Form 4 Lesson Notes Part 1.doc

download Form 4 Lesson Notes Part 1.doc

of 72

Transcript of Form 4 Lesson Notes Part 1.doc

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    1/72

    1 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON O NE : I NTRODUCTION OF I NFORMATION AND C OMMUNICATION T ECHNOLOGY (ICT)

    How our ancestor use to !s"erse !n#or$at!on to ot%ers&

    o In the early year of Tanah Melayu, when there was no television or ra io! The "#e u$% lay an im ortant role!

    o The 'ea man of the villa(e was the one who announce any news, )eit )irth, eath, time of rayers or even when the villa(e was in an(er!

    o *ifferent rhythms si(nifie ifferent events! The rhythm of the"#e u$% to announce eath was ifferent from the rhythm use toannounce rayers!

    '%at !s ICT&

    o ICT is the technolo(y re+uire for information rocessin(, in articular, the use of electronic com uters, communication evicesan software a lications to convert, store, rotect, rocess, transmitan retrieve information from anywhere, anytime!

    A ) In#or$at!on

    o Information refers to the $nowle (e o)taine from rea in(,investi(ation, stu y or research!

    o The tools to transmit information are the tele hone, television anra io!

    o e nee information to ma$e ecisions an to re ict the future! For e-am le, scientists can etect the formation of a tsunami usin( thelatest technolo(y an warn the u)lic to avoi isasters in the affecteareas!

    o Information is $nowle (e an hel s us to fulfill our aily tas$s! For e-am le, forecastin( the stoc$ e-chan(e mar$et!

    ) Co$$un!cat!on

    o Is an act of transmittin( messa(es! It is a rocess where)y informationis e-chan(e )etween in ivi uals usin( sym)ols, si(ns or ver)alinteractions!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    2/72

    . Form 4 Lesson Notes Part 1 ICT & Society

    o Previously, eo le communicate throu(h si(n or sym)ols, erformin( rama an oetry! ith the a vent of technolo(y, these"ol er% forms of communication are less utilise as com are to theuse of the internet, e/mail or vi eo conferencin(!

    C ) Tec%no*o+,

    o Is the use of scientific $nowle (e, e- erience an resources to create rocesses an ro uct that fulfill human nee s!

    o 0i in( Communication / tele hone an fa- machines are the evicesuse in e-ten in( communication

    o S rea in( Information To )roa cast information such as news or

    weather re orts effectively! 2a io, television, satellites an the orli e e) 3www are owerful tools that can )e use !

    T!$e*!ne For T%e De-e*o"$ent O# Tec%no*o+,

    Year Creat!on5677 #C Sumerians evelo e cuneiform writin(1677 #C The Phoenicians evelo e the al ha)et

    176 #C Tsai Lun of China invente a er 1464 The first rintin( )e(an with the creation of rintin(

    machine!1895 Tele(ra h line was invente1:8; The first tele hone was intro uce19.6 Television was ma e $nown to u)lic1941 Com uter was create

    196: Photoco ier machine was intro uce19;5 Communication satellite was intro uce19;9 The first internet $nown as 02P0N

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    3/72

    5 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'O : E .OLUTION OF C OM/UTER

    #efore the era of com uter )e(ins, countin( machine was invente to hel eo le with )usiness in ustry! The usa(e of countin( machine, )e(in as earlyas .77 #!C! ear Invention.77 #C Chinese 0)acus 3First countin( machine677 #C

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    4/72

    4 Form 4 Lesson Notes Part 1 ICT & Society

    4! New technolo(y was nee e in the invention of technolo(y! Thesetechnolo(ies area Aacuum tu)e an electronic tu)e a)out the siBe of li(ht )ul)s! It was

    use as the internal com uter com onents! Thousan s of them wereuse !

    ) Punche car use to store atac Ma(netic ta e intro uce in 1968! It is use to store ata! 0 faster

    an more com act metho of storin( ata!6! Pro)lems=

    a The vacuum tu)es (enerate (reat eal of heat causin( many ro)lemsin tem erature re(ulation an climate control!

    ) The tu)es )urnt out fre+uently!c Peo le o eratin( the com uter i not $now that the ro)lem was in

    the ro(rammin( machine!

    C Secon Generat!on (0156 4 0167)

    1! The secon (eneration com uter scientists invente somethin( new ue tolots of ro)lem create )y vacuum tu)es!

    .! The famous com uter scientists urin( the secon (eneration era were=a ?ohn #ar een

    ) alter 'ouser #rattainc illiam Shoc$ley

    5! The creation of transistor s ar$s the ro uction of secon (enerationcom uters! Transistor is a small evices use to transfer electronic si(nalacross a resistor!

    4! The a vanta(es of transistor=a Smaller than vacuum tu)es

    ) Nee no warm u timec Consume less ener(y

    @enerate much less heate Faster f More relia)le

    D T%!r Generat!on (0162 8 0190)

    1! I#M 587 series were intro uce in 19;4! It came in several mo els ansiBes! It is use for )usiness an scientific ro(rams!

    .! Dther com uter mo els intro uce were C*C 8;77, #E 677!5! New har ware technolo(y=a Silicone chi were manufacture in 19;1 at the silicone valley!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    5/72

    6 Form 4 Lesson Notes Part 1 ICT & Society

    ) Inte(rate circuit technolo(y, which ha re uce the siBe an cost of com uters! It is a com lete electronic circuit or a small chi of silicone which is also $nown as semicon uctor!

    c The ma(netic core memory was re lace )y microchi ! 3The first .65 )it 2am, )asis for the evelo ment of the 1 )it 2am !

    4! 0 vanta(es=a Silicone chi s were relia)le, com act an chea er!

    ) Sol har ware an software se arately which create the softwarein ustry!

    c Customer service in ustry flourishe 3reservation an cre it chec$s6! Software technolo(y=

    a More so histicate ) Several ro(rams run at the same time

    c Sharin( com uter resourcesSu ort interactive rocessin(

    E Fourt% Generat!on (0190 4 /resent)

    1! It too$ only 66 years for the 4th (enerations to evolve!.! The (rowth of the com uter in ustry evelo e technolo(ies of com uter

    inventions!5! There are many ty es of com uter mo els such as

    a 0 le Macintosh ) I#Mc *

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    6/72

    ; Form 4 Lesson Notes Part 1 ICT & Society

    9! 0 vanta(es=a 177 times smaller than

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    7/72

    8 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T HREE : U SAGE O F ICT IN D AILY L IFE

    Com uter lays maGor roles in our aily lives! e nee com uters to assists usin com letin( various tas$s an Go)s!0mon( the sector where ICT is use wi ely are=

    a! e ucation )! )an$in(c! in ustry

    ! )usiness

    A ) E ucat!on

    1! To ay, most schools an hi(her e ucation institution have com uter in theclassroom for teachers an stu ents!.! Com uter is use in the sector of e ucation )ecause they can offer

    a enhance learnin( ) co(nitive evelo mentc interactive e- eriences

    5! ser who )enefits area Teac%er Teacher uses com uters to research for teachin( materials,

    artici ate in online forums an online conferences as well as to aitheir teachin(!

    ) Stu ents Stu ents use the com uters as a reference tool! They usecom uters to )rowse the internet to loo$ for information

    c Researc%ers 2esearchers use com uters to collect an rocess ata!Sc%oo* a $!n!strators They use com uters for a ministrative

    ur oses to ma$e sure that the entire o eration runs smoothly!

    ) an;!n+

    1! The com uter is the nerve centre of the )an$in( system aroun the worl !It functions to control the entire )an$in( system that also inclu es"

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    8/72

    : Form 4 Lesson Notes Part 1 ICT & Society

    irect e osite ay )y hone systemf ersonal com uter )an$in(( internet )an$in(

    5! ser who )enefits area Custo$ers Customers can ma$e any transactions at the .4 hour service centres or via online! These services allowe them to otransaction at anytime they want!

    ) us!ness$en #usinessmen can save their time )y usin( the onlineservices offere )y )an$s! They can access com any accounts for loana lications, )usiness transactions an u ate on their cash flow atanytime

    c! an; a $!n!strators #an$ a ministrators can oversee the entire )an$in( activities such as reconciliations, inter/)ranch transaction3I#T , tele(ra hic transfer an others )y referrin( to the )an$in(system

    C ) In ustr,

    1! Com uters are use toa facilitate ro uction lannin( an control systems,

    ) to su ort chain mana(ementc to hel in ro uct esi(n in the in ustrial sector

    .! ser who )enefits area 'or;ers or$ers use com uters to analyBe an collect research ata

    for future reference! ) Researc%ers 2esearchers use com uters to analyBe an collect

    research ata for future reference!c! A $!n!strators 0 ministrators use com uters to oversee the entire

    o erations in the lant or factory to etect s ecific errors or efects thatoccurre in the rocess!

    D ) E8co$$erce

    a!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    9/72

    9 Form 4 Lesson Notes Part 1 ICT & Society

    .! ser who )enefits area Custo$ers Customers use com uters to )e connecte online with

    su liers to urchase ro ucts! This metho can save time an cost asthey o not have to (o any outlet!

    ) Su""*!ers Su liers use com uters to $ee trac$ of their transactions!0ll ro ucts are )ar co e an can )e rea )y the com uter scanner tohel in eterminin( rices an mana(in( inventory!

    c E$"*o,ees

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    10/72

    17 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON F OUR : C OM/UTERI

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    11/72

    11 Form 4 Lesson Notes Part 1 ICT & Society

    C ) In ustr,

    In ustr, e#ore ICT In ustr, a#ter ICT

    In ustry was slow )ecause

    everythin( was one manually antotally e en e on human la)or!

    Com uters an telecommunications

    in ustry )ecame very o ular an rofita)le since ro uction can )eincrease throu(h an all ay o erator!

