0% found this document useful (0 votes)
17 views21 pages

2 ExtraActivities Section1and2

Uploaded by

nicoleenletswalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views21 pages

2 ExtraActivities Section1and2

Uploaded by

nicoleenletswalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.1 Introduction to computers


1. What are the two characteristics or properties of laptop computers that makes them popular
for people who fly around the country a lot?
1. Their smaller size/weight and the fact that they can run on internal battery power for a while
(without having to be connected to the mains).
2. Why do people add more apps to their smartphones?
2. So they can perform more/different tasks on their smartphones.
3. A friend asked why everyone using the school’s network does not just use the same username.
Explain why this would be a bad idea.
3. One user name means everyone can access everyone else’s files! By having different
usernames, users can be restricted in terms of which programs they can use and data they can
access (on a computer or a network of computers). If everybody could access the same data,
files could get deleted or changed either intentionally or unintentionally.
4. Explain the difference between the object on the left versus the one on the right in the
following screenshot:

4. The one on the left is an actual (Word) file and the one on the right is a shortcut to a (Word) file.
5. A friend thought that he had copied all the videos to his smartphone that his CAT teacher
placed on the school’s computers for the learners.
When he got home he found that he had only copied the shortcuts to the videos.
Explain why he will not be able to view the videos by explaining what a shortcut is in this
situation.
5. A (file) shortcut is a just a link that allows the user to find a file, it is not the actual file itself.
Double clicking on the shortcut will generate a ‘file not found’ error. The videos cannot be
viewed as the actual videos have not been copied (only the links to them).

1
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

6. What is the easiest and quickest way to see which programs are open and running on your
computer?
6. View the icons of the programs on the Task Bar.
7. Your mother complained that it takes her forever to find a program by using the Start button.
What would be a better solution or method be to use if she frequently uses this program?
7. Create a shortcut to the program on the desktop or better still, add/pin it a shortcut to the
program on the Quick Launch toolbar next to the Start button.
8. Computer teachers and trainers will always tell their students to ‘make use of tooltips’ and
‘when in doubt to right-click!’
Explain why this is good advice by referring to these to two concepts.
8. A tooltip is a description of the function of an icon which pops up when you rest the mouse
pointer on some icons. This can provide some helpful information to a person who is not
familiar with the ‘function’ of the icon.
Right-clicking usually results in a pop-up menu appearing with a list of options that are
appropriate to the object you right-clicked on.
9. Right-clicking on the Recycle Bin gives a list of options, including ‘emptying’ the Recycle Bin.
Explain what the consequence of emptying the Recycling Bin would be by referring to the
function of the Recycle Bin.
9. The Recycle Bin is a special folder where files and folders that have been deleted from the hard
drive are stored. Emptying the Recycle Bin would permanently remove these deleted files and
folders.
10. One can easily forget the name of the file you are working on. What would be the quickest way
to determine the name of the file you are currently working on?
10. Look at the Title Bar at the top of the window which generally gives the name of the program
and the name of the file you are working on
11. Why do we need memory if all our files and programs are safely saved on storage?
11. Storage is where work is kept permanently. However, if we want to run a program or work on a
file, a copy needs to be loaded into memory to enable the computer to work with it.

2
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.2 Software


1. What is the general function of the WinZip utility program?
1. The WinZip utility program reduces the size of files (by compressing them).
2. Which company uses the iOS operating system on the portable devices it makes?
2. Apple.
3. A friends said that they had Nougat on their smartphone! What does this mean?
3. It means that they have the Nougat version or release of the Android operating system installed
on their smartphone
4. Why it is important to create different usernames even on a computer that is shared by the
same family members?
4. Different usernames need to be created so the operating system can ensure that users are not
able to see, use or change other users’ data.
5. Your mother installed an exchange rate app which uses a live tile to display the latest exchange
rates. She notices, however, that the information displayed is ‘old’ or ‘out-of-date’. What is the
most likely cause of this problem?
5. Her computer or device has not been or is not connected to the internet to in order to get the
latest information to display.
6. Some menu options are displayed as Settings  or as Settings …
What does these symbols after the word ‘Settings’ generally indicate to a user?
6. It indicates that their further choices or submenus.
7. What do we mean when we say an option is ‘greyed out’ and what is the significance of this.
7. A greyed out option is one that is displayed with a light shade of grey (or a lighter colour). It
simply means that the option is currently disabled (is not available for use).
8. The tooltip on the Paste button in Word displays the text Paste (Ctrl+V). What is the significance
of the Ctrl+V part that is shown?
8. It is the keyboard shortcut that can be used (holding down the Ctrl key and pressing V at the
same time) instead of clicking on the icon to paste something.
9. Consider the following two sets of control options:
A Bold Italics Underline

