SlideShare a Scribd company logo
1 of 10
Learning Area One – INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
No.   Keyword(s)        Referring to:
1.    Define ICT        ICT is the technology required for information processing, in particular, the use of electronic
                        computers, communication devices and software applications to convert, store, protect,
                        process, transmit and retrieve information from anywhere, anytime.
                        Information: the knowledge obtained from reading, investigation, study or research.
                        Communication: act of transmitting messages.
                        Technology: the use of scientific knowledge, experience, and resources to create processes
                        and product that fulfill human needs.
                          st
2.    Evolutions of     1 generation (1940 – 1956)
      Computers                   Huge, slow, expensive, unreliable
                                  Presper Eckert & William Maunchly built ENIAC (use vacuum tube)
                                  Problem with vacuum tube – generates great deal of heat, burns out frequently
                           nd
                         2 generation (1956 – 1963)
                                  Uses transistors which were smaller than vacuum tubes, no need warm up time,
                                  consumed less energy, generate less heat, faster and more reliable.
                                  Famous computer scientists: John Bardeen, Walter House Brattain, William
                                  Shockley
                          rd
                        3 generation (1964 – 1971)
                                   IBM 370 series were introduced in 1964. Also CDC 7600 and B2500
                                   Development of Integrated circuit begins.
                                   Use silicon chips – reliable, compact, cheaper
                                   Hardware and software sold separately.
                                   First 256 bit RAM were introduced and was the basis for development of 1K bit
                                   RAM.
                          th
                        4 generation (1971 – present)
                                                                                      st
                                  Famous computer scientists: Steve Jobs (built the 1 Apple computer), Bill Gates,
                                  Michael Dell
                                   Silicone chips, microprocessor, storage devices were invented.
                                  Computer became 100 times smaller than ENIAC.
                                  Gain in speed, reliability and storage capacity
                                  Personal and software industry bloomed.
                           th
                         5 generation (Present – beyond)
                                  Invention of new hardware technology includes:
                                         Silicon chips
                                         Processor
                                         Robotics
                                         Virtual reality
                                         Intelligent systems
                                         Programs which translate languages.
3.    Usage of ICT in   Education: can offer interactive experiences, enhanced learning, cognitive development.
      everyday life               Teachers: to research for teaching materials, participating in online forums and
                                  conferences
                                  Students: use computer as references tool, browse internet for information.
                                  Researchers: use computer to collect and process data
                                  School administrators: for administrative purposes (to make sure the entire
                                  operations runs smoothly)
                        Banking: electronic banking 24 hours services includes ATM, cheque deposit, electronic fund
                        transfer, direct deposit, pay by phone system, personal computer banking or internet
                        banking.
                                   Customers: make any transaction (for 24 hours services)
                                   Businessmen: save time by using online services
                                   Bank administrators: can oversee the entire banking activities.
                        Industry: to facilitate production planning and control system, support chain managements,
                        help in product design.
                                  Workers: use machine that are connected to computers to operate.
                                  Researchers: use computer to analyse and collect research data for future
                                  references
                                  Administrators: to oversee the entire operations, to detect specific error or
                                  defects

                                                       iii
E-commerce: makes buying and selling easier, more efficient and faster.
                                    Customers: connected with supplier to purchase products online. (save cost and
                                    time)
                                    Suppliers: to keep track their transactions (help in determine the price and
                                    managing inventory)
                                    Employees: use computers and telephones to communicate with their customer
                                    for enquiries. It helps employees to get the latest updates on inventory to be
                                    informed to the customers.
4.   Computerised and                                Non-computerised (before
                                  Fields                                                    Computerised (after ICT)
     non-computerised                                            ICT)
     system               Education                     Teaching was more to              Equipped with ICT technology
                                                        explaining using words            makes class more colourful and
                                                        and pictures. Multimedia          alive.
                                                        hardly usable in class            Variety of animation able to
                                                        Students search for               show and use for teaching and
                                                        information mainly from           learning.
                                                        books                             Students can search for
                                                                                          information online.
                          Banking System                Was done manually                 All transactions are done by
                                                        Transaction was done              computers
                                                        only during working hours         Transaction can be done
                                                        Takes time to approve             anytime and place
                                                        any loan applications             Online services, phone banking
                                                                                          system, credit cards
                          Industry                      Slow because everything           Computers and
                                                        was done manually and             telecommunications industry
                                                        depend totally on human           became very popular and
                                                        labour.                           profitable since productions can
                                                                                          be increased throughout all day
                                                                                          operation.
                          Commerce                      Trading system: barter            Distribution, buying, selling and
                                                        system, later developed           servicing products are done
                                                        into currency system.             electronically.
                                                        Advertisement: mouth,
                                                        billboard, printed flyers
                                                        Global trading: slow, late,
                                                        expensive
6.   Impact of ICT on     The six positive impacts:
     the society          Faster communication speed
                          Lower communication cost
                          Reliable mode of communication
                          Effective sharing of information
                          Paperless environment
                          Borderless communication.
                          The two negative impacts:
                          Social problems
                          Health problems
7.   Computer Ethics      Computer Ethics: System of a moral standards or values used as guideline for computer
     and legal issues     users
     definition           Code of Ethics: guidelines in ICT that help determine whether a specific computer action is
                          ethical or unethical
                          Intellectual Property: work created by inventors, authors, and artist
                          Privacy: rights of individuals and companies to deny or restrict the collection and use of
                          information about them.
                          Computer Crime: any illegal acts involving computers.
                          Cyber Law: any law relating to protect the Internet and other online communication
                          technologies.
8.   Why ethics and law   Respecting ownership – not steal other people’s work either by duplicating or distributing
     in computing is      Respecting privacy and confidentiality – refraining oneself from invading other’s privacy
     needed?              without permission.
                                                          iv
Respecting property – do not tamper and change electronic information.
9.    Intellectual          Patent for inventions: utility, design, plant patent,…
      property protection   Trademark for brand identity: Words, names, symbols, devices, images,…
                            Design for product appearance: Literary and artistic material, music, films,…
                            Copyright for material: particular lines, contours, colour, shape, texture, ornamentations,…
10.   Differences                                Ethics                                              Law
      between Ethics and    Guidelines: as a guidelines to computer users       Control: a rule to control computer users
      Law                   Moral standards: ethical behavior are judged        Judicial standards: Law are judged by
                            by moral standards                                  judicial standards
                            Free to follow: computer users are free to          Must follow: computer users must follow
                            follow or ignore the codes of ethics                the regulations and law

