Tuesday, July 2, 2013

Micro Test 2: Computer Software & Program Installation

PBS LA2: S05.1 Written Assignment

LA2.S05.1

Construct:S05 Current and Future Development of Open Source Software and the Latest
Development in ICT

Aspect: LA2.S05.1
Explain the latest open source software available and the latest development in ICT Instrument:

Written Assignment :
Task-
Candidate works in groups of 2 to 4 to conduct study AND / OR for discussion.
Written assignment MUST be done individually.
Refer to WAF.CW.LA2.S05.1

Suggested duration: 1-2 weeks
Values: • Appreciate • Cooperate • Confident

CONTENTS:
1. Explain the latest open source OS.
a. Meaning
b. TWO examples

2. Explain the latest open source application software.
a. Meaning
b. TWO examples

3. Explain the latest development in ICT.
a. ONE hardware
b. ONE software

4. Explain pervasive computing.
a. Meaning b. TWO examples

4. Follow required written assignment format.
a. Content format
b. Document format (Font: Arial, Size:12 ,Spacing:1.5)

6. Display cooperation.
a. Write the names of group members.
b. Verbal verification from group members or assessor’s observation.

TOTAL MARK: 20

Thursday, April 18, 2013

Visiting ICT Blog Project

Top 10 ICT Blog In The Net

1. Blog Cikgu Hisham http://panitiaictsmktp.blogspot.com/

Lesson 30: Computer Software

Open Source & Proprietary Software discussion Students should be able to distinguish.

Sunday, April 7, 2013

Lesson 29 : LA2.2 Hardware

GENERAL DEFINITION

Computer hardware refers to the physical parts of a computer and related devices. 

Internal hardware devices include 
RAM

External hardware devices include  
keyboards, 
mouse(mice),
printers, 
and scanners.

The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals. Together, they all fall under the category of computer hardware. 

Sunday, March 31, 2013

Micro Test 1: Over view of Computer System


Lesson 28: Clock Speed

Overview: Hertz is the term to describe 1 cycle per second of the computer process.
 
(http://www.techterms.com) Amazing Computer & Technology Term In The Internet

A clock cycle, or simply a "cycle," is a single electronic pulse of a CPU. During each cycle, a CPU can perform a basic operation such as fetching an instruction, accessing memory, or writing data. Since only simple commands can be performed during each cycle, most CPU processes require multiple clock cycles.

In physics, the frequency of a signal is determined by cycles per second, or "hertz." Similarly, the frequency of a processor is measured in clock cycles per second. Since modern processors can complete millions of clock cycles every second, processor speeds are often measured in megahertz or gigahertz.

Frequency measures the number of times something occurs in a specific amount of time. For example, if someone visits the grocery store twice a week, her shopping frequency is 2 visits per week. While frequency can be used to measure the rate of any action, in technical applications it is typically used to measure wave rates or processing speed. These frequencies often occur multiple times per second and therefore are measured in hertz (Hz) or related units of measurement, such as megahertz or gigahertz.

One megahertz (abbreviated: MHz) is equal to 1,000 kilohertz, or 1,000,000 hertz. It can also be described as one million cycles per second. Megahertz is used to measure wave frequencies, as well as the speed of microprocessors.
Radio waves, which are used for both radio and TV broadcasts, are typically measured in megahertz. For example, FM radio stations broadcast their signals between 88 and 108 MHz. When you tune to 93.7 on your radio, the station is broadcasting at a frequency of 93.7 MHz.
Megahertz is also used to measure processor clock speeds. This measurement indicates how many instruction cycles per second a processor can perform. While the clock speeds of processors in mobile devices and other small electronics are still measured in megahertz, modern computer processors are typically measured in gigahertz.
Abbreviation: MHz.

Clock speed is the rate at which a processor can complete a processing cycle. It is typically measured in megahertz or gigahertz. One megahertz is equal to one million cycles per second, while one gigahertz equals one billion cycles per second. This means a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.However, it is important to note that a 1.8 GHz CPU is not necessarily twice as fast as a 900 MHz CPU. This is because different processors often use different architectures.

For example, one processor may require more clock cycles to complete a multiplication instruction than another processor. If the 1.8 GHz CPU can complete a multiplication instruction in 4 cycles, while the 900 MHz CPU takes 7 cycles, the 1.8 GHz processor will be more than twice as fast as the 900 MHz processor. Conversely, if the 1.8 GHz processor takes more cycles to perform the instruction, it will be less than 2x as fast as the 900 MHz processor.

Other factors, such as a computer's bus speed, cache size, speed of the RAM, and hard drive speed also contribute to the overall performance of the machine. Therefore, while the processor's clock speed is a significant indicator of how fast a computer is, it is not the only factor that matters.

Lesson 27: Data Measurement

BYTES to BITS conversion.
How many megabytes in 1 GB?

