Why curriculum reforms are being conducted in Kenyan education sector:paper p...Joseph Mwanzo
International Bureau of education recommends that curricula should be reviewed every five years:Find out how the process of curriculum reform is being conducted in Kenya.
Why curriculum reforms are being conducted in Kenyan education sector:paper p...Joseph Mwanzo
International Bureau of education recommends that curricula should be reviewed every five years:Find out how the process of curriculum reform is being conducted in Kenya.
Kicd curriculum reform needs assessment findings report by Dr Julius Jwan...Joseph Mwanzo
Kenya Institute of Curriculum Development conducted a needs assessment study in all the counties in Kenya to gather the views of Kenyans about the kind of curriculum they expect Kenyan child to go through from Early childhood education to below university level of education in the 21st century.The following is a presentation of the findings report by Dr Julius Jwan, -CEO-KICD -April, 2016.
Teachers' Capacity Building And Productivity in Secondary Schools in Ondo Nor...CSCJournals
The stakeholders in the education sector has been persistent in expressing concern about the dwindling quality of secondary education in Nigeria, which seems to be attributed to the perceived inadequacies in teachers’ capacity building and productivity. This study therefore investigated the level of teachers’ capacity building and determined its implication on teachers’ productivity in secondary schools in Ondo North Senatorial District of Ondo State, Nigeria. Descriptive research design of the survey type was adopted. The sample comprised 30 principals and 600 teachers randomly selected from 30 public secondary schools. Data were collected using two research instruments titled Teachers’ Capacity Building Questionnaire (TCBQ) and Teachers’ Productivity Questionnaire (TPQ). Two research questions were raised and one hypothesis was formulated. Research questions were analyzed using frequency count and percentage while the hypothesis was tested using Pearson Product Moment Correlation (PPMC) at 0.05 level of significance. Results revealed that there was a significant relationship between capacity building and teachers’ productivity [r-cal=0.606, p<0.05]; It was concluded that in spite of the inadequacies in capacity building, teachers maintained high level of productivity possibly due to their strong commitment to professional duties. However, teachers are still faced with the challenges of excess workloads, large class size and shortage of instructional materials. It is recommended that the State Government should employ adequate number of qualified teachers to ensure manageable workloads and improve classroom management; the State Ministry of Education and other relevant stakeholders in the education sector should provide adequate instructional materials and step up efforts in organizing periodic capacity training workshops and seminars based on the professional needs assessment to update teachers’ knowledge and skills in instructional best practices to improve productivity in secondary schools.
Curriculum development process in pakistanMohsin Awan
Curriculum Development.
Educational process in Pakistan.
curriculum design.
how to develop curriculum.
curriculum standards.
standards based curriculum.
characteristics of a quality curriculum standards.
benchmarking in curriculum.
This section of the memory is also referred to as backup storage.
The storage capacity of primary storage is not sufficient to store the large volume so secondary storage.
Secondary storage also know as external memory or auxiliary storage not directly accessible by the CPU.
Kicd curriculum reform needs assessment findings report by Dr Julius Jwan...Joseph Mwanzo
Kenya Institute of Curriculum Development conducted a needs assessment study in all the counties in Kenya to gather the views of Kenyans about the kind of curriculum they expect Kenyan child to go through from Early childhood education to below university level of education in the 21st century.The following is a presentation of the findings report by Dr Julius Jwan, -CEO-KICD -April, 2016.
Teachers' Capacity Building And Productivity in Secondary Schools in Ondo Nor...CSCJournals
The stakeholders in the education sector has been persistent in expressing concern about the dwindling quality of secondary education in Nigeria, which seems to be attributed to the perceived inadequacies in teachers’ capacity building and productivity. This study therefore investigated the level of teachers’ capacity building and determined its implication on teachers’ productivity in secondary schools in Ondo North Senatorial District of Ondo State, Nigeria. Descriptive research design of the survey type was adopted. The sample comprised 30 principals and 600 teachers randomly selected from 30 public secondary schools. Data were collected using two research instruments titled Teachers’ Capacity Building Questionnaire (TCBQ) and Teachers’ Productivity Questionnaire (TPQ). Two research questions were raised and one hypothesis was formulated. Research questions were analyzed using frequency count and percentage while the hypothesis was tested using Pearson Product Moment Correlation (PPMC) at 0.05 level of significance. Results revealed that there was a significant relationship between capacity building and teachers’ productivity [r-cal=0.606, p<0.05]; It was concluded that in spite of the inadequacies in capacity building, teachers maintained high level of productivity possibly due to their strong commitment to professional duties. However, teachers are still faced with the challenges of excess workloads, large class size and shortage of instructional materials. It is recommended that the State Government should employ adequate number of qualified teachers to ensure manageable workloads and improve classroom management; the State Ministry of Education and other relevant stakeholders in the education sector should provide adequate instructional materials and step up efforts in organizing periodic capacity training workshops and seminars based on the professional needs assessment to update teachers’ knowledge and skills in instructional best practices to improve productivity in secondary schools.
Curriculum development process in pakistanMohsin Awan
Curriculum Development.
Educational process in Pakistan.
curriculum design.
how to develop curriculum.
curriculum standards.
standards based curriculum.
characteristics of a quality curriculum standards.
benchmarking in curriculum.
This section of the memory is also referred to as backup storage.
The storage capacity of primary storage is not sufficient to store the large volume so secondary storage.
Secondary storage also know as external memory or auxiliary storage not directly accessible by the CPU.
