Site icon k24.co.ke

FREE GRADE 8 PRETECHNICAL NOTES

FREE GRADE 8 PRETECHNICAL NOTES

Strand 1.1: Foundations of Pre-Technical Studies – Fire and Data Safety

Lesson 1: Understanding Fire Causes

  1. Causes of Fire:
    • Flammable Substances:
      • Chemicals: Used in laboratories (e.g., solvents, fuels).
      • Common Materials: Such as paper, wood, fabric, and oily rags.
      • Gases: Like propane and butane used in workshops.

Lesson 2: Preventing Fire

  1. Preventing Fires:
    • Proper Storage:
      • Flammable materials stored in designated areas with proper ventilation.
      • Separate storage for different types of materials to prevent chemical reactions.
    • Regular Maintenance:
      • Checking electrical equipment for wear and tear, frayed wires, or damaged plugs.
      • Ensuring machinery is well-lubricated to prevent overheating.
    • Safety Protocols:
      • Clearing workspaces from unnecessary clutter to reduce fire hazards.
      • Displaying and following emergency evacuation plans.

Lesson 3: Firefighting Techniques

  1. Firefighting Techniques:
    • Cooling:
      • Using water hoses or fire extinguishers to cool down the flames.
      • Emergency showers for individuals with chemical burns.
    • Smothering:
      • Utilizing fire blankets to cover flames and cut off their oxygen supply.
      • Deploying foam-based fire suppressants to smother liquid fires.
    • Interrupting:
      • Using fire extinguishers with appropriate agents for different fire types (e.g., ABC fire extinguishers).

Explanation: ABC fire extinguishers are versatile and effective for three classes of fires – A (ordinary combustibles), B (flammable liquids), and C (electrical fires).

Lesson 4: Data Threat Analysis

  1. Threats to Data:
    • Malware:
      • Viruses, including trojans, worms, spyware, ransomware, and adware.
      • Phishing: Attempts to trick individuals into revealing sensitive information through fake emails or websites.
    • Hacking:
      • Unauthorized access by individuals seeking to manipulate or steal data.
      • Data breaches where sensitive information is accessed without permission.
    • Data Corruption:
      • Software bugs causing unexpected errors and data loss.
      • Hardware failures, such as a malfunctioning hard drive leading to data corruption.

Lesson 5: Securing Electronic Data

  1. Securing Data:
    • Use Strong Passwords:
      • Combine uppercase and lowercase letters, numbers, and symbols (e.g., P@ssw0rd).
      • Avoid easily guessable passwords, like “password” or “123456.”
    • Regularly Back Up Data:
      • Use external devices like USB drives, external hard drives, or cloud services (e.g., Google Drive).
      • Schedule automatic backups to ensure consistent data protection.
    • Install and Update Antivirus Software:
      • Choose reputable antivirus software and keep it up-to-date to guard against new threats.
      • Enable real-time scanning for continuous protection.

Lesson 6: Hands-On Application

  1. Hands-On Application:
    • Creating a Strong Password:
      • Utilize a mix of letters, numbers, and symbols to enhance complexity.
      • Avoid personal information, like birthdays or names, to strengthen security.
    • Backing Up Important Files:
      • Use external hard drives, USB drives, or cloud services like Dropbox, OneDrive, or iCloud.
      • Regularly review and update the backup strategy based on evolving needs.
    • Running an Antivirus Scan:
      • Schedule regular scans to detect and remove potential threats automatically.
      • Perform manual scans after downloading new files or visiting unfamiliar websites.

Key Inquiry Questions

  1. Importance of Fire Safety:
    • Protect Lives and Property:
      • By preventing injuries, fatalities, and damage to structures.
    • Avoid Disruptions in Work Environments:
      • Ensuring uninterrupted workflow and maintaining productivity.
    • Prevent Injuries and Ensure a Safe Working Atmosphere:
      • Fostering a secure and comfortable workplace for all individuals.

