100% found this document useful (5 votes)
5K views188 pages

Progress in Computer Studies Grade 9

a good for grade nine to pass with flying colors

Uploaded by

Racheal Sitwala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (5 votes)
5K views188 pages

Progress in Computer Studies Grade 9

a good for grade nine to pass with flying colors

Uploaded by

Racheal Sitwala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
ACTIVITIES POD Ul FLOYD CHANDA es ALN Baan tol OXFORD SEAN REPUBLIC OF ZAMBIA MINISTRY OF GENERAL EDUCATION TAGS. came ve [Link] 220 DEPUTY HEAD | HOFMEYR DAY SECO P.O, BOX OXFORD ‘UNIVERSITY PRESS OXFORD UNIVERSITY PRESS Oxford University It furthers the University’ and education by publishing ‘Oxford University Press in Published for Oxford University Press ORBIS (Pty) Limited ‘Vasco Boulevard, Goodwood, N1 City, P O Box 12119, Cape’ South Africa ‘Oxford University Press ORBIS (Pty) ‘Ltd 2013, ¥ “The moral rights ofthe author have been asserted First published 2018 worldwide, Oxford is a regi the UK and in certain other: Zambia by ‘All rights reserved. No part of this a retrieval system, or transmitted, prior permission in writing of or us expressly permitted by law, by licence, or under tse with the appropriate reprographic rights onganisation. Engines reproduction outside the scope ofthe above should be seit te the R ‘Onford University Press ORBIS (Pty) Ltd, at the above ‘You must not circulate this workin any other form = and you must impose this same condition on any sequs Progress in Computer Studies Grade 9 Learner's Bp ISBN 978 0 19 073655 2 First impression 2019 ‘Typeset in ITC Stone Serif Std 10pton 13.5pt Printed on 70gsm woodfree paper Acknowledgements Publisher: Marie Louise Kriel Managing Editor: Anja Grobler Project Coordinator: Anson Banda, Material developers: Rohan Smit, Erika Gouws Editor: Erika Gouws Illustrator: Yvonne Robinson ‘Typesetter: Richards DTP Studios ce Designer: Cindy Armstrong Cover designer: Cindy Armstrong Cover image: © Catiamadio | [Link] Printed and bound by: ABC Press ‘The authors and publisher gratefully acknowledge permission een in ue oe cry effort has been made to trace _ any copyright infringements have been made, the publisher information that would enable any omissions or errors to be impressions. Links to third party websites are provided by Oxford in information only, Oxford disclaims any responsibility for the any third party website referenced in this wo Contents How to use this book. cad eee ROM ese Sub-topic 1 Peripheral devices... SW ee 2 sub-topic 2. Input-process-output operations 9 summary, revision and assessment exercises 13 Cy emma 15 sub-topic 1 Unresponsive computers... 16 b-topic 2. Security and viruses...... 21 Copyright...... 25 ; 28 nary, revision and assessment exercises .... ee 32 Sry ae) Information technology in everyday life 35 vlsehaues BG) 46 opic 1 Household appliances Sub-topic 2. Computer-based leaming..... Sub-topic 3. Computers in banking and e-commerce: 49 topic 4 Point-of-sale......... 53 ub-topic 5 Magnetic and smart cards... 55 Summary, revision and assessment exercises E s 57 Topic 4 Productivity tools: Word Pees!) i} Sub-topic 1 Keyboard skills... Betis toioc se bvented el a Sub-topic 2 Document setup and layout. 62 Sub-topic 3. Search and replace... ERS a 68 Sub-topic 4 Copy text from other document window: 70 Sub-topic5 Pagination... aataentee Ti Sub-topic 6 Page formatting. 74 Sub-topic 7 Finding and file retrieval 78 Summary, revision and assessment exercises s i 81 er es crue) 3 Sub-topic 1 Amending a spreadsheet... a 84 Sub-topic 2. Formatting cells... 88 Sub-topic 3. Sorting and filtering data. 91 Sub-topic 4 Using formulas and functions. 94 Sub-topic § Charts 99 Summary, revision and assessment exercises 103 contents iti enim eee . and custom animation Sub-topic 1 Using animation scheme: Sub-topic 2. PowerPoint objects Sub-topic 3 Slide shows Summary, revision and Werner execs. PIT maui screen. Touc Jects a command from the menu, the output is displayed on the sc selects a command : screens use sensors to detect the touch of a finger. A touch screen tablet that waiters in a coffee shop can use to print the bill Modems A modem is a device that connects a computer to the Internet. It sends (output) or receives (input) data from other computers on the Internet. It links personal computers to the Internet through an ISP (Internet Service Provider). A modem converts analogue signals (telephone line) to digital (computer) and vice versa. Network interface controllers A network interface controller (NIC) is used to link computers in a network so that you can transmit data from one computer to another, The NIC enables the computer to receive data, instructions and information from other computers (input). The NIC is also used to send data from one computer to other computers on the network (output). A NIC also be called a local area network card (LAN card), a LAN adapter or a network interface card, 10 Topic 1 Introduction to computers Awaiter using a touch screen to prepare the bill for customers Amodem Modern computers have network cards and sound cards built into the motherboard, An internal network interface controller circuit board Sound cards New word Asound card is an expansion card that provides xpansion card: a circuit input and output of audio signals to and from savaiaicn otter board that you can install on acomputer. A speaker produces audio output motherboard to give extra with the help of the sound card. The user uses a functions or memory microphone to input voice commands into the computer with the help of the sound card Hard disk drives a * Hard disk drives are used mainly for storage Examples of the types of files stored include: documents, images, audio files and spreadsheet files. * The user is able to create different types of files. A sound card to save to the computer. * Once files have been created, a user can open them again and then show the content on a reen or print it out as a hard copy. * The drive contains read/write heads to read data from the disk (input) but can also write data to the disk (output). Magnetic tape drives * A magnetic tape drive stores information on magnetic tape. * The tape is a narrow plastic film with a thin magnetic coating over it. * The drive can record information (input) digitally, which can be retrieved (output) at a later date. * The tapes are usually stored on cartridges or 7 cassettes, but for drives that are used as data A magnetic tape reel storage tape backups, the tape is often wound on reels. * These devices are still used as an offline data backup, because data storage is stable and the peripherals are inexpensive. The inside of a hard drive ~! cea An external hard drive, a USB. flash drive and memory cards Sub-topic 2 Input-process-output operations — 11 - Assessment exercises For questions 1-5, write down only one co 1. One __is equal to 1 024 megabytes. rrect option (A, B, C or D). (1) A. Bit B. Megabyte C. Gigabyte iD. Terabyte 2. Which part of the computer carries out 2 program’s instructions? qa) A. Processor B. Hard disk c. RAM D. ROM 3. Amodem converts data from: qa) ‘A. Analogue signals to digital signals C. Digital signals to data signals B. Digital signals to analogue data D. Analogue signals to network 4. Which of the following input devices can create diagrams or graphic drawings on the screen? qd) A. Graphic tablet C. Touch screen B. Light pen D. Plotter 5. List three advantages of a touch screen monitor. 3) 6. List four examples of computer processing. (4) 7. How can you find out what the speed of a CPU 1s? @) 8. Why are many ports colour coded? @) 9, Explain why you must keep the size of a file in mind if you want to send it as an email attachment. @ 4 10. The images below show basic information of two computers. Computer Ais older than Computer B. Use the information to complete the following sentences: a) The operating system installed on Computer B is 3 (2) b) ComputerAhas___of installed memory. 