0% found this document useful (0 votes)
1K views28 pages

Digital Technology

Uploaded by

Brantin Ndoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
1K views28 pages

Digital Technology

Uploaded by

Brantin Ndoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
Cerra ue ee a ru MCE gies ..1 2 1 4; Systems Technolo: Section are and the cloud 1.1; Softw Module 2: Digital technology in everyd Module 4 jay life ...7 lod section 2: Digital Citizenship - 13 Module 2.1: Online behaviour ...14 Module 2.2: Copyright and Plagiarism ..23 ybercrime and the Law ...29 Module 2.3: C Section 3: Computational Thinking ...35 Module 3.1: Variables and IPO tables ...36 Module 3.2: Problem solving with flowcharts ...42 Section 4: Word Processing ...49 Module 4.1; WordArt, text boxes, headers and footers ...50 Module 4.2: SmartArt ...59 Module 4.3: Revision and Table of Contents ...67 Section 5: Spreadsheets ...73 Module 5.1: Charts ...74 Module 5.2: Worksheets and Functions ...82 Module 5.3: Revision and preparing for printing ...92 Section 6: Coding ...99 Module 6.1: Programs that require user input ...100 Module 6.2: Making decisions ...112 Module 6.3: Working with numbers and strings ...124 Module 6.4: Loops ..133 Section 7: Test and improve ...145 Module 7.1: Theory — test your knowledge ...146 Module 7.2: Word and Excel — extra practice ...152 Module 7.3: ule 7.3: Programming ~ putting it all together ...167 Term SECTION Systems Technologies MODULES 1.1 Software and the cloud 1.2 Digital technology in everyday life 1 | Activity Open the comie Terrifie Tum and the troubled Baba. ip: You will find thie PF file in the subfolder 1_1 DATA eng with this book's data files. Double-click on the file name in Explorer to open the file Road the comic and answer the following questions: | What common mistakes has Baba made? What type of software is Windows? ). Can Windows be used to opet word processing document? 4, What is the main function of software such as Windows? 5. Name two other software products that do the same task as Windows. Knowing a litle more | about software and the 6. What category of software enables you to do different things with {loud wil help you use ‘your computer more effectively. your computer or sinarlphone? 7. What category of software does a word processor belong 10? 8, When a group of applications software from the same company is sold together as a single product itis called a 9. For the purpose of this question, the software categories are divided into the following: (X) System Software, Operating System (Y) System Software, Utility Software (2) Application Software Indicate which category each of the software titles listed below falls under (for your answer just write down just the question letter and an '%', "Y! or ‘2! for the category): a) Microsoft Word b) Windows c) Typing Tutor program 4) Android @) Microsoft Excel f) Avast Free Antivirus 9) Microsoft PowerPoint h) McAfee Anti-malware 1) Instagram )) 108 k) Google Chrome (web browser) 1) Surviving Mars (strategy gam 2 Activity mic Terrific Tumi and the confusing Cloud. nic and answer the following questions: What does the cloud consist of? Vho owns the cloud? 3. Where is the cloud located? ‘Android and 108 4. How do you access the cloud? dovieas normally come wit a fiited amos | of fo cloud sto your phone may alroady have asked if you want fo ‘sync oF ‘backup’ your photos to the cloud 5. Give three examples of applications that the cloud makes possible. 0° 6. What is cloud storage? 7. Name three cloud storage services, 8. Give the main advantage of using cloud storage. ‘Summary The cloud is a (huge) collection of computers owned by companies and housed in data centres around the world. These computers are accessible through the internet. Cloud computers can be used for anything ~ depending on the software that they run. (we The cloud Cloud storage ft «and much more I your computer is connected to the internet, you can use the service ‘available on these cloud computers, Many of us have Gmail accounts. Gmail is an example of an email service running in the cloud f ) woowe rs sorrwareavorreciou | 5 7 ET a | Introduction Online shopping Online banking Digital technologies ‘and education Digital technology in everyday life Introduction In this module we take a closer look at how we use technology in our everyday lives — with specific focus on online shopping and banking, and how technology has impacted on the way we teach and leam. 1 | Activity ‘Open the comic Terrific Tumi and the Ferocious Five. Read the comic and answer the following questions: 1. What device does Kiril use to do the shopping for the new recruits’ base camp? What other devices could he have used? Name at least two. Did he have to go anywhere to do the shopping? Did it matter what time it was when he did the shopping? een id the items he ordered have to be delivered to where he was when he ordered them? 6. The site Kiril used is in America. What does this tell us about online shopping? 