1. Panitia ICT SMK Kanowit 2011
Learning Area One – ICT and Society
1.1 – Introduction to ICT.
1.1.1 – Overview of ICT.
1.1.1.1 – Define ICT
ICT is defined as
Information is defined as
Communication is defined as
Technology is defined as
1.1.1.2 – Describe the brief evolution of computers
First Generation (1940-1956) Second Generation (1956 - 1963)
Technology: Technology:
Problems: Advantages:
Scientists: Scientists:
Example:
Scientist:
Third Generation (1964-1971)
Technology:
Advantages:
1
2. Panitia ICT SMK Kanowit 2011
Fourth Generation (1971 - present) Fifth Generation (Present & beyond)
Technology: Technology:
Advantages:
Scientists:
Example:
1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce
1.1.2.1 – List the usage of ICT in everyday life.
Education Industry
1. Students can use computer as references tool and 1.
browse internet for information
2.
2.
Banking Commerce
1. 1.
2. 2.
1.1.2.2 – State the differences between computerised and non-computerised systems.
Field Non- Computerised Computerised
1. Students listen mainly to 1. Students can use internet to
teacher explanation. search for information and do
not rely mainly on teacher.
Education 2. 2.
2
3. Panitia ICT SMK Kanowit 2011
1. 1.
Banking 2. 2.
1. 1.
Industry 2. 2.
1. 1.
Commerce 2. 2.
1.1.2.3 – State the impact of ICT on society.
Positive Impact
Negative Impact
3
4. Panitia ICT SMK Kanowit 2011
1.2 – Computer Ethics and Legal Issues
1.2.1 – Definition
1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
Computer Ethics is a
Definition:
Code of Good examples: Bad examples:
Ethics: 1. 1.
2. 2.
Computer Crimes
Intellectual property refers to
__________________________________
__________________________________
Any criminal activity ________________________
__________________________________
_________________________________________
_________________________________.
_________________________________________
These works are ____________________
There are 4 types of computer crimes:
__________________________________
__________________________________
Privacy in IT refers to
Information privacy is described as
Cyber law refers to
4
5. Panitia ICT SMK Kanowit 2011
1.2.1.2 – Differentiate between ethics and law.
Definition of Ethics
Definition of Law
1.
Similarity between ethics and law
2.
Ethics Law
Keywords Explanations Keywords Explanations
As a rule to control
Moral standards computer users
Computer users are free
to follow or ignore the
codes of ethics
Must follow
Depends on country and
state where the crime is
committed
Universals
Crime
1. 1.
Examples
2. 2.
5
6. Panitia ICT SMK Kanowit 2011
1.2.1.3 – State the need for Intellectual property laws
Why do we need intellectual
property law???
1.2.2 – Privacy
1.2.2.1 – List ways to protect privacy.
Privacy is threatened through …
Ways to protect
privacy
6
7. Panitia ICT SMK Kanowit 2011
1.2.2.2 – State authentication and verification methods / technologies
Authentication is a process
Methods Pictures Name Functions / Explanation
Analyses the features that
exist in the coloured
tissue surrounding the
pupil.
Biometric Devices
Scanning of retina and
analyzing the layer of
blood vessels at the back
of the eye.
This method is commonly
used in bank operation
and business transactions.
7
8. Panitia ICT SMK Kanowit 2011
Verification is the act of
Methods of
verification
Examples
1.2.3 – Controversial Contents and Control
1.2.3.1 – List the effects of controversial content on society (pornography & slander)
Pornography Slander
Impacts????
Examples
1.2.3.2 – Describe the process of filtering to control access to controversial contents.
Methods Website / site blocking
Uses lists of banned Rated by RSACI for the
words. content of the website.
If filter search found any Browser is set to accept
How??? words listed, it will stop pages with certain levels
downloading and block of ratings.
the page.
8
9. Panitia ICT SMK Kanowit 2011
1.2.4 – Computer Crimes
1.2.4.1 – Explain the need for Cyber Law.