2) ©) The speed of computer B’s CPU is : (2) view Gadi Information on your computer FT Windows 10 Windows 10 Pro. Version 1607 OS Build 143935, Product ID 0030-0000-0000 Processor Intel(R) Core(TM) i7-4510U CPU @ 200GHz 26 GHr Installed RAM 8.00 GB (7.85 GB usable) Computer B Total: 25 aL | Copyright | Storage media Basic operations Saeed Ai cadeericbcerad Unresponsive computer _|* Determine how to shut down an unresponsive computer “Security and viruses * Determine why usernames and passwords are used on computers Identity and apply safety procedures, such as antivirus scans and virus checks in maintaining data integrity Know how to check the ID number for a software product | * Define the terms freeware, shareware and end-user license | agreement * Compare the relationship between different measures of storage media capacities Starter activity Work in groups. 1. Stand or sit ina circle in groups of four to five. © One person thinks of a password of six letters that they would choose to “lock” their computer, (Note: not your real password!) * The rest of the group must guess what that password is. If no one guesses the password correctly, the person can start giving clues. '* See who gets the answer first. © Then repeat the game with the next person in the group thinking of a password. 2. Now discuss in your group: Why is it not a good idea to have a password consisting of only six letters? 3. Discuss in groups of four or five why you think a computer should have a password. Write down three good passwords and compare them with the rest of the class. ‘Topic 2 Basic operations = 15 ee. $UB-TOPIC1 Wnresponsive computers Shut down an unresponsive computer When you switch your computer on, the system checks that all the attached hardware is working and that the operating system loads properly. When all the files are loaded, you will see the Windows desktop. We call this process system booting. ‘There are two types of booting: Cold booting | a) ‘* The computer is on * The computer is restarted (activ: = The computer is off. | + The computer is powered up (Started). Basic troubleshooting techniques New words ‘When there are problems during the booting Process, "geting: the process of a computer will need to be forcibly shut down. Many starting or resetting a basic troubleshooting techniques can help. The technique that you use will depend on the problem. ‘We will show you some basic troubleshooting steps, as ‘well as common problems. ‘There are four problems that typically cause computers to be unresponsive. They are: 1. Computer restarts after you selected it to shut down. 2. Computer freezes at Windows start-up screen. 3. The computer does not switch on. 4. Running tasks keep the computer from shutting down. We will discuss these problems (and solutions) on the next few pages. Computer restarts after you selected it to shut down This problem usually happens because of a system failure (crash) when the computer shuts down. By default, Windows reboots after crashing. Step 1: Click Start (Windows icon). Type in “run”. oe Type “[Link]” in the dialogue box. Press Enter, Step 3: Click the Advanced rie and Recovery. tab and then the Settings button under Startup ‘Step 4: Uncheck the Automatically Restart o IG topic 2 Basic operations Windows will then no longer reboot when you shut it down. But it will still crash The underlying problem will still need to be corrected. Study all error messages for clues. If the message is a blue screen with white text (often called the blue screen of death), it could be a hardware or driver issue. If you added new hardware before the problem started, look for an updated driver or remove the hardware and uninstall the driver. The system log may give 4 blue screen of death error more information about the problem. To access it, &SS49€ you can follow the steps below. [EEEZGM) Fine out why you got the blue sereen of death error message Step 1: Click on Start (Windows icon). eve Step 2: Type in “event viewer”. Press Enter. Step 3: Click on Windows Logs (in the left-hand pane) to expand the section. Step 4: Double-click on System (in the centre pane), Step 5: Select any error message for more information on that error. Step 6: Click on Event Log Online Help to find more help online. Computer freezes at windows start-up screen There are many possible reasons why a computer can freeze. Most of the time this can be fixed by restarting _New words the computer, Should the problem persist, it will manually: by hand need to be manually corrected in Safe Mode. When boot: to start up a computer a computer starts in Safe Mode, it launches only 's0 that is ready to be used basic programs. Step 1: Start your computer. Step 2: Press and hold down F8 until you get the Advanced Options menu screen. If the Windows Be ee asic viens ce startup if there are too ™ fun at start-up might hel computer boot faster oading while it is Limit programs that p you to fix this A computer might freez booting, Limiting programs that problem It will also make your © ny programs | Click on Start (Windows icon). Step 2: Type in “task manager” Press Enter. Step 3: Select the Startup tab. You will see the programs that run when Windows starts. ae Step 4: Select the program you @ Task Scheduler do not want to start when ‘Search suggestions the operating system PD task - See web results > boots. Step 5: Click the Enable button to ame confirm your choice. Task Manage File Options View ‘processes Performance Apphistory Startup Users Details Senices Last BIOS time: 6.1 seconds Name Publcher satus Startup impact > I RequiredApplcationsLaunch... Alienware Enabled & |B Send to OneNote Teo! MicosoltCorporaton Enabled [Gy status Monitor Application Brother Industries, Ltd. Enabled Low [El Windows Defender noticati... Micosoft Corporation _tnabled Low Bl Wondershare Sto ‘Wendeshare Enabled Medium t screen Uninstall programs that freeze your computer If there is a program on may your computer that need to uninstall that tat causes your computer to Ma asta on a NEA: It might be that the boca: . freeze, you your computer, which causes the Counter ‘ ee T to crash. 18 ‘Topic 2 Basic operations SLED voinetan.a program Li Step 1: Click Start (Windows icon) Step 2: Type in “task manager Press Enter. » DD @ Fikes 7 Step 3: Look for the Programs heading. step 4: Click on Uninstall a program step 5: Select a program to uninstall by clicking on it. Step 6: Click on Uninstall or Recent @® Uninstall a program Aves ‘Settings Uninstall/Change, Search suggestions eee The Task Manager screen program. When you click on Uninstall, the program will be removed completely from your computer. You may need to enter your administrator password to continue uninstalling the program. The computer does not switch on ‘Ty the following troubleshooting tips when a computer does not switch on: eae Tips/Checkp | Power cord Is the cord securely plugged into | a working power outlet? | Use a lamp to check if the power | outlet might be faulty. | Is the cord plugged securely into the computer's power inlet box? Surge protector | * Is the surge protector switched ‘on? (Reset the surge protector by turning it off and then back on.) | Use a lamp to check if the surge protector is working. Laptop * Is the battery charged? Plug the AC adapter into a power | A Surge Protsctor protects outlet and switch the laptop on. nected Geviess ta electrical surges. Running tasks keep the computer from shutting down All open programs need to be closed before a computer can shut down. If the computer does not automatically close all the active programs, you can use Task Manager to force a program to close. Sub-topic 1 Unresponsive computers 19 ut down the 1. (You can also right-click on the Close a program to shi eyboare c vress Ctrl+Alt+Delete on the Key Step 1: Press Cirls ject Task Manager from the list Of options) soe tne Task Manager option to see:a list of °° program 1 eect itand click on the End Task button, Step 2: Sel Step 3: To close a program, sel to reboot or shut Once you have successfully ended the programs, you can try down the computer. Hard shutdown rd shutdown option will force the computer t ‘ by cutting its power. Try to avoid this option unless all other troubleshooting measures fail to work. This option can cause errors with open applications, causing you to lose data and possibly corrupt system files. ‘o shut down Asa last resort, the ha Step 1: Hold down the power button until the computer shuts off. ‘You can also unplug the power supply to the computer. @ When you restart your computer after a hard shutdown, itusually A typical runs diagnostic tests to verify the integrity of the file system. power button Activity 1 Solve problems with unresponsive computers Work in groups. 