0% found this document useful (0 votes)
231 views

Interact With Information Technology 3 Answers

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
231 views

Interact With Information Technology 3 Answers

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 85

Chapter 1 Being IT safe – taking care of IT things (3)

Interact with Information Technology 3

Questions and answers 1

Copy and fill in the blanks questions


A fragmented disk is one in which the files on the disk are divided into several segments
1 
and stored in different locations.
2 Drivers are a type of software that allows the hardware device to communicate with the
computer’s operating system.

True or false questions


1 The print queue shows the status of each job, as well as the general status of your printer. 
True
2 If the speakers are plugged into the wrong port, you will not hear sound.  True
3 A keyboard may not work if its wireless adaptor is connected to the computer.  False
4 Defragmenting your hard drive will destroy all the information on it.  False

Multiple-choice questions
1 
Which of the following is NOT a cause for the computer not starting up when the power button
is pressed?
a
A loose cable b A bad power strip
c The speaker not plugged in d A flat battery
2 All are causes for a frozen computer except for:
a
an infection by a virus or malware.
b
driver corruption.
c
an overheating system.
d a keyboard that is not working.

Interact with Information Technology 3 1


Chapter 1 Being IT safe – taking care of IT things (3)

Short-answer questions
1 Explain the term ‘troubleshooting’.

Troubleshooting is finding the source of a problem and fixing it.

2 List two situations for which you need to contact a technician.

Situations in which you would need to contact a technician:


• if the computer shows a blue screen
• if the internet/WiFi is slow or not working after troubleshooting
• if the computer will not start up.
(Any two)

3 Give two reasons why you should record the steps you take in troubleshooting a problem with
your computer system.

Two reasons for recording the steps when troubleshooting:


• to prevent repeating a step, as there are usually many approaches that can
be used
• so that you can send the steps to the technician to help her or him diagnose
the problem.

Scenarios
Use the troubleshooting form to identify and suggest possible solutions for problems:
1 Jason is using his mother’s computer. He plugs in his flash drive, but it does not appear in the
Explorer window. Suggest what Jason can do to try and resolve the problem.

To resolve the problem, Jason could:


• Try another USB port.
• Check if the drive is physically locked.
• Do a virus scan.

2 The computer shows a blue screen when you start it. How can you solve this problem?

To resolve the problem of a blue screen when starting the computer, first try
rebooting. If that does not work, call a technician to have a look.

3 Your sister uses her computer on the bed. She complains that her computer continually shuts
down and restarts.

I would suggest that my sister should:


• Check for a possible blocked air vent.
• Scan for any viruses.

Interact with Information Technology 3 2


Chapter 1 Being IT safe – taking care of IT things (3)

Research question
Determine if your school has any guidelines or policies based on the Occupational Safety and
Health Act to protect employees and students when using ICTs in the school.
Hint: Ask your school's health and safety officer or guidance counsellor, teachers or principal.
Your school may have a representative for the school board or teacher’s union from whom you can
get information.

Remind students that they would first have to make an appointment/arrange a time
to see the school's health and safety officer, guidance counsellor, teachers, principal or
school board/teacher's union representative.
Also remind students to treat any written documentation that might be available with
great care.

Project
Produce a campaign to promote health and safety practices when using the computer system.
You can use promotional flyers and charts, audio podcasts, speeches, debates, and demonstrations.
At the end of your campaign, create and distribute a survey to find out if students learned anything
from your campaign.

This project will challenge students' computer skills and a variety of other skills.
If any students have difficulties with where to begin, remind them of some steps they
can take:
• Do your research and set goals for what you want to achieve, such as 'What do you
want to get across to other students?' or 'What do you want to achieve by the end
of your campaign?'
• Do your planning.
• Implement/apply your planning, that is, write and create the promotional flyers,
charts, audio podcasts, speeches, debates and demonstrations.
• Look at the feedback you get from each form of promotion that you have used.
• Prepare your survey, collate the results and report back about what students have
or have not learned from the campaign.
• Think about what you could have done or can do to improve your campaign.

Interact with Information Technology 3 3


Chapter 1 Being IT safe – taking care of IT things (3)

Crossword
1
F

R
2
O A

V G
3 4
C D R I V E R S M

O R E
5
T R O U B L E S H O O T I N G

R E T
6
U A O E
7
P B T S D

T L I H
8
D E F R A G M E N T A T I O N

D N G

K
Across

4 The ‘blue screen of death’ can be caused by corrupt ______.


5 The process of finding the source of a problem and fixing it
8 The process of putting files back in a single location as one single file
Down

1 Files that are divided into several segments and stored in different locations on the hard disk
2 A reason for a computer to randomly restart
3 When driver software that lets hardware communicate with a computer’s operating system has
errors, it is said to be ______.
6 The Act that contains regulations to safeguard employees in the workplace
7 A computer being asleep or in hibernation mode can be a reason for a ______ screen.

Interact with Information Technology 3 4


Chapter 1 Being IT safe – taking care of IT things (3)

STEM project
Kevin, your friend who is not doing IT at school, is working on a computerised presentation for his
mid-term English Language assignment and is having problems. Firstly, he successfully downloaded
a video from a website without a secured sign. Then he realised that he was not getting sound
during the video playback and now his computer screen has frozen. He has asked for your help to
get his presentation back on track.
1 What do you suspect are the major causes of the problems that Kevin is experiencing?
2 Outline the steps you would take in troubleshooting the problems.
3 Write brief notes to explain the most likely problems and corresponding solutions in language
that Kevin can understand.
4 Develop a checklist for Kevin if he has such problems again. Share it with a classmate.
5 What feedback did you receive from your classmate? How can you use this feedback to improve
your checklist?
Hints
1 Write down any assumptions you are making in suggesting the most likely problems.
2 Create a glossary of the IT terms that Kevin will not understand.

Remind students to read the hints and follow the instructions before starting this
STEM project.
Students' advice for this STEM project will vary. Below, are some example answers.
1 The major causes of the problems that Kevin is experiencing may be:
• Downloading the video from a website without a secured sign could mean
an infection by a virus or malware.
• No sound could mean driver corruption or a setting is incorrect.
• A frozen computer screen could mean an infection by a virus or malware,
driver corruption or an overheated computer system.
2 Here are some troubleshooting steps.
If the sound does not work:
• Check to see if the volume level is up. Click the Audio button (speaker icon)
in the taskbar. Double-clicking on the icon will bring up the audio controls.
See if the volume control is muted or turned down very low. Adjust the
controls or unmute the volume control.
• Check to see if the cables are securely attached to the computer and that the
speakers are plugged into the correct audio port.
• Check that you can hear sound by using headphones.
If the computer screen is frozen:
• Check if the indicator light on the mouse is on, as well as whether the
batteries in the mouse need changing.
• Check to see if any of the air vents are blocked.
• Hold down the Control, Alt and Delete keys together. Click on the Power
button icon that appears in the lower right-hand corner of the screen and
select Restart.

Interact with Information Technology 3 5


Chapter 1 Being IT safe – taking care of IT things (3)

• Press and hold down the Power button for 5 to 10 seconds to force the
computer to shut down. Restart the computer after a few seconds.
• LAST RESORT (Only attempt this if other options fail): Unplug the power
cord from the electrical outlet or if you are using a laptop that is not
connected to an electrical outlet, remove the battery. Wait for a couple of
minutes, reinsert the battery or plug in the computer and restart.
• Once the computer restarts, check your computer for viruses. Update your
antivirus software and scan your computer.
3 Students' notes to explain the most likely problems and corresponding solutions
in language that Kevin can understand will vary.
4 Students' checklists will vary. Remind students, when sharing their lists with
classmates, to give each other constructive criticism or feedback. They should
do this by giving ideas on how to improve a point or mistake.
5 The feedback will vary.

Interact with Information Technology 3 6


Chapter 2 Operating system (2)

Questions and answers 2

Copy and fill in the blanks questions


1 Windows 10 is Microsoft’s newest operating system for PCs, tablets, embedded devices
and Internet of Things devices.
2 File Explorer is the utility used for file management functions in the Windows 10 operating
system.
3 Utilities programs are system software programs that provide useful services by performing
common tasks and ‘housekeeping’ routines.
4 Device drivers are programs that enable a computer to interact with hardware devices that
are attached to it.

True or false questions


1 Firmware consists of RAM chips.  False
2 Microsoft Windows 10 Continuum allows users to toggle between touchscreen and keyboard
interfaces on devices that offer both.  True
3 The Windows 10 Search box allows you to quickly search your computer and the internet from a
location on the taskbar.  True
4 The Action Center is the main notification system for Windows.  True
5 Saving your files to the cloud means that you can only access them from one location.  False
6 A folder can only hold one file.  False

Multiple-choice questions
1 
An example of a graphic file extension is:
a
DOC b TXT
c
SYS d JPEG
2 Which of the following is a service performed by a utility program?
a Protecting against viruses b Booting up the computer
c
Interacting with hardware devices d Translating computer languages
3 The ‘Assignment’ file is stored in drive C in a folder named ‘Homework’, which is stored in a
folder named ‘ICT’. Which of the following represents the hierarchical structure of how the
‘Assignment’ file is stored?
a b ICT\Homework\:C\Assignment
C:\Homework\Assignment\ICT
c
C:\Assignment\Homework d C:\ICT\Homework\Assignment

Interact with Information Technology 3 7


Chapter 2 Operating system (2)

4 Which of the following best describes the function of a device driver?


a
Translating programs written in one programming language into another
b Acting as a translator between the hardware device and the operating system
or programs that use it
c 
Scanning a hard disk for bad sectors and either repairing these sectors, or marking them so
that the operating system will not store any data in that location
d 
Making a duplicate copy of every file on the hard disk, which can be stored on an external
hard drive
5 Utility programs are an example of:
a system software programs. b application software programs.
c
graphic programs. d productivity software.

Short-answer questions
1 Name the type of software that can perform each of these tasks:
a
Back up data files and software
b
Translate programs from one programming language to another

a Utility software can be used to back up data files and software.


b Language translator software can be used to translate programs from one
programming language to another.

2 Mary wants to organise her notes and assignments for her four subjects: mathematics, physics,
chemistry and communications. She wants a folder for each subject. However, she also wants
her assignments in one folder and her notes for that subject in another folder. All the information
must be stored in the Documents folder in the C:\ drive.
a
Draw a hierarchical chart to show how Mary’s notes and assignments would be stored.
b
The file ‘Quiz 1’ is stored in the mathematics folder. Write out the location of the file ‘Quiz 1’.

The following show the hierarchical charts of how Mary's notes and assignments
would be stored.
a C:\Documents\Mathematics\Assignments\ and
C:\Documents\Mathematics\Notes\
C:\Documents\Physics\Assignments\ and
C:\Documents\Physics\Notes\
C:\Documents\Chemistry\Assignments\ and
C:\Documents\Chemistry\Notes\
C:\Documents\Communications\Assignments\ and
C:\Documents\Communications\Notes\
b C:\Documents\Mathematics\Assignments\Quiz 1\

Interact with Information Technology 3 8


Chapter 2 Operating system (2)

Research questions
You are an analyst for a small manufacturing company in Jamaica. The company has 200 desktop
computers that run the Windows 7 operating system. This year, the company plans to upgrade the
operating system of all the desktop computers to Windows 10. You are asked to do research on the
internet and provide the following information:
1 How much would it cost to upgrade one computer?
2 What are the memory and storage requirements of Windows 10?
3 Will the existing system be able to run the operating system or will new systems be required?
4 Which of the two operating systems provides better protection against malware?
5 Which new features included in Windows 10 are not available in Windows 7?

1 The cost of upgrading from Windows 7 to Windows 10 will vary according to


students' research. Examples are $139 or $199.
2 Students will find examples of the memory and storage requirements of Windows 10
in various places during their research. They can search using the question,
a shortened version of the question or 'Microsoft support'.
3 Students' research should tell them that Windows 7 will be able to run the operating
system, as both OSs have similar hardware requirements.
4 Students should find that Windows 10 provides better protection against malware.
This information will appear by doing a search using the question itself or a
shortened version.
5 Students should easily find the differences by searching for 'features of Windows 10
versus Windows 7'.

Interact with Information Technology 3 9


Chapter 2 Operating system (2)

Crossword
1
J
2
P H

E I
3
F R A G M E N T E D

R
4
F I R M W A R E

R
5
D I R E C T O R Y

H
6
U T I L I T I E S

A
7
X L S
Down

1 The extension of a graphics file commonly used for photos and illustrations
2 A structure for storing files that makes retrieval of files very easy
Across

3 The term for constituent parts of a typical file being scattered all over the hard disk
4 Programming that is added to a computer’s non-volatile memory at manufacturing
5 Used to hold documents, programs, files and folders
6 System software programs that provide useful services such as performing common tasks and
‘housekeeping’ routines
7 The extension of a spreadsheet file created by Microsoft Excel

Interact with Information Technology 3 10


Chapter 2 Operating system (2)

STEM project
Mr David works for the Government Statistical Office where Windows 10 has just been installed.
He previously used Windows 7 for about five years. He is currently working on a national survey of
the spending habits of individuals whose income exceeds $6 000 per month.
The categories of spending are food, transportation, utilities, entertainment and savings. Mr David
had previously compiled separate electronic Word tables of persons employed in the public and
private sectors. He is now setting up his system for sending out the survey and collecting and
storing the responses. His system will allow for hard copies of the survey forms to be sent via post
and for soft copies to be emailed. His supervisor is urging him to have the system up and running as
quickly as possible so that the data collected can be sent for analysis by the Consumer Affairs Office.
You and a group of your classmates who are very knowledgeable about Windows 10 have been
asked to help Mr David in any way possible. His report on the usefulness of your help will provide
you and your classmates with points towards winning the National Youth IT Awards.
1 Write a paragraph stating three positive comments you would like to see in Mr David’s report on
your contributions to his survey.
2 What are six critical pieces of information about Windows 10 that you can share with Mr David
to help make his survey both speedy and successful?
3 How do you plan to present your information to Mr David so that he can easily refer to it as
needed?
4 Draw a hierarchical chart to show how survey questionnaires sent and received can be stored in
a useful manner for export to the Consumer Affairs Department.
Hints
1 Research how data and information are handled at your Government Statistical Office. How can
this help you assist with the current survey?
2 Why do you think the Consumer Affairs Office wants to analyse the data? How can this guide
you in assisting Mr David?

