Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ict form 4 chapter 1(answer)


Published on

Published in: Technology, Business

Ict form 4 chapter 1(answer)

  1. 1. What is ICT ? <ul><li>ICT is the technology required for information processing. </li></ul><ul><li>In particular, the use Of electronic computers, communication devices </li></ul><ul><li>and software application to convert, store, protect, process, transmit, </li></ul><ul><li>and retrieve information from anywhere and anytime. </li></ul>Information and Communication Technology Information Communication Technology From reading, investigation, study or research From internet, e-mail, video conferencing From telephone, fax machine, radio, tv, satelites www… LESSON 1
  2. 2. TECHNOLOGY TIMELINE 3500 BC (Sumerians-Cuneiform writing) 1500 BC (Phoencians- alphabet ) 1941 Computer 1793 telegraph 1925 Television 1454 First Printing machine 105 BC Tsai Lun- paper 1876 First telephone 1958 photocopier 1963 Satellite 1969 APRANET -internet
  3. 3. LESSON 2 EVOLUTION OF COMPUTERS 200 BC ( Chinese Abacus) 1801 Joseph Marie Jacquard – Weaving Loom 500 BC (Egyptian abacus ) 1620 John Napier –Napier’s Bones 1653 Blaise Pascal- Pascaline 1673 Gottfried Wilhelm Von Leibniz - Leibniz’s Rechiner 1941 Harvard University- Mark 1 1823 Charles Baggage – Mechanical calculator Machine
  4. 4. Computer generations Technology Problem/ advantages First Generation (1940-1956) <ul><li>Vacuum tube </li></ul><ul><li>Punched card </li></ul><ul><li>magnetic tape </li></ul><ul><li>huge, slow, expensive & unreliable </li></ul><ul><li>tubes burnt out </li></ul><ul><li>vacuum tubes generated a great deal of heat. </li></ul>Second Generation (1956-1963) <ul><li>transistor </li></ul><ul><li>smaller than vacuum tubes </li></ul><ul><li>No warm up time </li></ul><ul><li>Less energy </li></ul><ul><li>less heat </li></ul>Third Generation (1964-1971) <ul><li>IBM 370 series </li></ul><ul><li>CDC 7600 & B2500 </li></ul><ul><li>Integrated circuit (IC)- silicone chip </li></ul><ul><li>were reliable, compact & cheaper </li></ul><ul><li>Sold hardware & software separately </li></ul>
  5. 5. Fourth Generation (1971-Present) <ul><li>computer models : </li></ul><ul><li>Apple Macintosh </li></ul><ul><li>IBM </li></ul><ul><li>DELL </li></ul><ul><li>ACER </li></ul><ul><li>microprocessor </li></ul><ul><li>computer became 100 times smaller than ENIAC </li></ul><ul><li>Gain in speed, reliability, & storage capacity </li></ul>Fifth Generation (Present & Beyond) <ul><li>silicone chip </li></ul><ul><li>Processor </li></ul><ul><li>Robotics </li></ul><ul><li>Virtual reality </li></ul><ul><li>Intelligent systems </li></ul><ul><li>Program translate languages </li></ul>New Era Computer <ul><li>super computer </li></ul><ul><li>Mainframe </li></ul><ul><li>Minicomputer </li></ul><ul><li>Personal computer (PC) </li></ul><ul><li>Mobile computer </li></ul>
  6. 6. DIFFERENCE BETWEEN COMPUTERIZED AND NON-COMPUTERIZED <ul><li>COMPUTERIZED </li></ul><ul><li>Used computer to do something or their work. </li></ul><ul><li>Such as input data, surf internet. </li></ul><ul><li>Easy to search information </li></ul><ul><li>E-learning, E-Commerce </li></ul><ul><li>NON-COMPUTERIZED </li></ul><ul><li>Manually </li></ul><ul><li>Use file to put a document </li></ul><ul><li>Very difficult to find old document or data. </li></ul><ul><li>File </li></ul>LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE
  7. 7. LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE A) EDUCATION BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Teacher lectures Teacher as a facilitator. Students study by their own. 2. Students write in their notes / exercise books Students do the exercise in the computer 3. Teacher write notes On the board Teacher use the LCD projector and computer 4. Students use textbooks Students use teaching courseware
  8. 8. Advantages of ICT in education <ul><li>Document / notes can be shared </li></ul><ul><li>Use of paper is reduced (paperless) </li></ul><ul><li>No heavy bags to carry </li></ul><ul><li>Can connect to the internet (Borderless </li></ul><ul><li>communication) </li></ul><ul><li>Faster communication speed </li></ul>