1. Name and explain two differences between the two types of booting. 2. Give two ways to open Task Manager. 3. A leamer at Lyambai Secondary School has her own computer. She tells you pate has the following problems with her computer. * The computer does not load the operating sys! 1 tem i * The computer restarts on its own. . mace * A blue screen with a stra: inge message displays o1 s What could cause each of these problems? ns Compute A ») a troubleshooting tips that might solve each proble: . Explain to the other learners in your group what a 4 a computer does not want to switch on aaa oe }) you want to restart a computer in Safe Mode 20 topice Basic operations -TOPIG2 Security and viruses Improve computer security against viruses Ifa computer or any other digital device is not properly protected, confidential information can be stolen or lost. We need better security methods to protect data and information security: ensuring that New words computer resources are free from unauthorised internal and external manipulation access co! The need for usernames and Features that control who passwords can access resources in the operating system The Windows operating system has access controls authentication: a process by to help keep data and information safe against ‘which you verify that someone unauthorised access. These include who has access ee Sey xe to log into the system and who may make changes Combination of letters and to the system. numbers that you enter on 2 seis computer to access the system Authentication authorisation: a process : of establishing if the user is Windows creates an account for new users for permitted to have access to a authentication purposes. Authentication is how resource you verify that someone is who they claim to be. It usually asks the user for a username and a password to log in to a computer. A password is a combination of letters and numbers that cannot easily be guessed by others. Good passwords have at least eight characters of uppercase and lowercase letters, as well as numbers and other keyboard symbols. Example: RnSK2mL"8. Normally, when you type in a password it will display as dots. This is to make sure that nobody sees your password when you type it in. If the user’s password does not match up with the username, access is denied. You usually get only three tries to enter the correct password. If you do not get it right, the system locks you out. You will then have to wait for the system administrator to Teset your password. Authorisation A login screen with username and password Once a user is authenticated, the authorisation process determines what a user can and cannot do on the computer. The level of authorisation is determined by the group they are a part of. If the user is part of the Administrator group, they will be able to perform any function on the computer. ; Sub-topic 2 Security and viruses 21 Verify software's authenticity » instead of buying th ed software il vortant that you verify (check) if e original program because it A user might use pit : eg imp ». Pirated software is illegal. It is v is too expensive Pirated sof ee tg your software is authentic (legal). The table below shows how y | t In. 1. Company logo _| Onthe actual computer the software is installed on. 2. Product key ‘On the program package. On the install CD. On the installation card. | Inthe email received from the software company (if bought online). _| 3. Onlineaccount | A registered account with the company will automatically see and authenticate the Installed program online and keep verifying i | every time the user connects to the Internet. Click on Start (Windows icon). Step 2: Type in “activation”. Step 3: Press Enter If the software is legal, you will see an activation notice like the one on the right. PNetNe i o) Nii) The Activation screen on Windows 10 Pro Computer security Itis important to keep the data on your computer safe. This type of security is called computer security. Good computer security will help that you do not lose any information or documents. When you share a computer with other peopl computer security is even more important. ee What is a virus? A virus is a program that interferes wi s with the normal funct avin ; ‘al functioning of the c: cu clog - system's memory, make copies of itself, or cist an autnaa 1 n that other computer programs use, There are three sane virus. The table below summarises them. eae Dee Itinfects the hard disk’s boot sector feu structured on the hard drive, and affects the way in which data is Ee | It atta elf to executable fi [Shion vis | tintocts specie sytem wee oyst of exe exten files (such as command, sions). Topic 2 Basic operations | ror 2 bomb, Trojan horse and worm afew examples of computer viruses are the tim eet I ube Prwitstartonaspectic | twill access & ‘computer | ate, ata certain time and | through email or free tis written to infiltrate & program and alter or destroy data detme the computer to | programs to try 0 Git | Worms often use net work | {ose its ability to function | access ‘tothe computer. | connections to spread from one | properly. | puter system to another. Antivirus software Antivirus software is used to protect computer systems put needs to be kept up to date. Antivirus software is divided into two sechOUss Scanners and integrity checkers. caw it detects a virus by its unique signature. It detects a virus by lock ing for any modifications Most antivirus software will automatically scan for viruses jn the background. if any viruses are found, it will clean them. What to do if your computer gets a virus Vimsses can harm your computer system and must De removed before serious damage is done. Examples of antivirus software are Bitdefender and Norton. rm Step 1: Open the antivirus program. Step 2; Ruma full system scan. When you find threats The antivirus program will notify the user if there are any threats. The program will provide various options to handle the infected files. Usually, the recommended action for each threat is the best choice. Ways to guard against viruses Follow the guidelines below to protect ven Soames against viruses. . Install a good quality antivirus Avirus alert di puter isplayed on a com| program. screen 2. Run updates regularly. 