Remind students to read the hints and follow the instructions before starting this
STEM project.
Students' paragraphs containing their three positive comments, their six critical
pieces of information about Windows 10, and their ideas on how they plan to
present their information will vary.
Check that students' hierarchical charts show full understanding of the order of the
hierarchical structure for storing files.

Interact with Information Technology 3 11


Chapter 3 Data communications, networks and the internet (3)

Questions and answers 3

Copy and fill in the blanks questions


1 Live chat software installed on websites allows businesses to provide personalised
customer support.
2 A podcast is online audio content that is delivered over the internet.
3 Webinar refers to conducting a seminar or lecture via the World Wide Web.
4 Data integrity means the consistency, accuracy and reliability of data.
5 Malware is software that specifically intends to corrupt, steal, disrupt or erase data or
information on a network.
6 Eavesdropping means to tap into a telephone or data transmission line and secretly listen
to conversations or access data being transmitted.

True or false questions


1 Local area networks can be used for sharing computer resources such as printers, modems,
DVD-ROM drives and hard disks.  True
2 The exchange of data is affected when devices are moved to another location in a personal area
network.  False
3 Wide area networks do not allow organisations to distribute work to other locations.  False
4 Many devices can be connected to one device at the same time in a personal area network. 
True
5 Podcasting allows listeners to decide what programming they want to receive and when they
want to listen to it.  True
6 A webinar is short for ’web-based seminar’.  True
7 Data security relates to the consistency, accuracy and reliability of data.  False
8 A malware threat refers to software that specifically intends to corrupt, steal, disrupt or erase
data or information on a network.  True

Interact with Information Technology 3 12


Chapter 3 Data communications, networks and the internet (3)

Multiple-choice questions
1 
All are security methods used to protect a network from internal threats, except for:
a
biometric devices. b antivirus software.
c
passwords to access the system. d passwords to access files.
2 Which of the following is an example of an external threat to an organisation’s network?
a Malware threats
b
An employee who intentionally deletes confidential information for personal gain
c
No suitable authentication procedures
d
No suitable accounting processes
3 Which of the following delivers online audio content over the internet?
a A podcast b A webinar
c
A webcast d A live chat

Short-answer questions
1 An internal threat comes from from inside the organisation and commonly occurs due to
employee actions or weak access control.
a 
Give two examples of employee actions that may result in an internal threat to an
organisation’s network.
b 
Describe three weak access-control procedures or processes that can cause an internal
threat to a network.
c
Describe three security methods that can protect a network from internal threats.

a Two examples of employee actions that may result in an internal threat to an


organisation’s network are:
• 
deliberately modifying, deleting or stealing confidential information for
personal gain

sabotaging a company’s data, systems or network.
b Three weak access-control procedures or processes that can cause an internal
threat to a network are:
• no suitable authentication procedures – no pins on biometric doors

no suitable authorisation procedures – only persons authorised should
access systems and files

no suitable accounting processes – no audit trails or access logs to see
accounting processes.
c Three security methods that can protect a network from internal threats are:

Use security guards.

Use passwords for individual files and folders.

Generate audit trails/access logs.

Interact with Information Technology 3 13


Chapter 3 Data communications, networks and the internet (3)

2 An external threat comes from outside the organisation and intends to corrupt or steal
confidential information.
a
Describe three external threats to an organisation’s network.
b 
For each external threat described in (a) above, state two security measures that can be
used to protect the network.

a Three external threats to an organisation's network could be:


• Malware – this is software that corrupts, steals or disrupts data such as
viruses and worms.

Eavesdropping – this is tapping into a telephone or data transmission line
to secretly listen or gain access to information transmitted.
• 
Industrial espionage – this is spying on competitors to steal confidential
formulae, products, etc.
b Examples of two security measures for each external threat, are as follows.
To protect a network from malware:

Install a firewall.

Install antivirus systems.
To protect a network from eavesdropping:

Encrypt data transmissions.

Do an electronic search of the radio frequency spectrum to detect
unauthorised signals.
To protect a network from industrial espionage:

Establish an effective security policy such as 'No password sharing' and
'No personal devices allowed at work'.

Conduct background checks on all employees.

3 The domain name system (DNS) allows users to refer to hosts by names.
a What is the domain name system?
b Using the web address ‘Caribbean.holiday. fun.com’, explain how the DNS system works to
locate information on the internet.

a 
The DNS divides the internet into a series of domains. It uses a hierarchical
naming system or tree structure to represent a host.
b Explanation of how the DNS system works to locate information on the
internet: 'Caribbean.holiday.fun.com' would first be translated into an IP
address so that the internet can locate the host. 'Holiday.fun.com' points to the
holiday section of the website and 'Caribbean.holiday.fun.com' gives the name
of the computer in the holiday section of the website.

Interact with Information Technology 3 14


Chapter 3 Data communications, networks and the internet (3)

4 Explain what each of the following types of websites may be used for:
a Personal websites b Photo-sharing websites
c Community-building websites d Informational websites

a Personal websites – may be used for anything you would like to share, such as
family photos, an online diary, and so on.
b Photo-sharing websites – may be used to offer free photo sharing and hosting
services.
c Community-building websites – may be used to build online communities of
people who want to interact with other people socially or meet people with
shared interests. Examples are Facebook, Twitter or Instagram.
d Information websites – may be used to provide information on a wide range of
topics, for example, businesses giving information about a product or service.

Research questions
Do research on the internet to find information to answer these questions.
1 What internet access plans are available in your country?
2 Prepare a table to compare internet access plans in your area. Include the name of the provider,
the type of access (cable or wireless), access speeds and cost.

1 Students should be able to find this information without too much trouble.
They could search using the question words plus the country, for example,
'What internet access plans are available in Jamaica?'.
2 Students' tables will vary. Check that students have formatted the tables correctly
and that they have the correct information under each heading.

Interact with Information Technology 3 15


Chapter 3 Data communications, networks and the internet (3)

Crossword
1
B
2
W E B I N A R
3
O D

M O
4
W E B C A S T
5
M T
6
E A V E S D R O P P I N G

N I

Across
2 Conducting a seminar or lecture via the WWW
4 The delivery of a live or delayed sound or video broadcast over the World Wide Web
6 To tap into a data transmission line to access data being transmitted
Down

1 A device that authenticates a person’s identity by converting a personal characteristic, such as


a fingerprint, into a digital code, which is then compared to the digital characteristic code stored
in a computer
3 An attack that floods a computer or website with data, causing it to overload and prevent it
from functioning properly
5 A computer network that interconnects users with computer resources in a geographic area
that spans an entire city or very large campus

Interact with Information Technology 3 16


Chapter 3 Data communications, networks and the internet (3)

STEM project
While using her personal computer at work, Maxine realised that files had appeared on it that she
had not put there herself, after she had downloaded other files from the company’s WAN. Based on
her knowledge of IT, she realised that she had malware on her computer and immediately informed
the IT Department in her company. You and your classmates are members of the IT Department.
(Note to teacher: Divide the class into even numbers of groups.)
1 What is the most immediate action the IT Department should take?
2 List the steps that the IT Department should take to prevent the malware from spreading.
3 Prepare an advisory to all staff members on the appropriate actions that they need to take,
in order of the most urgent first. What is the safest way to share this advisory?
4 Share your advisory with another group and obtain feedback.
5 Use feedback to improve your advisory notice.
Hints
1 Revise the two main groups of malware and how they act on a computer system.
2 What are the features of an effective advisory for this situation?

Remind students to read the hints and follow the instructions before starting this
STEM project. They should work together in their groups as a team.
1 Students' answers will vary but they should say something along the lines of:
The most immediate action would be for the IT department to disable the Wifi/
internet connection.
2 Students' answers about preventing malware from spreading will vary. Here are
just a few examples (there are others):

• 
Install a firewall.
• 
Update and run the antivirus/malware scanner. Clean the virus/malware
if found.
• Check for any updates to the program or application.
• Reboot the system
• 
Install a turnkey identity solution to protect and guard the network against
identity theft, malware and viruses.
3 Students' advisory of appropriate action that staff members need to take will
vary. Check that students have an understanding of internal and external
threats and how to deal with them.
4 and 5  he feedback and ways to improve each advisory will vary. Make sure
T
that students offer one another constructive criticism/helpful ways in
which to improve the advisory.

Interact with Information Technology 3 17


Chapter 4 Computer ethics and research (3)

Questions and answers 4

Copy and fill in the blanks questions


1 Cybercrimes are crimes that are directed at computers or other devices (for example,
hacking), and where computers or other devices are integral to the offence.
2 Individuals or teams of people who use technology to commit malicious activities on digital
systems or networks with the intention of stealing sensitive company information or personal
data to make a profit are known as cybercriminals .
3 The act of engaging in offensive, menacing or harassing behaviour towards other individuals
using electronic means is called cyberbullying .
4 An internet troll is a person who deliberately posts abusive or derogatory online comments
to social media or websites to provoke reactions from readers.
5 The unauthorised copying, use or selling of copyrighted software is known as
software piracy .
6 Malware is a term used to describe different types of malicious software, which include
viruses, worms, spyware, ransomware, Trojans and bots.
7 The ability of malware to move itself from computer to computer or network to network, thereby
spreading on its own, is known as self-propagating .
8 Phishing refers to attempts by cybercriminals and hackers to trick you into providing
personal information so that they can access your accounts or infect your machine with
malware.
9 The unauthorised accessing of a computer system is referred to as hacking .
10 Netiquette means respecting other users’ views and displaying common courtesy when
posting your views online.

True or false questions


1 Cyberbullying is not considered a type of cybercrime.  False
2 Posting hurtful messages, images or videos online is a form of cyberbullying.  True
3 Public domain software can be copied as many times as you like.  True
4 Adobe® Reader®, available from www.adobe.com, is an example of public domain software. 
True
5 Malware is often downloaded when someone opens an infected email attachment or clicks on a
suspicious link in an email.  True
6 Using storage media from other computers in your computer does not pose any malware risk to
your computer.  False

Interact with Information Technology 3 18


Chapter 4 Computer ethics and research (3)

7 The UNIX or Windows 10 operating system can protect your computer from many types of
malware.  True
8 Downloading of infected programs and files from the internet by accident can spread malware. 
True
9 Phishing attempts cannot get through spam filters and security software that you may have on
your computer.  False
10 Hackers are usually poor computer programmers.  False

Multiple-choice questions
1 Which of the following is an example of cyberbullying?
a Sending friendly emails to a classmate
b Helping your friend with her homework online
c Gathering and posting personal information about an individual online
d None of the above
2 Which of the following might be the best method to deal with cyberbullying?
a Suspend your social networking accounts until the bullying stops.
b Try to meet the cyberbully to have a discussion.
c Ignore the cyberbully and hope it stops.
d All of the above.
3 A person who deliberately posts abusive or derogatory online comments to social media or
websites to provoke reactions from readers is known as a:
a hacker. b cyberbully.
c troll. d cyberstalker.
4 Malware is usually spread by all of the following except for:
a downloading infected programs and files from the internet by accident.
b opening infected files received through emails.
c placing an infected storage device such as a USB drive with other storage
devices in the same desk drawer.

d self-propagation.
5 One method of avoiding phishing attempts is to:
a try to contact the individual responsible for the phishing attempts.
b double-check that every URL where you enter your password looks legitimate.
c hire a hacker to hack the phisher.
d click the links the phisher sent to see what happens.

Interact with Information Technology 3 19


Chapter 4 Computer ethics and research (3)

6 Which of the following may be considered an online scam?


a Unexpected money prizes
b Threats and extortion from persons online
c Identity theft
d All of the above

Short-answer questions
1 Cybercrime is an issue that affects the lives of many people, businesses and organisations
around the world.
a Explain the terms ‘cybercrime’ and ‘cybercriminal’.
b List three cybercrimes.

a Cybercrime is crime that is directed at computers or other devices, and where


computers or other devices are integral to the offence.
A cybercriminal is an individual or team if people who use technology to
commit malicious activities on networks to steal sensitive company information
and make a profit.
b Three cybercrimes are, for example: hacking, identity theft and online scams.

2 Cyberbullying is becoming very common among secondary school students.


a Explain the term ‘cyberbullying’.
b List three three software tools used for cyberbullying.
c Explain the difference between cyberbullying and cyberstalking.
d State three examples of some ways in which cyberbullying can happen.
e List three steps that someone can take to deal with the problem of cyberbullying.

a Cyberbullying is when people behave in offensive, menacing or harassing


ways towards others using electronic means.
b Three software tools that are used for cyberbullying are emails, instant
messaging and blogs.
c Cyberstalking is when adults behave in offensive, menacing or harassing
ways towards other adults using electronic means.
Cyberbullying is when children behave in offensive, menacing or harassing
ways towards other children using electronic means.
d Three examples of ways in which cyberbullying can happen:
• 
posting harmful messages online
• 
hacking into individuals' online banking or email accounts and changing
passwords
• 
posting nasty gossip and chat online.

Interact with Information Technology 3 20


Chapter 4 Computer ethics and research (3)

e Three steps that someone can take to deal with the problem of cyberbullying:

Suspend social networking accounts until the cyberbullying stops.

Do not accept friend requests from strangers.

Do not post photographs of your home that might show its location.

3 a Explain the term ‘internet troll’.


b Describe three methods to deal with trolls.

a 
An internet troll is a person who deliberately posts abusive or derogatory
online comments to social media or websites to provoke or produce reactions
from readers who become angry because of the comment.
b Three methods to deal with trolls:

Ignore comments made by trolls.

Fight back with facts that may stop the attacks.
• 
Reveal the troll’s identity if possible, which will make them powerless and
therefore think twice.

4 a Give three examples of types of content that may be classified as prohibited, offensive and
illegal.
b Explain one potential risk of prohibited, offensive and illegal content.

a Three examples of types of content that may be classified as prohibited,


offensive and illegal are:

child pornography

sexting

very violent materials including sexual content.
b Prohibited, offensive and illegal content may be a potential risk because it may
reach children for whom such content can be damaging.

