Computer Studies - Year 8 (2 Years)

download Computer Studies - Year 8 (2 Years)

of 24

Transcript of Computer Studies - Year 8 (2 Years)

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    1/24

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    2 weeks

    Graphics:

    Microsoft

    Paint

    Be able to state

    some uses ofcomputer graphics.

    Be able to create

    graphics usingbasic graphic

    elements such as

    lines, curves,

    sectors, polygons,circles, ovals,

    squares and

    rectangles.

    Hands-on:

    To draw some pictures. e.g. cat,flower, dinosaur or a face.

    Save your work.

    create, save, open and

    close MS Paint application.

    save file with a different name,

    type and in a different folder.

    import pictures from Clip-art.

    draw different pictures using

    graphic tools available in the

    application.

    Sugges ted MS Paint check list

    (Appendix 1)

    B5:

    (pg 120 134)

    B11:

    (pg 12)

    Online Resource:

    Microsoft Paint

    (Appendix 12)

    Suggested

    Exercises

    B8:

    (pg.108, 110

    -111, 136)

    2 weeks

    Graphics:

    Microsoft

    Publisher

    Be able to create a

    publication using

    pre-designedlayout.

    Be able to import

    images fromscanner or digital

    camera and

    incorporate them

    into the design.

    Hands-on:

    To produce a birthday card, award

    certificate, banner, brochure etc.

    Save your work.

    create, save, open and close MS

    Publisher application.

    save file with a different name,type and in a different folder.

    import pictures from Clip-art.

    Import photos from Digital Camera

    or scanner.

    create different designs using the

    pre-designed layouts and graphics.

    S uggested MS Publisher check list

    (Appendix 2)

    B8:

    (pg. 62 - 63)

    Online Resource:

    Microsoft

    Publisher

    (Appendix 12)

    Suggested

    Exercises

    B22:

    (pg. 20 24),

    32-36, 70-72

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    1

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    2/24

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    1 week

    Graphics:

    Any CAD

    software

    available

    Able to develop

    and format simplepre-designed

    graphics.

    Demonstration:

    Creating a 3D Home Architectproject.

    (or any CAD software available)

    Hands-on :Designing a project like a real

    house, Build a 2-or 3-story house.

    create, save, open and close 3D

    Home Architect application.

    save file with a different name,

    type and in a different folder.

    create different designs using the

    pre-designed layouts and graphics.

    Suggested 3D Home check list(Appendix 3)

    Help files from

    3D HomeArchitect

    application.

    2 weeks

    Computer

    Crime

    Be able to provideexamples of

    computer crime and

    suggest ways

    (physical and

    software) tosafeguard against

    computer crimes.

    Demonstration:

    Show web- links with evidence

    of computer crime.

    Listen to a sound file on

    network security. Video demonstrating phishing

    at Barclays.

    Slide-show of various examples

    of computer crime and

    prevention methods.

    Field trip (Optional):

    Visit a bank to view their

    security features.

    define the term Computer Crime

    provide examples of Computer

    Crime.

    define the term hacking.

    provide examples where hackingmight occur.

    provide variousphysical

    safeguards against hacking.

    provide various software

    safeguards against hacking.

    (Appendix 8)

    B2:(Pg 5-8,11-12)

    B6: (Pg 32-35)

    B7:

    (Pg 66-79,136-

    141, 157)

    On-line

    Resources:

    Computer crimes

    Sound, video &

    news

    (Appendix 12)

    SuggestedExercises:

    B2:

    (Pg 8-9)

    B4:

    (Pg 3-5, 9)

    On-line

    Games

    (Appendix 12)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    2

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    3/24

    2 weeks

    Computer

    Viruses

    Be able to identify

    the different kinds

    of viruses, theirimpact to a

    computer system

    and their

    preventionmethods.

    Demonstration:

    Show web- links with evidence

    of damages caused by virusinfection.

    Slide-show of different type of

    virus, sources of virus and

    prevention methods.

    differentiate between virus, wormand Trojan horse.

    provide examples of computerviruses and damages caused by

    them. e.g. Melissa virus, I Love

    You virus, etc.

    provide examples of Worms.