  9. 9. Uses of ICT in education <ul><li>Long distance learning (Pendidikan Jarak Jauh) </li></ul><ul><li>Office Automation ( student registration, </li></ul><ul><li>examination) </li></ul><ul><li>Online library </li></ul><ul><li>Online discussion with students abroad </li></ul><ul><li>Teacher use computer to do the research for </li></ul><ul><li>teaching material. </li></ul><ul><li>Students browse internet to look for information </li></ul><ul><li>Researchers use computer to collect and process </li></ul><ul><li>data </li></ul>m/s 12
  10. 10. B) BANKING SYSTEM BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Done manually by taking deposit directly All transaction are done with computer 2. Transactions can only be made during working hours Transactions can only be made 24 hours a day 3. Takes times to approve any loan applications Loan application can be approved faster Eg: online services, phone banking system, credit cards
  11. 11. Uses of ICT in banking system <ul><li>Customers can make transaction. </li></ul><ul><li>businessman can access company account for loan </li></ul><ul><li>application, business transaction and update on </li></ul><ul><li>their cash flow at any time. </li></ul><ul><li>Bank administrator can oversee the entire banking activities such as inter-branch transaction (IBT). </li></ul>m/s 13
  12. 12. C)INDUSTRY m/s14 Uses of ICT in industry <ul><li>Used to facilitate production planning and control </li></ul><ul><li>system. </li></ul><ul><li>To help in product design in the industrial sector. </li></ul>BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Production was slow Production is faster 2. Done manually and totally depended on human labour. Use machine or robotic 3. Takes times to finish the product Production can be increased through all day operation
  13. 13. D) E- COMMERCE Uses of ICT in E-Commerce <ul><li>Customers use computer to be connected online </li></ul><ul><li>with suppliers to purchase products. </li></ul><ul><li>Employees use computers and telephones to communicate </li></ul><ul><li>with their customers for any enquiries. </li></ul>BEFORE ICT (Non-computerized ) AFTER ICT (computerized) Using barter system Using e-commerce Word of mouth, billboard, printed flyers Advertisement on Radio, television and Internet Trading globally was slow, late and expensive Trading globally was faster and less expensive
  14. 14. LESSON 5 THE IMPACT OF ICT ON SOCIETY POSITIVE EFFECTS NEGATIVE EFFECT 1. Faster communication speed <ul><li>Social problems </li></ul><ul><li>fraud </li></ul><ul><li>identity theft </li></ul><ul><li>pornography </li></ul><ul><li>hacking </li></ul>2. Lower communication cost 3. Reliable mode of communication 4. Effective sharing of information <ul><li>2. Health problems </li></ul><ul><li>bad posture </li></ul><ul><li>eyestrain </li></ul><ul><li>physical and mental stress </li></ul>5. Paperless environment 6. Borderless communication
  15. 15. LESSON 6 Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it. GUIDELINES Meaning of the …. Ethics Any code of conducts that are not conforming to approved standards of social or processional behavior Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority. Unethical Law
  16. 16. Differences between Ethics and Law ETHICS LAW As a Guideline As a rule to control Moral standards Judicial standards Free to follow the code of ethics Must follow the regulation and law No punishments Penalties, imprisonments and others law Universal Depends on country Produce ethical computer users Prevent misusing of computers Immoral Crime