3 Scan all drives connected to the computer. . Do not open suspicious email links, attachments or websites. Sub-topie 2 Security and viruses 23. Viruses on external storage media Viruses can “jump” from one device to another through a memory card or other removable media, That is why a device, even if it is not connected to the Internet needs to have an updated antivirus software program. Viruses on memory cards There are many types of memory cards. Cards with a storage capacity of up to 64 MB are common, but there are cards that can store up to 2 TB of data. They are used in computers, digital cameras and smartphones. Step 1: Find the specific opening for the memory card. Step 2: Insert the memory card in the card teader. Do not force the card into the slot. Check that the card is the facing the right way up. Step 3: Open Windows Explorer. Step 4: Browse the files on the memory card. Find the specific opening for the memory card. Switch off the device. Carefully remove the memory card tray or back cover on the device. Step 3: Place the memory card in the tray or in the opening. Step 4: © Ifa tray is used: Slide the tray back in the ; ‘opening and close the back cover. * Ifno tray is used: Gently press the memory card until it in snaps into place. Close the back cover. | Activity 2] Dealing with computer security and viruses Wor rk on your own. 1. Explain the difference between the following pairs: ) Authentication and authorisation b) Scanners and integrity checkers. When logging on to a computer, certain infi ion i , o ue pieene rmation is requested, | ¥. sive an example of a good password, plain why your antivirus program should Give two examples of computer viruses, Se apehec aaa . Give four precautions to Zz, gee smartphone, and how you would remove in STONY catd into a 24 Topic 2 Basic operations Copyright The need for copyright software developers spend a lot of time, money and resources on creating software. Some people use programs that they have copied from the original versions, or downloaded from an unofficial site on the Internet. This is known and piracy. AS a result, copyright laws were established to prevent people from copying, selling and making a profit without permission from the original developers. License agreements gh, To prevent software piracy, software developers s jssue a license agreement for each computer program. This is accompanied by a license ib ‘number (also called a product ID or product key). You must type in this number when you install and register a program. The produ: Example of an illegally copied cD ct ID number is on the cover of the program package, a sticker on the actual CD or in the documentation you received if you bought the program online. Proprietary software When software developers create a program, they apply for one or more patents on the y software, These patents allow them exclusive ct ‘ownership of the program’s design n id the code used to create the 1is means that the manufacturer ary rights to this specific people are not allowed access to source code and the right to fy and sell the software. y software developer will provide software with a purchased Il under certain conditions. These the following: change or adapt the program. ‘resell the original program or its Sub-topic 3 Copyright = 25 dvantages and disadvantages of proprietary software A eee ules ee es poodles ‘A licence must be purchased to use the cific nee |1. The software's created for a specific ee: 2. The user must ensure their hardware | software is developed to run on jeepeiics ane & ‘The softwarecan be integrated with 3. Training people to operate the software |” other existing software from the same may be costly. manufacturer. 4 4. Dedicated customer services are available. | 4. Some features of the software might not | be required. | Open source software Recently, communities of developers have joined together to develop software that is referred to as open source software. Open source software is when the source code of the software is made available for everyone to copy, modify and redistribute at no cost. Any extra development of the program can be made by individual programmers, users as well as companies. Examples: GNU/Linux, Eclipse, Apache and Mozilla. Advantages and disadvantages of open source software Advantages l Disadvantages 1. Itis available to anyone at no cost. 1 . Instruction manuals for the software usually come ata cost. 2. The software can be adapted to the 2. Many versions of the same software exi user's needs, including the latest features pee ‘ making it difficult to find @ solution if and ideas. problems occur. 3. The developers work continuously to 3. There may il i . y be less support available if improve the software. experience problems. — Freeware Tee is a combination of “free” and ‘software”. It means that no licenses need to be purchased to use the software. There are no expiry dates or restrictions ‘on how ma the user can ee inans: OF use the software. ro ensure users follow the proprietary ¥ Sas and Conditions license agreement when they install a program, they are required to accept the software manufacturer's rules and regulations set out in a document. ‘This document is called the EULA (end-user license agreement). The user accepts this agreement by clicking the wiagree” button before the software Is installed. The importance of copyright Work on your own. a Type this into the address bar of a browser on the Internet z Bi [Link]. Then download this activity from the folder: Gr9CS_Topic 2_Act 3_Copyright.docx. You could also scan the QR code shown here with a smartphone to download the activity. Follow the instructions in the document. 4. Wambinji downloads music videos from YouTube so that he can sell copies to his friends. a) What is this activity called? b) Why is this activity illegal? 2. Whatis the difference between proprietary, open source, freeware and shareware software? 3. List three advantages of proprietary software. 4, List two disadvantages of open source software. 5. Explain why a user needs to accept a software company’s EULA. 6, Open the document Gr9CS_Topic 2_Act 3_Copyrightt.docx and complete ‘the instruction in the file. Save the ‘document as Gr9CS_Topic 2_Act 3_ _ Copyright_.docx. 7. Work in pairs. ¥ a) Show where you would go in a program to read its EULA ‘Show where you can see if the program is proprietary, open source, | freeware or shareware software Sub-tonic 3. Copvieht 22 SUB-TOPIC4 Storage media Different types of storage media Storage is a very important part of a computer, It is used to store both oe 7 z. can be and user data and files. It can also affect a computer's speed. Storage divided into primary memory and secondary memory. Primary memory Primary memory is temporary memory. This means it loses the information stored in it when you shut down the computer. We say primary memory is volatile as it is temporary. The main advantage of primary memory that is very fast and information can be written to and read from it very quickly. The CPU uses primary memory to store the instructions (program) and the data it is processing at the time. Primary memory is referred to as RAM (random access memory). When you start your computer, the operating software is copied from the hard drive into RAM. As you work, all the information You enter is kept in RAM until you save it. When you save your work, it is saved to the hard drive. If the computer is shut down before the information is saved to the hard drive, all the information will be lost. Primary memory is fast because, unlike the hard drive, it is close to the CPU and does not use slow magnetic media, Secondary memory Secondary memory is permanent memory. This means information saved to it 's kept safely, even if the computer is turned off. So we Say secondary memory ‘S non-volatile. Hard drives, CDs and flash drives are examples of secondary memory. The disadvantage of secondary memory isit i € is usual ; eas ry ly a lot slower than Secondary memory is also much lar a n ‘ger than primary memo: , SO you can store ae information and files, When you save your work, it is wanes i. theta ive and will stay there until you delet leeds. @ newer version of The table below gives a comparison of Primary and secondary memo} ry. Two RAM modules te it or write over it with Fast readi information: "4 W'ting of Non-volatile, larger capacity ees Ee storage devices Computer users need to keep information safe so that it is not lost. To do this, we save it to an internal hard drive or to an. external storage device as 4 backup In the sections that follow, we will look at various secondary memory storage devices Hard disk drives There are two types of hard drives. They are hard disk drives (HDD) and solid state drives (SSD). These may be internal drives that are fitted inside the computer system or external drives that can be moved from one computer to another. An internal hard drive in a computer holds the