Saturday, March 18, 2017

Topic 6 - Managing Information Technology In Teaching And Learning

Information Technology or IT is an important component in the teaching and learning process. To excel in this role, you as a teacher have to understand a number of basic concepts in the management of IT in operating and maintaining the computer as well as the computer laboratory. This topic will discuss three important aspects in this management: the maintenance of the computer, its basic networking and managing the computer laboratory. Managing IT is useful too in managing the resources of IT in teaching and learning.

SOFTWARE  MAINTENANCE

Computers are dynamic machines and constantly support changes and addition of software. A computer usually possesses the minimum software which consists of the system software, utility or various other software.
With this variety of software available in the computer, proper maintenance has to be carried out to optimise the ability of the computer.
  • Disk Defragmenter
    • Allows the data to be accessed faster
    • The program operates faster
When the computer saves the data on the hardisk or diskette, the data is placed on the first sector of disk that can be used. The computer will try to place the data consecutively (close). However, this does not always occur. When the contents of a file are spread between two or more sectors, it is said to be fragmented. This causes slow access and subsequently affects the computerÊs performance. This problem can be solved by using the Disk Defragmenter utility facility. You can use various methods similar to the ScanDisk operation to open Defragmenter facility.
  • Click the button Start > Programs > Accessories > System Tools then click on Disk The Defragmenter process will be carried out in two modes:
    • Setting Mode – utilities can be carried out in the background without being displayed to the
    • Visible Mode – the screen will display the defragmenter

 Installation of Software

You can add other software into your computer. Windows system operation provides the facility to install software.
There are many methods to install a software.
Some  software  has  the  auto-install  feature  and  you  can  install  the  software directly. In order to install manually, the following steps can be taken:
  • Click on the icon MyComputer on the
  • Click CD-Drive on the MyComputer.
  • Click file.exe to start the  
BASICS OF NETWORKING

• What is a network?
Computer  Network  is  a  collection  of computers  that  can  communicate  with  one another through a shared media.


Uses of computer Network




Components of computer network






a)      File server

b)     Workstation

c)      Network interface card

d)     Concentrators/Hub

e)      Repeaters

f)       Bridges

g)      Routers

h)     Network topologies

Main Types of topologies




a)      Bus or Linear Bus




b)     Star Topology or Spider







c)      Token Ring Topology or Star Wired Ring



d)     Tree Topology
       Combination  of  characters  from  the  Bus  and  Star  Topology .  It contains  a  number  of  work  station  groups  in  the  form  of  stars connected  to  the  cable  forming  a  backbone  to  a  topology  in  the bus  topology  form.  This  Tree  Topology  allows  a  spread  of  shapes from one existing network and it also allows schools to coordinate one network according to their needs.





e)      5-4-3 Arrangement
•     Applies  when  Ethernet  protocol  with  coaxial  cable  is used. 

     When  there  are  two  nodes  in  a  network,  only  5 segments  will  be  allowed  at  a  maximum  level.  Then, those  5  segments  will  be  connected  through  4 repeaters or concentrators. As an  addition, only 3 from the  5  segments  can  be  expanded  if  it  is  made  from coaxial  cable.
•     
      This  regulation  cannot  be  followed  by  another network  protocol  or  an  Ethernet  protocol  where  all cables  used are fibre optic  cables.


f)       Hierarchy Topology
•    Sorts  the  resources  throughout  the  whole  organisation according to the needs of a management level. 

•    Hierarchy  network  uses  a  small  computer  that  is  added  to  a bigger  computer centre. 

•    Although  each  leg  of  the  hierarchy  can  operate  on  its  own,  the whole system  is controlled by the main system.



Criteria in selecting Topology

Finance

• Bus  Linear  Topology  may  be  cheaper if  compared  to  other  topologies moreover  if  the  bus  topology  does  not need a concentrator .

Cable

• Bus  topology  configuration  network needs  a  longer  cable  compared  to  other topologies

Duration benefits

• When  we  use  a  Star  topology,  the network  is  lengthened  when  one  more concentrator is    added.
Types of cable

• The  most  popular  cable  used  in  school is the unshielded twisted pair  - UTP


Network Protocol
Network  protocol  is  a  standard  measurement  that  allows the  computer  and  the  IT   device  to  communicate  between one  another .  It  is  used  to  control  communication  in  the network.  The normal Protocol  will decide:

• how  the  computers  distinguish  each  other  in  a network,

• what form the data has to take before  it is transmitted

• how  the  data  can  be  processed  when  it  reaches  the desired destination  and

• how to deal with faulty or lost  transmission or  packet.



