Get 6112 - Comp Studies
Get 6112 - Comp Studies
2014
Purpose
To bring students to be in line with current trends, events and updates in information and
communication technology
Course Content
Aims , goals and objectives in computer education; Place of Computer Studies in
Secondary Schools Curriculum: Acquisition of basic knowledge, skills, and attitudes
necessary for a faster changing world; Analysis of Secondary Schools Computer Syllabus;
Lesson Plan preparation, Schemes of Work, Class Progress Reports etc; Methods and
Techniques of computer Mediated Instructions: Use and application of computers as a tool
that makes work easier, Students shall be exposed to the following applications: word
processors, spreadsheet, databases, graphic programmes, desktop publishing software, and
emphasis on laboratory software and hardware for scientific data collection; Collaborative
group work that allows students to study collaboratively will form part of teaching techniques;
Resources and facilities available for computer assisted instructions: Availability of the
following must be discussed. Both hardware and software devices, computer printers, printing
papers, storage devices, scanners, digital cameras, and their role in teaching learning process;
Design, Organization, Management, and Safety of the School computer Laboratories:
Keeping a breast with current development of ICT in order to advise administration on the
current requirements, correct value of the money in terms of costs involved, and procurement
procedures; Assessment and evaluation of computer assisted instructions.
Course Assessment
Examination - 70%; Continuous Assessments (Exercises and Tests) - 30%; Total - 100%
2
Table of Contents
INTRODUCTION, AIMS, GOALS AND OBJECTIVES OF COMPUTER EDUCATION; ...... 6
......................................................................................................................................................... 6
Introduction ................................................................................................................................. 6
ICT and Constructivism .............................................................................................................. 7
The future .................................................................................................................................. 10
Roles of ICT instruction............................................................................................................ 10
Goals and objectives of computer Education............................................................................ 12
INTERACTION FOR COMPUTER-AIDED LEARNING ......................................................... 16
Introduction ............................................................................................................................... 16
Theory ....................................................................................................................................... 18
Information Modes in human-computer interaction ................................................................. 19
Interaction - Tools and Learning Modes ................................................................................... 20
Navigation Methods and Learning Modes ................................................................................ 21
Feedback and Learning Modes ................................................................................................. 22
ROLE OF ICT IN LEARNER-CENTERED EDUCATION (LCE) ............................................ 25
Introduction ............................................................................................................................... 25
Importance Learner-Centered Education .................................................................................. 25
Teacher vs. Learner-Cantered Education .................................................................................. 27
Integration of ICT in LCE......................................................................................................... 28
Instructional Role of ICT .......................................................................................................... 29
The changing role of teacher in ICT based learning ................................................................. 30
What the teacher has to do in a learning cantered classroom? ................................................. 30
Learner-Cantered ICT Pedagogy: Theoretical Framework ...................................................... 31
....................................................................................................................................................... 31
APPLICATIONS USED IN CURRICULUM DEVELOPMENT AND INSTRUCTION
DELIVERY................................................................................................................................... 32
....................................................................................................................................................... 32
WORD PROCESSING ............................................................................................................. 32
Microsoft Word (MS-WORD).............................................................................................. 32
The Ms-Word Screen ............................................................................................................ 32
Creating, Saving and Closing Documents ............................................................................ 33
Formatting ............................................................................................................................. 34
Page Break ............................................................................................................................ 36
Editing Your Document ........................................................................................................ 37
3
To insert page numbers ......................................................................................................... 37
Columns ................................................................................................................................ 40
Mail Merging ........................................................................................................................ 41
SPREADSHEETS..................................................................................................................... 42
MICROSOFT EXCEL .......................................................................................................... 42
THE EXCEL WINDOW ...................................................................................................... 42
WORKING WITH WORKBOOKS AND WORKSHEETS ............................................... 45
ENTERING DATA .............................................................................................................. 46
FORMATTING A WORKSHEET ....................................................................................... 48
APPLYING BORDERS ....................................................................................................... 49
OPERATORS ....................................................................................................................... 50
WORKING WITH CHARTS ............................................................................................... 51
PRESENTATION GRAPHICS ................................................................................................ 53
MS POWERPOINT .............................................................................................................. 53
ADDING AND FORMATTING TEXT ............................................................................... 54
WORKING WITH DIFERENT VIEWS .............................................................................. 55
WORKING WITH OBJECTS .............................................................................................. 55
ANIMATION ....................................................................................................................... 56
SAVING A PRESENTATION ............................................................................................. 58
PRINTING ............................................................................................................................ 58
DATA MANAGEMENT SERVICES .......................................................................................... 60
....................................................................................................................................................... 60
Introduction: .............................................................................................................................. 60
Data Handling Infrastructure: ................................................................................................... 62
Knowledge Management: ......................................................................................................... 65
Application:............................................................................................................................... 66
Summary: ...................................................................................................................................... 69
INFORMATION AND COMMUNICATION TECHNOLOGY IN SECONDARY
EDUCATION ............................................................................................................................... 70
RATIONALE ............................................................................................................................ 70
TEACHING USING ICT ......................................................................................................... 70
ICT AS SUPPORT TOOL IN SECONDARY EDUCATION ................................................. 71
GENERIC COMPETENCIES FOR ICT .................................................................................. 73
Case Study ................................................................................................................................ 75
IMPLEMENTING COMPUTER MEDIATED COMMUNICATIONS IN THE CLASSROOM
....................................................................................................................................................... 77
Introduction ............................................................................................................................... 77
4
Blog or Weblog ......................................................................................................................... 77
Bulletin Board Systems (BBS) ................................................................................................. 78
Chat (Online Chat or Instant Relay Chat) ................................................................................. 79
Email ......................................................................................................................................... 79
Instant Messenger (or IM) ........................................................................................................ 80
Listservs .................................................................................................................................... 80
Virtual Learning Environments (VLE), Course Management System (CMS), or Learning
Support System (LSS)............................................................................................................... 81
Wiki........................................................................................................................................... 82
Scenario..................................................................................................................................... 82
Synchronous and Asynchronous Communication Technologies in the Learning Environment
................................................................................................................................................... 84
DESIGN, ORGANIZATION, MANAGEMENT, AND SAFETY OF THE SCHOOL
COMPUTER LABORATORIES ................................................................................................. 86
Introduction ............................................................................................................................... 86
Designing School Labs ............................................................................................................. 86
Organization of the computer lab ............................................................................................. 88
Strategies for Electronic Organization ...................................................................................... 91
Security ..................................................................................................................................... 94
Physical Security................................................................................................................... 94
Security Policy ...................................................................................................................... 95
Insurance ............................................................................................................................... 95
LEGAL AND ETHICAL ISSUES OF USING INFORMATION TECHNOLOGY IN A
CLASSROOM .............................................................................................................................. 97
Introduction ............................................................................................................................... 97
Technology and Ethics: Tips and Traps.................................................................................... 97
The Obligation to Use Technology ........................................................................................... 98
The Risks of Using Technology ............................................................................................... 99
..................................................................................................................................................... 105
MODERN TRENDS OF ICT IN EDUCATION........................................................................ 106
..................................................................................................................................................... 106
Introduction ............................................................................................................................. 106
Global Trends in ICT and Education are: ............................................................................... 106
References ................................................................................................................................... 109
Sample Paper 1 ........................................................................................................................... 111
Sample paper 2 ............................................................................................................................ 113
5
1. INTRODUCTION, AIMS, GOALS AND OBJECTIVES OF
COMPUTER EDUCATION;
Introduction
There is a new focus on the importance of learning with computers, as opposed to learning about
computers through integrating technologies, engaging students in ways not possible, creating
new learning and teaching possibilities, enhancing achievement and extending interactions with
local and global communities. In order to actualize the National Goals for Schooling and ICT,
the integration and inclusion of ICT has become mandated in all schools‘ syllabus for both
primary and secondary school students. The addition of ICT focused syllabus objectives and the
provision of increased student access to technology has resulted in the exponential growth of ICT
use in schools.
The rapid development of technology-mediated learning systems has led to a flood of utopian
promises involving "flexible delivery," "distance education" and "virtual learning." A range of
obstacles hampers the fulfilment of such promises, including technological, financial and social
constraints. These constraints limit the practicality of the glamorous visions of virtual learning
involving real-time distributed classrooms supported by high-bandwidth multi-party video
interaction. High-bandwidth networks will eventually be sufficiently ubiquitous to enable rich
virtual learning environments with equitable participation possibilities for proximate and remote
students, but current implementations are severely constrained by bandwidth and other
considerations.
6
A review of current trends and policies reveals that the contemporary practice for ICT inclusion
in educational policy, for both schools and higher education, is that of integration. The term
integration in relation to ICT in education appears ubiquitously in the literature. Fluck (2003)
defines the term integration with the degree to which ―ICT vanishes into the background of the
classroom learning activity‖. Lloyd (2006) suggests that the term ICT integration connotates a
wide variety of learning environments; from a single personal computer in the classroom to a
situation where the teaching is done by the computer through online applications. For Fluck and
Lloyd the integration of ICT is not a focus on the technology but more about the pedagogical
means through which the technology is employed in the classroom.
Such approaches to the use of ICT present a key fallacy and the notion of ICT integration is an
inaccurate description. Much of what is referred to as integration can more accurately be
described as transformation. There is a critical difference between ICT transformation that
describes change and its reasons, and ICT integration. Both come from differing paradigms with
different outcomes and directions. ‗Transformation‘ is more likely to imply change, particularly
with reference to teacher leadership and evidence of reflective practice. Integration on the other
hand can have the blending and coordinating function where the view is that ICT integration is
seen to ―seamlessly combine parts or elements into a complex but harmonious whole‖.
As the move towards ICT integration appears to continue to grow unabated, the more important
it becomes to examine the effectiveness of the technologically integrated learning process and
the transformation to the learning environment occurrence. In any educational environment it is
not a matter of simply using the technology, but evaluating how ICT is being used to foster
learning, for what purpose ICT is being integrated into the learning environment and assessing
its being utilized to enrich and essentially transform teaching and learning. In order for educators
to assess such pedagogical effectiveness there is a need to understand the constructivist
framework that currently dominates and underpins the transformational learning process.
ICT in education has always been heavily influenced by constructivism. Constructivism in the
ICT classroom is having students interact positively with others and self-facilitating the
procurement of their own knowledge. It is a shift away from instructivism, whereby students
participate in the direct instruction of technical knowledge with the primary focus of acquiring
specific application based skills, towards a constructivist approach where the purpose is in
7
utilizing student knowledge and skills in a more meaningful way. Meaningful learning is a
process brought about due to the nature of familiarity a student has with ICT and the
participation in experiences such as those supported through the ―active, constructive,
collaborative, intentional, complex, contextual, conversational, and reflective‖ characteristics of
the constructivist learning experience. The result is that a student is able to play a far more
vigorous role in their learning; from the traditional passive recipient to a more active learner,
where the learner is able to establish clear ideas and appropriate personal goals that drive the
student to search, create, adapt and overcome obstacles in order to meet these goals (Margules,
1996).
Reimann and Goodyear (2004) further testify that pedagogy and the integration of ICT are
underpinned by the school environment and the teachers‘ knowledge, beliefs and actions. What
is of significant importance in this framework is not on the ICT, but more so in how the ICT is
used in the classroom. This framework is characterized by the inclusion of authentic, real-world
learning experiences through the following pedagogies:
a) problem-oriented and
b) case-oriented,
c) inquiry-oriented,
d) design, modelling and construction- oriented,
e) Knowledge-building and immersive learning pedagogies.
Dias and Atkinson (2001) support this model by stating that the transformational integration of
technology has very little to do with technology itself and everything to do with teaching.
Teachers have also been identified as having a crucial role in the adoption and implementation of
ICT into the curriculum. If the potential of ICT is to be realized into education then, as in any
other profession, teachers must play a number of roles:
8
This notion is further supported by the MCEETYA (2005) Report Learning in an Online World
that makes the recommendation to all Australian teachers to integrate ICT in learning and
teaching by focusing on learning improvement, classroom and school transformation, addressing
the multiple, interactive dimensions of ICT use, listening to and empowering students, providing
tools to evaluate levels of integration of ICT in learning, improving personal learning plan
efficiency and developing collaborative networks.
As part of the facilitation of the ―Strategic plan for computer teaching and learning‖, the schools
have stressed the importance of student-centered learning where the focus is on a shift of
emphasis in responsibility from teacher to student. To effectively implement these plans the
School of Education has adopted key strategies in teaching and learning. The Schools promote
general characteristics of effective learning, such as:
(i) having clear learning goals and a wide repertoire of learning strategies,
(ii) using available resources effectively, and
(iii) Understanding the learning process that emphasizes planning, monitoring, evaluating
and adaptive learning processes. In support of these the Schools have embraced the principles
that describe characteristics of a high quality learning design in higher education from a
learning perspective.
Learning design needs to address the following four principles in order for the potential of high
quality learning to be realized
Engage learners by considering learners‘ prior knowledge and their desires and building
on their expectations.
Acknowledge the learning context by considering how the implementation of the learning
design (be it a one class session, over the period of a few weeks, or the entire subject) is
positioned within the broader program of study for the learner.
9
Provide practice by encouraging learners to articulate and demonstrate to themselves and
their peers what they are learning.
The future
This combination of approaches with the use of the Virtual School, LAMS and TLC, in addition
to e-learning tools in the LMS has been an excellent strategy for the use of ICT. It is perceived to
be high on relevance and thus promoting engagement amongst students in the early units of their
studies. It has stimulated students to think deeply about children in context and about
developmental theory. It is evident that the integration of ICT has occurred within these units,
however, the changes undergone through the restructuring of the educational units, content,
assessment and most importantly pedagogy can only be described as transformational.
There is need to provide the trainees with a holistic experience of the various roles of IT
instruction so that they could learn through experience of computers, instead of talking about it.
Before the commencement of the module, the trainees were asked to sign up for their tutorial
groups via online web-based registration, saving them time and effort to register physically. The
results of groupings were also announced through the Web. It was a stark contrast to previous
practice of physical registration, which was stressful for both the trainees and the module
coordinator.
Using the computer as a presentation tool is perhaps one of the most common applications of IT
in instruction. During our direct instruction, multimedia presentations were commonly used,
including instructor-prepared Microsoft PowerPoint slides, Web-based materials and video clips
on CD-ROMs. Each tutor‘s computer was linked to a video/data projector for projection onto a
large white-matte screen.
10
basic visual design principles and tired to apply the theories learned by designing a few
PowerPoint slides. The slides were then shared with and critiqued by fellow trainees.
Computer as a Tutor
Using the computer as a tutor is primarily based on the cognitivist theory of learning. This mode
of instruction uses the computer to mimic the instructor in providing information, structuring
learning activities, and in providing guidance and feedback. The Ministry of Education provides
schools with funds to purchase instructional software, as well as information about software
relevant to the local curriculum. It is thus important to impart to our trainees the necessary skills
to harness the existing IT resources in classroom instruction.
