SlideShare une entreprise Scribd logo
1  sur  56
Panitia ICT SMK Kanowit 2011

                                      Learning Area One – ICT and Society
1.1 – Introduction to ICT.
1.1.1 – Overview of ICT.
1.1.1.1 – Define ICT

    ICT is defined as



    Information is defined as



    Communication is defined as

    Technology is defined as




1.1.1.2 – Describe the brief evolution of computers

            First Generation (1940-1956)                         Second Generation (1956 - 1963)
    Technology:                                            Technology:



    Problems:                                              Advantages:




    Scientists:                                            Scientists:



    Example:




                                                                   Scientist:
   Third Generation (1964-1971)
   Technology:



   Advantages:




                                                      1
Panitia ICT SMK Kanowit 2011


          Fourth Generation (1971 - present)                        Fifth Generation (Present & beyond)
     Technology:                                               Technology:



     Advantages:




     Scientists:



     Example:




1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce
1.1.2.1 – List the usage of ICT in everyday life.

                             Education                                             Industry

1.     Students can use computer as references tool and       1.
       browse internet for information

                                                              2.
2.


                               Banking                                            Commerce

1.                                                            1.


2.                                                            2.




1.1.2.2 – State the differences between computerised and non-computerised systems.

                     Field                      Non- Computerised                          Computerised
                                         1. Students listen mainly to          1. Students can use internet to
                                            teacher explanation.                  search for information and do
                                                                                  not rely mainly on teacher.
                   Education             2.                                    2.




                                                          2
Panitia ICT SMK Kanowit 2011

                                       1.                          1.


              Banking                  2.                          2.



                                       1.                          1.


              Industry                 2.                          2.



                                       1.                          1.


            Commerce                   2.                          2.




1.1.2.3 – State the impact of ICT on society.




                                                Positive Impact




                                                 Negative Impact




                                                         3
Panitia ICT SMK Kanowit 2011

1.2 – Computer Ethics and Legal Issues
1.2.1 – Definition
1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.


  Computer Ethics is a




                                     Definition:




         Code of                     Good examples:                         Bad examples:
         Ethics:                     1.                                     1.



                                     2.                                     2.




                                                                           Computer Crimes
   Intellectual property refers to
   __________________________________
   __________________________________
                                                             Any criminal activity ________________________
   __________________________________
                                                             _________________________________________
   _________________________________.
                                                             _________________________________________
   These works are ____________________
                                                             There are 4 types of computer crimes:
   __________________________________
                                                              
   __________________________________
                                                              
                                                              
                                                              
       Privacy in IT refers to



       Information privacy is described as
                                                           Cyber law refers to




                                                       4
Panitia ICT SMK Kanowit 2011

1.2.1.2 – Differentiate between ethics and law.


     Definition of Ethics




      Definition of Law




     1.


                                                                         Similarity between ethics and law

     2.




                            Ethics                                                Law

          Keywords                    Explanations              Keywords                     Explanations
                                                                                     As a rule to control
     Moral standards                                                                 computer users


                                Computer users are free
                                to follow or ignore the
                                codes of ethics


                                                                Must follow

                                                                                     Depends on country and
                                                                                     state where the crime is
                                                                                     committed


          Universals



                                                                  Crime

1.                                                                  1.

                                                     Examples
2.                                                                  2.




                                                          5
Panitia ICT SMK Kanowit 2011

1.2.1.3 – State the need for Intellectual property laws




                                             Why do we need intellectual
                                                  property law???




1.2.2 – Privacy
1.2.2.1 – List ways to protect privacy.



                                          Privacy is threatened through …




                                                  Ways to protect
                                                     privacy




                                                          6
Panitia ICT SMK Kanowit 2011

1.2.2.2 – State authentication and verification methods / technologies

  Authentication is a process




        Methods                       Pictures                     Name    Functions / Explanation




                                                                          Analyses the features that
                                                                          exist in the coloured
                                                                          tissue surrounding the
                                                                          pupil.




    Biometric Devices




                                                                          Scanning of retina and
                                                                          analyzing the layer of
                                                                          blood vessels at the back
                                                                          of the eye.




                                                                          This method is commonly
                                                                          used in bank operation
                                                                          and business transactions.




                                                       7
Panitia ICT SMK Kanowit 2011


 Verification is the act of




                                                    Methods of
                                                    verification




                                                      Examples




1.2.3 – Controversial Contents and Control
1.2.3.1 – List the effects of controversial content on society (pornography & slander)


               Pornography                                                                  Slander




                                                    Impacts????




                                                      Examples




1.2.3.2 – Describe the process of filtering to control access to controversial contents.

  Methods                                         Website / site blocking

                    Uses lists of banned                                                   Rated by RSACI for the
                    words.                                                                 content of the website.
                    If filter search found any                                             Browser is set to accept
  How???            words listed, it will stop                                             pages with certain levels
                    downloading and block                                                  of ratings.
                    the page.

                                                          8
Panitia ICT SMK Kanowit 2011

1.2.4 – Computer Crimes
1.2.4.1 – Explain the need for Cyber Law.




                                       For:




                                                  Needs for
    For:                                          Cyber Law                  For:




           For:                                                      For:




1.2.4.2 – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks.

           Computer Crimes                            Definition                           Example




1.3 – Computer security
1.3.1 – Definition
1.3.1.1 – Define computer security

  Computer security means




                                                        9
Panitia ICT SMK Kanowit 2011


                                              Types of computer security




1.3.2 – Security Threats
1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster,
          theft.

                                                   Security Threats


   Malicious Code                        Hacking                      Natural Disaster               Theft


     Definition:                     Definition:                        Definition:               Definition:




     Examples:                                                           Examples:                Examples:
                                                                       Flood
                                                                       Fire
                                                                       Earthquakes




1.3.3 – Security Measures
1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup,
          human aspect

Identify and write the appropriate security procedures in the SECURITY column and the security threats in the
THREATS column.
              Situation                             THREATS                             SECURITY
Ahmad’s has asked his secretary,
Minah, to send an email to his
business partner in Japan. Minah
tries to read Ahmad’s email.

Every two weeks Harry would save
a copy of his files from his laptop to
his external hard disk in case his
computer breaks down.


                                                            10
Panitia ICT SMK Kanowit 2011

One day, Karim found out his files
has been corrupted. He needs to
scan using appropriate utility.


While using the internet, Flora
founds out that some of her private
information showed up in an
unknown browser.

Daisy is a software engineer. One
day, she found out that on her
computer pops out a message that
writes “An unknown source is
trying to by-pass your security
system”
Bank safe vault is one of the
restricted areas in the office. Only
authorized personal are allow to
enter.


                                                  Questions
1. Copyright infringement is defined as a violation of the rights secured by Copyright Act.
      a. Give two examples of copyright infringement.




        b. Security measures are the precautionary measures taken towards possible dangers or damages.
           State the appropriate security measures to overcome the identified computer threats for:
                i. Data lost




                ii. Hiding information.




2.      Which of the following are biometric devices?
                     I. Hand geometry
                    II. Callback System
                   III. Retinal Scanning
                   IV. Signature Verification System

        A.      I, II and III
        B.      I, II and IV
        C.      I, III and IV
        D.      II, III and IV




                                                        11
Panitia ICT SMK Kanowit 2011

                                    Learning Area Two – Computer System.

2.1 – System Concept
2.1.1 – Overview of computer systems
2.1.1.1 – Define computer systems




2.1.1.2 – State the meaning of input, processor, output and storage.



                                              COMPUTER SYSTEM




                                       PROCESS                                            STORAGE
                                                                 OUTPUT
              INPUT




2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage.




        Description of Information Processing Cycle




                                                       12
Panitia ICT SMK Kanowit 2011


                                                    Fetch




                                               MACHINE CYCLE




2.1.2 – Data Representation
2.1.2.1 – State the relationship of data representation: Bit, byte, and character.


       _______ bits                                 1 byte                           _______ character




2.1.3 – Introductory to binary coding
2.1.3.1 – Explain the function of ASCII code

  ASCII: American _______________________________________________________________________

  ____________________________________________________________________________________


Functions:

  1.




  2.




                                                         13
Panitia ICT SMK Kanowit 2011

           Criteria                    ASCII                             EBCDIC                Unicode
  Number of bits in a
       byte


           Usage


 Supported languages


       Example


2.1.4 – Data measurement
2.1.4.1 – State the units of data measurement.
    Term         Abbreviation          Approx. size                     Exact Amount      Index power
     Bit                 --                    --                            --                  --

    Byte                 --                    --                            --                  --

                        KB

 Megabyte

                        GB

  Terabyte


2.1.5 – Clock Speed Measurement
2.1.5.2 – State the units of clock speed measurement.

Unit used : __________________________________ = ____________ cycle per second

                        Term      Abbreviation                     Cycle per second
                      Megahertz

                      Gigahertz       GHz



2.2 – Hardware




                                                    Types of hardware



                                                     Motherboard



                                                           14
Panitia ICT SMK Kanowit 2011

2.2.1 – Input Devices
2.2.1.1 – Identify the input devices used for text, graphics, audio and video

     Types                    Picture                          Name                     Other examples
                                                                                  1.


      Text                                                                        2.



                                                                                  1.


    Graphics                                                                      2.



