Uploaded by rbudripersadh

aim-121-2021-study-guide

advertisement
lOMoARcPSD|18615900
AIM 121 2021 Study Guide
Academic information management (University of Pretoria)
Studocu is not sponsored or endorsed by any college or university
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
lOMoARcPSD|18615900
Study Guide
School of IT
Academic Information Management
AIM 121 S2
2021
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
lOMoARcPSD|18615900
Table of Contents
1
2
Introduction ..............................................................................................................1
1.1
Welcome ...................................................................................................................... 1
1.2
Educational approach .................................................................................................... 1
1.3
Responsibilities of the student....................................................................................... 1
Administrative information ........................................................................................1
2.1
Contact details .............................................................................................................. 2
2.2
Timetable...................................................................................................................... 2
2.3
Study material and purchases ........................................................................................ 2
2.4
Programme rules, requirements, and guidelines ............................................................ 2
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
2.4.7
2.5
3
5
Grievance procedures.................................................................................................... 7
Module information...................................................................................................8
3.1
Purpose of the module .................................................................................................. 8
3.2
Module outcomes ......................................................................................................... 8
3.3
Articulation with other modules in the programme ........................................................ 8
3.4
Module structure .......................................................................................................... 8
3.5
Learning presumed to be in place .................................................................................. 9
3.6
Credits and notional hours............................................................................................. 9
3.7
Units ............................................................................................................................. 9
3.7.1
3.7.2
4
General conduct .................................................................................................................................2
Computer-Based Tests (CBT)..............................................................................................................4
Information / Data Policy ...................................................................................................................5
Software Policy ...................................................................................................................................6
Hardware policy .................................................................................................................................6
Fault reporting ...................................................................................................................................7
Warning system..................................................................................................................................7
Information Literacy ...........................................................................................................................9
Computer literacy.............................................................................................................................12
Assessment..............................................................................................................14
4.1
Assessment schedule................................................................................................... 14
4.2
Assessment criteria ..................................................................................................... 14
4.3
Assessment policy ....................................................................................................... 14
4.4
Plagiarism ................................................................................................................... 15
Support services ......................................................................................................15
5.1
Safety in the evening and emergencies ........................................................................ 15
5.2
E-learning support ....................................................................................................... 16
5.3
Other support services: ............................................................................................... 16
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
lOMoARcPSD|18615900
© 2021 University of Pretoria
1 Introduction
1.1 Welcome
The Academic Information Management (AIM) course acts as a roadmap to your academic journey.
The Computer Literacy section of this course will teach you how to drive your
vehicle on this journey. Most academic activities require using a computer or
other technological devices and AIM will teach you how to use computers that
act as your vehicle to academic success. This course's Information Literacy
section acts as a roadmap or GPS (Global Positioning System) to your academic
journey. This course will show you how to use information as you journey through
your degree. You will learn the rules you need to adhere to during your academic
journey; in other words, you will learn how to use information ethically. You will
learn to understand the signs of your journey, as you will learn how to find,
evaluate, and use information. You will also learn how to use your vehicle and GPS in future journeys
as the AIM course sets the foundation for lifelong learning as it allows the students to work on a
variety of platforms to apply your knowledge and skills.
This course is an undergraduate preparatory module (NQF level 5) that equips
students with the necessary skills to achieve academic success and become
efficient employees in the 21st century workplace. The course focuses on finding,
evaluating, processing, managing, and presenting information resources for
academic purposes using appropriate technology (Windows 10 and MS Office 2019). Students will
learn to apply effective search strategies in different technological environments, demonstrate the
ethical and fair use of information resources and integrate 21st‐century communications into
academic information management.
1.2 Educational approach
The whole brain teaching approach will be followed. Active student-centred learning
will be used during the semester. Online resources (videos and exercises) are
available on the AIM clickUP module. These resources can be used to prepare for
classes or as post-class activities to revise the content. Additionally, lecturers can be
consulted during their allocated consultation hours at the AIM labs. The combination
of online classes and face-to-face consultation ensures that a blended learning approach will be used.
The weekly class and assessment schedule available on clickUP will help you prepare for classes and
submit assessments before the due date and time.
1.3 Responsibilities of the student
Attendance of all lectures is compulsory. Students can prepare for classes by
watching the videos on clickUP. This will ensure that the students benefit from the
classes as there will be opportunities to interact with the lecturer, tutor, and peers
during the classes. This will ensure that the students can engage with the content
and build on prior knowledge. The exercises and activities on clickUP can be used after
classes to revise the content and test content mastery. Students are responsible to view the updated
schedule available on their AIM clickUP module.
2 Administrative information
All information about this course is available on the AIM clickUP module. The weekly class and
assessment schedules are available on clickUP. Topic-specific discussion boards and announcements
will be used to ensure that all relevant information is communicated to the students throughout the
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
1
lOMoARcPSD|18615900
© 2021 University of Pretoria
semester. The lecturers’ contact details are available on clickUP under “Who’s my
lecturer?” Please contact the lecturer who is responsible for communicating with you
according to your surname.
