The document provides a scheme of work for teaching Information and Communication Technology (ICT) to Form 4 students in Malaysia. It outlines the topics to be covered each month, including: 1) Information Technology and Society, discussing ethics, privacy and security; 2) Computer Systems, covering hardware, software and installation; and 3) Computer Networks and Communications, focusing on networking concepts, hardware, software and practical skills. The learning outcomes, suggested activities and notes for teachers are also included to support lesson planning and delivery for each topic.
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
Adaption of the new technology is a prerequisite for the business's survival and to meet the quality standard. The public address system is widely used in all areas of living; it helps the host speaker to easily disperse the desired messages. This study aimed to develop a wireless digital broadcasting with voice alarm and text-to-speech (TTS) feature that can wirelessly transmit audio signals from the main campus to its satellite campus over long distances. Also, the prototype has a TTS feature that can offer high-quality and stable speech. The main campus is the Colegio de San Antonio de Padua (CSAP) located at Guinsay, Danao City Cebu, Philippines with a satellite campus at Barangay Suba, Danao City, with a distance of not less than four kilometers and not greater than five kilometers from the main campus. The researcher used the descriptive developmental method of research as the systematic study of designing, developing, and evaluating programs that must meet the criteria of internal consistency and effectiveness. The rapid prototyping model was used during the system development while the criteria in McCall’s Factor Model were used to test the system according to its usability, applicability, and efficiency.
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
Adaption of the new technology is a prerequisite for the business's survival and to meet the quality standard. The public address system is widely used in all areas of living; it helps the host speaker to easily disperse the desired messages. This study aimed to develop a wireless digital broadcasting with voice alarm and text-to-speech (TTS) feature that can wirelessly transmit audio signals from the main campus to its satellite campus over long distances. Also, the prototype has a TTS feature that can offer high-quality and stable speech. The main campus is the Colegio de San Antonio de Padua (CSAP) located at Guinsay, Danao City Cebu, Philippines with a satellite campus at Barangay Suba, Danao City, with a distance of not less than four kilometers and not greater than five kilometers from the main campus. The researcher used the descriptive developmental method of research as the systematic study of designing, developing, and evaluating programs that must meet the criteria of internal consistency and effectiveness. The rapid prototyping model was used during the system development while the criteria in McCall’s Factor Model were used to test the system according to its usability, applicability, and efficiency.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Hsm ict 4
1. Form 4 Scheme Of Work For ICT
SMK TAMAN KLANG UTAMA, KLANG
INFORMATION AND COMMUNICATION TECHNOLOGY
SCHEME OF WORK 2014
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETY
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JAN.
WEEK
1 & 2
1.1 Introduction
to
Information
Technology
(4 periods)
Learners should be able to:
1.1.1 Define Information Technology in
general.
1.1.2 Discuss the roles of IT in
everyday life:
o Education
o Banking
o Industry
o Commerce.
1. Students state the definition of
Information Technology in general.
2. Group Activity:
- Discussing the roles of IT in
everyday life.
- Students cite an example of a
technology used in every day
life.
3. Students adhere the rules and
regulations set for the ICT lab.
JAN
WEEK
3
JAN
WEEK
4
JAN
WEEK
5
1.2 Computer
Ethics and
Legal
Issues
(8 periods)
1.2.1 Define Computer Ethics.
1.2.2 Identify the Code of Ethics.
1.2.3 Define Intellectual Property.
1.2.4 Define Privacy:
o authorised access
- user authentication and
verification
- Login (Personal Identification
Numbers (PIN), User
Identification, password)
- Biometrics
- physicalcontrol
1.2.5 Controversialcontents and
control:
o Pornography
o Slander
o Filtering (Example : NetNanny,
CyberPatrol, BlockNow )
1.2.6 Computer crime and Security
threats:
o Definition :
Computer crime
Security threats
o Examples of computer crimes:
o Fraud
identity fraud
credit card fraud
Copyright infringement
unauthorized copy
unauthorized file sharing
Theft: data, information, equipment
Attacks: Examples salami attack,
virus, w orms, hacking
1.2.7 Examples of Security threats
o malicious codes: e.g. virus, Trojan
horse, w orms, spy ware, Phishing
o hacking: ethical (hackers) and non-
ethical hacking (crackers)
o Natural/environmental: e.g. fire and
natural disasters
o Theft : e.g. physical, data,
information
1.2.8 Cyber-law
1.2.1.1 Students explain Computer Ethics and
Code of Ethics.
1.2.1.2 Students describe Intellectual Property
and Privacy.
1.2.1.3 Students carry out research on
controversialcontents and control.
1.2.1.4 Students discuss computer crime and
Security threats.
1.2.1.5 Students carry out research on Cyber
Law and its importance.
FEB
WEEK
1
1.3 Computer
Security
(4 periods)
1.3.1 Define Computer Security
1.3.2 State Security measures:
o data backup
o cryptography
1.3.3 encryption and decryption
o antivirus
1.3.1.1 Students discuss the meaning of
Computer Security and its measures.
