version 1.0 - Peace Corps Tanzania

advertisement
Shika kwa Mouse
Version 1.0 TZ
_____________________________________________________
ICT Resource and Teaching Manual
Tanzania
_____________________________________________________
Written by Peace Corps Volunteers
June 23, 2012
1
Contents
Introduction ….................................................................................................................................................................
3
Part 1: Teaching ICT - General Recommendations
1.1 - Computer Lab Rules …........................................................................................................................
1.2 - Pace of Teaching/“The Basics” ......................................................................................................
1.3 - Teaching Without a Projector …....................................................................................................
5
7
8
Part 2: Teaching ICT - Subjects/Activities
2.1 - Basic Computer Use …........................................................................................................................
2.2 - Open Lab Hours …................................................................................................................................
2.3 - NECTA ICT Syllabus …........................................................................................................................
2.4 - Using Computers to Teach Non-ICT Subjects …......................................................................
2.5 - Typing …...................................................................................................................................................
2.6 - Word Processing …..............................................................................................................................
2.7 - Internet ….................................................................................................................................................
2.8 - Programming ….....................................................................................................................................
2.9 - Media Design …......................................................................................................................................
10
11
12
19
20
21
22
23
25
Part 3: Computer Lab Management
3.1 - User Accounts …....................................................................................................................................
3.2 - Antivirus …..............................................................................................................................................
3.3 - Cleaning Up After Students …..........................................................................................................
31
33
36
3.4 - Reformatting and Reinstalling
…..........................................................................................
3.5 - Replacement of Obsolete/Broken Computers ….....................................................................
39
41
Part 4: Computer Lab Development
4.1 - Starting a School Computer Lab ….................................................................................................
4.2 - Improving an Existing Computer Lab …......................................................................................
43
49
Appendices
Appendix A - Computer Vocabulary …...................................................................................................
Appendix B - Computer Safety Concerns ….........................................................................................
Appendix C - Posters in the Lab …............................................................................................................
51
53
54
Appendix D - Windows Profile Management
….......................................................................
Appendix E - BIOS Guide
…...............................................................................................................
Appendix F - Contacting PCVs …...............................................................................................................
55
60
63
- sections that are more involved or technical
2
Introduction
Teaching ICT in Tanzania poses unique challenges, due to a general lack of ICT resources and a general
lack of ICT knowledge. Peace Corps Volunteers teaching ICT all over the country are finding
themselves having to learn how to teach, and to manage their laboratories, "the hard way". Due to a
lack of communication, many of them are "reinventing the wheel" - developing the same methods and
systems that have already been developed by others before them. Such development takes a very long
time, and during this "development time", each PCV's teaching is generally not very effective.
Shika kwa Mouse is intended to act as an ICT counterpart to Shika kwa Mikono, which is a Peace Corps
Volunteer-written guide to teaching science and managing school science labs. Shika kwa Mouse's
primary goal is to share knowledge and methods that have already been developed, in order to
increase the effectiveness of PCVs who teach and manage ICT in Tanzania.
If any non-PCVs would like to use this guide as well, they are welcome to do so.
3
Part 1 - Teaching ICT - General Recommendations
4
1.1 - Computer Lab Rules
Philosophy
Most schools cannot easily afford to replace their computers. Therefore, it is paramount that the
computers not be destroyed. It is very important to create and enforce rules to protect the computers.
It is important that the students be able to easily understand the rules, so the rules should be as simple
as possible.
And the rules should be enforced strictly; if the rules require kicking students out of the laboratory,
that is okay - it is better that a few students should not learn computers than that those students
should damage the computers and prevent everybody from learning.
Recommended Rules
The exact rules will vary from person to person, but a pretty good set of rules is this:
1. Don't run and don't fight.
2. Shut computers down properly.
3. Follow the teacher's instructions.
4. Bring notebooks and take notes.
Number 1 aims to prevent students from accidentally knocking computers off of their tables.
Number 2 is to prevent students from shutting off the electricity instead of following correct shutdown
procedures (simply shutting off the electricity can damage or even destroy the computers).
Number 3 allows the teacher to adapt and create new rules as situations require.
Number 4 ensures that students use good study practices in the lab, rather than simply playing with
the computers.
Strictness of Enforcement
Due to the importance of protecting a school's computers, we recommend strict enforcement of the
rules. If a student breaks one or more of the rules, that student should receive punishment
immediately. Punishment should be at least as significant as kicking the offending student out of the
lab for that class session. If the problem is more severe, the student may also be banned from the
laboratory for one or more future class sessions; if the problem is truly serious, the student may be
banned completely from the laboratory.
These are by no means the only applicable punishments. Especially in cases involving students who do
not care about studying ICT in the laboratory, other punishments may be required.
Note that being strict need not be the same as being mean - be sure that the students know that even
though they are being temporarily kicked out, they are welcome to keep coming to the lab provided
that they're careful to follow the rules.
Example Enforcement Scheme
One PCV uses the following system to enforce the computer lab rules:
Before students are allowed to enter the lab, they are taught the laboratory rules and the punishments
that will typically be used. They must write and sign a semi-formal agreement saying something to the
effect of "I understand the lab rules, promise that I will follow them, and agree to be given appropriate
punishment if I fail to do so", and then to give the agreement to the teacher.
5
A list is kept of all of the students who have handed in these agreements. At the beginning of each
class, a student is asked to be the "guard" - they have the list, and their job is to only allow the listed
students into the lab. Class monitors can be guards, or any other trustworthy student.
If a student breaks one of the rules, either intentionally or accidentally, typically the punishment is to
be kicked out of the lab for the rest of the day and/or to be banned from entering the lab for one
following lab session. In the case of a student being banned for the day, their name is temporarily
removed from the list and added to a second list of banned students. If a student does something really
terrible, this system could be used to ban them for longer periods of time, or even permanently.
Another Enforcement Scheme:
For serious or repeated problems that wouldn’t go away, I resorted to the more extreme measure of
kicking out all the students. This is a last resort but I’ve found it to be effective. The key was to
communicate clearly to the students why I’m doing it. For example, I used to have a problem with
students hitting the power switch to shut down, which I already explained they should not do. So
towards 6PM when I’m closing up, and the students exit, if I see anyone do this, I immediately close the
door (I stand near it while they’re exiting). Then I tell them the computer lab will be closed for the next
day or two (or more - you decide) because of what just happened. I make sure they understand what
behavior caused me to take this action.
Or if it happens earlier, say only 30 minutes after I open the lab, I only close for the rest of the day.
This is harsh, but again it’s been effective for me. Even though it punishes everyone for the bad actions
of a few, I’ve found it encourages peer pressure to behave well. And since I open every weekday, losing
1-2 days isn’t really a big deal.
6
1.2 - Pace of Teaching/“The Basics”
For a PCV teaching ICT in Tanzania to students who have never studied computers before, the pace of
teaching will probably be surprising, if not shocking.
In America, pretty much everybody has been using computers for years now. There is a vast amount of
computer skills and knowledge that in America are thought of as "the basics", that to new computer
students are actually quite complicated and take time to learn. A few examples:
○ How to shut down correctly!
○ Keeping track of the meanings of "left-click", "right-click", "single-click", and "double-click", as
well as knowing when to use each type of click. Or being physically capable of moving the
mouse cursor to the desired location, or being physically capable of double-clicking!
○ How to move, resize, close, maximize, minimize, and restore windows.
○ Opening moving, renaming, copying, and deleting files.
The bad news: You will probably not be able to teach your students nearly as many "advanced" skills
as you were hoping.
The good news: Even just teaching these types of basic skills is a huge help!
Mindset recommendations:
Try to go into your lessons with a realistic idea of what your students know and what they need to
learn, and how much you're going to be able to teach them. And be ready for unexpected setbacks, and
be ready to be patient as your students learn these skills. And be ready to take time to teach these
skills.
Strategy recommendations:
If you want to teach a particular topic (perhaps word processing, or Internet use), be sure to think
beforehand about which of these "basic skills" are needed to do whatever it is you want to teach them.
For example, if you want to teach them how to save and reopen word processing documents, the
students must:
○ Be able to use the mouse to both single-click and double-click.
○ Know that the "File" button is a button.
○ Know what computer menus are and how to use them.
○ Know how to write a filename in a particular box.
○ Be able to open files and folders via doubleclick.
For many Tanzanian students, the abovementioned skills are completely new and will take time to
learn.
7
1.3 - Teaching Without a Projector
Many schools do not have projectors. Teaching ICT without a projector can be very difficult, as it is
impossible to show the class, on the computer, how to perform whatever action is being taught.
Here are some possible ways to deal with these difficulties:
Chalkboard and Individual Investigation
One possible method involves a three-step process:
1. Use the chalkboard to outline the basic idea of the new action to be taken. Keep drawings as
simple as possible; instead of drawing the entire screen, draw only the controls that are
necessary for the action and then verbally explain where those controls will be on the screen.
Have the students take notes as you do this.
2. Give the students the task of doing these actions themselves, and then walk around the lab
helping students to find the controls and actually perform the actions.
3. Give the students some activity to perform that involves using these actions multiple times.
This serves to give them enough experience performing the action that they will really
remember it.
Although this method is much slower than simply showing things on a projector, it works reasonably
well. Going around to all of the computers to help the students can be very difficult depending on how
many computers there are in the lab.
Student Teaching Assistance
One PCV will teach something to the student at one computer, and then ask that student to help teach
the other students. While that student is going around teaching others, the teacher then visits a second
student, teaches them, and asks them to help teach. This process continues until every student has
been taught by either the teacher or by another student. It is much slower than teaching with a
projector, but much faster than individually teaching every student in the lab.
If you do this, be sure to tell the students to “teach” the other students by explaining it to them, and
make sure they don’t just take other students’ mice and do it for them.
Tutorials
Tutorial documents can be created and put on every computer. In this way, all of the students can
simultaneously work their way through a given tutorial and see any pictures or videos of the computer
screen that are included in the tutorial.
However, depending on how familiar the students are with the computers, it can be very difficult for
them to make the conceptual leap between real buttons on the screen and pictures of those same
buttons, et cetera. Students who are new to computers have also been observed to have a very difficult
time navigating between different sections of a document, etc.
8
Part 2 - Teaching ICT - Subjects/Activities
9
2.1 - Basic Computer Use
Justification
A lot of Tanzanian students are absolutely 100% new to using computers. Many others have only used
computers at school, and often have not been taught much about basic computer skills. In either case,
some instruction in "computer basics" is very important.
A few examples of skills the students may not have:
○ Being able to shut down correctly!
○ Knowing the meanings of "left-click", "right-click", "single-click", and "double-click", as well as
knowing when to use each type of click.
○ How to move, resize, close, maximize, minimize, and restore windows.
○ Opening, moving, renaming, copying, and deleting files.
Teaching Basic Computer Use
Based on one PCV's teaching experiences, the following plan was developed for teaching new
computer students. You can use it as-is, modify it, or use bits and pieces of it. If a class period has
enough time to teach more than one section, go ahead and teach more than one section in that period:
1. Parts of a Computer
○ Box, monitor, keyboard, and mouse
2. Using the Mouse
○ Concept of the "cursor"
○ Concept of using the mouse to move the cursor
○ Concept of moving the cursor to an object and then pushing the mouse button
3. Basic UI Elements, Part 1
○ The Taskbar
○ Buttons and the Start Button
○ Menus and the Start Menu
4. Logging In
○ Concept and procedure of logging in
5. Turning Computers Off
○ Concept: turning off by turning off the electricity is bad
○ Concept: and procedure for turning computers off correctly
6. Shutting Down Practice
○ Practice by repeatedly turning the computers on, logging in, and shutting down
7. Basic UI Elements, Part 2
○ The desktop
○ Files and folders
○ Windows
8. Basic Computer Use, With Practice
○ Double-clicking
○ Opening files and folders
○ Closing, maximizing, and minimizing windows
○ Scrolling up and down
10
2.2 - Open Lab Hours
Self-directed/free time with computers is great for letting students learn on their own. Benefits
include:
○ Letting students practice what they learned during periods.
○ Letting students who don’t have periods with you (if you don’t teach the entire school) have a
chance to use computers.
○ If you assign homework, this is more time to let them do it.
○ Letting students use self-paced educational material on the computers, if you have them
loaded.
○ Students feel more comfortable experimenting without a teacher looking over their shoulder.
Some Tanzanian students feel pressure from the mere presence of a teacher, even outside class
when the teacher isn’t teaching or otherwise asking them to do anything. Depending on the
situation, it might actually help for you to do your own work, or just relax and leave the
students alone during this time. It’s win-win!
Experience from one PCV:
At my school I keep the computer lab open every weekday from 4-6PM, electricity allowing. Anyone is
welcome as long as they are wearing a school uniform (so I know they are a student), or if I recognize
them as a student or teacher at my school. I do this because it’s usually fairly crowded and I let
outsiders know that students and staff get priority to use the computers.