    B2:

    (Pg 13-17)

    B7:(Pg 139,146-

    147)

    OnlineResources:

    Computer viruses

    Suggested

    Exercises:

    B2:(Pg 20)

    B4:

    (

    Pg 10-11)

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    Hands-on:

    How to use an anti-virus

    software?

    How to update virus definition

    files of an antivirus software?

    e.g. My Doom worm.

    provide examples of Trojan

    horse.

    provide sources of virus

    infections (Appendix 8). suggest various virus protection

    measures (Appendix 9).

    News

    (Appendix 13)

    On-line Quiz

    (Appendix

    13)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    3

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    4/24

    1 week

    Data Privacy Be able to identify

    areas where

    personalinformation are

    kept and the misuse

    of these data.

    Demonstration:

    Slide-show of some places

    where personal information is

    kept. Students to suggest more

    places where personalinformation is kept.

    Show a video on how ourpersonal information can be

    disclosed to others without ourconsent.

    Alternatively, students can copy

    or download and watch the video

    at home.

    Role-Play:

    Personal data of a magazine

    subscriber being sold to otherdirect-sale companies.

    Roles of magazines subscriber,

    magazine company and other

    direct-sale companies.

    define the term data privacy.

    identify areas where ones

    personal information is kept e.g.Hospital health records and

    magazine subscription.

    give examples of possible misuse

    of ones personal information.

    B2:

    (Pg 9-10)

    B21:(Pg 212-213)

    B20:

    (Pg 135-137)

    Online

    Resources:

    Video ondata privacy

    (Appendix 13)

    Suggested

    Exercises:

    B2:

    (Pg 12)

    B4:(Pg 5-8)

    Duration (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    4

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    5/24

    1 week

    Data Security Be able to identify

    factors affecting

    data security andmethods of data

    recovery.

    Demonstration:

    Show pictures of various ways

    in which data can be lost.

    Suggest ways to recover lost

    data and provide examples of

    various ways to back-up data.

    Hands-on:

    Students to back-up

    information stored on a

    selected folder in the hard diskonto a floppy disk or other

    storage media.

    Restore data from the back-up

    disk.Suggested Ref:

    B2: (Pg 17-20)

    Group Work:

    Task worksheet with variousscenarios of data lost. Students

    to determine the causes and

    what can be done to overcome

    the problem.Suggeted Ref: B9 (Pg 15-16)

    define the term data security.

    list possible dangersof losing

    files.

    Suggest waysto recover lost data.

    (Appendix 9)

    B6:

    (Pg 18-21)

    B20:(Pg 128 -130)

    Hands-on:

    B2:

    (Pg 17-20)

    Task:

    B9:

    (Pg 15-16)

    OnlineResources:

    News on

    Data security

    Slides on

    Data security

    (Appendix 13)

    Suggested

    Exercise:

    B9:

    (Pg 17-18)

    B15:(Pg 56-57)

    On-lineGames

    (Appendix

    13)

    3 weeks

    continued

    Spreadsheets:

    Practice with

    MS Excel

    Be able to create a

    worksheet, showing

    ability to formatdata in cells,

    including usingautomatic

    formatting andsetting tools.

    Hands-on:

    Produce an expenditure list with

    borders and shading and save it.

    Open the saved list, edit it andsave it again with the same nameand with different names (in

    different folders).

    open

    , create, save and close

    Workbooks.

    entertext and numbers.

    format text and numbers. apply borders and shading.

    handle worksheets.

    Manipulate range of cells.

    (Appendix 4)

    B2:

    (Pg 59-63)

    B2:

    (Pg 69-76)Online resource:

    Excel Tutorial

    (Appendix 14)

    Homework

    B4:

    (Pg 44-55)

    Duratio Topic Learning Learning Activities Learning outcome Resources Assessment

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    5

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    6/24

    n (no of

    weeks)Objectives

    (At the end of the lessons, students

    will be able to )

    Spreadsheets:

    Formulas &

    Functions

    Be able to practice

    and handle

    formulas andfunctions for

    calculations andcomparisons.

    Hands-on:

    Produce a class mark sheet and

    save it (Include Attendance &

    Ranking).

    Produce a budget for aneducational visit to a

    neighbouring country.

    insert and modify formulas.

    recognize common errors made

    when using formulas and functions.