1.3.1.2. Students describe encryption and
decryption.
1.3.1.2 Students carry out research on topics:
2. Form 4 Scheme Of Work For ICT
o anti-spyware
o Firew all
o Human aspects : aw areness
(policy, training)
- antivirus
- antti-spyware
- Firew all
- Policy and training of computer
security
FEB
WEEK
2
(Chinese
New
year)
FEB
WEEK
3
1.4 Research
(8 periods)
1.4.1 Impact of IT on society,
1.4.2 Copyright and Piracy fromthe
moral and legal standpoint
1.4.3 Lack of security and its effectsin
industry/economy/ government.
1.4.4 Malaysian Cyber-law , electronic
government law
1.4.1.1 Learners discuss the meaning of
Copyright and Piracy.
1.4.1.2 Learners list dow n the impact of piracy
activities fromthe perspectives of:
- moral
- legal
FEB
WEEK
4
ICT ASSESSMENT (PBS)
2.0 COMPUTER SYSTEM
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
MARCH
WEEK
1
2.1 System
Concept
(6 periods)
Learners should be able to:
2.1.1 Overview of computer system
2.1.2 Data Representation:
o bit
o byte
o character
2.1.3 Introduction to Binary coding:
ASCII
2.1.4 Data measurement:
o bit
o byte
o Kilobyte (KB)
o Megabyte (MB)
o Gigabyte (GB)
o Terabyte (TB)
2.1.5 Clock speed measurement:
o megahertz (MHz)
o gigahertz (GHz)
MARCH
WEEK
2
- REVISION
- SCHOOL ASSESSMENT
MARCH
WEEK
3
2.2 Hardw are
(12 periods)
2.2.1 Input devices
2.2.2 Output devices
2.2.3 Motherboard:
o centralprocessing unit (CPU)
o expansion slot
o expansion card
o RAM slot
o ports and connectors
2.2.4 Storage :
o primary storage (RAM/ROM)
o secondary storage (magnetic
medium, optical medium, flash
memory card)
MARCH
WEEK
4
MID-SEMESTER HOLIDAY 1 (22 MARCH -30 MARCH )
3. Form 4 Scheme Of Work For ICT
APRIL
WEEK
1
APRIL
WEEK
2 - 4
2.3 Software
(12 periods)
2.3.1 Operating System:
o platforms
o functions
o interfaces
2.3.2 Application Softw are: types and
usage (w ord processing,
spreadsheet, presentation,
graphics)
2.3.3 Utility Program: types and usage
(file management, antivirus,
diagnostic, file compression)
2.3.4 Proprietary and open source
software
MAY
WEEK
1 - 3
REVISION AND MID-YEAR EXAM
MAY
WEEK
4
JUNE
WEEK
1
MID-YEAR HOLIDAY( 28 MAY --- 15 JUNE)
JUNE
WEEK
2 & 3
2.4 Installation
(6 periods)
2.4.1 PC assembling
2.4.2 Hard disk partitioning and
formatting
2.4.3 Softw are installation:
o operating system
o application software
o utility program
JUNE
WEEK
4
2.5 Current and
Future
Technologies
(4 periods)
2.5.1 Latest open source software available
JULY
WEEK
1 & 2
-REVISION
-ICT ASSESSMENT 2 (PORTFOLIOS)
3.0 COMPUTER NETWORKS AND COMMUNICATIONS
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JULY
WEEK
3
JULY
WEEK
4
3.1 Basic
Concepts
of Netw orks
and
Communic
ations
(6 periods)
Learners should be able to:
3.1.1 Define netw ork
3.1.2 Define communication
3.1.3 State the importance of netw ork
and communication using
examples in the student’s
immediate environment.
3.1.4 Define types of computer
netw orks
LocalArea Netw ork(LAN)
MAN (Metropolitan Area
Netw ork)
Notes:
Netw ork: To connect tw o or more computers
together w ith the ability to communicate w ith each
other
Communication: The transmission of data from
one device to another
Discuss:
- file sharing betw een computers
- sending short messages using cellular
services
Conduct group research fromInformation sources
(library, the Internet) examples:
Discovering Computers, Shelly Cashman Series
(ISBN 0-619-25525-0)
http://www.webopedia.com
Notes:
LAN: A netw orkthat spans a small area usually
confined to a single building or a group of buildings
MAN: A netw orkdesigned for town and city usually
larger than Local-Area Network
WAN: A network that spans a relatively large
geographical area usually consisting two or more
Local-Area Network.