I find that this free time is very helpful to the students; many of them take advantage of it so they must
at least enjoy it. I do hardly any teaching during this time and just let them do whatever they want on
the computers. Since I have only educational software installed on the computers, I don’t worry that
people are wasting their time. (Some would argue that even non-educational computer games are
beneficial, but that’s another debate.) I’ve observed that students enjoy browsing Wikipedia, looking
over old NECTA exams, and making colorful WordArt with PowerPoint or Word.
There have been very few problems or downsides with open lab hours. At first some students didn’t
know how to treat the equipment properly: being too rough with the keyboard/mouse, turning the
monitors on/off repeatedly when they felt stuck using some software, hitting the power switch
without shutting down. After giving examples of what behaviors are not acceptable, this improved.
There have been more serious/repeated problems which I addressed with bolder action. See the
section on rules and enforcement.
11
2.3 - NECTA ICT Syllabus
Following the syllabus is not recommended. If it is unavoidable, try to at least cover the topics in a
different order from what is laid out in the syllabus, so you can get started using computers as soon as
possible. There are also some topics in which the students are required to memorize things they don't
understand, e.g., the parts of the CPU, and this may be unavoidable, depending on your school.
Suggested order of topics:
○ Computer handling
○ The computer
○ Practical applications (these are the office suite lessons)
○ Computer software and operating systems
○ Network
○ Information
○ Internet
○ Web page
○ Multimedia
Computer Evolution and Impacts of ICT on Society (have ready to teach on the days you don't have
power or the computers just don't work, or else make your students use their multiedia/word/ppt
time to make presentations on them).
Computer Handling
○ lab rules
○ how to protect the computers
○ power requirements and dangers of dirty power
○ utility and antivirus programs
This lesson is probably easiest to do just by taking a tour of the lab. Start outside and explain whatever
lab rules you have. Then take the students into the lab, in small groups if necessary, point out the
power arrangements, any measures taken against theft and dust. If there are any problems, explain
what they are and why this is a problem. This is a great time to terrify your students about how hard
poweroffs are really bad and how many computer viruses are on their flash drives and how easy it is
for their actions to damage the computers. It may also be a good idea to assure students that
computers don't produce cancerous x-rays and are perfectly safe. By utility programs, the syllabus
means disk cleanup and disk defrag programs. When discussing antivirus programs, be sure to
mention that having it isn't enough, the virus definitions and scans must be run regularly.
The Computer
○ Define computer
○ Describe significance of computers
○ Computer components
○ Input vs. output devices
○ Parts and functions of a cpu
Define computer: a machine that takes a user's input, processes it and produces output. [Please note
that in all cases in this section where a definition is given, it is the definition required by the ministry
of education, and is not necessarily endorsed by the Shika team.]
12
Significance of computers: in education, businesses, libraries, hospitals, research labs, police stations...
Computer components: My students love it when I dissect computers in front of them. I usually have
students take turns taking out the screws for me, and I stop with each piece I take out and explain
what it does. However, if your classes are large, what will often happen is that the girls will hang back
and not be able to see because they don't want to fight for a place at the front with the boys, so try to
have two or more stations of students taking apart computers. This assumes you have several dead
desktops lying around, but this will probably be the case.
Guide to what is inside a typical desktop computer: getting the case open is the most difficult part.
Seriously. All cases are different and all of them open slightly differently. Do the best you can. Once you
have it open, the rest is just screws and plugs. If you've never opened one and aren't sure you can
identify the parts, don't worry. You can figure out most of it by tracing the connections. The power
supply is a big box that the power cord plugs into the back of. You can identify the cd rom and floppy
drives (if present) based on what they look like. The things that look sort of like disc drives but aren't
cd drives are hard drives. The big circuit board that everything is plugged into is the mother board.
Any additional cards like video cards and sound cards will be on the motherboard and you can identify
what they are by looking at what could be plugged into them. The CPU is also located on the
motherboard, but you may not be able to see it. What you will probably see is a giant boxy thing for
heat exchange and it will have a fan on top or near it. If the fan stops working, your cpu will overheat
and die. If it was working to begin with, that is. The RAM chips are the small cards near the CPU that
you can pop in and out.
Input and output devices (I/O devices): this is all the stuff that connects to the case or the tower. Mice,
keyboards, monitor, and if you have them, printer, projector, speakers, etc. The only things you need to
spend time on are the mouse and the keyboard. Take time to explain left clicking vs right clicking on
the mice. On the keyboard, stress the enter/return key, backspace, spacebar, shift. It can be fun to have
students connect monitors, keyboards, and mice themselves, but be careful, they will have a tendency
to jam the devices and bend the pins. This isn't fatal, you can straighten the pins in the plugs with a
pair of tweezers, but talk about gentleness and try to save yourself some work.
Parts of the CPU: This is the CU (control unit), ALU (arithmetic logic unit), and the registers. It will
bother the students that they can't see these, or the CPU itself. The best I can do is demonstrate the
processes the cpu is executing and how much load is on the CPU. In Windows, you do this with the
13
Task manager, and then select the CPU tab, in unix-based operating systems, open a terminal and type
“top” and press enter.
The input is some program that needs to be executed. The Control unit interprets the instructions. The
arithmetic logic unit does the actual instructions, intermediate results are stored in the registers
(which is memory inside the actual CPU) and in the RAM, both of which are temporary memory
storage. Secondary storage is your actual memory storage devices, hard drives or external storage
stuff.
Practical Applications
○ Word
○ Excel
○ PowerPoint
○ Database
See [section 2.6] for word processing.
Computer software
○ Concept
○ Operating system
○ Using the operating system
Concept: Differentiate between software and hardware, and between system software and application
software. Hardware is the physical part of the computer that can be touched, software is the part that
the user interacts with that cannot be touched. Software consists of programs which are a series of
instructions that the hardware carries out. Application software consists of software that the user can
use directly, and system software consists of software that interacts directly with the hardware and
translates user instructions for the hardware.
14
Operating system: a collection of system programs that controls the operation of a computer system.
Functions: allows user to interact with application programs, coordinates data processing, manages
main memory use, checks for hardware status and displays error messages if necessary, and manages
files stored on disk. The syllabus also gives categories of operating systems as “single user, single task,
single user multi task, and multi user multi task” and I can't bring myself to teach that because it is
wrong and just plain weird.
Using the operating system: Turning the computer on and off (better to cover during computer
handling), using the operating system's built in help facility, managing files and folders. On windows,
the help should be in the start menu, in linux, it is under system->help and support. Also, most
programs will have a help function that can be accessed with F1. For covering files and folders, it is a
good idea to have lots of different types of files on the desktop, because the icons look different for
folders vs files, and then a lot of file types will have associated icons. I like to make my students
navigate the file system. On Windows go to my computer or start->windows explorer, in linux, this is
places->computer. I tell the students that everything in a computer is a system of files organized into
folders inside other folders, and I make them click through the folders and draw a map of the file
system as they explore. If I don't make them write something down they won't actually investigate the
computer and will just sit and not do anything.
Information
○ Concept of information
○ Information dissemination
○ Communication media
Concept of information: differentiate between data and information (NECTA definition, data are pieces
of meaningless facts, information is data assembled into something meaningful. Identify sources and
importance of information. Credible vs non credible information. I go on anarchist rants about
freedom of information being our only defense against tyranny. I don't necessarily recommend this,
but it surprises the students and wakes them up. If you have an Internet connection, you can
demonstrate finding noncredible information and that different search engines can give you different
results so information varies by source.
Disseminating information: modern vs traditional ways of spreading information. Compare and
contrast.
Communication media: radio, TV, newspaper, Internet, word of mouth...
Internet
15
○
○
○
○
○
○
Define and describe Internet
Search engines
Electronic mail
Electronic learning
Electronic commerce
Negative effects of Internet on Tanzanian society
Also see [Section 2.7 - Internet].
Define and describe: a network of networks that connects the whole world. The world wide web is an
application built on top of this network and people use it to post information about every imaginable
topic.
Search engines and meta search engines: meta search engines are search engines that search other
search engines. If you have an Internet connection, use the lesson on searching to discuss how we get
information. Do be sure to have some search filters because some of the students may start looking for
porn. Try to integrate this with the lesson on information.
Electronic mail: try not to do too much with this. All the students will forget their passwords and end
up creating 50 different email accounts and just overall spend way too much time coming to you for
help in creating these new accounts.
Electronic learning: Tanzania has this thing called open university you can use to demonstrate.
Electronic commerce: ebay, craigslist, whatever. Also a fun time to talk about how international
commerce is a problem with local laws, particularly in regard to copyright and pornography.
Negative effects: the youth may abandon their native culture to borrow others' culture, and
pornography destroys their morals. I refuse to say this, and talk about cultural exchange and how we
have to be smart to take what is good from cultures both native and foreign leave the rest.
If you don't have an Internet connection: If there is an Internet cafe within a reasonable distance,
consider a field trip. The ICT repository includes an offline version of wikipedia that can be put on
your computers for the students to search. They will all look for pictures of Celine Dion and porn, but
that's okay.
Web
○
○
○
○
Definition
Structure
Creation
Publishing
This you don't actually need an Internet connection for, as long as you have some offline versions of
web pages for the students.
Structure: A good website has a three tiered structure so it should ideally never take more than two
clicks for a visitor to get to the information wanted. Look at some websites (offline if need be) as good
and bad examples.
Creation (using HTML): you have two main options here, you can either have them create simple html
documents using word or Libre office (File->new->html document) or you can have them open a blank
document and write their own simple html (save as whatever.html and open with your web browser).
You can use any web page either on or offline as examples. In Chrome, go to the tools menu, and then
16
Tools->view source, or control+u. Some students will sit for hours writing html by hand and playing
with the color codes. I gave them a guide to html tags and left it at that. Html is very easy to write,
everything begins with tags like <> and ends with </>. So <html> hello world </html> will be
recognized by your browser as a web page containing the words hello world.
Publishing: On the off chance that you have a server, you can place the produced web page on the
server and show them how to access it through the network, otherwise mention that it must be on a
server somewhere and talk about how domain names and server space must be purchased. Also
mention free website hosting like google and microsoft.
Networks
○ Introduction to LAN and WAN
○ Physical network topologies
LAN and WAN: LAN stands for local area network, and it's a network that covers a small geographic
area. WAN is wide area network, anything bigger than the other two, for example, the Internet. Make
sure you explain that the Internet is a special type of network, because students tend to think the two
are synonymous. If a network is present in your lab, you can have students send messages to each
other. You can either take the time to set up a small instant messenger program, or you can just have
them open a terminal, look up their IP addresses, and ping each other or the gateway. In windows,
open a command prompt. This will probably be in the start menu under accessories-> command
prompt. It can also be accessed by opening 'run' in the command prompt and typing 'cmd' into the
dialog and then pressing enter. Once the command prompt comes up, type 'ipconfig' into the terminal.
This will tell you your ip address. You can then type “ping <ip address> to send pings to any other
computer on the network. You can also ping your gateway address, which is always your ip address
but ending in 1, so if your ip is 192.168.2 41, your gatway will be 192.168.2.1. In linux, open a terminal
by going to the Applications menu at the top and navigate to Applications->accessories->Terminal. To
find your ip address, type ifconfig. The ping commands are the same as in windows.
Networking components: Ethernet cables are the grey cables that you use for network connections.
The plastic things on the ends are called RJ-45s. You need either a switch or a hub to connect all the
computers into. There is a difference, which for the purposes of the class and the NECTA don't matter,
so assume whatever you have is a switch. It looks like a large box that you can plug everything into. I
have a piece of ethernet cable I cut open to reveal the wires and an RJ-45 that I show the students and I
take them on field trips to my server room and go over all the network stuff in that room. You can
directly connect computers to each other instead of to a switch, but that requires a special type of
ethernet cable called a crossover cable.
Network topologies: Bus topology, Ring topology, star topology. Bus topology has all computers
connected to a central trunk so all computers see all messages. Pros: easy to set up. Cons: doesn't work
well with a lot of computers. Ring topology, all computers are connected together in a circle and
information passes one way around the ring. Pros, you can use lots of computers, cons, if one of them
goes offline, it breaks the network. Star topology (probably what you have in your lab), all computers
connected to a central switch. Pros, works very well for large numbers of computers, easy to manage.
Cons, if the switch breaks, the network goes down. I know of no way to teach this lesson well, I think
it's completely inappropriate for this level.
Multimedia
○ History of multimedia
○ Elements of multimedia
○ Hardware devices necessary for multimedia
○ Sound/video recording and editing
17
History: briefly mention phonographs, black and white films, slide projectors, powerpoints
Elements of multimedia: text, still image, sound, video, animation, interactive components (e.g.
computer games)
hardware devices: newspapers, television, computer, projector, video camera
Sound and video editing: see section 2.9
Computer Evolution
○ Early computer development
○ Computer generations
This is a good lesson for girls' empowerment. Mention Lady Ada Lovelace, the first programmer, and
Rear Admiral Grace Hopper, who built the first compiler. If you want to have that kind of discussion,
you can also mention that Alan Turing (the father of computer science, invented general purpose
computing machines, broke a bunch of Nazi codes with computing during WWII) was a homosexual. I
just made a poster of this stuff with pictures and left it in my lab.
Thing to memorize for the NECTA: the categories of computers as categorized by size. Mainframe,
supercomputers, desktops, laptops, palmtops, microcomputers.
