You are on page 1of 15

Durati

on (no Learning outcome


Learning Assessme
of Topic Learning Activities (At the end of the lessons, Resources
Objectives nt
weeks students will be able to …)
)
Computer Be able to Demonstration: • state the role of computers U3: (Pg 61-
Control explain the use Show diagram of in control. 65)
of sensors in relationship between • describe the role of sensors
data collection sensors, computers, ADC, in control. U5: (Pg44, 46-
and detection DAC and etc.(using example • identify the different types 47)
in computer- of Greenhouse control of sensors used in
controlled system) computer-controlled U10: (Pg 152-
applications. applications. 155, 257-260)
Show pictures of the various
types of sensors and their o light
o temperature U11: (Pg141-
uses. 147)
2 e.g. light sensor, sound o pressure
weeks sensor, temperature sensor, o sound
etc. o etc
• describe the need of an ADC
Group work:
in conversion of analog to
Explore examples of
digital data.
computer control.eg. alarm
• describe the purpose of
clock, buzzer for shop, light
feedback loops in a
house, etc.
computer-controlled system.
Discuss on the paper • describe what is a process
manufacturer which uses control.
process control with
radiation to make paper.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 1


YEAR 11
Data Be able to Group Work: • define the term data U8: U9:
Logging explain the • Case study of various logging. (Pg 40-41) (Pg 40)
data logging data logging • provide examples of data U13:
process and to experiments. Students to logging experiments. (Pg 176-177)
give examples suggest suitable data • state a suitable data U10:
of data logging. logging period and data logging interval and data (Pg 105-109)
2 logging interval for each logging period for a given U3:
weeks application. application. (Pg 61-62)
• Discuss their virtues and • list the hardware and
limitations. software used in the data
logging experiment.
• state the advantages and
disadvantages of a given
data logging experiment.
Durati
on (no Learning outcome
Learning Assessme
of Topic Learning Activities (At the end of the lessons, Resources
Objectives nt
weeks students will be able to …)
)
Commercial Be able to state Group work: • state the devices used at a U7: (Pg 118-
and general the advantages Discuss the benefits of point-of-sale(POS) 122)
data of using computers in terminal.eg. supermarkets
processing computers in commercial use: • list the benefits of U11: (Pg135-
commercial o supermarkets computers 139)
and general o banks in commercial use: eg. in U11: (Pg160-
data o dental clinic supermarkets(in stock 161)
1 week processing. o etc control and order U11: (Pg166-
processing). 173)
Field trip: • list advantages and
Explore the use of disadvantages of:
computers in commercial o EFTPOS
banks.
o Credit cards
o Debit cards
o etc
COMPUTER STUDIES – SCHEME OF WORK SPN 21 2
YEAR 11
Industrial, Be able to state Group work: • list advantages of U3: (Pg 65-
technical advantages of Discuss the advantages and computers in industrial, 68)
and computers in identify the devices needed technical and scientific use.
scientific industrial, for each of the applications • define and give examples of U5: (Pg42-43,
uses technical and below: CAD/ CAM. 46-47)
scientific use. - CAD/CAM • define and give examples of
- Image processing simulation and modeling. U11: (Pg 120-
- Weather forecasting 123)
1 week
- Industrial inspection
system
- Simulation
- Modeling
Field trip:
A visit to RBA training centre
(flight simulator)
Expert Be able to Group work: • define expert system. U10:
systems describe the Discuss on examples on the • describe the three (Pg 175-176)
application of use of expert system: components of an expert
1 week expert system. o medical diagnosis system: U4:
o mineral prospecting o knowledge base (Pg4)
o fault diagnosis o inference engine
o user interface
Durati
on (no Learning outcome
Learning Assessme
of Topic Learning Activities (At the end of the lessons, Resources
Objectives nt
weeks students will be able to …)
)
• list advantages and
disadvantages of using
expert system.
• give examples of expert
system.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 3


YEAR 11
Miscellaneo Be able to Group work: • define CBL(computer U7:
us areas state the Discuss the advantages of based learning). (Pg 122-127)
advantages of CBL(Computer-based • state the advantages
using learning) and disadvantages of CBL. U11:
computers in: • list and identify types of (Pg 300-304)
o Education Discuss how computers CBL software:
and can help people with • drill and practice
Training special needs.
• tutorial
o Entertainm
• game
ent
• problem solving
o helping the
• describe the use of
handicappe
computer in production and
d.
generation of music by
mixing different signals
• describe the use of
1 week computers in
• television and film:
• computer graphics
• animation
• state devices used to
help people with special
needs:
• Braille keyboard, Braille
monitor
• speech recognition
systems, etc

