SlideShare une entreprise Scribd logo
1  sur  42
What is ICT ?  ,[object Object],[object Object],[object Object],[object Object],Information and Communication Technology Information  Communication   Technology   From reading, investigation, study or research From internet, e-mail, video conferencing  From telephone, fax machine, radio, tv, satelites www…  LESSON 1
TECHNOLOGY TIMELINE  3500 BC  (Sumerians-Cuneiform writing) 1500 BC (Phoencians- alphabet ) 1941 Computer  1793 telegraph 1925 Television  1454  First Printing machine  105 BC Tsai Lun- paper 1876 First telephone  1958 photocopier 1963 Satellite  1969 APRANET -internet
LESSON 2 EVOLUTION OF COMPUTERS 200 BC ( Chinese Abacus)  1801 Joseph Marie Jacquard – Weaving Loom 500 BC (Egyptian abacus ) 1620 John Napier –Napier’s Bones  1653 Blaise Pascal- Pascaline  1673 Gottfried Wilhelm Von Leibniz  - Leibniz’s Rechiner  1941 Harvard University- Mark 1  1823 Charles Baggage – Mechanical calculator Machine
Computer generations Technology  Problem/ advantages  First Generation (1940-1956) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Second Generation  (1956-1963) ,[object Object],[object Object],[object Object],[object Object],[object Object],Third Generation  (1964-1971) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fourth Generation  (1971-Present) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fifth Generation  (Present & Beyond) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],New Era Computer  ,[object Object],[object Object],[object Object],[object Object],[object Object]
DIFFERENCE BETWEEN COMPUTERIZED AND NON-COMPUTERIZED ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE
LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE  A) EDUCATION  BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Teacher lectures  Teacher as a facilitator.  Students study by their own. 2. Students write in their  notes / exercise books  Students do the exercise in the computer  3. Teacher write notes  On the board  Teacher use the LCD projector and computer  4. Students use textbooks  Students use teaching courseware
Advantages of ICT in education  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of ICT in education  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m/s 12
B) BANKING SYSTEM BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Done manually by taking deposit directly All transaction are done with computer 2. Transactions can only be made during working hours  Transactions can only be made 24 hours a day 3. Takes times to  approve any loan applications  Loan application can be approved faster Eg: online services, phone banking system, credit cards
Uses of ICT in banking system  ,[object Object],[object Object],[object Object],[object Object],[object Object],m/s 13
C)INDUSTRY m/s14 Uses of ICT in industry  ,[object Object],[object Object],[object Object],BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Production was slow  Production is faster 2. Done manually and totally depended on human labour.  Use machine or robotic  3. Takes times to finish the product  Production can be increased through all day operation
D) E- COMMERCE  Uses of ICT in E-Commerce  ,[object Object],[object Object],[object Object],[object Object],BEFORE ICT (Non-computerized ) AFTER ICT (computerized) Using barter system Using e-commerce Word of mouth, billboard, printed flyers Advertisement on Radio, television and Internet Trading globally was slow, late and expensive  Trading globally was faster and less expensive
LESSON 5 THE IMPACT OF ICT ON SOCIETY POSITIVE EFFECTS  NEGATIVE EFFECT 1. Faster communication speed  ,[object Object],[object Object],[object Object],[object Object],[object Object],2. Lower communication cost 3. Reliable mode of communication 4. Effective sharing of information  ,[object Object],[object Object],[object Object],[object Object],5. Paperless environment  6. Borderless communication
LESSON 6 Ethics is a  moral philosophy  where a person make a specific moral choice and Sticks to it. GUIDELINES  Meaning of the …. Ethics  Any code of conducts that are not conforming to approved  standards of social or processional behavior Law is legal system comprising of  rules and principles  that govern the affairs Of a community and controlled by a political authority. Unethical  Law
Differences between Ethics and Law  ETHICS  LAW  As a Guideline  As a rule to control Moral standards  Judicial standards  Free to follow the code of ethics Must follow the regulation and law  No punishments  Penalties, imprisonments and others law Universal Depends on country Produce ethical computer users Prevent misusing of computers  Immoral  Crime
Try do this exercises….. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ETHICS  UNETHIC  LAW BREAKING  FIND THE ANSWER FROM THE TEXT BOOK ……
LESSON 8 INTELLECTUAL PROPERTY RIGHTS  Refers to works created by inventors, author and artists. These work are unique  And have value in market place. Covers ideas, inventions, literary creations, unique names,  business models, industrial processes, computer program codes…..  Definition of Intellectual Property   Intellectual Property law  INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Intellectual  Property  Protection  Literary & artistic material, music, film, Sound recording & roadcasts, including  Software & multimedia  Words, names, symbols, devices & images that represent product, Goods or services  Utility, design, plant  That protect inventions  & improvement to  existing inventions Lines, contours, colors, shape, Texture, or material of the product or  Its ornamentation  1 ) Patents for inventions 2) Trademark for brand identity   3) Design for product  appearance   4) Copyright for material
[object Object],[object Object],[object Object],[object Object],[object Object],What is Privacy??  LESSON 9