  17. 17. Try do this exercises….. <ul><li>Sending warning about viruses to other computer users. …………………………….. </li></ul><ul><li>Selling information to other parties without the owner’s permission. …………….. </li></ul><ul><li>Modifying certain information on the Internet, affecting the accuracy of the </li></ul><ul><li>information. ……………………… </li></ul><ul><li>4. Selling pirated software in night market. …………………. </li></ul><ul><li>5. Reading your friend’s e-mail without his or her permission. …………………. </li></ul><ul><li>6. Hacking into your school’ database to change your examination results. ………….. </li></ul><ul><li>7. Using the office computer to do the personal things. ………….. </li></ul><ul><li>8. Using the information with authorization. ……………….. </li></ul><ul><li>9. Involvement in stealing software. …………………….. </li></ul><ul><li>10. Asking the permission before sending any business advertisements to others. </li></ul><ul><li>…………………… </li></ul>ETHICS UNETHIC LAW BREAKING FIND THE ANSWER FROM THE TEXT BOOK ……
  18. 18. LESSON 8 INTELLECTUAL PROPERTY RIGHTS Refers to works created by inventors, author and artists. These work are unique And have value in market place. Covers ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes….. Definition of Intellectual Property Intellectual Property law INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS <ul><li>TRADEMARKS </li></ul><ul><li>SERVICE MARKS </li></ul><ul><li>TRADE/ COMPANY NAMES </li></ul><ul><li>GEOGRAPHICAL INDICATIONS </li></ul><ul><li>DOMAIN NAMES </li></ul><ul><li>COPYRIGHTS </li></ul><ul><li>PATENTS </li></ul>
  19. 19. Types of Intellectual Property Protection Literary & artistic material, music, film, Sound recording & roadcasts, including Software & multimedia Words, names, symbols, devices & images that represent product, Goods or services Utility, design, plant That protect inventions & improvement to existing inventions Lines, contours, colors, shape, Texture, or material of the product or Its ornamentation 1 ) Patents for inventions 2) Trademark for brand identity 3) Design for product appearance 4) Copyright for material
  20. 20. <ul><li>Privacy in IT refers to the data and </li></ul><ul><li>Information privacy. </li></ul><ul><li>Information privacy </li></ul><ul><li>Described as the rights of individuals and companies </li></ul><ul><li>To deny or restrict the collection and use of information about them. </li></ul>What is Privacy?? LESSON 9
  21. 21. How does computer technology threaten the privacy of our data? <ul><li>Cookies </li></ul><ul><li>identify web casting, e-commerce, web application </li></ul><ul><li>contain user information and save it in the hard disk </li></ul><ul><li>used some website to store password & track regular </li></ul><ul><li>we visit a website. </li></ul><ul><li>store information for future use. </li></ul><ul><li>B) Electronic Profile </li></ul><ul><li>Combining of data in database that can be sold to the internet by the company to the interested parties. </li></ul><ul><li>eg: form such as magazine subscription or product warranty cards </li></ul><ul><li>Personal detail such as age, address and marital status. </li></ul><ul><li>C) Spyware </li></ul><ul><li>program that collect user information without the user’s knowledge. </li></ul><ul><li>communicates information it collects to some outside source while we are online. </li></ul>
  22. 22. <ul><li>WHY DO WE NEED PRIVACY??? </li></ul><ul><li>We need privacy for anonymity </li></ul><ul><li>we need privacy for confidentiality </li></ul><ul><li>we do not our private lives and habit exposed to third parties </li></ul><ul><li>CAN PRIVACY BE PROTECTED ?? </li></ul><ul><li>Privacy law </li></ul><ul><li>utilities software (Eg: anti-spam program, firewall , anti-spyware, </li></ul><ul><li>anti-virus) </li></ul>
  23. 23. THE WAYS OF COMPUTER PRIVACY PASSWORD ENCRYPTION EMAIL PRIVACY Not just to protect the computer but to make sure that the computer issues by authorized worker or user only. With public key encryption there are two keys, one public and the other private. When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The public key needs to be known The number of packets depends on the size of message. To send a message to a friend, you uses his public key to encrypt the message. Each message has the internet address of the recipient. Your friend then uses his private key to decode the message after receiving it. This means there may be some places between the packets could be intercepted and examined.