5 a Define the term ‘software piracy’.


b Describe three main types of software piracy.
c State three reasons why pirated software should not be used.

a Software piracy is the unauthorised copying, use or selling of copyrighted


software.
b Three main types of piracy are:

Internet piracy – Some websites allow individuals to download
unauthorised copies of software.
• 
Counterfeiting – Individuals or companies make illegal copies of software
and package it to resemble the original.
• 
Hard disk loading – Purchasing a legal copy of a software and loading it
onto other hard disks in other computers which are then sold.

Interact with Information Technology 3 21


Chapter 4 Computer ethics and research (3)

c Three reasons why pirated software should not be used:


• 
It is an infringement of ownership rights.
• 
It may not contain all the elements of the original program, thus causing
problems for the user.
• 
It can have viruses that can be harmful to your network or hard drive.

6 a Explain the term ‘copyright’ with reference to software.


b Explain the difference between public domain software and freeware software.
a 
All software has copyright, as the person or company who wrote it always
retains the right to decide whether or not it can be copied.
b Public domain software can be copied as many times as you like.
Freeware software can be freely downloaded for personal use.

7 a Explain the term ‘malware’.


b List three ways in which malware can be spread.
c List three signs that your computer has malware.
d Describe three methods of preventing your system from becoming infected with malware.

a Malware is any program or file that is harmful to a computer.


b Three ways in which malware can be spread:
• 
opening infected files received through emails
• 
downloading infected files or programs by mistake from the internet
• 
using a storage device that is infected.
c Three signs that your computer has malware:
• 
Weird or obscene messages appear.
• 
Documents have incorrect content.
• 
Garbled information comes up.
d Three ways to prevent a system from becoming infected with malware:
• 
Install a firewall.
• 
Install an antivirus program.
• 
Use an operating system such as UNIX or Windows 10 with security
features that protect against malware.

Interact with Information Technology 3 22


Chapter 4 Computer ethics and research (3)

8 a Explain the term ‘phishing’.


b List three methods to avoid phishing.

a Phishing is attempts by cybercriminals and hackers to trick you into giving


them personal information to access your accounts or infect your compute
with malware.
b Three methods to avoid phishing:
• 
Be vigilant.
• 
Think twice about opening a link that seems suspicious.
• 
Double check that any URL for entering password looks legitimate.

9 a Explain the term ‘hacking’.


b State three reasons for hacking.

a Hacking is the unauthorised accessing of a computer system.


b Three reasons for hacking:
• 
to steal important and confidential information
• 
to alter/change data
• 
to copy computer programs illegally.

10 a Explain two types of internet fraud.


b Describe two types of online scams.

a 
Two types of internet fraud:
• 
Credit card fraud, which involves setting up temporary fake businesses on
the internet.
• 
Online trading schemes involve customers buying goods via the internet.
The company may not deliver at all, or may deliver items that are worth less
than they paid or are inferior products.
b Two types of online scams:
• 
Unexpected prize scams involve online scammers informing you that you
are the 'lucky winner' of a large sum of money but then ask you to pay a sum
of money before you are actually given the money. However, you are never
given the so-called winnings.
• 
Identity theft involves someone else obtaining your personal information
and using it to commit fraud, sell your identity, and so on.

Interact with Information Technology 3 23


Chapter 4 Computer ethics and research (3)

11 a What is meant by the term ‘identity theft’?


b State three methods to protect yourself from identity theft.

a I dentity theft involves obtaining an individual's personal information and


using it to commit fraud, sell that person’s identity, and so on.
b Three methods to protect yourself from identity theft:
• 
Shred personal documents before tossing them in the bin.
• 
Use different secure passwords for all devices and ensure that they
are unique.
• 
Monitor accounts such as credit reports for suspicious activities.

Research questions
1 a Define the term ‘cybercrime’.
b Describe phishing, identity theft, DoS attack and hacking. For each type of crime, state one
way to prevent or reduce the chances of you or your company becoming a victim of such
a crime.
2 Conduct research on the Internet and complete the table for three major cybercrimes committed
over the last five years. List the type of crime, the year it was committed, a description of the
crime and the loss incurred.
Type of cybercrime Year Description of crime Loss incurred

3 Malware can cause problems for individuals and organisations. Complete the table below to
show the names of three types of malware that have caused problems for organisations and
individuals in the last 10 years.
Name of malware Year Description of attack Effects of attack/cost
to the individuals and
organisations

Interact with Information Technology 3 24


Chapter 4 Computer ethics and research (3)

Students' answers will vary. Here are some examples.


1 a C
 ybercrime is crime that is directed at computers or other devices, (for
example, hacking), and where computers or other devices are integral to
the offence. Cybercrime is an issue that has an impact on the lives of many
people, businesses and organisations around the world.
b Description of crime and a way to prevent or reduce the chances of you or
your company becoming a victim of such a crime:
Phishing refers to attempts by cybercriminals and hackers to trick you into
giving them your personal information so that they can access your account
numbers or infect your computer or device with malware.
To prevent phishing:
• 
Keep website certificates up to date so that users can be sure that the
websites are legitimate.
• 
Educate users about the best practices that they should follow when
using internet services. For example, users should think carefully about
clicking a link or opening a document that seems suspicious and should
double-check that every URL that requires a password looks legitimate.
Identity theft is a widespread crime that is continually changing with the
constant evolution of technology and trends. Cybercriminals have various
schemes to obtain your personal information and use it to steal your money,
sell your identity and commit fraud or other crimes in your name.
To prevent identity theft:
• 
Shred any documents containing personal information before you toss
them in the bin.
• 
Use secure passwords, meaning that you should make sure that you
password protect all your devices, and use a different, unique and
complicated password for each of your online accounts.
• 
Use secure connections. Never log on to financial accounts or shop
online while using free public WiFi, and make sure that you encrypt
and password protect your WiFi at home.
• 
Monitor accounts by reviewing your credit reports and bank accounts
periodically to look for suspicious activity and errors that could show
identity theft.
• 
Use detection products, such as an identity theft detection product that
includes identity theft restoration. If you do become a victim of identity
theft, you’ll be quickly and be able to get help from certified specialists
to help restore your identity.

Interact with Information Technology 3 25


Chapter 4 Computer ethics and research (3)

DoS (denial-of-service) attack is one that floods a computer or website


with data, which overloads and stops it from functioning properly.
To prevent a DoS attack:
• Install an antivirus program and firewall in the network, so that only
authenticated users can access the bandwidth.
• Set up the firewall policies to block unauthenticated users from
accessing the server’s resources.
Hacking is the unauthorised accessing of a computer system and the
individual who does this is called a hacker. Hackers may gain access
to your computer or device through security weaknesses, phishing or
malware. Once they have compromised your email, banking or social media
accounts, they can changºe passwords to prevent you from accessing your
accounts. Scammers often send out messages impersonating you, directing
people to fake websites or asking them to send money. To prevent hacking:
• Students should have similar points to those above, which include
having a firewall, antivirus, secure passwords, and so on.
2 and 3  Students' research for the information required for the two tables will
vary. Check that all students have entered valid information under each
heading.

Interact with Information Technology 3 26


Chapter 4 Computer ethics and research (3)

Crossword
1 2
T C
R Y
O B
L E
3
M A L W A R E
B
4
N E T I Q U E T T E
L
5 6
H L P
A Y H
7
C Y B E R C R I M I N A L S
K N S
I G H
N I
G N
G

Down
1 A person who posts abusive comments online to provoke reactions from readers
2 This occurs when someone engages in offensive, menacing or harassing behaviour towards
another person using electronic means
5 Unauthorised accessing of a computer system
6 Refers to attempts by cybercriminals to trick you into giving away personal information to gain
access to account numbers or to infect your PC with malware
Across

3 A term for different types of malicious software that includes viruses, worms, spyware,
ransomware, Trojans and bots
4 This means to respect other users’ views and displaying courtesy when posting views online
7 Individuals or teams of people who use technology to commit malicious activities on digital
systems to steal sensitive company information or personal data for profit

Interact with Information Technology 3 27


Chapter 4 Computer ethics and research (3)

STEM project
Your grandmother, who lives in a country outside of the Caribbean, now uses her computer every
day since you taught her how to use it. She sends emails to family and friends, blogs, joins in online
discussions and does online banking as well. Recently she read Jamaica’s new Cybercrimes
Act of 2015 and is now anxious about being a perpetrator or victim of cybercrimes. She has asked
you to prepare a quick reference checklist for her. You ask your classmates for help with preparing
this. (Note to teacher: Divide class into two groups, A and B.)
1 Decide on the content and format of the checklist. What process did you and your group follow
to decide on the content and format? Write a brief outline of this process.
2 Produce the checklist and ask your other group of classmates to evaluate it.
3 What feedback did you get from the evaluation? What improvements can you make in your
checklist?
Hints
1 Read Jamaica’s Cybercrimes Act of 2015 and summarise the main points.
2 List the major types of cybercrimes and write short notes on each one.

Remind students to read the hints and follow the instructions before starting this
STEM project. Only then should they plan and write the quick reference checklist to
make the grandmother more knowledgeable about how not to become a perpetrator
or a victim of cybercrimes, according to Jamaica’s Cybercrimes Act of 2015.

Interact with Information Technology 3 28


Chapter 5 Databases

Questions and answers 5

Copy and fill in the blanks questions


A database
1  is a collection of related data about a particular subject stored together.
2 A database package is a piece of software that enables you to organise and store related
data together, so that specific pieces of information can be retrieved easily and quickly.
3 A table is the basic unit of a database.
4 A field is an area reserved for each piece of individual data.
5 A record is a group of related fields relating to one person, place or thing.
6 A query is a method of storing and answering questions about information in a database.
7 The design view method lets you create a table from scratch.
8 A primary key is a selected field in a table that uniquely identifies a record.
9 A form is a method used to enter, view or print the information in a table or query other
than as rows and columns.
10 After you run a query, the answer (data) is displayed in a dynaset .
11 A report is used to display details and summary information about the contents of a
database.
12 A select query is the most common type of query.

True or false questions


1 You can only have one table in a database.  False
2 You can generate a report if you want to display information from a table or query.  True
3 You can build a query to extract information from only one table to answer a specific question. 
False
4 A primary key is a unique record identifier.  True
5 A primary key can allow you to run a query faster.  True
6 Accessing information from a manual database is faster than a database created in Access. 
False
7 A field is an area reserved for each piece of individual data.  True
8 A database can have a number of objects which you can select and manipulate.  True
9 The information in a table or query can be entered, viewed or printed other than as rows and
columns by using the form object.  True
10 You can also generate reports to display the information from a table or query in a customised
format.  True

Interact with Information Technology 3 29


Chapter 5 Databases

Multiple-choice questions
1 
Which of the following types of information can be stored in an electronic database?
a Text b Alphanumeric
c Date d All of the above
2 All of the following are problems associated with manual databases, except for:
a easy and fast retrieval of information.
b easily misplaced folders.
c large amounts of space for data storage.
d difficulty with accessing information from another location.
3 Which of the following is not an object found in a computerised database?
a Form b Table
c Spreadsheet d Report
4 An organised collection of related records is a:
a cell. b field.
c table d record.
5 A group of related fields relating to a single person is a:
a record b query.
c table. d report.
6 In a record containing these fields, FIRSTNAME, SURNAME, DOB, PHONENO, which of the
following would be the data type of DOB?
a Number b Text
c Date/Time d None of the above
7 A primary key can:
a speed up data retrieval.
b sort records according to values in fields.
c enable you to establish relationships between tables.
d do all of the above.
8 Which field can be used as a primary key?
a Surname b First name
c Phone number d Student number

Interact with Information Technology 3 30


Chapter 5 Databases

9 Which database object allows you to enter, view and print information in a table or query in a
format other than rows and columns?
a Report b Form
c Table d Query
10 Which database feature can be used to list the names of the female students from a table
holding information about a particular class?
a Table b Form
c Query d Report
11 Which is the most appropriate database data type storing the heights of students in a class?
a Text b Numeric
c Currency d Date/Time

Short-answer questions
1 Explain how an electronic database can help you to find information.

An electronic database can help you to find information much quicker by using
queries to retrieve the searched information.

2 The database table ‘Dental patients’ has the following fields:


Field Name Data Type Field Sizes
PatientNo
FirstName
Surname
DateofLastVisit
DOB
Address
PhoneNo
NoofFillings
NoofExtractions
a Copy and fill in the table with suitable data types and field sizes for the fields listed.
b Describe two queries that you may want to perform on the above database.
c List two additional fields that you could add to the above database table.
d Which field in this database table would you use as the primary key?

Interact with Information Technology 3 31


Chapter 5 Databases

a Example of suitable data types and field sizes:


Field Name Data Type Field Sizes
PatientNo Short Text 6
FirstName Short Text 15
Surname Short Text 15
DateofLastVisit Date/Time Short Date
DOB Date/Time Short Date
Address Short Text 30
PhoneNo Short Text 11
NoofFillings Number Integer
NoofExtractions Number Integer
b Two possible queries:
• 
Show all patients who did fillings.
• 
Show all patients who visited before 31/07/19.
c Two examples of additional queries:
• 
Appointment Date
• 
Health Insurance Company.
d 'PatientNo' would most likely be used as the primary key.

3 A Jamaican computer store keeps the details of its stock in a computer database.
Some of the records are shown in the table below.
You are required to complete the following questions.
a Create a database named ‘Computer Stock’.
b Create a table called ‘Laptop Inventory’ using suitable field names and datatypes to store
the information.
c Enter all the data shown in the table.
d Create a form.
e Enter three (3) records of your own using the form.
f Sort the table in ascending order of quantity.
g List all the information about computers that contain a 512 GB hard disk.

