Uploaded by Hassan Latif

Chapter 9 Audiences

advertisement
Audiences
Grade 10
Learning Objectives
In this chapter, you will learn about:
Audience appreciation.
Software copyright.
Audience Appreciation
▪ When planning and creating ICT solutions, it is important to consider the audience who
will either use or take part in the solution.
▪ Here are two different examples to show what is meant by audience appreciation:
1.
In the first example, we are going to consider using presentation software to make a
presentation for an audience.
2.
In the second example, we are going to consider the general audience requirements
when developing a new website.
Giving Presentation to Audience (Example 1)
Here, the ICT solution is a presentation aimed at a specific audience, using presentation
software. When writing a presentation, you need to consider all of the following factors:
• The age of the target group (e.g., is it young children or a more mature group of adults).
• The experiences of the audience (e.g., a board of company directors or an audience
composed of teenage school children).
• The expectation of the audience (e.g., for a new restaurant, an older audience might
expect to see fine wines and good waiter service while a group of students might be
more interested in pizzas and fast counter service).
• Knowledge of the audience (e.g., equations for graduates in maths rather than a group of
history students).
A Sample Presentation to Audience
▪ Now consider a phone company that markets a number of different mobile phones.
▪ The company has decided to produce two presentations, using an ICT solution,
regarding the sales and features of the four different mobile phones they market and
sell:
1.
One presentation is to be given to the mobile phone sales team who will receive
different bonus payments depending on the phone sold.
A Sample Presentation to Audience …
2.
A second presentation is to be given to a potential group of mobile phone customers.
▪ How would these two presentations differ?
▪ The first group (the sales team), will have technical knowledge and will be interested in
the profitability of each sale.
▪ The second group (end-users) will only be interested in the price and the features
found on each phone.
Key Factors When Writing the Presentations
The following are the key factors to consider while writing the presentations:
o The language used.
o The need for multimedia.
o The length of the presentation
o The need for audience participation (an interactive approach).
o The examples used to illustrate certain points.
Key Factors
When
Making a
Presentation
General Audience Requirement (Example 2)
In this example, we are setting out to develop a new website.
As with the previous example, you need to consider certain factors regarding the
audience:
o Audience characteristics.
o The needs of the audience.
o Why you need to consider the needs of your audience.
Audience Characteristics
Who will be using the new website? First, consider the characteristics of your target
audience when using the new website:
Age range.
Income levels.
Interests.
Disabilities or impairments.
Audience
Characteri
stics
Need of
Audience
Why we need to consider the needs of our
audience
Why is it important to respectfully consider these needs?
✔ If the audience is made up of older people, or people with disabilities, who have sight
problems, then it is important to make sure the website has clear-to-read fonts.
✔ Complex language can be a real turn-off to children or for people who have English as
their second language; the text needs to be clear and easy to read for these reasons.
✔ It is necessary to hold the attention of the users, otherwise, they will give up using the
website.
Why we need to consider the needs of our
audience …
✔ Good, attractive screen designs will attract users to the website.
✔ Keeping interfaces clear and easy to use keeps people engaged.
✔ Lots of typing can be very frustrating, as can badly designed websites where the user
seems to go ‘round in a big circle’.
Copyright
Software Copyright and Piracy
Software is protected by copyright laws in much the same way as music CDs, movies,
and articles from magazines and books are protected.
When software is supplied on CD, DVD, or online there are certain rules that must be
obeyed. It is illegal to:
1.
Make a software copy and then sell it or give it away to a friend or colleague.
2.
Use the software on a network or on multiple computers unless a license has been
acquired to allow this to happen.
Software Copyright and Piracy …
3.
Use coding from the copyright software in your own software and then pass this
software on or sell it as your own without the permission of the copyright holders.
4.
Rent out a software package without permission to do so from the publishers.
5.
Use the name of copyrighted software on other software without an agreement to do
so.
Software Copyright and Piracy …
Software piracy is the illegal copying of software. It is a big issue among software
companies.
They take many steps to stop illegal copying and to stop any illegal copies being used
once they have been sold as follows:
▪ When software is being installed, the user may be asked to key in a unique reference
number or product key that was supplied with the original copy of the software (e.g.,
4a3c 0efa 65ab a81e).
▪ The user will be asked to click ‘OK’/’I AGREE’ or put a cross in a box to agree to the
license agreement before the software continues to install.
Software Copyright and Piracy …
▪ If supplied as a hard copy, the original software packaging often comes with a sticker
informing the purchaser that it is illegal to make copies of the software; the label is
often in the form of a hologram indicating that this is a genuine copy.
▪ Some software will only run if the CD, DVD, or memory stick is actually in the drive;
this stops illegal multiple use and network use of the software.
▪ Some software will only run if a dongle is plugged into one of the USB ports.
Software Copyright
and Piracy …
o A dongle is a small device, usually plugged into one of the
computer’s USB ports.
o It is used to allow wireless communications with devices,
such as a keyboard.
o It can also be used to protect software (for example, it may
contain important files that mean the software will only run if
the dongle is plugged into the computer).
Download