2.1 Contact details
Name
Module
coordinator
Departmental
administrator
Administration
support
Ms
Pariksha
Singh
Ms Christa van
Zyl
Ms Anna Ngale
AIM IT
Support
AIM IT Helpdesk
Building
and room
number
Telephone
number
Email address
AIM Labs
012 420 5348
pariksha.singh@up.ac.za
AIM Labs
012 420 5349
christa.vanzyl@up.ac.za
012 420 6765
anna.ngale@up.ac.za
012 420 5350
itlabs@up.ac.za
AIM Labs
Helpdesk
AIM Labs
IT
Helpdesk
Please contact your Faculty Student Advisor as they can advise you on goal setting, adjustment to
university life, time management, study methods, stress management and career exploration. Book
an individual consultation or attend a workshop, for other support services see Section 5.
2.2 Timetable
The timetable for this module will be available on clickUP. Please ensure that you can attend 1 session
per week. Each session is 2 hours long.
2.3 Study material and purchases
The cost of the module material is included in the course fee. The compulsory reading material
through clickUP include:
• Electronic of Navigating Information Literacy: 6th edition;
• An electronic copy of CUSTOM Navigating Office 2019;
Supplementary resources available through clickUP include:
• Access to SAM self‐training and practice projects online.
• Videos and PowerPoint presentations are accompanying above mentioned books.
2.4 Programme rules, requirements, and guidelines
Students will adhere to the following rules and regulations extracted from the University of Pretoria’s code of conduct for
users of the student computing services environment (University of Pretoria, 2013):
2.4.1 General conduct
2.4.1.1 Who are the users?
“Users” are all students registered at the University of Pretoria (UP) and include part-time, visiting, and freelance students
with access to the University’s e-mail, Internet access and Information Technology Services (ITS) network.
2.4.1.2 Access and Access Restrictions
A valid, stamped student card is needed to access all Student Computing (SC) environments, including the Computer Based
Test (CBT) environments. Suppose a student does not have their student cars with them. In that case, they may use their
proof of registration, which can be obtained from the Client Service Centre (CSC) on campus by presenting a valid
identification, e.g. identity (ID) book or driver’s license.
Student Computing (SC) staff may deny access to the SC environment if a valid and stamped student card or alternative is
not provided or if the student card's bearer is not a registered user. SC staff may also perform spot checks in the computer
laboratories to ensure that only registered students use the computer laboratories' equipment.
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
2
lOMoARcPSD|18615900
© 2021 University of Pretoria
As with all of UP resources, the use of the network system is not a right, but a privilege granted for the fulfilment of users’
duties and obligations to the UP. The following stipulations apply:
•
all Internet access from the UP network system will be through authorised Internet gateways;
•
any access to the Internet from official UP premises, facilities or equipment using services other than the
authorised Internet gateways is strictly prohibited;
•
all users of the system will be authenticated
•
the use of passwords is mandatory and users shall revise and amend their passwords from time to time, as
stipulated in the Network Security Policy;
•
passwords or accounts may not be shared unless ITS has granted an exemption – it is users’ responsibility to
protect their passwords and private accounts from unauthorised access;
•
anyone found guilty of using some else’s username, and password will be subject to disciplinary action;
•
anyone found guilty of sharing their username and password with others will be subject to disciplinary action;
•
shared resources, for example, computer lab facilities, network bandwidth, printers, etc. must be utilised as
economically as possible, and teaching-related activities enjoy priority;
•
any attempts to circumvent system security or attempts to gain unauthorised access to local or network
resources are forbidden;
•
all users must log off their workstations when they are finished using the system;
•
authorised access to and use of databases include:
o communication with foreign researchers and educators in connection with research or instruction;
o communication and exchange for professional development, to maintain the currency, or to debate
issues in a field or sub-field of knowledge and
o the use for disciplinary-society, university-association, government-advisory, or standard activities to
the user’s research and instructional activities.
2.4.1.3 Acceptable use of Student Computing (SC) Environment
Computing resources are extremely limited and some computer laboratories have been reserved for the
use of official practical sessions. To be fair to all users it is necessary to restrict the use of these resources
to course work. SC staff, course lecturers or course assistants may ask any student involved with noncourse work to vacate the computer laboratories when there is an official practical in session, or in cases
where there are users in need of the resources for course related work.
It is expected of the SC environment users to report any violations of this Code of Conduct to the lab
administrator/manager. Any deliberate attempt to conceal contraventions will be viewed as an infringement of the Code of
Conduct.
2.4.1.4 Non-Acceptable and punishable use
As mentioned previously, the SC environment's computing systems are the property of the UP. Access to these systems is a
privilege and any actions or content accessed that violates the policies contained within this document will result in
disciplinary measures being instituted. These actions may include the revoking of this privilege and associated investigatory
and disciplinary actions against the offender following the rules and regulations of UP.
