Interact with IT Book 1 Answers PDF

Summary

This document provides answers to questions about computer systems, including definitions of hardware and software, descriptions of input and output devices, and explanations of computer components. It also explores the concepts of data, information, and the data processing cycle.

Full Transcript

Chapter 1 The parts of a computer system Interact with Information Technology 1 Questions and answers 1 Copy and fill in the blanks questions 1 A set of instructions that a computer needs to carry out its tasks is known as software. 2 Data is a set of raw...

Chapter 1 The parts of a computer system Interact with Information Technology 1 Questions and answers 1 Copy and fill in the blanks questions 1 A set of instructions that a computer needs to carry out its tasks is known as software. 2 Data is a set of raw facts and figures. 3 Input devices are used to get the data and instructions into the computer for processing. 4 A computer system consists of both hardware and software. 5 Processing takes place in the part of the computer known as the CPU. 6 The control unit directs and coordinates all the activities within the CPU. 7 A machine cycle is the sequence of instructions performed to execute one program instruction. 8 The ALU performs all the arithmetic and logic functions in a computer. 9 Main memory holds data and instructions that the computer is processing at the time. 10 Output devices translate information processed by the computer into a form that the user can understand. True or false questions 1 Data and information are the same. False 2 The CPU is the brain of the computer. True 3 All the data is processed in the memory unit. False 4 The control unit sends data from the memory to the ALU for processing. True 5 Output devices translate information processed by the computer into a form that the user can understand. True 6 A computer that is required for gaming does not need a fast processor. False 7 Input, processing and output are the three stages of data processing. True 8 A register is a permanent storage location. False 9 Technology has improved communities by providing better communication systems. True Interact with Information Technology 1 1 Chapter 1 The parts of a computer system Multiple-choice questions Choose the best answer to each question. 1 Which is not an example of a peripheral device? a Keyboard b Mouse d Speakers c Register 2 A program is a: a hardware device. b memory device. d register. c set of instructions. 3 Which is not found in the CPU? a ALU b Control unit c Memory d Printer 4 The ALU processes data and stores it in: a a flash drive. b the main memory. c a sound card. d modem. 5 Which one of the following is not a function of the control unit? a Fetches instructions from memory b Decodes instructions d Fetches data for required instructions c Processes instructions 6 The speed at which a CPU processes data to convert it, is measured in: a megabytes. b gigahertz. c gigabytes. d terabytes. 7 Registers are used to store data and instructions that: a are needed over a long period of time. b are needed immediately and frequently. c are needed at start up. d are needed to hold the program that is being used. 8 The main memory of a computer is also referred to as: b auxiliary storage. a immediate access store. c secondary storage. d backup storage. 9 Which of the following is an example of technology use in the home? a Keeping track of student progress b Greater collaboration c Entertainment d Enhanced productivity Interact with Information Technology 1 2 Chapter 1 The parts of a computer system Short-answer questions 1 Explain the difference between the terms ‘computer’ and ‘computer system’. Computer: a programmable electronic device that processes data following a set of instructions; a computer is a single device to which peripherals can be attached. Computer system: refers to all the hardware and software required for the computer to work; this includes the computer itself plus the monitor, keyboard, mouse, printer and any other peripherals needed. 2 Define the terms ‘hardware’ and ‘software’. Hardware: all the physical parts of the computer system that you can see and touch. Software: a set of instructions (called a program) that a computer needs to carry out its tasks. 3 Using examples, explain the difference between ‘data’ and ‘information’. Data: all the raw facts and figures that a computer processes; for example, data could be a list of the favourite colour of 11 students: red, blue, yellow, blue, green, blue, red, yellow, blue, red, blue. Information is organised data that brings out meaning and is produced when data is processed to give meaning. For example, if you were to count and tabulate the number of each colour of the data, then you would get information such as: The most popular colour is blue. (Five students said ‘blue’.) and The least favourite colour in the list is green. (Only one student said ‘green’.) 4 Draw a diagram showing the three stages of processing. Input Processing Output 5 Using an example, explain the data-processing cycle. A teacher needs to find the average of a student’s Mathematics and English scores. Input is typing the two scores on the keyboard. Processing is adding the two scores and dividing the result by two to get the average. Output is displaying the average on the screen or printing it on paper. Interact with Information Technology 1 3 Chapter 1 The parts of a computer system 6 Draw a block diagram to illustrate the main components of a computer system. Processing Input Output Secondary storage 7 Describe the functions of the two main units found in the central processing unit. The control unit (CU) directs and coordinates all the activities within the CPU. It determines the sequence in which instructions are executed. It sends the data and instructions to the arithmetic and logic unit (ALU) for processing. The arithmetic and logic unit (ALU) performs all the arithmetic and logic functions in a computer. Arithmetic functions involve the use of mathematical operators such as + – / and ×. Logic functions involve comparisons between two values to determine if they are: equal to, greater than, less than, greater than or equal to, less than or equal to, not equal to. 8 Explain the purpose of the following devices: a Input device b Output device c Main memory a Input device: used to carry data or instructions from the user to the computer. b Output device: converts results from the computer into a form that the user can understand; it carries results or information from the computer to the user; an example is a monitor. c Main memory: holds data and instructions that the computer is processing at the time. 9 a Explain the difference between application software and system software. b Give two examples of application software and one example of system software. a Application software consists of programs needed by the user to carry out specific tasks or solve problems; for example, software to calculate student averages.  System software is software that is needed to run and maintain the functionality of a computer and its parts. b Application software examples: Microsoft Word and games on the computer.  System software examples: the operating system or software to run a printer. (Any one) Interact with Information Technology 1 4 Chapter 1 The parts of a computer system 10 State four reasons why computers are used. Computers are more accurate and faster than humans. They can store a lot of data in a small space. They can work for long periods without taking a break for weekends and holidays. They can connect us to a vast amount of information through the internet, allowing us to communicate easily with people around the world. 11 Technology has permeated almost every aspect of our daily lives. a List three ways technology has made our lives easier in our homes. Family members can stay in touch using cell phone text and calls. Adults can shop and pay bills online from their homes; if proper systems are in place, this is safer and less time-consuming than leaving home to pay bills. Homeowners can have devices installed, such as smart switches, plug adapters or timers, which they can set so that the power switches off after a certain time without them even being in the room. This helps to save electricity. b List three ways technology has enhanced productivity at the workplace. Goods can be produced faster through the use of computer-aided design (CAD) and manufacturing. The use of the internet may help to bring in more sales. The use of the internet may also enable faster distribution and better after-sales service. 12 Technology has improved education and learning processes. a Explain two ways in which technology can be used to assist the teacher. Teachers can use technology to assist them by: using the internet to research topics or subjects to be taught and finding topic-related lesson plans, exams and videos using a computer to save time by emailing students’ homework and receiving their responses using a computer to provide students with immediate exam feedback, which helps them to focus on and correct incorrect answers while the information is still fresh in their minds helping to motivate students by suggesting activities involving technology, such as playing subject-related video games or using other visual aids. (Any two. There are other possible answers; accept any that are sensible.) b Describe an example of how you use technology to assist with your studies. An example of how a student can use technology to assist with studies: Use social media to link up with a study group in which students ask and answer one another’s difficult questions. (There are other possible answers; accept any that are sensible.) Interact with Information Technology 1 5 Chapter 1 The parts of a computer system Research questions 1 Using the internet to conduct research, answer the following questions. a State the names of three manufacturers of computer processors. b Create a table with the name of the manufacturer and their latest processors. a Names of three manufacturers of computer processors: Check Google or another search engine for CPU manufacturers, for example: Intel, AMD, Qualcomm, NVIDIA, IBM, Samsung, Motorola, Hewlett-Packard (hp), and so on. b Students should draw a two-column table with the following headings: Manufacturer; Latest processor. Check the research results to see that students are on the right track. 