SlideShare a Scribd company logo
Form 4 Scheme Of Work For ICT
SMK TAMAN KLANG UTAMA, KLANG
INFORMATION AND COMMUNICATION TECHNOLOGY
SCHEME OF WORK 2014
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETY
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JAN.
WEEK
1 & 2
1.1 Introduction
to
Information
Technology
(4 periods)
Learners should be able to:
1.1.1 Define Information Technology in
general.
1.1.2 Discuss the roles of IT in
everyday life:
o Education
o Banking
o Industry
o Commerce.
1. Students state the definition of
Information Technology in general.
2. Group Activity:
- Discussing the roles of IT in
everyday life.
- Students cite an example of a
technology used in every day
life.
3. Students adhere the rules and
regulations set for the ICT lab.
JAN
WEEK
3
JAN
WEEK
4
JAN
WEEK
5
1.2 Computer
Ethics and
Legal
Issues
(8 periods)
1.2.1 Define Computer Ethics.
1.2.2 Identify the Code of Ethics.
1.2.3 Define Intellectual Property.
1.2.4 Define Privacy:
o authorised access
- user authentication and
verification
- Login (Personal Identification
Numbers (PIN), User
Identification, password)
- Biometrics
- physicalcontrol
1.2.5 Controversialcontents and
control:
o Pornography
o Slander
o Filtering (Example : NetNanny,
CyberPatrol, BlockNow )
1.2.6 Computer crime and Security
threats:
o Definition :
 Computer crime
 Security threats
o Examples of computer crimes:
o Fraud
 identity fraud
 credit card fraud
Copyright infringement
 unauthorized copy
 unauthorized file sharing
Theft: data, information, equipment
Attacks: Examples salami attack,
virus, w orms, hacking
1.2.7 Examples of Security threats
o malicious codes: e.g. virus, Trojan
horse, w orms, spy ware, Phishing
o hacking: ethical (hackers) and non-
ethical hacking (crackers)
o Natural/environmental: e.g. fire and
natural disasters
o Theft : e.g. physical, data,
information
1.2.8 Cyber-law
1.2.1.1 Students explain Computer Ethics and
Code of Ethics.
1.2.1.2 Students describe Intellectual Property
and Privacy.
1.2.1.3 Students carry out research on
controversialcontents and control.
1.2.1.4 Students discuss computer crime and
Security threats.
1.2.1.5 Students carry out research on Cyber
Law and its importance.
FEB
WEEK
1
1.3 Computer
Security
(4 periods)
1.3.1 Define Computer Security
1.3.2 State Security measures:
o data backup
o cryptography
1.3.3 encryption and decryption
o antivirus
1.3.1.1 Students discuss the meaning of
Computer Security and its measures.
1.3.1.2. Students describe encryption and
decryption.
1.3.1.2 Students carry out research on topics:
Form 4 Scheme Of Work For ICT
o anti-spyware
o Firew all
o Human aspects : aw areness
(policy, training)
- antivirus
- antti-spyware
- Firew all
- Policy and training of computer
security
FEB
WEEK
2
(Chinese
New
year)
FEB
WEEK
3
1.4 Research
(8 periods)
1.4.1 Impact of IT on society,
1.4.2 Copyright and Piracy fromthe
moral and legal standpoint
1.4.3 Lack of security and its effectsin
industry/economy/ government.
1.4.4 Malaysian Cyber-law , electronic
government law
1.4.1.1 Learners discuss the meaning of
Copyright and Piracy.
1.4.1.2 Learners list dow n the impact of piracy
activities fromthe perspectives of:
- moral
- legal
FEB
WEEK
4
ICT ASSESSMENT (PBS)
2.0 COMPUTER SYSTEM
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
MARCH
WEEK
1
2.1 System
Concept
(6 periods)
Learners should be able to:
2.1.1 Overview of computer system
2.1.2 Data Representation:
o bit
o byte
o character
2.1.3 Introduction to Binary coding:
ASCII
2.1.4 Data measurement:
o bit
o byte
o Kilobyte (KB)
o Megabyte (MB)
o Gigabyte (GB)
