ORBIS (Pty) Ltd, at the above
‘You must not circulate this workin any other form =
and you must impose this same condition on any sequs
Progress in Computer Studies Grade 9 Learner's Bp
ISBN 978 0 19 073655 2
First impression 2019
‘Typeset in ITC Stone Serif Std 10pton 13.5pt
Printed on 70gsm woodfree paper
Acknowledgements
Publisher: Marie Louise Kriel
Managing Editor: Anja Grobler
Project Coordinator: Anson Banda,
Material developers: Rohan Smit, Erika Gouws
Editor: Erika Gouws
Illustrator: Yvonne Robinson
‘Typesetter: Richards DTP Studios ce
Designer: Cindy Armstrong
Cover designer: Cindy Armstrong
Cover image: © Catiamadio | [Link]
Printed and bound by: ABC Press
‘The authors and publisher gratefully acknowledge permission
een in ue oe cry effort has been made to trace
_ any copyright infringements have been made, the publisher
information that would enable any omissions or errors to be
impressions.
Links to third party websites are provided by Oxford in
information only, Oxford disclaims any responsibility for the
any third party website referenced in this woContents
How to use this book.
cad eee ROM ese
Sub-topic 1 Peripheral devices...
SW ee 2
sub-topic 2. Input-process-output operations 9
summary, revision and assessment exercises 13
Cy emma 15
sub-topic 1 Unresponsive computers... 16
b-topic 2. Security and viruses...... 21
Copyright...... 25
; 28
nary, revision and assessment exercises ....
ee 32
Sry ae) Information technology in everyday life 35
vlsehaues BG)
46
opic 1 Household appliances
Sub-topic 2. Computer-based leaming.....
Sub-topic 3. Computers in banking and e-commerce: 49
topic 4 Point-of-sale......... 53
ub-topic 5 Magnetic and smart cards... 55
Summary, revision and assessment exercises E s 57
Topic 4 Productivity tools: Word Pees!) i}
Sub-topic 1 Keyboard skills... Betis toioc se bvented el a
Sub-topic 2 Document setup and layout. 62
Sub-topic 3. Search and replace... ERS a 68
Sub-topic 4 Copy text from other document window: 70
Sub-topic5 Pagination... aataentee Ti
Sub-topic 6 Page formatting. 74
Sub-topic 7 Finding and file retrieval 78
Summary, revision and assessment exercises s i 81
er es crue) 3
Sub-topic 1 Amending a spreadsheet... a 84
Sub-topic 2. Formatting cells... 88
Sub-topic 3. Sorting and filtering data. 91
Sub-topic 4 Using formulas and functions. 94
Sub-topic § Charts 99
Summary, revision and assessment exercises 103
contents itienim eee
. and custom animation
Sub-topic 1 Using animation scheme:
Sub-topic 2. PowerPoint objects
Sub-topic 3 Slide shows
Summary, revision and Werner execs.
PIT maui screen. Touc
Jects a command from the menu, the output is displayed on the sc
selects a command :
screens use sensors to detect the touch of a finger.
A touch screen tablet that waiters in a
coffee shop can use to print the bill
Modems
A modem is a device that connects a
computer to the Internet. It sends
(output) or receives (input) data from
other computers on the Internet.
It links personal computers to the
Internet through an ISP (Internet
Service Provider).
A modem converts analogue signals
(telephone line) to digital (computer)
and vice versa.
Network interface controllers
A network interface controller (NIC)
is used to link computers in a network
so that you can transmit data from
one computer to another, The NIC
enables the computer to receive data,
instructions and information from
other computers (input). The NIC is also
used to send data from one computer
to other computers on the network
(output). A NIC also be called a local
area network card (LAN card), a LAN
adapter or a network interface card,
10
Topic 1 Introduction to computers
Awaiter using a touch screen to
prepare the bill for customers
Amodem
Modern computers have network
cards and sound cards built into the
motherboard,
An internal network interface controller
circuit boardSound cards
New word
Asound card is an expansion card that provides
xpansion card: a circuit
input and output of audio signals to and from savaiaicn otter
board that you can install on
acomputer. A speaker produces audio output motherboard to give extra
with the help of the sound card. The user uses a functions or memory
microphone to input voice commands into the
computer with the help of the sound card
Hard disk drives a
* Hard disk drives are used mainly for storage
Examples of the types of files stored include:
documents, images, audio files and
spreadsheet files.
* The user is able to create different types of files. A sound card
to save to the computer.
* Once files have been created, a user can open
them again and then show the content on a
reen or print it out as a hard copy.
* The drive contains read/write heads to read
data from the disk (input) but can also write
data to the disk (output).
Magnetic tape drives
* A magnetic tape drive stores information on
magnetic tape.
* The tape is a narrow plastic film with a thin
magnetic coating over it.
* The drive can record information (input)
digitally, which can be retrieved (output)
at a later date.
* The tapes are usually stored on cartridges or 7
cassettes, but for drives that are used as data A magnetic tape reel
storage tape backups, the tape is often wound
on reels.
* These devices are still used as an offline data
backup, because data storage is stable and the
peripherals are inexpensive.
The inside of a hard drive
~!
cea
An external hard drive, a USB.
flash drive and memory cards
Sub-topic 2 Input-process-output operations — 11-
Assessment exercises
For questions 1-5, write down only one co
1. One __is equal to 1 024 megabytes.
rrect option (A, B, C or D).
(1)
A. Bit B. Megabyte C. Gigabyte iD. Terabyte
2. Which part of the computer carries out 2 program’s instructions? qa)
A. Processor B. Hard disk c. RAM D. ROM
3. Amodem converts data from: qa)
‘A. Analogue signals to digital signals C. Digital signals to data signals
B. Digital signals to analogue data D. Analogue signals to network
4. Which of the following input devices can create diagrams or graphic
drawings on the screen? qd)
A. Graphic tablet C. Touch screen
B. Light pen D. Plotter
5. List three advantages of a touch screen monitor. 3)
6. List four examples of computer processing. (4)
7. How can you find out what the speed of a CPU 1s? @)
8. Why are many ports colour coded? @)
9, Explain why you must keep the size of a file in mind if you want to send
it as an email attachment. @ 4
10. The images below show basic information of two computers. Computer
Ais older than Computer B. Use the information to complete the following
sentences:
a) The operating system installed on Computer B is 3 (2)
b) ComputerAhas___of installed memory. 2)
©) The speed of computer B’s CPU is : (2)
view Gadi Information on your computer
FT Windows 10
Windows 10 Pro.
Version 1607
OS Build 143935,
Product ID 0030-0000-0000
Processor Intel(R) Core(TM) i7-4510U
CPU @ 200GHz 26 GHr
Installed RAM 8.00 GB (7.85 GB usable)
Computer B
Total: 25aL
| Copyright
| Storage media
Basic operations
Saeed Ai cadeericbcerad
Unresponsive computer _|* Determine how to shut down an unresponsive computer
“Security and viruses * Determine why usernames and passwords are used on
computers
Identity and apply safety procedures, such as antivirus scans
and virus checks in maintaining data integrity
Know how to check the ID number for a software product
| * Define the terms freeware, shareware and end-user license
| agreement
* Compare the relationship between different measures of
storage media capacities
Starter activity
Work in groups.