    D ) Co$$erce

    1! Commerce is an activity of e-chan(in( an )uyin( an sellin( of commo ities in lar(e scale involvin( trans ortation from lace to

    lace!

    Co$$erce e#ore ICT Co$$erce a#ter ICT

    Tra in( was ma e usin( the )arter system an it was then later

    evelo e into currency!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    12/72

    1. Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON F I.E : I M/ACT OF ICT ON T HE SOCIETY

    ICT evelo ment has chan(e every as ect of the human society! It hasaffecte our life in many ways!

    A ) Faster co$$un!cat!on s"ee1! In the ast, it too$ a lon( time for any news or messa(es to )e sent! Now

    with the internet, news or messa(es are sent via e/mail to frien s, )usiness artners or to anyone efficiently!

    .! ith the ca a)ility of )an wi th, )roa )an an connection s ee on theinternet, any information can travel fast an at an instant! It saves time anis ine- ensive!

    ) Lower co$$un!cat!on cost

    1! sin( the Internet is cost/effective than the other mo e of communicationsuch as tele hone, mailin( or orea Service! It allows eo le to haveaccess to lar(e amounts of ata at a very low cost!

    .! ith the internet we o not have to ay for any )asic services rovi e )ythe Internet! Furthermore, the cost of connection to the internet isrelatively chea !

    C ) Re*!a *e $o e o# co$$un!cat!on

    1! Com uters are relia)le! ith the Internet we can access an retrieveinformation from anywhere an at anytime! This ma$es it a relia)le mo eof communication!

    .! 'owever, the in ut to the com uter is contri)ute )y the human! If theata ass throu(h the com uter is faulty, the result will )e faulty as well!

    This is relate to the form @I@D! @I@D is a short form for @ar)a(e In@ar)a(e Dut! It refers to the +uality of out ut ro uce accor in( to thein ut! Normally )a in ut ro uces )a out ut!

    D ) E##ect!-e s%ar!n+ o# !n#or$at!on

    1! ith the a vancement of ICT, information can )e share )y eo le allaroun the worl ! Peo le can share an e-chan(e o inions, news aninformation throu(h iscussion (rou s, mailin( lists an forums on theInternet! This ena)les $nowle (e sharin( which will contri)ute to the

    evelo ment of a $nowle (e/)ase society!.! Some e-am les of o ular iscussion (rou s on the Internet are=

    a Goo+*e Grou"s (www +oo+*e+rou"s co$) ) Ya%oo= Grou"s (www ,a%oo+rou"s co$)c! C*ass!c !scuss!on +rou"

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    13/72

    15 Form 4 Lesson Notes Part 1 ICT & Society

    E ) /a"er*ess en-!ron$ent

    1! ICT technolo(y has create the term a erless environment! This termmeans information can )e store an retrieve throu(h the i(ital me iuminstea of a er! Dnline communication via email, online chat an instant

    messa(es also hel s in creatin( the a erless environment!F ) or er*ess co$$un!cat!on

    1! Throu(h the internet, information an communication can )e )or erless!.! Internet offers fast information retrieval, interactivity, accessi)ility an

    versatility! It has )ecome a )or erless source for services an information!

    G ) Soc!a* "ro *e$s

    1! There are some ne(ative effects of ICT! It has create social ro)lems inthe society!.! Nowa ays, eo le ten to choose online communication rather than

    havin( real time conversations!5! Peo le ten to )ecome more in ivi ualistic an introvert theft, hac$in(,

    orno(ra hy an online (am)lin(! This will result in moral eca ent an(enerate threat to the society!

    H ) Hea*t% "ro *e$s

    1! 0 com uter may harm user if they use it for lon( hours fre+uently!.! Com uters users are also e- ose to )a osture, eyestrain, hysical an

    mental stress!5! In or er to solve the health ro)lems, an er(onomic chair can re uce )ac$

    strain an a screen filter is to minimiBe eyestrain!

    Su$$ar,

    1! The a vanta(es of ICT in the society=a! faster s ee of communication )! lower communication costc! relia)le mo e of communication ! effective sharin( of informatione! a erless environment f! )or erless communication(! ur(in( for research an evelo ment of new ro uctsh! (oo com etition amon( the ro ucers

    .! The isa vanta(es of ICT in the society=a! social ro)lems )! health ro)lems

    c! chan(in( eo les attitu e an eman

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    14/72

    14 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON S I> : C OM/UTER E THICS

    A ) Et%!cs !n +enera*

    1! e often see irate C*s, software an AC* )ein( sol at the ni(ht

    mar$et! #uyin( irate software is an e-am le of unethical activity incom uter ethic!

    .! 0 (ui eline is nee e to sto the current technolo(y ro ucts from )ein(e- loite , for e-am le )y re licatin( ori(inals C*s an sellin( them as

    irate software! This unethical )ehavior can )e controlle )y the co e of con ucts!

    5! n er the Malaysia Co yri(ht act 19:8, any in ivi ual char(e with iracywill )e fine u to 17,777 for each co y or u to 6 years im risonment or

    )oth!4! Com uter ethics is a system of moral stan ar s or values use as a

    (ui eline for com uter users!

    ) T%e ten co$$an $ents o# co$"uter et%!cs

    1! The nite States Institute of Com uter

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    15/72

    16 Form 4 Lesson Notes Part 1 ICT & Society

    C ) Gu! e*!nes on t%e e8$a!* an Internet usa+e

    1! The *e artment of Pu)lic Services of Malaysia has rovi e (ui elines onthe e/mail an Internet usa(e as reference to the staff!

    .! This (ui ance covers the usa(e of e/mail account, mail)o- maintenance, e/

    mail re aration an elivery, mailin( list an the Internet!5! Some (ui elines from the *e artment of Pu)lic Services of Malaysia=

    a se only in ivi ual e/mail a ress to forwar in ivi ual o inion! ) ee the i entity name an asswor a secret to avoi the misuse of

    your e/mail without your $nowle (e!c

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    16/72

    1; Form 4 Lesson Notes Part 1 ICT & Society

    involvement in stealin( softwaree invasion of rivacy

    5! ith the a vancement of ICT, it is easy for anyone to retrieve your information from the Internet! >ou may release that when you fill a form

    on the Internet, your information may )e e- ose an stolen!4! evin *avi Mitnic$ was a famous hac$er! 'e accesse com uterswithout authoriBation! 'e e rive the rivacy of many in ivi uals )yhac$in( into networ$ of a few com anies! 'e also mana(e to (etvalua)le ata unethically for his own usa(e!

    E ) Et%!ca* co$"uter co e o# con ucts

    1! 'ave you ever as$ for ermission to ownloa materials from the internetsuch as music, articles, (ra hic an other material! If you have, you arefollowin( the com uter co e of con ucts! There are many we) sites withrestriction where the u)lic is allowe to use their material! sers mayhave to ay royalty to the owner or +uote the we)site in their assi(nmentor roGect, in or er to )e a)le to use this material!

    .!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    17/72

    18 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON SE.EN : T HE D IFFERENCES ET'EEN E THICS AND L A'S

    A ) De#!n!t!on o# Et%!cs

    1! In (eneral, ethics is a moral hiloso hy where a erson ma$es a s ecificmoral choice an stic$s to it!

    .! Dn the other han , ethics in com utin( means moral (ui elines to refer towhen usin( the com uter an com uter networ$s! This inclu es theInternet!

    ) De#!n!t!on o# Law

    1! Law is a le(al system com risin( of rules an rinci les that (overn theaffairs of a community an controlle )y a olitical authority!

    .! Law iffers from one country to another! In the era of technolo(y,com uter law is nee e to clarify (oo s or actions that fall un er thecom uter law! Com uter law refers to all areas in law that re+uires anun erstan in( of com uter technolo(y such as har ware, software anInternet!

    5!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    18/72

    1: Form 4 Lesson Notes Part 1 ICT & Society

    5! 2es ectin( ro ertyPro erty here means ownershi ! Since an in ivi ual ata an informationare consi ere as ro erty, therefore, an act of tam erin( an chan(in(electronic information is consi ere as van alism an isres ect for other

    eo le%s ro erty!D ) S!$!*ar!t!es etween Et%!cs an Law

    1! #oth ethics an law are com limentary to each other an are ma ea! to (ui e user from misusin( com uters )! to create a healthy com uter society, so that com uters are use to

    contri)ute to a )etter life!

    c to revent any crime!

    E ) D!##erences etween et%!cs an *aws

    Et%!cs Law1! @ui eline

    0s a (ui eline to com uter users1! Control

    0s a rule to control com uter users!

    .! Moral stan ar

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    19/72

    19 Form 4 Lesson Notes Part 1 ICT & Society

    Et%!cs Law Not honorin( com uter ethicsmeans i(norin( the moral elements3immoral !

    Not honorin( the law meanscommittin( a crime

    F ) Unet%!ca* -s *aw rea;!n+ con ucts

    Unet%!ca* Law rea;!n+1! sin( the office com uter to o

    ersonal thin(1! Sen in( a com uter virus via

    e/mail.! 2ea in( your frien %s e/mail without

    his or her ermission!.! 'ac$in( into your school

    ata)ase to chan(e your

    e-amination results!5! Pla(iarisin( an usin( materials from

    the Internet for your classassi(nments without (ivin( cre its tothe ori(inal author!

    5! Sellin( irate software in ani(ht mar$et!

    Su$$ar,

    1!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    20/72

    .7 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON E IGHT : I NTELLECTUAL / RO/ERTY R IGHTS

    It is im ortant to have your creation atente to rotect your ri(hts!2e ro ucin( other eo le%s inventions without their ermission or iracy isille(al! e must res ect the ri(hts of others!

    A ) De#!n!t!on o# Inte**ectua* /ro"ert,

    1! Intellectual Pro erty 3IP refers to wor$s create )y inventors, authors anartists! Those wor$s are uni+ue an have value in the mar$et value!