Interact with Information Technology 3 32


Chapter 5 Databases

h List those computers that have a 39.6 cm monitor and 512 GB hard disk.
Brand Quantity Processor Monitor size RAM Hard disk Price
Super 12 5.0 GHz 39.6 cm 4 GB 256 GB 60 500
Powermax 20 5.6 GHz 39.6 cm 8 GB 512 GB 95 000
Professional 23 5.3 GHz 35.6 cm 4 GB 128 GB 45 000
Kuta 30 5.3 GHz 39.6 4 GB 512 GB 75 000
Maxima 10 5.0 GHz 35.6 4 GB 256 GB 55 000
Eagle 15 1.66 GHz 39.6 4 GB 256 GB 43 000
Apex 11 1.66 GHz 35.6 4 GB 512 GB 48 900

a to d F
 or these questions, check that all students are able to follow the
instructions. Take note of students who may be having difficulties and
provide guidance.
e Students' should be able to enter three of their own records.
f Students must be able to sort the items (including their three additions) into
ascending (smallest to largest) order of quantity. The table provided shows
the order of the items in the table provided.
Brand Quantity Processor Monitor size RAM Hard disk Price
Maxima 10 5.0 GHz 35.6 4 GB 256 GB 55 000
Apex 11 1.66 GHz 35.6 4 GB 512 GB 48 900
Super 12 5.0 GHz 39.6 cm 4 GB 256 GB 60 500
Eagle 15 1.66 GHz 39.6 4 GB 256 GB 43 000
Powermax 20 5.6 GHz 39.6 cm 8 GB 512 GB 95 000
Professional 23 5.3 GHz 35.6 cm 4 GB 128 GB 45 000
Kuta 30 5.3 GHz 39.6 4 GB 512 GB 75 000
g Students should list the information about these brands (that contain a 512 GB
hard disk): Powermax, Kuta and Apex.
h Students should list these computers (with a 39.6 cm monitor and 512 GB
hard disk): Powermax and Kuta.

Interact with Information Technology 3 33


Chapter 5 Databases

Crossword
1
F

E
2
L D
3
D Y N A S E T

A
4
T A B L E

S
5 6
Q U E R Y

E
7
O B J E C T

Down
1 An area reserved for each piece of individual data or data item
2 A collection of related data about a particular subject (person, place or thing)
6 A group of related fields pertaining to one person, place or thing
Across

3 A group of records that answers a query


4 The basic unit of a database
5 A means of storing and answering questions about information in a database
7 An option you can select and manipulate in a database

Interact with Information Technology 3 34


Chapter 6 Integration across productivity tools

STEM project
In an effort to reduce driving infringements on the roads of a large Caribbean country, the issuing of
driving tickets is to be monitored in order to efficiently and effectively target motorists who break
the law.
The Transport Authority is holding a competition for all schools to help design an appropriate
database for the capture and easy access of this information. The idea will then be developed further
by the IT Department of the Transport Authority. The winning school will be given a cash prize and
on-the-job training for a maximum of six students when they reach employment age.
You and a group of your classmates under the guidance of your IT teacher are entering this
competition.
1 Write a statement on what your database will provide to the Transport Authority.
2 In a step-by-step approach, explain how you and your classmates plan to design this database.
Did you decide to appoint a lead person? Give a reason for your answer.
3 Set up your database and enter some data. Run a query to see how well it works.
4 What challenges did you face in designing and creating the database? How did you overcome
these challenges?
Hints
1 What are key items that you must have in your database? Ensure that you include all key items,
for example, name, driver’s permit number, date, type of offense, and so on.
2 Ensure that all class members contribute to the design and creation of the database.

Students' projects will vary. Check that all students were able to participate.
Remind them to read the hints provided and follow the instructions before starting
this STEM project.

Interact with Information Technology 3 35


Chapter 6 Integration across productivity tools

Questions and answers 6

Copy and fill in the blanks questions


1 
If the data source of a mail merge is an Access table, the Select Table dialog box displays the
access tables .
2 If the data source of a mail merge is an Excel table, the Select Table dialog box displays the
workbook sheets.
3 The Mail Merge Recipients dialog box displays all the records in the table.
4 The Write your letter mail merge dialog box allows you to view the fields for the document.
5 Moving data and graphs from an Excel spreadsheet to a Word document involves copying/
cutting and pasting .
6 To convert an Excel table into an Access table, the first row of the spreadsheet should contain
the field names or column headings .

True or false questions


1 A mail merge can be performed with a table created in Access as the data source.  True
2 The first step in performing a mail merge is selecting the document type.  True
3 Labels cannot be used as a document type in a mail merge.  False
4 The starting document in a mail merge must be an existing document only.  False
5 The Select Recipients dialog box allows you to indicate the location of the recipients.  True
6 The Write your letter mail merge dialogue box allows you to view the fields for the document. 
True
7 Moving data and graphs from an Excel spreadsheet to a Word document involves copying,
cutting and pasting.  True
8 An Access object such as a table cannot be imported into a Word document.  False

Interact with Information Technology 3 36


Chapter 6 Integration across productivity tools

Short-answer questions
1 Describe the steps to perform a mail merge if the datafile is an Access table.

The following text describes the steps to perform a mail merge if the datafile is an
Access table.
Mail Merge Wizard Step 1: Selecting the document Type
The first step in performing a mail merge is to select the document type. You can
perform a mail merge using any of the document types: Letters; Email messages;
Envelopes; Labels; Directory. Mark the document type you want and then click on
Next to continue.
Mail Merge Wizard Step 2: Selecting the starting document
The Select starting document pane gives you three options to choose from for
selecting the main document: Use the current document; Start from a template;
Start from existing document. Mark the starting document you want to use and
then click on Next: Select recipients.
Mail Merge Wizard Step 3: Selecting recipients
In the Select recipients pane, you have to indicate the location of the recipients
(the data source): Use an existing list; Select from Outlook contacts; Type a new
list. Mark your choice and then select Browse. The Select Data Source dialog box
will appear. Select the data source and click Open.
Mail Merge Wizard Step 4: Write your letter
The Write your letter mail merge pane is displayed. This option allows you to view
the fields for the document. Then, to write your letter:
• 
Open your Word document and click a location in the document where you
would like to place a particular field.
Then click More items. The Insert Merge Field dialog box appears.
• 
Select the field from the Fields dropdown menu and click Insert. The field will
• 
be inserted in the position selected. Repeat the process for each field. [bullet]
When all the fields you require have been inserted, click Next: Preview your
letters.
Mail Merge Wizard Step 5: Preview your letters
The Preview your letters pane appears. The Preview your letters dialog box
allows you to preview the merged letters. At this point, you can still make changes
to the recipients list if you wish. If you agree with the contents of the merged
letters, click Next: Complete the merge to move to the Mail Merge Wizard Step 6.
Mail Merge Wizard Step 6: Complete the merge
The Complete the merge pane appears. To display all the merged letters, click on
Edit individual letters. The Merge to New Document dialog box appears. If you
want to select all the records, mark the All button; otherwise input the appropriate
range and click OK.

Interact with Information Technology 3 37


Chapter 6 Integration across productivity tools

2 Describe the steps to perform a mail merge if the datafile is an Excel table.

Descriptions of the steps to perform a mail merge if the datafile is an Excel table:
When the data source file is opened, the Select Table dialog box is displayed.
• This dialog box displays all the sheets from the workbook selected.
• Select the sheet containing the data source and click OK.
• A
 s in Step 3 of the Mail Merge Wizard, the Mail Merge Recipients dialog box
displaying all the records in the table is displayed.
• Click OK to accept the data.

3 Explain one reason for moving data and charts from an Excel spreadsheet to a
Word document.

This is necessary if one document was prepared in MS Word and you want to
include a chart or graph done in Excel. Copying or cutting and pasting the chart
from Excel to Word would be necessary to complete the document done in
MS Word.

4 Explain the steps involved in importing a spreadsheet table or chart into a word processing
document.

Explanation of steps involved in importing a spreadsheet table or chart into a word


processing document:
• Open the Word document.
• Open the Excel workbook.
• Click the appropriate worksheet and select the data/chart required.
• Select Copy, Click the Word document on the taskbar to make it active.
• Position the cursor in the Word document where you would like to begin to
insert the data or chart and click on the Paste icon.

5 Describe the steps involved in publishing an Access object to a Word document.

The following text describes the steps involved in publishing/exporting an Access


object to a Word document:
• Open the source Access database.
• In the Navigation pane, select the object that contains the data you want to
export. You can export a table, query, form or report.
• Select the External data tab.
• Go to the Export group and select More.
• Select Word from the dropdown menu.
• The Export – RTF File Export Wizard opens.
• In the Export – RTF File Wizard, specify the name of the destination file.
•  The Wizard always exports formatted data. If you want to view the Word
document after the export operation is complete, select the Open the
destination file after the export operation is complete check box.

Interact with Information Technology 3 38


Chapter 6 Integration across productivity tools

• If you selected the records that you want to export before you started the
export operation, you can select the Export only the selected records check
box. However, if you want to export all the records in the view, leave the check
box cleared. (Note: This check box appears unavailable (dimmed) if no records
are selected.)
• Click OK.
• If the destination document exists, you are prompted to click Yes to overwrite
the file. Click No to change the name of the destination file, and then click
OK again.
The object will be published in a new Word document.

6 a State one reason why you might want to export an Access table into Excel.
b Describe the steps involved in importing an Access table into Excel.

a You might want to export an Access table into Excel because the data in the
table may be needed to perform a calculation or graph in Excel.
b The following text describes the steps involved in importing an Access table
into Excel.
• Open the database file.
• Click on the object.
• Select the table, query, report, and so on.
• Select the External data tab.
• Go to the Export group and select Excel.
• The Export – Excel spreadsheet Wizard opens.
•  In the Excel spreadsheet Wizard, specify the name of the destination file.
•  You can change the file format of the Excel worksheet by clicking
the down arrow in the File format combo box and selecting from
the displayed options. To view the Excel document after the export
operation is complete, select the Open the destination file after the
export operation is complete check box.
•  If you selected the records that you want to export before you started the
export operation, you can select the Export only the selected records check
box. If you want to export all the records in the view, leave the check box
clear. (Note: This check box appears unavailable (dimmed) if no records
are selected.
• Click OK.
The object will be published in a new Excel worksheet.

Interact with Information Technology 3 39


Chapter 6 Integration across productivity tools

7 a Describe the process of importing an Excel table into an Access database.


b State one advantage of importing an Excel table into a database.

a The following text describes the process of importing an Excel table into an
Access database.

Open the Access program on your computer.

Open a new blank Access database to import the Excel worksheet into it.
• 
Choose ‘Blank desktop database’ to create a new database within the
Access program. (Give it a new name.)

Click Create.
• 
Select the Excel option from the Import & Link group in the External Data
tab.

The Get External Data – Excel Spreadsheet dialog box appears.
• 
Click Browse to find your Excel sheet on your computer. Leave the box
checked that says ‘Import the source data into a new table in the current
database’. It will be checked by default.
• 
When you find the Excel spreadsheet you want to import on your computer,
click on it. Click OK. This will take you into the Import Spreadsheet Wizard.
• 
Choose the worksheet within the Excel spreadsheet that you want to
import. If there are multiple pages within a single Excel spreadsheet, you
need to tell the Access Wizard which spreadsheet you are choosing.
Click Next.
• 
The Import Spreadsheet Wizard has a box asking if the first row in the Excel
worksheet has column headings, such as First name, Surname, and so on.
Tick the box next to First Row Contains Column Headings. Click Next.
• 
The next page in the Wizard will ask if you want to identify a primary key.
(You do not have to do this, but you can.)
• 
The final screen in the Wizard has a space providing a default name. You
can change the name of the Excel worksheet you are importing (it will
become a ‘table’ in Access on the left side of the page when you finish
importing it).
• 
Click Finish.
• 
Click Close. You will see your table on the left side of the screen. It is now
imported within Access
b One advantage of importing an Excel table into a database: It allows you to
perform more in-depth queries on the spreadsheet data.

Interact with Information Technology 3 40


Chapter 6 Integration across productivity tools

Crossword
1
E
2 3
E X M

X C A
4
P R E V I E W

O L L

R I
5
R T F N

S
Down

1 An application that performs calculations to which tables from Access can be exported
2 The operation that moves an object such as a table, query, form or report from Access to Word
3 Select this tab to access the mail merge option
Across

4 This option in the mail merge allows you to see the merged letters before they are printed
5 The format to which an object has to be converted when it is exported from Access
to Word

Interact with Information Technology 3 41


Chapter 6 Integration across productivity tools

STEM project
Mr David of the Government Statistical Office has collected data in a national survey of the spending
habits of individuals whose income exceeds $6 000 per month. The categories of spending were
food, transportation, utilities, entertainment and savings.
You and a group of classmates helped him to set up the system to collect the survey feedback
(see Chapter 2). This data is now saved in several Excel Spreadsheets, Word Tables and an Access
database. Mr David wants to merge all data into an Access database before sending to the
Consumer Affairs Office for analysis.
You and a group of your classmates have been asked by Mr David to help with this merging. As
a reward, he will allow you to use select parts of the data in your IT SBA project when you reach
Grade 10 (Form 4).
1 Consult with your classmates and write a statement on exactly how you intend to approach
the merging process.
2 Draw up an action plan in which you explain each step.
3 Share your action plan with a CSEC level IT student in your school.
4 What feedback did you receive? What can you do to your action plan to make it even better?
Hints
1 What are the advantages of having all the data in an Access database?
2 Are your steps logical and easy to follow?
3 You may find it useful to create graphs to see if there are any visible trends.

Remind students to read the hints provided and follow the instructions for this
STEM project.
For the project, students' statements, action plans and improvements after the
feedback session will vary. Make sure that all students in each group participate.
Also remind students to give one another constructive/helpful feedback.

Interact with Information Technology 3 42


Chapter 7 Introduction to web page design

Questions and answers 7


Copy and fill in the blanks questions
A website is a collection of related web pages linked together with hyperlinks and residing
1 
in a web server.
2 Web pages are written in HTML code.
3 Hypertext Markup Language is the language that web browsers use to understand how to
display the contents of a web page.
4 Websites are accessible to users via the World Wide Web .
5 Notepad is a basic text editor program that you can use to create simple documents.
6 Web pages can be created in Notepad by entering HTML code and saving the file as a .html file.
7 An HTML file is a text file containing markup tags (commands) .
8 <HTML> tells your browser that this is the start of an HTML document.
9 A wireframe is a simplistic sketch and/or layout of a web page.
10 A service that allows organisations and individuals to post a website or web page on the
internet is known as web hosting .
11 Wix and Jimdo are examples of web creation programs software.
12 Websites are hosted, or stored, on special computers called web server .
13 Site maintenance ensures that a website is secure, updated and working properly.