1. Stand or sit ina circle in groups of four to five.
© One person thinks of a password of six letters that they would choose to
“lock” their computer, (Note: not your real password!)
* The rest of the group must guess what that password is. If no one guesses
the password correctly, the person can start giving clues.
'* See who gets the answer first.
© Then repeat the game with the next person in the group thinking of
a password.
2. Now discuss in your group: Why is it not a good idea to have a password
consisting of only six letters?
3. Discuss in groups of four or five why you think a computer should have a
password. Write down three good passwords and compare them with the
rest of the class.
‘Topic 2 Basic operations = 15ee.
$UB-TOPIC1 Wnresponsive computers
Shut down an unresponsive computer
When you switch your computer on, the system checks that all the attached
hardware is working and that the operating system loads properly. When all
the files are loaded, you will see the Windows desktop. We call this process
system booting.
‘There are two types of booting:
Cold booting | a)
‘* The computer is on
* The computer is restarted (activ:
= The computer is off.
| + The computer is powered up (Started).
Basic troubleshooting techniques New words
‘When there are problems during the booting Process, "geting: the process of
a computer will need to be forcibly shut down. Many starting or resetting a
basic troubleshooting techniques can help. The
technique that you use will depend on the problem.
‘We will show you some basic troubleshooting steps, as
‘well as common problems.
‘There are four problems that typically cause
computers to be unresponsive. They are:
1. Computer restarts after you selected it to shut down.
2. Computer freezes at Windows start-up screen.
3. The computer does not switch on.
4. Running tasks keep the computer from shutting
down.
We will discuss these problems (and solutions) on the
next few pages.
Computer restarts after you selected it to shut down
This problem usually happens because of a system failure (crash) when the
computer shuts down. By default, Windows reboots after crashing.
Step 1: Click Start (Windows icon). Type in “run”.
oe Type “[Link]” in the dialogue box. Press Enter,
Step 3: Click the Advanced rie
and Recovery. tab and then the Settings button under Startup
‘Step 4: Uncheck the Automatically Restart o
IG topic 2 Basic operationsWindows will then no longer reboot when you shut it down. But it will still crash
The underlying problem will still need to be corrected.
Study all error messages for clues. If the
message is a blue screen with white text (often
called the blue screen of death), it could be
a hardware or driver issue. If you added new
hardware before the problem started, look for
an updated driver or remove the hardware and
uninstall the driver. The system log may give 4 blue screen of death error
more information about the problem. To access it, &SS49€
you can follow the steps below.
[EEEZGM) Fine out why you got the blue sereen of death error message
Step 1: Click on Start (Windows icon). eve
Step 2: Type in “event viewer”. Press Enter.
Step 3: Click on Windows Logs (in the
left-hand pane) to expand the
section.
Step 4: Double-click on System (in the
centre pane),
Step 5: Select any error message for more
information on that error.
Step 6: Click on Event Log Online Help to
find more help online.
Computer freezes at windows start-up screen
There are many possible reasons why a computer can
freeze. Most of the time this can be fixed by restarting _New words
the computer, Should the problem persist, it will manually: by hand
need to be manually corrected in Safe Mode. When boot: to start up a computer
a computer starts in Safe Mode, it launches only 's0 that is ready to be used
basic programs.
Step 1: Start your computer.
Step 2: Press and hold down F8 until you get the Advanced Options menu
screen. If the Windows Be ee asic viens
cestartup
if there are too ™
fun at start-up might hel
computer boot faster
oading while it is
Limit programs that
p you to fix this
A computer might freez
booting, Limiting programs that
problem It will also make your ©
ny programs |
Click on Start (Windows
icon).
Step 2: Type in “task manager”
Press Enter.
Step 3: Select the Startup tab. You
will see the programs that
run when Windows starts. ae
Step 4: Select the program you @ Task Scheduler
do not want to start when ‘Search suggestions
the operating system PD task - See web results >
boots.
Step 5: Click the Enable button to ame
confirm your choice.
Task Manage
File Options View
‘processes Performance Apphistory Startup Users Details Senices
Last BIOS time: 6.1 seconds
Name Publcher satus Startup impact
> I RequiredApplcationsLaunch... Alienware Enabled &
|B Send to OneNote Teo! MicosoltCorporaton Enabled
[Gy status Monitor Application Brother Industries, Ltd. Enabled Low
[El Windows Defender noticati... Micosoft Corporation _tnabled Low
Bl Wondershare Sto ‘Wendeshare Enabled Medium t
screen
Uninstall programs that freeze your computer
If there is a program on
may your computer that
need to uninstall that tat causes your computer to
Ma asta on a NEA: It might be that the boca: . freeze, you
your computer, which causes the Counter ‘ ee
T to crash.
18 ‘Topic 2 Basic operationsSLED voinetan.a program Li
Step 1: Click Start (Windows
icon)
Step 2: Type in “task manager
Press Enter.
» DD @ Fikes 7
Step 3: Look for the Programs
heading.
step 4: Click on Uninstall a
program
step 5: Select a program to
uninstall by clicking on it.
Step 6: Click on Uninstall or
Recent
@® Uninstall a program
Aves
‘Settings
Uninstall/Change, Search suggestions
eee The Task Manager screen
program.
When you click on Uninstall, the program will be removed completely from
your computer. You may need to enter your administrator password to continue
uninstalling the program.
The computer does not switch on
‘Ty the following troubleshooting tips when a computer does not switch on:
eae Tips/Checkp
| Power cord Is the cord securely plugged into
| a working power outlet?
| Use a lamp to check if the power
| outlet might be faulty.
| Is the cord plugged securely into
the computer's power inlet box?
Surge protector | * Is the surge protector switched
‘on? (Reset the surge protector by
turning it off and then back on.) |
Use a lamp to check if the surge
protector is working.
Laptop * Is the battery charged?
Plug the AC adapter into a power | A Surge Protsctor protects
outlet and switch the laptop on. nected Geviess ta
electrical surges.
Running tasks keep the computer from shutting down
All open programs need to be closed before a computer can shut down. If the
computer does not automatically close all the active programs, you can use Task
Manager to force a program to close.
Sub-topic 1 Unresponsive computers 19ut down the
1. (You can also right-click on the
Close a program to shi
eyboare
c vress Ctrl+Alt+Delete on the Key
Step 1: Press Cirls ject Task Manager from the list Of options)
soe tne Task Manager option to see:a list of °° program
1 eect itand click on the End Task button,
Step 2: Sel
Step 3: To close a program, sel
to reboot or shut
Once you have successfully ended the programs, you can try
down the computer.