                            No Punishment: no punishment for anyone           Punishment: penalties, imprisonments and
                            who violates the ethics.                          other punishments for those who break
                                                                              the law.
                            Universal: can be applied anywhere all over       Depend on country: Depends on country
                            the world                                         and state where the crime is committed
                            Produce ethical computer users                    Prevent misusing of computers
                            Immoral: Not honouring computer ethics            Crime: Not honouring the law means
                            means ignoring the moral elements                 committing a crime
11.   Methods of            2 types:
      authentications       Biometric devices:
                                           Fingerprint recognition
                                           Facial recognition
                                           Hand geometry scanning
                                           Iris scanning (the area near to the coloured area of the pupil)
                                           Retinal scanning (the eyeball)
                                           Voice recognition
                                           Signature verification system.
                            Callback system
12.   Methods of            2 common methods:
      verification          User identification – show passport, key-in user name & password, show exam slip.
                            Processed object – swipe security card to enter building, police check the driver’s license to
                            identify valid driver.
13.   Controversial         Pornography – any form of media or material that depicts erotic behaviour and is intended
      content               to cause sexual excitement.
                            Slander – legal term for false and malicious statement.
14.   Internet filtering    3 common methods:
                            Keyword blocking – uses a list of banned words to filter access to the site
                            Website / site blocking – uses software to prevent access to any sites on the list
                            Web rating system – browser gain access to a certain level of ratings
15.   Cyber law acts in     Digital Signature Act 1997 – secures electronic communications especially on the internet.
      Malaysia              Computer Crimes Act 1997 – gives protection against misuse of computers and computer
                            criminal activities.
                            Telemedicine Act 1997 – Ensure only qualified medical practitioners can practice
                            telemedicine.
                            Communications and Multimedia Act 1998 – ensures that information is secure, network is
                            reliable, and service is affordable all over Malaysia.
16.   Computer Crimes       Computer Fraud – intention to take advantage or causing loss (mainly monetarily basis)
                            Copyright Infringement – involves illegal copy or reproduction of copyright material by black
                            market group
                            Computer Theft – unauthorized use of another person’s property
                            Computer Attack – to disrupt the equipment of computer systems …
17.   Computer Security     Hardware Security – measure used to protect the computer hardware
                            Software and Data Security – measure used to protect software and the loss of data files
                            Network Security – measure used to protect the network system.
18.   Security Threat       Malicious code
                                      Virus – a program that can pass in the malicious code to other programs by
                                      modifying them
                                      Trojan Horse – a program which can perform useful and unexpected action
                                      Logic Bomb – that goes off when a specific condition occurs
                                                           v
Trapdoor or Backdoor – a program that allows someone to access the program
                                    with privileges
                                    Worm – a program that copies and spreads itself through a network
                           Hacker – unauthorised person who access (hack) into computer
                           Natural and environmental threat – flood, fire, earthquake
                           Theft

19.   Security Measures    Data backup – a program of file duplication. It is necessary so that they can be recovered in
                           case of an emergency
                           Cryptography – process of hiding information by altering the actual information into
                           different representation.
                           Antivirus – program that protects a computer against viruses by identifying and removing
                           any computer viruses found in the computer memory, storage or incoming email files.
                           Anti-spyware – program used to remove spyware.
                           Firewall – hardware or software which functions in a networked environment to prevent
                           some communications forbidden by the security policies.
                                    Screening router
                                    Proxy gateway
                                    Guard
                           Human aspect – refer to the user and also the intruder of a computer system.
                                    Organisation self awareness – aware of the people they work with
                                    Organisation user self awareness – provide employee with adequate training and
                                    importance of security and control
                                    Individual user self awareness – aware of software from unreliable sources. Do not
                                    expose important information to stranger.




Learning Area Two – Computer System
No.   Keyword(s)           Referring to:
1.    Computer System      Hardware + Software + User
2.    Computer             Input Devices – texts, graphics, audio, video
      Hardware             Output Devices – texts, graphics, audio, animations, video
                           Storage Devices – Primary (RAM & ROM), Secondary (Magnetic, Flash, Optical, ROM)
                           Processor – the main brain in the system unit
3.    Computer Software    System Software – Operating System (Linux, Window XP, Mac OS X, Window Vista) & Utility
                           program (Antivirus, File Manager, Screen Saver, Diagnostic utility)
                           Application Software
                                    Word Processing – Corel Word Perfect, Microsoft Word, Sun StarOffice Writer
                                    Spreadsheet – Corel Quattro Pro, Microsoft Excel, Sun StarOffice Calc
                                    Presentation – Corel Presentations, Microsoft PowerPoint, Sun StarOffice Impress
                                    Graphics editing – Adobe Photoshop CS2, CorelDraw, Macromedia Freehand, Gimp
                                    Software Suite – collection of individual program sold as a single package
                           Proprietary Software – closed source software. Need to purchase the license in order to
                           use.
                           Open Source Software – user can freely use, modified and re-distribute. Any changes made
                           cannot be copyrighted.
4.    Information
      processing diagram                Input                        Process                        Output



                                                                     Storage

5.    Machine cycle
                                                                       Fetch
      diagram
                                             Store                                              Decode

                                                                      Execute
6.    Data                 8 bits = 1 byte = 1 character
                                                           vi
representation
7.    Character codes    ASCII (American Standard Code for Information Interchange)
                                   Pronounced as ASK-KEY
                                   Most widely used coding system to represent data
                                   Used mostly in PC and midrange server.
                                   Uses 7 out of 8 bits in the character.
                         EBCDIC (Extended Binary Coded Decimal Interchange Code)
                                   Pronounced as EB-SEE-DIC
                                   Primarily used in mainframe computers and high-end server
                         Unicode
                               Support all the world language including Asian Language
                               Example: Chinese, Japanese, Korean
                               Uses 16 bits instead of the usual 8 bits per character.
8.    Component of       Central Processing Unit (CPU) – control the operations of the computer. It interpret and
      motherboard        carries basic instructions that operate a computer. It have 2 subcomponent that is Control
                         Unit (CU) and Arithmetics Logic Unit (ALU).
                         Expansion Slots – sockets where the circuit board or the adapter card can be inserted into
                         the motherboard.
                         RAM Slot – slot where computer memory (RAM) is placed on the computer’s motherboard.
                         Ports – the point where perihpherals attaches to a system unit.
                              Serial port – connect a device to the system unit by transmitting data one bit at a time.
                              Parallel port – connect devices by transferring information more than one bit at a time.
                              Universal Serial Bus (USB) port – socket on a computer or peripheral devices into which
                              a USB cable is plugged in. Can connect up to 127 different peripherals together with a
                              single connector.
                              FireWire port – connect multiple types of devices that requires faster data transmission
                              speeds. Can daisy-chain connect up to 63 devices to one FireWire port.
                         Connectors – a connector joints a cable to a peripheral.
9.    User Interface     Command-line user interface – requires user to type commands or press special keys on the
                         keyboard to enter data and instructions that instruct the operating system what to do. It has
                         to be typed one line at a time.
                         Menu driven Interface – provides menus as means of entering commands.
                         Graphical User Interface (GUI) – provides interface by means of clicking icon that represent
                         computer resources.
10.   Function of        OS – set of program that coordinates all the activities among computer hardware devices.
      operating system   Also support the application software that we run. 3 types of OS: PC Platform (DOS,
                         Microsoft Windows), Apple Platform (Mac OS), Cross Platform (UNIX, LINUX)
                         Starting a computer – Start a computer. Happen in 2 ways: warm boot, cold boot
                         Proving a user interface – Command line, Menu Driven, GUI
                         Managing data and programs
                         Managing memory
                         Configuring Devices – handling input and output as well as enabling communication with
                         input and output devices.
11.   Utility program    A type of system software that allows a user to perform maintenance-type task related to
                         managing a computer, its devices or its program.
                         Example:
                         Antivirus: protects a computer against viruses by identifying and removing them
                         Diagnostic utility: compiles technical information about a computer’s hardware and certain
                         system software programs, and prepares a report.
                         File manager: performs functions related to files and disk management.
                         Screen saver: enables a display device’s screen to show a moving image or blank screen if no
                         mouse activity occurs for a specified time.
                         Disk Defragmenter: reorganising of disk so the files are stored in contiguous (joining / next
                         to each other) sectors.
                         Backup utility: back up or copy selected files or entire hard disk to another storage medium.
                         Data Recovery: restore the data that has been physically damage or corrupted.




