Sie sind auf Seite 1von 9

LEARNING AREA 1 : ICT AND SOCIETY

1.1.1 Define ICT P01 Define, Give, State,


.1 What

• ICT is the technology required to process information.


• the use of electronic computers, communication devices and software
applications to convert, store, protect, process, transmit and retrieve
information from anywhere, anytime.

1.1.1 Describe the brief evolution P02 Identify, Label, Match,


.2 of computers P04 State
P05 Arrange, List Label, List,
Match, Name, State

1.1.2 List the usage of ICT in P02 Give, Label, List, Match,
.1 everyday life State

ICT In Everyday Life

a. Education
 Teachers
 research for teaching materials
 forums and conferences.
 Students
 as a reference tool to look for information.
 School administrators
 for administrative purposes to make sure that the entire operation
runs
smoothly.

b. Banking
 Customers
 can make any transactions at the 24 hour service .
 Businessmen
• can save their time by using the online services offered by
banks.

c. Industry
 Workers
 use machines that are connected to computers to operate their jobs
 use robots to take over jobs that are dangerous to the workers.

d. E-Commerce
 Customers
• connected online with suppliers to purchase products.

e. Other Sector
Architecture, Arts, Career, Government, Healthcare, Home, Law Enforcement,
Transportation and Travel.

1.1.2 State the differences P02 Give, List, State, Match


.2 between computerized and Differentiate, Identify
non-computerized systems

Computerized Systems Non Computerized Systems


Banking Banking
• Banking was done manually • All transactions are done by
by taking deposits directly computers
• Transactions can only be made • Transaction can be done at
during working hours anytime and place
• Takes time to approve any • Online services takes less time
bank application such loan to approve bank application
applications such as credit cards application

Industry Industry
• Production was slow because • Production are faster because
everything was done everything was done using
manually . computer
• Less profitable because • More profitable since
production totally depended on production can be increased
human labour. with the computer technology

Commerce
Commerce • Advertisement was in the form
• Advertisement was in the form of multimedia and more
of word of mouth and less interesting
interesting. • Trading globally was extremely
• Trading globally was extremely fast and inexpensive
slow, late and expensive. • Distribution of goods, buying
• Distribution of goods, buying and selling are done
and selling are done manually electronically.

1.1.2 State the impact of ICT on P02 Give, List, State, What,
.3 society Select, Choose

Faster Communication Speed


Lower Communication Cost
Reliable Mode of Communication
Effective Sharing of Information
Paperless Environment
Borderless Communication
 Social Problems
Health Problems

1.2.1 Define Computer Ethics, P01 Define, Give, Match,


.1 Code of Ethics, Intellectual State, What
Property, Privacy,
Computer Crime and Cyber
Law

Define Computer Ethics


• is a system of moral standards or values
• used as a guideline for computer users.

Define Intellectual Property


• refers to works created by inventors, authors and artists.

What is privacy?
• Information privacy is described as the rights of individuals and
companies
• to deny or restrict the collection and use of information about them.

Define Computer Crime


• Any criminal activity that is related to the use of computers.
• These activities include computer fraud, copyright infringement,
computer theft and computer attack.

Define Cyber Law


• Cyber law refers to any laws relating to protecting the Internet and
other online communication technologies.

1.2.1 Differentiate between P02 Give, List, State


.2 ethics and law A00 Differentiate, Identify

Ethics Laws
• As a guideline to computer • As a rule to control computer
users users.
• Ethical behaviour is judged by • Law is judged by judicial
moral standards standards.
• Computer users are free to
• Computer users must follow
follow or ignore the code of
the regulations and law.
ethics.
• Penalties, imprisonments and
• No punishment for anyone who other
• Violates ethics • Punishments for those who
break the law.
• Universal, can be applied • Depends on country and state
anywhere, where
• All over the world. • The crime is committed.
• To produce ethical computer • To prevent misuse of
users. computers.
• Not honouring computer ethics
• Not honouring the law means
means ignoring the moral
Committing a crime.
elements (immoral).

1.2.1 State the need for P02C03 Give, List, State,


.3 intellectual property laws WhatState, Suggest,
Why

There are four types of Intellectual Property protection


• Patents for inventions
• Trademarks for brand identity
• Design for product appearance
• Copyright for material

1.2.2 List ways to protect P02 Give, How, List,


.1 privacy State,What

 Anti-virus
Anti-Spyware
Cryptography
Data backup
Human Aspect
Firewall

1.2.2 State authentication and P01 Give, List, State, What


.2 verification methods / P02 Give, List, State, What
technologies

Authentication method
a. Biometric Device
Fingerprint Recognition Retinal Scanning
Facial Recognition Voice Recognition
Hand Geometry Scanning Signature Verification System
Iris Scanning

b. Callback System

Verification method

User Identification
Processed Object
1.2.3 List effects of controversial P01 Define, Give, State,
.1 contents on society : P02 What
• Pornography Give, List, State, What
• Slander

Pornography
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour

Slander
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person

1.2.3 Describe the process of P02 Describe, How, List,


.2 filtering to control access to P04 State, What
controversial contents Arrange, Describe, State