B Bold  Italics  Underline 


(a) Explain why some of the letters on the options are underlined.
(a) So they can be selected using keyboard shortcuts (e.g. Alt+B for Bold)

3
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

(b) What are the names given to the two sets of controls (A) and (B)?
(b) Group (A) are check boxes and group (B) are radio buttons.
(c) How do these two sets of controls differ from the user’s perspective?
(c) Radio buttons allow the user to choose only one option at a time whereas check boxes
allow the user to select any number of options at the same time.
10. List box and combo box controls both allow users to select an option from a list of possible
choices. How do these two types of controls differ?
10. Combo boxes differ from list boxes in that combo boxes allow the user to add an option of their
own, while list boxes force the user to choose only from the options listed.
11. What would the quickest and easiest way to save a long complicated error message that
appears on your screen if you don’t have a camera on hand?
11. Take a screenshot using the Snipping tool utility and save or print it.
12. What do mean when we someone says they are available on Skype?
12. It means that they have the Skype program installed so one can chat to them online using
Skype.
13. Microsoft Office 2016 is very popular office suite.
(a) What is an office suite?
(a) It is a software package that combines commonly used ‘office’ software such as a word
processor, spreadsheet, database, presentation and communication software in an
integrated unit. All the programs are separate programs but data can be exchanged
between them.
(b) Give two benefits of an office suite besides the functions it provides and any cost related
issues.
(b) They have very similar user interfaces and data can also be easily exchanged between
them.
14. While viewing a web page, a message asking you to install a plug-in appeared.
Explain what a plug-in is and why it is needed in this context.
14. A plug-in is software that needs to be installed to view multimedia content on a web page.

4
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.3 Hardware


1. Give two benefits of having a wireless printer.
1. No cables are required so the printer can be moved around easily.
You can print to the printer without first logging onto a computer that has access to the printer.
2. A friend wants to connect a printer to his computer at home.
(a) Explain why this is generally an easy process.
(a) A printer is generally connected to a computer via a USB port. Because USB ports are plug-
and-play, the printer is usually configured automatically once you plug it in.
(b) After it was installed the icon of the printer appeared with a large green ‘tick’ under it.
Briefly explain what this means.
(b) It indicates that this is now the default printer, in other words it is the one that will be
printed to unless another printer is selected.
3. What are two of the potential disadvantages of using a Bluetooth mouse besides any cost
related issues?
3. Any two potential disadvantages:
 They require batteries to send the wireless signal, which can go flat.
 They can easily be removed or easily stolen.
 There can sometimes be interference with the wireless signal, causing the device to stop
working temporarily.
4. Your aunt needs to purchase a computer which she will use for running the accounts of her
small home business. The sales person at the computer shop recommends that she purchases a
graphics card with the computer.
4. A graphics card is not really needed as your aunt is not going to be working with graphics
intensive tasks such as video editing. The built-in graphics card should be fine for her needs.
5. Inkjet printers
 spray microscopic dots of ink onto the paper
 are relatively cheap to buy
 use ink cartridges that are generally individually cheaper than laser cartridges,
 but they can be more expensive to use in the long run because they need to be
 replaced more frequently than laser cartridges
 are capable of producing good quality colour printouts such as photographs
 are generally still slightly slower than laser printers.
Laser printers
 work like a photo-copier machine – using toner instead of ink
 are generally more expensive to buy than inkjet printers
 are generally cheaper to run than inkjet printers when printing large volumes
 generally print faster than inkjet printers.

5
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.4 File management


1. Consider the following screenshot:

(a) What is the most likely reason that this dialog appeared?
(a) The user chose the Open with command in Explorer to open the file.
(b) Explain why a user might try and download an app from the Store on the internet?
(b) They might try and download an app from the Store on the internet if they feel that none
of the apps/programs listed (that are installed) is suitable to open the file.
(c) Which of the apps listed is generally used to open .pdf files?
(c) Adobe (Acrobat) Reader
(d) Motivate why it might be a good idea to tick or select the option ‘Always use this app to
open .pdf files’.
(d) So that .pdf files are opened automatically in the application chosen (so the dialog does not
appear every time one tries to open a .pdf file).
2. Consider the following screenshot of a partial folder structure:

(a) What does the term Local Disk refer to or indicate?