Re- aligning higher education curriculum with the 21st century expectations: ...Joseph Mwanzo
Re-aligning higher education curriculum with the 21st century expectations:implications for teacher training in Kenya: a paper presented by Dr Julius Jwan, PhD on a conference on the state of Higher Education in Kenya at Kenyatta University on 23rd-August,2016
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Hsp ict
1. KEMENTERIAN PELAJARAN MALAYSIA
HURAIAN SUKATAN PELAJARAN
KURIKULUM BERSEPADU
SEKOLAH MENENGAH
INFORMATION AND COMMUNICATION TECHNOLOGY
Pusat Perkembangan Kurikulum
Kementerian Pelajaran Malaysia
2006
2. CONTENTS
Rukun Negara
v
Falsafah Pendidikan Kebangsaan
vi
Kata Pengantar
vii
Introduction
1
The Curriculum Specifications
1
Recommended Approaches And Strategies For Teaching And Learning
2
Curriculum Content
3
Criteria For Schools Intending To Offer The Subject
5
Suggested Readings
6
Learning Outcomes And Specifications
1.0 Information And Communication Technology And Society
7
2.0 Computer Systems
11
3.0 Computer Networks And Communications
14
4.0 Multimedia
19
5.0 Programming
23
6.0 Information Systems
26
3. RUKUN NEGARA
BAHAWASANYA negara kita Malaysia mendukung cita-cita untuk mencapai perpaduan
yang lebih erat di kalangan seluruh masyarakatnya; memelihara satu cara hidup demokratik;
mencipta masyarakat yang adil bagi kemakmuran negara yang akan dapat dinikmati
bersama secara adil dan saksama; menjamin satu cara yang liberal terhadap tradisi
kebudayaannya yang kaya dan berbagai-bagai corak; membina satu masyarakat progresif
yang akan menggunakan sains dan teknologi moden;
MAKA KAMI, rakyat Malaysia, berikrar akan menumpukan seluruh tenaga dan usaha kami
untuk mencapai cita-cita tersebut berdasarkan prinsip-prinsip yang berikut:
KEPERCAYAAN KEPADA TUHAN
KESETIAAN KEPADA RAJA DAN NEGARA
KELUHURAN PERLEMBAGAAN
KEDAULATAN UNDANG-UNDANG
KESOPANAN DAN KESUSILAAN
v
4. FALSAFAH PENDIDIKAN KEBANGSAAN
Pendidikan di Malaysia adalah suatu usaha berterusan ke arah
lebih memperkembang potensi individu secara menyeluruh dan
bersepadu untuk melahirkan insan yang seimbang dan harmonis
dari segi intelek, rohani, emosi, dan jasmani, berdasarkan
kepercayaan dan kepatuhan kepada Tuhan. Usaha ini adalah
bertujuan untuk melahirkan warganegara Malaysia yang berilmu
pengetahuan,
berketerampilan,
berakhlak
mulia,
bertanggungjawab dan berkeupayaan mencapai kesejahteraan diri
serta memberikan sumbangan terhadap keharmonian dan
kemakmuran keluarga, masyarakat dan negara.
vi
5. KATA PENGANTAR
Huraian Sukatan Pelajaran Information and Communication
Technology (ICT) ialah dokumen yang memperincikan
Sukatan Pelajaran yang bertujuan untuk memenuhi cita-cita
murni dan semangat Falsafah Pendidikan Kebangsaan dan
menyediakan murid menghadapi arus globalisasi serta
ekonomi berasaskan pengetahuan pada abad ke-21.
Dokumen ini menghurai dan mengembangkan kandungan
serta menyarankan strategi pengajaran dan pembelajaran
yang merangkumi pelbagai aktiviti dan penggunaan sumber.
Di samping itu, huraian ini memberi hala tuju dan panduan
untuk mengoptimumkan hasil pembelajaran yang dihasratkan.
Guru digalakkan menggunakan kreativiti untuk memilih,
menyusun dan mengolah aktiviti mengikut kesesuaian murid.
Huraian ini diharapkan dapat membantu guru merancang dan
melaksanakan pengajaran dan pembelajaran secara
berkesan.
Dalam melakukan aktiviti pengajaran dan pembelajaran, guru
diharap akan dapat memberikan penekanan pada unsur
bernilai tambah, iaitu kemahiran berfikir, kemahiran teknologi
maklumat dan komunikasi, kemahiran belajar cara belajar,
kajian masa depan, kecerdasan pelbagai, pembelajaran
kontekstual, dan pembelajaran konstruktivisme. Di samping
itu, nilai murni dan semangat patriotik dan kewarganegaraan
tetap diutamakan. Semua elemen ini diharap dapat
memberikan keyakinan kepada murid dan boleh diaplikasi
dalam kehidupan harian dan dunia pekerjaan.
Usaha menyempurnakan Huraian Sukatan Pelajaran ICT ini
melibatkan banyak pihak iaitu pensyarah universiti, pensyarah
maktab, guru, pegawai kementerian pelajaran, dan tenaga
pakar dari sektor swasta.
Akhir kata Kementerian Pelajaran Malaysia merakamkan
setinggi-tinggi penghargaan dan terima kasih kepada semua
pihak yang telah memberikan sumbangan kepakaran, masa
dan tenaga sehingga terhasilnya Huraian Sukatan Pelajaran
ICT ini.
(MAHZAN BIN BAKAR AMP)
Pengarah
Pusat Perkembangan Kurikulum
Kementerian Pelajaran Malaysia
vii
6. INTRODUCTION
Information and Communication Technology (ICT) is a
powerful medium that has become increasingly important to
society. The introduction of ICT as an elective subject in
Malaysian secondary schools will provide a valuable training
ground for students. This will help students relate their ICT
learning experiences to a progressive technology-based daily
life. The curriculum provides a platform for producing a
technologically capable work force. This will help meet the
challenges of a global economy.
