Lesson 01
|
ICT is the technology required for information
processing, in particular, the use of electronic computers, communication
devices and software application to convert, store, protect, process,
transmit and retrieve information from anywhere anytime.
|
Lesson 02
|
Evolution
of computer
|
First Generation computer
|
Second Generation computer
|
Third Generation computer
|
Fourth Generation computer
|
Fifth Generation computer
|
New Era Computer
|
Lesson 03
|
|
1
|
Understand the usage of ICT in different sectors
such as in education, banking, industry and business.
|
2
|
Identify the group that benefits from the usage of
ICT in different sectors.
|
Lesson 04
|
|
1
|
Prior to the non-computerized system, banking was
done manually by taking deposits directly.
|
2
|
Production was slow because everything was done
manually and depended totally on human labour.
|
3
|
Trading was made using the barter system. Trading
globally was extremely slow, late and expensive.
|
4
|
With computerized system, many schools provide computers
to assist with education.
|
5
|
Transaction for banking can be done at anytime and
at any place. On-line services, phone banking system and credit cards
facilities are also available.
|
6
|
With ICT, computers and telecommunication industries
become very popular and profitable.
|
7
|
E-Commerce plays an important role in the economic
scene. It includes distribution, buying, selling and servicing product that
are done manually.
|
Lesson 05
|
The impact of ICT in the society:
|
|
Advantages
|
Disadvantages
|
1
|
Faster speed of communication
|
Social problem
|
2
|
Lower communication cost
|
Health problem
|
3
|
Reliable mode of communication
|
Changing people attitude and demand
|
4
|
Effective sharing of information
|
|
5
|
Paperless environment
|
|
6
|
Borderless communication
|
|
Lesson 06
|
|
1
|
Ethic refers to a standard for moral guidelines,
that is used to determine proper behavior.
|
2
|
There are two codes of conducts that can be referred
to which are The Ten Commandments of Computer Ethics, by the United State
Institute of Computer ethics and the e-mails and Internet guideline, by the
Department of Public Services of Malaysia.
|
3
|
Unethical computer code of conducts include
modifying certain information on the Internet, affecting the accuracy of the
information, selling information to other parties without the owner’s
permission, using information without authorization, involvement in stealing
software and invasion of privacy.
|
4
|
Ethical computer code of conducts include sending
warning about viruses to other computer users, asking permission before
sending any business advertisement to others and using information with
authorization
|
Lesson 07
|
|
1
|
Ethics in computing means moral guidelines to refer
to when using the computer, computer networks and the Internet.
|
2
|
Computers law is a concept from existing law which
are applied to the relatively new technologies of computer hardware and
software, e-mail and the Internet.
|
3
|
Ethical behavior is judged by moral standards while
law is judge by judical standards.
|
4
|
Differences between ethics and law:
|
|
Ethics
|
Law
|
1.
|
As a guideline to computer users
|
As a rule to control computer users
|
2.
|
Ethical behavior is judge by moral standards
|
Law is judge by judical standards
|
3.
|
Computer users are free to follow or ignore the code
of ethics
|
Computer users must follow the regulations and law
|
4.
|
No punishment for anyone who violates ethics
|
Penalties, imprisonments and other punishment, for
those who break the law
|
5.
|
Universal, can be applied anywhere all over the
world
|
Depends on country and state where the crime is
committed
|
6.
|
To produce ethical computer users
|
To prevent misuse of computers
|
7
|
Not honoring computer ethics means ignoring the
moral elements (immoral)
|
Not honoring the law means committing a crime
|
Lesson 08
|
|
1
|
Patents of inventions
Trademarks for brand identity
Design for product appearance
Copyright for material
|
2
|
Intellectual Property refers to work created by
investors, authors and artists.
|
3
|
Intellectual Property Rights are rights to which
creators are entitled to for their inventories, writing and work of art.
|
4
|
Intellectual Property Laws cover ideas, inventions,
literacy creations, unique name, business models, industrial processes and
computer program codes from being manipulated by people other than the owner.
|
Lesson 09
|
|
1
|
Privacy in IT refers to data and information privacy
and the right of individuals and companies to restrict the collection and use
of information to others.
|
2
|
There are three (3) ways computer technology can
threaten our privacy: cookies, electronic profile and spyware.
|
3
|
Privacy can be protected by privacy law and
utilities software.
|
Lesson 10
|
|
1
|
Authentication is a process where users verify that
they are who they say they are.
|
2
|
There are two (2) commonly used authentication
methods, which are biometric device and callback system.
|
3
|
Biometric device is a device that translate personal
characteristics into a digital code that is compared with digital code stored
in the database.
|
4
|
Callback system refers to the checking system that
authenticates the user.
|
5
|
Authentication is important in order to safeguard
against the unauthorized access and use.
|
Lesson 11
|
|
1
|
Verification is the act of proving or disproving the
correctness of a system with respect to a certain formal specifications.
|
2
|
Two methods commonly used in verification are user
identification and processed object.
|
3
|
User identification refers to the process of
validating the user.
|
4
|
Processed object refer to something the user has
such as identification card, security token, key, badge and cell phone.
|
Lesson 12
|
|
1
|
Information that causes dispute among people with
different belief and values:
slander and pornography.
|
2
|
Impacts on society:
- causes
arguments and quarrels
- can
harm reputation of people
- lower
moral behavior
- may
exploit men, women and children
- can
lead to sexual addiction and crimes
- erodes
good religious, cultural and social beliefs and behaviors
|
Lesson 13
|
|
1
|
Type of URL
- URL
checks for blocked database:
if
“true” then “access denied”
else
“access granted”.
|
2
|
By using a large set of keywords to prevent
accessing sites that contain one or
more of
the words.