The above examples of using the computer as an administrative or presentation tool helps to
enhance productivity and efficiency of work. Moving beyond using computers as efficiency
tools, we also used the computer as a cognitive tool. It is different from using the computer as a
tutor, as it involves active construction of an artifact, in the form of computer-based product, by
the learners. The computer becomes a mediating tool, facilitating the learners in the process of
generating ideas and representing knowledge. Through this approach, the learners will assume a
more active role in learning; actively searching and analyzing information in order to complete
the task instead of depending on the teacher to feed the information. The learner might also be
more motivated, taking ownership in constructing his or her knowledge.
11
Goals and objectives of computer Education
Computers can support the variety of ways learners construct their own understanding.
Students who gather information from the Internet can be self-directed and independent.
They can choose what sources to examine and what connections to pursue. Depending on
the parameters set by teachers, the students may be in complete control of their topics and
their explorations.
Students can work through a computer-based activity at their own pace. Rather than 25
individuals working together on one activity, technology allows independent completion of
work. Those who begin to fall behind can receive an instructor's individualized attention
while others can begin to tackle more complex tasks.
Computer software can mix text, pictures, sound, and motion to provide a variety of options
for learners. Multimedia software will not be the only classroom resource, but it can
contribute richness and variety to student work.
Students can build on their own understanding by using computers as resource tools, as
work stations for individual learning, or as communication channels to share their ideas
with other learners. Individual understanding and experiences must be shared and compared
to curriculum content. By uncovering students' individual understandings, teachers can
determine the influence of students' prior knowledge and further their education through
new experience.
12
check our understanding. In another reflective application, teachers can enlist computers as
authoring tools for students' journals which are excellent vehicles for thoughtful
examination of experience.
Introducing technology into the learning environment can encourage cooperative learning
and student collaboration. If they are allowed to converse, most students like to talk about
their computer work and share their strategies. Classroom activities that are structured so
that computers encourage collaboration build on learners' desire to communicate and share
their understanding. It takes planning and intervention to build successful cooperative
groups with or without computers, but groups that use computers as teamwork tools have a
better start toward collaborative work.
The use of real world tools, relevant experiences, and meaningful data inject a sense of
purpose to classroom activity. Part of the mission of educational institutions is to produce
workforce-ready graduates who can, among other things, manipulate and analyze raw data,
critically evaluate information, and operate hardware and software. This technological
literacy imparts a very important set of vocational skills that will serve students well in the
working world.
13
a traditional, non-technological classroom.
Students in technology-supported classrooms are armed with powerful tools to help them
gather information, consult with colleagues, and present their findings. Their autonomy and
confidence increase as they rely less on their teacher and more on their own initiative for
knowledge-creation. Technology enables students to manipulate information in a manner
that accelerates both understanding and the progression of higher-order thinking skills. As
students gather more real-world data, share their findings with learners beyond their school,
and publish their findings to the world, their role broadens from investigators of other
products to designers, authors, purveyors, and publishers of their own work.
Technology amplifies the resources teachers can offer their students. Rather than relying
on the textbook for content, computers can provide on-line access to content experts and
up-to-date information from original sources. Reference materials on CD-ROMs and
curriculum assistance from high quality software offer many more resource opportunities
than most classrooms or school libraries could provide.
The depth and breadth of such information poses its own challenge. Internet content is
less structured and manageable than material outlined by a textbook. Students will need
to question and evaluate the information they find. There are many Internet sites that offer
raw data--pictures from space, numbers from the census, text from court testimony. These
kinds of resources need context to provide meaning, and lessons should include
components that help students use the information wisely and productively.
Information from the Internet is more dynamic than the printed word. Teachers who
understand the medium will use its currency and authenticity to their advantage. Along
the way they will find an added bonus from such an environment--they become learners
as well.
14
It may seem daunting to begin incorporating computers into your classroom. Yet many
teachers have done so with great success. Although there is no blueprint for getting started,
the following suggestions may serve as useful initial steps for introducing technology into
the classroom.
Maintain modest goals. Although a powerful learning tool, technology is not a panacea for
all that ails a classroom. When introducing computers in your classroom, start with a small
task such as supplementing research with some Internet resources or having students word
process (rather than handwrite) a report. As you begin to feel comfortable you can increase
your repertoire of computer-supported classroom activities.
Have a backup plan. Backup plans, always a necessity, are even more crucial when using
technology. What can you do if the Internet site is down or the CD-ROM drive gets stuck?
How can such glitches be used as learning experiences?
Ask for help. For many teachers who started their careers before the dawn of the
Information Age, understanding computers seems difficult. Learning technology, however,
is easier than it appears. It just takes time. Don't let difficulties with software get you down
or deter you from tapping technology's true potential. There are lots of experienced
educators around. Ask for their help!
Learn from and with your students. Many students have grown up around technology
and feel comfortable with it. Don't be embarrassed that they may know more about
technology than you do. Welcome opportunities to learn from them
References
15
Bransford, J. (2000). How people learn: brain, mind, experience, and school (Expanded
ed.). Washington, D.C.: National Academy Press
Bullen, M., & Janes, D. P. (2007). Making the transition to e-learning: strategies and
issues. Hershey PA: Information Science
Dias, L., & Atkinson, S. (2001). Technology integration - best practices - Where do
teachers stand?
Finger, G., Russell, G., Jamieson-Proctor, R., & Russell, N. (2007). Transforming
Introduction
Today, computing power is no longer a limitation for implementation of learning tools. The
problem has moved from how to implement to what tools to implement and why. Current
research on computer aided learning (CAL) is very focused on how to represent the learning
content and tends to neglect the impact of the user-interface in the learning process. An
integration of interface design with the representation of the learning content is important.
Interface design can be theory driven (the particular theory may be task related) or based on
human centered design principles. In the first case, theory guides implementation as, for
16
example, in Gibson‘s perceptual approach; the constructivist approach; the activity theory; or the
information processing approach, a theory of implicit and explicit learning. The second case, i.e.
the human centered design approach, strives for an interface that is attractive, easy and effective
for the users. The desktop metaphor is a typical product of this approach. Other tasks that take
advantage of this approach are file manipulation, text editing, or use of public automats (e.g.
information kiosks, ticket vending machines, etc.). Although this approach also makes use of
knowledge from different cognitive theories, research in this field is often characterized by
comparative heuristic studies where particular interface features are tested for efficiency and
satisfaction.
Complex computer mediated problem solving can take great advantage of interfaces that are
designed from considerations that run deeper than simple user friendliness. The human centered
design approach is not enough when an interface must support a task that goes beyond desktop
handling. In complex tasks among them:
a) computer-aided learning,
b) computer-aided design,
c) programming or process control
The user interface affect the cognitive processes related to learning and problem solving.
Human-computer interaction is a complex domain in which information can be channeled
through the human information processing system in subtle ways.
The theory is the key to the cognitive measures and user centered design providing the
framework for measures about satisfaction and efficiency. A comparison of the user centered
approach with the theoretical approach show that a consequent application of one of the
approaches would result in different suggestions for interaction design. In general, the theoretical
approach resulted in interfaces that improved learning performance, but these interfaces are not
necessarily most time effective. On the other hand, the application of user-centered design
principles resulted in interfaces that benefited from shorter task solving times and higher
satisfaction, but this is at the cost of the learning performance. A combination of both design
principles would aim at defining interfaces supporting both high performance and high
satisfaction.
17
Theory
Implicit and Explicit Learning
The application of theory in the interface design process enables us to understand interaction in a
wider context and to include task related factors in the interaction concept. In the series of
experiments reported here, we employed a theory of implicit and explicit learning. The theory
was applied to different ways of communicating information in human-computer interaction; i.e.
through various interaction tools, navigation methods and feedback forms. Different human-
computer interaction factors become a part of the information process in CAL. The theory of
implicit and explicit learning helps us to understand how this complex information process takes
place.
There is increasing evidence that people can learn in two different modes. An explicit learning
mode is characterized by rational, selective and conscious attention. Explicit learning implies
observing a manageable number of variables from the environment and keeping count only of
the contingencies between those variables. This learning mode is more demanding for the
cognitive system. People who learn explicitly seem to do so by developing a mental model of the
problem, which can be consulted, manipulated and communicated. It is this type of learning that
we normally refer to as problem solving. Implicit learning is an unconscious process that yields
abstract knowledge. Implicit learning is similar to trial and error learning. It implies storing all
the contingencies between all the variables at play. Reber defines implicit learning as "a general,
modal-free process, a fundamental operation whereby critical co-variations in the stimulus
environment are picked up.
The success of employing one of these modes depends on characteristics of the problem or the
learning task. Every learning task or problem has a structure or rules, which essentially influence
how the task should be solved and which solutions should be attempted. The task saliency refers
to how obvious the rules or the structure are. The saliency (or complexity) of a problem is, in this
research tradition, defined as the essential problem feature accounting for success when learning
in one of the two modes. Saliency is defined by the degree to which the critical features of the
stimulus material are obvious to the subjects, and by the amount of information that needs to be
considered. These two factors are related: the more features that need to be considered, the less
salient is the problem because it is more difficult to keep track of the critical features. The
saliency of a problem increases if the number of irrelevant factors in the situation is low, or if the
key events are in accordance with general knowledge from outside the problem. One example is
18
given by Reber. They developed an artificial language consisting of strings of letters. Only
certain combinations of the letters would follow the rules of the artificial grammar. In the salient
condition, the letter strings were organized in columns so that each column represented one
underlying stimulus type (grammatical rule). In the non-salient condition the letter strings were
shown randomly. After observing the letter strings, the subjects were shown new strings and
asked to identify those that were grammatically correct.
The learning modes can be induced relatively easily by external factors. In Reber's research, a
learning mode could be induced in the subjects by means of the instructions. If subjects were told
to search for rules in an artificial language, they would learn in an explicit mode. If the subjects
were led to believe that there were no rules governing the stimulus, they would learn in an
implicit mode. Instructions to search for rules that underlay less salient stimulus material had a
detrimental impact on the subjects' ability to learn about the structure. Explicit search for rules
produced a strong tendency for subjects to induce or invent rules, which were not accurate
representations of the stimulus structure. Subjects who, by instruction, were induced to learn in
an implicit mode were able to memorize exemplars of the stimulus structure better.
According to the theory, the ideal combination of problem saliency and learning mode would be
to learn in an explicit mode if the problem is salient and to learn in an implicit mode if the
problem is not salient. The implication of these findings is that people should be induced to learn
in a mode that corresponds to the problem saliency.
Clearly, this theory is highly relevant for human-computer interaction design if it can be shown
that different user-interfaces can induce the two learning modes. Hence, the motivation for the
research presented in this paper was to apply the theory to human-computer interaction.
19
analyse how both hardware and software aspects of the user-interface are integrated in the
information processing of complex learning tasks.
Various interaction tools can induce different learning modes. Some interaction tools require the
user to interact directly with the objects of interest (e.g. by directly controlling graphical objects
with a mouse). Other interaction tools demand that the user interact by intermediary actions, e.g.
by typing commands. Figure 1 shows an interface in which an augmented reality technique
incorporates real and virtual objects. The users can "grasp" the virtual objects, which are
projected on a normal desktop surface, with a brick.
When the cognitive impact of two given interaction tools differs enough, different learning
modes can be induced. Recent research shows that a user interface radically can influence the
way people learn by means of a computer. Our research shows that these findings also apply to
different interaction tools. An interaction tool, which induces a learning mode, also has
consequences for the learning performance. For example, interaction tools that increase the
cognitive load on students when learning (e.g. by demanding the user‘s type commands in order
to interact), can induce an explicit learning style. Interaction tools implying little cognitive load
on the users, such as interaction by direct manipulation with graphical objects, tend to induce a
more implicit, trial and error learning mode. The success of learning a certain task is closely
linked to the chosen learning strategy, due to some strategies being more powerful than others
(e.g. the success of implicit and explicit learning modes depends on the task saliency).
20
Consequently, the interaction tool can play a major role in successful learning by supporting or
inhibiting certain strategies.
CAL applications demand several kinds of user navigation methods. The navigation strategy is to
some extent defined by the characteristics of the learning system. There are many methods of
moving between different states, pages or masks in a program. The program can apply one or
more methods, and this will have an impact on how the information will be perceived. The
navigation strategy also influences the knowledge acquisition, depending on whether an implicit
or an explicit navigation strategy can be induced by the navigation tool. Navigation in a free
structured system (e.g. hypertext) can support an implicit learning strategy, because the structure
supports spontaneous and unstructured movements (and also because such systems often are
highly unsalient). Browsing is an example of an implicit navigation strategy. The
hypertext/media based structure of Internet supports navigation by browsing. Browsing is a way
of seeking new information; the information can be unknown, but anticipated. Browsing is a
member of a set of information seeking activities, or strategies, best suited to covering a large
and complex area without going into too much detail. Browsing has associative activities of
exploring, scanning and extending. The purpose of browsing may be quite implicit or tacit in the
understanding of the searcher.
Simulations are similar to hypertext/media systems in that there is no pre-defined structure of the
action sequences. Simulations that incorporate spatial movements, e.g. between rooms in a
virtual building, must implement navigation methods and tools, which enable users to walk
around. However, because many simulations are characterized by a more tacit change of states
depending on the user actions, the aspects of navigation are different from browsing. Hence,
operating a simulation is neither browsing nor non-browsing. In simulations demonstrating
complex relationships, navigation becomes a matter of selecting the right cognitive strategy for
the optimal sequence of actions. The knowledge discovery comes gradually by induction, where
in hypermedia systems the knowledge may be explicitly presented on one node.
Simulations that incorporate spatial movements, e.g. between rooms in a virtual building, must
implement navigation methods and tools, which enable users to walk around.
21
Non-browsing is more purposeful and focused than browsing. It is more concerned with having a
model of what might be possible and exploring options to see which meets chosen criteria. One
example is navigation in a structured environment, when people move linearly between pages in
a computer-based training program (CBT).) CBT programs often use some kind of a book
metaphor, in that the learning material is presented in chapters to be studied in a certain order.
This can support an explicit learning strategy because such systems reduce the orientation load
and free more attention for the information content. Most computer-based training applications
support non-browsing navigation. In such environments the navigation is supported by a
structured system. The students are supposed to navigate through the learning material in a
structured way; for example, buttons bring the user pages forward or backwards. This kind of
navigation was typical for Hypercard© applications. Non-browsing strategies can also be
employed in a hypertext/media system by users who apply an explicit search strategy to consider
the search activities consciously. This can be achieved by purposeful use of available navigation
aids like histories or guided tours. Such navigation aids can serve as cognitive tools, i.e. by
helping users to follow a structured search strategy. An example of a history used as a cognitive
tool is shown in Figure 4.
Feedback about learning performance is closely related to how the information is presented. Both
the feedback content (i.e. information about the learning performance) and the feedback form
(i.e. how the information is presented) are relevant. Different forms and content of feedback are
shown in Table 1. In the following, we will describe in more detail the feedback forms employed
in our research.