For:
Needs for
For: Cyber Law For:
For: For:
1.2.4.2 – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks.
Computer Crimes Definition Example
1.3 – Computer security
1.3.1 – Definition
1.3.1.1 – Define computer security
Computer security means
9
10. Panitia ICT SMK Kanowit 2011
Types of computer security
1.3.2 – Security Threats
1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster,
theft.
Security Threats
Malicious Code Hacking Natural Disaster Theft
Definition: Definition: Definition: Definition:
Examples: Examples: Examples:
Flood
Fire
Earthquakes
1.3.3 – Security Measures
1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup,
human aspect
Identify and write the appropriate security procedures in the SECURITY column and the security threats in the
THREATS column.
Situation THREATS SECURITY
Ahmad’s has asked his secretary,
Minah, to send an email to his
business partner in Japan. Minah
tries to read Ahmad’s email.
Every two weeks Harry would save
a copy of his files from his laptop to
his external hard disk in case his
computer breaks down.
10
11. Panitia ICT SMK Kanowit 2011
One day, Karim found out his files
has been corrupted. He needs to
scan using appropriate utility.
While using the internet, Flora
founds out that some of her private
information showed up in an
unknown browser.
Daisy is a software engineer. One
day, she found out that on her
computer pops out a message that
writes “An unknown source is
trying to by-pass your security
system”
Bank safe vault is one of the
restricted areas in the office. Only
authorized personal are allow to
enter.
Questions
1. Copyright infringement is defined as a violation of the rights secured by Copyright Act.
a. Give two examples of copyright infringement.
b. Security measures are the precautionary measures taken towards possible dangers or damages.
State the appropriate security measures to overcome the identified computer threats for:
i. Data lost
ii. Hiding information.
2. Which of the following are biometric devices?
I. Hand geometry
II. Callback System
III. Retinal Scanning
IV. Signature Verification System
A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV
11
12. Panitia ICT SMK Kanowit 2011
Learning Area Two – Computer System.
2.1 – System Concept
2.1.1 – Overview of computer systems
2.1.1.1 – Define computer systems
2.1.1.2 – State the meaning of input, processor, output and storage.
COMPUTER SYSTEM
PROCESS STORAGE
OUTPUT
INPUT
2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage.
Description of Information Processing Cycle
12
13. Panitia ICT SMK Kanowit 2011
Fetch
MACHINE CYCLE
2.1.2 – Data Representation
2.1.2.1 – State the relationship of data representation: Bit, byte, and character.
_______ bits 1 byte _______ character
2.1.3 – Introductory to binary coding
2.1.3.1 – Explain the function of ASCII code
ASCII: American _______________________________________________________________________
____________________________________________________________________________________
Functions:
1.
2.
13
14. Panitia ICT SMK Kanowit 2011
Criteria ASCII EBCDIC Unicode
Number of bits in a
byte
Usage
Supported languages
Example
2.1.4 – Data measurement
2.1.4.1 – State the units of data measurement.
Term Abbreviation Approx. size Exact Amount Index power
Bit -- -- -- --
Byte -- -- -- --
KB
Megabyte
GB
Terabyte
2.1.5 – Clock Speed Measurement
2.1.5.2 – State the units of clock speed measurement.
Unit used : __________________________________ = ____________ cycle per second
Term Abbreviation Cycle per second
Megahertz
Gigahertz GHz
2.2 – Hardware
Types of hardware
Motherboard
14
15. Panitia ICT SMK Kanowit 2011
2.2.1 – Input Devices
2.2.1.1 – Identify the input devices used for text, graphics, audio and video
Types Picture Name Other examples
1.
Text 2.
1.
Graphics 2.
1.
Audio 2.
1.
Video 2.
2.2.2 – Output devices
2.2.2.1 – Identify the output devices used for text, graphics, audio and video
Output Device Text graphics audio video
Monitor
Speaker
15
16. Panitia ICT SMK Kanowit 2011
2.2.3 – Motherboard
2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot,
ports and connectors on the motherboard.