- Type the
keyword (in the browser):
if
keyword = blocked database then “access denied”
else “access granted”.
|
3
|
Rate specific website.
- rating
either done by web page author or by independent bureau
- browser
set to only accept pages with certain level of rating.
( the
problem is: who decides the rating )
|
Lesson 14
|
|
1
|
Cyber law refers to any laws relating to protecting
the Internet and other online communication technologies.
|
2
|
Cyber law is needed to protect
- the
integrity and security of information
- the
legal status of online transaction
- the
privacy and confidentially of information
- the
intellectual property right
-
government data
|
3
|
Cyber laws in
- Digital
Signature Act 1997
-
Computer Crimes Act 1997
-
Telemedicine Act 1997
-
Communication and Multimedia Act 1998
|
4
|
Other Cyber Laws
- the
Security Protection Bill
- the
Private Data Protection Bill
- the
Electronic Transaction Bill
- the
Electronic Government Activities Bill
|
Lesson 15
|
|
1
|
Computer crimes is any criminal activity that is related
to the use of computers such as fraud, copyright infringement, theft and
computer attack.
|
2
|
Computer fraud includes health fraud, scarns and
hackers.
|
3
|
Copyright infringement includes the illegal
downloading and sharing of recorded music and unauthorized copying of movies
online.
|
4
|
Computer theft includes the unauthorized use of
another person’s property with the intention to deny the owner the rightful
possessions of that property or its use.
|
5
|
Computer attack includes any activities taken to disrupt
the equipment of computer system, change processing control or corrupt data
stored.
|
Lesson 16
|
|
1
|
Computer security is a process of preventing and
detecting unauthorized use of the computer.
|
2
|
There are three (3) types of computer security,
which are hardware security, software / data security and network security.
|
Lesson 17
|
|
1
|
Security threats include malicious code, hacking,
natural environment and theft.
|
2
|
There are various types of malicious code that
include virus, Trojan horse, logic door, trapdoor and backdoor and worm.
|
3
|
Virus is a program that can pass malicious codes to
other non-infected program by modifying them.
|
4
|
Computers are also threatened by natural or
environment disaster such as flood, fire, earthquakes, storms and tornados.
|
5
|
Computer thefts includes stealing money, goods,
information and computer resources.
|
Lesson 18
|
|
1
|
Security measures mean the precautionary measures
taken to ward off possible danger or damage.
|
2
|
An anti virus program protects a computer against
viruses.
|
3
|
Spyware is a program placed on a computer without
the user’s knowledge and secretly collects information about the user.
|
4
|
Cryptography is a process of hiding information by
altering the actual information into a different representation.
|
5
|
Firewall prevents some communications forbidden by
the security policy.
|
6
|
Data backup is a program of file duplication.
|
7
|
Human aspects refer to the user and also the
intruder of a computer system which is one of the hardest aspects to give
protection to.
|
Lesson 19
|
|
1
|
The relationship between the security threats and
the security measures.
|
2
|
The appropriate security measures to use to protect
the computer from the security threats.
|
Lesson 20
|
|
There are a few ways to protect information. They
are:
|
|
1
|
make backup files
|
2
|
detect the virus and clean the computer
|
3
|
warn others on virus attack
|
Lesson 21
|
|
1
|
Computer helps peoples to do their work faster and
more efficient by using the software applications that consists of special
program for specific tasks.
|
2
|
Software applications are used for many reasons such
as to enhance the learning process, to help in business activities, to
assists the graphics and multimedia projects and to facilitate
communications.
|
3
|
Examples of software application include integrated
software, personal finance, legal, word processing, spreadsheet,
computer-aided design (CAD), desktop publishing, e-mail, web browser and chat
rooms.
|
Lesson 22
|
|
Computer users :
|
|
1
|
home users
|
2
|
small office / home user (
|
3
|
mobile users
|
4
|
power users
|
5
|
large business users
|
Lesson 23
|
|
The five basic steps to take when doing study are:
|
|
1
|
Get an overview of the topic to be studied
|
2
|
Narrow down the topic and form some specific
questions related to it.
|
3
|
Find study materials related to the topic
|
4
|
Evaluate the study materials
|
5
|
Write out your study paper and mention your sources
|
Lesson 24
|
|
1
|
A good study paper should have an introduction,
content and conclusion.
|
2
|
A statement of problems must be presented for each
main idea or main point and they must be supported by properly quoted and
documented reference.
|
3
|
The general points, style, quoting, reference and
making their presentation clear with the guidelines given.
|
4
|
Some basic tips in conducting and good oral
presentation.
|
Lesson 25
|
|
Delegation of Work
|
|
1
|
What is Delegation?
|
2
|
Why Delegate?
|
3
|
What to Delegate?
|
4
|
How to Delegate?
|
Lesson 26
|
|
Five steps to do a study, which are
|
|
1
|
Work in group.
|
2
|
Choose a topic
|
3
|
Conduct a study by using proper research methods.
|
4
|
Organize information and prepare the findings in the
presentation format.
|
5
|
Present the findings to the class.
|
No comments:
Post a Comment