o Terabyte (TB)
2.1.5 Clock speed measurement:
o megahertz (MHz)
o gigahertz (GHz)
MARCH
WEEK
2
- REVISION
- SCHOOL ASSESSMENT
MARCH
WEEK
3
2.2 Hardw are
(12 periods)
2.2.1 Input devices
2.2.2 Output devices
2.2.3 Motherboard:
o centralprocessing unit (CPU)
o expansion slot
o expansion card
o RAM slot
o ports and connectors
2.2.4 Storage :
o primary storage (RAM/ROM)
o secondary storage (magnetic
medium, optical medium, flash
memory card)
MARCH
WEEK
4
MID-SEMESTER HOLIDAY 1 (22 MARCH -30 MARCH )
Form 4 Scheme Of Work For ICT
APRIL
WEEK
1
APRIL
WEEK
2 - 4
2.3 Software
(12 periods)
2.3.1 Operating System:
o platforms
o functions
o interfaces
2.3.2 Application Softw are: types and
usage (w ord processing,
spreadsheet, presentation,
graphics)
2.3.3 Utility Program: types and usage
(file management, antivirus,
diagnostic, file compression)
2.3.4 Proprietary and open source
software
MAY
WEEK
1 - 3
REVISION AND MID-YEAR EXAM
MAY
WEEK
4
JUNE
WEEK
1
MID-YEAR HOLIDAY( 28 MAY --- 15 JUNE)
JUNE
WEEK
2 & 3
2.4 Installation
(6 periods)
2.4.1 PC assembling
2.4.2 Hard disk partitioning and
formatting
2.4.3 Softw are installation:
o operating system
o application software
o utility program
JUNE
WEEK
4
2.5 Current and
Future
Technologies
(4 periods)
2.5.1 Latest open source software available
JULY
WEEK
1 & 2
-REVISION
-ICT ASSESSMENT 2 (PORTFOLIOS)
3.0 COMPUTER NETWORKS AND COMMUNICATIONS
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JULY
WEEK
3
JULY
WEEK
4
3.1 Basic
Concepts
of Netw orks
and
Communic
ations
(6 periods)
Learners should be able to:
3.1.1 Define netw ork
3.1.2 Define communication
3.1.3 State the importance of netw ork
and communication using
examples in the student’s
immediate environment.
3.1.4 Define types of computer
netw orks
 LocalArea Netw ork(LAN)
 MAN (Metropolitan Area
Netw ork)
Notes:
Netw ork: To connect tw o or more computers
together w ith the ability to communicate w ith each
other
Communication: The transmission of data from
one device to another
Discuss:
- file sharing betw een computers
- sending short messages using cellular
services
Conduct group research fromInformation sources
(library, the Internet) examples:
Discovering Computers, Shelly Cashman Series
(ISBN 0-619-25525-0)
http://www.webopedia.com
Notes:
LAN: A netw orkthat spans a small area usually
confined to a single building or a group of buildings
MAN: A netw orkdesigned for town and city usually
larger than Local-Area Network
WAN: A network that spans a relatively large
geographical area usually consisting two or more
Local-Area Network.
Example: The Internet
Group activity:
Students list out the differences between the three
Form 4 Scheme Of Work For ICT
AUGUST
WEEK
1 & 2
 WAN (Wide Area Netw ork)
3.1.5 Differentiate betw een the three
types of computer netw orks
3.1.6 Define 2 types of netw ork
architecture
 Client/Server
 Peer-to-Peer
3.1.7 State three types of netw ork
topology
 Bus
 Ring
 Star
3.1.8 Differentiate betw een the three
types of netw orktopology
3.1.9 Define TCP/IP as the protocolto
facilitate communication over
computer netw ork
3.1.10 State types of netw ork
communication that use TCP/IP
 Intranet
 Internet
 Extranet
3.1.11 Cooperation in conducting group
research
types of computer network
Conduct group research from information sources
(library, the Internet) on types of network
architecture
Notes:
Client/Server Architecture: A network architecture
in which each computer or process on the network
is either a client or a server
Peer-to-Peer Architecture: A typeof network in
which each workstation has equivalent capabilities
