Summary ICTnS

Untuk download, sila klik  :  Summary ICT & Society


  
Lesson 01
ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software application to convert, store, protect, process, transmit and retrieve information from anywhere anytime.
  
Lesson 02
Evolution of computer
First Generation computer
Second Generation computer
Third Generation computer
Fourth Generation computer
Fifth Generation computer
New Era Computer



Lesson 03
1
Understand the usage of ICT in different sectors such as in education, banking, industry and business.
2
Identify the group that benefits from the usage of ICT in different sectors.

Lesson 04
1
Prior to the non-computerized system, banking was done manually by taking deposits directly.
2
Production was slow because everything was done manually and depended totally on human labour.
3
Trading was made using the barter system. Trading globally was extremely slow, late and expensive.
4
With computerized system, many schools provide computers to assist with education.
5
Transaction for banking can be done at anytime and at any place. On-line services, phone banking system and credit cards facilities are also available.
6
With ICT, computers and telecommunication industries become very popular and profitable.
7
E-Commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing product that are done manually.

Lesson 05
The impact of ICT in the society:


Advantages
Disadvantages
1
Faster speed of communication
Social problem
2
Lower communication cost
Health problem
3
Reliable mode of communication
Changing people attitude and demand
4
Effective sharing of information

5
Paperless environment

6
Borderless communication


Lesson 06
1
Ethic refers to a standard for moral guidelines, that is used to determine proper behavior.
2
There are two codes of conducts that can be referred to which are The Ten Commandments of Computer Ethics, by the United State Institute of Computer ethics and the e-mails and Internet guideline, by the Department of Public Services of Malaysia.
3
Unethical computer code of conducts include modifying certain information on the Internet, affecting the accuracy of the information, selling information to other parties without the owner’s permission, using information without authorization, involvement in stealing software and invasion of privacy.
4
Ethical computer code of conducts include sending warning about viruses to other computer users, asking permission before sending any business advertisement to others and using information with authorization

Lesson 07
1
Ethics in computing means moral guidelines to refer to when using the computer, computer networks and the Internet.
2
Computers law is a concept from existing law which are applied to the relatively new technologies of computer hardware and software, e-mail and the Internet.
3
Ethical behavior is judged by moral standards while law is judge by judical standards.
4
Differences between ethics and law:


Ethics
Law
1.
As a guideline to computer users
As a rule to control computer users
2.
Ethical behavior is judge by moral standards
Law is judge by judical standards
3.
Computer users are free to follow or ignore the code of ethics
Computer users must follow the regulations and law
4.
No punishment for anyone who violates ethics
Penalties, imprisonments and other punishment, for those who break the law
5.
Universal, can be applied anywhere all over the world
Depends on country and state where the crime is committed
6.
To produce ethical computer users
To prevent misuse of computers
7
Not honoring computer ethics means ignoring the moral elements (immoral)
Not honoring the law means committing a crime

Lesson 08
1
Patents of inventions
Trademarks for brand identity
Design for product appearance
Copyright for material
2
Intellectual Property refers to work created by investors, authors and artists.
3
Intellectual Property Rights are rights to which creators are entitled to for their inventories, writing and work of art.
4
Intellectual Property Laws cover ideas, inventions, literacy creations, unique name, business models, industrial processes and computer program codes from being manipulated by people other than the owner.

Lesson 09
1
Privacy in IT refers to data and information privacy and the right of individuals and companies to restrict the collection and use of information to others.
2
There are three (3) ways computer technology can threaten our privacy: cookies, electronic profile and spyware.
3
Privacy can be protected by privacy law and utilities software.

Lesson 10
1
Authentication is a process where users verify that they are who they say they are.
2
There are two (2) commonly used authentication methods, which are biometric device and callback system.
3
Biometric device is a device that translate personal characteristics into a digital code that is compared with digital code stored in the database.
4
Callback system refers to the checking system that authenticates the user.
5
Authentication is important in order to safeguard against the unauthorized access and use.

Lesson 11
1
Verification is the act of proving or disproving the correctness of a system with respect to a certain formal specifications.
2
Two methods commonly used in verification are user identification and processed object.
3
User identification refers to the process of validating the user.
4
Processed object refer to something the user has such as identification card, security token, key, badge and cell phone.