How does computer technology threaten the privacy of our data? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE WAYS OF COMPUTER PRIVACY PASSWORD ENCRYPTION EMAIL PRIVACY Not just to protect the computer but to make sure that the computer issues by authorized worker or user only. With public key encryption there are two keys, one public and the other private. When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The public  key needs to be known The number of packets depends on the size of message.  To send a message to a friend, you uses his public key to encrypt the message. Each message has the internet address of the recipient.  Your friend then uses his private key to decode the message after receiving it. This means there may be some places between the packets could be intercepted and examined.
LESSON 10 Process where user verify that they are who they say they are  Authentication  Device that translates persona characteristics  Into a digital code that is compared with a digital code Stored in the database   Refers to the checking system that  Authenticates the user  Biometric device  Callback system  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 methods
LESSON 11 Act of proving or disproving the correctness of a system  With respect to a certain formal specification. Verification  Process of validating the  User  Processed Object Something the user has such as IC  User Identification  2 methods  ,[object Object],[object Object],[object Object],[object Object],[object Object],Examples: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Examples:
LESSON 12  CONTROVERSIAL CONTENT Is information that causes disagreement in opinions  And may cause the disruption of peace because different  People or culture have different view about the contents.  Pornography  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m/s 33 Slander
LESSON 13 Process that prevents or blocks access to certain materials on the internet. What is Internet filtering? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 method to filter the content of the Internet  The process of Internet filtering
LESSON 14 Any laws relating to protecting the internet and other online communication  Technologies  What is Cyber Law? Needs for  Cyber Law  Integrity and Security Information  Legal status of online transaction  Privacy and confidentially of information  Intellectual property Rights  Security of government data
The Cyber Law Acts in Malaysia  1 ) Digital Signature Act 1997 –  Secure electronic communications especially on the internet 2 ) Computer Crimes Act 1997 –  gives protection against misuse of computer and computer criminal activities 3) Telemedicine Act 1997 –  ensure only qualified medical practitioners practice telemedicine 4) Communication and multimedia Act 1998 –  ensures that information is secure, network is reliable, and service is affordable all over Malaysia
LESSON 15 Computer Crimes  1. Computer Fraud  Defined as having an intention to take advantage over or causing loss to other people . Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes. 2. Copyright  Infringement  Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction of copyright material by the black market group. Eg: Pirated CD 3. Computer Theft  Defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use.  Eg: transfer of payment to the wrong account  4. Computer Attacks  Defined as any activities taken to disrupt the equipment of computer system, change processing control or corrupt stored data. Eg: malicious code (virus, worm…)
computer security Means protecting our computer system and the information they Contain against unwanted access, damage, destruction or modification. Network security Hardware  Security  Software security / data security  3 types  Eg: pc-lock, keyboard lock, Smart card  Eg: activation code, Serial number  Eg: firewall
LESSON 17 Computer   Threats   Introduction computer threats  Natural Disasters  Human  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Give the correct answers… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 41-43
Primary differences between worms and viruses  Worm  Virus Operates through the network  Spreads through any medium Spreads copies on itself as a standalone program  Spreads copies itself as a program that attaches to other programs
It defined as unauthorised access to the  computer system by hacker. Hackers are person who learn about the computer system n detail.  What is Hacking?  What is Theft? Example: steal money, goods information,  Information, and resource …. Steal computer.   ,[object Object],[object Object],[object Object],[object Object],LESSON 17
LESSON 18 Security  Measures  Anti-spyware Firewall  Anti-virus  Human  Aspects  Data backup  Cryptography
Security Measures so m Explanation  1.Data backup File duplication – daily, weekly , biweekly backup  2. Cryptography  Is a process of hiding information by altering the actual information into different representation.  3. Antivirus  Protects a computer against viruses by identifying and removing any computer viruses found in the computer. (kaspersky) 4. Anti-spyware Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware) 5. Firewall Piece of hardware software which functions in a networking environment to prevent some communication forbidden by the security policy. (screening routers, proxy gateway, guard) 6. Human Aspects Refer to the user and also the intruder of a computer system.
LESSON 19  Relationship between  security threats and security measures  SECURITY PROCEDURES  ,[object Object],[object Object],[object Object],[object Object],[object Object],Security threats   VS   Security measures  1.  Malicious code threats   VS  Antivirus & Anti-Spyware 2. Hacking  VS  firewall 3. Natural disaster  VS  data backup 4. Theft  VS  human aspect
LESSON 21 Computer application in the society  Area  Examples of software applications Home & education  Microsoft office, adobe photoshop, macromedia flash, autoCAD… Business  Spreadsheet, database, presentation, graphics… Graphics & multimedia Computer Aided design (CAD), paint/image editing Communication  E-mail, web browsers, chat rooms, Newgroups, video conferencing
Computer users  Home user Power user  Large business  user Mobile user  SOHO
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
Mkhululi Silinga
 

