Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

STADIO: SCHOOL OF EDUCATION

ASSIGNMENT 1: Online Assessment Design

MODULE NAME: TEACHING INFORMATION


TECHNOLOGY FET2
MODULE CODE: TITF702

STUDENT NAME: MTHULISI MPOFU


STUDENT NUMBER: 23207464
LINK TO ONLINE ASSESSMENT: https://forms.office.com/r/emU9V5EgjC
ASSESSMENT INSTRUMENT AND MEMORANDUM

INFORMATION TECHNOLOGY
GRADE 11 TEST
TOPIC:
DURATION: 30 minutes

INSTRUCTIONS:
Answer all questions

SECTION A:
Various options are provided as possible answers to the following questions. Choose
the correct answer.
1.1 LTE stands for …
A Long Transfer Evolution.
B Life Time Energy.
C Life Transfer Everywhere.
D Long Term Evolution. (1)
1.2 Which ONE is related to the global village?
A Telecommunication
B Centralized labour
C Social office
D Mobile office (1)
1.3 What do GPS and WiMAX have in common?
A They are both wireless technologies
B They are both email protocols
C They are both mobile devices
D They are both types of blogs (1)
1.4 Which of the following is an example of a microblogging platform?
A Facebook
B Twitter
C YouTube
D WhatsApp (1)
1.5 A form of electronic communication through which users create online
communities to share information, ideas, personal messages and other content.
A Social media
B Video conferencing
C Instant messaging
D Podcasting (1)
1.1.6 A device that converts the data or signal from a computer to format
that can be transmitted over a communication channel:
A Router
B Modem
C Switch
D Mouse (1)

SECTION B
2.1 Explain the difference between SMS and instant messaging. (1)
2.2
2.2.1 Describe two security measures that can be implemented to protect
electronic communications. (2)
2.2.2 You need to send an important email attachment securely. Describe the
steps you would take to ensure the email is encrypted and protected. (3)
2.3 Imagine you are planning a video conference for a business meeting. List two
technical requirements you would need to ensure a successful video conference. (2)
SECTION C
3. The majority of the devices connected to networks are mobile devices, and
the number of devices seems to be increasing.
3.1 List the THREE main reasons that has driven this growth. (2)
3.2 Most mobile devices are always on hence the need to save battery
power. Advise THREE ways in which battery life can be maximized. (2)
3.3 Differentiate between a microblog AND a vlog service. (2)

MARKING GUIDELINE
SECTION A:
1.1 - D (1) 
1.2 - A (1) 
1.3 - A (1) 
1.4 - B (1) 
1.5 - A (1) 
1.6 - B (1) 

SECTION B:
2.1
 SMS is primarily for short text messages with character limits, while
instant messaging allows for real-time text-based conversations or
multimedia sharing. (1) 
2.2.1
 Two security measures that can be implemented are encryption and
firewall protection. 
(1 mark for each measure, 2 marks total)

2.2.2 Steps to ensure secure email attachment:


 Use secure email services with encryption options. 
 Encrypt the file or folder containing the attachment. 
 Use strong, unique passwords for email accounts. 
 Consider using a secure file-sharing service. 
 Educate users on safe email practices.
(1 mark for each step, 3 marks total)
2.3 Technical requirements for a successful video conference:
 High-speed internet connection (e.g., broadband). 
 Quality video and audio equipment (e.g., HD camera, microphone). 
(1 mark for each requirement, 2 marks total)

SECTION C:

3.1 Three main reasons driving the growth of mobile devices:


 Increased portability and mobility. 
 Expanding functionality and capabilities (e.g., smartphones). 
 Growing connectivity and availability of wireless networks. 
(1 mark for each reason, 2 marks total)
3.2 Three ways to maximize battery life in mobile devices:
 Lower screen brightness. 
 Close background apps and processes. 
 Disable unnecessary wireless features (e.g., Wi-Fi, Bluetooth) when
not in use. 
(1 mark for each way, 2 marks total)
3.3 Importance of password strength in online security:
 Strong passwords are harder to crack, providing better protection. 
 Consequences of weak passwords:
 Vulnerability to hacking and unauthorized access. 
 Risk of data breaches and loss of sensitive information. 
(1 mark for each point, 2 marks total)
Total Marks: 20
MARK
QUESTION COGNITIVE LEVEL
ALLOCATION
SECTION A

1.1 1

1.2 1

1.3 LOWER ORDER 1

1.4 1

1.5 1

1.6 1

TOTAL [6]

SECTION B

2.1 1

2.2
MIDDLE ORDER
2.2.1 2

2.2.2 3

2.3 2

TOTAL [8]

SECTION C

3.1 2
HIGHER ORDER
3.2 2

3.3 2

TOTAL [6]

GRAND TOTAL [20]


Explain how your assessment is valid.
Validity refers to the extent to which an assessment tool measures the specific
construct or trait it claims to measure. Here's an explanation of how assessment
validity is achieved.
Here's how we know if our test is valid:
Content Validity: This means the test should have all the important stuff about
Communication Technologies. Experts who know a lot about this topic check our test
to make sure it has the right questions. For example, if our test is about
Communication Technologies, these experts make sure we ask questions about all
the important parts of Communication Technologies, like email, messaging, and
more.
Criterion-Related Validity: This part checks if our test can tell us something about the
future. For example, if our test shows that someone is good at Communication
Technologies, we want to know if that person will do well in real life when using
Communication Technologies. We can check by comparing our test results with how
people actually use Communication Technologies in their jobs or daily life.
Construct Validity: This is about making sure our test really measures what we want
it to measure. For example, if our test is meant to see how good someone is at using
email, we should also see if the test makes sense based on what we know about
email. If our test is good, it should match what we know about Communication
Technologies

Explain what assessment reliability is and explain two methods you used to
ensure that the assessment is reliable.
Assessment reliability means how consistent and dependable the results are when
we do a test. For example, when we give a test about communication in Information
Technology for Grade 11 students, we want to make sure that the test is reliable,
meaning it gives similar results each time we use it. First, we need to be sure that
our test is actually testing what we want it to test, which is communication in this
case. Then, we need to check if the test gives similar results when we use it more
than once (test-retest reliability) or if the questions in the test are all measuring the
same thing (internal consistency reliability). These checks help us know if our test is
both accurate and consistent in measuring communication.
To make sure our test is reliable, we use two common methods:
Test-Retest Reliability: This means we give the same test to the same group of
students two times on different days. We then compare their scores from the first
and second times they took the test. If their scores are similar, it shows that our test
is reliable and measures communication consistently over time.
Internal Consistency Reliability (like Cronbach's Alpha): This method is helpful
when our test has many questions. We check if all the questions in our test are
related and measure the same thing, which is communication knowledge and its
aspects in this case. If the questions are closely related and work together well, it
means our test is reliable because it's measuring the same thing consistently.

EVIDENCE OF WORKING LINK

You might also like