7. If Kiril can buy from an overseas site, what does this mean for someone opening a local online store? Give two implications for the local online store - one positive and one negative. How did Kiril know that his purchases were linked to him and that nobody else could buy on his account? oous 12 oomurecnnioorwevancavure (7) we SOME disadvantages and linitations associated with ontine ding the following 7 You can also set up \ get delivered invmediately ~ there is always a waiting oweh Rie eat od whieh oan range from a day oF wo to several weeks, yourself of things that HpING FoF things like clothe ied buy right now = and you make the wish ist public, then frends and ©, You Usually have a much wider variety of items family can use it a8 a (© choose from, and you can find goods that are simply not source of gift ideas to © (ooally. (0 addition, ontine shopping is often cheaper than in fash aches oo you cannot physically touch and Y 0n’ your intended purchase, on the positive Physical shops ~ which makes up for any delivery costs, [ 2} Activity Wate the video OnlineShopping for a demonstration of how to shop online. Online banking Just about the only thing you cannot do when banking online, is to raw physical cash. Apart from this, online banking provides all the ence features of going to the bank ~ but without the hassles of having to ae physically go to the bank, standing in queues and ‘wasting time’ while waiting to be served. Online transactions also usually cost less than if you had to queue for a teller in the bank itself. Instead of you going Online banking allows one to pay people, get paid, check your bank balance, transfer money, get statements, buy utilities (such as airtime and pre-paid electricity) ~ and lots more. This makes life much easier, and it also reduces the dangers of walking around with cash. But is online banking safe? Yes its, provided that you take all the necessary precautions to keep your money safe. Basically, this means keeping your login details safe from criminals, so that they cannot log in pretending to be you, and then perform transactions without your knowledge or consent. Here are some guidelines: + Never give out personal details such as PIN codes and passwords, and never write them down. + Do not use public computers (0g. in libraries or internet cafés) for online banking. i sitet teenie Y een Digital Citizenship MODULES 2.1 Online behaviour 2.2 Copyright and Plagiarism 2.3 Cybercrime and the Law FTE NS Online behaviour Online harassment Online harassment s a blanket term covering various forms of bad online behaviour. including ones we learnt about last year such as catfishing and icentty thef. This year we will lok at two new ones ~ cyberbullying and cyberstalking, {t's important that you lean how to recognise bad online behaviour and that you know what you can do to try to stop it (and to avoid behaving badly yourself). Cyberbullying Cyberbullying is using online tools to post mean and hurtful content rected at someone, making them feel embarrassed, degraded and often leading to self-isolation and depression. Cyberbullying is typically found among tena: ccan include the following: * Sending hurtful private messages to the victim * Posting messages in a group chat insultin, to take part in the bullying) * Posting hurtful or insulting comments on the victim's social + Spreading false rumours about the victim * Tagging only certain people in a post ~ specifically excludin (¢.g. Can't wait for this weekend! @KatieC @Lumkas) * Digitally altering photos the victim posted online — to make * Sharing memes or embarrassing pictures about the victim + Using the victim's photos in ‘hot or not’ votes * Impersonating the vietim online in a mocking way agers and young adults, and 1g the victim (getting the group media posts 19 the victim fun of them Online harassment Online identity versus alin wertty Auvareress of digital foolprint Social media safety Netiquette Ethics online Most of you will Probably have come ‘across cyberbullying in ‘some way or another ‘by now. Hopefully, this ‘Module wil help you to realise how serious cyberbullying an be worse than real-life bullying because the a ape. You can always leave a real-life bully behind and find some peace and safety but bullying Is present are online and can take 9 is also worse because the ave no way to fight ies May be anonymous ips of people instead of a that you can stand up to. Staying safe (what you can do) Cyberbullying must never simply be accepted as an unavoidable part of life. There are things we can do to try to stop it whether we see it happening to someone else or we become a victim of it Steps to take if you see cyberbullying Don't keep quiet! By keeping quiet you are supporting the bully. + Tell the victim you support them. + Stand up to the cyberbully by telling them what they are doing is, wrong + Report the bully’s behaviour to the social media platform as well . as toa trusted adult. + cyberbulying is Steps you can take if you are a victim of cyberbullying i eeaiaiee 4 or + Message once asking the bully to stop. This shows that you {can bo taken against are not happy with the situation and it prevents the bully from janes claiming later that he/she ‘didn't know’ or ‘was only joking’. a + Ignore the bullying as best you can. Do not respond beyond asking the bully to stop. + Keep all evidence (proof) of the bullying. Save messages, photos, screenshots, etc. before the bully can delete the online evidence. + Set your profile’s privacy to ‘high’, and use the relevant settings to block the bully from communicating with you. + Tell an adult - someone you trust and respect. + Report the bullying to the social media platform concemed. They can help by blocking the bully, cancelling accounts, ete. + Report the bully to the police and obtain a protection order Ran Oict niet against them. ‘which states what the offender must stop doing. |, Module 2,3 deals with protection acts and legal consequences of ‘eybercrimes MODULE 2.1! ONLINE BEHAVIOUR Do Not tag locations where you live OF go to OF social media so that people can't use this to find you In real fe Nover send nude or embarrassing pictures of yourself to others. # good passwords policies so that a potential cyberstalker will NN 10 hack into your accounts » rolationship {ums