Ports
16
17. Panitia ICT SMK Kanowit 2011
2.2.4 – Storage
2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic
medium, optical medium, flash memory)
Primary storage is located at _______________________________________________
What is ROM?
____________ Only Memory: memory whose contents can be accessed and read but ______________ be
changed. The memory of a ROM is ________________________ which means the program and data will not be
__________________.
Types of ROM:
PROM EPROM EEPROM
What is RAM?
Random _____________________ Memory: memory whose contents can be _________________, read and
______________. The memory of a RAM is ________________________ which means the program and data
will be __________________.
2.3.1 – Operating System (OS)
2.3.1.1 – State the various types of OS used on different platforms.
OS Platform
Example Example Example
17
18. Panitia ICT SMK Kanowit 2011
2.3.1.2 – State the functions of OS
Functions of OS
2.3.1.3 – State the different interfaces of OS
18
19. Panitia ICT SMK Kanowit 2011
2.3.2 – Application Software
2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic)
2.3.2.2 – Describe the uses of application software.
Types Examples Functions / Usages
Word processor
Microsoft Excel
Corel Quattpro Pro
Sun StarOffice Calc
Provides pre-defined presentation format
Applying special effects to the slide transition.
Enhance text, charts and graphical images.
Edit digital non-text information such as photo
and drawings
Draw pictures using various tools such as brush
and pen
Modifying contrast and brightness
Adding special effects
2.3.3 – Utility program
2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and
file compression)
Types Examples Functions / Usages
1. 1.
File managements
2. 2.
1. 1.
Diagnostics
2. 2.
1. 1.
File Compression
2. 2.
19
20. Panitia ICT SMK Kanowit 2011
2.3.4 – Proprietary and Open Source Software.
2.3.4.1 - Differentiate between proprietary and open source
Criteria Proprietary Open Source
1. 1. It is Free
2.
2.
3.
Advantages
3.
1. User need to buy the product 1.
key (license key) in order to use
2.
Disadvantages
3.
1. Microsoft Office 2010 1.
Example for application 2.
software 2.
1. 1. Ubuntu
2.
Example for OS 2.
20
21. Panitia ICT SMK Kanowit 2011
Learning Area 3 – Computer Network and Communications
3.1 – Basic Concepts of Computer Networks and Communications
3.1.1 – Definition
3.1.1.1 – Define computer networks
3.1.1.2 – Define communication
Computer network is
Communication is
3.1.2 – Importance of Computer Network.
3.1.2.1 – State two importance of computer networks and communication in the following fields
Education E-Business
E-Commerce E-Banking
3.1.3 – Types of Network
3.1.3.1 - Define types of Computer network.
LAN
a. ______________ Area __________________.
b. __________________ network compare to ___________ and WAN.
c. Operated within a limited _________________________________________.
d. Devices connected usually are less than ____________________________.
e. Hardware used: ______________________________, ________________________________,
________________________________, _____________________________________.
f. Transmit data at a very _______________ speed.
a. ___________________ Area _________________________.
MAN
b. Located at ____________________ cities such as _________________________.
c. Used ____________________________________ as transmission media.
d. Can be collections of ______________.
21
22. Panitia ICT SMK Kanowit 2011
a. ________________________ Area __________________________. WAN
b. ______________________ network of all. An example is __________________________.
c. Generally it covers large ______________________ such as a state, ________________ or
___________________.
d. A group of _____________ or ____________ or a mixture of ____________.
e. Uses transmission media such as _________________________________________________.
f. Need ___________________ to connect two or more network.
3.1.3.2 – Differentiate between the three types of computer network.
Criteria LAN MAN WAN
Network size
Number of computers
Transmission media types
Speed
Cost
3.1.4 – Network Architecture
3.1.4.1 – Define two types of network architecture.
Network Architecture Client/Server Peer-to-Peer
Definition
Cabling cost
Network usage
Ease to manage
Software needed
22
23. Panitia ICT SMK Kanowit 2011
3.1.5 – Network Topology.
