Student Mobile Guide
Student Mobile Guide
LITERACY
FACILITATORS GUIDE
Table of Contents
South Africa is a mobile first country. Like other countries throughout the African region, a significant
number of people have access to smartphones but with limited or no accesses to computers
especially in rural, semi-rural and township communities. Nevertheless, limited access to digital
devices and the Internet prevents citizens to access opportunities that can help facilitate their social,
financial, and other forms of development such as to learn basic digital skills in order to improve their
lives and advance careers.
Digital literacy refers to the necessary competencies and skills required by individuals to take part in
today’s digitally driven society 3. The competencies are important as most of society is driven by
online communication or correspondence, access to technological devices and social media. Having
the necessary basic digital literacy skills is critical to work, live and be a productive member of the
modern world.
In order to better understand the need for digital skills, Prof Walter Claassen alongside the Western
Cape CoLab developed the Digital Skills Framework One (DSF One) to address the basic digital
skills individuals require to perform the necessary tasks in a digital driven society. This framework
was designed in a South African context to pinpoint the necessary digital skills required by South
African citizens. The researcher stated that digital skills should be applicable and relative to specific
areas of life 4. These specific areas can be defined as digital dimensions 5. The digital dimensions
are as follows: digital literacy skills, user digital skills, ICT practitioner skills and e-leadership skills.
For the purpose of this guide, we will focus on basic digital skills and user skills.
Figure 1, under the heading User digital skills, the user skills are highlighted from number 1 to 6. The
user skills include managing and handling information raw data and digital content, online
communication skills, online content creation, safety and security problem solving and digital
transaction skills 6. While the basic digital skills necessary to perform the tasks are shown right below
each task. It should be noted that certain digital skills have levels of difficulty. In order to illustrate
the levels, Claassen incorporated The Digital Competence Framework for Austria – DigComp
(2021), the framework grouped the levels of difficulty into groups 7. The groups are as follows,
Foundation skills (A-B), Intermediate skills (C-D), Advanced skills (E-F) and Highly specialised digital
skills (G-H). Each group/dimension of digital skills all have levels of proficiency. Each digital skill was
aligned to the level of proficiency an individual requires to use the digital skill. For example, browsing
the internet is a relatively simple task, therefore it is considered a foundational skill.
pg. 4
1. United Nation Human Rights Council Resolution, (2018, 04 July). The promotion, protection and enjoyment of human rights on
the Internet.
2. Jacob Poushter, (2016). Pew Research Report. Smartphone Ownership and Internet Usage Continues to Climb in Emerging
Economies.https://www.pewresearch.org/global/2016/02/22/smartphone-ownership-and-internet-usage-continues-to-climb-in-
emerging-economies/
3. Western Sydney University, (2020, 26 November). What is Digital Literacy?
https://www.westernsydney.edu.au/studysmart/home/study_skills_guides/digital_literacy/what_is_digital_literacy
4, 5, 6. Claassen, W. (2021). Digital Skills Framework One. Unpublished framework. CoLab for e-Inclusion and Social Innovation.
7. Republic of Austria. Federal Ministry for Digital and Economic Affairs. (2021). The Digital Competence Framework for Austria –
DigComp 2.2 AT. Vienna, 7, July.
Figure 1: Digital skills Framework One (Source: Claassen, 2021:1)
pg. 5
Purpose of the Mobile Literacy course
The Mobile Literacy course was designed to fill the lack of digital skills gap by focusing on stimulating
interest in acquiring basic digital skills using mobile devices such as smartphones and tablets
ensuring that communities with no computer infrastructures do not miss opportunities the fourth
industrial revolution (4IR) and digital technology presents.
The Western Cape CoLab developed this course to enhance the level of understanding and
competency of targeted groups with respect to the use of mobile technology (e.g., smartphones and
tablets). The key reasons for focusing on this technology include:
• An introduction to the basic concepts and principles of using mobile (digital) technology.
• To inspire confidence in using mobile application in conducting day to day personal and work
activities.
• This course is presented as a one-day short course with information, sharing videos and
practical exercise (allow a total of 6-8 notional hours).
pg. 6
1.3. Course Outcomes
6 Using Mobile Application for Self- Handling Information, Data & Digital Content
Development • Using Google for Information Search
• Using Google applications to create an • Using YouTube to access educational
online profile materials
pg. 7
On completing this course participants should understand:
• What is the Forth Industrial Revolution and how it affects their lives?