Effects of ICT on society
○ ICT in daily life
○ ICT and effects on awareness, gender, corruption, road safety
○ ICT and crime
○ Information security
○ ICT and employment
○ ICT and cultural interaction
○ ICT hazards—disposing of ICT materials without harming the environment.
I just make the students do the work and assign them to make presentations on the various topics.
18
2.4 - Using Computers to Teach Non-ICT Subjects
Along with this document, you should have been given (or the opportunity to get) the PCV resource
repository. In the Education folder of the repository is a large collection of files that include math and
science subjects in addition to ICT. Useful items include:
Math and science videos: the source of these videos are Khan Academy [www.khanacademy.org] and
Bozeman Science [www.bozemanscience.org], and can be found in the RACHEL folder. Just open the
index file and you’ll find the videos, which are categorized by subject (biology, chemistry, physics, and
lots of math - from arithmetic to calculus). They are further broken down by topics, with individual
videos at 5-10 minutes each.
These videos are excellent for self-paced study, but they are all in English, and not designed around
Tanzanian syllabi. So if possible, it would help to coordinate with fellow teachers at your school in
order to make this resource most effective for your students. Motivated students who aren’t turned
away by the English in these videos could also find them useful, but plan carefully if you wish to make
the videos available for use on multiple computers in a computer lab. They take up a lot of hard drive
space, and the audio portion of the video require that you have headphones, or only a few computers
accessing them at a time so that the audio won’t clash.
Simulations: these are the PhET simulations from the University of Colorado [phet.colorado.edu],
which include physics, biology, chemistry, and math. There are simulations dealing with many
important topics in all those subjects: states of matter, gravity, acidity, magnetism, to name a few.
Again, it helps to have a fellow teacher work with you in using individual simulations, as some of them
are very specific and students may not know how to use them on their own. Each simulation has a
teacher’s guide which will help in designing lessons/labs.
Past NECTA exams for all subjects: Form II, IV, along with some practicals, are included. There are also
some Form VI exams for some subjects. These are actual scanned exams from past years. Most don’t
have the solutions included but students are still eager to look over these to get a sense of what the
exams are like.
Wikipedia: here is a collection of education-related articles (it doesn’t have the whole Wikipedia found
online) that doesn’t require an Internet connection to use. Students love to browse this on their own
because so many pictures are included.
This can be accessed by using RACHEL (go in the RACHEL folder and open the index file), or by
installing a separate program called Kiwix (also included in the PCV repository). The advantage of
using the second method is that a separate database of articles, using simple English, is available. This
database has even fewer articles than the one in RACHEL but as the name implies, it’s written in
simple English which is helpful for students.
19
2.5 - Typing
Justification
Typing skills seem to be rare in Tanzania, which means that teaching them is probably very useful
both for your students and for society. Any organisation in need of a typist should jump at the
opportunity to hire someone who can actually type, and having people around who can type will
greatly improve the efficiency with which computers are used.
Note: If you want to teach typing, it is best to start doing so before your students have had a chance to
use computers very much - if they use computers for a long time without learning to type, they will
learn how to write by "hunting and pecking" for each letter, and it will be difficult for them to unlearn
that habit.
Step 1 - Teaching Technique
The basic technique is very simple and can be taught in 5-10 minutes - teach that the index fingers stay
on F and J, that the other fingers follow on each successive button, and that each finger only goes up
and down, but not side-to-side. You should also be sure that the students understand that, at the
beginning, typing is more difficult than hunting and pecking for each letter, but later it becomes much
easier and faster.
Sometime after the initial introduction, you can teach how the thumbs push the space bar, the pinkies
hold the Shift buttons for capital letters, and the right pinky pushes Backspace to delete and Enter to
start a new line.
Step 2 - Practice
After the basic technique is taught, all that is left is for the students to get practice. It takes a long time
to get good at typing.
Here are a few different ideas for ways in which students can get practice:
1. Free typing games are available, and students love them. See Section 4.2.1. Free Educational
Software to learn about some of the games and how to get them.
2. Other free typing programs are available, though less beloved by students. See Section 4.2.1.
Free Educational Software to learn about some of the programs and how to get them.
3. A simple method is to simply hand out sheets of paper with a lot of text written on them, and
the student's assignment is to type their entire paper up on the computer.
4. One PCV who has no projector combines typing, word processing, and techniques that don't
require a projector: At the beginning of class, one or two new word processing techniques are
explained and the basic method to use them is drawn on the chalkboard. The students are then
told to use the period "typing anything they want", but also trying the new word processing
techniques. Once the students begin, the teacher goes around to make sure that they're typing
properly, to make sure that they all use the new techniques, and to help them with any
difficulty.
20
2.6 - Word Processing
Justification
In one PCV's opinion, half of the importance of computers is word processing, the other half is the
Internet, and everything else is extra.
Aside from gaining very important/useful word processing skills, students can learn general computer
use skills. Teaching word processing can also be combined very easily with teaching typing, English,
Swahili, or language arts.
Teaching Word Processing
If you want to teach word processing, an important step is to decide which skills you want to teach. A
pretty good basic set is this:
Formatting:
○ Capital vs lower-case letters
○ Bold, italic, and underline
○ Text size
○ Font
○ Text color
○ Alignment
Word processor features:
○ Saving and reopening
○ Undo
○ Selection
○ Copy and paste
○ Search and replace
○ Spellcheck
○ Help
In general, a good way to do it seems to be to teach one type of formatting and one feature together,
and then for the next lesson do a new type of formatting with a new feature. Make sure students get
plenty of practice with each skill before moving on to the next, and give them opportunity to review.
One PCV who has no projector combines word processing, typing, and techniques that don't require a
projector: At the beginning of class, a new type of formatting and a new feature are explained and the
basic method to use them is drawn on the chalkboard. The students are then told to use the period
"typing anything they want", but also trying the new word processing techniques. Once the students
begin, the teacher goes around to make sure that they all use the new techniques, to make sure that
they're typing properly, and to help them with any difficulty. Students are allowed to also use
techniques from previous classes, and they often do so on their own initiative.
21
2.7 - Internet
Some ideas for what to do with an Internet connection:
○ Develop a class blog. Have the class write updates and take pictures (if possible).
○ Integrate HIV/AIDS, Malaria, girls empowerment, or any other good topic and assign the
students research projects where they must present both good information they found online
and information they know to be false.
○ Teach the lessons on information dissemination from the NECTA syllabus if you have to follow
it (or just want to).
See section 2.3
○ Show other teachers how to research materials for their classes. If the Internet connection is
good enough, you can work out deals with other teachers to let them have the lab to use
to
show their classes videos or animations.
○ Wikipedia and Project Gutenberg [www.gutenberg.org]. It gives the students something
educational to do online.
○ Let students use the Internet during open lab hours, if you have them.
Some suggestions for things to avoid:
○ If you aren't using it to teach, unplug your Internet connection during class time.
○ Email and social media-they will figure this out on their own if they have open lab hours, and it
is extremely annoying to have a lot of students expecting you to help them access their
accounts when they can't remember their passwords and didn't set security questions. You
may want to go over privacy settings for facebook, however.
22
2.8 - Programming
Experience from one PCV:
Learning to program can be a powerful way for students to learn problem solving and critical thinking
skills. To be successful at it, they must learn to be precise and logical in how they approach problems.
It was for these reasons that I started teaching it to a few of my students.
I knew that it was going to be very labor-intensive on my part to do this, so to keep the class small, I
picked only the best students. I determined this through class attendance and test scores from the
Form 3 streams at my school. I originally asked 11 students to come but due to schedule conflicts or
miscommunication, only three have attended regularly.
I use English while teaching this class. The students with stronger English skills obviously have an
advantage, but I don’t see a way around this problem since using Kiswahili to teach this subject would
be too difficult for me. I do try to make sure all the students are keeping up and let them explain things
to each other in Kiswahili if that helps. Sometimes their explanations go too far or are wrong, though,
so pay close attention when this is happening.
The Python language was chosen since it’s simple to get started with, and can be used to teach
multiple programming paradigms and theories, while being practical as well. I’m trying to follow a
typical introductory computer science curriculum, though I haven’t gotten very far yet.
My students have no prior experience at all with computers. Even though this isn’t a basic ICT course,
they need to learn the basics of navigating the operating system so they can do the coursework.
Specifically, I’ve had to teach:
○ How to start the Python IDE and save a new file - or use any text editor and then save the file as
“.py”. One complication of this is that IDLE, the Python IDE, first starts the interpreter in a shell,
then you must go to “File -> New Window” before it takes you to the code editor. My students
were confused about having to start the program, then taking another step to create a new
window before saving.
○ Also, when saving with IDLE it will prompt to save at the program folder (“C:\Program
Files\Python31”, etc.), and students have to learn to click on My Documents first. Further, they
have to know how to create their own folder under My Documents and to save inside it.
○ How to edit an existing file - this just involves selecting the file in their folder under My
Documents, then either right clicking or going to the File menu, then clicking Edit with IDLE.
But my students needed a few reminders of what “edit” meant.
○ How to type symbols on the keyboard - use of the shift key didn’t come natural to my students.
After letting them know about how to type lower/upper case letters, I showed them the
symbols on the number row and elsewhere. Keep in mind that many keyboards in Tanzania
are UK style which have a different layout, especially with the symbols like #, @, $, etc. If you
have the operating systems of your computer lab set up to use a US keyboard mapping, the
symbols won’t match what’s on the keyboard. But students should get used to this fairly
quickly, either way you set it up.
○ How to use the command prompt - this sounds a bit scary but it hasn’t been too bad for us so
far. I did this to simplify the execute-output process for my students (see observations below).
I made a shortcut to the command prompt under the Python folder of the start menu. It starts
under My Documents, so all they have to do is learn ‘cd <name>’ to get into their folder, then
type the name of the Python script they want to run.
○ Students need to get out of the habit of using the “Run” menu in the IDE, but if you start
teaching using the command prompt method then they wouldn’t pick up this habit in the first
23
○
place. Also, they need to learn to save their code in the editor before running the script in the
command prompt.
How to navigate a PDF book - the textbook we’re using is Think Python (PDF download - online
version). It’s ok; from a teacher’s standpoint I’m not too thrilled with it, but there doesn’t seem
to be too many choices for free books out there. Anyway, my students don’t really understand
the concept that it’s an exact replica of a real textbook. They need to be taught how to scroll
and how to use the table of contents (especially when the pages there don’t match with the
PDF pages).
Other observations:
○ Choosing Form 3 students for this class has been a good decision. Form 4 students are too busy
studying for their NECTAs, and this isn’t a core subject (the computer studies NECTA touches
upon programming topics but is much broader, and the test results don’t really count for
anything). Also, one term isn’t enough to teach all the important topics- I hope to teach the
same Form 3 students through their Form 4 term, if they are able to keep attending.
○ Getting students to use PDF textbooks has been a challenge. Even students with strong English
skills don’t regularly refer to them as they should. Because they don’t see a PDF book as having
the same value as a physical book, because reading English (or reading in general) is difficult,
or some other reason, I’m still not entirely sure. Remember that Tanzanian students are used
to a “copy notes that the teacher writes on a chalkboard” style of learning- maybe you can
write out entire sections of the PDF book, but I haven’t tried this.
○ When using an IDE, even a simple one like the Python Shell, students can get confused with
what the output of a program is. Some of my students still don’t have a clear understanding of
how their code is executed, with output being produced in the Shell window. What was
happening was that when I gave them example problems, saying that their output should look
like that of the solved program I’d written, they would simply go into the output window and
edit it to look like mine. One way I mitigated this problem was by teaching them to use the
command prompt. Instead of running the program from the IDE, I have them save the code,
then run it from the command prompt, which they can’t edit.
Despite the challenges, I’ve already seen the benefit this class has been for some of the students. They
are more comfortable thinking about problems that don’t have immediate answers, or ones that can be
simply recalled from memory. They’ve gotten into the habit of me asking them questions, letting them
think about it, and waiting for their answer or prodding them with hints if they need them.
24
2.9 - Media Design
For many PCV’s media design is often the last computer subject to make it into the lab. However, if you
have the few resources necessary and even just a basic understanding of the fundamentals, media
design can offer an incredibly valuable experience for your students. Not only will it further expose
them to the opportunities working with computers can bring (including employment they have likely
not considered) it can also give them an opportunity to be creative, something that can often be
missing in the Tanzanian schools we work with. Plus, the students love it.
Working with media like photos, music, movies and design can create obstacles especially in the
resource low environments we work in. But as always, it’s easiest to start with what you have. Any
digital camera can be the start of photo or video projects and iPods are a quick start to your very own
recording studio. Then a computer and a host of free open source programming are all you really need
to start projects.
A note on the suggested programs that follow:
While design programs in and of themselves can be difficult to learn, open source design programs
offer unique challenges. However, as with any new program, the more you experiment and learn by
doing, the easier they become.