3.1.5.1 – State three types of network topologies: Bus, Ring, Star
Definition: structure or configuration of ______________________ for ____________________.
Topology Diagram
3.1.5.2 - Differentiate between the three types of network topology
Aspect Ring Topology Star Topology Bus Topology
Host failure
Node Failure
Structure
Ease of adding/removing
nodes
Ease of troubleshooting
Number of nodes when
extending network
Connection between
nodes
Host existence
23
24. Panitia ICT SMK Kanowit 2011
3.1.6 - Protocol
3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitate
communication over computer network.
Definition: Protocol is ………..
Importance of protocol:
TCP/IP:
3.1.7 – Internet, Intranet, Extranet.
3.1.7.1 – Describe the types of network communications technology (Internet, Intranet, Extranet)
Criteria Internet Intranet Extranet
Definition
Usage
Services
Accessibility
Security
24
25. Panitia ICT SMK Kanowit 2011
3.2 – Hardware Requirements
3.2.1 – Devices
3.2.1.1 – Identify the function of the devices needed in computer network communication.
3.2.1.2 – State the function of the devices needed in computer network communication.
Diagram Device Name Function
Diagram Device Name Function
From router
To
MODEM
25
26. Panitia ICT SMK Kanowit 2011
3.2.2 – Medium
3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP),
Coaxial and Fibre Optic Cable.
3.2.2.2 – Identify various types of wireless transmission media.
1
2
3
4
3.3 – Software Requirements.
3.3.1 – Server Software
3.3.1.1 – Define Network Operating System.
Network Operating System or known as __________ allows to ____________________ computers
and peripheral to a ______________________________.
Most frequently used with ______________ and ____________________ but also have application
to larger _____________________________________________.
It is not the same as the ____________________________________________ provided by some
existing __________________________________________.
It is specifically written to keep __________________________ running at
__________________________________________________.
26
27. Panitia ICT SMK Kanowit 2011
3.3.1.2 – Name various Network Operating System Software.
1. Window NT
2. N
3. O
S
4.
3.3.2 – Client Software
3.3.2.1 – State the functions of various client software.
Client Software Function Example
1. 1. Internet Explorer (IE)
2. 2.
Web Browser
3. 3.
1. 1. Outlook Express
E-mail client
2.
1. 1. Ping
Network Utilities
2. 2.
1. 1. Network
Neighbourhood
Network File Manager 2.
2.
27
28. Panitia ICT SMK Kanowit 2011
3.4 – Setting Network Facilities
3.4.1 – Installation of Network Interface Cards (NIC)
This is a
Step 1a: Place your
___________________________________
in the PCI of your computer
Step 1b: Window will
____________________ that it has found
new hardware
Step 1c: The “Found New Hardware
Wizard” will then ___________________.
Click __________ to continue
Step 2a: Select “CD-ROM Drives” and click
“Next” to ________________. Window will
find suitable _____________ for your device.
28
29. Panitia ICT SMK Kanowit 2011
Step 2b: The NIC driver is now properly
installed. __________________ the
computer to complete the installation.
3.4.1.2 – Install drivers for NIC (for WinXP)
Step 1: Windows will indicate a new
hardware found after the NIC has been
inserted into its slot. Click Next to continue.
Step 2: Select “Search for the best driver
for my device (recommended)” and click
“________________” to continue
Step 3: Select “CD-ROM Drives” and click
“Next” to continue. Windows will now search
for the best driver for your device.
29
30. Panitia ICT SMK Kanowit 2011
Step 4: Windows will locate the correct
driver for your device and indicate that it is
now ready to install the driver. Click “Next” to
continue.
Step 4: The NIC driver is now properly
__________________________.
3.4.2 – Cable Crimping and Testing
3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable).
2 types
From PC to PC From PC to hub/switch/router
TOOLS
30
31. Panitia ICT SMK Kanowit 2011
3.4.3 – Configuration and Testing Network.
3.4.3.1 – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Test
the network connection.
IP is _________________________________________________________.
Subnet mask specifies __________________________________ of the network.