Hard shutdown
rd shutdown option will force the computer t ‘
by cutting its power. Try to avoid this option unless all other troubleshooting
measures fail to work. This option can cause errors with open applications,
causing you to lose data and possibly corrupt system files.
‘o shut down
Asa last resort, the ha
Step 1: Hold down the power button until the computer shuts off.
‘You can also unplug the power supply to the computer. @
When you restart your computer after a hard shutdown, itusually A typical
runs diagnostic tests to verify the integrity of the file system. power
button
Activity 1 Solve problems with unresponsive computers
Work in groups.
1. Name and explain two differences between the two types of booting.
2. Give two ways to open Task Manager.
3. A leamer at Lyambai Secondary School has her own computer. She tells you
pate has the following problems with her computer.
* The computer does not load the operating sys! 1
tem i
* The computer restarts on its own. . mace
* A blue screen with a stra:
inge message displays o1
s What could cause each of these problems? ns Compute
A ») a troubleshooting tips that might solve each proble:
. Explain to the other learners in your group what a
4 a computer does not want to switch on aaa oe
}) you want to restart a computer in Safe Mode
20 topice Basic operations-TOPIG2 Security and viruses
Improve computer security against viruses
Ifa computer or any other digital device is not
properly protected, confidential information can be
stolen or lost. We need better security methods to
protect data and information
security: ensuring that
New words
computer resources are free
from unauthorised internal and
external manipulation
access co!
The need for usernames and Features that control who
passwords can access resources in the
operating system
The Windows operating system has access controls authentication: a process by
to help keep data and information safe against ‘which you verify that someone
unauthorised access. These include who has access ee Sey xe
to log into the system and who may make changes Combination of letters and
to the system. numbers that you enter on 2
seis computer to access the system
Authentication authorisation: a process
: of establishing if the user is
Windows creates an account for new users for permitted to have access to a
authentication purposes. Authentication is how resource
you verify that someone is who they claim to be. It
usually asks the user for a username and a password to log in to a computer.
A password is a combination of letters and numbers that cannot easily be
guessed by others. Good passwords have at least eight characters of uppercase
and lowercase letters, as well as numbers and other keyboard symbols.
Example: RnSK2mL"8.
Normally, when you type in a password it will
display as dots. This is to make sure that nobody
sees your password when you type it in. If the
user’s password does not match up with the
username, access is denied. You usually get only
three tries to enter the correct password. If you do
not get it right, the system locks you out. You will
then have to wait for the system administrator to
Teset your password.
Authorisation
A login screen with
username and password
Once a user is authenticated, the authorisation process determines what a user
can and cannot do on the computer. The level of authorisation is determined by
the group they are a part of. If the user is part of the Administrator group, they
will be able to perform any function on the computer. ;
Sub-topic 2 Security and viruses 21Verify software's authenticity
» instead of buying th
ed software il vortant that you verify (check) if
e original program because it
A user might use pit
: eg imp
». Pirated software is illegal. It is v
is too expensive Pirated sof ee tg
your software is authentic (legal). The table below shows how y
|
t In.
1. Company logo _| Onthe actual computer the software is installed on.
2. Product key ‘On the program package.
On the install CD.
On the installation card.
| Inthe email received from the software company (if bought online). _|
3. Onlineaccount | A registered account with the company will automatically see
and authenticate the Installed program online and keep verifying i
| every time the user connects to the Internet.
Click on Start (Windows
icon).
Step 2: Type in “activation”.
Step 3: Press Enter
If the software is legal, you
will see an activation notice
like the one on the right.
PNetNe i o)
Nii)
The Activation screen on Windows 10
Pro
Computer security
Itis important to keep the data on your computer safe. This type of security is
called computer security. Good computer security will help that you do not lose
any information or documents. When you share a computer with other peopl
computer security is even more important. ee
What is a virus?
A virus is a program that interferes wi
s with the normal funct
avin ; ‘al functioning of the c:
cu clog - system's memory, make copies of itself, or cist an autnaa
1 n that other computer programs use, There are three sane
virus. The table below summarises them. eae
Dee
Itinfects the hard disk’s boot sector
feu structured on the hard drive, and affects the way in which data is
Ee | It atta elf to executable fi
[Shion vis | tintocts specie sytem wee
oyst of exe exten
files (such as command,
sions).
Topic 2 Basic operations| ror 2
bomb, Trojan horse and worm
afew examples of computer viruses are the tim
eet I ube
Prwitstartonaspectic | twill access & ‘computer
| ate, ata certain time and | through email or free
tis written to infiltrate & program
and alter or destroy data
detme the computer to | programs to try 0 Git | Worms often use net work
| {ose its ability to function | access ‘tothe computer. | connections to spread from one
| properly. | puter system to another.
Antivirus software
Antivirus software is used to protect computer systems put needs to be kept up to
date. Antivirus software is divided into two sechOUss Scanners and integrity checkers.
caw
it detects a virus by its unique signature.
It detects a virus by lock ing for any modifications
Most antivirus software will automatically scan for viruses jn the background.
if any viruses are found, it will clean them.
What to do if your computer gets a virus
Vimsses can harm your computer system and must De removed before serious
damage is done. Examples of antivirus software are Bitdefender and Norton.
rm
Step 1: Open the antivirus program.
Step 2; Ruma full system scan.
When you find threats
The antivirus program will notify the user
if there are any threats. The program will
provide various options to handle the
infected files. Usually, the recommended
action for each threat is the best choice.
Ways to guard against viruses
Follow the guidelines below to protect
ven Soames against viruses.
. Install a good quality antivirus Avirus alert di puter
isplayed on a com|
program. screen
2. Run updates regularly.
3 Scan all drives connected to the computer.
. Do not open suspicious email links, attachments or websites.
Sub-topie 2 Security and viruses 23.Viruses on external storage media
Viruses can “jump” from one device to another through a memory card or other
removable media, That is why a device, even if it is not connected to the Internet
needs to have an updated antivirus software program.
Viruses on memory cards
There are many types of memory cards. Cards with a storage capacity of up to
64 MB are common, but there are cards that can store up to 2 TB of data. They are
used in computers, digital cameras and smartphones.
Step 1: Find the specific opening for the memory card.
Step 2: Insert the memory card in the card teader. Do not force the card into
the slot. Check that the card is the facing the right way up.
Step 3: Open Windows Explorer.
Step 4: Browse the files on the memory card.
Find the specific opening for the memory card. Switch off the device.
Carefully remove the memory card tray or back cover on the device.
Step 3: Place the memory card in the tray or in the opening.
Step 4: © Ifa tray is used: Slide the tray back in the ;
‘opening and close the back cover.
* Ifno tray is used: Gently press the
memory card until it in snaps into place.
Close the back cover.
| Activity 2] Dealing with computer security and viruses
Wor
rk on your own.
1. Explain the difference between the following pairs:
) Authentication and authorisation
b) Scanners and integrity checkers.