Example: The Internet
Group activity:
Students list out the differences between the three
4. Form 4 Scheme Of Work For ICT
AUGUST
WEEK
1 & 2
WAN (Wide Area Netw ork)
3.1.5 Differentiate betw een the three
types of computer netw orks
3.1.6 Define 2 types of netw ork
architecture
Client/Server
Peer-to-Peer
3.1.7 State three types of netw ork
topology
Bus
Ring
Star
3.1.8 Differentiate betw een the three
types of netw orktopology
3.1.9 Define TCP/IP as the protocolto
facilitate communication over
computer netw ork
3.1.10 State types of netw ork
communication that use TCP/IP
Intranet
Internet
Extranet
3.1.11 Cooperation in conducting group
research
types of computer network
Conduct group research from information sources
(library, the Internet) on types of network
architecture
Notes:
Client/Server Architecture: A network architecture
in which each computer or process on the network
is either a client or a server
Peer-to-Peer Architecture: A typeof network in
which each workstation has equivalent capabilities
and responsibilities
Conduct group research from information sources
(library, the Internet) on types of network topology
Students draw simple diagram of the3 types of
network topology
Students list out the differences between the three
types of network topology
Conduct group research from information sources
(library, the Internet) on TCP/IP
Conduct group research from information sources
(library, the Internet) examples:
Discovering Computers, Shelly Cashman Series
(ISBN 0-619-25525-0)
http://www.webopedia.com
AUGUST
WEEK
3
3.2 Hardw are
Requirements
(8 periods )
3.2.1 Identify the devices needed to
establish a computer netw ork
communication for a client/server
netw orkorganization
3.2.2 Describe the functions of the
Netw orkInterface Card and hub
Students list dow n the various networkdevices
Notes:
Netw orkDevices:
Netw orkInterface Card (Ethernet and Wi-
Fi)
Modem (Internal and External)
Hub, Sw itch, Router
Wireless AccessPoint
Students list dow n the functions of the stated
devices
Notes:
Function of the Netw orkInterface Card: KIV
Function of Hub: KIV
AUGUST
WEEK
4
3.2 Hardw are
Requirements
(8 periods )
3.2.3 Identify various types of physical
transmission media/ cables such
as Unshielded Tw isted Pair(UTP),
Shielded Tw isted Pair(STP),
Coaxial Cable and Fiber Optic
Cable
3.2.4 Identify various types of w ireless
transmission media such as
infrared, radio w ave and satellite
Students list dow n various typesof cables
Students list dow n various typesof wireless
transmission media
5. Form 4 Scheme Of Work For ICT
SEPT
WEEK
1
3.3 Softw are
Require-
ments
(4 periods )
3.3.1 Define Netw orkOperating System
3.3.2 Name various Netw orkOperating
System Software
3.3.3 State the functions of various
client software
w eb browser
email client
netw orkutilities
netw orkfile manager
Notes:
Netw orkOperating System(NOS): An operating
systemthat includes functions for connecting
computers anddevices into a local-area netw ork
(LAN). It has the capabilities to coordinate the
activities of multiple computers across a network
Notes:
Examples: Window s 2000 Server, WindowsNT,
LINUX, UNIX
Notes:
Examples:
Web Brow sing: Internet Explorer, Mozilla
Firefox and Opera
Email Client: Microsoft Outlook, Mozilla
Thunderbird and Eudora
Netw orkUtilities: Ping and Traceroute
Netw orkFile Manager: Netw ork
Neighborhood and My Netw orkPlaces
SEPT
WEEK 2
MID-SEMESTER HOLIDAY 2 (13 SEPT – 21 SEPT)
SEPT
WEEK
3
SEPT
WEEK
4
3.4 Setting
Netw ork
Facilities
(12 periods )
3.4.1 Install netw orkinterface card
3.4.2 Setup the driver for the netw ork
card
3.4.3 Crimp and test UTP cable
Straight cable
Crossed cable
3.4.4 Configure the w orkstation to join
a Local-Area Netw ork
Internet Protocol (IP) Address
Subnet Mask
Gatew ay
Hostname
3.4.5 Test the netw orkconnection
3.4.6 Create a shared folder Activity:
Ping the server fromthe configured workstation
Activity:
Set up a shared folder
Save a file in the shared folder
Accessthe file in the shared folder fromother
w orkstations
OCT.
WEEK
1
3.5 Current and
Future
Develop-
ment
( 6 periods )
3.5.1 Describe:
Mobile Computing
(specifications, services,
frequencies), or
Internet Technology and
Services (VOIP, BLOG), or
Types of netw ork(PAN, VPN,
WLAN, WIMAX)
Activity:
Research on the chosen topic
Write a short report (350 w ords) and save the
document in the shared folder
OCT
WEEK
2 & 3
FINAL EXAMINATION
OCT
WEEK
4-5
NOV
WEEK
1&2
- ICT ASSESSMENT 3 (PORTFOLIOS)
- REINFORCEMENT OF FORM FOUR SYLLABUS
- OVERVIEW OF FORM FIVE SYLLABUS
- RECAPUTILATION
NOV
WEEK
3
YEAR END HOLIDAYS (22 NOV – 4 JAN 2015)