_________________________________ are used to connect other network and the
_____________________________________________
3.4.3.2 - Steps to test a network connection:
1.
2.
3.
4.
3.4.4 Share Data
3.4.4.1 – Create a share folder.
1.
2.
3.
4.
31
32. Panitia ICT SMK Kanowit 2011
Questions
1. Figure 1 shows a network configuration.
INTERNET
PC 1
IP address: 192.168.1.5 PC 2
Subnet Mask: 255.255.253.0
IP address: 192.168.1.5
Gateway: 192.168.1.1
Subnet Mask: 255.255.253.0
Gateway: 192.168.1.1
ADSL MODEM
IP address: 192.168.1.1
Subnet Mask: 255.255.255.0 Figure 1
a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other.
[4 marks]
b. Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then
filled the table below for the new configuration.
Computer IP address Subnet Mask
PC 1
PC 2
2. Computer A Computer B Computer C
ADSL MODEM
IP address: 192.168.1.36 IP address: 192.168.1.110 IP address: 192.168.1.36
IP address: 192.168.1.1
Subnet Mask: 255.255.255.0 Subnet Mask: 255.255.255.0 Subnet Mask: 255.255.250.0
Subnet Mask: 255.255.255.0
Gateway: 192.168.1.1 Gateway: 192.168.1.1 Gateway: 192.168.1.1
Figure 2
a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the
computers that able to communicate with each other. Justify your answer. [ 3 marks]
32
33. Panitia ICT SMK Kanowit 2011
b. There is one computer that unable to communicate with the other computer in the network.
Identify that computer. Then identify the problem and re-configure the computer so that it can
communicate with the other computers in the network. [3 marks]
3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1.
20 desktops 1 modem
1 switch 1 router Table 1
LAN cables A server
Based on Table 1, answer the following questions.
a. As the school network administrator, you are asked to suggest a suitable network topology to Pn.
Malsiah, the school principal. Justify your answer. [4 marks]
b. You are also asked to suggest a suitable network architecture. Justify your answer. [3 marks]
4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to
set up in his company.
a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks]
b. Give 2 services, with the examples, provided by the internet to Mr. Ali. [ 4 marks]
33
34. Panitia ICT SMK Kanowit 2011
Learning Area Four – Multimedia
4.1 – Multimedia Concepts
4.1.1 – Definition of Multimedia
4.1.1.1 – Define multimedia
Multimedia is a
4.1.2 – Multimedia in various of fields
4.1.2.1 – Identify the use of multimedia in various fields
Fields Example Usage
Education
Business
Art
Medicine
4.1.3 – Interactivity of multimedia
4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia.
Interactivity refers to
Types File format Example
Text Notepad, Microsoft Words
Audio
Video *.mov, *.avi
Animations
Graphics Paint, Photoshop
34
35. Panitia ICT SMK Kanowit 2011
Linear Criteria/Characteristics Non-Linear
User interaction with application
User control over the application
Application flow / arrangement
Example
4.1.4 – Medium of delivery
4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications.
Medium of delivery
Application Quality
Production Time
Production Cost
Up-to-Date
4.1.5. – Multimedia Elements
4.1.5.1 – Identify the multimedia elements
35
36. Panitia ICT SMK Kanowit 2011
4.2 – Hardware and software
4.2.1 – Hardware
4.2.1.1 – Identify the hardware that can be used to produce multimedia products.