Visual feedback can be direct or indirect. Direct visual feedback occurs when an action
immediately causes a reaction of the program: e.g. a window opens by starting a program, or the
scroll bar in a text window scrolls the text. Visual feedback is one of the most powerful effects in
simulation-based learning. Interactive simulations can give continuous visual feedback about the
effects of different actions in the system. Interaction with graphical interfaces by direct
manipulation implies continuous visual feedback about the location and state of objects. This
feedback contains indirect information that supports continuous reflections of the ongoing
22
actions. The students interpret the new states of the simulation based on their actions; hence, a
series of actions (conscious and purposely or implicit and intuitively) can follow.
Approach
Auditory
Cognitive (indirect)
With increasing processing power, continuous feedback to the user is appealing. The effect of
this kind of feedback was investigated in experiment 5, referred to below. An effect of feedback
in this case not only would be related to aspects of the feedback itself, but also would indicate
the degree to which users are influenced by apparently unimportant interface aspects in general.
23
Two actual examples from commercial software illustrate different forms of subtle feedback.
The two examples represent continuous and discontinuous methods of feedback respectively:
1. A graphics editor, such as Adobe Photoshop, offers filtering options, which are operated
by dialogue boxes. In the dialogue box, different parameters can be changed interactively
by moving small handlers on a bar. The effect of a change can often be seen instantly in a
small preview box. This gives the user an immediate impression of the effect of such a
change.
2. The use of 3D programs often involves the following situation: when rotating a three-
dimensional object, the user is actually manipulating a simple copy of the object, i.e. a
'bounding box'. The object rotated to the new position is not shown until the rotation is
finished.
From a pedagogical point of view, different feedback content represents an important feature of a
CAL system. Verbal forms of feedback communicate direct messages and are, therefore, closely
linked to content feedback. Response feedback provides an evaluation of the appropriateness of
an action. Approach feedback relates to the chosen task solving strategy. It is realistic for simple
tasks with few parameters. It is more complex to design approach feedback for complex tasks.
Motivation feedback is intended to increase the effort put into learning. Source of motivation is
an individual matter; thus, many factors may have an influence. It is important to analyses
carefully what motivates the target group of a learning program before deciding what to
implement. Many effects can serve as cognitive feedback depending on the teaching strategy.
Cognitive feedback is involved in all interactions with a system in which the students can
observe the consequences of their own actions. In particular visual feedback in simulations can
have great impact on the learning performance, by either explicitly or implicitly contributing to
knowledge acquisition. Simulation promotes much indirect cognitive feedback; in fact, the idea
is not based on instruction, but on letting the students implicitly unveiling the learning goals.
24
ROLE OF ICT IN LEARNER-CENTERED
EDUCATION (LCE)
Learning Objectives for the Topic
At the end of the lesson, the learner should be able to;
Define Learner-Centered Education
Differentiate the Teacher vs. Learner-Centered Education
Discuss the Integration of ICT in LCE
Introduction
The Learner-Centered Education (LCE) focuses on both teacher‘s and learner‘s
experiences. It helps to motivate teaching, learning and its achievement. ICT can be exploited to
enhance the integration of the learning centered principles by supporting the learners and
teacher‘s need and capabilities while promoting creative and critical thinking. Teachers must
advance in their methods of instruction and knowledge of technology to support the individual
learner in learner-centered frame work.
Informed educators are rapidly adopting Learner-Centered Education for the classes they
teach because the students are benefiting in a number of ways: students are more actively
engaged with the subject, they are more motivated as learners, and they learn more skills,
including discipline knowledge and collaborative and communication skills. Faculties who
employ LCE interact more closely and richly with their students, thereby developing a clearer
picture of student understanding. Faculty guidance and feedback to students is thus better
informed and more appropriately aimed. There is little question among informed educators that
getting students actively engaged in a well-designed LCE classroom environment facilitates
learning better than do teacher-centered classrooms.
25
1. The role of the educator shifts. No longer is the teacher simply someone who stands at
the front of the room imparting knowledge on students. Instead, the instructor works as
an educational architect and facilitator.
2. Students assume responsibility for their own learning. The educator and student work
together to decide on appropriate coursework and evaluation. It is the student‘s job to
follow through with these choices.
3. Rather than revolving around content, the learner-centered classroom centers
around learning processes. These are meta-cognitive skills that the student can apply in
any educational scenario. Therefore the student is more likely to attain success in a new
educational environment.
4. The student is no longer a passive “receptacle” for the teacher’s knowledge. Instead,
the student becomes an active part of the learning process, and may even assist in
teaching his or her classmates.
5. The learner-centered classroom provides an emphasis upon higher-order thinking
skills, such as the ability to judge and evaluate. Students who master these skills are
better able to assimilate new information and apply it to different situations.
6. In addition to gaining a strong knowledge base, students develop learning skills and
self-awareness. Because they must make decisions along with their instructors, they
must pay attention to how they learn best, evaluate their own strengths and weaknesses,
and act accordingly.
7. Students learn self-advocacy skills. They have to articulate their needs on a regular
basis. This practice means that they not only get better at expressing themselves, but they
also learn how to communicate appropriately and effectively with a wide variety of
people, from fellow students to instructors.
8. Reluctant learners are more motivated to participate in their own education, since
their stake in the process is clearly defined. Because they can steer themselves toward
curriculum that they find interesting and rewarding, such reluctant students become more
enthusiastic learners.
9. The learner-centered classroom provides a built-in system for accommodating
different learning styles or specific challenges. Because the learner-centered classroom
offers a tailored program for each student, special needs like ADD/ADHD or specific
learning disabilities can be addressed seamlessly and effectively.
26
10. Students in the learner-centered classroom feel significant as individuals, since their
opinions and viewpoints are an integral part of their classroom experiences. This
aspect of the learner-centered environment is particularly significant to troubled
teenagers, who often have less sense of self-worth than their peers.
Using this model, students demonstrate improvement in motivation, learning, and achievement.
Ultimately, the learner-centered classroom has a higher rate of student retention, and students are
better prepared for success outside the classroom.
Teacher-Centered Learner-Centered
Focus is on language forms and structures Focus is on language use in typical situations (how
(what the instructor knows about the students will use the language)
language)
Instructor talks; students listen Instructor models; students interact with instructor
and one another
Instructor monitors and corrects every Students talk without constant instructor
student utterance monitoring; instructor provides
feedback/correction when questions arise
Instructor answers students‘ questions about Students answer each other‘s questions, using
language instructor as an information resource
Instructor evaluates student learning Students evaluate their own learning; instructor
also evaluates
27
Classroom activity is Didactic Classroom activity is Interactive
Teachers controls and directs all the aspects Teacher gives students more options and
of learning responsibilities for their own learning
28
2. To divide such task in categories and sub-categories
Technology can support ―learning centered‖ principles in two main facts researching and
creating an authentic product for assessment. The internet provides an unrestricted number of
sources of information and data on most topics. Web pages are a popular form. Documents,
studio presentations, video animations, web movies, digital camera images and excel spread
sheets. Thus all products should here be technology based.
The above flow chart shows that ICT approach on LCE focuses upon all the aspects of
teaching and learning. The four quadrants of the chart contain the specific planning steps, each of
which is necessary and important. The charts provide more significance on both teacher and
learner. Thus, the LCE can answer any questions
regarding teaching-learning process. It gives
1.GOALS
technological explanations also. Objectives
29
The changing role of teacher in ICT based learning
In the traditional teaching-learning situation, the relation between the teacher and the pupil is
frontal-the role of teacher is to deliver knowledge to the pupil. There is some co-operation
among pupils. Teachers do not possess adequate knowledge and skills for the effective
collaboration of ICTs.
Traditional Teacher-Pupil Relationship
TEACHER
Knowledge Knowledge
Transmission Transmission
Co-operation
PUPIL PUPIL
For effective education, it is essential that there be more opportunities for student
participation in the learning process, more team work, more self-study and self-evaluation, as
well as more peer evaluation and less examination oriented teaching and learning. It is felt that
ICTs can assist in promoting more learner-centered and interactive learning.
INFORMATION
Knowledge
PUPIL RESOURCES
Constructio
n
PUPIL
The new technologies have enormous potential to revolutionize education. It is obvious
that the monopolies enjoyed by schools as formal education providers will diminish.
A teacher has to use many techniques in the teaching process. For example, he may:
30
1. prompt students to formulate their own questions (inquiry)
2. allow multiple interpretations and expressions of learning (multiple intelligences)
3. encourage group work and the use of peers as resources (collaborative learning)
The design of a learner-centered ICT teaching method depends on the chosen theoretical
framework. The framework supports the designers‘ work, forming the foundation for
implementation, evaluation, and research. The theoretical framework is developed in four steps:
1) Defining the psychological foundations of the learning-centered ICT teaching method
based on learning theories and the learning cycle.
2) Specifying the underlying pedagogical principles of the learner-centered ICT teaching
method.
3) Re-conceptualizing pedagogical principles of the ICT teaching method within learning
theories and the learning cycle.
4) Defining the contextual factors influencing the use of the learner-centered ICT teaching
method in secondary schools.
References
Oberoi, S.C., (2004). Educational Technology. New Delhi: Arya Book Depot.
Sharma, R.A., (2004). Educational Technology and Management. Meerat: Surya
Publications.
Barak, M. (2006). Instructional principles for fostering learning with ICT: Teachers‘
perspectives as learners and instructors. Education and Information Technologies, 11,
121-135.
31
APPLICATIONS USED IN CURRICULUM DEVELOPMENT
AND INSTRUCTION DELIVERY
WORD PROCESSING
Ms Word is a powerful word processing program that helps the user create, edit, format and save
documents.
Loading Ms-Word
Loading can also be achieved by clicking the Ms Word icon on the Microsoft shortcut bar (only
if it is available)
The Ms Word screen contains various features. The common ones are:
1. TITLE BAR: This bears the name of the application followed by the name of the current
document or the file.
2. OFFICE BUTTON: It contains commands such as new for creating a new file, open, save,
save as etc and commonly used commands.
3. TABS: There are seven tabs in word 2007, Home, insert, page layout, references, mailings,
review, view each of them has a ribbon with a set of commands.
32
Ms-Word Screen
When the program starts, the following document window will be displayed on the screen.
Creating
Option 1
1. From the office button, click New then double click the Blank Document icon.
Saving
To save a new document
Closing
he Ms- Word desktop or
Formatting
To bold text
click bold.
To Italicize text
To underline text
ont size.
34
To change the font color
elect the text.
Formatting Paragraphs
Word displays text, as it will appear when printed.
Aligning text
35
Change case
Page Break
1. Position the cursor where you want the page break to appear.
2. From the insert tab click on page break.
Add a background
You can add different backgrounds to Word documents.
1. On the home tab, point to background and then check the color you want or click more colors
to see additional color choices. Click fill effects for special effects such as textures.
2. Select the option that you want.
Note: To remove a background, click NO FILL option.
Using SmartArt
36
This feature enables you to create visually compelling text affects e.g. slanting, curving text in a
document.
1. From the insert tab, select SmartArt and click the smart art graphic desired.
Shapes
The insert tab has a variety of features used to create different shapes in a document.
1. From the shapes icon, select a tool that you will use to draw a certain shape e.g. a rectangle.
2. Click and drag to the desired position.
Insert a picture
You can insert a clip art or a picture from the clip Gallery.
1. Position the insertion point(cursor) where you want to insert a clip art or a picture.
2. From the Insert tab, click the clip art icon.
3. Click a clip art category then choose a clipart and click insert clip.
To resize the objects
1. Click inside the object i.e. clipart, word art or a drawing.
2. Position the mouse pointer in either of the placeholders.
3. Click and drag to the desired size.
4. Release the mouse button.
To undo mistakes
Next to the office button, clicks undo or click the Undo button.
To undo several actions
1. Click the arrow next to the Undo button to see a list of the most recent actions.
2. Click the action you want to undo. If you don‘t see the action, scroll through the list.
rom the header to the footer by clicking the switch button to move to the
footer
Click close button to return to the document
To remove a header /footer - refer to removing page numbers
Copying and Pasting Text
An existing piece of text may be required in a different document. Ms Word allows the user to
copy this text rather than retype then paste it to the required area. When text or graphic is copied
or cut, it is stored in the clipboard and can be pasted into as many documents as desired.
To copy and paste text
elect the text to copy
Moving text
Select the text to move
on on the home tab.
Note: When you cut, the text is completely removed from the original location.
To spell check a Document
ng and Grammar… on the review tab
38
To find text
g sought
To Replace Text
39
1. In the insert tab click table.
2. In the no. of columns box enter the number of columns.
3. In the no of rows box enter the number of rows.
4. Click Ok.
Creating a table with a different format
1. In the insert tab click table
2. Choose a table format of your choice under quick tables
3. Click Ok.
Merging cells in a tab
1. Select the cells to be merged.
2. Right click to see the merge cells option.
Splitting the cells
1. Select cell to be split
2. From the shortcut menu obtained by right clicking choose split cells
3. Type the number of columns and rows each cell is to be cell spitted
To delete rows and columns in a table
1. Select the row or the column to be deleted
2. From the shortcut menu choose deleted cells
3. In the deleted cell dialog box choose an option i.e. entire row or column
4. Click Ok
Adjusting column width
1. Position the mouse pointer over the column boundary until it changes shape
2. Drag the column boundary to the right or left
Adding rows to a table
1. Select the row to row as above which you want to insert a new row
2. From the table menu choose insert cells
3. In the insert cells dialog box choose an option e.g. insert the entire row.
4. Click Ok.
To delete cells in a table
1. Select the cells you want to delete
2. From the layout tab choose the delete cells option
Columns
40
Newspaper style columns
You can format text into multiple newspaper style columns. This is best applied when creating
documents like newspaper, newsletters or brochures.
Option 1
Using the columns button on the page layout tab
1. Highlight the text to be columned.
2. Select the number of columns you want.
Templates
A template is a document that contains predefined settings. The use of templates ensures that
there is consistency between documents.
1. From the office menu choose new.
2. Click on the relevant tab depending on the type of document you want to create e.g. letters and
faxes, legal document, menus etc.
3. Select the template that you want to use.
4. Click Ok.
5. Delete the default text and type your own.
To Print a Document
1. From the office menu, click print.
2. In the name box select a printer.
3. Choose an option for the number of pages to be printed i.e.
ALL: -Prints the entire document
CURRENT PAGE: -prints the current page
PAGE: -you can select certain pages within a document
4. .In the number of copies box, specify the number of copies you want in each page.
5. Click Ok.
Mail Merging
If you had to type the same form letter 100 times, you know what boring and back breaking work
it can be. Never again, by setting up the form letter as a Ms Word merge documents, you need
type the letter only once.
STEP 1
1. From the mailings tab click Mail Merge and choose letters
STEP 2
41
Select recipients
One can select from an existing file or by creating a new data source
Creating a new data source
1. Choose get data type new list
2. Create data source dialogue appear as shown below
3. Remove the fields not needed and / or create new field
4. When you have finish creating the fields click ok
5. Type the data to be stored
STEP 3
1. Place the cursor to position of field insertion
2. From the mail merge toolbar click insert merge field
3. Repeat field insertion until all the fields have been inserted
4. Choose Finnish merge
SPREADSHEETS
Spreadsheets are application packages used for manipulation of figures. A spreadsheet usually
consists of a series of rows and columns. The figures or text are inserted into cells. Examples
include Ms Excel, Lotus 1-2-3, Supercalc, Quattro Pro.From the examples given, we shall tackle
Ms Excel.