These actions and content include, but are not limited to, the following:
•
installation or playing of games;
•
browsing the Internet for any purpose other than for academic reasons;
•
downloading of any non-academic material;
•
littering in and around the lab environment;
•
disrupting the orderly operation of the SC environment by any means;
•
refusal to vacate the lab five minutes before a scheduled practical commences;
•
the using of the computer systems in the SC for direct commercial gain;
•
using of equipment, systems, services and software on the Institute’s networks are primarily for academic and
administrative purposes. Common sense and good judgement should guide personal and private usage;
•
modifying, adapting or changing the UP network system or altering any hardware or software configurations of
UP computing equipment or resources;
•
connecting any unauthorised computer equipment including, but not limited to, laptop/notebook computers and
modems, to the UP network system, unless prior written permission is obtained from the Deputy Director:
Infrastructure;
•
sharing login usernames with or disclosing passwords to any third person(s);
•
modifying an e-mail message and forwarding or replying with in addition to that without noting the changes (i.e.,
deletions, removal of recipients, modification of content etc.);
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
3
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
fabricating a message and/or sender of a message;
bypassing the security mechanisms of the mail system or any other secure web site or network (e.g. creating
bogus accounts);
modifying the internal mail transport mechanism to forge a routing path that a message takes through the
Internet;
receiving, storing, downloading, printing, distributing, sending or accessing illegal content or undesirable nonacademic content;
participating in e-mail “chain letters” or similar activities;
downloading, receiving and/or installing software applications not approved by ITS;
knowingly burdening the UP network with non-academic data (e.g. forwarding, downloading or accessing large
video clips or graphics to or from a distribution list or file-sharing server);
using automatic forwarding of e-mails (“Auto Rules”) to any person without such person’s consent;
creating, sending or forwarding of unsolicited mail (spam);
the creating, sending or forwarding of marketing information about commercial and/or non-academic issues;
sending or forwarding messages and attachments that are infected with malicious codes such as viruses; using
disks that may be infected with malicious codes;
accessing and using Internet relay chat if such actions burden the UP systems or prevent other users from using
them;
performing any non-academic actions that knowingly prevent other users from using e-mail or Internet access;
taking any of those steps or action criminalised and detailed in Chapter XIII of the Electronic Communications and
Transactions Act 25 of 2002 (ECT), including but not limited to, hacking or developing, downloading and using any
technology that may circumvent ITS security measures (see sections 85 – 89);
undertaking any destructive and disruptive practices either via e-mail or the Internet;
indiscriminating storage and/or forwarding of e-mail, files, web sites and attachments for which permission has
not been obtained from the originator or copyright holder;
doing anything or acting in a manner that could reasonably be expected to cause directly or indirectly excessive
strain on any computing facilities, or unwarranted or unsolicited interference with others;
sending, replying to or forwarding e-mail messages or other electronic communications which hide the identity
of the sender or represents the sender as someone else;
users of the UP electronic mail systems who obtain access to materials of other organisations may not copy,
modify or forward copyrighted materials, except under the specific copyright terms and conditions;
using information, e-mail, files, downloads or data to commit fraud or any other criminal offence(s) and
the copying, forwarding and/or modification of copyrighted materials.
2.4.1.5 Pornography
The surfing, downloading, viewing and storage of pornographic material via any means in the SC environment, is strictly
prohibited.
An offender will not be issued a written warning as stipulated in the warning system section (section 8), but a UP disciplinary
action will follow.
2.4.1.6 Eating, Drinking and Smoking
Eating, drinking and smoking in the computer laboratories are prohibited.
If students do not adhere to the rules laid out in the Code of Conduct, a written warning will be issued as stipulated in the
warning system section (section 8).
2.4.2 Computer-Based Tests (CBT)
The following rules apply to all students that makes use of the CBT environment:
•
in order to be allowed entry into the lab, students have to display their (valid) student cards;
•
students may also present proof of registration together with either an ID document or driver’s
license;
•
the staff on duty will regulate seating in the CBT environment – this procedure has been
approved by the majority of lecturers;
•
test slips need to be completed indicating the date and the starting time of the particular session;
•
student cards should be placed next to keyboards for the duration of the CBT;
•
students should raise their hands if they require assistance – assistance will be provided as soon as possible;
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
4
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
•
•
•
•
•
•
students should be on time for their test session. In the event of a student being more than 15 minutes late for
their test, the student will not be allowed to write the test or exam;
no eating or drinking will be allowed in the CBT environment;
no disruptive behaviour will be tolerated. It is every student’s right to be able to write a test or exam without
interference. Students who exhibit disruptive behaviour will be asked to leave immediately;
cellular phones are not allowed under any circumstances whatsoever. Examination conditions apply;
cellular phones may not be used as an alternative of clocks or calculators and must be switched off;
scrap paper will be provided on request – the back of the test slips is specifically for use in hand calculations;
students are requested to push in their chairs when they leave the lab – it saves time in preparing the lab for the
following session;
please bear in mind that the waiting area outside the lab is adjacent to computer laboratories used daily for
lectures. Do not make such a noise as to interfere with any lecture or test.
2.4.3 Information / Data Policy
The data and programs stored in your user account is considered as your private property. Through the policies set forth in
this document, the University endeavours to ensure user data and programs' privacy. However, an account in the SC is
viewed as a privilege to students and not a right, irrespective of the rights to privacy as provided by the constitution.
Therefore, if an action on the user’s account violates any of the provisions in this document, the user violates their privileges,
and disciplinary action will be taken against such a user. In the course of their duties, SC staff may need to bypass user
protection mechanisms to access user files or jobs, either to trace a system problem, monitor possible violations of SC
policies, or make official and authorised data backups. If violations of the provisions in this document are suspected, user
accounts may be suspended by LAN (Local Area Network) administrators and disciplinary actions are initiated.
