Page 995 - SUBSEC October 2017_Neat
P. 995

SECTION 3: SOCIAL AND ECONOMIC IMPACT OF INFORMATION AND COMMUNICATIONS
                           TECHNOLOGY (ICT) (cont’d)


               Suggested Teaching and Learning Activities

               To facilitate students’ attainment of the objectives of this Section, teachers/facilitators are encouraged
               to engage students in the teaching and learning activities below.

               1.      Using a screenshot of a student’s offensive comment about a teacher/peer on social media as
                       stimulus, engage students in a discussion on cyberbullying.

               2.      Allow students to observe short clips about various forms of computer systems misuse (for
                       example, hacking and identity theft) then engage in discussions on cybersecurity.

               3.      Encourage students to write a report to be placed on the school’s notice board to describe the
                       threats associated with each specific vulnerability discussed in class.

               4.      Have  students  classify  countermeasures  into  appropriate  categories:  physical  or  software
                       related. Have students derive definitions of physical and software counter measures, based on
                       classifications.

               5.      Engage students in a poster-making competition in which they illustrate good personal security
                       practices.

               6.      Engage students in a web quest where they explore different scenarios that will culminate in
                       obtaining authentic and reliable online sources.

               7.      Engage  students  in  a  debate  where  they  explore  the  implications  of  companies  utilising
                       automated kiosks to transact business. Have students discuss the effects of job loss versus
                       productivity gained in skilled and unskilled categories.

               8.      Engage students in a project where they visit/research various businesses to determine the
                       extent to which technology is being used in different positions.

               9.      Have students conduct research on cybersecurity and then present their information in a panel
                       discussion  format.  (Students  should  be  able  to  pose  questions  to  the  panel  members).

















                                  CXC 30/G/SYLL 17           18
   990   991   992   993   994   995   996   997   998   999   1000