Grade 10-12 SOCIAL IMPLICATIONS (1)

pdf

School

University of Pretoria *

*We aren’t endorsed by this school

Course

110

Subject

Information Systems

Date

Nov 24, 2024

Type

pdf

Pages

10

Uploaded by 1Student123456789

Report
1 MINDSET LEARN GRADE 10-12 CAT SUMMARIES OF VIDEOS GRADE 10 - 12 SOCIAL IMPLICATIONS These short discussions deal with a few main topics relating to the social implications (including impact on society, health and ergonomics, and environmental issues) of computer use. They may be useful to obtain a view that you haven’t yet considered, or they could be used as an introduction to an idea, about which you could think/research further and debate in your family or class. 1. Some Reasons for Studying CAT What sorts of benefits do you think CAT learners have in their future studies? - Research - Presentation of work or report - Saving of time - Collect, manipulate and analyse data to draw conclusions - Network with and collaborate with others - Tap into the global network - Ability to communicate in various ways; to access online help - Submit work electronically How can CAT learners apply their CAT skills in their future careers? - Most jobs are moving towards the ‘knowledge’ economy - Productivity - Ability to learn new skills and processes 2. The Work and Career Benefits of Using a Computer In what ways do you think good computer skills can be used when trying to find work? - Presentation of CVs make a good impression - Ability to research what careers are available - Connect and network with others, to put your name out there - Use sites like LinkedIn, Twitter and Facebook to create a professional image How could one demonstrate computer and other skills before even getting a job? - Apart from the interview, companies often ask candidates to demonstrate their skills - Provide an online portfolio of work What kinds of skills do you think employers are looking for? - Flexibility and adaptability constant updating of skills and knowledge - Online professional development workplaces are changing very rapidly and will continue to do so What kinds of computer skills might be needed by about 2025 or 2030? - Most jobs that will be around in 10 to 15 years time h aven’t even been invented yet - Data management, data analysis and meaningful information from which special knowledge can be draw for companies to make strategic decisions - Programming of computers in fields like engineering, medicine and many other areas, to solve new problems
2 MINDSET LEARN GRADE 10-12 CAT 3. The Overall Impact of ICTs What would you not be able to do if you weren’t able to use computers? - Very little! - Couldn’t do job , watch TV on computer, listen to music, communicate with family members in all parts of the world - Would be very unproductive - Can be tricky to get the balance right when computers impact on so many areas of life Do you think that access to a computer makes life easier and if so, how? - A llow one to do things that otherwise wouldn’t be possible - Enhanced education options are useful - When computers are on all the time, this could easily interrupt normal life too much - Human relationships and face-to-face time are also very important, in social, family and work situations - Make considered decisions about when to use electron applications Do you think that family life is hindered or helped by the presence of computing devices and other electronic devices? - Technology is a tool decide if you want to use it to help or hinder your life - Decide how to deal with gadgets during key moments like meal times - Make sure that technology is serving your interests 4. The Impact of Computers in Homes, Offices and Education What sort of computing devices can be found in homes and do they make home life easier? - Phones and tablets - Smart TVs - Game consoles play stations, Wii, etc - Media centres like - Appliances with computers inside (washing machines, for examples) - Can be helpful in terms of efficiency, convenience, time-saving, etc. - Apply balance and use these intelligently Do you think we can go as far as saying that teenage obesity can be attributed to the amount of physical inactivity they experience because of their almost constant ‘on - screen’ time? - Yes, to an extent - Also the responsibility of parents and teens themselves (all of us) - Over-eating is also an important reason - Need to do physical activity, preferably with other people it helps us to keep that exercise appointment - Create a structure that allows for appropriate use and balance In what ways have computing devices changed the office? - Profound changes! Not only in the way we work but also in the type of work we do - Computers have allowed for large volumes of repetitive work to be completed - People are not needed as much to do this repetitive work anymore, so humans have been pushed ‘up the value chain’ – people design and programme the computing devices, so that the computers themselves can do the work that people did before - Allow us to work with a team of people in real time (at the same time) Will human beings still have a role to play in the workplace? - For many people the reality is that some jobs are being taken over by computers