Network  Protocol:  3  kinds  of  communication protocol:

Token  Ring : Token  ring  uses  the  ring  topology   where  the  data is  sent  from  one  computer  to  another  in  a  circle until all data reaches again to the Sender

Ethernet : 
• Ethernet  uses  the  protocol  CSMA/CD  (Carrier Sense Multiple  Access/Collision Detection).
• CSMA/CD  -  The  Protocol  which  allows  computers to communicate simultaneously and provide ways to solve the problem in the event of a clash of data.

TCP/IP

• Data  is  broken  into  smaller  parts  (packet)  and  then attached  with  the  sender’s  address  and  the recipient’s  address.  Data  packets  may  not  arrive  in sequence.
• TCP  -  ensure  that  each  packet  reach  is  numbered well  &  reach  in  good  order  so  that  the  receiver arranges  the data according to the correct sequence.
• IP   -  is  responsible  for  providing  the  address  for  a computer or device.

BASICS OF NETWORKING

• There  are  three  types  of  information  sharing through the basic computer network that is:

a. Local  Area Network  (LAN)

The  basic  function  of  LAN  as  a  network  is  to connect  a  number  of  computers  in  a  restricted
area  such  as  the  university  campus,  in  a  small building,  in  a  room  and  often  connected  to  a
main  computer  framework  or  minicomputer.  Can be  connected  through  twisted  pair  cable, fibre optic,  telephone  lines,  infrared  lights  and  radio signals.

There are three types of common topology network in the LAN  configuration for the customer network. The networks are

• Bus Topology or Linear Bus

• Star Topology or Spider


• Token Ring Topology

b. Metropolitan  Area Network  (MAN)

Metropolitan  Area  Network  or  MAN  usually  covers  a  vast geographical  area..  The  MAN network  usually  operates  in  cities, a  group  of  schools  or  in  a  small  district.  With  a comparatively wide  communication  network  in  a  geographical  vicinity, information can be disseminated widely,  quickly and effectively .



c. Wide  Area Network  (WAN) 

The  typical  Wide  Area  Network  connects  two  or  more  Local Area  Network  and  usually  covers  a  wide  geographical  area using  the  microwaves,  telephone  cables,  satellites  or  other means of communication. 


LABORATORY MAINTENANCE 

1) Safety  and Laboratory  Regulations

a. Regulations on the Use of the Laboratory


b. User Safety

c. Ensuring Data Safety

d. Ensuring  Computer safety

 i. Environment

 ii. Computer System

 iii. Monitor

 iv. Internal System  Unit

 v. Keyboards


 vi. Disks

2) Protecting the Computer from Virus

• Computer  virus  is  a  program  and  does not  evolve  on  its  own  but  is  written  or created  by  a  person  with  an  intention. The  computer  virus  can  spread  and affected  other  programmes  on  the system. It is usually hidden.

• BOMB  is  a  computer programme  that  does  not spread  but  that  which produces  an  explosion.
  The  explosion  of  the BOMB is unpredictable.

• WORM  is  a  vicious  program  that  can  spread  and corrupt the memory or inside the disk until there isn't a complete  memory  or  space  in  the  disk.  It  cannot explode.

• A   VIRUS  is  a  program,  a  script or  macro  that  is  more  dangerous because  it  can  explode, spread  or even  multiply .  Virus  can  be written  by  experts  in  computer programming. It aims at sabotage, investigation, research, comedy or business.

The Virus can enter the computer system :

• Through a copied programme or file from a disk

• Through the virus replica process itself

• Through downloading or through e-mails. It usually attacks EXE. and COM files.

Examples of  Virus

• Creeper  -  the  first  virus  to  be  invented  in  the  year 1970

• Christmas  Virus  -  invented  on  Mar  1990.  It  displays the  Christmas  tree  on  24  December  until  1  January every year .

• Brain  -  existed  since  1986.  It  spoils  the  boot  sector and FAT and changes  the disk  label.

• Dark  Avenger  -  from  Bulgaria  in  the  year  1989.  It attacks  the file.com , .exe and  .ovl.


• Den Zuk was detected  in Indonesia  on 1988.

• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.

• Stoned - created in February 1988.