Design and Illustration:
Open Source Program - Open Office Draw
Equivalent – Adobe Illustrator, Paint
Open Office Draw, which is part of the Open Office software package, is the open source equivalent of
Adobe Illustrator. The program has a number of tools that make basic computer illustration very
simple while offering far more options than a program such as Paint. Start with lessons on basic
shapes, lines and arrows and how to chance their color and outline color. Then move into some of the
tools like arranging and aligning elements, transparency and adding text. Give practical examples and
assignments for how these tools can be used such as using the alignment and text tools to create a
seating or flow chart. Then allow them to use the tools to be creative by asking them to illustrate
things like their dream house or to use the perspective tools and create their own city.
Photography
Open Source Program - Gimp
Equivalent – Adobe Photoshop
Gimp can be a challenging program to figure out at first, but once you understand some of the basic
layout and where to find tools, things become a bit easier. It’s best to always keep the Toolbox and
Layers windows open while working in the program; both can be found in the “Windows” drop-down
menu. (Layers is under either “recently closed docks” or “dockable dialogs”) If you are unfamiliar with
photo manipulation programs, the basics come down to three things: selections, basic manipulation
(colors, filters, etc.) and layers.
Selections
Selections are a key component to understanding photo editing programs. In fact, the first nine tools in
the Gimp toolbox are dedicated just to making selections. While it is arguably the most difficult, I try to
teach the “Paths Tool” for making selections as I find it to be the most useful and adaptable. With the
Paths Tool you can create and edit intricate paths including curves, which is not possible with other
tools. Once you’ve created a path, choose the “Select” drop-down menu and click “from path.” Once the
selection has been created any editing you do will only affect that selection. You can also cut or copy
the selection from one photo and paste it into another photo or photo-collage. For example, if you
want to change the color of a car, simply draw a path around the car, convert it to a selection and
25
change the Hue or Saturation as explained below. Only the color of the area in the selection will
change.
Basic manipulation
Most manipulations can be found under the “Colors” or “Filters” drop-down menus. If you’ve made a
selection, the edits you make will only affect the area selected. Experiment with all of the changes here
until you find the desired effect.
Layers
Layers are used to create photo collages and they work just as you would expect; the layer on the top
of the list will be shown over all the other layers. Regardless of their order, however, you must select
the layer you want to edit in the list of layers to move or make any changes. When you add a new
photo or object to a Gimp project it adds it to the layer palette as a “Floating Selection.” I suggest right
clicking that layer and choosing “New Layer” before making any further changes. If you choose not to
make the floating layer a new layer, Gimp will merge the object with the layer below, which can cause
a lot of confusion further into the project and greatly reduces your ability to change that object.
When demonstrating these tools, consider using photos of the students themselves or of things they
like. My students like to use the photos I have taken of them playing football or photos of cars and
other things they find on Encarta, our digital encyclopedia.
Desktop Publishing:
Open Source Program - Scribus
Equivalent – Adobe InDesign, Microsoft Publisher
Teaching desktop publishing software such as Scribus offers a number of practical and creative
implementations for your students. As with Open Office Draw, consider first demonstrating the
practical uses of the program like combining photos, text and illustrations to create magazine
advertisements or professional letterheads. Then consider more challenging creative applications or
class projects like creating a themed book or school magazine.
Themed Book
One themed book idea could be the ABC’s of your school or Tanzania. Assign each student a letter and
ask them to design a page with photos, text and illustrations that represent the topic and begin with
their assigned letter. “D” for instance could be a page about Dala-dala’s while “Z” could be about
Zanzibar. When everyone has finished, print and compile the pages to form a book. This can also be a
fun project to collaborate with an American school or class on. Ask a teacher in the states to compile a
similar book and exchange them through the mail or online as a combined PDF.
School Magazine
As a school magazine is a larger project, consider creating an after school club to organize and work on
the project. Assign roles and responsibilities such as the executive editor, section and copy editors,
reporters, photographers, a photo editor, a production editor and production artists. (See the attached
organizational chart for more on these roles.) Break the magazine into sections and work on it over
the course of the year.
26
Audio Editing/Song Writing
Open Source – Audacity w/ Lame Library, LMMS (Linux Music Making Studio), MAX
Equivalent – Garage Band
Too much music in a lab can be overwhelming, especially with secondary school students. I suggest
limiting the music making programs to just a few computers or your personal computer and to only
teach the topic to students who show a very strong interest. Consider starting a media club of some
kind that requires students to come in on their own time to work on projects. Many song projects can
also later be used in conjunction with the film projects discussed later.
Audacity with Lame Library
Audacity is a music mixing and editing program. It allows for the importing of a number of music file
types and for basic clipping and manipulation. It offers a long list of effects and allows for nearly
unlimited tracks. Consider lessons on music compilations or song writing. Tubidy.com is a very
useful, quick and searchable site with a large library of popular songs including instrumentals. For
song writing, use the microphone on your computer or voice memo option on your IPod to record
your students playing instruments, rapping or singing. Then combine the track with other recordings
or instrumental versions of their favorite songs. My students in particular enjoy writing their own raps
in English and adding them to instrumental versions of music they’ve heard online or seen in movies
like Step-Up 2.
Note: For MP3 outputs Audacity requires an output directory called Lame Library which can be found
on the Audacity website.
27
MAX
Depending on the type of file that is created when you attempt to record, you may need a fileconverting program like MAX. It is very fast and relatively easy to use. Most of the options you will
need or want (like Formats and Output options) are in the properties menu. (Of the Mac version)
LMMS
LMMS is a beat making and loop program for song writing. Students may find the program frustrating
and challenging at first, but the more they experiment the more successful they will become. Start by
introducing loops and software instruments and maybe adding to or modifying an already finished
song or instrumental. Then consider challenging them to complete an original song of their own.
Movie Making
Open Source Program – AVS Video Editor
Equivalent – iMovie, Windows Movie Maker
I’ve found using a more rigid structure in movie making to be beneficial. Much like the school
magazine project discussed in the desktop publishing section, I suggest giving a group of interested
students a list of roles, responsibilities and duties that they need to perform in order to make a movie
before you start filming. (See the attached “Media Club Project Request Form” as an example.) Include
jobs like a director, producer, editor, camera operator, choreographer and story board/script writer.
Take them through the entire process from the original idea, to writing a script, forming a timetable
and editing the final product. The more work they put in before filming, the less time they are likely to
waste.
When it does come time to film, require them to show you a plan for the day. The plan should show
when you will be shooting, in which location and who will be needed both in and behind the scenes.
When writing the schedule, remind the students that they do not need to shoot the entire movie in
order as scenes can be rearranged in the editing process. As far as equipment is concerned, find one
trustworthy student to operate the camera and keep a close eye on him or her as they shoot. If you
don’t feel comfortable allowing your students to handle the camera, film the shots yourself, but ask the
students to help you plan each shot and to look at the screen before you start each scene.
When it is time to edit, explain the basics of importing and clipping footage, adding music or sounds
and using transitions. Then, let them work on their own, answering questions along the way.
28
29
Part 3 - Computer Lab Management
30
3.1 - User Accounts
If you do not have multiple user accounts set up on your computer, that means that everyone who uses
the computer has "administrator access", which basically means that they are capable of messing up
the computer really badly, either on purpose or by accident. Given students' propensity for
accidentally messing up computers, setting up user accounts is a good way to keep the computers in
good condition.
3.1.1 - Setting Up User Accounts
The procedure for setting up user accounts will vary depending on what operating system your
computers have.
do so:
Windows XP
To set up user accounts on Windows, you must first open the User Accounts Control Panel. To
1. Click on the Start Button.
2. Click on Control Panel.
3. Within the Control Panel, open the User Accounts item.
Once you've opened the User Accounts Control Panel, you should see that it has two areas.
At the top, it should have a section titled "Pick a task...", with the options "Change an account",
"Create a new account", and "Change the way users log on or off".
Below that, it should have a section titled "or pick an account to change", with a list of the
existing user accounts.
If your computer has not had user accounts set up, the list of existing accounts should show
only two accounts, one of which is called "Guest".
We recommend setting your computers up with three accounts - "Admin", "Student", and
"Teacher".
The Admin account will be the only account with administrator privileges, and it will have a
password. You will use it to configure the computer - setting up user accounts, installing or removing
software, updating your antivirus program, et cetera.
The Student account will not have administrator privileges and will not have a password. The
idea is that students (or anybody else) can use it freely, but there is no risk of messing up the
computer.
The Teacher account will not have administrator privileges, but it will have a password. You
should only tell the password to the school's teachers. This account will allow them to work on
sensitive documents, such as upcoming exams, that the students are not allowed to see.
The procedure for creating the accounts is as follows:
1. Click on your (non-Guest) account in the list of accounts at the bottom of the screen.
A new screen should appear that says "What do you want to change about your account?" and has a
list of options.
2. Click on "Change my name", type the name "Admin", and click on the "Change Name"
button.
3. Click on "Create a password" or "Change my password", then enter a new password,
and finally click on the "Create Password" or "Change Password" button. If you trust that you will
remember the new password, you do not need to enter a "password hint" - you can just leave that box
empty.
4. If it asks you "Do you want to make your files and folders private?", click on the
"Make private" button. The Admin account is now ready.
5. Now you will create the Student account. In the upper-left, there is a box called
"Related Tasks" that has four options. Click on the "Create a new account" button in that box.
31
6. A new screen will come that says "Name the new account". Type "Student" for the
name, and then click on the "Next" button.
7. A new screen will come that says "Pick an account type", with the options of either
"Computer administrator" or "Limited". Choose "Limited" and then click on the "Create Account"
button.
8. You will now be taken back to the main screen. The Student account should appear
in the list of accounts at the bottom of the screen. The Student account is now ready.
9. Now you will create the Teacher account. In the "Pick a task..." section, click on
"Create a new account".
10. Type "Teacher" for the account name, and then click on the "Next" button.
11. Choose "Limited" for the account type, and then click on the "Create Account"
button.
12. You will be taken to the main screen. The new Teacher account should appear in
the list of accounts at the bottom of the screen. Click on it.
13. A new screen will come that says "What do you want to change about Teacher's
account?". Click on "Create a password", then enter a password, and finally click on the "Create
Password" button. If you trust that you will remember the password, you do not need to enter a
"password hint" - you can just leave that box empty.
14. If it asks you "Do you want to make your files and folders private?", click on the
"Make private" button. All three accounts are now ready.
If your computer was already set up with multiple accounts, those extra accounts still exist. If
they are not in use, you may want to delete them. This removes clutter and makes the computer easier
to use.
The procedure for removing other user accounts is:
1. Click on Start->Control Panel, and open the User Accounts item.
2. In the list of accounts at the bottom, click on an account that you want to remove.
3. A new screen will come that says "What do you want to change about So-and-so's
account?". Click on "Delete the account".
4. A new screen will come that says "Do you want to keep So-and-so's files?". If you are
not sure what to do, click on the "Keep files" button. If you are 100% certain that there are no
important files on the account's desktop or in its My Documents folder, click on the "Delete files"
button.
5. A new screen will come that says "Are you sure you want to delete So-and-so's
account?". Click on the "Delete account" button.
6. The account will be deleted and you will be taken back to the main screen. If there
are other accounts that you wish to delete, repeat this procedure for each one.
Your computer may also have been set up with a special "Guest" account. You may want to turn
it off, in order to remove clutter and make the computer easier to use.
The process for turning off the "Guest" account is:
1. Click on Start->Control Panel, and open the User Accounts item.
2. In the list of accounts at the bottom, click on the "Guest" account.
3. A new screen will come that says "What do you want to change about the guest
account?". Click on "Turn off the guest account". The account will be turned off and you will be
returned to the main screen.
Linux
Section to be added in the future. For help on this topic, contact one of the PCVs found in
[Appendix E].
32
3.2 - Antivirus
Computer viruses are a serious danger for computers - they can delete or hide your files, reduce your
computers' performance, and even render your computers unuseable. Installing and maintaining
antivirus software on your computers is very important.
Note #1: The vast majority of computer viruses only attack Windows-based computers. If your
computers are running Linux, you do not need to worry about viruses.
Note #2: Sometimes viruses will embed themselves in important operating system files. If this
happens, you cannot safely remove the viruses - your computer must simply remain infected. The only
way to prevent this situation is to get an antivirus program on your computer before it gets infected
with viruses, and to keep your antivirus up-to-date.
Note #3: There are many free antivirus programs available. If you don't know which one to choose, we
recommend Avira Antivirus. However, Avira Antivirus requires that the computer you install it on has
at least Windows XP with Service Pack 3. If it refuses to install on your computer, your version of
Windows is probably too old. You can try another free antivirus program - we recommend Avast
Antivirus. The processes of obtaining, installing, and updating Avast are very similar to those
processes for Avira.
3.2.1 - How to Install Antivirus
There are many free antivirus programs available. If you don't know which one to choose, we
recommend Avira Antivirus.
Note: Avira Antivirus requires that the computer you install it on has at least Windows XP with
Service Pack 3. If it refuses to install on your computer, your version of Windows is probably too old.
You can try another free antivirus program - we recommend Avast Antivirus. The processes of
obtaining it, installing it, and updating it are very similar to those of Avira Antivirus.