2.4.3.1 Copyright
The Internet makes it very easy to publish material. Data included in electronic documents posted on
bulletin boards, newsgroups and the WWW or made available by file transfers are considered published
material and therefore protected. Students who use copyrighted material without the necessary
permission risk being exposed to extreme financial civil claims as well as criminal prosecution. The
definition of student misconduct also explicitly includes the violation of copyright and the University will
ensure that appropriate measures are enforced in cases where SC users violate copyright.
For more information on copyright, refer to http://www.ais.up.ac.za/copyright/index.htm
2.4.3.2 Plagiarism
Plagiarism is committed when you present another person’s ideas – published or unpublished – as if they were your own.
Somebody else’s ideas may be contained in writing, e.g. co-students’ projects, visual text, e.g. books, multimedia products,
e.g. websites, music, e.g. CDs (Compact Disks) and spoken text, e.g. speeches.
Plagiarism is a serious offence. If you are found guilty of plagiarism, you may be suspended from the University, criminally
charged, or a civil claim may be brought against you.
Refer to http://upetd.up.ac.za/authors/create/plagiarism/definition.htm
2.4.3.3 The World Wide Web
All registered students will receive credit for internet use. This will be provided at no cost. For more information, go to
http://cahce1.up.ac.za/.
2.4.3.4 E-mail
•
•
•
•
•
•
•
•
as a registered student, you have a student e-mail address to receive and send electronic mail. Chain letters, junk
mail or other unwanted e-mails cause problems, especially delays to the transmission of academically related
material. Users must not pass on such mail to any other e-mail addresses;
virus infected files may not be intentionally forwarded;
offensive mail may not be transmitted to any other e-mail address;
you may not intercept e-mail intended for any other reason;
mail forgery: No e-mail that disguises or falsifies the sender of mail is allowed. Forging an email by interfering with the contents of the original message is not permitted.
Masquerading as another user is forbidden;
users shall use e-mail and Internet access primarily for academic and administrative purposes. Private and
personal use, in moderation, will be tolerated, subject to the rules detailed in this policy;
e-mail has the same status as formal correspondence and should be treated with caution;
users must clearly indicate when an e-mail message is confidential by marking such e-mail message with a
confidentiality sign;
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
5
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
•
•
•
•
users are responsible for the content of e-mail messages and may never forwards any e-mail message with a
confidentiality sign;
UP has the right to limit the size of incoming and outgoing e-mail messages and attachments, downloads and
other files and may block and/or delete e-mail messages, downloads, attachments and other files to prevent
overloading of the electronic mail systems resources;
virus warnings or other errors resulting from incoming e-mail of file downloads
https://www1.up.ac.za/cs/groups/public/@public/documents/document/mdaw/mda0/~edisp/004167.pdf must
be reported to the Student Computing Helpdesk immediately at (012) 420-3837 or studenthelp@it.up.ac.za;
all outgoing electronic communications must have the UP standard disclaimer at the end of the message. This
disclaimer may not be removed or tampered with by users;
users must check e-mail recipients before sending, forwarding, or replying to messages. When distribution lists
are used, the sender should consider whether or not each group member really needs, or really should, receive
the e-mail and
the subject field of an e-mail message should relate directly to the contents or purpose of the message.
2.4.3.5 User working space and confidentiality
Each user is allocated a limited amount of working space of 50 MB on system hard drives. It is the user's responsibility to
manage their space to ensure that space is available to complete assignments. If space limits are exceed for longer than a
defined grace period, you will not be able to log into your account.
User data is considered private, and the privacy thereof is protected by the provisions in this document. Any attempt to
access or alter data that is not your own, unless specifically instructed to do so through a formal assignment, is a violation.
You may not store any offensive material on your account or any other system storage space.
2.4.3.6 Printing
The SC services thousands of users, all whom will make use of printing facilities. To be fair, and to reduce the
network traffic, large print jobs should not be submitted during peak times. If in doubt, ask an assistant or
administrator if it is convenient to submit your print job. Systems may be implemented to give large print jobs
a low priority.
2.4.4 Software Policy
2.4.4.1 Copying of software
All software installed on the computer systems is licensed and/or copyrighted to UP. Modifying, adapting or changing the
UP network system, or altering any hardware or software configurations of UP computing equipment or resources is
forbidden and legal actions may be taken against offenders. Users may copy shareware and/or freeware software from public
domain directories.
2.4.4.2 Installing software
Only lab administrators, their assistants and other personnel responsible for maintaining software are allowed to install
software on computer systems. Users are not allowed to install any software on computer systems – this includes user’s data
directories or public-access directories.
2.4.4.3 Altering software
Any attempt to alter, damage or destroy software and any other files installed on computer systems is strictly forbidden.
2.4.4.4 Computer set-up
Any attempt to alter the boot sequence and/or operating system loader is forbidden.
2.4.4.5 Viruses
Users must take care not to use virus infected disks on computer systems or to copy or store any virus infected file on any
computer system.
2.4.4.6 Dual-boot operating systems
Some of the computers in the SC environment have dual operating systems installed. For most of these operating systems,
the file systems become corrupt if machines are switched off or rebooted without proper shutdown procedures. Users may
not shutdown any piece of equipment without the prior approval of lab personnel. Users may manually reboot PC’s (personal
computers) that are ‘frozen’ only if there is no other possible course of action recovering the PC’s stability
2.4.5 Hardware policy
2.4.5.1 Damaging hardware
Any malicious attempt to damage any hardware system or component is a serious offence and will be dealt with as such.