    (Appendix 5)

    B2:

    (Pg 66)

    Suggested

    exercise:

    B4:(Pg 46-51)

    2 weeks

    Spreadsheets:

    Sorting Data

    Be able to organize

    data using sort.

    Hands-on:

    Retrieve the mark sheet producedearlier and sort it.

    sort data in any order.

    sort data in multiple columns.

    (Appendix 5)

    B2:

    (Pg 77)

    Homework

    Spreadsheets:

    Creating and

    Formatting

    Charts

    Be able to create,

    edit and formatsome features in a

    chart.

    Hands-on:

    Produce a chart on populationgrowth of Brunei Darussalam.

    Produce a chart showing the ratioon school club members.

    create, insert, modify, label and

    formatcharts in a worksheet.

    duplicate, move charts within a

    worksheet, between openspreadsheets.

    (Appendix 5)

    B2:

    (Pg 78)

    Homework

    Spreadsheets:

    Page Preview

    and Printing

    Be able to produce

    outputs or hardcopies.

    Hands-on:

    Retrieve some files created

    earlier then do formatting tasks.

    Apply page setup properties.

    Print the files.

    apply proper formatting and page

    setup features.

    preview a worksheet.

    print a worksheet.

    (Appendix 5)

    B2:

    (Pg 79)

    Suggested

    exercise:B4:

    (Pg 63-66)

    Progress test

    1 weekAutomation Be able to explore

    the economicbenefits of

    computers to

    society.

    Be able to explain

    briefly that

    Group Work:

    Explore the benefits of automation(e.g. home, office, industry, space).

    explain what automation is.

    state the reasons how automation

    improves productivity.e.g. the use of robots , the use of

    CAD/CAM in automobile

    industry

    identify automation trends in

    B7:

    (Pg 82 85)

    Online Resource:

    Robots

    (Appendix 14)

    Suggested

    exercises

    B16:

    (Pg. 68 69)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    6

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    7/24

    computers are usedto automate

    processes and thus

    improve

    productivity.

    modern life.(Appendix 10)

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    1 week

    Information Be able to usecomputers to

    collect, organize,

    and evaluate

    information.

    Group Work:

    Simulate on running a supermarket.

    Field Trip:Visit to a supermarket or a bank.

    state the importance of

    information and its use in

    government and businessorganizations.

    recognize that data can be easily

    stored, organized, retrieved and

    processed using the computer.

    recognize some of the uses of

    large-scale computer

    applications.

    B2:

    (Pg 95)

    B6:

    (Pg 48 58)

    Suggested

    exercises

    B9:

    (Pg 35, 49 51)

    1 week

    New

    products

    Be able to state the

    benefits of new

    products.

    Assignment:

    Search for new products and related

    information.

    Group Presentation:

    New products.

    name the modern gadgets used at

    home.

    identify new products that allow

    us to lead to more comfortable and

    secure life.

    Latest Internet

    resources

    B2:

    (Pg.97-98)

    1 week

    Health Issues Be able to identifypotential dangers

    posed by

    computers on our

    health.

    Demonstration:Show pictures of ergonomically-

    designed equipments.

    Assignment :Collect information on healthhazards caused by unused / old

    computer equipment.

    list some health problemscaused

    by using computers.

    practicegood habitsto maintaingood health and create good

    working environment.

    (Appendix 10)

    B14:(Pg 76 77)

    B2:

    (Pg.102)Online Resource:

    Health and

    Safety

    (Appendix 14)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    7

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    8/24

    1 week

    Environmenta

    l Issues

    To identify

    potential dangers

    posed bycomputers on the

    environment.

    Group Work :

    Collect information on ways to

    minimize environmental problems

    caused by computers.

    Field Trip:

    explain briefly how computers can

    give rise to pollution and

    environmental problems.

    help raise consciousness about

    protecting our environmentthrough the 4Rs. (Reduce,

    Recycle, Repair, Reuse).

    B7:

    (Pg 164 165)

    B2:

    (Pg 101)

    Suggested

    exercises

    B4:

    (Pg 72-75)

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    1 week

    Effect on

    employment

    Be able to identifythe impact of

    computers on

    employment.

    Group Work:

    To explore the current employment

    trends.

    explain the effects of computers

    on employment.

    Identify different types of new

    working styles: (Internet

    banking, e-Commerce, tele-commuting, etc.).

    explain the benefits of newworking styles.

