مذكرة تكنولوجيا المعلومات لغات خامسة ابتدائي ترم اول 2024 مستر حمادة السيد
مذكرة تكنولوجيا المعلومات لغات خامسة ابتدائي ترم اول 2024 مستر حمادة السيد
ت :ماجستير مناهج وطرق تدريس تكنولوجيا التعليم أ /حماده السيد محمد 01061226750
Lesson 1 • Explorer IN Action
G5 Ax1
Fred Hiebert
organization, he studies the past through excavation, observation and writing about
What tools did the scientist Fred Hiebert use in his daily work?
2
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
What does Fred Hiebert do to teach and train others
prefers?
in different countries
information
Q-Why has information sharing become an essential part of our daily life ?
To make people more experienced and understand the topics and get all the
information
3
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 1 • Questions
G5 Ax1
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase:
1- there are some difficulties when conducting face-to-face interviews due to the
distance of people from each other ( )
2- the presentation program is used in the preparation of graphs and calculation
tables ( )
3- transferring experiences helps others to progress faster ( )
4- the time difference between countries makes it difficult to follow meetings and
meetings when they are held on platforms ( )
5- there are many ICT tools for information exchange ( )
Q2: pray from Column (A) what fit from Column (B):
Column (a ) Column (B )
1 A YouTube channel with a lot of videos for A Your e-mail messages
school subjects
4
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 2 • Computer accessories
G5 Ax1
Computer accessories
Ethernet port
Flash memory
Connects to an Ethernet wire
Used to transfer files from one and Ethernet is more stable
computer to another and faster than wireless
connections
Router
External hard driver
It is a device that connects a
Which is like hard but works
computer to the internet via a
better
Wifi or Ethernet wire
5
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
There are some problems that we may face while using the computer and their solutions
presentation
external drive
3 Poor network connection Weak and slow wireless Try a fast wired
conference
6
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
lesson 2 •Questions
G5 Ax1
1- from the tools attached to the computer .................... And ...................... And
...................
2- ....................... It is a wire that connects the computer to the router
3- ....................... It is a wire that transmits sound and image from and to devices
4- ...................... A device that connects a computer to the internet via Wi-Fi or the
internet
5- one of the units of measurement is the storage capacity ...................... And
......................... And ......................
7
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 3 • Networks
G5 Ax1
8
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Secondly: what is an intranet
Important information
In the Eighties of the The late eighties of In the nineties of the Year 2000 and
previous century the last century last century beyond
9
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 3 • Questions
G5 Ax1
1- an intranet is a network that connects computers and people using that network
2- the internet is a private network limited to people who are connected to them
3- the web is the gateway that connects the computer to the internet ( )
6- the closed network is the one that can be for the computer lab at school and be
private ( )
registered in it ( )
9- the router is the only one that connects the computer to the internet service
provider ( )
10
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson4 •Digital communication tools
G5 Ax1
Introduction:
- Humans communicate daily using computer networks when using phones to send
text messages, buy something online, take lessons, download videos, or run
applications and programs
- Companies and organizations also use networks daily to share information privately
through closed networks or in general through open networks
Internet of things
You can control it whether you are in the same room or in another city
(Speakers for listening to music-digital refrigerator and washing machine that can
be turned on and off using an application - surveillance cameras for remote control)
Bluetooth
A network technology that connects wireless mobile devices over a short range to
- That independence helps to save money and time and increase their level of self-
confidence
- Helps the visually impaired from doing their homework online by using screen
- Screen readers help the visually impaired to do everything they need from (writing
11
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Very important concepts
3- online shopping: buy any item online and you must get permission from parents
before buying
12
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson4 • Questions
G5 Ax1
1- ...................... It consists of devices connected to the internet via Wi-Fi that you
can control whether they are in the same room or another city
over a short range to form a network to transfer data between different devices
they need from writing research and accessing documents on their laptop
1- the internet is a network technology that connects wireless mobile devices over a
4- ICT tools helped people of determination to accomplish their daily work with
ease ( )
writing research ( )
information ( )
13
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
•Internet connection problems
Lesson 5
and solutions
G5 Ax1
While using these programs, he is exposed to many problems related to the device or programs
Troubleshooting steps
2 Think about different ways you can solve the problem and plan for it
3 Study the possible solutions to the problem and try each of them until one
4 Which solutions worked And if you can't solve the problem, What did you
learn while trying And how can what you've learned help you next time
5 If you can't find a solution, should you contact your teacher or a family
member
14
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Common computer problems and their possible solutions
updated
connection problems
for assistance
15
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 5 • Questions
G5 Ax1
Q1: connect the problem in Column (A) with its possible solution from Column (B)
M (A) M (B )
1 The computer slows down when A Making sure the router is connected
opening an application
interruption
C- using your teacher or a member of your family to help you solve the problem
( )
D- finding solutions to solve the problem, and if not, then you should look for
other ways ( )
Q4: state one possible solution for each of the following problems:
1- there is no internet connection despite the safety of the Ethernet wire
2- Slow tablet device when opening an application
3- I tried to download a digital game from the internet, but the download is
very slow
16
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 6 •Digital file management
G5 Ax1
Use the photo scanner and save it for Store and share information using
later use flash memory
3- put a title for each file 4- put files, photos and videos in the correct folder
17
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 6 •Questions
G5 Ax1
2- keeping electronic copies of private papers is one of the ways to store important
files ( )
3- it is preferable to put the photos in the pictures folder on the flash memory for
process
Q3: sort the following files into files that should be placed in the photos, files, or
videos folder:
Word program
18
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 7 •Information search strategies
G5 Ax1
19
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 7 • Questions
G5 Ax1
Q1: arrange the following steps to conduct a research with your colleagues:
2- Choosing the research topic in conducting any research is the step ............
