Saturday, March 18, 2017

Topic 6 - Managing Information Technology In Teaching And Learning

Information Technology or IT is an important component in the teaching and learning process. To excel in this role, you as a teacher have to understand a number of basic concepts in the management of IT in operating and maintaining the computer as well as the computer laboratory. This topic will discuss three important aspects in this management: the maintenance of the computer, its basic networking and managing the computer laboratory. Managing IT is useful too in managing the resources of IT in teaching and learning.

SOFTWARE  MAINTENANCE

Computers are dynamic machines and constantly support changes and addition of software. A computer usually possesses the minimum software which consists of the system software, utility or various other software.
With this variety of software available in the computer, proper maintenance has to be carried out to optimise the ability of the computer.
  • Disk Defragmenter
    • Allows the data to be accessed faster
    • The program operates faster
When the computer saves the data on the hardisk or diskette, the data is placed on the first sector of disk that can be used. The computer will try to place the data consecutively (close). However, this does not always occur. When the contents of a file are spread between two or more sectors, it is said to be fragmented. This causes slow access and subsequently affects the computerÊs performance. This problem can be solved by using the Disk Defragmenter utility facility. You can use various methods similar to the ScanDisk operation to open Defragmenter facility.
  • Click the button Start > Programs > Accessories > System Tools then click on Disk The Defragmenter process will be carried out in two modes:
    • Setting Mode – utilities can be carried out in the background without being displayed to the
    • Visible Mode – the screen will display the defragmenter

 Installation of Software

You can add other software into your computer. Windows system operation provides the facility to install software.
There are many methods to install a software.
Some  software  has  the  auto-install  feature  and  you  can  install  the  software directly. In order to install manually, the following steps can be taken:
  • Click on the icon MyComputer on the
  • Click CD-Drive on the MyComputer.
  • Click file.exe to start the  
BASICS OF NETWORKING

• What is a network?
Computer  Network  is  a  collection  of computers  that  can  communicate  with  one another through a shared media.


Uses of computer Network




Components of computer network






a)      File server

b)     Workstation

c)      Network interface card

d)     Concentrators/Hub

e)      Repeaters

f)       Bridges

g)      Routers

h)     Network topologies

Main Types of topologies




a)      Bus or Linear Bus




b)     Star Topology or Spider







c)      Token Ring Topology or Star Wired Ring



d)     Tree Topology
       Combination  of  characters  from  the  Bus  and  Star  Topology .  It contains  a  number  of  work  station  groups  in  the  form  of  stars connected  to  the  cable  forming  a  backbone  to  a  topology  in  the bus  topology  form.  This  Tree  Topology  allows  a  spread  of  shapes from one existing network and it also allows schools to coordinate one network according to their needs.





e)      5-4-3 Arrangement
•     Applies  when  Ethernet  protocol  with  coaxial  cable  is used. 

     When  there  are  two  nodes  in  a  network,  only  5 segments  will  be  allowed  at  a  maximum  level.  Then, those  5  segments  will  be  connected  through  4 repeaters or concentrators. As an  addition, only 3 from the  5  segments  can  be  expanded  if  it  is  made  from coaxial  cable.
•     
      This  regulation  cannot  be  followed  by  another network  protocol  or  an  Ethernet  protocol  where  all cables  used are fibre optic  cables.


f)       Hierarchy Topology
•    Sorts  the  resources  throughout  the  whole  organisation according to the needs of a management level. 

•    Hierarchy  network  uses  a  small  computer  that  is  added  to  a bigger  computer centre. 

•    Although  each  leg  of  the  hierarchy  can  operate  on  its  own,  the whole system  is controlled by the main system.



Criteria in selecting Topology

Finance

• Bus  Linear  Topology  may  be  cheaper if  compared  to  other  topologies moreover  if  the  bus  topology  does  not need a concentrator .

Cable

• Bus  topology  configuration  network needs  a  longer  cable  compared  to  other topologies

Duration benefits

• When  we  use  a  Star  topology,  the network  is  lengthened  when  one  more concentrator is    added.
Types of cable

• The  most  popular  cable  used  in  school is the unshielded twisted pair  - UTP


Network Protocol
Network  protocol  is  a  standard  measurement  that  allows the  computer  and  the  IT   device  to  communicate  between one  another .  It  is  used  to  control  communication  in  the network.  The normal Protocol  will decide:

• how  the  computers  distinguish  each  other  in  a network,

• what form the data has to take before  it is transmitted

• how  the  data  can  be  processed  when  it  reaches  the desired destination  and

• how to deal with faulty or lost  transmission or  packet.



Network  Protocol:  3  kinds  of  communication protocol:

Token  Ring : Token  ring  uses  the  ring  topology   where  the  data is  sent  from  one  computer  to  another  in  a  circle until all data reaches again to the Sender

Ethernet : 
• Ethernet  uses  the  protocol  CSMA/CD  (Carrier Sense Multiple  Access/Collision Detection).
• CSMA/CD  -  The  Protocol  which  allows  computers to communicate simultaneously and provide ways to solve the problem in the event of a clash of data.

TCP/IP

• Data  is  broken  into  smaller  parts  (packet)  and  then attached  with  the  sender’s  address  and  the recipient’s  address.  Data  packets  may  not  arrive  in sequence.
• TCP  -  ensure  that  each  packet  reach  is  numbered well  &  reach  in  good  order  so  that  the  receiver arranges  the data according to the correct sequence.
• IP   -  is  responsible  for  providing  the  address  for  a computer or device.