• Concepts mobile devices and applications
• Concepts related to the internet connectivity
• Concepts related to Smartphone applications
• How applications can be used to help with day-to-day activities and challenges
pg. 8
1.4. Digital Skills Framework One Alignment with Course Outcomes
The table below illustrate how Mobile Literacy course exercises align with the Digital Skills Framework categories and objectives.
Figure 2: Digital skills Framework One amended (Source: Claassen, 2021:1; Nhlapo, 2022)
pg. 9
1.5. Course Assessment Approach
• Participants in the face-to-face facilitated sessions are to be encouraged to engage in
discussions and complete all practical exercises during their sessions. The facilitator will
assess understanding during interactions. Based on observations and participants’ feedback
future session delivery can be improved.
• Participants undertaking the course online (via a dedicated Learning Management System)
will be required to go through all compulsory activities and complete all quizzes and exercises
to reach course completion stage.
At the end of each respective course, feedback forms are to be completed. These serve as formative
assessments to be used for course revision and enhancement. Certificates of Attendance are
distributed to all delegates via email.
pg. 10
2 COURSE RESOURCES AND CONTENT
• 4IR https://youtu.be/GqdHeWKUo6I
• 4IR Technologies Explained https://youtu.be/Zv6UK96e6lY
• Conneting to Internet https://youtu.be/LdipiqMwvXg
• Understanding Apps https://youtu.be/fH1ciDI6gY4
• How to create a Gmail Account https://youtu.be/mYLjEkbuFR8
• Google Drive https://youtu.be/f6wlvFgieoc
• Google Calender https://youtu.be/HGWOe_xtzEU
• Google Maps https://youtu.be/8TQxTrFQXRY
• Google Docs https://youtu.be/LNBk4rTRM-s
pg. 12
3. THE DIGITAL AGE AND 4TH INDUSTRIAL REVOLUTION
This section focuses on giving a brief explanation on what the Fourth Industrial
Revolution is including 4IR Technologies
Section Participants will get a general understanding of what is 4IR and how it affects
Overview their lives. The benefit of gaining this understanding is the reduction of concern
relating to misunderstandings or uncertainty associated with digital technology,
and how it benefits human lives.
Time Estimate 15-20 minutes
The speed, breadth and depth of this revolution is forcing us to rethink how countries develop, how
organisations create value and even what it means to be human. The Fourth Industrial Revolution
is about more than just technology-driven change; it is an opportunity to help everyone, including
leaders, policymakers and people from all income groups and nations, to harness converging
technologies in order to create an inclusive, human-centred future. The real opportunity is to look
beyond technology and find ways to give the greatest number of people the ability to positively impact
their families, organisations, and communities.
• The First Industrial Revolution occurred at the end of the 18th century, it used water and
steam power to mechanize production.
• The Second Industrial Revolution, at the start of the 20th century, used electric power to
create mass production.
• The Third Industrial Revolution, in the 1960s, used electronics and information technology to
automate production.
• Fourth Industrial Revolution, today, is building on the Third, the digital revolution that has
been occurring since the middle of the last century. It is characterized by a fusion of
technologies that is blurring the lines between the physical, digital, and biological spheres.
pg. 13
Challenges and opportunities
Like the revolutions that preceded it, the Fourth Industrial Revolution has the potential to raise global
income levels and improve the quality of life for populations around the world. To date, those who
have gained the most from it have been consumers able to afford and access the digital world;
technology has made possible new products and services that increase the efficiency and pleasure
of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening
to music, watching a film, or playing a game—any of these can now be done remotely.
Artificial intelligence (AI) and machine learning refer to the ability of machines to learn and act
intelligently meaning they can make decisions, carry out tasks and even predict future outcomes
based on what they learn from the data. AI will transform our world and how we live in it. It's already
used in our everyday lives from Google searches to powering Amazon's product recommendations
and the personalized suggestions you get from Facebook or Netflix accounts. AI and machine
learning are also the foundation of which many other technology trends are built. AI gives machines
the ability to carry out a wide range of human-like processes, such as seeing (facial recognition),
writing (chatbots), and speaking (Suri). AI will infiltrate even more of our lives as the ability for
machines to act intelligently gets better and better.