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
6
lOMoARcPSD|18615900
© 2021 University of Pretoria
2.4.5.2 Tampering with hardware
•
•
•
students are not allowed to open any of the computer hardware cases;
students are not allowed to attempt to fix errors and
any attempt to alter the set-up of any hardware system is forbidden.
2.4.5.3 Removing hardware
You are not allowed to remove any hardware system or component from any lab. Such action will be considered theft and
will be treated as such.
2.4.6 Fault reporting
Users of the SC environment are politely requested to report any hardware or software errors to the lab
administrator/manager or relevant personnel.
2.4.7 Warning system
The personnel of the SC environment do not, in any way, wish to impede the academic progress of any student and the onus
for acceptable behaviour and continued use of the SC environment rests solely with the individual user.
The procedure that will be followed when a student is in breach of this code of conduct is as follows: In the case of a serious
offence, e.g., the infringement of copyright, plagiarism, theft, hacking and the viewing and/or distributing of pornography,
the matter will be referred to directly to the Disciplinary Committee of students. The user account will also be disabled, and
the user will not be able to use the SC facilities until a formal written letter, signed by the relevant subject
head or the head of the department is received.
In the case of less serious offences, e.g. eating and drinking in the lab, smoking in the lab, playing games or
swapping of cards, e.g. passing student cards from one person to another to get access to the computer
laboratories, the following will be applicable.
2.4.7.1 First offense
A written warning will be issued to the offender; a witnessed copy will be kept on file for twelve months after it will expire.
It is in the user’s best interest to adhere to the Code of Conduct to avoid further punitive measures being taken.
2.4.7.2 Second offence
In instances of further contraventions of the Code of Conduct, a second written warning will be issued to the offender. A
witnessed copy will be kept on file for twelve months after which time it will expire. A formal written letter signed by the
relevant subject head, or the head of the department must be received within a week of the offence or the offender’s access
to the SC environment and his/her login will be revoked.
Should the offender fail to return the abovementioned letter within the prescribed week, his/her revoked access will only
be restored at the same time said letter is received. A copy will be kept on file.
2.4.7.3 Third offence
In the case of a third offence of a less serious nature, no written warning will be issued by SC environment staff. Still, the
matter will be regarded as a serious offence and will be referred to the Disciplinary Committee of students.
2.5 Grievance procedures
All issues should be reported in writing, providing details of the complaint or issue. First consult the
lecturer concerned about the complaint or issue. Suppose the matter is, however, not resolved. In
that case, you should consult the class representative (the class representative's primary function is
to serve as a two-way communication channel between the class and the lecturer.) If the matter
remains unresolved, you should consult the module co-ordinator in the case of large module classes
with multiple lecturers. Where the co-ordinator is unable to or fails to resolve the matter, you should
consult the Head of Department. Should the matter remain unresolved, you may approach the Dean
of the Faculty.
General department-specific policies, rules, requirements, and guidelines are available on clickUP
under “Rules and regulations”.
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
7
lOMoARcPSD|18615900
© 2021 University of Pretoria
3 Module information
3.1 Purpose of the module
After completing this module, the student should be able to find, evaluate, process, present and
manage information resources for academic purposes using appropriate technology (Windows 10 and
MS Office 2019). This will allow the student to succeed at any information task the student will face
as part of academic studies or the workplace.
3.2 Module outcomes
After the completion of this module, the student should be able to:
• discuss basic computer concepts to make informed decisions on the
acquisition and use of hardware and software;
• discuss information literacy and know how to organise and retrieve
information;
• use the UP library effectively;
• write and produce typed assignments and research reports according to academic principles;
• discuss information ethics and understand the concepts of intellectual property rights,
copyright and plagiarism and correctly reference information sources;
• assess and evaluate information sources;
• design a presentation using MS PowerPoint;
• and create spreadsheets to present information.
3.3 Articulation with other modules in the programme
This module is a preparatory module to teach the student the basic skills necessary to succeed at any
information task. This module and AIM 121 form the basis for all academic and 21st century skills
necessary to operate in the world of the internet of things (IoT). This module links all the other
modules together as AIM teaches the skills necessary to complete assignments and research. This
module is necessary to ensure that students adhere to academic principles when completing
assignments for all other modules to complete their degree. Students will also be able to function
effectively.
3.4 Module structure
This module will be presented by way of one online two‐hour lecture per week. Attendance of all
lectures are compulsory. The module entails a computer literacy component and an information
literacy component. The computer literacy component focuses on mastery of Windows 10 and MS
Office 2019. The information literacy component focuses on information tasks in the 21st century. The
purpose of the AIM module is to:
• Provides the first-year students with the invaluable skills and competencies of being computer
literate.
• Helps to links all modules providing the platform for assignments, projects, and activities to
be completed using our information age tools. Emphasis is placed on the Microsoft Office
suite of products and the world of Navigating Information Literacy.
• It provides a platform for students to understand and learn how to use e-books, the
blackboard online modules, emphasises and teaches the skills of referencing and searching
for information.
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
8
lOMoARcPSD|18615900
© 2021 University of Pretoria
3.5 Learning presumed to be in place
No prior information or skills are necessary as a pre-requisite for the module.
