ict form 4 chapter 1(answer)
DESCRIPTION
TRANSCRIPT
What is ICT ?
-ICT is the technology required for information processing.- In particular, the use Of electronic computers, communication devices and software application to convert, store, protect, process, transmit,
and retrieve information from anywhere and anytime.
Information and Communication Technology
Information
Communication
Technology
From reading, investigation, study or research
From internet, e-mail, video conferencing
From telephone, fax machine, radio, tv, sateliteswww…
LESSON 1
11
TECHNOLOGY TIMELINE
3500 BC (Sumerians-Cuneiform writing)
1500 BC(Phoencians- alphabet )
1941Computer
1793telegraph
1925Television
1454 First Printing machine
105 BCTsai Lun- paper
1876First telephone
1958photocopier
1963Satellite
1969APRANET -internet 22
LESSON 2EVOLUTION OF COMPUTERS
200 BC ( Chinese Abacus) 1801
Joseph Marie Jacquard –Weaving Loom
500 BC (Egyptian abacus )
1620John Napier –Napier’s Bones
1653Blaise Pascal- Pascaline
1673Gottfried Wilhelm Von Leibniz
- Leibniz’s Rechiner
1941Harvard University-
Mark 1
1823Charles Baggage –
Mechanical calculator Machine
33
Computer Computer generationsgenerations
Technology Technology Problem/ Problem/ advantages advantages
First GenerationFirst Generation
(1940-1956)(1940-1956)
Vacuum tubeVacuum tube Punched cardPunched card magnetic tapemagnetic tape
huge, slow, huge, slow, expensive & expensive & unreliable unreliable tubes burnt out tubes burnt out vacuum tubes vacuum tubes generated a great generated a great deal of heat.deal of heat.
Second Generation Second Generation
(1956-1963)(1956-1963)
transistor transistor smaller than smaller than vacuum tubes vacuum tubes No warm up time No warm up time Less energyLess energy less heatless heat
Third Generation Third Generation
(1964-1971)(1964-1971)
IBM 370 series IBM 370 series CDC 7600 & B2500CDC 7600 & B2500Integrated circuit Integrated circuit (IC)- silicone chip(IC)- silicone chip
were reliable, were reliable, compact & cheaper compact & cheaper Sold hardware & Sold hardware & software software separatelyseparately 44
Fourth Generation Fourth Generation
(1971-Present)(1971-Present)
computer computer models :models :-Apple MacintoshApple Macintosh-IBMIBM-DELLDELL-ACERACER microprocessor microprocessor
computer became computer became 100 times smaller 100 times smaller than ENIACthan ENIAC Gain in speed, Gain in speed, reliability, & reliability, & storage capacity storage capacity
Fifth Generation Fifth Generation
(Present & Beyond)(Present & Beyond)
silicone chip silicone chip Processor Processor Robotics Robotics Virtual realityVirtual realityIntelligent Intelligent systems systems Program translate Program translate languages languages
New Era Computer New Era Computer super computer super computer Mainframe Mainframe Minicomputer Minicomputer Personal computer Personal computer (PC)(PC)Mobile computer Mobile computer
55
66
DIFFERENCE BETWEEN COMPUTERIZED DIFFERENCE BETWEEN COMPUTERIZED AND NON-COMPUTERIZEDAND NON-COMPUTERIZED
COMPUTERIZEDCOMPUTERIZED
Used computer to do Used computer to do something or their something or their work. work.
Such as input data, Such as input data, surf internet.surf internet.
Easy to search Easy to search informationinformation
E-learning, E-E-learning, E-CommerceCommerce
NON-COMPUTERIZEDNON-COMPUTERIZED
ManuallyManually Use file to put a Use file to put a
documentdocument Very difficult to find Very difficult to find
old document or old document or data.data.
FileFile
LESSON 3 & 4USAGE OF ICT IN DAILY LIFE
LESSON 3 & 4USAGE OF ICT IN DAILY LIFE
BEFORE ICTBEFORE ICT
(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT
(computerized)(computerized)1. Teacher lectures 1. Teacher lectures Teacher as a facilitator. Teacher as a facilitator.