COMPUTER STUDIES – SCHEME OF WORK SPN 21 4


YEAR 11
Changing Be able to Group Work: • explain the changes in U10:
work explain the Discuss the changes in employment trends. (Pg 144)
patterns changes in employment trends. • explain what de-skilling is
employment U8:
and provide examples.
trends brought Identify the effects of de- (Pg 72-73)
1 week skilling: manufacturing, • explain what electronic
about by scabbing is. U11:
computer publishing, services, etc.
• explain the needs for re- (Pg255)
controlled Discuss the needs for re- training.
technology. training.

Durati
Learning outcome
on (no Learning Assessme
Topic Learning Activities (At the end of the lessons, Resources
of Objectives nt
students will be able to …)
weeks
)
• list advantages and
disadvantages of tele-
commuting (tele-working).
• explain what a call centre
is and provide examples.
Changing Be able to Assignment: • explain what a cashless U7: (Pg 160-
lifestyles identify Visit a commercial website society is. 163)
changes in and browse through the • list advantages and U5: (Pg 76-
lifestyles due to ordering procedures for e- disadvantages of cashless 77)
technology. shopping (on-line shopping). society.
1 week • describe what a smart card U10: (Pg 147)
Group work:
Discuss the benefits of office is. U11: (Pg 247-
automation. • list advantages and 249)
disadvantages of on-line
shopping (e-commerce).
• list the benefits of office
automation.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 5


YEAR 11
Health and Be able to Demonstration: • list some health U8: (Pg 76 – 77)
safety identify health Show pictures of problems caused by using U11: (Pg 271-
problems ergonomically-designed computers and suggest 274)
associated with equipments. remedies to overcome
using them. U2: (Pg 148-
Assignment: 151)
computers. • list some safety issues
Collect information on safety
1 week at work and suggest
Be able to issues at work.
identify remedies to overcome
precautions to them.
reduce health • list some Health and
risks when Safety Regulations.
working with
computers.
Moral and Be able to Group work: • state some moral issues U3: (Pg 88-
social identify areas Discuss the effects on some related to the use of 89)
issues on moral and moral issues: copyright, computers.
social issues unethical websites, hacking, • state some social issues U11: (Pg 264-
with the use of etc. related to the use of 267)
1 week computers. computers.
Discuss the effects on some
• describe the effects of U8: (Pg 88-
social issues: electronic
Be able to these moral and social 89)
scabbing, de-skilling, etc.
identify the issues.
undesirable
• state some drawbacks of
usage of
using the Internet.
Internet.
Durati
on (no Learning outcome
Learning Assessme
of Topic Learning Activities (At the end of the lessons, Resources
Objectives nt
weeks students will be able to …)
)
Group work:
Discuss some drawbacks of
using the Internet.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 6


YEAR 11
Computer Be able to state Hands-on: • define the term computer U7:
virus and list Using an anti-virus software virus. (Pg 139, 146-
precautions to scan and remove viruses. • state the sources of virus 148)
1 week against infections.
Group work: U2:
computer virus. • list precautions against
Discuss the effects of and (Pg 123-124)
ways to overcome virus virus infections.
infections.
Computer Be able to Demonstration: • define the term computer U7:
Crime provide Slide-show of various crime. (Pg 66-79,
examples of examples of computer • provide examples of 136-141,157)
computer crime and prevention computer crime.
crime. methods. • define the term hacking.
1 week Field trip: • define the term software
Be able to piracy.
Visit a bank to view their
explain ways to • provide various safeguard
security features.
protect against against computer crime.
computer
crime.