operating system, all the installed software, as ‘well as all the files that the user has saved. Hard disk drives contain one or more rotating disks and rely on magnetic storage. The disks inside « hard disk drive are coated with a thin film or layer of magnetic material. To store the data, this film gets magnetised. As the disk spins ata high speed the magnetic head, mounted on a moving arm, reads and writes data. A typical hard disk drive operates at The inside of a 3.5" hard a speed of 7 200 revolutions per minute (rpm) aad en can be identified by a faint humming noise. Solid state drives have no moving mechanical parts but ust flash memory like flash drives. Most computers have magnetic hard disk drives because solid state drives are much more expensive and do not store as much information. Both types of hard disk drives come jn various sizes that range from 1 TB to 8 TB or more. If extra storage capacity Is required, additional internal hard drives can be installed, or separate external hard drives can be connected. Optical disk drive Most computers have an optical disk drive. Depending on the type of drive it ‘will be able to read CDs, DVDs and Blu-ray disks. More advanced types of drives will also allow the user to write data to an empty disk to create a backup of thelr data. The optical disk drive (ODD) reads data from or ‘Writes data to an optical disk by using a laser beam, ( ght). The user can load documents, listen “or watch movies written to these disks. software that needs to be installed on the puter is often supplied on these disks. ‘An optical disk drive with open tray Sub-topic 4 Storage media = 29) An optical disk drive comes with two general types of loading mechanisms, as shown in the table below. ela) Ake ue fa ueaie, Tray-loading mechanism _ | The disk is placed on a motorised tray that moves in and out of the drive. | Siot-loading mechanism _| The disk is slid into a slot and motorised rollers move the disk in | and out of the drive. Types of disks The first type of optical disk was the compact disk (CD). It contained music for people to listen ® to, Then the compact disk read only memory (CD-ROM) disk was developed. It held read-only data (files and software) for use in computers | and became the preferred method to distribute software. The next type of optical disk that was tical dises look developed was called the Digital Versatile Disk or a Hes OF Seto cece Digital Video Disk (DVD), which was followed by Z the Blu-ray or Blu-ray Disk (BD). Flash drive A flash drive is a small storage device used to store data. Unlike the optical disk drive and the traditional hard disk drives, it has no moving parts, but uses solid state flash memory, similar to an SSD. < It connects to a computer through the universal = serial bus port (USB). These portable devices are often referred to USB drives or thumb drives. Atypical flash drive Flash drive storage capacities range from 4 GB up to 128 GB. As with other Storage devices, data can be written and rewritten to these drives for an unlimited number of times. Owing to its size, faster speeds and portability, these drives have almost replaced other storage media such as CDs, DVDs and BDs. Storage capacity The amount of data a storage device can hold is measured in kilob megabytes (MB), les (G' iene cares a ee eee =. ae terabytes (TB). One byte is one character multiples of 1024, * Akilobyte is 1024 bytes, * A megabyte is 1024 kn. * A gigabyte is 1024 MB, * A terabyte is 1024 Gp, hearts CD-ROM size OVD size (conventional) 8D size (conventional, e 2 Basic operations TO! Examples of popular storage media, showing storage capacity Memory cards USB flash drives Solid state drives Hard disk drives ya es ig with different storage media - Explain to Chenda what the following words mean: a) RAM b) HDD 9 cD d) CD-ROM ©) DVD f) BD 8) USB. What is the difference between ptimary and secondary memory? What does volatile mean? List the types of secondary storage devices. Work in pairs. ) Show how you would find out the available Space on the computer's hard drive. ») You have picked up an optical disk. How do you know what type of optical disk it is? Sub-topic 4 Storage media 3} att) dle Summary, revision and 2 assessment exercises Summary Unresponsive computer * Booting is the process of starting or resetting the computer and is grouped into two categories called cold booting and warm booting. * Computers can have problems during the booting process. These problems are: 1. Computer restarts after you selected it to shut down. 2. Computer freezes at the Windows startup screen, 3. The computer does not switch on. 4. Running tasks keep the computer from shutting down. * When a computer starts up in Safe Mode, it only launches the basic programs and services that are required. Security and viruses * To safeguard data and information against unauthorised access, the Windows operating system is equipped with access controls. A virus is a program that has been written to interfere with the normal functioning of a computer. itis important to install an antivirus Software that will detect and warn the user if a virus is detected. Copyright and storage media * Copyright laws help to curb Software piracy of license agreements. These agreements are often Computer storage refers Proprietary software through called EULAs, ‘doydey au “Arayeq pesreyp v asp “a 0} ASNOUL PalIM B BUUOD *D sroyajo1d ans oy} SOY “A “pio 1amod ay Yad *y (wD ‘uo doydey ev yous 07 8urAn are nod 71 [NYdyay aq you TIM sdy SupooYsetqnon SuTMOTIOJ AY} JO UUM “E areMyos amos usdo “qd aremareyg "Dd aremyos Areyatidoig “@ aremaaly "WY {se UMOUY st 10] pred sem yeu wiersoid y *Z Sap ASIP prey [eureyxg “C aALIp YSIP prey [UTA] “D soqund “@ Alp USPLE “VW @ {qiod gsp & 07 2aUOD LON S2op s22142p SUTMOTIOS at JO UIUM “T -(@.10 2 ‘g ‘y) uordo yax109 uo ATUO UMOP ayTIM. “s-1 suonsanb 105 sasio1exe JuauIssessy @ ST 1E30L @ @ -4quaueanad eyep arois 01 a8esoys Areurtad asn aM (4 ‘gay sl aremareys (@ “yuautaye}s W2H0I au} UMOP az1IM ‘asTey JI ‘asTey 10 any are syUsUIE}e}S Surmoyjoy ayy Ft Aes “01 (AIoWaW aTeIOA pares A1owrsut Axeurtd st gM 6 UAV peau saynduros ev saop AUM “8 {aavy Jayndwiod e saop Arouraur jo sad UM “L “snatA aynduros k Jo sajdurexa 0M} aAID “9 jaavy uraysds Sunerado smOpUIM at SAOP [OOD ss209e joadg eum “S @umop }T 3NYs 0} pay aaey Nod Ua ‘Buyueyser wioy rayndusoo e yuaaard 0} asn NOA ued anbruypay SuHooyseyqnoy WUM “F “uTOOg WEM pue ZUHOOG Plo? UEaMJaq a2T2I2HIP au} Jay 07 UTe|dxy ‘W1IeM IO Pfo> aq JeyRTE Ur Sunoog syndurod say SHBYS BYS UAY 300 A[TedHEUOINE [TM saynduros ayy smouy eAQUOT *€ AN ‘ax ‘AD “L'a GN ‘aX ‘aL ‘99 aL ‘AD ‘AN ‘a “A 9 ‘aX ‘HLL ‘aN 'V w -ysaSaey ayy 0} ISATTEUUS AU WO aBeI0ys Jo spun Surmoyjoy au asueny "T aremygos Burssavord prom “C1 aIeMYOS UOHRIUASAd “OD aremyos wayshs Bupesedo “a aremzyos yaayspeads “V {UO PaYyoILMs sy} sayNdwUO? eu aya Asowsaul a4) OF ISI PAPLOT Aq [11M BRMIOS Supmorqoy ayy Jo HOM Tt (30D ‘A ‘¥) UORdO JasI09 BuO {uo umop ayaa ‘Zt suopsenb 104 SOS1910XO UOISIACH @ @ @) @ @ (s) (y) @ Summary, revision and assessment exercises continued 10. ll. 12. 13. 14. 