Beruflich Dokumente
Kultur Dokumente
1.1.2 List the usage of ICT in P02 Give, Label, List, Match,
.1 everyday life State
a. Education
Teachers
research for teaching materials
forums and conferences.
Students
as a reference tool to look for information.
School administrators
for administrative purposes to make sure that the entire operation
runs
smoothly.
b. Banking
Customers
can make any transactions at the 24 hour service .
Businessmen
• can save their time by using the online services offered by
banks.
c. Industry
Workers
use machines that are connected to computers to operate their jobs
use robots to take over jobs that are dangerous to the workers.
d. E-Commerce
Customers
• connected online with suppliers to purchase products.
e. Other Sector
Architecture, Arts, Career, Government, Healthcare, Home, Law Enforcement,
Transportation and Travel.
Industry Industry
• Production was slow because • Production are faster because
everything was done everything was done using
manually . computer
• Less profitable because • More profitable since
production totally depended on production can be increased
human labour. with the computer technology
Commerce
Commerce • Advertisement was in the form
• Advertisement was in the form of multimedia and more
of word of mouth and less interesting
interesting. • Trading globally was extremely
• Trading globally was extremely fast and inexpensive
slow, late and expensive. • Distribution of goods, buying
• Distribution of goods, buying and selling are done
and selling are done manually electronically.
1.1.2 State the impact of ICT on P02 Give, List, State, What,
.3 society Select, Choose
What is privacy?
• Information privacy is described as the rights of individuals and
companies
• to deny or restrict the collection and use of information about them.
Ethics Laws
• As a guideline to computer • As a rule to control computer
users users.
• Ethical behaviour is judged by • Law is judged by judicial
moral standards standards.
• Computer users are free to
• Computer users must follow
follow or ignore the code of
the regulations and law.
ethics.
• Penalties, imprisonments and
• No punishment for anyone who other
• Violates ethics • Punishments for those who
break the law.
• Universal, can be applied • Depends on country and state
anywhere, where
• All over the world. • The crime is committed.
• To produce ethical computer • To prevent misuse of
users. computers.
• Not honouring computer ethics
• Not honouring the law means
means ignoring the moral
Committing a crime.
elements (immoral).
Anti-virus
Anti-Spyware
Cryptography
Data backup
Human Aspect
Firewall
Authentication method
a. Biometric Device
Fingerprint Recognition Retinal Scanning
Facial Recognition Voice Recognition
Hand Geometry Scanning Signature Verification System
Iris Scanning
b. Callback System
Verification method
User Identification
Processed Object
1.2.3 List effects of controversial P01 Define, Give, State,
.1 contents on society : P02 What
• Pornography Give, List, State, What
• Slander
Pornography
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person
site blocking :
• prevents access to any sites on this list.
• provides control over what categories of information
• filters can use both site blocking and word blocking
Computer Fraud
• is defined as having an intention to take advantage over
• or causing loss to other people through the use of computers.
Copyright Infringement
• is defined as a violation of the rights secured by a copyright.
• Such as illegal copy or reproduction of copyrights material.
Computer Theft
• is defined as the unauthorised use of another person’s property with
the intention to deny the owner right.
Computer Attacks
• is defined as any activities taken to disrupt the equipment of
computer systems.
• change or corrupt computer data.
Computer security
• means protecting computer systems and the information against
unwanted access, damage, destruction or modification.
1.3.2 Explain briefly the different P01 Choose, Complete,
.1 threats to computer Define, Give, Match,
security : P02 What
• Malicious code A00 Explain, List, Match,
• Hacking State
• Nature / environment Identify, Suggest, State
• Theft
Malicious code
• is a threat to computing assets with the intention to cause damage.
• There are various kinds of malicious code.
• Example Trojan horse, logic door, trapdoor and backdoor, worm
Hacking
• is defined as unauthorised access to the computer system by a
hacker.
1.3.3 Apply the correct security P04 Use, How, List, State,
.2 procedures. P07 What
• Antivirus Use, How, List, State,
• Anti-Spyware What
• Cryptography
• Firewall
• Data backup
• Human aspects
antivirus
• protects computer against viruses
• identifies the infected file and remove its virus, worm or Trojan horse.
• If cannot be remove the infection, it often quarantines the infected file.
anti-spyware
• An application program used to remove spyware.
• Spyware is a program secretly collects information about the user
• Placed on a computer without the user’s knowledge.
• The spyware program gives the information to the outside source.
Cryptography
• is a process of hiding information by altering the actual information
into different representation.
• depend on a key such as a password like the numbers.
• or a phrase that can be used to encrypt or decrypt a message.
Data Backup
• is a program of file duplication.
• Backups of data applications are necessary so that they can be
recovered in case of an emergency.
Firewall
• is a piece of hardware or software which functions in a networked
environment to prevent some communications forbidden by the
security policy.
• It might permit limited access from in or outside the network
perimeters or from certain user or for certain activities.
Human aspects
• refer to the user and also the intruder of a computer system.
• It is one of the hardest aspects to give protection to.
• The most common problem is the lack of achieving a good information
security procedure.
1. Introduction
is at the beginning of the research
includes the objectives of the research
provides a clear statement on why the study was undertaken
includes the limitations/assumptions and analytical techniques
2. Content
consists of facts or arguments related to subject matter
can be presented in an argument format or just as an overview
3. Conclusion
is a review of content (not repetition of content)
relates to the statement of objectives in the introduction
should not introduce new issues
should contain judgment or decision that has been reached