3.6 Credits and notional hours
The number of credits allocated to a module indicate the volume of learning required
for the completion of that module and is based on the concept of notional hours. Given
that this module carries a weighting of 4 credits, it follows that you should spend an
average of 40 hours of study in total on the module (1 credit = 10 notional hours). This
includes time for lectures, assignments, projects, tests, and exams. There is a one twohour contact session per week. The time necessary for self-study may vary per student, as it is based
on the student’s current computer literacy skills. Class contact sessions, clickUP activities and
assessments are detailed in the “Schedule”.
3.7 Units
The following themes will be taught during AIM 121 WS.
3.7.1 Information Literacy
Theme: The search query
Outcomes
Student should be able to:
• How do I identify concepts to represent
my information need?
• How do I convert an information need
into a query?
• How do I combine concepts, synonyms
and alternative terms with Boolean
operators?
• What are the differences between
controlled vocabulary and natural
language?
Teaching and
learning
strategies,
methods, and
activities
Active learning
Student-centred
learning
The Whole Brain
teaching
approach
Blended
learning
Assessment
opportunities
Materials and
resources
Continuous
assessments
Assignment 1
Navigating
Information Literacy
Chapter 4: The search
query
Notes and videos on
clickUP
Assessment
opportunities
Materials and
resources
Final Tests
Theme: Searching the web
Outcomes
Student should be able to:
• What are the differences between
search engines and directories?
• Why is it better to use specialised sites
to search for news?
• Where can I search for sound clips,
images and videos?
• What are the differences between
Google and Google Scholar?
• How can I use ‘search limits’ to
Teaching and
learning
strategies,
methods, and
activities
Active learning
Student-centred
learning
The Whole Brain
teaching
approach
Continuous
Assessment
Final Tests
Navigating
Information Literacy
Chapter 5: Searching
the web
Notes and videos on
clickUP
Blended
learning
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
9
lOMoARcPSD|18615900
© 2021 University of Pretoria
improve my search results?
• How can I set up a profile so that I am
notified if there is any new information
on a topic I am interested in?
Theme: Searching databases and online journals
Teaching and
learning
strategies,
methods, and
activities
Outcomes
Student should be able to:
• What is a database?
• What types of online journals are
available?
• What other types of full-text
publications are available and indexed
in databases?
• How do I access databases and online
journals?
• How do I choose the most suitable
databases and online journals for my
subject field and topic?
• How do I search databases and online
journals?
• How can I use database records to
refine search strategies?
• Which search strategies work well for
databases?
• How can I use digital libraries, pre-print
archives and open-access resources for
information?
• How do I print, save, share and export
information from a database or an
online journal?
• What is the value of saving search
strategies for future use?
• What is the value of setting up a
personal profile?
• What is the value of the extra services
available from information and
database service providers?
Active learning
Student-centred
learning
The Whole Brain
teaching
approach
Blended
learning
Assessment
opportunities
Continuous
Assessment
Assignment 2
Final Tests
Materials and
resources
Navigating
Information Literacy
Chapter 6: Searching
databases and online
journals
Notes and videos on
clickUP
Theme: The Post-Truth World
Outcomes
Student should be able to:
• Discuss and identify how to interpret
the most important terms related to
information in a post-truth world.
• Explain the importance always to apply
your mind when evaluating
information.
Teaching and
learning
strategies,
methods, and
activities
Active learning
Student-centred
learning
Assessment
opportunities
Assignment 10
The Whole Brain
teaching
approach
Materials and
resources
Navigating
Information Literacy
Chapter 12: Being
information literate in
a post-truth world
Notes and videos on
clickUP
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
10
lOMoARcPSD|18615900
© 2021 University of Pretoria
• Evaluate using current information to
solve information needs.
• Discuss peer-reviewed information
accuracy.
• Analyse the belief of news in
newspapers and on television or the
radio.
• Identify fake news.
• Identify trustworthy information on
social media.
• Explain the ethical and legal
implications of creating or sharing
misinformation, fake news and
propaganda.
• Analyse and illustrate how to develop
the type of information literacy
required to identify misinformation
and fake news.
• Explain how burgeoning amounts of
information and ongoing, rapid
developments in information and
communication technology impact
academia, the workplace and people’s
personal lives.