  24. 24. LESSON 10 Process where user verify that they are who they say they are Authentication Device that translates persona characteristics Into a digital code that is compared with a digital code Stored in the database Refers to the checking system that Authenticates the user Biometric device Callback system <ul><li>Fingerprint Recognition – measure blood flow, edges of the fingers. </li></ul><ul><li>Facial Recognition – characteristics of an individual’s face images. </li></ul><ul><li>Hand Geometry Scanning - analysis of the shape of one’s hand. </li></ul><ul><li>Iris Scanning – 200 point that can be used for comparison, including rings, </li></ul><ul><li>furrows and freckles. (this method is excellent but cost is high) </li></ul><ul><li>Retinal Scanning – analysis the layer of blood vessels at the back of the eye. </li></ul><ul><li>Voice Recognition – verification time is approximately 5 seconds </li></ul><ul><li>Signature Verification System – uses special pen and tablet. Verification system </li></ul><ul><li>is fair and the cost is excellent. </li></ul>2 methods
  25. 25. LESSON 11 Act of proving or disproving the correctness of a system With respect to a certain formal specification. Verification Process of validating the User Processed Object Something the user has such as IC User Identification 2 methods <ul><li>key in the user name to log in </li></ul><ul><li>exam slip </li></ul><ul><li>Passport </li></ul><ul><li>Birth certificate </li></ul><ul><li>marriage certificate </li></ul>Examples: <ul><li>driver license </li></ul><ul><li>security card </li></ul><ul><li>credit card </li></ul><ul><li>IC </li></ul><ul><li>security token </li></ul><ul><li>Cell phone </li></ul>Examples:
  26. 26. LESSON 12 CONTROVERSIAL CONTENT Is information that causes disagreement in opinions And may cause the disruption of peace because different People or culture have different view about the contents. Pornography <ul><li>impact on Malaysian society.. </li></ul><ul><li>Can lead to criminal acts such as exploitation of women and children </li></ul><ul><li>2) Can lead to sexual addiction and perversion </li></ul><ul><li>3) Can develop low moral value </li></ul><ul><li>impact on Malaysian society.. </li></ul><ul><li>1) Disregards honesty and truth </li></ul><ul><li>2) Bad habit and spreading </li></ul><ul><li>untruths or rumors </li></ul><ul><li>3) Unnecessary argument </li></ul><ul><li>4) Negative attitudes </li></ul>m/s 33 Slander
  27. 27. LESSON 13 Process that prevents or blocks access to certain materials on the internet. What is Internet filtering? <ul><li>Keyword blocking </li></ul><ul><li>Banned word </li></ul><ul><li>Objectionable terms </li></ul><ul><li>Site blocking </li></ul><ul><li>Dubious internet sites </li></ul><ul><li>Denial list regularly updated </li></ul><ul><li>Web rating system </li></ul><ul><li>Rating done by web page </li></ul><ul><li>author or </li></ul><ul><li>Independent bureau </li></ul>3 method to filter the content of the Internet The process of Internet filtering
  28. 28. LESSON 14 Any laws relating to protecting the internet and other online communication Technologies What is Cyber Law? Needs for Cyber Law Integrity and Security Information Legal status of online transaction Privacy and confidentially of information Intellectual property Rights Security of government data
  29. 29. The Cyber Law Acts in Malaysia 1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet 2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities 3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine 4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia
  30. 30. LESSON 15 Computer Crimes 1. Computer Fraud Defined as having an intention to take advantage over or causing loss to other people . Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes. 2. Copyright Infringement Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction of copyright material by the black market group. Eg: Pirated CD 3. Computer Theft Defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg: transfer of payment to the wrong account 4. Computer Attacks Defined as any activities taken to disrupt the equipment of computer system, change processing control or corrupt stored data. Eg: malicious code (virus, worm…)