True or false questions


1 Web pages are written in HTML.  True
2 HTML tags are case sensitive.  False
3 A server-based website is on the server and not on your computer.  True
4 Web pages can be created using application software such as Excel.  True
5 All HTML tags are surrounded by the two characters, < and >.  True
6 The text between the <HEAD> tag and the </HEAD> tag is displayed in the browser window. 
False
7 Word has a built-in HTML translator that can automatically convert any text, graphics or
hyperlinks that you insert into your Word document into a web-compatible format.  True
8 Dreamweaver® is an example of web-authoring software.  True
9 The IMG tag in HTML inserts an image into a web page.  False
10 The attribute background-colour changes the background colour to the selected colour. 
False
11 Website maintenance is not essential to keep visitors coming back to a site.  False

Interact with Information Technology 3 43


Chapter 7 Introduction to web page design

Multiple-choice questions
1 
A website is a collection of:
a sound files. b animation files.
c graphic images. d web pages.
2 Which of the following is not a major step in website publishing?
a Planning
b Designing
c Executing d Hosting
3 Web pages can be created using:
a application software. b an editor program such as Notepad.
c specialist web-creation software. d all of the above.
4 Websites can provide a convenient way of:
a advertising.
b purchasing items.
c paying bills. d doing all of the above.
5 The design of a website depends on:
a the amount of memory space available on your computer.
b the purpose and intended users of the site.
c the processing speed of your computer.
d all of the above.

Interact with Information Technology 3 44


Chapter 7 Introduction to web page design

Short-answer questions
1 Define the terms ‘website’ and ‘web page’.

A website is a collection of web pages, whereas a web page is a document written


using HTML and is connected to the World Wide Web.

2 List the five major steps in website publishing.

The five major steps in website publishing are:


• 
planning
• designing
• creating
• evaluating and testing/debugging
• hosting and maintaining.

3 Describe how you would go about building a web page.

How to go about building a web page:


Design is a critical component in the success or failure of a website. The technical
and user requirements help the web designer to create the best possible design.
To start, assume that the website is just one page.
Make sure that all the elements that the audience want to see are easy to find on
the web page. These elements also need to be well organised and look attractive.
It is important to go through the web page and determine which design elements
(for example, text menus, images, graphics and links) make the most sense for
that page. All design elements need to be designed so that they fit together, in the
same way that the colours and badge in a school uniform all work together so you
can recognise several different students as all being at the same school.
The designer needs to work out the structure and layout of the website
beforehand, so that she or he can make sure they meet the purpose and the user
and technical requirements of the customer and target audience. One tool that we
can use for planning the layout of a web page is a wireframe.

4 Define the term ‘wireframe’ and explain its importance in building a website.

A wireframe/storyboard can show the direction of movement through the website


by laying out the different buttons and links on each page. It is important to show
the structure, mood and organisation of the website.

Interact with Information Technology 3 45


Chapter 7 Introduction to web page design

5 List five basic components of a web page.

The following are some basic components of a web page:


• Header: A website header runs across the top of the web page. It appears on
every page of the website and may contain a big heading and a logo. It may
also contain common information about the website such as site navigation
and main contact information.
• Site navigation: You will need navigation buttons on the website. These
buttons can be part of the header, on the left or the right. The navigation
buttons allow you to click through to other pages if the website has more than
one page. They may also take you to other parts of a single web page.
• Body/Content area: This is the large area in the centre that contains most of
the unique content of a web page, for example, the photo gallery you want to
display or a feature article you want your visitors to read. This is the area that
changes from page to page.
• Footer: A web page footer in a website works the same way as a footer in a
Word document. The footer may contain:
• the page author details
• the copyright statement
• contact details
• links to related sites.
Larger websites may also have the following elements (Any one):
• A Back to Home Page button: It is a good design feature for the other pages to
have a link back to the home page.
• A site map: This map shows a list of hyperlinks to all web pages on the site
that can be accessed by search engines and users.
• Website search features: These features allow users to search the website for
what they are interested in.
• An About us page: This page would include:
• a complete description of the individual, company or organisation
• the objectives of the website
• the name, address, phone numbers and email addresses of the individual,
company or organisation
• a logo displayed in the left corner of each page of your website, which can
take one back to the Home page if clicked.

Interact with Information Technology 3 46


Chapter 7 Introduction to web page design

6 List four different categories of software which can be used to create web pages.

Four different categories of software, which can be used to create web pages:
• application software (for example, Microsoft Word)
• a text editor program such as Notepad
• web creation programs (for example, Adobe Dreamweaver)
• website builders (for example, siteBuilder).

7 What are the different types of links you can create in a web page?

The different types of links that one can create in a web page:
• internal links (jumping from one section to another within a web page)
• external links (links to files, images and audio, etc.)
• links to emails.

12 Explain the term ‘web hosting’.

Web hosting is a service that allows organisations and individuals to post a


website or web page on the internet. A web host, or web-hosting service provider,
is a business that provides the technologies and services needed for the website or
web page to be viewed on the internet.

13 Explain the purpose of maintaining a site.

In order to get the most from a website, it needs to be maintained. Websites


quickly become outdated, old-fashioned and static. When information remains
static, there is little reason for people to revisit the site, and therefore the
opportunity to promote new products, ideas and services is lost. Keeping your
website up to date and relevant after it has been launched is important to keep
people visiting and returning to your site.

Interact with Information Technology 3 47


Chapter 7 Introduction to web page design

Research questions
1 Make a list of five of the most-used website-building software. Place this information in a table
under the following headings:

Name of software

Cost

Features offered

Support offered
2 Make a list of five of the top web-hosting companies and each one’s cost for their service.
3 Your friends have created a website using HTML. When they open it in the browser on the
computer at school, it seems to work fine. They would like to make the site available to everyone
on the internet. Explain to your friends what they need to do to publish their website on the
internet.
4 Maintaining a website is important to its success. A few steps to maintain a website are listed
in this chapter. Conduct research to find out about other ways to maintain a website. Use the
information to prepare a list of instructions someone may follow to maintain a website.

Students' answers will vary for each question.


1 Students' research will vary. Have they been able to make a list of five of the most-
used website-building software. Have students put the information in an easy to
follow table?
2 Students' research will vary. Have they managed to make a list of five of the top
web-hosting companies and each one’s cost for their web-hosting service?
3 Are students able to explain clearly what their friends need to do to publish their
website (created using HTML) on the internet?
4 Students will need to research more information about maintaining a website.
Make sure that students have first listed the steps that are in this chapter before
starting their research.

Interact with Information Technology 3 48


Chapter 7 Introduction to web page design

Crossword
1
H T M L

Y
2
P W
3
D E S I G N I N G

R R
4
L N O T E P A D

I F

N R
5
K A N G L E

M
6
W E B S I T E
Across

1 The extension that must be used to save a Word document as a web page
3 A step in creating a website to make sure it meets the purpose, user and technical requirements
4 A basic text editor program that you can use to create web pages
5 A type of bracket that surrounds HTML tags
6 A collection of related web pages linked together with hyperlinks and located in a web server

Down

1 This allows you to move to another point within a document or another document or
a website by clicking on a word or image
2 A simplistic sketch and/or layout of a web page

Interact with Information Technology 3 49


Chapter 7 Introduction to web page design

STEM project
Your country will be hosting CARIFESTA next year. The Ministry of the Arts and Culture has a
website that facilitates the upload of artwork and dance and music performances by schools to
highlight emerging talent. This must be accompanied by a description of the item and information
on the contributing students.
The principal of your school has asked your class to help with the uploading exercise and to do a
walk-through of the uploaded items to the entire school after the exercise has been completed.
You are selected to be the lead person in this project. You may ask a classmate to play the part of the
principal.
1 How do you and your classmates plan to approach this exercise? List your planning steps and
the categories of possible items for uploading.
2 Prepare your implementation plan. Remember to include a template for the description of each
item as well as the student information.
3 Share your implementation plan with your principal. What suggestions for improvement did you
receive?
Hints
1 Brainstorm approaches to doing this exercise and list all ideas.
2 Review relevant content within the chapter.
3 Contact your country’s Ministry of Arts and Culture to find out what it does to help highlight
emerging talent.

Before starting this STEM project, remind students to read the hints provided and
follow the instructions.
Make sure that all students take part and respect one another's viewpoints.
Ask them to be mindful of giving constructive/helpful criticism.
1 Students' planning steps and the categories of possible items for uploading
will vary.
2 Students' implementation plans will vary. Have they remembered to include a
template for the description of each item, as well as the student information?
3 The role plays will vary, as will the suggestions for improvement.

Interact with Information Technology 3 50


Chapter 8 Advanced desktop publishing

Questions and answers 8

Copy and fill in the blanks questions


layout   margin guides  pink  margins  blue

Margin guides are lines that tell where the margins are located. These pink or blue
lines assist you in the layout of your design. Changing the measurement of these lines also
changes your margins .

True or false questions


1 A grid guide indicates where the margins are in a publication.  False
2 An overflow area holds text that cannot fit into a text frame.  True
3 You cannot adjust the margins by changing the margin guides.  False
4 Borders can only be used to frame a text frame.  False
5 You can import text from another application such as Microsoft Word into Microsoft Publisher. 
True
6 You cannot delete or add a page once a publication type is selected.  False
7 Publisher allows you to add ‘Continued on page …’ when two frames are linked.  True
8 Connecting two frames allows you to see the overflow text.  True

Multiple-choice questions
1 
From which menu can you adjust the margins and page orientation?
a Edit
b File

8 c Setup
aDvanCeD DeskTop
d puBLishing View
2 From which tab can you change the settings of the grid guides?
3 This icon is known as the: Research question
a Arrange b File You have applied for a job in a marketing
8 aaDvanCeD DeskTop puBLishing
autoflow icon.
c Page Design d Tablecompany. In the interview, the manager gives you
bThis this scenario: ‘You have been hired to promote
33 This
overflow
icon icon.
icon is
is known
known as
asthe:
the: Research question
our client's book by designing its cover, as well as
c text
aa autoflowlink icon. You
otherhave applied for
promotional a job in a marketing
documents. How would you use
autoflow icon.
icon. b overflow icon.
company.
your In the of
knowledge interview,
desktop the managertogives
publishing you
create
d c text
text box
link icon.
icon. d text box
this icon.
b overflow icon. and scenario:
promote our ‘Youclient's
have been
book? hired to promote
Explain and justify
44 This
This icon
icon known
is known as
as the:
the: our client's book by designing
your choice of design elements.’ its cover, as well as
c text link icon. other promotional documents. How would you use
aa autoflow
autoflow icon.
icon. b text your
link icon.
d text box icon. Hints knowledge of desktop publishing to create
bc text
text link icon. d picture
box icon. and promote
frame icon. our client's book? Explain and justify
4 This icon is known as the: 1yourWhat
choiceis the first thing
of design you would do?
elements.’
c text box icon. 2 What software would you use to design the
a autoflow icon.
d picture frame icon. Hints
book covers?
Interact
b with
textInformation
link icon. Technology 3 1 Which
3 What isdesign
the first thing youwould
elements use on51
wouldyoudo? the
5 In order to add the following text to a frame
c text box icon.
Chapter 8 Advanced desktop publishing

5 In order to add the following text to a frame ‘Continued from page …’ you need to:
a right-click and choose Format Text Box.
b select Format from the Font menu.
c choose Continued from page … from the Edit menu.
d type it in at the top of the text frame.

Short-answer questions
1 List the three options for allowing text to fit into a frame and explain in what context each
option would work.

Three options for allowing text to fit into a frame and explanation of context in
which each option would work:
Increase the size of the frame – used when expanding the frame will not
• 
take up a lot of space.
Decrease the size of the text – used when decreasing the text size makes
• 
it still readable.
Continue the article in another frame – this is used when you want the text
• 
to flow from one frame into another and adjusting the sizes will not work.

2 Explain the difference between margin guides and grid guides.

Margin guides tells you where your margins are located, whereas grid guides
assist you with laying out columns and rows.

3 Your neighbour has decided to sell his puppies and he has stuck flyers all over the
neighbourhood. Below is a copy of the flyer he produced. Identify four features that can be used
to improve the flyer. Redesign the flyer using Microsoft Publisher.

Pups for Sale


3 weeks old, brown and black puppies,
vaccinated, pure breed German Shepard
Price: $400.00
Phone contact: Jason Smith 664-7622

Interact with Information Technology 3 52


Chapter 8 Advanced desktop publishing

Students' redesigned flyers will vary. Check that all students are able to use
Microsoft Publisher with an understanding of its features.
A few points that students might have considered:
• The neighbour has made a spelling error. It should be 'German Shepherd', not
'German Shepard'.
• The boring/unappealing layout of the current flyer ... When creating a flyer, the
information could be laid out differently. Students might consider whether the
page would be better in a portrait or landscape orientation.
• Photographs of the 3-week-old puppies should be included to create 'emotional
pull' to make people want to buy the puppies.
• Make the fact that the puppies have been 'vaccinated' clearer, as this is an
important point for a pet owner.
• No code has been provided in the contact information.

Research questions
You have applied for a job in a marketing company. In the interview, the manager gives you
this scenario:
‘You have been hired to promote our client's book by designing its cover, as well as other
promotional documents. How would you use your knowledge of desktop publishing to create
and promote our client's book? Explain and justify your choice of design elements.’
Hints
1 What is the first thing you would do?
2 What software would you use to design the book covers?
3 Which design elements would you use on the book cover?
4 What other promotional documents would you suggest be produced?
5 What are a few design elements you would include in the products?
6 Explain some guidelines that you would consider when producing a publication.

Students' research and answers will vary. Make sure that students read and follow the
guidelines in the hints box while working on these research questions.

