Form 4 Yearly Plan For ICT 2014

SMK DENGKIL, SEPANG
INFORMATION AND COMMUNICATION TECHNOLOGY
SCHEME OF WORK 2014
FORM 4
1...
Form 4 Yearly Plan For ICT 2014

and natural disasters
Theft : e.g. physical, data,
information
1.2.8 Cyber-law
o

WEEK
7
...
Form 4 Yearly Plan For ICT 2014
31/3-18/4

MAY
WEEK
16,17

2.2.3 Motherboard:
o central processing unit (CPU)
o expansion ...
Form 4 Yearly Plan For ICT 2014

3.1.4

WEEK
29

3.1.5

11/8-15/8

3.1.6

3.1.7

3.1.8

3.1.9

3.1.10

WEEK
30
18/8-22/8

...
Form 4 Yearly Plan For ICT 2014

devicesinto a local-area network (LAN). It
has the capabilities to coordinate the
activit...
Upcoming SlideShare
Loading in …5
×

Scheme ict-f4-2014

557 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
557
On SlideShare
0
From Embeds
0
Number of Embeds
19
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Scheme ict-f4-2014

  1. 1. Form 4 Yearly Plan For ICT 2014 SMK DENGKIL, SEPANG INFORMATION AND COMMUNICATION TECHNOLOGY SCHEME OF WORK 2014 FORM 4 1.0 INFORMATION TECHNOLOGY AND SOCIETY MONTH/ TOPICS AND LEARNING OUTCOME SUGGESTED ACTIVITIES WEEK SCOPE JAN 1.1 Introduction Learners should be able to: Students state the definition of WEEK to Information 1.1.1 Define Information Technology InformationTechnology in general. 1 Technology in general. 2/1-3/1 (1 periods) WEEK 2 ORIENTASI PELAJAR TINGKATAN 4 6/1-10/1 (4 periods) WEEK 3 Learners should be able to: 1.1.1 Define Information Technology in general. 13/1-17/1 1.1.2 Discuss the roles of IT in everyday life: o Education o Banking o Industry Commerce. MAULIDUR RASUL THAIPUSAM WEEK 4 (8 periods) WEEK 5 27/1-30/1 (TAHUN BARU CINA) FEB WEEK 6 3/2-7/2 1.2.1 Define Computer Ethics. 1.2.2 Identify the Code of Ethics. 1.2.3 Define Privacy: authorised access - user authentication and verification Login (Personal Identification Numbers (PIN), User Identification, password) Biometrics physical control Controversial contents and Students state the definition of Information Technology in general. 2. Group Activity: Discussing the roles of IT in everyday life. Students cite an example of a technology used in every day life. Students adhere the rules and regulations set for the ICT lab. Define Intellectual Property. 1.2.4 o 20/1-24/1 1.2 Computer Ethics and Legal Issues 1. 1.2.5 control: o Pornography o Slander o Filtering (Example : NetNanny, CyberPatrol, BlockNow) 1.2.6 Computer crime and Security threats: o Definition :  Computer crime  Security threats o Examples of computer crimes: o Fraud identity fraud credit card fraud Copyright infringement unauthorized copy unauthorized file sharing Theft: data, information, equipment Attacks: Examples salami attack, virus, worms, hacking 1.2.7 Examples of Security threats o malicious codes: e.g. virus, Trojan horse, worms, spy ware, Phishing o hacking: ethical (hackers) and non-ethical hacking (crackers) o Natural/environmental: e.g. fire 1.2.1.1 Students explain Computer Ethics and Code of Ethics. 1.2.1.2 Students describe Intellectual Property and Privacy. 1.2.1.3 Students carry out research on controversial contents and control. 1.2.1.4 Students discuss computer crime and Security threats. 1.2.1.5 Students carry out research on Cyber Law and its importance.