The Internet of Things (IoT) refers to the increasing number of everyday devices and objects that
are connected to the internet and gather and transmit data. While the first smart device many of us
were exposed to was a smartphone, we now have smartwatches, smart TVs and refrigerators. Today
there are 20 billion smart devices, but it is expected to grow to at least 200 billion connected devices
soon. These smart devices are responsible for an explosion of data and are rapidly changing our
world and the way we live in it. The ability of machines to connect to and share information with each
other is a key part of the IoT.
Big Data
Big Data refers to the exponential explosion in the amount of data being generated in the increasingly
digital age. Our world is full of data, more than ever before. The more data you have, the easier it is
to gain new insights and even predict what will happen in the future. By analysing masses of data
with intelligent algorithms, it's possible to spot patterns and relationships that were previously
unknown. And when you can understand the relationships between data points, you can better
pg. 14
predict future outcomes and make smarter decisions about what to do next. Augmented insights
that can extract insights automatically will give organisations unprecedented insights from their data.
Blockchain
A blockchain is a kind of highly secure database, a way of storing information. In today's digital age,
storing, authenticating, and protecting data presents serious challenges for many organizations.
Blockchain technology, a form of open, distributed ledger, promises a practical and super secure
solution to this problem. As a result, blockchain is an increasingly attractive tool for industries such
as banking and insurance. It will transform how banks operate and how we keep our possessions.
Bitcoin, the well know cryptocurrency, is one example of blockchain technology invention.
Cloud Computing
Cloud computing means storing and processing data in a data centre via a network that gives people
and organisations the ability to store massive amounts of data and process it in nearly real-time.
Edge computing refers to the processing of data on devices such as smartphones. Cloud service
providers such as Google, Dropbox and Microsoft allow individuals and organisations to host all vital
IT infrastructure in their cloud rather than within an organization's digital walls reducing overhead
costs to maintain and operate individual systems, software and data. Edge sits at the other end of
the scale—rather than far away in remote data centres, edge computing happens up-close-and-
personal on the frontline of business operations. Rather than send every piece of information
collected by cameras, scanners, handheld terminals, or sensors to the cloud to be processed, edge
devices carry out some or all of the processing themselves, at the source where the data is collected.
Today’s robots can be defined as intelligent machines that can understand and respond to their
environment and perform routine or complex tasks autonomously. In this data-driven age, it’s the
intelligence and ability to act autonomously that defines robots and separates them from other
machines. The rise of collaborative robots, or cobots, is the latest generation of robotic systems
designed to work alongside humans as robotic colleagues. Cobots enhance the work that humans
do and interact safely and easily with the human workforce providing extra robotic muscle in the
workplace.
Autonomous Vehicles
An autonomous vehicle, be it a car, truck, ship, or other vehicle, is one that can sense what's going
on around it and operate without human involvement. Every major car manufacturer is investing
heavily in self-driving technology, and self-driving vehicles could change the face of our cities. They
potentially will reduce pollution, drastically improve the daily commute, and more.
Quantum Computing
Quantum computing will completely redefine what a computer is and could give us computing power
that is millions or trillions of times more powerful than supercomputers today. Although conventional
binary computing is likely to be all we will need for many tasks we carry out on computers in the near
future, incomprehensibly quick quantum computing is likely to have a variety of applications in fields
such as artificial intelligence and decoding complex structures such as genomic information (Marr,
2020).”
pg. 15
Figure 4: Top 10 4IR Technologies for the Earth (Source: Price Waterhouse Coopers,
2017:7)
pg. 16
4. UNDERSTANDING & MANAGING MOBILE CONNECTIONS
This section discusses internet connectivity
Section
Participants will be exposed to methods to connect their devices to internet,
Overview
managing connection and setting up internet connection in their household
Time Estimate 20 minutes
Among these, wireless access to the Internet is the latest (as of the early 2000s) had only reached
a small group of users. While Broadband connections, including DSL (digital subscriber line), ADSL
(asymmetrical DSL), and cable modems, were becoming more widespread.
pg. 17
4.2 How to Set-up Internet at Your Home
Whether you have moved into your new home or installing connectivity for the first time in your home,
consider this your step-by-step guide to set up internet at home as quickly as possible.
The first step in getting internet access where you live is choosing the right internet service provider
(ISP). In most locations, you usually have a few options, but often only one company is available for
each option. This may not be the case in metro areas where there’s more competition.
The following are the types of internet service providers you have to
choose from.
One way of finding available ISP in your area that provide the most affordable and stable internet
services is by conducting a Google search for “internet service provider” and finding listings of
companies you can contact. This search will show you all ISPs in your area as well as the types of
internet access they offer. Once you’ve decided which type you need, contact the ISP and order the
service.