15. Serene Which of the following optical storage media has the most i storage available? ieee ob B. BD c. DVD p. CD-R What kind of program is written to interfere with the normal functioning of the computer? a) slain what Cheelo must do to “hard shutdown” computer. qa) Give one example of a good password. (2) Explain to Katendi what a computer “worm” is (2) Antivirus software is divided into two sections. What are they? (2) Explain what open source software is. Give one example. GB) Give three troubleshooting techniques to solve each of following problems: a) The computer restarts after you selected it to shut down. GB) @) b) The computer freezes at the Windows startup screen. ©) The desktop computer with no surge protector does not switch on. @) re in a table. (4) List two advantages and disadvantages. of proprietary software List the steps to uninstall a program that has become unresponsive. (6) Identify each of the following images. (10) a) ‘b) ° d) lain ee you would do the following: Dy @ CD into a computer system. enovs a virus from a memory card, a Total: 50 Mal 4 Information technology in everyday life Sd eke cae Household appliances * Describe particular technologies being used for speci purposes in the home * Infer, using examples, how information and communication networks create a global community | + Demonstrate an understanding of new and emerging |___ communication systems Computer-based learning | * Identify different types of CBL software [CBU — u ats es Computers in banking | * Associate the use of computers to organise, retrieve and and e-commerce Process data * Appreciate the linking of computers in different locations to | | enable electronic fund transfer * Describe e-commerce and the process of purchasing goods and services online List advantages and disadvantages of e-commerce _ Point-of-sale * State common uses of computers in a supermarket | Magnetic and smart cards | * Associate the use of a PIN (personal identification number) as a security measure to initiate a transaction using a magnetic card * Describe the benefits of the trend towards cashless electronic transaction Starter activity Work in groups of four or five. 1. Discuss the following: a) Using a debit card is a much safer way to buy products. b) How to connect a television to a hi-fi system. ©) List two advantages and two disadvantages of using old cash registers at the supermarket checkout instead of the newer scanning systems. d) How to scan a photo to a computer. 2. Make a list on the board ae shows the names of networking sites, and how many learners wr are members of each. Instagram Popular social networks Topic 3 Information technology in everyday life = 35, suB-TOPIC 1 Household app iances Technologies used in the home almost every home and office. We see this when Je see progre: echnology in We see progress in technology ieepecyday eer rae we look at different appliances. These appliances give quick solution: problems. They save humans time, energy and space Connect household appliances SS ae In this sub-topic, we will look at a few appliances that we find in the house. We will also explain how to connect them to a computer or other devices. A decoder Decoders Most of the television sets we now use are built to receive analogue signals. Television stations such as the Zambia National Broadcasting Corporation broadcast television programmes through analogue signals. Pay TV services such as DStv or Zuku use digital data to broadcast their programmes. If you want to watch any of the programmes on these stations, you need a decoder. The decoder changes the digital signal so that standard TVs can receive them. You use a remote control unit to switch between programmes or to change the volume. Zambia, like most other countries in the world, is changing its national broadcasting format from analogue to digital. When the digital system is in place, everybody will need a decoder to watch programmes on their existing television sets. yi A remote control PETE connects) = rae: : Step 1: Switch the television set and the Aseoden ore oa : Step 2: Connect the cable running from the satellite dish to the back of the decoder. Step 3: eoee the three colour-coded RCA connectors 5 both the television set and the decoder. Step 4: Switch the television set an : id thy Step 5: ‘The decoder will search fora satellnc ce” fee colour-coded elite si when connected for the frst tine oo RCA connectors established, insert the ee Once communication is 2 nledboal step 6: Once the smartcard is verified, call the service provider's call centre to activate the account, Step 7: Once the customer details are confirmed, a picture appears on the TV screen. The back panel of a decoder DVD player DVD players are very popular because people can watch their favourite television series and/ or movies without any distractions. The quality ey of the video is very good, and you can pause, rewind and forward the content as you like. A DVD player with an open tray Step 1: Switch the television set and the DVD player off. Step 2: Connect the three colour-coded RCA connectors to both the television set and the DVD player. The colours of the connectors must correspond to the colours of the TV and DVD player terminals. If it is a digital system, there will be only one connector to plug in. Step 3: Power the television set and the DVD player on. Step 4: Plug the AC power cord into an electrical outlet in the wall. Always plug in the power cord after you have connected all the other plugs. Step 5: Refer to the user manual to change the language display and clock on the DVD screen, if necessary. Step 6: Insert a DVD. Step 7: Remember that DVDs come with menus, so they will not play automatically. You must select the options you want. The back panel of a DVD player Hi-fi systems Hi-fi systems vary from expensive systems (that consist of different Parts) to compact systems (that consist of 4 single unit with two speakers). Hi-fi stands for “high fidelity”, which means the sound quality is high. z i can connect a hi-fi system to a television set prove the sound quality of the programmes yor watch. Modern devices can also crnernielea Orne eR TNARietom newer hi-fi systems, Sub+topic 1 Household appliances QF Step 1: Switch the television set and the hi-fi system off. ; Step 2: Connect the two colour-coded RCA connectors to both the television set and the hi-fi system. The colours (usually red and white) of the connectors must aes correspond to the colours of the TV and RCA connectors in a hi-fi hi-fi system terminals. system Step 3: Switch the television set and the hi-fi system on. Step 4: Access the menu on the television set, switch off the internal speakers and turn the audio output of the television on. Step 5: Make sure the volume on the hi-fi system is at a low setting before testing the connection. Step 6: Select the correct input on the hi-fi system and turn the volume up slowly. Connect a DVD player to a TV Work on your own. Type this into the top address bar of a browser on the Internet: [Link]. Then download this activity from the folder: Gr9CS_Topic 3_Act 1_Connect [Link]- You could also scan the QR code shown here with a smartphone to download the activity. Follow the instructions in the document you download. You have to connect the television cables at point A to the DVD player. You do not have the correct cables and go to the shop to buy cables. You see a selection of cables on display. 1. Which cable(s) would you buy? 2. Give two reasons for your choice. 3. What do we call the cables that you need? Connect office appliances In thi: i i i is en ae vit oes a few appliances (devices/peripherals) that are often used Ba ee fees tt fe appliances, for example cameras, are also commonly used x ok at their uses and how to connect them properly. Most of the appliances are c onnected : Remember that most desktop comp: to a computer with a USB cable. te see the front of the computer ecu e forts on the Lae ae in the fi . It is ust rt Serie Bey a more accessible. If you use a ae eusietto uss le of the computer. Some laptops signe ce eaceeh 5 ports at the back $8. Topics intonation rtmoiogy in everyday up tyday life Projector A projector displays video, images or computer data on a screen or other flat surface. Most projectors create an image by shining a light through a small transparent lens. Newer types of projectors can project the image directly, by using lasers. Most projectors that we use with a computer can accept different types of input. See what cables you have and what your computer can support, then choose a connection method. The most common connection is through the VGA monitor output on your computer toan analogue VGA input port on the projector. You can also use S-Video and HDMI to connect the projector to the computer. A projector New words ‘$-Video: a standard analogue video signal