ict form 4 chapter 1(answer)

42
What is ICT ? -ICT is the technology required for information processing. In particular, the use Of electronic computers, communication device d software application to convert, store, protect, process, transmit and retrieve information from anywhere and anytime. Information and Communication Technology Information Communication Technology From reading, investigation, study or r From internet, e-mail, video conferenci From telephone, fax machine, radio, tv, www… LESSON 1 1

Upload: smkengkilili2011

Post on 20-Jan-2015

12.958 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ict form 4 chapter 1(answer)

What is ICT ?

-ICT is the technology required for information processing.- In particular, the use Of electronic computers, communication devices and software application to convert, store, protect, process, transmit,

and retrieve information from anywhere and anytime.

Information and Communication Technology

Information

Communication

Technology

From reading, investigation, study or research

From internet, e-mail, video conferencing

From telephone, fax machine, radio, tv, sateliteswww…

LESSON 1

11

Page 2: Ict form 4 chapter 1(answer)

TECHNOLOGY TIMELINE

3500 BC (Sumerians-Cuneiform writing)

1500 BC(Phoencians- alphabet )

1941Computer

1793telegraph

1925Television

1454 First Printing machine

105 BCTsai Lun- paper

1876First telephone

1958photocopier

1963Satellite

1969APRANET -internet 22

Page 3: Ict form 4 chapter 1(answer)

LESSON 2EVOLUTION OF COMPUTERS

200 BC ( Chinese Abacus) 1801

Joseph Marie Jacquard –Weaving Loom

500 BC (Egyptian abacus )

1620John Napier –Napier’s Bones

1653Blaise Pascal- Pascaline

1673Gottfried Wilhelm Von Leibniz

- Leibniz’s Rechiner

1941Harvard University-

Mark 1

1823Charles Baggage –

Mechanical calculator Machine

33

Page 4: Ict form 4 chapter 1(answer)

Computer Computer generationsgenerations

Technology Technology Problem/ Problem/ advantages advantages

First GenerationFirst Generation

(1940-1956)(1940-1956)

Vacuum tubeVacuum tube Punched cardPunched card magnetic tapemagnetic tape

huge, slow, huge, slow, expensive & expensive & unreliable unreliable tubes burnt out tubes burnt out vacuum tubes vacuum tubes generated a great generated a great deal of heat.deal of heat.

Second Generation Second Generation

(1956-1963)(1956-1963)

transistor transistor smaller than smaller than vacuum tubes vacuum tubes No warm up time No warm up time Less energyLess energy less heatless heat

Third Generation Third Generation

(1964-1971)(1964-1971)

IBM 370 series IBM 370 series CDC 7600 & B2500CDC 7600 & B2500Integrated circuit Integrated circuit (IC)- silicone chip(IC)- silicone chip

were reliable, were reliable, compact & cheaper compact & cheaper Sold hardware & Sold hardware & software software separatelyseparately 44

Page 5: Ict form 4 chapter 1(answer)

Fourth Generation Fourth Generation

(1971-Present)(1971-Present)

computer computer models :models :-Apple MacintoshApple Macintosh-IBMIBM-DELLDELL-ACERACER microprocessor microprocessor

computer became computer became 100 times smaller 100 times smaller than ENIACthan ENIAC Gain in speed, Gain in speed, reliability, & reliability, & storage capacity storage capacity

Fifth Generation Fifth Generation

(Present & Beyond)(Present & Beyond)

silicone chip silicone chip Processor Processor Robotics Robotics Virtual realityVirtual realityIntelligent Intelligent systems systems Program translate Program translate languages languages

New Era Computer New Era Computer super computer super computer Mainframe Mainframe Minicomputer Minicomputer Personal computer Personal computer (PC)(PC)Mobile computer Mobile computer

55

Page 6: Ict form 4 chapter 1(answer)

66

DIFFERENCE BETWEEN COMPUTERIZED DIFFERENCE BETWEEN COMPUTERIZED AND NON-COMPUTERIZEDAND NON-COMPUTERIZED

COMPUTERIZEDCOMPUTERIZED

Used computer to do Used computer to do something or their something or their work. work.

Such as input data, Such as input data, surf internet.surf internet.

Easy to search Easy to search informationinformation

E-learning, E-E-learning, E-CommerceCommerce

NON-COMPUTERIZEDNON-COMPUTERIZED

ManuallyManually Use file to put a Use file to put a

documentdocument Very difficult to find Very difficult to find

old document or old document or data.data.