This subject is offered to all Form 4 and Form 5 students. It
aims to provide them with the knowledge, skills and values
from several designated learning areas. It will also prepare
them for the Sijil Pelajaran Malaysia (SPM) examination.
THE CURRICULUM SPECIFICATIONS
Suggested activities are incorporated as part of the teachinglearning strategy. It should be borne in mind that teachers are
also encouraged and expected to employ other effective
strategies in line with the needs of the target group.
What is it?
The Curriculum Specifications is a document that
contains detailed explanations of the basic information
required within the subject curriculum. It is designed as
a teaching guide to help the teacher interpret and
implement the Information and Communication
Technology (ICT) syllabus in the classroom.
Who is it for?
This document is intended for ICT teachers teaching
the ICT subject at the Upper Secondary Level (Form 4
and Form 5) of the Kurikulum Bersepadu Sekolah
Menengah (KBSM).
What are the Learning Areas?
The six learning areas are as follows:
•
Information and Communication Technology and
Society
•
Computer Systems
•
Computer Networks and Communications
•
Multimedia
•
Programming
•
Information Systems
What information does it contain?
The ICT Curriculum Specifications contains the
following information:
•
The various topics and recommended duration of
each topic
•
The learning outcomes of each topic which
describe the skills to be acquired by students at
the end of the allotted time
1
7. •
Suggested activities for each topic. Teachers are
free to select any or all of the recommended
activities or to design their own
The topics may be taught in any sequence without
compromising the quality of the curriculum. The teacher is not
confined to follow the order in which the topics are set out in
this document.
RECOMMENDED APPROACHES AND
STRATEGIES FOR TEACHING AND LEARNING
Appropriate teaching and learning approaches and strategies
are important for the achievement of the learning objectives
set out in the curriculum specifications. The teacher acts as
an instructor or a facilitator depending on the types of
activities and the learning outcomes.
Teaching Approaches
Information and Communication Technology (ICT) lessons
should be conducted using the teaching approaches stated
below.
The Knowledge-Based Approach
The knowledge-based approach in this curriculum
requires the teacher to act as an instructor. The
teacher is required to:
•
introduce the field of study in terms of concept,
definition and terminology
•
•
•
show and demonstrate the various software,
hardware and devices used in the learning areas
provide instructional guidance which will form the
fundamental basis for students to grasp the
content of the syllabus
encourage students to seek other sources of
information and reference, and to conduct
independent study whenever necessary
The Skill-Based Approach
The skills-based approach emphasizes student-centred
activities with the teacher providing explanations and
guidance whenever needed. As such, the teacher
plays the dual role of instructor and facilitator, and
should:
•
provide hands-on guidance to students to help
them acquire relevant skills in each learning area
•
guide students on standard operating procedures
involved in the various learning areas
•
encourage students to work systematically
The Task-Based Approach
Task-based activities are almost completely studentcentred. The teacher’s role here will involve:
•
providing advice on project management
procedures and task organization
•
monitoring the progress of student projects
•
giving advice, tips and recommendations
whenever needed
•
evaluating the outcome of students’ work
2
8. Learning Strategies
The Self-Directed, Self-Accessed, Self-Assessed and SelfPaced strategies (SeDAAP) are introduced within this
document.
The SeDAAP strategy is designed to encourage students to
take responsibility for their own learning and to develop selfreliance and self-confidence within the parameters of the
assignments given. This strategy encourages the
development of independent learners, facilitates the forging of
productive work relationships among group members and also
serves to foster student discipline.
Self-Directed Learning
In self-directed learning, students determine the topics
they want to learn within a particular content area.
Self-Accessed Learning
In self-accessed learning, students search for and
locate information about specific topics from a variety
of sources not supplied by the teacher. These
information sources may include reference books,
magazines, CD-ROMs, the Internet, resource centres
and libraries.
Self-Assessed Learning
In self-assessed learning, students are encouraged to
evaluate their own progress within a particular topic.
This evaluation can be based on value judgements,
self-reflection or observation as well as on criteria lists
or evaluation rubrics provided by the teacher. If
students decide that a particular topic or skill has been
satisfactorily learned, they can then move on to another
topic.
Self-Paced Learning
In self-paced learning, students determine their own
pace in acquiring the prescribed knowledge and skills
in the various content areas within the syllabus. This
strategy encourages step-by-step learning in which
students monitor their own progress.
CURRICULUM CONTENT
The curriculum emphasizes the integration of knowledge,
skills and values.
Knowledge
The knowledge to be acquired in the ICT curriculum consists
of concepts and facts about ICT as well as ICT terminology. It
includes procedures in managing computer systems,
sequential processes in developing products, and
programming commands and syntax. It also integrates
discussions on current issues related to ICT and their
implications for the future.
3
9. •
Skills
The skills involved are communication skills, information
management skills, managing computer systems and
problem-solving skills.
The details of each skill are as follows :
Communication Skills
Communication skills refer to the process of gaining
and disseminating information verbally or non-verbally.
These involve:
•
Information sharing and dissemination
•
Production through various means including
graphic presentation, sketching and proto-typing
using information technology
•
Identifying, elaborating on and interpreting various
points of view
•
Exploiting, accessing and processing technologies
with confidence and competence
•
Ensuring security of information distribution
Information Management Skills
Information Management Skills provide opportunities to
develop information by:
•
maintaining the integration of information
•
using various inquiry techniques
•
identifying,
searching,
collecting,
saving,
accessing and processing information
•
categorising,
analysing,
synthesising
and
evaluating information
Presenting
information
accurately and precisely
clearly,
logically,
Managing Computer Systems
This involves the use of computer hardware and
software for communications and problem-solving,
including the ability to identify, assemble, arrange and
maintain the computer systems.