Depending on the type of internet service you order, the router you’re provided can be slightly
different. Even though this device is referred to as a “router”, it’s technically known as a “modem”.
Router technologies used in DSL modems include ADSL or VDSL, which are just data transfer
technologies that work over phone lines. So, the input ports on these modems will include a phone
port that you plug into the phone jack in your home.
If you’ve signed up for a fiber optic internet connection, the modem will include GPON data transfer
technology.
Cable modems include coaxial input ports that you plug into the broadband cable jack in your home.
Satellite modems typically have several antennas to enable communication back and forth from
overhead satellites.
pg. 18
Some ISPs may allow you to purchase your own modem. While other ISPs require you to use their
specific supplied brand of modem and include the monthly fee for it in your bill.
If you don’t know anything about modem/router technologies, you can ask your ISP to provide you
with the router that they know works with their internet service.
a) Place the modem near the port in your home that provides the
internet service. This might be the cable outlet, the phone
outlet, or near a window in the case of satellite internet.
b) Connect the phone, fiber optic, or cable port on your modem to
the appropriate outlet in your home.
c) Use the included power adapter to connect your modem to a
nearby power outlet.
d) Once your modem is powered on, you may need to call your
ISP to confirm that they can connect to your modem and that it
has an active internet connection.
Now that you have an internet modem in your home that’s connected to the internet, your only
remaining task is to connect to that internet connection with all your devices.
There are a few options, depending on the modem type. If the modem is Wi-Fi enabled, then it’s
also a WiFi router and it’ll produce an internal Wi-Fi network that you can connect to with devices in
your home. If it isn’t, then you’ll need to purchase a secondary Wi-Fi router to connect to your
modem. Don’t let the ports on the back of these devices scare you. Connecting everything together
is actually fairly easy.
Figure 8: How to set up internet at home (for beginners). (Source: Dube, 2021)
pg. 19
Use the following steps to connect your modem to your router and enable
your in-home WiFi network.
Before you move on to the next step, make sure you secure your WiFi router. This will also prevent
neighbours from accessing your network without your permission. When you set up your WiFi
network password, make sure to make a note of it for later when you want to connect your devices.
Now there are two main ways you can connect each device to your new internet connection. You
can connect to the Wi-Fi wireless network, or you can use an ethernet cable to connect directly to
your router.
To connect using an ethernet cable, just plug one end of the cable into the ethernet port on your
computer or laptop. Plug the other end into one of the network ports on the back of your router
Typically, these network ports are highlighted in yellow. They’re also commonly numbered. Avoid
plugging into the port labelled as “Internet” because that one should only be connected to your
internet modem.
Once you are connected via ethernet, your computer or laptop will instantly have an internet
connection.
pg. 20
• Connecting to wireless network
Watch the lesson video: Conneting to Internet on the Digital Skills Plartform
pg. 21
5. UNDERSTANDING MOBILE APPLICATIONS
This section focuses on giving a brief explanation on mobile applications
Section technology
Overview Participants will be exposed to the concept of mobile apps and how to install
app into their devices.
Time Estimate 20 minutes
A smartphone nowadays can get you through all kinds of things. Much of the capabilities of
smartphones today are owed, in part, to mobile apps which together with mobile hardware have
made the modern world much more convenient.
Apps are divided into two broad categories: native apps and web apps.
Native apps are built for a specific mobile operating system, usually iOS or Android. Native apps
enjoy better performance and a more finely tuned user interface (UI), and usually need to pass a
much stricter development and quality assurance process before they are released.
Web apps are used in HTML5 or CSS and require minimum device memory since they’re run through
a browser. The user is redirected on a specific web page, and all information is saved on a server-
based database. Web apps require a stable connection to be used.
Gaming apps: The equivalent of computer video games, they are among the most popular types of
apps. They account for one-third of all app downloads and three-fourths of all consumer spending.
Productivity apps: These focus on improving business efficiency by easing various tasks such as
sending emails, tracking work progress, booking hotels, and much more.
Lifestyle and entertainment apps: Increasingly popular, these encompass many aspects of
personal lifestyle and socialization such as dating, communicating on social media, as well as
sharing (and watching) videos. Some of the most widely known apps such as Netflix, Facebook or
TikTok fall into this category.
pg. 22
Note that some listed apps might require your payment information or an account for download since
those are paid apps, which is why it’s recommended that you should create an account in the store
and set up a payment method beforehand.