  31. 31. computer security Means protecting our computer system and the information they Contain against unwanted access, damage, destruction or modification. Network security Hardware Security Software security / data security 3 types Eg: pc-lock, keyboard lock, Smart card Eg: activation code, Serial number Eg: firewall
  32. 32. LESSON 17 Computer Threats Introduction computer threats Natural Disasters Human <ul><li>Malicious Code </li></ul><ul><li>Virus </li></ul><ul><li>Trojan Horse </li></ul><ul><li>Logic Bomb </li></ul><ul><li>Trapdoor or Backdoor </li></ul><ul><li>Worm </li></ul><ul><li>Flood </li></ul><ul><li>Fire </li></ul><ul><li>Earthquakes, storms and tornados </li></ul><ul><li>Excessive heat </li></ul><ul><li>Inadequate power supply </li></ul>
  33. 33. Give the correct answers… <ul><li>A program that copies itself and spreads through a network. </li></ul><ul><li>( ) </li></ul><ul><li>2. A program that goes off when a specific condition occurs </li></ul><ul><li>and causes threats to computer at a specified time and date. </li></ul><ul><li>( ) </li></ul><ul><li>3. Usually attaches itself to the program and then destroys or </li></ul><ul><li>co-exists with the program. </li></ul><ul><li>( ) </li></ul><ul><li>4. Spreads through any medium and causes threats by </li></ul><ul><li>modifying the files attached. </li></ul><ul><li>( ) </li></ul><ul><li>5. One of the common ways to attack our computer is </li></ul><ul><li>requesting for users’ login ID and password. </li></ul><ul><li>( ) </li></ul>Page 41-43
  34. 34. Primary differences between worms and viruses Worm Virus Operates through the network Spreads through any medium Spreads copies on itself as a standalone program Spreads copies itself as a program that attaches to other programs
  35. 35. It defined as unauthorised access to the computer system by hacker. Hackers are person who learn about the computer system n detail. What is Hacking? What is Theft? Example: steal money, goods information, Information, and resource …. Steal computer. <ul><li>3 approaches to prevent the theft…. </li></ul><ul><li>Using locks, smart card, password </li></ul><ul><li>record any hardware transported </li></ul><ul><li>Restricting the hardware from being moved </li></ul>LESSON 17
  36. 36. LESSON 18 Security Measures Anti-spyware Firewall Anti-virus Human Aspects Data backup Cryptography
  37. 37. Security Measures so m Explanation 1.Data backup File duplication – daily, weekly , biweekly backup 2. Cryptography Is a process of hiding information by altering the actual information into different representation. 3. Antivirus Protects a computer against viruses by identifying and removing any computer viruses found in the computer. (kaspersky) 4. Anti-spyware Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware) 5. Firewall Piece of hardware software which functions in a networking environment to prevent some communication forbidden by the security policy. (screening routers, proxy gateway, guard) 6. Human Aspects Refer to the user and also the intruder of a computer system.
  38. 38. LESSON 19 Relationship between security threats and security measures SECURITY PROCEDURES <ul><li>There are a few ways to protect </li></ul><ul><li>the information: </li></ul><ul><li>backup files </li></ul><ul><li>detect virus and do cleanup </li></ul><ul><li>warn others on virus attack </li></ul>Security threats VS Security measures 1. Malicious code threats VS Antivirus & Anti-Spyware 2. Hacking VS firewall 3. Natural disaster VS data backup 4. Theft VS human aspect
  39. 39. LESSON 21 Computer application in the society Area Examples of software applications Home & education Microsoft office, adobe photoshop, macromedia flash, autoCAD… Business Spreadsheet, database, presentation, graphics… Graphics & multimedia Computer Aided design (CAD), paint/image editing Communication E-mail, web browsers, chat rooms, Newgroups, video conferencing
  40. 40. Computer users Home user Power user Large business user Mobile user SOHO
  41. 41. <ul><li>HOW TO CONDUCT A STUDY </li></ul><ul><li>STEP 1: GET AN OVERVIEW OF THE TOPIC </li></ul><ul><li>STEP 2: NARROW DOWN THE TOPIC </li></ul><ul><li>STEP 3: FIND STUDY MATERIAL </li></ul><ul><li>STEP 4: EVALUATE STUDY MATERIAL </li></ul><ul><li>STEP 5: WRITING OUT THE STUDY MATERIAL </li></ul>
  42. 42. <ul><li>PRESENTING RESULT </li></ul><ul><li>INTRODUCTION </li></ul><ul><li>CONTENT </li></ul><ul><li>CONCLUSION </li></ul>