                                                                                  1.


     Audio                                                                        2.



                                                                                  1.


     Video                                                                        2.




2.2.2 – Output devices
2.2.2.1 – Identify the output devices used for text, graphics, audio and video
           Output Device                   Text              graphics          audio            video
             Monitor                                                                           


               Speaker




                                                         15
Panitia ICT SMK Kanowit 2011

2.2.3 – Motherboard
2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot,
ports and connectors on the motherboard.

                                                              Ports




                                                        16
Panitia ICT SMK Kanowit 2011

2.2.4 – Storage
2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic
         medium, optical medium, flash memory)

Primary storage is located at _______________________________________________

What is ROM?
____________ Only Memory: memory whose contents can be accessed and read but ______________ be
changed. The memory of a ROM is ________________________ which means the program and data will not be
__________________.

Types of ROM:


  PROM                                   EPROM                           EEPROM




What is RAM?
Random _____________________ Memory: memory whose contents can be _________________, read and
______________. The memory of a RAM is ________________________ which means the program and data
will be __________________.



2.3.1 – Operating System (OS)
2.3.1.1 – State the various types of OS used on different platforms.



                                                OS Platform




                Example                          Example                        Example




                                                        17
Panitia ICT SMK Kanowit 2011

2.3.1.2 – State the functions of OS




                                                 Functions of OS




2.3.1.3 – State the different interfaces of OS




                                                         18
Panitia ICT SMK Kanowit 2011

2.3.2 – Application Software
2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic)
2.3.2.2 – Describe the uses of application software.


        Types                        Examples                                 Functions / Usages


Word processor


                             Microsoft Excel
                             Corel Quattpro Pro
                             Sun StarOffice Calc

                                                                 Provides pre-defined presentation format
                                                                 Applying special effects to the slide transition.
                                                                 Enhance text, charts and graphical images.

                                                                 Edit digital non-text information such as photo
                                                                 and drawings
                                                                 Draw pictures using various tools such as brush
                                                                 and pen
                                                                 Modifying contrast and brightness
                                                                 Adding special effects



2.3.3 – Utility program
2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and
          file compression)


       Types                    Examples                                  Functions / Usages
                       1.                             1.

File managements
                       2.                             2.


                       1.                             1.

Diagnostics
                       2.                             2.


                       1.                             1.

File Compression
                       2.                             2.




                                                       19
Panitia ICT SMK Kanowit 2011

2.3.4 – Proprietary and Open Source Software.
2.3.4.1 - Differentiate between proprietary and open source


          Criteria                        Proprietary                           Open Source
                             1.                                     1. It is Free
                                                                    2.

                             2.
                                                                    3.
        Advantages
                             3.




                             1. User need to buy the product        1.
                                key (license key) in order to use

                                                                    2.
      Disadvantages
                                                                    3.




                             1. Microsoft Office 2010               1.
  Example for application    2.
        software                                                    2.


                             1.                                     1. Ubuntu
                                                                    2.
      Example for OS         2.




                                                        20
Panitia ICT SMK Kanowit 2011

                          Learning Area 3 – Computer Network and Communications
3.1 – Basic Concepts of Computer Networks and Communications
3.1.1 – Definition
3.1.1.1 – Define computer networks
3.1.1.2 – Define communication

 Computer network is




 Communication is




3.1.2 – Importance of Computer Network.
3.1.2.1 – State two importance of computer networks and communication in the following fields

                        Education                                          E-Business




                       E-Commerce                                          E-Banking




3.1.3 – Types of Network
3.1.3.1 - Define types of Computer network.
                                                                                                LAN
       a. ______________ Area __________________.
       b. __________________ network compare to ___________ and WAN.
       c. Operated within a limited _________________________________________.
       d. Devices connected usually are less than ____________________________.
       e. Hardware used: ______________________________, ________________________________,
            ________________________________, _____________________________________.
       f.   Transmit data at a very _______________ speed.


       a. ___________________ Area _________________________.
                                                                                                  MAN
       b. Located at ____________________ cities such as _________________________.
       c. Used ____________________________________ as transmission media.
       d. Can be collections of ______________.




                                                     21
Panitia ICT SMK Kanowit 2011



        a. ________________________ Area __________________________.                               WAN
        b. ______________________ network of all. An example is __________________________.
        c. Generally it covers large ______________________ such as a state, ________________ or
               ___________________.
        d. A group of _____________ or ____________ or a mixture of ____________.
        e. Uses transmission media such as _________________________________________________.
        f.     Need ___________________ to connect two or more network.


3.1.3.2 – Differentiate between the three types of computer network.

             Criteria                   LAN                      MAN                         WAN
Network size

Number of computers

Transmission media types

Speed

Cost


3.1.4 – Network Architecture
3.1.4.1 – Define two types of network architecture.

Network Architecture                    Client/Server                           Peer-to-Peer


Definition




Cabling cost


Network usage


Ease to manage


Software needed




                                                        22
Panitia ICT SMK Kanowit 2011

3.1.5 – Network Topology.
3.1.5.1 – State three types of network topologies: Bus, Ring, Star

  Definition: structure or configuration of ______________________ for ____________________.

               Topology                                               Diagram




3.1.5.2 - Differentiate between the three types of network topology

            Aspect                Ring Topology                 Star Topology         Bus Topology

Host failure


Node Failure


Structure

Ease of adding/removing
nodes

Ease of troubleshooting

Number of nodes when
extending network

Connection between
nodes

Host existence




                                                       23
Panitia ICT SMK Kanowit 2011

3.1.6 - Protocol
3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitate
communication over computer network.

        Definition: Protocol is ………..




        Importance of protocol:




        TCP/IP:




3.1.7 – Internet, Intranet, Extranet.
3.1.7.1 – Describe the types of network communications technology (Internet, Intranet, Extranet)

   Criteria                 Internet                         Intranet                          Extranet


Definition




Usage




Services




Accessibility




Security




                                                        24
Panitia ICT SMK Kanowit 2011

3.2 – Hardware Requirements
3.2.1 – Devices
3.2.1.1 – Identify the function of the devices needed in computer network communication.
3.2.1.2 – State the function of the devices needed in computer network communication.

                   Diagram                          Device Name                      Function




                   Diagram                          Device Name                      Function




                                 From router




                                       To
                                     MODEM



                                                    25
Panitia ICT SMK Kanowit 2011

3.2.2 – Medium
3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP),
Coaxial and Fibre Optic Cable.




3.2.2.2 – Identify various types of wireless transmission media.


     1

   2

     3

   4

3.3 – Software Requirements.
3.3.1 – Server Software
3.3.1.1 – Define Network Operating System.


        Network Operating System or known as __________ allows to ____________________ computers
          and peripheral to a ______________________________.
        Most frequently used with ______________ and ____________________ but also have application
          to larger _____________________________________________.
        It is not the same as the ____________________________________________ provided by some
          existing __________________________________________.
        It is specifically written to keep __________________________ running at
          __________________________________________________.




                                                       26
Panitia ICT SMK Kanowit 2011

3.3.1.2 – Name various Network Operating System Software.


       1. Window NT

       2.                                                                       N
       3.                                                                       O
                                                                                S
       4.


3.3.2 – Client Software
3.3.2.1 – State the functions of various client software.

       Client Software                                 Function           Example
                                1.                                1. Internet Explorer (IE)


                                2.                                2.
Web Browser

                                3.                                3.


                                1.                                1. Outlook Express


E-mail client
                                                                  2.


                                1.                                1. Ping


Network Utilities
                                2.                                2.


                                1.                                1. Network
                                                                     Neighbourhood
Network File Manager                                              2.
                                2.




                                                            27
Panitia ICT SMK Kanowit 2011

3.4 – Setting Network Facilities
3.4.1 – Installation of Network Interface Cards (NIC)




       This is a




    Step 1a: Place your
    ___________________________________
    in the PCI of your computer




    Step 1b: Window will
    ____________________ that it has found
    new hardware




    Step 1c: The “Found New Hardware
    Wizard” will then ___________________.
    Click __________ to continue




      Step 2a: Select “CD-ROM Drives” and click
      “Next” to ________________. Window will
      find suitable _____________ for your device.




                                                        28
Panitia ICT SMK Kanowit 2011




    Step 2b: The NIC driver is now properly
    installed. __________________ the
    computer to complete the installation.




3.4.1.2 – Install drivers for NIC (for WinXP)



    Step 1: Windows will indicate a new
    hardware found after the NIC has been
    inserted into its slot. Click Next to continue.




                                                          Step 2: Select “Search for the best driver
                                                      for my device (recommended)” and click
                                                      “________________” to continue




     Step 3: Select “CD-ROM Drives” and click
     “Next” to continue. Windows will now search
     for the best driver for your device.




                                                      29
Panitia ICT SMK Kanowit 2011




   Step 4: Windows will locate the correct
   driver for your device and indicate that it is
   now ready to install the driver. Click “Next” to
   continue.




                                                        Step 4: The NIC driver is now properly
                                                        __________________________.




3.4.2 – Cable Crimping and Testing
3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable).

                                                      2 types




                                 From PC to PC                     From PC to hub/switch/router



                         TOOLS




                                                        30
Panitia ICT SMK Kanowit 2011

3.4.3 – Configuration and Testing Network.
3.4.3.1 – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Test
the network connection.




