We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
c1C2601/101/0/2021
12 ADDENDUM
SEMESTER 1 Due date: 16 May 2021
ASSIGNMENT 01 (Compulsory) [50]
Unique number: 652668
Study material: Study guide units 1-4
Instructions
Use an HB pencil to answer all the questions on an optical mark-reading sheet on
which your name, address, student number, module code, assignment number and
the unique number of the assignment are all clearly indicated.
Question 1-25: Choose the CORRECT answer from the list of possible answers for
each of the following questions.
1. Which ONE of the following role players provides technical backup, trouble shooting and
computer literacy training?
1. Parents
2. Teachers
3. ICT Coordinator
4. Subject specialist
2. Computer literacy implies that
1. Aperson knows everything about computers
2. Aperson has the knowledge and understanding about computers
3. A person who can work with all software packages
4. Aperson can play games on a computer
13http:/www.unisa.ac.za is an example of:
1, Aweb browser
2. Awebpage
3. AURL
4. AHomepage
In MS Word landscape isa
1. Font style
2. Page orientation
3. Paper size
4. Page layout
A can be described as a unit of teaching and learning in which a
coherent series of teaching and learning Activities are performed to achieve a specific
outcome.
1. Activities
2, Technology-integrated lesson
3. Lesson objective/outcome
4, Teaching strategy
This scanned code typically contains a link to a video, document, contact details or email
address:
Sgr
5
ol
1 QRCode
2 Scan Code
3. Barcode
4 WR Code
1410.
1".
c1C2601/101/0/2021
The process of sending information to your computer is called
1, Upload
2, Download
3. Sending
4, Receiving
— __is a document that provides a preformatted layout for text and
graphics, as well as some content.
1. Wizard
(2. Template
3, Letter
4, Thumbnail
Formulas in MS Excel always begin with...
1 #
2. %
@e
4+
Which ONE of the following acronyms is often used in software licencing?
1. GU
2. WLAN
3. www
® EULA
Which one of the following is NOT an example of social a networking site,
1. Twitter
2. Facebook
(3. Wikipedia
4, Instagram
1512.
13,
14,
15.
In Microsoft PowerPoint, which view will the following icon execute?
ist
4. Normal view
3. Slide sorter view
4, Reading view
Which ONE of the following initiatives (projects) is the first example of e-leaming implementation
in South Africa,
1, The Gauteng online project
2. Intel@Teach Programme
4. The Meraka Institute
Which combination of keys will highlight ALL the content in MS Word from top to bottom?
41. CTRL+H
2. CTRL+Up
3. CTRL+Pg up
4. CTRL +A
The most common type of software theft is.
1. Stealing a CD-ROM
2. Stealing a flash drive (memory stick)
3. Software piracy
4, Identity theft
1616.
7.
18.
19,
20.
1C2601/101/0/2021
A is a process of identifying the content knowledge and skills that you
‘expect the learners to achieve at the end of the lesson.
1. Activities
2. Assessment
3. Lesson objective/outcome
4, Teaching strategy
After selecting your text, use the and commands to move to the next
text to a different location.
1, Copy; Paste
2. Cut; Repeat
3. Copy; Paste Special
4, Cut; Paste:
When a row and a column of a spreadsheet meet, it is called a
1. Cell
2. Address
3. Workbook
4, Page layout
Which ONE of the following is NOT an example of a presentation software?
1. Prezi
2. Google Slides
3) Access:
4, MS PowerPoint
Choose a statement that best describes an application software.
1 Microsoft Office is mainly used to work with numbers.
* ‘Software needed to run electronic to run your electronic device.
3. Microsoft Excel can also be used to edit and format text.
4, Software that can be downloaded to perform a specific task.
1721
22.
23.
24.
26.
A predecessor of a word processor is.
1% ~~ Typewriter
2. Tablet
3. Smartphone
4. Laptop
A theory that describes who is doing what, why and how.
1 Cognitive theory
2. Social cognitive theory
3. Dual coding theory
What is the main function of the button highlighted in red?
st a OCT
1. Refresh:
2. Repeat
3. Undo
4, Rotate
‘Any action that causes harm to your computer is called a
1. Security harm
2. Security damage
(3. Security risk
4. Security crime
Which ONE of the following tools is used to search for information?
1. Web browser
2, Search engine
3, Hyperlink
4. Web site
181C2601/101/0/2021
Questions 26-40: Determine for each of the questions whether the statement is True or False. Mark the
number “4” on the mark-reading sheet to indicate “True” and a “2” to indicate “False”
26. Cost and equity is one of the four intertwined issues that must beg into consideration when
institutions think of implementing ICTs in teaching and learning
27. The activity theory is grounded in social historical theories and draws heavily on Vygotsky's
concept of mediation,
28. _ Aproession plan is a detailed description of the course of instruction that guides a teacher to
provide knowledge to learners. $&
29. In Microsoft Excel the COUNT function is used to calculate a total range of value W
30. Norton is an example of an anti-virus software.
31. In ICT integrs
resources. 9%
32. Digital natives are more fascinated with the use of ICTS in their leaming envionment W
is the teacher's responsi
lity to financially assist, have expertise and provide
33. The integration of ICTs in teaching and learning forces a paradigm shift of teaching and learning,
a shift from a teacher-centred approach to a leamer-centred approach. $&
34. hips is aloo refered to as a protocol, W7
36. Atouchpad is found on a laptop.
36. The intermet and world wide web (WWW) represent networks. 3X
37. __ Inthe activity theory, the object is the person carrying out the activity. 3
38. An LCD monitor is also referred to as a flat panel monitor. 9&
39. _ When you have finished working with a document, and need it in the future, you should close it. 9&
40. The mouse and keyboard are regarded as the most used input devices. W
19Questions 41-50: Study the following images of different devices that could be connected to or form
part of a computer. Identify the correct device and choose the CORRECT answer from the list of
possible answers.
4 42.
a
1. Plotter 1. RAM
(2. Data Projector 2, CPU
B |
=
1 Scanner 1. LED Monitor
2 Printer 2. CRT Monitor
7 : ES
1. Keyboard: 1. Laptop
2. Touchpad 2. Desktop
201C2601/101/0/2021
1. Speakers: 1, Flash drive
2. Headphones 2. Disk drive
49. = SS
Digital Camera
Web camera 2. External Disk Drive
GRAND TOTAL: [50]
21