The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

This book provides in-depth note for teachers teaching computing in Basic 7 to 9

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Isaac Vladimir Donkor, 2024-02-13 01:15:32

CLOUDCOM COMPUTING SERIES B7-B9

This book provides in-depth note for teachers teaching computing in Basic 7 to 9

Keywords: Artificial intelligence, algorithm, information security, perceptual computing,cloud computing

Achievers Computing for JHS Basic 7 45 FILES A File is a collection of related information save on a disk. The information can be of different types such as text, data or images. Similar to the way you keep files or documents in file folders for easy reference. An icon of a file normally shows the type of program used to create that file. Files are open or launch by double clicking on its icon. FOLDER A folder is an electronic container for storing documents, files and other folders. A folder may contain other folders known as Sub folder. Most folder icons appear as yellow colour. Folders that contain information about the operating system is called system folder. This type of folders is created by the operating system and not the user. Folders that contain information about all installed programs are called program folders. A folder within another folder is called a sub-folder. The main folder is called the parent folder. USES OF FOLDERS 1. It helps users to locate important file quickly 2. For keeping related files together 3. For organizing files on the computer. How to Create a Folder on the Desktop 1. Right-click on an empty space on the desktop 2. Select New from the menu 3. Select Folder from the pop-up menu 4. 5. Press Enter from the keyboard Note: the shortcut keys for creating new folder is CTRL + SHIFT + N FILES MANAGEMENT TECHNIQUE


Achievers Computing for JHS Basic 7 46 Basic 4 has been rename to basic 5 RENAMING A FOLDER ON THE DESKTOP Renaming is the process of changing the name of a folder or giving folder a new name. Folders are renamed for easily identification. A file or folder maybe renamed when the name of that file or folder exist already or when the content of the folder has changed. There are some characters or symbols that cannot be used for renaming a folder. Examples include: *, :, , /, \, |, >, <, ?. Steps involved in renaming a folder 1. Right-click on the folder 2. Select Rename from the popup menu 3. Type the new name in the textbox provided 4. Press Enter on the keyboard FILE NAMING CONVENTION File naming convention is a systematic method for naming files that will make them easier to retrieve later. All file systems follow the same general naming conventions for an individual file. File name is made up of a base file name and file extension separated by a period (.). Importance of File Naming Conventions 1. It helps users know the content of a file without opening it. 2. It helps users find or identify files even if they are no longer in their original location. 3. Help manages file more easily. 2 3


Achievers Computing for JHS Basic 7 47 File-naming conventions when saving files 1. Case sensitivity upper and lower case are different 2. Maximum length is 260 characters (for Windows) 3. Spaces allowed 4. Digits allowed 5. \ 6. File names not allowed (con, nul, prn). You cannot use any of them as file name; windows will not allow you to use them. FILE EXTENSION File extension or file name extension is suffix at the end of a filename that indicates what type of file it is. A file extension is a three or four-letter abbreviation found at the end of a file name after a period or full stop. In Microsoft Windows, the file name extension is a period that is often followed three or four characters but may also be one or two long. Importance of File Extensions 1. File extensions provide clues to the file contents. 2. OS uses extensions to determine which application created the file. 3. It indicates the file type or file format of the file. 4. It helps users identify the type of document. Examples of files and their file extensions Extension Type of Document Application .doc or .docx Word processing document Microsoft word .txt text document Windows text .xls or .xlsx Workbook Microsoft excel .ppt or pptx PowerPoint Presentation Microsoft PowerPoint .gif or .jpg or .png Images Windows image viewer .mp3 or .mp4 Audio Video Windows media .pdf Portable Document Format Adobe acrobat .htm or .html Web page Hypertext Markup Language


Achievers Computing for JHS Basic 7 48 USER ACCOUNT A user account allows you to sign in to Windows 10 computer. By default, your computer already has one user account, which you created during setting up Windows for the first time. But if you plan to share your computer with others, you can create a separate user account for each member of your home or office. Windows requires at least one user account. You specify that account when you are completing the installation processes, or the first time the computer starts after Windows has been installed. Windows assigns this first account as an administrator account so that the account can be used to manage the computer. It is not possible to sign on to the computer without a user account. A user is the person who is using the computer. A user account is an account that a person uses to sign in to a computer. Each user account is either: A Microsoft account, which is any email address that has been registered with the Microsoft account service A local account that exists only on a single computer and is not associated with a specific email address. User account permissions The system actions that a user can perform are governed by the type of account he or she signs in with. An administrator account has higher-level permissions than a standard user account, which means that an administrator account owner can perform tasks on your computer that a standard user account owner cannot. Standard user account allows a user to do things that affect only his or her account, including: Change or remove the password. Change the user account picture. Change the theme and desktop settings. View files stored in his or her personal folders and files in the Public folders.


Achievers Computing for JHS Basic 7 49 Administrator account is necessary to do things such as: Create, change, and delete accounts. Change security-related settings. Install and remove applications. Access system files and files in other user account profiles. User Account Control User Account Control (UAC) protects your computer from changes to Windows system settings by requiring that only an administrator permit certain types of changes. Each area of the Windows interface that requires administrator permission is labeled with a security icon. When you attempt to access or change protected Windows settings, a User Account Control dialog box appears, asking for confirmation that Windows should continue the operation. continue the operation. administrator accounts on the computer. To continue the operation, you click one of the administrator accounts, enter its password if any in the box that appears, and then click Yes. operation by simply clicking that account and then clicking Yes. This is one of the reasons rator account on the computer has a password. The User Account Control message box varies depending on your account and the action


Achievers Computing for JHS Basic 7 50 Creating a local user account on windows 10 1. Click on the Start button 2. Select Settings 3. Select Accounts 4. Then select Family & other users. (In some versions of Windows, you will see Other Users.) 5. Select Add someone else to this PC. 6. Select I don't have this person's sign-in information, and on the next page, select Add a user without a Microsoft account 7. Enter a user name, password, or password hint or choose security questionsand then select Next to complete your account. Creating local user account on windows 10 PC


Achievers Computing for JHS Basic 7 51 FILES AND FOLDER PERMISSION LEVEL File permissions regulate file access. They allow you to control who can read, write, or execute any file or folder. Every file and every folder in Windows have its own set of permissions. Permissions can be broken down into Access Control Lists with users and their corresponding rights. Standard Permission Level Types There are six standard permission types which apply to files and folders in Windows. 1. Full Control 2. Modify 3. Read & Execute 4. List Folder Contents 5. Read 6. Write Each level represents a different set of actions users can perform. Users can also set their own unique folder permissions or create a variation on any of the standard permission levels. Within each of the permission levels are many possible variations. How to change or edit folder and file permission some permissions. Before you can edit any permissions, you must to have ownership of the file or folder be an administrator. If the owner is another user account or a system account like Local Here are the steps to modify the permissions of folders and files: 1. Right-click on the file or folder you want to edit 2. Select Properties 3. Click on Security 4. Click on Edit 5. Check the box of the permission you want to allow or deny. 6. Click on Apply and then OK.