When logging on to a computer, certain infi ion i
, o
ue pieene rmation is requested, |
¥. sive an example of a good password,
plain why your antivirus program should
Give two examples of computer viruses, Se apehec aaa
. Give four precautions to
Zz,
gee
smartphone, and how you would remove in STONY catd into a
24 Topic 2 Basic operationsCopyright
The need for copyright
software developers spend a lot of time, money
and resources on creating software. Some people
use programs that they have copied from the
original versions, or downloaded from an
unofficial site on the Internet. This is known
and piracy. AS a result, copyright laws were
established to prevent people from copying,
selling and making a profit without permission
from the original developers.
License agreements gh,
To prevent software piracy, software developers s
jssue a license agreement for each computer
program. This is accompanied by a license ib
‘number (also called a product ID or product
key). You must type in this number when
you install and register a program. The produ:
Example of an illegally copied cD
ct ID number is on the cover of the
program package, a sticker on the actual CD or in the documentation you received
if you bought the program online.
Proprietary software
When software developers create a program,
they apply for one or more patents on the
y
software, These patents allow them exclusive
ct ‘ownership of the program’s design
n id the code used to create the
1is means that the manufacturer
ary rights to this specific
people are not allowed access to
source code and the right to
fy and sell the software.
y software developer will provide
software with a purchased
Il under certain conditions. These
the following:
change or adapt the program.
‘resell the original program or its
Sub-topic 3 Copyright = 25dvantages and disadvantages of proprietary software
A eee ules ee
es
poodles ‘A licence must be purchased to use the
cific nee
|1. The software's created for a specific ee:
2. The user must ensure their hardware
| software is developed to run on
jeepeiics ane
& ‘The softwarecan be integrated with 3. Training people to operate the software
|” other existing software from the same may be costly.
manufacturer. 4
4. Dedicated customer services are available. | 4. Some features of the software might not
| be required. |
Open source software
Recently, communities of developers have joined together to develop software
that is referred to as open source software. Open source software is when the
source code of the software is made available for everyone to copy, modify and
redistribute at no cost. Any extra development of the program can be made by
individual programmers, users as well as companies. Examples: GNU/Linux,
Eclipse, Apache and Mozilla.
Advantages and disadvantages of open source software
Advantages l
Disadvantages
1. Itis available to anyone at no cost. 1
. Instruction manuals for the software
usually come ata cost.
2. The software can be adapted to the
2. Many versions of the same software exi
user's needs, including the latest features pee
‘ making it difficult to find @ solution if
and ideas. problems occur.
3. The developers work continuously to 3. There may il i
. y be less support available if
improve the software. experience problems. —
Freeware
Tee is a combination of “free” and
‘software”. It means that no licenses need to
be purchased to use the software. There are no
expiry dates or restrictions
‘on how ma
the user can ee inans:
OF use the software.ro ensure users follow the proprietary ¥ Sas and Conditions
license agreement when they install a
program, they are required to accept
the software manufacturer's rules and
regulations set out in a document.
‘This document is called the EULA
(end-user license agreement). The user
accepts this agreement by clicking the
wiagree” button before the software Is
installed.
The importance of copyright
Work on your own. a
Type this into the address bar of a browser on the Internet z Bi
[Link]. Then download this activity from
the folder: Gr9CS_Topic 2_Act 3_Copyright.docx.
You could also scan the QR code shown here with a
smartphone to download the activity. Follow the instructions in
the document.
4. Wambinji downloads music videos from YouTube so that he can sell copies to
his friends.
a) What is this activity called?
b) Why is this activity illegal?
2. Whatis the difference between proprietary, open source, freeware and
shareware software?
3. List three advantages of proprietary software.
4, List two disadvantages of open source software.
5. Explain why a user needs to accept a software company’s EULA.
6, Open the document Gr9CS_Topic 2_Act 3_Copyrightt.docx and complete
‘the instruction in the file. Save the ‘document as Gr9CS_Topic 2_Act 3_
_ Copyright_.docx.
7. Work in pairs.
¥ a) Show where you would go in a program to read its EULA
‘Show where you can see if the program is proprietary, open source,
| freeware or shareware software
Sub-tonic 3. Copvieht 22SUB-TOPIC4 Storage media
Different types of storage media
Storage is a very important part of a computer, It is used to store both oe
7 z. can be
and user data and files. It can also affect a computer's speed. Storage
divided into primary memory and secondary memory.
Primary memory
Primary memory is temporary memory. This means it loses the information stored
in it when you shut down the computer. We say primary memory is volatile as it
is temporary. The main advantage of primary memory that is very fast and
information can be written to and read from it very quickly. The CPU uses
primary memory to store the instructions (program) and the data it is processing
at the time. Primary memory is referred to as RAM (random access memory).
When you start your computer, the operating software is copied from the hard
drive into RAM. As you work, all the information
You enter is kept in RAM until you save it. When you
save your work, it is saved to the hard drive. If the
computer is shut down before the information is saved
to the hard drive, all the information will be lost.
Primary memory is fast because, unlike the hard
drive, it is close to the CPU and does not use slow
magnetic media,
Secondary memory
Secondary memory is permanent memory. This means information saved to it
's kept safely, even if the computer is turned off. So we Say secondary memory
‘S non-volatile. Hard drives, CDs and flash drives are examples of secondary
memory. The disadvantage of secondary memory isit i
€ is usual
; eas ry ly a lot slower than
Secondary memory is also much lar a
n ‘ger than primary memo: , SO you can store
ae information and files, When you save your work, it is wanes i. theta
ive and will stay there until you delet
leeds. @ newer version of
The table below gives a comparison of Primary and secondary memo}
ry.
Two RAM modules
te it or write over it with
Fast readi
information: "4 W'ting of
Non-volatile,
larger capacityees Ee
storage devices
Computer users need to keep information safe so that it is not lost. To do this, we
save it to an internal hard drive or to an. external storage device as 4 backup In the
sections that follow, we will look at various secondary memory storage devices
Hard disk drives
There are two types of hard drives. They are hard disk drives (HDD) and solid state
drives (SSD). These may be internal drives that are fitted inside the computer
system or external drives that can be moved from one computer to another. An
internal hard drive in a computer holds the operating system, all the installed
software, as ‘well as all the files that the user has saved.
Hard disk drives contain one or more rotating
disks and rely on magnetic storage. The disks inside
« hard disk drive are coated with a thin film or layer
of magnetic material. To store the data, this film gets
magnetised. As the disk spins ata high speed the
magnetic head, mounted on a moving arm, reads
and writes data. A typical hard disk drive operates at The inside of a 3.5" hard
a speed of 7 200 revolutions per minute (rpm) aad en
can be identified by a faint humming noise.
Solid state drives have no moving mechanical parts but ust flash memory like
flash drives. Most computers have magnetic hard disk drives because solid state
drives are much more expensive and do not store as much information. Both
types of hard disk drives come jn various sizes that range from 1 TB to 8 TB or
more. If extra storage capacity Is required, additional internal hard drives can be
installed, or separate external hard drives can be connected.