• Michael Angelo - exploded on March 1992

Signs of Virus attack

• A program takes a longer time than usual to run.

• Disk operations seem difficult to conduct.

• ERROR message are displayed.

• Free Memory in RAM reduces.

• Programs or files disappear strangely.

• Changes in file size especially exe. and com. files.

• There are hidden files.

• It  attacks  the  File  Allocation  Table.  Boot  sector  or  FAT  that  is spoilt  and  will  cause  the  file   in  the  disk  to  be  undetected  and the  boot  sector  that  is  spoilt  will  not  be  able  to  start  the

  computer system.

• It attacks the file by changing the code and contents of the file  disabling its use.

• It lags the computer and finally the system breaks down when  it spreads and fills the computer     memory.

• It creates a bad sector causing loss or inaccessibility of data.

• It causes an increase in file size and alternatively reconstructs the file.

• Controls the computer after boot sector is attacked

• It shows an untrue display screen.


• It changes the disk label.

Ways  of addressing Virus attack

(i) Preventive Methods

• Use a password so that only authorized people can  use the computer.

•  Always scan for virus using anti-virus scans such  as MacFee  Scan, PcCillin, TAVS, Kasperskey ,    etc

• Don’t save data in the hard drive unless very  important

• Always prepare a backup so that there is a copy in  case the original disk is spoilt.


• Don’t share disks: possibly have virus in it.

(ii) Defense Mechanism

• Install & update  anti-virus  software


• Restoration Methods

3) Laboratory Use Time Table

• A   Time  Table  for  the  use  of  the  Laboratory  has  to  be arranged so that the teaching and learning process can be implemented  well.

• A   teacher,  especially  Computer  Laboratory attendants,  should  refer  to  all  parties  including
curriculum  committees,  heads  of  departments,  time table  coordinators  and  science  laboratory  attendants to  arrange  time  tables  so  that  they  do  not  clash  and suitable  for the subjects  taught.

Topic 5 - Electronic Spread Sheet

Before electronic spreadsheets were introduced, record and account keepers used pen and paper to record data into a ledger that a book containing a number of spreadsheets. Accounting records and calculations were recorded by hand and entered into the spreadsheet every time calculations were made.
According to history, the idea to invent an electronic spreadsheet was started by Dan Bricklin while he was an MBA student at Harvard Business School in 1978. While observing his lecturers erase and rewrite the whole workings on the spreadsheet on the blackboard while calculating, he tried to think of an easier way to do calculations only by changing one digit on the spreadsheet.
The electronic spreadsheet application allows the user to;
  • Save records
  • Delete records
  • Edit records
  • Arrange and sort records
  • Calculate mathematical  calculations,  stastistics,  finance  and  engineering based on formulas and functions
  • Display information in the form of a table or chart
The Microsoft Excel Software allows the user to:
  • Save and process data;
  • Format worksheets like adding currency symbols and decimals, adding colour effects, alignment and protection,
  • Produce charts based on data,
  • Carry out calculations, statistics, engineering and finance,
  • Make predictions based on the use of analysis what-if,
  • Automate actions based on macro use
  • Store and manage data easily in the database
  • Insert graphics
  • Access internet based on the hyperlink.
  • Introduction to Microsoft Excel Windows
5
(b)  Main Menu Bar 

There are distinct differences in the Main Menu Excel compared to other Microsoft Office applications. Among the obvious differences are: On the sub Insert Menu there are special features such as adding cells, rows, columns, worksheets, functions and charts. The other features are similar to the menu in Microsoft Word.



(c)  Toolbar on Microsoft Excel Display

Microsoft Excel provides a number of toolbars that can be searched by selecting the View on the Main Menu and click Toolbars. The specified Toolbar can be viewed on the display screen. Each toolbar has a set of icons to assist to facilitate the Excel user to carry out the task of formatting, editing and carrying out mathematical instructions.

Cell Format 

Cell can be formatted in various formats. The method to format cells of users is to highlight the said cell first before displalying the screen to format cells. Highlighting cells can be carried out in any one of the following ways: 

(a)  Cell  -  Clicking any one of the cells to activate it 

(b)  Range  -  Click and drag the mouse over a number of cells

(c)  Column  -  Click on the column header of the respective columns 

(d)  Row  -  Click on the row header on the respective row 

The Sub window Cells format is a main menu to format cells. The display is seen by clicking on Format of the MainMenu and clicking on Cells. By using the sub window of Cells format, the user can change the characteristics of the cell in the form of changing numbers in the cell, aligning the cell content, font characteristics cell border, cell pattern and changing the protection for cells. 