3 MINDSET LEARN GRADE 10-12 CAT - A lack of skills and education will contribute to this inability to use computers - Routine and mundane jobs are under threat - However, technology is also creating other, new jobs so education for new skills is vital - Programming and online marketing are examples of new roles in the workplace Has the option of working from home changed? - Increasingly, working from home is a reality this is often referred to as telecommuting - More and more jobs can be done from anywhere in the world, with a computer and an internet connection - This doesn’t guarantee employer trust and good management - Productivity needs to be judged differently - There are environmental advantages to working from home less travelling and using of fossil fuels Talk to us about 3 best options for technology in education - Much of this depends on the learning environment and the age of the learners - Best options view rich media (online games, audio, video, website); administration of education (keeping track of who is learning, when, how, drawing reports of progress, communication results and statistics (efficient, more cost effective); ability to collaborate and learn from others in other parts of the world this is especially good for teachers to learn from each other; also important for learners to work with people from different backgrounds and geographical areas. This allows for a wide variety of exposure to different cultures and values. 5. The Economic Reasons for Using Computers In what ways does computer use make economic sense? - As a form of digital technology, computers increase the ability to do productive work (like all technologies) increase productivity - Reduce costs increase efficiency - Increase in innovation and creativity - Economically, when swapping goods and services for money, computers therefore create goods and services more quickly, more efficiently, less expensively - Examples of goods and services include finding (providing) information, advertising, goods sold online - For example, in the accounting sector: economic value includes efficiencies (faster delivery), developing new ways of delivering services - For example, in a surgeon’s life: allows for ‘remote’ surgery using a robot, allows for good sterile conditions, more accurate and minute movements, fewer mistakes. Surgery is therefore more efficient surgeons can get through more surgeries in less time, bring the cost down and reduce recovery time (through keyhole surgery). - For example, in agriculture: tractors can be GPS guided, allowing for harvesting of fields without the tractor being controlled by a human driver; this allows the farmer to do something else Is it possible to make money using computers? - Definitely! Some people have made large amounts of money think of Google and Facebook. - Many other things can be done build apps, create music and video, analyse information and data, help others with information by connecting with them. - The computer becomes the tool to allow you to do any number of entrepreneurial things.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 MINDSET LEARN GRADE 10-12 CAT 6. Consider the Environment Why do we need to dispose of computers and computer peripherals wisely? - Toxic metals in computers, which will leak into the ground when decomposed - Take these sorts of things so that parts can be disassembled, to dispose of everything properly - Cost-wise, money can be recovered through recycling of many computer parts Where can one do this kind of computer recycling? - There are companies that collect and recycle computers, although they usually do this for large companies - Recycling companies often sell old computers to other smaller companies or pass them on to organisations that might need them, like schools - Pick n Pay and other supermarkets sometimes offers bins for these kinds of components - We need to be more pro-active and ask companies, like computer sellers, to make this service available - Sometimes returning an old computer can bring in Do computers is a lot of energy, and if they do, what sort of energy management should we apply? - Yes, they do use a surprising amount of energy - Many new computers will come with software that will inform you of how much energy is being used,, often in terms of energy used by light bulbs - Mobile phones and similar computing devices use less energy - Decide what kind of performance you need this affects how much power is used. If you are carrying out complex tasks, like with video editing or very large spreadsheets doing powerful calculations, set your processor to be on maximum, but if doing a simple Word document or surfing the web, power settings can be turned down. This won’t really be noticed. - The screen takes a lot of power if in a brightly lit room, bring down the brightness of the screen. This is also better to reduce eye strain. Some research shows that just to build a single computer requires about 1,8 tons of different chemical and fossil fuels and water. It’s also said that every year about 35 million tons of CO 2 is poured into the atmosphere from the collective number of computers on earth. One study also said that collectively computer users cause about around 300 million tons of CO 2 to enter the atmosphere just from surfing the Internet. Do you know of any ways that we can reduce CO 2 emissions? - Reduce or limit the energy requirements of our computing activities - Look at how we are generating the electricity we use this requires global efforts to change the ways we use fossil fuels, switching to other forms of electrical generation, possibly ‘carbon sequestration’ to store fossil fuels produced - Offset the CO 2 we produce, by doing things like planting trees and conserving the trees we have already - Limit CO 2 producing behaviour in other areas cars produce far more CO 2 emissions than computers, for example 7. Looking after a Computer Tell us about the physical care of computers and other computing devices - Computers are not as strong as they might appear. - Handle with care keep them away from water and don’t spill any liquids on them - Keep devices in a protective cover - Screens need extra care use a screen cover - Don’t throw them or drop them...treat all computing devices with great care