The process for installing Avira Antivirus is as follows:
1. Go to Avira's web site at [www.avira.com], find the page for "free antivirus", and download it
(you will actually download its installer).
2. Run the installer (double-click on it).
Note: Due to changes in new versions of the installer, the exact process for using the installer
will change over time and this document may not be up-to-date. In general, follow the
installer's instructions. If this document is up-to-date, the process for using the installer is:
○ Wait while it says "Extracting Files...".
○ Click on the checkbox next to "I accept the End User License Agreement."
○ Click on Next.
○ Click on Next again.
○ Wait while Avira Antivirus is installed.
○ After it finishes installing, it will automatically try to update itself. Wait for the updater
to finish, and then click "Close".
○ After it finishes trying to update itself, it will automatically run a virus scan. Wait for
the scan to finish, and then click "Close".
3. After you finish installing antivirus, you should update it. See the following section, Section
3.2.2 How To Update Antivirus for information on how to update your antivirus.
33
3.2.2 - How to Update Antivirus
If your computer has a good Internet connection, you can update your antivirus program online, which
is easy. If the computer does not have a good connection, you must update the antivirus program
offline, which is harder.
Online
If your computer is connected to the Internet, Avira Antivirus should update itself automatically, so
you don't need to worry about updating.
Offline
If your computer is not connected to the Internet, you must manually update Avira Antivirus. The
process is:
Note: At the time of writing, the company that makes Avira Antivirus recently changed the manual
update process. If this guide does not seem to match up with reality, it's probably because they
changed the process again after this guide was written. Hopefully the process is either the same as, or
similar to, what is written here:
Phase 1: Go somewhere where you have good Internet access, and:
1. Go to Avira's web site at www.avira.com.
2. Click on the "VDF Update" link at the bottom of the page.
3. Download the "Fusebundle Generator".
4. Run the "Fusebundle Generator" program (double-click on it) and wait for it to finish. It should
create a new folder called "install" and a new file called "VDF Fusebundle" inside that new
folder.
5. Open the "install" folder and copy the "VDF Fusebundle" file onto a flash drive.
Phase 2: Go to the computer you want to update, and:
1. Turn the computer on and connect your flash drive.
2. Right-click on the umbrella icon in the lower-right and choose "Start Avira".
3. Click on Update->Manual Update....
4. Find and open the "VDF Fusebundle" file.
5. Wait for the update to complete.
3.2.3 - How to Run Virus Scans
The process for scanning your computer for viruses is this:
1. Right-click on the umbrella icon in the lower-right and choose "Start Avira".
2. Click on "System Scanner" in the list on the left.
3. Right-click on either "Full system scan"* or "Quick system scan"* and then click on "Start scan".
4. Wait for the scan to finish, and then follow the program's instructions (click on buttons that
say things like "OK", "Apply", "Close", and "End").
*A "Quick scan" only scans the parts of your computer where viruses are most likely to be found. A
"Full scan" scans the entire computer, but takes a long time (30 minutes or more). If you have a lot of
time available, do a "Full scan". If you don't have a lot of time available, do a "Quick scan".
34
Note: Sometimes viruses will embed themselves in important operating system files. It is possible that
you might run a virus scan, find viruses, and delete them, only to discover that you just deleted files
that are necessary for your computer to work! If you know enough about computers to know which
files should not be deleted, you can check your virus-scan results and choose which files not to delete.
Otherwise, the only way to prevent this situation is to get an antivirus program on your computer
before it gets infected with viruses, and to keep your antivirus software up-to-date.
3.2.4 - Worst-Case Scenario: Reinstallation
Sometimes a virus cannot be removed, or does so much damage that your computer no longer works
properly. When this happens, the only solution is to reinstall your operating system and all of the
computer's software.
See [Section 3.4 - Reformatting/Reinstalling] for details on how to reinstall your operating system and
software.
35
3.3 - Cleaning Up After Students
Many students, due to their inexperience with computers, have a habit of accidentally clicking on
things that aren't good to click on, dragging things around that shouldn't really be dragged around,
pushing buttons that are best left unpushed, et cetera. The end result of this is that they make a mess
in the computer - they accidentally create files, folders, and shortcuts, move the Taskbar to strange
places, remove buttons from toolbars, et cetera.
If you don't want your computers to become complete messes, you will have to spend some time
cleaning up after your students. This section outlines how to do this.
Note: there is a method to set up your computer such that it will automatically clean itself. This is very
handy, but setting it up this way is very technically challenging. If you think that you are up to the
challenge, see [Appendix D - Windows Profile Management].
Restoring the Taskbar's Location
The Taskbar in Windows is usually found at the bottom of the monitor, and ordinarily cannot be
moved. However, it is possible to "unlock" the Taskbar and then to move it to other locations.
Furthermore, the Taskbar can be resized, and can even be made so small that you cannot see its
buttons. All of these things can be done accidentally by students who are unfamiliar with computers.
To resize: If the Taskbar is unlocked, you can change its width. To do so, hover the mouse over
the Taskbar's edge, and then drag the edge until you have the width you desire. If the Taskbar
is just a very thin line without any buttons, you can use this method to restore it to its normal
size, and its buttons will appear again.
To lock or unlock: Right-click on the Taskbar and then choose "Lock the Taskbar". This will
unlock the Taskbar if it is locked, and will lock it if it is unlocked.
To move: If the Taskbar is unlocked, you can click-and-drag it to any side of the monitor you
wish - the top, bottom, left, or right.
Deleting Files/Folders/Shortcuts
Be on the lookout for accidentally-created files, folders, and shortcuts. To delete them, simply rightclick on them, choose "Delete", and then, when it asks you if you really want to delete the item, click on
the "Yes" button.
Re-Arranging The Desktop
When students attempt to open files or folders, often they accidentally move the mouse while
temporarily holding the left mouse button. Thus, they accidentally drag the file or folder to a random
new location! Moving everything back into an orderly arrangement is easy - just right-click on the
desktop, choose "Arrange Icons By", and then choose "Type" in the submenu.
Removing Toolbar Windows
If a folder is dragged to any edge of the monitor, a "toolbar window" is created along that edge.
Removing toolbar windows is a three-step process.
36
First: Depending on where the toolbar window is located, there is either a vertical bar at the
left-hand side, or a horizontal bar at the top. You must grab this bar with the mouse and drag
the toolbar window into the middle of the screen.
Second: Once the toolbar window is in the middle of the screen, it will have a normal blue bar
along the top and an X button at the upper-right. Click on the X button to close the window.
Third: It will show you a little box called "Confirm Toolbar Close". Click on the "OK" button.
Restoring Window Buttons
When you have a folder open, there is a normal set of buttons and controls at the top of the window things like Forward and Back buttons, an Address bar, etc. By default, these buttons are "locked" and
you cannot change them. However, it is possible to "unlock" them and then to remove them. Unlocking
and removing them can be done accidentally, as can moving them.
Additionally, they can be removed completely, and this can also be done accidentally.
To lock or unlock: Open any folder. At the top of the window, click on View, then on Toolbars,
then "Lock the Toolbars". This will unlock them if they are locked, and will lock them if they
are unlocked.
To move: Each "toolbar" is a long thin strip with several buttons. When the toolbars are
unlocked, each one has a small vertical bar on its left-hand side. You can move the toolbars by
clicking and dragging on the small vertical bars.
To remove or add: At the top of the window, click on View, then on Toolbars, then choose one
of the toolbars. The three toolbars available should be "Standard Buttons" (forward, backward,
up, search, etc), "Address Bar" (self-explanatory), and "Links" (internet bookmarks). Choosing
a toolbar in this way will remove it if it is present, and will add it if it is not present.
Toolbars in OpenOffice or Microsoft Word
The buttons at the top of Microsoft Word or OpenOffice are contained in "Toolbars", which are long
thin strips containing many buttons. Unlike the toolbars at the top of a window, the toolbars in
Word/OpenOffice cannot be "locked", and can very easily get messed up.
Note that the instructions here are written specifically for OpenOffice. Most of these things should be
the same or very similar in Microsoft Word.
To move: At the left side of any toolbar is a vertical line of dots. You can grab this line with the
mouse and use it to drag the toolbar around.
To remove or add: At the top of the window, click on View, then on Toolbars, and then choose
one of the toolbars. Choosing a toolbar in this way will remove it if it is present, and will add it
if it is not present. In word-processing mode, OpenOffice normally only has two toolbars - the
"Standard" toolbar, and the "Formatting" toolbar. In spreadsheet mode, it normally has
"Standard", "Formatting", and "Formula". In slideshow presentation mode, it normally has
"Standard", "Drawing", "Line and Filling", and "Presentation".
37
To remove or add individual buttons: If an individual button is missing from a toolbar, you
can re-add it as follows:
1. At the top of the window, click on View, then on Toolbars, and then on "Customize...".
2. A new window will appear with several tabs. Click on the "Toolbars" tab.
3. Use the drop-down menu at the top to choose the toolbar whose button you wish to readd.
4. In the list of buttons, find the button you want to re-add and check its checkbox.
Toolbars in Mozilla Firefox
The buttons at the top of Mozilla Firefox are contained in "Toolbars", which are long thin strips
containing many buttons. Toolbars can be easily removed by accidental clicks. To add or remove them:
1. Right-click at the top of Mozilla Firefox.
2. Click on the name of the toolbar to be added/removed. Usually you will want to have the Menu
Bar, the Navigation Toolbar, and possibly the Bookmarks Toolbar.
Saving with Automatic Filename Extensions
Note: This section primarily refers to OpenOffice. Microsoft Word probably has a similar issue.
In computers, every file's name ends with a period and then a three-letter code indicating what type of
file it is. These codes are called "file extensions". For example, Microsoft Word documents have a code
of ".doc". PDF files have a code of ."pdf", most music files have a code of ".mp3", programs have a code
of ".exe", etc.
Computers can be configured to either show these codes to you or to hide them. If you have not seen
these codes before, it is probably because your computer is configured to hide them. However, even if
the codes are hidden from view, they still exist and they are very important. If a file's code is missing
or incorrect, the file cannot be used.
When you save a file in OpenOffice, you must type a name for that file. The name must include the file
extension code, or else the file will not work properly. By default, OpenOffice will check the name you
typed, and if you did not type a file extension, OpenOffice will automatically add the correct file
extension for you when you click on the "Save" button.
However, it is possible to turn off this feature. Turning it off can easily be done by accident. If this
feature is turned off, and you save a file without specifically typing in the file extension, the file will be
unuseable.
Teaching students about file extensions and getting them able to properly type the file extension every
time they save is not practical. Thus, this feature of OpenOffice is very important.
To turn this feature on:
1. Create a new file.
2. Click on File and then Save.
3. At the bottom of the window, check the checkbox that says "Automatic file name extension".
4. Click on Save.
38
3.4 - Reformatting and Reinstalling
Sometimes, your computer's software can get messed up, but the computer itself is fine. If the software
is really badly messed up, sometimes the only way to fix the computer is to erase everything on it and
to install your operating system again.
The method to erase everything is called “reformatting”, so this method of fixing your computer is
called “reformatting and reinstalling”.
The process is different depending on which operating system you are using. We have here
instructions for reformatting and reinstalling in either Windows XP or Linux:
3.4.1 - Windows XP
Warning: This section is technically demanding and ideally should be performed by someone who has
at least seen it done before and is familiar with its technical aspects. If you don't know what you're
doing, you can render your computer unuseable. (It will be fixable, but only by someone who
knows what they're doing.)
To reinstall Windows, you first need to get a copy of a Windows installation CD. Hopefully your school
has some. Legal Windows installation CDs are expensive. Illegal Windows installation CDs are illegal.
Both types may be difficult to find.
Assuming that you have an installation CD, the procedure for installing Windows is as follows:
1. Put the CD in the computer you want to install on.
2. Restart the computer.
3. While the computer starts up again, at one point the screen will say "Press any key to boot
from CD...". When it says this, press any button on the keyboard.
4. The computer will show a blue screen with a gray bar at the bottom and will boot up slowly.
Wait for the computer to finish booting up. (When it is ready, it will say "Welcome to Setup".).
5. Push "Enter" to continue. From this point onwards, you will be doing everything with the
keyboard.
6. The computer will show you a legal agreement. Push F8 to accept the agreement.
7. If the computer talks about repairing existing Windows installations, press Escape to choose
"DON'T REPAIR".
8. At this point, you are asked to choose a partition to install on. Probably the computer will only
show you one partition to choose. If so, push Enter to choose to install on that partition.
Otherwise, choose a partition by using the arrow keys and then push Enter to choose one. If
there are no partitions, follow the computer's instructions to create a partition on which to
install.
9. The computer may warn you about choosing to install Windows on a partition that already has
Windows installed. If it does so, press C to choose to continue with the installation.
10. The computer will ask you whether or not to format the partition. Use the arrow keys to select
"Format the partition using the NTFS file system (Quick)" and then push Enter.
11. The computer will double-check if you are sure that you want to reformat. Push F to reformat
the partition.
12. From this point onwards, the install process is easy. It consists of waiting while the computer
installs Windows by itself, and periodically filling in information such as your name and a
name for the computer. Just wait for instructions, and follow the instructions when they arrive.