Achievers Computing for JHS Basic 7 52 ASSESSMENT TASK MULTIPLE CHOICE 1. The screen that appears after turning A. Wallpaper B. Monitor screen C. Desktop 2. All the following are features of computer desktop except A. Taskbar B. Title bar C. Icons D. Wallpaper 3. The long horizontal bar located at the bottom of the desktop is called A. Taskbar B. Title bar C. Start bar 4. Small picture that represents installed program is termed as A. File B. Folders C. Icons 5. Deleted items on the computer can A. Recycle bin B. User file C. My documents 6. Documents on the computer are kept A. Files B. Folders C. Icons 7. The suffix at the end of a file name after a period or full stop is called A. Path name B. File name extension C. File naming convention 8. The file name extension for Microsoft word is A. .docx B. .wod C. .txt 9. Which of the following is not an extension for image file? A. .Jpg B. .Png C. .img STRUCTURED QUESTIONS 1. What is desktop? Out the main features of a desktop. 2. Discuss the functions of the taskbar, thumbnails, start screen, and tiles. 3.a. What is file naming convention? b. Outline three importance of file naming convention. 4. a. What is file extension? b. state three importance of file extension 5. List the steps involved in creating folder on the desktop. 6. Identify possible applications that produce the following file extensions: docx, xls, pdf, jpg and ppt. 7. Identify the various parts of the Windows taskbar. 8. What are the procedures used to rename a folder? 9. Identify three (3) importance of icons


Achievers Computing for JHS Basic 7 53 CONTENT STANDARD DEMONSTRATE THE USE OF TECHNOLOGY IN THE COMMUNITY At the end of this content, learners will be able to: Describe and give examples of at least five technology tools for learning. Demonstrate the use of at least three technology tools identified. Discuss the benefits of using technology tools in learning. Examine the negative impact of computers and computer use on the environment Propose environmentally responsible practices that can be used to reduce the negative impact of computers and computer use on the environment Technology is the use of scientific knowledge for practical purposes or application, whether in industry or our everyday lives. So basically, whenever we use our scientific knowledge to achieve some specific purpose means we are using technology. We apply technology in almost everything we do in our lives. Educational Technology (edutech) is the use of hardware and software or technology tools to improve the processes of teaching and learning. Hundreds of educational technology tools have been created with the purpose of helping student improve their academic activities and facilitating communication between teachers and learners. Below are some examples of technology tools that can be used to support learning 1. Encarta 2. Mavis beacon 3. Spreadsheet 4. Scratch SUB-STRAND 2 TECHNOLOGY IN THE COMMUNITY Indicators TECHNOLOGY TOOLS FOR LEARNING 5. Presentation 6. Virtual museum 7. Google classroom


Achievers Computing for JHS Basic 7 54 Encarta Microsoft Encarta was a digital multimedia encyclopedia publish by Microsoft Corporation from 1993 to 2009. Encarta was a multimedia product, with text, pictures, sound, short videos and more used for leaning various subjects. It discusses knowledge about science, history, arts, animal life, environment, and more. It helps student to access information on various subjects or topic with a single click. Uses of Encarta 1. For improving learners reading skills in English. 2. It provides step-by-step instruction for solving math problems 3. It helps students to learn on their own. Scratch Scratch is a free visual programming language that allows students to create their own interactive stories, games and aminations. As student design scratch projects, they learn to think creatively and reason systematically. Uses of Scratch 1. It helps children develop their logical thinking 2. It improves social skills 3. Scratch help children to lean coding concept. Mavis Beacon Mavis beacon is an application software program design to teach touch typing". How to use Mavis beacon 1. Open the program by double clicking on the Mavis beacon icon. 2. 3. If this is your first time, sign in by tying your first name and last name and select your age. If not your first time, click on your name on the class list. 4. USES OF TECHNOLOGY TOOLS


Achievers Computing for JHS Basic 7 55 Google Classroom Google Classroom is a free web based social tool for leaning. It allows students to post questions and receive answers from their teachers and fellow students. Teacher can post question and lesson materials to student at home. Teachers can create, distribute, and mark assignments all in google classroom. Spreadsheet Spreadsheet is a software that is used to organize and calculate numerical data. Spreadsheet is made up of rows and columns that stores numerical data, perform calculations, and organize the data into meaningful information. Uses of Spreadsheet 1. For entering, sorting and storing of data. 2. For performing calculations 3. For data collections Virtual Museum Virtual museum is a collection of digitally recorded images, sounds, text and other data of historical, scientific or cultural interest that can be accessed through electronic media or web. As with a traditional museum, virtual museum can be designed around specific objects such as art museum or natural history museum or can consists of online exhibitions BENEFITS OF USING TECHNOLOGY TOOLS IN LEARNING 1. Technology promotes active participation of student in teaching and learning 2. Technology motivates students to learn. 3. It creates new ways for students to lean 4. Technology encourages collaboration. 5. It helps student to lean on their own. 6. It encourages communication between students and their teachers.


Achievers Computing for JHS Basic 7 56 Computers have a negative impact to the environment as well as the usage of computers. Many electronic products such as computers are discarded with a predicted amount of 20- 50 million tons generated every year, most of this waste ends in landfills. This waste has a negative impact on the environment since the heavy metals and dangerous chemicals make up these electronics and pose health risks to the entire country. These heavy metals contain beryllium, cadmium, lead and mercury and the waste contain chemicals which are toxic and help contribute to global warming. people using them for various purposes on a daily basis. While computers have certainly brought numerous benefits and improvements, they also have a negative impact on the environment. In this lesson, we will discuss some of the ways in which computers harm the environment and the steps that can be taken to reduce these impacts. 1. Energy Consumption One of the biggest environmental impacts of computers is their energy consumption. The production and use of computers require a significant amount of energy, which often comes from non-renewable sources such as coal and natural gas. This energy consumption contributes to greenhouse gas emissions, which are a major contributor to climate change. People who use computers never turn the actual device off which wastes a large amount of electricity that could have been potentially saved and reduce the amount of electricity produced by burning fossil fuels. 2. E-waste Another major negative impact of computers on the environment is the generation of electronic waste, or e-waste. E-waste refers to electronic devices that are no longer wanted or needed, and can include computers, laptops, printers, smartphones, and other electronic devices. When electronic devices are discarded, they often end up in landfills where they can release harmful chemicals into the environment. These chemicals can contaminate soil and water, posing a threat to plants, animals, and even humans. In addition, the extraction of the materials used in electronic devices, such as metals and plastics, can also have negative environmental impacts. Agbogbloshie in Ghanan is one of the largest e-waste dumping site in the world NEGATIVE IMPACT OF COMPUTERS AND COMPUTER USE ON THE ENVIRONMENT


Achievers Computing for JHS Basic 7 57 3. Air Pollution The production of computers also contributes to air pollution. The manufacturing of computers involves the use of various chemicals and materials, many of which can release harmful pollutants into the air. These pollutants can include carbon dioxide, nitrogen oxides, and other greenhouse gases, which can contribute to air pollution and climate change. Also, Electronic waste contains gold, silver and cooper, and people in developing countries attempt to extract these materials by burning the substance which releases hazardous smoke into the air and creates a poor air quality with so much pollution. 4. Water Pollution In addition to air pollution, the production of computers can also lead to water pollution. The manufacturing process for computers uses large amounts of water, and this water can become contaminated with chemicals and other pollutants. This contaminated water poses a risk to human health when it is dumped into rivers and other bodies of water since it can harm aquatic life and potentially get into the water supply. Water pollution can have a variety of negative impacts on the environment, including the destruction of ecosystems and the loss of biodiversity. It can also have economic consequences, such as the loss of fishing and other industries that rely on clean water. Electronic waste dumped site (Agbogbloshie-Ghnan)