(a) A local drive or disk is a hard drive that is physically installed inside your computer.

6
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

(b) Give one reason why the disk drive shown is not a network drive, besides the fact that it
states that it’s a local disk.
(b) Network drives are usually labelled with letters towards the end of the alphabet such as S,
T, U, etc.
(c) Is a network drive such a T: an actual drive? Motivate your answer.
(c) Network drives are in fact not physical drives but folders on another computer on the
network. They just act as, and give the appearance of being physical drives on the
computer.
(d) What would be the effect or result of clicking on the down arrow (‘\/’) to the left of Local
Disk (C:)?
(d) It would ‘collapse’ the folder structure shown.

3. Consider the following screenshot showing some of the options available in Explorer:

(a) Motivate which view you think is the best View to use in Explorer.
(a) In Details view, the files and folders will be displayed with easy-to-read columns of
information such as: Name, Date Modified, Type, and Size etc.
(b) Motivate why it is probably a good idea to deselect or untick the displaying or showing of
file name extensions.
(b) The file extension indicates to the operating system what type of file it is and what
program it must use to open the file. By accidentally changing the file extension of an
existing file, the operating system may try to load it with a program other than the one it is
meant to use.
It also makes it easier to read the file name (without the file extension) and the ‘Type’
column’ tells you what type of file they are in any event.
(c) Why is it easier to recover a file deleted from your local hard drive as opposed to one
stored on your flash drive or the network (not on your local drive)?
(c) The Recycle Bin folder automatically saves deleted files from the local hard drive but not
from network drives or removable drives such as your flash drive.

7
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

4. Consider the following screenshot of a folder on the school’s network containing a video the
users want to take home with them

(a) What indicates that this is a video file?


(a) The file extension is .mp4 which is a commonly used video format.
(b) Explain what the problem would be if they copied the one on the right to take home
(b) The one on the right is a shortcut to the video. The one on the left needs to be copied as
that one is the actual video.
(c) Which one of these files is likely to have a larger size? Motivate your answer?
(c) Because the one on the left is the video itself, it will be the larger file, as video files tend to
be large whereas shortcuts are small files.

8
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.5 ICT in perspective


1. A friend saw a server edition of Windows being advertised.
Explain what a server is and why he is unlikely to need this for his single computer at home.
1. Servers provide resources and services to computers in a network, why is why they usually have
powerful processors, a lot of memory and storage. Your friend’s computer is not acting as a
server so there is no need to purchases the server edition of the operating system.
2. What makes smartphones ‘smart’?
2. A smartphone is termed ‘smart’ as it a multi-purpose computing device because it has its own
operating system installed and can have applications (apps) installed onto them to increase
their usefulness.

9
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.6 Extended software


concepts
1. Explain what Creative Commons (CC) is and outline a situation where you would make use of
them.
1. Creative Commons (CC) is a non-profit organisation that promotes the sharing and free use of
knowledge and products legally. They provide a variety of free copyright licenses which can be
customised to suit the person seeking the licence. For example, you can specify that your
computer training video may be freely used, but not for commercial use.
2. Explain what is meant by the term multi-user licensing by referring to a suitable example.
2. Some software companies allow software to be installed on two computers (e.g. a laptop and a
desktop). Some offer for example a 5 or 10 user license for less cost than a site license.

10
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.7 Extended hardware


concepts
1. Give two reasons why some users might experience more difficulty using a touchpad compared
to using a mouse.
1. The limited area of the touch pad could be problematic. They generally require finer
movements to use them and can be ‘sensitive’ at times. In addition, some actions such as
scrolling and dragging files and folders is not always as easy as is the case with using a mouse.
Using the buttons in conjunction with the touch pad is not was easy as is the case with a mouse
and users who have problems with their hands or coordination might well prefer a mouse.
2. Most mobile devices such as digital cameras have a feature that allow you to automatically
store pictures ‘on the cloud’ (the internet).
Give two possible advantages of this feature.
2. It provides automatic backup of the photos and makes them accessible on other devices
(and other users) connected to your cloud storage on the internet.
3. Give two reasons or advantages for scanning and hardcopy documents and storing them
digitally.
3. They occupy less space. When documents are stored in digital format, they are easier to sort
and process and can be easily shared with others. The quality of older hardcopy documents can
worsen over time.
4. Give two possible advantages and two possible disadvantages of using QR codes to promote a
talent show to be held at your school.
4. Advantages of using QR codes:
QR codes are an easy way of referring people to a website by just taking a snapshot of the code.
The user does not have to ‘remember’ the website and cannot make a mistake entering the
web address (URL). Websites and software needed to create and interpret QR codes are freely
available (it costs nothing to make them). They are also easy to use (if you know how).
Disadvantages of using QR codes:
Many users may not be familiar with QR codes or know how to work with them. You need to
access a website or download a QR code reader to interpret the information stored in the QR
code.
5. Why would it an advantage to have a biometric flash drive?
5. Only the ‘owner’ of the flash drive can access the data as flash drives which is important as flash
drives are left lying around or even stolen.