4.2.2 – Editing Software
4.2.2.1 – Identify editing software that can be used to be produce multimedia elements
Example:
Text editor
Example:
Graphics and image editor
Example:
Audio editor
Example:
Video and animation editor
4.2.3 – Authoring Tools
4.2.3.1 – Define the various concepts in authoring tools
Criteria Time Frame Concepts Icon Concepts Card Concepts
Concepts Uses visual icon in a
structural framework
Way of presentation Uses frames that
represents the time
Special features Pages are arranged like
stack of cards
Examples Adobe flash
36
37. Panitia ICT SMK Kanowit 2011
4.2.4 - Web editor
4.2.4.1 – Describe and give examples of web editors
Text-based:
Example:
What You See Is What You Get (WYSIWYG):
Example:
4.3 – Multimedia development
4.3.1 – User interface Principles
4.3.1.1 – State the user interface principles
4.3.1.2 – Apply suitable user interface principles in a project
Match the user interface principles with the correct statements
Consistency Can move around the system: menus, help
Clarity Enable user to search keyword or glossary
Context Make their own personal learning
Navigation Harmony and same applies to all screen
Search Clearness of labels on all icons
Personalisation Provides support system / help files
Learnability Can navigate through all sections without limitation
Flexibility Each part should be relevant to the title
4.3.2 – Development Team
4.3.2.1 – State the role of each member in a development team.
Multimedia
Production Team
37
38. Panitia ICT SMK Kanowit 2011
Multimedia
Specialise in Scope of work
Production Team
Project Manager Leading the multimedia team
Research on the content of a
multimedia program
Graphics editing
Audio-video
technician
Educational strategies and planning
Writes program codes (scripting)
Combines the multimedia elements
4.3.3 – Multimedia production phase
4.3.3.1 – Describe the phases in multimedia productions
38
39. Panitia ICT SMK Kanowit 2011
Multimedia production
Descriptions Example of activity
phase
Interview clients to find out their
needs
Write problem statement and
proposal
Ali uses flow chart draft the flow
of his multimedia application.
Ali uses storyboard to sketch the
interface of the page.
Implementation phase
A checklist is used to test the
multimedia program.
It is also to fix any error found.
James chooses a group of
selected users to evaluate and
give feedback to his multimedia
program using Evaluation Form.
Publishing phase
Match the screen design principles with the correct statement
Contrast Usage of different types of multimedia elements
Simplicity Arrangement of the elements
Proximity Simple and easy way of presentation
Repetition Concept of grouping similar elements
Alignment Create a focus point on the screen
Emphasis Concept of repetition the same texture, colour, size and font
39
40. Panitia ICT SMK Kanowit 2011
Questions
1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as
shown in Table 1. He uses authoring tool software to make his project more effective and interesting.
Collect pictures of the school, hostels, classes, field and canteen.
Modify the school badge image so that it can be animated.
Record the school anthem.
Insert the school objectives, motto and school history into different screens.
Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3
Table 1
Based on Table 1,
I. What is the name of the animated file used by Halim?
II. Halim wants to record his voice as background narration. Give one suitable device to carry out this
task.
III. Name two missing multimedia element that is not in the files used by Halim.
IV. From your answer in 1 (c), give one suitable file extension for each elements you have mentioned.
2. Study the following table carefully. Then answer the questions based on Table 2.
Phase Description
The multimedia developers interview the client to find out their needs and write the
X
problem statement and a proposal.
Y The multimedia developers will design a flow chart and storyboard.
The multimedia developers will use a checklist to test the multimedia program. If there are
Z
errors, he will fix the program.
Table 2
a) Identify phase X, Y and Z.
b) From your answer in 2 (a), what are the missing phases?
c) State one example activity for each of the missing phases from your answer in 2 (b).
3. User interface principles are:
I. Clarity
II. Colourful
III. Consistency
IV. Wide screen
A. I and II
B. II and IV
C. I and III
D. III and IV
40
41. Panitia ICT SMK Kanowit 2011
Learning Area Five – Programming.