Lesson 12
1
Information that causes dispute among people with different belief and values:     slander and pornography.
2
Impacts on society:
     - causes arguments and quarrels
     - can harm reputation of people
     - lower moral behavior
     - may exploit men, women and children
     - can lead to sexual addiction and crimes
     - erodes good religious, cultural and social beliefs and behaviors

Lesson 13
1
Type of URL
     - URL checks for blocked database:
        if “true” then “access denied”
        else “access granted”.
2
By using a large set of keywords to prevent accessing sites that contain one or
     more of the words.
    - Type the keyword (in the browser):
       if keyword = blocked database then “access denied”
       else “access granted”. 
3
Rate specific website.
    - rating either done by web page author or by independent bureau
    - browser set to only accept pages with certain level of rating.
      ( the problem is: who decides the rating )

Lesson 14
1
Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
2
Cyber law is needed to protect
     - the integrity and security of information
     - the legal status of online transaction
     - the privacy and confidentially of information
     - the intellectual property right
     - government data
3
Cyber laws in Malaysia
     - Digital Signature Act 1997
     - Computer Crimes Act 1997
     - Telemedicine Act 1997
     - Communication and Multimedia Act 1998
4
Other Cyber Laws
     - the Security Protection Bill
     - the Private Data Protection Bill
     - the Electronic Transaction Bill
     - the Electronic Government Activities Bill

Lesson 15
1
Computer crimes is any criminal activity that is related to the use of computers such as fraud, copyright infringement, theft and computer attack.
2
Computer fraud includes health fraud, scarns and hackers.
3
Copyright infringement includes the illegal downloading and sharing of recorded music and unauthorized copying of movies online.
4
Computer theft includes the unauthorized use of another person’s property with the intention to deny the owner the rightful possessions of that property or its use.
5
Computer attack includes any activities taken to disrupt the equipment of computer system, change processing control or corrupt data stored.

Lesson 16
1
Computer security is a process of preventing and detecting unauthorized use of the computer.
2
There are three (3) types of computer security, which are hardware security, software / data security and network security.

Lesson 17
1
Security threats include malicious code, hacking, natural environment and theft.
2
There are various types of malicious code that include virus, Trojan horse, logic door, trapdoor and backdoor and worm.
3
Virus is a program that can pass malicious codes to other non-infected program by modifying them.
4
Computers are also threatened by natural or environment disaster such as flood, fire, earthquakes, storms and tornados.
5
Computer thefts includes stealing money, goods, information and computer resources.

Lesson 18
1
Security measures mean the precautionary measures taken to ward off possible danger or damage.
2
An anti virus program protects a computer against viruses.
3
Spyware is a program placed on a computer without the user’s knowledge and secretly collects information about the user.
4
Cryptography is a process of hiding information by altering the actual information into a different representation.
5
Firewall prevents some communications forbidden by the security policy.
6
Data backup is a program of file duplication.
7
Human aspects refer to the user and also the intruder of a computer system which is one of the hardest aspects to give protection to.

Lesson 19
1
The relationship between the security threats and the security measures.
2
The appropriate security measures to use to protect the computer from the security threats.

Lesson 20
There are a few ways to protect information. They are:
1
make backup files
2
detect the virus and clean the computer
3
warn others on virus attack

Lesson 21
1
Computer helps peoples to do their work faster and more efficient by using the software applications that consists of special program for specific tasks.
2
Software applications are used for many reasons such as to enhance the learning process, to help in business activities, to assists the graphics and multimedia projects and to facilitate communications.
3
Examples of software application include integrated software, personal finance, legal, word processing, spreadsheet, computer-aided design (CAD), desktop publishing, e-mail, web browser and chat rooms.

Lesson 22
Computer users :
1
home users
2
small office / home user (SOHO) user
3
mobile users
4
power users
5
large business users

Lesson 23
The five basic steps to take when doing study are:
1
Get an overview of the topic to be studied
2
Narrow down the topic and form some specific questions related to it.
3
Find study materials related to the topic
4
Evaluate the study materials
5
Write out your study paper and mention your sources

Lesson 24
1
A good study paper should have an introduction, content and conclusion.
2
A statement of problems must be presented for each main idea or main point and they must be supported by properly quoted and documented reference.
3
The general points, style, quoting, reference and making their presentation clear with the guidelines given.
4
Some basic tips in conducting and good oral presentation.

Lesson 25
Delegation of Work
1
What is Delegation?
2
Why Delegate?
3
What to Delegate?
4
How to Delegate?

Lesson 26
Five steps to do a study, which are
1
Work in group.
2
Choose a topic
3
Conduct a study by using proper research methods.
4
Organize information and prepare the findings in the presentation format.
5
Present the findings to the class.

No comments:

Post a Comment