Optical disk drive
Most computers have an optical disk drive.
Depending on the type of drive it ‘will be able to
read CDs, DVDs and Blu-ray disks. More advanced
types of drives will also allow the user to write data
to an empty disk to create a backup of thelr data.
The optical disk drive (ODD) reads data from or
‘Writes data to an optical disk by using a laser beam,
( ght). The user can load documents, listen
“or watch movies written to these disks.
software that needs to be installed on the
puter is often supplied on these disks.
‘An optical disk drive with
open tray
Sub-topic 4 Storage media = 29)An optical disk drive comes with two general types of loading mechanisms, as
shown in the table below.
ela)
Ake ue fa ueaie,
Tray-loading mechanism _ | The disk is placed on a motorised tray that moves in and out of
the drive.
| Siot-loading mechanism _| The disk is slid into a slot and motorised rollers move the disk in
| and out of the drive.
Types of disks
The first type of optical disk was the compact
disk (CD). It contained music for people to listen ®
to, Then the compact disk read only memory
(CD-ROM) disk was developed. It held read-only
data (files and software) for use in computers |
and became the preferred method to distribute
software. The next type of optical disk that was
tical dises look
developed was called the Digital Versatile Disk or a Hes OF Seto cece
Digital Video Disk (DVD), which was followed by Z
the Blu-ray or Blu-ray Disk (BD).
Flash drive
A flash drive is a small storage device used to
store data. Unlike the optical disk drive and the
traditional hard disk drives, it has no moving parts,
but uses solid state flash memory, similar to an SSD. <
It connects to a computer through the universal =
serial bus port (USB). These portable devices are
often referred to USB drives or thumb drives. Atypical flash drive
Flash drive storage capacities range from 4 GB up to 128 GB. As with other
Storage devices, data can be written and rewritten to these drives for an unlimited
number of times. Owing to its size,
faster speeds and portability, these drives have
almost replaced other storage media such as CDs, DVDs and BDs.
Storage capacity
The amount of data a storage device can hold is measured in kilob
megabytes (MB), les (G' iene cares
a ee eee =. ae terabytes (TB). One byte is one character
multiples of 1024,
* Akilobyte is 1024 bytes,
* A megabyte is 1024 kn.
* A gigabyte is 1024 MB,
* A terabyte is 1024 Gp,
hearts
CD-ROM size
OVD size (conventional)
8D size (conventional,
e 2 Basic operationsTO!
Examples of popular storage media, showing storage capacity
Memory cards USB flash drives
Solid state drives Hard disk drives
ya es
ig with different storage media
- Explain to Chenda what the following words mean:
a) RAM
b) HDD
9 cD
d) CD-ROM
©) DVD
f) BD
8) USB.
What is the difference between ptimary and secondary memory?
What does volatile mean?
List the types of secondary storage devices.
Work in pairs.
) Show how you would find out the available Space on the computer's
hard drive.
») You have picked up an optical disk. How do you know what type of optical
disk it is?
Sub-topic 4 Storage media 3}att) dle
Summary, revision and
2 assessment exercises
Summary
Unresponsive computer
* Booting is the process of starting or resetting the computer and is grouped into
two categories called cold booting and warm booting.
* Computers can have problems during the booting process. These problems are:
1. Computer restarts after you selected it to shut down.
2. Computer freezes at the Windows startup screen,
3. The computer does not switch on.
4. Running tasks keep the computer from shutting down.
* When a computer starts up in Safe Mode, it only launches the basic programs
and services that are required.
Security and viruses
* To safeguard data and information
against unauthorised access, the
Windows operating system is equipped
with access controls.
A virus is a program that has been
written to interfere with the normal
functioning of a computer.
itis important to install an antivirus
Software that will detect and warn the
user if a virus is detected.
Copyright and storage media
* Copyright laws help to curb Software piracy of
license agreements. These agreements are often
Computer storage refers
Proprietary software through
called EULAs,‘doydey au
“Arayeq pesreyp v asp “a 0} ASNOUL PalIM B BUUOD *D
sroyajo1d ans oy} SOY “A “pio 1amod ay Yad *y
(wD ‘uo doydey ev yous 07 8urAn
are nod 71 [NYdyay aq you TIM sdy SupooYsetqnon SuTMOTIOJ AY} JO UUM “E
areMyos amos usdo “qd aremareyg "Dd
aremyos Areyatidoig “@ aremaaly "WY
{se UMOUY st 10] pred sem yeu wiersoid y *Z
Sap ASIP prey [eureyxg “C aALIp YSIP prey [UTA] “D
soqund “@ Alp USPLE “VW
@ {qiod gsp & 07 2aUOD LON S2op s22142p SUTMOTIOS at JO UIUM “T
-(@.10 2 ‘g ‘y) uordo yax109 uo ATUO UMOP ayTIM. “s-1 suonsanb 105
sasio1exe JuauIssessy
@
ST 1E30L
@
@
-4quaueanad eyep arois 01 a8esoys Areurtad asn aM (4
‘gay sl aremareys (@
“yuautaye}s W2H0I
au} UMOP az1IM ‘asTey JI ‘asTey 10 any are syUsUIE}e}S Surmoyjoy ayy Ft Aes “01
(AIoWaW aTeIOA pares A1owrsut Axeurtd st gM 6
UAV peau saynduros ev saop AUM “8
{aavy Jayndwiod e saop Arouraur jo sad UM “L
“snatA aynduros k Jo sajdurexa 0M} aAID “9
jaavy uraysds Sunerado smOpUIM at SAOP [OOD ss209e joadg eum “S
@umop }T 3NYs 0} pay aaey Nod Ua ‘Buyueyser
wioy rayndusoo e yuaaard 0} asn NOA ued anbruypay SuHooyseyqnoy WUM “F
“uTOOg WEM pue ZUHOOG Plo? UEaMJaq a2T2I2HIP
au} Jay 07 UTe|dxy ‘W1IeM IO Pfo> aq JeyRTE Ur Sunoog syndurod
say SHBYS BYS UAY 300 A[TedHEUOINE [TM saynduros ayy smouy eAQUOT *€
AN ‘ax ‘AD “L'a GN ‘aX ‘aL ‘99
aL ‘AD ‘AN ‘a “A 9 ‘aX ‘HLL ‘aN 'V
w -ysaSaey ayy 0} ISATTEUUS AU WO aBeI0ys Jo spun Surmoyjoy au asueny "T
aremygos Burssavord prom “C1 aIeMYOS UOHRIUASAd “OD
aremyos wayshs Bupesedo “a aremzyos yaayspeads “V
{UO PaYyoILMs sy} sayNdwUO? eu
aya Asowsaul a4) OF ISI PAPLOT Aq [11M BRMIOS Supmorqoy ayy Jo HOM Tt
(30D ‘A ‘¥) UORdO JasI09 BuO {uo umop ayaa ‘Zt suopsenb 104
SOS1910XO UOISIACH
@
@
@)
@
@
(s)
(y)
@Summary, revision and assessment
exercises continued
10.
ll.
