Академический Документы
Профессиональный Документы
Культура Документы
FDEME3L
Semester 1
2 1 52 2
3 4 53 1
4 4 54 1
5 3 55 1
6 4 56 1
7 2 57 5
8 2 58 3
9 2 59 4
10 3 60 2
11 4 61 5
12 2 62 3
13 3 63 1
14 1 64 4
15 2 65 2
16 3 66 5
17 3 67 4
18 3 68 1
19 2 69 3
20 3 70 4
21 1 71 5
22 3 72 2
23 4 73 4
24 3 74 3
2
FDEME3L/201
25 4 75 2
26 3 76 1
27 4 77 5
28 1 78 3
29 1 79 4
30 2 80 2
31 3 81 5
32 2 82 4
33 2 83 1
34 2 84 2
35 2 85 5
36 2 86 2
37 1 87 4
38 1 88 1
39 2 89 4
40 2 90 1
41 2 91 2
42 1 92 3
43 1 93 3
44 1 94 1
45 1 95 5
46 1 96 4
47 1 97 4
48 1 98 2
49 1 99 1
50 1 100 5
3
MEMO: FDEME3L ASSIGNMENT 2 [100]
QUESTION 1 [25]
1.1 What other types of literacy do the five teachers need in order to have the
competency of integrating ICT into their teaching activities? (2)
Information
Integration
1.2 List four (4) possible reasons why the integration of ICT in Boitshoko Primary
School is not successful. (4)
MEMO: Any four relevant and valid reasons why the integration of ICT in
Boitshoko primary school is not successful (1 x=4):
1.3 Describe six (6) major interventions that the Department of Education can
implement in order to make ICT usage in teaching and learning a success in
this primary school. (6)
4
FDEME3L/201
1.4 Explain the best strategy for curriculum integration in teaching and
learning. (5)
The best strategy for curriculum integration is to put the technologyinto the
hands of trained teachers, make it easily accessible, and let them
decidehow best to use it at the point of instruction in their classrooms
1.5 Digital children can do anything with technological tools. One major problem is
that they can access unsuitable material through the internet. State and
explain four (4) educational control measures that can be used to prevent such
a problem. (8)
MEMO: Any valid and relevant four educational control measures that
can be used to prevent such a problem. 2 x =8
Acceptable user policies: (AUP) Schools should set rules that govern
the use of school computers, networks, and the internet by teachers,
administrators, staff and students.
QUESTION 2 [25]
5
Type of Name of software Use or purpose of Example of teaching or
software package the package learning task
package
Example: Microsoft Access To record data orderly in Teachers build a
Database records with fields database of personal
details of learners in
register classes.
Word Microsoft To create documents Teacher creating
processing worksheet, written
Apple iWork documents such as
Word Pad lesson plans,
handouts, parents
communication, test
and question
papers.
Spreadsheet. Microsoft excel To process data in tables Teacher enter
called spreadsheets students grade or
Microsoft works attendance
Apple Work information
Presentation Microsoft To convey ideas to an Teacher can create
graphics. PowerPoint audience by means of and integrate
presentation into
Apple iWork slides
any classroom
Keynote curriculum as an
exciting lecture.
Web Internet To link a user to Web Teacher
browser. Mozilla Firefox sites on the Internet searches
Google chrome information for
Opera Mini a certain
Mosaic subject
Netscape navigator preparation
Safari
E-mail. Microsoft outlook To send and receive Teachers can
messages communicate with
Gmail experts to get more
Yahoo information on a
Any other recognised certain topic
email
Accounting Pastel Accounting services Learners balance
package their accounting
balance sheets
6
FDEME3L/201
2.2 The ICT coordinator is an indispensable person in a school where ICTs are
integrated in teaching and learning activities. Mention five (5) tasks that are the
responsibility of the school’s ICT coordinator. (5)
MEMO: Any relevant and valid five tasks that are the responsibilities of the
school’s ICT coordinator (1 x = 5)
QUESTION 3 [25]
3.1 In your own words and using practical examples, define the concept “computer
security risk”. (5)
MEMO: Any relevant and valid definition of computer security risks and
Examples :
Any event or action that has the potential of causing a lossof computer
equipment, software, dataand information or processing capability. (Use
your own words)
3.2 List five (5) risks that might affect the school’s information system. (5)
MEMO: Any five of the following security threats. Also refer to the prescribed
book for alternative answers (1 x = 5):
Computer viruses
Unauthorised access by hackers/crackers
Information theft
Hardware theft
System failure
Software theft
7
3.3 For each of the risks in 3.2, explain how schools can safeguard their
equipment. (5)
MEMO: Any five of the following risks and their safeguards. Also refer to the
prescribed book for alternative answers (1 x = 5):
3.4 Discuss five (5) examples of computer ethics for educators. (5)
MEMO: Any five of the following computer ethics for educators and their
discussions. Also refer to the prescribed book for alternative answers (1 x
= 5)
3.5 Ergonomic studies emphasise the correct posture for a computer user in order
to avoid lower back pain, muscle fatigue and emotional fatigue. In your own
words, describe what ergonomics is about. (5)
8
FDEME3L/201
QUESTION 4 [25]
4.1 Briefly name and describe three categories of knowledge and skills that the
training of teachers in integrating technology into teaching and learning should
include. (10)
Three categories of content knowledge and skills
MEMO: (10)
Computer literacy
Having current knowledge and understanding of computers and their uses
Information literacy
Knowing how to find, analyze, use, and communicate information.
OR
OR
4.2 Define the term “digital students” and give reasons why these students
are different from previous generations of students. (10)
9
MEMO: Any five of the following examples: (1x=6)
They are kids who are hyper communicators who use multiple tools to
communicate,
Multitaskers who do several things at once with ease,
Goal oriented as they pursue multiple goals at the same time
Today’s students are much more media- centric than previous generation
Today’s students are different from previous generations in the way they
think, in the way they access, absorb, interpret, process, and apply
information and above all in the way they view, interact, and communicate
in this technology –rich and connected world
4.3 List five (5) specific ICT skills that can be considered essential for the 21st
century. (5)
MEMO: Any five of the following examples and any other relevant idea:
(1x =5)
Use a word processor to create a document
Use formula in a spreadsheet to do calculations
Use a spreadsheet to draw a graph
Develop a slide show in a presentation graphics package to present ideas
Store information in an orderly manner in a database
Create, send and receive e-mails
Go to and explore specific Web sites
Use a search engine to search specific information on the Web
Download files from Web sites to a local computer
Operate a computer and its peripherals
10