                                                        vii
Learning Area Three – Computer Networks and Communications
No.   Keyword(s)               Referring to:
1.    Definition of computer   A system of interconnected computers and peripheral devices. For example, it may
      network.                 connect computers, printers, scanners and cameras.
2.    Types of Computer        LAN – covers a small region of space, typically a single building
      Network                  MAN – is a collection of LANs with the same geographical area (e.g. – same city)
                               WAN – can be collections of LANs and / or MANs (e.g. – a country or even beyond the
                               border)
3.    Network Architecture     Client/Server – Network in which the shared files and applications are stored in the
                               server but network user (client) can still store files on their individual PCs.
                               Peer-to-Peer (P2P) – network with all the nodes are acting as both serves and clients.
                               Bus Topology –main physical pathway
                               or central cable where all other devices
                                                                              Backbone
                               are connected to it
                               Advantages:
                                    Easy to implement.
                                    Failure of a node doesn’t affect the entire LAN.
                                    No disruption to network during add/remove devices.
                                    Network easily extend
                               Disadvantages:
                                    Backbone fails  entire network affected
                                    Network speed decrease as number of device increase
                                    Troubleshooting difficult when a node fails
                               Ring Topology – all computers and other devices are                             Node
                               connected in a loop (or a circle)
                               Advantage:
                                                                                                    Node               Node
                                    Troubleshoot is easy when a node fails
                               Disadvantages:
                                    Difficult to implement
4.    Network Topology              Failure of a node affect the entire network                                       Node
                                                                                                         Node
                                    Difficult to add/remove devices
                                    Network speed decrease as number of device
                                    increase
                               Star Topology – a central host (usually a hub or a
                                                                                                Node                    Node
                               switch) which acts as the centre, and all nodes connect
                               to the host.
                               Advantages:                                                                   HUB
                                    Easy to implement.
                                    Failure of a node doesn’t affect the entire LAN.                                   Node
                                                                                               Node
                                    No disruption to network during add/remove
                                    devices.
                                    Network easily extend
                                    Troubleshoot is easy
                               Disadvantages:
                                    Failure of a host affect the entire network
                                    Network speed decrease as number of device increase
                                    Troubleshoot difficult when a node fails
                                    A host must be installed to control the network
5.    Protocols                HTTP: used to access, send and receive Hypertext Markup Language files (HTML) on the
                               internet
                               SMTP: used for transferring e-mail between computers
                               FTP: for allowing files to be copies between devices
                               TCP: ensures the delivery of information packets across network.
                               IP: providing logical addressing called IP address to route information between network
6.    Network                  Internet
      Communication            Intranet – internal network that uses Internet technologies. It is a small version of the
      Technologies             internet that exist within an organization
                               Extranet – private network that uses Internet protocols to securely share part of a
                               business’s information.
                                                          viii
7.    Transmission medium    Physical transmission medium – usually uses wires (Unshielded Twisted Pair (UTP),
                             Shielded Twisted pair (STP), Coaxial, Fibre Optic)
                             Wireless transmission medium – uses air to transmit data
                              Omnidirectional       Unidirectional                    Short range frequency

                              One sender,           Sending and receiving antenna     Need special port called IrDA
                              many receiver         need to be aligned                port.

                              Frequency:            Frequency:                        Frequency:
                              3 KHz – 1 GHz         1 GHz – 300 GHz                   300 GHz – 400 THz

                              Radio wave            Microwave                         Infrared
8.    Server Software        Network Operating System:
                                    a) Windows NT
                                    b) Windows 2000 Server
                                    c) Windows Server 2003
                                    d) Red Hat Linux

9.    Client Software        Client Software:
                                  a) Web browser
                                  b) Email client
                                  c) Network Utility
                                  d) Network File Manager


Learning Area Four – Multimedia
No.   Keyword(s)             Referring to:
1.    Definition of          Presentation of information by using a combination of text, audio, graphics, video and
      Multimedia             animation.
2.    Interactivity          Linear interactivity – the user is a passive receiver. User does not have control over the
                             multimedia content. Only one way communication
                             Non-linear interactivity – the user is an active receiver. User has control over the
                             multimedia content. Two way communication occurs
3.    Medium of delivery     Differences between Web-based and CD-based
                                        Web-based                         Criteria                     CD-based
                               Relatively cheaper                          Cost              It is more expensive
                               Produces low and medium                                       Can produce high quality
                                                                          Quality
                               quality multimedia                                            multimedia
                               Takes up less time                                            Takes up a lot of time to
                                                                     Production time
                               compared to CD-based                                          produce an end product
                               Easily update via web                                         Cannot update
                                                                        To update
                               server
4.    Multimedia Elements    Text: *doc, *.txt, *.rtf [Microsoft Word, Notepad, Open Office Writer]
      and File formats.      Graphics: *.jpg, *.gif, *.tiff, *.bmp, *.png, *.psd [Microsoft Paint, Adobe Photoshop]
                             Audio: *.wav, *.midi, *.aif/aiff, *.au, *.wma, *.mp3 [Sound Recorder, Sony Sound Forge]
                             Video: *.avi, *.mov, *.mpeg, *.wmv [Adobe Premiere, Pinnacle Studio, Window Movie
                             Maker]
                             Animation: *.swf, *.gif, *.swi [Macromedia Flash, Magic Morph, Ulead GIF Animator]
5.    Multimedia Authoring   Time Frame Concept – presented and organised along time line. Example: Macromedia
      Tools                  Flash, Macromedia Director
                             Icon Concept – elements and events are organized in a structural framework. Presented
                             visually in a logical flow of events by dragging icons from an icon menu. Example:
                             Authorware, IconAuthor
                             Card Concept – elements and events are organized as pages in a book pr a stack of cards.
                             Example: Toolbook, HyperCard, SuperCard.
5.    Web editor             What You See Is What You Get (WYSIWYG) Vs Text-based
                                        WYSIWYG                           Criteria                    Text-based
                               User doesn’t require                                          HTML knowledge is
                                                                     HTML Knowledge
                               HTML knowledge to use.                                        required
                               Will produce junk HTML in                                     No junk is present
                                                                        Junk HTML
                               the web source code
                               Very user friendly to use               Friendliness          Less user friendly
                                                        ix
Easy to visual the display                                  Harder to visualise the
                                                                      Visualise the design
                                   page                                                        design.
6.    User Interface Principle   -User interface is a way a computer program communicates with the person who is using
                                 it.
                                 Consistency – interface design are harmony and the same applies to all screen in the
                                 software
                                 Clarity - clearness of labels on the icon to make understanding easy
                                 Context – relevant to the title
                                 Navigation – can move around the system without much constrain
                                 Search – enables user to search keyword or glossary
                                 Personalisation – user can make their own personal or individual learning
                                 Learnability – provides support information and help files to make it easy to understand
                                 Flexibility – have authority to navigate any sections
7.    Multimedia production      Project Manager – see the overall of the project.
      team                       Subject Matter Expert – do research on the context of the multimedia
                                 Graphics Artist – In-charge of the graphics matters (icon, buttons, background, etc…)
                                 Audio-Video Technician – In-charge of the audio/video editing.
                                 Instructional Designer – decides on the best educational strategies and presentations.
                                 Programmer – writes codes or scripts for the authoring tools.
8.    Multimedia Production      Analysis Phase
      Phases                     Design Phase
                                 Implementation Phase
                                 Testing Phase
                                 Evaluation Phase
                                 Publishing Phase
9.    Screen Design Principle    -screen design refers to how the multimedia program will look when it is displayed on
                                 the computer screen.
                                 Contrast
                                 Alignment
                                 Simplicity
                                 Proximity
                                 Emphasis
                                 Repetition