Interact with Information Technology 3 53


Chapter 8 Advanced desktop publishing

Crossword
1 2
I M P O R T I N G

T
3
A B
4
O N L
5
V G G A

E L U N
6
C R E A T E L I N K

F D
7
L D E L E T E
8
B O R D E R S

W
Across

1 Publisher allows you to use text from other software by ______ it.
6 This icon connects one frame to another. (two words)
7 You can add or ________ a page from a publication.
8 You can add this to give a finished look to a publication.
Down

2 You can use this shape to create a border around a page.


3 You can create a publication without using a template by starting from a _______ publication.
4 Text that cannot fit in the frame is placed in this area.
5 These elements help with the layout of a publication.into digital form

Interact with Information Technology 3 54


Chapter 8 Advanced desktop publishing

STEM project
Your form teacher, who manages the production of the school magazine each year, appoints you as
the editor of a special 25th anniversary edition of your school magazine. You have been tasked with
planning all the details for a new full-colour magazine that must be published in six months.
Your publishing team consists of a group of classmates.
1 You hold a meeting with your publishing team to plan what to do. What are the main issues you
plan to discuss? What other issues are raised by the publishing team?
2 With the help of your publishing team, put together a step-by-step plan for producing the
magazine. You may include a timeline for quick referencing.
3 When you present your plan to your teacher, she advises that she wants the following changes:
• Class photographs must fit onto a maximum of seven pages, although there are 16 forms/
grades and your original plan was to allocate one page per form/grade.
• A select number of teachers’ biographies from the year the school started (only typed
versions are available for most) must be included.
• Newspaper clippings on the school’s greatest achievements must be included.
4 What adjustments do you need to make to your plan to ensure that your form teacher’s wishes
are carried out?
Hints
1 List the key features of a school magazine.
2 Interview students and teachers on the features they would like to see in the 25th anniversary
edition of the school magazine.
3 Refer to the chapter as you and your publishing team work out your plan.

Before starting this STEM project, remind students to read and follow the
instructions in the hints section.
Make sure that all students take part and respect one another's viewpoints.
Ask them to be mindful of giving constructive/helpful criticism.

Interact with Information Technology 3 55


Chapter 9 Advanced multimedia (PowerPoint)

Questions and answers 9

Copy and fill in the blanks questions


1 
On the slide printouts, the speaker notes appear below the printed slide.

2 A Slide Master acts as a template to give an entire presentation the same design
elements.

3 Rearranging the placeholders on the Slide Master adjusts all slides with that
layout accordingly.

True or false questions


1 Speaker notes can be created in the Notes pane of the Normal view.  True
2 You can only print six slides on a page.  False
3 You cannot print speaker notes; you can only print slides.  False
4 The audience will be able to see the speaker notes during a presentation.  False
5 A Slide Master does not affect the entire presentation.  False
6 Rearranging the placeholders on the Slide Master will cause all the slides with that layout to
adjust accordingly.  True
7 Too much animation can be a distraction in your presentation.  True
8 Text colours that are similar to the slide background are easy to see and read.  False

Multiple-choice questions
1 
The Notes pane allows you to:
a create your slide show.
b add an animation to your slide.
c add additional comments about the slide for the presenter.
d determine if an audience will like your presentation.
2 To see how your presentation will look once it is printed, click:
a Note Pages. b Preview.
c Handouts.
d Slide Master.

Interact with Information Technology 3 56


Chapter 9 Advanced multimedia (PowerPoint)

3 A Slide Master contains:


a preset text boxes.
b design elements to give slides a consistent appearance.
c preformatted objects.
d all of the above.
4 Which of the following is not an effective guideline to follow when creating a presentation?
a Use consistent animations. b Use as many graphics as possible.
c Use contrasting colours. d Be mindful of the sound quality.

Short-answer questions
1 What are speaker notes and how can they be used by a presenter?

Speaker notes are additional notes for the presenter, containing further details
that remind them of what they plan to say about specific points during the
presentation.

2 Explain the purpose of using a Slide Master template.

Slide Master is used to create a slide that acts as a template to give the entire
presentation the same design elements.

3 List three guidelines for including sound, animation and transitions in presentations.

Three guidelines for including sound, animation and transitions in presentations:


• Add sound only if it improves and enhances the quality of the presentation.
• 
Animations can be distracting, so use them only if they will enhance a
presentation.
• Avoid using too many animations and transitions, as they can be distracting.

4 List five guidelines to follow for an effective presentation.

Five guidelines to follow for an effective presentation:


• Practise and time your presentation.
• Know your audience.
• Avoid long sentences, as they are difficult to read.
• Avoid capital letters, as they are difficult to read.
• Use contrasting colours on slides.

Interact with Information Technology 3 57


Chapter 9 Advanced multimedia (PowerPoint)

Create a slide presentation


Create a ten-slide presentation on one of the following topics:
1 Protecting our pets
2 Conserving electricity
3 Conserving water
4 The bee and the hummingbird are responsible for over 90% of the world’s pollination.
5 Forms of transportation (air, land, water)
6 Evacuation drill in my school
7 Folk music in my country
8 Reviving the folk tales (folk stories told in my country)
9 Making my home more environmentally friendly
10 A tradition in my family (who started it, how was it passed down through the generations).

Students' slide presentations will vary. Check that they have used ten appropriate slides
for their chosen topic and that they are able to present the slides in a way that keeps
the audience focused.

Interact with Information Technology 3 58


Chapter 9 Advanced multimedia (PowerPoint)

STEM project
Continuing your STEM Project from Chapter 8, your form teacher has asked you and your publishing
team to prepare a PowerPoint presentation showing samples of the items from the school magazine.
She wants you to present this to the school principal and other staff members. You will have
15 minutes to deliver this presentation and answer any questions at the end.
(Note to teacher: Invite the principal and staff to view the presentation.)
1 Using your new knowledge on transitions and animations from Interact with IT Book 2, organise
a publishing team discussion on the items and features that you think would be suitable and
effective for this presentation. Take notes of all ideas discussed.
2 Due to the time constraint, what are three major features you intend to use in your
presentation? Why did you select these features?
3 Prepare your presentation, making sure all members of your publishing team contribute.
4 Show your presentation to the principal and other members of staff. Document all questions
asked at the end of the presentation. Answer questions as they are asked and ask for some more
time for you and your team to provide answers to any questions you cannot answer on the spot.
Hints
1 Review the chapter and list all of the features you can possibly use in your presentation.
2 Do a practice run of your presentation to make sure its length is within the 15 minutes allocated.
3 Use the questions asked to help you plan similar projects in the future.

Before students start this STEM project, remind them to read and follow the
instructions in the hints section.
Students' presentations will vary. Check that all students are able to create a
presentation and use transitions and animations effectively.

Interact with Information Technology 3 59


Chapter 10 3D drawing with Paint

Questions and answers 10

Copy and fill in the blanks questions

1 
A three-dimensional object has length , height and width . It exists on the x ,
y and z axes.
10 3D DraWing WiTh painT
2 The Mixed Reality tool allows you to place a 3D object into a real environment. This is
also called Summary
augmented 10
reality.
1 A three-dimensional (3D) object has length, 7 The Effects tool lets you add a filter colour,
height and width, and exists in a plane with which adjusts how lighting colours and the
three axes: x-axis, y-axis and z-axis. lighting source position will affects the object.
True or false questions
2 You can draw 3D shapes such as 3D doodles, 8 The Canvas tool lets you observe your 3D
3D objects and 3D models in 3D Paint. object or model in a 2D space or single plane.
1 You cannot cut unwanted parts from a picture.  False
3 You can colour 3D models using the Brushes 9 Cropping cuts out or removes the outer
tool. portions of an image that you do not want.
2 The Effects tool allows you to change the position of the light source.  True
4 10 The History tool keeps track of every step you
Stickers are tiny forms of clip art that can be
3 You cannot colour a 3D to both your 2DFalse
drawing. 
added and 3D models.
make while creating your 3D object or model
and the history slider allows you to play it
5 Textures such as scales and fur can be added
4 You can record your actions while
to the surface of anycreating
object. a 3D model and play
back it back as a video.  True
as a video.
11 The Mixed Reality tool superimposes your 3D
6 3D Text, which is similar to WordArt, can be
5 You cannot rotate any 3D graphic along the x-axis, y-axis drawing
created using 3D Text tool.
or z-axis.  False
into a space in the real world.

6 Using the Brushes tool allows you to colour 3D objects.  True


Questions 10
Copy and fill in the blanks questions Multiple-choice questions
Multiple-choice questions 1 A three-dimensional object has ________,
________ and ________. It exists on the
1 The graphic shown in Figure 10.19 tells you
that you are using the:
________, ________ and ________ axes.
1 
The graphic shown in Figure 10.19 tells you that you are using the:brush.
a soft edge
2
The ________ ________ tool allows you to
b marker brush.
place a 3D object into a real environment. This
a soft edge brush.
is also called ________ reality.
b marker brush.
c tube brush.

d
c tube brush. True or false questions d sharp edge brush. Figure
sharp edge brush. 10.19
Figure 10.19
1 You cannot cut unwanted parts from a picture. 2 All the tools are available to draw 3D graphics
2 All the tools are available to draw 3D graphics except for:except for
2 The Effects tool allows you the change the
position of the light source. a 3D objects. b 3D models.
a 3D objects. b 3D models.
3 You cannot colour a 3D drawing. c 3D text. d 3D car.
c 3D text. 4 d creating
You can record your actions while 3D car.
a 3 Placing a 3D object or model into a real space
3D model and play it back as a video. requires the use of which tool?
3 Placing a 3D object5 orYou
model
cannot into a real
rotate any space
3D graphic requires
along the thea use
Paint of which
brush tool tool?
x-axis, y-axis or z-axis.
b 3D model tool
a Paint brush tool b 3D model tool
6 Using the Brushes tool allows you to colour
c The History tool
3D objects.
c The History tool d The MixeddReality tool tool
The Mixed Reality

184

9781510473980_Interact_with_IT_3_BP_SIP.indb 184 2019/09/23 17:12

Interact with Information Technology 3 60


Chapter 10 3D drawing with Paint
Short-answer questions
1 Explain the concept of a mixed-reality graphic.

The Mixed Reality concept allows you to superimpose your 3D drawing into a
space in the real world, which bring your images to life.

2 Give one reason to use the History Slider to play back or create a video of your 3D graphic.

A reason to use the History Slider to play back or create a video of your
3D graphic:
The History tool keeps track of every step you have made while creating your
3D object or model. The History Slider allows you to replay every step you have
taken in creating your drawing; your object appears to move when you play back
the video.

3 What makes an object three dimensional?

An object is three dimensional (3D) if it has length, width and height.

Interact with Information Technology 3 61


Chapter 10 3D drawing with Paint

Crossword
1
T
2
T H R E E D I M E N S I O N A L

W X
3 4 5
O C U T B S

D A U R T

I N R U I
6
M V E F F E C T S C

E A S H K
7
N S A U G M E N T E D

S S R

I S

L
Down

1 Adding this to the surface of your object makes it look different


2 An object that exists on a single plane and has only height and length (two words)
3 This allows you to observe your 3D model in a 2D space
4 This tool allows you to paint or colour your objects
5 Small forms of clip art that can be added to your models
Across

2 An object that has length, height and width (two words)


3 You can _____ out unwanted parts of an image.
6 This lets you add a colour filter and lighting source to the object.
7 The term for placing a digital object into a space in the real world

Interact with Information Technology 3 62


Chapter 10 3D drawing with Paint

Research questions
3D paint can be used to create augmented-reality art. Explain and demonstrate using 3D paint what
is augmented-reality art.

Students' research and answers will vary. Guideline answer:


You can draw 3D shapes such as 3D doodles, 3D objects and 3D models in 3D Paint.
The Mixed Reality tool allows you to place your 3D model into a real space. Once you
click this tool, a 3D Viewer opens and your device camera places your 3D Model into the
live image. You can record a video of your model in the live background shot or take a
picture of it. This view is also called augmented reality. It is where computer-generated
objects, text and sound are superimposed on the real world. Examples of augmented
reality are the films 'Iron Man' and 'The Avengers'.

STEM project
In the early 1990s and 2000s when one heard of creating a work of art, one would imagine an
artist, with pencil, paint and paper. This has now evolved to three-dimensional (3D) computerised
drawings. Your school’s Art and Design teacher has asked you to do a comparison table on the
techniques involved and visual impact when drawing by hand compared to creating a 3D mixed-
reality drawing. You can select any of the following themes to produce sample drawings for
demonstrating your comparison:
• country scene with persons and animals
• video arcade with persons and objects
• a group of friends socialising at an eating place.
Each student will be expected to produce their own comparison table but can discuss and plan in
groups.
1 Write a paragraph stating exactly what you will be doing for your Art and Design teacher.
2 Discuss the advantages and disadvantages of using the 3D drawing with Paint software
compared to using paper and paint to create a work of art. Record the points discussed for use
in your comparison table.
3 Create two pieces of artwork on one of the themes given. Use this artwork to produce your
comparison table, which you can present using any of the multimedia formats you prefer.
4 Present your artwork and comparison table to a group of your classmates. What feedback did
you receive?
5 Give an opinion on which method produces more impactful art and give at least two reasons for
your opinion.
Hints
1 What are possible headings for your comparison table?
2 Select a theme you will enjoy working on.

Interact with Information Technology 3 63


Chapter 9 Advanced multimedia (PowerPoint)

Remind students to read and follow the instructions in the hints section before
starting to work on this STEM project. Students' research and answers will vary.
1 Have students written a paragraph stating exactly what they will be doing
for the Art and Design teacher? Have they chosen topics that they will enjoy
working on and come up with possible headings for their comparison table?
2 While groups discuss the advantages and disadvantages of using the 3D
drawing with Paint software compared to using paper and paint to create a
work of art, make sure that all members of the groups participate. Have they
recorded the points discussed for their comparison table?
3 Have students created two pieces of artwork on their chosen theme? Have
students used this artwork to produce their comparison table using their
preferred multimedia formats?
4 Listen to students' presentations of their artwork and comparison table? It might
be a good idea to discuss the group feedback as a class.
5 Have students given their own opinions on which method produces more
impactful art, with at least two reasons for their opinions?