11
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

6. Bar coding and RFID systems have similar functions.


What is main advantage of a RFID system over a bar-code system?
6. RFID (Radio Frequency Identification) uses small radio devices to wirelessly store and transmit
data. It starts transmitting the data stored on it when it is within range of a receiving antenna.
The antenna picks up the transmission. This is done automatically so the item (with the RFID tag
attached) does not have to be physically picked up or passed through a scanner.
7. If a typical CD disc can store 700 MB of data, and a Blu-ray disc up to 50 GB, approximately how
many CDs (their content) could you store on a Blu-ray disc?
7. 1 GB = 1000 MB
So a Blu-ray disk stores 50 X 1000 MB = 50000 MB
This represents 50000 / 700 = 71 CDs

12
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 1.8 The impact of ICT


1. Mention three points to illustrate how ICT has improved our experience of watching television
programs.
1. Any three of:
 Video on Demand (VOD) allows you to choose your preferred TV programmes online from a
storage archive.
 Most service providers also provide these programs in different formats, enabling them to
be viewed on different devices.
 HD (High Definition) services, which offer the viewer a better quality picture on HD-ready
devices.
 Internet Television broadcasts TV stations over the internet rather than using radio signals
(like normal TV or Satellite TV does) etc.
 Availability of subtitles / alternative sound tracks in other languages
2. Highlights two ways in which ICT has positively impacted on travel.
2. Any two of:
 We can book accommodation and buy airline tickets online instead of having to go through a
travel agent.
 We can view and investigate the places we want to visit, and read about other people’s
travel experiences online etc.
 ‘Sharing economy’ apps such as Uber & Airbnb make travel / accommodation cheaper.
3. Mention three areas in which schools can make more use of ICT for various management and
administrative (not classroom teaching) tasks.
3. Any three of:
 Creating timetables with specialised software.
 Using to ICT to improve communication with parents
 Marketing the school by using a service like Facebook or via a website etc.
4. While security measures must be in place to prevent external, unauthorised access to company
data, attention must also be paid to the employees of the company.
Explain why this is the case.
4. A company’s computers are most easily accessed by the employees of the company, and so the
largest percentage of ‘conventional’ computer criminals are ordinary employees. They will also
have knowledge of how and where to locate specific data and information.

13
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

5. Most people think of hacking when it comes to ICT and cybercrime. List FOUR other types of ICT
connected crimes other than hacking.
5. Any four of:
 Online stalking/harassment/defamation
 Running a spam businesses.
 Stealing secrets either for blackmail or to sell.
 Copying and selling CDs and DVDs illegally.
 Committing identity theft, etc.

14
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 2.1 Introducing networks


1. Networks come in all sorts of configurations. Give two ways in which networks can be classified
besides the number of devices or computers connected.
1. The physical size or area they cover and whether they are connected via cables or wirelessly.
2. Give three possible indicators that your device or computer is currently connected to a
network.
2. Some form of indication from the computer or device’s operating system.
You can use hardware (like a printer) not physically connected to your computer or device.
Your data is depleting if you are using a mobile device.
You can access data/information not stored on your device or computer.
You can communicate with other users electronically.
You can access other computers and folders not stored on your device or computer.
3. How would your teacher have to set up and run a CAT practical exam if the server was ‘down’,
(‘not working’)?
3. He/she would have to use a portable storage device such as a flash drive or portable hard drive
from computer to computer and create folders with the relevant files on each computer’s hard
drive/desktop. The learners would have to be told to access and store the files on the local
computer. Afterwards the teacher would have to go to each computer and retrieve all the
learners’ files after a test and move them to his or her own folder so that they can be marked.
4. These days it is quite common to save our files in the ‘cloud’. Explain what this means and give
the names of two popular cloud storage series.
4. It means files are basically stored on a computer connected to the internet. Popular cloud
storage services include OneDrive, Google Drive and Dropbox.
5. Explain how the centralisation of data in a network contributes to flexible access.
5. With networking, users access and use files or folders on a central computer as if the file or
folder was actually on their own computer. They are therefore not limited by the physical
location of their computers as they can access the network from any device or computer
connected to the network.
6. The school told parents they can use EFT for school fees. What does this mean?
6. EFT (Electronic Fund Transfer) means one can transfer money using the internet and internet
banking using your home computer or on your mobile device to the school to pay the fees.
7. Important events such as the Olympics and ‘keynote speeches’ have been ‘live streamed’. What
is meant by live streaming in this context?
7. Live streaming refers to a situation when an event is ‘broadcast’ live via the Internet (as
opposed to via conventional TV channels).