It should take about half an hour or less.
3.4.2 - Linux
39
Picking a version:
There are a number of Linux distributions, but for the purposes of laboratory installation, Edubuntu is
recommended. Get it here: http://edubuntu.org/download. It is a version of linux specifically
designed for classroom settings and comes with lots of things like typing games. Ubuntu is also very
popular and user friendly, and good for the linux novice. Get it here:
http://www.ubuntu.com/download. The edubuntu packages can be added to it at any time. Unless
you have reliable and reasonably fast, choose what is known as a long-term-installation, otherwise you
will need Internet access in order to keep your system up-to-date.
Installation:
You need some bootable media storage device, cd, dvd, flash drive, whatever that has a linux live
version installed on it. This means that you can boot your computer into linux from that media and
install from there. To make one you need a linux image. You can find these, along with burning
instructions at the linux web page of your distribution. It is also likely that your friendly neighborhood
ICT volunteer will have something on hand. Once you have created your linux live cd or flash drive or
whatever, start the computer with the media attached. When your computer boots up, you will see
some instruction such as press <key> for boot selection menu. Press that key and you will get a menu
allowing you to boot from your external disk. Caution! Some older computers will not boot off usb
drives! Alternatively, you may only see a message that says press <key> for setup/to enter
BIOS/something like that. If that is your only option, use the BIOS (refer to the BIOS guide in Appendix
E) to select your boot options. Once you begin booting onto the live media, you will either see an
option to install as you are booting, or else you will see a linux desktop with an icon giving you install
options. Either way, choose install and follow the directions. Formatting will be done as part of the
install process and you will be able to choose how you want your hard drive partitioned.
40
3.5 - Replacement of Obsolete/Broken Computers
Over time, computers break and go obsolete. The life expectancy of a computer is only several years,
which means that any computer lab will need to be completely replaced once every few years.
See [Section 4.1 - Starting a School Computer Lab] for details on how to get new computers for a lab.
41
Part 4 - Computer Lab Development
42
4.1 - Starting a School Computer Lab
Starting a school computer lab in Tanzania is not easy - most public schools have nowhere near the
financial resources required to purchase their own computers. However, not only can it be done, but it
is done on a regular basis.
Some schools may have the financial resources to buy a lab on their own. Others may be able to find
grant money with which to start a lab. And there are NGOs working in Tanzania with the express
purpose of providing computers to schools.
4.1.1 - NGOs to Contact
A word of caution - there are not nearly enough NGOs around to supply computers to all of the schools
in Tanzania, which means that the NGOs are swamped and may have difficulty supplying your school.
Powering Potential
At the time of writing, Powering Potential provides solar-powered Linux-based computer labs,
teachers, and e-learning content to schools in the Karatu area of Arusha region. They are hoping to
expand to other regions.
Web site: [www.poweringpotential.org]
Email: janicelathen@poweringpotential.org
Phone number: 212-595-3549
Viafrica
Viafrica runs a variety of programs aimed at improving ICT infrastructure and skills in Africa. Tanzania
is one of the countries they operate in, and one of their programs is to donate computers to secondary
schools and provide computer-use training to the schools' teachers. The school is responsible for
providing a suitable computer room and source of power. For a fee, Viafrica will assist with
maintaining the computers and doing additional training.
Web site: [www.viafrica.org]
Phone number: +255 27 2750114
Camara
Camara "recycles" donated computers by reloading them with educational software and sending them
to various African countries, where they are installed in schools. At the time of writing, they do not
work in Tanzania, but they are currently developing a Tanzanian branch. The closest countries they
already work in are Kenya, Rwanda, Uganda, and Zambia.
Web site: [www.camara.ie]
Email: info@camara.ie
4.1.2 - Other Funding Ideas
Aside from being provided computers by an NGO, there are a few other possibilities for getting a
computer lab.
Raising Money
Computers can be purchased in Tanzania for a few hundred thousand shillings. This means that if a
school with a few hundred students were able to increase its school fees by a few thousand shillings
per year, that school should be able to purchase, by itself, a few computers every year.
Partnerships with Foreign Schools or Companies
43
Schools in developed countries - especially private schools - have many computers. Every year, to keep
their computers up-to-date, they must purchase some new computers and get rid of some old
computers. Many businesses manage their computers similarly.
It may be possible for your school to form a partnership with a school or business in a foreign country,
in which that school or business agrees to mail some of its old computers to your school.
The main issues with this idea are shipping costs and import fees. If your school's administration
writes a letter to your district office, it may be possible to have the import fees waived. However, the
shipping costs will still be significant. One NGO shipped sixteen desktop computers, without monitors,
to a school near Karatu, for approximately $3,300.
Grant Money
It may also be possible to get grant money with which to develop a computer lab. One possible grant
option is the US Ambassador's Self-Help Fund. To learn how to apply for it, contact the American
Embassy in Dar Es Salaam.
Phone: 255-22-229-4602
Email: bakerdr@state.gov
4.1.3 - Buying Computers In Tanzania
Computers are available for purchase at many shops in Tanzania. Here is some information about
computer availability, by city:
Dar Es Salaam
There are many computer shops in Dar Es Salaam. Here are two of them:
Lion China Computer L.T.D.
In downtown Dar, near the intersection of Morogoro Road and Libya Street, is a computer shop
called Lion China Computers. They mostly sell desktops, and their prices go as low as about
150,000 /= for a desktop tower.
Phone: 0757830998
Sherman IT & Office Solutions
Sherman IT & Office Solutions operates primarily out of Dar Es Salaam, but also operates in
Tanga. They sell desktops, laptops, and office accessories. Services include system installation,
maintenance, and IDs.
Contact Name: Mr. Isaya
Phone: 0787323446 or 0713464229
Email: hopeji05@yahoo.com
Karatu
In Karatu town, computer availability is very limited.
Hilary Electronics
Hilary Electronics sometimes sells laptops for approximately 400,000 /=. It is located on the
main road in downtown Karatu.
Morogoro
There are probably several places to find computers in Morogoro, but the easiest to find is a store just
down the road from the NBC bank to the main Dala stand, there is a large Microsoft logo painted on the
wall. This store sells laptops and desktops, both for approximately 1,000,000 /=. It also sells mice,
keyboards, and other peripherals if needed.
44
Njombe
Altek
This is a computer shop, Internet café, and actual restaurant all in one, just down the main
road from the bus stand. Many PCVs hang out here for their Internet café needs. Hardware is
limited, but since they do lots of repairs for local residents they tend to have spare parts, or can
help you obtain them if they don’t have what you’re looking for. The owner (Jack) is very
helpful and has dealt with many PCVs and will give reasonable prices.
Tanga
Computer availability is limited in Tanga.
Sherman IT & Office Solutions
Sherman IT & Office Solutions operates primarily out of Dar Es Salaam, but also operates in
Tanga. They sell desktops, laptops, and office accessories. Services include system installation,
maintenance, and IDs.
Contact Name: Mr. Isaya
Phone: 0787323446 or 0713464229
Email: hopeji05@yahoo.com
4.1.4 - Technical Needs of a Computer Lab
Power
The lab must be equipped with electrical sockets that are connected to some sort of power source.
Safety note: if you are using desktop computers, you must be sure that your power source will
not stop, and will not surge, while the computers are running. Desktop computers can be
damaged or even destroyed by power cuts or surges. Voltage stabilizers will help protect
against surges but not cuts.
Power strips/extensions can be used to bring power from the sockets to the computers.
Furniture
The computers need to be placed on tables.
Safety note: be sure that your tables are solid. If a computer is knocked off of a table, the
computer will probably break.
Additionally, there must be enough seats for all of the students who will be using the lab at any
given time.
Security
Computers are valuable, and theft is a problem. Your lab must be secure from thieves.
Any windows should have bars on them.
The lab door(s) should be strong - ideally metal - and will need a lock. Try to limit keys to the lab to as
few people as possible.
Additionally, the walls and roof of the lab should be sturdy.
Cleanliness
45
Computers can be damaged or destroyed by water, dust, and other substances that can get inside.
Therefore, for their protection, the lab must be very clean.
The lab floor should not be made of dirt, and the lab's construction should be good-enough to keep
rain, dust, insects, and small animals out.
For added protection, cloth dust covers can be made to cover the computers.
Students will want to mop the lab floors, and they will splash water over cables and power strips, so be
careful.
4.1.5 - Optional Components of a Computer Lab
Projector
A projector can be very helpful, as it allows the teacher to show something to all of the students at
once. It can be used show how to perform some action on the computer, or to show education content
such as videos and documents.
However, projectors are very expensive.
Speakers
Speakers allow the teacher to show videos with sound to the students. They are not very expensive.
Network
A network allows you to do a variety of things. Here are some examples:
○ You can "share" files between your computers, so that you can save a file only on one
computer, but that file will be available on all of the computers.
○ You can set up networked user accounts, so that you can configure your user accounts on only
one computer, but those accounts will be available on all of the computers.
○ If you have an Internet connection, you can share that Internet connection amongst all of the
computers, so that all of the computers will be able to use the Internet simultaneously.
The downside is that configuring networking equipment is complicated and very technical. If you don't
personally know how to configure a network and you don't know anybody who has done it before, it
will be very difficult.
The price for a 24-port switch (no router) is around 120,000 /= at Dar and major towns.
Internet Connection
Connecting to the Internet can get your school a lot of information very fast, but having computers
with Internet connections can make teaching difficult. The students will tend to ignore the teacher in
favor of surfing the Internet, and some teachers will try to monopolize the lab. Having one or two
computers with a connection for teachers or for demonstration purposes may be a better solution
than trying to connect the entire lab.
The most common way of connecting to the Internet is via individual USB modems. USB modems vary
by price and quality of service varies by provider and region. During PST there should be a session on
personal technology which discusses them in more detail. Connecting a computer using such a modem
to a network, to share its Internet connection, is possible but it will likely be very slow for every user,
especially since most PCVs’ sites don’t have 3G.
Other ways of connecting to the Internet include satellite and DSL. Both are usually too expensive for
PCVs at secondary schools but your situation may allow for it:
46
Satellite: these tend to be slow and low bandwidth. My experience is that a TTCL satellite
connection can work reasonably well if there aren’t too many people using it at once, but
SATCOM does not. SimbaNet is another company that offers satellite service, at the cost of
$885 USD per 3 months. Actual speeds are comparable to ISDN (~128kbps, ~100ms latency at
best).
DSL: if you’re near a main road, you may be able to get land line DSL from TTCL. The price
plans are similar to those of cellular bundles: by volume or by time period, varying between
30,000 /= to 200,000 /= per month. There are also initial costs of about 120,000 /= for
installation and a modem. Service quality will vary, but a good site can get speeds comparable
to what we have in America. Talk to your local TTCL office about the relevant details before
spending any money. Also, be careful about which price plan you use- this will depend on the
size of your computer lab, how many people use the Internet, and your budget.
Tanzania is currently investing in a fiber optic backbone, but this is still under construction and
expensive.
4.1.6 - Setting Up New Computers
Connecting Physical Components
Computer:
Each computer has an electrical cable that must be connected to a socket or power strip. The cable
should only fit in one hole on the computer, so finding the correct hole should be simple.
Monitor:
Monitors usually have two cables - one for electricity, and one to connect to a computer.
The electrical cable must be connected to a socket or power strip. The cable should only fit in one hole
on the monitor, so finding the correct hole should be simple.
The computer-connection cable must be connected between the monitor and a computer. Each end of
the cable should only fit in one hole on the monitor or computer, so finding the correct holes should be
simple.
Keyboard:
Keyboards usually have only one cable that is built-in to the keyboard at one end and is connected to a
computer at the other end.
The end that connects to the computer can come in one of two kinds - it can be either rectangular or
round.
If it is rectangular, it can be connected to any rectangular hole into which it fits on the
computer.
If it is round, it can be connected to a corresponding round hole. However, computers with this
type of hole have two such holes - one for a keyboard, and one for a mouse. The keyboard's
cable must be connected to the keyboard hole. Each hole should be color-coded, and the
keyboard's cable should also be color-coded. Find the hole the matches your cable's color. Also,
although the cable is nearly circular, it is not exactly circular and must be rotated to one
specific direction in order to connect to the hole. Do not force the cable to connect - if you
need to force it, it is not aligned properly, and forcing it thus will break the cable.
47
Mouse:
Mice usually have only one cable that is built-in to the mouse at one end and is connected to a
computer at the other end.
The end that connects to the computer can come in one of two kinds - it can be either rectangular or
round.
If it is rectangular, it can be connected to any rectangular hole into which it fits on the
computer.
If it is round, it can be connected to a corresponding round hole. However, computers with this
type of hole have two such holes - one for a keyboard, and one for a mouse. The mouse's cable
must be connected to the mouse hole. Each hole should be color-coded, and the mouse's
cable should also be color-coded. Find the hole the matches your cable's color. Also, although
the cable is nearly circular, it is not exactly circular and must be rotated to one specific
direction in order to connect to the hole. Do not force the cable to connect - if you need to
force it, it is not aligned properly, and forcing it thus will break the cable.