Tendances (20)

Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
 
ICT
ICTICT
ICT
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Introduction to computer literacy
Introduction to computer literacyIntroduction to computer literacy
Introduction to computer literacy
 
Ict – information & communication technology
Ict – information & communication technologyIct – information & communication technology
Ict – information & communication technology
 
Ict
IctIct
Ict
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily life
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
 
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOLINFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
 
Information & communication Technology
Information & communication TechnologyInformation & communication Technology
Information & communication Technology
 
ICT introduction
ICT introductionICT introduction
ICT introduction
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 

En vedette

Chapter 5( programming) answer
Chapter 5( programming) answerChapter 5( programming) answer
Chapter 5( programming) answer
smkengkilili2011
 
ICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paperICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paper
kwongliik
 
Bidang pembelajaran 4.3 Tingkatan 5
Bidang pembelajaran  4.3 Tingkatan 5Bidang pembelajaran  4.3 Tingkatan 5
Bidang pembelajaran 4.3 Tingkatan 5
MOE
 
Bidang pembelajaran 4.1 Tingkatan 5
Bidang pembelajaran 4.1 Tingkatan 5Bidang pembelajaran 4.1 Tingkatan 5
Bidang pembelajaran 4.1 Tingkatan 5
MOE
 
Bidang pembelajaran 4.2 Tingkatan 5
Bidang pembelajaran 4.2 Tingkatan 5Bidang pembelajaran 4.2 Tingkatan 5
Bidang pembelajaran 4.2 Tingkatan 5
MOE
 
how 3d technology works
how 3d technology workshow 3d technology works
how 3d technology works
Yashi Rawal
 
Role of ICT in agriculture
Role of ICT in agricultureRole of ICT in agriculture
Role of ICT in agriculture
BFCP
 
Types of technology in the classroom
Types of technology in the classroomTypes of technology in the classroom
Types of technology in the classroom
britsona0546
 

En vedette (17)

Chapter 5( programming) answer
Chapter 5( programming) answerChapter 5( programming) answer
Chapter 5( programming) answer
 
La1 ict & society
La1 ict & societyLa1 ict & society
La1 ict & society
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La4b multimedia notacd09
La4b multimedia notacd09La4b multimedia notacd09
La4b multimedia notacd09
 
ICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paperICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paper
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Bidang pembelajaran 4.3 Tingkatan 5
Bidang pembelajaran  4.3 Tingkatan 5Bidang pembelajaran  4.3 Tingkatan 5
Bidang pembelajaran 4.3 Tingkatan 5
 
Bidang pembelajaran 4.1 Tingkatan 5
Bidang pembelajaran 4.1 Tingkatan 5Bidang pembelajaran 4.1 Tingkatan 5
Bidang pembelajaran 4.1 Tingkatan 5
 
Forms of education technology
Forms of education technology Forms of education technology
Forms of education technology
 
Bidang pembelajaran 4.2 Tingkatan 5
Bidang pembelajaran 4.2 Tingkatan 5Bidang pembelajaran 4.2 Tingkatan 5
Bidang pembelajaran 4.2 Tingkatan 5
 
how 3d technology works
how 3d technology workshow 3d technology works
how 3d technology works
 