When you purchased your mobile device, it already had a number of applications pre-installed. Over
time you will download applications on your mobile device by accessing your application store.
Some application may be useful, others not. As a general-purpose computer, your mobile device is
capable of running applications to meet everyone’s different needs. Someone else’s need and yours
will differ.
You should learn to manage the applications installed on your mobile device. This will save your
phone memory, reduce data usage that is consumed by application updates, and make your device
easier to interact with if only applications you use are shown on your display.
Your mobile device is a bit like a multi-purpose pocketknife. While it offers many features, you will
probably only use a few of them. You can use your mobile device to substitute for many other tools.
It can be a calculator, a diary, a calendar, a notebook, a radio etc. But more than that, it can go well
beyond the general function of these standalone tools, by integrating their capabilities.
pg. 23
6. USING MOBILE APPLICATIONS TO ORGANISE YOUR LIFE
This section discusses general applications to help you organise your life.
Section
Participants will be exposed to applications that can be used to help with day-
overview
to-day activities
Time Estimate 90 minutes
As more and more applications are developed and enhanced, it is not that easy for most general
users to understand how to effectively use these applications to organise or improve their lives.
You can create a Gmail account using a web browser on your computer or on the mobile app. No
matter where you create your account, you'll be able to access it from any of your web browsers or
devices.
pg. 24
Exercise One
On your mobile phone follow the below steps to create a Gmail Account:
Step 1: Open the Gmail app and tap the account icon
Step 2: Tap Add account
Step 3: On the Add account screen, tap Google
Step 4: On the Google Sign in screen, tap Create account and choose For myself
Step 8: Create a strong password for your new Google account and then tap Next
Step 9: You can add a phone number that can be used to recover your account if you
forget your password, and with other Google services (like using it for video calls with
Google Meet). If you want to do this, enter a mobile phone number and then click Yes,
I'm in. Otherwise, click Skip.
Step 10: If you added a phone number, enter the verification code that's texted to your
number.
Step 11: Finally, click I agree after reviewing Google's terms of service.
Watch the lesson video: How to create a Gmail Account on the DSP
Video link https://youtu.be/mYLjEkbuFR8
pg. 25
6.2 Using Email Professionally
Some basic tips for using Email services:
• Add yourself to your own Contact Database with all your correct details
• Add a signature to all your emails that includes all your details
• Ensure your contacts names are correctly spelt, as their names will appear when email
addressed to them. Nobody likes their names to be wrong, it is a sign of disrespect.
• Use To: address field for people you expect a response from
• Use CC: address field (Carbon Copy) for people you wish to inform, but do not expect a
response from
• Use Blind Carbon Copy (BCC) address field when you do not want a person’s email address
to be shared with others. This is important for marketing emails where you should not give
customer information to others without their permission.
• Always have a Subject. If you don’t, people won’t know why to open your email, and many
email system discard emails without subjects, as they may be considered as spam emails.
• Emails are ideal for sharing legal and business information and records. Emails are kept and
can be referred to in future correspondence.
In short, you can send emails to anyone whose email address you know. They can decide whether
to open it and what to do with it. They can ignore it, delete it reply to it.
How well you use email will determine the nature of responses you get. Be courteous, professional
and dignified in your communication. Your emails can be blocked, automatically deleted, flagged as
spam if you do not use email effectively.
Exercise Two
On your mobile phone follow the below steps to access and use Google Drive:
Step1: Open the app: On your Android device, find and open the Google Drive app
Step 2: Upload or Create Files: You can upload files from your phone or tablet or create files in
Google Drive.
Step 3: Share and Organise File: You can share files or folders, so other people can view, edit,
or comment on them.
pg. 26
Benefits of using online storage:
To be able to use Google Calendar, you need to have a Google Account. Google Calendar is one
of the free apps and services you get by having a Google account. You can create calendars to keep
track of different types of events.
Exercise Three
On your mobile phone follow the below steps to set up a new calendar event:
Step 1: On your Android phone or tablet, visit the Google Calendar page on Google
Play then Tap Install to install Google Calendar in your device.
Step 2: Once the calendar is installed, open the app and sign in with your Google
Account.
Step 3: On the left, next to "Other calendars," click Add other calendars Create
new calendar.
Step 4: Add a name and description for your calendar.
Step 5: Click Create calendar.