Learning Area Five – Programming
No.   Keyword(s)                 Referring to:
1.    Definitions                Program – contains list of variables and statements that tell the computer what to do.
                                 Programming – a creation of a set of commands or instructions which directs a
                                 computer in carrying out a task.
                                 Programming language – set of words, symbols, and codes that enables human to
                                 communicate with computers.
2.    Generations of             Low Level Programming Language
      programming language       1GL (Machine Language) – written in binary codes and each statement are corresponds
                                 to one machine action.
                                 2GL (Assembly Language) – human readable notation for machine language used to
                                 control specific computer operations. Written using symbolic instructions codes that are
                                 meaning abbreviations or mnemonics.
                                 High Level Programming Language
                                 3GL (Procedural language) – uses a series of English-like words that are closer to human
                                 language to write instructions. Example: PASCAL, FORTRAN, BASIC, COBOL, C, C++
                                 4GL (Non-procedural language) – enables user to access data in a database. Limited to a
                                 very specific application.
                                 5GL (Visual programming / Natural language) – provides a visual or graphics interface.
                                 Example: Prolog and Mercury
3.    Programming                Structured programming (top-down approach) – map out the overall program structure
      approaches                 into separate subsection from top to bottom.
                                 Object oriented programming (OOP) – combines data with functions to create objects.
                                 The object has relationships with one another. Example: Smalltalk, Java, Visual Basic, C++
4.    Translator                 Compiler – source code  machine language (Extra info: translate high level
                                 programming language to assembler or machine language. Example: COBOL, FORTRAN,
                                 C, C++)
                                                            x
Interpreter – interpret and execute program directly from its source without compiling it
                            first line by line. Execute in real time when user execute it.
                            Assembler – computer program for translating assembly language into machine
                            language. Example: MACRO-80 Assembler and Microsoft MASM
5.    Basic element         Constant – the value never change at any time during the course of a program
                            Variables – value inside may change at any time during the course of a program
                            Data type
                                       Integer: Is an whole number (18, 79, 101, -6, -20)
                                       Double: Numbers with decimal or contains fractional part (14.1, - 3.5, 200.10)
                                       String: Any value that contains a sequence of characters (Ahmad, sekolah)
                                       Boolean: consist either True or False value
                                       Currency: For currency use (RM, USD, Yen)
                            Operators – symbol or notation that tells a computer to perform certain actions or
                            operation
                                       Mathematical operators: plus (+), minus (–), multiply (*), divide (/)
                                       Relation operators: equal to (=), greater than (>), less than (<), greater than or
                                       equal to (>=), less than or equal to (<=)
                                       Logical operators: AND, OR, NOT
6.    Flow Chart            Terminator – beginning or end of a program
                            Flow line and arrowhead – connect symbols and               Terminator          Input/output
                            indicate the sequences of operation.
                            Input / output – shows either an input operation
                                                                                        Process
                            or output operation                                                                Decision
                            Process – shows process to be carried out
                            Decision – shows a decision to be made
7.    Control Structure     Sequence control – linear execution
                            of codes within the program (in
                            sequence)
                            Selection control – execution of
                            codes involving decision making
                            based on the situation given. There
                            will be decision symbol present in
                            the control.                                Sequence
                            Repetition control – execution of                             Selection               Repetition
                            codes where the codes are repeated
                            while condition remains true. The arrowhead in the flow chart usually will return the
                            part of the decision to repeat the process for true condition.
8.    Program development   Problem analysis phase
      phase                 Program design phase
                            Coding phase
                            Testing and debugging phase
                                       Three types of error
                                            Syntax error – caused by wrong spelling, case sensitive, punctuation and
                                            wrong words in command.
                                            Logic error – expected output and actual output do no match for any set of
                                            data.
                                            Run-time error – occurs while the program is running or executing.
                            Documentation phase


Learning Area Six – Information System (IS)
No.   Keyword(s)            Referring to:
1.    Definition            Data – raw material that are not organized, and has little value
                            Information – processed data that are organized, meaningful and useful.
                            Information System – a set of related components that collects data, processes data and
                            provides information.
2.    Component of IS       Data
                            Hardware
                            Software            each component are interrelated with one another.
                            People
                            Procedures

                                                         xi
3.   Types of IS               Management Information System (MIS) – provide regular information about the daily
                               activities of a business to the manager
                               Transaction Processing System (TPS) – record business transaction and keep track of the
                               daily transaction in the database.
                               Decision Support System (DSS) – provides managers with information to make the best
                               decisions. It also helps to analyse information, recognize problems and making decisions.
                               Executive Information System (EIS) – helps top-level managements to plan strategies. It
                               is also used to forecast future trends.
                               Expert System (ES) – store knowledge and make logical suggestions for the user.
4.   Hierarchy of Data                            Bits  Bytes  Fields  Records  Files  Database

