Tuesday, November 15, 2016

ITGS Case Study Activity

Read the ITGS Case Study posted in the link below;

https://ekrisnawan.wikispaces.com/file/view/Case%20Study%202013.pdf/386374376/Case%20Study%202013.pdf

Using the case study above and your further extended research on the Taxi systems, answer the following questions individually and posted your work in managebac;


  1. Describe TWO main social and ethical issues that can arise from using behavioral marketing software by the Red Dragon Taxi Company. (4 mks)
  2. Explain TWO situations where Business intelligence software can be used by the Taxi Company. (6 mks)
Surveillance

3. "The management of Red Dragon Taxi Company has announced that CCTV equipment will be installed to monitor the activities in the taxi in the interests of driver and customer safety. GPS and GPRS will also provide the location of the vehicles. However, this raises concerns from the drivers about employee monitoring. Different monitoring systems are being investigated. "


The extract above is from line 116

 a) Red Dragon company may be considering to move to 4G technology instead of GPRS. What is the impact of this move to the Company? (6 mks)


 b) "Different monitoring systems are being investigated".  Give evidence from research of measures that can be put in place to address the concerns of drivers in having monitoring technologies in the taxis. (10 mks)


4. UBER is a world wide transportation system; Evaluate the impact of using UBER to the different stakeholders. (Support with real evidence from research) (10 mks) 
         

    Monday, November 14, 2016

    Network Administration

    Write short notes on network administration related terms below and post them on your OneNote page

    Electronic security:
    for example, authorized access, levels of access, biometrics with examples, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails and others

    http://www.itmanagerdaily.com/network-security-fundamentals/

    http://www.computernetworkingnotes.com/ccna-study-guide/network-security-threat-and-solutions.html

    Network Licences:
    single-user, multi-user, concurrent, network, site

    Physical security:
    for example, locks, safes and others http://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/

    Monitoring:
    for example, keystroke monitoring, system performance, surveillance
    check others methods in  http://www.techrepublic.com/blog/10-things/10-ways-to-monitor-what-your-users-are-doing-with-company-computers/

    Network policies:
    -Give an example of what the policy can say and why that is important.
    for example, backup, archiving, disaster recovery, usage, redundancy, failover

    Codes of ethics and professional conduct:
    for example, ACM (Association for Computing Machinery)

    Data centres
    • What are they?
    • Name some examples
    • Why are they important?

    Energy usage in managing computer networks
    - uninterruptable power supply (UPS) how effective are they?
    - Do we have other sources of energy used to support computer networks?
    - What solutions have been put in place to address Energy concerns resulting from using computer networks?


    Network Administration

    Write short notes on network administration related terms below and post them on your OneNote page

    Electronic security:
    for example, authorized access, levels of access, biometrics with examples, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails and others

    http://www.itmanagerdaily.com/network-security-fundamentals/

    http://www.computernetworkingnotes.com/ccna-study-guide/network-security-threat-and-solutions.html

    Network Licences:
    single-user, multi-user, concurrent, network, site

    Physical security:
    for example, locks, safes and others http://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/

    Monitoring:
    for example, keystroke monitoring, system performance, surveillance
    check others methods in  http://www.techrepublic.com/blog/10-things/10-ways-to-monitor-what-your-users-are-doing-with-company-computers/

    Network policies:
    -Give an example of what the policy can say and why that is important.
    for example, backup, archiving, disaster recovery, usage, redundancy, failover

    Codes of ethics and professional conduct:
    for example, ACM (Association for Computing Machinery)

    Data centres
    • What are they?
    • Name some examples
    • Why are they important?

    Energy usage in managing computer networks
    - uninterruptable power supply (UPS) how effective are they?
    - Do we have other sources of energy used to support computer networks?
    - What solutions have been put in place to address Energy concerns resulting from using computer networks?