2 Use the internet to conduct research to determine the negative impacts of computers in: a the school. b the home. c the workplace. d the community. Negative impact of computers: Check Google and YouTube videos. Some points are listed below. (There are other possible answers; accept any that are sensible.) a School: Students waste time using computers to play games and to go on social media. It is not easy to monitor students, so they may stray and visit unsuitable sites. b Home: Students waste time playing computer games instead of concentrating on homework, assigned duties or helping around the house. Parents may also spend hours on the internet, so neglecting family members and household chores. c Workplace: Unauthorised viewing of a person’s confidential files may occur. The spread of viruses could occur. d Community: Increased theft of computers from homes, schools and businesses by criminals. Reduced interpersonal relationships, as many people choose to stay indoors on their PCs instead of meeting and spending time with others in the community. 3 Collect data in your school to determine for what purposes students use their cell phone. Analyse the data and present the information to your teacher. Tips for collecting data to determine for what purposes students use their cell phone – for example: Find out from 15 or more students if they use a cell phone to play games, check social media, or to help with studies such as internet research and reading emails from teachers. (Any other suggestions may also be used.) Tally the responses for each reason, then create a table or graph. Analyse the results and make some conclusions, for example: Cell phones in this school are used mostly for …. Interact with Information Technology 1 6 Chapter 1 The parts of a computer system Crossword 1 M 2 E D 3 M A P 4 S O F T W A R E R A O Y C 5 P E R I P H E R A L S S 6 C O M P O N E N T S O 7 H A R D W A R E Across 4 A set of instructions that a computer needs to carry out its tasks 5 Hardware devices that are not essential to a computer’s function 6 The internal hardware devices that make up a computer and ensure its functionality 7 All the parts of a computer system that you can see and touch Down 1 The part that holds data and instructions that the computer is processing at the time 2 All the raw facts and figures that a computer processes by following a program 3 Sometimes referred to as the ‘brain’ of the computer Interact with Information Technology 1 7 Chapter 1 The parts of a computer system STEM project Your mother has given your grandmother a computer as a gift. Your grandmother lives in a country outside of the Caribbean. She is a retired typist and is familiar with an electronic typewriter, but she is not very familiar with computers. However, she is looking forward to learning about them. Your mother has asked you to write simple step-by step guidelines to help your grandmother understand the parts of a computer and their functions, to gently get her started in its use. You decide to consult with your classmates to get help in writing these guidelines. 1 Write a precise statement on what the manual should do for your grandmother. 2 Decide on the content and format of the manual. What process did you and your classmates follow to decide on the content and format? Write a brief outline of this process. 3 Produce the manual and get an elderly non-computer-using adult to use it. 4 Were there any problems in the test use of the manual? How do you plan to improve the manual as a result? Hints 1 How is a computer similar to an electronic typewriter? Do research on this. 2 What are the main features of a manual? Write up a table of contents. 3 A large, well-labelled diagram can be very effective in showing the parts of a computer. Students’ will have their own answers. Before they start, remind them to read the hints that have been provided. 1 Make sure students have thought through and written a precise statement on what the manual should do for the grandmother. 2 Look at and assess students’ content and format for the manual. Is it well- thought through? Did students follow a suitable and logical process? Check students’ outlines for sense. 3 The manual should be clear enough for a non-computer-user to be able to follow. 4 Discuss problems that students might have had, or suggestions of ways to make the manual clearer – a class discussion would help here. Interact with Information Technology 1 8 Chapter 2 Types of computers Questions and answers 2 Copy and fill in the blanks questions 1 A PC consists of a system unit , a keyboard, a mouse and a display screen. 2 A netbook is a small, light, low-power notebook computer that has less processing power than a full-sized laptop. 3 Data can be entered through the tablet with the use of a special pen called a stylus. 4 An embedded computer is a special-purpose computer that is used inside a device to handle specific functions. 5 A gaming console is a highly specialised desktop computer used to play video games. 6 A controller is used by players to interact with computer games. 7 The Apple Watch® is an example of a wearable computer. 8 Computers can be broadly classified into five generations. 9 First-generation computers were programmed using machine language. 10 The vacuum tube or valve was the main electronic component of first -generation computers. True or false questions 1 A laptop computer is a portable version of a PC. True 2 Notebooks are usually just as powerful as a desktop PC. True 3 Notebooks cost less than a desktop PC. False 4 A mainframe can handle more than a thousand users at a time. True 5 An embedded computer is housed on a single circuit board. True 6 First-generation computers were based on the integrated circuit (IC) or chip. False 7 High-level programming languages were used in third-generation computers. True 8 Fifth-generation computers use ultra-large-scale integration (ULSI) chips. True 9 The CRAY T3E 900 and GRAPE are examples of personal computers. False 10 The most common computers today are mainframe computers. False Interact with Information Technology 1 9 Chapter 2 Types of computers Multiple-choice questions Choose the best answer to each question. 1 ENIAC was the first: a electromechanical computer. b electronic computer. c computer with integrated circuits. d microcomputer. 2 Complex scientific research is usually done using: a microcomputers. b supercomputers. c minicomputers. d mainframe computers. 3 The main component that formed the basis for second-generation computers was: a vacuum tubes. b registers. c integrated circuits. d transistors. 4 Third-generation computers were used during the period: a 1933–1945. b 1945–1956. c 1956–1963. d 1964–1970. 5 Which generation of computers used very large-scale integration (VLSI)? a First generation b Second generation c Third generation d Fourth generation 6 All of the following are portable computers except: a laptop computers. b notebook computers. c tablet computers. d video game consoles. 7 A tablet is a computer that looks like a notebook computer except that data can be entered using: a a keyboard. b a touchscreen. c a digitising tablet. d all of the above. 8 The Apple Watch® is an example of: b an embedded computer. a a wearable computer. c a first-generation computer. d a video game console. 9 An embedded computer can be found in a: a laptop computer. b desktop computer. d netbook computer. c washing machine. Interact with Information Technology 1 10 Chapter 2 Types of computers 10 Which of the following computers is connected to sensors and actuators that convert an electrical control signal into a physical action? a Laptop computers b Desktop computers c Wearable computers d Embedded computers Short-answer questions 1 Describe the features of a personal computer (PC). PCs come in many different shapes, sizes and colours. They are designed to be used by one person at a time. They are small computers ranging in size from those that fit on an office desk to those that can fit into a jacket pocket. A PC consists of a system unit, a keyboard, a mouse and a display screen; other devices (such as speakers) can be added. They are designed to perform the input, control, arithmetic-logic, output and storage functions. 2 Explain the difference between a mainframe computer and a supercomputer. A supercomputer is larger, faster, more powerful and more expensive than a mainframe computer. A mainframe computer handles large amounts of input, processes many transactions or requests from thousands of users attached to it, and produces high-volume output; it is used in large organisations such as banks or insurance companies. A supercomputer does many very fast and complex calculations, for example, in scientific simulations or research and development in areas such as energy, space exploration, medicine and industry. 