Interact with Information Technology 3 64


Chapter 11 Problem solving and algorithm development (2)

Questions and answers 11

Copy and fill in the blanks questions

Adding values to a current total is described as cumulative totals, while adding 1 to a


1 
counter is known as incrementing the counter.

2 Loops are statements that can be repeated a number of times. The two types are finite
and infinite .

True or false questions


1 When instructions are repeated this is called a loop.  True
2 A lookout value is also called a sentinel value.  True
3 The FOR…NEXT loop is an example of an indefinite loop.  False
4 The instructions within a finite loop are repeated a fixed number of times.  True
5 When a variable is set to a particular value at the beginning of a program, this is called
initialising the variable.  True

Multiple-choice questions
1 
A value that stops a loop from repeating is called all of the following except for:
a terminal.
b lookout.
c finish. d sentinel.
2 Statements within the WHILE…DO loop are executed as long as:
a the condition is false. b the condition is somewhat false.
c the condition is somewhat true. d the condition is true.
3 A finite loop is executed:
a an indefinite number of times. b a fixed number of times.
c an unspecified number of times. d when the number of times is unknown.

Interact with Information Technology 3 65


Chapter 11 Problem solving and algorithm development (2)

Short-answer questions
1 What is the difference between a finite loop and an indefinite loop?

Finite loops are executed a fixed number of times, whereas indefinite loops are
executed an unspecified number of times until a condition is met.

2 Flour is sold at $40.00 a bag. Write a program using QBASIC to input an order number and the
quantity ordered. Calculate the cost of the order. Print the order number, quantity and cost.

CLS
INPUT “WHAT IS YOUR ORDER NUMBER”; ORDERNUM
INPUT “HOW MUCH DO YOU WANT TO BUY?”; QUANTITY
LET COST=QUANTITY * $40.00
PRINT “ORDER NUMBER:”; ORDERNUM
PRINT “QUANTITY IS:”; QUANTITY
PRINT “COST IS:”; COST
END

3 Identify the lines that are errors in the following algorithm. Rearrange the algorithm so that it
makes sense.
1 Set Total to 0
2 Prompt and enter the number
3 WHILE number >= 5 DO
4 Set number to 0
5 Total = Total + (Number * 2)
6 ENDWHILE
7 Print total
8 Add 1 to number

This is a corrected example:


1 Set Total to 0
4 Set Number to 0
2 Prompt and enter the Number
3 WHILE Number <= 5 DO
8 Add 1 to number (Number = Number + 1)
5 Total = Total + (Number)
7 Print total
6 ENDWHILE
(Note that 6 and 7 could be swapped.)

Interact with Information Technology 3 66


Chapter 11 Problem solving and algorithm development (2)

Research questions
Have you seen television shows where the hero of the show has been stuck in an infinite loop in
time? Do you think that indefinite loops happen in the real world? Create a scenario where it is
possible to be stuck in an indefinite loop and then explain how to exit this loop.

Students' research and scenarios will vary.

STEM project
A national sports group is scouting for new national talent in cricket, football, and track and field.
It wants to set up trials in as many school districts as possible to identify athletes in the above
categories between the ages of 12 and 16 years. Your school will be sending a number of athletes
to the district trial for your region and your class is currently using problem-solving and algorithm
development to help develop a record-keeping system for the scores and times of each school
athlete. You and a group of your classmates are preparing a presentation on how your record system
will work and are planning to share it with this national sports group as a way to help them keep
accurate records on the athletes for all the trials. (Note to teacher: Divide the class into project
groups of no more than five students.)
1 What are three possible questions to ask that can help develop a meaningful record-keeping
system for this scenario? Explain the steps that you and your group use to produce these
questions.
2 For each question, use an algorithm to work out a solution. You must use algorithms with the
FOR–NEXT and WHILE–DO statements and use at least one flowchart in your solution for any
one of the questions.
3 Select one question and decide on the presentation method best suited to it and its
corresponding algorithm and solution. Prepare your presentation. Ensure that all group
members take part and document the part that each person plays.
4 Show your presentation to another group and ask them to evaluate it. What feedback did you
receive? How can you use this feedback to improve your presentation? If you chose to ignore
any feedback, what was your reason for doing so?
Hints
1 List all the important items that must be in a useful record-keeping system for school athletes,
for example, full name, date of birth, sport engaged in, scoring method, and so on.
2 Explain what an algorithm is, in your own words. What is the difference between a rough and a
refined algorithm?
3 List any assumptions that you have made. Explain how to exit this loop.

Interact with Information Technology 3 67


Chapter 11 Problem solving and algorithm development (2)

Remind students to read and follow the instructions in the hints section before
starting to work on this STEM project.
1 Were students/groups able to come up with three questions that could be used
to help develop a meaningful record-keeping system for the scenario? Were
students able to explain the steps that they used to produce their questions?
2 Were students able to use an algorithm to work out a solution? Did they use
algorithms with the FOR–NEXT and WHILE–DO statements and at least one
flowchart in their solution for any one of their questions?
3 Did students use suitable presentation methods for the corresponding algorithm
and solution? Did all group members take part? Did they document the part that
each person should play?
4 The group evaluation will vary. Were groups able to discuss the feedback
objectively? Did groups discuss how they could use the feedback to improve
their presentations? If a group chose to ignore feedback, were they able to give
valid reasons for doing so?

Interact with Information Technology 3 68


Chapter 12 Program implementation

Questions and answers 12

Copy and fill in the blanks questions


Copy the sentences and use the words below to fill in the blanks. Note that some words
may be used more than once.
interpreter        syntax        algorithm   
machine code     compiler
computer program             convert

1 
We need to convert the algorithm to a computer program using programming
language. Specific syntax is required when converting the algorithm to a particular
programming language. Syntax is the specific rules and statements of that particular
computer language. A compiler or interpreter is required to convert the
programs into machine code of the computer you are using. Machine code is the
language that the computer understands.

Multiple-choice questions
1 
BASIC stands for:
a Beginner’s All-purpose Symbolic Instruction Code.
b
Beginner’s Associative Signal Instruction Code.
c
Basic Associative Signal Identification Code.
d
Basic All-purpose Symbol Identification Codes.
2 A compiler:
a
converts a program in C to a program written in BASIC.
b converts a program to machine language.
c
determines if a program is ready to be read by the computer.
d
instructs a user how to write a program.
3 In Visual Basic programming language, CONSOLE.READ:
a reads information typed on the keyboard by the user.
b
displays the information typed by the user.
c
clears the screen.
d
cleans the screen.

Interact with Information Technology 3 69


Chapter 12 Program implementation
4 Which of the following is the correct Visual Basic code for producing the following output?
Jack Smith is: 25
a
CONSOLE.PRINT (“Jack Smith is:”, Age)
b
PRINT “Jack Smith is:”, Age$
c
OUTPUT Jack Smith is: 25
d CONSOLE.WRITE (“Jack Smith is:” & Age)

True or false questions


1 C is the name of a type of instruction.  False
2 A comment cannot be written anywhere in a program.  False
3 A comment in Visual Basic may be enclosed using { and }.  False
4 A comment cannot be enclosed using (* and *).  True
5 The & is an operator in Visual Basic.  True
6 Semi-colons are not at the end of a statement in the Visual Basic programming language. 
True

Short-answer questions
1 Explain the purpose of a compiler.

A compiler is used to convert a program into machine language that the computer
understands.

2 Write a program using Visual Basic to calculate the simple interest on savings in a bank. The
program should allow the user to input the principal, rate and time, and output the principal and
the interest earned. Simple interest = (Principal × Rate × Time)/100.

Students' programs will vary. Check to see that all students understand the
process.

3 Write a program using Visual Basic to convert kilograms (Kg) to pounds for values 1 to 20
kilograms. Display the amount in kilograms and pounds, for example: 1 Kg = 2.2 pounds.

Students' programs will vary. Check to see that all students understand the
process.

Interact with Information Technology 3 70


Chapter 12 Program implementation

Research questions
1 Conduct research to find information on at least five other programming languages.
Draw up a comparison table with brief descriptions of each programming language,
as well as the following information for each one:
a The popularity of the programming language
b The ease with which the programming language can be used
c The function for which the programming language is generally used.
2 Which one of these programming languages can be useful to you as a student? Give two
reasons for your selection.

1 Students' research on at least five other programming languages will vary, as will
their comparison table with brief descriptions of each programming language.
a W
 ere students able to find out about the popularity of each programming
language?
b Were students able to find information about the ease with which the
programming language can be used?
c D
 id students find information about the function for which each programming
language is generally used?
2 Were students able to give two reasons reasons for why a programming language
can be useful to them?

STEM project
Continuing your STEM project from Chapter 11, you and a group of your classmates have been
tasked with coding one of the algorithms that you have developed. You will be explaining how it
works to members of the national sports group, many of whom are not very knowledgeable about
programming, but are enthusiastic about having computerised trial records.
You decide to write coding to find the highest cricket scorer in your region. You and your group
will be given 15 minutes to deliver your explanation and the members of the national sports group
will ask any questions they may have after that. Your aim is to prepare an explanation that will not
require further questions afterwards.
1 Write the algorithm and the Visual BASIC program for entering the number of runs scored
by students in a cricket trial to find the highest scorer. Do this on PowerPoint slides.
2 Write the oral explanation you will give as the slides are shown. Ensure that you include
explanations of key terminology.
3 Demonstrate your presentation to another group of classmates. What feedback did you receive?
4 How can you improve your presentation based on feedback received?

Interact with Information Technology 3 71


Chapter 12 Program implementation
Hints
1 Research how cricket runs are currently recorded in similar trials.
2 Ensure that you use appropriate words and logical sentences in your oral explanation.
3 Keep your explanation within the specified time given.
4 Anticipate possible questions and answer these within your explanation.

Remind students to read and follow the instructions in the hints section before
starting this STEM project.
Students' research, algorithms and presentations will vary.
1 Were students able to write the algorithm and the Visual BASIC program for
entering the number of runs scored by students in a cricket trial to find the
highest scorer on PowerPoint slides?
2 Were students able to write an accompanying oral explanation for showing the
slides? Did students include explanations of key terminology?
3 Students' presentations will vary. Did they listen to and acknowledge the
feedback?
4 Were students able to come up with ideas on how to improve their
presentations based on the feedback?

Interact with Information Technology 3 72


Chapter 13 Introduction to programming with Scratch

Questions and answers 13

Copy and fill in the blanks questions


The sound editor allows you to add and edit sound for your sprite.
1 
2 Scratch programming language is a visual block type language.

True or false questions


1 You cannot change the colour of your sprite costume.  False
2 You can record your voice as a sound for your sprite.  True
3 You can drag blocks of code together to create a program in Scratch.  True
4 You cannot use variable names in a Scratch program.  False

Interact with Information Technology 3 73


2 You can record your voice as a sound for 4 You cannot use variable name
e the block programming code together to write
your sprite. a Scratch program.
13
your Scratch program.
Chapter Introduction to programming with Scratch
Multiple-choice questions
1 Your new teacher has written a program to 2 A programme is written to co
accept the input from the user’s keyboard (see numbers and to subtract or m
Multiple-choice questions
Figure 13.25). The variable that holds the input number is greater than the ot
Choose the best answer to each question.
is called ‘Value’. What would be the final data sprite say if the user entered 5
and 2 Scratch
1 stored inprogramming
Your new teacher has written
the variable value language
a after is
program to a _________
accept
the the
programinput from the user’s
afterkeyboard (see
the program is run? (See
Figure 13.25). The variable that holds the input is called ‘Value’. What would be the final data
_________
has been run? type language.
stored in the variable value after the program has been run?

3 You can drag blocks of code together to


create a program in Scratch.
4 You cannot use variable names in
a Scratch program.

Figure 13.25
Figure 13.25
to 2 A programme is written to compare two
a Your name b Your best friend’s name
d (see a Your name
numbers and to subtract or multiply if one Figure 3.26
c Hi Mrs Diamond d Your mother’s name
input number
b Your is greater
best than
friend’s the other. What will the
name
data 2 A programme is written to compare two numbers and to subtract or multiply
sprite say if the user entered 5 for R and 4 for S a 20if one number is b 1
greater than the other. What will the sprite say if the user entered 5 for R and 4 for S after the
gram c
afterHithe
Mrsprogram
Diamond is run?
program is run? (See Figure 13.26.)(See Figure 3.26.) c 5 d 4
d Your mother’s name

9781510473980_Interact_with_IT_3_BP_SIP.indb 231


Figure 13.26
Figure 3.26
a 20
b 1
a 20 b 1
c d 4
5
c 5 d 4

Interact with Information Technology 3 74


231
Chapter 13
13 inTroDuCTion Totoprogramming
Introduction WiTh sCraTCh
programming with Scratch

3 Which of the following is not a variable used STEM project


3
in this program (see Figure 13.27)?
Which of the following is not a variable used in this program (seeYou are
Figure excited about including Sc
13.27)?
programming in your future prese
one of your presentations from a p
to include a sprite or sprites.
1 Write a paragraph stating whi
you have selected and giving
two reasons for this selection.
appropriate sprite or sprites.
2 Decide on the appropriate par
presentation for the inclusion

Figure 13.27
Say why you have selected th
Figure 13.27
a b R
Answer
Write the algorithm for the inc 3
a Answer b R sprite and its features. Create
c 2 d S
c 2 d S program and include it in you
part of your presentation.
Short-answer questions
Short-answer questions 4 Show your Scratch program to
11 Explain what
Explain what the costume
the Costume editor does.
Editor does. classmates. Assess the impac
2 Explain how Editor
The Costume to useallows
coordinates to position
you to change a look and from
the colour,
the reactions of your clas
feel of your sprite.