Achievers Computing for JHS Basic 7 58 5. Deforestation The production of computers can also contribute to deforestation. Many of the materials used in the production of computers, such as plastics and metals, are derived from trees and other natural resources. The demand for these materials can lead to the destruction of forests, which can have negative impacts on the environment, including soil erosion and loss of habitat for plants and animals. Computers also cause unnecessary waste of paper by printing files and emails; most office waste is made out of paper and paper are made from trees which also contribute to deforestation. Computers have a negative impact on the health of its user such as the following diseases: arthritis, sleeping disorders such as frequently waking up during the night or having insomnia, back pain for staying in the same sitting position, headaches and poor attention spam in which you regard single tasks as boring and makes you anxious. Watching the screen of the computer that contains lights can burn your retina and cause blindness. The use of computers has numerous benefits and has brought significant advancements to our society. However, it is important to recognize the negative environmental impacts of computers, including energy consumption, the generation of e-waste, air and water pollution, and deforestation. There are steps that can be taken to reduce the negative environmental impacts of computers. Some of these steps include: Energy-efficient computers: Choosing computers that are designed to be energyefficient can help reduce their overall energy consumption and greenhouse gas emissions. Look for computers with the ENERGY STAR label, which indicates that they meet strict energy-efficiency standards set by the Environmental Protection Agency (EPA). We have to try to reduce the amount of power the computer uses by using the computer only when it's needed and turning the computer off when we are not using it. Some other small things we can do is adjusting the computer brightness, setting, and using LCD monitors instead of CRT. E-waste recycling: Properly disposing of e-waste is crucial for reducing its environmental impact. Many communities offer e-waste recycling programs, PROPOSED RESPONSIBLE PRACTICES TO REDUCE THE NEGATIVE IMPACT OF COMPUTERS AND COMPUTER USE ON THE ENVIRONMENT


Achievers Computing for JHS Basic 7 59 where old electronic devices can be safely and responsibly recycled. This helps to prevent e-waste from ending up in landfills and reduces the demand for the extraction of new materials. Green Manufacturing: Consumers can also support companies that are committed to environmentally-friendly manufacturing practices. These companies often use sustainable materials and employ eco-friendly production Paper Waste recycle: Computers produce a large amount of paper waste, mostly by printing. To reduce paper waste, we must recycle the paper that can be reused. Recycling electronic waste Recycling electronic waste is a long and expensive process, most electronic waste goes through a recycling system called the WEEE (Waste Electrical and Electronic Equipment). All the hard drives and memories are destroyed to corrupt all the data, but only 95%- 98% is completely recycled. Although there is a series of events needed to recycle electronic waste: o Firstly, all the items are sorted using their hands, then the copper and batteries are extracted o Items are shredded to small sizes and thoroughly sorted, all data is destroyed at this point o All small debris is shaken to make enough room to be broken down once again, all dust extracted is disposed of. o Using magnets, steel and iron is removed from the debris o Aluminum, copper and brass is separated from the non- metallic content o Water separates glass and plastic content Many countries contain facilities in which electronic waste is recycled such as: Australia, UK, the United States and Canada. Many developing countries contain vast landfills like Ghana, Nigeria, and India. Continents like Africa are known to contain many landfills of electronic waste, in which is hazardous to the environment and the entire population. Taking steps to reduce these impacts, such as choosing energy-efficient computers, recycling e-waste, supporting companies that use eco-friendly manufacturing practices, and reducing our overall consumption of computers, can help to safeguard the environment and make sure our world has a viable future. It is up to each of us to take responsibility for the environmental impact of our actions and make choices that are better for the environment.


Achievers Computing for JHS Basic 7 60 ASSESSMENT QUESTIONS MULTIPLE CHOICE 1. The practical use of scientific knowledge to solve problems in our everyday life is termed as A. Educational technology B. Technology C. Scientific knowledge 2. The introduction of technology in the classroom to improve teaching and learning is known as A. Educational technology B. Technology C. Scientific knowledge 3. All the following are examples of technology tools in the classroom except A. Google classroom B. Encarta C. One drive D. Mavis Beacon 4. Which of the following tool help students improve their typing skills A. Encarta B. Spreadsheet C. Scratch D. Mavis Beacon 5. Electronic devices that are no longer wanted or needed and disposed of are termed as A. Water waste B. E-waste C. Metal waste 6. The most common landfill site in Ghana is located in A. Kejetia B. Agbogbloshie C. Nima D. Kasoa 7. All the following can help reduce the negative impact of computers on the environment except A. Green manufacturing B. E-waste recycling C. Use of energy efficient computers D. Do not switch of the computer after use. 8. Software used to organize and calculate numerical data is a form of rows and columns is called? A. Encarta B. Word processors C. Spreadsheet 9. Which the following is not a negative effect of computers on the environment? A. E-waste B. Deforestation C. Air pollution D. Energy saving STRUCTURED QUESTIONS 1. Explain the term technology tools 2. What is Educational Technology? 3. Identifying any four (4) technology tools that aid learning. 4. State the use of the tools identified in question 3 above. 5. Outline four (4) benefits of using technology in learning 6. Identify any four negative impacts of computer on the environment 7. Propose any four ways to reduce these negative impacts identified in (7)


Achievers Computing for JHS Basic 7 61 CONTENT STANDARD HOW TO APPLY HEALTH AND SAFETY MEASURES IN USING ICT TOOLSAt the end of this content, learners will be able to: Describe Current Regulatory Requirements and Potential Computing-Related Disorders. Describe Safety measures in using ICT tools Examine workstation health risk assessment methods Explore safety measures at workstations The long-term use of computers has been linked to a range of potential health problems, or "computing related disorders" (CRDs). The health problems most highly associated with the use of computer equipment are upper limb disorders, eye problems, stress and fatigue, and skin complaints. Upper limb disorders are term used to describe a range of conditions affecting the fingers, hands, arms and shoulders. A hazard describes anything or situation that could be harmful to the user as they use a computer. For example, prolonged and improper use of the keyboard and mouse can cause repetitive strain injury. Additionally, using the wrong body posture can lead to body pain and other health issues over time. Health and Safety issues Associated with the of ICT Tools 1. Radiation from mobile phone causing cancer 2. Vision impairment from monitor 3. Hearing impairment from radio and PA system 4. Repetitive strain injury (prolonged and improper use of mouse and keyboard) 5. Carpal tunnel syndrome (pains in the hand and arm) 6. Computer vision syndrome (group of eye and vision related problems) 7. Posture position injuries (neck and back pain, headache, arm and shoulder pains caused by bad sitting position) SUB-STRAND 3 HEALTH AND SAFETY IN USING ICT TOOLS Indicators Regulatory Requirements and Potential ComputingRelated Disorders.


Achievers Computing for JHS Basic 7 62 HEALTH HAZARDS ASSOCIATED WITH ICT DEVICES HEALTH HAZARDS OF COMPUTER 1. Long term exposure to the monitor affects vision also known as vision impairment. 2. Improper sitting posture can cause waist, back, and neck pains. 3. Long-term usage of non-ergonomics keyboard causes wrist pains. 4. Radiation from the monitor causes eye and skin irritation. HEALTH HAZARDS OF MOBILE PHONE 1. Loud ringing tone can cause hearing impairment or damage our hearing system. 2. The mobile phone also emits radiation which can cause cancer. PUBLIC ADDRESS SYSTEM HEALTH HAZARDS Public address system is an electronic system consisting of microphone, amplifiers, and speakers used to amplify speech and music. Loud or high volume of public address system can affect or damage our hearing (hearing impairment). HEALTH HAZARD OF TELEVISION OR MONITOR Long term exposure to television can affects vision (vision impairment). HEALTH HAZARD OF RADIO Loud volume of radio can cause hearing impairment. This can cause permanent damage to the hearing mechanism. Preventive Measures or Safety Precautions for using ICT Tools 1. Do not answer or receive calls when charging mobile phone. 2. Avoid plugging ICT tools in damage socket. 3. Do not overload the socket 4. Correct body position when using the computer. 5. Distant yourself from the monitor when using the computer. 6. Avoid sitting closer to your television. 7. Reduce the ringing tone of your mobile phone. 8. Use Uninterruptible Power Supply (UPS) to ensure constant flow of power to the computer 9. Use ergonomic keyboard to reduce wrist pain.