                               Bit – smallest unit of data the computer can store. It is in binary digit (1 and 0).
                               Byte – 8 bits = 1 byte = 1 character.
                               Field – smallest unit of meaning information in the database. It is also unit of data
                               consist of one or more characters. Example: field that describe Name, Class, Address
                               Record – collection of related fields. Example: Data about a student [Name, StudentID,
                               Age]
                               File – collection of related records.
                               Database – Structured collection of information on a specific subjects.
5.   Benefits of using         Minimise data redundancy – no need to repeat recording the same data.
     database                  Data Integrity is assured – changes of data in database will be automatically for all files.
                               Data can be shared – allow ease of sharing data especially over the network.
                               Information can be easily accessed
6.   Features of table,        Table – stores a collection of information about specific topic.
     query, form and report.   Query – request for a specific data from a database
                               Form – interface to enter information.
                               Report – summary of information from the database.
7.   Primary key and           Primary key – these keys must not be null values, and it is unique. It helps to avoid
     foreign key               duplication
                               Foreign key – the field that matches the primary key in another table. It may have
                               duplicate values.
8.   Phases of System          Analysis Phase
     Development               Design Phase
                               Implementation Phase
                               Testing Phase
                               Documentation Phase
                               Maintenance Phase
                                   3 types of maintenance:
                                         Corrective maintenance – to repair error in the system design.
                                         Perfective maintenance – to improve a computer program.
                                         Preventive maintenance – aim for future breakdowns and failures.
9.   Data manipulation         Update – to correct inaccurate data and to change old data with new data
                               Insert – to add new records in the file when new data are obtained.
                               Delete – to remove a record from a file when it is no longer needed
                               Retrieve – to obtain specific information from the tables in order to refer or make
                               changes the information.
                               Sort – To arrange the records according to ascending or descending order based on a
                               specific field.
                               Filter – to exclude unwanted records from being retrieved by using certain condition or
                               criteria in a query.
                               Search – To find specific records that fulfills the user’s requirements.




                                                           xii

More Related Content

What's hot

Digital technologies
Digital technologiesDigital technologies
Digital technologies
jamberryxxx
 
Interview presentation
Interview presentationInterview presentation
Interview presentation
Rosalindj26
 
Apresentação delegação Albânia projeto SeguraNet
Apresentação delegação Albânia projeto SeguraNetApresentação delegação Albânia projeto SeguraNet
Apresentação delegação Albânia projeto SeguraNet
Fernando Rui Campos
 
Evolution computer
Evolution computerEvolution computer
Evolution computer
Home
 

What's hot (20)

Digital technologies
Digital technologiesDigital technologies
Digital technologies
 
Intro to ict
Intro to ictIntro to ict
Intro to ict
 
Ch1 intro comp
Ch1 intro compCh1 intro comp
Ch1 intro comp
 
Interview presentation
Interview presentationInterview presentation
Interview presentation
 
Apresentação delegação Albânia projeto SeguraNet
Apresentação delegação Albânia projeto SeguraNetApresentação delegação Albânia projeto SeguraNet
Apresentação delegação Albânia projeto SeguraNet
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
 
Bab I
Bab IBab I
Bab I
 
Evolution computer
Evolution computerEvolution computer
Evolution computer
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Ict topic 4
Ict topic 4Ict topic 4
Ict topic 4
 
I.C.T notes
I.C.T notesI.C.T notes
I.C.T notes
 
Sharp Electronic portfolio
Sharp Electronic portfolioSharp Electronic portfolio
Sharp Electronic portfolio
 
Unit i mm_chap1_introduction to multimedia
Unit i mm_chap1_introduction to multimediaUnit i mm_chap1_introduction to multimedia
Unit i mm_chap1_introduction to multimedia
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Mac malacao
Mac malacaoMac malacao
Mac malacao
 
A guide to ICT security in schools
A guide to ICT security in schoolsA guide to ICT security in schools
A guide to ICT security in schools
 
Mikial Singh Nijjar | The Definition of Computer Science
Mikial Singh Nijjar | The Definition of Computer ScienceMikial Singh Nijjar | The Definition of Computer Science
Mikial Singh Nijjar | The Definition of Computer Science
 
Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Discovering Computers: Chapter 03
Discovering Computers: Chapter 03
 
Chapter01
Chapter01Chapter01
Chapter01
 
Capítulo 1 Discovering Computers
Capítulo 1 Discovering ComputersCapítulo 1 Discovering Computers
Capítulo 1 Discovering Computers
 

Similar to Important keyword to remember

1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
KMJ Science Computer
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
Kak Yong
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
Chapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.pptChapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.ppt
JayasheelanP
 
Chapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.pptChapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.ppt
ssuser2a76b5
 

Similar to Important keyword to remember (20)

mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
 
1.1.2
1.1.21.1.2
1.1.2
 
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptxUNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
UNit 1sbhejsjejdhdhdjjejejdhejjjdjdhdhheh.pptx
 
Module 1 intro evolution computer
Module 1 intro  evolution computerModule 1 intro  evolution computer
Module 1 intro evolution computer
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Final multimedia
Final multimediaFinal multimedia
Final multimedia
 
Chapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.pptChapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.ppt
 
Chapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.pptChapter 1 - Introduction to Multimedia.ppt
Chapter 1 - Introduction to Multimedia.ppt
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Chap1 basic
Chap1 basicChap1 basic
Chap1 basic
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Advancements in technology
Advancements in technologyAdvancements in technology
Advancements in technology
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Important keyword to remember

