Professional Documents
Culture Documents
Winmat Computing FG 6
Winmat Computing FG 6
Primary Computing
Standards-Based
Facilitator’s Guide 6
Editorial Advisor
Shadrack K. Agyiri
(ICT Panel Convenor for GAST)
Published by
WINMAT PUBLISHERS LTD
No. 27 Ashiokai Street
P.O. Box 8077
Accra North
Ghana
ISBN: 978-9988-0-4442-8
The publishers have made every effort to trace all copyright holders but if they have inadvertently
overlooked any, they will be pleased to make the necessary arrangements at the first opportunity.
TABLE OF CONTENTS
INTRODUCTION vii
SUB-STRAND 2 11
EXPLORING THE COMPUTER DESKTOP
LESSON 1 12
LESSON 2 WORKING WITH RECYCLE BIN OR TRASH CAN 13
iii
STRAND 2 30
INTRODUCTION TO MS – POWERPOINT
(TABS AND RIBBONS OF MS-POWERPOINT)
SUB-STRAND 1 30
LESSON 1 EXPLORING MS – POWERPOINT 31
STRAND 6 46
NETWORK OVERVIEW
SUB-STRAND 1 47
LESSON 1 FACILITIES AND THE INTERNET 47
LESSON 2 TYPES OF INFORMATION AVAILABLE 49
ON THE INTERNET
LESSON 3 CONNECTING TO THE INTERNET 51
SUB-STRAND 2 WEB BROWSERS AND WEB PAGES 54
LESSON 1 EXPLORING WEB BROWSERS AND WEB PAGES 55
LESSON 2 UNIFORM RESOURCE LOCATOR (URLS) 56
SUB-STRAND 3 SURFING THE WORLD WIDE WEB 58
iv
LESSON 1 EXPLORING THE USE OF UNIFORM 58
RESOURCE LOCATOR
SUB-STRAND 4 FAVOURITE PLACES AND SEARCH ENGINES 60
STRAND 7 79
HEALTH AND SAFETY IN USING ICT TOOLS
SUB-STRAND 1 80
LESSON 1 HEALTH RISK OF COMPUTER USAGE 80
GLOSSARY 82
v
vi
Introduction
INTRODUCTION
This book has been written in line with the new curriculum in Computing published by
the National Council for Curriculum and Assessment (NaCCA) of the Ministry of Education
(MoE), Ghana in 2018. It has been developed by an expert team of Ghanaian teachers and
educators and its aim is to achieve the core competencies of the new standards-based
curriculum, and also to support facilitators as they guide and work with children through
the year.
The computing course uses a child-centred approach, and works to develop the abilities
of the learners in line with the learning domains (expected learning behaviour) specified
in the curriculum document. The course is developed to help the learners to develop
computing attitudes and skills, as well as their knowledge and understanding of comput-
ing and their ability to apply that knowledge. The course is activity-based and proceeds
on the assumption that children learn best when they engage actively in the process
of teaching and learning computing. Accordingly, each strand and sub-strand(s) of the
Learner’s Book contains many activities for children to do.
This Facilitator’s Guide is designed to support facilitators as they create the teaching and
learning opportunities through which the learners will develop their computing skills, at-
titudes and knowledge and understating of computing. For each strand in the learner’s
Book, this Guide provides a list of resources required so that these can be collected be-
fore the teaching and learning activities are provided. There should be particular empha-
sis on creating opportunities for both more able and less able Learners to learn. This will
help facilitators to individualise their teaching so that they can offer the best learning
opportunities to all the children in their class.
The course also provides plenty of assessment opportunities. There are questions and
exercises for discussion throughout the Learner’s Book, and these can be used for
ongoing assessment of the learners by the facilitator. Answers to these questions are
provided in the Facilitator’s Guide.
vii
Introduction
SUBJECT AIMS
The computing curriculum is designed to help learners to:
1. Acquire basic ICT literacy
2. Communicate effectively using ICT tools
3. Develop interest and acquire skills in the use of the Internet
4. Develop basic ethics in using ICT tools
5. Acquire basic programming and database skills
INSTRUCTIONAL EXPECTATIONS
• Guide and facilitate learning by generating discourse among learners and chal-
lenging them to accept and share responsibility for their own learning, based on
their unique individual differences.