Step 6: If you want to share your calendar, click on it in the left bar, then select Share
with specific people
.
pg. 27
Benefits of using Google Calendar:
• You can see traffic info, public transit options and local places of interest in just a few
seconds.
• With voice navigation, you’ll hear traffic alerts, where to turn, which lane to use, and if there's
a better route.
pg. 28
Exercise Four
On your phone turn on your GPS and let Google Maps access your current location and audio
speakers then follow the below steps to start using Maps:
Step 1: On your Android phone or tablet, open the Google Maps app icon (or got Google
Play to search and install Google Maps).
Step 2: Once opened search for a place or tap it on the map.
Step 3: In the bottom left, tap Directions. If you touch and hold the button instead, you’ll
start navigation and can skip steps 4-6.
Step 4: Optional: To add additional destinations, go to the top right and tap
More Add stop. You can add up to 9 stops. When you are finished, tap Done.
Step 5: Choose one of the following options:
• Driving:
• Transit:
• Walking:
• Rides:
• Cycling:
Step 6: If other routes are available, they will be shown in grey on the map. To follow an
alternate route, tap the grey line.
Step 7: To start navigation, tap Start . If you see “Searching for GPS,” your phone is
trying to get a GPS signal. For example, you might be in or near a tunnel, parking garage,
or other location where there’s no GPS signal.
Step 8: To stop or cancel navigation, go to the bottom left and tap Close .
• With online banking you can check your account balance online at any time. You can now
catch errors such as unauthorized activities (e.g., unsanctioned debit orders) quicker.
• There is a good chance that your financial institution allows you to transfer money between
accounts.
• You can also pay most of you bills online or thought the mobile app.
pg. 29
Most Major Banks have mobile banking applications which allow you to:
• Make Payments
• Send Money
• Save Money
• Buy Airtime or Electricity
• Updates Details
• And More
How is it used
Login to your account, the first page you will see is the home screen.
• This is where you will see your everyday account and GoalSave balances. If you ever want
to check the information Tymebank has it for you, go to menu at the top left hand side of the
screen, press profile management and then press on My details.
How to send money to a cell phone using banking app:
Different banks call it different things, FNB refers to it as eWallet, Capitec calls it Cash Send and the
one we are using TymeBank, is called SendMoney.
• You login
• Tap menu
• Choose Pay and Save, then send money.
• Type the cell phone number of the person you are sending the money to.
• Or type the Name and get the number from the contacts on your phone.
• Then enter the amount you want to send.
• If I don’t want the receiver to pay the transaction fee, you should add R4 to the total amount.
• Tap next to check all the details and follow the rest of the steps.
• The receiver will get an SMS from Banking institution with a 10-digit code. Which you will
then show to the cashier at Pick ’n Pay or Boxer till point to get his and her money.
Many services can be availed anywhere, anytime instead of going to the branch physically. Online
banking can also be done during holidays, which is something impossible in the case of traditional
banking. Users can make a transaction without going to the bank counter. You access your account
24/7 including the relative services. Banks also share spend overview online.
Firstly, we will have to understand what online shopping is. Online shopping is the activity or action
of buying products or services over the internet. It means going online, landing on a seller’s website,
selecting something and arranging for its delivery. The buyer either pay for the goods or services
online with a credit or debit card, or upon delivery.
pg. 30
Benefits of online shopping
• You don’t stand in a line or queue, at cash counters to pay for the
product that you have been purchased online.
• The online store is 365 days, 24/7 so, time does not act as a barrier,
wherever the vendor and buyers are.
• To attract customers, online stores and marketers offer discounts to
customers.
• Customers can purchase items from the comfort of their own homes or
workplace.
• Shopping is made easier and convenient for the customer through the
internet.
• Online customers can track the order delivery status, tracking of
shipping is available.
• Make sure the online shopping site you are using is protected before filling personal details
such as banking details.
• A protected site should have a secure sign or padlock next to the URL or web address
pg. 31
7. USING APPLICATIONS FOR WORK READINESS
This section focuses on how to use applications to perform administrative tasks
Section such writing documents and digitally collaboration for work purposes.
Overview Participants will be exposed to applications that will help them perform
administrative tasks, conduct online meetings and create digital profile
Time Estimate 60 minutes
• You can even use the app to save and make changes to your docs when you're offline.
• It's fully compatible with Microsoft Word.
• Add functionality with Google Chrome extensions.
• Access your work from any device.
• Automatic saving.