                  IP is _________________________________________________________.
                  Subnet mask specifies __________________________________ of the network.
                  _________________________________ are used to connect other network and the
                  _____________________________________________


3.4.3.2 - Steps to test a network connection:

             1.


             2.


             3.


             4.


3.4.4 Share Data
3.4.4.1 – Create a share folder.

        1.


        2.


        3.


        4.

                                                      31
Panitia ICT SMK Kanowit 2011


                                                            Questions
1. Figure 1 shows a network configuration.


                                                                      INTERNET



                      PC 1
            IP address: 192.168.1.5                                                                        PC 2
            Subnet Mask: 255.255.253.0
                                                                                                 IP address: 192.168.1.5
            Gateway: 192.168.1.1
                                                                                                 Subnet Mask: 255.255.253.0
                                                                                                 Gateway: 192.168.1.1
                                     ADSL MODEM
                               IP address: 192.168.1.1
                               Subnet Mask: 255.255.255.0                     Figure 1

       a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other.
          [4 marks]




       b.    Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then
            filled the table below for the new configuration.




            Computer                         IP address                                       Subnet Mask
              PC 1
              PC 2

2.            Computer A                      Computer B                        Computer C
                                                                                                              ADSL MODEM
        IP address: 192.168.1.36         IP address: 192.168.1.110         IP address: 192.168.1.36
                                                                                                          IP address: 192.168.1.1
        Subnet Mask: 255.255.255.0       Subnet Mask: 255.255.255.0        Subnet Mask: 255.255.250.0
                                                                                                          Subnet Mask: 255.255.255.0
        Gateway: 192.168.1.1             Gateway: 192.168.1.1              Gateway: 192.168.1.1

                                                Figure 2
       a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the
          computers that able to communicate with each other. Justify your answer.         [ 3 marks]




                                                                      32
Panitia ICT SMK Kanowit 2011

       b.    There is one computer that unable to communicate with the other computer in the network.
            Identify that computer. Then identify the problem and re-configure the computer so that it can
            communicate with the other computers in the network.                              [3 marks]




3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1.

                                  20 desktops 1 modem
                                  1 switch    1 router       Table 1
                                  LAN cables A server

    Based on Table 1, answer the following questions.
       a. As the school network administrator, you are asked to suggest a suitable network topology to Pn.
           Malsiah, the school principal. Justify your answer.                                   [4 marks]




       b. You are also asked to suggest a suitable network architecture. Justify your answer.       [3 marks]




4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to
   set up in his company.
       a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks]




       b. Give 2 services, with the examples, provided by the internet to Mr. Ali.                     [ 4 marks]




                                                      33
Panitia ICT SMK Kanowit 2011

                                         Learning Area Four – Multimedia
4.1 – Multimedia Concepts
4.1.1 – Definition of Multimedia
4.1.1.1 – Define multimedia

 Multimedia is a




4.1.2 – Multimedia in various of fields
4.1.2.1 – Identify the use of multimedia in various fields


      Fields                       Example                                          Usage


Education




Business




Art




Medicine



4.1.3 – Interactivity of multimedia
4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia.

 Interactivity refers to




Types          File format                       Example
Text                                             Notepad, Microsoft Words
Audio

Video          *.mov, *.avi

Animations

Graphics                                         Paint, Photoshop




                                                         34
Panitia ICT SMK Kanowit 2011


             Linear                      Criteria/Characteristics                 Non-Linear


                                    User interaction with application




                                    User control over the application




                                     Application flow / arrangement




                                                  Example



4.1.4 – Medium of delivery
4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications.


                                             Medium of delivery




                                             Application Quality



                                              Production Time



                                               Production Cost



                                                 Up-to-Date



4.1.5. – Multimedia Elements
4.1.5.1 – Identify the multimedia elements




                                                        35
Panitia ICT SMK Kanowit 2011

4.2 – Hardware and software
4.2.1 – Hardware
4.2.1.1 – Identify the hardware that can be used to produce multimedia products.




4.2.2 – Editing Software
4.2.2.1 – Identify editing software that can be used to be produce multimedia elements

                                     Example:
        Text editor




                                                    Example:
       Graphics and image editor




                                     Example:
        Audio editor




                                                    Example:
        Video and animation editor




4.2.3 – Authoring Tools
4.2.3.1 – Define the various concepts in authoring tools

Criteria                  Time Frame Concepts         Icon Concepts             Card Concepts
Concepts                                              Uses visual icon in a
                                                      structural framework
Way of presentation       Uses frames that
                          represents the time
Special features                                                                Pages are arranged like
                                                                                stack of cards
Examples                  Adobe flash


                                                       36
Panitia ICT SMK Kanowit 2011

4.2.4 - Web editor
4.2.4.1 – Describe and give examples of web editors

    Text-based:




    Example:



    What You See Is What You Get (WYSIWYG):




    Example:



4.3 – Multimedia development
4.3.1 – User interface Principles
4.3.1.1 – State the user interface principles
4.3.1.2 – Apply suitable user interface principles in a project

                       Match the user interface principles with the correct statements
Consistency                                             Can move around the system: menus, help
Clarity                                                 Enable user to search keyword or glossary

Context                                                 Make their own personal learning

Navigation                                              Harmony and same applies to all screen
Search                                                  Clearness of labels on all icons
Personalisation                                         Provides support system / help files

Learnability                                            Can navigate through all sections without limitation

Flexibility                                             Each part should be relevant to the title


4.3.2 – Development Team
4.3.2.1 – State the role of each member in a development team.


                                                    Multimedia
                                                  Production Team




                                                          37
Panitia ICT SMK Kanowit 2011

    Multimedia
                                   Specialise in                    Scope of work
 Production Team
Project Manager      Leading the multimedia team




                                                           Research on the content of a
                                                           multimedia program


                     Graphics editing




Audio-video
technician



                     Educational strategies and planning




                                                           Writes program codes (scripting)
                                                           Combines the multimedia elements




4.3.3 – Multimedia production phase
4.3.3.1 – Describe the phases in multimedia productions




                                                     38
Panitia ICT SMK Kanowit 2011

Multimedia production
                                         Descriptions                          Example of activity
       phase
                               Interview clients to find out their
                               needs
                               Write problem statement and
                               proposal

                                                                         Ali uses flow chart draft the flow
                                                                         of his multimedia application.
                                                                         Ali uses storyboard to sketch the
                                                                         interface of the page.



Implementation phase


                               A checklist is used to test the
                               multimedia program.
                               It is also to fix any error found.


                                                                         James chooses a group of
                                                                         selected users to evaluate and
                                                                         give feedback to his multimedia
                                                                         program using Evaluation Form.



  Publishing phase



                        Match the screen design principles with the correct statement


       Contrast                         Usage of different types of multimedia elements

      Simplicity                        Arrangement of the elements

      Proximity                         Simple and easy way of presentation

      Repetition                        Concept of grouping similar elements

      Alignment                         Create a focus point on the screen

      Emphasis                          Concept of repetition the same texture, colour, size and font




                                                        39
Panitia ICT SMK Kanowit 2011

                                                      Questions

1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as
   shown in Table 1. He uses authoring tool software to make his project more effective and interesting.

                        Collect pictures of the school, hostels, classes, field and canteen.
                        Modify the school badge image so that it can be animated.
                        Record the school anthem.
                        Insert the school objectives, motto and school history into different screens.

                    Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3

                                                         Table 1
    Based on Table 1,

      I.      What is the name of the animated file used by Halim?

      II.     Halim wants to record his voice as background narration. Give one suitable device to carry out this
              task.

     III.     Name two missing multimedia element that is not in the files used by Halim.

     IV.      From your answer in 1 (c), give one suitable file extension for each elements you have mentioned.

2. Study the following table carefully. Then answer the questions based on Table 2.

            Phase                                           Description
                     The multimedia developers interview the client to find out their needs and write the
          X
                     problem statement and a proposal.
          Y          The multimedia developers will design a flow chart and storyboard.
                     The multimedia developers will use a checklist to test the multimedia program. If there are
          Z
                     errors, he will fix the program.
                                                      Table 2
        a) Identify phase X, Y and Z.

        b) From your answer in 2 (a), what are the missing phases?

        c) State one example activity for each of the missing phases from your answer in 2 (b).

3. User interface principles are:
      I.   Clarity
     II.   Colourful
    III.   Consistency
    IV.    Wide screen

        A.    I and II
        B.    II and IV
        C.    I and III
        D.    III and IV


                                                           40
Panitia ICT SMK Kanowit 2011

                                      Learning Area Five – Programming.