Achievers Computing for JHS Basic 7 63 Computer users are a key component in any computer system. Protecting users is just as important as protecting hardware, software, and data. The widespread use of computers has led to some important user health concerns. Users should be proactive and minimize their chance of risk. The following sections discuss health risks and preventions, along with measures users can take to keep the environment healthy. The long-term use of computers has been linked to a range of potential health problems, or "computing related disorders" (CRDs). Computers and health risk 1. Upper and lower back pain due to bad posture 2. Long term exposure to the monitor affects the eye. 3. Back and neck pains. 4. Strain in Legs and Feet. 5. Wrist pains. 6. Eye and skin irritation. 7. Repetitive strain injury (prolonged and improper use of mouse and keyboard) 8. Plugging all your system into one socket 9. Using damage socket 10. Faulty electrical connections, SAFETY MEASURES AT WORKSTATIONS The following measures will help reduce the various health risk associated with the use of workstations. To reduce back and neck pains: Adjusting the chair for comfort Re-positioning of devices, Stand up and walk around every hour or so. Slowly lean your torso over to one side of the chair and then the other to stretch your sides and spine. Stand up and put your hands together, elbows out, then slowly twist to the left and then to the right. Keep your neck straight as much as possible. Move your shoulders around in small circles, first in one direction and then the other. Slowly bring your chin down to your chest, hold for 3 seconds, and then release. WORKSTATION HEALTH RISK ASSESSMENT METHODS


Achievers Computing for JHS Basic 7 64 Keeping the arm and wrist free from pain: Reach your arms out in front of you and draw big circles with your wrists, first in one direction and then the other. Stretch your arms out to the side as far as you can and then above your head as high as you can to stretch your arms, wrists and back. Interlock your fingers and then push them out in front of you, with palms facing out. To reduce the risks of visual problems (Protecting your eye) 1. Tilt the screen slightly to avoid reflections or glare. 2. Make sure the screen is not too close to your face. 3. Use large fonts. 4. Every 10 to 15 minutes, take an eye break. 5. Blink your eyes every five seconds. 6. If you wear glasses, ask your doctor about computer glasses. 7. Put the screen either at eye level or slightly lower. 8. Reduce the contrast and brightness of your screen by adjusting the controls. 9. Frequently look away from the screen and focus on faraway objects. 10. Have regular eye examinations to check that any blurring, headaches and other associated problems are not caused by any underlying disorders. Preventing computer-related muscle and joint injuries: Sit at an adjustable desk specially designed for use with computers. Have your keyboard at a height that lets your elbows rest comfortably at your sides. Your forearms should be roughly parallel with the floor and level with the keyboard. Adjust your chair so that your feet rest flat on the floor, or use a footstool. Use an ergonomic chair, specially designed to help your spine hold its natural curve while sitting. Use an ergonomic keyboard so that your hands and wrists are in a more natural position. Take frequent short breaks and go for a walk, or do stretching exercises at your desk. Stand often.


Achievers Computing for JHS Basic 7 65 ASSESSMENT TASK MULTIPLE CHOICE 1. All the following are health hazards of using the computer except A. Neck pain B. Backache C. Toothache D. Wrist pain 2. Which of the following is an effect of laud ringing tone of mobile phone A. Hearing impairment B. Vision impairment C. Headache 3. To avoid wrist pain, one must us A. Ergonomics keyboard B. QWERTY keyboard C. Dvorak keyboard 4. All the following can cause hearing impairment except A. Mobile phone B. Computer C. Public address system D. Radio 5. The following are possible hazards of prolonged use of the computer system except A. Neck and wrist pain B. Backache C. Tuberculosis D. Eye strain 6. Which of the following is not a safety measure to consider in ICT environment? A. Not overloading the socket B. Proper sitting position C. Always charge your battery 7. All the following are possible measures to protect eye except. A. Blink your eyes every five seconds. B. Use large fonts C. Wash your eyes frequently D. Every 10 to 15 minutes, take an eye break. 8. Which of the following devices can leads to eye problem and skin irritation A. Keyboard B. Mouse C. Monitor D. Printer STRUCTURED QUESTION 1. Give five examples of ICT tools 2. Mention two health hazards or effects associated with the use of computer and mobile phone 3. Define the term health hazards. 4. Identify any five (5) possible health hazards of prolonged use of computing devices. 5. Suggest five (5) preventive measures to reduce health and safety risks associated with the use of computers. 6. Identify any five measures to reduce visual problems when using a computer.


Achievers Computing for JHS Basic 8196


Achievers Computing for JHS Basic 8197 CONTENT STANDARD 1 PARTS OF A COMPUTER AND TECHNOLOGY TOOLS AND THEIR USES At the end of this content, learners will be able to: Discuss the Fifth-generation computers Demonstrate understanding of direct data entry devices Examine the uses of the output devices: Braille printers, Impact, Inkjet, Thermal, Wax, 3D printers Describe storage devices: Flash Memory Storage Systems, USB Flash Drives, Solid State Drives and Hybrid hard drives. The period of fifth generation started from 1980-till date. The process of developing fifth generation of computers is still in the development stage. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software. Two main characteristics can be identified with the fifthgeneration computers, which are: Parallel Processing: Most computers today access and execute only one instruction at a time. This is called serial processing. However, a computer using parallel processing accesses several instructions at once and works on them at the same time through the use of multiple central processing units. Artificial Intelligence (AI): It refers to a series of related technologies that tries to simulate and reproduce human behaviour, including thinking, speaking and reasoning. AI comprises of a group of related technologies: expert systems (ES), natural language processing (NLP), speech recognition, vision recognition, and robotics. STRAND 1 INTRODUCTION TO COMPUTINGIndicators FIFTH-GENERATIONS OF COMPUTERS SUB-STRAND 1 COMPONENTS OF COMPUTERS AND COMPUTER SYSTEMS


Achievers Computing for JHS Basic 8 198 Features of Fifth Generation 1. Development is based on artificial intelligence 2. Computers that are more portable and powerful. 3. Computers are dependable and less expensive. 4. Advancement in Parallel Processing 5. More user-friendly interfaces with multimedia features Advantages of Fifth Generation of Computer 1. These computers are far quicker than previous generations. 2. These computers are simpler to repair. 3. These computers are smaller in size than other generation computers. 4. They are lightweight and easy to move. 5. True artificial intelligence is being developed. Disadvantages of Fifth Generation of Computers 1. Fear of Unemployment: Although AI offers numerous benefits, there are many people who still fear about their job and think AI will replace their jobs in the future. 2. Moden computers are simple but could be difficult to use Quantum Computing Quantum computing is an area of computer science that uses the principles of quantum theory. Quantum theory explains the behavior of energy and material on the atomic and subatomic levels. Quantum computing uses subatomic particles, such as electrons or photons. Quantum bits, or qubits, allow these particles to exist in more than one state (i.e., 1 and 0) at the same time. Where classical computers store information as bits with either 0s or 1s, quantum computers use qubits. Qubits carry information in a quantum state that engages 0 and 1 in a multidimensional way. Google Sycamore is a quantum computer developed by Google AI Quantum. Google Sycamore chip is based on a type of quantum computing called superconducting qubits, which uses electric currents flowing through superconducting materials to store and process information. Syca processor comprising 54 qubits (quantum bits).