    .! In our aily lives, we are surroun e )y thin(s that are rotecte )y IP!>our school )a(s, your shoes an even your soc$s are rotecte )yIntellectual Pro erty 2i(hts! Ni$e, #ata or 0 i as, for e-am le, are all

    rotecte )y a (rou of le(al ri(hts!

    ) Inte**ectua* /ro"ert, Law

    1! Intellectual ro erty an intellectual ro erty ri(ht can )e rotecte un er the Intellectual Pro erty Law!

    .! Intellectual Pro erty Laws cover i eas, inventions, literary creations,uni+ue names, )usiness mo els, in ustrial rocesses, com uter ro(ram

    co es an more!C ) In-ent!ons /rotecte , Inte**ectua* /ro"ert, Laws

    1! 0s )usinesses continue to e- an (lo)ally, )usiness owners must realiBethe im ortance of (ettin( rofessional a vice on how to esta)lish ansafe(uar their intellectual ro erty ri(hts!

    .! This inclu es Tra emar$s, Service mar$s, Tra eKCom any names, *omainnames, @eo(ra hical in ications, Co yri(hts, Patents!

    5!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    21/72

    .1 Form 4 Lesson Notes Part 1 ICT & Society

    o It is a (rant of a ro erty ri(ht to the inventor! For e-am le! Centrinois a rocessor which intro uce efficient ower mana(ement! The

    esi(n of the rocessor is atente )y Intel!

    .! tra e$ar;s for )ran i entityo

    or s, names, sym)ols, evices an ima(es that re resent ro ucts,(oo s or serviceso Tra emar$s for )ran s, i entity of (oo s an services allowe the

    istinction to )e ma e )etween ifferent tra ers! For e-am le= Intelan 0M*!

    5! es!+ns for ro uct a earanceo The features of, in articular, the lines, contours, colours, sha e,

    te-ture or material of the ro uct itself or its ornaments!o The esi(n for ro uct a earance covere the whole or a art of a

    ro uct resultin( from the feature such as the lines, contours, colours,sha e, te-ture or material! For e-am le= 0 le IM0C!

    4! co",r!+%t for materialo Literary an artistic material, music, films, soun recor in(s an

    )roa cast, inclu in( software an multime ia!o Co yri(hts rotect the e- ression of i ea in literary, artistic an

    musical wor$s! For e-am le, you can co yri(hts the we) content youhave Gust esi(ne !o Co yri(hts (ive the hol er some e-clusive ri(hts to control the

    re ro uction of wor$s of authorshi , such as )oo$s an music for acertain erio of time!

    Su$$ar,

    1! Intellectual Pro erty 3IP refers to wor$ create )y investors, authors anartists!

    .! Intellectual Pro erty 2i(hts are ri(hts to which creators are entitle to for their inventions, writin(s an wor$s of art!

    5! Intellectual Pro erty Laws cover i eas, inventions, literary creations,uni+ue names, )usiness mo els, in ustrial rocesses an com uter

    ro(ram co es from )ein( mani ulate )y eo le other than the owner!4! hy o we nee intellectual ro erty lawJ

    o To a reciate other har wor$s an ener(yo To safe(uar one ro ertyo To rotect human relationshi

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    22/72

    .. Form 4 Lesson Notes Part 1 ICT & Society

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    23/72

    .5 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON N INE : / RI.ACY IN C OM/UTER U SAGE

    e shoul res ect other eo le%s rivacy )y not inva in( their ersonal lives!Peo le treasure rivacy as there are some thin(s that they o not wish to

    isclose to others! The same (oes for rivacy in ICT!

    A ) '%at !s "r!-ac,&1! Privacy in IT refers to ata an information rivacy!.! *ata refers to a collection of raw un rocesse facts, fi(ures an sym)ols!

    Then, com uter is use to rocess ata into information! In (eneral, atainclu e te-ts, num)ers, soun s, ima(es an vi eo!

    5! Information rivacy is escri)e as the ri(hts of in ivi uals ancom anies to eny or restrict the collection an use of information a)outthem!

    ) 'a,s co$"uter tec%no*o+, t%reaten our "r!-ac,1! 'ow oes com uter technolo(y threaten the rivacy of our ataJ It is one

    throu(h=a! Coo$ies

    o are use to i entify users )y we) castin(, e/commerce an other we) a lications!

    o contain user information an are save in the com uter har is$!o are use )y some we)sites to store asswor s an trac$ how

    re(ularly we visit a we)site, that%s how we )ecome otentialtar(ets for we) a vertisers!

    o ena)le we) sites to collect information a)out your online activitiesan store them for future use, then the collecte etails will )esol to any com any that re+uests for it!

    )!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    24/72

    .4 Form 4 Lesson Notes Part 1 ICT & Society

    o Communicates information it collects to some outsi e sourcewhile we are online!

    .! Com uter technolo(y threatens our rivacy throu(h electronic rofilin(!For e-am le, when we fill out a form such as a ma(aBine su)scri tion,

    urchasin( ro ucts or contest entry form on the Internet, this ata is $e tin the ata)ase! It will inclu e a(e, a ress, marital status an other

    ersonal etails!5!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    25/72

    .6 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T EN : A UTHENTICATIONS

    A ) '%at !s aut%ent!cat!on&

    1! 0uthentication is a rocess where users verify that they are who they saythey are! The user who attem ts to erform functions in a system is in factthe user who is authoriBe to o so!

    .! For e-am le, when you use an 0TM car , the machine will verify thevali ation of the car ! Then, the machine will re+uest for a in num)er!This is where the authentication ta$es lace!

    ) Met%o s o# Aut%ent!cat!on

    5! There are two commonly use authentication metho s, which are )iometric evice an call)ac$ system!

    4! #iometric evice is a evice that translates ersonal characteristics into ai(ital co e that is com are with a i(ital co e store in the ata)ase!

    6! Call)ac$ system refers to the chec$in( system that authenticates the user!

    I ent!#!cat!on/ resent what the user has 3e!(! smart car

    I ent!#!cat!on/ resent what the user is 3e!(! )iometric

    Aerification/ verify the vali ity of

    the I*

    0uthentication/ authenticate who the

    user is

    Access +rante

    Accessen!e

    Not vali 3F

    True

    False

    Aali 3T

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    26/72

    .; Form 4 Lesson Notes Part 1 ICT & Society

    C ) !o$etr!c e-!ces

    The e-am les of )iometric evices are

    a! Fin(er rint reco(nition

    o 0 e icate fin(er rint rea er is attache to a com uter an ta$es theima(e ata from the scanner an sen s it to the ata)ase! The user isusually re+uire to leave his fin(er on the rea er for less than 6secon s urin( which time the i entification or verification ta$es

    lace! The ata receive is com are to the information store withinthe ata)ase!

    o In or er to revent fa$e fin(ers from )ein( use , many )iometricsfin(er rint systems also measure )loo flow, or chec$ for correctlyarraye ri (es at the e (es of the fin(ers!

    o This authentication metho is accurate an cost effective!

    )! Facial 2eco(nition

    o Facial reco(nition analyses the recor e information of istance )etween eyes, nose, mouth an Gaw e (es of an in ivi ual s faceima(es ca ture throu(h a i(ital vi eo camera!

    o Facial reco(nition is wi ely use , toute as a fantastic system for reco(niBin( otential threats 3whether terrorists, scam artists, or $nown criminals !

    o #ut so far, it has )een un roven in hi(h level usa(e! It is currentlyuse in the verification only system with a (oo eal of success!

    o The accuracy is fair an the cost involve for this metho is reasona)le!

    c! 'an @eometry Scannin(

    o 'an scannin( involves the measurement an analysis of the sha e of one s han !

    o It is a fairly strai(ht forwar roce ure an it is sur risin(ly accurate!o 0lthou(h it re+uires s ecial har ware to use, it can )e easily inte(rate

    into other evices or system!o nli$e fin(er rints, the human han is not uni+ue! In ivi ual han

    features are not escri tive enou(h for i entification!o It is ossi)le to revise a metho )y com)inin( various in ivi ual

    features an measurements of fin(ers an han s for verification ur oses!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    27/72

    .8 Form 4 Lesson Notes Part 1 ICT & Society

    ! Iris Scannin(

    o Iris scannin( analyses the features that e-ist in the coloure tissuessurroun in( the u il which has more than .77 oints that can )e use

    for com arison, inclu in( rin(s, furrows an frec$les!o The scans use a re(ular vi eo camera an can )e one from further away than a retina scan!

    o It will wor$ erfectly fine throu(h (lasses an in fact has the a)ility tocreate an accurate enou(h measurement that it can )e use for i entification ur oses!

    o The accuracy of this metho is e-cellent while the cost involve ishi(h!

    e! 2etina Scannin(

    o 2etina )iometrics involves the scannin( of retina an analyBin( thelayer of )loo vessels at the )ac$ of the eye!

    o 2etina scannin( involves usin( a low intensity li(ht source an ano tical cou ler an can rea the atterns at a (reat level of accuracy!

    o 2etina scannin( re+uires the user to remove (lasses, lace their eyeclose to the evice an focus on a certain oint!

    o hether the accuracy can overwei(ht the u)lic iscomfort is yet to )e seen!

    o The accuracy in retina scannin( is very (oo an the cost involves isfair!

    f! Aoice 2eco(nition

    o Aoice reco(nition system com ares a erson s live s eech with their store voice attern!

    o Aoice reco(nition )iometrics re+uires users to s ea$ into amicro hone! hat he s ea$s can )e his asswor or an access hrase!

    o Aerification time is a ro-imately 6 secon s! To revent recor evoice use, most voice reco(nition evices re+uire the hi(h an lowfre+uencies of the soun to match, which is ifficult for manyrecor in( instruments to recreate well! 0lso, some evices (enerateran om num)er of se+uences for verification!

    o The accuracy in voice reco(nition is fair an the cost involve is veryreasona)le!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    28/72

    .: Form 4 Lesson Notes Part 1 ICT & Society

    (! Si(nature Aerification System

    o Si(nature Aerification System reco(niBes the sha e of your han written si(nature, as well as measurin( the ressure e-erte anthe motion use to write the si(nature!

    o

    Si(nature Aerification System uses s ecial en an ta)let!o 0fter re/ rocessin( the si(nature, several features are e-tracte !o The authenticity of a writer is etermine )y com arin( an in ut

    si(nature to a store reference set 3tem late consistin( of threesi(natures!

    o The similarity )etween an in ut si(nature an the reference set iscom ute usin( strin( matchin( an the similarity value is com areto a threshol !

    o The accuracy in Si(nature Aerification System is fair an the costinvolve is e-cellent!