    (Appendix 10)

    B2:

    (Pg 104 105)

    B14:(Pg 72 73)

    Online

    Resources:

    Social Impact

    (Appendix 14)

    Suggestedexercises

    B4:

    (Pg 75-77)

    1 week

    Changes in

    Lifestyles

    To identify the

    impact of

    computers on ourlifestyles.

    Assignment:

    Searching for information on the

    Internet about Moneo TheSmart card electronic wallet

    Collect information on various

    forms of non- cash payments in

    BruneiDarussalam.

    Demonstration:

    Looking at example on the Internet

    for e-commerce.e.g. www.amazon.com

    explain what a cashlesssociety is.

    explain why electronic

    transactions are popular.

    identify the various

    forms ofnon-cash payments.

    (Appendix 11)

    B7:

    (Pg 160-163)

    B2:

    (Pg 106 109)

    Online resource:

    Lifestyles

    (Appendix 14)

    Suggested

    exercises

    B15:

    (Pg 70-71)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    8

    http://www.amazon.com/http://www.amazon.com/
  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    9/24

    1 week

    Computers at

    Home

    To recognize how

    embedded

    computers are usedat homes.

    Assignment:

    Collect information on examples

    of household appliances withembedded computers.

    Look for pictures of home

    Entertainment.

    identify embeddedcomputers that are installed in

    household appliances and devices.

    e.g. washing machine, a

    refrigerator, digital cameras,

    electronic games, etc.

    identify benefits that can be

    brought about by using home

    computer.

    B7:

    (Pg 98-100)

    Online Resource:

    Lifestyle2

    (Appendix 14)

    Suggested

    exercises

    B8:(Pg 25)

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    1 week

    Multimedia Be able to identify

    features in a

    multimedia system.

    Be able to makeuse the recorded

    sound or voices to

    be incorporated in a

    multimediapresentation.

    Demonstration:

    Record your voice.

    Record some human-made

    sound. Mix the recorded sound and

    make some changes to the tempo,frequency and speed.

    state the meaning of the term

    multimedia.

    identify the features in a

    multimedia system. list all the necessary peripherals

    and application software of amultimedia system.

    state the function of C.A.L as a tool

    in a multimedia interactive

    educational software.

    identify the advantages of using

    C.A.L

    to use narration to record voice.

    (Appendix 6)

    B2:

    (Pg 116 118)

    B6:

    (Pg 128 137)

    Suggested

    exercise:

    B2:

    (Pg 119)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    9

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    10/24

    2 weeks

    Practice with

    MS

    PowerPoint

    Be able to develop

    and format simple

    presentations.

    Hands-on:

    Create a presentation containing

    5-6 slides.

    create, save, open and close a

    presentation.

    enter and format text.

    format slides.

    switch between open presentations.

    use available help functions.(Appendix 6)

    B1:(Pg 123 - 131)

    Online Resource:

    PowerPointTutorial

    (Appendix 14)

    Homework

    Be able to identify

    the general featuresand make use them

    for a multimediaapplications.

    Hands-on:

    Open a presentation file and

    incorporated sound or video and

    animated images.

    Incorporate a recorded voice into

    a presentation file.

    Hyperlink slides.

    make use of some interesting

    elementsor features in a

    multimedia presentation: video,

    sound and animation.

    hyperlinkslides to other slides,

    other presentation files or different

    format files or a website.

    (Appendix 7)

    B5:(Pg 137-149)

    B5:

    (Pg 155 160)

    Homework

    Duratio

    n (no of

    weeks)

    TopicLearning

    ObjectivesLearning Activities

    Learning outcome

    (At the end of the lessons, students

    will be able to )

    Resources Assessment

    1 week

    Movie maker

    application

    package

    Be able to create asimple storyboard

    using a movie

    maker program.

    Demonstration:

    Produce a simple movie clips.

    create save, open a movie using

    still pictures or video clips.

    make use of thetaskbutton.