5.1 – Basic programming concepts
5.1.1 – Define program and programming language
5.1.1.1 – State the definition of program

    A computer program is




5.1.1.2 – State the definition of programming language

   A programming language is




5.1.2 – Levels and generations of programming language

                                          Level of programming
                                                 language




                                         Low-level programming
                                                language




                   Example:                                   Example:




                                          High-level programming
                                                 language




  Example:                               Example:                         Example:




                                                         41
Panitia ICT SMK Kanowit 2011

5.1.3 – Programming Language Approaches
5.1.3.1 – Define structured approach in programming


                                      Approach:                              Programs are drawn in
        Structured approach                                                   ____________________



      Smaller sections of each        A program may have a                  Example of structured
                                                                            programming languages:
      program are known as            __________________ or several
      _____________________           ________________________



     Beneficial for:




5.1.3.2 – Define object-oriented approach in programming



                                       Approach:                              The object have
           Object-oriented
              approach                                                        _____________________
                                                                              with one another

                                      Beneficial for:
       Combines ____________
                                                                             Example of structured
       with functions to create
                                                                             programming languages:
       ____________________




5.1.3.3 – Differentiate between structured approach and object oriented approach in programming

        Structured approach                     Differences                Object-oriented approach

                                                   Uses


                                                Emphasize


                                                Suitable for


                                                        42
Panitia ICT SMK Kanowit 2011

5.1.4 – Translator
5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler



                                                 Translator




                                 Is a computer program that
                                                                              Example of assembler:

         Assembler




                                   Translator method:               It is interpreted and executed in

              Interpreter                                           ______________________ when the
                                                                    user execute it


          Execute ____________ by _________             Example:
          until the end of the program.



                 Weakness:




                                   Translator methods:

               Compiler




          Advantages:                                              Example:




                                                     43
Panitia ICT SMK Kanowit 2011

5.1.5 – Basic elements in programming


                                                Basic Elements




5.1.5.1 – Differentiate between constants and variables

             Constant                               Differences                              Variable
                                                                                The value may change at any time
                                                  Characteristics               during the course of the program


                                                       Usage

1. Const Pi = 3.142                                                             1. Dim Speed as Integer
2. Const Speed = 30
                                                                                2.
                                                      Example
3.
                                           (declaration in Visual Basic 6)
                                                                                3.
4.


5.1.5.2 – Differentiate between data types: Boolean, integer, double, strings and date

Data types              Description                                             Example
Integer


                        Any number value that may and could contain a
                        fractional part.

                                                                                “Kuala Lumpur”
                                                                                “23 is larger than 20”
                                                                                “Today is Monday”
                        Consists of a TRUE or FALSE value. It is usually used
                        to store status

                        Contains date and time value




                                                         44
Panitia ICT SMK Kanowit 2011

5.1.5.3 – Differentiate between mathematical and logical (Boolean) operators.
Operators             Functions                                Operators            Example
Mathematical
                                                                       +, -, ,

                    Logical operators perform logical
                    operations such as checking the
                    condition of two Boolean values

Extra:
Operators          Description                                   Operator           Example
                                                                                    A>B
                                                                                    C >= D



5.1.5.4 – Differentiate between sequence control and selection control

                                  Identify the types control structure below.


                                                             BEGIN
                  BEGIN




                   END
                                                             END




                                                  Differences

                                                Execution flow


                                                    Usage


                                              Symbols difference




                                                        45
Panitia ICT SMK Kanowit 2011

5.2 – Program Development
5.2.1 – Program Development phases
5.2.1.1 – Describe the five main phases in program development

Phases of Program Development




                                                Coding




 Multimedia production
                                         Descriptions                 Example of activity
        phase
                                Interview clients to find out their
                                needs
                                Write problem statement and
                                proposal




      Coding Phase




                                                        46
Panitia ICT SMK Kanowit 2011

                                                    Questions
1.   Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an
     entertainment park or not. The following are the source code.

                                      if height_boy > 162 then enter =         TRUE

                                      if height_girl > 155 then enter = TRUE

                                      else,

                                      enter = FALSE

                                                         Figure 1
        Based on the programming above, answer the following questions.
         a. (i) Can height_boy and height_girl be declared as constant?
            (ii) Justify your answer.                                                                 [3 marks]
         b. (i) Identify the data types used
            (ii) Give one difference for the data types you have mentioned in b(i).                   [4 marks]

2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program.

      Private Sub CommandCheck_Click()
      Dim marks As Double, response As String

      marks = TextMark.Text

      If (marks >= 50) Then
             response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”)
      Else
             response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”)
      End If

      End Sub

                                                    Figure2(a)


                                   Begin




                               Request marks




                                                    No
                                   >= 50?                             Print “You have fail
                                                                    your ICT examination.”

                                       Yes



                            Print “You have pass
                           your ICT examination.”




                                     End



                                                    Figure 2 (b)
                                                           47
Panitia ICT SMK Kanowit 2011

     Based on Figure 2(a) and 2(b), answer the following questions:
        i.    States which phase comes after the process in Figure 2(a).
       ii.    Design the output interface for both of the outcomes.                              [7 marks]


2.   Find the correct pair of data types.
            A. Const Height = 123.8 (Integer)
            B. Const Members = 34233 (Double)
            C. Const Input_Status = TRUE (Currency)
            D. Const Address = “Kuala Lumpur” (String)

3.   Study the flow chart below carefully.


                                                    Begin




                                               Request numbers
                                               of working days.



                                            Calculate total salary:
                                        (RM 12.50 x number of working
                                                     days)



                                              Print total salary




                                                     End


                                                    Diagram 3


     Based on Diagram 3, answer the following questions:

       i.    There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol.
                                                                                                 [2 marks]
      ii.    What is the outcome of the salary if:
                a. The number of working days is six (6) days?                                   [1 mark]
                b. The salary is now RM 15 and the working days are five (5) days?               [1 mark]




                                                         48
Panitia ICT SMK Kanowit 2011

                                     Learning Area Six – Information Systems
6.1 – Concepts of Information Systems
6.1.1 – Definition
6.1.1.1 – Give the meaning of data, information and information systems.


                  Data                            Information                        Information System



    Definition                           Definition                            Definition




6.1.2 – Usage of information systems in various fields
6.1.2.1 – State the usage of information system in education, business and management.

         Fields
                           1.
       Education           2.

                           1.

        Business           2.

                           1.

     Management            2.



6.1.3 – Information System Components
6.1.3.1 – List the Information System components
6.1.3.2 – Define each of the Information System components

                            Hardware                                     Procedure
                                             End users who uses
                                             the system and
                                             information system
                                             personnel who
                                             creates the system.




                                                      49
Panitia ICT SMK Kanowit 2011

6.1.3.3 – Describe the interrelation between information system components using a diagram.




                                                                                Software




    Description:




6.1.4 – Types of Information Systems
6.1.4.1 – List five types of Information systems
6.1.4.2 – State the usage of each types of information system.


                                                                    Usage:




                                                                    Usage:




  Types of
                                                                    Usage:
  Information
  System


                                                                    Usage:




                                                                    Usage:



                                                       50
Panitia ICT SMK Kanowit 2011

6.1.5 – Hierarchy of Data
6.1.5.1 – Define bit, byte, field, record and file


           Bit




          Byte




          Field




         Record




6.1.5.2 – State the hierarchy of data




                                                     Fields




6.2.1 – Definition
6.2.1.1 – Define database and Database Management System (DBMS)


     Database




                                                      51
Panitia ICT SMK Kanowit 2011


                                          Provides an interface between the database and the user

       Database
      Management
        System




6.2.1.2 – List the benefits of using database




                                                    Benefits of
                                                       using
                                                     database




6.2.2 – Features
6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file)


          Field              Specific category of information in a table.




         Record




           File




                                                Name         Age   Class
                                                Amirullah    13    1A
                                                Sarah        15    3C
                                                Chai Leng    16    4S1


                                                            52
Panitia ICT SMK Kanowit 2011

6.2.2.2 – Define the primary key and foreign key


                                The field that ___________________________________________________
    Primary key???              It must not have __________________ value.
                                Each table must have at least ____________ primary key.
                                It is also known as ___________________________.



                               The field that ___________________________________________________
    Foreign key???             It can have __________________ value.
                               It is ______________________________________ in other tables.
                               It is also known as ___________________________.


6.2.2.3 – State the importance of the primary key.




6.2.2.4 – Differentiate between the primary key and foreign key.

            Primary key                              Property                             Foreign key
                                                      Usage
                                                     Null value
                                                     Duplicate

6.2.2.5 – State the importance of the relationship between the primary key and foreign key.




6.2.3 – Database Objects
6.2.3.1 – Define the following database objects / tools: Table, form, query, report

Database Object              Definition

          Table



          Form



          Query


                                                        53
Panitia ICT SMK Kanowit 2011



         Report



6.2.4 – Data Manipulation
6.2.4.1 – List the basic operations of data manipulation
6.2.4.2 – State the usage of basic operations in data manipulation

 Basic operation of data
                                                                       Usage
      manipulation




           Sort


                            To remove record(s) from the database




          Filter




6.3 – Database Development
6.3.1 – Phases of System Development
6.3.1.1 – Describe the phases of System Development

  System Development
                                          Descriptions                              Example of activity
         phase
                                 Interview clients to find out their
                                 needs
                                 Write problem statement and
                                 proposal




                                                                               Ali chooses the data he has
                                                                               collected during his interview.
                                                                               Ali draft out the table contains
                                                                               necessary data.




                                                         54
Panitia ICT SMK Kanowit 2011




Implementation phase




                       It involves the system developer
                       and users
                       It is to ensure the quality of a
                       database.




                                                          James documents all the
                                                          information from source code to
                                                          user manual to troubleshooting
                                                          information.




                       Involves three types of
                       maintenance:
                       o
                       o
 Maintenance phase
                       o




                                            55
Panitia ICT SMK Kanowit 2011

                                                Questions
Table 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a Simple
Query Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria.