    Wednesday, November 9, 2016

    Business And Employment: Online Security

    Read the article and prepare to present briefly what you have been assigned. Posting on OneNote is an optional activity

    Saumya:
    Describe briefly the 6 fraud risks for small businesses
    http://programs.online.utica.edu/articles/TopSixFraudRisksforSmallBusinesses

    Sahir:
    Describe briefly the 7 e-commerce frauds
    http://www.information-age.com/seven-types-e-commerce-fraud-explained-123461276/

    Shad
    List the different online frauds and suggest the different measures to prevent on from online fraud.
    http://www.techradar.com/news/world-of-tech/roundup/the-small-business-guide-to-preventing-online-fraud-1101869

    Ali
    Describe 5 business related scams from the list in the website and suggest how one can protect themselves from the scam
    http://www.actionfraud.police.uk/fraud-az-online-fraud

    Wayne
    Explain the crime committed in article below. Explain in detail how credit card skimmers are used to commit crime.
    http://www.theoaklandpress.com/general-news/20161107/feds-charge-foreign-nationals-in-alleged-credit-card-skimming-scheme

    Hezi
    Describe how each of the 5 examples 5 scams was executed.
    http://www.makeuseof.com/tag/top-5-internet-fraud-scams-time/

    Samy
    Explain the different Frauds identified in the article
    https://www.entrepreneur.com/article/227689

    Tanzil
    Why do hackers target small businesses? What are types of cyber-attacks? what are the Security solutions and and best practices for your business
    http://www.businessnewsdaily.com/8231-small-business-cybersecurity-guide.html

    Amaar
    Explain the 6 different business security risks and how you can protect your self from them
    http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html?page=2

    Wednesday, November 2, 2016

    Business and Employment: Online Businesses

    Watch the videos in the YouTube links below;

    https://www.youtube.com/watch?v=NdXf6f22N4g

    https://www.youtube.com/watch?v=RaH1jc3zBM0


    A friend has approached you to start an online business;

    a) Study ONE example of an online business ensuring that the following is captured;


    • What is the name of the online business?
    • What are the different technologies used by the online business?
    • Describe in detail how the business functions / operates online
    • What are the common issues/ethical concerns associated with the online business?
    • What are some of the solutions put in place to address the concerns / problems?
    b) As for your friend
    • What online business would you recommend? and why?
    • Describe the IT technologies that will be used in the recommended online business?
    • Describe in detail how the online business will function/operate?
    • Provide a detail account of the expected challenges/ concerns/ problems in running the proposed online business.
    • For each concern suggest some of the solution to address them.
    Further Reading

     ATM, EFT, Online Banking Fraud Cases

    Read the news article below
    ATM frauds
    http://www.northeastfraudforum.co.uk/atmfraud
    http://www.bankersonline.com/security/gm_atm_skimming.html

    ATM Crime & Fraud Information
    https://www.european-atm-security.eu/ATM%20Crime%20/

    EFT POS Hacker Net $50 Million
    http://www.bloggernews.net/123778

    Steps for Preventing EFT problems
    http://www.isaca.org/Journal/Past-Issues/2003/Volume-4/Pages/Preventing-EFT-Fraud.aspx

    Other news
    http://www.atmsecurity.com/

    http://www.asiaone.com/News/Latest%2BNews/Singapore/Story/A1Story20120111-321215.html

    http://www.bdo.co.za/resources/showitemarticle.asp?ResourceSectionId=4&ResourceSectionName=Publications&ResourceId=11&ResourceName=News%20and%20Views&IssueId=44&ContentPageID=&Archive=&articleid=52

    Monday, October 31, 2016

    Network Activities

    As part of your Network notes on OneNote, 

    • Provide the differences between SAN (storage area network) and RAID (redundant array of inexpensive disks). Use diagrams where possible to provide the detailed explanations
    • Describe at least 4 network operating systems while stating the functions of a network operating systems (NOS). What are the functions of utility software with a computer network?


    Attempt the following questions and post those important for you on your OneNote

    the network worksheet in this page 


    Thursday, October 27, 2016

    Paper 2 Practice Activity

    Task A.

    Read the article and use the marking to assess the student's response. Post comments and grades awarded for each criterion in your one note page.