Consequen Be able to Group Work: • compare the varied degree


ces of explain the Discuss various of seriousness posed by
system consequences consequences of system system failure in various
failure of computer failure in various situations.
system failure. applications: air traffic • state the precautionary
control system, traffic-light methods to prevent
Be able to
control system, payroll system failure.
explain
system, etc. • state the methods of
methods of
data recovery system recovery.
in case of
system failure.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 7


YEAR 11
Durati
on (no Learning outcome
Learning Assessme
of Topic Learning Activities (At the end of the lessons, Resources
Objectives nt
weeks students will be able to …)
)
The Data Be able to Group work: • differentiate between data U3: (Pg 85)
Protection justify the need Discuss the use of commissioner, data U9: (Pg81)
Act to control how personal data and how controller/user and data
data and these data users (data subject. U11: (Pg267-
information can collectors) should be held • list the rights of data 269)
be collected responsible for using the subjects.
1 week and used. data. • list the eight principles
under the Data Protection
Be able to Act.
identify the • state the exemptions from
data protection the Data Protection Act.
legislations.

Data and Be able to give Group work: • list examples of computer U3: (Pg85)
Computer examples of Discuss various examples of misuse at work. U9: (Pg 79),
misuse computer computer misuse at their • list some rules under the
misuse at work. work place. Computer Misuse Act. U11: (Pg270)
1 week
• describe examples of U2: (Pg133-
misuse of data: 134)
electronic fraud, credit
card fraud, etc.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 8


YEAR 11
Copyright Be able to Group work: • explain terms like U3: (Pg 85)
explain the Discuss copyrights issues: Freeware, Shareware and U9: (Pg 78)
concept of using User licenses.
copyright distributing materials stored. • list examples on how U11: (Pg270-
applied to copyright laws can be 271)
software and broken.
files.
1 week Be able to
explain
copyrights
issues which
involve file or
software
downloading
from the
Internet.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 9


YEAR 11
SUGGESTED CHECKLIST ON THE SOCIAL AND ECONOMIC IMPLICATIONS OF THE USE OF COMPUTERS

Suggested check list on The social and economic implications of the use of computers Tick here
Changing employment patterns
Many of the manual tasks such as assembly work and paint spraying in factories are now
performed by robots.
Many industrial processes operate 24 hours a day and are continually being monitored and
controlled by robots.
There are fewer paper-based systems in offices.
More people work from home, with the advantage of no travelling and freedom of being able
to live in any part of the country(or the world for that matter).
Computers are used to monitor the performance of their users. eg. In supermarkets
Examples of how de-skilling can happen
Through replacement of skilled and semi-skilled labour by micro-processor-controlled
systems in manufacturing. eg. robots
The typesetters who used to set out newspapers were replaced by Desktop Publishing
Examples of jobs alteration as a result of computers
Secretaries use office software
Shop assistants scan bar codes
Doctors keep computer records and use diagnostic techniques such as CAT scans
Police use databases to track criminals and check on drivers and cars
Engineers use CAD to design constructions and to perform simulations
Civil servants use models to predict economic changes
Reasons for the need of retraining
Existing packages are upgraded
New packages are published
Advantages of homeworking
Less travel.
Working hours to suit the individual.
There is no need to live near the work place.
Saving on expensive office space.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 10


YEAR 11
Suggested check list on The social and economic implications of the use of computers Tick here
Disadvantages of homeworking
Less social contact.
A suitable room has to be found at home.
Likelihood of interruptions from family.
Hazards in the work place
Wires trailing across the floor which people might trip over.
Overloaded power sockets, which can cause fires.
Wedging a fire door open which should be kept shut at all times.
Large quantities of paper lying around, particularly if people are allowed to smoke in the
office.
Not lifting properly.
Remedies to overcome hazards in the work place
All electrical equipment should be tested for safety at regular intervals.
Wires should be bound together and run through proper ducting.
Back should be kept straight with legs bent while lifting.
Health problems which can be linked using a computer
Eyestrain
Stress
Backache or joint aches(RSI)
Measures to reduce health risks
Take regular breaks form computer work. Looking away from the screen, walking around
and exercising your fingers and hands.
Make sure there are no reflections off the screen. If sunlight is coming in, take time to adjust
the binds.
Use copy-holder to hold documents rather than read them from the surface of the desk.
Adjust your chair to the right height.
Adjust the brightness and contrast of the monitor to suit you.
Sit up straight.
Use special keyboards and wrist guards.
Make sure that your screen is clean.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 11