5 MINDSET LEARN GRADE 10-12 CAT What are some special things to consider about the hard drive? - The hard drive is a series of discs with a reader; the disk is spinning so movement while the hard drive is moving when damage it and possibly also damage the data stored on it - If moving your laptop, first put it into sleep mode Why are passwords important and what is a good password? - Use passwords to protect what’s “behind the front door” - Need to use a good, strong password - ‘password’ and ‘1234’ are not good as passwords - Use a combination of characters, like letters, numbers, exclamation marks or similar - Make passwords long say 10 to 15 characters - Don’t follow language conventions i.e. not something logical like a word or 2 words joined - However, the longer the password, the more difficult it is to remember get the balance between getting a strong password and being able to remember it - There are lots of new software applications where passwords can be stored various passwords go into one place behind one password, so you only have to remember one password - Biometrics can also be used like a fingerprint or a scan of the iris in the eye 8. Treating Data with Care Data quality is important. How can this be achieved? - The better the quality of the data, the better the analysis that can be done of the data - The principle is “Garbage in, garbage out” - Be sure data is clean it is not corrupted, all records are accurate and complete, well- described (can someone else also understand it?), well-organised. - Must be useable with others and by others How does data encryption work? - It works with a key a string of numbers and letters, often quite long - A random key is generated by a piece of software; then every byte of data is changed in some way by putting it through a mathematical formula that incorporates the random key - The end result is data that makes no sense - To make sense of it, the encryption needs to be reversed, and the only way to do this is if you know the key - Encryption can be applied to a file on your hard drive, to e-commerce transactions, - Use encryption to keep your own data safe and to keep data safe when sending it to someone else - Look out for websites that start with https:// - this shows a secure website So what is backup and how do you do that? - This is simply a copy of data that is stored somewhere safe, either as a hard copy or in the cloud a safe or vault, a local server, a cloud application like Skydrive, Google Drive and Apple iDrive. Flickr, Picasa, YouTube and even Facebook store media and other files in these services’ servers. - Cloud backup is usually very secure and is often free; a new device could be used to access backed up data, with an internet connection - Theoretically cloud services can be damaged, but stat in the cloud is mostly stored in many locations and the services have built in ways of being strong - Hard copies can be made on DVDs or in external hard drives, but store these separately from your laptop or computer and preferably in another building
6 MINDSET LEARN GRADE 10-12 CAT - The purpose of backup is to have a safe copy in case something goes wrong with the hardware you are using theft, hard drive crash, fire, etc. - Do a backup as often as needed, based on the nature of the data work backup might occur daily or weekly, personal photos could be backed up monthly, legal and tax documents for a family might be backed up every year 9. Protecting y our Computer How can we protect ourselves from theft of computing devices? - Think of your computer items like piles of cash keep it close to you, don’t flash it around, keep it out of sight What steps can we take to protect ourselves against theft or loss of data? - Backup is essential - Data can be stolen through phishing, using key loggers (monitoring key strokes), etc. - Use good antivirus software to check that there are no programs or types of activities that shouldn’t be there - Be aware of what websites you are visiting and what you click on - Disconnect from the internet not practical for a lot of work we need to do, but the less exposure you have to the internet, the less chance data theft and infection can occur What should we look for to avoid suspicious activity? - Big flashing banners offering to clean your computer, send you money, reward you for being the millionth visitor... they are not true and don’t click on them - Look for https:// if using a banking website; it it ’s not there, leave immediately – creating a website that looks like the real thing is called spoofing - Be careful of e-mails don’t believe offers of money or rewards because you have been selected in a lucky draw or someone traced your long-lost relative, who left you money. In the URL or address, there is no similarity with the institution the sender is pretending to be from. This happens a lot with banking-related hoaxes. - Generally, don’t open e - mails from people you don’t know or from organisations you’ve never heard of - Websites that have banner adverts with half naked ladies, know that the website is probably shady - Don’t be naive, be responsible and have the right software to protect yourself. When antivirus software shows that there is a problem, take it seriously and take the recommended action. Keep the antivirus software updated. 10. Considerations for Different Applications How can we take end users needs into account when using databases? - Clean data, fields well indexed and correctly linked so that queries and reports can be run - Format data fields well enter whether data needs to be a date, or text, or a number How can we take end users needs into account when using spreadsheets? - Very similar considerations to those for databases - Be a bit more aware of formatting well-labelled columns, good formulae wherever possible, add comments to guide users How can we take end users needs into account when using word processing? - Presentation is important - Make sure that font types match the purpose of the document, e.g. a business document - Insert images with good titles