    Task B.
    Using the article below write a complete paper 2 type response and post the response on your OneNote page.

    Tuesday, October 25, 2016

    Computer Networks Technologies

    Use your OneNotes page to make short notes on the concepts already covered on networks.

    You will further make short notes on;

    • Distributed processing, Grid computing and Cloud computing,

    • Network connections types; types of cables, wireless technologies, WiMax, Bluetooth and Microwave.

    Monday, October 24, 2016

    Introduction to Computer Networks

    Watch the Ted video

    All computer devices can be hacked

    http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked

    Computer Uses
    https://www.youtube.com/watch?v=lQ_2QBel_cQ

    Computer networks basics
    https://www.youtube.com/watch?v=JvXro0dzJY8&index=1&list=PLtJDAcNXilyT-ykli3snQsu3Xe5FlA37Y

    Notes Slideshare
    http://www.slideshare.net/ASHadventurelover/introduction-to-computer-network-33788727

    http://www.slideshare.net/makyong1/basic-concepts-of-computer-networks?next_slideshow=1

    http://www.slideshare.net/makyong1/basic-concepts-of-computer-networks

    http://www.slideshare.net/hemangkothari/lecture-1-introduction-to-computer-network-2013

    Objective for the lessons today

    • Be able to define what a computer network is
    • Distinguish between host and a server computer, P2P network, 
    • Describe the different network types and Wireless network
    • Examine the different network topologies
    • Explaining the functions of the different network devices.
    Resources 
    Types of computer networks

    Wireless networks

    Network topologies

    Network Devices


    Ethical Dilemmas facing Developers today

    Analyse one of the dilemmas and share your views.

    Ethical issues for computer network security professionals

    Tuesday, October 4, 2016

    Business and Employment Assignment

    Research for a 2016 News article with social / ethical issue in Business and Employment. Use post the link of the news article and use the article to respond to the following on One Note

    Criterion A
         i) What is the main social / ethical issue from the article?
         
         ii) Who is the main primary stakeholder and why?
    Criterion B
      i)
         - Name the technology stated in the article 
         - List the IT terms and concepts directly listed in the articles
         - List the IT terminologies that you would use provide more understanding on how the technology works.
      ii) What contributes to the social issue stated in Criterion A to easily occur?

    Criterion C
      i) Name three explicitly stated stakeholders in the article and list advantages and disadvantages for each of using the technology

      ii)Name One implicit stakeholder listing the advantages and disadvantage of using the technology

    Criterion D
      i) Name one main problem/ main disadvantage of the technology
      ii) State one solution that can be used to solve the problem
      iii) List the strengths and the limitations of your solutions
      iv) State how can your proposed solution can be improved in future

    Tuesday, September 27, 2016

    Business And Employment (Traditional Businesses)

    Your task is to find either a supermarket/hotel/bank or any financial institution that operates locally or globally and provide the following;

    a) Name the institution

    b) Describe the different services offered by the Institution

    c) Describe at least four unique Information technologies (systems/software/hardware/innovations),  used by the bank.

    d) Describe at least four common social and ethical issues that the institution faces or can face.

    e) What are some of the common measures put in place to addresses the the issues state above?


    Post your findings in OneNote

    Tuesday, September 20, 2016

    Students Information Management System (SIMS)

    Activity
    You have been approached by a school to recommend the best online Students Information Management System (SIMS). Evaluate two such systems and submit a summary report that will be presented to the school board.

    N/B ManageBac should not be one of the systems to be evaluated. 

    The presentation will include the following

    • the main features of each system
    • the advantages and disadvantages of each system
    • a short demo video of the main features or how the system is used.
    • recommend the best system from the two with reasons.
    This will be assessed as a presentation in class. You have the option of using any presentation tool.