Speakers:
Speakers usually have only one cable, but sometimes have two.
Usually they have only one small cable with a small round connector; this is connected to a
corresponding small round hole in the computer. Computers usually have more than one such hole one for speakers, one for a microphone, etc. The speakers' cable must be connected to the speaker
hole. Holes are typically either color-coded or have little icons next to them. Look for a green-colored
hole, or one with a picture of headphones next to it; this should be the speaker hole.
Note: Some speakers have a small cable with multiple ends instead of the cable with a small round
connector. Speakers with multi-end cables are meant to be connected to televisions or stereos, and
cannot be connected to computers.
Note: Some speakers also have an electrical cable that must be connected to a socket or power strip.
The cable should only fit in one hole on the speakers, so finding the correct hole should be simple.
Network and Internet equipment:
Currently to be written is a separate section on networking. While physically connecting cables and
other components isn’t difficult, it probably won’t do much good unless you also configure the
software to make the network function. For help on this topic, contact one of the PCVs found in
Appendix E.
Configuring Software
If your computer is used, or is set up in a way that doesn't work for you, you may need to erase
everything on the computer and install it again. This process is called "reformatting and reinstalling".
See Section 3.4. Reformatting/Reinstalling for details on how to reformat and reinstall.
48
4.2 - Improving an Existing Computer Lab
A variety of free software is available that can help you to easily improve the computers in a lab for
either education-specific or general-purpose use.
Additionally, certain hardware accessories can greatly improve the usefulness of a lab.
4.2.1 - Free Educational Software
A collection of educational software, including materials for non-ICT science subjects such as math,
biology, and physics, is available in a PCV-managed repository. These materials are in use in several
PCV sites and are known to be useful to students there.
○ Past NECTA exams: available for all math and science subjects, plus some English ones. Form
II, IV (with practicals), and VI are available in PDF format. A few are available with answer
keys.
○ Wikipedia: a program called Kiwix is available that can read downloaded Wikipedia databases,
meaning you don’t need an Internet connection to use them. Two such databases have been
downloaded by Tanzania PCVs: a “schools” collection of educational articles, and a smaller
“simple English” one that has fewer articles but is written in simple vocabulary to help
students.
○ RACHEL: this is a large collection of educational files which run in a web browser but doesn’t
need an Internet connection. It has a version of the Wikipedia mentioned above, along with ebooks, a medical encyclopedia, a collection of math and science video lessons, and more.
○ PhET simulations: this is a collection of simulations that run in a web browser but again
doesn’t require an Internet connection. They include physics, biology, chemistry, and math
simulations. For example, for physics: a springs simulation that demonstrates the weight of
different masses, where gravity can be adjusted. For biology: a natural selection simulation
that shows the effects of mutations on survival of animals.
4.2.2 - Free General-Purpose Software
○
LibreOffice: this is a free/open source alternative to the Microsoft Office suite, and it used to be
known as OpenOffice and is often still referred to that way. Documents can be saved in the
LibreOffice format, in the Microsoft Format, or exported as PDFs. Get it at:
○ http://www.libreoffice.org/download/
○
Google Chrome: this browser has a nice feature that’s helpful for slow Internet connections:
automatic updates with only differential downloads, meaning it downloads only small amounts
rather than the entire browser when a new version is released. Plus, it’s a very fast browser
overall. Get it at:
○ http://www.google.com/chrome
Note that on Windows, it installs for the current user only. It puts its files in your user profile,
rather than Program Files, meaning it won’t show up for other users.
Also, if you visit the download site from Tanzania, it might try to install a Swahili version. If
you want the English version instead, first go to www.google.com, which will redirect you to
www.google.co.tz. Change that page to English by clicking on “Google.com in English”. Then
click on “Go to Google.com” which should still be in English. Finally, go to
www.google.com/chrome, which should now install the English version.
49
○
7-Zip: this is a free/open source alternative to WinZip that can open many types of files such as
zip, rar, tar, etc. It also has its own 7z format which compresses better than zip in many cases.
Available for Windows and Linux here:
○ http://www.7-zip.org
○
Avira Antivirus: Computer viruses are a serious danger for Windows-based computers - they
can delete or hide your files, reduce your computers' performance, and even render your
computers unuseable. Installing and maintaining antivirus software on your computers is very
important.
There are many free antivirus programs available. If you don't know which one to choose, we
recommend Avira Antivirus, which you can download from [www.avira.com].
Note: However, Avira Antivirus requires that the computer you install it on has at least
Windows XP with Service Pack 3. If it refuses to install on your computer, your version of
Windows is probably too old. You can try another free antivirus program - we recommend
Avast Antivirus, which you should be able to easily find via Google Search.
○
VLC: this is a free media player that is well-known for being able to play most if not all types of
videos, including mp4, flv (Flash), etc. Available for Windows/Linux/Mac here:
○ http://www.videolan.org/vlc
○
SumatraPDF: for Windows, a good alternative is SumatraPDF, which is an open-source, free,
and lightweight reader. The download is 4.7MB, here:
○ http://blog.kowalczyk.info/software/sumatrapdf/download-free-pdf-viewer.html
○
Windows SteadyState: this is a Windows XP management tool intended for Internet cafe
owners running computers that are shared by many different people. It simplifies the process
for keeping your WinXP computers in the same condition by preventing users from changing
things like the desktop wallpaper, taskbar settings, etc. It’s a Microsoft product that’s since
been discontinued, but can still be downloaded here:
○ http://download.cnet.com/Windows-SteadyState/3000-18512_4-11127965.html
4.2.3 - Optional Lab Components
Some components of a computer lab are not strictly required and may not have been added to an
existing computer lab. Nevertheless, addition of these components will increase the usefulness of the
lab. Examples of these types of components include projectors, speakers, networks, and Internet
connections.
See [Section 4.1.5. Optional Components Of A School Computer Lab] for details on the benefits these
optional components bring and how to acquire them.
4.2.4 - Replacement of Obsolete/Broken Computers
Over time, computers break and go obsolete. The life expectancy of a computer is only several years,
which means that any computer lab will need replacement once every few years.
See Section 4.1. Starting A School Computer Lab for details on how to get new computers for a lab.
50
Appendices
In this section you can find appendices about various miscellaneous topics.
Appendix A - Computer Vocabulary
Use this vocabulary to help explain, but it’s best to use the English because of the English environment
on a computer. If explaining in Swahili, even with community members who don’t know English,
saying ku-click, ku-type, or ku-save rather than kuminya, kuchapa, or kuhifadhi will help them learn to
navigate the computer better.
Also, keep in mind that many students may not know the meaning of the Swahili words either, due to
complete lack of previous experience with computers. So you may need to explain every word.
Starting up
wire
insert (as in plugging in)
pull out (as in unplugging)
on/at the wall
turn on
be turned on
shut down
The computer shuts down automatically
Using the mouse
click or press
click on (the X/start/the blue area)
one time
two times
quickly
hold
click and hold
release
move (as in to move something around a little)
move (as in to permanently move somewhere)
take to
drag
go up
go down
arrow
shape
in the corner/on the edge
waya
-chomekea
-chomoa
ukutani
-washa
-waka
-zima
Kompyuta inazima yenyewe
-minya / -bonyeza
-minya kwenye (X/start/buluu)
mara moja
mara mbili
haraka haraka
-shikilia
minya na kushikilia
-achia
-sogeza
-hamisha
-peleka
-buruta
-pandisha
-shusha
mshale
umbo
pembeni
Using windows
symbol, icon
close (beware: kufunga and kuzima can mean the same thing to a
Swahili speaker)
open
maximize
alama
-funga
-fungua
-kuza
51
minimize
-ficha/-shusha chini kwenye
taskbar
-rudisha
restore
Note: Many Tanzanians see scrolling down and say kupandisha. This is because when you scroll down,
the objects in the screen move up. It’s a matter of perspective. Explain that vitu vinapanda, lakini sisi
tunaenda kuangalia chini.
Typing
document(s)
waraka/nyaraka
write
-andika
type
delete
be deleted
press and hold
release
right of
left of
letter(s) (of the alphabet)
capital letter(s)
text
symbol(s)
full stop (i.e. period, but the British say full stop)
paragraph
kichwa
letter (mail)
essay
italics
style
appearance
dictionary
-chapa
-futa
-futwa/-futika
-bonyeza na kushikilia
-achia
mbele
nyuma
herufi
herufi kubwa
maandishi (or just say maneno)
alama
nukta
aya/ibara
heading
barua
insha
herufi zinazolala
mtindo/misura
kamusi
Other
store (save)
-hifadhi
be stored
memory
look for
insert
copy
a copy
draw
-hifadhiwa
kumbukumbu
-tafuta
-ingiza
-nakili
nakala
-chora
52
Appendix B - Computer Safety Concerns
When discussing safety concerns regarding computers, there are basically two categories: the safety of
your students, and the safety of your computers.
Safety of Students
The only safety issue for students is the danger of electrocution. To avoid this, be sure that electrical
wires are properly insulated and hidden away, don't let students poke things in electrical sockets,
don't let students damage the electrical cables, et cetera.
Safety of Computers
There are a variety of dangers to computers:
○ Falling: If a computer is knocked off of a table or is dropped, it can easily be damaged or
destroyed. The same goes for monitors, keyboards, mice, etc. Don't allow running or
roughhousing in your lab.
○
Water, food, and drink: If water, food, or drink gets into a computer, it can easily create short
circuits and damage/destroy the computer. The same goes for monitors, keyboards, mice, etc.
Do not allow food or drink in your lab, and make sure there is no risk of water getting in. If
water, food, or drink should somehow get into your computer, disconnect the computer from
electricity ASAP (with laptops, be sure to remove the battery). Then open the computer up and
do the best you can to dry it out/remove the food before connecting it to electricity again.
○
Incorrect shutdown procedure: If a computer is running and its electricity is turned off, the
computer can be damaged or even destroyed. It is paramount that you teach your students the
correct shutdown procedure (Start->Turn Off Computer->Turn Off->wait several minutes
while the computer turns itself off) and enforce its use.
○
Poor electricity: If your electricity fluxuates a lot or periodically cuts out, it can create all kinds
of problems for both laptops and desktops - damaging the battery, damaging the power supply,
and messing up or even outright destroying the computer. You can check if your electricity
fluxuates a lot by connecting an AVR or AVS (Automatic Voltage Regulator or Automatic
Voltage Stabilizer) and checking to see if it seems to be needing to do work to keep the
electricity stable. If your electricity is unstable, you should connect AVRs or AVSs to all of your
computers. If you are using desktop computers, you should take any precautions you can to
prevent the electricity from suddently cutting out on them.
○
Dust: If enough dust gets into a computer, it can cause problems. Leave the windows closed
most of the time and consider getting cloth dust covers for your computers.
53
Appendix C - Posters in the Lab
Many teachers create instructional posters to help teach a variety of subjects. Here are some ideas for
posters that can help to teach ICT:
Rules
A simple poster that lists the rules of the laboratory can be helpful to remind students of the rules, and
also to provide an easy reference.
How To Shut Down Properly
Students often have difficulty remembering how to shut a computer down properly, so a simple poster
with visual instructions can be a good reminder and reference.
Typing Hand Position
When it comes to typing, understanding the basic method is relatively easy, and it is only practicing
that takes time. A poster can easily show the basic method.
Internet Basics
In one school with no Internet connection, a "getting started with the Internet" poster was created
with four sections:
1. Internet cafe pricing
2. Modem pricing
3. Internet programs - Mozilla Firefox and Internet Explorer
4. Address and uses of Google Search and Google Translate
54
Appendix D - Windows Profile Management
Note: this gets involved with the internal workings of Windows XP, but the resulting benefits are so
great that it’s worth considering if you’re using this OS instead of Linux.
This section contains instructions for creating a default user profile in Windows XP, for the purpose of
resetting the desktop and other software settings on the computer at every boot. With it, students can
use the computer as they wish, changing settings like the wallpaper, program options (toolbars in
applications, etc.), the start menu, and desktop icons. When the computer reboots, a startup script will
automatically wipe out their changes and reset everything back to a default state. With this technique,
the amount of maintenance for cleaning up user settings should be cut down to basically zero.
Below are the overall steps that need to be taken. Details for doing each step follow the list.
1. Set up some prerequisite software.
2. If there isn’t one already, make a student account that’s separate from your administrator
account.
3. Log on as the student account and set up everything as you want a student to see the computer
when they log on. The settings will get backed up into an archive file.
4. Change the location of My Documents (and optionally, Desktop) so that students can still save
files and not lose them when the computer is rebooted.
5. Do a little housekeeping on the account’s files.
6. Create a startup script which, at every boot, will wipe out the user profile and replace it with
the one from the archive.
7. Change Windows settings to use the startup script.
Step 1
Part A) Make a folder to store scripts and other settings on the computer. For this example, let’s make
one called Configs in C: drive. Log on as an administrator, and create a folder in C: (Local Disk) called
Configs.
Part B)If you don’t already have the 7-Zip program, install it. It should be included with this document
you’re reading, if not you can get it at [http://www.7-zip.org].
a. 7-Zip should’ve been installed in C:\Program Files\7-Zip, so go to that folder.
b. You should see a 7z.exe (the Application, not DLL or SFX) file in there. Copy this file.
c. Browse to C:\Windows\System32 and place the copy of 7z here.
