Teacher's guide
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Teacher's guide

on

  • 697 views

 

Statistics

Views

Total Views
697
Views on SlideShare
687
Embed Views
10

Actions

Likes
0
Downloads
6
Comments
0

1 Embed 10

http://sparklytech.tumblr.com 10

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Teacher's guide Document Transcript

  • 1. DRAFTINFORMATION AND COMMUNICATION TECHNOLOGYTEACHER’S NOTE PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA ARAS 4-8, BLOK E9, PUTRAJAYA 2006
  • 2. DRAFTThis document comes together with the Learning Modulefor students. You are advised to read this documentbefore getting the students to start with the LearningModule.In carrying out activities for topic 2.4 Installation ComputerSystem and 3.4 Setting Network Facilities, DO NOT usethe computers in the computer lab. You are advised tohave a different set of computers for these activities. Youhave to ensure that all the computer components, partsand hardware are available for the students to carry outthe activities found in the module. 2
  • 3. DRAFTReferences: Books 1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information Age. Complete. Eight Edition. 2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering Computers 2005 : A Gateway to Information, Course Technology. 3. Stallings W. (2003) Cryptography and Network Security: Principles and Practices. Third Edition. 4. Irv Englander (2000) The Architecture of Computer Hardware and Systems Software, An Information Technology Approach: Second Edition. 5. Tamara Dean (2000), “Network + Guide to Networks”, Thomson Course Technology Websites addresses ICT and Society 1. Ad-Aware SE Personal ~ http://www.lavasoft.com 2. Antivirus ~ http://www.primode.com/glossary.html 3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com 5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/ 7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm Computer System 1. http://www.scsite.com 2. http://webopedia.com/ 3. http://www.microsoft.com/assemble 4. http://www.microsoft.com/biossetup 5. http://www.grisoft.com 6. http://www.pcguide.com Computer Networks and Communications 1. http://www.lanshack.com 2. http://www.homenethelp.com 3. http://www.crossover.asp 4. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin g.mspx 3
  • 4. DRAFT INFORMATION ANDCOMMUNICATION TECHNOLOGY AND SOCIETY 1.3 COMPUTER SECURITY 4
  • 5. DRAFTTopic: 1.3 COMPUTER SECURITY 1.3.3 Security measuresAt the end of the lesson, students should be able to: 1.3.3.3 Apply the correct security procedures. A. Antivirus B. Anti-Spyware C. Cryptography D. Firewall E. Data backup F. Human aspectsIndividual / group activitiesBefore using this module teacher has to ensure the following:A. Antivirus i. An Antivirus Software must be preinstalled in students’ personal computer. Example: AVG Free Edition software ii. Test file for virus check must be copied on the desktop of students’ personal computer. Example: eicar.com iii. AVG Free Edition and Eicar.com is included in Teaching guide CD.B. Anti-spyware i. Anti-spyware software must be preinstalled in students’ personal computer. ii. Ad -Aware SE Personal software is included in Teaching guide CD. Note on spyware: Spyware and adware Some vendors or employers use spyware to collect information about program usage or employees. Internet advertising firms often collect information about users’ Web browsing habits by hiding spyware in adware. Adware is a program that dispkays an online advertisement in a 5
  • 6. DRAFT banner or pop-up windows on Web pages, email, or othe Internet services. How to protect your computer from spyware? The best defence against spyware and other unwanted technologies is to prevent them from getting into your computer in the first place. Here are some steps you can take to stay safe while using the Internet and software programs. - Keep security on your computer up to date o Update security patches o Security and privacy settings in Internet browsers - Only download programs from web sites you trust. - Beware of the fine print: Read all security warnings, license agreements, privacy statements, and “opt-in” notices with any software you download. - Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,” or “Cancel” to close a window. - Be extra careful with certain types of “free” programs. - Use available tools to detect and delete spyware. o Anti-spyware and antivirus software o Personal firewallC. Cryptography i. The activity on cryptograph will be on paper not computer. ii. This is a group activity. NOTE on cryptography A process associated with scrambling plaintext (ordinary text, or cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Cryptography concerns itself with four objectives: 1) Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4) Authentication (the sender and receiver can confirm each other www.stallion.com/html/support/glossary.html 6
  • 7. DRAFTHow to calculateEncryption algorithm: C = (P + K) mod 26 with K = 3 To encrypt a letter H : 1. Substitute the letter H into number. H=7 2. Use the algorithm. P = 7, K = 3 C = (P + K) mod 26 = (7 + 3) mod 26 = 10 mod 26 mod = balance of division = 10 3. Convert the number 10 into letter. 10 = KDecryption algorithm: P = (C – K) mod 26 with K = 3 To decrypt the letter K: 1. Substitute the letter K into number. K = 10 2. Use the algorithm. C = 10, K = 3 P = (C – K) mod 26 = (10 – 3) mod 26 = 7 mod 26 =7 3. Convert the number 10 into letter. 7=H 7