3 a State two reasons why a bank may want to purchase a mainframe computer. b Differentiate between a notebook computer and a sub-notebook computer. c What is an embedded computer? a The bank may have thousands of employees working at several branches, with clients all over the country who need to do transactions that must access the bank’s computer. This creates a lot of input, processing, output and storage, which would be too much for a set of personal computers. b A sub-notebook computer is smaller than a notebook computer. It weighs less, has a smaller screen and keyboard, a slower processing speed and performs many of the functions of a notebook but to a lesser degree of complexity. c An embedded computer is a special-purpose computer, which is used inside a device that is dedicated to one set of specific functions (such as in a microwave, dishwasher or washing machine). Its circuit board is connected to sensors and actuators (devices or hardware that moves or controls another part in response to a signal; actuators convert an electrical control signal into a physical action). Interact with Information Technology 1 11 Chapter 2 Types of computers 4 a Explain the term ‘wearable computer’. b Give three examples of wearable computers. c State three applications used by wearable computers. a A wearable computer is a digital device that is either strapped to or carried on a user’s body. b Three examples of wearable computers: smart watches, smart glasses or visors, fitness-tracking bands, smartphones. (Any three) c Three examples of applications of wearable computers: email, calendar or scheduler, alarm clock. 5 a What is a supercomputer? b State two uses of supercomputers. c Give two examples of supercomputers currently in use. a A supercomputer is the largest, fastest and most powerful type of computer. It is used mainly for ‘number crunching’ formulae and exercises in scientific research and development. Areas include space exploration, the military, energy, weather forecasting, medicine, industry and scientific simulations. b Two uses of supercomputers are, for example, weather forecasting and military research. c Two examples of supercomputers currently in use are Cray’s Titan and IBM Sequoia. (Other answers are possible.) 6 a Which type of chip is used in fifth-generation computers? b What are some of the features of fifth-generation computers? a Chip used in fifth-generation computers: Ultra-large-scale integration (ULSI) b Features of a fifth-generation computer: will be able to accept spoken word instructions (voice recognition) and assist doctors in makings diagnoses (expert systems). 7 List the component that formed the basis of the first four generations of computers. First-generation – vacuum tube/valve Second-generation – transistors Third-generation – integrated circuit (IC) chip Fourth-generation – very large-scale integration (VLSI) chip 8 a What is a quantum computer? b How is a quantum computer different from a digital computer? c Give two possible problems that may be solved by quantum computers. a A quantum computer is a computer that is able to solve problems that would be impractical or impossible for a digital computer to solve. It makes use of the quantum states of subatomic particles to store information. b A digital computer uses 0 or 1 as separate bits; a quantum computer represents both a 1 and a 0 at the same time (a qubit consists of two bits and is the basic unit of quantum physics). Interact with Information Technology 1 12 Chapter 2 Types of computers c Quantum computers may be able to: explain complex molecular and chemical interactions, which could lead to the discovery of new medicines and materials make aspects of artificial intelligence (AI), such as machine learning, much more powerful. Research questions 1 Work with your classmates to do research on the internet to find out how a portable computer can help the following professionals with their work: a A teacher b A police officer c A newspaper reporter d A sales representative a Students should think about where and how the teacher can use a portable computer (such as a laptop), for example, by carrying it easily from class to class and using it to contact other classes while on the go; to maximise time when waiting for long periods between classes. b Students should look up how a police officer benefits from using a portable computer (such as a laptop). Students should ask themselves, for example: What can the police officer look up concerning vehicles while on the road? What about GPS? What can he or she save on the computer for court cases or from a crime scene? What contacts can he or she make? How does it save time? What can he or she find on the internet? c Students should look up how a newspaper reporter benefits from using a portable computer (such as a laptop). Students should ask themselves, for example: While the reporter is out of the office and at home, what can he or she do? How does the internet help? What and how can he or she report back to the office? d Students should look up how a sales representative can benefit from using a portable computer (such as a laptop). Students should ask themselves, for example: How does the company benefit? How do customers benefit? 2 Do research on the internet and make a list of the top five personal computers and laptop computers at present. Students’ own answers 3 Do research to find out if any company or organisation in your country uses a mainframe computer in the day-to-day running of its operation. For the named organisation or company, describe the purpose for which it uses the mainframe computer. Students’ own answers Interact with Information Technology 1 13 Chapter 2 Types of computers Crossword 1 Q U 2 M A I N F R A M E N 3 4 T A B L E T U A M P 5 N E T B O O K O O T P E B O O K Across 2 Very large, powerful computers 3 A computer that looks like a notebook computer except that users enter data with a keyboard, touchscreen or a digitising tablet 5 A small, light, low-power notebook computer that has less processing power than a full-sized laptop Down 1 A type of computer that works by using qubits 4 A portable version of a personal computer 5 A computer that can easily be tucked into a briefcase or backpack, or simply under your arm Interact with Information Technology 1 14 Chapter 2 Types of computers STEM project Your very talented school friend Usain has won a national storytelling competition. The prize is his choice of a laptop, notebook or cell phone, to a maximum value of US$1 000, but the device selected must be purchased in your country. He has asked you and two other classmates to help him choose the device that will be of most use to him. He needs to make the decision within a week or he will have to accept whatever is given to him. 1 What do you and your classmates have to do? Write a statement. 2 Produce a complete list of all appropriate available devices and their features, with the help of your classmates. How did you approach getting the information for this list? 3 Advise Usain on which device you think best suits his needs. Give reasons for your advice. Hints 1 Where do you plan to get the most up-to-date information on the electronic devices available (for example, from computer and cell phone shops, asking advice from knowledgeable adults, and so on)? 2 How best can you and your classmates divide the work to ensure that you meet the one- week deadline? 3 Which device is most useful to Usain as a talented storyteller? Students’ will have their own answers. Before they start, remind them to read the hints that have been provided. 1 Make sure students have thought through and written a suitable statement. 2 Check students’ lists and that they understood how best to approach getting the information. 3 Check students’ advice on which device would be best for Usain’s needs. Interact with Information Technology 1 15 Chapter 3 Being IT safe – taking care of IT things (1) Questions and answers 3 Copy and fill in the blanks questions Use these words. monitor capacitors computer 35 kilovolts metal misuse contact To prevent the misuse or mishandling of the equipment in the computer laboratory, we need to follow a set of rules. For example, you should not open the system unit or monitor casing. Also, do not insert any metal objects, such as clips, pins and needles, into the computer or monitor. Some monitors may have capacitors , which can store up to 35 kilovolts of electricity. Coming into contact with this device may cause death. True or false questions 1 Computers and most peripheral devices are generally safe to work with. True 2 A computer laboratory does not contain many electrical and other cables. False 3 To prevent misuse or mishandling of the equipment in the computer laboratory we need to follow a set of rules. True 4 Inserting metal objects into the monitor is safe. False 5 Switching your computer on/off too often will not cause any damage to your computer. False 6 Exposing your computer to excessive dust can result in it becoming defective. True 7 It is OK to eat and drink while working on the computer. False 8 You should not copy software from the school’s computer if you do not have proper authorisation. True 9 You are allowed to change the settings in the computers at school. False 10 You should never bend CDs or DVDs. True 11 Excessive humidity and smoke does not affect CDs, DVDs and flash drives. False 12 Exposing CDs, DVDs and flash drives to direct sunlight will not cause any problems. False 13 A computer virus can be spread to other computers when an infected disk is used in other computers. True Interact with Information Technology 1 16 Chapter 3 Being IT safe – taking care of IT things (1) Short-answer questions 1 List the personal safety rules for the computer. Avoid stepping on electrical wires or any other computer cables. Do not open the computer system unit or monitor casing. Do not insert any metal objects – such as clips, pins and needles – into the CPU or monitor. Do not touch, connect or disconnect any plug or cable without your teacher’s permission. 