• Select computing content, adapt and plan lessons to meet the interests, knowl-
edge, understanding, abilities, and experiences of learners.
• Work together as colleagues within and across disciplines and grade levels to de-
velop communities of computing learners who exhibit the skills of computing in-
quiry and the attitudes and social values conducive to computing learning.
viii
Introduction
ASSESSMENT
Assessment is a process of collecting and evaluating information about learners and using
the information to make decisions to improve their learning. The action verbs provided
in the learning indicators in each content standard, should help to structure teaching
and learning to achieve the desired learning outcomes. Check the learning indicators
to ensure that you have given the required emphasis to each learning domain in your
instruction and assessment.
In this curriculum, it is suggested that assessment is used to promote learning. Its purpose
is to identify the strengths and weaknesses of learners to enable facilitators ascertain
their learner’s response to instruction.
• Assessment is both Formative and Summative: Formative assessment is
viewed in terms of Assessment as learning and Assessment for learning.
• Assessment as Learning: Assessment as learning relates to engaging learners
to reflect on the expectations of their learning. Information that learners provide
the facilitator forms the basis for refining teaching-learning strategies.
Learners are assisted to play their roles and to take responsibility of their own
learning to improve performance. Learners are assisted to set their own learning
goals and monitor their own progress.
• Assessment for Learning: It is an approach used to monitor learners’ progress
and achievement. This occurs throughout the learning process.
The facilitator employs assessment for learning to seek and interpret evidence
which serves as timely feedback to refine their teaching strategies and improve
learners’ performance. Learners become actively involved in the learning process
and gain confidence in what they are expected to learn.
• Assessment of Learning: This is summative assessment. It describes the
level learners have attained in their learning, what they know and can do over a
period of time. The emphasis is to evaluate the learner’s cumulative progress and
achievement.
It must be emphasised that all forms of assessment should be based on the domains of
learning. In developing assessment procedures, try to select indicators in such a way that
you will be able to assess a representative sample from a given strand. Each indicator
in the curriculum is considered a criterion to be achieved by the learners. When you
develop assessment items or questions that are based on a representative sample of the
indicators taught, the assessment is referred to as a “Criterion-Referenced Assessment”.
In many cases, a facilitator cannot assess all the indicators taught in a term or year. The
assessment procedure you use i.e. class assessments, homework, projects etc. must be
ix
Introduction
developed in such a way that the various procedures complement one another to pro-
vide a representative sample of indicators taught over a period.
x
Introduction
Electronic Email
Digital Literacy
Network Etiquette
xi
Introduction
PRE-REQUISITE SKILLS
Learners at this stage might have acquired good reading, writing, responsible behaviour
in following rules, regulations and performing tasks according to procedure.
ADVANCED PREPARATION
As a facilitator, you need to have mastery over your lesson presentation as well as class
control. In line with this, it is suggested that the facilitator reads the textbook and under-
stand every concept. You are also free to read other related references to increase your
mastery level.
In most cases you will be using the computers and their accessories and you will need to
try them and ensure that they work effectively before sending them to the classroom.
While in the class, fix the tools and try it prior to the next lesson. Technological tools can
be disappointing for various reasons. In view of this, the facilitator needs to have a back-
up of his/her information either on external media or print media.
xii
Introduction
xiii
Introduction to Computer
Sub-Strand One:
Generation of computers and parts of a computer and other gadgets
Key Ideas: Computer generations are based on when major technological
changes in computers occurred.
The generations of computer are classified in 1st, 2nd, 3rd, 4th and
5th generations.
The major components of the computer system are hardware,
software and liveware (people).
Clicking, dragging and using the scroll wheel are some of the basic
mouse skills.
Learning Indicators
By the time you finish studying the content of this strand, you will be able to:
Discuss Learn about the Generation of Computers according to their
microprocessors
Identify components of a Computer System: Hardware, Software and
Liveware.
Use the mouse skills to create, format and edit documents.
Type at least five hundred characters (500) within eight (8) minutes.