FileFile

LESSON 3 & 4USAGE OF ICT IN DAILY LIFE

Page 7: Ict form 4 chapter 1(answer)

LESSON 3 & 4USAGE OF ICT IN DAILY LIFE

BEFORE ICTBEFORE ICT

(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT

(computerized)(computerized)1. Teacher lectures 1. Teacher lectures Teacher as a facilitator. Teacher as a facilitator.

Students study by their Students study by their own.own.

2. Students write in 2. Students write in their their

notes / exercise books notes / exercise books

Students do the Students do the exercise in the exercise in the computer computer

3. Teacher write notes 3. Teacher write notes

On the board On the board Teacher use the LCD Teacher use the LCD projector and computer projector and computer

4. Students use 4. Students use textbooks textbooks

Students use teaching Students use teaching coursewarecourseware

A) EDUCATION

77

Page 8: Ict form 4 chapter 1(answer)

Advantages of ICT in education

Document / notes can be shared

Use of paper is reduced (paperless)

No heavy bags to carry

Can connect to the internet (Borderless communication)

Faster communication speed

88

Page 9: Ict form 4 chapter 1(answer)

Uses of ICT in education

Long distance learning (Pendidikan Jarak Jauh) Office Automation ( student registration, examination) Online library Online discussion with students abroad Teacher use computer to do the research for teaching material. Students browse internet to look for information Researchers use computer to collect and process data

m/s 12

99

Page 10: Ict form 4 chapter 1(answer)

B) BANKING SYSTEM

BEFORE ICTBEFORE ICT

(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT

(computerized)(computerized)

1. Done manually by 1. Done manually by taking deposit taking deposit directlydirectly

All transaction are All transaction are done with computerdone with computer

2. Transactions can 2. Transactions can only be made during only be made during working hours working hours

Transactions can Transactions can only be made 24 only be made 24 hours a dayhours a day

3. Takes times to 3. Takes times to approve any loan approve any loan applications applications

Loan application can Loan application can be approved fasterbe approved faster

Eg: online services, Eg: online services, phone banking phone banking system, credit cardssystem, credit cards

1010

Page 11: Ict form 4 chapter 1(answer)

Uses of ICT in banking system

Customers can make transaction.

businessman can access company account for loan application, business transaction and update on their cash flow at any time.

Bank administrator can oversee the entire banking activities such as inter-branch transaction (IBT).

m/s 13

1111

Page 12: Ict form 4 chapter 1(answer)

BEFORE ICTBEFORE ICT

(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT

(computerized)(computerized)1. Production was slow 1. Production was slow Production is fasterProduction is faster

2. Done manually and 2. Done manually and totally depended on totally depended on human labour. human labour.

Use machine or Use machine or robotic robotic

3. Takes times to 3. Takes times to finish the product finish the product

Production can be Production can be increased through all increased through all day operationday operation

C)INDUSTRY m/s14

Uses of ICT in industry

Used to facilitate production planning and control system. To help in product design in the industrial sector.

1212

Page 13: Ict form 4 chapter 1(answer)

BEFORE ICTBEFORE ICT

(Non-computerized )(Non-computerized )AFTER ICTAFTER ICT

(computerized)(computerized)Using barter systemUsing barter system Using e-commerceUsing e-commerce

Word of mouth, Word of mouth, billboard, printed billboard, printed flyersflyers

Advertisement on Advertisement on Radio, television and Radio, television and InternetInternet

Trading globally was Trading globally was slow, late and slow, late and expensive expensive

Trading globally was Trading globally was faster and less faster and less expensiveexpensive

D) E- COMMERCE

Uses of ICT in E-Commerce

Customers use computer to be connected online with suppliers to purchase products. Employees use computers and telephones to communicate with their customers for any enquiries. 1313

Page 14: Ict form 4 chapter 1(answer)

LESSON 5THE IMPACT OF ICT ON SOCIETY

POSITIVE EFFECTS POSITIVE EFFECTS NEGATIVE EFFECTNEGATIVE EFFECT

1. Faster 1. Faster communication speed communication speed

1.1. Social problems Social problems fraudfraud identity theftidentity theft pornographypornography hacking hacking

2. Lower 2. Lower communication costcommunication cost

3. Reliable mode of 3. Reliable mode of communicationcommunication

4. Effective sharing of 4. Effective sharing of information information

2. Health problems 2. Health problems bad posturebad posture eyestraineyestrain physical and mental physical and mental stressstress

5. Paperless 5. Paperless environment environment

6. Borderless 6. Borderless communication communication 1414

Page 15: Ict form 4 chapter 1(answer)

LESSON 6

Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it.

GUIDELINES

Meaning of the ….