Applications of Spreadsheets
1. Can be used to record sales, produce invoices and compile statements.
2. Researchers can compile and analyze their results.
3. Teachers can compile their students‘ marks and produce overall results.
4. Clerks and secretaries can easily create tables of figures and manipulate.
MICROSOFT EXCEL
START EXCEL
Option 1
Click the start button moves to programs move to Microsoft excel and click
Option 2
Click the excel button on the Microsoft shortcut if only if the option available
42
Window
When you work in Excel, you use workbook files to hold your information. Each workbook
consists of several worksheets made up rows and columns of information.
A workbook therefore allows you to organize various kinks of related information in a single file
(or workbook)
Worksheet
A worksheet is one sheet in an Excel workbook. Each worksheet consists of 256 columns and
65,536 rows.
Columns
Columns are the vertical divisions of a worksheet that are identified by letters.
The columns begin with A and proceed through the alphabet. The 27th column is AA followed
by AB, AC, and this convention for naming continues through the entire alphabet until you end
up with the last column (column 256) which is designated IV.
Rows
Rows are the horizontal divisions of a worksheet and are identified by numbers.
Cells
A cell is the intersection of a row and a column. Each cell has an address that consists of the
column letter and row number (A1, B3, C5 and so on)
Each cell is capable of containing different types of information e.g. text, number, times,
formulas. Excel data basically comes in two varieties: labels and values.
A label is a text entry consisting of alphanumeric characters. It is called a label because it
typically provides descriptive information such as the name of a place, person, e.t.c. A label has
no numerical significance in Excel.
A value is data that has numerical significance. These include numbers, dates and times that you
enter on your worksheet. Values can be acted on by formulas and functions.
The figure below shows the elements of an Excel window.
43
Element and Description
Formula bar: When you enter information into a cell, it appears in the Formula bar. You can
use the formula bar to edit the data later. The cell‘s location also appears.
Column Headings: The letters across the top of the worksheet, which identify the columns in
the worksheet.
Row Headings: The numbers down the side of the worksheet, which Identify the rows in the
worksheet.
Cell Selector: this is the dark outline that indicates the active cell. It Highlights the cell you are
currently working in.
Worksheet tabs: These tabs help you move from worksheet to Worksheet within the workbook.
The active Worksheet is displayed in bold.
Active cell: It indicates the cell in which the typed data will be entered. It is also known as the
current cell.
47
1. Select the cells, rows or columns that you want to clear.
2. Press the delete key on your keyboard.
Delete cells, rows or columns
1. Select the cells, rows or columns you want to delete.
2. Home tab, click Delete.
Undo mistakes
To undo recent actions one at a time, click Undo next to the save icon
To undo several actions at once, click the arrow next to Undo button and select from the list.
Microsoft Excel reverses the selected action and all actions above it.
To undo several actions at once, click the arrow next to Undo button on the standard toolbar and
select from the list. Microsoft Excel reverses the selected action and all actions above it.
Insert cells, rows or columns
You can insert blank cells, rows and columns and fill them with data.
Insert blank cells
1. Select a range of existing cells where you want to insert the new blank cells.
2. Select the same number of cells as you want to insert.
3. On the insert icon under the home tab, click cells.
4. Click Shift cells right or shift cells down.
Insert rows
1. To insert a single row, click a cell in the row immediately below where you want the new row.
For example, to insert a new row above Row 5,click a cell in Row 5.
To insert multiple rows, select rows immediately below where you want the new rows, select the
same number of rows you want to insert.
2. On the Insert menu, click Rows.
Insert columns
1. To insert a single column, click a cell in the column immediately to the right of where you
want to insert the new column. For example, to insert a new column to the left of column B, click
a cell in column B
To insert multiple columns, select columns immediately to the right of where you want to insert
the new columns. Select the same number of columns as you want to insert.
2. On the Insert icon on the home tab, click Columns.
FORMATTING A WORKSHEET
48
Change the size, font, color, or other text format
You can specify a font, font size and font color by clicking buttons on the home tab.
Change the font or font size
1. Select whole cells or the specific text in a single cell that you want to format.
2. In the Font box, click the font you want.
3. In the Font size box, click the font size you want (on the home tab)
Make selected text or numbers bold, italic or underlined
1. Select whole cells or the specific text in a single cell that you want to format.
2. On the home tab, click a button for the format you want.
To make text Click
Bold
Italic
Underlined
Change the text color
1. Select whole cells or the specific text in a single cell that you want to format.
2. To apply the recently most selected color, click Font Color A
To apply a different color, click the arrow next to Font Color A and then click a color on the
palette.
APPLYING BORDERS
OPERATORS
Operators are signs or symbols which specify the type of a calculation that you may perform in
the elements of a formula.
There are four different types of calculation operators i.e.
50
1. Arithmetic
2. Comparison
3. Text and
4. Reference
You can display Microsoft Excel data graphically in a chart. Charts are linked to the worksheet
data they are created from and are updated when you change the worksheet data. You can create
charts from cells or ranges that are not next to one another.
1. Select the cells that contain the data that you want appear in the chart.
2. Under the insert tab select the kind of chart you want.
3. The chart is prepared for you.
Create a chart from non-adjacent selections
1. Select the first group that contains the data you want to include.
2. While holding down CTRL key, select any additional cell groups you want to include.
3. Under the insert tab select the kind of chart you want.
4. The chart is prepared for you.
Move and resize chart items by the use of the mouse
You can use the mouse to resize and move the chart area, the plot area and the legend. Microsoft
Excel automatically sizes titles to accommodate their text. You can move titles with the mouse
but not resize them.
1. Click the chart item.
2. To move a chart item, point to the item and then drag it to another location.
To resize a chart item, point to a sizing handle.
When the mouse pointer changes to a double-headed arrow, drag the sizing handle until the item
is the size you want.
Rotate text in a chart title or along an axis
You can rotate or ―angle‖ text in a chart or along an axis. However, you cannot rotate legend
text.
1. Click the axis or the title you want to format.
2. If you clicked an axis, click Axis on the Format menu.
3. Click the Alignment tab.
51
4. To rotate text, under Orientation, click a degree point or drag the indicator to the position you
want.
About using a list as a database
In Microsoft Excel, you can easily use a list as a database. When you perform database tasks
such as finding, sorting or subtotaling data, Microsoft Excel automatically recognizes the list as a
database and uses the following list elements to organize the data.
fields in the database.
field‘s names in the database.
Sorting a list
You can rearrange the rows or columns of a list based on the values in the list by sorting. When
you sort, Microsoft Excel rearranges rows, columns or individual cells by using the sort order
that you specify. You can sort lists in ascending (1 to 9,A to Z) or descending (9 to 1,Z to A)
order and sort based on the contents of one or more columns.
Sort in ascending or descending order
1.Click a cell in the column you would like data sort.
2.Click Sort ascending or descending button on the standard toolbar.
Sort columns based on the contents of rows
1.Click a cell in the list you want to sort.
2.On the Data tab, click sort.
3.Click Options.
4.Under Orientation, click sort left to right and then click Ok.
5.In the Sort by and Then by boxes, click the rows you want to sort.
6.Click Ok.
Using apply filter
Autofilter
Displays only those rows that match the value in the active cell and inserts
Autofilter arrows to the right of each column label.
Show all
Displays all of the rows in a filtered list
Chapter Review Exercise
Intermediate Spreadsheet Concepts Exercise
52
Create a spreadsheet using the following information. You have been asked to prepare a
spreadsheet to show the profit and loss figure for the last financial year. The profit and loss
should be shown as a dollar and as a percentage.
1) Enter the raw data below, applying as many presentation Features (Font, Font
Size, Font Colour, Number Formats and Colour, Cell Shading, Text Rotation, etc) to it as you
wish.
2) Apply appropriate number formats to your numbers.
3) Give your spreadsheet an appropriate title and center it across your spreadsheet.
4) Select the best page orientation for your spreadsheet.
5) Adjust the column width and row height to suit the layout you have selected.
6) Create formula's to calculate the profit / loss as a currency for each month.
7) Create formula's to calculate the profit / loss as a percentage for each month.
PRESENTATION GRAPHICS
MS POWERPOINT
What is PowerPoint?
This is a complete presentation graphics package. It gives you everything you need to produce a
professionally looking presentation. It enables you to express your ideas in graphics, text and
objects all in one.
What is presentation?
It is a collection of slides, handouts, speaker‘s note, and outline all in one file. As create a slide
you are creating a presentation, giving it a format that will carry through from beginning to the
end.
What is a slide?
Slides are individual pages of your presentation. Slides have titles, text, drawn objects, shapes,
clip arts, and visuals created with other application.
Starting PowerPoint
From the start menu select programs and the move to PowerPoint and click.
By default it creates a new presentation 1 for you with a window shown below.
53
Starting a presentation
1. Type the title and anything else on the layout on the first slide
2. On the ―Home tab‖, click ―New Slide‖ and select a new layout for the next slide.
3. Repeat steps 2 for each new slide.
N.B: You can put as many slides as desired.
Add text.
Normally the easiest way to add text to a slide is to type directly into any placeholder that
accommodates text. However when you want to add text outside a placeholder you use ―Text
Box tool on the format tab.
Changing the font and color of the text
1. Highlight the text to be formatted
2. From the home tab click font
3. Choose the desired font size color e.t.c
Add, change or remove a bullet
After you create a bulleted text, you can change the look of the bullets: their size, shape, color,
e.t.c
To change a bullet, you need to highlight the test associated with the bullets.
54
You cannot highlight a bullet.
1. Highlight the text
2. In the home tab, select bullets
3. Choose from the variety of bullets and click
4. Specify things like color and the size.
FORMATTING YOUR SLIDE
Colors and designs are added to slides in a presentation for enhancement.
They also help in capturing the attention of the audience. You can either add a background color,
apply design or both.
Applying background
1. Choose the slide you want to apply background (if you have several) by scrolling.
2. In the design tab, chose the background you desire.
Applying design
1. Choose the slide you want to design.
2. In the design tab chose, the desired design.
A slide can be looked at in different angles. These views help a lot while working on your
presentations.
To access the views, click the view tab. The most common views are:
1. Slide: Views individual slide.
2. Outline: Views all slides (outlined). NB.Graphics & Text effects cannot be viewed in outline.
3. Slide sorter: Miniatures all slides in your presentation. You can animate, transit, sort etc in
this view.
4. Slide show: Complete presentation is run in this view.
Deleting a slide
1. Select the slide you want to delete
2. On the home tab, click Delete
55
PowerPoint comes with its own set of pictures in the clip art gallery. The clip art gallery includes
a wide variety of clip arts that makes it easy for you to dress up your presentation with
professionally designed images. You will find everything from maps to people and from
buildings to scenic backgrounds.
Inserting pictures in your presentation
1. From the insert tab point to clip art
2. You can choose from the
3. From the source you have chosen, chose the picture and click insert.
Inserting Shapes
1. From the insert tab click shapes
2. Move to desired category
3. Choose the shape and click
4. After the mouse pointer changes shape, click and drag at the insertion position.
Working with organization chart
1. Insert a slide and select the smart art option as shown below
2.
3. Use the chart‘s tools and menus to sign your chart
ANIMATION
You can animate text, graphics sounds, movies, and other objects on your slides so as to focus on
important points, control the flow of information, and add interest to your presentation. You can
56
have each main bullet point appear independently of others, or you can have objects appear
progressively, one after another.
You can set up the way you want each bullet point or object to appear on your slide e.g. to fly in
from the left and whether you want other bullets or objects to dim or change color when you add
a new element. You also change the order of timing of your animation.
Animating objects & text on the slide
1. In the animations, display the slide that has the text or objects you want to animate.
2. On the ribbon, click ―custom animation‖, and then click timing tab.
3. Under ―slide objects without animation‘, select the text or object you want to animate and then
click animate.
4. Choose ‗on mouse click‘ to activate the animation after a mouse click or ‗automatically‘, and
then enter the number of seconds you want to elapse between the previous animation and the
current one.
5. Click the effect tab.
6. If you are animating a chart in Microsoft Graph, click the Chart Efforts tab.
7. Under ‗entry animation and sound‘, select the options you want.
8. Click the timing tab and repeat steps 3 through 6 for every object you want to animate. You
can click the preview button to see how your animation works.
Changing the order of the animation on a slide
1. In the slide view, display the slide you want to change the order in.
2. On the slide show menu, click Custom Animation.
3. Under ‗animation order‘, select the object you want to change, and the click one of the arrows
to move the objects up or down on the list.
4. Repeat the process for each objects whose order you want to change.
Add an effect on an animated object after it appears
1. In slide view, display the slide you want to add an effect to.
2. On the slide show menu, click Custom Animation, and then click the effects tab.
3. Under animation order, select the object you want to add an effect to, and then click an option
under after animation.
4. Repeat the process for each object you want to add and effect to
Add Transitions To A Slide Show
For the slide show to flow well you need to transit your slide.
1. In the slide view, select the slide you want to transit
57
2. On the animation tab click ‗slide transition‘.
3. In the effect box, choose a transition.
4. To apply a transition to one slide, click apply. Click ‗apply to all‘ for all the slides.
5. To view the transition, click slide show.
SAVING A PRESENTATION
There are different options of saving a presentation. The common ones are:
Saving a new or existing presentation to always open as a slide show
1. Open the presentation you want to open as a slide show.
2. On the office button click, save as.
3. In the ‗save as type‘ list box, click PowerPoint show.
4. Choose the drive in the ‗save in‘ box.
5. Click save.
PRINTING
You can print your entire presentation either in black and white or color.
1. Open the presentation you want to print.
2. Click print from the file menu.
3. In the resulting dialog box, choose and click as appropriate.
4. Click okay.
Activity
1. You are the marketing manager of Mount Kenya University and you are required to make a
presentation at the Inter-University conference about Mount
Kenya. The presentation should not be less than 15 slides and should also have the following
features;
- Slides with the different layouts i.e Organisation chart, Chart, Tables, clip art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
2. You are the marketing manager of Mount Kenya University and you are required to make a
presentation at the Inter-University conference about Mount
58
Kenya. The presentation should not be less than 15 slides and should also have the following
features;
- Slides with the different layouts i.e. Organization chart, Chart, Tables, clip art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
59
DATA MANAGEMENT SERVICES
Introduction:
Scientific disciplines are starting to assemble primary source data for use by researchers. The
data are typically organized into collections that are distributed across multiple administration
domains and are stored on heterogeneous storage systems. The challenge is to provide a
persistent and consistent environment for organizing and maintaining the collections across
distributed environments that are under the control of local administrators. At the same time,
middleware is needed to support uniform access to the data objects, including APIs for direct
application discovery and manipulation of the data, command line interfaces for accessing
data objects from scripts, and web GUIs for interactive browsing and presentation of data
objects.
The development of infrastructure to support the publication of scientific data can build upon
technology from the digital library, data grid, and persistent archive communities. One can
differentiate between infrastructure components that provide:
Data storage of digital objects that are either simulation output or remote sensing data. The
digital objects are representations of reality, generated either through a hardware remote
sensing device or by execution of an application.