                       Table 1                                               Figure2




                                                                                   Figure 3

   a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view
      the grades of the co curriculum activities for each student. Justify your answer.                [3 marks]
   b) Based on the query design in Figure 10, complete the query result below to show the information
      obtained.                                                                                       [ 3 marks]

               Class               Stu_ID               Name                Position               CoCu




   c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify
      your answer.                                                                                  [3 marks]




                                                      56

Contenu connexe

Tendances

Inside the computer
Inside the computerInside the computer
Inside the computerZafar Ayub
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and mediaAnjan Mahanta
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10Annu Ahmed
 
2.3 worksheet ICT O Level
2.3 worksheet ICT O Level2.3 worksheet ICT O Level
2.3 worksheet ICT O LevelAdnan Saleem
 
Computer hardware and maintenance
Computer hardware and   maintenanceComputer hardware and   maintenance
Computer hardware and maintenanceImran Khan
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to ComputerHalimaton Sa'adiah
 
Intro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageIntro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageJohn Goldsworthy
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programshaider ali
 
Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of ComputerJack Frost
 
CBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxCBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxmrunalshethiya
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersKate Bailey
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7samina khan
 
how to start and shut down a computer.ppt
how to start and shut down a computer.ppthow to start and shut down a computer.ppt
how to start and shut down a computer.pptaksh534954
 

Tendances (20)

Inside the computer
Inside the computerInside the computer
Inside the computer
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and media
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
 
Windows 8 ppt
Windows 8 pptWindows 8 ppt
Windows 8 ppt
 
Defragmentation
DefragmentationDefragmentation
Defragmentation
 
2.3 worksheet ICT O Level
2.3 worksheet ICT O Level2.3 worksheet ICT O Level
2.3 worksheet ICT O Level
 
Computer hardware and maintenance
Computer hardware and   maintenanceComputer hardware and   maintenance
Computer hardware and maintenance
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Computer operation
Computer operationComputer operation
Computer operation
 
Boot process
Boot processBoot process
Boot process
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to Computer
 
Intro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageIntro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and Storage
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of Computer
 
CBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxCBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptx
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computers
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
how to start and shut down a computer.ppt
how to start and shut down a computer.ppthow to start and shut down a computer.ppt
how to start and shut down a computer.ppt
 

En vedette

Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersAlithea Barbosa
 
Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheetDonna Rue
 
Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5cikgushaharizan
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework WorksheetBiscette InfoTech
 
Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4cikgushaharizan
 
Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)Biscette InfoTech
 
Computer Worksheets Std 8
Computer Worksheets Std 8Computer Worksheets Std 8
Computer Worksheets Std 8Alithea Barbosa
 
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4cikgushaharizan
 
Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5cikgushaharizan
 
Input Devices Crossword Puzzle
Input Devices Crossword PuzzleInput Devices Crossword Puzzle
Input Devices Crossword PuzzleBiscette InfoTech
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functionsBESOR ACADEMY
 
Шифр магического квадрата
Шифр магического квадратаШифр магического квадрата
Шифр магического квадратаDdeva
 
computer basics from bismark
computer basics from bismark computer basics from bismark
computer basics from bismark BISMARK AMOAH
 
All keyboard short cuts in microsoft office by bismark
All keyboard short cuts in microsoft office by bismarkAll keyboard short cuts in microsoft office by bismark
All keyboard short cuts in microsoft office by bismarkBISMARK AMOAH
 
GILFRED AFRAWUAH'S 2016 CV
GILFRED AFRAWUAH'S  2016 CVGILFRED AFRAWUAH'S  2016 CV
GILFRED AFRAWUAH'S 2016 CVGILFRED AFRAWUAH
 

En vedette (20)

Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheet
 
Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5
 
Worksheet2
Worksheet2Worksheet2
Worksheet2
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
 
Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4
 
Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)
 
Computer Worksheets Std 8
Computer Worksheets Std 8Computer Worksheets Std 8
Computer Worksheets Std 8
 
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4
 
Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5
 
Input Devices Crossword Puzzle
Input Devices Crossword PuzzleInput Devices Crossword Puzzle
Input Devices Crossword Puzzle
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
 
Шифр магического квадрата
Шифр магического квадратаШифр магического квадрата
Шифр магического квадрата
 
Ipos cycle
Ipos cycle Ipos cycle
Ipos cycle
 
INPUT DEVICES
INPUT DEVICESINPUT DEVICES
INPUT DEVICES
 
computer basics from bismark
computer basics from bismark computer basics from bismark
computer basics from bismark
 
Bece 2012
Bece 2012Bece 2012
Bece 2012
 
All keyboard short cuts in microsoft office by bismark
All keyboard short cuts in microsoft office by bismarkAll keyboard short cuts in microsoft office by bismark
All keyboard short cuts in microsoft office by bismark
 
Worksheet inputdevices1
Worksheet inputdevices1Worksheet inputdevices1
Worksheet inputdevices1
 
GILFRED AFRAWUAH'S 2016 CV
GILFRED AFRAWUAH'S  2016 CVGILFRED AFRAWUAH'S  2016 CV
GILFRED AFRAWUAH'S 2016 CV
 

Similaire à Worksheet complete set 180111

1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docxkarisariddell
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersSamudin Kassan
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
Introduction to Internet of Things
 Introduction to Internet of Things Introduction to Internet of Things
Introduction to Internet of ThingsJayanthi Kannan MK
 
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdfJayanthi Kannan MK
 
Chapter 01 - Introduction to Computers
Chapter 01 - Introduction to ComputersChapter 01 - Introduction to Computers
Chapter 01 - Introduction to Computerspatf719
 
Copyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and ChinaCopyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and ChinaHanSangWoo7
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfBabylyn Atillaga
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdfROMARIEQUIJANO
 
Empowerment Technology: ICT and its Current State
Empowerment Technology: ICT and its Current StateEmpowerment Technology: ICT and its Current State
Empowerment Technology: ICT and its Current StateLeeJabar
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 
DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)Riina Vuorikari
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfLadyCheyenneMontefal
 

Similaire à Worksheet complete set 180111 (20)

1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
ITED.docx
ITED.docxITED.docx
ITED.docx
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Bab I
Bab IBab I
Bab I
 
Introduction to Internet of Things
 Introduction to Internet of Things Introduction to Internet of Things
Introduction to Internet of Things
 
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
 
Chapter 01 - Introduction to Computers
Chapter 01 - Introduction to ComputersChapter 01 - Introduction to Computers
Chapter 01 - Introduction to Computers
 
Copyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and ChinaCopyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and China
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT (2).pdf
 
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdfADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdf
ADMSHS_Emp_Tech_Q1_M1_L1-ICT.pdf
 
Empowerment Technology: ICT and its Current State
Empowerment Technology: ICT and its Current StateEmpowerment Technology: ICT and its Current State
Empowerment Technology: ICT and its Current State
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
 
Basic it
Basic itBasic it
Basic it
 
Information Technologies
Information TechnologiesInformation Technologies
Information Technologies
 

Dernier

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Dernier (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Worksheet complete set 180111