  • 1. Learning Area One – INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY No. Keyword(s) Referring to: 1. Define ICT ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime. Information: the knowledge obtained from reading, investigation, study or research. Communication: act of transmitting messages. Technology: the use of scientific knowledge, experience, and resources to create processes and product that fulfill human needs. st 2. Evolutions of 1 generation (1940 – 1956) Computers Huge, slow, expensive, unreliable Presper Eckert & William Maunchly built ENIAC (use vacuum tube) Problem with vacuum tube – generates great deal of heat, burns out frequently nd 2 generation (1956 – 1963) Uses transistors which were smaller than vacuum tubes, no need warm up time, consumed less energy, generate less heat, faster and more reliable. Famous computer scientists: John Bardeen, Walter House Brattain, William Shockley rd 3 generation (1964 – 1971) IBM 370 series were introduced in 1964. Also CDC 7600 and B2500 Development of Integrated circuit begins. Use silicon chips – reliable, compact, cheaper Hardware and software sold separately. First 256 bit RAM were introduced and was the basis for development of 1K bit RAM. th 4 generation (1971 – present) st Famous computer scientists: Steve Jobs (built the 1 Apple computer), Bill Gates, Michael Dell Silicone chips, microprocessor, storage devices were invented. Computer became 100 times smaller than ENIAC. Gain in speed, reliability and storage capacity Personal and software industry bloomed. th 5 generation (Present – beyond) Invention of new hardware technology includes:  Silicon chips  Processor  Robotics  Virtual reality  Intelligent systems  Programs which translate languages. 3. Usage of ICT in Education: can offer interactive experiences, enhanced learning, cognitive development. everyday life Teachers: to research for teaching materials, participating in online forums and conferences Students: use computer as references tool, browse internet for information. Researchers: use computer to collect and process data School administrators: for administrative purposes (to make sure the entire operations runs smoothly) Banking: electronic banking 24 hours services includes ATM, cheque deposit, electronic fund transfer, direct deposit, pay by phone system, personal computer banking or internet banking. Customers: make any transaction (for 24 hours services) Businessmen: save time by using online services Bank administrators: can oversee the entire banking activities. Industry: to facilitate production planning and control system, support chain managements, help in product design. Workers: use machine that are connected to computers to operate. Researchers: use computer to analyse and collect research data for future references Administrators: to oversee the entire operations, to detect specific error or defects iii
  • 2. E-commerce: makes buying and selling easier, more efficient and faster. Customers: connected with supplier to purchase products online. (save cost and time) Suppliers: to keep track their transactions (help in determine the price and managing inventory) Employees: use computers and telephones to communicate with their customer for enquiries. It helps employees to get the latest updates on inventory to be informed to the customers. 4. Computerised and Non-computerised (before Fields Computerised (after ICT) non-computerised ICT) system Education Teaching was more to Equipped with ICT technology explaining using words makes class more colourful and and pictures. Multimedia alive. hardly usable in class Variety of animation able to Students search for show and use for teaching and information mainly from learning. books Students can search for information online. Banking System Was done manually All transactions are done by Transaction was done computers only during working hours Transaction can be done Takes time to approve anytime and place any loan applications Online services, phone banking system, credit cards Industry Slow because everything Computers and was done manually and telecommunications industry depend totally on human became very popular and labour. profitable since productions can be increased throughout all day operation. Commerce Trading system: barter Distribution, buying, selling and system, later developed servicing products are done into currency system. electronically. Advertisement: mouth, billboard, printed flyers Global trading: slow, late, expensive 6. Impact of ICT on The six positive impacts: the society Faster communication speed Lower communication cost Reliable mode of communication Effective sharing of information Paperless environment Borderless communication. The two negative impacts: Social problems Health problems 7. Computer Ethics Computer Ethics: System of a moral standards or values used as guideline for computer and legal issues users definition Code of Ethics: guidelines in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Property: work created by inventors, authors, and artist Privacy: rights of individuals and companies to deny or restrict the collection and use of information about them. Computer Crime: any illegal acts involving computers. Cyber Law: any law relating to protect the Internet and other online communication technologies. 8. Why ethics and law Respecting ownership – not steal other people’s work either by duplicating or distributing in computing is Respecting privacy and confidentiality – refraining oneself from invading other’s privacy needed? without permission. iv
  • 3. Respecting property – do not tamper and change electronic information. 9. Intellectual Patent for inventions: utility, design, plant patent,… property protection Trademark for brand identity: Words, names, symbols, devices, images,… Design for product appearance: Literary and artistic material, music, films,… Copyright for material: particular lines, contours, colour, shape, texture, ornamentations,… 10. Differences Ethics Law between Ethics and Guidelines: as a guidelines to computer users Control: a rule to control computer users Law Moral standards: ethical behavior are judged Judicial standards: Law are judged by by moral standards judicial standards Free to follow: computer users are free to Must follow: computer users must follow follow or ignore the codes of ethics the regulations and law No Punishment: no punishment for anyone Punishment: penalties, imprisonments and who violates the ethics. other punishments for those who break the law. Universal: can be applied anywhere all over Depend on country: Depends on country the world and state where the crime is committed Produce ethical computer users Prevent misusing of computers Immoral: Not honouring computer ethics Crime: Not honouring the law means means ignoring the moral elements committing a crime 11. Methods of 2 types: authentications Biometric devices: Fingerprint recognition Facial recognition Hand geometry scanning Iris scanning (the area near to the coloured area of the pupil) Retinal scanning (the eyeball) Voice recognition Signature verification system. Callback system 12. Methods of 2 common methods: verification User identification – show passport, key-in user name & password, show exam slip. Processed object – swipe security card to enter building, police check the driver’s license to identify valid driver. 13. Controversial Pornography – any form of media or material that depicts erotic behaviour and is intended content to cause sexual excitement. Slander – legal term for false and malicious statement. 14. Internet filtering 3 common methods: Keyword blocking – uses a list of banned words to filter access to the site Website / site blocking – uses software to prevent access to any sites on the list Web rating system – browser gain access to a certain level of ratings 15. Cyber law acts in Digital Signature Act 1997 – secures electronic communications especially on the internet. Malaysia Computer Crimes Act 1997 – gives protection against misuse of computers and computer criminal activities. Telemedicine Act 1997 – Ensure only qualified medical practitioners can practice telemedicine. Communications and Multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia. 16. Computer Crimes Computer Fraud – intention to take advantage or causing loss (mainly monetarily basis) Copyright Infringement – involves illegal copy or reproduction of copyright material by black market group Computer Theft – unauthorized use of another person’s property Computer Attack – to disrupt the equipment of computer systems … 17. Computer Security Hardware Security – measure used to protect the computer hardware Software and Data Security – measure used to protect software and the loss of data files Network Security – measure used to protect the network system. 18. Security Threat Malicious code Virus – a program that can pass in the malicious code to other programs by modifying them Trojan Horse – a program which can perform useful and unexpected action Logic Bomb – that goes off when a specific condition occurs v