and responsibilities
Conduct group research from information sources
(library, the Internet) on types of network topology
Students draw simple diagram of the3 types of
network topology
Students list out the differences between the three
types of network topology
Conduct group research from information sources
(library, the Internet) on TCP/IP
Conduct group research from information sources
(library, the Internet) examples:
Discovering Computers, Shelly Cashman Series
(ISBN 0-619-25525-0)
http://www.webopedia.com
AUGUST
WEEK
3
3.2 Hardw are
Requirements
(8 periods )
3.2.1 Identify the devices needed to
establish a computer netw ork
communication for a client/server
netw orkorganization
3.2.2 Describe the functions of the
Netw orkInterface Card and hub
Students list dow n the various networkdevices
Notes:
Netw orkDevices:
 Netw orkInterface Card (Ethernet and Wi-
Fi)
 Modem (Internal and External)
 Hub, Sw itch, Router
 Wireless AccessPoint
Students list dow n the functions of the stated
devices
Notes:
Function of the Netw orkInterface Card: KIV
Function of Hub: KIV
AUGUST
WEEK
4
3.2 Hardw are
Requirements
(8 periods )
3.2.3 Identify various types of physical
transmission media/ cables such
as Unshielded Tw isted Pair(UTP),
Shielded Tw isted Pair(STP),
Coaxial Cable and Fiber Optic
Cable
3.2.4 Identify various types of w ireless
transmission media such as
infrared, radio w ave and satellite
Students list dow n various typesof cables
Students list dow n various typesof wireless
transmission media
Form 4 Scheme Of Work For ICT
SEPT
WEEK
1
3.3 Softw are
Require-
ments
(4 periods )
3.3.1 Define Netw orkOperating System
3.3.2 Name various Netw orkOperating
System Software
3.3.3 State the functions of various
client software
 w eb browser
 email client
 netw orkutilities
 netw orkfile manager
Notes:
Netw orkOperating System(NOS): An operating
systemthat includes functions for connecting
computers anddevices into a local-area netw ork
(LAN). It has the capabilities to coordinate the
activities of multiple computers across a network
Notes:
Examples: Window s 2000 Server, WindowsNT,
LINUX, UNIX
Notes:
Examples:
 Web Brow sing: Internet Explorer, Mozilla
Firefox and Opera
 Email Client: Microsoft Outlook, Mozilla
Thunderbird and Eudora
 Netw orkUtilities: Ping and Traceroute
 Netw orkFile Manager: Netw ork
Neighborhood and My Netw orkPlaces
SEPT
WEEK 2
MID-SEMESTER HOLIDAY 2 (13 SEPT – 21 SEPT)
SEPT
WEEK
3
SEPT
WEEK
4
3.4 Setting
Netw ork
Facilities
(12 periods )
3.4.1 Install netw orkinterface card
3.4.2 Setup the driver for the netw ork
card
3.4.3 Crimp and test UTP cable
 Straight cable
 Crossed cable
3.4.4 Configure the w orkstation to join
a Local-Area Netw ork
 Internet Protocol (IP) Address
 Subnet Mask
 Gatew ay
 Hostname
3.4.5 Test the netw orkconnection
3.4.6 Create a shared folder Activity:
Ping the server fromthe configured workstation
Activity:
Set up a shared folder
Save a file in the shared folder
Accessthe file in the shared folder fromother
w orkstations
OCT.
WEEK
1
3.5 Current and
Future
Develop-
ment
( 6 periods )
3.5.1 Describe:
 Mobile Computing
(specifications, services,
frequencies), or
 Internet Technology and
Services (VOIP, BLOG), or
 Types of netw ork(PAN, VPN,
WLAN, WIMAX)
Activity:
Research on the chosen topic
Write a short report (350 w ords) and save the
document in the shared folder
OCT
WEEK
2 & 3
FINAL EXAMINATION
OCT
WEEK
4-5
NOV
WEEK
1&2
- ICT ASSESSMENT 3 (PORTFOLIOS)
- REINFORCEMENT OF FORM FOUR SYLLABUS
- OVERVIEW OF FORM FIVE SYLLABUS
- RECAPUTILATION
NOV
WEEK
3
YEAR END HOLIDAYS (22 NOV – 4 JAN 2015)