  2. 2. Form 4 Yearly Plan For ICT 2014 and natural disasters Theft : e.g. physical, data, information 1.2.8 Cyber-law o WEEK 7 1.3 Computer Security 10/2-14/2 (4 periods) 1.3.1 Define Computer Security 1.3.2 o o State Security measures: data backup cryptography 1.3.3 encryption and decryption o antivirus o anti-spyware o Firewall o Human aspects : awareness (policy, training) WEEK 8 17/2-21/2 1.4 Research 1.4.1 Impact of IT on society, (8 periods) 1.4.2 Copyright and Piracy from the moral and legal standpoint 1.4.3 Lack of security and its effects in industry/economy/ government. 1.4.4 1.3.1.1 Students discuss the meaning of Computer Security and its measures. 1.3.1.2. Students describe encryption and decryption. 1.3.1.2 Students carry out research on topics: antivirus antti-spyware Firewall Policy and training of computer security 1.4.1.1 Learners discuss the meaning of Copyright and Piracy. 1.4.1.2 Learners list down the impact of piracy activities from the perspectives of: moral legal Malaysian Cyber-law, electronic government law WEEK 9 24/2-28/2 MARCH WEEK 10 ICT ASSESSMENT (PBS) 3/3-7//3 11 UJIAN BULANAN 1 10/3-14/3 2.0 COMPUTER SYSTEM MONTH/ TOPICS AND WEEK SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES Learners should be able to: WEEK 12 2.1 System Concept 17/3-21/3 (6 periods) 2.1.1 Overview of computer system 2.1.2 Data Representation: o bit o byte o character 2.1.3 Introduction to Binary coding: ASCII 2.1.4 o o o o o o Data measurement: bit byte Kilobyte (KB) Megabyte (MB) Gigabyte (GB) Terabyte (TB) 2.1.5 Clock speed measurement: o megahertz (MHz) o gigahertz (GHz) 22/3-30/3 APRIL WEEK 13,14,15 CUTI PERTENGAHAN PENGGAL 1 2.2 Hardware 2.2.1 Input devices (12 periods) 2.2.2 Output devices
  3. 3. Form 4 Yearly Plan For ICT 2014 31/3-18/4 MAY WEEK 16,17 2.2.3 Motherboard: o central processing unit (CPU) o expansion slot o expansion card o RAM slot o ports and connectors 2.2.4 Storage : o primary storage (RAM/ROM) o secondary storage (magnetic medium, optical medium, flash memory card) 2.3 Software (12 periods) 21/4-2/5 2.3.1 Operating System: o platforms o functions o interfaces 2.3.2 Application Software: types and usage (word processing, spreadsheet, presentation, graphics) 2.3.3 Utility Program: types and usage (file management, antivirus, diagnostic, file compression) 2.3.4 Proprietary and open source software HARI PEKERJA WEEK 18 5/5-9/5 JUNE WEEK 19,20 PEPERIKSAAN PERTENGAHAN TAHUN 12/5-23/6 HARI WESAK 28/5-13/6 CUTI PERTENGAHAN TAHUN( 28 MAY --- 13 JUNE) JULY WEEK 21-24 ULANGKAJI 2.4 Installation 2.4.1 PC assembling (6 periods) 2.4.2 Hard disk partitioning and formatting 2.4.3 o o o Software installation: operating system application software utility program 16/6-11/7 HARI KEPUTERAAN AGONG WEEK 25 14/7-18/7 NUZUL QURAN 2.5 Current and Future Technologies (4 periods) 2.5.1 Latest open source software available 26 21/7-25/7 UJIAN BULANAN 2 (HARI RAYA PUASA) 3.0 COMPUTER NETWORKS AND COMMUNICATIONS MONTH/ WEEK AUGUST WEEK 28 4/8-8/8 TOPICS AND SCOPE 3.1 Basic Concepts of Networks and Communica tions LEARNING OUTCOME Learners should be able to: 3.1.1 Define network 3.1.2 Define communication 3.1.3 (6 periods) State the importance of network and communication using examples in the student’s SUGGESTED ACTIVITIES Notes: Network: To connect two or more computers together with the ability to communicate with each other Communication: The transmission of data from one device to another Discuss: - file sharing between computers - sending short messages using
  4. 4. Form 4 Yearly Plan For ICT 2014 3.1.4 WEEK 29 3.1.5 11/8-15/8 3.1.6 3.1.7 3.1.8 3.1.9 3.1.10 WEEK 30 18/8-22/8 3.1.11 immediate environment. Define types of computer networks Local Area Network (LAN) MAN (Metropolitan Area Network) WAN (Wide Area Network) Differentiate between the three types of computer networks Define 2 types of network architecture Client/Server Peer-to-Peer State three types of network topology Bus Ring Star Differentiate between the three types of network topology Define TCP/IP as the protocol to facilitate communication over computer network State types of network communication that use TCP/IP Intranet Internet Extranet Cooperation in conducting group research cellular services Conduct