FACILITATOR CALA GUIDE
LEARNING AREA: SCIENCE
SUBJECT: COMPUTER SCIENCE
LEVEL: FORM 4
SYLLABUS TOPIC: SECURITY AND ETHICS, UNHU/UBUNTU (Syllabus page 23)
SUB- TOPIC: DATA PROTECTION MEASURES
CALA TYPE: PRACTICAL INVESTIGATION
DURATION: 2 WEEKS
COMPETENCIES/SKILLS:
Research, Critical Thinking, Technological, Problem-solving, Security and Ethical Principles,
Financial Literacy, Collaboration, Disaster Risk Management
DIMENSIONS/ CRITERIA TO BE ASSESSED
• Identifying data security risks.
• Collecting data using the relevant research instruments
• Identifying all the possible remedies for the data security risks identified
• Costing all the possible remedies for the data security risks identified.
• Writing a detailed report with recommendations.
OBJECTIVES TO BE ACHIEVED
By the end of the CALA the learner must be able to:
• Identify data security risks
• Collect data using relevant research instruments
• Identifying all the possible remedies for the data security risks identified
• Costing all the possible remedies for the data security risks identified.
• Write a detailed report with recommendations.
CALA CONTEXT
Often the issue of data security is taken for granted in most schools. Computer laboratories and
school offices do not have adequate data security measures to protect the valuable personal data
Page 1 of 6
stored in computer systems. Learners to investigate the data security risks for the school’s
computer laboratory and administration offices and submit findings.
FACILITATOR TIPS
• To encourage learners to identify and carry out research on data security issues affecting
the computer laboratory and the school’s administration offices.
• Teacher to instruct learners to follow the major principles of data collection
• Learners encouraged to do a cost analysis of all the data protection measures
• Teacher to encourage learners to produce a detailed report with recommendations
Page 2 of 6
LEARNER CALA GUIDE
LEARNING AREA: SCIENCE
SUBJECT: COMPUTER SCIENCE
LEVEL: FORM 4
SYLLABUS TOPIC: SECURITY AND ETHICS, UNHU/UBUNTU (Syllabus page 23)
SUB- TOPIC: DATA PROTECTION MEASURES
CALA TYPE: PRACTICAL INVESTIGATION
DURATION: 2 WEEKS
BACKGROUND
Often the issue of data security is taken for granted in most schools. In most schools’ computer
laboratories and school offices there are inadequate data security measures to protect the valuable
personal data stored in computer systems. You are required to investigate the data security risks
for your school’s computer laboratory and administration offices and submit your findings.
The CALA has two parts, namely Activity 1 an Activity 2. You are advised to do both parts.
ACTIVITY 1
• Inspect the school’s computer lab and the school administration offices and identify all
the data security risks.
• Identify all the possible remedies for the data security risks identified.
ACTIVITY 2
• Do a cost analysis for each possible remedy identified in Activity 1.
• Write a detailed report to your school’s administration on the data security issues
affecting the computer laboratory and the school’s administration offices and suggest
recommendations that can be implemented based on your cost analysis.
HOW WILL THE LEARNER BE ASSESSED?
ACTIVITY 1
• Conducting detailed research
• Explaining in detail all the data security risks
• Identifying all the possible remedies for the data security risks identified
ACTIVITY 2
Page 3 of 6
• Costing all the possible remedies for the data security risks identified.
• Writing a detailed report with recommendations.
LEARNER CALA TIP
• Ensure your risks are clearly explained and not just a summary of points.
Page 4 of 6
MARKING GUIDE
DIMENSION
Identifying Key threats to data security (1 mark each)
Security risks 1
8(Any other relevant point) 1
1
1
1
8 Marks
1
1
1
Possible remedies Possible remedies for security risks identified (1 mark
for security risks each) 1
identified 8 (Any other relevant point) 1
1
1
1
1
8 marks 1
1
Cost analysis for Cost analysis for each possible remedy
each possible (1 mark for each correct category) 1
remedy Cheap 1
Expensive 1
3marks
Most Expensive
Report Writing Report writing (2 marks each)
2
6 marks
1. Clear outline of observations 2
2. Clear outline of possible recommendations 2
3. Relevancy to the identified problem
Page 5 of 6
ACHIEVEMENT STANDARD SCHOOL NAME: JOHN TALLACH HIGH SCHOOL
LEARNING AREA: COMPUTER SCIENCE LEVEL: FORM 4 TITLE: PRACTICAL INVESTIGATION CALA 5
DURATION: 2 WEEKS
DIMENSIONS/
CRITERIA
8 8-7 7-6 6-5 5-4 3-1
Develop an ability to Excellent research and Very Good research and Good research and Unsatisfactory research Attempted to
utilise research skills to communication skills managed communication managed to communication managed and communication obtain
identify data security to identify 8 data security risks. identify at least 6 data to identify at least 4 data managed to identify 4 meaningful data.
risks security risks. security risks. data security risks.
11 11-9 9-7 7-6 6-5 5-1
Develop strong skills in Very strong capabilities, More than sufficient managed Sufficient capabilities Unsatisfactory Attempted to
identifying possible managed to identify 8 possible to identify 6 possible managed to identify 6 capabilities managed to identify possible
data protection remedies and do a cost analysis remedies and to do a cost possible remedies. identify 5 possible data protection
remedies for each remedy analysis for each remedies. remedies.
6 6 5 4 3 2-1
Develop report writing Exceptional techniques in report Good capabilities in report Satisfactory capabilities Unsatisfactory Attempted to
skills writing skills showing relevance writing skills showing all in report writing showing capabilities in report write a report.
to all the observations and clear observations and all the observations. writing.
recommendations recommendations.
Page 6 of 6