SlideShare a Scribd company logo
1 of 10
Information & Communication Technology

LA1 – ICT & Society

LEARNING AREA 1 – ICT & SOCIETY
Topic 1.1 -

Introduction to Information and Communication Technology

1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT

1.1.1.2 Describe the brief evolution of computers

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

Topic 1.2 -

LA1 – ICT & Society

Computer Ethics and Legal Issues

1.2.1.1 Definition
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer
Crime and Cyber Law.

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.2.2 Privacy
1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/ technologies.

1.2.3 Controversial Contents and Control
Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.2.3.1 a)List effects of controversial contents of pornography on society:

1.2.3.2 Describe the process of filtering to control access to controversial contents

1.2.4

Computer Crimes

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

LA1 – ICT & Society

1.2.4.1 Explain the need for Cyber Law

1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement,
Theft, Attacks.

Topic 1.3 -

Computer Security

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.3.1 Definition
1.3.1.1 Define Computer security.

1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
-

Malicious code
Hacking
Natural disaster
Theft

1.3.3 Security Measures

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.3.3.1 Select the appropriate security measures to overcome the identified computer
threats.

1.3.3.2 Apply the correct security procedures.

Topic 1.4 -

Current and Future Developments

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society

More Related Content

Viewers also liked (20)

Notacd051
Notacd051Notacd051
Notacd051
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
Privacy
PrivacyPrivacy
Privacy
 
La2 templates
La2 templatesLa2 templates
La2 templates
 
Scheme ict-2013-f4
Scheme ict-2013-f4Scheme ict-2013-f4
Scheme ict-2013-f4
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Notacd01
Notacd01Notacd01
Notacd01
 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Computer
ComputerComputer
Computer
 
โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์
 
Notacd071
Notacd071Notacd071
Notacd071
 
Notacd10
Notacd10Notacd10
Notacd10
 
Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5
 
Notacd081
Notacd081Notacd081
Notacd081
 
Notacd09
Notacd09Notacd09
Notacd09
 
Notacd12
Notacd12Notacd12
Notacd12
 
Presentation1
Presentation1Presentation1
Presentation1
 
Notacd11
Notacd11Notacd11
Notacd11
 

Similar to La1 templates

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111girlfrida
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docxkarisariddell
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksDavid Sweigert
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignmentVivek Maurya
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files Pdepoerossie
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpointMOE
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber lawFatin Izzaty
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptxdikkoyafya
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesRichard Dioteles
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU
 

Similar to La1 templates (20)

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Hsm ict 4
Hsm ict 4Hsm ict 4
Hsm ict 4
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
 
Rpt ict t4_2016
Rpt ict t4_2016Rpt ict t4_2016
Rpt ict t4_2016
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Scheme ict-f4-2014
Scheme ict-f4-2014Scheme ict-f4-2014
Scheme ict-f4-2014
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptx
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
 

More from cikgushaharizan

More from cikgushaharizan (17)

Acf
AcfAcf
Acf
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-4-1
Bidang pembelajaran-4-1Bidang pembelajaran-4-1
Bidang pembelajaran-4-1
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

La1 templates

  • 1. Information & Communication Technology LA1 – ICT & Society LEARNING AREA 1 – ICT & SOCIETY Topic 1.1 - Introduction to Information and Communication Technology 1.1.1 Overview of Information and Communication Technology (ICT) 1.1.1.1 Define ICT 1.1.1.2 Describe the brief evolution of computers Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 2. Information & Communication Technology Topic 1.2 - LA1 – ICT & Society Computer Ethics and Legal Issues 1.2.1.1 Definition Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 3. Information & Communication Technology 1.2.1.2 Differentiate between ethics and law. 1.2.1.3 State the need for intellectual property laws Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 4. Information & Communication Technology 1.2.2 Privacy 1.2.2.1 List ways to protect privacy. 1.2.2.2 State authentication and verification methods/ technologies. 1.2.3 Controversial Contents and Control Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 5. Information & Communication Technology LA1 – ICT & Society 1.2.3.1 a)List effects of controversial contents of pornography on society: 1.2.3.2 Describe the process of filtering to control access to controversial contents 1.2.4 Computer Crimes Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 6. Information & Communication Technology LA1 – ICT & Society 1.2.4.1 Explain the need for Cyber Law 1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement, Theft, Attacks. Topic 1.3 - Computer Security Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 7. Information & Communication Technology 1.3.1 Definition 1.3.1.1 Define Computer security. 1.3.2 Security Threats 1.3.2.1 Explain briefly the different threats to computer security: - Malicious code Hacking Natural disaster Theft 1.3.3 Security Measures Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 8. Information & Communication Technology LA1 – ICT & Society 1.3.3.1 Select the appropriate security measures to overcome the identified computer threats. 1.3.3.2 Apply the correct security procedures. Topic 1.4 - Current and Future Developments Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 9. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 10. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society