Professional Documents
Culture Documents
AICT521 Final
AICT521 Final
AICT521 Final
FINAL ASSESSMENT
SURNAME : MGIBA
>>Computer-Related Storage Devices (Knowledge: disks, CDs, USB drives, zip disks, DVDs, etc.
1.2
E-learning is a learning platform where the learners utilize electronic technology to access learning
curriculum. E-learning enhances learners' understanding by enabling the learners to learn from any
place at any time with the use of internet.
1.2.2
> Learners will develop the ability to use (a) MICROSFT WORD
© WEB BROWSER
1.3
STREANGTH WEAKENESS
Resources- we will need computers, Furniture-the classroom need to be improved
projection system & a master computer. to accommodate computers, by changing the
Advantages- Students can practice desks to replace with computer desks.
collaboration skills by getting involved in
different online activities.
OPPORTUNITIES THREATS
Computer Literacy- students will benefit Burglary- thief’s can brake and destroy the
computer skills. computers.
Internet access- students will have access to Cyber bulling-
web-browser to surf information.
1.3.2
1.3.3 Advantages
> the teacher does not need to struggle between rows to reach the learners.
Disadvantages
>The learner face away from the writing board, as a result learner must always turn around to face the
projector.
> with this arrangement room you can only accommodate few computers.
1.3.5
1.3.6 > make sure that each learner uses one computer at a time.
> computers are peripheral are not to be moved or reconfigured without approval of an educator.
QUESTION 2
2.1
2.1.3 MICROSOFT POWER POINT can be used to convey ideas to an audience by means of slides. For
example, teachers can create a photo college of objects based on their lesson plan.
2.2
2.3
2.3.1 >To help teachers communicate and share experience and ideas with other teachers
2.3.2 An ISP is an Internet Service Provider that has a permanent quick access to the internet and all
telecommunication services. A well know ISP it’s TELKOM
(b) >A LAN (local area network) is a group of computers and network devices connected together,
usually within the same building. e.g. token ring.
But; a WAN is not restricted to a geographical location, although it might be confined within the bounds
of a state or country. e.g broadband connections such as 3G, 4G
2.4
2.4.1 A computer virus A security risk that activates when it detects a certain condition.
graphics quickly.
Scanning.
2.6
2.6.1 > Mouse
> keyboard
> Speaker
2.6.4 Yes; because it has WLAN 802.11bgn & Intel® Pentium Dual core processor.