Achievers Computing for JHS Basic 8 199 Direct data entry devices are devices that read data from the source and transferred it directly to the computer system. They allow data to be sent into the computer with no or little human interaction. Direct data entry devices are specific purpose devices designed to automate or speed up the entry of data in to the system by minimising human data entry. Examples include Magnetic Stripe Reader, Chip and Pin Reader, Barcode Reader, Magnetic Ink Character Recognition (MICR), Optical Mark Recognition, Radio Frequency Identification (RFID) Readers and Graphic tablets, 1. Magnetic Strip Card Reader (MSCR) Magnetic Strip Readers reads information from magnetic stripes found on bank cards, membership cards and hotel room doors. strip reader. This is known as Swiping. The magnetic strip reader then sends data from the card into the computer for processing. The strip on the card holds information such as: Bank account number Name of card holder Expiry date of membership Uses of a Magnetic Strip Readers 1. ATM use these readers to process the information on bank cards 2. Electronic fund transfers point of sale (EFTPOS) uses the readers to transfer 3. Hotel rooms sometimes uses magnetic strip readers in place of door keys. 2. Chip and Pin Reader These allow people to pay for goods and services electronically at EFTPOS terminals. The chip and pin reader works by inserting a bank / credit card into a slot and then entering a PIN (personal identification number). If the correct PIN is entered, the cost of the goods or transferred to the company (supermarket, restaurants etc). The PIN ensures that the person with the bank card is the genuine owner. Only the owner of the card should know the PIN. DIRECT DATA ENTRY DEVICES


Achievers Computing for JHS Basic 8 200 Uses of Chip and Pin Readers They are used to make payments for goods or services in places such as: Supermarkets Filling station Restaurants Cafes 3. Barcode Scanners Used to rea barcodes. The barcode scanner reads the information stored on the barcode using a visible red light which is reflected and translated into digital information. The barcode holds information about each product including; Product Id Manufacturer Country of origin Note that the barcode does not store the price of the product. The price and other information about the product are held in a computer database and access using the product Id. The barcodes hold information about the product which is linked to a computer database. This enables automatic fast billing to take place. Once the barcode has been scanned, a computer can read the information stored on the barcode and access details about the product that are stored in the database. Uses of Barcode Scanners or Readers a) Used in supermarkets, stores and warehouse where goods are marked with a barcodes b) They are used in libraries to scan library cards and read ISBN numbers on books c) They are used to keep track of packages that are being delivered to different locations d) Also used in organising luggage in airports to ensure that luggage is loaded into the correct plane 4. Optical Mark Reader (OMR) It is a device which automatically reads marks made in pen or pencil. The OMR reader shines a light onto a form and less light is reflected where a pencil mark has been made. This allows the reader to tell which options has been chosen and send the result back onto the computer.


Achievers Computing for JHS Basic 8 201 Uses of Optical Mark Reader (OMR) They are used to read the shaded areas of documents such as: Multiple choice examination Multiple choice questionnaire Lottery tickets 5. Radio Frequency Identification (RFID) readers RFID uses the same technology as contactless cards. They use radio waves to read information that is stored on a tag. That information can be read from several meters away. The tag is made up of two components, a microchip that stores and processes the information, and an antenna that is used to receive and transmit the information. RFID tags are small tags that can be directly attached to a product and when a reader passes within a certain proximity of the tag, the reader can read the contents of the tag. The tag itself can contain: General Product information, such as its name and manufacturer. Specific item information, such as its unique ID or sold by date. This means that a human (or robot) can pass by close to stock and the stock information can be automatically read. Some common uses for RFID applications include: Pet and livestock tracking Inventory management Asset tracking and equipment tracking Inventory control Vehicle tracking 6. Graphic Tablet A graphics tablet (also known as a digitizer, pen tablet, drawing tablet or external drawing pad) is a computer input device that enables a user to hand-draw images, animations and graphics, with a special pen-like stylus, similar to the way a person draws images with a pencil and paper.


Achievers Computing for JHS Basic 8 202 Uses of Graphic Tablet Teachers can project handwritten notes onto the board in the classroom For writing Chinese, Japanese, and Korean characters For creating computer graphics Artists can create digital drawings or artwork with graphic tablet. 7. Quick Response (QR) code Reader A QR code is a 2-D barcode that can be digitally read by smartphones. QR codes contain information just like barcodes. They can be used to make a call, send a message or email, or even open a website. QR codes work similarly to barcodes, but are able to hold much more information. They are scanned usually via a mobile phone using its camera. The QR code can take you to a website, it can play audio, it may hold information for a company etc. Uses of QR codes Reader QR codes are used for many purposes. QR codes are commonly used for holding data such as: 1. Payments - QR codes can store information about your bank account or credit card. 2. 2-step verification passkeys - used during the configuration of two-step authentication security by various websites and applications. 3. Links to apps - 4. E-mail addresses - personal or business accounts 5. Addresses - personal home address, business address Advantages of Direct Data Entry Device 1. Faster data entry process. 2. More accurate data entry. 3. Requires little or no human interaction. Disadvantages of Direct Data Entry Device 1. They can be used for their intended purpose only. 2. Expensive to set-up (costs to buy the hardware / software). 3. Error may occur with faulty software or hardware.


Achievers Computing for JHS Basic 8203 3D Printer Inkjet Printer Thermal Printer Impact Printer Braille Printer information. The information is ready to output or sent outside. In this lesson, you will learn about different output devices such as Braille printers, Impact, Inkjet, Thermal, Wax, 3D printers and their uses. THE USE OF OUTPUT DEVICE


Achievers Computing for JHS Basic 8 204 BRAILLE PRINTER A braille printer (also called a braille embosser) is an impact printer that creates tangible dots on a braille paper, making written documents readable to the visually impaired individuals. A Braille printer is a system that enables people who are blind to read using a sense of touch. The utilization of the Braille printer allows individuals who are visually impaired and blind to access information quickly and perform tasks that involve reading and writing more efficiently using the Braille printer. In braille, each letter is represented by a different dot pattern of up to six raised dots. Benefits or Advantages of using braille 1. It enables the visually impaired to read. 2. Reading in the dark is possible. 3. Reading while stuck in traffic while keeping your eyes on the road. Limitation or Disadvantages in using braille printers 1. They are slower. 2. They make a lot of noise. 3. It requires heavyweight paper. 4. Very expensive to use compared to other types of printers. IMPACT PRINTERS Impact printers form characters by striking on a print hammer or wheel against an inked ribbon, leaving an image on a paper. There are two main types or category of printers which are impact printers and non-impact printers. Example of impact printer 1. Dot matrix printer 2. Daisy wheel printer 3. Band and chain printer Characteristics of Impact Printers 1. They are less expensive 2. They make a lot of noise. 3. They are character or line printers (Prints character or line of text a time) 4. They produce low print quality


Achievers Computing for JHS Basic 8 205 Advantages and Disadvantages of impact Printers Advantages Disadvantages Impact printers are less expensive They produce low quality prints They are reliable printers They make a lot of noise while printing They are character or line printers They are very slow in printing They use cartridges and ink ribbons. Refilling of the cartridge is expensive. Very useful for larger output prints They are not able to print in colour NON-IMPACT PRINTERS Non-impact printer form characters and images without any direct physical contact between the printing mechanism and the paper. Non-impact printers use laser, spray of special ink or heat and pressure to print graphics and characters onto the paper. The quality of print produced by a non-impact printer is higher than that of the impact printer. Examples of non- impact printers 1. Laser printer 3. Thermal printer 2. Ink-jet printer 4. Plotter Characteristics of Non-Impact Printers 1. They are quiet in nature 2. They produce high quality print 3. They are expensive compared to impact printers 4. They are page printers. Advantages and disadvantages of Non-Impact Printers Advantages Disadvantages They require less maintenance than impact printers. Non-impact printer ink cartridges are extremely expensive. They are very quiet in operation Toner in laser printers is harmful to people. They produce high quality print The cost of replacing the ink cartridge is high. They are easy to handle and move quickly. Inkjet printers are slower than laser printers


Achievers Computing for JHS Basic 8 206 Thermal Printer A thermal printer is a printer that makes use of heat in order to produce the image on paper. Thermal printers use heated pins to "burn" images onto heat-sensitive paper. Thermal printers are increasingly becoming popular and are mostly used in airline, banking, entertainment, retail, grocery, and healthcare industries. Thermal printing does not make use of ink or toner unlike many other printing forms but largely depends on thermal papers for producing the images. Advantages of Thermal Printers 1. Thermal printer saves money, since there is no use of cartridge or toner. 2. More durable compared to other printers. 3. More efficient and fast in printing 4. Largely inexpensive and come in various models and sizes. Disadvantages of Thermal Printer 1. Poor color printing compared to other printers 2. Printhead could be damaged by the high heat used while printing. 3. They consume more ink when the printhead becomes hot. 3D Printer A 3D printer is a type of material design printer that designs and builds 3D models from Computer Aided Design (CAD) using an additive manufacturing process. 3D printing is a process that uses computer-aided design, or CAD, to create objects layer by layer. 3D printing is commonly used in manufacturing and automotive industries, where tools and parts are made using 3D printers. 3D printing is an additive process whereby layers of material are built up to create a 3D part. This is the opposite of subtractive manufacturing processes, where a final design is cut from a larger block of material. As a result, 3D printing creates less material wastage. Uses or Application of 3D Printing 1. For creating product models and prototypes 2. For printing shoe designs 3. For creating wax casting for jewelry 4. Printing 3D foods. 5. For printing personal protective equipment (PPE) 6. For manufacturing replacement parts and spare parts.