  • 1. Panitia ICT SMK Kanowit 2011 Learning Area One – ICT and Society 1.1 – Introduction to ICT. 1.1.1 – Overview of ICT. 1.1.1.1 – Define ICT ICT is defined as Information is defined as Communication is defined as Technology is defined as 1.1.1.2 – Describe the brief evolution of computers First Generation (1940-1956) Second Generation (1956 - 1963) Technology: Technology: Problems: Advantages: Scientists: Scientists: Example: Scientist: Third Generation (1964-1971) Technology: Advantages: 1
  • 2. Panitia ICT SMK Kanowit 2011 Fourth Generation (1971 - present) Fifth Generation (Present & beyond) Technology: Technology: Advantages: Scientists: Example: 1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce 1.1.2.1 – List the usage of ICT in everyday life. Education Industry 1. Students can use computer as references tool and 1. browse internet for information 2. 2. Banking Commerce 1. 1. 2. 2. 1.1.2.2 – State the differences between computerised and non-computerised systems. Field Non- Computerised Computerised 1. Students listen mainly to 1. Students can use internet to teacher explanation. search for information and do not rely mainly on teacher. Education 2. 2. 2
  • 3. Panitia ICT SMK Kanowit 2011 1. 1. Banking 2. 2. 1. 1. Industry 2. 2. 1. 1. Commerce 2. 2. 1.1.2.3 – State the impact of ICT on society. Positive Impact Negative Impact 3
  • 4. Panitia ICT SMK Kanowit 2011 1.2 – Computer Ethics and Legal Issues 1.2.1 – Definition 1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Computer Ethics is a Definition: Code of Good examples: Bad examples: Ethics: 1. 1. 2. 2. Computer Crimes Intellectual property refers to __________________________________ __________________________________ Any criminal activity ________________________ __________________________________ _________________________________________ _________________________________. _________________________________________ These works are ____________________ There are 4 types of computer crimes: __________________________________  __________________________________    Privacy in IT refers to Information privacy is described as Cyber law refers to 4
  • 5. Panitia ICT SMK Kanowit 2011 1.2.1.2 – Differentiate between ethics and law. Definition of Ethics Definition of Law 1. Similarity between ethics and law 2. Ethics Law Keywords Explanations Keywords Explanations As a rule to control Moral standards computer users Computer users are free to follow or ignore the codes of ethics Must follow Depends on country and state where the crime is committed Universals Crime 1. 1. Examples 2. 2. 5
  • 6. Panitia ICT SMK Kanowit 2011 1.2.1.3 – State the need for Intellectual property laws Why do we need intellectual property law??? 1.2.2 – Privacy 1.2.2.1 – List ways to protect privacy. Privacy is threatened through … Ways to protect privacy 6
  • 7. Panitia ICT SMK Kanowit 2011 1.2.2.2 – State authentication and verification methods / technologies Authentication is a process Methods Pictures Name Functions / Explanation Analyses the features that exist in the coloured tissue surrounding the pupil. Biometric Devices Scanning of retina and analyzing the layer of blood vessels at the back of the eye. This method is commonly used in bank operation and business transactions. 7
  • 8. Panitia ICT SMK Kanowit 2011 Verification is the act of Methods of verification Examples 1.2.3 – Controversial Contents and Control 1.2.3.1 – List the effects of controversial content on society (pornography & slander) Pornography Slander Impacts???? Examples 1.2.3.2 – Describe the process of filtering to control access to controversial contents. Methods Website / site blocking Uses lists of banned Rated by RSACI for the words. content of the website. If filter search found any Browser is set to accept How??? words listed, it will stop pages with certain levels downloading and block of ratings. the page. 8
  • 9. Panitia ICT SMK Kanowit 2011 1.2.4 – Computer Crimes 1.2.4.1 – Explain the need for Cyber Law. For: Needs for For: Cyber Law For: For: For: 1.2.4.2 – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks. Computer Crimes Definition Example 1.3 – Computer security 1.3.1 – Definition 1.3.1.1 – Define computer security Computer security means 9
  • 10. Panitia ICT SMK Kanowit 2011 Types of computer security 1.3.2 – Security Threats 1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster, theft. Security Threats Malicious Code Hacking Natural Disaster Theft Definition: Definition: Definition: Definition: Examples: Examples: Examples: Flood Fire Earthquakes 1.3.3 – Security Measures 1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats 1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup, human aspect Identify and write the appropriate security procedures in the SECURITY column and the security threats in the THREATS column. Situation THREATS SECURITY Ahmad’s has asked his secretary, Minah, to send an email to his business partner in Japan. Minah tries to read Ahmad’s email. Every two weeks Harry would save a copy of his files from his laptop to his external hard disk in case his computer breaks down. 10
  • 11. Panitia ICT SMK Kanowit 2011 One day, Karim found out his files has been corrupted. He needs to scan using appropriate utility. While using the internet, Flora founds out that some of her private information showed up in an unknown browser. Daisy is a software engineer. One day, she found out that on her computer pops out a message that writes “An unknown source is trying to by-pass your security system” Bank safe vault is one of the restricted areas in the office. Only authorized personal are allow to enter. Questions 1. Copyright infringement is defined as a violation of the rights secured by Copyright Act. a. Give two examples of copyright infringement. b. Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats for: i. Data lost ii. Hiding information. 2. Which of the following are biometric devices? I. Hand geometry II. Callback System III. Retinal Scanning IV. Signature Verification System A. I, II and III B. I, II and IV C. I, III and IV D. II, III and IV 11
  • 12. Panitia ICT SMK Kanowit 2011 Learning Area Two – Computer System. 2.1 – System Concept 2.1.1 – Overview of computer systems 2.1.1.1 – Define computer systems 2.1.1.2 – State the meaning of input, processor, output and storage. COMPUTER SYSTEM PROCESS STORAGE OUTPUT INPUT 2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage. Description of Information Processing Cycle 12
  • 13. Panitia ICT SMK Kanowit 2011 Fetch MACHINE CYCLE 2.1.2 – Data Representation 2.1.2.1 – State the relationship of data representation: Bit, byte, and character. _______ bits 1 byte _______ character 2.1.3 – Introductory to binary coding 2.1.3.1 – Explain the function of ASCII code ASCII: American _______________________________________________________________________ ____________________________________________________________________________________ Functions: 1. 2. 13
  • 14. Panitia ICT SMK Kanowit 2011 Criteria ASCII EBCDIC Unicode Number of bits in a byte Usage Supported languages Example 2.1.4 – Data measurement 2.1.4.1 – State the units of data measurement. Term Abbreviation Approx. size Exact Amount Index power Bit -- -- -- -- Byte -- -- -- -- KB Megabyte GB Terabyte 2.1.5 – Clock Speed Measurement 2.1.5.2 – State the units of clock speed measurement. Unit used : __________________________________ = ____________ cycle per second Term Abbreviation Cycle per second Megahertz Gigahertz GHz 2.2 – Hardware Types of hardware Motherboard 14
  • 15. Panitia ICT SMK Kanowit 2011 2.2.1 – Input Devices 2.2.1.1 – Identify the input devices used for text, graphics, audio and video Types Picture Name Other examples 1. Text 2. 1. Graphics 2. 1. Audio 2. 1. Video 2. 2.2.2 – Output devices 2.2.2.1 – Identify the output devices used for text, graphics, audio and video Output Device Text graphics audio video Monitor    Speaker 15
  • 16. Panitia ICT SMK Kanowit 2011 2.2.3 – Motherboard 2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot, ports and connectors on the motherboard. Ports 16
  • 17. Panitia ICT SMK Kanowit 2011 2.2.4 – Storage 2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic medium, optical medium, flash memory) Primary storage is located at _______________________________________________ What is ROM? ____________ Only Memory: memory whose contents can be accessed and read but ______________ be changed. The memory of a ROM is ________________________ which means the program and data will not be __________________. Types of ROM: PROM EPROM EEPROM What is RAM? Random _____________________ Memory: memory whose contents can be _________________, read and ______________. The memory of a RAM is ________________________ which means the program and data will be __________________. 2.3.1 – Operating System (OS) 2.3.1.1 – State the various types of OS used on different platforms. OS Platform Example Example Example 17
  • 18. Panitia ICT SMK Kanowit 2011 2.3.1.2 – State the functions of OS Functions of OS 2.3.1.3 – State the different interfaces of OS 18
  • 19. Panitia ICT SMK Kanowit 2011 2.3.2 – Application Software 2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic) 2.3.2.2 – Describe the uses of application software. Types Examples Functions / Usages Word processor Microsoft Excel Corel Quattpro Pro Sun StarOffice Calc Provides pre-defined presentation format Applying special effects to the slide transition. Enhance text, charts and graphical images. Edit digital non-text information such as photo and drawings Draw pictures using various tools such as brush and pen Modifying contrast and brightness Adding special effects 2.3.3 – Utility program 2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and file compression) Types Examples Functions / Usages 1. 1. File managements 2. 2. 1. 1. Diagnostics 2. 2. 1. 1. File Compression 2. 2. 19
  • 20. Panitia ICT SMK Kanowit 2011 2.3.4 – Proprietary and Open Source Software. 2.3.4.1 - Differentiate between proprietary and open source Criteria Proprietary Open Source 1. 1. It is Free 2. 2. 3. Advantages 3. 1. User need to buy the product 1. key (license key) in order to use 2. Disadvantages 3. 1. Microsoft Office 2010 1. Example for application 2. software 2. 1. 1. Ubuntu 2. Example for OS 2. 20
  • 21. Panitia ICT SMK Kanowit 2011 Learning Area 3 – Computer Network and Communications 3.1 – Basic Concepts of Computer Networks and Communications 3.1.1 – Definition 3.1.1.1 – Define computer networks 3.1.1.2 – Define communication Computer network is Communication is 3.1.2 – Importance of Computer Network. 3.1.2.1 – State two importance of computer networks and communication in the following fields Education E-Business E-Commerce E-Banking 3.1.3 – Types of Network 3.1.3.1 - Define types of Computer network. LAN a. ______________ Area __________________. b. __________________ network compare to ___________ and WAN. c. Operated within a limited _________________________________________. d. Devices connected usually are less than ____________________________. e. Hardware used: ______________________________, ________________________________, ________________________________, _____________________________________. f. Transmit data at a very _______________ speed. a. ___________________ Area _________________________. MAN b. Located at ____________________ cities such as _________________________. c. Used ____________________________________ as transmission media. d. Can be collections of ______________. 21
