ICT is the technology required for information processing.
In particular, the use Of electronic computers, communication devices
and software application to convert, store, protect, process, transmit,
and retrieve information from anywhere and anytime.
Information and Communication Technology Information Communication Technology From reading, investigation, study or research From internet, e-mail, video conferencing From telephone, fax machine, radio, tv, satelites www… LESSON 1
TECHNOLOGY TIMELINE 3500 BC (Sumerians-Cuneiform writing) 1500 BC (Phoencians- alphabet ) 1941 Computer 1793 telegraph 1925 Television 1454 First Printing machine 105 BC Tsai Lun- paper 1876 First telephone 1958 photocopier 1963 Satellite 1969 APRANET -internet
LESSON 2 EVOLUTION OF COMPUTERS 200 BC ( Chinese Abacus) 1801 Joseph Marie Jacquard – Weaving Loom 500 BC (Egyptian abacus ) 1620 John Napier –Napier’s Bones 1653 Blaise Pascal- Pascaline 1673 Gottfried Wilhelm Von Leibniz - Leibniz’s Rechiner 1941 Harvard University- Mark 1 1823 Charles Baggage – Mechanical calculator Machine
Computer generations Technology Problem/ advantages First Generation (1940-1956)
DIFFERENCE BETWEEN COMPUTERIZED AND NON-COMPUTERIZED
Used computer to do something or their work.
Such as input data, surf internet.
Easy to search information
Use file to put a document
Very difficult to find old document or data.
LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE
LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE A) EDUCATION BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Teacher lectures Teacher as a facilitator. Students study by their own. 2. Students write in their notes / exercise books Students do the exercise in the computer 3. Teacher write notes On the board Teacher use the LCD projector and computer 4. Students use textbooks Students use teaching courseware
B) BANKING SYSTEM BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Done manually by taking deposit directly All transaction are done with computer 2. Transactions can only be made during working hours Transactions can only be made 24 hours a day 3. Takes times to approve any loan applications Loan application can be approved faster Eg: online services, phone banking system, credit cards
Used to facilitate production planning and control
To help in product design in the industrial sector.
BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Production was slow Production is faster 2. Done manually and totally depended on human labour. Use machine or robotic 3. Takes times to finish the product Production can be increased through all day operation
Employees use computers and telephones to communicate
with their customers for any enquiries.
BEFORE ICT (Non-computerized ) AFTER ICT (computerized) Using barter system Using e-commerce Word of mouth, billboard, printed flyers Advertisement on Radio, television and Internet Trading globally was slow, late and expensive Trading globally was faster and less expensive
LESSON 5 THE IMPACT OF ICT ON SOCIETY POSITIVE EFFECTS NEGATIVE EFFECT 1. Faster communication speed
2. Lower communication cost 3. Reliable mode of communication 4. Effective sharing of information
2. Health problems
physical and mental stress
5. Paperless environment 6. Borderless communication
LESSON 6 Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it. GUIDELINES Meaning of the …. Ethics Any code of conducts that are not conforming to approved standards of social or processional behavior Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority. Unethical Law
Differences between Ethics and Law ETHICS LAW As a Guideline As a rule to control Moral standards Judicial standards Free to follow the code of ethics Must follow the regulation and law No punishments Penalties, imprisonments and others law Universal Depends on country Produce ethical computer users Prevent misusing of computers Immoral Crime
Sending warning about viruses to other computer users. ……………………………..
Selling information to other parties without the owner’s permission. ……………..
Modifying certain information on the Internet, affecting the accuracy of the
4. Selling pirated software in night market. ………………….
5. Reading your friend’s e-mail without his or her permission. ………………….
6. Hacking into your school’ database to change your examination results. …………..
7. Using the office computer to do the personal things. …………..
8. Using the information with authorization. ………………..
9. Involvement in stealing software. ……………………..
10. Asking the permission before sending any business advertisements to others.
ETHICS UNETHIC LAW BREAKING FIND THE ANSWER FROM THE TEXT BOOK ……
LESSON 8 INTELLECTUAL PROPERTY RIGHTS Refers to works created by inventors, author and artists. These work are unique And have value in market place. Covers ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes….. Definition of Intellectual Property Intellectual Property law INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS
TRADE/ COMPANY NAMES
Types of Intellectual Property Protection Literary & artistic material, music, film, Sound recording & roadcasts, including Software & multimedia Words, names, symbols, devices & images that represent product, Goods or services Utility, design, plant That protect inventions & improvement to existing inventions Lines, contours, colors, shape, Texture, or material of the product or Its ornamentation 1 ) Patents for inventions 2) Trademark for brand identity 3) Design for product appearance 4) Copyright for material
THE WAYS OF COMPUTER PRIVACY PASSWORD ENCRYPTION EMAIL PRIVACY Not just to protect the computer but to make sure that the computer issues by authorized worker or user only. With public key encryption there are two keys, one public and the other private. When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The public key needs to be known The number of packets depends on the size of message. To send a message to a friend, you uses his public key to encrypt the message. Each message has the internet address of the recipient. Your friend then uses his private key to decode the message after receiving it. This means there may be some places between the packets could be intercepted and examined.