Role of ICT in agriculture
Role of ICT in agricultureRole of ICT in agriculture
Role of ICT in agriculture
 
Types of educational technology
Types of educational technologyTypes of educational technology
Types of educational technology
 
Chapter 5 Chemical Bonds
Chapter 5 Chemical BondsChapter 5 Chemical Bonds
Chapter 5 Chemical Bonds
 
Types of technology in the classroom
Types of technology in the classroomTypes of technology in the classroom
Types of technology in the classroom
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
Educational technology 1
Educational technology 1Educational technology 1
Educational technology 1
 

Similaire à Ict form 4 chapter 1(answer)

1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
KMJ Science Computer
 
Communication_skills_ICT_and_Office_e-Communication.ppt
Communication_skills_ICT_and_Office_e-Communication.pptCommunication_skills_ICT_and_Office_e-Communication.ppt
Communication_skills_ICT_and_Office_e-Communication.ppt
Iguru1
 

Similaire à Ict form 4 chapter 1(answer) (20)

Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
System technologies: What is a computer?
System technologies: What is a computer?System technologies: What is a computer?
System technologies: What is a computer?
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
Empowerment Technology.pptx
Empowerment Technology.pptxEmpowerment Technology.pptx
Empowerment Technology.pptx
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
ch 1
ch 1ch 1
ch 1
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Communication_skills_ICT_and_Office_e-Communication.ppt
Communication_skills_ICT_and_Office_e-Communication.pptCommunication_skills_ICT_and_Office_e-Communication.ppt
Communication_skills_ICT_and_Office_e-Communication.ppt
 

Plus de smkengkilili2011 (20)

Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answer
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Acf.cw.la6.s13.1
Acf.cw.la6.s13.1Acf.cw.la6.s13.1
Acf.cw.la6.s13.1
 
Acf.cw.la6.s12.1
Acf.cw.la6.s12.1Acf.cw.la6.s12.1
Acf.cw.la6.s12.1
 
Acf cw la5 s11 1
Acf cw la5 s11 1Acf cw la5 s11 1
Acf cw la5 s11 1
 
Acf cw la5 s10 1
Acf cw la5 s10 1Acf cw la5 s10 1
Acf cw la5 s10 1
 
Acf cw la4 s09 1
Acf cw la4 s09 1Acf cw la4 s09 1
Acf cw la4 s09 1
 
Acf cw la4 s08 1
Acf cw la4 s08 1Acf cw la4 s08 1
Acf cw la4 s08 1
 
Acf.cw.la3.s07.1
Acf.cw.la3.s07.1Acf.cw.la3.s07.1
Acf.cw.la3.s07.1
 
Acf.cw.la3.s06.2
Acf.cw.la3.s06.2Acf.cw.la3.s06.2
Acf.cw.la3.s06.2
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf cw la2 s04 1
Acf cw la2 s04 1Acf cw la2 s04 1
Acf cw la2 s04 1
 
Acf cw la2 s03 1
Acf cw la2 s03 1Acf cw la2 s03 1
Acf cw la2 s03 1
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la1.s01.2
Acf.cw.la1.s01.2Acf.cw.la1.s01.2
Acf.cw.la1.s01.2
 
La4a multimedia notacd10
La4a multimedia  notacd10La4a multimedia  notacd10
La4a multimedia notacd10
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Ict form 4 chapter 1(answer)