group research from Information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com Notes: LAN: A network that spans a small area usually confined to a single building or a group of buildings MAN: A network designed for town and city usually larger than Local-Area Network WAN: A network that spans a relatively large geographical area usually consisting two or more Local-Area Network. Example: The Internet Group activity: Students list out the differences between the three types of computer network Conduct group research from information sources (library, the Internet) on types of network architecture Notes: Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities Conduct group research from information sources (library, the Internet) on types of network topology Students draw simple diagram of the 3 types of network topology Students list out the differences between the three types of network topology Conduct group research from information sources (library, the Internet) on TCP/IP Conduct group research from information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com WEEK 31 25/8-29/8 3.2 Hardware Requirements (8 periods ) HARI KEBANGSAAN 3.2.1 3.2.2 SEPT WEEK 32 Identify various types of physical transmission media/ cables such as Unshielded Twisted Pair(UTP), Shielded Twisted Pair(STP), Coaxial Cable and Fiber Optic Cable Identify various types of wireless transmission media such as infrared, radio wave and satellite Students list down various types of cables Students list down various types of wireless transmission media -ICT ASSESSMENT 2 (PORTFOLIOS) 2/9-5/9 WEEK 33 8/9-12/9 3.3 Software Require-ments (4 periods ) 3.3.1 Define Network Operating System Notes: Network Operating System (NOS): An operating system that includes functions for connecting computers and
  5. 5. Form 4 Yearly Plan For ICT 2014 devicesinto a local-area network (LAN). It has the capabilities to coordinate the activities of multiple computers across a network Notes: 3.3.3 State the functions of various client software Examples: Windows 2000 Server, Windows NT, LINUX, UNIX web browser Notes: email client Examples: network utilities Web Browsing: Internet Explorer, network file manager Mozilla Firefox and Opera Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora Network Utilities: Ping and Traceroute Network File Manager: Network Neighborhood and My Network Places CUTI PERTENGAHAN PENGGAL 2 (13 SEPT – 21 SEPT) 3.3.2 13/9-21/9 HARI MALAYSIA WEEK 34 3.4.5 Install network interface card Setup the driver for the network card Crimp and test UTP cable Straight cable Crossed cable Configure the workstation to join a Local-Area Network Internet Protocol (IP) Address Subnet Mask Gateway Hostname Test the network connection 3.4.6 22/9-26/9 3.4 Setting Network Facilities (12 periods ) 3.4.1 3.4.2 Name various Network Operating System Software Create a shared folder 3.5.1 Describe: Mobile Computing (specifications, services, frequencies), or Internet Technology and Services (VOIP, BLOG), or Types of network (PAN, VPN, WLAN, WIMAX) ULANGKAJI 3.4.3 3.4.4 OCT WEEK 35 29/9-3/10 WEEK 35 29/9-3/10 3.5 Current and Future Develop-ment ( 6 periods ) WEEK 36,37 Activity: Ping the server from the configured workstation Activity: Set up a shared folder Save a file in the shared folder Access the file in the shared folder from other workstations Activity: Research on the chosen topic Write a short report (350 words) and save the document in the shared folder 7/10-24/10 PEPERIKSAAN AKHIR TAHUN HARI RAYA QURBAN DEEPAVALI AWAL MUHARAM NOV WEEK 38-41 - ICT ASSESSMENT 3 (PORTFOLIOS) REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPUTILATION 27/10-21/11 WEEK 42 22/11-4/1 CUTI AKHIR TAHUN (22 NOV – 4 JAN 2015)

×