    (Appendix 7)

    B5:(Pg 150 154)

    B6:

    (Pg 144 150)

    Homework

    Progress test

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    10

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    11/24

    APPENDIX 1

    SUGGESTED CHECK LIST ON MICROSOFT PAINT USAGE:

    Suggested check list for hands-on activities Tick here

    Creating a new graphic file

    Open a graphics application

    Save graphics with a different name and in a different folder

    Graphics tools

    Free form select

    Select

    Eraser/color eraser

    Pick color

    Pencil

    AirbrushLine

    Draw shapes e.g. Rectangle, etc

    Fill with color

    Magnifier

    Brush

    Text

    Curve

    Using images tools

    Flip/rotate

    Sketch/Skew

    Invert Colors

    Attributes

    Clear Images

    Using editing objects

    Move

    Resize

    Copy and paste

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    11

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    12/24

    Duplicate or clone

    Group and ungroup

    APPENDIX 2

    SUGGESTED CHECK LIST ON MICROSOFT PUBLISHER USAGE:

    Suggested check list for hands-on activities Tick here

    Creating a new file

    Open a graphics application

    Save graphics with a different name and in a different folder

    Inserting Picture /Autoshapes

    Editing scanned Picture Graphics tools

    Shading

    Cropping

    Improving appearanceBorders

    Font scheme

    Color scheme

    Design a card and printing hard copies

    Specifying page setup e.g. Publication type, paper orientation, paper size.

    Input text

    Import text or pictures into a card

    Number of copies

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    12

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    13/24

    APPENDIX 3

    SUGGESTED CHECK LIST ON MICROSOFT 3D HomeUSAGE:

    Suggested check list for hands-on activities Tick hereCreating a new file

    Open a graphics application

    Save graphics with a different name and in a different folder

    Graphics tools

    Walls

    Windows

    Base cabinet

    Fixture library

    Furniture

    Stairs

    RoofsUse text and dimension to improve the appearance of a objects

    Design a simple house

    Draw the walls (plot 4 corners)

    Design windows (standard window, bay window, box window, 5 sections window)

    Create cabinet (base cabinet, wall cabinet, full height, soffit, shelf/rod)

    Install fixtures (bathroom fixture, sinks, appliances, utility, misc. : water cooler, post lamp)

    Install stairs

    Select furniture for each room (tables, seating, bedroom, interior design, plants, etc.)

    Design roofs for the house

    Use camera plan to view the house.

    Wall elevation

    Cross section

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    13

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    14/24

    APPENDIX 4

    SUGGESTED CHECK LIST ON SPREADSHEET PACKAGE USAGE:

    Suggested check list for hands-on activities: Tick here

    Open, create, save and close workbooks

    Open a spreadsheet application.Create a new workbook using default template.

    Entering data items: text; numeric values; formulas / function

    Save a workbook to a location on a drive.

    Save a workbook using a different name or file type.

    Worksheet manipulation

    Handle worksheet: insert new, move, rename & delete

    Freeze and unfreeze column and/or row titles.

    Switch between worksheets and open spreadsheets.

    Enter text and numbers

    Select cells and enter data

    Change, copy, move and delete cell entryCells alignment (item types) by default

    Enter numbers as labels or value

    Autofill

    Select appropriate range of cells manipulation

    Select a cell, range of adjacent cells and non-adjacent cells.

    Select a row, range of adjacent rows and non-adjacent rows.

    Select a column, range of adjacent columns and non-adjacent .

    Select entire worksheet.

    Cell Formatting tasks

    Adjust standard column width

    Adjust standard row heightAdjust text alignment and orientation

    Format numbers: currency, date/time and percentage.

    Autoformat

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    14

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    15/24

    APPENDIX 5

    SUGGESTED CHECK LIST ON SPREADSHEET PACKAGE USAGE:

    Suggested check list for hands-on activities: Tick here

    Insert and modify arithmetic formulasAddition, subtraction, multiplication and division

    SUM, AVERAGE, MINIMUM, MAXIMUM, COUNTS AND AUTOSUM

    Generate formulas using cell referencing: relative, mixed, absolute.

    Create and handle charts

    Create different types of charts

    Change the colours in a chart: background, lines, columns, bars and pie slices.

    Add / remove a title, label to / from the chart.

    Organize data using sort

    Sort by one column using a basic descending or ascending sort.