Problem-Solving Skills
Problem-solving skills provide opportunities for
students to apply ways and strategies to real-life
problems. These skills emphasize the following:
•
Logic and programming
•
Critical, creative, reflective and mantic thinking
•
Imaginative, initiative and flexibility
•
Identification, description, and re-interpretation of
problems and analysis from various perspectives
•
Investigation, exploration and generation of ideas
•
Problem-testing and solutions
•
Making decisions based on experience and sound
rationale
•
Process and product evaluation
4
10. Values
The values in the ICT syllabus are diligence, accuracy,
precision, confidence, responsibility, integrity, respect,
cooperation, appreciation, courtesy and abiding by the ICT
Code of Ethics.
Local Area Network (LAN)
•
All computers must be networked using the
TCP/IP communications protocol with a minimum
data transfer rate of 10 MB per second.
Schools which intend to offer this subject must fulfil the
requirements outlined below:
Server
•
Minimum Pentium 3 or equivalent microprocessor.
•
Minimum speed of 933 MHz
•
A minimum RAM of 256 MB
•
HDD of at least 40 GB
•
Operating system: Minimum requirements Windows NT /Windows 2000 Server/Linux base
Physical Facilities/Infrastructure
•
A fully-equipped computer laboratory with direct
access to the Internet, with at least 20
workstations and one server
•
The ratio is one computer to one student.
Digital Camera and Digital Video Camera
•
At least one workstation in the computer lab
should be equipped with a Video Capture Card
•
At least one digital camera
•
At least one digital video camera
Workstations
•
Multimedia PC, minimum Pentium 3 or equivalent
microprocessor with a minimum speed of 700
MHz.
•
A minimum RAM of 128 MB
•
At least 10 GB of free space hard disk drive
•
Operating system: Minimum requirements Windows98/Linux base
Scanner
•
At least one scanner
SCHOOL REQUIREMENTS FOR OFFERING THE
ICT SUBJECT
Computer Software (Standard software provided by
Ministry of Education)
•
Word processor: Microsoft Word/Open
office.org.writer
•
Electronic Spreadsheet: Microsoft Excel/ Open
office.org.calc
•
Presentation Software: Microsoft PowerPoint/
Open office.org.impress
5
11. •
•
•
•
•
•
Database: Microsoft Access
Programming Tool: Microsoft Visual Basic
Authoring Tool : ComIL
Web Browser : Any web browser
Web Editor: Any web editor
Video Editor : Video Capture Card Software or
equivalent
•
Audio Editor: Any audio editor
•
Graphic Editor: Any graphic editor
Note: All proprietary software must be licensed
SUGGESTED READINGS
Teacher’s Qualifications
•
Diploma/Degree/Post Graduate Degree in
Computer Science/Information Technology, or
equivalent.
3. Chua Chooi See (2000) Visual Basic 6 : A Step-by-Step
Guide, Times Publication.
Students’ Basic Requirement
•
Students must have basic computer skills
Reading Materials
1. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J.
(2005) Discovering Computers 2006 : A Gateway to
Information, Course Technology.
2. Bryan Pfaffenberger, Bill Daley (2003) Computers In Your
Future, Prentice Hall.
4.
Capron H.L, J.A. Johnson (2005) Computers: Tools For
an Information Age Eighth Edition, Prentice Hall.
5.
George Beekman (2004) Computer Confluence :
Exploring Tomorrow’s Technology, Prentice Hall.
6.
Stephen McGloughlin (2001) Multimedia : Concepts and
Practice, Prentice Hall.
6
12. LEARNING OUTCOMES AND SPECIFICATIONS
1.0 INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
TOPICS
1.1 Introduction to
Information and
Communication
Technology
(4 periods)
1.2 Computer Ethics
and Legal Issues
(6 periods)
1.1.1
1.1.2
1.2.1
LEARNING OUTCOMES
Overview of Information and Communication
Technology (ICT)
1.1.1.1
Define ICT.
1.1.1.2
Describe the brief evolution of computers.
ICT In Everyday Life: Education, Banking, Industry and
Commerce
1.1.2.1
List the usage of ICT in everyday life.
1.1.2.2
State the differences between
computerised and non-computerised
systems.
1.1.2.3
State the impact of ICT on society.
(6 WEEKS)
SUGGESTED ACTIVITIES
Individual/Group task
• List the differences between
computerised and noncomputerised systems using search
engines.
• Discuss and list the differences
between computerised and noncomputerised systems.
• Conduct a simple survey of ICT
usage in the community.
• Discuss the effects of controversial
contents on society.
Definition
1.2.1.1
Define Computer Ethics, Code of Ethics,
Intellectual Property, Privacy, Computer Crime
and Cyber Law.
1.2.1.2
Differentiate between ethics and law.
1.2.1.3
State the need for intellectual property laws.
7
13. TOPICS
LEARNING OUTCOMES
1.2.2
Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification methods/
technologies.
1.2.3
Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes below:
• Fraud
• Copyright Infringement
• Theft
• Attacks
•
Study on:
- available technologies for
authentication and verification
(include: what it is, where it is
used, its efficiency, its
availability)
- common ethical practices
(10 Commandments of
Computer Ethics)
- computer criminals
(examples: Kevin Mitnick
and Aman Shah)
Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society:
• Pornography
• Slander
Describe the process of filtering to control
1.2.3.2 access to controversial contents.
