Monday, February 25, 2013

ITGS Mark Band Paper 2

These are the grade boundaries from last year - they will definitely change this year.

1: 0-2

2: 3-4

3: 5-8

4: 9-11

5: 12-15

6: 16-18

7: 19-26

Check out this site for some help with studying for the exams.

http://tw.aisj-jhb.com/dross/dpitgs/unit-x/

Sunday, February 24, 2013

Fundamentals Presentations

With a partner or alone, you will come up with a presentation based on one of the following topics:

- Hardware
- Viruses
- Piracy
- Hacking
- Online safety

Sign up with your group HERE. (you can see examples from last semester as well)

You will need to make a presentation that is 10 minutes if you're working alone and  15-20 minutes if working with a partner.  You must also have some sort of activity that the rest of the class will participate in. They could answer questions on their own blogs, or they can comment on a post you've made on your own blog.

- both members of the group must be a part of the presentation
- you must have visuals to show on the projector
- include resources of different types (presentations, videos, websites, games, etc)
- you will also be responsible to make a poster based on your chosen topic

Format must be in EITHER Prezi or Google Presentation (no Keynote or PowerPoint for this one!).

 

Wednesday, February 20, 2013

Creating Tech Questions

Today, your task will be to become IT Teachers!

You job will be to find an article that is related to the topics we've discussed so far:

- Hardware
- Software
- Hacking
- Viruses
- Online Safety

After you've got your article, you need to create a list of 5-8 questions that relate to the article. Post these on your blog and then email the link to THREE other students in our class. Your grade will be affected by the quality of the questions you ask and the answers your classmates give!

(In other words, don't just ask questions that can be answered with one word -- try to ask questions that will get your 'students' to talk about how their own life relates to what the article is about. See my last post for examples.)

Hacking, the Government, and YOU!

[caption id="" align="aligncenter" width="500"] (taken from http://o14.metroflog.com/pictures/563/50/5/972550563_WEXIJTWNBTMRNPT.jpg)[/caption]

Stuxnet

Take a look at the terrifying article and video above and answer the following as a comment to this post:

  1. How safe is information on the internet? What can we do to protect ourselves?

  2. Read this article for a History of Hackers.

  3. What do you think hackers want? How has it changed throughout the years?

  4. Should the government be allowed to 'hack' in order to keep people safe?

  5. Have you had any experiences with your data or passwords being compromised online? Describe any stories you have.

  6. Can you predict what hacking will be like in the future? Will it still only target computers and laptops? What other targets could there be?

  7. Do some research on a 'Hacktivist' group called ANONYMOUS. What are their goals? How do they accomplish them? What are some (in)famous things they have caused?


 

Finally, find another article related to hacking or internet safety and post the link on your blog. Find a partner to read your article and summarize it as a comment on your post.

ITGS Study Website

http://tw.aisj-jhb.com/dross/dpitgs/unit-x/

Sunday, February 17, 2013

Computers and Copyright


(image taken from: http://harisbahalwan.files.wordpress.com/2011/07/hacking-21.jpg)

 

http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml

 

http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/2copyrightrev1.shtml

 

Read through both of the links, take the quizzes, and create a blog post answering the following questions:

1) If a hacker simply gains access to a computer system without trying to cause any damage, should they still be considered a criminal?

2) How strict should copyright laws be? Do you feel stealing a movie or a song is enough of a crime to go to jail? What sort of crime are 'worse'?

3) Have you ever experienced anything like being hacked? What sort of things can we do to protect ourselves?

Thursday, February 14, 2013

Ethics

1) You are speeding down the road homeward. You are in panic because you just heard on the radio that earthquake experts have detected an earthquake in the sea a few minutes ago. There’s a 99% chance that there will be a medium sized tsunami as a result. You are now about 5km away from the beach. Here, the tsunami will probably not strike so badly, but you are still in danger of drowning (even though you're a pretty good swimmer). When you pass a bus stop, you see three people waiting for the bus, not aware of the upcoming tsunami:

1. A pregnant woman, who cannot swim well in her condition.
2. Your boyfriend/girlfriend, whom you love very much. He/she swims very well.
3. The person who once saved your life, who cannot swim at all.