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 MINDSET LEARN GRADE 10-12 CAT - Use good tables of contents - Lay the document out well and see that it flows well - Write clear, simple English - Watch grammar and spelling (whether UK or US English is needed) and use the review tools to see to this - Also use tools to set styles, automatic numbering What sort of things should we consider when making a website, to make it user friendly - Many of the things applicable to documents apply to websites too - Watch out that the colour scheme is easy to look at for quite a while - Don’t use blinking - Structure the website well look at the information architecture (how do bits of information relate to each other?) and navigation structure (is it easy to find important information?) How can we take end users’ needs into account when preparing presentations? - Remember the saying “death by PowerPoint” - Don’t read from a slide! - The presentation should only highlight what you want to say - Keep the number of words on a slide to a minimum - Use images that say what you want to say without adding words - Use colours that are easy to look at; certain colours don’t go well together and some people can’t read certain colour combination - Practice the presentation so that you are confident with it - Check websites to see what colours go well with others (for presentations and websites) 11. Health Issues when Using Computers We use small print on screens and those screens are emitting light; what can we do to minimise eye strain? - Enlarge the font (available in word processors and other Office documents, as well as browsers) - Remember to blink - Use the 20-20-20 rule every 20 minutes, look about 20 metres away for about 20 seconds; t his gives the eyes a chance to exercise a bit, reduce strain - Position your screen so that your looking slightly down - Be aware of screen brightness try to get it as bright as a white piece of paper is in the same amount of light - Use the biggest monitor you can, if using a desktop computer, of the highest possible quality and with the most optimum screen resolution (neither too high nor too low, as this causes minute flickering). Monitor settings tell you what is the optimum setting. Could you talk to us about repetitive strain injuries? - One of the commonest ones is called carpal tunnel syndrome an inflammation of ligaments in the wrist from moving the mouse a lot. This can be prevented and/or reduced. Loosen up with wrist by exercising it, support the wrist on a special mouse pad or on the desk What can do to avoid posture problems? - Look slightly down at the screen - Sit as tall as possible, and avoid hunching - Place feet squarely and firmly on the floor, with the chair not too high or too low - Don’t sit for hours in the same position – get up and move around, about once every 40
8 MINDSET LEARN GRADE 10-12 CAT minutes 12. Computer User Rights Is Internet access a human right or not? - Increasingly it is as much of a right as health care, education, water and sanitation, electricity - Some countries, particularly Scandinavian countries, have written into their constitutions that Internet access is a right of every citizen - South Africa is not anywhere near this - The trend is towards Internet access is towards Internet access for all - This will enable contribution to the economy; people without access will likely fall further and further behind - There is digital divide it’s not only about a divide between those with computer and those without, but also a divide between those with access to the Internet and those without it - Those without access to the Internet are at a huge disadvantage, which means that it does become a human right. Everybody needs to have access to the same tools and same opportunities. How do we get Internet access to impoverished areas and very remote, rural areas? - South Africa is getting closer to being able to provide Internet access to everyone the issues relating to this access are almost identical to the issues related to providing access to water, housing, electricity and so on - Technologically South Africa is in a stronger position to do this using mobile phones and mobile Internet access Do you think that Internet users should be able to view anything and everything, just what they want? - South Africa is a democratic country so we have rights to do what we want, but that right must be seen against the rights of others. - One’s right to view something if and when another person’s rights would be negatively impacted - Access to information has been challenged lately for example, using Bitcoin , a virtual currency. Bitcoin use can be tracked, but software is also available to hide this trading activity. Some people feel that this lack of transparency should not be allowed. - The important question is, do we want to live in a co untry