SlideShare a Scribd company logo
Information & Communication Technology

LA1 – ICT & Society

LEARNING AREA 1 – ICT & SOCIETY
Topic 1.1 -

Introduction to Information and Communication Technology

1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT

1.1.1.2 Describe the brief evolution of computers

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

Topic 1.2 -

LA1 – ICT & Society

Computer Ethics and Legal Issues

1.2.1.1 Definition
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer
Crime and Cyber Law.

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.2.2 Privacy
1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/ technologies.

1.2.3 Controversial Contents and Control
Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.2.3.1 a)List effects of controversial contents of pornography on society:

1.2.3.2 Describe the process of filtering to control access to controversial contents

1.2.4

Computer Crimes

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

LA1 – ICT & Society

1.2.4.1 Explain the need for Cyber Law

1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement,
Theft, Attacks.

Topic 1.3 -

Computer Security

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.3.1 Definition
1.3.1.1 Define Computer security.

1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
-

Malicious code
Hacking
Natural disaster
Theft

1.3.3 Security Measures

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.3.3.1 Select the appropriate security measures to overcome the identified computer
threats.

1.3.3.2 Apply the correct security procedures.

Topic 1.4 -

Current and Future Developments

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society

More Related Content

Viewers also liked (8)

Borang bp2
Borang bp2Borang bp2
Borang bp2
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
Privacy
PrivacyPrivacy
Privacy
 
La2 templates
La2 templatesLa2 templates
La2 templates
 
Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to La1 templates

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111girlfrida
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
karisariddell
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
Vivek Maurya
 
Rpt ict t4_2016
Rpt ict t4_2016Rpt ict t4_2016
Rpt ict t4_2016
Kalaivani Kanasing
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
depoerossie
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpointMOE
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
Fatin Izzaty
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
ChetanShahukari
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptx
dikkoyafya
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
Richard Dioteles
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
ITU
 

Similar to La1 templates (20)

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Hsm ict 4
Hsm ict 4Hsm ict 4
Hsm ict 4
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
Rpt ict t4_2016
Rpt ict t4_2016Rpt ict t4_2016
Rpt ict t4_2016
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Scheme ict-f4-2014
Scheme ict-f4-2014Scheme ict-f4-2014
Scheme ict-f4-2014
 
Ethics and Laws (1).pptx
Ethics and Laws (1).pptxEthics and Laws (1).pptx
Ethics and Laws (1).pptx
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 

More from cikgushaharizan (20)

Acf
AcfAcf
Acf
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-4-1
Bidang pembelajaran-4-1Bidang pembelajaran-4-1
Bidang pembelajaran-4-1
 
Notacd081
Notacd081Notacd081
Notacd081
 
Notacd12
Notacd12Notacd12
Notacd12
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

La1 templates

  • 1. Information & Communication Technology LA1 – ICT & Society LEARNING AREA 1 – ICT & SOCIETY Topic 1.1 - Introduction to Information and Communication Technology 1.1.1 Overview of Information and Communication Technology (ICT) 1.1.1.1 Define ICT 1.1.1.2 Describe the brief evolution of computers Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 2. Information & Communication Technology Topic 1.2 - LA1 – ICT & Society Computer Ethics and Legal Issues 1.2.1.1 Definition Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 3. Information & Communication Technology 1.2.1.2 Differentiate between ethics and law. 1.2.1.3 State the need for intellectual property laws Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 4. Information & Communication Technology 1.2.2 Privacy 1.2.2.1 List ways to protect privacy. 1.2.2.2 State authentication and verification methods/ technologies. 1.2.3 Controversial Contents and Control Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 5. Information & Communication Technology LA1 – ICT & Society 1.2.3.1 a)List effects of controversial contents of pornography on society: 1.2.3.2 Describe the process of filtering to control access to controversial contents 1.2.4 Computer Crimes Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 6. Information & Communication Technology LA1 – ICT & Society 1.2.4.1 Explain the need for Cyber Law 1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement, Theft, Attacks. Topic 1.3 - Computer Security Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 7. Information & Communication Technology 1.3.1 Definition 1.3.1.1 Define Computer security. 1.3.2 Security Threats 1.3.2.1 Explain briefly the different threats to computer security: - Malicious code Hacking Natural disaster Theft 1.3.3 Security Measures Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 8. Information & Communication Technology LA1 – ICT & Society 1.3.3.1 Select the appropriate security measures to overcome the identified computer threats. 1.3.3.2 Apply the correct security procedures. Topic 1.4 - Current and Future Developments Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 9. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 10. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society