Ethics

Any code of conducts that are not conforming to approved standards of social or processional behavior

Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority.

Unethical

Law

1515

Page 16: Ict form 4 chapter 1(answer)

ETHICS ETHICS LAW LAW

As a Guideline As a Guideline As a rule to controlAs a rule to control

Moral standards Moral standards Judicial standards Judicial standards

Free to follow the Free to follow the code of ethicscode of ethics

Must follow the Must follow the regulation and law regulation and law

No punishments No punishments Penalties, Penalties, imprisonments and imprisonments and

others lawothers law

UniversalUniversal Depends on countryDepends on country

Produce ethical Produce ethical computer userscomputer users

Prevent misusing of Prevent misusing of computers computers

Immoral Immoral Crime Crime

Differences between Ethics and Law

1616

Page 17: Ict form 4 chapter 1(answer)

Try do this exercises…..

1. Sending warning about viruses to other computer users. ……………………………..

2. Selling information to other parties without the owner’s permission. ……………..

3. Modifying certain information on the Internet, affecting the accuracy of the

information. ………………………4. Selling pirated software in night market. ………………….5. Reading your friend’s e-mail without his or her permission. ………………….6. Hacking into your school’ database to change your examination results.

…………..7. Using the office computer to do the personal things. …………..8. Using the information with authorization. ………………..9. Involvement in stealing software. ……………………..10. Asking the permission before sending any business advertisements to

others. ……………………

ETHICS UNETHIC LAW BREAKING

FIND THE ANSWER FROM THE TEXT BOOK ……

1717

Page 18: Ict form 4 chapter 1(answer)

LESSON 8INTELLECTUAL PROPERTY RIGHTS

Refers to works created by inventors, author and artists. These work are unique And have value in market place.

Covers ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes…..

Definition of Intellectual Property

Intellectual Property law

INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS

• TRADEMARKS• SERVICE MARKS • TRADE/ COMPANY NAMES • GEOGRAPHICAL INDICATIONS • DOMAIN NAMES • COPYRIGHTS • PATENTS

1818

Page 19: Ict form 4 chapter 1(answer)

Types of Intellectual Property

Protection

Literary & artistic material, music, film,Sound recording & roadcasts, including

Software & multimedia

Words, names, symbols, devices& images that represent product,

Goods or services

Utility, design, plant That protect inventions

& improvement to existing inventions

Lines, contours, colors, shape,Texture, or material of the product or

Its ornamentation

1 ) Patents for inventions

2) Trademark for brand identity

3) Design for product appearance

4) Copyright for material

1919

Page 20: Ict form 4 chapter 1(answer)

Privacy in IT refers to the data and Information privacy.

Information privacy-Described as the rights of individuals and companies

To deny or restrict the collection and use of information about them.

What is Privacy??

LESSON 9

2020

Page 21: Ict form 4 chapter 1(answer)

How does computer technology threaten the privacy of our data?

A)Cookies • identify web casting, e-commerce, web application • contain user information and save it in the hard disk• used some website to store password & track regular we visit a website. • store information for future use.

B) Electronic Profile • Combining of data in database that can be sold to the

internet by the company to the interested parties. • eg: form such as magazine subscription or product

warranty cards • Personal detail such as age, address and marital status.

C) Spyware• program that collect user information without the user’s

knowledge.• communicates information it collects to some outside

source while we are online. 2121

Page 22: Ict form 4 chapter 1(answer)

WHY DO WE NEED PRIVACY???

• We need privacy for anonymity

• we need privacy for confidentiality

• we do not our private lives and habit exposed to third parties

CAN PRIVACY BE PROTECTED ??

• Privacy law

• utilities software (Eg: anti-spam program, firewall , anti-spyware, anti-virus)

2222

Page 23: Ict form 4 chapter 1(answer)

THE WAYS OF COMPUTER PRIVACYTHE WAYS OF COMPUTER PRIVACY

Not just to protect the computer but to make sure that the computer issues by authorized worker or user only.

With public key encryption there are two keys, one public and the other private.

When u send a message by email, the message is broken into packets and the packets are sent out over the Internet.

The public key needs to be known

The number of packets depends on the size of message.

To send a message to a friend, you uses his public key to encrypt the message.

Each message has the internet address of the recipient.

Your friend then uses his private key to decode the message after receiving it.

This means there may be some places between the packets could be intercepted and examined.