1
Strand One: Introduction to Computer
SUPPLY
1. characteristics of a supercompute
• Large storage capacity
• Extremely fast
• High computational speed
• Fast retrieval of instructions
TRUE OR FALSE
2. True
3. True
4. False
5. True
Supercomputer
6. False
7. True
8. False
9. False
10. True
Laptop
3
Strand One: Introduction to Computer
4
Introduction to Computer
SELECT TYPE
1. True
2. Binary codes
3. Mainframe computers
4. Weather analysis
5. The actual executions of the instructions take place
6. Software
7. System software
8. Application software
9. Intel
10. Voice recognition
5
Strand One: Introduction to Computer
6
Introduction to Computer
Matching
Match the following actions to their respective definitions
2 Click-and-hold Press and release the middle mouse button, without moving the
mouse.
3 Double-click Press and do not release the left mouse button.
4 Middle-click Same as click. The term ‘left-click’ is used where there might be
confusion with right-click.
5 Triple-clicks Press and release the left mouse button, without moving the
mouse.
6 Left-click Press and release the right mouse button, without moving the
mouse
7
Strand One: Introduction to Computer
8
Introduction to Computer
9
Strand One: Introduction to Computer
SUB-STRAND TWO
File explorer window helps to navigate and manage icons and files on the
computer.
You can locate the hard drives icon and the icon for other storage devices
on the computer.
You can use the File explorer window to navigation pane to access files
different locations of the computer.
Learning Indicators:
By the time you finish studying the content of this strand, you will be able to:
Demonstrate the use of the desktop Background, changing the themes
colours and User account.
Demonstrate the use of Copy, Paste, Delete tools, the moving of folders
by using the Desktop Pop-Up menu
Select, delete, hide and empty the Recycle bin or Trash can icons
Illustrate the use of File Explorer window and locations of the computer
10
Introduction to Computer
11
Strand One: Introduction to Computer
SUPPLY
1. First four (4) things you will see when the computer’s windows operating system
boots
successfully.
• Taskbar
• Start button
• Desktop background image
• Recycle bin
2. My computer:
3. Microsoft Internet Explorer
4. Folder
5. Recycle bin
6. The three (3) main account types visible to most Windows users.
• Standard User
• Administrator
• Guest Accounts
SELECT TYPE
7. Standard User account
8. A pop-up menu
9. Search box
10. Navigation pane
11. Multiple users
12
Introduction to Computer
13
Strand One: Introduction to Computer
TRUE OR FALSE
12. True
13. False
14. True
15. True
16. False
14
Introduction to Computer
15
Strand One: Introduction to Computer
1. Five (5) options under the “Clipboard section from File Explorers are:
• Computer
• Recycle bin
• Trash
• Icon
• File
• Recover
2. You can use the File menu from File Explorer, to quickly:
• Pinning frequent folders to File Explorer
• Open PowerShell in a specific folder
16
Introduction to Computer
SUB-STRAND THREE
17
Strand One: Introduction to Computer
18
Introduction to Computer
1. Arrays
2. MS Excel
3. Integers
4. Character
5. Floating point number
6. arrays
TRUE OR FALSE
7. False
8. True
9. True
10. False
11. False
19
Strand One: Introduction to Computer
SUPPLY
1. Four (4) of such services.
• Web Services
• Communication Services
• File transfer
• Video conferencing
2. E-Commerce
3. Modulated microwave
4. Satellite method and Terrestrial method.
5. True
6. True
7. False
21
Strand One: Introduction to Computer
22
Introduction to Computer
1. Listening to radio
• Reading news papers
• Interviews
• Questionnaires
• Observations
• Focus Group
2. Interview: An interview is a conversation between two or more people. Interview
involves an interviewer and an interviewee. The interviewer is the one who is
questioning to obtain information from you and the interviewee is the one who
provides the information.
Focus Group Discussions: This involves groups of people who are given a topic for them
to share their views.
Observation: Observation is a systematic data collection approach where the individual
observing (Observer) uses all their senses to examine or monitor people in a natural
settings or natural occurring situations.
23
Strand One: Introduction to Computer
SUB-STRAND FOUR
24
Introduction to Computer
25
Strand One: Introduction to Computer
• Arrest, stimulate and maintain the learners’ interest throughout the learning
period.
• Maintain good relationship and bond between learners and facilitator.
• Create a secured, healthy and conducive learning environment for effective and
efficient teaching and learning.
