Unit 2: ICT and personal computer

  Grade 4:

Information

Technology

  User

  Index: Unit 1: Technology all around us In this unit you will:  Students will get a basic understanding of what ICT means.

   Students will be aware how ICT affects our lives.  Students will be able to learn about the components of a personal computer

  Unit 2: ICT and personal computer In this unit you will:  Students will be aware of various forms of technology.

   Students will be able to know the difference between internal hardware and external hardware.  Students will learn about various software types.

  Unit 3: Internet Safety In this unit you will:  Students will be aware of real world and virtual world.

   Students will be able to know the type of information NOT to share online.  Students will be aware to how to protect themselves from inappropriate Internet behavior.

  Unit 4: Computer System In this unit you will:  Students will understand how the computer system works.

   Students will be aware of various input, output and processing devices.

  What is Algorithm? In this unit you will:

Unit 5:

   Students will understand what is Algorithm?  Students will be able to create a flowchart.  Students will practice some logical thinking.

  Unit 6: Digital Footprint and Social Media: In this unit you will:  Students will be aware of how to protect themselves online.

   Students will discover they all have a digital footprint.

Unit 1: Technology all around us

  Check which one of these activities you or your friend have done or participated in and format the text as Bold.

   Cooked/ warmed food in a microwave oven.  Drawn cash at an ATM ( Automatic Teller Machine)  Used a telephone.

   Used a dishwasher  Sent/received an SMS  Booked tickets for a movie or show,  Watched a DVD movie.

   Listened to radio.  Listened to an audio CD.  Played a video game.  Watched TV.  Driven in a car with a tracking system.  Programmed a video recorder to record a show.  Watched a movie in a cinema

   Checked the time on a digital watch.  Upload airtime to your cellphone. If you have performed any of the activities in the list, you have used a computer without even realizing that you have. It could be that computer chips have been controlling the equipment or they have helped to create at the program /movie /sound that you have been enjoying. The fact is that computers are here, there and everywhere - and you probably can’t get along without them even if you don’t have PC sitting on your desk at home. Sometimes just taking notice of information we receive in the media, e.g. Reading a newspaper, listening to the radio or watching television can help you to realize and understand how much of an impact computer have on our society.

Task 1:

  1. List three examples where technology is used to :  Present information  Gather information  Control machines/devices

  2. From the picture give three examples of how technology makes our lives easier.

  3. List three ways in which technology is used in your school.

  4. Think about a visit to the Bank or Post Office. Describe all the ways that technology is used there.

  5. Has technology been good for all section of the community? Give an example of someone that may not benefit from ICT and explain why.

  Save your work as: Task 1 and your name and surname.

Unit 2: ICT and personal computer Computers today are all around us

   Laptop The point is that computers come in all shapes and sizes and are often built into other devices. But they share some common features. There are three types of personal computers (pc) in common use.

   Mobile phone

   Calculator

   Watch

   Interactive white board

   Projector

   Printer

   Desktop computer

  Whilst you are reading this page, how many computers are you aware of in the room? Maybe you are in a classroom right now and you are near to a:

  1. Desk-top: designed to be used at home or in the office in one place.

  Desk- tops are often linked together or networked to share software and data. Each PC is then called a workstation.

  2. Notebook or laptop: small, light and

  with built

  • –in screen, mouse, speakers, microphone and mode. It has a rechargeable battery.

  extremely small, designed to be carried in a pocket and used anywhere.

  Visit the we How and where are technology being used?

  3. Palmtop :

Task 2:

Hardware

  Hardware is a generic term for any part of the computer that you can physically touch, pick up, hold, move around the room etc. In other words, hardware are the physical parts that Examples of external hardware (not inside the computer):

   Monitor - so you can see what you are working on

   Printer - so you can get a paper copy of your work

   Keyboard - so you can type text, numbers and symbols into your work

   Mouse - so you can point, click and select things on your screen

   Microphone - so you can input voice or sound recordings Examples of internal hardware (inside the computer):

   Hard disk - to store all of your applications and files

   CPU (Central Processing Unit) - the 'brains' of the computer

   Fan - to keep the CPU cool and stop it overheating

   Motherboard - the main printed circuit board in the computer with sockets to connect the other parts

   Sound card - used to generate and capture sounds

Software

  A computer needs to be told what to do, otherwise it will just sit on your desk collecting dust and taking up space.

  Software are the applications and programming instructions that tell your computer what to do and enable you to use it for things such as playing games, writing an essay or listening to music.