• It's packed with helpful features.
• It's free!
Exercise Five
Step 1: Download the Google Docs, Sheet, Slide or Site app on your Android phone or tablet.
Open the Google Play app search and install Google Docs app.
Step 2: Once installed you can get started in creating a document:
Step 3: Share & work with others. You can share files and folders with people and choose whether
they can view, edit, or comment on them.
pg. 32
7.2 Using Online/Virtual Meetings Applications
How do virtual meetings work? Virtual meetings utilize technology that allows individuals to connect
and collaborate via video and audio, using an internet connection. It is a real-time interaction
between remotely located workers to accomplish a shared goal or plan.
Anyone with a Google Account can create an online meeting with up to 100 participants. Individuals,
businesses, schools, and other organizations can take advantage of advance feature including
meetings with up to 250 internal or external participants and live streaming to up to 100,000 viewers
within a domain.
Exercise Six
On your mobile phone follow the below steps to get started on Google Meet
• To create a new video meeting, log in to your existing Google Account or sign up for free.
• Send a link or meeting code to anyone you want to join the meeting. For the free version
of Google Meet, guests will need to create or sign into an existing Google Account to join.
• Join a meeting Tap the meeting link from the invite, enter the meeting code from
your host or call into the meeting using the dial-in number and PIN in the invite.
pg. 33
• Video and audio preview screen: After clicking your meeting code or link, you can adjust your
camera and mic and see how you look before entering the meeting. You’ll also get a preview
of who has already joined the meeting.
• Screen sharing with participants you can present you entire screen to share presentations or
collaborate on documents.
• Make meetings more engaging with live messaging to share files, links, and other messages
with participants.
These days almost everyone has a digital reputation whether they want to have one or not. Many of
us create these for ourselves through social media or websites. These can be profiles can be
accessed by search engines, and people can find out more about you than you might
think. Everything we post (blogs, tweets, photos and videos, likes, links, comments, and shares)
contributes to our online reputation. So, too, does whatever other people post about us.
Most of the time you may be judged based on your digital profile by other people, such as employers,
clients, landlords and those in the financial industry. This means you may want to consider changing
or making your profile to what it is you want these types of people and others to see about you.
Step One: Look for your digital reputation – you need to know what is already available online about
you so that you can address any problem areas. You can do this by removing your browsing history
in your browser and then adding your name to a variety of different search engines.
Step Two: Evaluate your online reputation – weigh up what the outcome is of what you have found.
You will want to review whether your online information really reflects who you are, or how you want
to be seen.
Step Three: Think before you post – when considering whether or not to put a post-up you need to
weigh up the advantages and disadvantages of doing so. Wild drinking photos may seem like fun at
the time, but a bit down the road you might not be happy about them. Consider what a future
employer might think, or your current or future partner.
Step Four: Keep it private – there are plenty of ways that you can protect your online reputation by
making sure you use privacy settings. You can hide contact details like email address and numbers.
You should never add information about other people without asking. Then look at ways you can
restrict access to your profile for different groups of people in your life, such as acquaintances, family
and close friends.
Step Five: Rectify problems – if your online reputation has problems, you will not be able to fix all of
them, but some you can. You can ask search engines to remove information about you from search
pg. 34
results. You can also get rid of obsolete accounts that you do not use any more. Often you will not
be able to remove content about you added by others, but you can ask them to remove it.
Step Six: Focus on what is great – work towards creating a digital reputation that promotes the most
positive and best aspects of you. This will help to avoid other more negative content surfacing in
searches, at least high up or on early search pages. You can also make sure that you use
professional sites like LinkedIn, and work on building a great profile on those.
Signing Up on LinkedIn
LinkedIn is the world's largest professional network with hundreds of millions of members. The
platform’s mission is to connect the world's professionals to make them more productive and
successful.
Exercise Seven
pg. 35
8. USING APPLICATIONS FOR SELF-DEVELOPMENT
This section focuses on how to use digital platforms and applications to access
Section relevant information, self-development guides and learning channels to help
Overview improve and equip individuals for employment or improve their lives.
The internet has made easier for individuals, organisation and entities to exchange and share
information and knowledge in the form of text, images or diagrams and videos online. Information,
and demonstrations of how to do things are readily available for any of us to access anytime from
anywhere in world as long you have internet connection. Some of the technology developments
examples includes:
• Search services, like Google Search which enable us to find information on just about
anything.