  • 22. Panitia ICT SMK Kanowit 2011 a. ________________________ Area __________________________. WAN b. ______________________ network of all. An example is __________________________. c. Generally it covers large ______________________ such as a state, ________________ or ___________________. d. A group of _____________ or ____________ or a mixture of ____________. e. Uses transmission media such as _________________________________________________. f. Need ___________________ to connect two or more network. 3.1.3.2 – Differentiate between the three types of computer network. Criteria LAN MAN WAN Network size Number of computers Transmission media types Speed Cost 3.1.4 – Network Architecture 3.1.4.1 – Define two types of network architecture. Network Architecture Client/Server Peer-to-Peer Definition Cabling cost Network usage Ease to manage Software needed 22
  • 23. Panitia ICT SMK Kanowit 2011 3.1.5 – Network Topology. 3.1.5.1 – State three types of network topologies: Bus, Ring, Star Definition: structure or configuration of ______________________ for ____________________. Topology Diagram 3.1.5.2 - Differentiate between the three types of network topology Aspect Ring Topology Star Topology Bus Topology Host failure Node Failure Structure Ease of adding/removing nodes Ease of troubleshooting Number of nodes when extending network Connection between nodes Host existence 23
  • 24. Panitia ICT SMK Kanowit 2011 3.1.6 - Protocol 3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitate communication over computer network. Definition: Protocol is ……….. Importance of protocol: TCP/IP: 3.1.7 – Internet, Intranet, Extranet. 3.1.7.1 – Describe the types of network communications technology (Internet, Intranet, Extranet) Criteria Internet Intranet Extranet Definition Usage Services Accessibility Security 24
  • 25. Panitia ICT SMK Kanowit 2011 3.2 – Hardware Requirements 3.2.1 – Devices 3.2.1.1 – Identify the function of the devices needed in computer network communication. 3.2.1.2 – State the function of the devices needed in computer network communication. Diagram Device Name Function Diagram Device Name Function From router To MODEM 25
  • 26. Panitia ICT SMK Kanowit 2011 3.2.2 – Medium 3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable. 3.2.2.2 – Identify various types of wireless transmission media. 1 2 3 4 3.3 – Software Requirements. 3.3.1 – Server Software 3.3.1.1 – Define Network Operating System.  Network Operating System or known as __________ allows to ____________________ computers and peripheral to a ______________________________.  Most frequently used with ______________ and ____________________ but also have application to larger _____________________________________________.  It is not the same as the ____________________________________________ provided by some existing __________________________________________.  It is specifically written to keep __________________________ running at __________________________________________________. 26
  • 27. Panitia ICT SMK Kanowit 2011 3.3.1.2 – Name various Network Operating System Software. 1. Window NT 2. N 3. O S 4. 3.3.2 – Client Software 3.3.2.1 – State the functions of various client software. Client Software Function Example 1. 1. Internet Explorer (IE) 2. 2. Web Browser 3. 3. 1. 1. Outlook Express E-mail client 2. 1. 1. Ping Network Utilities 2. 2. 1. 1. Network Neighbourhood Network File Manager 2. 2. 27
  • 28. Panitia ICT SMK Kanowit 2011 3.4 – Setting Network Facilities 3.4.1 – Installation of Network Interface Cards (NIC) This is a Step 1a: Place your ___________________________________ in the PCI of your computer Step 1b: Window will ____________________ that it has found new hardware Step 1c: The “Found New Hardware Wizard” will then ___________________. Click __________ to continue Step 2a: Select “CD-ROM Drives” and click “Next” to ________________. Window will find suitable _____________ for your device. 28
  • 29. Panitia ICT SMK Kanowit 2011 Step 2b: The NIC driver is now properly installed. __________________ the computer to complete the installation. 3.4.1.2 – Install drivers for NIC (for WinXP) Step 1: Windows will indicate a new hardware found after the NIC has been inserted into its slot. Click Next to continue. Step 2: Select “Search for the best driver for my device (recommended)” and click “________________” to continue Step 3: Select “CD-ROM Drives” and click “Next” to continue. Windows will now search for the best driver for your device. 29
  • 30. Panitia ICT SMK Kanowit 2011 Step 4: Windows will locate the correct driver for your device and indicate that it is now ready to install the driver. Click “Next” to continue. Step 4: The NIC driver is now properly __________________________. 3.4.2 – Cable Crimping and Testing 3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable). 2 types From PC to PC From PC to hub/switch/router TOOLS 30
  • 31. Panitia ICT SMK Kanowit 2011 3.4.3 – Configuration and Testing Network. 3.4.3.1 – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Test the network connection. IP is _________________________________________________________. Subnet mask specifies __________________________________ of the network. _________________________________ are used to connect other network and the _____________________________________________ 3.4.3.2 - Steps to test a network connection: 1. 2. 3. 4. 3.4.4 Share Data 3.4.4.1 – Create a share folder. 1. 2. 3. 4. 31
  • 32. Panitia ICT SMK Kanowit 2011 Questions 1. Figure 1 shows a network configuration. INTERNET PC 1 IP address: 192.168.1.5 PC 2 Subnet Mask: 255.255.253.0 IP address: 192.168.1.5 Gateway: 192.168.1.1 Subnet Mask: 255.255.253.0 Gateway: 192.168.1.1 ADSL MODEM IP address: 192.168.1.1 Subnet Mask: 255.255.255.0 Figure 1 a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other. [4 marks] b. Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then filled the table below for the new configuration. Computer IP address Subnet Mask PC 1 PC 2 2. Computer A Computer B Computer C ADSL MODEM IP address: 192.168.1.36 IP address: 192.168.1.110 IP address: 192.168.1.36 IP address: 192.168.1.1 Subnet Mask: 255.255.255.0 Subnet Mask: 255.255.255.0 Subnet Mask: 255.255.250.0 Subnet Mask: 255.255.255.0 Gateway: 192.168.1.1 Gateway: 192.168.1.1 Gateway: 192.168.1.1 Figure 2 a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the computers that able to communicate with each other. Justify your answer. [ 3 marks] 32
  • 33. Panitia ICT SMK Kanowit 2011 b. There is one computer that unable to communicate with the other computer in the network. Identify that computer. Then identify the problem and re-configure the computer so that it can communicate with the other computers in the network. [3 marks] 3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1. 20 desktops 1 modem 1 switch 1 router Table 1 LAN cables A server Based on Table 1, answer the following questions. a. As the school network administrator, you are asked to suggest a suitable network topology to Pn. Malsiah, the school principal. Justify your answer. [4 marks] b. You are also asked to suggest a suitable network architecture. Justify your answer. [3 marks] 4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to set up in his company. a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks] b. Give 2 services, with the examples, provided by the internet to Mr. Ali. [ 4 marks] 33
  • 34. Panitia ICT SMK Kanowit 2011 Learning Area Four – Multimedia 4.1 – Multimedia Concepts 4.1.1 – Definition of Multimedia 4.1.1.1 – Define multimedia Multimedia is a 4.1.2 – Multimedia in various of fields 4.1.2.1 – Identify the use of multimedia in various fields Fields Example Usage Education Business Art Medicine 4.1.3 – Interactivity of multimedia 4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia. Interactivity refers to Types File format Example Text Notepad, Microsoft Words Audio Video *.mov, *.avi Animations Graphics Paint, Photoshop 34
  • 35. Panitia ICT SMK Kanowit 2011 Linear Criteria/Characteristics Non-Linear User interaction with application User control over the application Application flow / arrangement Example 4.1.4 – Medium of delivery 4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications. Medium of delivery Application Quality Production Time Production Cost Up-to-Date 4.1.5. – Multimedia Elements 4.1.5.1 – Identify the multimedia elements 35
  • 36. Panitia ICT SMK Kanowit 2011 4.2 – Hardware and software 4.2.1 – Hardware 4.2.1.1 – Identify the hardware that can be used to produce multimedia products. 4.2.2 – Editing Software 4.2.2.1 – Identify editing software that can be used to be produce multimedia elements Example: Text editor Example: Graphics and image editor Example: Audio editor Example: Video and animation editor 4.2.3 – Authoring Tools 4.2.3.1 – Define the various concepts in authoring tools Criteria Time Frame Concepts Icon Concepts Card Concepts Concepts Uses visual icon in a structural framework Way of presentation Uses frames that represents the time Special features Pages are arranged like stack of cards Examples Adobe flash 36
  • 37. Panitia ICT SMK Kanowit 2011 4.2.4 - Web editor 4.2.4.1 – Describe and give examples of web editors Text-based: Example: What You See Is What You Get (WYSIWYG): Example: 4.3 – Multimedia development 4.3.1 – User interface Principles 4.3.1.1 – State the user interface principles 4.3.1.2 – Apply suitable user interface principles in a project Match the user interface principles with the correct statements Consistency Can move around the system: menus, help Clarity Enable user to search keyword or glossary Context Make their own personal learning Navigation Harmony and same applies to all screen Search Clearness of labels on all icons Personalisation Provides support system / help files Learnability Can navigate through all sections without limitation Flexibility Each part should be relevant to the title 4.3.2 – Development Team 4.3.2.1 – State the role of each member in a development team. Multimedia Production Team 37
  • 38. Panitia ICT SMK Kanowit 2011 Multimedia Specialise in Scope of work Production Team Project Manager Leading the multimedia team Research on the content of a multimedia program Graphics editing Audio-video technician Educational strategies and planning Writes program codes (scripting) Combines the multimedia elements 4.3.3 – Multimedia production phase 4.3.3.1 – Describe the phases in multimedia productions 38
  • 39. Panitia ICT SMK Kanowit 2011 Multimedia production Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Ali uses flow chart draft the flow of his multimedia application. Ali uses storyboard to sketch the interface of the page. Implementation phase A checklist is used to test the multimedia program. It is also to fix any error found. James chooses a group of selected users to evaluate and give feedback to his multimedia program using Evaluation Form. Publishing phase Match the screen design principles with the correct statement Contrast Usage of different types of multimedia elements Simplicity Arrangement of the elements Proximity Simple and easy way of presentation Repetition Concept of grouping similar elements Alignment Create a focus point on the screen Emphasis Concept of repetition the same texture, colour, size and font 39
