FDEME3L EXAM PACK 2018
#MKHULU
******************
JUNE 2015
Question 1
Use practical examples in teaching and learning to define the following concepts
(a) Computer literacy (3)
Having current knowledge and understanding of computers and their uses
Educational use: installing programs on the computer, replace ink cartridge, use a
spreadsheet.
(b) Information literacy (3)
Knowing how to find, analyse, use, and communicate information
The ability to gather information from multiple sources, selects relevant materials, and
organizes it into a form that will allow the user to make decisions or take specific actions
Educational use: search/evaluate info on the web and use it in a lesson/subject.
(c) Integration literacy (4)
The ability to use computers, mobile devices, digital media, and other technologies
combined with a variety of teaching and learning strategies to enhance students’ learning.
Teachers understanding how to match appropriate technology to learning objectives,
goals, and outcomes
Educational use: use computers and other technologies combined with a variety of
teaching and learning strategies to enhance students learning.
QUESTION 2
(a) List five software packages that teachers and learners can use (5)
Word processing
Spreadsheet
Presentation graphics
Web browser
E-mail
Database
(b) Discuss the basic purpose of each of the mentioned package (10)
Word processing- To create documents
Spreadsheet- To process data in tables called spreadsheets
Presentation graphics- To convey ideas to an audience by means of slides
Web browser- To link a user to Web sites on the Internet
E-mail- To send and receive messages
Database- To record data orderly in records with fields
, QUESTION 3
(a) List five (5) risks that might affect the schools information system (5)
Computer viruses
Unauthorised access by hackers/crackers
Information theft
Hardware theft
System failure
Software theft
(b) For each of the risks in (a), discuss how schools can safeguard their equipment (10)
Computer viruses – install antivirus programs with regular updates
Unauthorised access by hackers/crackers – install a firewall
Information theft– implement user ID controls and encrypt the data
Hardware theft – install burglar proofing and access control systems (alarms)
System failure – make regular backups
Software theft– lock original package away, keep product keys confidential, etc
QUESTION 4
Computer ethics are the moral guidelines that govern the use of computers, networks
and information systems. Name and describe five (5) areas of computer ethics. (10)
Unauthorized use of computers: refers to the use of a computer without getting permission
from the owner
Hardware, software and information theft: The deliberate stealing of hardware, software and
information
Information privacy: is the right of individuals and organizations to deny or restrict the
collection or use of information about them
Copyright (laws): laws that cover software programs or protect them from piracy and
The existence of objectionable materials on internet: are objectionable materials on internet
that include racists’ literature, obscene pictures and videos, gambling, and age-restriction items
such as cigarettes and alcohol
Kids who are hyper communicators who use multiple tools to communicate, multitaskers,
who do several things at once with ease and goal orientated as they pursue multiple goals
at the same time
Reasons:
They are media-centric
Play on electronic playgrounds
Today’s students are much more media- centric than previous generation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller DML. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R109,00. You're not tied to anything after your purchase.