  • 1.
  • 2. TECHNOLOGY TIMELINE 3500 BC (Sumerians-Cuneiform writing) 1500 BC (Phoencians- alphabet ) 1941 Computer 1793 telegraph 1925 Television 1454 First Printing machine 105 BC Tsai Lun- paper 1876 First telephone 1958 photocopier 1963 Satellite 1969 APRANET -internet
  • 3. LESSON 2 EVOLUTION OF COMPUTERS 200 BC ( Chinese Abacus) 1801 Joseph Marie Jacquard – Weaving Loom 500 BC (Egyptian abacus ) 1620 John Napier –Napier’s Bones 1653 Blaise Pascal- Pascaline 1673 Gottfried Wilhelm Von Leibniz - Leibniz’s Rechiner 1941 Harvard University- Mark 1 1823 Charles Baggage – Mechanical calculator Machine
  • 4.
  • 5.
  • 6.
  • 7. LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE A) EDUCATION BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Teacher lectures Teacher as a facilitator. Students study by their own. 2. Students write in their notes / exercise books Students do the exercise in the computer 3. Teacher write notes On the board Teacher use the LCD projector and computer 4. Students use textbooks Students use teaching courseware
  • 8.
  • 9.
  • 10. B) BANKING SYSTEM BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Done manually by taking deposit directly All transaction are done with computer 2. Transactions can only be made during working hours Transactions can only be made 24 hours a day 3. Takes times to approve any loan applications Loan application can be approved faster Eg: online services, phone banking system, credit cards
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. LESSON 6 Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it. GUIDELINES Meaning of the …. Ethics Any code of conducts that are not conforming to approved standards of social or processional behavior Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority. Unethical Law
  • 16. Differences between Ethics and Law ETHICS LAW As a Guideline As a rule to control Moral standards Judicial standards Free to follow the code of ethics Must follow the regulation and law No punishments Penalties, imprisonments and others law Universal Depends on country Produce ethical computer users Prevent misusing of computers Immoral Crime
  • 17.
  • 18.
  • 19. Types of Intellectual Property Protection Literary & artistic material, music, film, Sound recording & roadcasts, including Software & multimedia Words, names, symbols, devices & images that represent product, Goods or services Utility, design, plant That protect inventions & improvement to existing inventions Lines, contours, colors, shape, Texture, or material of the product or Its ornamentation 1 ) Patents for inventions 2) Trademark for brand identity 3) Design for product appearance 4) Copyright for material
  • 20.
  • 21.
  • 22.
  • 23. THE WAYS OF COMPUTER PRIVACY PASSWORD ENCRYPTION EMAIL PRIVACY Not just to protect the computer but to make sure that the computer issues by authorized worker or user only. With public key encryption there are two keys, one public and the other private. When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The public key needs to be known The number of packets depends on the size of message. To send a message to a friend, you uses his public key to encrypt the message. Each message has the internet address of the recipient. Your friend then uses his private key to decode the message after receiving it. This means there may be some places between the packets could be intercepted and examined.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. LESSON 14 Any laws relating to protecting the internet and other online communication Technologies What is Cyber Law? Needs for Cyber Law Integrity and Security Information Legal status of online transaction Privacy and confidentially of information Intellectual property Rights Security of government data
  • 29. The Cyber Law Acts in Malaysia 1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet 2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities 3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine 4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia
  • 30. LESSON 15 Computer Crimes 1. Computer Fraud Defined as having an intention to take advantage over or causing loss to other people . Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes. 2. Copyright Infringement Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction of copyright material by the black market group. Eg: Pirated CD 3. Computer Theft Defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg: transfer of payment to the wrong account 4. Computer Attacks Defined as any activities taken to disrupt the equipment of computer system, change processing control or corrupt stored data. Eg: malicious code (virus, worm…)
  • 31. computer security Means protecting our computer system and the information they Contain against unwanted access, damage, destruction or modification. Network security Hardware Security Software security / data security 3 types Eg: pc-lock, keyboard lock, Smart card Eg: activation code, Serial number Eg: firewall
  • 32.
  • 33.
  • 34. Primary differences between worms and viruses Worm Virus Operates through the network Spreads through any medium Spreads copies on itself as a standalone program Spreads copies itself as a program that attaches to other programs
  • 35.
  • 36. LESSON 18 Security Measures Anti-spyware Firewall Anti-virus Human Aspects Data backup Cryptography
  • 37. Security Measures so m Explanation 1.Data backup File duplication – daily, weekly , biweekly backup 2. Cryptography Is a process of hiding information by altering the actual information into different representation. 3. Antivirus Protects a computer against viruses by identifying and removing any computer viruses found in the computer. (kaspersky) 4. Anti-spyware Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware) 5. Firewall Piece of hardware software which functions in a networking environment to prevent some communication forbidden by the security policy. (screening routers, proxy gateway, guard) 6. Human Aspects Refer to the user and also the intruder of a computer system.
  • 38.
  • 39. LESSON 21 Computer application in the society Area Examples of software applications Home & education Microsoft office, adobe photoshop, macromedia flash, autoCAD… Business Spreadsheet, database, presentation, graphics… Graphics & multimedia Computer Aided design (CAD), paint/image editing Communication E-mail, web browsers, chat rooms, Newgroups, video conferencing
  • 40. Computer users Home user Power user Large business user Mobile user SOHO
  • 41.
  • 42.