Blended
learning
3.7.2 Navigating Office 2019
Theme: MS PowerPoint
Teaching and
learning
strategies,
methods, and
activities
Outcomes
Creating a Presentation in PowerPoint
Student should be able to:
• Define presentation software
• Plan an effective presentation
• Examine the PowerPoint window
• Enter slide text
• Add a new slide
• Format text
• Apply a design theme
• Compare presentation views
• Insert and resize a picture
• Check spelling
• Print a PowerPoint presentation
Modifying a Presentation
Student should be able to:
• Convert text to SmartArt
• Insert and style shapes
• Rotate and modify shapes
• Rearrange and merge shapes
• Edit and duplicate shapes
• Align and group objects
Active learning
Student-centred
learning
The Whole Brain
teaching
approach
Blended
learning
Assessment
opportunities
Continuous
Assessment
Assignment 5
Assignment 6
Final Tests
Materials and resources
Navigating Office 2019
MS PowerPoint Module
1: Creating a
Presentation in
PowerPoint
Module 2: Modifying a
Presentation
Module 3: Inserting
Objects into a
Presentation
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
11
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
Add slide footers
Set slide transitions and timings
Inserting Objects into a Presentation
Student should be able to:
• Insert a text box
• Crop and style a picture
• Insert a chart
• Enter and edit chart data
• Insert slides from other presentations
• Insert a table
• Insert and format WordArt
• Animate objects
• Insert and edit digital video
Theme: MS Excel
Teaching and
learning
strategies,
methods, and
activities
Outcomes
Assessment
opportunities
Working with Tables
Student should be able to:
• Create and format a table
• Add and delete table data
• Sort table data
• Use formulas in a table
• Filter a table
• Look up values in a table
• Summarize table data
• Validate table data
Managing Workbook Data
Student should be able to:
• View and arrange worksheets
• Protect worksheets and workbooks
• Save custom views of a worksheet
• Prepare a workbook for distribution
• Insert hyperlinks
• Save a workbook for distribution
• Group worksheet data
• Group worksheets
Active learning
Student-centred
learning
The Whole Brain
teaching
approach
Blended
learning
Continuous
Assessment
Assignment 3
Assignment 4
Final Tests
Working with Images and Integrating
with Other Programs
Student should be able to:
• Plan a data exchange
• Import a text file
• Import data from another workbook
• Import a database table
• Link worksheet data to a Word
document
• Link an Excel chart to a PowerPoint
slide
• Import Excel data into Access
Materials and resources
Navigating Office 2019
MS Excel Module 5:
Working with Tables
Module 6: Managing
Workbook Data
Module 7: Working with
Images and Integrating
with Other Programs
Module 8: Analyzing
Data with PivotTables
Module 9: Automating
Worksheet Tasks
Module 10: Advanced
Worksheet
Management
Module 11: Advanced
Formulas and Functions
Module 12: Performing
What-If Analysis
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
12
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
Insert a graphic file in a worksheet
Analyzing Data with PivotTables
Student should be able to:
• Plan and design a PivotTable report
• Create a PivotTable report
• Change a PivotTable's summary
function and design
• Explore PivotTable Data Relationships
• Create a PivotChart report
• Update a PivotTable report
• Filter PivotTable data
• Use the GETPIVOTDATA function
Automating Worksheet Tasks
Student should be able to:
• Plan a macro
• Enable a macro
• Record a macro
• Run a macro
• Edit a macro
• Assign a macro to a button
• Assign a macro to a command button
• Assign a macro to a form control
Advanced Worksheet Management
Student should be able to:
• Create and apply a template
• Import HTML data
• Create a custom AutoFill list
• Work with themes
• Work with cell comments
• Customize an Excel workbook
• Encrypt a workbook with a password
• Work with Ideas
Advanced Formulas and Functions
Student should be able to:
• Separate data using Flash Fill
• Format data using text functions
• Sum a data range based on conditions
• Find values based on conditions
• Construct formulas using named
ranges
• Consolidate worksheet data
• Audit a worksheet
• Calculate payments with the PMT
function
Performing What-If Analysis Student
should be able to:
• Define what-if analysis
• Track what-if analysis with Scenario
Manager
• Generate a scenario summary
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
13
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
•
•
•
Project figures using a data table
Use Goal Seek
Find solutions using Solver
Manage data using a data model
Analyze data using Power Pivot
4 Assessment
This module involves the development of skills and continuous assessment on the
basis of learning outcomes. Formative assessment will involve individual assessment
opportunities in the form of assignments, projects, and tests. Assignments and
projects will be completed on MyItLabs/SAM. Tests will be completed on a simulated
office environment through QuestUp and theory will be completed on the Compasses
system.
It is highly advised that assignments are submitted well before the due date. It is the student’s own
responsibility to complete and submit assessments on time. Under no circumstance will late
submissions be accepted!
4.1 Assessment schedule
The assessment schedule is available on clickUP. It is the student’s responsibility to view the
assessment schedule.
4.2 Assessment criteria
When completing projects and tests on SAM, your assignment's rubric is available as a final figure as
part of the “Instruction”-file and the available report once you have submitted a project. The report
is not available during tests to ensure original work is submitted.
4.3 Assessment policy
Continuous assessment will be used through the semester to assess your progress. Pass
requirements:
• According to University regulations you must obtain a final mark of 50% or more, to pass this
module.
• A student’s year/semester mark will be taken into consideration in the calculation of his/her
final mark.
• All mark queries will only be attended to after publication of marks on the UP Portal.
Please refer to the School of IT Brochure for general rules related to qualifying for supplementary
exams. Only students who comply with these requirements would be allowed to write the
supplementary exams. A special module test for all legitimate absentees can be taken on the
specified date.
4.3.1 Absence from tests
Any absence from module tests must be supported by an official and valid statement (for example a
relevant medical certificate) and must be submitted to the lecturer within three days of the test
date. When sending a sick letter (medical certificate) to the lecturer, cc Ms C Van Zyl
(christa.vanzyl@up.ac.za). Please note: this does not refer to any assignments, only tests.