More Related Content

Similar to Hsm ict 4

RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
nurulafifa_matsaleh
 
05 scheme ictf4 2015 -smkppm
05 scheme ictf4 2015 -smkppm05 scheme ictf4 2015 -smkppm
05 scheme ictf4 2015 -smkppm
Azmi Sulaiman
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networksPadam Thapa
 
Rpt ictl tg1_smktt_2016
Rpt ictl tg1_smktt_2016Rpt ictl tg1_smktt_2016
Rpt ictl tg1_smktt_2016
Syed Zulkefle Yahya
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
beherapravat936
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
ijcsa
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 
It4504 syllabus
It4504 syllabusIt4504 syllabus
It4504 syllabus
tilahun kebede
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
sourabhyadav2624
 
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
Jeremiahvmacaraeg
 
GR 12 IOT Week 2.pptx
GR 12 IOT Week 2.pptxGR 12 IOT Week 2.pptx
GR 12 IOT Week 2.pptx
afsheenfaiq2
 
Fe4
Fe4Fe4
Osi model
Osi modelOsi model
Osi model
ShubhamMishra485
 
RP ICT F5 2013
RP ICT F5 2013RP ICT F5 2013
RP ICT F5 2013
nurulafifa_matsaleh
 
files_1570175665_204715750.pdf
files_1570175665_204715750.pdffiles_1570175665_204715750.pdf
files_1570175665_204715750.pdf
beherapravat936
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
ijfcstjournal
 

Similar to Hsm ict 4 (20)

Scheme ict-f4-2014
Scheme ict-f4-2014Scheme ict-f4-2014
Scheme ict-f4-2014
 
RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
 
05 scheme ictf4 2015 -smkppm
05 scheme ictf4 2015 -smkppm05 scheme ictf4 2015 -smkppm
05 scheme ictf4 2015 -smkppm
 
Scheme ict-2013-f4
Scheme ict-2013-f4Scheme ict-2013-f4
Scheme ict-2013-f4
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networks
 
Rpt ictl tg1_smktt_2016
Rpt ictl tg1_smktt_2016Rpt ictl tg1_smktt_2016
Rpt ictl tg1_smktt_2016
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
It4504 syllabus
It4504 syllabusIt4504 syllabus
It4504 syllabus
 
3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf3rd Year IT Syllabus.pdf
3rd Year IT Syllabus.pdf
 
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
 
GR 12 IOT Week 2.pptx
GR 12 IOT Week 2.pptxGR 12 IOT Week 2.pptx
GR 12 IOT Week 2.pptx
 
Fe4
Fe4Fe4
Fe4
 
Osi model
Osi modelOsi model
Osi model
 
RP ICT F5 2013
RP ICT F5 2013RP ICT F5 2013
RP ICT F5 2013
 
files_1570175665_204715750.pdf
files_1570175665_204715750.pdffiles_1570175665_204715750.pdf
files_1570175665_204715750.pdf
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Marta de la Cruz-Informe Final
Marta de la Cruz-Informe FinalMarta de la Cruz-Informe Final
Marta de la Cruz-Informe Final
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Hsm ict 4