Step 2
Part A) This part is needed if there isn’t an account already set up just for students/visitors. Usually if
the computer doesn’t ask for a login, or there’s only one account that shows up when it boots, you’ll
need to do this step. If you already have a separate student account, make sure it’s a Limited account
(not Administrator) and skip to part B.
Go to the Control Panel and click User Accounts. Create a new account and make sure it’s Limited, not
Administrator. For the purposes of these instructions let’s say you name the account Mgeni. Since this is
a public account to be used by students/visitors, it probably doesn’t need a password. Leave that blank
when asked.
Part B) Go to the C:\Configs folder you made in Step 1. In it, make a subfolder called Mgeni (or
whatever your student account is called). This will be used to store that account’s My Documents.
Change that folder’s permissions so that Mgeni has rights to write to it.
55
a.
b.
c.
d.
Right click on the C:\Configs\Mgeni folder and select Properties
Click on the Security tab, then the Advanced button
(If you don’t have a Security tab, just skip the rest of these steps.)
Uncheck the box that reads “Inherit from parent the permission entries that apply to child
objcets. Include these with entries explicitly defined here.”
e. A box should come up asking you to Copy, Remove, or Cancel. Click Remove.
f. Click the Add button
a. Type Mgeni and click OK
b. Another box should come up, here click “Full Control” under the Allow column (the top
left box). All the checkboxes under it should become checked as well. Click OK
g. Click the Add button again
a. Type administrators (be sure it’s administrators, not administrator) and click OK
b. Another box should come up, here click “Full Control” under the Allow column (the top
left box). All the checkboxes under it should become checked as well. Click OK
h. Click OK, and then OK again to complete this step.
Step 3
Log off. Then log on as Mgeni. Set up the desktop, start menu, and program settings (like toolbars and
options in Office, for example) the way you want students to see them. When you’re done, close down
every program but stay logged on.
Step 4
Change the location of where My Documents are stored.
a. Right click on My Documents and click Properties.
b. Under Target, click the Move button.
c. Browse to the C:\Configs\Mgeni folder you made in step 2 and click OK.
d. You will be asked if you want to move the files in the current My Documents folder to the new
one. You probably want to, so click Yes.
Optional: if you also want changes to desktop icons to be saved (e.g., allowing students to save files to
desktop), you’ll need to install Tweak UI and use it to change the location of the Desktop folder.
Step 5
Clean out temp files for this account.
a. Open My Computer
b. Click on the address bar or press F4
c. Type %temp% and press Enter
d. Delete everything in here. Most likely, you’ll get errors trying to remove some of them, but do
what you can. For folders that remain, try to delete them again, individually. This will remove
as many files as possible inside those folders.
Step 6
Log off. Log back on as an administrator. Open up a basic text editor like Notepad and paste in the
following (without the dashed lines):
-----------------------------------------------------------------------------------------if exist \Configs\startup_skip goto end
if not exist \Configs\Profile_Mgeni.7z goto postimage
56
cd "\Documents and Settings"
rd /s /q Mgeni
7z x -y \Configs\Profile_Mgeni.7z
cacls Mgeni /T /E /G Mgeni:F
goto end
:postimage
7z a \Configs\Profile_Mgeni.7z -r "\Documents and Settings\Mgeni" -mx0
goto end
:end
if exist \Configs\startup_skip del \Configs\startup_skip
------------------------------------------------------------------------------------------
Save this file, call it startup.cmd, and put it in C:\Configs
Step 7
Now have Windows use the startup script.
a. Click Start->Run and type gpedit.msc, then Enter
b. Under Computer Configuration, expand Windows Settings
c. Click Scripts (Startup/Shutdown)
d. At the right, double click Startup
e. Click Add
f. Browse to C:\Configs and select startup.cmd
g. Click OK
h. Not done yet - now in the left pane, collapse all the folders so that you see only Computer
Configuration and User Configuration.
i. Expand Computer Configuration, then expand Administrative Templates, then expand System
j. Click Logon
k. At the right, find the option called “Always wait for the network at computer startup and logon”
and double click it
l. Select Enabled and click OK
Now it’s pretty much done - you’re almost ready to have a beer. The next time you boot up, the
computer will take longer to boot. Maybe up to 5 minutes, because it’s creating a backup of the current
Mgeni profile. Ok might as well get your beer while waiting.
Test your work by logging on as Mgeni, making changes to the wallpaper, Microsoft Word toolbars, etc.
Save something in My Documents. Reboot, wait for the script to finish, and log on as Mgeni again.
Everything should be reset, except the file you saved in My Documents should still be there.
On subsequent boots, the computer will still be slower than before, as it needs to do the wiping and
restoring, but an added 2-3 minutes to booting up is worth not having to clean up by hand. The
computer shouldn’t be any slower once the welcome screen appears.
IMPORTANT: In the future, if you want to make changes to the Mgeni account, like setting up a newly
installed program, etc., follow this procedure:
a. Reboot, so that the profile gets reset again
57
b. Delete the file C:\Configs\Profile_Mgeni.7z
c. Log on as Mgeni and make the desired changes
d. Reboot. This will make the startup script create a new profile archive.
What the script does
This script does a few things which you should understand so you can troubleshoot and possibly make
modifications to suit your purposes. First, you might want to know what a user profile is. In Windows,
all your settings like the desktop icons, wallpaper, My Documents, and program settings are stored in
files inside a folder. This folder is in C:\Documents and Settings for Windows XP. So for an account
called Mgeni, the profile is stored in C:\Documents and Settings\Mgeni. If you look in that folder
you’ll see the Desktop, Start Menu, My Documents, etc. What we’re doing with the script, after you’ve
set up the account to a pristine state, is to back up the entire profile and put it into a 7z archive. (7z is
like a zip file.)
On to the script itself. This is what will happen every time the computer boots:
if exist \Configs\startup_skip goto end
First, it won’t do anything if it finds a file called "startup_skip" in the C:\Configs folder. This is useful
when you’re making changes or testing something and don’t want the script to run. Usually, the script
takes 2-5 minutes to run, so using the startup_skip file makes booting faster (but please understand
the consequences). If you want to do this use ‘touch’ or Notepad to save the file in C:\Configs (make
sure to type "startup_skip" with the quotes if using Notepad, otherwise it’ll make a file called
startup_skip.txt instead, which is wrong). It doesn’t matter what’s in the file, or even if it’s empty. It
will also automatically get deleted, so that on subsequent boots the startup script will run normally.
if not exist \Configs\Profile_Mgeni.7z goto postimage
Next, the script checks to see if a profile archive already exists. The first time you use the script, or if
you want to make changes to the Mgeni account (more on this later), it will skip to the postimage part
of the script since the archive will not exist. The assumption is that you’ve just made a pristine profile
and want it to be backed up, so it will skip the wiping part and create an archive of the existing profile.
7z a \Configs\Profile_Mgeni.7z -r "\Documents and Settings\Mgeni"
Under the postimage section is the command to make a 7z archive of the current Mgeni profile.
If the Mgeni archive already exists, then the script proceeds to wipe out the current profile, then
unpack (restore) the archived one.
cd "\Documents and Settings"
rd /s /q Mgeni
7z x -y \Configs\Profile_Mgeni.7z
cacls Mgeni /T /E /G Mgeni:F
// Change to the Documents and Settings folder
// Delete the Mgeni profile
// Unpack the archived Mgeni profile
// Grant permissions to Mgeni account
The last line above grants permissions to the Mgeni account to use the profile that was just unpacked.
If you didn’t see a Security tab from the step 1 instructions, you might want to delete the line (starting
with cacls) but it should be fine even if you leave it.
Additional power tip
One other tweak that’s been helpful for me is to prevent the “All Users” start menu items from
appearing by default for everyone. Usually, when you install a program, items are added to the All
Users Start Menu folder. If you’ve installed Microsoft Office, it’s probably in there. This lets everyone
use the shortcuts, regardless of what account they’re logged in as.
You might want finer control over student start menus for administrative purposes. For example, if
you occasionally test new software that you’re thinking about letting students use, you might not want
students to use it quite yet, but allow yourself access to it via the administrator account. Then when
58
you’re ready to allow students access to that program, make a copy of the start menu item to theirs.
Here’s how to accomplish this:
1. If you’re using the profile reset technique described above in conjunction with this tweak,
delete the profile archive (C:\Configs\Profile_Mgeni.7z) before making changes.
2. Temporarily give the student account (Mgeni in my example) administrator access. Log on as
an administrator, go to the Control Panel, then User Accounts, and change the Mgeni account to
be an Administrator.
3. Log off, and back on as Mgeni.
4. Click Start->Run, type gpedit.msc, then Enter
5. Under User Configuration, expand Administrative Templates
6. Click Start Menu and Taskbar
7. At the right, find the option “Remove All Programs list from the Start menu” and double click it
8. Click Enable
9. Click OK
10. Log off, and back on as an administrator
11. Revoke the administrator access to Mgeni. Go to Control Panel, User Accounts, then change the
Mgeni account back to Limited.
12. Copy shortcuts to programs that you want the Mgeni to be able to access to C:\Documents and
Settings\Mgeni\Start Menu (or the Programs subfolder).
As I explained before, in C:\Documents and Settings, user profiles are stored by account name (e.g.
C:\Documents and Settings\Mgeni). There’s also one called All Users, which has its own Desktop,
Start Menu, etc. By default, anything in the All Users Desktop and Start Menu appear on everyone’s
Desktop and Start Menu, respectively. Now, things in C:\Documents and Settings\All Users\Start
Menu (this is where shortcuts for most of your programs should be) will no longer appear for Mgeni.
For any program that you want your students to be able to use, they must have a shortcut in
C:\Documents and Settings\Mgeni\Start Menu.
59
Appendix E - BIOS Guide
Introduction
This guide will be about some basic things we can do in a BIOS (Binary Input Operating System); topics
covered will include accessing the BIOS, changing the time and date settings, and changing the boot
order. A very common problem found in desktop computers in Tanzania is a faulty (ie dead) CMOS
battery, which causes all data stored in the BIOS to be lost, especially in older computers (like most of
the ones found in Tz); specifically, the system clock will be reset to January 1, 1970 which causes your
OS (windows, linux, etc) to malfunction. Another problem with Tanzanian computers is that from time
to time they may need an operating system (re)installed, and you might need to change the boot
device order. This setting is stored in the BIOS as well.
Your BIOS
60
Getting into your BIOS is as easy as hitting the DEL key as soon as your system starts to spit gibberish
onto the screen. You might even see a Splash screen instructing you to hit DEL, but this isn't always the
case. If mashing the DEL key doesn't do the trick (some OEM setups, notebooks, and older PCs use a
different key), try punching F1, F10, or the ESC key. BIOSes tend to differ depending on the company
and the particular hardware it's running on, so the following picture will probably not look like the
one you'll get on your monitor.
Once you're in the BIOS, you'll see some screens of text and various menu options.
Changing Date and Time
Basically follow the instructions on the screen to figure out how to change the date time settings. If you
find yourself doing this more than once per computer, it's probably time to buy a new battery. It'll
likely be a CR2302 battery, aka a watch battery, so you can try asking the fundis in your banking town
where to buy in bulk. Price: 5,000 shillings each?
Changing Boot Order
61
Primary means first, as in that will be the medium the computer looks at first for instructions on what
operating system to load. Typically this is either a floppy drive or a hard drive. If you're trying to
install windoze or linux from a CD, then the CD-ROM drive needs to be in this space; if you are loading
linux off a flash drive, then the USB Drive or USB CD-ROM drive should be the primary boot medium.
Secondary is typically the hard drive, and tertiary tends to be network boot, but we don't really care
about that stuff.
Once you've installed your favourite operating system, you'll need to go back into the BIOS and change
the boot order such that the hard drive is the primary boot medium.
Checking for Bad Cables
Every once in a while you'll encounter a computer with all of the hardware properly installed, but for
some unknown reason it still refuses to work. You can use the BIOS to check if the hardware
(specifically CD-ROM and hard drives) show up under the device tab. If they don't, then that means the
cable between said piece of hardware is bad and needs to be replaced.
Notes
There's a ton of things you can change in the BIOS. However, a badly configured BIOS can mean a nonoperable computer. Unfortunately, navigating the BIOS for an inexperienced user can be a frustrating
experience. If you think maybe a BIOS is not configured properly (or if your CMOS battery died and
you think some extra settings need to be changed beyond just the time/date setting), your best bet
would be to find an ICT/techy volunteer, or a computer fundi.
62
Appendix F - Contacting PCVs
If you have questions, would like advice, or if you want to give feedback/contribute to the Shika
project, here is contact info for the ICT-teaching Peace Corps Volunteers who wrote this book:
- Beth Crompton: j.e.crompton@gmail.com
- Chris Paff: paff00@gmail.com
- Josh Zamor: jzamor@gmail.com
- Philip Chui: philipchuimakete@gmail.com
- Tyler Jump: tyjump@gmail.com
63
Download