YEAR 11
Suggested check list on The social and economic implications of the use of computers Tick here
Health and Safety Regulation 1992
Analyse workstations, and assess and reduce risks.
Ensure workstations meet minimum requirements.
Plan work so there are breaks or changes of activity.
Provide free eye-tests.
Provide health and safety training and information.
Social Issues
“Information Rich” and “Information Poor”
The Internet is changing how we interact
Over-reliance in technology
Impact on literacy
Faster pace of life
Motivation changes
Reduced social interaction at work
Changes in leisure time
Moral issues
Unrestricted Internet access
Ease of copying of computer files
Computers are replacing people at work
Increased government surveillance
Advantages of cashless society
It is far more convenient not to have to use cash.
The risk of being robbed is reduced. It is safer to move around.
You don’t have to queue at the bank.
Credits cards allow people to buy goods and pay them at the end of the month or obtain
them on credit, paying a proportion each month.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 12


YEAR 11
Suggested check list on The social and economic implications of the use of computers Tick here
Disadvantages of cashless society
Credit is normally given only to people who are working and have a steady source of income,
so certain people won’t be able to get it.
It is possible for people to spend more than they can really afford so they can get easily into
debt.
More information is kept about individuals. Inevitably some of this will be incorrect and lead
to people wrongly being refused cash or credit cards.
It is harder for people to keep track of how much they have spent.
Examples of downside of Internet
Shopping on the Internet will attract fraud and thieves.
Illegal materials - detailed instructions on how to make bombs and their dangerous products
are freely available on the Internet
Pornographic, obscene, indecent and immoral material can be downloaded by anyone.
Starting rumours – it is easy to spread rumours using the Internet through chatrooms.
Examples of consequences of system failure
A failure during a batch update of a sequential master file is irritating and will cause delay
A failure in an air traffic control system could well have catastrophic results
Examples of computer crime
The cracking of ineffective security systems to gain unauthorized access to commercially
sensitive or confidential data
Fraud through improper transfer of funds from one account to another
Measures taken to combat computer crime
Physical security
Development of complex security codes and systems
Encryption of sensitive data
Monitoring of all attempts to access the system

COMPUTER STUDIES – SCHEME OF WORK SPN 21 13


YEAR 11
Suggested check list on The social and economic implications of the use of computers Tick here
Virus protection measures
Avoid the use of any programs of doubtful origin, such as free software.
Write-protect disk
Avoid sharing diskettes/computers.
Use of antivirus software and updating the virus definition files.
Back up files on a regular basis
Possible dangers of losing files
Lost e.g. losing storage discs/tapes, bad filename
Destroyed e.g. natural disaster, accidental deletion
Corrupted e.g. scratches on a disc/ faulty disc drives , electronic interference
Modified e.g. accidentally overwritten, fraud, updated with wrong data.
Accessed by unauthorized
Recover lost data
Use of back up file
Uninterruptible Power Supply (UPS)
Data Protection Act
Personal data must be obtained and processed fairly and lawfully.
Personal data must be held for specific purposes.
Personal data must not be used for any reason incompatible with its original purpose.
Personal data should be relevant and adequate.
Personal data must be accurate and up-to-date.
Personal data must not be kept longer than necessary.
Personal data must be made available to the individual concerned and provision made for
correction.
Personal data must be kept secure.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 14


YEAR 11
Suggested check list on The social and economic implications of the use of computers Tick here
Misuse of computers at work
Wasting time playing games when they should be working.
Installing illegal software, thus placing the firm in a difficult position.
Running private business interests on the company’s equipment.
Visiting questionable websites, wasting work time and placing the company in a dubious
position.
Circulating irrelevant or offensive material via the company’s email system.
Computer Misuse Act
It is illegal to unauthorized access to computer material(e.g. hacking). This include viewing
of network you are not permitted to see and the illegal copying of programs(software piracy).
It is illegal to gain unauthorized access to computer to carry out serious crimes like fraud and
blackmail.
It is illegal to unauthorized changing of computer files including planting of viruses and
deleting files.
How Copyright Laws may be broken
Using software without proper licence.
Downloading text or images from the Internet and using them without saying where you got
them, or without receiving the copyright owner’s permission.
Copying a computer program you use at work and running it on a computer at home, without
the permission from the copyright holder.

COMPUTER STUDIES – SCHEME OF WORK SPN 21 15


YEAR 11

You might also like