 

 

Strand 1.0: Foundations of Pre-Technical Studies

Sub Strand 1.2: Computer Hardware (11 lessons)

Lesson 1: Introduction to Computer Hardware

Explanation: Computer hardware comprises the physical elements that make up a computer, allowing it to function. These components include devices such as keyboards, monitors, hard drives, and more.

Lesson 2: Categories of Computer Hardware

Input devices get data, output devices display information, and storage devices save data.

Lesson 3: Categories Discussion

Explanation: Engaging in group discussions helps explore diverse perspectives and understand practical applications of different hardware categories.

Lesson 4: Matching Devices to Categories

Explanation: This hands-on activity reinforces the connection between specific devices and their respective hardware categories.

Lesson 5: Task Performance Using Hardware

Explanation: Performing tasks with various hardware devices enhances practical skills and demonstrates how these components work together.

Lesson 6: Importance of Computer Hardware

Explanation: Recognizing the importance of computer hardware encourages an appreciation for its role in making technology functional and user-friendly.

Top of Form

 

Strand 1: Foundations of Pre-Technical Studies – Substrand 1.3: Consumer and Investor Protection

Lesson 1: Importance of Consumer and Investor Protection

Objective: Explain the importance of consumer and investor protection in Kenya.

Examples:

Lesson 2: Analyzing Protection Mechanisms in Kenya

Objective: Analyze ways in which consumers and investors are protected in Kenya.

Examples:

Lesson 3: Government Financial Regulators

Objective: Explore the Government financial regulators in Kenya.

Examples:

Lesson 4: Protecting Oneself from Exploitation

Objective: Protect oneself from exploitation.

Critical Thinking Questions:

  1. Why does the Government protect consumers and investors?
    • Government intervention ensures fairness, transparency, and stability in the marketplace, fostering economic growth.
  2. How do consumers protect themselves from exploitation by traders?
    • By being informed, verifying information, and understanding their rights, consumers can avoid falling victim to unfair practices.

Strand 2: Communication

Substrand 2.1: Business Communication

Lesson 1: Importance of Business Communication

Objective: Understand the importance of business communication.

Lesson 2: Selecting Channels of Communication

Objective: Learn to choose appropriate communication channels.

Ethical Practices:

  1. Clear Communication:
    • Providing accurate and transparent information. For example, clearly stating product specifications in advertising materials.
  2. Respect for Privacy:
    • Protecting sensitive information and respecting privacy. For instance, ensuring customer data is securely handled.
  3. Honesty:
    • Providing truthful and unbiased information. An example is transparently communicating any potential delays in project timelines.
  4. Professionalism:
    • Maintaining a professional tone and demeanor in written and verbal communication. For example, using formal language in official documents and meetings.

Unethical Practices:

  1. Misleading Information:
    • Providing false or misleading information to gain an advantage. For instance, exaggerating product features in marketing.
  2. Bullying or Harassment:
    • Using communication to intimidate or harm others. An example is sending threatening messages to colleagues.
  3. Lack of Transparency:
    • Withholding crucial information to manipulate perceptions. For example, not disclosing potential risks to investors.
  4. Plagiarism:
    • Presenting someone else’s work or ideas as one’s own. This could involve copying a competitor’s marketing strategy without attribution.

Substrand 2.2: Plain Scale Drawing

Lesson 3: Plain Scale Drawing Fundamentals

Objective: Understand and apply plain scale drawing skills.

Substrand 2.3: Visual Programming

Lesson 4: Introduction to Programming and Visual Programming

Objective: Understand the basics of programming and visual programming.

Lesson 5: Visual Programming Applications

Objective: Explore various types of visual programming applications.

Strand 3: Materials for Production

Substrand 3.1: Composite Materials

Lesson 1: Identifying Composite Materials

Objective: Learn to identify composite materials in the locality.

Lesson 2: Composition of Composite Materials

Objective: Describe the composition of composite materials.

Lesson 3: Uses of Composite Materials in the Locality

Objective: Relate composite materials to their use in a work environment.