On the Alignment menu, the user can update the position and orientation of the cell content display. The user can also merge the cells through Merge cells.


Type of Data Input and Mathematical Operation Function 

Cells can either be blank without any input or with a constant or a formula as an input. 
Constant is:

(a)  An input that does not change including text, date, time 

(b)  Numbers that have a numeric value for instance integer, decimal, percentage or fraction which if needed change a new entry has to be made 

A Formula is an addition which is an operation and mathematical function to the constant, and any change to it will change the whole calculation. This also means in the event the constant is changed, the change in the calculation outcome will occur automatically. 

Formulas have to start with the symbol =. 

Common mathematical operations using formulas include 

Among the common mathematical functions that are usually used by teachers include those in the table below: 


Arranging and Sorting Data 

Besides functioning to carry out mathematical operations, Excel is also useful for routine work such as arranging data in table and chart form to be presented and printed. 

Data Insertion can be done using the instruction Sort. 

For this purpose, data has to be highlighted first, then click Data on the Main Menu and select Sort. 

The Sub Window displayed will allow the user to sort the data in the said column according to alphabetically order and strength of value in descending or ascending order. 


Filtering Data
When the collection of data becomes too large the capacity to access the data becomes more difficult. Excel prepares the feature to filter data to facilitate easy 
access of data displayed. 

The filtering of data can be done by clicking Data on the Main Menu, click Filter on the sub menu and select Auto Filter. 
Making a Table 

Tables are used to present data in the form of text and numbers to facilitate understanding. The table in Excel is formed as a result of formatting on cells containing data. Among the formatting effects usually applied on cells include adding colour to the table header, creating a border around the cell and range, the effect on the alignment of the text in cells including the orientation effect.


Making Charts  
Charts are used as graphic representation added into Excel. The usual way to produce a chart would be by using Chart Wizard. The sub Window of Chart Wizard is taken out for display by clicking on the Chart Wizard Icon on the toolbar or by clicking on Insert on the Main Menu and selecting Chart.

Topic 4 - Electronic Presentation

The use of electronic presentations as teaching and learning tools has become increasingly popular amongst teachers in schools. There are many kinds of software introduced. However, in this topic, our discussions will revolve around the use of Microsoft PowerPoint.

Uses and Advantages

 There are many kinds of software available in producing electronic presentations. Among them are Microsoft PowerPoint and the Harvard Graphics as seen in Figure  below:
4
According to Shaifol (2004), the use of animation, graphics, audio, video and text in media for any presentation will:
  • Attract the interest of consumers
  • Motivate consumers
  • Facilitate easy understanding amongst consumers

The electronic presentation characteristic which allows the continuous movement of slides makes it possible as a platform to produce animated movements without rendering. This electronic presentation is normally used as a preview at the initial stages before the animation is compiled. The aim of using electronic presentations in animated movement is to display the movement without having to rely on the rendering process, which is time consuming.

Electronic presentations are user-friendly as well as possess command buttons that are easily understood and do not require programming codes. As a result of its user-friendly nature and its ability to combine various media such as video, animation, graphics, audio and text, this software is suitable in creating backdrop presentations.

Apart from that, this combination of media electronic presentation is interactive in nature. Hence, this electronic presentation software is widely used in the teaching and learning process in classrooms. Electronic presentation also allows the teaching and learning process to be highly interesting as complex ideas are easily illustrated and this undoubtedly motivates learners.

Layout

Layout in electronic presentation software is the knowledge or skill used to lay and arrange media on display with the intention of creating an attractive presentation. The ability to lay and arrange good and effective media elements will bring positive results on the presentation.

The Development of Basic Slides Presentation

There are five elements used in the design of electronic presentation software. Not all five of these media have to be used in any one electronic presentation. The software designer has to be very adept in using electronic presentation media to produce a presentation that gives the best and most effective impact on the user.
4.2
  • The elements to consider in the design of the storyboard are as follows:
    • Background colour
    • Font type
    • Size of alphabets
    • Colours of the alphabets
    • Picture format
    • Video format
    • Audio format
    • Animation format

  • Sample Storyboard
This storyboard is sketched in a flow, showing the sketches on the screen and the interactive patterns of the software.
4.3