BS 8 Computing Notes Term 3
BS 8 Computing Notes Term 3
Main (35mins)
Have learners mention some examples of social media sites they know.
Guide learners to categorize social media sites into Photo and Video
sharing sites.
Discuss the use of Photo sharing sites such as Instagram, Snapchat, Pinterest
etc.
There are several popular social media platforms that focus on photo
sharing. Here are some notable examples:
3. Flickr: Flickr is a photo-centric platform where users can upload, share, and organize
their photos. It offers various features like privacy settings, tagging, and the ability to join
groups and engage in discussions around photography.
7. Snapchat: A platform known for its disappearing photo and video messages,
augmented reality filters, and Stories feature that allows users to share content for 24
hours.
Assessment
1. Which social media platform is primarily dedicated to sharing photos and
videos?
2. What is the name of the platform known for its disappearing photo and
video messages?
3. Which platform allows users to create themed boards and save or
upload images to those boards?
4. Name a photo-centric platform where photographers can showcase their
work and connect with other enthusiasts.
5. Which platform is known for offering a vast collection of high-quality,
free-to-use photos?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Have learners mention some examples of social media sites they know.
Guide learners to categorize social media sites into Photo and Video
sharing sites.
Discuss the use of Video sharing sites such as YouTube, Facebook Live,
Periscope, Vimeo etc.
2. TikTok: TikTok is a short-form video platform where users can create and
share 15 to 60-second videos. It gained significant popularity for its viral dance
challenges, lip-syncing, and creative content. TikTok's algorithm suggests
personalized videos based on user preferences.
4. Snapchat: Snapchat is known for its disappearing photo and video messaging,
but it has evolved to include features like Snapchat Stories and Discover. Users
can capture and share videos with friends, and the content disappears after a set
period.
Assessment
1. What is the largest video-sharing platform in the world?
2. Which platform gained popularity for its short-form videos and viral
dance challenges?
3. Which social media platform primarily focuses on photo-sharing but also
supports video content?
4. Which platform allows users to share disappearing photo and video
messages?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Discuss the threats that can prevent information from reaching its
destination.
Network Failures: Network failures can occur due to hardware malfunctions, software
glitches, or misconfigurations. These failures can disrupt the transmission of data,
causing delays or complete loss of connectivity.
Routing Problems: Routing problems occur when there are errors or misconfigurations
in the routing infrastructure of a network. Incorrect routing information can cause
data to be sent on incorrect paths or be lost in transit, preventing it from reaching the
intended destination.
Packet Loss: Packet loss refers to the failure of network packets to reach their
destination. It can happen due to network congestion, hardware issues, or errors in
transmission. If a significant number of packets are lost, the information may not
reach its destination correctly.
Hardware Failures: Hardware failures, such as hard drive crashes, memory errors,
power surges, or faulty components, can corrupt data stored on the affected devices.
Software Glitches and Bugs: Software glitches, bugs, or programming errors can
introduce flaws into applications or systems, leading to data corruption. For instance,
a programming error in a data storage or retrieval function can result in data being
written or read incorrectly, causing corruption.
Assessment
1. What are two common causes of data corruption?
2. How can organizations mitigate the threat of data corruption?
3. How can network failures and connectivity issues affect the transmission of data
and prevent it from reaching its intended destination?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
1. Interruption:
Interruption refers to the disruption or denial of access to data and systems. It
involves the intentional or unintentional actions that result in the unavailability of
data or system resources. Examples include:
2. Interception:
Interception involves unauthorized access to data during transmission. It occurs
when an attacker intercepts or eavesdrops on communication channels to capture
sensitive information. Examples include:
3. Modification:
Modification refers to unauthorized alteration or tampering of data. Attackers aim
to modify data to manipulate its integrity, accuracy, or trustworthiness. Examples
include:
4. Fabrication:
Fabrication involves the creation or insertion of false or counterfeit data into a
system or network. It refers to the unauthorized addition of data that appears
legitimate, but is, in fact, fraudulent. Examples include:
Assessment
1. What is the difference between interception and modification as data threats?
2. How does interruption pose a risk to data availability?
3. Provide an example of a real-world scenario where fabrication of data can lead
to significant consequences.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Define each threat briefly and explain their significance in safeguarding data.
Focus on authorization as the first threat and explain its role in controlling
access to data and resources.
Discuss the importance of strong passwords and the risks associated with
weak or shared passwords.
Introduce encryption as a method of protecting data by converting it into a
secure and unreadable format.
Divide learners into small groups and provide them with handouts or
worksheets related to information security.