12.
13.
14.
15.
Serene
Which of the following optical storage media has the most i
storage available?
ieee ob B. BD c. DVD p. CD-R
What kind of program is written to interfere with the normal
functioning of the computer? a)
slain what Cheelo must do to “hard shutdown” computer. qa)
Give one example of a good password. (2)
Explain to Katendi what a computer “worm” is (2)
Antivirus software is divided into two sections. What are they? (2)
Explain what open source software is. Give one example. GB)
Give three troubleshooting techniques to solve each of following problems:
a) The computer restarts after you selected it to shut down. GB)
@)
b) The computer freezes at the Windows startup screen.
©) The desktop computer with no surge protector does not switch on. @)
re in a table. (4)
List two advantages and disadvantages. of proprietary software
List the steps to uninstall a program that has become unresponsive. (6)
Identify each of the following images. (10)
a) ‘b) °
d)
lain
ee you would do the following:
Dy @ CD into a computer system.
enovs a virus from a memory card, a
Total: 50Mal
4 Information technology
in everyday life
Sd eke cae
Household appliances * Describe particular technologies being used for speci
purposes in the home
* Infer, using examples, how information and communication
networks create a global community
| + Demonstrate an understanding of new and emerging
|___ communication systems
Computer-based learning | * Identify different types of CBL software
[CBU — u ats es
Computers in banking | * Associate the use of computers to organise, retrieve and
and e-commerce Process data
* Appreciate the linking of computers in different locations to
| | enable electronic fund transfer
* Describe e-commerce and the process of purchasing goods
and services online
List advantages and disadvantages of e-commerce _
Point-of-sale * State common uses of computers in a supermarket
| Magnetic and smart cards | * Associate the use of a PIN (personal identification number) as
a security measure to initiate a transaction using a magnetic
card
* Describe the benefits of the trend towards cashless electronic
transaction
Starter activity
Work in groups of four or five.
1. Discuss the following:
a) Using a debit card is a much safer way to buy products.
b) How to connect a television to a hi-fi system.
©) List two advantages and two disadvantages of using old cash registers at
the supermarket checkout instead of the newer scanning systems.
d) How to scan a photo to a computer.
2. Make a list on the board
ae shows the names of
networking sites,
and how many learners wr
are members of each.
Instagram
Popular social networks
Topic 3 Information technology in everyday life = 35,suB-TOPIC 1 Household app iances
Technologies used in the home
almost every home and office. We see this when
Je see progre: echnology in
We see progress in technology ieepecyday
eer rae
we look at different appliances. These appliances give quick solution:
problems. They save humans time, energy and space
Connect household appliances SS ae
In this sub-topic, we will look at a few appliances
that we find in the house. We will also explain how
to connect them to a computer or other devices.
A decoder
Decoders
Most of the television sets we now use are built to
receive analogue signals. Television stations such
as the Zambia National Broadcasting Corporation
broadcast television programmes through analogue
signals. Pay TV services such as DStv or Zuku use
digital data to broadcast their programmes. If you
want to watch any of the programmes on these
stations, you need a decoder. The decoder changes
the digital signal so that standard TVs can receive
them. You use a remote control unit to switch
between programmes or to change the volume.
Zambia, like most other countries in the world,
is changing its national broadcasting format from
analogue to digital. When the digital system is
in place, everybody will need a decoder to watch
programmes on their existing television sets. yi
A remote control
PETE connects) = rae: :
Step 1: Switch the television set and the Aseoden ore oa :
Step 2: Connect the cable running from the satellite
dish to the back of the decoder.
Step 3: eoee the three colour-coded RCA connectors
5 both the television set and the decoder.
Step 4: Switch the television set an :
id thy
Step 5: ‘The decoder will search fora satellnc ce” fee colour-coded
elite si
when connected for the frst tine oo RCA connectors
established, insert the ee Once communication is2 nledboal
step 6: Once the smartcard is verified, call the
service provider's call centre to
activate the account,
Step 7: Once the customer details are
confirmed, a picture appears on the
TV screen. The back panel of a decoder
DVD player
DVD players are very popular because people
can watch their favourite television series and/
or movies without any distractions. The quality ey
of the video is very good, and you can pause,
rewind and forward the content as you like. A DVD player with an open tray
Step 1: Switch the television set and the DVD player off.
Step 2: Connect the three colour-coded RCA connectors
to both the television set and the DVD player.
The colours of the connectors must correspond
to the colours of the TV and DVD player
terminals. If it is a digital system, there will be
only one connector to plug in.
Step 3: Power the television set and the DVD player on.
Step 4: Plug the AC power cord into an electrical outlet in the wall. Always
plug in the power cord after you have connected all the other plugs.
Step 5: Refer to the user manual to change the language display and clock on
the DVD screen, if necessary.
Step 6: Insert a DVD.
Step 7: Remember that DVDs come with menus, so they will not play
automatically. You must select the options you want.
The back panel of a
DVD player
Hi-fi systems
Hi-fi systems vary from expensive systems (that consist
of different Parts) to compact systems (that consist of
4 single unit with two speakers). Hi-fi stands for “high
fidelity”, which means the sound quality is high.
z i can connect a hi-fi system to a television set
prove the sound quality of the programmes yor
watch. Modern devices can also crnernielea Orne eR TNARietom
newer hi-fi systems,
Sub+topic 1 Household appliances QFStep 1: Switch the television set and the hi-fi
system off. ;
Step 2: Connect the two colour-coded RCA
connectors to both the television set and
the hi-fi system. The colours (usually
red and white) of the connectors must aes
correspond to the colours of the TV and RCA connectors in a hi-fi
hi-fi system terminals. system
Step 3: Switch the television set and the hi-fi system on.
Step 4: Access the menu on the television set, switch off the internal speakers
and turn the audio output of the television on.
Step 5: Make sure the volume on the hi-fi system is at a low setting before
testing the connection.
Step 6: Select the correct input on the hi-fi system and turn the volume
up slowly.
Connect a DVD player to a TV
Work on your own. Type this into the top address bar of a
browser on the Internet: [Link].
Then download this activity from the folder:
Gr9CS_Topic 3_Act 1_Connect [Link]-
You could also scan the QR code shown here with a smartphone
to download the activity.
Follow the instructions in the document you download.
You have to connect the television cables at point A to the DVD player. You do
not have the correct cables and go to the shop to buy cables. You see a selection of
cables on display.
1. Which cable(s) would you buy?
2. Give two reasons for your choice.
3. What do we call the cables that you need?
Connect office appliances
In thi: i i i
is en ae vit oes a few appliances (devices/peripherals) that are often
used Ba ee fees tt fe appliances, for example cameras, are also commonly
used x ok at their uses and how to connect them properly.