2 sprite
Explain on
howthe Stage
to use Area.to position a sprite on the Stage Area. classmates’ opinions on the im
coordinates
sprite(s).
3 What does athe
To position ‘answer’
sprite blockArea,
on the Stage fromyou
the
use coordinates to tell the sprite how
to move. menu
Sensing The coordinates
and y-axis.
do? Hints
are given based on their position in relation to the x-axis

Project
3 What does the ‘answer’ block from the Sensing menu do?
1 Look at online or television adve
1 Create a Scratch
The answer program
block is using
used to store thetwo sprites
response in user. have sprites. Assess how effect
of the
which these two sprites are speaking to each 2 Select a sprite or sprites that is/
other, asking and answering questions about the presentation and use for imp
themselves such as: overwhelm the presentation.
✱ What is your name?
✱ Where do you live?
✱ What are your hobbies?
2 Create a Scratch program to draw a kite using
the coordinates of the stage and the blocks of
code in the Motions menu.

Interact with Information Technology 3 75


Chapter 13 Introduction to programming with Scratch

Project
1 Create a Scratch program using two sprites in which these two sprites are speaking to each
other, asking and answering questions about themselves such as:
• What is your name?
• Where do you live?
• What are your hobbies?
2 Create a Scratch program to draw a kite using the coordinates of the stage and the blocks of
code in the Motions menu.

Students' Scratch programs will vary.

STEM project
You are excited about including Scratch programming in your future presentations. Select one of
your presentations from a previous chapter to include a sprite or sprites.
1 Write a paragraph stating which presentation you have selected and giving at least two reasons
for this selection. Select an appropriate sprite or sprites.
2 Decide on the appropriate part(s) of the presentation for the inclusion of the sprite(s). Say why
you have selected these parts.
3 Write the algorithm for the inclusion of the sprite and its features. Create your Scratch program
and include it in your presentation or part of your presentation.
4 Show your Scratch program to your classmates. Assess the impact of the sprite(s) from the
reactions of your classmate. Ask your classmates’ opinions on the impact of the sprite(s).
Hints
1 Look at online or television advertisements that have sprites. Assess how effective they are.
2 Select a sprite or sprites that is/are relevant to the presentation and use for impact but not to
overwhelm the presentation.

Remind students to read and follow the instructions in the hints section before
starting this STEM project.
1 Were students able to write a paragraph stating which presentation they
selected, with at least two reasons for their selection? Were they able to select
an appropriate sprite or sprites?
2 Were students able to decide on the appropriate part(s) of the presentation for
the inclusion of the sprite(s) and why they selected these parts?
3 Were students able to write the algorithm for the inclusion of the sprite and its
features? Were they able to create their Scratch program and include it in their
presentation or part of their presentation?
4 After showing their Scratch program to classmates, were students able to
assess the impact of the sprite(s) from the reactions they received? Did students
listen to classmates’ opinions on the impact of the sprite(s)?

Interact with Information Technology 3 76


Chapter 14 Computing careers (3)

Questions and answers 14

Copy and fill in the blanks questions


An information systems manager is responsible for staffing, planning and managing the
1 
information systems department of a large organisation.
2 A systems analyst is in charge of developing a computerised system for a client or
business from start to finish.
3 A games designer has to work together with the game artists , programmers and
testers .
4 The IT specialist who creates and builds characters, objects and environments of the game is a
game artist .
5 A company that requires some files converted to an unreadable format needs the services of a
cryptographer .
6 A games programmer must have good problem-solving and analytical skills.
7 Artificial intelligence (AI) is the part of computer science that focuses on the creation of
machines that can react and perform intelligent tasks similar to humans.
8 This IT specialist, a geospatial analyst , examines environment and geographical data,
including aerial photographs, satellite data, and soil and geographical maps, to look for potential
problems in an area.

True or false questions


1 Ordinary jobs nowadays usually require basic computer skills.  True
2 You can get a certification from Microsoft.  True
3 CompTIA and Cisco certification is obtained from a university.  False
4 A systems analyst can be assisted by a computer consultant.  True
5 A games designer comes up with ideas for the storyline, characters, setting and the rules of the
game, while the games artist draws or creates the characters, props and setting for the game. 
True
6 A technical writer does not require good communication skills, as he does not come into
contact with the public.  False
7 Cryptographers write algorithms to disguise or hide information such as credit card information,
account information and financial information.  True
8 Cybercriminals need the internet to commit crime.  True

Interact with Information Technology 3 77


Chapter 14 Computing careers (3)
Multiple-choice questions
1 What is the minimum qualification you need to be a games tester?
a
Bachelor’s degree b Diploma
c
Certificate d Nothing
2 All of the following are benefits of certification except for:
a
giving you job security, as it increases your chances of getting a job or a promotion.
b making you more eligible to become the manager.
c
drawing customers to you or your company.
d
providing you with entry into an elite group of certified and skilled professionals.
3 Who assigns IT work to staff on a daily basis?
a
ICT manager b Operations manager
c
Network administrator d Programmer
4 One of the fastest-growing IT careers is a:
a
computer technician. b robotics engineer.
c mobile app developer. d computer consultant.
5 For a career as a robotics engineer, you need a bachelor’s degree in:
a
computer engineering. b mechanical or electrical engineering.
c
robotics-engineering. d any of the above.
6 A games designer does all of the following except for:
a sketch and develop graphical designs in 2D or 3D format.
b
train testers to play the game.
c
use feedback from testers to modify the game.
d
document the game design process.
7 In a small company, which computer specialist may have to do the job of the games designer,
game artist and game tester?
a
Technical writer b Artificial intelligence (AI) specialist
c Games programmer d Virtual reality specialist
8 Which specialist does not work with the environment or human biology?
a Cloud architect b Health IT specialist and green ICT specialist
c
Geospatial analyst d Bioinformatician

Interact with Information Technology 3 78


Chapter 14 Computing careers (3)
9 The work of a cryptographer involves a part of the functions of these two specialists:
a
Technical writer and artificial intelligence (AI) specialist
b Programmer and data security specialist
c
Virtual reality specialist and geospatial professional
d
Software tester and file librarian
10 Which of the following statements are correct?
i A web developer builds, maintains and
improves websites.
ii A web master monitors internet traffic on
given websites, answer queries about site
operations, and perform the duties of a web
developer.
iii A computer engineer designs and creates
hardware and software for the computer.
iv A file librarian catalogues the company’s
DVDs, CDs, tapes and other portable
storage media or devices and monitors the
borrowing of these items.
v A data consultant is only contracted to give
technical assistance in the design of a new
data processing department.

a
i and ii only b i, ii and iv
c
i, ii, iii and v d i, iii and v

Interact with Information Technology 3 79


Chapter 14 Computing careers (3)
Short-answer questions
1 List three specific IT skills you need as a high school student.

The specific IT skills that are needed as a high school student are any three of
the following:
• be able to email assignments to teachers
• be able to type and print notes on a word processor
• 
be able to use presentation software such as PowerPoint to deliver a
presentation as part of group work
• 
be able to complete and submit online application forms to a program, college
or university
• 
be able to search the internet for coursework information.
(There are more possible answers.)

2 State three functions of a video game tester.

The functions of a video game tester are any three of the following:
• Test different levels and versions of the game.
• Check whether the game is working as intended, based on the designers
specifications.
• Determine what caused the bugs in the game.
• Write a report about any bugs found and submit the report to the designer.
• Determine if the instructional manual is user friendly and accurate.
(There are more possible answers.)

3 List four types of manuals or documents that a technical writer has to produce.

The types of manuals or documents that a technical writer has to produce are any
four of the following:
• user manuals
• training manuals
• equipment assembly manuals
• customer service
• training guides
• technical reports.

Interact with Information Technology 3 80


Chapter 14 Computing careers (3)
4 Name three types of online business transactions that an e-commerce specialist deals with.

The types of online business transactions that an e-commerce specialist deals with
are any three of the following:
• internet banking
• electronic funds transfer
• buying and selling on the internet
• internet marketing
• mobile commerce.

5 Name four emerging technology specialists that require degrees.

Four emerging technology specialists that require degrees are:


• robotics engineer
• computer forensics analyst
• artificial intelligence (AI) specialist
• cryptographer.
{There are more possible answers.}

6 An AI specialist has to take on the jobs of certain specialists in the AI field. List three of these
specialists.

The specialist jobs that an AI specialist has to take on are:


• research scientist
• software engineer and software analyst
• C and Java software programmer/developer.
• information security specialist.
(Any three)

7 Why is the work of a geospatial analyst important?

The work of a geospatial analyst is important because she or he must examine a


wide range of environmental and geographical data in order to compare past and
present information, discover potential problems, effectively manage and conserve
resources and plan for the future.

Interact with Information Technology 3 81


Chapter 14 Computing careers (3)
8 Identify three differences in the qualification requirements between a game tester and
a cryptographer.

Differences in the qualification requirements between a game tester and a


cryptographer are:
A game tester plays games to determine if there are any bugs in the game, which
they then document and report. They make recommendations about how to
improve the game before it is sold or launched to the general public.
Although no specific qualifications are needed to become a game tester, a game
tester requires:
• 
knowledge of computers and qualifications in computer science, maths and
physics at an ordinary level or ‘A’ levels
• 
good analytical and problem-solving skills
• 
the ability to pay attention to detail.
A cryptographer is the writing and the solving of codes. It is the conversion of
ordinary text into an unintelligible format for the purpose of secrecy to prevent
the message from being read by persons for whom the message is not intended.
Cryptographers develop cyphers, algorithms and security systems to encrypt
important and sensitive information. They need to be highly analytical and have a
great knowledge and understanding of mathematical theories, which helps in the
creation and breaking of codes and cyphers.
To become a cryptographer:
• 
A bachelor’s degree in computer engineering, computer science or
mathematics is usually required.
• 
Relevant qualifications and knowledge of the related programming languages
such as Java, C++, C# and Python are required.
• 
Some jobs may accept non-technical degrees. However, a large amount of
experience in the field is necessary. Masters and PhD degrees in computer
science are an advantage and can be required for promotion to higher levels
within an organisation.

Interact with Information Technology 3 82


Chapter 14 Computing careers (3)

Research questions
1 A robbery took place at a downtown store when no one was around. The thief broke through a
glass door to get in and out.
a State three pieces or types of evidence that a computer forensic technician could receive
from a crime scene.
b Name any devices used to capture this information.
2 a Define the term ‘cloud storage’.
b Give at least three advantages and two disadvantages of cloud storage.
3 Your school wants to computerise its library so that book enquiries can be made to find out if
a book is in stock, its location in the library, the number of each book that the library has, the
names and quantities of books borrowed and the ID number of the borrower, as well as other
related matters. Students can go to one of four or five computerised stations to type enquiries.
Books are scanned when borrowed, returned or newly added to the library’s stockpile. List four
IT specialists you think would be required for this project and briefly state one function that
each one would perform.
4 Select two industries from this list below and explain at least three ways in which ICT skills can
be utilised in the profession or industry.

• Hotels   
• Schools   
• Banks
• Government agencies
• Insurance companies
• Police stations
• Custom and excise departments
• Hospitals
• Local businesses (realty investments, distributors, farmers, wholesalers)

5 Do research on IT courses that are offered at Technical Vocational Institutions or Community


Colleges in your country. What are the prerequisites for applying to study these courses?

Interact with Information Technology 3 83


Chapter 14 Computing careers (3)

1 a S
 tudents' three pieces or types of evidence that a computer forensic technician
could receive from a crime scene will vary.
b Students' answers about devices used to capture the information will vary.
2 a C
 loud storage is a way to save documents and files in remote server-based
storage and processing, known as ‘the cloud’. Examples of cloud storage
services are iCloud®, Google Drive™ and Microsoft OneDrive.
b Advantages of cloud storage (any three):
• Saving your files to the cloud provides seamless access to all your important
data, such as Word docs, PDFs, spreadsheets, photos and any other digital
assets.
• Documents can be accessed from anywhere in the world, making it easy to
share them with family and friends.
• Files are saved online and also to your cloud provider’s folder on your
computer.
• Storing files in your cloud provider’s folder on your computer allows you to
work offline, in addition to online.
• Changes are synchronised when you reconnect to the internet.
(Any three)

Two disadvantages of cloud storage:
• Some cloud services require the user to pay a fee.
• If you have no internet then you will not be able to access your files. and two
disadvantages of cloud storage.
3 Students' lists of four IT specialists they think would be required for this project with
one function that each one would perform will vary.
File librarians are one type of IT specialist that would be required. They organise a
company’s data files and software by cataloguing and storing the tapes and disks.
They maintain and protect the company's data, and also clean and inspect the data
storage media.
4 Students' two choices of profession/industry will vary. Were they able to explain at
least three ways in which to utilise ICT skills for each?
5 Students' research on IT courses that are offered at Technical Vocational Institutions
or Community Colleges will vary, as will the prerequisites for applying to study the
courses.

Interact with Information Technology 3 84


Chapter 14 Computing careers (3)
Project
You have applied for a job as a data security analyst and you are asked to prepare a résumé
to present at the interview. Design a résumé using the security analyst qualifications and any
additional information you think you will need to create the résumé.
Hint: Contact your English teacher for assistance.

Students’ résumés for this project will vary.

STEM project
You are a Form 6 (Grade 12) student who has won an international technology competition by
designing a Caribbean-based travel game. A new Caribbean gaming company has invited you to
submit your résumé for employment as a game designer, for possible employment after you have
finished your schooling.
1 Make short notes about what you will include in your résumé. How do you plan to make your
résumé stand out?
2 Do a template for your résumé and fill in the content.
3 Present your résumé to a trusted classmate and ask for feedback in terms of, for example, the
appropriateness of the format, the relevance of the content, the impact and the ease of location
of key information.
4 How can you improve your résumé based on feedback from your classmate?
Hints
1 Do research into résumé formats and select one that you think suits you best.
2 List the reasons for your suitability for the job in order of their relevance and importance to the
job.
3 Keep your résumé format for use when applying for jobs in real life.

Remind students to read and follow the instructions in the hints section before starting
to work on this STEM project. Students’ résumés will vary.
1 Did all students make short notes about what they wished to include in their
résumé? Did they come up with good ideas to make their résumé stand out?
2 Were student able to do a template for their résumé and fill in the content?
3 Did students think through their presentations before presenting them to a trusted
classmate? Did they listen carefully to the feedback in terms of the various points?
4 Did students make an effort to improve their résumé based on the feedback?

Interact with Information Technology 3 85

You might also like