• Use teaching and learning materials to make abstract teaching interesting and
real.
SELECT TYPE
1. Communication
2. Smartphones
3. Turned in a clockwise
4. Satellite computer
5. Technology is advancing everyday
TRUE OR FALSE
6. True
7. False
8. True
9. True
10. True
26
Introduction to Computer
SUPPLY TYPE
11. Six (6) common communication tools that people use in your community.
• Smartphones
• Laptops
• Tablets
• VOIP/Internet telephony
• Satellite
• Social networks
Technology in Business, Technology in Communication, Technology In Agriculture,
Technology in Education, Technology In Banking
Observation Exercise
1. Visit any retail shop and observe if the following are being used to make work
more efficient:
a. CCTV or Video cameras
b. Scanners
c. Personal Computers
28
Introduction to Computer
d. Digital receipts
e. Automatic doors
f. Counting machines, etc
2. List two (2) most common ways by which people communicate today?
3. Observe within the school community, the technological tools used by both staff and
students.
a. Projectors
b. Personal computers
c. Laptops
d. CCTV or security cameras
e. Calculators
f. Digital weighing scales
g. Digital ovens
h. Digital fridges, etc
4. What farming practice replaced the pull complex tilling machine in agriculture?
Answer: ATMs
29
Strand Two: Presentation
STRAND TWO
30
Presentation
31
Strand Two: Presentation
1. Office button
2. Allows the user to make relevant options
3. Six (6)
4. The prepare menu’s most common options are:
• Properties,
• Inspect Document,
• Mark as Final
• Run Compatibility Checker
5. The options you will see under the office logo.
• Open a document
• Create a new one
• Save your document
• Print
6. Print brings up the standard print dialog box while Quick print will print one copy
without any dialog box coming up.
32
Presentation
33
Strand Three: Word processing
STRAND THREE:
34
Word processing
35
Strand Three: Word processing
1. It enables the user to create his or her own tool tab. So, it is short but extends as
you add more tool.
2. The header & footer section allows you to edit the header, footer and page
numbering for your document.
3. Both perform the same function when you are already in a saved document.
• However, when you want to change location or file name, then you can use Save As.
4. The menu options under the Table section only has a drop-down menu which offers a
grid to create ………………………
• a new table,
• insert table,
• draw table,
• convert text to table for selected text,
• Excel spreadsheet,
• predefined “Quick Tables”
5. The page background section allows you to change the background colour of the
document, watermark and draft or confidential document or add borders to your
document.
6. Sections in the way they appear under the Referenced Tab.
• Table of Contents
• Footnotes
• Citations & Bibliography
36
Word processing
• Captions
• Indexes and
• Table of Authorities.
7. 2nd, Mailings
8. Review
9. Show/Hide
10. Macros
11. The split button will take your current document and show it in two frames within
the window one on top of the other.
37
Strand Five: Programming and Database
STRAND FIVE:
38
Programming and Database
39
Strand Five: Programming and Database
40
Programming and Database
Match the terms with their definitions on Concepts of Relational Data Model
The terms are:
42
Programming and Database
In the Relational model the, relations are saved in this format. It Tables
is stored along with its entities. This format has two properties
rows and columns. Rows represent records and columns
represent attributes.
43
Strand Five: Programming and Database
44
Programming and Database
1. Spreadsheet application
2. I. Column
II. Row
III. Cell
3. a) =B2*C2
b) =D2+D3+D4
c) =10/100*D5 or =0.1*D5
45
Strand Six: Internet and Social media
STRAND SIX:
S U B - S T R A N D NETWORK OVERVIEW
ONE:
(REFER TO PAGE 223 OF LEARNER’S BOOK)
Key Ideas: Network is the connection of two or more computer and peripher-
al devices for the purpose of sharing resources.
Devices found on a network are known as Nodes
The types of networks include: PAN, LAN, MAN, WAN and internet.
46
Internet and Social media
47
Strand Six: Internet and Social media
48
Internet and Social media
S U B - S T R A N D NETWORK OVERVIEW
ONE:
LESSON TWO TYPES OF INFROMATION AVAILABLE ON THE INTERNET
REFERENCE PAGES 231 - 238 OF LEARNER’S BOOK
49
Strand Six: Internet and Social media
1. A
2. D
3. D
4. A
5. A
6. A
7. C
8. C
9. A
10. D
50
Internet and Social media
You may encourage learners to bring any of the following device or pictures of
the devices: desktop computers, laptop computers, mobile phones, etc
Discuss with learners how these devices may help them to connect to the
internet.
