rph ict tingkatan 4
DESCRIPTION
ICT Form 4TRANSCRIPT
![Page 1: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/1.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETYMONTH/
WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JAN.
WEEK1 & 2
1.1 Introduction to Information Technology
(4 periods)
Learners should be able to:1.1.1 Define Information
Technology in general.
1.1.2 Discuss the roles of IT in everyday life: Education Banking Industry Commerce.
1. Students state the definition of Information Technology in general.
2. Group Activity: Discussing the roles of
IT in everyday life. Students cite an
example of a technology used in everyday life.
3. Students adhere the rules and regulations set for the ICT lab.
JANWEEK
3
JANWEEK
4
1.2 Computer Ethics and Legal Issues
(8 periods)
1.2.1 Define Computer Ethics.
1.2.2 Identify the Code of Ethics.
1.2.3 Define Intellectual Property.
1.2.4 Define Privacy: authorised access user
authentication and verification
Login (Personal Identification Numbers (PIN), User Identification, password)
Biometrics physical control
1.2.1.1 Students explain Computer Ethics and Code of Ethics.
1.2.1.2 Students describe Intellectual Property and Privacy.
1.2.1.3 Students carry out research on controversial contents and control.
1.2.1.4 Students discuss computer crime and Security threats.
1.2.1.5 Students carry out research on Cyber Law and its importance.
![Page 2: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/2.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETYMONTH/
WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JANWEEK
5
1.2.5 Controversial contents and control:
Pornography Slander Filtering
(Example : NetNanny, CyberPatrol, BlockNow)
1.2.6 Computer crime and Security threats:
Definition : Computer
crime Security
threats Examples of
computer crimes: Fraud identity fraud credit card
fraud Copyright
infringement unauthorized
copy unauthorized
file sharing Theft: data,
information, equipment
Attacks: Examples salami attack, virus, worms, hacking
![Page 3: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/3.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETYMONTH/
WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
1.2.7 Examples of Security threats
malicious codes: e.g. virus, Trojan horse, worms, spy ware, Phishing
hacking: ethical (hackers) and non-ethical hacking (crackers)
Natural/environmental: e.g. fire and natural disasters
Theft : e.g. physical, data, information
1.2.8 Cyber-law2.0 COMPUTER SYSTEMMONTH/
WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
MARCH
WEEK 1
2.1 System Concept
(6 periods)
Learners should be able to:
2.1.1 Overview of computer system
2.1.2 Data Representation: bit byte character
2.1.3 Measurement: bit byte Kilobyte (KB) Megabyte (MB) Gigabyte (GB) Terabyte (TB)
![Page 4: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/4.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
2.0 COMPUTER SYSTEMMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
2.1.4 Clock speed measurement:
megahertz (MHz) gigahertz (GHz)
MARCHWEEK
2
REVISION SCHOOL ASSESSMENT
MARCHWEEK
3
2.1 Hardware
(12 periods)
2.2.1 Input devices
2.2.2 Output devices
2.2.3 Motherboard:o central processing
unit (CPU)o expansion sloto expansion cardo RAM sloto ports and
connectors2.2.4 Storage :
o primary storage (RAM/ROM)
o secondary storage (magnetic medium, optical medium, flash memory card)
MARCHWEEK
4MID-SEMESTER HOLIDAY 1 (14 MARCH - 22 MARCH )
![Page 5: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/5.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER SYSTEMMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
APRILWEEK
1
APRILWEEK
2 - 4
2.3 Software
(12 periods)
2.3.1 Operating System: platforms functions interfaces
2.3.2 Application Software: types and usage (word processing, spreadsheet, presentation, graphics)
2.3.3 Utility Program: types and usage (file management, antivirus, diagnostic, file compression)
2.3.4 Proprietary and open source software
MAYWEEK
1 - 3REVISION AND MID-YEAR EXAM
MAYWEEK
4JUNEWEEK
1
MID-YEAR HOLIDAY (30 MAY - 14 JUNE)
![Page 6: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/6.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
2.0 COMPUTER SYSTEMMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
JUNEWEEK2 & 3
2.4 Installation
(6 periods)
2.4.1 PC assembling
2.4.2 Hard disk partitioning and formatting
2.4.3 Software installation: operating
system application
software utility
program
JUNEWEEK
4
2.5 Current and Future Technologies
(4 periods)
2.5.1 Latest open source software available
JULYWEEK1 & 2
REVISION ICT ASSESSMENT 2 (PORTFOLIOS)
3.0 COMPUTER NETWORKS AND COMMUNICATIONSJULYWEEK
3
JULY WEEK
3.1 Basic Concepts of Networks and Communications
(6 periods)
Learners should be able to:
3.1.1 Define network
3.1.2 Define communication
Notes: Network: To connect two or more computers together with the ability to communicate with each otherCommunication: The transmission of data from one device to anotherDiscuss: file sharing between
computers
![Page 7: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/7.jpg)