    Sort by multiple columns

    Page settings and printing hard copies.Changing page size

    Page: orientation (portrait and landscape)

    Adjusting margin: top, bottom, left and right

    Creating headers and footers: text

    Showing sheet: gridlines

    Inserting other details like: filename, date/time, page numbering

    Set page break

    Print area: selection, active sheet, entire workbook, selected chart

    Number of copies

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    15

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    16/24

    APPENDIX 6

    SUGGESTED CHECKLIST ON MULTIMEDIA & PRESENTATION APPLICATION PACKAGES.

    Suggested check list for hands-on activities Tick HereSound recording software:

    Open the application: program accessories entertainment sound recorder

    Identify the simple buttons for recording and play-back

    Demonstrate the use of other features like: mixing sound, changing the tempo and thefrequency of the recorded voice.

    Save the recorded voice for later use in the Microsoft power point application.

    Closing the application

    Presentation software: start creating

    Open, editing, close and save a multimedia application.

    Create a presentation by using pre-designed layout and templates.

    Use the undo and redo commandsSave a file under a different file type eg. slide show file type

    Formatting text

    Use different case, build shadows and colours.

    Try different text alignments: left, right, centre and justified.

    Format the paragraph and slides

    Adjust line spacing before / after bulleted and numbered point

    Change between the style of bullets, numbers in a list from built-in standard options

    Apply the background templates or import other wallpapers.

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    16

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    17/24

    APPENDIX 7

    SUGGESTED CHECKLIST ON MULTIMEDIA & PRESENTATION APPLICATION PACKAGES.

    Suggested check list for hands-on activities Tick HereOther features / elements to be incorporated

    Clip arts, word art, animation or animated clip art

    Sound or music

    Slide transitions

    Incorporate timing features during a slide show presentation

    Hyperlink buttons

    Hyperlink built- in buttons / user-made buttons

    Hyperlink to other presentation file or other files

    Hyperlink to external slides from other presentation file

    Linking a slide to other files like a movie file, a webpage

    Movie Maker application package:How to import pictures into the collection frame

    Show two viewing mode of media: storyboard and timeline

    Produce (drag) clips from collection to the storyboard /timeline.

    Incorporate audio and music effects

    Making use of the TASK button

    Video effects.

    Video transition.

    Designing the movie clips with titles or credits (Enrichments)

    Titles at the beginning / before / after selected slides shows

    Add credits at the end of the movie

    Saving video clips in different movie formats: CD format, e-mail; web version; DV format andsimply to the computer movie version.

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    17

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    18/24

    APPENDIX 8

    SUGGESTED CHECK LIST ON DATA PRIVACY AND SECURITY:

    Suggested check list on Data Privacy and Data Security Tick here

    Examples of computer crime

    Software Piracy

    Data Espionage

    Computer Fraud

    E-mail Scams

    Examples of hacking

    Password guessing

    Spyware/plug-Ins to capture personal details e.g. Credit-card details

    Physical safeguards against hacking

    Locking CPU/notebook

    Accessing a Computer lab via special key like a magnetic stripe card

    Accessing a Computer lab via biometric characteristic { like retina-scan, face recognition,fingerprint-scan and voice recognition}

    Software safeguards against hacking

    User ID and Password

    Data Encryption

    Firewall

    Sources of virus infections

    Sharing diskettes/computers

    Free software distributed with magazines

    Downloading software/shareware from untrusted web-sites

    E-mail attachment

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    18

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    19/24

    APPENDIX 9

    SUGGESTED CHECK LIST ON DATA PRIVACY AND SECURITY:

    Virus protection measures.

    Avoid the use of any programs of doubtful origin, such as free software.

    Write-protect diskAvoid sharing diskettes/computers.

    Use of antivirus software and updating the virus definition files.

    Back up files on a regular basis

    Possible dangers of losing files

    Lost e.g. losing storage discs/tapes, bad filename

    Destroyed e.g. natural disaster, accidental deletion

    Corrupted e.g. scratches on a disc/ faulty disc drives , electronic interference

    Modified e.g. accidentally overwritten, fraud, updated with wrong data.

    Accessed by unauthorized

    Recover lost data

    Use of back up fileUninterruptible Power Supply (UPS)

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    19

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    20/24

    APPENDIX 10

    SUGGESTED CHECK LIST ON SOCIAL ECONOMICS AND IMPLICATIONS:

    Suggested check list on Social and Economic implications: Tick hereAutomation trends in modern offices.

    Word processors

    SpreadsheetsDatabases

    E-mail

    Health problems which can be linked with using a computer.