Students study by their Students study by their own.own.
2. Students write in 2. Students write in their their
notes / exercise books notes / exercise books
Students do the Students do the exercise in the exercise in the computer computer
3. Teacher write notes 3. Teacher write notes
On the board On the board Teacher use the LCD Teacher use the LCD projector and computer projector and computer
4. Students use 4. Students use textbooks textbooks
Students use teaching Students use teaching coursewarecourseware
A) EDUCATION
77
Advantages of ICT in education
Document / notes can be shared
Use of paper is reduced (paperless)
No heavy bags to carry
Can connect to the internet (Borderless communication)
Faster communication speed
88
Uses of ICT in education
Long distance learning (Pendidikan Jarak Jauh) Office Automation ( student registration, examination) Online library Online discussion with students abroad Teacher use computer to do the research for teaching material. Students browse internet to look for information Researchers use computer to collect and process data
m/s 12
99
B) BANKING SYSTEM
BEFORE ICTBEFORE ICT
(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT
(computerized)(computerized)
1. Done manually by 1. Done manually by taking deposit taking deposit directlydirectly
All transaction are All transaction are done with computerdone with computer
2. Transactions can 2. Transactions can only be made during only be made during working hours working hours
Transactions can Transactions can only be made 24 only be made 24 hours a dayhours a day
3. Takes times to 3. Takes times to approve any loan approve any loan applications applications
Loan application can Loan application can be approved fasterbe approved faster
Eg: online services, Eg: online services, phone banking phone banking system, credit cardssystem, credit cards
1010
Uses of ICT in banking system
Customers can make transaction.
businessman can access company account for loan application, business transaction and update on their cash flow at any time.
Bank administrator can oversee the entire banking activities such as inter-branch transaction (IBT).
m/s 13
1111
BEFORE ICTBEFORE ICT
(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT
(computerized)(computerized)1. Production was slow 1. Production was slow Production is fasterProduction is faster
2. Done manually and 2. Done manually and totally depended on totally depended on human labour. human labour.
Use machine or Use machine or robotic robotic
3. Takes times to 3. Takes times to finish the product finish the product
Production can be Production can be increased through all increased through all day operationday operation
C)INDUSTRY m/s14
Uses of ICT in industry
Used to facilitate production planning and control system. To help in product design in the industrial sector.
1212
BEFORE ICTBEFORE ICT
(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT
(computerized)(computerized)Using barter systemUsing barter system Using e-commerceUsing e-commerce
Word of mouth, Word of mouth, billboard, printed billboard, printed flyersflyers
Advertisement on Advertisement on Radio, television and Radio, television and InternetInternet
Trading globally was Trading globally was slow, late and slow, late and expensive expensive
Trading globally was Trading globally was faster and less faster and less expensiveexpensive
D) E- COMMERCE
Uses of ICT in E-Commerce
Customers use computer to be connected online with suppliers to purchase products. Employees use computers and telephones to communicate with their customers for any enquiries. 1313
LESSON 5THE IMPACT OF ICT ON SOCIETY
POSITIVE EFFECTS POSITIVE EFFECTS NEGATIVE EFFECTNEGATIVE EFFECT
1. Faster 1. Faster communication speed communication speed
1.1. Social problems Social problems fraudfraud identity theftidentity theft pornographypornography hacking hacking
2. Lower 2. Lower communication costcommunication cost
3. Reliable mode of 3. Reliable mode of communicationcommunication
4. Effective sharing of 4. Effective sharing of information information
2. Health problems 2. Health problems bad posturebad posture eyestraineyestrain physical and mental physical and mental stressstress
5. Paperless 5. Paperless environment environment
6. Borderless 6. Borderless communication communication 1414
LESSON 6
Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it.
GUIDELINES
Meaning of the ….
Ethics
Any code of conducts that are not conforming to approved standards of social or processional behavior
Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority.