1.2.4
SUGGESTED ACTIVITIES
Group Task
• Brainstorming
• Slide presentation in groups for
each topic
8
14. TOPICS
1.3 Computer
Security
(6 periods)
LEARNING OUTCOMES
1.3.1
1.3.2
1.3.3
Definition
1.3.1.1 Define computer security.
Security Threats
1.3.2.1 Explain briefly the different threats to
computer security:
• Malicious code
• Hacking
• Natural disaster
• Theft
Security Measures
1.3.3.1 Select the appropriate security measures to
overcome the identified computer threats
1.3.3.2 Apply the correct security procedures.
• Antivirus
• Anti-Spyware
• Cryptography
• Firewall
• Data backup
• Human aspects
SUGGESTED ACTIVITIES
Individual/Group task
• Conduct a study on effects of
computer security breaches on an
organization
• Compile the study in a portfolio
Activity 1.3.3
(Refer to provided module).
• Visit any computer shop or
organization that uses any of the
security measures.
9
15. TOPICS
1.4 Current and
Future
Developments
(8 periods)
1.4.1
LEARNING OUTCOMES
Impact of ICT on Society
1.4.1.1 Locate information from various sources
(example: Internet, library or magazines).
1.4.1.2 Describe the impact of ICT on society.
1.4.1.3 Present results in a clear, concise manner.
1.4.1.4 Display cooperation in conducting study.
SUGGESTED ACTIVITIES
Group task
Portfolio: A compilation of information
on any of the issues below:
• Copyright and Piracy from moral
and legal standpoints.
• Lack of security and its effects on
industry/economy/ government.
• Malaysian Cyber law, electronic
government law.
Individual/Group task
Slide Presentation on any of the
topics below:
• Phishing
• Virus
- Trojan Horse
- Salami Attack
• Hacking
• Security measures
- Biometrics(Fingerprint, Iris
Scan)
- Authentication
10
16. 2.0 COMPUTER SYSTEMS
TOPICS
2.1 System Concept
(6 periods)
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
(10 WEEKS)
LEARNING OUTCOMES
Overview of Computer Systems
2.1.1.1 Define computer systems.
2.1.1.2 State the meaning of input, process, output and
storage.
2.1.1.3 Describe the information processing cycle which
includes input, process, output and storage.
Data Representation
2.1.2.1 State the relationship of data representation: bit,
byte and character.
Introduction to Binary Coding
2.1.3.1 Explain the function of ASCII code.
Data Measurement
2.1.4.1 State the units of data measurement:
• Bit
• Byte
• Kilobyte (KB)
• Megabyte (MB)
• Gigabyte (GB)
• Terabyte (TB)
Clock Speed Measurement
2.1.5.1 State the units of clock speed measurement:
• Megahertz (MHz)
• Gigahertz (GHz)
SUGGESTED ACTIVITIES
Individual task
Complete a task sheet (a block
diagram) on ‘The Computer System’.
Identify the units used in data and clock
speed measurements.
11
17. TOPICS
2.2 Hardware
(12 periods)
2.2.1
2.2.2
2.2.3
2.2.4
2.3 Software
(6 periods)
2.3.1
2.3.2
LEARNING OUTCOMES
Input Devices
2.2.1.1 Identify the input devices used for text, graphic,
audio and video.
Output Devices
2.2.2.1 Identify the output devices used for text, graphic,
audio and video
Motherboard
2.2.3.1 Identify the location of the central processing unit
(CPU), expansion slots, expansion cards, RAM
slots, ports and connectors on the motherboard.
Storage
2.2.4.1
Explain types and functions of :
• primary storage (RAM, ROM)
• secondary storage (magnetic medium
optical medium, flash memory)
Operating System (OS)
2.3.1.1 State the various types of OS used on different
platforms.
2.3.1.2 State the functions of OS.
2.3.1.3 State the different interfaces of OS.
Application Software
2.3.2.1 State the types of application software (word
processing, spreadsheet, presentation, graphic).
2.3.2.2 Describe the uses of application software (word
processing, spreadsheet, presentation, graphic).
SUGGESTED ACTIVITIES
Retrieve photos of input and output
devices from the Internet or other
resources.
Hands-on.
1. Teacher shows different parts and
components of the motherboard.
2. Students identify the parts and
components of the motherboard
Individual task
Differentiate between primary and
secondary storage by completing a task
sheet.
Collect information on different OS from
relevant materials or the Internet.
Collect information on different
application software from relevant
materials or the Internet.
Collect information on different
application software from relevant
materials or the Internet.
12
18. TOPICS
2.3.3
2.3.4
2.4 Installation
(12 periods)
LEARNING OUTCOMES
Utility Program
2.3.3.1 Differentiate between the types and usage of utility
programmes (file management, diagnostic and file
compression).
Proprietary and Open Source Software
2.3.4.1 Differentiate between proprietary and open source
software.
SUGGESTED ACTIVITIES
1. Find information on different types of
proprietary and open source OS and
application software.
2. Find, download and explore one open
source application software and give
your comment.
2.4.1
Personal Computer (PC) Assembling
2.4.1.1 Assemble the components of a PC.
Group task
2.4.1.2 Display cooperation in assembling the components (Refer to provided module)
of a PC.
• Assemble components.
• Follow step-by-step installation
instructions provided.
• Test the functionality of the PC.
2.4.2
Hard Disk Partitioning and Formatting
2.4.2.1 Format and partition the hard disk.
Software Installation
2.4.3.1 Install operating system, application software and
utility programs.
2.4.3
2.5 Current and
Future
Developments
(4 periods)
2.5.1
2.5.2
Latest Open Source Software Available
2.5.1.1 Explain the latest open source OS and application
software available in the market.