2 List five safety rules for the computer and explain why they should be followed. Do not switch your computer on/off too often; this may damage the on/off switch, as well as other components in the computer. Avoid exposing the computer to excessive dust by covering the PC with dust covers; too much dust may affect the circuity. Avoid using USB drives and CDs/DVDs that were used to store information in computers from outside the lab; they may have viruses that will affect the computer and cause it to malfunction. Do not pile anything on the keyboard; this may damage the keys. Do not eat or drink in the computer room; liquids can cause short circuits or electric shocks, and food crumbs can cause malfunctions inside the computer. (Accept any other sensible rules.) 3 State three rules for handling CDs, DVDs and USB storage. Never bend USB storage devices, CDs or DVDs. Do not write on the underside of USB storage devices, CDs or DVDs. Do not keep USB storage devices, CDs or DVDs in sunlight. Keep USB storage devices, CDs and DVDs away from water and food. Always keep USB storage devices, CDs and DVDs covered when not in use. Keep USB storage devices, CDs and DVDs away from excessive humidity and smoke. (Any three) 4 List six steps to follow in an emergency. Do not panic. Follow your teacher’s instructions. Quickly follow the evacuation plan established for your room or building. Close doors behind you after everyone has left in the case of a fire. When you are in a safe position, pull the fire alarm (if the alarm is not already going off). If someone catches on fire, he or she should stop, drop and roll. The person can also be doused with water or patted with a fire blanket. Interact with Information Technology 1 17 Chapter 3 Being IT safe – taking care of IT things (1) Crossword 1 S 2 V E R M I N T 3 C A P A C I T O R I N 4 V G 5 L I Q U I D S R 6 R U L E S S Across 2 Creatures not wanted in the computer working environment 3 A device that can store current in a monitor 5 If these spill, they may cause short circuits or electric shocks inside the computer 6 You need these in every laboratory Down 1 You should not change these without your teacher’s permission 4 This could be transferred by flash drives or CDs/DVDs from one computer to another Interact with Information Technology 1 18 Chapter 3 Being IT safe – taking care of IT things (1) STEM project Mark Anthony is a Form 1 student, newly transferred to your school during the third term of the academic year. He was not exposed to Information Technology (IT) at his previous school. You observed Mark doing several things that are dangerous to his own well-being and also to the proper functioning of the computer laboratory. As a student who has some knowledge of IT, you feel that you should correct him. 1 Highlight four actions Mark may have been doing that you consider to be incorrect laboratory protocol. 2 Besides not doing IT before at school, what are two other possible reasons for Mark not following correct laboratory protocol? Explain why you suggested these reasons. 3 For the actions highlighted, write brief guidelines to help Mark follow the correct protocol. How would you present these guidelines to Mark to ensure that he follows them? 4 Make a poster with your guidelines to put up in the computer laboratory. 5 How would you assess your success in getting Mark to follow the guidelines within the term? Hints 1 What is a poster? Where in your computer laboratory can you place your poster and how will this position affect the size and content in it? 2 Ask a classmate to check that he or she understands the content of your poster. Students’ answers for questions 1 to 4 will vary. Before they start, remind them to read the hints that have been provided. 1 Check that students have given four examples of incorrect laboratory procedure; this will indicate that students know the rules for working in a computer laboratory. 2 Check that students’ two other possible reasons and explanations for Mark not following correct laboratory protocol make sense, for example, they could use any two of these points: Avoid stepping on electrical wires or any other computer cables. Do not open the computer’s system unit or monitor casing – these can be dangerous. For example, some monitors may have capacitors that can store up to 35 kilovolts of electricity. Touching this device can cause an electric shock or even death. Do not insert any metal objects, such as clips, pins and needles, into the computer casing or monitor casing. This may cause the device to short circuit or give you an electric shock. Do not touch, connect or disconnect any plug or cable without your teacher’s permission. Place chairs under the desks when they are not in use. 3 Check students’ guidelines to see that they make sense and will be helpful. 4 Check students’ posters. Have they used their imaginations? Do the posters present the information clearly and in a way that will make others want to look at them? 5 Students’ own suggestions, after asking a classmate to look at their posters, as per hint number 2. Interact with Information Technology 1 19 Chapter 4 Computers and health Questions and answers 4 Copy and fill in the blanks questions 1 An inflamed tendon caused by repeated stress on that tendon is known as tendonitis. 2 Carpal tunnel syndrome is an inflammation of the nerve that connects your forearm to the palm of your hand. 3 Repetition, bad posture and lack of rest are three key factors that result in RSI. 4 Ergonomics is a science that uses mathematics, physics and biomechanics to determine the best working conditions for people who work with machines. 5  Neck strain can be caused by keeping your head bent while looking down at your laptop for long periods. 6 Increased sensitivity to light is a symptom of computer vision syndrome. True or false questions 1 Bad posture is a key factor in the cause of repetitive strain injury. True 2 One symptom of tendonitis of the wrist is a very mild pain that extends from the forearm to the hand. False 3 Taking frequent breaks during any long computer session to exercise your hands and arms can prevent repetitive strain injury. True 4 Minimising glare and reflections from the computer screen can reduce computer vision syndrome. True 5 Spending too much time with headphones on listening to loud music or other audio material can cause tinnitus (ringing in the ears). True 6 Research has found no link between certain mental illnesses and internet addiction. False 7 The heavy metals contained in computers can cause serious illnesses in people. True 8 A headache or sore neck can be a result of computer vision syndrome. True Interact with Information Technology 1 20 Chapter 4 Computers and health Multiple-choice questions Choose the best answer to each question. 1 All of the following are symptoms of computer vision syndrome except for: a sore, tired, burning, itching or dry eyes. b blurred or double vision. c a headache or sore neck. d extreme pain in the forearm. 2 Which of the following type of worker is most prone to repetitive strain injury? a Musician b Engineer c Doctor d Teacher 3 Lower back pain due to extended computer use may be reduced or removed by: a using a firm, adjustable and comfortable chair. b stretching your lower back now and then by standing up, pulling each knee to your chest and holding that position for a few seconds. c relaxing your shoulders. d all of the above. 4 Which of the following illnesses may be caused by internet addiction? a Depression b A common cold c A rash d Pimples 5 Which of the following is a negative effect of digital technology use on the environment? a Reduction in paper usage b Reduction in building construction c Consumption of energy d Reduction in fuel usage Interact with Information Technology 1 21 Chapter 4 Computers and health Short-answer questions 1 a Name two types of repetitive strain injury. b List three key factors that can result in RSI. c Describe three ways to prevent or reduce RSI. a Two types of repetitive strain injury: tendonitis – where a tendon is inflamed, caused by some repeated motion or stress on that tendon carpal tunnel syndrome (CTS) – an inflammation of the nerve that connects your forearm to the palm of your hand. b RSI can be caused by: repetition, for example, using the keyboard or mouse constantly for many hours bad posture, for example, many hours at the computer, sitting incorrectly or in the same position lack of rest, for example, many concentrated hours using the keyboard with few or no breaks. c To prevent or reduce RSI: Take frequent breaks during any long computer session to exercise your hands and arms. Place a wrist rest between the keyboard and your desk edge to prevent injury due to typing. Position the mouse at the same height as your keyboard. (There are other possible answers.) 