Unethical
Law
1515
ETHICS ETHICS LAW LAW
As a Guideline As a Guideline As a rule to controlAs a rule to control
Moral standards Moral standards Judicial standards Judicial standards
Free to follow the Free to follow the code of ethicscode of ethics
Must follow the Must follow the regulation and law regulation and law
No punishments No punishments Penalties, Penalties, imprisonments and imprisonments and
others lawothers law
UniversalUniversal Depends on countryDepends on country
Produce ethical Produce ethical computer userscomputer users
Prevent misusing of Prevent misusing of computers computers
Immoral Immoral Crime Crime
Differences between Ethics and Law
1616
Try do this exercises…..
1. Sending warning about viruses to other computer users. ……………………………..
2. Selling information to other parties without the owner’s permission. ……………..
3. Modifying certain information on the Internet, affecting the accuracy of the
information. ………………………4. Selling pirated software in night market. ………………….5. Reading your friend’s e-mail without his or her permission. ………………….6. Hacking into your school’ database to change your examination results.
…………..7. Using the office computer to do the personal things. …………..8. Using the information with authorization. ………………..9. Involvement in stealing software. ……………………..10. Asking the permission before sending any business advertisements to
others. ……………………
ETHICS UNETHIC LAW BREAKING
FIND THE ANSWER FROM THE TEXT BOOK ……
1717
LESSON 8INTELLECTUAL PROPERTY RIGHTS
Refers to works created by inventors, author and artists. These work are unique And have value in market place.
Covers ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes…..
Definition of Intellectual Property
Intellectual Property law
INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS
• TRADEMARKS• SERVICE MARKS • TRADE/ COMPANY NAMES • GEOGRAPHICAL INDICATIONS • DOMAIN NAMES • COPYRIGHTS • PATENTS
1818
Types of Intellectual Property
Protection
Literary & artistic material, music, film,Sound recording & roadcasts, including
Software & multimedia
Words, names, symbols, devices& images that represent product,
Goods or services
Utility, design, plant That protect inventions
& improvement to existing inventions
Lines, contours, colors, shape,Texture, or material of the product or
Its ornamentation
1 ) Patents for inventions
2) Trademark for brand identity
3) Design for product appearance
4) Copyright for material
1919
Privacy in IT refers to the data and Information privacy.
Information privacy-Described as the rights of individuals and companies
To deny or restrict the collection and use of information about them.
What is Privacy??
LESSON 9
2020
How does computer technology threaten the privacy of our data?
A)Cookies • identify web casting, e-commerce, web application • contain user information and save it in the hard disk• used some website to store password & track regular we visit a website. • store information for future use.
B) Electronic Profile • Combining of data in database that can be sold to the
internet by the company to the interested parties. • eg: form such as magazine subscription or product
warranty cards • Personal detail such as age, address and marital status.
C) Spyware• program that collect user information without the user’s
knowledge.• communicates information it collects to some outside
source while we are online. 2121
WHY DO WE NEED PRIVACY???
• We need privacy for anonymity
• we need privacy for confidentiality
• we do not our private lives and habit exposed to third parties
CAN PRIVACY BE PROTECTED ??
• Privacy law
• utilities software (Eg: anti-spam program, firewall , anti-spyware, anti-virus)
2222
THE WAYS OF COMPUTER PRIVACYTHE WAYS OF COMPUTER PRIVACY
Not just to protect the computer but to make sure that the computer issues by authorized worker or user only.
With public key encryption there are two keys, one public and the other private.
When u send a message by email, the message is broken into packets and the packets are sent out over the Internet.
The public key needs to be known
The number of packets depends on the size of message.
To send a message to a friend, you uses his public key to encrypt the message.
Each message has the internet address of the recipient.
Your friend then uses his private key to decode the message after receiving it.
This means there may be some places between the packets could be intercepted and examined.