    Assessment Criteria
    Level
    Descriptors
    1-3
    A simple software is presented which does not capture effectively the details required by the client. The impacts of using the software is superficial. Generic characteristics of the software are shown.  The demo video used does not clearly provide the required information. The presentation tool used is partially effective in communication the required information. The board is partially convinced to purchase the software
    4-5
    A good software is presented which captures adequately the details required by the client. The impacts of using the software is detailed with good characteristics of the software shown.  The demo video used provides the required information and is understandable. The presentation tool used communicates the information as required. The board considers to buy the software.
    6-7
    Excellent and most appropriate software is presented which captures effectively the details required by the client. The impacts of using the software is thorough with most appropriate characteristics of the software shown.  The demo video used is clear, precise and effective in providing required information. The choice of presentation tool is effective, captivating and communicates precisely. The board is thoroughly convinced to purchase the software.

    Monday, September 19, 2016

    Computer software

    Makes notes on software and post them on your OneNote page

    Your notes should touch on the following;

    • Application software with examples
    • Systems software which includes operating system and utility programs with examples
    • Computer interface for example,  Command Line Interface CLI, GUI, MDI, Voice Interface and others
    • Software licencing; Distinguish between shareware, public domain, freeware, proprietary and open source software
    • Licensing authorities: Business Software Alliance (BSA)
    • Commercial and custom-built (bespoke) software
    • Registration, serial number, warranty, copyright agreement
    • Web-based software
    • User support: manuals, assistants, tutorials, help systems, “Read Me” files
    • Macros, templates, wizards
    Make further Notes on the following;

    a) File formats
    - What are file formats?
    - Describe the different file formats 

    b) System Utilities


    Introduction to Software slideshare
    http://www.slideshare.net/samudin/applicaton-software

    http://www.slideshare.net/ThaierFandakly/chapter-08-discovering-coputers-2012

    The Future of Software
    https://www.youtube.com/watch?v=bwj2s_5e12U

    Wednesday, September 14, 2016

    Education Articles with Social and Ethical Significance

    Copy the link, read the article assigned and post your findings in your OneNote Page;
    Criterion A
         i) What is the main social / ethical issue from the article?
         
         ii) Who is the main primary stakeholder and why?
    Criterion B
      i)
         - Name the technology stated in the article 
         - List the IT terms and concepts directly listed in the articles
         - List the IT terminologies that you would use provide more understanding on how the technology works.
      ii) What contributes to the social issue stated in Criterion A to easily occur?

    Criterion C
      i) Name three explicitly stated stakeholders in the article and list advantages and disadvantages for each of using the technology

      ii)Name One implicit stakeholder listing the advantages and disadvantage of using the technology

    Criterion D
      i) Name one main problem/ main disadvantage of the technology
      ii) State one solution that can be used to solve the problem
      iii) List the strengths and the limitations of your solutions
      iv) State how your proposed solution can be improved in future


    Student 1
    https://thejournal.com/articles/2016/09/14/guilford-county-schools-adopts-new-service-learning-management-tool.aspx?admgarea=News1

    Student 2
    https://thejournal.com/articles/2016/09/13/new-report-on-personalized-learning-recommends-use-of-learner-positioning-systems.aspx?admgarea=News1

    Student 3
    https://thejournal.com/articles/2016/09/13/securely-adds-cyberbullyingprevention-tool.aspx?admgarea=News1

    Student 4
    https://thejournal.com/articles/2016/09/13/lenovo-updates-lanschool-with-expanded-chromebook-support-faster-screen-sharing.aspx?admgarea=News1

    Student 5
    https://thejournal.com/articles/2016/09/12/robots-give-chronically-ill-kids-valuable-social-ties-with-school.aspx?admgarea=News1

    Student 6
    https://thejournal.com/articles/2016/09/12/tennessee-district-adopts-edfi-student-data-tracking-system.aspx?admgarea=News1

    Student 7
    https://thejournal.com/articles/2016/08/26/class-communication-tool-adds-payment-feature-for-field-trips-dues.aspx?admgarea=News1

    Student 8
    https://thejournal.com/articles/2016/08/29/parentteacher-communication-app-adds-student-reports-and-portfolios.aspx?admgarea=News1