The current preferred method of choice to limit access on the Internet is to


filter content either by:
keyword blocking :
• This method uses a list of banned words or objectionable terms.
• As the page is downloading, the filter searches for any of these
words.
• If found, it will block the page completely, stop downloading
block the banned words and even shut down the browser.

site blocking :
• prevents access to any sites on this list.
• provides control over what categories of information
• filters can use both site blocking and word blocking

web rating systems :


• Web sites are rated in terms of nudity, sex and violence.
• Ratings done either by the web page author or by the
independent bureau.
• Browsers set to only accept pages with certain levels of ratings.
1.2.4 Explain the need for Cyber P02 Explain, List, State,
.1 Law C03 What
Explain, State, Suggest,
Why

Explain the need for Cyber Law


• the integrity and security of information
• legal status of online transactions
• privacy and confidentiality of information
• intellectual property rights
• security of government data placed on the Internet.

1.2.4 Explain briefly the computer P01 Choose, Complete,


.2 crimes below : Define, Give, Match,
• Fraud P02 What
• Copyright Infringement Explain, List, Match,
• Theft State
• Attacks

Computer Fraud
• is defined as having an intention to take advantage over
• or causing loss to other people through the use of computers.

Copyright Infringement
• is defined as a violation of the rights secured by a copyright.
• Such as illegal copy or reproduction of copyrights material.

Computer Theft
• is defined as the unauthorised use of another person’s property with
the intention to deny the owner right.

Computer Attacks
• is defined as any activities taken to disrupt the equipment of
computer systems.
• change or corrupt computer data.

1.3.1 Define computer security P01 Define, Give, State,


.1 What

Computer security
• means protecting computer systems and the information against
unwanted access, damage, destruction or modification.
1.3.2 Explain briefly the different P01 Choose, Complete,
.1 threats to computer Define, Give, Match,
security : P02 What
• Malicious code A00 Explain, List, Match,
• Hacking State
• Nature / environment Identify, Suggest, State
• Theft

Malicious code
• is a threat to computing assets with the intention to cause damage.
• There are various kinds of malicious code.
• Example Trojan horse, logic door, trapdoor and backdoor, worm

Hacking
• is defined as unauthorised access to the computer system by a
hacker.

Natural or environmental disaster


• can be in a form of Flood, Fire ,Earthquakes, storms and tornados.
• Excessive Heat and Inadequate Power Supply that can be a threat to a
computer.

1.3.3 Select the appropriate P01 List, State


.1 security measures to A00 Choose, Identify, List,
overcome the identified State
computer threats

Security Threats Security Measures


Malicious Code Antivirus And Anti-Spyware
Hacking Firewall
Natural Disaster Data Backup
Theft Human Aspects

1.3.3 Apply the correct security P04 Use, How, List, State,
.2 procedures. P07 What
• Antivirus Use, How, List, State,
• Anti-Spyware What
• Cryptography
• Firewall
• Data backup
• Human aspects

antivirus
• protects computer against viruses
• identifies the infected file and remove its virus, worm or Trojan horse.
• If cannot be remove the infection, it often quarantines the infected file.

anti-spyware
• An application program used to remove spyware.
• Spyware is a program secretly collects information about the user
• Placed on a computer without the user’s knowledge.
• The spyware program gives the information to the outside source.

Cryptography
• is a process of hiding information by altering the actual information
into different representation.
• depend on a key such as a password like the numbers.
• or a phrase that can be used to encrypt or decrypt a message.

Data Backup
• is a program of file duplication.
• Backups of data applications are necessary so that they can be
recovered in case of an emergency.

Firewall
• is a piece of hardware or software which functions in a networked
environment to prevent some communications forbidden by the
security policy.
• It might permit limited access from in or outside the network
perimeters or from certain user or for certain activities.

Human aspects
• refer to the user and also the intruder of a computer system.
• It is one of the hardest aspects to give protection to.
• The most common problem is the lack of achieving a good information
security procedure.

1.4.1 Locate information from P02 Find, How, List, Where


.1 various sources (example : A00 Choose, Identify,
Internet, library or Suggest
magazines).

1.4.1 Describe the impact of ICT P02 Give, Describe, Record,


.2 on society C03 State, What
How, Describe, What

Impact of ICT on society


• Computers help people to do their work faster and more efficient
• by using the software application that consist of special program for
specific task.
• People interact directly with computer in
o education,
o finance,
o government,
o health care,
o science,
o publishing,
o tourism,
o and industry.

IImpact of ICT on Education


??

1.4.1 Present results in a clear, P04 Arrange, Display,


.3 concise manner. P07 Organise, Prepare
How, What

A presentation should contain three well-defined sections, they are:

1. Introduction
 is at the beginning of the research
 includes the objectives of the research
 provides a clear statement on why the study was undertaken
 includes the limitations/assumptions and analytical techniques

2. Content
 consists of facts or arguments related to subject matter
 can be presented in an argument format or just as an overview

3. Conclusion
 is a review of content (not repetition of content)
 relates to the statement of objectives in the introduction
 should not introduce new issues
 should contain judgment or decision that has been reached

Das könnte Ihnen auch gefallen