  • 1. Form 4 Scheme Of Work For ICT SMK TAMAN KLANG UTAMA, KLANG INFORMATION AND COMMUNICATION TECHNOLOGY SCHEME OF WORK 2014 FORM 4 1.0 INFORMATION TECHNOLOGY AND SOCIETY MONTH/ WEEK TOPICS AND SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES JAN. WEEK 1 & 2 1.1 Introduction to Information Technology (4 periods) Learners should be able to: 1.1.1 Define Information Technology in general. 1.1.2 Discuss the roles of IT in everyday life: o Education o Banking o Industry o Commerce. 1. Students state the definition of Information Technology in general. 2. Group Activity: - Discussing the roles of IT in everyday life. - Students cite an example of a technology used in every day life. 3. Students adhere the rules and regulations set for the ICT lab. JAN WEEK 3 JAN WEEK 4 JAN WEEK 5 1.2 Computer Ethics and Legal Issues (8 periods) 1.2.1 Define Computer Ethics. 1.2.2 Identify the Code of Ethics. 1.2.3 Define Intellectual Property. 1.2.4 Define Privacy: o authorised access - user authentication and verification - Login (Personal Identification Numbers (PIN), User Identification, password) - Biometrics - physicalcontrol 1.2.5 Controversialcontents and control: o Pornography o Slander o Filtering (Example : NetNanny, CyberPatrol, BlockNow ) 1.2.6 Computer crime and Security threats: o Definition :  Computer crime  Security threats o Examples of computer crimes: o Fraud  identity fraud  credit card fraud Copyright infringement  unauthorized copy  unauthorized file sharing Theft: data, information, equipment Attacks: Examples salami attack, virus, w orms, hacking 1.2.7 Examples of Security threats o malicious codes: e.g. virus, Trojan horse, w orms, spy ware, Phishing o hacking: ethical (hackers) and non- ethical hacking (crackers) o Natural/environmental: e.g. fire and natural disasters o Theft : e.g. physical, data, information 1.2.8 Cyber-law 1.2.1.1 Students explain Computer Ethics and Code of Ethics. 1.2.1.2 Students describe Intellectual Property and Privacy. 1.2.1.3 Students carry out research on controversialcontents and control. 1.2.1.4 Students discuss computer crime and Security threats. 1.2.1.5 Students carry out research on Cyber Law and its importance. FEB WEEK 1 1.3 Computer Security (4 periods) 1.3.1 Define Computer Security 1.3.2 State Security measures: o data backup o cryptography 1.3.3 encryption and decryption o antivirus 1.3.1.1 Students discuss the meaning of Computer Security and its measures. 1.3.1.2. Students describe encryption and decryption. 1.3.1.2 Students carry out research on topics:
  • 2. Form 4 Scheme Of Work For ICT o anti-spyware o Firew all o Human aspects : aw areness (policy, training) - antivirus - antti-spyware - Firew all - Policy and training of computer security FEB WEEK 2 (Chinese New year) FEB WEEK 3 1.4 Research (8 periods) 1.4.1 Impact of IT on society, 1.4.2 Copyright and Piracy fromthe moral and legal standpoint 1.4.3 Lack of security and its effectsin industry/economy/ government. 1.4.4 Malaysian Cyber-law , electronic government law 1.4.1.1 Learners discuss the meaning of Copyright and Piracy. 1.4.1.2 Learners list dow n the impact of piracy activities fromthe perspectives of: - moral - legal FEB WEEK 4 ICT ASSESSMENT (PBS) 2.0 COMPUTER SYSTEM MONTH/ WEEK TOPICS AND SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES MARCH WEEK 1 2.1 System Concept (6 periods) Learners should be able to: 2.1.1 Overview of computer system 2.1.2 Data Representation: o bit o byte o character 2.1.3 Introduction to Binary coding: ASCII 2.1.4 Data measurement: o bit o byte o Kilobyte (KB) o Megabyte (MB) o Gigabyte (GB) o Terabyte (TB) 2.1.5 Clock speed measurement: o megahertz (MHz) o gigahertz (GHz) MARCH WEEK 2 - REVISION - SCHOOL ASSESSMENT MARCH WEEK 3 2.2 Hardw are (12 periods) 2.2.1 Input devices 2.2.2 Output devices 2.2.3 Motherboard: o centralprocessing unit (CPU) o expansion slot o expansion card o RAM slot o ports and connectors 2.2.4 Storage : o primary storage (RAM/ROM) o secondary storage (magnetic medium, optical medium, flash memory card) MARCH WEEK 4 MID-SEMESTER HOLIDAY 1 (22 MARCH -30 MARCH )
  • 3. Form 4 Scheme Of Work For ICT APRIL WEEK 1 APRIL WEEK 2 - 4 2.3 Software (12 periods) 2.3.1 Operating System: o platforms o functions o interfaces 2.3.2 Application Softw are: types and usage (w ord processing, spreadsheet, presentation, graphics) 2.3.3 Utility Program: types and usage (file management, antivirus, diagnostic, file compression) 2.3.4 Proprietary and open source software MAY WEEK 1 - 3 REVISION AND MID-YEAR EXAM MAY WEEK 4 JUNE WEEK 1 MID-YEAR HOLIDAY( 28 MAY --- 15 JUNE) JUNE WEEK 2 & 3 2.4 Installation (6 periods) 2.4.1 PC assembling 2.4.2 Hard disk partitioning and formatting 2.4.3 Softw are installation: o operating system o application software o utility program JUNE WEEK 4 2.5 Current and Future Technologies (4 periods) 2.5.1 Latest open source software available JULY WEEK 1 & 2 -REVISION -ICT ASSESSMENT 2 (PORTFOLIOS) 3.0 COMPUTER NETWORKS AND COMMUNICATIONS MONTH/ WEEK TOPICS AND SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES JULY WEEK 3 JULY WEEK 4 3.1 Basic Concepts of Netw orks and Communic ations (6 periods) Learners should be able to: 3.1.1 Define netw ork 3.1.2 Define communication 3.1.3 State the importance of netw ork and communication using examples in the student’s immediate environment. 