15
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

8. Many computer games allow gamers to play them online.


Give one potential benefit of this approach (online) for the gamer.
8. Online gaming allows one to play against other users around the world (which is sometimes
referred to as a MMORPG – Massively Multiplayer Online Role-Playing Game) as an individual or
in teams or ‘armies’
9. Give three reasons why networks make the life of a network administrator easier (besides that
they are employed).
9. It is much easier to control access to data when that data is accessed via a network, since access
can then be controlled and set up by a network administrator to ensure that no unauthorised
access takes place.
Since the data of an organisation can be centrally stored on a server, it is easier to ensure that
the data gets backed up regularly.
It is easier to maintain the integrity of data (to prevent it becoming outdated and unreliable) if it
is only updated in one central location. It reduces the likelihood of having duplicate or outdated
files on different machines.
Using a network, software such as anti-virus software can be updated by sending the updates to
all the computers from a central computer, instead of updating each machine individually using
a flash drive or a portable hard drive. Not only is this more efficient, it also ensures that all
computers receive the same updates and versions of the software.
10. Give two reasons why viruses are potentially more difficult to deal with in network
environments.
10 There are more potential ‘points of access’ in terms of multiple users, the widespread use of
portable storage devices and internet connectivity.
Viruses are designed to spread and can move rapidly through a network infecting multiple
computers and the files of many users.
One ideally needs to ensure that all the computers that connect to the network have up-to-date
anti-virus software installed. This is becoming more difficult with more and more users making
use of portable devices to connect to an existing network.

16
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 2.2 Network basics


1. What type is network is formed when you and a friend send files to each other via Bluetooth
with your smartphones?
1. A Personal Area Network or PAN
2. Explain what the advantages of a PAN is terms of using your smartphone to play music though a
high-quality sound speaker.
2. The Personal Area Network (PAN) connects the smartphone and the speaker wirelessly via
Bluetooth (no cables are needed). The connection does not need to be set up again after that,
as the devices (smartphone and speaker) will automatically ‘pair’ up when they are in range of
one another (a few metres).
3. How are the various components of a PAN usually connected?
3. Via Bluetooth
4. Which one of the following statements about a PAN is false?
a) It mainly uses Bluetooth to connect components
b) It has a smaller range than a HAN
c) It needs a switch
d) It is a type of network that can work on batteries
4. (c) It needs a switch
5. What is the main purpose of a PAN, other than typical examples of its use?
5. To automate connections between mobile devices.
6. What are the two broad ways used to connect a HAN?
6. A HAN can be connected either via cable (wired) or via wireless technologies.
7. Your father wants to connect all the computers at home in a HAN using cables. He was told he
will need a NIC in each computer.
Explain to him what this means by outlining the function of a NIC and motivate whether he will
have go and buy some.
7. Each computer must have a NIC (Network Interface Controller) to connect the computers via
cable to the network. A NIC does not normally need to obtained separately, as it is usually built
into the device.
8. What types of wireless communication media are used to connect the various parts of the
internet?
8. Satellites, cellular technology and microwave

17
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

9. Explain why purchasing a switch will not help you share internet access in your home and list
the item that should be purchased.
9. A switch is just a device used to connect computers with the home network. It is not designed
or used for shared internet access. For that you will need a router which is a device designed to
allow one or more computers or devices in the HAN to connect to (share) the internet.
10. What are the two most common cabled methods to connect to the internet?
10. ADSL and Fibre
11. What does the term FTTH refer to? Do not just give the meaning of the acronym.
11. Fibre to the Home (FTTH) is the rolling out of fibre cables to homes and businesses for internet
connectivity.