  There are two main types of software which you will learn about in detail later on. They are 'systems software' which basically controls the way the computer works and tells it what to do.

  Examples include:  Operating System  Utilities  User Interface The other type of software is called ' application software' and it is this type of software that you use to do your work and have fun. Some examples include:  Word processors such as Word  Spreadsheets such as Excel  Databases such as Access  Games applications such as Half Life, Call of Duty etc

  So software depends on hardware and hardware depends on software. Together they form a computer system.

Task 3A:

  Students work in groups of two or three members and should brainstorm various technology/digital devices they use daily each member should have his own list with daily technology activities.

Student’s next task is to log their daily use and how long they have used of all digital media over 4 days which includes at least

  one weekend day. Saturday Sunday Monday Tuesday Television 30 min Microwave 20 min Computer 60 min Dishwasher 120 min PlayStation 60 min IPad 30min Cellphone 25 min Some examples include: phone usage, gaming (DS, PlayStation, X-Box) playing, surfing the internet, texting and so on.

  Task 3B: Insert your raw data into a spreadsheet such as Microsoft Excel.

  Bonus: Format the Excel Spreadsheet by: Changing the color of the table and cells. Change the border and the color of the table.

  Save your work as: Task 3 Your name and surname

Unit 3: Internet Safety In a group of 2 or 3 member brainstorm the following questions

  1. Do you know the difference between Real world and Virtual world?

  2. What personal information are good to share online?

  3. What personal information is not good to share online?

  4. Is the person chatting to you online always sharing their true identity?

  5. What should you do if someone stalk/harass you online?

Task 4: Create an Internet Safety comic by explaining dangers of real world and virtual world

  1. You can choose do draw your comic in MS Paint or create a table in Microsoft Word or PowerPoint.

  2. Another thought is trying a cartoon website such as:

Save your work as: Task 4 Your name and surname Task 5:

  So you think you know about the web? You think you’re safe? After all it’s all in the computer, so how could it hurt you? Guess again.

  The truth is: it’s a jungle out there! It’s full of traps for the unwary and vicious predators waiting to destroy your life.

  It isn’t safe but you can learn to protect yourself. You can learn to minimize your exposure to dark side of the web. How? By arming yourself with information and shielding yourself with the use of a little commonsense.

  

Research the following question and apply your findings in a Presentation.

Example: PowerPoint.

  1. Identify five types of personal information

  2. Identify types of online “Stranger Danger”

  3. Identify appropriate people for communication

  4. Identify how to protect themselves from inappropriate Internet behavior

  Bonus Points: Will be given to:

  Custom animation and Slide Transition Format the Picture Bibliography

  Save your work as: Task 5 Your name and surname

Unit 4: Computer System

  Computer system allows you to enter data, process data, store data and then output the result.

  Input Devices

  Task 4: Design an A4 poster in Microsoft Word that display ONLY input devices .

  The following criteria should be apply.

  1. Heading for your poster.

  2. Format the pictures

  3. Each picture should have a caption Bonus Points: Apply double page border and change the color of the page.

Computer processing

  Processing is the stage where the input data is manipulated in order to produce meaningful information. Processing can include a number of stages such as sorting, searching, calculations, graphing.

  Some examples of processing could include:

  1. Searching sales data to find which products in a supermarket have sold

  the most 2. Sorting a list of customer data into alphabetical order

  3. After a barcode has been scanned (input), retrieving the price of the item

  from the supermarket database and using this data to calculate the customer's bill

  4. Auto tune software: You are at a concert of a world famous singer. The singer knows their voice is a bit wonky this evening with some 'off' notes.

  So they use a computer processing system between the microphone and the main sound system to 'correct' these duff notes in real-time. The audience enjoys a perfect rendition. This is real-time processing in action.

Computer Output: Examples of output could include:

  1. A printout of student examination results displayed in order from highest to lowest.

  

2. A digital display at the petrol pump showing how much fuel has been delivered

and the cost of that fuel.

  3. An alarm from a fire alarm system which has detected smoke in the room.

  Task 6: 1. Insert a table in Microsoft Word.

  2. The table should have 2 columns and 4 rows.

  3. Insert pictures with labels inside each cell.

  

Bonus points: Format the table by changing the colors of the borders and cell.

  Save your work as: Task 5 Your name and surname

Unit 5: What is Algorithm?

  An algorithm is a set of precise instructions to solve a problem or

  Teacher will used the achieve a goal. BBC website to teach Algorithm.