There is only one extra seat in your car, what do you do?

 

2) A husband and his wife lived in a beautiful mansion on an island surrounded by a river outside of New York City. One day the husband had to go out to the city to attend to some business. Before leaving, he told his wife "Do not leave the mansion today or you will be severely punished."

As the husband went off to his days work, the wife changed clothes and prepared for a little journey of her own. The wife had a lover not far from the mansion. Despite the husband's warning, she could not resist such a perfect opportunity to spend the day with him.

So the wife went and laid with her lover during the afternoon and then returned to the mansion. When she reached the bridge to the mansion, she found a most unpleasant surprise. A madman was dancing around on the bridge waiving a sharp, very large knife and on seeing the wife proclaimed in a loud voice, "Do NOT cross this bridge woman, for my God has instructed me to stab and kill all of those who try." And the madman continued to dance back and forth with the vigilant eyes of a hound dog before a storm. There was little doubt that this man's insanity would lead him to follow through on his threat.

The wife now began to worry that she would not find a way back into the mansion before the husband arrived home. Off in the distance she spotted a ferryman. The wife ran over to the man and explained to him there was a madman on the bridge and that she needed passage into the mansion. The ferryman said that he would give her passage across the river for twenty dollars. The wife did not have twenty dollars and explained to the ferryman that if she did not get back into the mansion that she would be severely punished. The ferryman said, "I'm sorry madam, but I have a business to run here. The price for passage is twenty dollars."

Realizing that she was getting nowhere with the ferryman, the wife ran back to her lover's home. She explained the situation of the madman, her husband's approaching return, and the need for twenty dollars to gain passage from the ferryman. After hearing this tale of woe, the lover looked sympathetically at the Wife and simply said, "I'm sorry dear, but I cannot help you."

Flustered more now than before, the Wife ran straight to her best friend's home and told her in tears her tale. She told her friend the entire story of how she had gone to see her lover, how he wouldn't help her, about the madman, the her husband's warning, and the ferryman's requirement of twenty dollars that could get the Wife out of this mess. The friend listened quietly throughout the whole tale and afterwards cleared her throat saying, "I told you to stop messing around with that lover of yours. You have no one to blame for the situation that you are in but yourself. I will not help you."

The wife was now shocked and dismayed. She had no one else to turn to, and did not want to be severely punished for disobeying her husband. Not knowing what else to do, the Wife went back to the bridge. The madman looked as attentive and crazy as before, waiving his dagger with glee. He was still shouting warnings to others near the bridge not to try and cross. In desperation, the Wife ran across the bridge. The madman let out a wild scream on seeing this, chased the Wife down, and stabbed her to death.

(adapted from http://www.americasdebate.com/forums/simple/index.php/t10998.html)

Put in order from 1-6 who you believe is responsible for the wife' death

(1 being most responsible, 6 least):
the husband
the wife
the lover
the madman
the ferryman
the friend

Be ready to explain your decision.

After that, your table will have to come to an agreement on the order. Finally, we'll try to come to a class agreement.

Wednesday, February 13, 2013

Hardware Pop Quiz!

You must be logged into your jwaonline account to access the quiz.

Thursday, February 7, 2013

ITGS - Exam Prep

Here are the questions you can expect on paper 2. They will be based on an article you haven't seen yet.
1. 4 Marks
a. Describe one social/ethical concern related to the IT system in the article.
b. Describe the relationship of one primary stakeholder to the IT system in the article.

2. 6 Marks
a. Describe, step-by-step, how the IT system works.
b. Explain the relationship between the IT system and the social/ethical concern described in Criterion A.

3. 8 Marks
Evaluate the impact of the social/ethical issues on the relevant stakeholders.