BASICS OF NETWORKING

• There  are  three  types  of  information  sharing through the basic computer network that is:

a. Local  Area Network  (LAN)

The  basic  function  of  LAN  as  a  network  is  to connect  a  number  of  computers  in  a  restricted
area  such  as  the  university  campus,  in  a  small building,  in  a  room  and  often  connected  to  a
main  computer  framework  or  minicomputer.  Can be  connected  through  twisted  pair  cable, fibre optic,  telephone  lines,  infrared  lights  and  radio signals.

There are three types of common topology network in the LAN  configuration for the customer network. The networks are

• Bus Topology or Linear Bus

• Star Topology or Spider


• Token Ring Topology

b. Metropolitan  Area Network  (MAN)

Metropolitan  Area  Network  or  MAN  usually  covers  a  vast geographical  area..  The  MAN network  usually  operates  in  cities, a  group  of  schools  or  in  a  small  district.  With  a comparatively wide  communication  network  in  a  geographical  vicinity, information can be disseminated widely,  quickly and effectively .



c. Wide  Area Network  (WAN) 

The  typical  Wide  Area  Network  connects  two  or  more  Local Area  Network  and  usually  covers  a  wide  geographical  area using  the  microwaves,  telephone  cables,  satellites  or  other means of communication. 


LABORATORY MAINTENANCE 

1) Safety  and Laboratory  Regulations

a. Regulations on the Use of the Laboratory


b. User Safety

c. Ensuring Data Safety

d. Ensuring  Computer safety

 i. Environment

 ii. Computer System

 iii. Monitor

 iv. Internal System  Unit

 v. Keyboards


 vi. Disks

2) Protecting the Computer from Virus

• Computer  virus  is  a  program  and  does not  evolve  on  its  own  but  is  written  or created  by  a  person  with  an  intention. The  computer  virus  can  spread  and affected  other  programmes  on  the system. It is usually hidden.

• BOMB  is  a  computer programme  that  does  not spread  but  that  which produces  an  explosion.
  The  explosion  of  the BOMB is unpredictable.

• WORM  is  a  vicious  program  that  can  spread  and corrupt the memory or inside the disk until there isn't a complete  memory  or  space  in  the  disk.  It  cannot explode.

• A   VIRUS  is  a  program,  a  script or  macro  that  is  more  dangerous because  it  can  explode, spread  or even  multiply .  Virus  can  be written  by  experts  in  computer programming. It aims at sabotage, investigation, research, comedy or business.

The Virus can enter the computer system :

• Through a copied programme or file from a disk

• Through the virus replica process itself

• Through downloading or through e-mails. It usually attacks EXE. and COM files.

Examples of  Virus

• Creeper  -  the  first  virus  to  be  invented  in  the  year 1970

• Christmas  Virus  -  invented  on  Mar  1990.  It  displays the  Christmas  tree  on  24  December  until  1  January every year .

• Brain  -  existed  since  1986.  It  spoils  the  boot  sector and FAT and changes  the disk  label.

• Dark  Avenger  -  from  Bulgaria  in  the  year  1989.  It attacks  the file.com , .exe and  .ovl.


• Den Zuk was detected  in Indonesia  on 1988.

• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.

• Stoned - created in February 1988.


• Michael Angelo - exploded on March 1992

Signs of Virus attack

• A program takes a longer time than usual to run.

• Disk operations seem difficult to conduct.

• ERROR message are displayed.

• Free Memory in RAM reduces.

• Programs or files disappear strangely.

• Changes in file size especially exe. and com. files.

• There are hidden files.

• It  attacks  the  File  Allocation  Table.  Boot  sector  or  FAT  that  is spoilt  and  will  cause  the  file   in  the  disk  to  be  undetected  and the  boot  sector  that  is  spoilt  will  not  be  able  to  start  the

  computer system.

• It attacks the file by changing the code and contents of the file  disabling its use.

• It lags the computer and finally the system breaks down when  it spreads and fills the computer     memory.

• It creates a bad sector causing loss or inaccessibility of data.

• It causes an increase in file size and alternatively reconstructs the file.

• Controls the computer after boot sector is attacked

• It shows an untrue display screen.


• It changes the disk label.

Ways  of addressing Virus attack

(i) Preventive Methods

• Use a password so that only authorized people can  use the computer.

•  Always scan for virus using anti-virus scans such  as MacFee  Scan, PcCillin, TAVS, Kasperskey ,    etc

• Don’t save data in the hard drive unless very  important

• Always prepare a backup so that there is a copy in  case the original disk is spoilt.


• Don’t share disks: possibly have virus in it.

(ii) Defense Mechanism

• Install & update  anti-virus  software


• Restoration Methods

3) Laboratory Use Time Table

• A   Time  Table  for  the  use  of  the  Laboratory  has  to  be arranged so that the teaching and learning process can be implemented  well.

• A   teacher,  especially  Computer  Laboratory attendants,  should  refer  to  all  parties  including
curriculum  committees,  heads  of  departments,  time table  coordinators  and  science  laboratory  attendants to  arrange  time  tables  so  that  they  do  not  clash  and suitable  for the subjects  taught.

No comments:

Post a Comment