    D ) Ca** ac; S,ste$

    o The call)ac$ system is commonly use in the )an$ o eration an )usiness transaction!

    o For e-am le, when you )oo$ for the ta-i services, the o erator will

    as$ you to han( u an she will call you )ac$ to confirm for theservice re+uire !

    E ) '%, !s aut%ent!cat!on !$"ortant&

    0uthentication is im ortant in or er to safe(uar a(ainst the unauthoriBeaccess an use!

    Su$$ar,

    1! 0uthentication is a rocess where users verify that they are who theysay they are!

    .! There are . commonly use authentication metho s, which are )iometric evice an call)ac$ system!

    5! #iometric evice is a evice that translates ersonal characteristicsinto a i(ital co e that is com are with a i(ital co e store in the

    ata)ase!

    4! Call)ac$ system refers to the chec$in( system that authenticates theuser!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    29/72

    .9 Form 4 Lesson Notes Part 1 ICT & Society

    6! 0uthentication is im ortant in or er to safe(uar a(ainst theunauthoriBe access an use!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    30/72

    57 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON E LE.EN : . ERIFICATION

    A ) '%at !s -er!#!cat!on&

    Aerification is the act of rovin( or is rovin( the correctness of a system withres ect to a certain formal s ecification

    ) Met%o s o# -er!#!cat!on

    1! There are two metho s, commonly use in verification, which are user i entification an rocesse o)Gect!

    .! ser i entification refers to the rocess of vali atin( the user!

    5! Processe o)Gect refers to somethin( the user has such as i entificationcar , security to$en an cell hone!

    C ) User ! ent!#!cat!on

    The e-am les of vali atin( rocess usin( the user i entification are=1! ey in the user name to lo(/in to a system an the system will verify

    whether the user is vali or invali user!.! Show e-am sli to verify that you are the vali can i ate for the e-am!5! Show a ass ort )efore e arture!

    I ent!#!cat!on/ resent what the user has 3e!(! smart car

    I ent!#!cat!on/ resent what the user is 3e!(! in num)er

    Aerification/ verify the vali ity ofthe I*

    Access +rante Accessen!e

    Not vali 3F

    Aali 3T

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    31/72

    51 Form 4 Lesson Notes Part 1 ICT & Society

    D ) /rocesse o ?ect

    The e-am les of vali atin( rocess usin( the rocesse o)Gect are=1! The oliceman will chec$ on the river%s license to i entify the vali

    river!.!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    32/72

    5. Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'EL.E : C ONTRO.ERSIAL C ONTENT

    A ) Contro-ers!a* content

    0 controversial content is information that causes isa(reement ino inions an may cause the isru tion of eace )ecause ifferent eo le or culture will have ifferent views a)out the contents

    ) Issues on contro-ers!a* contents

    o The issues on controversial contents are always focusin( on orno(ra hy an slan er! Malaysia consi ers orno(ra hy an slan er as ille(al!

    o Porno(ra hic an slan erous activities can )e in the forms of lots anactions is laye on vi eo (ames, controversial rhythm or lyrics of music, controversial contents of )oo$s an controversial issues onreli(ion an hiloso hy!

    C ) /orno+ra"%,

    o Cute ictures of innocent )a)ies can%t )e consi ere as orno(ra hy

    )y normal stan ar s! 'owever these ictures may attract "ae o"%!*es !Pae o hiles are eo le who are se-ually arouse )y youn( chil ren!They e- loit chil ren for se-ual leasure! Se-ual acts a(ainst chil renare a crime everywhere an must )e cur)e ! These ictures are

    orno(ra hy to ae o hiles!o The efinition of orno(ra hy is any form of me ia or material 3li$e

    )oo$s or hoto(ra hs that e icts erotic )ehaviour an is inten e tocause se-ual e-citement!

    o

    Porno(ra hy ten s to e- loit men, women an chil ren in a istastefulmanner

    D ) S*an er

    o Slan er is a le(al term for false an malicious statement 3meanin($nowin( that it is false or Hrec$less isre(ar that it was false a)outsomeone!

    o

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    33/72

    55 Form 4 Lesson Notes Part 1 ICT & Society

    i! >ou wrote an e/mail that a fellow classmate was havin( an affair with a teacher, even thou(h it was not true! >ou then sent it to fiveother frien s!

    ii! 0hma is a Muslim! Dne ay, he receive a Hs am e/mail statin(that his favourite so a rin$ HSo a Mo a uses non/halal foocolourin(, )ut he oes not $now if the source of the content iscre i)le or true! 'e eci es to forwar the e/mail to 67 of hisfrien s!

    iii! Chin ei s rea s a rumour that a @overnment Minister isreceivin( )ri)es from an enemy (overnment!

    E ) I$"acts On Ma*a,s!an Soc!et,

    /orno+ra"%, S*an er1! Can lea to criminal acts such

    as e- loitation of women anchil ren

    1! Can evelo into a societythat isre(ar s honesty an truth!

    .! Can lea to se-ual a ictionor erversion!

    .! Can evelo )a ha)it of s rea in( untruths an rumours!

    5! Can evelo low moral valuetowar s other men, women or

    chil ren!

    5! Can lea to unnecessaryar(ument!

    4! Can ero e (oo reli(ious,cultural an social )eliefs an

    )ehaviour!

    4! Can cause eo le to havene(ative attitu es towar s another

    erson!

    Su$$ar,

    1! Controversial content is the information that causes is ute amon( eo lewith ifferent )eliefs an values!

    .! Controversial contents such as slan er an orno(ra hy can (ive effect tothe society in the followin( manner!

    a Causes ar(uments an +uarrels ) Can harm re utation of eo le!c Lowers moral )ehaviour

    May e- loit men, women an chil rene Can lea to se-ual a iction an crimesf

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    34/72

    54 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T HIRTEEN : T HE / ROCESS OF I NTERNET F ILTERING

    A ) Internet #!*ter!n+

    o Internet orno(ra hy olitically incorrect sites, hatre sites an manyother mislea in( an controversial contents are at lar(e in theinformation su er hi(hway! Internet has )ecome more accessi)le toanyone!

    o It is our res onsi)ility to ensure that the teena(ers are rotecte fromthese corru tions of the min )y filterin( access to the Internet!

    o Internet filterin( is a rocess that revents or )loc$s access to certainmaterials on the Internet!

    o Filterin( is most commonly use to revent chil ren from accessin(ina ro riate material an to $ee em loyees ro uctive on theInternet!

    ) Contro* access to t%e Internet

    1! The current referre metho of choice to limit access on the Internetis to filter content either )y

    a @e,wor *oc;!n+

    i! ses a list of )anne wor s or o)Gectiona)le termssuch as the wor Hse- an H enis !

    ii! 0s the a(e is ownloa in(, the filter searches for anyof these wor s! If foun , it will )loc$ the a(e com letely,sto ownloa in( the a(e, )loc$ the )anne wor s aneven shut own the )rowser!

    iii! "@e,wor *oc;!n+ /rocess %

    iv!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    35/72

    56 Form 4 Lesson Notes Part 1 ICT & Society

    an Penistone! The wor )reast will also )loc$ searches for reci es usin( chic$en )reast!

    S!te *oc;!n+i! This software is more so histicate than wor

    )loc$in( as it involve eo le visitin( the site anevaluatin( them!

    ii! This metho com iles a list a " u)ious Internet sites%which the software then can revent eo le from accessin(it!

    iii! "*enial list% re(ularly u ate an can )eautomatically ownloa e to the software urchaser!

    iv! Some e-am le of " u)ious Internet sites% are

    www!---!-om , www! o$er!com , www! orn!com v! S!te *oc;!n+ "rocessB

    vi! The lists are often or(aniBe into cate(ories of information! For e-am le= activist (rou , se-uality anlifestyle!

    vii! sers then can have control on what they )loc$e anon%t )loc$!

    viii! 'owever, there are concerns on what (oes on the" enial list%! These lists are sensitive commercialinformation an com anies are conse+uently often notwillin( to ma$e them availa)le! It is unrealistic that asoftware com any is a)le to $ee trac$ of the whole of theInternet!

    i-! Filters can use )oth site )loc$in( an wor )loc$in(!-! This coul catch the sites that are on the )loc$e list

    c 'e Rat!n+ S,ste$i! e) sites are rate in terms of nu ity, se-, violence

    an lan(ua(e!