Most of the appliances are c
onnected :
Remember that most desktop comp: to a computer with a USB cable.
te
see the front of the computer ecu e forts on the Lae ae
in the fi . It is ust rt
Serie Bey a more accessible. If you use a ae eusietto uss
le of the computer. Some laptops signe ce eaceeh
5 ports at the back
$8. Topics intonation rtmoiogy in everyday up
tyday lifeProjector
A projector displays video, images or computer
data on a screen or other flat surface. Most
projectors create an image by shining a light
through a small transparent lens. Newer types
of projectors can project the image directly, by
using lasers.
Most projectors that we use with a
computer can accept different types of
input. See what cables you have and
what your computer can support, then
choose a connection method. The most
common connection is through the
VGA monitor output on your computer
toan analogue VGA input port on the
projector. You can also use S-Video and
HDMI to connect the projector to the
computer.
A projector
New words
‘$-Video: a standard analogue video signal
that is not digital
HDMI: stands for High-Definition Multimedia
Interface. It is a digital video and audio signal
being send through the same cable
detect: to recognise the presence of a device
and identify the type of connection
plug and play: when the operating system
automatically detects, configures and installs
a basic set of drivers for the attached device
Step 1: Switch the computer and the projector off.
Step 2: Choose the connection method.
Step 3: Connect the cable to both the computer and the projector.
Step 4: Switch the computer and the projector on.
Step 5: If the computer does not detect the projector automatically, activate
the projector by pressing Windows Key+P at the same time.
Scanners
Ascanner makes a digital copy of physical images or documents. Scanners can
also “read” typed documents and change them to documents that you can edit in
aword processing program.
A scanner either comes as a separate unit, called
a flatbed scanner, or it is combined in an all-in-one
device. This device can scan, fax, print, and make
and receive phone calls.
Most scanners are “plug and play” compatible.
This means when you connect the scanner to the
Computer, Windows will automatically detect what
type of scanner it is. Windows will then install a
default set of drivers and software to operate the
scanner,
=
A flatbed scanner
Sub-topic 1 Household appliances = 3Q.to the
Connect the scanr
computer. Most scanners
make use of a USB port
connection.
Step 2: If the scanner uses its own
power source, connect it to
the power outlet and switch
eee = The USB cable from a scanner
Step 3: For scanner-specific utilities, connected toa laptop
install the software that came
with the scanner.
Printers
The most common types of printers
used in homes or small businesses are
inkjet and laser printers. Their function
is to receive digital information from
a computer to produce a hard copy
on paper. Connecting a printer to a
computer is similar to connecting a
scanner to a computer.
Most printers are “plug and play”
compatible. This means that Windows
will automatically detect the type of
printer and install a default set of drivers
and software to operate the printer. A laser printer
Step 1: Connect the printer to the computer. Most printers use a USB port
connection.
Step 2: Connect the printer to the power outlet and switch the printer on.
Step 3: For printer-specific utilities, install the software that came with the
printer,
Connect common household appliances
1. Work in groups. Explain to the other leat
rners hi .
a) a scanner to a computer. ow you would connect:
b) a printer to a computer,
Topic 3 Information technology in everyday lifeDigital cameras
s. There are two main types ©
se digital cameras to take digital phot
We
digital cameras.
Compact digital cameras are smal)
You do not have to look through the
lens when you take a photo.
« SLR cameras are bigger. Professional
An SLR digital
photographers use this type of
camera. You look through the lens_—_@ compact digital
when you take a photo. camera camera
One of the advantages of a digital camera is New words
that it stores its photos on an SD card. Photos oo
are immediately available to view or upload to ‘SD card: a memory card that you
put into a camera, onto which the
omputer. Some cameras can also record short
acomp eo :
video clips. ee
‘Step 1: Make sure that the computer is switched on.
Step 2: Connect the digital camera to the computer. Most cameras make use
of a USB port connection.
Step 3: Switch the digital camera on.
Step 4: When the computer has detected the
camera, choose one of the following options:
a) Open Windows File Explorer
b) Click Start (Windows icon).
‘Type in “file explorer”. Then press Enter. 4 digital camera
©) The computer may provide options for__ connected to a laptop
transferring the digital photos. Select the option you want and
follow the instructions.
d) Pre-installed software that comes with the camera can
automatically transfer the photos to the computer.
Step 5: Choose a destination folder to transfer the photos from the
F ms ‘ Sut
Micon yy Spec niente a AY
Smartphones
Smartphones are mobile devices that are connected to a network. Smartphone
users con send messages and talk to other users over a cellular network
connection. Smartphones have integrated devices such as cameras and voice
- This means that the user must be able to connect it to a
comy
transfer data from or to the phone. ae
Sub-topic 1 Household appliances 41one
Step I; Switch on the nd the ee :
Step 2: Connect the cable t0 the phone FEsts
then to the computer's USB Botts gic
Step 3: If it isthe first time you are connecting i
phone to the computer follow the on-scree
Pistructions for the installation of drivers A emastphone
: connected to a laptop
complete.
Step 4: If you want to
programs, instal
computer.
Examples: Store phone numbers oP
ne specific utility
ft
use any ol came with the phone on the
1 the software that
your computer.
Take a photo
Work in groups. ‘
1. If you have a smartphone available, take turns to take photos of your friends
in the group.
2. Now connect the smartphone to a
hard drive. If you do not have smal
to explain the steps.
computer and transfer the photos onto the
rtphones or computers available, take turns
Information and communication technology
create a global community
It is very difficult for someone to be completely =
isolated from information and communication Mi
technology (ICT) these days. Technology is all
gone a oe the opportunities it offers are
endous. You can talk to somebod)
other side of the world by keying in oe
and you do not even have to pay for the call.
; y c area
Email also makes it possible to communicate with Soe in aglobal
people and get an almost immediat
You can communicate with ee ae Hh
they were living nextdoor to you. This aaa
conn e part of what we mean by the term.
oe cae Smartphones, the Internet
many electronic devices have all
made it possible for everybo.
a global community. dy to be part ofSmartphones are a crucial part of our lives
smartphones have become a very important tool for
many people. You can use them to access information
on the Internet; keep in touch with friends, family
and business partners; send and receive email
Wireless technology makes it possible to use a
smartphone anywhere where it can pick upa signal. _A range of smartphones
Advantages of smartphones
smartphones can help us in many ways.
+ You can receive and place calls, store data,
and take pictures.
You can use a smartphone as a notebook,
calendar or calculator.
You can use a smartphones as a walkie-talkie.
You can feel safe when you move around,
because you can stay connected with other
people and get help if there is an emergency.
Some smartphones have global positioning
system (GPS) technology. This can help you to find your way to a destination.
It also makes it possible to track where the user is. This can help to save lives in
an emergency.
New and emerging communication systems
Social networks
An online social network (also called a social networking site) is a website where
users create their personal online profiles and build social groups with other users
based on common interests. A personal online profile can include:
* a person’s interests
* the school they attended
* personal photographs or videos.
When you register on a social networking site, you can socialise
with other users and view their profiles.