    RSI (repetitive strain injury)

    Eye strain cause by screen glare

    Back problems associated with poor seating or bad posture

    Injuries to wrists cause by prolonged typing

    Practices to help create good working environment.

    Appropriate positioning of monitors, keyboards and adjustable chairs

    Use of a mouse pat

    Use of a monitor filter

    Use of a wrist support

    Provision of adequate lighting and ventilation

    Pollution problems and environmental problems caused by computers.

    Manufacture of computers and peripherals

    Expendable computer parts, e.g. Printer cartridges

    Disposal of unwanted computers and peripherals

    Cutting down of trees

    Advantages of tele-commuting (tele-officing)

    Reduce or no commuting time

    Greater ability to focus on one task

    More flexibility in schedules

    Reduce company space requirement

    COMPUTER STUDIES SCHEME OF WORK SPN 21

    YEAR 8

    20

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    21/24

    APPENDIX 11

    Suggested check list on Social and Economic implications: Tick here

    Why electronic transactions are popular.Cost saving

    Convenience

    Security

    Forms of non-cash payments.

    Credit and debit cards

    Prepayment cards

    ATMs

    Smart cards

    E-commerce

    Page 21

  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    22/24

    APPENDIX 12

    Online Resources, Games & News

    MS Paint Tutorialshttp://www.lkwdpl.org/classes/MSPaint/paint.html

    http://www.lesley.edu/faculty/ahunt/MSPttutr.htmhttp://www.baycongroup.com/paint_shop_pro/tutorials.htm

    MS Publisher Tutorialshttp://www.officetutorials.com/publishertutorials.htmhttp://support.churchserve.com/tutorials/publisher/

    Computer Crimes

    http://www.teach-ict.com/gcse/theory/crime/general/miniweb/index.htm

    http://www.teach-ict.com/gcse/theory/crime/fraud/miniweb/index.htm

    http://www.teach-ict.com/gcse/theory/crime/hacking/hacking/index.htm

    http://www.teach-ict.com/gcse/theory/crime/piracy/piracy/index.htm

    Sound file on Network security and Video on Phishing:http://www.ictgcse.com/?act=podcast

    News on computer crimes:

    http://www.teach-ict.com/news/news_crime.htm

    http://www.teach-ic.com/news/news_hacking.htm

    On-line Games on computer crimes:http://www.teach-ict.com/gcse/theory/crime/piracy/quizzes/gcsepiracybaloons.htm

    http://www.teach-ict.com/contributors/philippa_smith/hacking.doc

    Page 22

    http://www.lkwdpl.org/classes/MSPaint/paint.htmlhttp://www.lesley.edu/faculty/ahunt/MSPttutr.htmhttp://www.baycongroup.com/paint_shop_pro/tutorials.htmhttp://www.officetutorials.com/publishertutorials.htmhttp://support.churchserve.com/tutorials/publisher/http://www.teach-ict.com/gcse/theory/crime/general/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/crime/fraud/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/crime/hacking/hacking/index.htmhttp://www.teach-ict.com/gcse/theory/crime/piracy/piracy/index.htmhttp://www.ictgcse.com/?act=podcasthttp://www.teach-ict.com/news/news_crime.htmhttp://www.teach-ic.com/news/news_hacking.htmhttp://www.teach-ict.com/gcse/theory/crime/piracy/quizzes/gcsepiracybaloons.htmhttp://www.teach-ict.com/contributors/philippa_smith/hacking.dochttp://www.lkwdpl.org/classes/MSPaint/paint.htmlhttp://www.lesley.edu/faculty/ahunt/MSPttutr.htmhttp://www.baycongroup.com/paint_shop_pro/tutorials.htmhttp://www.officetutorials.com/publishertutorials.htmhttp://support.churchserve.com/tutorials/publisher/http://www.teach-ict.com/gcse/theory/crime/general/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/crime/fraud/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/crime/hacking/hacking/index.htmhttp://www.teach-ict.com/gcse/theory/crime/piracy/piracy/index.htmhttp://www.ictgcse.com/?act=podcasthttp://www.teach-ict.com/news/news_crime.htmhttp://www.teach-ic.com/news/news_hacking.htmhttp://www.teach-ict.com/gcse/theory/crime/piracy/quizzes/gcsepiracybaloons.htmhttp://www.teach-ict.com/contributors/philippa_smith/hacking.doc
  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    23/24