    T e 2L

    2L chec$s for )loc$e

    0ccess 0ccess

    Falseee True

    http://www.xxx.xom/http://www.poker.com/http://www.porn.com/http://www.xxx.xom/http://www.poker.com/http://www.porn.com/

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    36/72

    5; Form 4 Lesson Notes Part 1 ICT & Society

    ii! The 2ecreational Software 0 visory Council or 2S0CI is res onsi)le for the ratin( of the Internet!

    iii! 'e Rat!n+ S,ste$B

    o The a(es are rate accor in( to their content either )ythe we) a(e author or )y the in e en ent )ureau!

    o The ratin( is either em)e e in the we) a(e itself or access to the we) is mana(e throu(h the )ureau!

    o #rowsers set to only acce t a(es with certain levels of ratin(s! For e-am le= artial nu ity, mil e- letives,innocent $issin( an romance an s orts violence!

    o 0ny a(e with ratin( a)ove this level will not )e acce teor viewa)le! 2atin(s li$e this have )een ta$en out at ahi(h level )y olitician )ut o)viously very few a(es have

    )een rate an so its value is still )ein( eci e !o 0(ain, there are issue, who eci e the ratin(s an how

    they Gu (e the criteria! For e-am le= 'ow o you eci ewhat mil e- letives or mo erate e- letives areJ Dr how

    o you ta$e into account the cultural ifferencesJ.! Controllin( access to the Internet )y means of filterin( software has

    )ecome a (rowin( in ustry in Malaysia an elsewhere!5! Its use has )ecome as the man atory res onse to the current lace of

    society mainly internet orno(ra hy, olitically incorrect sites, hatre ,violent, hate an in (eneral anythin( ue to )e threatenin( or un leasant!

    4! These metho re+uire software to )e install at a client or server level!

    Su$$ar,

    The rocess of internet filterin( throu(h several ways which are1! 2eferre to )y the 2Ls.! #y usin( a lar(e set of $eywor s to revent accessin( sites that contain

    one or more of the wor s!

    Software com anies rate we)sites

    Content to )e accesse allowe we)sites

    0ccess (rante 0ccess enie

    False True

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    37/72

    58 Form 4 Lesson Notes Part 1 ICT & Society

    5! 2ate s ecific we)siteso 2atin( either one )y we) a(e author or )y in e en ent )ureau!o #rowsers set to only acce t a(es with certain levels of ratin(s!

    L ESSON F OURTEEN : C Y ER L A'

    The ra i evelo ment an im lementation of the information ancommunication technolo(y ICT can result in the a)use of the orl i e

    e), a service which is rovi e )y the internet! Information an ata)ase inthe Internet nee s to )e rotecte an secure a(ainst a)uses! The security an

    rivacy of the ata on the Internet is rovi e )y Cy)er Law!

    A ) '%at !s C, er Law&o Cy)er Law refers to any laws relatin( to rotectin( the Internet an

    other laws relatin( to rotectin( the Internet an other onlinecommunication technolo(ies!

    ) Nee s For C, er Lawo In the recent years, many concerns an issues were raise on the

    inte(rity an security of information, le(al status of onlinetransactions, rivacy an confi entiality of information, intellectual

    ro erty ri(hts an security of (overnment ata lace on the Internet!o

    These concerns an issues clearly in icate why Cy)er Laws arenee e in online activities!

    C ) T%e C, er Law Acts !n Ma*a,s!ao The Malaysian @overnment has alrea y asse several Cy)er Laws to

    control an re uce the Internet a)use!o These Cy)er Laws inclu e=

    a! *i(ital Si(nature 0ct 1998

    i! The *i(ital Si(nature 0ct 1998 secures electroniccommunication es ecially on the Internet!ii! *i(ital Si(nature is an i entity verification stan ar that uses

    encry tion techni+ues to rotect a(ainst e/mail for(ery! Theencry te co e consists of the user%s name an a hash of allthe arts of the messa(es!

    iii! #y attachin( the i(ital si(nature, one can ensure that no)o ycan eaves ro , intersect or tam er with transmitte ata!

    )! Com uter Crimes 0ct 1998i! The com uter crimes 0ct 1998 (ives rotection a(ainst the

    misuses of com uters an com uter criminal activities such as

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    38/72

    5: Form 4 Lesson Notes Part 1 ICT & Society

    criminal activities unauthoriBe use of ro(ramme, ille(altransmission of ata or messa(es over com uters an hac$in(an crac$in( of com uter systems an networ$s!

    ii! #y im lementin( Com uter Crimes 0ct 1998 users can rotect their ri(hts to rivacy an )uil trust in the com uter system! 0t the same time, the (overnment can have control ata certain level over the Cy)er S ace to re uce Cy)er Crimeactivities!

    c! Teleme icine 0ct 1998i! The Teleme icine 0ct 1998 ensures that only +ualifie

    me ical ractitioners can ractice the teleme icine an thattheir atients% ri(hts an interest are rotecte !

    ii! These acts rovi e the environment for the future

    evelo ment an elivery of healthcare in Malaysia!! Communications an Multime ia 0ct 199:i! The im lementation of Communication an

    Telecommunication 199: ensures that information is secure,the networ$ is relia)le an the service is affor a)le all over Malaysia!

    ii! This act also ensures hi(h level of user%s confi ence in theinformation an communication technolo(y in ustry!

    o #esi es these Cy)er Laws, there are three other Cy)er Laws )ein(rafte

    i! Private *ata Protection #illii!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    39/72

    59 Form 4 Lesson Notes Part 1 ICT & Society

    ii The

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    40/72

    47 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON F IFTEEN : C OM/UTER C RIMES

    Nowa ays, we foun that many eo les are sellin( irate com uter softwareto customers at a much chea er rice than the ori(inal C*s! *o you thin$ thisis a criminal act or Gust a way of oin( )usinessJ

    COM/UTER CRIMES

    1! 0 com uter crime is efine as any criminal activity that is relate tothe use of com uters!

    .! 0ny ille(al act involvin( a com uter is referre as a com uter crime!5! These activities inclu e com uter frau , co yri(ht infrin(ement,

    com uter theft an com uter attac$!

    A COM/UTER FRAUD1! Com uter frau is efine as havin( an intention to ta$e a vanta(e

    over or causin( loss to other eo le, mainly on monetary )asis throu(hthe use of com uters!

    .! There are many forms of com uter frau which inclu e e/mail hoa-es, ro(ram frau , investment schemes, sales romotion, claims of e- ertise on certain fiel , health frau s, scams an hac$in(!

    CO/YRIGHT INFRINGEMENT1! Co yri(ht infrin(ement is efine as a violation of the ri(ht secure

    )y a co yri(ht!.! Co yri(ht infrin(ement involves ille(al co yin( or re ro uction of

    co yri(ht materials )y the )lac$ mar$et (rou s!5! The o en commercial sale of irate items is also ille(al! Co yri(ht

    infrin(ement involves ille(al co yin( or re ro uction of co yri(ht4! ith the current technolo(y, the most erfect co y of the ori(inal

    co yri(ht materials can )e ownloa e from the Internet!6! For e-am le, the wi es rea of ille(al ownloa in( activities ansharin( of recor e music in MP5 format! 0lso the unauthoriBeco yin( of movies even after the closin( own of Ne ster!

    C COM/UTER THEFT

    1! Com uter Theft is efine as the unauthoriBe use of another erson%s ro erty with the intention to eny the owner the ri(htful

    ossession of that ro erty or its use!.! Insurance com anies an ru( com anies have access to rivate me ical recor s! These me ical recor s can )e use to

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    41/72

    41 Form 4 Lesson Notes Part 1 ICT & Society

    etermine the a)ility of em loyees to (et an insurance olicy! Theru( com anies may then sell an share the information with other

    com anies!5!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    42/72

    4. Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON S I>TEEN : C OM/UTER SECURITY

    DEFINITION OF COM/UTER SECURITY

    1! Com uter security means rotectin( our com uter systems an theinformation they contain a(ainst unwante access, ama(e,estruction or mo ification!

    .! e nee to rotect our com uter from any intru er such as hac$ers,crac$ers an scri t $i ies!

    5! e o not want stran(ers to rea our email, use our com uter to attac$ other systems, sen for(e e/mail from our com uter, or e-amine

    ersonal information store on our com uter such as financialstatements!

    TY/ES OF COM/UTER SECURITY

    Three ty es of com uter security area! har ware security

    )! software securityK ata securityc! networ$ security

    HARD'ARE SECURITY1! 'ar ware security refers to security measures use to rotect the

    har ware s ecifically the com uter an its relate ocuments!.! The e-am les of security measures use to rotect the har ware

    inclu e PC/loc$s, $ey)oar /loc$, smart car s an )iometric evices!5! #esi es these Cy)er Laws, there are three other Cy)er Laws )ein(

    rafte

    SOFT'ARE AND DATA SECURITY1! Software an ata security refers to the security measures use to

    rotect the software an the loss of ata files!.!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    43/72

    45 Form 4 Lesson Notes Part 1 ICT & Society

    NET'OR@ SECURITY

    1! The transfer of ata throu(h networ$ has )ecome a common racticean the nee to im lement networ$ security has )ecome si(nificant!

    .! Networ$ security refers to security measures use to rotect the

    networ$ system!5! Dne e-am le of networ$ security measures is firewall! ith firewall,networ$ resources can )e rotecte from the outsi ers!

    /ERSONAL COM/UTER SECURITY CHEC@LIST

    In or er to ma$e sure our com uters are secure , here are the com uter security chec$lists to follow!

    a *o not eat, rin$ or smo$e near the com uter!

    ) *o not lace the com uter near o en win ows or oors!c *o not su)Gect the com uter to e-treme tem eratures!Clean the e+ui ment re(ularly!

    e Place a ca)le loc$ on the com uter!f se a sur(e rotector!( Store is$s ro erly in a loc$ container!h Maintain )ac$u co ies of all files!i Stores co ies of critical files off sites!

    G Scan a flo y is$ )efore you o en it!$ *o not o en any un$nown email receive !

    SUMMARY

    1! Com uter security is a rocess of reventin( an etectin(unauthoriBe use of the com uter!

    .! There are three ty es of com uter, which are har ware security,softwareK ata security an networ$ security!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    44/72

    44 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON SE.ENTEEN : I NTRODUCTION T O SECURITY T HREATS

    1! The com uter is a (reat tool to store im ortant information! In certaincases the information is very vital that losin( it will harm the com uter system!

    .! Com uter threats can come from many ways either from human or naturalisaster! For e-am le, when someone is stealin( your account information

    from a truste )an$, this threat is consi ere as a human threat! 'owever,when your com uter is soa$e in heavy rain, then that is a natural isaster threat!

