0 ratings0% found this document useful (0 votes) 1K views28 pagesDigital Technology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Cerra ue ee a ru MCEgies ..1
2
1 4; Systems Technolo:
Section
are and the cloud
1.1; Softw
Module
2: Digital technology in everyd
Module 4 jay life ...7
lod
section 2: Digital Citizenship - 13
Module 2.1: Online behaviour ...14
Module 2.2: Copyright and Plagiarism ..23
ybercrime and the Law ...29
Module 2.3: C
Section 3: Computational Thinking ...35
Module 3.1: Variables and IPO tables ...36
Module 3.2: Problem solving with flowcharts ...42
Section 4: Word Processing ...49
Module 4.1; WordArt, text boxes, headers and footers ...50
Module 4.2: SmartArt ...59
Module 4.3: Revision and Table of Contents ...67
Section 5: Spreadsheets ...73
Module 5.1: Charts ...74
Module 5.2: Worksheets and Functions ...82
Module 5.3: Revision and preparing for printing ...92
Section 6: Coding ...99
Module 6.1: Programs that require user input ...100
Module 6.2: Making decisions ...112
Module 6.3: Working with numbers and strings ...124
Module 6.4: Loops ..133
Section 7: Test and improve ...145
Module 7.1: Theory — test your knowledge ...146
Module 7.2: Word and Excel — extra practice ...152
Module 7.3:
ule 7.3: Programming ~ putting it all together ...167
TermSECTION
Systems
Technologies
MODULES
1.1 Software and the cloud
1.2 Digital technology in everyday life1 | Activity
Open the comie Terrifie Tum and the troubled Baba.
ip: You will find thie PF file in the subfolder 1_1 DATA eng with
this book's data files.
Double-click on the file name in Explorer to open the file
Road the comic and answer the following questions:
| What common mistakes has Baba made?
What type of software is Windows?
). Can Windows be used to opet
word processing document?
4, What is the main function of software such as Windows?
5. Name two other software products that do the same task as
Windows.
Knowing a litle more
| about software and the
6. What category of software enables you to do different things with {loud wil help you use
‘your computer more
effectively.
your computer or sinarlphone?
7. What category of software does a word processor belong 10?
8, When a group of applications software from the same company is
sold together as a single product itis called a
9. For the purpose of this question, the software categories are divided
into the following:
(X) System Software, Operating System
(Y) System Software, Utility Software
(2) Application Software
Indicate which category each of the software titles listed below falls
under (for your answer just write down just the question letter and an
'%', "Y! or ‘2! for the category):
a) Microsoft Word
b) Windows
c) Typing Tutor program
4) Android
@) Microsoft Excel
f) Avast Free Antivirus
9) Microsoft PowerPoint
h) McAfee Anti-malware
1) Instagram
)) 108
k) Google Chrome (web browser)
1) Surviving Mars (strategy gam2 Activity
mic Terrific Tumi and the confusing Cloud.
nic and answer the following questions:
What does the cloud consist of?
Vho owns the cloud?
3. Where is the cloud located?
‘Android and 108
4. How do you access the cloud? dovieas normally come
wit a fiited amos
| of fo cloud sto
your phone may
alroady have asked if
you want fo ‘sync oF
‘backup’ your photos to
the cloud
5. Give three examples of applications that the cloud makes possible.
0°
6. What is cloud storage?
7. Name three cloud storage services,
8. Give the main advantage of using cloud storage.
‘Summary
The cloud is a (huge) collection of computers owned by companies and
housed in data centres around the world. These computers are accessible
through the internet.
Cloud computers can be used for anything ~ depending on the software
that they run.
(we The cloud
Cloud storage ft «and much more
I your computer is connected to the internet, you can use the service
‘available on these cloud computers, Many of us have Gmail accounts.
Gmail is an example of an email service running in the cloud
f )
woowe rs sorrwareavorreciou | 57 ET a |
Introduction
Online shopping
Online banking
Digital technologies
‘and education
Digital technology
in everyday life
Introduction
In this module we take a closer look at how we use technology in our
everyday lives — with specific focus on online shopping and banking, and
how technology has impacted on the way we teach and leam.
1 | Activity
‘Open the comic Terrific Tumi and the Ferocious Five.
Read the comic and answer the following questions:
1. What device does Kiril use to do the shopping for the new recruits’
base camp?
What other devices could he have used? Name at least two.
Did he have to go anywhere to do the shopping?
Did it matter what time it was when he did the shopping?
een
id the items he ordered have to be delivered to where he was
when he ordered them?
6. The site Kiril used is in America. What does this tell us about online
shopping?
7. If Kiril can buy from an overseas site, what does this mean for
someone opening a local online store? Give two implications for the
local online store - one positive and one negative.