18
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 2.3 The World Wide Web


1. Explain why some university faculties discourage their students from using Wikipedia as a
resource for research by referring to the general functioning of a wiki
1. A wiki is a website that allows for the collaborative (joint) creating and editing of web pages.
The core idea of a wiki is that anyone can contribute to it. Some faculties may feel that the
information given in articles may be inaccurate as they are not necessarily verified by
professional editors in individuals in that field.
2. During a web surfing session you saw an interesting site, but now when you want to go back to
it you cannot find it!
Describe how you might be able to find the site if you have not yet exited your browser.
2 Use the Back and Forward buttons of the browser takes you to pages you were previously
viewing. Alternatively, you could check the (recent) History which has a list of websites you
have accessed.
3. You are following the latest PSL soccer scores on a website but it only shows the half-time
scores and the matches are already over. What is the easiest way to get the final scores on your
computer?
3. Try refreshing the web page as it is probably an outdated (older) web page that is being
displayed.

19
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 2.4 Electronic communication


1. Your friend, Zola Smithies, works at an Albanian-based organisation whose website has a URL
of:
www.kompjuter.org.al
Give an example of an email address she might have, based on the URL given above.
1. [email protected], [email protected], [email protected]
etc.
2. The school’s secretary complains she has to add the email addresses of all fifteen members of
the school’s Governing Body every time she wants to send them an email.
Explain what a mailing list is and why it would be the best solution to use in this scenario.
2. A mailing list is a list of people’s email addresses grouped under a single name, and an email
sent to this mailing list will be sent to all the email addresses on that list. The secretary can
create the list (once), give it a ‘name’ and in future just send messages to the name of the list
and all fifteen members would be sent the email.
3. People are often divided about whether one should delete the original text in an email you are
replying to or forwarding. Give some motivated advice in this regard.
3. Decide if the content in the email (from the original message) is relevant or useful to have in
order to see the ‘thread of the conversation’ – if not, remove it.
4. Give two reasons why you should make your description in the Subject field of an email short
but meaningful.
4. So the recipient of the email can quickly see what the email is about without having to read the
entire email, and also for searching and sorting emails.
5. A friend said that she did not receive an email you said you had sent her.
How could you quickly check that you have sent it to the correct person?
5. Go to the Sent folder as it stores a copy of every email message that has been sent.
6. Why should be you be careful when using the Reply All option of an email system?
6. Using the Reply All option will send a reply to all the addresses which were included in the To
and Cc fields, i.e. to everybody who had received the original message. You may not want the
reply to go to or be seen by all these people.
7. Give two reasons why companies might block social networking sites in terms of saving money.
7. To reduce costs in terms of the use of bandwidth or data(‘cap’). Also employees can be less
productive as they end up ‘cyber-slacking’ where they spend too much time on these sites
instead of working. In addition, companies might face legal battles if employees gossip or
portray other companies in a bad light.

20
Study Opportunities — EXTRA ACTIVITIES Computers, part of your life – Grade 10, 2nd Edition

Module 2. 5 Safe internet use


1. You located a virus on your hard drive and removed it. Is it necessary to scan the flash drives
you used in this computer, if the virus has been removed from the hard drive?
Motivate your answer.
1. Yes, you should scan any portable media devices used on the computer. Viruses are written in
such a way as to try to reproduce or replicate themselves and spread to other computers. The
virus on the hard drive may have even originated from an infected flash drive.
2. The network administrator has disabled the autorun feature for flash drives on all the school’s
computers. Explain why she would have done this.
2. Flash drives can automatically run certain commands when they are inserted in a PC. This so-
called autorun feature is a prime means of activating and spreading viruses. It is good practice
disable this function.
3. Some people suggest that a Trojan is ‘less dangerous’ than viruses.
Motivate why this statement might be considered true
3. A Trojan is a destructive program disguised as a useful application. But, unlike viruses and
worms, Trojans do not reproduce themselves or infect other files. They also rely on you to
activate them.
4. Why so some e-mail messages end up in the spam folders of email systems even when they are
clearly not spam?
4. Most programs allow you to set up rules to filter out spam and automatically send it to a so-
called Junk or Spam folders. These rules can be based on words or text appearing in the content
of the email. It may just be that some words or text in the email triggered these rules and
caused the email to be diverted to the Spam folder.
5. Users are encouraged to type in the URL of the bank or e commerce website directly in the
address bar of your browser and not to click on a link in an email to go to these sites.
Would this help with pharming? Motivate your answer.
5. No, pharming occurs when a user is automatically redirected to another (fake) website even if
he/she types in the correct URL for the official website.

21

You might also like