Latest Development In ICT
2.5.2.1 Explain the latest ICT hardware and software
2.5.2.2 Explain pervasive computing.
Collect related information on open
source software and compile it into a
portfolio/digital portfolio.
13
19. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS
TOPICS
3.1 Basic Concepts of
Computer
Networks and
Communications
(6 periods)
3.1.1
3.1.2
LEARNING OUTCOMES
Definition
3.1.1.1
Define computer networks.
3.1.1.2
Define communications.
Importance of Computer Network
3.1.2.1
State the importance of computer networks and
communications.
3.1.3
Network Architecture
3.1.4.1
Define two types of network architecture:
• Client/Server
• Peer-to-Peer
SUGGESTED ACTIVITIES
Group task
Cite examples in immediate
environment to show the importance of
network and communication.
Types of Networks
3.1.3.1
Define types of computer networks:
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
3.1.3.2
Differentiate between the three types of computer
networks.
3.1.4
(8 WEEKS)
3.1.5
Network Topology
3.1.5.1
State three types of network topologies:
• bus
• ring
• star
Group task
Retrieve information on types of
network architectures from relevant
materials and the Internet
Individual task
Prepare a graphic representation of the
different types of network topology
14
20. TOPICS
3.1.5.2
3.1.6
3.1.7
3.2 Hardware
Requirements
(8 periods)
3.2.1
LEARNING OUTCOMES
Differentiate between the three types of network
topology.
Protocol
3.1.6.1
Define Transmission Control Protocol/Internet
Protocol (TCP/IP) as a protocol to facilitate
communication over computer network.
Internet, Intranet, Extranet
3.1.7.1
Describe the types of network communications
technology:
• Internet
• Intranet
• Extranet
Devices
3.2.1.1
3.2.1.2
Identify the devices needed in computer network
communication :
• Network Interface Card (NIC)
• Wireless Network Interface Card
• Modem (internal and external)
• Hub / Switch
• Router
• Wireless Access Point
State the functions of the following:
• Network Interface Card (NIC)
• Wireless Network Interface Card
• Modem (internal and external)
• Hub / Switch
• Router
• Wireless Access Point
SUGGESTED ACTIVITIES
Group Task
Retrieve information from relevant
materials and the Internet.
Visit Internet Provider such as TMnet
and Mimos.
Individual task
List the various network devices
required to set up client/server network.
Individual task
Retrieve information on the function of
the stated devices from relevant
materials and the Internet.
15
21. TOPICS
LEARNING OUTCOMES
3.2.2
Medium
3.2.2.1
3.2.2.2
3.3 Software
Requirements
(4 periods)
3.3.1
Identify various types of cables such as
Unshielded Twisted Pair (UTP), Shielded Twisted
Pair (STP), Coaxial and Fibre Optic Cable.
Identify various types of wireless transmission
media such as infrared, radio wave and satellite.
Server Software
3.3.1.1
Define Network Operating System.
3.3.1.2
3.3.2
SUGGESTED ACTIVITIES
Name various
Software.
Network
Operating
Individual task
Label correctly pictures of different
transmission media.
Individual task
Retrieve information from books and the
Internet.
System
Client Software
3.3.2.1
State the functions of various client software.
Group task
State the functions of the following:
• web browser (Internet Explorer,
Firefox)
• email client (Outlook Express,
Thunderbird)
• network utilities (Ping, Trace Route)
• network file manager (Network
Neighbourhood, My Network Places)
16
22. TOPICS
3.4 Setting Network
Facilities
(12 periods)
3.4.1
3.4.2
3.4.3
3.4.4
LEARNING OUTCOMES
Installation of Network Interface Cards (NIC)
3.4.1.1
Insert network interface cards (NIC).
3.4.1.2
Install drivers for the NIC.
Cable Crimping and Testing
3.4.2.1
Crimp and test UTP cable
• Straight cable
• Crossed cable
3.4.2.2
Create awareness of the correct way when
crimping a cable.
Configuration and Testing of Network
3.4.3.1
Configure the workstation to join a Local Area
Network :
• Internet Protocol (IP) Address
• Subnet Mask
• Server name
3.4.3.2
Test the network connection.
Share Data
3.4.4.1
Create a shared folder.
SUGGESTED ACTIVITIES
Group task
(Refer to provided module).
1. Insert NIC correctly.
2. Follow step-by-step installation
instructions provided.
Individual/ Group task
Ping the server from the configured
workstation.
Individual/ Group task
• Set up a shared folder.
• Save a file in the shared folder.
• Access the file in the shared folder
from other workstations.
17
23. TOPICS
3.5 Current and
Future
Developments
(6 periods)
3.5.1
LEARNING OUTCOMES
Latest Development In Networks and Communications
3.5.1.1
Describe
• Mobile Computing (specifications,
services, frequencies)
• Internet Technology and Services
(VOIP, BLOG)
• Types of network (examples: PAN,
VPN, WLAN, WIMAX)
SUGGESTED ACTIVITIES
Individual task
• Study on any of the chosen topic and
save the document in the shared
folder.
• Write a short report (minimum of 350
words) and save the document in the
shared folder.
18
24. 4.0 MULTIMEDIA
TOPICS
4.1 Multimedia
Concepts
(9 WEEKS)
LEARNING OUTCOMES
Definition of Multimedia
SUGGESTED ACTIVITIES
4.1.1.1
4.1.1
Individual task
Define multimedia.
(6 periods)
Collect and discuss information about
the concept of multimedia .
4.1.2
Multimedia in Various Fields
4.1.2.1 Identify the use of multimedia in various fields.
Individual task
Give examples of various applications
of multimedia and discuss their
contributions to the society.