Achievers Computing for JHS Basic 8 207 Advantages of 3D Printer 1. 3D printers are affordable 2. Wastage is minimal during production. 3. 3D printers are very fast in production 4. Environmentally friendly Disadvantages of 3D Printers 1. 3D Printers may not provide enough strength 2. May lead to high rate of unemployment 3. Limited material 4. Restricted Build Size. Inkjet Printer Inkjet Printer is a printer that blows ink onto paper using very small jets to produce characters on the paper. Inkjet printers uses ink to print text, graphics, and images onto various types of paper. They are mostly used in home and small offices. Inkjet printer works by spraying droplets of ink onto a paper to from an image or character. The ink is stored in disposable ink cartridges, and often a separate cartridge is used for each of the major colours which are CMYK. CMYK stands for Cyan, Magenta, Yellow, and Key. K' stands for Key, Key Color, or Key Plate, which actually refers to the color Black. Most inkjet printer can perform multiple functions like printing, scanning and ed and black & white. Advantages of inkjet Printer Disadvantages of Inkjet Printer Good for photo and image printing High maintenance cost Cartridges can be refilled and reused. Less printing speed compare to laser printer. Inkjet printers are smaller, lighter and easier to maintain than laser printers. Refiling and replacing of cartridges are very expensive. Inkjet printers have a low start-up cost Performance reduces with high volume printing. They are quieter in operation


Achievers Computing for JHS Basic 8208 CompactFlash Memory Stick MicroSD xD Picture Card Secure Digital High Capacity Secure Digital In addition to the previously discussed types of storage device in basic 7, other options are available for specific uses and applications. These include Flash Memory Storage Systems, Embedded Flash Memory Cards and Readers, USB Flash Drives, Solid State Drives and Hybrid hard drives. Flash Memory Storage Systems Flash Memory is a type of nonvolatile memory that can be erased electronically and rewritten. Flash memory chips are a type of solid-state media, which means they consist entirely of electronic components, such as integrated circuits, and contain no moving parts. The lack of moving parts makes flash memory storage more durable and shock resistant than other types of media such as magnetic hard disks or optical discs. Types of flash memory storage include Memory Cards and Readers, USB Flash Drives, Solid State Drives and Hybrid hard drives. Memory Cards Memory cards enable mobile users to easily transport digital photos, music, or files to and from mobile devices and computers or other devices. Memorycard is a removable flash memory device, usually no bigger than 1.5 inches in height or width, that you insert and remove from a slot in a computer, mobile device, or card reader/writer. Common types of memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, xD Picture Card, and Memory Stick. STORAGE DEVICE


Achievers Computing for JHS Basic 8 209 USB Flash Drive USB flash drive, sometimes called a thumb drive, is a flashmemory storage device that plugs in a USB port on a computer or mobile device. USB flash drives are convenient for mobile users because they are small and lightweight enough to be transported on a keychain or in a pocket. With a USB flash drive, users can easily transfer documents, photos, music, and videos from one computer to another. Solid-State Drive (SSD) Soli-state drive or SSD drive, is a new type of storage device used in computers. It is a non-volatile storage media that stores persistent data on solid-state flash memory. SSDs replace traditional hard disk drives (HDDs) in computers and perform the same basic functions as a hard drive. But SSDs are significantly faster in comparison. With SSD, the device's operating system will boot up more rapidly, programs will load quicker and files can be saved faster. Features of Solid-state drive 1. SSDs are smaller as well as lighter in weight than previous hard drives. 2. The data transfer rate for SSD is between 100-500 Mbs / sec. 3. Solid-state drives have no moving parts. 4. SSDs are quiet in operation. 5. Solid-state drives consume less power or energy. 6. Solid-state drives are 25 to 100 time faster than hard disk drives. Advantages of solid-state drives 1. Solid-state drives require less power to operate 2. They produce less noise because there is no moving or spinning parts. 3. They produce less heat since there are no moving parts 4. Quicker boot time and better performance. 5. Faster data access and transfer rate. 6. They are more resistance to accidental drop and shock.


Achievers Computing for JHS Basic 8 210 Disadvantages of Solid-state drives 1. They are more expensive than hard disk drive 2. SSDs have smaller storage capacity compare to Hard drives 3. SSDs decrease in performance over time. 4. Data recovery process is time-consuming and can be expensive, as the data on damaged chips may not be recoverable. Comparison between SSD and HDD Property Solid-State Drive (SSD) Hard Disk Drive (HDD) Heat Less heat production More heat production due to moving parts Electricity Consumes less power Consumes more power due to moving parts Noise Produce less or no noise Moving parts make a lot of noise. component SSD has no moving components HDD structure has moving parts Weight Less in weight Heavy in weight Speed SSD has faster read/write operation than HDD HDD has longer read/write operation Hybrid Hard Drive Hybrid hard drive also known as Solid State Hybrid Drive (SSHD) is a storage drive that combines the best features of a hard disk drive (HDD) and solid-state drive (SSD). Hybrid is defined as something which is a combination of two different things and so is a Hybrid hard drive as it is a combination of hard disk and solid-state drive. Its intended purpose is to bring together the performance of an SSD and high capacity of an HDD. SSD provides great speed and performance but it is not very good when it comes to capacity and internal storage. While in hard disk, it provides a larger capacity and storage than SSD but is not very efficient when it comes to speed and performance. SSHD combines the speed of SSD and capacity of HDD and comes at a very affordable price for users.


Achievers Computing for JHS Basic 8211 ShareSearchStart Device SettingsCONTENT STANDARD 2 Demonstrate the use of the Desktop features. At the end of this content, learners will be able to: Explore the use of the Charms bar Practise file management techniques (Drive Management) The Charms bar is a systems toolbar available in Windows 8 Graphical User Interface or screen. The Charms bar is a vertical toolbar, found on the right-hand side of the screen, and includes search, share, start, devices and settings icons or buttons. The menu appears when the mouse cursor is positioned at the top-right or bottom-right corner of the Windows 8 GUI. Search: To find and open any program or file. (Window Key + F) Start: Open the Windows 8 Start menu. (Windows Key) Share: Share and send links, photos, and more to your friends and social networks in the app currently open. (Windows + H) Devices: List available devices, for example printer or keyboard. (Windows + K) Settings: View Start Settings, view settings such as battery monitor, volume, brightness, notifications, and the power to shut down the computer. (Window + I) Indicators WINDOWS CHARMS BAR