Information repositories that store attributes about the digital objects. The attributes are
typically stored as metadata in a catalog or database.
Knowledge bases that characterize relationships between metadata attributes. An example is
rule-based ontology mapping that provides the ability to correlate information stored in
multiple metadata catalogs.
Scientific data publication systems support ingestion of digital objects, querying of metadata
catalogs to identify objects of interest, and integration of responses across multiple
60
information repositories. Fortunately, a rapid convergence of information management
technology and data handling systems is occurring for the support of scientific data
collections. The goal is to provide mechanisms for the publication of scientific data for use
by an entire research community. The approach used at the San Diego Supercomputer Center
is to organize distributed data objects through creation of a logical collection. The ownership
of the data objects is assigned to the collection, and a data handling system is used to create,
move, copy, replicate, and read collection data objects. Since all accesses to the collection
data objects are done through the data handling system, it then becomes possible to put the
data objects under strict management control, and implement features such as access control
lists, usage audit trails, replica management, and persistent identifiers.
Effectively, a distributed collection can be created in which the local resources remain under
the control of the local site, but the data objects are managed by the global logical collection.
Researchers authenticate themselves to the collection, and the collection in turn authenticates
itself to the distributed storage systems on which the data objects reside. The collection
manages the access control lists for each data object independently of the local site. The local
resources are effectively encapsulated into a collection service, removing the need for
researchers to have user accounts at each site where the data objects are stored.
The data handling system serves as an interoperability mechanism for managing storage
systems. Instead of directly storing digital objects in an archive or file system, the
interposition of a data handling system allows the creation of a collection that spans multiple
storage systems. It is then possible to automate the creation of a replica in an archival storage
system, cache a copy of a digital object onto a local disk, and support the remote manipulation
of the digital object. The creation of data handling systems for collection-based access to
published scientific data objects makes it possible to automate all data management tasks,
while maintaining a consistent metadata environment. All metadata attributes can be kept
consistent with any operation on an object within the collection. In turn, this makes it
possible to support data mining against collections of data objects, including comparisons
between simulation and measurement, and statistical analysis of the properties of multiple
data objects. Data object handling systems can be characterized as interoperability
mechanisms that integrate local data resources into global resources. The interoperability
mechanisms include
61
global persistent identifiers that are location and protocol independent,
latency-hiding methods for movement of data within a wide area network
consistency management methods for tracking all changes and updates to the
collection
authentication methods for remote-data access
collection management tools for ingestion and persistent storage of data
knowledge management tools for mapping between collection concept spaces
The data management infrastructure is based upon technology from multiple communities that
are developing archival storage systems, parallel and XML database management systems,
digital library services, data grids, and persistent archives. The combination of these systems
is resulting in the ability to describe, manage, access, and build very large distributed
scientific data collections. Several key factors are driving the technology convergence:
Development of an appropriate information exchange protocol and information tagging
model. The ability to tag the information content makes it possible to directly manipulate
information. The eXtensible Markup Language (XML) provides a common information
model for tagging data object context and provenance. Document Type Definitions (and
related organizational methods such as XML Schema) provide a way to organize the tagged
attributes. Currently, scientific disciplines are developing their own markup language (set of
attributes) for describing their domain-specific information. The digital library community
has developed generic attribute sets such as the Dublin core to describe provenance
information. The combination of Dublin core metadata and discipline specific metadata can
be used to describe scientific data objects and construct a global name space.
Differentiation between the physical organization of a collection (conceptually the table
structures used to store attributes in object-relational databases) and the logical organization
of a collection (the schema). If both contexts are published, it becomes possible to automate
the generation of the SQL commands used to query relational databases. For XML-based
collections, the emergence of XML Matching and Structuring languages such as XQuery
makes it possible to construct queries based upon specification of attributes within XML files.
Differentiation of the organization and access mechanisms for a logical collection from the
organization and access mechanisms required by a particular storage system. Conceptually,
data handling systems store data in storage systems rather than storage devices. By keeping
62
the storage context independent of the physical storage devices, and providing interoperability
mechanisms for data movement between storage systems, logical data object collections can
be created that span any type of storage system. Existing data collections can be transparently
incorporated into the logical collection. The only requirement is that the logical collection be
given access control permission for the local data objects. The data handling system becomes
the unifying middleware for access to distributed data objects.
Differentiation of the management of data collections from the storage of metadata into a
database. Information management systems provide the ability to manage databases. By
building a logical representation for data collections that is independent of the choice of
information repository or database, it becomes possible to support extensible schema, and
migrate collections onto new information repositories.
The ability to manipulate data objects through collection-based access mechanisms enables
the federation of data collections and the creation of persistent archives. Federation is enabled
by publishing the schema used to organize a collection, and mapping the semantics of the
collection to a discipline concept space. Information discovery can then be done through
queries based upon semi-structured representations of the collection attributes such as
provided by an XML DTD. Distributed queries across multiple collections can be
accomplished by mapping between the multiple DTDs, either through use of rules-based
ontology mapping, or token-based attribute mapping.
Persistent archives can be enabled by archiving the context that defines both the physical and
logical collection organization along with the data objects that comprise the collection. The
collection context can then be used to recreate the collection on new database technology
through an instantiation program. This makes it possible to migrate a collection forward in
time onto new technology. The collection description is instantiated on the new technology,
while the data objects remain on the physical storage resource. The collection instantiation
program is updated as database technology evolves, while the archived data remains under the
control of the data handling system. As the archive storagea technology evolves, new drivers
are added to the data handling system to interoperate with the new data access protocols.
The implementation of information management technology can build upon the information
models and manipulation capabilities that are coming from the Digital Library community,
63
and the remote data access and procedure execution support that is coming from the
distributed computing community. The Data Access Working Group of the Grid Forum is
promoting the development of standard implementation practices for the construction of data
grids. Data grids are inherently distributed systems that tie together data collections with
execution environments. Researchers rely on the grid to support all aspects of information
management and data manipulation. An end-to-end system provides support for:
Knowledge discovery – ability to identify relationships between digital objects stored in
different data collections
Information discovery – ability to query across multiple information repositories to
identify data objects of interest
Data handling system – ability to read data from a remote site for use within an
application
Latency management – ability to use collective operations to minimize the number of
messages and amount of data sent across the wide area network
Publication – ability to add data objects to collections for use by other researchers
Analysis – ability to use data in scientific simulations, or for data mining, or for creation
of new data collections
These services are implemented as middleware that hide the complexity of the diverse
distributed heterogeneous resources that comprise data and compute grids. The services
provide four key functionalities or transparencies that simplify the complexity of
accessing distributed heterogeneous systems.
Name transparency – Unique names for data objects are needed to guarantee a specific
data object can be found and retrieved. However, it is not possible to know the unique
name of every data object that can be accessed within a data grid (potentially billions of
objects). Attribute based access is used so that any data object can be identified either by
data handling system attributes, or Dublin core provenance attributes, or discipline
specific attributes.
Location transparency – Given the identification of a desired data object, a data handling
system manages interactions with the possibly remote data object. The actual location of
the data object can be maintained as part of the data handling system attributes. This
makes it possible to automate remote data access. When data objects are replicated across
64
multiple sites, attribute-based access is essential to allow the data handling system to
retrieve the ―closest‖ copy.
Protocol transparency – Data grids provide access to heterogeneous data resources,
including file systems, databases, and archives. The data handling system can use
attributes stored in the collection catalog to determine the particular access protocol
required to retrieve the desired data object. For heterogeneous systems, servers can be
installed on each storage resource to automate the protocol conversion. Then an
application can access objects stored in a database or in an archive through a uniform user
interface.
Time transparency – At least six mechanisms can be used to minimize latencies for
retrieving distributed objects: data caching, data replication, data staging, data
aggregation, data streaming, and remote data filtering. Each of these mechanisms can be
automated as part of the data handling system. Data caching can be automated by having
the data handling system pull data from the remote archive to a local data cache. Data
replication across multiple storage resources can be used to optimize the source selection
for the data movement. Data staging can be used to prefetch data objects from high
latency systems such as tape onto disk caches. Data aggregation through the use of
containers can be used to minimize access latency to archives or remote storage systems
by caching similar objects. Data streaming ensures that the data pipe linking the local
application to the remote data resource remains full. Remote data filtering can be used to
minimize the amount of data that must be moved. This latter capability requires the
ability to support remote procedure execution at the storage resource.
Knowledge Management:
65
There are many examples of knowledge management systems already in production use. The
types of knowledge relationships can be loosely characterized as
When multiple data collections are federated within a data grid, each of these types of
knowledge may need to be managed and applied. Semantic interoperability is needed
between the attributes within the data collections, structural relationships are needed to
understand how to transform data objects into a common data format, procedural relationships
are needed to describe the multiple processing stages that may be required for the structural
transformations, and algorithmic relationships may be needed to convert data into common
physical variables. A virtual data grid that manages either the creation of a derived data
product or the extraction of a derived data product from a collection is a prime example of the
need for knowledge management as part of data management services.
Application:
A collection-based data management system has the following software infrastructure layers:
Persistent archive – provide management procedures for handling the evolution of the
software and hardware infrastructure.
66
Data handling system – provide consistent and persistent data management across
multiple data storage systems
Data collection – provide support for extensible, dynamically changing logical
organizations of data objects
Digital library - provide services for discovering, manipulating, and presenting data from
collections
Data Grid – integrate multiple digital libraries into a publication and analysis
environment.
This view of software infrastructure is recursive, in that persistent archives are created using
the interoperability mechanisms of data grids, data grids can be implemented as collection-
managed data handling systems, and data collections can be implemented using data handling
systems that integrate multiple storage systems.
The essential infrastructure component is the data handling system. It is possible to use data
handling systems to assemble distributed data collections, integrate digital libraries with
archival storage systems, federate multiple collections into a data grid, and create persistent
archives. An example that encompasses all of these cases is the proposed National Virtual
Observatory (NVO) that will integrate multiple existing sky surveys into a data and
information resource for the Astronomy community.
Each sky survey is an example of a digital library that provides mechanisms to query, extract,
and present information and data. The sky surveys typically provide a web interface for
querying a catalog of identified objects, thumbnail browse images for interactive viewing of
the objects, and access mechanisms for retrieving full-resolution images. As an example, the
2-Micron All Sky Survey maintains a digital library that uses storage systems at Caltech and
the San Diego Supercomputer Center to hold 5 million images comprising 10 Terabytes of
data. The SDSC Storage Resource Broker is the data handling system that is used to integrate
a digital library at IPAC at Caltech with the storage systems. To minimize retrieval latencies,
containers are used to hold all images for the same area of the sky. When an image is
accessed, the associated container is staged onto disk to minimize retrieval times for similarly
located images.
67
The usage model supports the following access scenario:
Astronomers access the catalog at IPAC at Caltech to identify galaxy types of interest.
Digital library procedures determine which images need to be retrieved.
The data handling system maps the image to the appropriate container, retrieves the
container from the archive, and caches the container on a disk.
The desired image is then read from the disk and returned to the user through the digital
library.
Since the images are accessed through the data handling system, the desired images can be
retrieved from either archive depending upon load or availability. If the container has already
been staged to disk cache, the data handling system can immediately retrieve the image from
disk avoiding the access latency inherent in reading from the archive tape system. If one
archive is inaccessible, the data handling system automatically defaults to the alternate storage
system. If data is migrated to alternate storage systems, the persistent identifier remains the
same and the data handling system maintains consistency by adding the location and protocol
access metadata for the new storage system. The system incorporates persistent archive
technology, data handling systems, collection management tools, and digital library services
in order to support analysis of astronomical objects.
The NVO will build a data grid that links multiple sky surveys. Since each sky survey is
autonomous, the data grid will have to federate access across the surveys, providing services
that cannot be supported by any single survey. The name spaces used by each survey are
distinct, with data objects stored on different types of storage systems. One approach for
building the data grid is to recursively apply the concept of logical collections.
Each sky survey is a logical collection that organizes access to images that may be
replicated across multiple independent storage systems as in the 2MASS collection.
A logical collection can be created that spans the multiple sky surveys. A cross-
correlation catalog can be created that links the names of equivalent astronomical objects
across all of the surveys. The cross-correlation catalog is an example of a concept space
for semantic interoperability between the surveys.
A data handling system can be used to map from the cross-correlation catalog to the
objects in the multiple sky surveys. For cross-survey analysis, astronomical objects can
be copied from the independent sky surveys into a data grid that then manages their
68
manipulation. The data grid provides a separate name space for creating new derived data
products that are the result of combining data and information from the separate sky
surveys.
A new derived data product logical collection can be created to manage the results of the
data manipulations. The new collection can itself be distributed across multiple
administration domains through the use of a data handling system.
The process can be repeated, with a new logical collection created that integrates the
derived data product collection with the original sky surveys.
The recursive application of logical collections created through use of collection-based data
handling systems can create arbitrarily sophisticated data, information, and knowledge
management infrastructures.
Summary:
Data intensive computing is facilitated by the organization of scientific data into collections
that can then be processed by the scientific community. In the long run, the utility of
scientific computation will be measured by the publication of the results of the computation
into collections for use by the rest of the community. Digital objects that remain as local files
on a researcher‘s workstation will be of little use to a scientific discipline. The utility of
digital objects will be directly related to the specification of their context through membership
in a scientific data collection. The fundamental access paradigm will shift to reading and
writing data from collections, with applications using APIs to discover, access, and
manipulate collection-based data. Each discipline will use their data repositories, information
catalogs, and knowledge bases to provide direct access to all of the primary data sources for
their domain.
69
INFORMATION AND COMMUNICATION TECHNOLOGY IN
SECONDARY EDUCATION
RATIONALE
Information and Communication Technology (ICT) has developed to become an integral part of
everyday life. It influences the lives of everyone, wherever we live or work in the world.
Almost every aspect of our daily lives now involves using ICT skills. In the increasingly
dynamic world of work, people need to be able to work effectively with ICT, to develop
transferable ICT skills and to apply those skills across different contexts using a variety of
software packages.
In the context of the current curriculum reform, where the strategy has been rooted in a realistic
evaluation of the economic context in which we are evolving, pupils will use ICT tools to find,
explore, analyze, exchange and present information responsibly, creatively and with
discrimination. They learn how to employ ICT to enable rapid access to information, ideas and
experiences from a wide range of people, communities and cultures. Increased capability in the
use of ICT promotes initiative and independent learning with pupils being able to make informed
judgments about when and where to use ICT to best effect, and to consider its implications for
home and work both now and in the future.
ICT is being used as a pedagogical support in the primary schools and in the pre-vocational
schools. The teacher uses ICT tools, such as productivity software, educational software and the
Internet to teach her/his subjects. S/he uses the tools to prepare lessons, to look for lesson ideas
and develop class activities, to network and collaborate with other teachers and educators for
various teaching-related goals, and as support for teaching. S/he uses ICT as a facilitating tool
for her/his pupils to acquire and apply subject-related knowledge and to develop relevant skills,
70
and to perform educational tasks and review them. S/he can design a range of activities for the
pupils to do using ICT that also enable them to discuss and reflect on their actions. The teacher
teaches the pupils to search for purposeful information using the Internet and helps them develop
their skills to critically evaluate web-based materials. Also, s/he designs collaborative projects
that require pupils in the same school or in different schools to work together. These projects can
be subject-specific or multi-subject in nature. Moreover, the teacher implements activities with
the support of ICT that enables pupils of varying ability to learn at their own pace.
