SlideShare a Scribd company logo
1 of 10
Information & Communication Technology

LA1 – ICT & Society

LEARNING AREA 1 – ICT & SOCIETY
Topic 1.1 -

Introduction to Information and Communication Technology

1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT

1.1.1.2 Describe the brief evolution of computers

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

Topic 1.2 -

LA1 – ICT & Society

Computer Ethics and Legal Issues

1.2.1.1 Definition
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer
Crime and Cyber Law.

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.2.2 Privacy
1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/ technologies.

1.2.3 Controversial Contents and Control
Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.2.3.1 a)List effects of controversial contents of pornography on society:

1.2.3.2 Describe the process of filtering to control access to controversial contents

1.2.4

Computer Crimes

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

LA1 – ICT & Society

1.2.4.1 Explain the need for Cyber Law

1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement,
Theft, Attacks.

Topic 1.3 -

Computer Security

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.3.1 Definition
1.3.1.1 Define Computer security.

1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
-

Malicious code
Hacking
Natural disaster
Theft

1.3.3 Security Measures

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.3.3.1 Select the appropriate security measures to overcome the identified computer
threats.

1.3.3.2 Apply the correct security procedures.

Topic 1.4 -

Current and Future Developments

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society

More Related Content

Viewers also liked (8)

Borang bp2
Borang bp2Borang bp2
Borang bp2
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
Privacy
PrivacyPrivacy
Privacy
 
La2 templates
La2 templatesLa2 templates
La2 templates
 
Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to La1 templates

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111girlfrida
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docxkarisariddell
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksDavid Sweigert
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignmentVivek Maurya
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files Pdepoerossie
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpointMOE
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber lawFatin Izzaty
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptxdikkoyafya
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesRichard Dioteles
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU
 

Similar to La1 templates (20)

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Hsm ict 4
Hsm ict 4Hsm ict 4
Hsm ict 4
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
Rpt ict t4_2016
Rpt ict t4_2016Rpt ict t4_2016
Rpt ict t4_2016
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Scheme ict-f4-2014
Scheme ict-f4-2014Scheme ict-f4-2014
Scheme ict-f4-2014
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptx
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 

More from cikgushaharizan (20)

Acf
AcfAcf
Acf
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-4-1
Bidang pembelajaran-4-1Bidang pembelajaran-4-1
Bidang pembelajaran-4-1
 
Notacd081
Notacd081Notacd081
Notacd081
 
Notacd12
Notacd12Notacd12
Notacd12
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

La1 templates

  • 1. Information & Communication Technology LA1 – ICT & Society LEARNING AREA 1 – ICT & SOCIETY Topic 1.1 - Introduction to Information and Communication Technology 1.1.1 Overview of Information and Communication Technology (ICT) 1.1.1.1 Define ICT 1.1.1.2 Describe the brief evolution of computers Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 2. Information & Communication Technology Topic 1.2 - LA1 – ICT & Society Computer Ethics and Legal Issues 1.2.1.1 Definition Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 3. Information & Communication Technology 1.2.1.2 Differentiate between ethics and law. 1.2.1.3 State the need for intellectual property laws Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 4. Information & Communication Technology 1.2.2 Privacy 1.2.2.1 List ways to protect privacy. 1.2.2.2 State authentication and verification methods/ technologies. 1.2.3 Controversial Contents and Control Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 5. Information & Communication Technology LA1 – ICT & Society 1.2.3.1 a)List effects of controversial contents of pornography on society: 1.2.3.2 Describe the process of filtering to control access to controversial contents 1.2.4 Computer Crimes Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 6. Information & Communication Technology LA1 – ICT & Society 1.2.4.1 Explain the need for Cyber Law 1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement, Theft, Attacks. Topic 1.3 - Computer Security Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 7. Information & Communication Technology 1.3.1 Definition 1.3.1.1 Define Computer security. 1.3.2 Security Threats 1.3.2.1 Explain briefly the different threats to computer security: - Malicious code Hacking Natural disaster Theft 1.3.3 Security Measures Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 8. Information & Communication Technology LA1 – ICT & Society 1.3.3.1 Select the appropriate security measures to overcome the identified computer threats. 1.3.3.2 Apply the correct security procedures. Topic 1.4 - Current and Future Developments Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 9. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 10. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society