20
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 8 • Sharing information
G5 Ax1
When sharing information electronically, you should think about what is shared
21
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
22
ت :ماجستير مناهج وطرق تدريس تكنولوجيا التعليم أ /حماده السيد محمد 01061226750
Lesson 7 •Questions
G5 Ax1
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign wrong in front
of the wrong phrase :
Q3: pray from Column (A) to the appropriate from Column (B):
M (A ) M (B )
closed network
2 Intranet B = A15 + A3
Excel
and the value of cell A3 shared over the World Wide Web
Q4: arrange the following steps to arrange the information alphabetically in Excel:
23
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 1 • Explorer IN Action
G5 Ax2
Jeff Kerby
photographic expeditions in Africa, North America, the Arctic and most of all
photographed landscapes
Photographic expeditions
These are trips to places where a person takes photos of the area he is visiting
1- he thinks well about where he will go, what things he will do and how to do his
job safely
2- he carries his camera with him in addition to its lenses and batteries
4- he uses his phone to take a quick picture and navigate using a GPS tool (GPS)
Create a backup copy of all the photos taken by the camera or drone on an external
24
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Copyright
1- everyone owns the copyright of the photos they take, unless they sell them
before taking photos or after
2- Some people use photos taken by others without their permission or buying
photos, and it is called "copyright infringement"
3- photographers can protect their works from copyright infringement such as
placing a watermark with the name or data
4- Jeff Kirby ensures the protection of his works by not sharing high-resolution
photos only with people he trusts
5- Jeff Kirby shares low-resolution photos that don't look good if printed or
uploaded to a website
6- Jeff Kirby uses a search through photos to find out if his photos have been used
without his permission
7- "copyright infringement" is contrary to Egyptian Law Article 69 of the Egyptian
constitution of 2014 provides as follows:
(The state is committed to protecting intellectual property rights of all kinds in all
fields and establishes a competent body to take care of these rights)
25
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 1 • Questions
G5 Ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase:
infringement ( )
4 - you can use the mobile phone camera to take pictures of animals ( )
(Put a voice tag – do not put any tags – put a watermark-delete the watermark)
(Delete photos – send photos to your friends – save photos securely-share photos
3- You can post related photos ................. Online protection against copyright
infringement
26
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
• Protecting ourselves and our
Lesson 2
information
G5 Ax2
Stolen data
And steal personal information such as (your name – address - date of birth-
passwords) this information is called "personally identifiable information" (PII or
Personally Identifiable Information)
2- The hacker can use the email address and password of one of the people to send
a virus to all the email addresses in your email or he can use the bank account
number of an adult to steal his money
Use different passwords for each site you register on ( because if he finds out the
password for one site, he will be able to access all the other sites )
Lost files
Files that are created or stored on devices must be protected from viruses, from
software-related problems, or from human errors such as falling and crashing
your laptop
27
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
File protection methods
Creating a backup copy of it, such as using some applications and software that
automatically create backup copies of files
Using a device to save files and connect it to a computer, such as flash memory or
an external hard drive, which is a safer way to copy and save files
28
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 2 • Questions
G5 Ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase :
information ( )
3- the hard drive is smaller than the flash memory in terms of space
29
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 3 • Password security
G5 Ax2
Phishing scams
Is sending a message via email or social media applications looks real but it
is not
Types of phishing
scams
1- send a message telling you that you have won a prize, but you need to give your
2- a type that urges you to act quickly when you open one of the attachments of the
fraudulent message or the file attached to it and the data theft program is
4- there is another type of phishing that is done by text messages instead of e-mail
2- it also allows the service to evaluate passwords if they are very weak or if
30
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Multi-Factor Authentication
Providing at least two ways to introduce the user about himself often combine a
• And another factor that the user has, such as an email, a one-time code, or a
personal question
1- when the user enters the password for his account on a game website, for
example, he will receive a text message to verify his identity (the text message
contains a code that the user must enter on the site to make sure that he is
2- the user cannot log in to the site and start playing after completing both steps
personal accounts because they do not have the second authentication factor
31
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 3 • Questions
G5 Ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase:
2- the password management program generates the same password for each of the
user accounts ( )
accounts ( )
1- multi-factor authentication combines a factor that the user knows and a factor
2- the password management program allows alerting the user if their passwords
3- A text message is sent with a code valid for a period of time ................. To verify
32
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 4 •How to deal with fake websites
G5 Ax2
Fraudulent websites
These are sites that include fake positions to obtain the user's personal data such as