51
Strand Six: Internet and Social media
3. Three (3) ways in which Spreadsheet applications run day-to-day financial tasks are:
• such as compiling financial data
• presenting the data in an organized manner through the use of charts and graphs
• drawing budgets and calculations of complex transactions.
52
Internet and Social media
53
Strand Six: Internet and Social media
54
Internet and Social media
55
Strand Six: Internet and Social media
56
Internet and Social media
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. False
57
Strand Six: Internet and Social media
58
Internet and Social media
1. False
2. False
3. True
4. True
5. False
6. True
7. False
9. The steps you require to enter the URL of a website you want to visit
• Launch the web browser
• Locate the address bar on top of the web browser window interface
• Type the website address or the URL in the address bar
59
Strand Six: Internet and Social media
60
Internet and Social media
61
Strand Six: Internet and Social media
1. True
2. False
3. True
4. False
5. True
6. True
7. True
8. True
9. False
10. True
64
Internet and Social media
65
Strand Six: Internet and Social media
66
Internet and Social media
67
Strand Six: Internet and Social media
68
Internet and Social media
• Ensure that learners sit correctly behind the computer and perform activities
assigned to them.
• Assist learners in writing email using techniques as NOT writing in caps.
2. security reasons
3. spam
4. spam email
5. True
69
Strand Six: Internet and Social media
70
Internet and Social media
1. Broadband
2. Sensor
3. smart locks
4. scan
5. A network of Internet connected objects which is able to collect and exchange data.
6. “Internet of Things” has two main parts. They are:
• Internet being the backbone of connectivity
• Things meaning objects / devices.
7. Examples of Internet of Things (IoT) with a consumer part and an industrial / business
segment are:
• Connected security systems
• Thermostats
• Cars
• Electronic appliances.
71
Strand Six: Internet and Social media
72
Internet and Social media
74
Internet and Social media
75
Strand Six: Internet and Social media
76
Internet and Social media
77
Strand Six: Internet and Social media
2. Netiquette refers to the rules of proper conduct that needs to be applied while using the
internet.
3.
i) Information privacy is the protection of individuals and their personal information from
being shared to others. It also determines which information should be shared to the public
and those that cannot be shared.
ii) Copyright is a law that prevents others from making illegal copies of someone else’ cre-
ative work.
4.
Software theft is the unauthorised or illegal copying, sharing or the usage of software that
is copyright-protected. Software theft may be carried out by individuals, groups or in some
cases, organisations by distributing the unauthorized software copies to users. Illegal copy-
ing of software, also known as piracy occurs when anyone copies a software. Piracy is the
most common type of software theft.
Information theft is the act of stealing computer-based information from an ignorant victim
with the intent of compromising privacy or obtaining confidential information. If stolen, the
loss of information can cause as much damage as hardware or software theft. An example
is a disgruntled employee stealing valuable information from the company he/she works
and selling it to another competitive company.
5. Hardware theft is the act of stealing computer equipment such as mouse, keyboard,
memory, monitor, the entire computer and other physical components of the computer.
78
Health and safety in using ICT tools
STRAND SEVEN:
79
Strand Seven: Health and safety in using ICT tools
80
Health and safety in using ICT tools
2. Discuss how you will prevent the health risk stated in question 1
● Look away from the monitor at regular intervals – re-focus on distant or close objects
to exercise the muscles in the eye.
● Take regular breaks.
● Use an anti-glare filter in front of the monitor to cut down on screen reflections that
can also tire the eyes.
81
Glossary
GLOSSARY
Double Click Occurs when a user presses a button on the mouse twice in quick
succession; this generates a command to the computer
Download Transferring data from another computer to your computer
Drag Occurs when a user points the mouse at an icon or folder, presses
the button and without releasing the button, moves the icon or
folder to another place on the computer where the button is
released
Driver Software program that controls a piece of hardware or a
peripheral
82
Glossary
83
Glossary
84
Glossary
85