5.1 – Basic programming concepts
5.1.1 – Define program and programming language
5.1.1.1 – State the definition of program
A computer program is
5.1.1.2 – State the definition of programming language
A programming language is
5.1.2 – Levels and generations of programming language
Level of programming
language
Low-level programming
language
Example: Example:
High-level programming
language
Example: Example: Example:
41
42. Panitia ICT SMK Kanowit 2011
5.1.3 – Programming Language Approaches
5.1.3.1 – Define structured approach in programming
Approach: Programs are drawn in
Structured approach ____________________
Smaller sections of each A program may have a Example of structured
programming languages:
program are known as __________________ or several
_____________________ ________________________
Beneficial for:
5.1.3.2 – Define object-oriented approach in programming
Approach: The object have
Object-oriented
approach _____________________
with one another
Beneficial for:
Combines ____________
Example of structured
with functions to create
programming languages:
____________________
5.1.3.3 – Differentiate between structured approach and object oriented approach in programming
Structured approach Differences Object-oriented approach
Uses
Emphasize
Suitable for
42
43. Panitia ICT SMK Kanowit 2011
5.1.4 – Translator
5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler
Translator
Is a computer program that
Example of assembler:
Assembler
Translator method: It is interpreted and executed in
Interpreter ______________________ when the
user execute it
Execute ____________ by _________ Example:
until the end of the program.
Weakness:
Translator methods:
Compiler
Advantages: Example:
43
44. Panitia ICT SMK Kanowit 2011
5.1.5 – Basic elements in programming
Basic Elements
5.1.5.1 – Differentiate between constants and variables
Constant Differences Variable
The value may change at any time
Characteristics during the course of the program
Usage
1. Const Pi = 3.142 1. Dim Speed as Integer
2. Const Speed = 30
2.
Example
3.
(declaration in Visual Basic 6)
3.
4.
5.1.5.2 – Differentiate between data types: Boolean, integer, double, strings and date
Data types Description Example
Integer
Any number value that may and could contain a
fractional part.
“Kuala Lumpur”
“23 is larger than 20”
“Today is Monday”
Consists of a TRUE or FALSE value. It is usually used
to store status
Contains date and time value
44
45. Panitia ICT SMK Kanowit 2011
5.1.5.3 – Differentiate between mathematical and logical (Boolean) operators.
Operators Functions Operators Example
Mathematical
+, -, ,
Logical operators perform logical
operations such as checking the
condition of two Boolean values
Extra:
Operators Description Operator Example
A>B
C >= D
5.1.5.4 – Differentiate between sequence control and selection control
Identify the types control structure below.
BEGIN
BEGIN
END
END
Differences
Execution flow
Usage
Symbols difference
45
46. Panitia ICT SMK Kanowit 2011
5.2 – Program Development
5.2.1 – Program Development phases
5.2.1.1 – Describe the five main phases in program development
Phases of Program Development
Coding
Multimedia production
Descriptions Example of activity
phase
Interview clients to find out their
needs
Write problem statement and
proposal
Coding Phase
46
47. Panitia ICT SMK Kanowit 2011
Questions
1. Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an
entertainment park or not. The following are the source code.
if height_boy > 162 then enter = TRUE
if height_girl > 155 then enter = TRUE
else,
enter = FALSE
Figure 1
Based on the programming above, answer the following questions.
a. (i) Can height_boy and height_girl be declared as constant?
(ii) Justify your answer. [3 marks]
b. (i) Identify the data types used
(ii) Give one difference for the data types you have mentioned in b(i). [4 marks]
2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program.
Private Sub CommandCheck_Click()
Dim marks As Double, response As String
marks = TextMark.Text
If (marks >= 50) Then
response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”)
Else
response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”)
End If
End Sub
Figure2(a)
Begin
Request marks
No
>= 50? Print “You have fail
your ICT examination.”
Yes
Print “You have pass
your ICT examination.”
End
Figure 2 (b)
47
48. Panitia ICT SMK Kanowit 2011
Based on Figure 2(a) and 2(b), answer the following questions:
i. States which phase comes after the process in Figure 2(a).
ii. Design the output interface for both of the outcomes. [7 marks]
2. Find the correct pair of data types.
A. Const Height = 123.8 (Integer)
B. Const Members = 34233 (Double)
C. Const Input_Status = TRUE (Currency)
D. Const Address = “Kuala Lumpur” (String)
3. Study the flow chart below carefully.
Begin
Request numbers
of working days.
Calculate total salary:
(RM 12.50 x number of working
days)
Print total salary
End
Diagram 3
Based on Diagram 3, answer the following questions:
i. There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol.