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
14
lOMoARcPSD|18615900
© 2021 University of Pretoria
4.3.2 Extra-time for tests
If a student needs extra time during tests, a letter must be obtained from Student
Support and sent to the lecturer. When sending an extra-time letter to the lecturer, cc
Ms C Van Zyl (christa.vanzyl@up.ac.za). Please note: this does not refer to any
assignments, only tests. An extra-time letter must be sent to the lecturer before
every test. Student Support can be contacted at (012) 420 2333.
4.3.3 Students with Disabilities
If a student has a disability, a letter must be obtained from the Disability Unit and sent to the
lecturer. When sending a disability letter to the lecturer, cc Ms C Van Zyl (christa.vanzyl@up.ac.za). A
student can contact the Disability Unit at (012) 420 2064 or email them at du@up.ac.za.
4.4 Plagiarism
Plagiarism is a serious form of academic misconduct. It involves both appropriating someone else’s
work and passing it off as one’s work afterwards. Thus, you commit plagiarism when you present
someone else's written or creative work (words, images, ideas, opinions, discoveries, artwork, music,
recordings, computer-generated work, etc.) as your own. Only hand in your original work. Indicate
precisely and accurately when you have used information provided by someone else. Referencing
must be done in accordance with a recognised system. Indicate whether you have downloaded
information from the Internet. For more details, visit the library’s website:
http://www.library.up.ac.za/plagiarism/index.htm. When completing projects and tests on SAM,
ensure that you submit your own work as a violation report will be produced by the SAM system if
you submit another student’s work.
5
Support services
You can contact the AIM IT Helpdesk for support with Office 365 and laptop issues by emailing
itlabs@up.ac.za. Suppose the matter is, however, not resolved. You can contact the following IT Lab
Administrators directly.
Hatfield campus:
Mr Daniel Smit: daniel.smit@up.ac.za
Mr Zamani Dubazana: zamani.dubazana@up.ac.za
Groenkloof campus:
Mr Schalk van Heerden: Schalk.vanheerden@up.ac.za
Mamelodi campus:
Mr Sam Tshele: sam.tshele@up.ac.za
To access more support services please download a QR code reader on your cell phone. To download
a QR code reader open your mobile app store (App Store, Google Play or Windows Marketplace) and
search for QR code readers.
5.1 Safety in the evening and emergencies
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
15
lOMoARcPSD|18615900
© 2021 University of Pretoria
•
•
•
For any safety or emergency related matters, for example: if you need a security officer to
accompany you from your residence to campus, phone the Operational Management Centre
(details at the back of your student card).
The 24-hour, multi-disciplinary UP Crisis Line offers professional and confidential support to
victims of crime in times of trauma. For assistance and immediate action, phone the UP-Crisis
Line on 0800 00 64 28.
Hatfield residence students: From 18:00 till 06:00 security officers are available to escort you
(on foot) to and from your residence or campus anywhere east of the Hatfield Campus through
to the Hillcrest Campus.
5.2 E-learning support
•
•
•
•
•
Report a problem you experience to the Student Help Desk on your campus.
Visit the open labs in the Informatorium Building or IT labs on your campus to report problems
at the Student Help Desk offices.
Approach the assistants at the help desk
o Hatfield: Adjacent to the Student Computer Laboratories in IT Building and at the CBT
and Open Laboratories
o Mamelodi campus: NW2CBT
o Groenkloof: Aldoel Building IT labs
Call 012 420 3837
Email studenthelp@up.ac.za
5.3 Other support services:
FLY@UP:
The Finish
Line is Yours
Disability
Unit
• Think carefully before
dropping modules (after the
closing date for amendments
or cancellation of modules).
• Make responsible choices
with your time and work
consistently.
• Aim for a good semester
mark. Don’t rely on the
examination to pass.
Academic support for students
with learning disabilities:
• Assistive technological
services
• Facilitation of test and
examination
accommodations
• Test and exam concession
applications
• Accessible study venues and
a computer lab
• Referrals for recommended
textbooks in electronic
format
www.up.ac.za/fly@up
email: fly@up.ac.za
https://www.up.ac.za/disabilityunit
012 420 2064
email: du@up.ac.za
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
16
lOMoARcPSD|18615900
© 2021 University of Pretoria
Student
Counselling
Unit
Provides counselling and
therapeutic support to students
012 420 2333
Student
Health
Services
Promotes and assists students
with health and wellness
012 420 5233
012 420 3423
The Careers
Office
Provides support for UP students
and graduates as they prepare
for their careers
careerservices@up.ac.za
012 420 2315
24-hour Operational
Management Centre
012 420-2310
012 420-2760
24-hour Operational Manager
Crisis Line
083 654 0476
0800 006 428
Department
of Student
Affairs
Enquiries concerning studies,
accommodation, food, funds,
social activities and personal
problems
012 420 2371/4001
Roosmaryn Building, Hatfield
campus
Centre for
Sexualities,
AIDS and
Gender
Identifies and provides training
of student peer counsellors
012 420 4391
Fees and
funding
http://www.up.ac.za/enquiry
www.up.ac.za/fees-and-funding
012 420 3111
IT Helpdesk
For student IT related queries
Department
of Security
Services
012 420 3051
studenthelp@up.ac.za
The Study guide is subject to change without prior notice – the most recent and relevant information is
available on clickUP
Downloaded by Ryea Budripersadh (rbudripersadh@gmail.com)
17
Download