Assessment
1. What are the four main threats in information security?
2. Explain what authorization means in the context of information security.
3. Give an example of a situation where authorization is important.
4. What is authentication and why is it important in protecting data?
5. Name two methods of authentication mentioned in the lesson.
6. What is the purpose of encryption in information security?
7. Explain the difference between encryption and decryption.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Introduce the concept of threats to data security and explain that these are
potential risks or vulnerabilities that can lead to data breaches.
Divide learners into small groups and provide them with handouts or
worksheets related to data security.
Have groups discuss and identify examples of each threat and brainstorm
preventive measures for each one.
Assessment
1. What is data security, and why is it important?
2. Name two common threats to data security.
3. Explain what unauthorized access means and how it can be prevented.
4. What is malware, and how can its impact be minimized?
5. Describe one method of preventing malware infections.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
1. Keyword Search: This is the most basic and widely used search technique. It involves
entering relevant keywords or phrases into a search engine to find web pages or
documents containing those keywords. Keyword search allows users to quickly locate
information on specific topics, but it may generate a large number of irrelevant results.
2. Boolean Operators: Boolean operators (AND, OR, NOT) are used to refine search
queries and specify the relationships between keywords. By combining keywords with these
operators, users can create more complex search queries and narrow down or broaden
their search results. Boolean operators enable users to specify precise search criteria and
retrieve more relevant information.
3. Phrase Search: By enclosing search terms within quotation marks, users can perform a
phrase search. This technique ensures that the search results contain the exact phrase as
entered, rather than individual words scattered across the text. It is particularly useful
when searching for specific quotes, titles, or unique phrases.
4. Advanced Search Filters: Many search engines offer advanced search options and filters
to refine search results further. These filters allow users to specify criteria such as file type,
date range, language, location, and more. By utilizing these filters, users can narrow down
their search results to obtain more precise and targeted information.
5. Truncation and Wildcard Characters: Truncation involves using a symbol (usually an
asterisk "*") to search for variations of a word. For example, entering "run*" will retrieve
results containing "run," "running," "runner," etc. Wildcard characters are similar but
represent a single character within a word. These techniques are helpful when searching
for terms with multiple forms or when unsure about the exact spelling.
6. Search Operators: Many search engines support specific operators that allow users to
refine their search results further. For instance, the site operator limits the search to a
specific website or domain, while the filetype operator restricts the results to a particular
file type (e.g., PDF, DOCX). These operators enable users to target their search within
specific contexts or types of content.
7. Filtering and Sorting: Once search results are obtained, filtering and sorting options help
users organize and prioritize the information. Common filtering options include relevance,
date, popularity, and source credibility. These features allow users to quickly identify the
most relevant and up-to-date information based on their specific needs.
Ask each group to choose a scenario and brainstorm search queries using
one or more of the effective search techniques discussed.
Assessment
1. What are some effective search techniques discussed in the lesson for
improving web searches?
2. How can using search phrases with exact spelling or enclosing them in
quotation marks help refine search results?
3. What are Boolean operators and how can they be used to refine search
queries?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Ask each group to choose a scenario and brainstorm search queries using
one or more of the effective search techniques discussed.
Assessment
1. What are some examples of advanced search options or filters available
on search engines?
2. Describe a scenario where you would use the AND operator in a search
query.
3. How can critically evaluating the information found during web searches
contribute to effective research?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Highlight that different search engines may have different algorithms and
databases, resulting in varying search results.
Main (35mins)
Explain that learners will be exploring and comparing these search engines
to understand their strengths and weaknesses.
Explain that each group will conduct a search using their chosen search
engine and explore the search results.
Ask each group to share their experiences and observations about their
chosen search engine.
Assessment
1. Name three popular search engines.
2. Why might different search engines yield different search results?
3. What are some factors to consider when exploring and comparing
search engines?
4. How can using multiple search engines enhance your web search
experience?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Instruct the learners to perform the same search query on two or three
different search engines individually.
Encourage them to compare the search results and analyze the differences
in relevance, order, and types of results displayed.
Ask learners to note any patterns or trends they observe across the search
engines.
Guide a class discussion to share and discuss the findings, focusing on the
factors that may have influenced the differences in search results.
Assessment
1. What are some possible advantages and disadvantages of using different
search engines?
2. Explain the term "search accuracy" in the context of search engines.
3. Why is it important to analyze and evaluate search results from
different search engines?
4. How can understanding the strengths and weaknesses of different
search engines improve your search skills?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Provide a simple problem or task to solve (e.g., making a peanut butter and
jelly sandwich).
Demonstrate how variables can store and manipulate data, and how control
structures help control the flow of a program.
Assessment
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Assessment
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Introduce the concept of assignment statements and how they are used to
store the result of an expression in a variable.