    5! @enerally, security threats inclu e malicious co e, hac$in(, naturalenvironment an theft!

    A MALICIOUS CODE1! Malicious co e is also $nown as a rou(e ro(ram! It is a threat to

    com utin( assets )y causin( un esire effects in the ro(rammer%s art! The effect is cause )y an a(ent, with the intention to cause

    ama(e!

    .! The a(ent for malicious co e is the writer of the co e or any ersonwho causes its istri)utions!

    5! There are various $in s of malicious co e! They inclu eo -!rus

    Airus is a ro(ram that can ass on the malicious co eto other non/infecte ro(rams )y mo ifyin( them!

    To infect a com uter, the virus nee s to attaches itself to the ro(ram, usually files with ! oc 3 ocument , !-ls3s rea sheet , !e-e 3e-ecuta)le file e-tensions!

    It will then estroy or co/e-ists with the ro(ram!Dnce the infecte file is o en, the virus will co y

    itself into that articular system an erform its functions!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    45/72

    46 Form 4 Lesson Notes Part 1 ICT & Society

    Must )e installe )y users or intru ers )efore it canaffect the system%s assets!

    0n e-am le of a TroGan horse is the lo(in scri t thatre+uest for users% lo(in I* an asswor !

    The user will then successfully ass the lo(in rocess, )ut the TroGan horse will $ee a co y of the information to )euse for malicious ur oses!

    o Lo+!c o$

    Lo(ic )om) is a malicious co e that (oes off when as ecific con ition occurs!

    0n e-am le of a lo(ic )om) is the time )om)! It (oesoff an causes threats at a s ecifie time or ate!

    o Tra" oor or ac; oor

    0 feature in a ro(ram that allows someone to accessthe ro(ram an use it with s ecial rivile(es!

    o 'or$

    0 ro(ram that co ies an s rea s itself throu(h anetwor$!

    Primary ifferences )etween worms an viruses!

    'or$ .!rusD erates throu(h thenetwor$!

    S rea s throu(h any me ium!3 sually co ie ro(rams or

    ata filesS rea s co ies of itself as astan alone ro(ram!

    S rea co ies of itself as a ro(ram that attaches to other ro(ram!

    HAC@ER

    1! 'ac$in( is a source of threat to security in com uter! It is efine asunauthoriBe access to the com uter system )y a hac$er!

    .! 'ac$ers are ersons who learn a)out the com uter systems in etail!They wrote ro(ram referre to as hac$s! 'ac$ers may use a mo emor ca)le to hac$ the tar(ete com uters!

    5! evin Mitnic$ is the most notorious hac$er ever cau(ht! 'e hastolen millions of ollars worth of software an cre it car

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    46/72

    4; Form 4 Lesson Notes Part 1 ICT & Society

    information on the net! 'e use new i entities an cleverly concealehis locations! 'e s ent 6 years in Gail for his hac$in( activity!

    C NATURAL AND EN.IRONMENTAL THREATS

    1! Com uters are also threatene )y natural or environmental isaster! #eit at home, stores, offices an also automo)iles!

    .!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    47/72

    48 Form 4 Lesson Notes Part 1 ICT & Society

    6! Com uter theft inclu es stealin( money, (oo s, information ancom uter resources!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    48/72

    4: Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON E IGHTEEN : S ECURITY M EASURES

    1! To ay, eo le rely on com uter to create, store an mana(e criticalinformation! It is im ortant that the com uter an the ata they store areaccessi)le an availa)le when nee e ! It is also im ortant that user ta$emeasures to rotect their com uters an ata from lost, ama(e anmisuse! 'ow o we rotect our com uter from )reaches of security anour security ris$J

    .! Secur!t, $easures mean the recautionary measures ta$en to war off ossi)le an(er or ama(e! There are 6 t,"es o# secur!t, $easures whichare ata ac;u" cr,"to+ra"%, Ant!-!rus Ant!8S",ware F!rewa** an%u$an as"ects !

    A ) Data ac;u"

    1! *ata )ac$u is a ro(ram of file u lication!

    .! #ac$u s of ata a lications are necessary so that they can )erecovere in case of an emer(ency!

    5! *e en in( on the im ortance of the information, aily, wee$ly or )iwee$ly )ac$u s from a har is$ can )e erforme !

    ) Cr,"to+ra"%,

    1! Cry to(ra hy is a rocess of hi in( information )y alterin( the actualinformation into ifferent re resentation, for e-am le 0P0 can )ewritten as IJO!

    .! 0lmost all cry tosystem e en on a $ey such as a asswor li$e thenum)ers or a hase that can )e use to encry t or ecry t a messa(e!

    5! The tra itional ty e of cry tosystem use on a com uter networ$ iscalle a symmetric secret $ey system!

    4! ith this a roach, the sen er an the reci ient use the same $ey, anthey have to $ee the share $ey a secret from anyone else!

    C ) Ant!-!rus

    1! ser shoul install an 0ntivirus ro(ram an u ate it fre+uently!

    .! 0n 0ntivirus ro(ram rotects a com uter a(ainst viruses )yi entifyin( an removin( any com uter viruses foun in the com uter memory, on stora(e me ia or incomin( e/mail files!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    49/72

    49 Form 4 Lesson Notes Part 1 ICT & Society

    5! I entifyin( virus=

    o Two techni+ues are use to i entify the virus=a Airus si(nature also calle a virus efinition! It is a s ecific

    attern of the virus co e!

    ) Inoculatin( a ro(ram file the 0ntivirus ro(ram recor sinformation such as the file siBe an file creation ate in ase arate inculcation file! The 0ntivirus ro(ram then uses thisinformation to etect if a virus tam ers with the ata

    escri)in( the inoculate ro(ram file!

    o If an 0ntivirus ro(ram i entifies an infecte file, it attem ts toremove its virus, worm or TroGan horse! If the 0ntivirus ro(ramcannot remove the infection, it often +uarantines the infecte file!

    uarantine is a se arate area of a har is$ that hol s the infectefile until the infection can )e remove ! This ste ensures other files will not )ecome infecte !

    4! 0n 0ntivirus ro(ram scans for ro(rams that attem tto mo ify the )oot ro(ram, the o eratin( system an other ro(ramsthat normally are rea from )ut not mo ifie !

    6! Many 0ntivirus ro(ram automatically scan files

    ownloa e from the we), e/mail attachments an all ty es of remova)le me ia inserte into the com uter!

    D ) Ant!8S",ware

    1! S yware is a ro(ram lace on a com uter without the user%s$nowle (e! It secretly collects information a)out the user!

    .! The S yware ro(ram communicates information to the outsi esource!

    5! 0n 0nti/S yware a lication ro(ram sometimes calle trac$in( for threat or a S y)ot is use to remove S yware!

    4! 0mon( the o ular 0nti/S yware ro(rams are=

    o S y)ot Search an estroyo 0 /awareo S yware #laster

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    50/72

    67 Form 4 Lesson Notes Part 1 ICT & Society

    E ) F!rewa**

    1! Firewall is a iece of har ware or software which functions in anetwor$e environment to revent some communications for)i en )ythe security olicy!

    .! The ur ose of a firewall is to $ee )a thin( outsi e a rotectefirewall im lement a security olicy! It mi(ht ermit limite accessfrom in or outsi e the networ$ erimeters or from certain users or for certain activity!

    5! There are three ty es of firewall

    a! Screenin( routers

    o Sim lesto Sees only a resses an service rotocol ty eo Screen )ase on connection rules!

    )! Pro-y (ateway

    o Com le-o Sees full te-t of communicationo Screen )ase on )ehaviour ro-ies

    c! @uaro Most com le-o Sees full te-t of communicationo Screens )ase on inter retation of messa(e content!

    F ) Hu$an As"ects

    1! 'uman as ects refer to the user an also the intru er of a com uter

    system!.! It is one of the har est as ects to (ive rotection to!

    5! The most common ro)lem is the lac$ of achievin( a (ooinformation security roce ure!

    4! There are three ways to rotect com uter from human as ect threat=

    a! Dr(anisation Self 0wareness

    o Dr(anisations nee to )e aware of the eo le they wor$ with!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    51/72

    61 Form 4 Lesson Notes Part 1 ICT & Society

    o Some threat also come from within the or(aniBation an not Gust from the outsi e!

    )! Dr(anisational ser Self 0wareness

    o Provi e em loyee with a e+uate trainin( an the im ortanceof security an control!

    o

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    52/72

    6. Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON N INETEEN : R ELATIONSHI/ ET'EEN SECURITY T HREATS AND SECURITY M EASURES

    Security threats may come in many forms! For e-am le, when someone isinva in( our account information from a truste )an$, this act is consi ere asa security threat! Security measures can )e use to revent this inva ers from(ettin( the (ettin( the account information! For e-am le, the )an$ can use afirewall to revent unauthoriBe access to its ata)ase!

    A ) Secur!t, t%reats

    1! Security threats causes ata loss, com uter ama(e an the misuse of content! These threats inclu e malicious co e, hac$in(, natural

    isaster an theft!.! Peo le nee to a ly some security measures to overcome these

    threats! The e-am les of security measures inclu e ata )ac$u ,cry to(ra hy, 0ntivirus, 0nti/S yware, firewall an human as ects!

    ) Ma*!c!ous co e t%reats .s Ant!-!rus an Ant!8S",ware

    1! Malicious co e is a ro(ue ro(ram that threats com uter assets )ycausin( un esire effects in the ro(rammer art! These threats

    inclu e virus, TroGan horse, lo(ic )om), worm, tra oor an )ac$ oor!

    .! 0ntivirus an 0nti/S yware can )e use as security measure to rotectthe com uter from those threats!