3.1.4 Define types of computer netw orks  LocalArea Netw ork(LAN)  MAN (Metropolitan Area Netw ork) Notes: Netw ork: To connect tw o or more computers together w ith the ability to communicate w ith each other Communication: The transmission of data from one device to another Discuss: - file sharing betw een computers - sending short messages using cellular services Conduct group research fromInformation sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com Notes: LAN: A netw orkthat spans a small area usually confined to a single building or a group of buildings MAN: A netw orkdesigned for town and city usually larger than Local-Area Network WAN: A network that spans a relatively large geographical area usually consisting two or more Local-Area Network. Example: The Internet Group activity: Students list out the differences between the three
  • 4. Form 4 Scheme Of Work For ICT AUGUST WEEK 1 & 2  WAN (Wide Area Netw ork) 3.1.5 Differentiate betw een the three types of computer netw orks 3.1.6 Define 2 types of netw ork architecture  Client/Server  Peer-to-Peer 3.1.7 State three types of netw ork topology  Bus  Ring  Star 3.1.8 Differentiate betw een the three types of netw orktopology 3.1.9 Define TCP/IP as the protocolto facilitate communication over computer netw ork 3.1.10 State types of netw ork communication that use TCP/IP  Intranet  Internet  Extranet 3.1.11 Cooperation in conducting group research types of computer network Conduct group research from information sources (library, the Internet) on types of network architecture Notes: Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server Peer-to-Peer Architecture: A typeof network in which each workstation has equivalent capabilities and responsibilities Conduct group research from information sources (library, the Internet) on types of network topology Students draw simple diagram of the3 types of network topology Students list out the differences between the three types of network topology Conduct group research from information sources (library, the Internet) on TCP/IP Conduct group research from information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com AUGUST WEEK 3 3.2 Hardw are Requirements (8 periods ) 3.2.1 Identify the devices needed to establish a computer netw ork communication for a client/server netw orkorganization 3.2.2 Describe the functions of the Netw orkInterface Card and hub Students list dow n the various networkdevices Notes: Netw orkDevices:  Netw orkInterface Card (Ethernet and Wi- Fi)  Modem (Internal and External)  Hub, Sw itch, Router  Wireless AccessPoint Students list dow n the functions of the stated devices Notes: Function of the Netw orkInterface Card: KIV Function of Hub: KIV AUGUST WEEK 4 3.2 Hardw are Requirements (8 periods ) 3.2.3 Identify various types of physical transmission media/ cables such as Unshielded Tw isted Pair(UTP), Shielded Tw isted Pair(STP), Coaxial Cable and Fiber Optic Cable 3.2.4 Identify various types of w ireless transmission media such as infrared, radio w ave and satellite Students list dow n various typesof cables Students list dow n various typesof wireless transmission media
  • 5. Form 4 Scheme Of Work For ICT SEPT WEEK 1 3.3 Softw are Require- ments (4 periods ) 3.3.1 Define Netw orkOperating System 3.3.2 Name various Netw orkOperating System Software 3.3.3 State the functions of various client software  w eb browser  email client  netw orkutilities  netw orkfile manager Notes: Netw orkOperating System(NOS): An operating systemthat includes functions for connecting computers anddevices into a local-area netw ork (LAN). It has the capabilities to coordinate the activities of multiple computers across a network Notes: Examples: Window s 2000 Server, WindowsNT, LINUX, UNIX Notes: Examples:  Web Brow sing: Internet Explorer, Mozilla Firefox and Opera  Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora  Netw orkUtilities: Ping and Traceroute  Netw orkFile Manager: Netw ork Neighborhood and My Netw orkPlaces SEPT WEEK 2 MID-SEMESTER HOLIDAY 2 (13 SEPT – 21 SEPT) SEPT WEEK 3 SEPT WEEK 4 3.4 Setting Netw ork Facilities (12 periods ) 3.4.1 Install netw orkinterface card 3.4.2 Setup the driver for the netw ork card 3.4.3 Crimp and test UTP cable  Straight cable  Crossed cable 3.4.4 Configure the w orkstation to join a Local-Area Netw ork  Internet Protocol (IP) Address  Subnet Mask  Gatew ay  Hostname 3.4.5 Test the netw orkconnection 3.4.6 Create a shared folder Activity: Ping the server fromthe configured workstation Activity: Set up a shared folder Save a file in the shared folder Accessthe file in the shared folder fromother w orkstations OCT. WEEK 1 3.5 Current and Future Develop- ment ( 6 periods ) 3.5.1 Describe:  Mobile Computing (specifications, services, frequencies), or  Internet Technology and Services (VOIP, BLOG), or  Types of netw ork(PAN, VPN, WLAN, WIMAX) Activity: Research on the chosen topic Write a short report (350 w ords) and save the document in the shared folder OCT WEEK 2 & 3 FINAL EXAMINATION OCT WEEK 4-5 NOV WEEK 1&2 - ICT ASSESSMENT 3 (PORTFOLIOS) - REINFORCEMENT OF FORM FOUR SYLLABUS - OVERVIEW OF FORM FIVE SYLLABUS - RECAPUTILATION NOV WEEK 3 YEAR END HOLIDAYS (22 NOV – 4 JAN 2015)