PASSWORD ENCRYPTION

EMAIL PRIVACY

2323

Page 24: Ict form 4 chapter 1(answer)

LESSON 10

Process where user verify that they are who they say they are

Authentication

Device that translates persona characteristics

Into a digital code that is compared with a digital code Stored in the database

Refers to the checking system that Authenticates the user

Biometric device Callback system

1. Fingerprint Recognition – measure blood flow, edges of the fingers.2. Facial Recognition – characteristics of an individual’s face images. 3. Hand Geometry Scanning - analysis of the shape of one’s hand.4. Iris Scanning – 200 point that can be used for comparison, including rings, furrows and freckles. (this method is excellent but cost is high)5. Retinal Scanning – analysis the layer of blood vessels at the back of the eye.6. Voice Recognition – verification time is approximately 5 seconds7. Signature Verification System – uses special pen and tablet. Verification system is fair and the cost is excellent.

2 methods

2424

Page 25: Ict form 4 chapter 1(answer)

LESSON 11

Act of proving or disproving the correctness of a system With respect to a certain formal specification.

Verification

Process of validating the User

Processed ObjectSomething the user has

such as IC

User Identification

2 methods

• key in the user name to log in• exam slip • Passport

• Birth certificate • marriage certificate

Examples:• driver license• security card• credit card

• IC• security token

•Cell phone

Examples:

2525

Page 26: Ict form 4 chapter 1(answer)

LESSON 12

CONTROVERSIAL CONTENTIs information that causes disagreement in opinions

And may cause the disruption of peace because different People or culture have different view about the contents.

Pornography

• impact on Malaysian society..

1) Can lead to criminal acts such as exploitation of women and children

2) Can lead to sexual addiction and perversion

3) Can develop low moral value

• impact on Malaysian society..1) Disregards honesty and truth2) Bad habit and spreading untruths or rumors3) Unnecessary argument4) Negative attitudes

m/s 33

Slander

2626

Page 27: Ict form 4 chapter 1(answer)

LESSON 13

Process that prevents or blocks access to certain materials on the internet.

What is Internet filtering?

Keyword blocking-Banned word

-Objectionable terms

Site blocking-Dubious internet sites

-Denial list regularly updated

Web rating system-Rating done by web page

author or -Independent bureau

3 method to filter the content of the Internet

The process of Internet filtering

2727

Page 28: Ict form 4 chapter 1(answer)

LESSON 14

Any laws relating to protecting the internet and other online communication Technologies

What is Cyber Law?

Needs for Cyber Law

Integrity and Security Information

Legal status of online transaction

Privacy and confidentially of information

Intellectual property Rights

Security of government data

2828

Page 29: Ict form 4 chapter 1(answer)

The Cyber Law Acts in Malaysia

1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet

2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities

3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine

4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia

2929

Page 30: Ict form 4 chapter 1(answer)

LESSON 15

Computer Crimes Computer Crimes 1. Computer 1. Computer Fraud Fraud

Defined as having an intention to take Defined as having an intention to take

advantage over or causing loss to other peopleadvantage over or causing loss to other people..Eg: e-mail hoaxes, programme fraud, sales Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes.promotion, investment schemes.

2. Copyright 2. Copyright

Infringement Infringement Defined as a violation of the right secured by a Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction copyright. Involve illegal copy or reproduction of copyright material by the black market of copyright material by the black market group.group.

Eg: Pirated CDEg: Pirated CD

3. Computer 3. Computer Theft Theft

Defined as the unauthorised use of another Defined as the unauthorised use of another person’s property with the intention to deny the person’s property with the intention to deny the owner the rightful possession of that property owner the rightful possession of that property or its use. or its use.

Eg: transfer of payment to the wrong account Eg: transfer of payment to the wrong account

4. Computer 4. Computer Attacks Attacks

Defined as any activities taken to disrupt the Defined as any activities taken to disrupt the equipment of computer system, change equipment of computer system, change processing control or corrupt stored data.processing control or corrupt stored data.

Eg: malicious code (virus, worm…)Eg: malicious code (virus, worm…)

3030

Page 31: Ict form 4 chapter 1(answer)

Means protecting our computer system and the information theyContain against unwanted access, damage, destruction or modification.