Such as: some online shopping sites that do not send items purchased incorrectly
Intimidation software
These are programs that include fake warnings indicating that there is a problem
with the computer and the need to download a certain program, in addition to fraud
through bonuses and prizes that offer a prize that is not obtained
1- trying to lure the user by arousing his enthusiasm and attracting his attention
3- exploitation of the sites for the information that I found about the user in a bad
2- check for spelling or grammatical errors (the reliable source will be well written
3- conduct an internet search to find out if the site being used is a known
fraudulent site
33
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
4- in general, if something starts out incorrect, the site is most likely a fraudulent
site
Important note
to fraudulent sites or call the child's helpline or the General Directorate for
combating cybercrime
The service provider, the e-store and the bank that is being dealt with must be
informed about this fraudulent website with the help of a teacher or a family
member
2- The name of the resource name: it is the server of the network web server or the
desired website and the name of the resource indicates who owns the site, the
name of the resource often ends with Com – Edu - Gov – org - net
3- File path file path: represents the last part of the URL and specifies the name of
34
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 4 • Questions
G5 ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase:
2- the matter must be hidden if you fall victim to one of the fraudulent websites ( )
35
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 5 • Intellectual property rights
G5 Ax2
Digital content
Copyright law protects printed and digital content by granting creators and authors
legal protection for their works it is illegal to take content from the internet and
Copyright
2- copyright protects the works of creators and authors and covers multiple types of
websites
5- when using copyrighted content, you must respect the owner's work and request
Important note:
• If you use someone else's artwork on your social media account or download a TV
episode from YouTube You Tube, you have used copyrighted content
3- discoveries
4- creative works that have passed 50 years since the death of the owner
36
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Written content
When doing research, for example, it is not allowed to use only a small part of
Pictures
- When using an image, its title, the name of the painter or photographer, the link
to the original version of the image and the type of copyright protected by it must
be mentioned
- The user can create his own photos or take them in case he does not want to get
permission or buy photos
Sources that are in the public domain and have a Creative Commons license can
Public ownership includes creative works that are not covered by copyright
Creative works usually enter the public domain 50 years after the death of the
When searching for images online, the results can be filtered to show only
Giving permission by the creative employer to reuse the work anytime, anywhere
37
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 5 • Questions
G5 Ax2
Q2: pray from Column (A) to the appropriate from Column (B):
)A( (B)
1- use of copyrighted content A- includes creative works that are not
owner
YouTube
38
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 6 • Using digital sources
G5 Ax2
M Facts Opinions
observation experiences
1- it is necessary to use multiple sources during the research to include knowledge of all
the important facts of the research topic
2- if two reliable sites include the same information, it often means that the information is
correct
3- when using more than one source, be sure to write the notes of the first source and then
examine the second source for additional information
4- in the event that two sites contain different information on the same topic, both must be
verified reliably and the information is based on facts
5- copyright rules and laws must be followed when using digital sources
6- articles and digital encyclopedias also contain important information
7- there are other sources other than texts such as maps, charts, tables and provide
measurable facts
8- reliable photos and videos help to gain information by watching better than reading
texts
9- records and databases can also be reliable sources, as they contain multiple research
materials such as (books-articles-etc.)
39
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 6 • Question
G5 Ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front
3- the presence of the same information in two reliable sites most often
4- copyright rules and laws must be followed when using digital sources ( )
digital search
2- produce............... About the studies and researches that prove the validity
of their results
40
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 7 • Advanced searches
G5 Ax2
41
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Logical factors and search rates
Search results
5- Quickly read the source content and search for titles and
topic headers
42
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Lesson 7 • Questions
G5 Ax2
Q1: put the ( √ ) sign in front of the correct phrase and the ( × ) sign in front of the
wrong phrase:
1- the topic and research questions must be specified to obtain accurate research
results online ( )
2- it is impossible to narrow search results to certain ranges ( )
4- the mentioned words are excluded from the search results when using " and "
AND ( )
43
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
•Documenting information
Lesson 8
appropriately
G5 Ax2
Take notes
Important note: to search for a source online by keyword, press Ctrl + Foal
typing in the search box
Use of quotations
2 - when quoting a saying, you must specify its source and the reason for using it
44
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ
Citing sources
List of works cited The sources used are listed on the "list of Works Cited"page
Lesson 8 • Questions
G5 Ax2
45
ماجستير مناهج وطرق تدريس تكنولوجيا التعليم: ت 01061226750 حماده السيد محمد/ أ