  1. Plywood:
    • Uses:
      • Furniture, construction.
    • Importance:
      • Structural stability, flexibility.
  1. Kevlar Composites:
    • Uses:
      • Bulletproof vests, sports equipment.
    • Importance:
      • High tensile strength.

Lesson 4: Acknowledging the Importance of Composite Materials

Objective: Acknowledge the importance of composite materials used in the locality.

Substrand 3.2: Ceramic Materials

Lesson 5: Identifying Ceramic Materials

Objective: Identify common ceramic materials in the locality.

Lesson 6: Physical Properties of Ceramic Materials

Objective: Describe the physical properties of ceramic materials.

Lesson 7: Matching Ceramic Materials to Their Uses

Objective: Use a chart to match ceramic materials to their uses in the work environment.

  1. Glass:
    • Uses:
      • Windows, containers, tableware.
    • Importance:
      • Transparency, versatility.
  1. Porcelain:
    • Uses:
      • Dinnerware, decorative items.
    • Importance:
      • Elegant appearance, durability.

Strand 4: Tools and Production

Substrand 4.1: Cutting Tools

Lesson 1: Identifying Cutting Tools

Objective: Learn to identify cutting tools used in the work environment.

Lesson 2: Selecting Cutting Tools for Tasks

Objective: Select cutting tools for given tasks in a workplace.

Lesson 3: Observing Cutting Tool Use

Objective: Use audio-visual aids to observe the use of cutting tools in the work environment.

Lesson 4: Demonstrating Safe Use of Cutting Tools

Objective: Demonstrate safe use of cutting tools to perform specific tasks.

Lesson 5: Performing Tasks Using Cutting Tools

Objective: Carry out given tasks using cutting tools.

Lesson 6: Maintaining and Storing Cutting Tools

Objective: Learn to care for cutting tools in the work environment.

Lesson 7: Acknowledging the Importance of Cutting Tools

Objective: Recognize the importance of cutting tools in the work environment.

Substrand 4.2: Production Unit

Lesson 8: Explaining Factors in Locating a Production Unit

Objective: Explain the factors considered when locating a production unit.

Lesson 9: Analyzing Factors Determining Production Unit Size

Objective: Analyze the factors determining the size of a production unit.

Lesson 10: Locating a Production Unit in a Suitable Area

Objective: Locate a production unit in a suitable area.

Lesson 11-15: Application of Knowledge in Practical Scenarios

Objective: Apply knowledge gained in real-life situations.

Strand 5: Entrepreneurship

Substrand 5.1: Bookkeeping

Lesson 1: Understanding Basic Terms in Bookkeeping

Lesson 2: Importance of Bookkeeping for a Business

Lesson 3: Calculating Assets, Liabilities, and Capital

Lesson 4: Case Study Analysis of Cash and Credit Transactions

Lesson 5: Costing, Pricing, and Profit Calculation

Lesson 6: Components of Financial Statements

Lesson 7: Drawing Simple Financial Statements

Substrand 5.2: Income and Budgeting

Lesson 8: Sources of Income for an Individual

Lesson 9: Importance of Budgeting

Lesson 10: Wise Spending and Budget Preparation

Lesson 11: Ethical and Unethical Practices in Income and Budgeting

Substrand 5.3: Marketing of Goods and Services

Lesson 12: Meaning and Importance of Marketing

Lesson 13: Sources of Information about the Market

Lesson 14: Factors in Selecting a Suitable Market

Lesson 15: ICT Tools in Marketing

Substrand 5.4: Saving and Investment

Lesson 16: Reasons for Saving and Investment

Lesson 17: Methods of Saving and Investment

Lesson 18: Creating a Simple Saving and Investment Plan

Lesson 19: Ethical and Unethical Practices in Saving and Investing

Lesson 20: Researching Ethical and Unethical Practices

Top of Form

Top of Form

Top of Form

 

 

Exit mobile version