• Video streaming services such as YouTube make it possible to share videos with anyone
else in the world. YouTube can be searched and videos that match the search request are
then available for viewing on demand.
By having a Google account means that you have access to Google services and YouTube.
Most mobile devices capable of accessing the Internet come with an application that provides the
ability to “Browse the Internet”. Some examples the Browsers include:
• Google Chrome
• Apple’s Safari
• Microsoft’s Internet Explorer/Edge
• Firefox
• Opera Mini
These applications understand how to send data to and receive data from Web Servers on the
internet. They also understand how to display data they receive in a format that is intended to make
it easy for us to interact with our computer. This data includes screen layout controls, text fields,
embedded videos, animations, action buttons, entry fields etc.
Tips and tricks to help you easily find information on Google search
For example, if you searched for “flag with a blue background and a yellow cross” but didn’t find
matches, try searching for “flags with yellow crosses.”
By searching with the minus symbol (-), you're telling Google to find results that exclude the words
preceded by a minus symbol. For example, if you know the flag you’re after isn’t the flag of the United
Kingdom, you'd search “flag with white cross -United Kingdom.”
Using Advanced Search, you can easily find webpages that are only available in a specific language,
sites that originate from a particular domain, or documents written in the past month or year.
pg. 37
8.2 Accessing Government Information and Services:
Governments around the world have worked on better serving their citizens by improving access to
information and services. This is done by government departments building web sites to constantly
share information they consider useful. Each government department typically has their own content
and offers their own interactive services. In South Africa, the government services and information
are published on the www.gov.za web site which can link you to any other government department,
agency and municipalities.
You can sign into YouTube with your Google Account. To sign into YouTube, enter your Google Commented [MOU1]:
Account email and password. After signing up for YouTube, signing into your Google account on
another Google service will automatically sign you in to YouTube. When you sign in to YouTube you
can take advantage of many YouTube features:
Unless you create a channel, you won't have a public presence on YouTube. Your activity will be
fully private. If you want to upload your own videos, comment on videos, or create playlists, you can
create a YouTube at any time.
pg. 38
Exercise Eight
There are multiple ways you can find what you want to watch on YouTube. On the YouTube
platform, you can:
pg. 39
9. UNDERSTANDING CYBERSECURITY
This section focuses on giving an overview of the cybersecurity issues that can
Section affect a mobile technology user, how to implement basic password
Overview strengthening and dangers of cyberbullying.
• Something the user knows – Knowledge factors (password, personal identification number
(PIN), security question etc.)
• Something the user has – Ownership factors (cell phone, wrist band, ID or membership card)
• Something the user is – Inherence factors (biometrics - fingerprint, iris pattern, facial
recognition). Essentially based on physical appearance of the user.
• The passwords we use will, in many cases, depend on the expectations of the service
provider. Service providers can set the rules in terms of:
• Minimum length of password (the longer, the more secure, ideally 8 or more characters)
pg. 40
• Requirement for combination of alphabetic characters and numbers (e.g., abc123)
• Requirement for mixed case (e.g., abCde…)
• Requirement for inclusion of symbols (e.g., abc123#)
• How often passwords must be changed
• Whether passwords can be reused
Mobile devices connect to the internet through procuring Mobile Data supplied by cellular operators,
and the most popular option through Wi-Fi Hotspots which are installed at our homes, at the office
or workplaces, restaurants, educational institutions or in public spaces.
There are risks/threats assorted with accessing internet through Wi-Fi Hotspots. One of the biggest
threats to especially public Wi-Fi is the ability for hackers to position themselves between you and
connection point, so that they can access your device to steal information, distribute malware or
hijack your devices to conduct harmful practices.
9.5 Cyberbullying
Also known as online bullying, cyberbullying is any form of bullying behaviour or harassment that
takes place on online applications using devices.
Bullying occurs when a person is sought out and repeatedly harassed using predominantly social
media sites, and other messaging applications. Stalking, repeatedly tormenting and even excluding
individuals from groups can be seen as cyberbullying. Cyberbullying includes sending, posting, or
sharing mean, perhaps false, negative, and potentially harmful content about others that leads to
embarrassment or humiliation.
The impact of cyber bullying may occur online but extend to real-world social outcomes including
peer pressure, depression, self-harm, and social exclusion. Amongst teenagers and young adults,
this behaviour can also be done anonymously. In some cases, cyberbullying can be considered a
criminal offense if the behaviour is determined to be unlawful.
pg. 41