0% found this document useful (0 votes)
37 views6 pages

CALA 5 Guide

This document provides guidance for a 2-week practical investigation CALA on data protection measures for Form 4 computer science students. The CALA involves identifying data security risks and remedies at the school's computer lab and offices. Students will inspect the facilities, identify risks, propose remedies with cost analyses, and submit a written report with recommendations. They will be assessed based on their research and problem-solving skills, identification of risks and remedies, cost analyses, and the quality of their written reports.

Uploaded by

we.wack.23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views6 pages

CALA 5 Guide

This document provides guidance for a 2-week practical investigation CALA on data protection measures for Form 4 computer science students. The CALA involves identifying data security risks and remedies at the school's computer lab and offices. Students will inspect the facilities, identify risks, propose remedies with cost analyses, and submit a written report with recommendations. They will be assessed based on their research and problem-solving skills, identification of risks and remedies, cost analyses, and the quality of their written reports.

Uploaded by

we.wack.23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

FACILITATOR CALA GUIDE

LEARNING AREA: SCIENCE


SUBJECT: COMPUTER SCIENCE
LEVEL: FORM 4
SYLLABUS TOPIC: SECURITY AND ETHICS, UNHU/UBUNTU (Syllabus page 23)
SUB- TOPIC: DATA PROTECTION MEASURES
CALA TYPE: PRACTICAL INVESTIGATION
DURATION: 2 WEEKS

COMPETENCIES/SKILLS:
Research, Critical Thinking, Technological, Problem-solving, Security and Ethical Principles,
Financial Literacy, Collaboration, Disaster Risk Management

DIMENSIONS/ CRITERIA TO BE ASSESSED


• Identifying data security risks.
• Collecting data using the relevant research instruments
• Identifying all the possible remedies for the data security risks identified
• Costing all the possible remedies for the data security risks identified.
• Writing a detailed report with recommendations.
OBJECTIVES TO BE ACHIEVED
By the end of the CALA the learner must be able to:
• Identify data security risks
• Collect data using relevant research instruments
• Identifying all the possible remedies for the data security risks identified
• Costing all the possible remedies for the data security risks identified.
• Write a detailed report with recommendations.

CALA CONTEXT
Often the issue of data security is taken for granted in most schools. Computer laboratories and
school offices do not have adequate data security measures to protect the valuable personal data

Page 1 of 6
stored in computer systems. Learners to investigate the data security risks for the school’s
computer laboratory and administration offices and submit findings.

FACILITATOR TIPS

• To encourage learners to identify and carry out research on data security issues affecting
the computer laboratory and the school’s administration offices.
• Teacher to instruct learners to follow the major principles of data collection
• Learners encouraged to do a cost analysis of all the data protection measures
• Teacher to encourage learners to produce a detailed report with recommendations

Page 2 of 6
LEARNER CALA GUIDE
LEARNING AREA: SCIENCE
SUBJECT: COMPUTER SCIENCE
LEVEL: FORM 4
SYLLABUS TOPIC: SECURITY AND ETHICS, UNHU/UBUNTU (Syllabus page 23)
SUB- TOPIC: DATA PROTECTION MEASURES
CALA TYPE: PRACTICAL INVESTIGATION
DURATION: 2 WEEKS

BACKGROUND
Often the issue of data security is taken for granted in most schools. In most schools’ computer
laboratories and school offices there are inadequate data security measures to protect the valuable
personal data stored in computer systems. You are required to investigate the data security risks
for your school’s computer laboratory and administration offices and submit your findings.

The CALA has two parts, namely Activity 1 an Activity 2. You are advised to do both parts.
ACTIVITY 1
• Inspect the school’s computer lab and the school administration offices and identify all
the data security risks.
• Identify all the possible remedies for the data security risks identified.

ACTIVITY 2
• Do a cost analysis for each possible remedy identified in Activity 1.
• Write a detailed report to your school’s administration on the data security issues
affecting the computer laboratory and the school’s administration offices and suggest
recommendations that can be implemented based on your cost analysis.
HOW WILL THE LEARNER BE ASSESSED?
ACTIVITY 1
• Conducting detailed research
• Explaining in detail all the data security risks
• Identifying all the possible remedies for the data security risks identified

ACTIVITY 2

Page 3 of 6
• Costing all the possible remedies for the data security risks identified.
• Writing a detailed report with recommendations.
LEARNER CALA TIP
• Ensure your risks are clearly explained and not just a summary of points.

Page 4 of 6
MARKING GUIDE
DIMENSION
Identifying Key threats to data security (1 mark each)
Security risks 1
8(Any other relevant point) 1
1
1
1
8 Marks
1
1
1

Possible remedies Possible remedies for security risks identified (1 mark


for security risks each) 1
identified 8 (Any other relevant point) 1
1
1
1
1
8 marks 1
1
Cost analysis for Cost analysis for each possible remedy
each possible (1 mark for each correct category) 1
remedy Cheap 1
Expensive 1
3marks
Most Expensive
Report Writing Report writing (2 marks each)
2
6 marks
1. Clear outline of observations 2
2. Clear outline of possible recommendations 2
3. Relevancy to the identified problem

Page 5 of 6
ACHIEVEMENT STANDARD SCHOOL NAME: JOHN TALLACH HIGH SCHOOL
LEARNING AREA: COMPUTER SCIENCE LEVEL: FORM 4 TITLE: PRACTICAL INVESTIGATION CALA 5

DURATION: 2 WEEKS

DIMENSIONS/
CRITERIA

8 8-7 7-6 6-5 5-4 3-1

Develop an ability to Excellent research and Very Good research and Good research and Unsatisfactory research Attempted to
utilise research skills to communication skills managed communication managed to communication managed and communication obtain
identify data security to identify 8 data security risks. identify at least 6 data to identify at least 4 data managed to identify 4 meaningful data.
risks security risks. security risks. data security risks.
11 11-9 9-7 7-6 6-5 5-1

Develop strong skills in Very strong capabilities, More than sufficient managed Sufficient capabilities Unsatisfactory Attempted to
identifying possible managed to identify 8 possible to identify 6 possible managed to identify 6 capabilities managed to identify possible
data protection remedies and do a cost analysis remedies and to do a cost possible remedies. identify 5 possible data protection
remedies for each remedy analysis for each remedies. remedies.
6 6 5 4 3 2-1
Develop report writing Exceptional techniques in report Good capabilities in report Satisfactory capabilities Unsatisfactory Attempted to
skills writing skills showing relevance writing skills showing all in report writing showing capabilities in report write a report.
to all the observations and clear observations and all the observations. writing.
recommendations recommendations.

Page 6 of 6

You might also like