where everyone’s choices are restricted? This needs an ongoing discussion. Do computer users have privacy rights and what can be done when privacy rights are misused? - One’s life on the Internet should have the same safeguards to privacy as in every day life. - However, an online profile makes it very easy to give away private information, and we often don’t know what kind of private information we are giving away - Check whether companies have the right to track our online behaviour is the data they keep (like a browsing pattern) anonymous or does it include my name? - Think of spending with a credit card it’s alright to have this spending tracked, as long as this information cannot be made available to others - Nobody has the right to check my computer usage or data, unless there is some real evidence that something has been done to arouse suspicion Can we please talk about plagiarism, piracy and copyright? - Plagiarism is pretending that someone else’s work is your own – it’s a form of stealing of ideas and effort
9 MINDSET LEARN GRADE 10-12 CAT - Piracy is also a kind of stealing download things that you should be paying for. This is a real issue in the music industry - Copyright infringement is a kind of theft too any use of work, be it research, written articles, music or similar... - Copyright normally says “all rights reserved” unless something else is specified. This also applies to use of this kind of information on a blog, for example. The Internet is challenging this, because we can add links to others’ work – as long as it is attributed (name and details of the original author or photographer) this is a bit like free advertising. - Creative Commons licences allow for more flexible use. For example, some work can be used in any way, as long as you attribute me, or as long you don’t make any money off it, or as long as you also share it like I have. 13. Communicating with E-mail What e-mail applications are useful? - E-mail is an integral part of our lives - Most e-mail applications offer the same functionality and benefits, whether they are cloud- based services like Gmail, Yahoo or Hotmail, or whether they are localised services like MS Exchange or company-based services - All offer Inboxes that can be categorised, all offer some sort of virus protection - The advantages of cloud-based e-mail services include less e-mail management, lower costs if not free, available anywhere in the world, and need for server hard drive space. Many of them are also available offline. What is spam? - It is any e- mail you get that you don’t want, from someone you don’t know - E-mail applications can manage spam quite well now, particularly with rules - When unwanted e-mail comes in, flag it as spam to manage it in the future What are the no- no’s when sending e -mails in the workplace? - Using large attachments rather send a link to cloud documents instead. Attachments take up space in the mailbox, and they make for inefficient work, compared to online editing, collaborating and all knowing where we all are on the same document - Think very carefully whether it is necessary to cc people in mails - It is not necessary to respond if you have been cc’d in an e -mail; us the To: line if two or more people need to reply with different information - Always use a subject line a short, accurate one. Make it easier for colleagues to decide what to read urgently, help them to search for mails by subject at a later stage. - Be brief and to the point in the body of the e-mail. - Put the main point upfront, then elaborate on it below. This is known as an inverted pyramid style - Use basic, plain , business language - Leave out smiley faces and curly fonts; use the signature and branding in the workplace 14 Aspects Relating to Social Media What do you advise us to do to protect our privacy and our dignity? - Think long-term! What will this look like in years to come? Remember that you often lose control of pictures or posts once it’s online, because people can post them elsewhere - Sometimes social media incidents cause interviewees to lose job opportunities or employees to lose their jobs - Even setting viewing controls doesn’t guarantee privacy – those who have access, like followers or friends, can pass things on
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 MINDSET LEARN GRADE 10-12 CAT Do you think that users of social media know enough about setting access controls and ensuring control of their privacy needs? - Probably not - Some privacy control settings are quite complex - Go and find out as much as you can about privacy settings of various social media - Google+ offers good control What are some of the positive aspects of being socially connected? - We can connect online more widely than ever; not only socially but also by networking with peers and colleagues - Geographical boundaries so not apply - Collaboration provides excellent opportunities for learning new things or working with people who are elsewhere - LinkedIn can be used like an online CV, only more than this. It also reflects connections and experience, while also showcasing endorsements from other people. This can be a useful personal selling tool in the job space. - Use certain social media for different things, some personal and some professional The negative aspects of using social media? - Apart from privacy issues... - Social media can also be a big time waster - Can take the place of real relationships - Keep the balance, be safe, be careful, while having fun Note: there are no interactive multimedia lessons and no How To’s fo r the series on Social Implications.