unpleasant, block the person from communicating with you online immediately Cheek how much information you can find about yourself ontine ogle yoursel!), This will help you to see how much information about You (8 publicly available ~ and how much information a cyberstalker can ind Out about you. Wateh out for phishing attempts ~ do not click on suspicious links oF open attachments from unknown senders, as this may be a ceyberstalker trying to access your accounts. ‘Steps you can take if you are a victim of cyberstalking The same steps are applicable here, as are listed under the heading Stops you can take if you are a victim of cyberbullying’ on page 15. Consequences A protection order can be issued against the alleged cyberstalker. If the person ignores this order, he/she can be charged and, if found guilty, be sentenced to up to five years in prison. Online identity versus offline identity On social media everyone seems to be smart, talented, happy and productive ~ but we know that this is not always so. Everything we do online (and what others post about us) creates our online identity. This includes not only social media, but also the games we play, as well as many other online interactions (such as following channels/accounts, subscriptions or simply ‘liking’ content). It gives anyone who looks us up a sense of who and what we are, That is why most people carefully select what they present to the world online, Mostly we only present the best of who and what we are. Sometimes people just want space to ‘be their real selves’ online. To do this they create secondary accounts that they only share with certain people. They also use services that promise to delete content after a short period of time (e.g. SnapChat or Instagram Stories), MODULE 21 Did you know that other people can see which ‘YouTube channels you follow? Social media safety To keep yourself safe on social media, you need to stay up to date with the latest privacy settings. These get updated regularly, so make a point of doing @ search every now and then and checking to see what the security experts recommend, The following are general tips to keep yourself safe on social media + Make sure the account is private. + Set who can tag photos of yourself. Netiquette Netiquette is a description of what good manners look like in the digital Specify who can send messages or communicate with you. Disable any geotagging setting that shows where you are or have been. Disable any settings that indicate when you were last online. Network + Etiquette = Netiquette world. The golden rule of real life still applies online — treat others as you want to be treated yourself. There is a person on the other side of that screen with a right to be treated with respect. Do's: + Observe before you participate — the accepted format/tone of posts will differ between platforms and between groups. Consider the tone of the communication (formal vs informal — for example, an emoji in a job application ‘would NOT be appropriate). Learn how to respectfully disagree. Check posts for truthfulness before sharing — just because something is ‘online does not mean itis true. ‘Stay on topic in a discussion, Read instructions / other people's ‘comments before you post something — do not make people repeat themselves. Do not... + type in all CAPS — tis ike shouting at someone + have personal conversations in a group chat + insult people online * point out other people's mistakes (unless not doing so would cause harm) + waste people's time and data by sharing information unnecessarily (e.g. posting motivational messages in WhatsApp groups is a big no-no) + repost other people’s content without their permission + use information you found online without giving credit, 1e. commit plagiarism + share other people's personal information (such as contact number, address) ~ not even with a mutual friend — always first ask their permission. at should you always do before ‘sp 9 a comment? aking your mind’ online or cyberbullying not just harmless fun but a serious offence? ebrities at risk of being cyberstalked? Explain your How does a cyberstalker try to damage their victim's reputation? 7 Vhy is it unsafe to tag your location on social media? It's not just for exams that you need to be able o answer these kinds of questions; its ‘also good to know tis yourself and be able to 9. Name three specific things we do online that create our online apply it in your own life, identity, Online Identity 8. Is our online identity only our own responsibility? Explain your answer, 10. Why should you still be careful about what you post to private Instagram accounts? | Awareness of digital footprint | 11. Can you alter your digital footprint by deleting inappropriate content? 12. Who will usually do research about you online before meeting you? | 13. How can you control who sees a specific social media post of yours? 14. Give two things that contribute to a negative digital footprint. Social media safety 15, Your friend checked all her social media privacy settings when she created her accounts two years ago. Explain why this is not enough to keep oneself safe on social media. 16. Name two basic security settings that you should change for apps you use. Netiquette 17. What does netiquette refer to? 18. Why is it not good practice (‘bad netiquette’ to frequently forward funny memes to a WhatsApp group? 19. You disagree with a classmate’s statement on global warming. How ‘could you rephrase the following response in a better way, so as to start a fruitful discussion? “What an idiot - whoever thinks that could work?" MODULE 2.1: ONLINE BEHAVIOUR ( 21

You might also like