    5! These security measures rovi e rotection to the com uter )ya limitin( connectivity

    ) allowin( only authoriBe me ia for loa in( ata an softwarec enforcin( man atory access controls

    )loc$in( the virus from the com uter ro(ram

    C ) Hac;!n+ .S F!rewa**

    1! 'ac$in( is an unauthoriBe access to the com uter system one )y ahac$er! e can use firewall or cry to(ra hy to revent the hac$er from accessin( our com uters!

    .! 0 firewall ermits limite access to unauthoriBe users or any

    activities from the networ$ environment!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    53/72

    65 Form 4 Lesson Notes Part 1 ICT & Society

    5! Cry to(ra hy is a rocess of hi in( information )y chan(in( theactual information into ifferent re resentation, for e-am le, an 0P0can )e written as 8&Q!

    D ) Natura* !saster .S ata ac;u"

    1! The natural an environmental isaster may inclu e floo , fire,earth+ua$es, storms an torna os!.! Natural isaster may threaten a com uter%s har ware an software

    easily! Com uters are also sensitive to their o eratin( environmentsuch as e-cessive heat or the ina e+uacy of ower su ly!

    5! The )ac$u system is nee e to )ac$u all ata an a lications in thecom uter! ith the )ac$u system, ata can )e recovere in case of anemer(ency!

    E ) T%e#t .S %u$an as"ects

    1! Com uter theft can )e of . $in s=a can )e use to steal money, (oo s, information an com uter

    resources! ) the actual stealin( of com uters, es ecially note)oo$s an P*0s!

    .! These threats can )e han le )ase on the human as ects!5! There are 5 a roaches that can )e ta$en )y in ivi uals or

    or(aniBations to revent theft which area revent access )y usin( loc$s, smart car or asswor

    ) revent orta)ility )y restrictin( the har ware from )ein( movec etect an (uar all e-its an recor any har ware trans orte !

    F ) e sus"!c!ous o# a** resu*ts

    1! There are many instances where non/ ro(rammers evelo

    a lications which are not )uilt with ro er un erstan in( of softwareen(ineerin( ractices!

    .! *ata ro uce )y such a lications may not )e correct an may ris$ corru tin( ata receive from other sources that are not com ati)lewith the a lication!

    Su$$ar,

    1! The relationshi )etween the security threats an the securitymeasures!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    54/72

    64 Form 4 Lesson Notes Part 1 ICT & Society

    .! The a ro riate security measures to use to rotect the com uter fromcom uter threats!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    55/72

    66 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY : S ECURITY / ROCEDURES

    'ome alarm systems o revent )ur(lars from )rea$in( in! Similarlycom uters shoul have alarm systems to (uar them from any attac$s such asviruses an ata corru tion! e can assume that the house is li$e the com uter while the alarm system is the security roce ures that we ta$e to ensure itssafety! It shows that the alarm system is the tool that revents the )ur(lar fromenterin( the house! Similarly, )y ta$in( e-tra safety recautions, we can avoiany virus attac$s an file corru tions in our com uters!

    A ) Data "rotect!on

    1! e nee to rotect the ata in the com uter as it may somehow (etlost or corru te ue to some viruses or misha li$e fire, floo ,li(htnin(, machine failures an even human errors!

    .! There are a few ways to rotect the information namely=o Ma;e ac;u" #!*es

    ee in( the u licate files in e-ternal stora(e suchas in the flo y is$ an thum) rive!

    *o )ac$u fre+uently to revent ata from (ettin( lostue to har ware or system failure!

    o Detect t%e -!rus an c*ean t%e co$"uter0 com uter virus is a)le to infect the way the

    com uter wor$sith an 0nti/Airus ro(ram, viruses can )e estroye

    an eliminate +uic$ly an efficiently!Airuses can )e etecte when we run an 0nti/Airus

    ro(rame can also elete the infecte files an ocuments!

    *on%t for(et to o routine 0nti/Airus chec$s, u atesan )ac$u files to revent from future virus attac$!

    o 'arn ot%ers on -!rus attac;se can warn others on virus attac$s or new viruses )y

    sen in( e/mail to them!

    ) Detect!n+ !**e+a* access to s,ste$

    1! The com uter system is a)le to etect any ille(al access to the system )y a user who oes not have any authoriBation!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    56/72

    6; Form 4 Lesson Notes Part 1 ICT & Society

    .! #asically, a cor oration will sim ly use tc wra ers an tri wire toetect any ille(al access to their system!

    a Tc wra erso Tc wra ers will control access at the a lication level, rather

    than at the a lication level, rather than at the soc$et level li$ei ta)les an i chains! The system will run tc wra ers to lo(access to ftt , tft , rch, rlo(in, re-e an telnet!

    o Tc wra ers sto the attem te connection e-amines itsconfi(uration files will eci e whether to acce t or reGectthe re+uest!

    ) Tri wireo Tri wire will etect an re ort on any chan(es in the

    thousan s of strate(ic system files! The system will runtri wire to etermine if system files have chan(e !

    5! ser%s access will )e reviewe erio ically )y com uter o erations! Dn (oin( internal au its will )e ma e to ensure etectionof violations of security an unauthoriBe mo ifications to softwarean ata!

    C ) /re-ent!n+ !**e+a* access to s,ste$s

    1! There are thin(s that cannot )e ta$en insi e the air lane! It is for the ur ose of security roce ures! It is the same as com uter systems! Itwoul not allow any unauthoriBe users to sim ly access the systems!

    .! ays to revent ille(al access to systemsa 2un anl asswor to ma$e asswor crac$in( ifficult!

    ) 2un tc wra ers to chec$ if the name for an i a resscan )e rovi e )y *NC

    c se a call)ac$ system to revent unauthoriBe use of stolen asswor s!

    D ) /re-ent!n+ !**e+a* root access

    1! To revent any ille(al root access, we shoul have Su o! So that eo le can erform on some machines without (ettin( access to the

    entire root if that is not re+uire! In a ition, with Su o we o not haveto (ive u the root asswor s!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    57/72

    68 Form 4 Lesson Notes Part 1 ICT & Society

    .! Su o stan s for 3Su eruser o an is a ro(ram in ni-, Linu- ansimilar o eratin( systems such as Mac DS O that allows users to run

    ro(rams in the form of another user 3normally in the form of thesystem%s su eruser !

    5! Su o allows a ermitte user to e-ecute a comman as the su eruser or another user, as s ecifie in the su oers file!

    E ) /atc%

    1! Patch is a name of an NIO utility! It a lies a scri t (enerate )y theifferent ro(ram to a set of files that allows chan(es from one file to

    )e irectly a lie to another file!

    .! Patch su lies small u ates to software, rovi e that the sourceco e is availa)le!

    5! 2esources are not enou(h to atch all security holes that we can hear a)out throu(h the )u(tra+ list!

    4! #u(tra+ is a full isclosure mailin( list e icate to the issues of com uter security! Dn/to ic iscussions are new iscussions a)outvulnera)ilities, metho s of e- loitation an how to fi- them! It is ahi(h volume mailin( list an almost all new vulnera)ilities are

    iscusse there!

    Su$$ar,

    There are a few ways to rotect information! They areo Ma$e )ac$u fileso *etect the virus an clean the com uter o arn others on virus attac$!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    58/72

    6: Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY 8ONE : C OM/UTER A //LICATIONS I N T HE SOCIETY

    SOFT'ARE A//LICATION

    02

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    59/72

    69 Form 4 Lesson Notes Part 1 ICT & Society

    o D en *istance Learnin( 3D*L or Dn/line learnin( can )eim lemente as com uters are the main me ium in eliverin( the$nowle (e from one location to the other locations!

    o This ty e of learnin( consists of online forum, iscussion, +uiBBes,test +uestions & many more! The e-am le of the D en *istanceLearnin( institution is the D en niversity of Malaysia!3www!oum!e u!my

    ) USINESS

    1 Peo le use finance or accountin( software to )alance chec$ )oo$s, ay )ills, trac$ ersonal income & e- enses, mana(e investments &evaluate their financial lans!

    . 0ccountin( software hel s com anies to recor & re ort theirfinancial transactions! Dne e-am le of these software a licationsinclu es M>D#, Intuit uic$ #oo$s & Peachtree Com lete0ccountin(!

    5 Com uter In #an$in(

    o In the )an$in( sector! Many financial institutions offer online )an$in(! Peo le can access their financial recor s from anywhere

    in worl !

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    60/72

    ;7 Form 4 Lesson Notes Part 1 ICT & Society

    5! Com uter/ 0i e *esi(n, *es$to Pu)lishin(, PaintK Ima(e < itin(,Ai eo & au io e itin( & Multime ia 0uthorin( are amon( the o ular a lications software!

    D) COMMUNICATION

    1! 0 (overnment rovi es society with irection )y ma$in( &a ministerin( olicies! Most (overnment offices or a(encies havewe)site in or er to rovi e citiBen with u /to/ ate or latestinformation!

    .!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    61/72

    ;1 Form 4 Lesson Notes Part 1 ICT & Society

    ; Science

    o In the scientific worl , com uters are use in all fiel s of sciencefrom )iolo(y to astronomy to meteorolo(y an others! These arethin( that can )e one )y com uter, namelyR

    i! Collectin(, analyBin( & mo elin( ataii! Servin( as me ium of communication with collea(ues

    aroun the worliii! Contri)utin( to new inventions or )rea$throu(h in

    sur(ery, me icine & treatment!iv! Imitatin( functions of the central nervous system, retina of

    the eye & others )y tiny com uters!v! 0llowin( a eaf erson to listen throu(h cochlear im lant

    SUMMARY

    1! Com uters hel eo le to o their wor$ faster & more efficient )yusin( the software a lications that consist of s ecial ro(rams fors ecific tas$s!

    .! Software a lications are use for many reasons such as to enhancethe learnin( rocess, to hel in )usiness activities, to assist the (ra hic& multime ia roGects & to facilitate communication!