LESSON 10 Process where user verify that they are who they say they are Authentication Device that translates persona characteristics Into a digital code that is compared with a digital code Stored in the database Refers to the checking system that Authenticates the user Biometric device Callback system
Fingerprint Recognition – measure blood flow, edges of the fingers.
Facial Recognition – characteristics of an individual’s face images.
Hand Geometry Scanning - analysis of the shape of one’s hand.
Iris Scanning – 200 point that can be used for comparison, including rings,
furrows and freckles. (this method is excellent but cost is high)
Retinal Scanning – analysis the layer of blood vessels at the back of the eye.
Voice Recognition – verification time is approximately 5 seconds
Signature Verification System – uses special pen and tablet. Verification system
is fair and the cost is excellent.
LESSON 11 Act of proving or disproving the correctness of a system With respect to a certain formal specification. Verification Process of validating the User Processed Object Something the user has such as IC User Identification 2 methods
key in the user name to log in
LESSON 12 CONTROVERSIAL CONTENT Is information that causes disagreement in opinions And may cause the disruption of peace because different People or culture have different view about the contents. Pornography
impact on Malaysian society..
Can lead to criminal acts such as exploitation of women and children
2) Can lead to sexual addiction and perversion
3) Can develop low moral value
impact on Malaysian society..
1) Disregards honesty and truth
2) Bad habit and spreading
untruths or rumors
3) Unnecessary argument
4) Negative attitudes
m/s 33 Slander
LESSON 13 Process that prevents or blocks access to certain materials on the internet. What is Internet filtering?
Dubious internet sites
Denial list regularly updated
Web rating system
Rating done by web page
3 method to filter the content of the Internet The process of Internet filtering
LESSON 14 Any laws relating to protecting the internet and other online communication Technologies What is Cyber Law? Needs for Cyber Law Integrity and Security Information Legal status of online transaction Privacy and confidentially of information Intellectual property Rights Security of government data
The Cyber Law Acts in Malaysia 1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet 2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities 3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine 4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia
LESSON 15 Computer Crimes 1. Computer Fraud Defined as having an intention to take advantage over or causing loss to other people . Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes. 2. Copyright Infringement Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction of copyright material by the black market group. Eg: Pirated CD 3. Computer Theft Defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg: transfer of payment to the wrong account 4. Computer Attacks Defined as any activities taken to disrupt the equipment of computer system, change processing control or corrupt stored data. Eg: malicious code (virus, worm…)
computer security Means protecting our computer system and the information they Contain against unwanted access, damage, destruction or modification. Network security Hardware Security Software security / data security 3 types Eg: pc-lock, keyboard lock, Smart card Eg: activation code, Serial number Eg: firewall
A program that copies itself and spreads through a network.
2. A program that goes off when a specific condition occurs
and causes threats to computer at a specified time and date.
3. Usually attaches itself to the program and then destroys or
co-exists with the program.
4. Spreads through any medium and causes threats by
modifying the files attached.
5. One of the common ways to attack our computer is
requesting for users’ login ID and password.
Primary differences between worms and viruses Worm Virus Operates through the network Spreads through any medium Spreads copies on itself as a standalone program Spreads copies itself as a program that attaches to other programs
It defined as unauthorised access to the computer system by hacker. Hackers are person who learn about the computer system n detail. What is Hacking? What is Theft? Example: steal money, goods information, Information, and resource …. Steal computer.
3 approaches to prevent the theft….
Using locks, smart card, password
record any hardware transported
Restricting the hardware from being moved
LESSON 18 Security Measures Anti-spyware Firewall Anti-virus Human Aspects Data backup Cryptography
Security Measures so m Explanation 1.Data backup File duplication – daily, weekly , biweekly backup 2. Cryptography Is a process of hiding information by altering the actual information into different representation. 3. Antivirus Protects a computer against viruses by identifying and removing any computer viruses found in the computer. (kaspersky) 4. Anti-spyware Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware) 5. Firewall Piece of hardware software which functions in a networking environment to prevent some communication forbidden by the security policy. (screening routers, proxy gateway, guard) 6. Human Aspects Refer to the user and also the intruder of a computer system.
LESSON 19 Relationship between security threats and security measures SECURITY PROCEDURES
There are a few ways to protect
detect virus and do cleanup
warn others on virus attack
Security threats VS Security measures 1. Malicious code threats VS Antivirus & Anti-Spyware 2. Hacking VS firewall 3. Natural disaster VS data backup 4. Theft VS human aspect
LESSON 21 Computer application in the society Area Examples of software applications Home & education Microsoft office, adobe photoshop, macromedia flash, autoCAD… Business Spreadsheet, database, presentation, graphics… Graphics & multimedia Computer Aided design (CAD), paint/image editing Communication E-mail, web browsers, chat rooms, Newgroups, video conferencing
Computer users Home user Power user Large business user Mobile user SOHO