4. 8 Marks
Evaluate at least one possible solution that addresses at least one problem identified in Criterion C

Wednesday, February 6, 2013

Hardware Overview

Hey Grade 9s, take a look at the following links to remind yourself of what sort of hardware is inside your computer:

What's most important?

What's inside?



When you're done, answer the following question on your blog:

PART ONE

Make an analogy about computers. An analogy is a way to compare two very different things and show how they are actually similar in certain ways.

Here's an example: Your blood vessels and veins are like the highways of a country. Blood cells are the cars and the heart is the airport.

Think of examples for a computer. For this part, DO NOT use the human body (you'll do that in part two. Post your analogies as a comment below.

This link will help.

What's the CPU?

What's the RAM?

What's the Power Supply?

What's the difference between the different kinds of 'memory'?

PART TWO

Label the following diagram as if the human body is a computer. (You can find your own diagram if you like).



It won't be perfect, but see how many you can fill in.

Brains vs Computers

Computer vs Brain

Who wins??!

http://www.youtube.com/watch?v=TlUK69Wsk6g

Future of Robots

Do you think that Computers will ever 'Catch Up' to the human brain? Do you think they are better than us in some ways already? What do you think the dangers are if computers continue to develop? (Think about movies like I, Robot or Terminator or AI).

Post responses on your blogs. This could be in the form of a paragraph, or a short story that shows what it would be like if computers were advanced enough to interact with humans.

Vote for the SWA Blog Champion!

Grade 9s,

Don’t forget to check out the finalists and

Vote for the Wordsmith blog that you appreciate most.

OUR WORDSMITHS!




Check out these awesome blogs and vote for your favourite below!

Won Jun
Elena
Boris
Annisa
Christy

Hardware Pop Quiz!

You must be logged into your jwaonline account to access the quiz.

Tuesday, February 5, 2013

ITGS Study Guide

All of this is taken from your ITGS Textbook (come to me if you've lost your digital copy).

Required reading!

SL/HL: 11-29. 291-373, Chapter 3 Overviews for each section (ie. 3.1, 3.2, 3.3, 3.4, 3.5...)

SL: 253-258

HL: 253-287

Also, you must read AT LEAST the overview of each section in Chapter 3 (ie. 29, 62, 94, 124, 163, etc)... I say AT LEAST, but it would be a good idea to read as much as you can from each section.

 

Specific terms and concepts you should know (these will be updated throughout the week):

File formats (audio/video/documents/images)
Biometrics
Databases (key fields, relationships, Field Types, etc)
Privacy (How do websites protect users? What policies do they create?)
Information transferring (real-time vs store and forward. KB/s vs Kb/s)
Satellites
Electronic vs manual data collection
What do agencies do with information they collect? (Businesses, governments, hospitals, environmental groups)
Facebook/Twitter/Instagram (privacy? Who own images uploaded?)
School policies (what digital policies should schools enforce?)
PRODUCT DEVELOPMENT LIFE CYCLE (learn it!) Feasibility Studies, Milestones, Initiation
Different types of networks (peer-to-peer, server-client, etc)
ISPs (what do they do?)
Traffic systems (using digital models for prediction, collecting information, who uses it? SMS alerts?)

Hardware (pg 29-93)

- different types of computers

- different types of software/hardware

- Communication methods

- Input/Output devices

Information Systems (pg 253-268)

- Definition

- Examples of Information Systems

- Uses

Virtual Learning Environments (pg 308-321)

- IT and Education

- Authentication

- File formats

- Applications for VLEs

Spreadsheets (pg 228-246)

- Formulae

- Charts

- Macros

- Cells

Sunday, February 3, 2013

Evolution of computers



 

Create a post on your blog that shows how much computers have changed during your lifetime. Remember, you have watched the invention of iPhones, iPads, smartboards, fast wi-fi, etc. What other changes have you witnessed.

Finally, write a paragraph describing what you think the major changes in the next five years will be.