At secondary level, the teacher uses ICT as a support in all three stages (Stage I, II, & III).
However, the teacher should ensure that the pupils have the necessary ICT pre-requisites.
STAGE I
The teacher uses the computer in the teaching of Languages, Values, Basic Science, History &
Geography, The Arts, Environment, Mathematics, and Health & Physical Education. S/he uses
the computer to make teaching aids such as posters, to demonstrate educational game-like
software so that pupils learn as they play, and to show video clips that enable pupils to learn
visually. The use of headset is recommended so that pupils can listen to audio without disturbing
others and to reduce noise level in the classroom.
The teacher can use a simple graphics package such as Ms Paint to develop the creativity and
imagination of her/his pupils as they use the mouse to draw, edit, reflect, and discuss. They do
this while developing their ICT skills. Subject-specific educational software is given to pupils to
familiarize them with their subject through exploration and discovery. The teacher acts as a
guide and facilitator in the whole process so that pupils are on-task and make progress in their
learning. S/he also uses discretion in deciding when and where to use to ICT as a teaching tool.
STAGE II
The teacher uses the same integrative strategies as in Stage I. S/he uses ICT to teach core
subjects such as Languages, Mathematics, Basic Science, History & Geography, Health &
71
Physical Education, The Arts, and integrated components such as Values, Citizenship Education
and Body Awareness. The teacher can design simple software to teach pupils, and for the latter
to use at their own pace under her/his guidance. S/he uses a variety of software such as simple
graphics software, a word processor, a spreadsheet, and multimedia playing software to develop
the pupils‘ language, mathematical and creative skills, and musical ideas. S/he can also design
activities that require the pupils to make simple multimedia elements such as graphic images,
sound, and text.
The teacher looks for appropriate web sites for the pupils to visit while learning. He or she has to
inform pupils about the dangers that exist while visiting websites and about what is good and
what is bad about the Web. S/he has to ensure that pupils visit only those sites that the teacher
has approved. Apart from using the Net for appropriate websites for pupils to use, the teacher
uses it to look for lesson ideas and lesson plans, and for materials that can serve as handouts or
teaching aids. The teacher establishes a network of contacts with people in the educational field
to support her/him in teaching. For example, s/he explores avenues for collaborative projects in
Stage III.
STAGE III
In addition to the strategies described in Stage I and II, the teacher designs activities that enable
the pupils to further develop their analytical, creative skills and critical thinking in all the
subjects. Activities that require the pupils to communicate their work to their peers through class
presentation, newsletter, brochures or web publishing is explored. The teacher teaches the pupils
to integrate various multimedia elements into a holistic product that is then presented to the class
or any audience that s/he deems appropriate.
The teacher also designs activities that enable pupils to develop and refine their skills to search
and critically analyze web-based materials or any materials that they have collected as part of
their learning at school. Group work that requires pupils to work together on an activity that
spans one or more periods is also explored by the teacher. The latter can use the Internet for
activities such as Treasure Hunts and Web Quests for the pupils to perform. Pupils use the Web
to research, collect, analyze, criticize, debate, draw conclusions on a topic related to the primary
school syllabus. The teacher also designs collaborative projects that involve pupils from the same
72
school or from other schools as well. Through these activities, which can be interdisciplinary as
well; the teacher provides a platform for pupils to develop their social, problem-solving and
critical thinking skills to interpret, analyze, synthesize, evaluate, and draw conclusions.
The ICT syllabus is designed in such a way that it is integrated across the curriculum. Various
subject areas will use ICT as a support in order to enhance the teaching learning process. Its
objectives include giving students knowledge of the nature of ICT and the broad range of its
applications. It also emphasizes practical skills in using the computer so that pupils can become
effective end-users in a technological world. Finally, it emphasizes on the use of ICT across a
range of subject, that is, ICT enhanced learning in the various subjects.
STAGE I
Students will:
Learn the basic components of a computer system in order to effectively use it in their
learning.
operate a computer as a first step towards further integration of ICT and applications in other
subject areas
Identify and describe factors that need to be considered in order to ensure safe use of ICT
equipment. They understand the purpose of sitting comfortably, and will adopt proper posture
that will allow easy access to all equipment.
Work with multimedia software. This gives them the opportunity to use ICT to develop their
creative skills. They learn the various subject disciplines though educational software.
STAGE II
Students will:
Learn more about the computer system. They, thus, effectively use various ICT components
in as learning tool.
Work with various kinds of software. This will allow them to enhance both their learning
process and their ICT skills.
73
Organize subject related information effectively on the computer system.
Use ICT tools ethically and correctly.
Use ICT tools to control their environment. They will learn that computers can be used to
control things.
Learn that the key pieces of information can be used to describe objects.
Use ICT to represent data graphically. This way they will communicate observation and
measurements made during class activities through diagrams and charts created on the
computer.
Explore and develop musical ideas by using ICT.
Understand the concept of websites, URL, and the Internet.
Locate and retrieve information from given websites on the Internet.
produce simple subject-specific multimedia elements such as graphic images, sound, text,
and animations
Use input devices or switches to control a process.
STAGE III
Students will:
collect subject related information using the Internet based on well-formulated search key
words
critically analyze gathered information for their veracity and currency
send and receive subject-related information electronically
work collaboratively on subject-related projects among classes in the same school or other
schools
assemble multimedia elements in a coherent manner to produce meaningful and purposeful
multimedia products
become aware of health hazards associated with working with computers and take
appropriate preventive measures
consider ethical issues including access to illegal and unsuitable materials
identify materials which may be socially or morally unacceptable
Be aware of ICT legislation related to keeping personal information on computers, copyright
legislation, etc.
Use ICT tools to represent knowledge, concepts and ideas. They will use specifically
designed software to create charts, mind maps, concept maps.
74
Attach devices such as data logger, to a control box.
control devices according to a set of instructions
Case Study
Context: Examine the environment in which technology is used in teaching and learning
How did the real environment compare to the ideal? (eg. The programme required five
computers in each classroom, but there were only two computer labs of 40 units each for
1000 students)
What problems are hampering success of technology integration? (eg. technology
breakdowns, not all schools had internet access)
About 50% of teachers do not have basic computer skills
Input: Examine what resources are put into technology integration (Identify the educational
strategies most likely to achieve the desired result)
Is the content selected for using technology right?
Have we used the right combination of media? (internet, video-clips, etc)
Process: Assess how well the implementation works (Uncovers implementation issues)
Did technology integration run smoothly?
Were there technology problems?
Were teachers able to integrate technology in their lessons as planned?
What are the areas of curriculum in which most students experienced difficulty?
Product: Addresses outcomes of the learning (Gather information on the results of the
educational intervention to interpret its worth and merit)
75
Did the learners learn using technology? How do you know?
Does technology integration enhance higher order thinking?
ACTIVITY
With reference to Case Study
Suggest other questions you would ask regarding process
evaluation (i.e. implementation issues).
What data collection techniques would you recommend for
carrying out product evaluation to determine the teaching and
learning outcomes of technology integration?
76
IMPLEMENTING COMPUTER MEDIATED COMMUNICATIONS IN
THE CLASSROOM
Introduction
Computer Mediated Communications offers a rich set of tools that can be used to support a
variety of learning experiences. The instructor is not limited to one set of services or tools but
can use several to create a learning environment which will best suit his or her students‘ learning
needs.
As illustrated in the tables below each tool offers its own strengths and weaknesses.
Blog or Weblog
A blog is an asynchronous communication tool that acts as an online space for journaling and
gathering links related to topics of interest. In general blogs are maintained by one person
(although some blogs may be set up to allow multiple authors) and entries are loaded in a
chronological manner with the newest post located at the top. Blogs allow readers to comment on
posts and those comments are attached to the related post. Most blogs have searchable archives.
Updated blogs can be "pushed" to users via RSS (Really Simple Syndication or Rich Site
Summary) into a blog reader (a tool that allows users to track all of the blogs they are interested
in one location). One of the great strengths of web logs is the ease of linking. If you comment on
an article on the web, it is easy to link directly to it. This makes it much easier for the reader to
follow up references and research matters in greater depth. It also allows you to comment on
items you disagree with and link to the original so that the reader may make up his or her mind.
This allows the reader to interact with the bibliography, rather than the bibliography merely
being something at the end of the article.
What Works
Instructional Uses
Students can be asked to blog (or reflect) about their learning experiences.
Students can be asked to blog about their portion of a group project (and post links to
collected research materials.).
Students can be asked to blog writing samples (for creative writing classes.)
Students can be asked to comment on blog entries made by other classmates.
Via RSS the instructor can have new posts and comments pushed to a central reader.
What Works
Users are not aware a new post has been made unless they check the site on a regular basis
To track a thread the subject line of the original post must remain intact
Instructional Uses
Students can be asked to post messages for other class or group members to respond to.
78
Students can be asked to post files for other class or group members to view and respond to.
Students can share information that may be of help to the whole class or group.
Students can be asked to discuss a topic and the thread can be followed by the instructor or
other class members.
What Works
Good environment for informal real time information sharing with a group of users
Sessions can be saved and reviewed
The whole class or team can participate in the conversation during real time
Many users find chat sessions hard to follow as posts may seem to be illogical or disjointed
Side conservations distract other students
Individual threads are not traceable
Saved or logged sessions are not easy to read
It is difficult to make lengthy or thoughtful posts
Instructional Uses
Chat can be used as a tool for side comments and questions during a real time lecture.
Chat can be used to have discussions with teams or groups.
Teams or groups can share ideas and brainstorm
Email
Email is an asynchronous communication tool that allows users to send messages, letters, and
files to each other. Email is more formal than a BBS, chat or IM.
What Works
Instructional Uses
What Works
Not all IM systems work with each other (there are aggregators but you still need an account
with individual types of IM)
Instructional Uses
Individual conferences
Virtual office hours
Oral discussions (using voice chat)
Listservs
An asynchronous email based communication tool that allows a community to form around a
topic or shared interest. Messages that are sent can be requests for help, answers to questions, or
80
general information. Messages submitted to the listserv are distributed to the entire membership
of the list.
What Works
All students have email accounts where posts to the list can be received
All messages are handled via a single server
Most listservs maintain an archive that can be searched
Instructional Uses
An instructor can set up a listserv where students can share information as a group and
information can be pushed to students.
The information space has been designed, educational interactions occur in the environment,
turning spaces into places, the information/social space is explicitly represented, the
representation varies from text to 3D immersive worlds, students are not only active, but also
actors, students co-construct the virtual space, virtual learning environments are not restricted to
distance education, they also enrich classroom activities, virtual learning environments integrate
heterogeneous technologies and multiple pedagogical approaches, most virtual environments
overlap with physical environments.
What Works
Instructional Uses
Wiki
Wikis are asynchronous web based forums that allow user groups to post and collectively edit
documents. They often take the form of a collaborative online encyclopedia.
What Works
Since anyone in the group can edit the document some changes can be made that do not
reflect the views of the whole group (wikis can, and should, have central editors who can
resolve disputes between contributors)
Instructional Uses
Scenario
The College of Education at Southern University has decided to offer several of its master's
degrees completely online. Over the past two years, enrollment in face-to-face programs has
82
steadily declined while enrollment has increased in university online degree programs. The
faculty is concerned that if this trend continues they will not be able to compete in the global
education market. In order to best serve students, the college has selected a versatile electronic
course management system (CMS) and a virtual classroom space where real time classes can be
held. Each instructor will receive training in developing a class for these electronic
environments.
Dr. Jones has begun to explore the CMS for his Educational Psychology class. The CMS
includes an internal mail system, a chat client, a discussion board, a place where students can
take quizzes and areas where students can retrieve and post assignments. The virtual classroom
space allows for two-way synchronous communications via a voice-over IP connection (VOIP)
and an interactive white board space where students and the instructor can write, draw, and post
slides. The virtual classroom also includes a chat client that allows students to transmit and
receive real time messages via the network.
Dr. Jones has also decided to use other supporting technologies such as blogs and wikis that exist
outside the CMS (but can be linked inside the CMS) and the virtual classroom to provide what
he hopes is a successful learning experience for the students in his class.
Dr. Jones' class will meet once a week in the virtual classroom where he will present his material
to the class, give the students a chance to communicate vocally, create team rooms where
students can have peer team discussions, and where each team will give a presentation at the end
of the semester.
Dr. Jones will use the CMS to post assignments and grades, create asynchronous discussion
spaces via the discussion boards, and give the students a place to turn in their assignments and
conduct general class business. There will also be links to outside resources including subject-
and topic-focused library guides, and a link to virtual real-time reference with a librarian.
The class will be divided into teams and each team will pick a subtopic for its end-of-the-
semester presentation. Each student will be asked to set up a blog where they will journal about
their learning experience, discuss the subtopic they have picked, and post critical reviews of
other blogs related to the class focus and their subtopic. The group will be asked to maintain a
wiki for its collaborative work.
At the end of the semester, each student will deposit their final work into the college's repository
and their materials will be available to anyone on the internet. The repository will also be used to
83
allow the student to create an e-portfolio. Each e-portfolio will have a persistent URL that will
allow students to direct potential employers to examples of their work.
Dr. Jones is providing students with the tools they need to have a complete group learning
experience even though they are physically removed from each other. Using both the CMS and
the Virtual Classroom software as a superstructure around which to develop his assignments and
class time, Dr. Jones is creating gathering places for online learning communities to form and
develop. By requiring students to meet in these places, he is developing a group of users who are
comfortable with these technologies. As they progress through the program, these users should
become comfortable and adept in this environment.
By employing technologies such as chat and the bulletin board system (via the CMS), Dr. Jones
is encouraging the students to use both synchronous and asynchronous technologies to interact
with one another. Unfortunately, some users find group chat sessions hard to follow and others
use the technology to hold side conservations which may or may not be relevant to the discussion
at hand. Students frequently find ways to talk to each other about subjects other than what the
teacher is saying. In CMC, though, the teacher doesn't have to shout over the students'
conversations.
84
Overall, Dr. Jones has created a space that takes advantage of current CMC technology to
simulate a traditional, physical, face-to-face learning environment. Learning in this environment
is obviously a two-way, online process. Dr. Jones is learning from his students' experiences and
his responses to questions become more reflective and deliberate. In this setting, instructors must
engage in a deeper level of mental processing as they formulate their questions and respond to
those of students.