that is not digital HDMI: stands for High-Definition Multimedia Interface. It is a digital video and audio signal being send through the same cable detect: to recognise the presence of a device and identify the type of connection plug and play: when the operating system automatically detects, configures and installs a basic set of drivers for the attached device Step 1: Switch the computer and the projector off. Step 2: Choose the connection method. Step 3: Connect the cable to both the computer and the projector. Step 4: Switch the computer and the projector on. Step 5: If the computer does not detect the projector automatically, activate the projector by pressing Windows Key+P at the same time. Scanners Ascanner makes a digital copy of physical images or documents. Scanners can also “read” typed documents and change them to documents that you can edit in aword processing program. A scanner either comes as a separate unit, called a flatbed scanner, or it is combined in an all-in-one device. This device can scan, fax, print, and make and receive phone calls. Most scanners are “plug and play” compatible. This means when you connect the scanner to the Computer, Windows will automatically detect what type of scanner it is. Windows will then install a default set of drivers and software to operate the scanner, = A flatbed scanner Sub-topic 1 Household appliances = 3Q. to the Connect the scanr computer. Most scanners make use of a USB port connection. Step 2: If the scanner uses its own power source, connect it to the power outlet and switch eee = The USB cable from a scanner Step 3: For scanner-specific utilities, connected toa laptop install the software that came with the scanner. Printers The most common types of printers used in homes or small businesses are inkjet and laser printers. Their function is to receive digital information from a computer to produce a hard copy on paper. Connecting a printer to a computer is similar to connecting a scanner to a computer. Most printers are “plug and play” compatible. This means that Windows will automatically detect the type of printer and install a default set of drivers and software to operate the printer. A laser printer Step 1: Connect the printer to the computer. Most printers use a USB port connection. Step 2: Connect the printer to the power outlet and switch the printer on. Step 3: For printer-specific utilities, install the software that came with the printer, Connect common household appliances 1. Work in groups. Explain to the other leat rners hi . a) a scanner to a computer. ow you would connect: b) a printer to a computer, Topic 3 Information technology in everyday life Digital cameras s. There are two main types © se digital cameras to take digital phot We digital cameras. Compact digital cameras are smal) You do not have to look through the lens when you take a photo. « SLR cameras are bigger. Professional An SLR digital photographers use this type of camera. You look through the lens_—_@ compact digital when you take a photo. camera camera One of the advantages of a digital camera is New words that it stores its photos on an SD card. Photos oo are immediately available to view or upload to ‘SD card: a memory card that you put into a camera, onto which the omputer. Some cameras can also record short acomp eo : video clips. ee ‘Step 1: Make sure that the computer is switched on. Step 2: Connect the digital camera to the computer. Most cameras make use of a USB port connection. Step 3: Switch the digital camera on. Step 4: When the computer has detected the camera, choose one of the following options: a) Open Windows File Explorer b) Click Start (Windows icon). ‘Type in “file explorer”. Then press Enter. 4 digital camera ©) The computer may provide options for__ connected to a laptop transferring the digital photos. Select the option you want and follow the instructions. d) Pre-installed software that comes with the camera can automatically transfer the photos to the computer. Step 5: Choose a destination folder to transfer the photos from the F ms ‘ Sut Micon yy Spec niente a AY Smartphones Smartphones are mobile devices that are connected to a network. Smartphone users con send messages and talk to other users over a cellular network connection. Smartphones have integrated devices such as cameras and voice - This means that the user must be able to connect it to a comy transfer data from or to the phone. ae Sub-topic 1 Household appliances 41 one Step I; Switch on the nd the ee : Step 2: Connect the cable t0 the phone FEsts then to the computer's USB Botts gic Step 3: If it isthe first time you are connecting i phone to the computer follow the on-scree Pistructions for the installation of drivers A emastphone : connected to a laptop complete. Step 4: If you want to programs, instal computer. Examples: Store phone numbers oP ne specific utility ft use any ol came with the phone on the 1 the software that your computer. Take a photo Work in groups. ‘ 1. If you have a smartphone available, take turns to take photos of your friends in the group. 2. Now connect the smartphone to a hard drive. If you do not have smal to explain the steps. computer and transfer the photos onto the rtphones or computers available, take turns Information and communication technology create a global community It is very difficult for someone to be completely = isolated from information and communication Mi technology (ICT) these days. Technology is all gone a oe the opportunities it offers are endous. You can talk to somebod) other side of the world by keying in oe and you do not even have to pay for the call. ; y c area Email also makes it possible to communicate with Soe in aglobal people and get an almost immediat You can communicate with ee ae Hh they were living nextdoor to you. This aaa conn e part of what we mean by the term. oe cae Smartphones, the Internet many electronic devices have all made it possible for everybo. a global community. dy to be part of Smartphones are a crucial part of our lives smartphones have become a very important tool for many people. You can use them to access information on the Internet; keep in touch with friends, family and business partners; send and receive email Wireless technology makes it possible to use a smartphone anywhere where it can pick upa signal. _A range of smartphones Advantages of smartphones smartphones can help us in many ways. + You can receive and place calls, store data, and take pictures. You can use a smartphone as a notebook, calendar or calculator. You can use a smartphones as a walkie-talkie. You can feel safe when you move around, because you can stay connected with other people and get help if there is an emergency. Some smartphones have global positioning system (GPS) technology. This can help you to find your way to a destination. It also makes it possible to track where the user is. This can help to save lives in an emergency. New and emerging communication systems Social networks An online social network (also called a social networking site) is a website where users create their personal online profiles and build social groups with other users based on common interests. A personal online profile can include: * a person’s interests * the school they attended * personal photographs or videos. When you register on a social networking site, you can socialise with other users and view their profiles. Businesses use networking sites to reach out to customers and the public. It is also a useful tool to make contact with other business people. There are social networking sites where you can add your contact details, post ‘details of your services and experience, apply for jobs and look for advice. Social networking is popular around the world, Facebook is one of the best-known ‘networks. Other social networks include Twitter, LinkedIn and WhatsApp. Sub-topic 1 Household appliances 43 Step 1 Step 2 Step 3: Step 4: > to [Link] book. com/signur: Pbone number or email address. Create