    APPENDIX 13

    Online Resources, Games & News

    Computer Viruseshttp://www.teach-ict.com/gcse/theory/crime/virus/virus/index.htm

    News on computer viruses:http://www.teach-ict.com/news/news_virus.htm

    On-line Quiz on computer viruseshttp://www.teach-ict.com/gamesxml/finished/720/qopt.htm

    http://www.teach-ict.com/gcse/theory/crime/virus/quizzes/gcsevirusballoons.htm

    Video on data privacyhttp://www.ictgcse.com/?act=podcast#vid

    News on data securityhttp://www.teach-ict.com/news/news_dataloss.htm

    http://www.teach-ict.com/gcse/theory/protectingdata/miniweb/index.htm

    Slides on data security

    http://www.teach-ict.com/gcse/theory/protectingdata/security_integrity.ppt

    On-line Games on data security

    http://www.teach-ict.com/gcse/theory/protectingdata/students/s_protectdata_quiz.htm

    Page 23

    http://www.teach-ict.com/gcse/theory/crime/virus/virus/index.htmhttp://www.teach-ict.com/news/news_virus.htmhttp://www.teach-ict.com/gamesxml/finished/720/qopt.htmhttp://www.teach-ict.com/gcse/theory/crime/virus/quizzes/gcsevirusballoons.htmhttp://www.ictgcse.com/?act=podcast#vidhttp://www.teach-ict.com/news/news_dataloss.htmhttp://www.teach-ict.com/gcse/theory/protectingdata/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/protectingdata/security_integrity.ppthttp://www.teach-ict.com/gcse/theory/protectingdata/students/s_protectdata_quiz.htmhttp://www.teach-ict.com/gcse/theory/crime/virus/virus/index.htmhttp://www.teach-ict.com/news/news_virus.htmhttp://www.teach-ict.com/gamesxml/finished/720/qopt.htmhttp://www.teach-ict.com/gcse/theory/crime/virus/quizzes/gcsevirusballoons.htmhttp://www.ictgcse.com/?act=podcast#vidhttp://www.teach-ict.com/news/news_dataloss.htmhttp://www.teach-ict.com/gcse/theory/protectingdata/miniweb/index.htmhttp://www.teach-ict.com/gcse/theory/protectingdata/security_integrity.ppthttp://www.teach-ict.com/gcse/theory/protectingdata/students/s_protectdata_quiz.htm
  • 8/14/2019 Computer Studies - Year 8 (2 Years)

    24/24

    APPENDIX 14

    Online Resources, Games & News

    Excel Tutorialhttp://www.uwstout.edu/training/MSTutorials/excel.htm

    PowerPoint Tutorialhttp://www.uwstout.edu/training/MSTutorials/pwrpnt.htm

    Robotshttp://www.livescience.com/bestimg/index.php?cat=robots

    Health and Safetyhttp://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtml

    Social Impact

    http://www.bbc.co.uk/gcsebitesize/ict/implications/2workpatternsrev4.shtml

    http://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtml

    Lifestyleshttp://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev4.shtml

    http://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev2.shtml

    Page 24

    http://www.uwstout.edu/training/MSTutorials/excel.htmhttp://www.uwstout.edu/training/MSTutorials/pwrpnt.htmhttp://www.livescience.com/bestimg/index.php?cat=robotshttp://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtmlhttp://www.bbc.co.uk/gcsebitesize/ict/implications/2workpatternsrev4.shtmlhttp://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtmlhttp://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev4.shtmlhttp://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev2.shtmlhttp://www.uwstout.edu/training/MSTutorials/excel.htmhttp://www.uwstout.edu/training/MSTutorials/pwrpnt.htmhttp://www.livescience.com/bestimg/index.php?cat=robotshttp://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtmlhttp://www.bbc.co.uk/gcsebitesize/ict/implications/2workpatternsrev4.shtmlhttp://www.bbc.co.uk/gcsebitesize/ict/implications/3healthandsafetyrev.shtmlhttp://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev4.shtmlhttp://www.bbc.co.uk/schools/gcsebitesize/ict/implications/1lifestylerev2.shtml