PASSWORD ENCRYPTION
EMAIL PRIVACY
2323
LESSON 10
Process where user verify that they are who they say they are
Authentication
Device that translates persona characteristics
Into a digital code that is compared with a digital code Stored in the database
Refers to the checking system that Authenticates the user
Biometric device Callback system
1. Fingerprint Recognition – measure blood flow, edges of the fingers.2. Facial Recognition – characteristics of an individual’s face images. 3. Hand Geometry Scanning - analysis of the shape of one’s hand.4. Iris Scanning – 200 point that can be used for comparison, including rings, furrows and freckles. (this method is excellent but cost is high)5. Retinal Scanning – analysis the layer of blood vessels at the back of the eye.6. Voice Recognition – verification time is approximately 5 seconds7. Signature Verification System – uses special pen and tablet. Verification system is fair and the cost is excellent.
2 methods
2424
LESSON 11
Act of proving or disproving the correctness of a system With respect to a certain formal specification.
Verification
Process of validating the User
Processed ObjectSomething the user has
such as IC
User Identification
2 methods
• key in the user name to log in• exam slip • Passport
• Birth certificate • marriage certificate
Examples:• driver license• security card• credit card
• IC• security token
•Cell phone
Examples:
2525
LESSON 12
CONTROVERSIAL CONTENTIs information that causes disagreement in opinions
And may cause the disruption of peace because different People or culture have different view about the contents.
Pornography
• impact on Malaysian society..
1) Can lead to criminal acts such as exploitation of women and children
2) Can lead to sexual addiction and perversion
3) Can develop low moral value
• impact on Malaysian society..1) Disregards honesty and truth2) Bad habit and spreading untruths or rumors3) Unnecessary argument4) Negative attitudes
m/s 33
Slander
2626
LESSON 13
Process that prevents or blocks access to certain materials on the internet.
What is Internet filtering?
Keyword blocking-Banned word
-Objectionable terms
Site blocking-Dubious internet sites
-Denial list regularly updated
Web rating system-Rating done by web page
author or -Independent bureau
3 method to filter the content of the Internet
The process of Internet filtering
2727
LESSON 14
Any laws relating to protecting the internet and other online communication Technologies
What is Cyber Law?
Needs for Cyber Law
Integrity and Security Information
Legal status of online transaction
Privacy and confidentially of information
Intellectual property Rights
Security of government data
2828
The Cyber Law Acts in Malaysia
1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet
2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities
3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine
4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia
2929
LESSON 15
Computer Crimes Computer Crimes 1. Computer 1. Computer Fraud Fraud
Defined as having an intention to take Defined as having an intention to take
advantage over or causing loss to other peopleadvantage over or causing loss to other people..Eg: e-mail hoaxes, programme fraud, sales Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes.promotion, investment schemes.
2. Copyright 2. Copyright
Infringement Infringement Defined as a violation of the right secured by a Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction copyright. Involve illegal copy or reproduction of copyright material by the black market of copyright material by the black market group.group.
Eg: Pirated CDEg: Pirated CD
3. Computer 3. Computer Theft Theft
Defined as the unauthorised use of another Defined as the unauthorised use of another person’s property with the intention to deny the person’s property with the intention to deny the owner the rightful possession of that property owner the rightful possession of that property or its use. or its use.
Eg: transfer of payment to the wrong account Eg: transfer of payment to the wrong account
4. Computer 4. Computer Attacks Attacks
Defined as any activities taken to disrupt the Defined as any activities taken to disrupt the equipment of computer system, change equipment of computer system, change processing control or corrupt stored data.processing control or corrupt stored data.
Eg: malicious code (virus, worm…)Eg: malicious code (virus, worm…)
3030
Means protecting our computer system and the information theyContain against unwanted access, damage, destruction or modification.