4.1.3
4.1.4
Interactivity of Multimedia
4.1.3.1 Differentiate between the characteristics of linear
and non-linear multimedia.
Medium of Delivery
4.1.4.1 Compare and contrast the mediums of delivery for
multimedia applications:
•
•
4.1.5
web-based
CD-based
Multimedia Elements
4.1.5.1
Identify the multimedia elements:
•
•
•
•
•
text
audio
video
graphics
animation
Individual task
Discuss the characteristics of linear and
non-linear multimedia.
Individual task
Discuss the similarities and differences
between mediums of multimedia
application delivery.
Individual task
Match multimedia elements with the
respective standard file formats.
19
25. TOPICS
4.2 Hardware and
Software
LEARNING OUTCOMES
4.2.1
Hardware
4.2.1.1
(6 periods)
SUGGESTED ACTIVITIES
Identify hardware that can be used to produce
multimedia products:
•
•
•
•
•
scanner
video camera
camera
audio devices
video capture devices
Group task
Scan pictures using scanner.
Group task
Capture images and motions using
camera and video camera.
Group task
Capture sound, music, narration or
special effects using audio devices.
Group task
Capture video from video tape, laser
disc or camera using video capture
devices.
4.2.2
4.2.3
Editing Software
4.2.2.1 Identify editing software that can be used to
produce multimedia elements:
• text editor
• graphics and image editor
• audio editor
• video and animation editor
Authoring Tools
4.2.3.1 Define the various concepts in authoring tools:
•
•
•
time frame concept
icon concept
card concept
Individual task
Collect information on popular
multimedia editing software from printed
materials or the Internet.
Individual task
Produce a portfolio on various concepts
used by the specific authoring tools.
20
26. TOPICS
4.3 Multimedia
Development
LEARNING OUTCOMES
4.2.4
Web Editor
4.2.4.1
Describe and give examples of web editors:
•
•
(24 periods)
4.3.1
User Interface Principles
4.3.1.1 State user interface principles.
4.3.1.2
4.3.2
Apply suitable user interface principles in a project.
Individual task
Collect information on web editors from
printed materials or the Internet.
Individual task
Collect information on user interface
principles from the Internet.
Development Team
4.3.2.1
4.3.3
text-based
WYSIWYG
SUGGESTED ACTIVITIES
State the role of each member in a development
team (examples: project manager, subject matter
expert, instructional designer, graphics artist,
audio-video technician and programmer).
Group task
Form a development team, consisting of
a project manager and assign members
with respective responsibilities based on
the module.
Multimedia Production
4.3.3.1
Describe the phases in multimedia production:
•
•
•
•
•
•
4.3.3.2
analysis
design
implementation
testing
evaluation
publishing
Apply all the phases of multimedia production to
produce an interactive educational multimedia
project.
Individual task
Collect information on multimedia
production phases from printed
materials or the Internet.
Group task
Produce an interactive educational
multimedia project based on the
module.
21
27. TOPICS
4.4 Current and
Future
Developments
(4 periods)
4.4.1
LEARNING OUTCOMES
SUGGESTED ACTIVITIES
Immersive Multimedia
4.4.1.1 Give an example of immersive multimedia in Group task
education, business or entertainment.
Produce a portfolio about the example
of immersive multimedia in education,
business or entertainment.
22
28. 5.0 PROGRAMMING
TOPICS
5.1 Basic
Programming
Concepts
(10 WEEKS)
LEARNING OUTCOMES
Define Program and Programming Language
SUGGESTED ACTIVITIES
5.1.1.1
5.1.1.2
5.1.1
Individual task
State the definition of program.
State the definition of programming language.
(10 periods)
5.1.2
Levels and Generations Of Programming Languages
5.1.2.1
Identify the generations of low-level
programming languages with examples.
5.1.2.2
5.1.3
Collect information on definition of the
program and the programming
language from printed materials or the
Internet.
Identify the generations of high-level
programming languages with examples.
Individual task
Draw a hierarchy chart to classify the
generations of each level of
programming language.
Programming Language Approaches
Individual task
5.1.3.1
5.1.3.2
5.1.3.3
Collect information on different
programming language approaches
from printed materials or the Internet.
Define structured approach in programming.
Define object-oriented approach in programming.
Differentiate between structured approach and
object-oriented approach in programming.
Individual task
Produce a compare and contrast table
on structured approach and objectoriented approach in programming.
5.1.4
Translator
5.1.4.1
Describe the translation method of programming
using assembler, interpreter and compiler.
Individual task
Write an essay on how the assembler,
interpreter and compiler work.
23
29. TOPICS
LEARNING OUTCOMES
Basic Elements In Programming
SUGGESTED ACTIVITIES
5.1.5.1
5.1.5.2
5.1.5
Individual task
5.1.5.3
5.1.5.4
Differentiate between constants and variables.
Differentiate between the data types: Boolean,
integer, double, string and date.
Differentiate between mathematical and logical
(Boolean) operators.
Differentiate between sequence control structure
and selection control structure.
Draw a chart or table to illustrate the
understanding on constants and
variables.
Individual task
Draw a chart or table to illustrate the
understanding on different data types.
Individual task
Draw a chart or table to illustrate the
understanding on the mathematical and
logical (Boolean) operators.
Individual task
Find out a simple flow chart for both
structures from printed materials or the
internet.
5.2 Program
Development
(24 periods)
5.2.1
Program Development Phases
5.2.1.1
Describe the five main phases in program
development:
•
•
•
•
•
problem analysis
program design
coding
testing and debugging
documentation
Individual task
Collect information on program
development phases from printed
materials or the Internet.