2 a Explain ‘computer vision syndrome’. b List four conditions that may result from computer vision syndrome. c Describe three ways to reduce or prevent computer vision syndrome. a  Computer vision syndrome (CVS) is the term for problems caused by looking at a computer screen or display device for long periods without a break. This intense focus on the screen or device strains the eye muscles. b The following conditions may result from CVS: sore, tired, burning, itching or dry eyes blurred or double vision headache or sore neck distance vision blurred after prolonged staring at monitor difficulty shifting focus between monitor and documents colour fringes or ‘after images’ when you look away from the monitor difficulty focusing on the screen image increased sensitivity to light. (Any four) c Ways to reduce or prevent CVS: Take a break of 5 to 10 minutes away from the computer every hour. Reduce glare and reflections from the computer screen. Clean your screen and block out excessive sunlight and reflections from lamps. Interact with Information Technology 1 22 Chapter 4 Computers and health Use monitors designed to adjust brightness and screen position. Adjust the contrast and brightness of the computer screen so that there is a high contrast between the text on the screen and the screen background. Prevent eye strain by positioning the top of your screen at, or slightly below, eye level. Experiment to find a distance between your eyes and the screen that feels comfortable (usually 45 to 71 cm). Gently massage your eyes, cheeks, forehead, neck and upper back from time to time to keep blood flowing and muscles loose. Blinking lubricates your eyes with tears and another solution to prevent it from drying out. Blink often when staring at the screen. (Any three) 3 a Describe two situations that may result in neck strain caused by improper computer use. b State three ways to prevent or reduce neck strain. a Situations that can result in neck strain: Looking down at your laptop with your head puts unnecessary strain on your neck muscles, which can lead to pain, including tension headaches. Holding your cell phone between your neck and your shoulder can put your neck in a harmful position. Spending long periods of time texting with your head down over your cell phone puts pressure on your neck muscles. (Any two) b Three ways to prevent or reduce neck strain: Use a lower-back support in your work chair to maintain a healthier posture. Raise your laptop to eye level by placing something under it. You will need to use an external keyboard to type comfortably with your laptop in this position. Take short breaks to do some simple movements like shoulder rolls while studying or working. 4 a State two causes of lower back pain due to computer use. b Describe three ways to prevent or reduce lower back pain caused by computer use. a Two causes of lower back pain due to computer use: long hours of sitting at the computer with bad posture sitting on uncomfortable, poorly designed or incorrectly assembled furniture. b Ways to prevent or reduce lower back pain caused by computer use: Use a firm, adjustable and comfortable chair. Adjust the chair height so that your thighs are horizontal, your feet are flat on the floor and the backs of your knees are slightly higher than the seat of your chair. The back of the chair should support your lower back. Stretch your lower back occasionally by standing up and pulling each knee to your chest, holding that position for a few seconds. Relax your shoulders. When you type on the keyboard, your upper arm and forearm should form a right angle, with your wrist and hand in roughly a straight line. Take short breaks (5 to 10 minutes per hour) and get up from your desk and walk around. (Any three) Interact with Information Technology 1 23 Chapter 4 Computers and health 5 a Name three types of mental illnesses associated with internet addiction. b Describe two ways to reduce or prevent mental illnesses associated with internet addiction. a Three types of mental illnesses associated with internet addiction: depression low self-esteem loneliness. b Two ways to reduce or prevent mental illnesses associated with internet addiction: Reduce the number of hours that you spend on the internet. Spend time having physical face-to-face conversations with others. Research questions 1 Use the internet to conduct research and then complete the following: a List three types of jobs other than those mentioned in this chapter that can cause employees to suffer from RSI. b State which type of RSI the employees may suffer from. c Which profession has the highest rate of RSI? Students’ own answers 2 Conduct research and then complete the following: a Which devices are currently being manufactured using ergonomic design principles? b List three companies that manufacture ergonomically-designed computer peripherals. a Students’ own answers, for example: workstations (including the chair or seating, desk, computer, mouse and keyboard), the computer workplace, headsets, microphones and even clothing. b Students' answers will vary. Three examples are: Neveast Supplies Limited (Jamaica) Humanscale (USA, Ireland, Hong Kong, Australia) Workrite ergonomics* (USA, Canada). Interact with Information Technology 1 24 Chapter 4 Computers and health Crossword 1 D 2 3 E E E 4 B E H A V I O U R A L W P 5 G T A R O I S E 6 T E N D O N I T I S O N E S M I I I T O C U N 7 L O N E L I N E S S S Down 1 This illness may result from excessive use of digital technology 2 A science that makes extensive use of mathematics, physics and biomechanics to determine the best working conditions for people who work with machines 3 Another name for technological waste 5 A condition caused by spending too much time with headphones on listening to loud music or other audio material Across 4 A type of problem that can result from spending long hours on digital technology 6 A medical condition where a tendon is inflamed, caused by some repeated motion or stress on that tendon 7 May be caused by internet addiction Interact with Information Technology 1 25 Chapter 4 Computers and health STEM project You have been invited to The World Information Technology Summit to present on the topic ‘Your Computer, Your Health, Your Responsibility’. You have been asked to focus on the most widespread health issues that have an impact on computer users. You only have ten minutes for your presentation, as several students from other countries are also presenting on different topics. 1 Write a comprehensive title for your presentation. 2 Write down what you consider to be the five most important points to explain in your presentation. 3 Write your presentation in no more than 150 words. Use a few real-life examples from your school situation to explain your points. 4 Ask a group of your classmates to read your presentation and give you feedback on how useful it is. What feedback did you get? 5 What changes did you make to your presentation based on the feedback you received? Hints 1 What are the key world health issues facing computer users? Do research to draw up a shortlist of these issues and to obtain supporting statistics. 2 Write three possible titles for your presentation, and then select the most appropriate one. 3 Is your presentation within the ten-minute time limit? 4 Before sharing your presentation with your classmates, check it against the content of this chapter. Students’ answers for questions 1 to 5 will vary. Before they start, remind them to read the hints that have been provided. 1 Is the student’s presentation title comprehensive? 2 Do the student’s five most important points explain the presentation? 3 Check that the presentation is no more than 150 words. Have sensible real-life examples been used? 4 Check and discuss students’ feedback. Encourage positive and constructive feedback to help one another. 5 Check and discuss students’ feedback, so that they know where they might improve and where they have done well. Interact with Information Technology 1 26 Chapter 5 Introduction to Microsoft Word Questions and answers 5 Copy and fill in the blanks questions Word processing is the preparation of documents such as letters and reports on a computer. 1  2 A word processor is an application program that allows you to do word processing. 3 Print layout mode is the mode you are in when you open a new Word document. 4 Formatting allows you to change the appearance of the text in a document. 5 The backspace key deletes the character to the left of the insertion point. True or false questions 1 Many neck, back and CTS problems are caused by poor posture when typing. True 2 The word wrapping feature lets you move to a new line without pressing the Enter key. True 3 Apple® iWork® Pages® is a word processor. True 4 Formatting a document includes changing the font colour and font type of the text. True 5 A footer is text or graphics that appear in the top margin of every page of a document. False Multiple-choice questions Choose the best answer to each question. 1 Which group would you use to change the style, size and colour of a typeface? a Clipboard b Font c Paragraph d Styles 2 In word processing, you press the Enter key while typing a document when you want to: a create blank lines. b keep a typed line short in appearance. c create a new paragraph. d do all of the above. 3 Font style refers to which of the following? a Shape of the character b Height of a character c Bold, Italic, Underline d None of the above 4 Pressing this key immediately after an action cancels or takes you out of that action: a Alt b Backspace c Esc d Shift Interact with Information Technology 1 27 Chapter 5 Introduction to Microsoft Word Short-answer questions 1 What is word wrapping? Word wrapping is a feature that allows you to move automatically to a new line without pressing the Enter key. 2 Why do you need to save a previously saved document after making changes to it? You need to save a previously saved document after making changes to it, so that you save the latest additions or changes to that document, which have not yet been saved. The changes are saved to the previously saved file. 3 Name three special keys in the keyboard and describe their function. Backspace: This key deletes the character to the left of the cursor or insertion point. Delete: This key deletes the character to the right of the cursor or insertion point. CapsLk: toggles between upper case and lower case letters while typing. (There are other possible answers.) 