Businesses use networking sites to reach out to customers and the public. It is
also a useful tool to make contact with other business people.
There are social networking sites where you can add your contact details, post
‘details of your services and experience, apply for jobs and look for advice.
Social networking is popular around the world, Facebook is one of the best-known
‘networks. Other social networks include Twitter, LinkedIn and WhatsApp.
Sub-topic 1 Household appliances 43Step 1
Step 2
Step 3:
Step 4:
> to [Link] book. com/signur: Pbone
number or email address.
Create a unique password: saan
Now enter your date of birth. (¥¢ Sy
at least 13 years old to create an acce 5
Select your gender.
Click the Sign Up button.
You must confirm your smar
oremail address before your account can
become active.
tphone number
& Username
= Email address
(© Password
A typical screen
to create an online
account
Step 1: Go to [Link]/signup.
Step 2: Enter your name and smartphone number or email address.
Create a unique password.
Step 4: Click the Sign Up button.
Step 5: You will be asked to verify your smartphone number with a code sent
to you in an SMS.
Step a ae the given code in the sign-up box to activate your account.
Step : aC, choose or create a unique username.
Step Click the “Create my account” button.
Talk about onli
ine communicati
Work in groups. unication
Choose two online social n
zo etworkit i .
the two sites you chose, ng sites. Discuss what content you can share 0
other while you talk Ita ee
money by Skyping ‘ne data to ee ee <<
use this function, you have wo @ Phone cal, SO you can save a
y
a4 Sadan app and register as a user
Topic 3 Information tess.Create a Skype account ae
step 1: Go to [Link]. Select Sign In in the upper-right corner
Step 2: Click on Sign up. Follow the directions and enter the required
information (your name, birth date, and so on)
Step 3: Read the EULA and make sure that you understand the conditions.
If you agree to the EULA, click Continue.
Step 4: After your account has been created, download Skype.
Step 5: Double-click on the installation file once it
has downloaded and follow the instructions
to install Skype.
Step 6: Enter your username and password, then
click Sign in.
The Skype window will appear. Sal
Step 1: Sign into Skype using your username
and password. —
Step 2: Select the person you want to video call t
from the Contacts tab.
Step 3: The contact’s information will open in a pane
on the right. Click the Video Call button. Friends talking on Skype
Step 4: The Calling window will open. The video from the camera on your
computer (webcam) will show at the bottom of the screen. The call
will keep ringing until someone picks up.
Step 5: When the other person answers, you will see video from his or her
webcam on the screen. If the person does not have a webcam (or
chooses to answer without it) a profile picture will be shown instead.
Step 6: Talk as long as you want to. Click the End Call button when you want
to end the conversation.
Step 2: Ifyou want to use a number you do not have saved on
your phone: Key in the number you want to call on_
your phone's keypad, Press Call to start your call.
oe a ata eeearning
SUB-TOPIC 2 Computer-based |
i s of
Identify different types _
epee learning softw:
yhen you use
Computer-based learning ( ne ass of using these
he advanta :
computer programs to study Be rate
ne,
programs is that you can study from hon
help of a teacher.
Types of computer-based ae avaiable
1OOSe wm.
learning software
There are different types of software that you
can use to learn in different ways.
Drill and practise programs
There are three types of drill and practise
software: flashcard activities, branching drill
activities and extensive feedback activities.
1. Flashcard activities: These are usually a
set of questions that appear one by one on
the screen. You have to click on the correct
answer to move to the next flashcard. —
2. Branching drill: These activities require a Milli
that the learner answer a question that A learner studying technology
appears on the screen. If the learner answers online
the question correctly, the software moves on to show more advanced
information and questions.
3. Extensive feedback activities: With these activities, the software responds t0
ihe leamer’s answers with detaled information, een explain why an answet
mas wrong, or what the answer should have been. The software can also
'pply extra information that helps the learner to understand the work.
The advantages of dri
- This type of softwar
- You can use a smartphen 78 learners to get all the answers correct:
Learners can access
. Drill and practise software
* learn new conte
* work on Problems or ¢;
* get immediate feeatya,
Bene
helps tea:
mers to;
‘nt OF review content
xamples at their
sk on thet Performance
Topic 3 Information
t
INO ih everscinss.
46ion. They give
Simulation programs
simulations are computerised models of a real or imagined situ:
Jearners the freedom to choose which tasks they want to do. Th
; advantage of
simulations is that they can be applied to real-life situations because they allow
the learners to test concepts under safe conditions without the restraint of cost,
maintenance and clean-up.
Simulations provide leamers with visual, hands-on experience of processes that
they could not ordinarily see. There are two types of simulations:
+ those that teach something.
+ those that teach how to do something.
Tutorial programs
Computer tutorials are very similar to a teacher teaching in the classroom.
Many are designed to be a self-contained lesson that allows learners to learn the
content without needing any other material. Tutorials are different from the other
instructional software because they are true teaching materials and provide the
learners with all the information and activities to help them learn the content.
The advantage of tutorials is that they can be used in the classroom, but each
learner can work at his or her own pace.
Problem-solving programs
Many people think that simulations and tutorials are
problem-solving programs because they teach learners
problem-solving skills. However, there are programs
designed specifically for problem-solving. The software
focuses on different methods for learners to design
solutions to given problems. The advantage of these a Sees chiles
programs is that they get leamers more interested and ONE vs
involved in a subject. The program also makes learning more meaningful, because
learners have to find solutions to real-world problems.
EE Benefits of computer-based learning
Work on your own. ‘
1. What is the main difference between computer-based learning and teaching
by teachers?
2. List the types of computer-based learning software available.
3. What opportunities does drill and practice programs offer learners?
4. List the two types of simulation programs.
5. Discuss which type of learners would benefit from these types ‘of computer-
based learning. List at least two reasons for your answer.
6. In pairs, explain how it benefits a learner to complete a tutorial program after
the teacher has explained a section of work.
Sub-topie 2 Computer-based teaming 47Software for physically challenged users
There is special software for learners who have poor eyesight, blindness, deafn
or even motor function problems. Companies develop software for these learner
to help them to learn more easily. These special features include
* recognising their voice to control the computer
* on-screen displays of keyboards
* showing notes on the computer instead of making sounds
making the mouse cursor larger
* changing text to speech
magnifying sections of the screen.
A blind person using a special device that can read text aloud
Explore computer settings for people with
poor eyesight
Work in pairs.
The Windows operating system has various things that you can do to make
a computer more accessible to people with impaired eyesight, hearing or
movement. You will find the options in a menu called Ease of Access.
1. Open the Start menu in Windows. Type in “Ease of access". This will take you
toa menu with various options.
2. Look at the options. Experiment with some changes
3. Explain to your friend what you will do to make it easier for a person with
poor eyesight to use a computer. If you do not have a computer available,
make a list of the things you would change to help a person with poor
eyesight. Then try to find information about the ways in which a computer
can be adapted for such a person.
48 topic 3 Information technology in everyday life