How did Kiril know that his purchases were linked to him and that
nobody else could buy on his account?
oous 12 oomurecnnioorwevancavure (7)we SOME disadvantages and linitations associated with ontine
ding the following
7 You can also set up
\ get delivered invmediately ~ there is always a waiting oweh Rie eat
od whieh oan range from a day oF wo to several weeks, yourself of things that
HpING FoF things like clothe ied
buy right now = and
you make the wish ist
public, then frends and
©, You Usually have a much wider variety of items family can use it a8 a
(© choose from, and you can find goods that are simply not source of gift ideas to
© (ooally. (0 addition, ontine shopping is often cheaper than in fash aches oo
you cannot physically touch and
Y 0n’ your intended purchase,
on the positive
Physical shops ~ which makes up for any delivery costs,
[ 2} Activity
Wate the video OnlineShopping for a demonstration of how to shop
online.
Online banking
Just about the only thing you cannot do when banking online, is to
raw physical cash. Apart from this, online banking provides all the ence
features of going to the bank ~ but without the hassles of having to ae
physically go to the bank, standing in queues and ‘wasting time’ while
waiting to be served. Online transactions also usually cost less than if
you had to queue for a teller in the bank itself.
Instead of you going
Online banking allows one to pay people, get paid, check your bank
balance, transfer money, get statements, buy utilities (such as airtime
and pre-paid electricity) ~ and lots more. This makes life much easier,
and it also reduces the dangers of walking around with cash.
But is online banking safe?
Yes its, provided that you take all the necessary precautions to keep your
money safe. Basically, this means keeping your login details safe from
criminals, so that they cannot log in pretending to be you, and then perform
transactions without your knowledge or consent.
Here are some guidelines:
+ Never give out personal details such as PIN codes and passwords, and
never write them down.
+ Do not use public computers (0g. in libraries or internet cafés) for online
banking.
i sitet teenieY
een
Digital
Citizenship
MODULES
2.1 Online behaviour
2.2 Copyright and Plagiarism
2.3 Cybercrime and the LawFTE NS
Online behaviour
Online harassment
Online harassment s a blanket term covering various forms of bad online
behaviour. including ones we learnt about last year such as catfishing and
icentty thef. This year we will lok at two new ones ~ cyberbullying and
cyberstalking,
{t's important that you lean how to recognise bad online behaviour and
that you know what you can do to try to stop it (and to avoid behaving badly
yourself).
Cyberbullying
Cyberbullying is using online tools to post mean and hurtful content
rected at someone, making them feel embarrassed, degraded and often
leading to self-isolation and depression.
Cyberbullying is typically found among tena:
ccan include the following:
* Sending hurtful private messages to the victim
* Posting messages in a group chat insultin,
to take part in the bullying)
* Posting hurtful or insulting comments on the victim's social
+ Spreading false rumours about the victim
* Tagging only certain people in a post ~ specifically excludin
(¢.g. Can't wait for this weekend! @KatieC @Lumkas)
* Digitally altering photos the victim posted online — to make
* Sharing memes or embarrassing pictures about the victim
+ Using the victim's photos in ‘hot or not’ votes
* Impersonating the vietim online in a mocking way
agers and young adults, and
1g the victim (getting the group
media posts
19 the victim
fun of them
Online harassment
Online identity versus
alin wertty
Auvareress of digital
foolprint
Social media safety
Netiquette
Ethics online
Most of you will
Probably have come
‘across cyberbullying in
‘some way or another
‘by now. Hopefully, this
‘Module wil help you
to realise how serious
cyberbullyingan be worse than real-life bullying because the
a ape. You can always leave a real-life bully behind
and find some peace and safety
but bullying Is present
are online and can take
9 is also worse because the
ave no way to fight
ies May be anonymous
ips of people instead of a
that you can stand up to.
Staying safe (what you can do)
Cyberbullying must never simply be accepted as an unavoidable
part of life. There are things we can do to try to stop it whether we
see it happening to someone else or we become a victim of it
Steps to take if you see cyberbullying
Don't keep quiet! By keeping quiet you are supporting the bully.
+ Tell the victim you support them.
+ Stand up to the cyberbully by telling them what they are doing is,
wrong
+ Report the bully’s behaviour to the social media platform as well .
as toa trusted adult. + cyberbulying is
Steps you can take if you are a victim of cyberbullying i eeaiaiee 4 or
+ Message once asking the bully to stop. This shows that you {can bo taken against
are not happy with the situation and it prevents the bully from janes
claiming later that he/she ‘didn't know’ or ‘was only joking’. a
+ Ignore the bullying as best you can. Do not respond beyond
asking the bully to stop.
+ Keep all evidence (proof) of the bullying. Save messages,
photos, screenshots, etc. before the bully can delete the online
evidence.
+ Set your profile’s privacy to ‘high’, and use the relevant settings
to block the bully from communicating with you.
+ Tell an adult - someone you trust and respect.
+ Report the bullying to the social media platform concemed. They
can help by blocking the bully, cancelling accounts, ete.