Network securityHardware Security

Software security/ data security

3 types

Eg: pc-lock, keyboard lock,

Smart card

Eg: activation code,

Serial number Eg: firewall

3131

Page 32: Ict form 4 chapter 1(answer)

LESSON 17

Computer Threats

Introduction computer threats

Natural Disasters

Human

• Malicious Code

1. Virus 2. Trojan Horse3. Logic Bomb4. Trapdoor or Backdoor 5. Worm

• Flood • Fire • Earthquakes, storms and

tornados • Excessive heat • Inadequate power supply

3232

Page 33: Ict form 4 chapter 1(answer)

Give the correct answers…

1. A program that copies itself and spreads through a network. ( )2. A program that goes off when a specific condition occurs and causes threats to computer at a specified time and date. ( )3. Usually attaches itself to the program and then destroys or co-exists with the program. ( )4. Spreads through any medium and causes threats by modifying the files attached. ( )5. One of the common ways to attack our computer is requesting for users’ login ID and password. ( )

Page 41-433333

Page 34: Ict form 4 chapter 1(answer)

Worm Worm VirusVirus

Operates through the Operates through the network network

Spreads through any Spreads through any mediummedium

Spreads copies on Spreads copies on itself as a standalone itself as a standalone program program

Spreads copies itself Spreads copies itself as a program that as a program that attaches to other attaches to other programs programs

Primary differences between worms and viruses

3434

Page 35: Ict form 4 chapter 1(answer)

It defined as unauthorised access to the

computer system by hacker. Hackers are person who learn about the computer system n detail.

What is Hacking?

What is Theft?

Example: steal money, goods information, Information, and resource ….

Steal computer.

3 approaches to prevent the theft….

• Using locks, smart card, password • record any hardware transported• Restricting the hardware from being moved

LESSON 17

3535

Page 36: Ict form 4 chapter 1(answer)

LESSON 18

Security Measures

Anti-spywareFirewall

Anti-virus

Human Aspects

Data backup

Cryptography

3636

Page 37: Ict form 4 chapter 1(answer)

Security Measures so Security Measures so mm

Explanation Explanation

1.Data backup1.Data backup File duplication – daily, weekly , biweekly File duplication – daily, weekly , biweekly backup backup

2. Cryptography 2. Cryptography Is a process of hiding information by altering Is a process of hiding information by altering the actual information into different the actual information into different representation. representation.

3. Antivirus 3. Antivirus Protects a computer against viruses by Protects a computer against viruses by identifying and removing any computer viruses identifying and removing any computer viruses found in the computer. (kaspersky)found in the computer. (kaspersky)

4. Anti-spyware4. Anti-spyware Is a program placed on a computer without the Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware)user’s knowledge. (spy-bot, ad-adware)

5. Firewall5. Firewall Piece of hardware software which functions in Piece of hardware software which functions in a networking environment to prevent some a networking environment to prevent some communication forbidden by the security communication forbidden by the security policy. (screening routers, proxy gateway, policy. (screening routers, proxy gateway, guard)guard)

6. Human Aspects6. Human Aspects Refer to the user and also the intruder of a Refer to the user and also the intruder of a computer system.computer system.

3737

Page 38: Ict form 4 chapter 1(answer)

LESSON 19 Relationship between security threats and security

measures Security threatsSecurity threats VSVS Security measures Security measures

1. 1. Malicious code threatsMalicious code threats VSVS Antivirus & Anti-Spyware Antivirus & Anti-Spyware

2. Hacking VS firewall2. Hacking VS firewall

3. Natural disaster VS data backup3. Natural disaster VS data backup

4. Theft VS human aspect4. Theft VS human aspect

SECURITY PROCEDURES

There are a few ways to protect the information:

• backup files • detect virus and do cleanup• warn others on virus attack

3838

Page 39: Ict form 4 chapter 1(answer)

LESSON 21Computer application in the society

Area Area Examples of software Examples of software applicationsapplications

Home & Home & education education

Microsoft office, adobe Microsoft office, adobe photoshop, macromedia flash, photoshop, macromedia flash, autoCAD…autoCAD…

Business Business Spreadsheet, database, Spreadsheet, database, presentation, graphics…presentation, graphics…

Graphics & Graphics & multimediamultimedia

Computer Aided design (CAD), Computer Aided design (CAD), paint/image editingpaint/image editing

CommunicatiCommunication on

E-mail, web browsers, chat E-mail, web browsers, chat rooms, Newgroups, video rooms, Newgroups, video conferencing conferencing

3939

Page 40: Ict form 4 chapter 1(answer)

Computer users

Home user

Power user Large business user

Mobile user SOHO

4040

Page 41: Ict form 4 chapter 1(answer)

HOW TO CONDUCT A STUDY

• STEP 1: GET AN OVERVIEW OF THE TOPIC

• STEP 2: NARROW DOWN THE TOPIC

• STEP 3: FIND STUDY MATERIAL

• STEP 4: EVALUATE STUDY MATERIAL

• STEP 5: WRITING OUT THE STUDY MATERIAL

4141

Page 42: Ict form 4 chapter 1(answer)

PRESENTING RESULT

• INTRODUCTION

• CONTENT

• CONCLUSION

4242