85
DESIGN, ORGANIZATION, MANAGEMENT, AND SAFETY OF
THE SCHOOL COMPUTER LABORATORIES
Learning Objectives for the Topic
At the end of the lesson, the learner should be able to;
Show the need of computer labs in schools
List the safety issues in a computer laboratory
Know the organization of a computer Lab in a school setting
Introduction
The Computer Laboratory is an academic department within the school that encompasses
Computer Science, along with many aspects of Engineering, Technology and Mathematics. The
Laboratory undertakes research in a broad range of subjects within the disciplines of Computer
Science, Engineering, Technology, and Mathematics. Current research areas include
bioinformatics, computer architecture, computer vision, distributed systems, graphics and
human-computer interaction, logic and semantics, machine learning, natural language
processing, networking and wireless communication, operating systems and virtualization,
programming, security, and sustainable computing.
In the past decade, PCs, laptops, tablets, netbooks, and mobile devices have proliferated at
academic institutions. Students and teachers alike want to use the device of their choosing to
access their data and applications—from any location across campus and beyond. To address
these changing dynamics, educational
IT organizations are shifting away from traditional approaches to device-centric computing and
moving towards a user-centric model where data and applications are securely provisioned and
readily available on demand, regardless of the user‘s location or the device being used.
Virtualization is the catalyst that makes user-centric computing a reality. IT administrators are
leveraging the benefits of this technology—particularly in on-site and mobile labs. In a school‘s
computer lab, a variety of applications help educators meet broad curriculum requirements for
diverse groups of faculty and students.
86
For example, a secondary school environment may need profiles for different user types,
including faculty, staff, students and administrators, each with a unique set of application
requirements. IT administrators can use virtualization to easily manage and maintain dozens of
applications and ensure they operate at acceptable performance and service levels.
1. Periodically inspect all equipment and fixtures and ask all other employees, interns or
volunteers to report to you any problems they see with equipment or fixtures.
2. Keep a log of problems with lab fixtures, including the date that the problem was noted and
the date the problem was addressed. This will help keep track of issues and raise your
awareness about how often certain problems (i.e. burned out light bulbs or faulty network
cables) occur.
3. Put a high priority on making small repairs, and work with others involved as needed to
make sure repairs happen. Since this may be a higher priority for you than for other people,
you may need to give frequent (but pleasant) reminders to get the work done.
4. As you gain more experience with making small repairs, begin to forecast likely future
repairs and keep common spare parts on hand.
87
Organization of the computer lab
11' 46'
STORAGE
TEACHER
STATION
24'
37'
TV
Overall Purpose
Organizational skills do not come naturally to all of us, but most working adults
would agree that it is very useful to be organized. It is usually when we are searching
around for some important piece of paper that we really wished that we were better
organized! A well-organized lab is certainly easier to work in, and it also (like a clean
lab) sends the right signal to potential learners, clients and donors. It shows that the
people who work in the lab care about the resources that they have and are professional
and well prepared. Some specific organizational suggestions are included in the sections
that follow.
89
space to store the books. If other people are permitted to use any of the books, they
should be instructed to return the books to the place on the shelf where they found them.
Paper Documents: A computer lab manager will also end up with paper
documents or files that need to be stored. These documents could include quotations and
invoices, letters with signatures or stamps, or handwritten documents (such as attendance
sheets for an event). The standard way of saving documents is really the best option
here: place the documents in file folders that are appropriately and clearly labeled. When
there are a large number of documents of a single type, these documents should have a
separate file folder, and new file folders should be created periodically and labeled by
date. For example, for tracking purchases, a project might need a file labeled ―Receipts
2009‖ or if purchases are quite frequent then there could be separate files for each month.
The lab manager might also use a ring binder instead of a file folder for items that should
be kept in date order. The file folders and binders should also be organized in a way that
makes them easy find on a shelf, such as sorted by date or alphabetically by name.
Whatever system is used, however, it is most important that the computer lab manager is
diligent in using the system. This includes taking the time to add new documents to the
proper file and putting folders back in the proper location on the shelf. A computer lab
manger‘s schedule needs to include a small amount of time to allow for these tasks to
occur.
Equipment Inventories
Imagine this scenario: a computer lab has just been broken into by thieves. The
computer lab manager is surveying the scene with a police officer and they both can see
that two LCD computer monitors have been stolen. The police officer then asks: ―is
anything else missing‖? The manager then pauses for a bit, and then confesses that she
(or he) isn‘t sure. She tries to remember how many recently donated CPUs were stacked
in the corner, or how many laptops were in the stack in the office. Wouldn‘t it be
helpful if this lab manager had a readily accessible inventory sheet that she could refer to
while the police officer was there? Similarly, imagine if a laptop donor comes to a
computer lab and asks how many functioning P4 laptops they had. The donor would be
pleased to know that the lab manager had that information at her fingertips.
All items of significant value in your computer lab should be inventoried. This
includes clearly labeling all items using a sensible numbering system and then creating
90
an inventory of each item, listing important characteristics of the item. For an inventory
of laptop computers, for example, the list should include the make and model, the serial
number, useful specifications (such as processor type or speed, hard drive capacity, and
operating system used) and any significant performance problems that the computer lab
manager is unable to fix. It is best to create this inventory using an electronic
spreadsheet program so that the inventory can easily be updated. A regular schedule for
updating these inventories should be established.
File Location. It is important that users be aware of where on computer they are
saving files. If saved in the wrong location, a file can be difficult to find again. The first
time a file is saved, the Save As, dialog box opens, and at the top there is a ―Save In‖
box showing the location that the file is being saved in. The computer lab manager
should become accustomed to checking the location and also determine how to change
the location. The method for this depends on the application software being used.
Naming: A computer file should have a name that is brief but informative. For
example, a letter should not be named ―Dear Sir‖ but instead ―Letter to Mumba‖. If the
computer lab manger frequently corresponds with Mr. Mumba, more information such
91
as the date or topic might also help. A computer inventory spreadsheet should not be
named ―inventory‖ but instead ―Chawama Comp Inventory 9-08‖. Including the date
helps a reader know how current the information is, and including the project location is
useful when communicating the information to donors (who might be working with
multiple projects).
Backing Up: Whatever strategies are used for organizing computer files, it is
particularly important that the computer lab manager is able to remember frequently
make backup copies of those files. Computers sometimes fail or are stolen and it would
be a shame for a project to lose all of its data when this happened. It is wise to set up a
schedule for making backup copies on a regular basis, such as once a month. In
addition, while working on particularly important documents, the computer lab manager
should consider making a backup any time significant changes to the document have
been made. While a small amount of information can be backed up onto a USB Flash
Drive, it is more secure to periodically make copies of all files on CD-ROM or DVD
disks. These disks can then be stored in case of an emergency. Storing data on an
external hard drive is also a good option.
92
User data is a collection of information about the clients or students who use a
computer lab. While not all organizations will collect the same information, below is a
list of some of the commonly collected data:
Names and descriptions (i.e. teacher, student or community member, grade
level of student) of users
Date, start and end time of computer use
Identification name/number of computer used
Purpose of visit (i.e. Internet research, typing, preparing a presentation,
lesson)
Whether or not this is the first visit (ever? or this month?) for this particular
user
Fee paid
User comments
An Internet café might be most interested in the numbers of users and the fees paid, but
the purposes of user‘s visits might also help with marketing efforts. For a community or
school project, donors might be particularly interested in knowing what audience is being
served the most by their donations. Including the names of users can help an
organization follow up on thefts that occur in the lab, but may not be appropriate for
commercial projects such as Internet cafés.
In most cases the easiest way for an organization to keep user data is to have a
well-organized and clearly labeled log book kept at a location near the entrance to the lab.
During the peak hours (busiest times) for a computer lab, the manager could assign an
intern, student monitor or volunteer to make sure that the log book is filled out properly
for all users. The computer lab manager should discuss with his or her supervisor or
project steering committee to determine what data should be collected and what should
be done with the data collected in the log book. Typically, after the log book has been
used for a month or other specified unit of time, the computer lab manager will
summarize the data electronically (in a spreadsheet) and include this information in
reports to supervisors, donors, or other interested parties. High user numbers are a great
indication of the success of a computer project, and this data should be shared widely to
celebrate the achievement, thank the individuals responsible for the success and
encourage further successes. Analyzing trends in user data can also be valuable as a part
93
of project planning. Perhaps the data reveal that a certain target audience is not using the
facility, and so a special effort should be made to attract those users. Or perhaps the data
show that the lab is being used little at a certain time of the day. This could result in a
change of operating hours, or the institution of a new course during the low use hours.
Data that shows low use or negative trends should not be seen as ―bad news‖ but as an
opportunity to help a program adapt to meet changing needs.
Assignments/Activities
1.1.1. Have a look around your computer lab and office (or the lab and office at another
computer project). What organizational systems do you already see in place? If
there are areas that seem disorganized, what organizational strategies would you
suggest?
1.1.2. Imagine that you were creating an inventory of the educational CD-ROM disks
that your computer project owned. What sort of information do you think should be
included in this inventory? Make a sample spreadsheet showing all of the column
headings for the inventory and including example information for six disks. (The
examples do not have to be actual disks if your project doesn‘t own any.)
Security
Physical Security
It doesn‘t take much to convince most people of the benefits of a secure computer
lab. How can a project be sustained if valuable equipment regularly disappears? Theft is
often a significant problem when computer projects are located in or adjacent to
underserved communities, and the more portable the equipment is (such as laptop
computers) the larger the problem. In Zambian computer projects thieves have been
known to break through roof tiles, crawl over ceilings from adjacent rooms, and even
break through walls to take computers! The measures taken to ensure physical security
will vary for each lab but should as a minimum include the installation of burglar bars
over all windows and doors and high quality locks. Keys should not be distributed
widely. Some labs will also consider installing alarm systems or hiring security guards.
94
Laptop computers should be stored in the most secure area of the computer lab, such as a
locking closet with burglar bars on the ceiling and door.
Security Policy
A computer project steering committee should work with a computer lab manager
to develop a thorough security policy for the computer lab. Here are some topics to
address in this policy.
Record keeping procedure (such as recording information in a log book) for
equipment use
Record keeping procedure for lab users
Key distribution policy
Procedure for lab access when computer lab manger is not present (such
afterhours use or in the case of lab manager illness)
A strategy for managing user‘s bags and backpacks
Procedure to follow once a theft has occurred
A strategy (such as password protection on specific files or computers) for
securing sensitive files (such as those containing financial information or
student marks/scores)
Insurance
96
LEGAL AND ETHICAL ISSUES OF USING INFORMATION
TECHNOLOGY IN A CLASSROOM
Introduction
Computer ethics defined as the application of classical ethical principles to the use of computer
technology. Teachers and students recognize and practice responsible and appropriate use while
accessing, using, collaborating, and creating technology, technology systems, digital media and
information technology. Students demonstrate an understanding of current ethical and legal
standards, rights and restrictions governing technology, technology systems, digital media and
information technology within the context of today‘s society.
Some of you may remember the television series, The Six Million Dollar Man. Every week,
during the opening sequence, a disembodied voice talked about Steve Austin, an astronaut who
was ―barely alive‖ after the crash of a plane he flew as a test pilot. Another voice told us,
―Gentlemen, we can rebuild him. We have the technology. We have the capability to build the
world‘s first bionic man. Steve Austin will be that man. Better than he was before. Better,
stronger, faster.‖
As with Steve Austin, the technology available to lawyers today can make them better, stronger,
faster—not able to leap tall buildings in a single bound, but able to practice law more efficiently.
This technology functions as a double-edged sword, however. While it can help make your life
and practice easier, more effective, and more efficient, it can also place you at risk for ethical
violations and expose you to malpractice liability.
97
Most lawyers want to use technology to assist them in their practice. Many have a reasonable
concern about the risks of using technology, but many have blissfully embarked on the use of
technology without a second thought about the associated risks. Although I will discuss the
manner in which technology can turn on you and bite you in that portion of your anatomy often
most difficult to see without the help of mirrors, I want to start with a completely different point
and perspective.
I, too, look at technology as a double-edged sword. I see the risks and benefits of technology in
the practice of law from a slightly different perspective, however. I want to start this discussion
with that perspective.
I start from the position that one cannot properly practice law today without the use of
appropriate technology. Whether you see technology as a boon or a bane, it has evolved to play
an essential role in today‘s practice of law. The ABA Model Rules of Professional Conduct
require that we act competently as attorneys when we undertake representation of a client. As a
practical matter, an attorney failing to make use of available technology violates, in all
probability, one or more ethical obligations. Initially, the use of online legal research tools allows
the attorney to get the most current information available respecting the decisions applicable to
the case. Although those decisions may appear in advance sheets in several weeks, they appear
online in several days, at the latest.
It is difficult to consider that a lawyer who fails to check for a decision that reinterprets a
provision of the law relevant to the case and, therefore, misses that case, to the client‘s detriment,
to have competently represented the client. I don‘t know how many of you have had the
experience I have of being in a courtroom and watching a judge chide a lawyer for not knowing
about the most recent decision on an important point in the case (one that was very recently
decided and not yet in advance sheets, but that could be located online). I do not think that the
jump from a judge criticizing a lawyer for not using available technology to a client suing for
malpractice or the state bar finding an unethical failure to provide competent legal representation
to the client represents a quantum leap. Rather, I see it as a short hop.
A lawyer levying unreasonable charges for services has ethical connotations as well. If the use of
technology enables us to work faster and better but we do not use it, the consequences appear not
98
only in the quality of the work turned out but also in the time required to do the work and,
correspondingly, the charge to the client for the work, when the lawyer bills on an hourly basis.
If a lawyer bills at a reasonable hourly rate and could accomplish a job using available
technology in two hours but fails to use available technology so it takes a little longer, that may
not likely prove a serious problem. But what if the failure to use available technology results in
billing four or six hours at the same hourly rate for work that could have been completed in two
using available technology? At some point the repetition of this billing practice can add up to an
amount that one might reasonably conclude exceeded the scope of reasonableness.
Almost ten years ago I participated on a panel of attorneys for a CLE presentation in San
Francisco. The panel included a well-known practitioner in San Francisco with a practice
focusing on representing attorneys in ethical dilemmas or bar disciplinary matters. I asked him
whether he thought the failure to use available technology violated ethical obligations. I found
his response very interesting: Although he did not think we had yet reached that point, he could
see it happening in the future. We since have traveled another decade on the technology express.
If we have not yet reached that point, we have come some ten years closer to getting there; I do
not think it is much farther down the road.
We want to use available technology to make ourselves better, faster, and more efficient lawyers.
Perhaps equally importantly, the ethical obligations imposed on our conduct as lawyers may
already compel us to use available technology in our practices—and, if not yet, they will likely
do so soon.
Accordingly, we can safely assume that most lawyers either have started to make use of available
technology in their practices or will do so soon. Similarly, we can anticipate that those who
employ technology in their practices will increase its use in a steadily progressing trend.
Recognizing that technology can serve as a double-edged sword, we need to explore the aspects
of technology most likely to cause problems for lawyers when employed in their practice. We
will focus on the ethical problems technology can create, not the business issues. That said, I
would consider myself remiss if I did not at least mention the fact that any implementation of
99
technology should start with an analysis of the function it will serve and whether it truly offers a
benefit to the practice.
Improperly employed technology can create massive inefficiency. I have seen many people
spend outrageous amounts of time in the interest of being more efficient through technology.
Remember that improperly chosen technology and improperly implemented technology will not
make you better, faster, stronger, or more efficient. It can, however, make you slower and far less
efficient—technology can turn into a massive sinkhole for your time and your staff‘s time.
