SlideShare une entreprise Scribd logo
1  sur  10
Information & Communication Technology

LA1 – ICT & Society

LEARNING AREA 1 – ICT & SOCIETY
Topic 1.1 -

Introduction to Information and Communication Technology

1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT

1.1.1.2 Describe the brief evolution of computers

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

Topic 1.2 -

LA1 – ICT & Society

Computer Ethics and Legal Issues

1.2.1.1 Definition
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer
Crime and Cyber Law.

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.2.2 Privacy
1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/ technologies.

1.2.3 Controversial Contents and Control
Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.2.3.1 a)List effects of controversial contents of pornography on society:

1.2.3.2 Describe the process of filtering to control access to controversial contents

1.2.4

Computer Crimes

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

LA1 – ICT & Society

1.2.4.1 Explain the need for Cyber Law

1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement,
Theft, Attacks.

Topic 1.3 -

Computer Security

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.3.1 Definition
1.3.1.1 Define Computer security.

1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
-

Malicious code
Hacking
Natural disaster
Theft

1.3.3 Security Measures

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

LA1 – ICT & Society

1.3.3.1 Select the appropriate security measures to overcome the identified computer
threats.

1.3.3.2 Apply the correct security procedures.

Topic 1.4 -

Current and Future Developments

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society
Information & Communication Technology

1.4.1

Impact of ICT on Society

1.4.1.1Describe the impact of society
POSITIVE IMPACT

NEGATIVE IMPACT

Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007

LA1 – ICT & Society

Contenu connexe

En vedette (20)

Notacd051
Notacd051Notacd051
Notacd051
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
Privacy
PrivacyPrivacy
Privacy
 
La2 templates
La2 templatesLa2 templates
La2 templates
 
Scheme ict-2013-f4
Scheme ict-2013-f4Scheme ict-2013-f4
Scheme ict-2013-f4
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Notacd01
Notacd01Notacd01
Notacd01
 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Computer
ComputerComputer
Computer
 
โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์
 
Notacd071
Notacd071Notacd071
Notacd071
 
Notacd10
Notacd10Notacd10
Notacd10
 
Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5
 
Notacd081
Notacd081Notacd081
Notacd081
 
Notacd09
Notacd09Notacd09
Notacd09
 
Notacd12
Notacd12Notacd12
Notacd12
 
Presentation1
Presentation1Presentation1
Presentation1
 
Notacd11
Notacd11Notacd11
Notacd11
 

Similaire à La1 templates

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
girlfrida
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
depoerossie
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
MOE
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
ITU
 

Similaire à La1 templates (20)

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Hsm ict 4
Hsm ict 4Hsm ict 4
Hsm ict 4
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
 
Rpt ict t4_2016
Rpt ict t4_2016Rpt ict t4_2016
Rpt ict t4_2016
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Final Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files PFinal Project - IoT Security ResearchAttached Files P
Final Project - IoT Security ResearchAttached Files P
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Scheme ict-f4-2014
Scheme ict-f4-2014Scheme ict-f4-2014
Scheme ict-f4-2014
 
Capstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 

Plus de cikgushaharizan (17)

Acf
AcfAcf
Acf
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-4-1
Bidang pembelajaran-4-1Bidang pembelajaran-4-1
Bidang pembelajaran-4-1
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Dernier (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

La1 templates

  • 1. Information & Communication Technology LA1 – ICT & Society LEARNING AREA 1 – ICT & SOCIETY Topic 1.1 - Introduction to Information and Communication Technology 1.1.1 Overview of Information and Communication Technology (ICT) 1.1.1.1 Define ICT 1.1.1.2 Describe the brief evolution of computers Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 2. Information & Communication Technology Topic 1.2 - LA1 – ICT & Society Computer Ethics and Legal Issues 1.2.1.1 Definition Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 3. Information & Communication Technology 1.2.1.2 Differentiate between ethics and law. 1.2.1.3 State the need for intellectual property laws Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 4. Information & Communication Technology 1.2.2 Privacy 1.2.2.1 List ways to protect privacy. 1.2.2.2 State authentication and verification methods/ technologies. 1.2.3 Controversial Contents and Control Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 5. Information & Communication Technology LA1 – ICT & Society 1.2.3.1 a)List effects of controversial contents of pornography on society: 1.2.3.2 Describe the process of filtering to control access to controversial contents 1.2.4 Computer Crimes Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 6. Information & Communication Technology LA1 – ICT & Society 1.2.4.1 Explain the need for Cyber Law 1.2.4.2 Explain briefly the computer crimes below: Fraud, Copyright Infringement, Theft, Attacks. Topic 1.3 - Computer Security Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 7. Information & Communication Technology 1.3.1 Definition 1.3.1.1 Define Computer security. 1.3.2 Security Threats 1.3.2.1 Explain briefly the different threats to computer security: - Malicious code Hacking Natural disaster Theft 1.3.3 Security Measures Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 8. Information & Communication Technology LA1 – ICT & Society 1.3.3.1 Select the appropriate security measures to overcome the identified computer threats. 1.3.3.2 Apply the correct security procedures. Topic 1.4 - Current and Future Developments Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007
  • 9. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society
  • 10. Information & Communication Technology 1.4.1 Impact of ICT on Society 1.4.1.1Describe the impact of society POSITIVE IMPACT NEGATIVE IMPACT Hak Cipta Terpelihara Panitia ICT Jabatan Pelajaran Negeri Selangor 2007 LA1 – ICT & Society