Assessment
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
When a computer processes input data to print out an answer, it follows a series of steps
to evaluate expressions and compute the result. Here's a high-level overview of how a
computer would process the expression (4 + 6 * 2 - 8) / 3 and print out the answer:
1. Tokenization: The input expression is broken down into individual tokens or symbols,
such as numbers, operators, and parentheses. In this case, the tokens are: (, 4, +, 6, *, 2,
-, 8, ), /, and 3.
2. Parsing: The tokens are organized into a meaningful structure, typically using a parse
tree or an abstract syntax tree (AST). The parse tree represents the hierarchical
relationship between the tokens and their respective operators. For our expression, the
parse tree would reflect the order of operations according to the operator precedence.
3. Evaluation: Starting from the root of the parse tree, the computer traverses the tree
and evaluates each node based on the corresponding operator. The evaluation follows the
operator precedence order (BODMAS) to ensure the correct computation. In our example,
the computer would evaluate the multiplication first (6 * 2 = 12), then the addition (4 +
12 = 16), followed by the subtraction (16 - 8 = 8), and finally the division (8 / 3 =
2.6666...).
4. Printing the result: Once the evaluation is complete, the computer obtains the final
result (2.6666...) and converts it into a human-readable format, such as a string. The
result can then be printed on the screen or stored in a variable for further use.
Ask learners to explain their approaches and clarify any areas of confusion.
Analyze any common errors made and provide guidance on how to correct
them.
Assessment
1. What does the acronym BODMAS stand for, and what does it represent
in arithmetic computations?
2. Provide an example of an arithmetic expression that involves brackets,
exponents, division, multiplication, addition, and subtraction. Compute the
expression using the BODMAS rule.
3. Why is it important to follow the correct order of operations when
computing arithmetic expressions?
4. What happens when the BODMAS rule is not followed in computing an
expression? Provide an example.
5. Explain the concept of error analysis when computing expressions using
the BODMAS rule.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Guide the class through the creation of a simple program that incorporates
sequence, selection, and iteration. Work on a program together as a class
where learners can contribute.
Display the code on the smart board, pointing out and explaining each part.
Assign a task where learners have to modify the program created in class.
They should change the condition in the selection statement and the limit in
the iteration statement.
Allow learners to work individually and circulate in the class to provide help
where needed.
Assessment
What does a sequence in programming refer to?
How does the selection mechanism work in programming?
Write a simple program that demonstrates the use of a selection statement.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Discuss how variables and constants store data but are different in terms of
whether their values can be changed.
Explain what variables are, how they can be assigned values, and how their
values can change throughout the program.
Discuss what constants are, how they differ from variables, and when it's
beneficial to use them.
Display the code on the smart board, pointing out and explaining each part.
Learners create their own programs, where they define variables and
constants, adhering to proper naming conventions.
Allow learners to work individually and circulate in the class to provide help
where needed.
Assessment
What is the difference between a variable and a constant in programming?
When would you use a constant instead of a variable in your program?
What is a naming convention? Why is it important?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Explain how they help the robot move, grab, turn around, or lift objects.
Assessment
1. What is the primary function of the controller in a robot?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Main (35mins)
Ask them to identify which sensor might be used in each device and explain
its function.
Assessment
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Divide the learners into small groups and assign each group one of the
three categories: humans, animals, or machines.
After research, each group presents their findings to the class, highlighting
similarities and differences in intelligence across the three categories.
Guide the discussion by asking questions such as: What are the strengths of
human intelligence? What are the limitations of machine intelligence? How
do animals process information differently from machines and humans?
Assessment
1. What is intelligence?
2. How can we define intelligence in humans?
3. List one major similarity and one major difference between human and
machine intelligence.
4. How does animal intelligence differ from human intelligence in terms of
problem-solving?
5. Can machines ever truly possess emotions, or will they always mimic
them? Explain your answer.
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.
Introduce the terms "strong AI" and "weak AI" and ask if anyone knows the
difference.
Explain the difference between strong AI (AGI) and weak AI (ANI). Strong AI
possesses human-like general intelligence, while weak AI performs specific tasks
without consciousness or understanding.
Engage learners in a class debate: "Will we ever achieve strong AI?" Divide the class
into two groups: one arguing for the possibility and one arguing against.
Explain how mixed reality (MR) combines physical and digital elements to create
immersive experiences.
Divide learners into small groups and provide them with a specific scenario (e.g.,
designing a holographic interactive learning tool).
In their groups, learners brainstorm and discuss potential benefits and challenges of
using holograms to enhance intelligence and learning.
Assessment
1. Define strong AI.
2. What is weak AI?
3. List a primary difference between strong AI and weak AI.
4. Why might some experts argue that strong AI is a distant or
unreachable goal?
5. Do you believe that machines with strong AI would have rights similar
to humans? Why or why not?
Reflection (10mins)
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.