Audiences Grade 10 Learning Objectives In this chapter, you will learn about: Audience appreciation. Software copyright. Audience Appreciation ▪ When planning and creating ICT solutions, it is important to consider the audience who will either use or take part in the solution. ▪ Here are two different examples to show what is meant by audience appreciation: 1. In the first example, we are going to consider using presentation software to make a presentation for an audience. 2. In the second example, we are going to consider the general audience requirements when developing a new website. Giving Presentation to Audience (Example 1) Here, the ICT solution is a presentation aimed at a specific audience, using presentation software. When writing a presentation, you need to consider all of the following factors: • The age of the target group (e.g., is it young children or a more mature group of adults). • The experiences of the audience (e.g., a board of company directors or an audience composed of teenage school children). • The expectation of the audience (e.g., for a new restaurant, an older audience might expect to see fine wines and good waiter service while a group of students might be more interested in pizzas and fast counter service). • Knowledge of the audience (e.g., equations for graduates in maths rather than a group of history students). A Sample Presentation to Audience ▪ Now consider a phone company that markets a number of different mobile phones. ▪ The company has decided to produce two presentations, using an ICT solution, regarding the sales and features of the four different mobile phones they market and sell: 1. One presentation is to be given to the mobile phone sales team who will receive different bonus payments depending on the phone sold. A Sample Presentation to Audience … 2. A second presentation is to be given to a potential group of mobile phone customers. ▪ How would these two presentations differ? ▪ The first group (the sales team), will have technical knowledge and will be interested in the profitability of each sale. ▪ The second group (end-users) will only be interested in the price and the features found on each phone. Key Factors When Writing the Presentations The following are the key factors to consider while writing the presentations: o The language used. o The need for multimedia. o The length of the presentation o The need for audience participation (an interactive approach). o The examples used to illustrate certain points. Key Factors When Making a Presentation General Audience Requirement (Example 2) In this example, we are setting out to develop a new website. As with the previous example, you need to consider certain factors regarding the audience: o Audience characteristics. o The needs of the audience. o Why you need to consider the needs of your audience. Audience Characteristics Who will be using the new website? First, consider the characteristics of your target audience when using the new website: Age range. Income levels. Interests. Disabilities or impairments. Audience Characteri stics Need of Audience Why we need to consider the needs of our audience Why is it important to respectfully consider these needs? ✔ If the audience is made up of older people, or people with disabilities, who have sight problems, then it is important to make sure the website has clear-to-read fonts. ✔ Complex language can be a real turn-off to children or for people who have English as their second language; the text needs to be clear and easy to read for these reasons. ✔ It is necessary to hold the attention of the users, otherwise, they will give up using the website. Why we need to consider the needs of our audience … ✔ Good, attractive screen designs will attract users to the website. ✔ Keeping interfaces clear and easy to use keeps people engaged. ✔ Lots of typing can be very frustrating, as can badly designed websites where the user seems to go ‘round in a big circle’. Copyright Software Copyright and Piracy Software is protected by copyright laws in much the same way as music CDs, movies, and articles from magazines and books are protected. When software is supplied on CD, DVD, or online there are certain rules that must be obeyed. It is illegal to: 1. Make a software copy and then sell it or give it away to a friend or colleague. 2. Use the software on a network or on multiple computers unless a license has been acquired to allow this to happen. Software Copyright and Piracy … 3. Use coding from the copyright software in your own software and then pass this software on or sell it as your own without the permission of the copyright holders. 4. Rent out a software package without permission to do so from the publishers. 5. Use the name of copyrighted software on other software without an agreement to do so. Software Copyright and Piracy … Software piracy is the illegal copying of software. It is a big issue among software companies. They take many steps to stop illegal copying and to stop any illegal copies being used once they have been sold as follows: ▪ When software is being installed, the user may be asked to key in a unique reference number or product key that was supplied with the original copy of the software (e.g., 4a3c 0efa 65ab a81e). ▪ The user will be asked to click ‘OK’/’I AGREE’ or put a cross in a box to agree to the license agreement before the software continues to install. Software Copyright and Piracy … ▪ If supplied as a hard copy, the original software packaging often comes with a sticker informing the purchaser that it is illegal to make copies of the software; the label is often in the form of a hologram indicating that this is a genuine copy. ▪ Some software will only run if the CD, DVD, or memory stick is actually in the drive; this stops illegal multiple use and network use of the software. ▪ Some software will only run if a dongle is plugged into one of the USB ports. Software Copyright and Piracy … o A dongle is a small device, usually plugged into one of the computer’s USB ports. o It is used to allow wireless communications with devices, such as a keyboard. o It can also be used to protect software (for example, it may contain important files that mean the software will only run if the dongle is plugged into the computer).