Here are a few general tips to help you navigate these dangerous waters.
Lawyers will, of necessity, depend on newer technology to get an edge over (or sometimes just
to keep up with) opposing counsel; so let‘s explore some of the other dangers associated with the
use of technology.
Data security: One of the best-known technological dangers relates to the security of our data.
Loss of a computer through carelessness or theft poses the biggest threat to data security. We
have all heard about hackers breaking into computers via the Internet and stealing data, or of
malware taking over a computer, logging keystrokes, or sending data to third parties without
notice to us or our approval. These risks exist, and lawyers, in particular, must guard against
them owing to our ethical and legal obligations to protect the confidentiality of our clients‘
information. Another aspect of data security concerns the loss of the data owing to computer
malfunction (as opposed to loss of the computer or theft of the data by a hacker or scanner).
Losing critical client information or work product owing to a failure to adopt and properly
employ a reasonable and appropriate backup system would be difficult to defend as competent
legal practice in today‘s world.
100
As lawyers employ more and more mobile technologies, the risks to data security increase. Most
of us use laptop computers when we travel. That laptop undoubtedly has both personal and client
data that we do not want to put at risk. Many of us have adopted the use of smart phones instead
of mere mobile telephony devices. Smart phones provide many advantages and conveniences to
us. They concurrently place information contained in the phone at risk. People lose computers to
theft and sometimes just leave them someplace. Even more smart phones than computers get
lost, left behind, or stolen. Additionally, once these devices have an active Internet or cellular
connection, someone with sophisticated electronics could potentially read the data they contain
even while the devices remain in your possession.
The problem of data security is exacerbated as more and more lawyers convert paper files to
electronic files to replace or at least supplement the paper files. We generally keep these files on
our computers, and as we adopt mobile technology, more and more of that data leave the office
with us. By taking the data out of the office on a laptop or a handheld device, we increase the
risk of loss of the data. To the extent that it contains client confidential information, the loss of
that data can pose both practical and ethical problems for attorneys.
Here are some guidelines to follow to protect data security and integrity:
101
11. Do not allow unauthorized persons to use your computers, smart phones, or other devices
containing data.
12. As mobile telephony and e-mail are not always secure, I recommend putting clients on
notice of that fact and letting them choose whether they wish to convey information
between you and them using such devices. I include a disclosure in my representation
letter, advising of the risk and telling them it is their choice. You might also point out to
them that choosing not to use such devices will likely result in slower communication of
information. You can also let them know that they can and should consider securing e-
mail through encryption.
Metadata: Hopefully, by now most of you know about metadata—the ―hidden‖ information
stored in an electronic file. Sometimes the information can help us do our work. Metadata
enables a word processing program to let you undo changes and/or track changes in a document.
In fact, vendors tout these features as benefits and, in many cases; they do help us do our work.
On the other hand, if you can see all the changes that have been made in an electronic document,
then so can others to whom you give the file. Because we may not want that history or other
information about the file to go to a client or opposing counsel, metadata poses a threat to us as
well as a benefit. Metadata can attach to virtually any electronic file, but word processing
documents pose the most common and, therefore, the most serious threat.
Here are some tips to help protect you against metadata problems:
The issue becomes important in advising your clients as well, because metadata will reside on
their computers. If, during the course of litigation, electronic discovery processes require the
102
production of information on the computer in its native form, then the electronic files will go to
the opposing side with all the attendant metadata. Having the metadata makes their work
somewhat easier as many document programs can read the metadata and use the information to
populate some of the blanks in their database respecting the document, thereby saving time in
recording the results of the production.
Software as a service: Recently, we have seen a change in the structure of how we deal with
programs that help us in our practice. Historically, we would buy a program, install it on our
computer, and proceed to use it. We might over time buy updates or new versions of the software
to acquire new features or ensure compatibility with a new operating system. The software
would run on our computers. The data generated would remain in our office computers. The
publisher would generally provide some technical support, often at no cost for a period of time
and with a charge thereafter.
The new evolution goes by the acronym SaaS (software as a service). The SaaS vendor provides
software on its server; accessible to you via your browser from anywhere you have Internet
access. You pay a subscription fee and get to access and use the vendor‘s program and input and
process your data. Generally, your data remains on the vendor‘s server. Some software also
facilitates backing up to your computer. Without access to the software, however, you might not
have the ability to use the data in a reasonable and economically viable manner.
Vendors like SaaS for several reasons. It gives them a steady source of revenue without having
to generate new sales of the original software or updates. You effectively pay a rental fee for the
ability to use their program. The SaaS structure allows vendors to more easily (and perhaps less
expensively) provide technical support for their program, as they only need to support the current
version. Everyone will use the current version as they all access it online. When the vendor
modifies or upgrades the program, all users must automatically adopt the change. This avoids the
customer‘s decision- making process entirely. Additionally, it often avoids the issue of platform
specificity as browser access generally allows people on both the Mac and Windows OS to use
it.
In the SaaS environment, the consumer generally needs less and may get better tech support. The
consumer avoids the pain of having to decide whether to purchase or install a given upgrade. The
consumer gets the most current version of the software. The cost savings on advertising and
103
distribution in conjunction with the monthly subscription fees may encourage the vendor to
continually improve the software.
On the other hand, the consumer often becomes the vendor‘s captive. If the program stores the
information in a proprietary structure, even if you can save a copy of your data to your storage
device, you may not have the ability to access it without the vendor‘s software. If you cancel
your subscription, you face the task of trying to convert your data to another system.
Additionally, even if the vendor allows you to make a copy of the data on your computer, a copy
of the information resides on the vendor‘s server. Information that resides on the vendor‘s server
is accessible by those who have or gain access to the server, whether or not they do so
legitimately.
Here are a few tips to help you protect yourself in the SaaS world:
1. Look closely at the vendor, its history, and financial stability. How likely is it that the
vendor will continue in business?
2. Even companies that appear large and stable can fail. Accordingly, the inclusion of a
software escrow structure makes good sense.
3. Look for the ability to retrieve data and store it in a usable format on your own storage
devices.
4. Determine whether the program converts data to a proprietary format that you cannot use
with other software. Look for programs that do not do that.
5. Does the vendor‘s system provide secure connections? You should consider ―secure
sockets layer‖ (SSL) technology an essential. SSL provides a level of encryption
protection for your data, even when transmitted over a public WiFi connection. Most
likely, you will see some form of lock icon when you transmit over a SSL.
6. Consider server security. Investigate what protective measures the vendor employs to
lock out hackers. Remember that you have the obligation to ensure the security and
confidentiality of your client‘s information.
7. Look at the server backup structure. Even if you can back up your data to your own
storage devices, you will want a provider that practices reasonable, safe, redundant, and
geographically dispersed backup of its server.
104
Cloud computing (storing information in cyberspace) raises many of the same ethical concerns,
and you can protect yourself and your use of cloud computing by following the above-listed
suggestions (particularly 1, 5, 6, and 7) with respect to the provider. On the other hand, the use of
cloud computing can help protect data against falling into the wrong hands, particularly from the
loss of a computer owing to carelessness or theft.
Conclusion
I want to leave you with a few thoughts respecting protecting yourself and your data with any
program you may choose to use, whether SaaS or locally located:
1. Regularly back up your data to your own storage devices. Use redundant systems for
security, and make sure one copy of your data resides outside of your office. Be sure you
know how to convert the data to a usable format.
2. Use a reliable encryption program for your confidential data. Be sure to pick a strong and
secure password. Random collections of numbers, letters, and symbols work best. Most
of us find such a random collection difficult to remember, so pick something you can
remember that includes numbers and letters and then add a symbol or two for good
measure.
3. Use good security software for your own computer (anti-malware and antivirus). Use it
regularly to ensure that a hacker does not breach your own system security.
4. Keep your network secure and your computer safe from intruders.
Following the tips listed above can also help reduce exposure. Remember, wisely selected and
carefully implemented technology can make you better, faster, and more efficient as an attorney.
Poorly chosen and badly implemented technology can make you slower and less efficient and
also get you into hot water ethically.
105
MODERN TRENDS OF ICT IN EDUCATION
Introduction
In the spirit of the new technology and advancement dealing with high resolutions and lists of
high technology in almost every sector; it is imperative to discuss Global Trends in ICT and
Education for 2010 and beyond.
1. Mobile Learning. New advances in hardware and software are making mobile ―smart
phones‖ indispensable tools. Just as cell phones have leapfrogged fixed line technology
in the telecommunications industry, it is likely that mobile devices with internet access
and computing capabilities will soon overtake personal computers as the information
appliance of choice in the classroom.
106
2. Cloud computing. Applications are increasingly moving off of the standalone desk top
computer and increasingly onto server farms accessible through the Internet. The
implications of this trend for education systems are huge; they will make cheaper
information appliances available which do not require the processing power or size of the
PC. The challenge will be providing the ubiquitous connectivity to access information
sitting in the ―cloud‖.
5. Gaming. A recent survey by the Pew Internet and American Life Project per the Horizon
Report found that massively multiplayer and other online game experience is extremely
common among young people and that games offer an opportunity for increased social
interaction and civic engagement among youth. The phenomenal success of games with a
focus on active participation, built in incentives and interaction suggests that current
educational methods are not falling short and that educational games could more
effectively attract the interest and attention of learners.
7. Quickly become a relic of the industrial age as schools around the world are re-thinking
the most appropriate learning environments to foster collaborative, cross-disciplinary,
students centered learning. Concepts such as greater use of light, colors, and circular
tables, individual spaces for students and teachers, and smaller open learning spaces for
project-based learning are increasingly emphasized.
9. Smart portfolio assessment. The collection, management, sorting, and retrieving of data
related to learning will help teachers to better understand learning gaps and customize
content and pedagogical approaches. Also, assessment is increasingly moving toward
frequent formative assessments which lend itself to real-time data and less on high-
pressure exams as the mark of excellence. Tools are increasingly available to students to
gather their work together in a kind of online portfolio; whenever they add a tweet, blog
post, or photo to any online service, it will appear in their personal portfolio which can be
both peer and teacher assessed.
10. Teacher managers/mentors. The role of the teacher in the classroom is being
transformed from that of the font of knowledge to an instructional manager helping to
guide students through individualized learning pathways, identifying relevant learning
resources, creating collaborative learning opportunities, and providing insight and
support both during formal class time and outside of the designated 40 minute instruction
108
period. This shift is easier said than done and ultimately the success or failure of
technology projects in the classroom hinge on the human factor and the willingness of a
teacher to step into unchartered territory.
These trends are expected to continue and to challenge many of the delivery models
fundamental to formal education as it is practiced
References
Gouzouasis, P. &Bakan, D. (2011).The future of music education and music making in a
transformative digital world. The UNESCO Observatory E-Journal. Available
at http://www.abp.unimelb.edu.au/unesco/ejournal/e-journals.html
Leggo, C., Sinner, A. E., Irwin, R. L., Pantaleo, K., Gouzouasis, P. &Grauer, K. (2010).
Lingering in liminal spaces: a/r/tography as living inquiry in a language arts class. International
Journal of Qualitative Studies in Education,.
Weibe, S., Irwin, R., Leggo, C., Gouzouasis, P., Grauer, K., &Sameshima, P. (2008). Re-
imagining arts integration: Rhizomatic relations of the everyday. Journal of Educational
Thought, 41 (3), 263-280.
Gouzouasis, P. (2006). Arts-based technology in education: Is there room for the arts at the
desktop? Arts Education Policy Review,107 (5), 3-9.
Gouzouasis, P. &LaMonde, A. M. (2005, July 3). The use of tetrads in the analysis of arts-based
media. International Journal of Education & the Arts, 6 (4).Retrieved July 4, 2005
from http://ijea.asu.edu/v6n4/.
109
Gouzouasis, P. (2001). The role of the fine arts in new media and Canadian education for the
21st century. Education Canada, 41(2), 20-23.
Gouzouasis, P. (2003). The FAME Project: New pedagogies and praxis for teachers and students
in the 21st century. From proceedings of the 3rd International Conference on Technology in
Teaching & Learning in Higher Education. (C. Spirou, ed.), 83-88.
Thomas, L., & Bitter, G. G. (Eds.) (2000). National Educational Technology Standards:
Connecting Curriculum and Technology. Eugene, OR: ISTE.
Rupert, W. (2008). Dialogic, Education and Technology: Expanding the Space of Learning:
Springer
Gillespie, H.(2006). Unlocking learning and teaching with ICT : identifying and overcoming
Buckingham, D.(2007). Beyond technology: children's learning in the age of digital culture
Forrest,P.W.(2006). Curriculum and instruction for becoming a teacher
Newby, T.J. at all (2005). Educational Technology for Teaching and Learning (3rd Edition)
Roblyer, M.D. (2006). Integrating Educational Technology into Teaching (4th Edition) :
PEARSON
110
Sample Paper 1
Model Exam 1
INSTRUCTIONS TO STUDENTS
1) This exams consists of Five(5)questions. Answer Any three(3)questions. Question 1 is
compulsory
2) Cheating of all forms is forbidden. Students who cheat will be penalised.
QUESTION ONE
(a) Outline the characteristics of a computer that makes it a tool for instructional media. [4
Marks]
(b) Giving examples, discuss the three technologies used in making secondary storage media. [6
Marks]
(c) Discuss any five disadvantages of using computers in a school. [10 Marks]
Discuss the various uses of computers in our schools today safe teaching. [20 Marks]
112
Sample paper 2
Model Exam 2
INSTRUCTIONS TO STUDENTS
4) This exams consists of Five(5)questions. Answer Any three(3)questions. Question 1 is
compulsory
5) Cheating of all forms is forbidden. Students who cheat will be penalised.
(a) Distinguish between system software and application software. Give at least two
examples of each. [4 marks]
(b) With relevant illustrations, explain the difference between LAN and WAN types of
computer networks. [3 marks]
(c) Explain the difference between teacher driven and student driven classrooms. [3
marks]
(d) Explain the terms Computer Aided instruction and computer aided design. [3 marks]
(e) Explain the proper procedure of shutting down a computer. Why is it important to
113
follow this procedure when you can simply switch off the main socket? [3 marks]
(f) Computers are prone to security threats from the outside world. Your friend can also
pose a security threat to your computer; explain measures you would take to protect
your data and programs stored in your computer. [5 marks]
(g) What is a www? Does it help learning? [3 marks]
(h) Explain the difference between synchronous and asynchronous data. [3 marks]
(i) Explain the relevance of spreadsheet software and presentation software in a school
such as a secondary school. [3 marks]
(a) Using a well labeled diagram, explain the role of the various functional components
of a computer laboratory. [10 marks]
(b) Explain how a computer lab can be safe. [10 marks]
(a) In a classroom, explain what communications media is. With relevant examples,
explain the two major types of communications media [10 marks]
(b) After purchasing a computer, you just discovered that some of the work you
intended to accomplish such as playing games could not be done. After consultation,
you learnt that you can increase your computer’s abilities. Explain any THREE ways
you might have learnt to increase the abilities of your computer. [10 marks]
114