24
30. TOPICS
5.3 Current and
Future
Developments
(6 periods)
5.3.1
SUGGESTED ACTIVITIES
5.2.2.1
5.2.2
LEARNING OUTCOMES
Develop a program
Individual task
Apply program development phases to solve
problems.
Develop a simple program using Visual
Basic based on the module.
Latest Programming Languages
5.3.1.1
Find out the latest programming languages:
•
•
•
fifth generation language
natural language
OpenGL (Graphic Library)
Group Task
Collect information on the latest
programming languages from printed
materials or the Internet.
25
31. 6.0 INFORMATION SYSTEMS
TOPICS
6.1 Concepts of
Information
Systems
(10 WEEKS)
LEARNING OUTCOMES
6.1.1
6.1.1.1
Give the meaning of data, information and
information systems.
(6 periods)
6.1.2
Individual task
Draw a mind map on data, information
and information systems.
Usage of Information Systems In Various Fields
6.1.2.1
6.1.3
SUGGESTED ACTIVITIES
Definition
State the usage of Information Systems in
education, business and management.
Individual task
Collect information on usage of
Information Systems in education,
business and management from printed
materials or the Internet.
Information System Components
6.1.3.1
List the Information System components:
•
•
•
•
•
6.1.3.2
6.1.3.3
data
hardware
software
people
procedure
Define each of the Information System
components.
Describe the interrelation between information
system components using a diagram.
Individual task
Draw a mind map on the five main IS
components based on a given scenario.
Individual task
Discuss how data, hardware, software,
people and procedure are interrelated in
information system environments.
Individual task
Draw a diagram showing the
interrelation between information
system components.
26
32. TOPICS
SUGGESTED ACTIVITIES
6.1.4.1
6.1.4
LEARNING OUTCOMES
Types of Information Systems
Individual task
List five types of Information Systems:
•
•
•
•
•
6.1.4.2
6.1.5
Collect information on the five types of
Management Information System (MIS)
IS from printed materials or the Internet.
Transaction Processing System (TPS)
Decision Support System (DSS)
Executive Information System (EIS)
Expert System (ES)/Artificial Intelligence
(AI)
State the usage of each type of information Individual task
system.
List and provide examples of the types
of information systems.
Hierarchy of Data
6.1.5.1
6.1.5.2
Define bit, byte, field, record, and file
Individual task
State the hierarchy of data:
Collect information on bit, byte, field,
• Bit → Byte (Character) → Field → Record record, file and database from printed
→ File → Database
materials or the Internet.
Individual task
Draw a diagram to illustrate the
hierarchy of data.
27
33. TOPICS
6.2 Software
LEARNING OUTCOMES
6.2.1
(8 periods)
SUGGESTED ACTIVITIES
Definition
6.2.1.1
6.2.1.2
Define database and Database Management
Systems (DBMS).
Individual task
List the benefits of using database.
Group task
Produce a comparison table on
database and DBMS.
Brainstorm and record the findings in a
report.
6.2.2
Features
6.2.2.1
6.2.2.2
6.2.2.3
6.2.2.4
6.2.2.5
State the relationship between attribute (field), row
(record) and relation (file).
Individual task
Define the primary key and foreign key.
State the importance of the primary key.
Differentiate between the primary key and foreign
key.
State the importance of relationship between the
primary key and foreign key.
Individual task
Show the relationship between attribute,
row and relation on a chart or table.
Collect information on primary key and
foreign key from printed materials or the
Internet.
Individual task
Draw a simple diagram to show the
relationship.
6.2.3
Database Objects
6.2.3.1
Define the following database objects/ tools: Table, Individual task
form, query, report.
Collect information on four database
objects/ tools from printed materials or
the Internet.
28
34. TOPICS
6.2.3.2
6.2.4
6.2.4.2
(22 periods)
6.3.1
SUGGESTED ACTIVITIES
Individual task
Identify the four database objects/ tools
in Microsoft Access.
Data Manipulation
6.2.4.1
6.3 Database
Development
LEARNING OUTCOMES
Identify table, query, form and report as database
objects/ tools.
List the basic operations of data manipulation:
Individual task
• Update
• Insert
• Delete
• Retrieve
• Sort
• Filter
• Search
State the usage of basic operations in data
manipulation.
Collect information on the basic
operations of data manipulation from
printed materials or the Internet.
Individual task
Collect information on the usage of
basic operations in data manipulation
from printed materials or the Internet.
Phases of Systems Development
6.3.1.1
Describe the phases of systems development:
•
•
•
•
•
•
Analysis
Design
Implementation
Testing
Documentation
Maintenance
Individual task
Collect information on the phases of
systems development from printed
materials or the Internet.
29
35. TOPICS
SUGGESTED ACTIVITIES
6.3.2.1
6.3.2.2
6.3.2.3
6.3.2.4
6.3.2.5
6.3.2.6
6.3.2
LEARNING OUTCOMES
Develop A Database Project
Individual task
6.3.2.7
6.3.2.8
6.3.2.9
6.3.2.10
6.3.2.11
6.3.2.12
6.4 Current and
Future
Developments
(4 periods)
6.4.1
Identify a project.
Identify the project requirements.
Classify project requirements into two tables.
Design database tables.
Create a database.
Create two tables that include the primary key in
each table.
Build a relationship between two tables.
Enter data into the table.
Create a form that relates to the table content.
Create a query to retrieve required information with
one or more conditions.
Generate a report.
Gather all the documents from the above phases
into a folio.
Create a database that has tables,
relationships, forms, queries and reports
based on the module.
Web-based Application
6.4.1.1
Find out current developments in computer
information systems.
Group task
Produce a portfolio about current
developments in computer information
systems.
30