    5!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    62/72

    ;. Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY 8T'O : C OM/UTER U SER

    0t the en of the lesson, stu ent shoul )e a)le to =

    • escri)e the various ty e of com uter users in society!

    COM/UTER USERS IN SOCIETY

    The 6 cate(ories of com uter users are =

    • home users• small officeK house office 3SD'D users• mo)ile users•

    ower users• lar(e )usiness users

    HOME USERS

    The com uter is a )asic necessity!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    63/72

    ;5 Form 4 Lesson Notes Part 1 ICT & Society

    • wor$ with )asic )usiness software such as wor rocessin( ans rea sheet )usiness software

    • use resentation (ra hics software to create an eliver resentations to alar(e au ience )y connectin( a mo)ile com uter or evice to a vi eo

    roGector

    /O'ER USER

    Power user =

    • inclu e en(ineers, scientists, architects an virtual reality animators• use com uters with e-tremely fast rocessor, )i((er stora(e an

    customiBe software•

    wor$ with mini com uters that uses esi(n to meet the or(aniBationalnee s

    • use software such as C0* , C0M an M0TL0#

    LARGE USINESS USER

    Lar(e )usiness users =

    • )an$, insurance com any, hy ermar$et• use com uters for )asic )usiness activities• have e/commerce that allows customers an ven ors to interact an o

    )usiness transaction online therefore customers, ven ors an otherintereste arties can access information on the we)

    • have e/mail an we) )rowsers to ena)le communications amon(em loyees, ven ors an customers

    • rovi e $ios$s in u)lic locations

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    64/72

    ;4 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY 8THREE : H O' T O C ONDUCT A S TUDY

    0t the en of this lesson, stu ents shoul )e a)le to=• Dutline the )asic ste s of oin( stu y

    There are five )asic ste s to follow when we o stu y=

    Ste" 08 Get an o-er-!ew o# t%e to"!c:

    a Familiarity = e nee to familiariBe ourselves with the to ic )efore westart oin( stu y! This will allow us to s en more time evelo in( ato ic rather than usin( more time learnin( a)out the to ic!

    ) 2eference = 2efer to a ictionary, encyclo ae ia, han )oo$, te-t)oo$,

    (ui e or )i)lio(ra hy which can rovi e an overview of the to ic!c #rainstormin( = S en some time )rainstormin( a)out the to ic an

    write own everythin( that we can thin$ of a)out the to ic!

    Ste" 8 Narrow own t%e to"!c:

    a Narrow own the to ic )y rea in( the sources an form some s ecific+uestions relate to the to ic! #y oin( this, we may have awareness

    of the various as ects that we may want to stu y!Ste" 7 8 F!n stu , $ater!a*s:

    a Stu y materials are availa)le offline an online! e can search for theinformation that we want in )oo$s, Gournals, articles or other resourcematerials foun in the li)rary an the internet!

    Ste" 2 8 E-a*uate stu , $ater!a*s:

    0ll selecte materials nee to )e evaluate in 4 as ects=

    a 2elevance=

    • *oes this u)lication hel to answer the research +uestion J If itoes not fin somethin( else which oes!

    ) Pers ective=

    • Is this a rimary source 3 resentin( the author%s own research an

    i eas or a secon ary source 3summarisin( an iscussin( theresearch an i eas of others J

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    65/72

    ;6 Form 4 Lesson Notes Part 1 ICT & Society

    • Is the evi ent )iase J *oes the author attem t to sway the rea er%so inionJ

    c 2elia)ilityK Cre i)ility

    • Is the information accurateJ

    • 'as the information )een eer reviewe J

    • 0re the authors an u)lishers re uta)leJ

    • *o they cite their cre entialsJ

    • 0re there footnotes an a )i)lio(ra hyJ

    ate

    • 'ow recent is the information u)lishe J

    • 'ow recent has it )een u ate J

    • 'ave there )een new evelo ments on the to icJ

    • Coul the information you are usin( )e mislea in( )ecause of the u)lication ateJ

    Ste" 5 8 'r!t!n+ out t%e stu , "a"er:a hen all resources are (athere , start writin( the a er an cite all the

    sources of information use ! These may inclu e )oo$s, Gournals,articles an ma(aBines!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    66/72

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    67/72

    ;8 Form 4 Lesson Notes Part 1 ICT & Society

    • 1. oint minimum an 14 oint ma-imum 3with thee-ce tion of hea in(s an footnotes

    • . s aces after a full sto an 1 s ace followin( acomma, semi/colon or colon

    • No a))reviation such as "e(%, & or etc! rite everythin(in full= "for e-am le, that is an so on%

    • Numerals are use when the num)er is more than twowor s= for ta)ulation, statistical iscussion, sums ofmoney, a resses, ates, time an a(e, cha ter, volumenum)ers 3for e-am le, . ?une,.777

    • Consistency in style for e-am le in writin( out hea in(s

    5! uotes •

    0 irect +uote must )e lace in +uotation• #loc$ +uotes are use if a irect +uote is more than

    three lines lon(• If ossi)le, ara hrase information in reference to

    usin( irect +uotes• se +uotes an ara hrasin( to su ort ar(ument

    4! Clarity • 'el s your rea ers un erstan your a er )y or(aniBin(

    your a er well an on%t for(et to insert the a(enum)ers• < it your wor$ means rea in( throu(h the a er several

    times )efore su)mission an on%t Gust rely on the rou(hs ellin( an (rammar chec$s offere )y your software!

    6! In icatin(your Intentions

    • In a com le- stu y, the intro uction of every sectionshoul inform the rea er what to e- ect in that section

    • The final ara(ra h in each section shoul tie thecontents of that section to(ether with a short conclusion

    • *o not use too many wor s to say what you are (oin( too an what you have one, $ee to necessary minimum

    /RE/ARING THE /RESENTATION

    1! The style an resentation of assi(nments are essential

    .! Presentation shoul )e resente clearly! It shoul not )e rea out5! literature cite in te-t shoul )e accurately ocumente4! references use for resente shoul )e clearly mentione

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    68/72

    ;: Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY 8FI.E : D ELEGATION O F ' OR@

    A 'HAT IS DELEGATION&

    *ele(ation is the a)ility to assi(n tas$s to others with the authority,res onsi)ility an accounta)ility to finish the tas$s!

    'HY DELEGATE TAS@S&

    2eason why shoul I ele(ate tas$s =• ill )e a)le to save time• 'el others to learn new s$ills, for e-am le, how to ne(otiate an

    coo erate• tiliBe in ivi ual%s a itional stren(ths an e- ertise• ill )e a)le to achieve lar(e (oals )y ivi in( them into smaller tas$s• Promotes creativity an iversity )ecause others may have )etter way

    oin( thin(s• Cut own on tas$s that can )e one Gust as well )y others

    C 'HAT TO DELEGATE

    0 UESTIONING• *iscover a ro)lem• Form a +uestion to answer the ro)lem

    /LANNING

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    69/72

    ;9 Form 4 Lesson Notes Part 1 ICT & Society

    • Set out ste s to fin answer • Select sources for ossi)le answer • Plan a )asic raft for re ortin(• 0ssi(n tas$s to team mem)ers•

    0(ree on contin(ency lans

    7 GATHERING• @o to a(ree sources of information• Collect information

    2 SORTING• Put similar information to(ether • 'i(hli(ht valua)le cre i)le information

    5 SYNTHESISING• *iscuss information with others• Com)ine ifferent information

    6 E.ALUATING• *iscuss if information (athere su orts the answer • Test out solution an ecision that su orts the answer

    9 RE/ORTING• rite or ty e out the re ort• Create an a ro riate (ra hic or me ia• Pre are for +uestion an answer • Pre are research

    2 HO' TO DELEGATE

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    70/72

    87 Form 4 Lesson Notes Part 1 ICT & Society

    L ESSON T 'ENTY 8SI> : T O/ICS F OR STUDY

    STE/S TO DO A STUDY

    /ORTFOLIO

    o The ortfolio will contain=

    1! Team Gournala! Stu y roGect intro uction a(e

    )! Minutes of team meetin(sc! Initial roGect lan K calen ar

    ! Conflict resolution re ort

    .! Initial framewor$ for resentation

    5! Final resentation

    o The ur ose of team Gournal is to $ee trac$ the ro(ress of the roGect!

    o The team%s initial framewor$ is where the team shoul o some )asicstu y on the to ic an eci e what shoul )e inclu e in the resentation!

    o The rint out of the final resentation will )e (iven to the teacher for final(ra in(!

    SOURCE CITATION CARD

    o Source citation car is a note car in which you write the name of thearticle, author, )oo$ name, a(e num)ers, where you foun it, why it is(oo information an a short summary of the im ortant oints!

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    71/72

    81 Form 4 Lesson Notes Part 1 ICT & Society

    CREATING YOUR /RESENTATION0 Presentation shoul =o

    'ave at least 16 sli es 3not inclu in( the Title sli eo 'ave a Title sli e

    • Intro uce a resentation• Inclu e names of each mem)er of the team

    o se any esi(n tem lateso se at least five (ra hics 3e!(! cli art, hoto(ra hs, wor art an

    rawin(so

    'ave some multime ia• se animation on sli es• se sli e transitions

    o se less te-t on the sli es• Try resentin( the information throu(h ictures, (ra hs, min ma s or

    any other form of visual 3as o ose to te-tual resentationo 'ave a citation sli e

    • The last sli e must list all of your citations 3where you (ot thecontents an other relate resources

    • 2emem)er to (ive cre it to others

    THE FINAL /RESENTATIONo Gu! e*!nes:

  • 8/17/2019 Form 4 Lesson Notes Part 1.doc

    72/72

    8. Form 4 Lesson Notes Part 1 ICT & Society

    • Practice in a vance• Pre are notes on a er or cue car s to hel you remem)er to s ea$ out

    clearly for eo le at the )ac$ to hear you• *o not shout