    Student 9
    https://thejournal.com/articles/2016/08/29/schoolwise-launches-website-to-help-high-school-students-with-college-admissions.aspx?admgarea=News1

    Task B
    You have been approached by an IB school to recommend the best online Students Information Management System (SIMS). Evaluate two such systems and submit a summary report showing

    Education Articles with Social and Ethical Significance

    Copy the link, read the article assigned and post your findings in your OneNote Page;
    Criterion A
         i) What is the main social / ethical issue from the article?
         
         ii) Who is the main primary stakeholder and why?
    Criterion B
      i)
         - Name the technology stated in the article 
         - List the IT terms and concepts directly listed in the articles
         - List the IT terminologies that you would use provide more understanding on how the technology works.
      ii) What contributes to the social issue stated in Criterion A to easily occur?

    Criterion C
      i) Name three explicitly stated stakeholders in the article and list advantages and disadvantages for each of using the technology

      ii)Name One implicit stakeholder listing the advantages and disadvantage of using the technology

    Criterion D
      i) Name one main problem/ main disadvantage of the technology
      ii) State one solution that can be used to solve the problem
      iii) List the strengths and the limitations of your solutions
      iv) State how your proposed solution can be improved in future


    Student 1
    https://thejournal.com/articles/2016/09/14/guilford-county-schools-adopts-new-service-learning-management-tool.aspx?admgarea=News1

    Student 2
    https://thejournal.com/articles/2016/09/13/new-report-on-personalized-learning-recommends-use-of-learner-positioning-systems.aspx?admgarea=News1

    Student 3
    https://thejournal.com/articles/2016/09/13/securely-adds-cyberbullyingprevention-tool.aspx?admgarea=News1

    Student 4
    https://thejournal.com/articles/2016/09/13/lenovo-updates-lanschool-with-expanded-chromebook-support-faster-screen-sharing.aspx?admgarea=News1

    Student 5
    https://thejournal.com/articles/2016/09/12/robots-give-chronically-ill-kids-valuable-social-ties-with-school.aspx?admgarea=News1

    Student 6
    https://thejournal.com/articles/2016/09/12/tennessee-district-adopts-edfi-student-data-tracking-system.aspx?admgarea=News1

    Student 7
    https://thejournal.com/articles/2016/08/26/class-communication-tool-adds-payment-feature-for-field-trips-dues.aspx?admgarea=News1

    Student 8
    https://thejournal.com/articles/2016/08/29/parentteacher-communication-app-adds-student-reports-and-portfolios.aspx?admgarea=News1

    Student 9
    https://thejournal.com/articles/2016/08/29/schoolwise-launches-website-to-help-high-school-students-with-college-admissions.aspx?admgarea=News1

    Education Articles with Social and Ethical Significance

    Copy the link, read the article assigned and post your findings in your OneNote Page;
    Criterion A
         i) What is the main social / ethical issue from the article?
         
         ii) Who is the main primary stakeholder and why?
    Criterion B
      i)
         - Name the technology stated in the article 
         - List the IT terms and concepts directly listed in the articles
         - List the IT terminologies that you would use provide more understanding on how the technology works.
      ii) What contributes to the social issue stated in Criterion A to easily occur?

    Criterion C
      i) Name three explicitly stated stakeholders in the article and list advantages and disadvantages for each of using the technology

      ii)Name One implicit stakeholder listing the advantages and disadvantage of using the technology

    Criterion D
      i) Name one main problem/ main disadvantage of the technology
      ii) State one solution that can be used to solve the problem
      iii) List the strengths and the limitations of your solutions
      iv) State how can your proposed solution can be improved in future


    Student 1
    https://thejournal.com/articles/2016/09/14/guilford-county-schools-adopts-new-service-learning-management-tool.aspx?admgarea=News1

    Student 2
    https://thejournal.com/articles/2016/09/13/new-report-on-personalized-learning-recommends-use-of-learner-positioning-systems.aspx?admgarea=News1

    Student 3
    https://thejournal.com/articles/2016/09/13/securely-adds-cyberbullyingprevention-tool.aspx?admgarea=News1