4 sending short messages using cellular services
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
AUGUSTWEEK1 & 2
3.1.3 State the importance of network and communication using examples in the student’s immediate environment.
3.1.4 Define types of computer networks
Local Area Network (LAN)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
Conduct group research from Information sources (library, the Internet) examples:Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0)http://www.webopedia.com
Notes:LAN: A network that spans a small area usually confined to a single building or a group of buildings
MAN: A network designed for town and city usually larger than Local-Area Network
WAN: A network that spans a relatively large geographical area usually consisting two or more
Local-Area Network.Example: The InternetGroup activity:Students list out the differences between the three types of computer networkConduct group research from information sources (library, the Internet) on
![Page 8: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/8.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
3.1.5 Differentiate between the three types of computer networks
3.1.6 Define 2 types of network architecture
Client/Server
Peer-to-Peer
3.1.7 State three types of network topology
Bus
Ring
Star
3.1.8 Differentiate between the three types of network topology
3.1.9 Define TCP/IP as the protocol to facilitate communication over computer network
types of network architecture
Notes:Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server
Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities
Conduct group research from information sources (library, the Internet) on types of network topologyStudents draw simple diagram of the 3 types of network topology
Students list out the differences between the three types of network topology
Conduct group research from information sources (library, the Internet) on TCP/IP
![Page 9: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/9.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
3.1.10 State types of network communication that use TCP/IP
Intranet
Internet
Extranet
Cooperation in conducting group research
Conduct group research from information sources (library, the Internet) examples:Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0)http://www.webopedia.com
AUGUSTWEEK
3
3.2 Hardware Requirements
(8 periods )
3.2.1 Identify the devices needed to establish a computer network communication for a client/server network organization
Students list down the various network devices
Notes:
Network Devices:
Network Interface Card (Ethernet and Wi-Fi)
Modem (Internal and External)
Hub, Switch, Router
Wireless Access Point
Students list down the functions of the stated devices
![Page 10: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/10.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
3.2.2 Describe the functions of the Network Interface Card and hub
Notes:
Function of the Network Interface Card: KIVFunction of Hub: KIV
AUGUSTWEEK
4
3.3 Hardware Requirements
(8 periods )
3.2.3 Identify various types of physical transmission media/ cables such as Unshielded Twisted Pair(UTP), Shielded Twisted Pair(STP), Coaxial Cable and Fiber Optic Cable
3.2.4 Identify various types of wireless transmission media such as infrared, radio wave and satellite
Students list down various types of cables
Students list down various types of wireless transmission media
SEPTWEEK
13.3 Software Requirements
(4 periods )
3.3.1 Define Network Operating System
![Page 11: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/11.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
SEPTWEEK
13.4 Software Requirements
(4 periods )
3.4.1 Name various Network Operating System Software
3.4.2 State the functions of various client software
web browser
email client
network utilities
network file manager
Notes:
Network Operating System (NOS): An operating system that includes functions for connecting computers and devices into a local-area network (LAN). It has the capabilities to coordinate the activities of multiple computers across a network
Notes:
Examples: Windows 2000 Server, Windows NT, LINUX, UNIX
Notes:
Examples:
Web Browsing: Internet Explorer, Mozilla Firefox and Opera
Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora
Network Utilities: Ping and Traceroute
![Page 12: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/12.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
SEPTWEEK
13.5 Software Requirements
(4 periods )
Network File Manager: Network Neighborhood and My Network Places
SEPTWEEK 2
MID-SEMESTER HOLIDAY 2 (19 SEPT – 27 SEPT)
SEPTWEEK
3
SEPTWEEK
4
3.6 Setting Network Facilities
(12 periods )
3.6.1 Install network interface card
3.6.2 Setup the driver for the network card
3.6.3 Crimp and test UTP cable
Straight cable
Crossed cable
3.6.4 Configure the workstation to join a Local-Area Network
Internet Protocol (IP) Address
Subnet Mask
Gateway
Hostname
Activity:Ping the server from the configured workstation
Activity:Set up a shared folder Save a file in the shared folderAccess the file in the shared folder from other workstations
![Page 13: RPH ICT Tingkatan 4](https://reader035.vdocuments.mx/reader035/viewer/2022081700/5695d3111a28ab9b029cbb78/html5/thumbnails/13.jpg)
SMK TENGKU BUDRIAH, ARAU
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2015
FORM 4
3.0 COMPUTER NETWORKS AND COMMUNICATIONSMONTH/
WEEKTOPICS AND SCOPE
LEARNING OUTCOME
SUGGESTED ACTIVITIES
3.6.5 Test the network connection
3.6.6 Create a shared folder
OCT.WEEK
1
3.7 Current and Future Development
( 6 periods )
3.7.1 Describe:
Mobile Computing (specifications, services, frequencies), or
Internet Technology and Services (VOIP, BLOG), or
Types of network (PAN, VPN, WLAN, WIMAX)
Activity:
Research on the chosen topic
Write a short report (350 words) and save the document in the shared folder
OCTWEEK2 & 3
FINAL EXAMINATION
OCTWEEK
4-5
NOVWEEK
1&2
ICT Assessment 3 (Portfolios)
Reinforcement Of Form Four Syllabus
Overview Of Form Five Syllabus
Recapitulation
-
NOVWEEK
3YEAR END HOLIDAYS (21 NOV – 3 JAN 2016)