4 The data below is a list of five students with their corresponding student number, name, weight (kg) and height (cm). 001, Varun Birbal, 40.5, 140.5 002, Kerry Johnson, 45.2, 160.3 003, Phillip Maynard, 50.6, 165.0 004, Richard Wilson, 65.0, 166.3 You are required to do the following: a Type out the data in a tabular format with the given headings. b Make bold and underline each heading. a and b You may insert a table (as shown below) or use the Tab key after each entry to get to the next column. You hit Tab until you get to the next column, or advanced users can set up Tab stops to get to the second, third and fourth columns, as shown here. Student No. Name Weight (kg) Height (cm) 001 Varun Birbal 40.5 140.5 002 Kerry Johnson 45.2 160.3 003 Phillip Maynard 50.6 165.0 004 Richard Wilson 65.0 166.3 Student No. Name Weight (kg) Height (cm) 001 Varun Birbal 40.5 140.5 002 Kerry Johnson 45.2 160.3 003 Phillip Maynard 50.6 165.0 004 Richard Wilson 65.0 166.3 Interact with Information Technology 1 28 Chapter 5 Introduction to Microsoft Word 5 Information about the planets in the solar system is listed below in the following order: planet, diameter (km), distance from the Sun (millions of km) and length of year. Mercury, 4 840, 58, 88 Earth days Venus, 12 200, 108, 225 Earth days Earth, 12 800, 150, 365 Earth days Mars, 6 750, 228, 687 Earth days Jupiter, 143 000, 778, 12 Earth days Saturn, 121 000, 1430, 29 Earth days Uranus, 47 200, 2 870, 84 Earth days Neptune, 44 600, 4 500, 154 Earth days Pluto, 6 000, 5 900, 248 Earth days You are required to do the following: a Create a table with ten rows and four columns. b Put the information above into the table under the headings in the appropriate columns. a and b Planet Diameter Distance Length of year (km) from the Sun (millions of km) Mercury 4 840 58 88 Earth days Venus 12 200 108 225 Earth days Earth 12 800 150 365 Earth days Mars 6 750 228 687 Earth days Jupiter 143 000 778 12 Earth days Saturn 121 000 1 430 29 Earth days Uranus 47 200 2 870 84 Earth days Neptune 44 600 4 500 154 Earth days Pluto 6 000 5 900 248 Earth days 6 Create a flyer to advertise a function (a bazaar, sports day, or so on) at your school. The flyer must contain graphics. Students’ flyers will vary, but here is an example: PARK HIGH SCHOOL FUNDRAISER BARBEQUE In Aid of Repairs to the School Court Music by DJ Soca King Tickets $20 Venue: School Grounds Fish, Friday Chicken, 22nd March Lamb 5 pm SEE U THERE COME ONE COME ALL Interact with Information Technology 1 29 Chapter 5 Introduction to Microsoft Word Research questions 1 Use the internet to do research and complete the following: a Name three word-processing programs currently available. b Which is the most popular word-processing program currently on the market? c What are the differences between a modern word-processing program and a desktop publishing software? d Create a list of shortcuts using the Ctrl key and the alphabetic keys using the Microsoft word-processing application. a Students should know of Microsoft Word, Kingsoft Writer and Apple® iWork® Pages®. They should try to find three more. b Is it Microsoft Word or Open Office Suite, or some other word-processing program? It must be used almost worldwide and be free or affordable. c Online, learners should find the definition for desktop publishing. How is it different to word processing? They should compare the type of documents each creates and how text and pictures are added. Students could also compare the cost and find out which is more widely used. d Students should look up shortcut keys in Microsoft Word, then write the shortcut keys and their uses. Some of these are also used in other programs. One example is Ctrl + B, which bolds the letters and other text you type. The plus sign +, just means you hold down Ctrl and the letter at the same time. There is also Ctrl + V and Ctrl + A. Students should look for at least five more. They should choose those that involve text in Microsoft Word. 2 You are a new teacher at a school. a List five types of documents a teacher may use a word processor to create. b List three types of documents a secretary in the school may have to create. a Students should think of what teachers give them to use in class, to take home, what they put up on the wall or on certain boards, what document they get their topics from or what they do to promote an event and more. b The secretary does work for the school principal. Students should think of what documents the principal may want prepared. For example, documents concerning misbehaving students or students who may be changing schools, a fund raiser, a meeting, documents for students and more. Students should say exactly what those documents are. Interact with Information Technology 1 30 Chapter 5 Introduction to Microsoft Word Crossword 1 F O R M 2 H A 3 C E L L T A T 4 D P I E R N 5 W R A P P I N G N 6 F O O T E R Down 1 Allows you to change the appearance of the text in a document 2 Appears in the top margin 4 Mode you are in when you open a new Word document Across 3 The intersection of a row and a column in a table 5 When text flows around a graphic 6 Appears in the bottom margin Interact with Information Technology 1 31 Chapter 5 Introduction to Microsoft Word STEM project Your Agricultural Science teacher also teaches Information Technology (IT) and would like you and a group of four other classmates to construct a table with useful information on the types of fruit trees found in your community. The table should have at least ten rows and ten columns, but must fit onto a single A4 page for printing out to display at an upcoming Parent’s Day at your school. Your table should show elements of the chapter on word processing that you have just been taught in IT class. 1 What is the most appropriate title for your table? Write a paragraph on what your table is about and why it is useful to you and your community. 2 In a step-by-step approach, explain how you and your classmates plan to create this table. Did you decide to appoint a lead person? Give a reason for your answer. 3 Produce your one-page table. 4 Compare your table to others produced by other groups of classmates. Suggest ways to combine the content of their tables with yours to produce a useful document for your teacher to use in teaching the Grade 1/Form 1 class next year. This document does not have to be in a table format and can be more than one page in length. Hints 1 Draw or obtain a map of your community showing the main fruit trees. List the types of fruit trees using their common and biological names. 2 Ensure that each team member contributes during all stages of preparing the table. Your teacher may find it helpful if you state who was responsible for each contribution at the bottom of the table. 3 Which graphics can you include to make your table more useful? Students’ group answers for questions 1 to 4 will vary. Before they start, remind them to read the hints that have been provided. 1 Have the groups given an appropriate title for their table? Check that their paragraph explains clearly what the table is about and why it is useful to them and their community. 2 Have groups explained in a step-by-step approach, how they would create the table? Did the group decide to appoint a lead person? Have they given a reason that makes sense? 3 Check students’ tables. 4 A group and/or class discussion would help students to produce a useful document. Interact with Information Technology 1 32 Chapter 6 Data communications, networks and the internet (1) Questions and answers 6 Copy and fill in the blanks questions 1 Communication can be broadly described as the process by which information is transmitted or exchanged. 2 The physical path that connects sender and receiver in a communication system is known as a channel. 3 The encoder is a device that converts digital signals in a form that can pass through a transmission medium. 4 A data communication system is made up of hardware, software and communication facilities. 5 A network is a group of two or more computers linked together so that they can share resources and can communicate with one another. 6 The networking hardware device that allows a WiFi device to connect to a wired network is a wireless access point (WAP). 7 The device that acts as an interface between two networks is known as a router. 8 The interconnection of networks in a city into a single larger network is known as a MAN. 9 The internet is a network of networks that connects computers worldwide via a huge set of telecommunications links. 10 A search engine is also sometimes called a web portal. True or false questions 1 The encoder is a device that converts the encoded signals into digital form. False 2 Data in any communications system is moved from one location to another via data communication channels or links. True 3 Each device that forms part of a network must be connected by cables. False 4 A switch increases the overall performance of the devices on the network. False 5 A router is an interface that enables communication between two different networks. True 6 A personal area network can only be wireless. False 7 The main purpose of a modem in a home network is to connect your home internet connection with your internet service provider (ISP). True Interact with Information Technology 1 33 Chapter 6 Data communications, networks and the internet (1) 8 An internet service provider (ISP) is a company with a direct connection to the internet, which it lets users access, usually for a fee. True 9 The World Wide Web is another name for the internet. False 10 In order to find, retrieve, display and send hypertext and hypermedia, you need a browser. True Multiple-choice questions Choose the best answer to each question. 