  • 8. DRAFTD. Firewall i. Ensure the windows firewall is disabled in students’ computer before they start the module. ii. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewall is turned on by default. (However, some computer manufacturers and network administrators might turn it off.) iii. You do not have to use Windows Firewall —you can install and run any firewall that you choose. Evaluate the features of other firewalls and then decide which firewall best meets your needs. If you choose to install and run another firewall, turn off Windows Firewall. iv. As enrichment, you can ask the students to disable the firewall and surf the Internet. Then, try surfing the Internet again but this time with the firewall enabled. Ask students to observe any differences? Normally the firewall will block the download and upload files activities if you are using instant messaging like Yahoo messenger.E. Data backup i. Provide students with a blank diskette or a floppy disk. ii. Make sure My document folder is on the desktop. iii. Save a file or document in My Documents folder.F. Human AspectNote on security risk generally done by human.Computers are exposed to several types of security risks . Security Risks Descriptions Unauthorized • Unauthorized access - the use of a computer or access and use network without permission. • Unauthorized use – the use of a computer or its data for unapproved or possibly illegal activities. Hardware Theft • Hardware theft – the act of stealing computer and Vandalism equipment. • Hardware vandalism – the act of destroying computer equipment. Identity Theft When someone steals personal or confidential information. Software Theft When someone • steals software media • intentionally erases programs • illegally copies a program 8
  • 9. DRAFTHow to protect your computer from perpetrators?User may take several measures to help protect computer from perpetrators. Security Risks SafeguardsUnauthorized • Company should have a written acceptable use policyaccess and use (AUP) that outlines the computer activities for which computer and network may and may not be used. • Users should be identified and authenticated. • Users should disable file and printer sharing on your Internet connection.Hardware Theft • Users should have common sense and a constantand Vandalism awareness of the risk. • Organisations should implement physical access control (locked doors, windows and equipment). • Computers use passwords, possessed objects and biometrics.Software Theft • Organisations should keep original software boxes and media in a secured location. • Manufacturers should issue users license agreement to protect from software piracyIdentity Theft • Organisations should implement user identification and authentication controls. • Oganisations use a variety of encryption techniques to keep data secured and private. 9
  • 10. DRAFTCOMPUTER SYSTEM 2.4 Installation 10
  • 11. DRAFTTopic: 2.4 Installation 2.4.1 Personal Computer (PC) Assembling 2.4.2 Hard Disk Partitioning and Formatting 2.4.3 Software InstallationAt the end of the lesson, students should be able to: 2.4.3.1 Assemble the parts of a PC correctly 2.4.3.2 Participate in assembling the parts of a PC correctly 2.4.3.3 Display cooperation in assembling the parts of a PC correctly 2.4.3.4 Format and partition the hard disk 2.4.3.5 Install operating system, applications software and utility programsACTIVITIES (Group activity)1. Ensure all components are available by using the checklist below. Students’ copy is in the module.2. Do not use the computers in the computer lab. Buy a different set or use other computers in the school.3. Teacher has to demonstrate first.4. It is advisable to wear an anti-static wrist strap that is properly grounded.5. Encourage students to handle all the components with great care. 11
  • 12. DRAFTChecklist No. Components Tick (√) if available 1 CPU casing and power supply 2 CPU chip 3 Motherboard 4 Hard disk 5 Floppy disk drive 6 CD Rom drive 7 Cables o IDE cable o floppy cable o audio cable 8 Cards o modem card o display card o sound card o network card (not needed if all devices are integrated on-board) 9 RAM chips 10 Mouse 11 Speakers 12 Keyboard 12
  • 13. DRAFTCOMPUTER NETWORKS AND COMMUNICATIONS3.4 SETTING NETWORK FACILITIES MODULE 13
  • 14. DRAFTTOPIC: 3.4 SETTING NETWORK FACILITIES 3.4.1 Installation of Network Interface Cards (NIC) 3.4.2 Cable Crimping and Testing 3.4.3 Configuration and Testing of Network 3.4.4 Share DataAt the end of the lesson, students should be able to: 3.4.1.1 Insert network interface cards (NIC) 3.4.1.2 Install drivers for the NIC 3.4.2.1 Crimp and test UTP cable • Straight cable • Crossed cable 3.4.2.2 Exercise care and caution when crimping a cable 3.4.3.1 Configure the workstation to join a Local Area Network • Internet Protocol (IP) Address • Subnet Mask • Server name 3.4.3.2 Test the network connection 3.4.4.1 Create a shared folderActivities (Group work) 1. Ensure all components are available by using the checklist below. Students’ copy is in the module. 2. Do not use computers in the computer lab. Buy a different set or use other computers found in the school. 3. You need to have 3 sets of computers for this activity. 4. Teacher has to demonstrate first.Checklist No. Hardware Tick (√) if available Network Interface Card (NIC) NIC driver Switch / Hub CAT5E cable (UTP cable) RJ45 connectors LAN cable tester Crimp tool Cable stripper Cutter Screwdrivers 14