  • 40. Panitia ICT SMK Kanowit 2011 Questions 1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as shown in Table 1. He uses authoring tool software to make his project more effective and interesting. Collect pictures of the school, hostels, classes, field and canteen. Modify the school badge image so that it can be animated. Record the school anthem. Insert the school objectives, motto and school history into different screens. Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3 Table 1 Based on Table 1, I. What is the name of the animated file used by Halim? II. Halim wants to record his voice as background narration. Give one suitable device to carry out this task. III. Name two missing multimedia element that is not in the files used by Halim. IV. From your answer in 1 (c), give one suitable file extension for each elements you have mentioned. 2. Study the following table carefully. Then answer the questions based on Table 2. Phase Description The multimedia developers interview the client to find out their needs and write the X problem statement and a proposal. Y The multimedia developers will design a flow chart and storyboard. The multimedia developers will use a checklist to test the multimedia program. If there are Z errors, he will fix the program. Table 2 a) Identify phase X, Y and Z. b) From your answer in 2 (a), what are the missing phases? c) State one example activity for each of the missing phases from your answer in 2 (b). 3. User interface principles are: I. Clarity II. Colourful III. Consistency IV. Wide screen A. I and II B. II and IV C. I and III D. III and IV 40
  • 41. Panitia ICT SMK Kanowit 2011 Learning Area Five – Programming. 5.1 – Basic programming concepts 5.1.1 – Define program and programming language 5.1.1.1 – State the definition of program A computer program is 5.1.1.2 – State the definition of programming language A programming language is 5.1.2 – Levels and generations of programming language Level of programming language Low-level programming language Example: Example: High-level programming language Example: Example: Example: 41
  • 42. Panitia ICT SMK Kanowit 2011 5.1.3 – Programming Language Approaches 5.1.3.1 – Define structured approach in programming Approach: Programs are drawn in Structured approach ____________________ Smaller sections of each A program may have a Example of structured programming languages: program are known as __________________ or several _____________________ ________________________ Beneficial for: 5.1.3.2 – Define object-oriented approach in programming Approach: The object have Object-oriented approach _____________________ with one another Beneficial for: Combines ____________ Example of structured with functions to create programming languages: ____________________ 5.1.3.3 – Differentiate between structured approach and object oriented approach in programming Structured approach Differences Object-oriented approach Uses Emphasize Suitable for 42
  • 43. Panitia ICT SMK Kanowit 2011 5.1.4 – Translator 5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler Translator Is a computer program that Example of assembler: Assembler Translator method: It is interpreted and executed in Interpreter ______________________ when the user execute it Execute ____________ by _________ Example: until the end of the program. Weakness: Translator methods: Compiler Advantages: Example: 43
  • 44. Panitia ICT SMK Kanowit 2011 5.1.5 – Basic elements in programming Basic Elements 5.1.5.1 – Differentiate between constants and variables Constant Differences Variable The value may change at any time Characteristics during the course of the program Usage 1. Const Pi = 3.142 1. Dim Speed as Integer 2. Const Speed = 30 2. Example 3. (declaration in Visual Basic 6) 3. 4. 5.1.5.2 – Differentiate between data types: Boolean, integer, double, strings and date Data types Description Example Integer Any number value that may and could contain a fractional part. “Kuala Lumpur” “23 is larger than 20” “Today is Monday” Consists of a TRUE or FALSE value. It is usually used to store status Contains date and time value 44
  • 45. Panitia ICT SMK Kanowit 2011 5.1.5.3 – Differentiate between mathematical and logical (Boolean) operators. Operators Functions Operators Example Mathematical +, -, , Logical operators perform logical operations such as checking the condition of two Boolean values Extra: Operators Description Operator Example A>B C >= D 5.1.5.4 – Differentiate between sequence control and selection control Identify the types control structure below. BEGIN BEGIN END END Differences Execution flow Usage Symbols difference 45
  • 46. Panitia ICT SMK Kanowit 2011 5.2 – Program Development 5.2.1 – Program Development phases 5.2.1.1 – Describe the five main phases in program development Phases of Program Development Coding Multimedia production Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Coding Phase 46
  • 47. Panitia ICT SMK Kanowit 2011 Questions 1. Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an entertainment park or not. The following are the source code. if height_boy > 162 then enter = TRUE if height_girl > 155 then enter = TRUE else, enter = FALSE Figure 1 Based on the programming above, answer the following questions. a. (i) Can height_boy and height_girl be declared as constant? (ii) Justify your answer. [3 marks] b. (i) Identify the data types used (ii) Give one difference for the data types you have mentioned in b(i). [4 marks] 2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program. Private Sub CommandCheck_Click() Dim marks As Double, response As String marks = TextMark.Text If (marks >= 50) Then response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”) Else response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”) End If End Sub Figure2(a) Begin Request marks No >= 50? Print “You have fail your ICT examination.” Yes Print “You have pass your ICT examination.” End Figure 2 (b) 47
  • 48. Panitia ICT SMK Kanowit 2011 Based on Figure 2(a) and 2(b), answer the following questions: i. States which phase comes after the process in Figure 2(a). ii. Design the output interface for both of the outcomes. [7 marks] 2. Find the correct pair of data types. A. Const Height = 123.8 (Integer) B. Const Members = 34233 (Double) C. Const Input_Status = TRUE (Currency) D. Const Address = “Kuala Lumpur” (String) 3. Study the flow chart below carefully. Begin Request numbers of working days. Calculate total salary: (RM 12.50 x number of working days) Print total salary End Diagram 3 Based on Diagram 3, answer the following questions: i. There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol. [2 marks] ii. What is the outcome of the salary if: a. The number of working days is six (6) days? [1 mark] b. The salary is now RM 15 and the working days are five (5) days? [1 mark] 48
  • 49. Panitia ICT SMK Kanowit 2011 Learning Area Six – Information Systems 6.1 – Concepts of Information Systems 6.1.1 – Definition 6.1.1.1 – Give the meaning of data, information and information systems. Data Information Information System Definition Definition Definition 6.1.2 – Usage of information systems in various fields 6.1.2.1 – State the usage of information system in education, business and management. Fields 1. Education 2. 1. Business 2. 1. Management 2. 6.1.3 – Information System Components 6.1.3.1 – List the Information System components 6.1.3.2 – Define each of the Information System components Hardware Procedure End users who uses the system and information system personnel who creates the system. 49
  • 50. Panitia ICT SMK Kanowit 2011 6.1.3.3 – Describe the interrelation between information system components using a diagram. Software Description: 6.1.4 – Types of Information Systems 6.1.4.1 – List five types of Information systems 6.1.4.2 – State the usage of each types of information system. Usage: Usage: Types of Usage: Information System Usage: Usage: 50
  • 51. Panitia ICT SMK Kanowit 2011 6.1.5 – Hierarchy of Data 6.1.5.1 – Define bit, byte, field, record and file Bit Byte Field Record 6.1.5.2 – State the hierarchy of data Fields 6.2.1 – Definition 6.2.1.1 – Define database and Database Management System (DBMS) Database 51
  • 52. Panitia ICT SMK Kanowit 2011 Provides an interface between the database and the user Database Management System 6.2.1.2 – List the benefits of using database Benefits of using database 6.2.2 – Features 6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file) Field Specific category of information in a table. Record File Name Age Class Amirullah 13 1A Sarah 15 3C Chai Leng 16 4S1 52
  • 53. Panitia ICT SMK Kanowit 2011 6.2.2.2 – Define the primary key and foreign key The field that ___________________________________________________ Primary key??? It must not have __________________ value. Each table must have at least ____________ primary key. It is also known as ___________________________. The field that ___________________________________________________ Foreign key??? It can have __________________ value. It is ______________________________________ in other tables. It is also known as ___________________________. 6.2.2.3 – State the importance of the primary key. 6.2.2.4 – Differentiate between the primary key and foreign key. Primary key Property Foreign key Usage Null value Duplicate 6.2.2.5 – State the importance of the relationship between the primary key and foreign key. 6.2.3 – Database Objects 6.2.3.1 – Define the following database objects / tools: Table, form, query, report Database Object Definition Table Form Query 53
  • 54. Panitia ICT SMK Kanowit 2011 Report 6.2.4 – Data Manipulation 6.2.4.1 – List the basic operations of data manipulation 6.2.4.2 – State the usage of basic operations in data manipulation Basic operation of data Usage manipulation Sort To remove record(s) from the database Filter 6.3 – Database Development 6.3.1 – Phases of System Development 6.3.1.1 – Describe the phases of System Development System Development Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Ali chooses the data he has collected during his interview. Ali draft out the table contains necessary data. 54
  • 55. Panitia ICT SMK Kanowit 2011 Implementation phase It involves the system developer and users It is to ensure the quality of a database. James documents all the information from source code to user manual to troubleshooting information. Involves three types of maintenance: o o Maintenance phase o 55
  • 56. Panitia ICT SMK Kanowit 2011 Questions Table 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a Simple Query Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria. Table 1 Figure2 Figure 3 a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view the grades of the co curriculum activities for each student. Justify your answer. [3 marks] b) Based on the query design in Figure 10, complete the query result below to show the information obtained. [ 3 marks] Class Stu_ID Name Position CoCu c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify your answer. [3 marks] 56