[2 marks]
ii. What is the outcome of the salary if:
a. The number of working days is six (6) days? [1 mark]
b. The salary is now RM 15 and the working days are five (5) days? [1 mark]
48
49. Panitia ICT SMK Kanowit 2011
Learning Area Six – Information Systems
6.1 – Concepts of Information Systems
6.1.1 – Definition
6.1.1.1 – Give the meaning of data, information and information systems.
Data Information Information System
Definition Definition Definition
6.1.2 – Usage of information systems in various fields
6.1.2.1 – State the usage of information system in education, business and management.
Fields
1.
Education 2.
1.
Business 2.
1.
Management 2.
6.1.3 – Information System Components
6.1.3.1 – List the Information System components
6.1.3.2 – Define each of the Information System components
Hardware Procedure
End users who uses
the system and
information system
personnel who
creates the system.
49
50. Panitia ICT SMK Kanowit 2011
6.1.3.3 – Describe the interrelation between information system components using a diagram.
Software
Description:
6.1.4 – Types of Information Systems
6.1.4.1 – List five types of Information systems
6.1.4.2 – State the usage of each types of information system.
Usage:
Usage:
Types of
Usage:
Information
System
Usage:
Usage:
50
51. Panitia ICT SMK Kanowit 2011
6.1.5 – Hierarchy of Data
6.1.5.1 – Define bit, byte, field, record and file
Bit
Byte
Field
Record
6.1.5.2 – State the hierarchy of data
Fields
6.2.1 – Definition
6.2.1.1 – Define database and Database Management System (DBMS)
Database
51
52. Panitia ICT SMK Kanowit 2011
Provides an interface between the database and the user
Database
Management
System
6.2.1.2 – List the benefits of using database
Benefits of
using
database
6.2.2 – Features
6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file)
Field Specific category of information in a table.
Record
File
Name Age Class
Amirullah 13 1A
Sarah 15 3C
Chai Leng 16 4S1
52
53. Panitia ICT SMK Kanowit 2011
6.2.2.2 – Define the primary key and foreign key
The field that ___________________________________________________
Primary key??? It must not have __________________ value.
Each table must have at least ____________ primary key.
It is also known as ___________________________.
The field that ___________________________________________________
Foreign key??? It can have __________________ value.
It is ______________________________________ in other tables.
It is also known as ___________________________.
6.2.2.3 – State the importance of the primary key.
6.2.2.4 – Differentiate between the primary key and foreign key.
Primary key Property Foreign key
Usage
Null value
Duplicate
6.2.2.5 – State the importance of the relationship between the primary key and foreign key.
6.2.3 – Database Objects
6.2.3.1 – Define the following database objects / tools: Table, form, query, report
Database Object Definition
Table
Form
Query
53
54. Panitia ICT SMK Kanowit 2011
Report
6.2.4 – Data Manipulation
6.2.4.1 – List the basic operations of data manipulation
6.2.4.2 – State the usage of basic operations in data manipulation
Basic operation of data
Usage
manipulation
Sort
To remove record(s) from the database
Filter
6.3 – Database Development
6.3.1 – Phases of System Development
6.3.1.1 – Describe the phases of System Development
System Development
Descriptions Example of activity
phase
Interview clients to find out their
needs
Write problem statement and
proposal
Ali chooses the data he has
collected during his interview.
Ali draft out the table contains
necessary data.
54
55. Panitia ICT SMK Kanowit 2011
Implementation phase
It involves the system developer
and users
It is to ensure the quality of a
database.
James documents all the
information from source code to
user manual to troubleshooting
information.
Involves three types of
maintenance:
o
o
Maintenance phase
o
55
56. Panitia ICT SMK Kanowit 2011
Questions
Table 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a Simple
Query Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria.
Table 1 Figure2
Figure 3
a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view
the grades of the co curriculum activities for each student. Justify your answer. [3 marks]
b) Based on the query design in Figure 10, complete the query result below to show the information
obtained. [ 3 marks]
Class Stu_ID Name Position CoCu
c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify
your answer. [3 marks]
56