    Student 4
    https://thejournal.com/articles/2016/09/13/lenovo-updates-lanschool-with-expanded-chromebook-support-faster-screen-sharing.aspx?admgarea=News1

    Student 5
    https://thejournal.com/articles/2016/09/12/robots-give-chronically-ill-kids-valuable-social-ties-with-school.aspx?admgarea=News1

    Student 6
    https://thejournal.com/articles/2016/09/12/tennessee-district-adopts-edfi-student-data-tracking-system.aspx?admgarea=News1

    Student 7
    https://thejournal.com/articles/2016/08/26/class-communication-tool-adds-payment-feature-for-field-trips-dues.aspx?admgarea=News1

    Student 8
    https://thejournal.com/articles/2016/08/29/parentteacher-communication-app-adds-student-reports-and-portfolios.aspx?admgarea=News1

    Student 9
    https://thejournal.com/articles/2016/08/29/schoolwise-launches-website-to-help-high-school-students-with-college-admissions.aspx?admgarea=News1

    Monday, September 12, 2016

    Introduction to Computers

    Summary Slideshare notes Discovering Computers" by Shelly Cashman on;

    1. Introduction to computers

    2. Components of a System Unit
      

    http://www.slideshare.net/astirling917/chapter-01-11576876

    http://www.slideshare.net/astirling917/discovering-computers-chapter-04


    Revision Questions
    http://insideitgs.wikispaces.com/3.1+Hardware+Quiz+Questions

    Thursday, September 8, 2016

    Education Mobile App Development

    Think of a problem that relates to education and develop a simple mobile app that solves that problem. The solution should be able to uploaded in the apps store or run in individual phones.

    Ideas of solution http://www.schoolscool.co.uk/school-mobile-applications

    Example
    Problem - Students at AKAM are not able to tell what is the special break that is being sold at the tuck-shop.

    Client- Tuck-shop executive

    Solution - Develop mobile app that we will updated by the tuck-shop committee  so as students can upload it in their mobile phones to be able to know what break is being sold everyday.

    Possible software builder
    1. http://appmakr4schools.com/
    2. http://www.mobincube.com/try-it.html
    3. http://ibuildapp.com/marketplace/Solutions/?all=1
    Assessment rubric
    0-3
    The app developed is simple solving the educational problem partly with limited techniques and features used.
    4-6
    The app developed is of an average quality solving the educational problem with some evidence of good use of techniques and features of the mobile app builder. The app functions partly.
    7-9
    The app developed is of good quality solving the educational problem with some evidence of good use of varied techniques and features of the mobile app builder. The app functions effectively in the mobile phone.
    10-12
    The app developed is of excellent quality solving the educational problem identified with some thorough use of the techniques and features of the mobile app builder and functions effectively as expected.

    Education Mobile App Development

    Think of a problem that relates to education and develop a simple mobile app that solves that problem. The solution should be able to uploaded in the apps store or run in individual phones.

    Ideas of solution http://www.schoolscool.co.uk/school-mobile-applications

    Example
    Problem - Students at AKAM are not able to tell what is the special break that is being sold at the tuck-shop.

    Client- Tuck-shop executive

    Solution - Develop mobile app that we will updated by the tuck-shop committee  so as students can upload it in their mobile phones to be able to know what break is being sold everyday.

    Possible software builder
    1. http://appmakr4schools.com/
    2. http://www.mobincube.com/try-it.html
    3. http://ibuildapp.com/marketplace/Solutions/?all=1

    Monday, September 5, 2016

    Education: IT Hardware In education

    Investigate and make short notes on at least 10 IT hardwares used in education and post your notes on OneNote.

    Your notes should;
    - Define the hardware
    - Describe how and where it is used
    - Obtain a suitable diagram for the hardware
    - List the advantages and disadvantages of using the hardware.

    Show at least FIVE hardwares of the future that will be used in Education, explaining why.