Network securityHardware Security
Software security/ data security
3 types
Eg: pc-lock, keyboard lock,
Smart card
Eg: activation code,
Serial number Eg: firewall
3131
LESSON 17
Computer Threats
Introduction computer threats
Natural Disasters
Human
• Malicious Code
1. Virus 2. Trojan Horse3. Logic Bomb4. Trapdoor or Backdoor 5. Worm
• Flood • Fire • Earthquakes, storms and
tornados • Excessive heat • Inadequate power supply
3232
Give the correct answers…
1. A program that copies itself and spreads through a network. ( )2. A program that goes off when a specific condition occurs and causes threats to computer at a specified time and date. ( )3. Usually attaches itself to the program and then destroys or co-exists with the program. ( )4. Spreads through any medium and causes threats by modifying the files attached. ( )5. One of the common ways to attack our computer is requesting for users’ login ID and password. ( )
Page 41-433333
Worm Worm VirusVirus
Operates through the Operates through the network network
Spreads through any Spreads through any mediummedium
Spreads copies on Spreads copies on itself as a standalone itself as a standalone program program
Spreads copies itself Spreads copies itself as a program that as a program that attaches to other attaches to other programs programs
Primary differences between worms and viruses
3434
It defined as unauthorised access to the
computer system by hacker. Hackers are person who learn about the computer system n detail.
What is Hacking?
What is Theft?
Example: steal money, goods information, Information, and resource ….
Steal computer.
3 approaches to prevent the theft….
• Using locks, smart card, password • record any hardware transported• Restricting the hardware from being moved
LESSON 17
3535
LESSON 18
Security Measures
Anti-spywareFirewall
Anti-virus
Human Aspects
Data backup
Cryptography
3636
Security Measures so Security Measures so mm
Explanation Explanation
1.Data backup1.Data backup File duplication – daily, weekly , biweekly File duplication – daily, weekly , biweekly backup backup
2. Cryptography 2. Cryptography Is a process of hiding information by altering Is a process of hiding information by altering the actual information into different the actual information into different representation. representation.
3. Antivirus 3. Antivirus Protects a computer against viruses by Protects a computer against viruses by identifying and removing any computer viruses identifying and removing any computer viruses found in the computer. (kaspersky)found in the computer. (kaspersky)
4. Anti-spyware4. Anti-spyware Is a program placed on a computer without the Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware)user’s knowledge. (spy-bot, ad-adware)
5. Firewall5. Firewall Piece of hardware software which functions in Piece of hardware software which functions in a networking environment to prevent some a networking environment to prevent some communication forbidden by the security communication forbidden by the security policy. (screening routers, proxy gateway, policy. (screening routers, proxy gateway, guard)guard)
6. Human Aspects6. Human Aspects Refer to the user and also the intruder of a Refer to the user and also the intruder of a computer system.computer system.
3737
LESSON 19 Relationship between security threats and security
measures Security threatsSecurity threats VSVS Security measures Security measures
1. 1. Malicious code threatsMalicious code threats VSVS Antivirus & Anti-Spyware Antivirus & Anti-Spyware
2. Hacking VS firewall2. Hacking VS firewall
3. Natural disaster VS data backup3. Natural disaster VS data backup
4. Theft VS human aspect4. Theft VS human aspect
SECURITY PROCEDURES
There are a few ways to protect the information:
• backup files • detect virus and do cleanup• warn others on virus attack
3838
LESSON 21Computer application in the society
Area Area Examples of software Examples of software applicationsapplications
Home & Home & education education
Microsoft office, adobe Microsoft office, adobe photoshop, macromedia flash, photoshop, macromedia flash, autoCAD…autoCAD…
Business Business Spreadsheet, database, Spreadsheet, database, presentation, graphics…presentation, graphics…
Graphics & Graphics & multimediamultimedia
Computer Aided design (CAD), Computer Aided design (CAD), paint/image editingpaint/image editing
CommunicatiCommunication on
E-mail, web browsers, chat E-mail, web browsers, chat rooms, Newgroups, video rooms, Newgroups, video conferencing conferencing
3939
Computer users
Home user
Power user Large business user
Mobile user SOHO
4040
HOW TO CONDUCT A STUDY
• STEP 1: GET AN OVERVIEW OF THE TOPIC
• STEP 2: NARROW DOWN THE TOPIC
• STEP 3: FIND STUDY MATERIAL
• STEP 4: EVALUATE STUDY MATERIAL
• STEP 5: WRITING OUT THE STUDY MATERIAL
4141
PRESENTING RESULT
• INTRODUCTION
• CONTENT
• CONCLUSION
4242