Achievers Computing for JHS Basic 8 212 Drive or disk management is a utility software or tool used to manage data on disk by performing various functions on it. It enables users to view and manage the disk drives installed in their computer and the partitions associated with those drives. Some basic functions that disk management utility tools performs includes: Disk partitioning Disk defragmentation File compression Defragmentation Defragmentation, also known as defragging or defrag, is the process of rearranging the data on a storage medium, such as a hard disk drive (HDD), for efficient storage and access. Defragmenting is the process of scanning your hard drive and joining the different file fragments stored on the disk. Defragmentation increases the speed and performance of a hard disk. How to perform a disk defragment on windows 10 1. Select the search bar on the taskbar and enter defrag. 2. Select Defragment and Optimize Drives. 3. Select the disk drive you want to optimize or defragment. 4. Select the Optimize button. FILE MANAGEMENT TECHNIQUES (DRIVE MANAGEMENT)


Achievers Computing for JHS Basic 8 213 Disk Partitioning Disk Partitioning is the process of dividing a disk into one or more regions called partitions. Disk partition, is a logical division on a hard disk drive (HDD) that enables a PC to have different drives. A partition divides the hard drive into several logical storage units on one drive but functions as multiple drives. Reasons or importance of disk partition 1. For better data organisation on your PC 2. Run different operating systems on one PC 3. Partitions make data recovery convenient and efficient. 4. Windows can easily be reinstalled without affecting the installed programs. Partition a Hard Drive with Disk Management on Windows 10/11 1. Right-click the Windows icon, then click Disk Management. 2. Right-click the hard disk partition that you want to shrink, and select "Shrink Volume. 3. Enter the amount of space you want to shrink in MB, then click on the "Shrink" button. Wait for the process to complete, you'll get an unallocated volume. 4. Right-click on the unallocated space on your hard disk, and then select "New Simple Volume". 5. In the New Simple Volume Wizard interface, click "Next". 6. Enter the size of the volume you want to create in MB or accept the default size, and then select "Next". 7. Accept the default drive letter or choose a different letter for the partition, and then select "Next". 8. Set the default file system as NTFS and click "Next" to format the volume. 9. Click "Finish" to complete creating a new partition in Windows 11/10. File compression File compression is the process of reducing or squeezing the size of files to save storage space. File compression is the act of reducing the size of data while maintaining the integrity of the information. This is useful because it allows us to store smaller files on storage disks, as well as making file transfer over the internet more efficient.


Achievers Computing for JHS Basic 8 214 ASSESSMENT QUESTIONS MULTIPLE CHOICE 1. Which generation of computers uses parallel processing and artificial intelligence? A. Third generation B. Fourth generation C. Fifth generation 2. When a computer is able to process or execute more than one instruction at a time, it refers to as A. Serial processing B. Parallel processing C. Multi-processing 2. Which of the following device can be used to mark multiple choice examination? A. Chip and Pin Reader B. Optical Mark Reader C. Barcode Reader 3. The best printer for the visually impaired or blind people is A. Laser printer B. Thermal printer C. Braille printer 4. Which of the following is not an example of non- impact printer? A. Dot Matrix B. Plotter C. Thermal printer 7. Another name for USB flash drive is A. Memory card B. thumb drive C. Memory stick 8. All the following are features of the windows charm bar except A. Device B. Search C. Toolbar 9. Dividing a hard disk into one or more regions is called? A. Compression B. Partition C. Defragmentation 10. The process of reducing the size of files to reduced storage space is known as A. Compression B. Partition C. Defragmentation STRUCTURED QUESTION 1. Explain the term direct data entry device and give four examples 2. State three (3) uses of barcode reader. 3. What are the advantages and disadvantages of direct data entry device. 4. Explain the following and give 2 examples each. I. Impact printer II. Non-Impact printer 5. State 3 applications of 3D printer 6. identify any three advantages of SSD over HDD 7. Explain the following terms i. Defragmentation ii. File compression iii. Disk partition


Achievers Computing for JHS Basic 8 215 CONTENT STANDARD DEMONSTRATE THE USE OF TECHNOLOGY IN THE COMMUNITY At the end of this content, learners will be able to: Discuss technologies that help to improve computer accessibility Describe how portable computing devices affect our everyday lives Explain the issues associated with online services (e.g. social media, wikis, blogs, etc.) Many people have disabilities that limits their ability to perform daily living tasks. Low vision and mobility issues, as well as speech and hearing problems, can seriously affect a person's ability to navigate daily life. Assistive and adaptive technologies can help people their limitations. Although the terms are often used interchangeably, there is a slight difference in the definitions of assistive technology and adaptive technology Both assistive and adaptive equipment refer to devices and technology that help people live more independent. Assistive and adaptive equipment help improve people's mobility, communication, and sensory abilities. Assistive equipment or technology This includes devices and technology that allow people with disabilities or aged person to participate in daily life with greater ease. Assistive technology can be bought off-the-shelf, modified, or custom-made. Adaptive equipment or technology Adaptive technology is a subset of assistive technology, which refers to something specifically designed for people with disabilities. Adaptive equipment has been modified or enhanced from its original purpose to specifically meet the needs of a person with a disability. Adaptive equipment is more specialized. SUB-STRAND 2 TECHNOLOGY IN THE COMMUNITY Indicators ADAPTIVE AND ASSISTIVE TECHNOLOGIES


Achievers Computing for JHS Basic 8 216 Category of people with disability People with disability can be categorize into different group, which includes; 1. Sensory Disability (blindness or vision impaired and deaf or hearing impaired) 2. Locomotive or mobility disability (including cerebral palsy and leprosy) 3. Mental Disability 4. Intellectual disability 5. Learning disability Technologies that can be used to help people with special need. The following are both adaptive and assistive equipment and technology that can be used to help or assist people with disabilities. Large monitors Software to adjust screen colors Computers with voice output Computers with visual output Screen readers Text-to-speech software Portable computing devices have affected our everyday life in both positive and negative ways. With the increase in usage of mobile devices such as smartphones, laptops, smart watches, and GPS, access to information and communication has never been more easily accessible. You can have music in your pocket and make life more enjoyable. you can keep up with people the latest trends, the latest sports, whatever you want. you don't need to see your friends you can text them when you are not able to hang out with them. How These Devices Affect Our Daily Lives. Mobile Phone Smartphones have transformed the world in how people communicate with each other. With the world's population of about seven billion people, there are over 2.5 billion smartphone users worldwide. The most fundamental function of mobile phone is to receive and make calls. It also allows us to tell the time, take pictures, get directions, entertain ourselves, Braille embossers Screen enlargement applications, On-screen keyboards Electronic pointing devices Joysticks Trackballs PORTABLE COMPUTING DEVICE IN OUR EVERYDAY LIFE


Achievers Computing for JHS Basic 8 217 communicate with people on the various social media platforms and many more. These small devices are everywhere and have an increasing role in the lives of everyone. Effects of using mobile or smart phone Positive Effects Negative Effects 1. Help people stay connected 2. Helps people to communicate with each other 3. Help businesses run smoother 4. Really useful in emergencies 5. Many different opportunities to learn 6. Creates jobs in the technology world 1. Affects student's studies 2. Distracted driving due to cellphones is becoming a big problem 3. The radiation of cellphones negatively affects our health 4. Blue light emitted from phone screens affects our vision Smart watches Smart watch is a wearable computing device that look like a wristwatch or other time-keeping device. Smart watches have many features that smartphones have, but it is much more compact. In addition to telling time, many smartwatches are capable of extending the capabilities of th smartphone to the watch through Bluetooth transmission. The user can use the watch's interface to initiate and answer phone calls from their mobile phone, read email and text messages, get weather reports, listen to music, access GPS location and health data. Useful features of smartwatches 1. Health information, such as heart rate, blood oxygen level, blood pressure and temperature monitoring; 2. Messaging and calling features, similar to those on a smartphone. 3. Emergency calls for assistance if the watch detects the user has fallen. 4. Location features, such as maps, a compass and GPS tracking. Laptop Laptops are very common in the modern-day society. Like smartphones, they are lightweight, portable, and can be used on the go. Laptops allow us to feel like we are working on a desktop but with the convenience of being able to work wherever