+ Report the bully to the police and obtain a protection order Ran Oict niet
against them. ‘which states what the
offender must stop doing.
|, Module 2,3 deals with
protection acts and
legal consequences of
‘eybercrimes
MODULE 2.1! ONLINE BEHAVIOURDo Not tag locations where you live OF go to OF social media so that
people can't use this to find you In real fe
Nover send nude or embarrassing pictures of yourself to others.
# good passwords policies so that a potential cyberstalker will
NN 10 hack into your accounts
» rolationship {ums unpleasant, block the person from communicating
with you online immediately
Cheek how much information you can find about yourself ontine
ogle yoursel!), This will help you to see how much information about
You (8 publicly available ~ and how much information a cyberstalker can
ind Out about you.
Wateh out for phishing attempts ~ do not click on suspicious links
oF open attachments from unknown senders, as this may be a
ceyberstalker trying to access your accounts.
‘Steps you can take if you are a victim of cyberstalking
The same steps are applicable here, as are listed under the heading
Stops you can take if you are a victim of cyberbullying’ on page 15.
Consequences
A protection order can be issued against the alleged cyberstalker. If the
person ignores this order, he/she can be charged and, if found guilty, be
sentenced to up to five years in prison.
Online identity versus offline identity
On social media everyone seems to be smart, talented, happy and
productive ~ but we know that this is not always so.
Everything we do online (and what others post about us) creates our
online identity. This includes not only social media, but also the games
we play, as well as many other online interactions (such as following
channels/accounts, subscriptions or simply ‘liking’ content). It gives anyone
who looks us up a sense of who and what we are,
That is why most people carefully select what they present to the world
online, Mostly we only present the best of who and what we are.
Sometimes people just want space to ‘be their real selves’ online. To do
this they create secondary accounts that they only share with certain
people. They also use services that promise to delete content after a short
period of time (e.g. SnapChat or Instagram Stories),
MODULE 21
Did you know that other
people can see which
‘YouTube channels you
follow?Social media safety
To keep yourself safe on social media, you need to stay up to date with
the latest privacy settings. These get updated regularly, so make a point of
doing @ search every now and then and checking to see what the security
experts recommend,
The following are general tips to keep yourself safe on social media
+ Make sure the account is private.
+ Set who can tag photos of yourself.
Netiquette
Netiquette is a description of what good manners look like in the digital
Specify who can send messages or communicate with you.
Disable any geotagging setting that shows where you are or have been.
Disable any settings that indicate when you were last online.
Network + Etiquette =
Netiquette
world. The golden rule of real life still applies online — treat others as you
want to be treated yourself. There is a person on the other side of that
screen with a right to be treated with respect.
Do's:
+ Observe before you participate — the
accepted format/tone of posts will
differ between platforms and between
groups.
Consider the tone of the
communication (formal vs informal — for
example, an emoji in a job application
‘would NOT be appropriate).
Learn how to respectfully disagree.
Check posts for truthfulness before
sharing — just because something is
‘online does not mean itis true.
‘Stay on topic in a discussion,
Read instructions / other people's
‘comments before you post something —
do not make people repeat themselves.
Do not...
+ type in all CAPS — tis ike shouting at
someone
+ have personal conversations in a group
chat
+ insult people online
* point out other people's mistakes (unless
not doing so would cause harm)
+ waste people's time and data by sharing
information unnecessarily (e.g. posting
motivational messages in WhatsApp
groups is a big no-no)
+ repost other people’s content without their
permission
+ use information you found online without
giving credit, 1e. commit plagiarism
+ share other people's personal information
(such as contact number, address) ~ not
even with a mutual friend — always first
ask their permission.at should you always do before ‘sp
9 a comment?
aking your mind’ online or
cyberbullying not just harmless fun but a serious offence?
ebrities at risk of being cyberstalked? Explain your
How does a cyberstalker try to damage their victim's reputation?
7 Vhy is it unsafe to tag your location on social media?
It's not just for exams
that you need to be
able o answer these
kinds of questions; its
‘also good to know tis
yourself and be able to
9. Name three specific things we do online that create our online apply it in your own life,
identity,
Online Identity
8. Is our online identity only our own responsibility? Explain your
answer,
10. Why should you still be careful about what you post to private
Instagram accounts?
| Awareness of digital footprint
| 11. Can you alter your digital footprint by deleting inappropriate content?
12. Who will usually do research about you online before meeting you?
|
13. How can you control who sees a specific social media post of
yours?
14. Give two things that contribute to a negative digital footprint.
Social media safety
15, Your friend checked all her social media privacy settings when she
created her accounts two years ago. Explain why this is not enough
to keep oneself safe on social media.
16. Name two basic security settings that you should change for apps
you use.
Netiquette
17. What does netiquette refer to?
18. Why is it not good practice (‘bad netiquette’ to frequently forward
funny memes to a WhatsApp group?
19. You disagree with a classmate’s statement on global warming. How
‘could you rephrase the following response in a better way, so as to
start a fruitful discussion?
“What an idiot - whoever thinks that could work?"
MODULE 2.1: ONLINE BEHAVIOUR ( 21