a unique password: saan Now enter your date of birth. (¥¢ Sy at least 13 years old to create an acce 5 Select your gender. Click the Sign Up button. You must confirm your smar oremail address before your account can become active. tphone number & Username = Email address (© Password A typical screen to create an online account Step 1: Go to [Link]/signup. Step 2: Enter your name and smartphone number or email address. Create a unique password. Step 4: Click the Sign Up button. Step 5: You will be asked to verify your smartphone number with a code sent to you in an SMS. Step a ae the given code in the sign-up box to activate your account. Step : aC, choose or create a unique username. Step Click the “Create my account” button. Talk about onli ine communicati Work in groups. unication Choose two online social n zo etworkit i . the two sites you chose, ng sites. Discuss what content you can share 0 other while you talk Ita ee money by Skyping ‘ne data to ee ee << use this function, you have wo @ Phone cal, SO you can save a y a4 Sadan app and register as a user Topic 3 Information tess. Create a Skype account ae step 1: Go to [Link]. Select Sign In in the upper-right corner Step 2: Click on Sign up. Follow the directions and enter the required information (your name, birth date, and so on) Step 3: Read the EULA and make sure that you understand the conditions. If you agree to the EULA, click Continue. Step 4: After your account has been created, download Skype. Step 5: Double-click on the installation file once it has downloaded and follow the instructions to install Skype. Step 6: Enter your username and password, then click Sign in. The Skype window will appear. Sal Step 1: Sign into Skype using your username and password. — Step 2: Select the person you want to video call t from the Contacts tab. Step 3: The contact’s information will open in a pane on the right. Click the Video Call button. Friends talking on Skype Step 4: The Calling window will open. The video from the camera on your computer (webcam) will show at the bottom of the screen. The call will keep ringing until someone picks up. Step 5: When the other person answers, you will see video from his or her webcam on the screen. If the person does not have a webcam (or chooses to answer without it) a profile picture will be shown instead. Step 6: Talk as long as you want to. Click the End Call button when you want to end the conversation. Step 2: Ifyou want to use a number you do not have saved on your phone: Key in the number you want to call on_ your phone's keypad, Press Call to start your call. oe a ata ee earning SUB-TOPIC 2 Computer-based | i s of Identify different types _ epee learning softw: yhen you use Computer-based learning ( ne ass of using these he advanta : computer programs to study Be rate ne, programs is that you can study from hon help of a teacher. Types of computer-based ae avaiable 1OOSe wm. learning software There are different types of software that you can use to learn in different ways. Drill and practise programs There are three types of drill and practise software: flashcard activities, branching drill activities and extensive feedback activities. 1. Flashcard activities: These are usually a set of questions that appear one by one on the screen. You have to click on the correct answer to move to the next flashcard. — 2. Branching drill: These activities require a Milli that the learner answer a question that A learner studying technology appears on the screen. If the learner answers online the question correctly, the software moves on to show more advanced information and questions. 3. Extensive feedback activities: With these activities, the software responds t0 ihe leamer’s answers with detaled information, een explain why an answet mas wrong, or what the answer should have been. The software can also 'pply extra information that helps the learner to understand the work. The advantages of dri - This type of softwar - You can use a smartphen 78 learners to get all the answers correct: Learners can access . Drill and practise software * learn new conte * work on Problems or ¢; * get immediate feeatya, Bene helps tea: mers to; ‘nt OF review content xamples at their sk on thet Performance Topic 3 Information t INO ih everscinss. 46 ion. They give Simulation programs simulations are computerised models of a real or imagined situ: Jearners the freedom to choose which tasks they want to do. Th ; advantage of simulations is that they can be applied to real-life situations because they allow the learners to test concepts under safe conditions without the restraint of cost, maintenance and clean-up. Simulations provide leamers with visual, hands-on experience of processes that they could not ordinarily see. There are two types of simulations: + those that teach something. + those that teach how to do something. Tutorial programs Computer tutorials are very similar to a teacher teaching in the classroom. Many are designed to be a self-contained lesson that allows learners to learn the content without needing any other material. Tutorials are different from the other instructional software because they are true teaching materials and provide the learners with all the information and activities to help them learn the content. The advantage of tutorials is that they can be used in the classroom, but each learner can work at his or her own pace. Problem-solving programs Many people think that simulations and tutorials are problem-solving programs because they teach learners problem-solving skills. However, there are programs designed specifically for problem-solving. The software focuses on different methods for learners to design solutions to given problems. The advantage of these a Sees chiles programs is that they get leamers more interested and ONE vs involved in a subject. The program also makes learning more meaningful, because learners have to find solutions to real-world problems. EE Benefits of computer-based learning Work on your own. ‘ 1. What is the main difference between computer-based learning and teaching by teachers? 2. List the types of computer-based learning software available. 3. What opportunities does drill and practice programs offer learners? 4. List the two types of simulation programs. 5. Discuss which type of learners would benefit from these types ‘of computer- based learning. List at least two reasons for your answer. 6. In pairs, explain how it benefits a learner to complete a tutorial program after the teacher has explained a section of work. Sub-topie 2 Computer-based teaming 47 Software for physically challenged users There is special software for learners who have poor eyesight, blindness, deafn or even motor function problems. Companies develop software for these learner to help them to learn more easily. These special features include * recognising their voice to control the computer * on-screen displays of keyboards * showing notes on the computer instead of making sounds making the mouse cursor larger * changing text to speech magnifying sections of the screen. A blind person using a special device that can read text aloud Explore computer settings for people with poor eyesight Work in pairs. The Windows operating system has various things that you can do to make a computer more accessible to people with impaired eyesight, hearing or movement. You will find the options in a menu called Ease of Access. 1. Open the Start menu in Windows. Type in “Ease of access". This will take you toa menu with various options. 2. Look at the options. Experiment with some changes 3. Explain to your friend what you will do to make it easier for a person with poor eyesight to use a computer. If you do not have a computer available, make a list of the things you would change to help a person with poor eyesight. Then try to find information about the ways in which a computer can be adapted for such a person. 48 topic 3 Information technology in everyday life

You might also like