1 All of the following are components of a simple communication system except for the: a sender. b receiver. c internet. d encoder and decoder. 2 This type of network is usually found in schools and businesses located in a small geographical area. a WAN b LAN c MAN d PAN 3 Which of the following is a benefit of a LAN? a Hardware such as printers can be shared. b Storage facilities can be shared. c Software and data files can be shared by many users. d All of the above. 4 A network that involves a computer, smartphone, printer, and/or some other personal device such as a tablet set up for personal use is known as a: a MAN. b PAN. c LAN. d WAN. 5 Which of the following allows members to post questions, start a discussion or contribute to various discussions? a Discussion forum b SMS c Video-conferencing d VoIP Interact with Information Technology 1 34 Chapter 6 Data communications, networks and the internet (1) Short-answer questions 1 a Draw a diagram to show the components of a simple communication system. b Explain the purpose of each of the components in a simple communication system. a Sender Encodes Channel Message Channel Decodes Receiver b The purpose of each component in a simple communication system: Sender – the device (for example, a computer, smartphone, fax machine, laptop, notebook or tablet) that sends the message. Encodes – the encoder converts digital signals in a form that can pass through a transmission medium. (A modem performs the role of both an encoder and a decoder.) Message – the data or information to be communicated; it may consist of text, numbers, pictures, sound, video or any combination of these. Channel – the physical path that connects the sender and receiver; it is used to transmit data. The channel can be wired (twisted-pair wire, coaxial cable or fibre optic cable) or wireless (radio waves, microwaves, infrared, Bluetooth and satellite). Decodes – the decoder converts the encoded signals into digital form. The receiver can understand the digital form of the message. (A modem performs the role of both an encoder and a decoder.) Receiver – the device that receives the message; it can be a computer, printer, smartphone or another computer-related device. The receiver must be able to accept the message. 2 a Explain the term LAN. b List three advantages of a LAN. c List three disadvantages of a LAN. d Name two organisations that may use a LAN. e Explain the purpose of the LAN in the organisation. a LAN is short for local area network; it consists of a collection of microcomputers, which can share peripherals, files and programs, and communicate with one another on the network. Each microcomputer that forms part of the network is connected either by cables or by a wireless link. b Advantages of a LAN: Hardware, such as printers, can be shared. Storage facilities can be shared. Software and data files can be shared by many users. It is usually cheaper to buy one copy of a software application and pay the licence fee for several machines, than to buy individual packages for each computer. Users can work together on a single document. Users can communicate using email. (Any three) Interact with Information Technology 1 35 Chapter 6 Data communications, networks and the internet (1) c Disadvantages of a LAN: The initial set-up costs are high. The risk of data corruption is higher. A LAN has many users on the system, so the chance of data being tampered with or corrupted is greater. The malware (software that corrupts, steals or deletes data) risk is greater, because it can be spread easily between the computers on the LAN. If the file server fails, all the workstations will be affected and work stored on shared hard disk drives will not be accessible; nor, for example, will it be possible to use network printers. Networks can be complicated to maintain and may require a network manager, so incurring additional costs to a company. (Any three) d Organisations that may use a LAN are offices, departments and schools. (Any two) e The purpose of the LAN in an organisation is that each computer can function both as an independent personal computer running its own software, and as a workstation on the network, accessing information from the network server. The server runs the networking software that allows resources to be shared with the other computers (called clients) on the network. The devices shared by a LAN may include printers, hard drives, optical drives (CD-ROM, CD-RW, DVD-ROM, DVD-RW), modems and fax machines. 3 Explain the purpose of the following devices in a wireless LAN (WLAN): a Switch b Router a A switch connects multiple devices on the same network to facilitate communication among them. b A router is used when there are two separate local area networks (LANs) or when an office wants to share a single internet connection among multiple computers. The two types of routers are wired and wireless. The choice depends on the physical office or home setting, speed and cost. 4 a What is a wide area network (WAN)? b Name two organisations that may use a WAN. c Describe two benefits of a WAN to one of the organisations stated above. a A WAN connects multiple devices on the same network to facilitate communication among them. b Two organisations that may use a WAN are universities, research centres and banks or large organisations. (Any two) c Benefits of a WAN: to share information to share information and processing loads between various branches of large organisations, companies and banks in different countries to publish documents and distribute software. (Any two) Interact with Information Technology 1 36 Chapter 6 Data communications, networks and the internet (1) 5 Explain the following terms: a FTP b Upload c Download d VoIP a FTP is short for file transfer protocol; it is a set of rules for communicating over the internet. FTP enables you, through an FTP program, to find an electronic file stored on a computer in another location and download it. In other words, take a file from one computer on the internet and copy it to a storage device on your computer. b Upload means to send files to other computers on the internet. c Download means to receive files on your computer via the internet. d VoIP is short for voice-over internet protocol; it is the transmission of telephone calls over computer networks using the internet rather than traditional communication lines to support voice communication. You would need an internet telephone (or other appropriate input and output device), an internet connection, a sound card and specialised software. Research questions 1 You have recently been given an internship at a local manufacturing company that has patents for several products. The company is considering setting up a wireless LAN (WLAN), but several people have raised concerns about the use of a wireless LAN in the company. The manager has asked you to provide answers for some of the concerns raised. a What hardware is required for a WLAN? b Would the thick walls in the building affect the network? If the walls would affect the network, how could this problem be resolved? c Which security concerns exist for a WLAN? If there are security concerns, what steps can be taken to protect the network? d Does the wireless network present any health hazards? e Which advantages does a wireless network have over a wired network for the needs of the company? Students' answers will vary. Check their work for understanding of what has been taught. 2 a Which internet access plans are available in your country? b Prepare a table comparing the internet access plans in your area. Include the name of the provider, the type of access (cable or wireless), access speeds and cost. c Based on your usage and that of your family, which plan would you purchase? Explain your choice. Students' answers will vary. Check their work for understanding of what has been taught. Interact with Information Technology 1 37 Chapter 6 Data communications, networks and the internet (1) Crossword 1 G 2 3 M L A N O T 4 D P E 5 E A W E 6 C O M M U N I C A T I O N Y C O 7 S D E E 8 B R O W S E R V E R Down 1 An interface that enables communication between two different networks 2 A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection 4 A computer network organised around an individual person, and set up for personal use only 5 A device that converts digital signals in a form that can pass through a transmission medium 7 Runs the networking software that allows resources to be shared with the other computers (called clients) on the network Across 3 A collection of microcomputers, such as in an office building, department or school, which can share peripherals, files and programs, and communicate with each other on the network 6 Described as the process by which information is transmitted or exchanged 8 A program that resides in your computer and enables you to find, retrieve, view and send hypertext and hypermedia documents over the web Interact with Information Technology 1 38 Chapter 6 Data communications, networks and the internet (1) STEM project The Bank of Commerce Caribbean (BCC) is a fairly new financial institution. It started off with one bank in Jamaica and now is opening another Jamaican branch within a month and expanding to St Kitts in the months thereafter. At present, it has a local area network connecting all of its devices. However, the main method of communication among the bank departments is printed circulars. Printed circulars are also sent to investors, stakeholders and customers. You are a member of an IT team advising the bank on its networking needs. The team consists of students from your class. 