  Role play: Students: Should work in groups of 2 or 3.

  One group should demonstrate how to make toast. Second Group: Cleaning teeth.

  Flow Chart show sequences of events.

  They are made of shapes such as rectangles and diamonds All the flow charts begin with a START symbol and finish with the End symbol Action / processing/ instructions represented using rectangles and decisions represented through diamonds. Diamonds are used for asking questions.

  Task 7: Algorithms can be represented with diagrams, instructions or a combination of

  both. Again working with your partner, you are to attempt to come up with a flowchart and step-by-step instructions of how to make tea or coffee for your

  parents in the morning. Work together with one of you creating the flowchart

  and the other the instructions. Use the symbols below for the flowchart:

  Once your flowchart is complete:

  Visit t

  Save your work as: Task 6 Your name and surname https://www.brainpop.com/ math/dataanalysis/compute rprogramming/quiz/

  Bonus: Algorithmic Puzzles

  Students should complete the following:

   ●

  ove it, Move it ● Unplugged Activity

  -life Algorithms ● Unplugged Activity

  Loops & Events Students should complete the following:

  

Getting Loopy

● Unplugged Activity

  

he Big Event

● Unplugged Activity

  Algorithmic Puzzles Students should complete the following:

   ●

  ove it, Move it ● Unplugged Activity

  -life Algorithms ● Unplugged Activity

Unit 6: Digital Footprint and Social Media What are digital footprints?

  Well, you may not realize it BUT every time you go online you leave a trail!! Have a look in the history section of your website browser and you can see the websites you have visited in the past.

  Task 8: Complete the survey below:

  E. They did not share or post any online

  9 J.

  8 I.

  7 H.

  6 G.

  5 F.

  4 E.

  3 D.

  2 C.

  A. Before 1 years old B.

  3. How old were you when you used your first computing device (Nintendo, X- box, Playstation, computer, laptop, iPad, leapPad,) when I was

  D. On a web page of some sort

  1. Did your digital footprint begin at birth? Ask your parents and return to this survey and fill it out.

  C. On their wiki site

  B. On their blog page

  A. On their social network page (Facebook, MySpace, AOL, Yahoo, etc.)

  2. My parent(s)/guardian(s) included one or more photos of me when I was under 3 years old (check all that apply)

  F. Don't know

  E. Not sure but think so

  D. My name was posted with a baby picture on the web.

  C. My baby photo was shared on the Internet.

  B. My parents posted my baby picture(s) on a web site for others to see.

  A. The hospital I was born in posted my picture on their web site.

  10

  4. Do you have an account which requires a password? (Select as many as fit)

  6. I have played online with others in the following social sites (check all that apply)

  G. Nickelodeon

  F. NeoPets

  E. Friv

  D. GiantHello

  C. Franktown Rocks

  B. ABCya

  A. Club Penguin

  B. No

  A. No

  A. Yes

  5. I participate in online gaming sites such as Minecraft, World of Warcraft, Halo....

  G. I use another relative's login and password

  F. I use my brother or sister's login and password

  E. I use my parent/guardian login and password

  D. My older brother or sister created an account for me

  C. My parent/guardian or other adult created an account I use

  B. I created my own account

  H. PBS Kids I. Youtube. J. WhatsWhat.me K. Facebook L. Twitter

  7. I have provided the following to get an account or access to information on the Internet (check all that apply)

  A. Chat room

  1

  G. I don't share personal information online

  F. Webcamera

  E. Twitter

  D. e Mail

  C. Blog

  B. Gaming site

  I have shared personal information using one or more of the following online

  A. First name

  Street address 8.

  G. Town I live in H.

  F. Home phone number

  E. Own cell phone number

  D. Where I go to school

  C. Age

  B. Last name

Save your work as: Task 7 Your name and surname

  Task 9:

   You may also use graphics, such as screen shots and/or pictures, to develop your map. (Here is an example of visual map.)

  Organize your sites into categories such as social networking sites (Facebook, Twitter, etc), gaming sites, shopping sites, learning sites, etc.

  Save your work as: Task 8 Your name and surname

Bibliography:

  Unit 1: Technology all around us Unit 2: ICT and personal computer

   http://www.bbc.co.uk/education/subjects/z8mtsbk

  Unit 3: Internet Safety

  

  Unit 4: Computer System What is Algorithm?

Unit 5:

   Unit 6: Digital Footprint and Social Media:

  Survey Monkey