  • 4. Trapdoor or Backdoor – a program that allows someone to access the program with privileges Worm – a program that copies and spreads itself through a network Hacker – unauthorised person who access (hack) into computer Natural and environmental threat – flood, fire, earthquake Theft 19. Security Measures Data backup – a program of file duplication. It is necessary so that they can be recovered in case of an emergency Cryptography – process of hiding information by altering the actual information into different representation. Antivirus – program that protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, storage or incoming email files. Anti-spyware – program used to remove spyware. Firewall – hardware or software which functions in a networked environment to prevent some communications forbidden by the security policies. Screening router Proxy gateway Guard Human aspect – refer to the user and also the intruder of a computer system. Organisation self awareness – aware of the people they work with Organisation user self awareness – provide employee with adequate training and importance of security and control Individual user self awareness – aware of software from unreliable sources. Do not expose important information to stranger. Learning Area Two – Computer System No. Keyword(s) Referring to: 1. Computer System Hardware + Software + User 2. Computer Input Devices – texts, graphics, audio, video Hardware Output Devices – texts, graphics, audio, animations, video Storage Devices – Primary (RAM & ROM), Secondary (Magnetic, Flash, Optical, ROM) Processor – the main brain in the system unit 3. Computer Software System Software – Operating System (Linux, Window XP, Mac OS X, Window Vista) & Utility program (Antivirus, File Manager, Screen Saver, Diagnostic utility) Application Software Word Processing – Corel Word Perfect, Microsoft Word, Sun StarOffice Writer Spreadsheet – Corel Quattro Pro, Microsoft Excel, Sun StarOffice Calc Presentation – Corel Presentations, Microsoft PowerPoint, Sun StarOffice Impress Graphics editing – Adobe Photoshop CS2, CorelDraw, Macromedia Freehand, Gimp Software Suite – collection of individual program sold as a single package Proprietary Software – closed source software. Need to purchase the license in order to use. Open Source Software – user can freely use, modified and re-distribute. Any changes made cannot be copyrighted. 4. Information processing diagram Input Process Output Storage 5. Machine cycle Fetch diagram Store Decode Execute 6. Data 8 bits = 1 byte = 1 character vi
  • 5. representation 7. Character codes ASCII (American Standard Code for Information Interchange) Pronounced as ASK-KEY Most widely used coding system to represent data Used mostly in PC and midrange server. Uses 7 out of 8 bits in the character. EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced as EB-SEE-DIC Primarily used in mainframe computers and high-end server Unicode  Support all the world language including Asian Language  Example: Chinese, Japanese, Korean  Uses 16 bits instead of the usual 8 bits per character. 8. Component of Central Processing Unit (CPU) – control the operations of the computer. It interpret and motherboard carries basic instructions that operate a computer. It have 2 subcomponent that is Control Unit (CU) and Arithmetics Logic Unit (ALU). Expansion Slots – sockets where the circuit board or the adapter card can be inserted into the motherboard. RAM Slot – slot where computer memory (RAM) is placed on the computer’s motherboard. Ports – the point where perihpherals attaches to a system unit. Serial port – connect a device to the system unit by transmitting data one bit at a time. Parallel port – connect devices by transferring information more than one bit at a time. Universal Serial Bus (USB) port – socket on a computer or peripheral devices into which a USB cable is plugged in. Can connect up to 127 different peripherals together with a single connector. FireWire port – connect multiple types of devices that requires faster data transmission speeds. Can daisy-chain connect up to 63 devices to one FireWire port. Connectors – a connector joints a cable to a peripheral. 9. User Interface Command-line user interface – requires user to type commands or press special keys on the keyboard to enter data and instructions that instruct the operating system what to do. It has to be typed one line at a time. Menu driven Interface – provides menus as means of entering commands. Graphical User Interface (GUI) – provides interface by means of clicking icon that represent computer resources. 10. Function of OS – set of program that coordinates all the activities among computer hardware devices. operating system Also support the application software that we run. 3 types of OS: PC Platform (DOS, Microsoft Windows), Apple Platform (Mac OS), Cross Platform (UNIX, LINUX) Starting a computer – Start a computer. Happen in 2 ways: warm boot, cold boot Proving a user interface – Command line, Menu Driven, GUI Managing data and programs Managing memory Configuring Devices – handling input and output as well as enabling communication with input and output devices. 11. Utility program A type of system software that allows a user to perform maintenance-type task related to managing a computer, its devices or its program. Example: Antivirus: protects a computer against viruses by identifying and removing them Diagnostic utility: compiles technical information about a computer’s hardware and certain system software programs, and prepares a report. File manager: performs functions related to files and disk management. Screen saver: enables a display device’s screen to show a moving image or blank screen if no mouse activity occurs for a specified time. Disk Defragmenter: reorganising of disk so the files are stored in contiguous (joining / next to each other) sectors. Backup utility: back up or copy selected files or entire hard disk to another storage medium. Data Recovery: restore the data that has been physically damage or corrupted. vii
  • 6. Learning Area Three – Computer Networks and Communications No. Keyword(s) Referring to: 1. Definition of computer A system of interconnected computers and peripheral devices. For example, it may network. connect computers, printers, scanners and cameras. 2. Types of Computer LAN – covers a small region of space, typically a single building Network MAN – is a collection of LANs with the same geographical area (e.g. – same city) WAN – can be collections of LANs and / or MANs (e.g. – a country or even beyond the border) 3. Network Architecture Client/Server – Network in which the shared files and applications are stored in the server but network user (client) can still store files on their individual PCs. Peer-to-Peer (P2P) – network with all the nodes are acting as both serves and clients. Bus Topology –main physical pathway or central cable where all other devices Backbone are connected to it Advantages: Easy to implement. Failure of a node doesn’t affect the entire LAN. No disruption to network during add/remove devices. Network easily extend Disadvantages: Backbone fails  entire network affected Network speed decrease as number of device increase Troubleshooting difficult when a node fails Ring Topology – all computers and other devices are Node connected in a loop (or a circle) Advantage: Node Node Troubleshoot is easy when a node fails Disadvantages: Difficult to implement 4. Network Topology Failure of a node affect the entire network Node Node Difficult to add/remove devices Network speed decrease as number of device increase Star Topology – a central host (usually a hub or a Node Node switch) which acts as the centre, and all nodes connect to the host. Advantages: HUB Easy to implement. Failure of a node doesn’t affect the entire LAN. Node Node No disruption to network during add/remove devices. Network easily extend Troubleshoot is easy Disadvantages: Failure of a host affect the entire network Network speed decrease as number of device increase Troubleshoot difficult when a node fails A host must be installed to control the network 5. Protocols HTTP: used to access, send and receive Hypertext Markup Language files (HTML) on the internet SMTP: used for transferring e-mail between computers FTP: for allowing files to be copies between devices TCP: ensures the delivery of information packets across network. IP: providing logical addressing called IP address to route information between network 6. Network Internet Communication Intranet – internal network that uses Internet technologies. It is a small version of the Technologies internet that exist within an organization Extranet – private network that uses Internet protocols to securely share part of a business’s information. viii
  • 7. 7. Transmission medium Physical transmission medium – usually uses wires (Unshielded Twisted Pair (UTP), Shielded Twisted pair (STP), Coaxial, Fibre Optic) Wireless transmission medium – uses air to transmit data Omnidirectional Unidirectional Short range frequency One sender, Sending and receiving antenna Need special port called IrDA many receiver need to be aligned port. Frequency: Frequency: Frequency: 3 KHz – 1 GHz 1 GHz – 300 GHz 300 GHz – 400 THz Radio wave Microwave Infrared 8. Server Software Network Operating System: a) Windows NT b) Windows 2000 Server c) Windows Server 2003 d) Red Hat Linux 9. Client Software Client Software: a) Web browser b) Email client c) Network Utility d) Network File Manager Learning Area Four – Multimedia No. Keyword(s) Referring to: 1. Definition of Presentation of information by using a combination of text, audio, graphics, video and Multimedia animation. 2. Interactivity Linear interactivity – the user is a passive receiver. User does not have control over the multimedia content. Only one way communication Non-linear interactivity – the user is an active receiver. User has control over the multimedia content. Two way communication occurs 3. Medium of delivery Differences between Web-based and CD-based Web-based Criteria CD-based Relatively cheaper Cost It is more expensive Produces low and medium Can produce high quality Quality quality multimedia multimedia Takes up less time Takes up a lot of time to Production time compared to CD-based produce an end product Easily update via web Cannot update To update server 4. Multimedia Elements Text: *doc, *.txt, *.rtf [Microsoft Word, Notepad, Open Office Writer] and File formats. Graphics: *.jpg, *.gif, *.tiff, *.bmp, *.png, *.psd [Microsoft Paint, Adobe Photoshop] Audio: *.wav, *.midi, *.aif/aiff, *.au, *.wma, *.mp3 [Sound Recorder, Sony Sound Forge] Video: *.avi, *.mov, *.mpeg, *.wmv [Adobe Premiere, Pinnacle Studio, Window Movie Maker] Animation: *.swf, *.gif, *.swi [Macromedia Flash, Magic Morph, Ulead GIF Animator] 5. Multimedia Authoring Time Frame Concept – presented and organised along time line. Example: Macromedia Tools Flash, Macromedia Director Icon Concept – elements and events are organized in a structural framework. Presented visually in a logical flow of events by dragging icons from an icon menu. Example: Authorware, IconAuthor Card Concept – elements and events are organized as pages in a book pr a stack of cards. Example: Toolbook, HyperCard, SuperCard. 5. Web editor What You See Is What You Get (WYSIWYG) Vs Text-based WYSIWYG Criteria Text-based User doesn’t require HTML knowledge is HTML Knowledge HTML knowledge to use. required Will produce junk HTML in No junk is present Junk HTML the web source code Very user friendly to use Friendliness Less user friendly ix