    Resources
    Notes Summary
    http://www.itgstextbook.com/chapter10-education.html

    Classroom gadgets
    http://www.techradar.com/news/computing/10-awesome-gadgets-for-teachers-1301675
    http://calgaryherald.com/technology/classroom-gadgets-using-technology-to-enhance-learning

    News Articles for Further Reading
    1. http://www.bbc.com/news/technology-30814302
    2. https://www.theguardian.com/uk/2011/jun/09/schools-surveillance-spying-on-pupils
    3. https://www.sciencedaily.com/releases/2016/06/160630214509.htm
    4. https://www.carolinajournal.com/news-article/student-data-mining-system-raises-privacy-concerns/
    5. https://www.sciencedaily.com/releases/2016/08/160810141939.htm
    6. https://www.sciencedaily.com/releases/2016/08/160830084148.htm
    7. http://pilotmountainnews.com/news/2911/new-security-system-launching-at-east-surry
    8. https://www.washingtonpost.com/news/the-switch/wp/2015/12/28/google-is-tracking-students-as-it-sells-more-products-to-schools-privacy-advocates-warn/
    9. https://www.washingtonpost.com/news/the-switch/wp/2016/04/22/schools-are-helping-police-spy-on-kids-social-media-activity/





    Education: IT Hardware In education

    Investigate and make short notes on at least 10 IT hardwares used in education and post your notes on OneNote.

    Your notes should;
    - Define the hardware
    - Describe how and where it is used
    - Obtain a suitable diagram for the hardware
    - List the advantages and disadvantages of using the hardware.

    Show at least FIVE hardwares of the future that will be used in Education, explaining why.



    Resources
    Notes Summary
    http://www.itgstextbook.com/chapter10-education.html

    Classroom gadgets
    http://www.techradar.com/news/computing/10-awesome-gadgets-for-teachers-1301675
    http://calgaryherald.com/technology/classroom-gadgets-using-technology-to-enhance-learning


    News Articles for Further Reading


    1. http://www.bbc.com/news/technology-30814302
    2. https://www.theguardian.com/uk/2011/jun/09/schools-surveillance-spying-on-pupils
    3. https://www.sciencedaily.com/releases/2016/06/160630214509.htm
    4. https://www.carolinajournal.com/news-article/student-data-mining-system-raises-privacy-concerns/
    5. https://www.sciencedaily.com/releases/2016/08/160810141939.htm
    6. https://www.sciencedaily.com/releases/2016/08/160830084148.htm
    7. http://pilotmountainnews.com/news/2911/new-security-system-launching-at-east-surry
    8. https://www.washingtonpost.com/news/the-switch/wp/2015/12/28/google-is-tracking-students-as-it-sells-more-products-to-schools-privacy-advocates-warn/
    9. https://www.washingtonpost.com/news/the-switch/wp/2016/04/22/schools-are-helping-police-spy-on-kids-social-media-activity/





    Education: IT Hardware In education

    Investigate and make short notes on at least 10 IT hardwares used in education and post your notes on OneNote.

    Your notes should;
    - Define the hardware
    - Describe how and where it is used
    - Obtain a suitable diagram for the hardware
    - List the advantages and disadvantages of using the hardware.

    Show at least FIVE hardwares of the future that will be used in Education, explaining why.


    Thursday, September 1, 2016

    IT in Education

    Do an independent research in the area assigned and post a summary of your findings on OneNote;

    a) Define the terms assigned

    b) Describe how the technology works and use appropriate illustrations or diagrams to explain the technology
    c) Provide examples where possible
    d) Outline the positives and the negative impacts of using the tools in education
    e) Suggests some common related social / ethical issues to the technologies

    f) Share one current article relevant with an issue related to the topic.

    Shad         Virtual learning environments (VLE), 
    Tanzil :      Interactive and smart e-books, 
    Amaar :     Web 2.0 educational networks
    Saumya:    Game-based learning,
    Wayne:      fully immersive learning environments,
    Sahir:        Software filtering and monitoring of students’ internet use, 
    Samy:        M-learning technologies.

    Hezi:          Cloud computing in Education