1 What is a major problem that BCC will face when it expands? 2 What are three possible reasons for this problem? 3 Use a step-by-step approach to explain how your team will work out a solution to the problem. 4 Recommend a solution to the problem facing the bank that you stated in question 1. Use posters or any other media tools that you can use competently to produce a presentation that you can show to the bank managers. 5 What challenges did you face while working out a solution, and how did you overcome them? Hints 1 List the research you must do to understand the problem facing the bank. Which methods of research do you plan to use? 2 Ensure that each team member contributes at least one idea or action in the step-by-step planning to work out a solution. 3 Your solution should be clear, simply presented and emphasise the advantage of computerised (electronic) circulars over printed ones. Students’ group answers for questions 1 to 5 will vary. Before they start, remind them to read the hints that have been provided. 1 Have team members clearly explained the major problem that BCC will face when it expands? 2 Check each team’s three possible reasons for the problem. 3 Have students managed to explain, in a step-by-step approach, how their team will work out a solution to the problem? 4 Check that students have been able to recommend a solution to the problem facing the bank using posters or other media tools. They should be able to produce a suitable presentation. 5 Were teams able to discuss and verbalise the challenges they faced while working out a solution, and how they overcame these challenges? Interact with Information Technology 1 39 Chapter 7 Computer ethics and research (1) Questions and answers 7 Copy and fill in the blanks questions 1 Computer ethics is a set of moral principles that regulates the use of computers, mobile devices, networks, and information systems. 2 The unique and original works of a person or an organisation is referred to as intellectual property. 3 A trademark can be a name, word, slogan, design, symbol or other unique device that identifies a product or organisation. 4 Copyright law prohibits unauthorised actions such as duplication, publication, and sale of the material. 5 In-text citation refers to a citation that is placed within a document. 6 Software privacy is the unauthorised copying, use or selling of software that is copyrighted. 7 An online source is material that you find online. 8 Plagiarism refers to the act of using the work of another author without authorisation or representing the work of an author as one’s own. 9 The MLA style uses parenthetical citation to refer to the works of other authors in someone’s research. 10 Most cases of plagiarism can be avoided by citing the sources from which the information was taken. True or false questions 1 There is nothing wrong with copying, using or selling copyrighted electronic content from the internet. False 2 Accessing someone’s personal information on a computer system without their permission is legal. False 3 Copyright applies to work that is recorded in some way. True 4 Accessing someone’s personal information on a computer system without permission is ethical. False 5 Copyright laws allow the owner of a piece of work to take legal action against instances of infringement or plagiarism. True 6 Plagiarism involves stealing or using someone else’s work and passing it off as your own. True 7 Copying images from other websites to paste them into your own papers or websites without referencing is not regarded as plagiarism. False Interact with Information Technology 1 40 Chapter 7 Computer ethics and research (1) 8 Changing words but copying the sentence structure of a source without giving credit is an example of plagiarism. True 9 The credentials of the author are a good indication of the accuracy of the information in an online source. True Multiple-choice questions Choose the best answer to each question. 1 Which of the following refers to intellectual property (IP)? a Ideas b Art c Inventions d All of the above 2 The following are examples of plagiarism except for: a failing to properly reference work. b submitting someone else’s work as your own. c copying words or ideas from someone else’s work without giving credit. d including all in-text citations and a complete reference list at the end of the paper. 3 The following are all criteria that make an online source credible except for: a source. b author. c objectivity. d attractiveness of the site. 4 Plagiarism also includes using which of the following without permission? a An image b A video c A piece of music d All of the above 5 Which of the following is a correct APA in-text citation for an article written by Brown in 2017? a Brown (2017) b (2017, Brown) c 2017 (Brown) d (2017, Brown) Interact with Information Technology 1 41 Chapter 7 Computer ethics and research (1) Short-answer questions 1 Explain the term ‘computer ethics’. Computer ethics is a set of moral principles that regulate the use of computers, mobile devices, networks and information systems. 2 Give two examples of unethical behaviour related to computer use. Examples of unethical behaviour related to computer use: plagiarism (stealing someone’s work and presenting it as your own) copying, using or selling copyrighted digital content from the internet or other sources without the author’s permission accessing someone’s personal information on a computer system without their permission. (Any two) 3 Define the terms ‘intellectual property’ and ‘trademark’. Intellectual property (IP) refers to unique and original works of a person or an organisation. A trademark can be a name, word, slogan, design, symbol or other unique device that identifies a product or organisation. 4 Explain the term ‘intellectual property rights’. Intellectual property rights are the rights to which creators are entitled for their work, which includes ideas that have been recorded, inventions, art, writings, processes and trademarks. 5 a Explain the term ‘plagiarism’. b Give three examples of plagiarism. a Plagiarism is the act of using/stealing the work of someone else without permission or pretending that the person’s work is one’s own. b Examples of plagiarism: submitting someone else’s work as your own copying words or ideas from someone else’s work without giving credit failing to properly reference work (not using quotes or giving incorrect information about the source) changing words, but keeping the sentence structure of a source without giving credit using an image, video or piece of music in work that you have produced without receiving proper permission or providing appropriate citation; this includes copying images from other websites to paste them into your own papers or websites without referencing, making a video using material from someone else’s videos without giving credit or getting permission from the original creator of the video, using copyrighted music as part of the soundtrack of a video you created without permission, performing another person’s copyrighted music without permission. (Any three) Interact with Information Technology 1 42 Chapter 7 Computer ethics and research (1) 6 Explain five ways to determine the accuracy of online information. To determine the accuracy of online information, check: the source (where the information comes from), for example, national, international, educational or government institution the uniform resource locator (URL), for example, government (.gov), educational institutions (.edu) the information and relevant details about the organisation if the material is sponsored – this should be shown clearly on the website, with a link to the organisation for confirmation that the sponsor is legitimate (real) the date and name of the person who wrote the article (author); most accurate that the information online shows the date on which it was written or updated; information should be as current as possible that the content is comprehensive; it should give a works cited page or reference page with the sources used to write the article; scholarly online articles should list a works cited page. (Any five) Research questions 1 State the copyright laws of Jamaica. Students should find the website for the Jamaica Intellectual Property Office. This site will give them the information that they need. Other sources are provided on the site. 2 State the penalty for breaking the law. Students should be able to find information about the penalty for breaking copyright law on the Jamaican Information service website: "Most of these matters have culminated in varying fines and suspended sentences. Under the Copyright Act the maximum fine for a breach is $100,000 and or two years imprisonment, per offence or count.... He can do both criminal and civil prosecutions” [May 5, 2004] 3 Give two examples of products patented by Jamaicans. Students may answer the question based on their country. Answers will vary. Interact with Information Technology 1 43 Chapter 7 Computer ethics and research (1) Crossword 1 O N L 2 P L A G I A R I S M N 3 E C 4 E T H I C S O 5 O A P A U Y 6 T R A D E M A R K C I E G

Use Quizgecko on...
Browser
Browser