  • 8. Easy to visual the display Harder to visualise the Visualise the design page design. 6. User Interface Principle -User interface is a way a computer program communicates with the person who is using it. Consistency – interface design are harmony and the same applies to all screen in the software Clarity - clearness of labels on the icon to make understanding easy Context – relevant to the title Navigation – can move around the system without much constrain Search – enables user to search keyword or glossary Personalisation – user can make their own personal or individual learning Learnability – provides support information and help files to make it easy to understand Flexibility – have authority to navigate any sections 7. Multimedia production Project Manager – see the overall of the project. team Subject Matter Expert – do research on the context of the multimedia Graphics Artist – In-charge of the graphics matters (icon, buttons, background, etc…) Audio-Video Technician – In-charge of the audio/video editing. Instructional Designer – decides on the best educational strategies and presentations. Programmer – writes codes or scripts for the authoring tools. 8. Multimedia Production Analysis Phase Phases Design Phase Implementation Phase Testing Phase Evaluation Phase Publishing Phase 9. Screen Design Principle -screen design refers to how the multimedia program will look when it is displayed on the computer screen. Contrast Alignment Simplicity Proximity Emphasis Repetition Learning Area Five – Programming No. Keyword(s) Referring to: 1. Definitions Program – contains list of variables and statements that tell the computer what to do. Programming – a creation of a set of commands or instructions which directs a computer in carrying out a task. Programming language – set of words, symbols, and codes that enables human to communicate with computers. 2. Generations of Low Level Programming Language programming language 1GL (Machine Language) – written in binary codes and each statement are corresponds to one machine action. 2GL (Assembly Language) – human readable notation for machine language used to control specific computer operations. Written using symbolic instructions codes that are meaning abbreviations or mnemonics. High Level Programming Language 3GL (Procedural language) – uses a series of English-like words that are closer to human language to write instructions. Example: PASCAL, FORTRAN, BASIC, COBOL, C, C++ 4GL (Non-procedural language) – enables user to access data in a database. Limited to a very specific application. 5GL (Visual programming / Natural language) – provides a visual or graphics interface. Example: Prolog and Mercury 3. Programming Structured programming (top-down approach) – map out the overall program structure approaches into separate subsection from top to bottom. Object oriented programming (OOP) – combines data with functions to create objects. The object has relationships with one another. Example: Smalltalk, Java, Visual Basic, C++ 4. Translator Compiler – source code  machine language (Extra info: translate high level programming language to assembler or machine language. Example: COBOL, FORTRAN, C, C++) x
  • 9. Interpreter – interpret and execute program directly from its source without compiling it first line by line. Execute in real time when user execute it. Assembler – computer program for translating assembly language into machine language. Example: MACRO-80 Assembler and Microsoft MASM 5. Basic element Constant – the value never change at any time during the course of a program Variables – value inside may change at any time during the course of a program Data type Integer: Is an whole number (18, 79, 101, -6, -20) Double: Numbers with decimal or contains fractional part (14.1, - 3.5, 200.10) String: Any value that contains a sequence of characters (Ahmad, sekolah) Boolean: consist either True or False value Currency: For currency use (RM, USD, Yen) Operators – symbol or notation that tells a computer to perform certain actions or operation Mathematical operators: plus (+), minus (–), multiply (*), divide (/) Relation operators: equal to (=), greater than (>), less than (<), greater than or equal to (>=), less than or equal to (<=) Logical operators: AND, OR, NOT 6. Flow Chart Terminator – beginning or end of a program Flow line and arrowhead – connect symbols and Terminator Input/output indicate the sequences of operation. Input / output – shows either an input operation Process or output operation Decision Process – shows process to be carried out Decision – shows a decision to be made 7. Control Structure Sequence control – linear execution of codes within the program (in sequence) Selection control – execution of codes involving decision making based on the situation given. There will be decision symbol present in the control. Sequence Repetition control – execution of Selection Repetition codes where the codes are repeated while condition remains true. The arrowhead in the flow chart usually will return the part of the decision to repeat the process for true condition. 8. Program development Problem analysis phase phase Program design phase Coding phase Testing and debugging phase Three types of error Syntax error – caused by wrong spelling, case sensitive, punctuation and wrong words in command. Logic error – expected output and actual output do no match for any set of data. Run-time error – occurs while the program is running or executing. Documentation phase Learning Area Six – Information System (IS) No. Keyword(s) Referring to: 1. Definition Data – raw material that are not organized, and has little value Information – processed data that are organized, meaningful and useful. Information System – a set of related components that collects data, processes data and provides information. 2. Component of IS Data Hardware Software each component are interrelated with one another. People Procedures xi
  • 10. 3. Types of IS Management Information System (MIS) – provide regular information about the daily activities of a business to the manager Transaction Processing System (TPS) – record business transaction and keep track of the daily transaction in the database. Decision Support System (DSS) – provides managers with information to make the best decisions. It also helps to analyse information, recognize problems and making decisions. Executive Information System (EIS) – helps top-level managements to plan strategies. It is also used to forecast future trends. Expert System (ES) – store knowledge and make logical suggestions for the user. 4. Hierarchy of Data Bits  Bytes  Fields  Records  Files  Database Bit – smallest unit of data the computer can store. It is in binary digit (1 and 0). Byte – 8 bits = 1 byte = 1 character. Field – smallest unit of meaning information in the database. It is also unit of data consist of one or more characters. Example: field that describe Name, Class, Address Record – collection of related fields. Example: Data about a student [Name, StudentID, Age] File – collection of related records. Database – Structured collection of information on a specific subjects. 5. Benefits of using Minimise data redundancy – no need to repeat recording the same data. database Data Integrity is assured – changes of data in database will be automatically for all files. Data can be shared – allow ease of sharing data especially over the network. Information can be easily accessed 6. Features of table, Table – stores a collection of information about specific topic. query, form and report. Query – request for a specific data from a database Form – interface to enter information. Report – summary of information from the database. 7. Primary key and Primary key – these keys must not be null values, and it is unique. It helps to avoid foreign key duplication Foreign key – the field that matches the primary key in another table. It may have duplicate values. 8. Phases of System Analysis Phase Development Design Phase Implementation Phase Testing Phase Documentation Phase Maintenance Phase 3 types of maintenance: Corrective maintenance – to repair error in the system design. Perfective maintenance – to improve a computer program. Preventive maintenance – aim for future breakdowns and failures. 9. Data manipulation Update – to correct inaccurate data and to change old data with new data Insert – to add new records in the file when new data are obtained. Delete – to remove a record from a file when it is no longer needed Retrieve – to obtain specific information from the tables in order to refer or make changes the information. Sort – To arrange the records according to ascending or descending order based on a specific field. Filter – to exclude unwanted records from being retrieved by using certain condition or criteria in a query. Search – To find specific records that fulfills the user’s requirements. xii