Achievers Computing for JHS Basic 8 218 and whenever we want. They also consume eighty percent less electricity than desktop computers being particularly beneficial for students and businessmen. People use laptops on a daily basis as they provide many advantages over desktops and smartphones. PDA PDA is short for personal digital assistant, and it is a handheld device that combines computing, telephone, Internet and networking features. A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer. PDAs may also be referred to as a palmtop, hand-held computer or pocket computer. Basically, what a PDA does is to combined the features of a laptop and a cell phone on same device. GPS Global Positioning System (GPS) has made the lives of many people safer by reliably transmitting maps to unfamiliar locations through portable GPS navigational devices that speak to the user rather than requiring the user to read a map. These devices can save a great deal of time and fuel costs by preventing a user or driver from becoming lost in an unfamiliar location. For people who are traveling alone, GPS technology can direct them to the exact location or to a specific address without any assistance from anyone. The internet has transformed the lives of students in many ways. From online classes to virtual study groups, the internet provides many resources that allow learners to manage their day-to-day activities more efficiently. Also, social media provides students with a platform to connect and collaborate with peers, allowing them to form study groups in the comfort of their homes. An online service is an entity that provides access to various types of data for different uses via the Internet. Examples of online services include online banking, educational, news, shopping, blogs, e-mail, wikis and social media networks. Issues Associated with Online Service Delivery. Every day, regardless of your age or the website you use, you are at risk of being hacked and having your information stolen. It might be your accounts on social networking sites, bank websites, or even information on your personal computer. ISSUES ASSOCIATED WITH ONLINE SERVICES


Achievers Computing for JHS Basic 8 219 Example of these issues include Reliability of passwords Network Security Identity Theft Reliability of Password Passwords are hard to choose, especially choosing the right one that is easy to remember for yourself yet hard to guess by others. Many people tend to use very easy passwords for many of their accounts because they find it much easier to remember. These simple passwords can put their computer or mobile device at risk, and allow for hackers to access their financial and personal information. Here is a list of some of the world's most popular passwords that are very easy to be hacked: 1. Password 2. Password1 3. 123456 Security experts suggest that people use a different password for each service or website they have an account with. For this way if one of your accounts is hacked, the others will remain safe. The way to create a password that will be hard for others to guess is by using characters that nobody could think of. Your password should contain UPPERCASE and lowercase letters, numbers and symbols. Network Security Network security are software and hardware that protects you from threats. Components of Network Security include: Anti-virus and anti-spyware Firewall, blocks unauthorized access to your network Virtual Private Networks (VPN), to provide secure network access. Identity Theft Identity theft can also be known as identity fraud, which is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or account details, in order to impersonate someone else for financial or legal purposes. Some of the ways that identity can be stolen are listed below: Stealing your mail. Looking for personal documents in your trash. Tampering with ATMs to steal your banking information.


Achievers Computing for JHS Basic 8 220 CONTENT STANDARD DEMONSTRATE HOW TO APPLY HEALTH AND SAFETY MEASURES IN USING ICT TOOLS At the end of this content, learners will be able to: Discuss health issues at workstations Discuss safety measures in risk reduction at workstations Individuals who use computers for long periods of time may experience discomfort or pain as a result of poor posture, improper adjustment or use of workstation components and other factors. In most cases, there are relatively simple and inexpensive corrective measures which can be employed to reduce the likelihood of discomfort or injury. Companies must put measures in place or train computer users on how to adjust their computer workstations in order to work safely. We will discuss the importance of taking regular break, adopting good sitting posture and using document holders as a safety measure at the workstation. The Importance of Taking Regular Breaks from Bulk Work Continuously working without taking proper breaks is affecting not just your productivity but also your mental and physical health and your overall wellbeing. There are plenty of different activities that constitute breaks, here are some examples: A casual conversation with co-workers Checking your phone and/or social media for non-work content Taking a walk outside or around the office Having a snack or meal Here are some of the significant benefits of taking frequent breaks: 1. Breaks help to prevent and reduce stress. 2. Breaks help to improve your physical health. 3. Breaks improve your memory and learning. 4. Breaks improve your mental health and overall wellbeing. 5. Breaks increases your productivity. SUB-STRAND 3 HEALTH AND SAFETY IN THE USE OF ICT TOOLSIndicators HEALTH ISSUES AT WORKSTATIONS


Achievers Computing for JHS Basic 8 221 Adopting a good posture position at work Posture is the position of your body when you are standing or sitting. It describes how your spine is aligned with your head, shoulders, and hips. Good posture is an essential part of staying healthy, and fit. It helps you to maintain proper alignment of your spine, shoulders and hips. To prevent chronic health issues and enhance your wellbeing, it is important to implement healthy workplace habits that improve your posture at work and anywhere you find yourself. the right amount of support from muscle tension. The following guidelines can help improve your sitting posture. Proper Sitting Posture 1. Sit with a back straight (no hunching), your shoulders pulled back and buttock touching the end of the seat. 2. Keep your neck and head in an upright angle with your ears aligned with your shoulders. 3. Avoid leaning on any side. Keep hips even to distribute weight of body. 4. Bend your knees at a 90-degree angle, and keep your knees even with or slightly lower than hips. 5. Leave a 2 3-inch small gap between the bottom of your thighs and the edge of the seat. This helps reduce pressure build up in the underside of your thighs. 6. 7. 8. Avoid sitting for longer than 30 minutes at a time.


Achievers Computing for JHS Basic 8 222 Sitting Positions That Must be Avoided Use of document holders at workstation A document holder is a tool that allows you to position a physical document you are working on while at a computer in order to reduce risk of occupational fatigue, headaches, neck pain and eye strain. Almost everybody who use computers on a daily basis at least occasionally have tasks that involve referring to a hard copy document while typing. In those times and when properly used, a welldesigned document holder can be greatly impactful ergonomically. Benefits of using documents holder A document holder helps to avoid ergonomic hazards which include: 1. Neck twisting 2. Unnecessary eye fatigue and headaches 3. Curved spine Safety measures to reduce risk at workstations Refer to page 62 for the measures to reduce risks at workstation


Achievers Computing for JHS Basic 8 223 ASSESSMENT TASKS MULTIPLE CHOICE 1. Which of the following is classified as sensory impairment or disability A. Mental illness B. Leprosy C. Blindness 2. Cerebral palsy belongs to which category of disabilities? A. Sensory disability B. Locomotive disability C. Learning disability 3. Braille embossers or printers are A. Hearing impairment B. Vision impairment C. Learning impairment 4. Computers with voice output is best A. Hearing impairment B. Vision impairment C. Voice impairment 5. All the following are positive impact of mobile phone except A. For communication B. For entertainment C. Distracted driving 6. Which of the following is not a safety measure to consider in ICT environment? A. Not overloading the socket B. Proper sitting position C. Avoid using damage socket D. Always charge your battery STRUCTURED QUESTIONS 1. Briefly explain the following terms; i. Adaptive technology ii. Assistive Technology 2. Identify any three devices that can be used to assist someone who is visually impaired or blind to use a computing device 3. State four ways in which mobile phone affects our daily life. 4. Mention any three uses or applications of smart watches 5. What are the major issues associated in online services 6. Write the Following abbreviation in full i. PDA ii. GPS iii. VPN 7. Identify any four safety measures to reduce back pains at the workplace. 8. State four (4) ways to reduce eye problem when using the computer. 9. How can you reduce wrist pains when using the computer. 10. As a student, what are some of the effects of playing computer game for long hours 11. State three benefits of using document holder. 12. Identify any three importance of taking regular breaks at the workplace


Achievers Computing for JHS Basic 9331


Click to View FlipBook Version