MEASUREMENT CHART
(http://www.wu.ece.ufl.edu/links/dataRate/DataMeasurementChart.html)


UnitValueSize
bit (b)0 or 11/8 of a byte
byte (B)8 bits1 byte
kilobyte (KB)10001 bytes1,000 bytes
megabyte (MB)10002 bytes1,000,000 bytes
gigabyte (GB)10003 bytes1,000,000,000 bytes
terabyte (TB)10004 bytes1,000,000,000,000 bytes
petabyte (PB)10005 bytes1,000,000,000,000,000 bytes
exabyte (EB)10006 bytes1,000,000,000,000,000,000 bytes
zettabyte (ZB)10007 bytes1,000,000,000,000,000,000,000 bytes
yottabyte (YB)10008 bytes1,000,000,000,000,000,000,000,000 bytes

NOTE: A lowercase "b" is used as an abbreviation for bits, while an uppercase "B" represents bytes. This is an important distinction, since a byte is 8x as large as a bit.
For example, 100 KB (kilobytes) = 800 Kb (kilobits).

Lesson 26: Binary Coding

Binary code: ASCII "Ass Kee"
(http://www.telacommunications.com/nutshell/ascii.htm#chart)

ASCII, pronounced "ask-ee" is the acronym for American Standard Code for Information Interchange. It's a set of characters which, unlike the characters in word processing documents, allow no special formatting like different fonts, bold, underlined or italic text. All the characters used in email messages are ASCII characters and so are all the characters used in HTML documents. (Web browsers read the ASCII characters between angle brackets, "<" and ">", to interpret how to format and display HTML documents.)

An "ASCII file" is a data or text file that contains only characters coded from the standard ASCII character set. Characters 0 through 127 comprise the Standard ASCII Set and characters 128 to 255 are considered to be in the Extended ASCII Set. These codes, however, may not be the same in all computers and files containing these characters may not display or convert properly by another ASCII program.

Knowing something about ASCII can be helpful. ASCII files can be used as a common denominator for data conversions. For example, if program A can't convert its data to the format of program B, but both programs can input and output ASCII files, the conversion may be possible.

ASCII characters are the ones used to send and receive email. If you're familiar with email, you already know that formatting like italic type and underlines are not possible. Email transmissions are limited to ASCII characters and because of that, graphics files and documents with non-ASCII characters created in word processers, spreadsheet or database programs must be "ASCII-fied" and sent as email file attachments. When the files reach their destination they are "deASCII-fied" (i.e. decoded) and therefore, reconstructed to restore them for use.
ASCII
Description
0 NUL Null
1 SOH Start of heading
2 STX Start of text
3 ETX End of text
4 EOT End of transmit
5 ENQ Enquiry
 ......

64 @
65 A
66 B
67 C
68 D
69 E
70 F
71 G
72 H
73 I
74 J
75 K
76 L
77 M
78 N
79 O
80 P
81 Q
82 R
83 S
84 T
85 U
86 V
87 W
88 X
89 Y
90 Z

(http://www.telacommunications.com/nutshell/ascii.htm)



Lesson 25: Data Representation

( http://www.willamette.edu/~gorr/classes/cs130/lectures/data_rep.htm)

Data Representation refers to the methods used internally to represent information stored in a computer. Computers store lots of different types of information:
  • numbers
  • text
  • graphics of many varieties (stills, video, animation)
  • sound
At least, these all seem different to us. However, ALL types of information stored in a computer are stored internally in the same simple format: a sequence of 0's and 1's.

How can a sequence of 0's and 1's represent things as diverse as your photograph, your favorite song, a recent movie, and your term paper?

It all depends on how we interpret the information. Computers use numeric codes to represent all the information they store. These codes are similar to those you may have used as a child to encrypt secret notes: let 1 stand for A, 2 stand for B, etc. With this code, any written message can be represented numerically. The codes used by computers are a bit more sophisticated, and they are based on the binary number system (base two) instead of the more familiar (for the moment, at least!) decimal system. Computers use a variety of different codes. Some are used for numbers, others for text, and still others for sound and graphics.

THE RELATIONSHIP BETWEEN BITS,BYTES & CHARACTER
  • Memory consists of bits (0 or 1)
    • a single bit can represent two pieces of information
  • bytes (=8 bits)
    • a single byte can represent 256 = 2x2x2x2x2x2x2x2 = 28 pieces of information
  • words (=2,4, or 8 bytes)
    • a 2 byte word can represent 2562 pieces of information (approximately 65 thousand).
  • Byte addressable - each byte has its own address.
Text can be represented easily by assigning a unique numeric value for each symbol used in the text. For example, the widely used ASCII code (American Standard Code for Information Interchange) defines 128 different symbols (all the characters found on a standard keyboard, plus a few extra), and assigns to each a unique numeric code between 0 and 127.

In ASCII, an "A" is 65," B" is 66, "a" is 97, "b" is 98, and so forth. When you save a file as "plain text", it is stored using ASCII. ASCII format uses 1 byte per character 1 byte gives only 256 (128 standard and 128 non-standard) possible characters The code value for any character can be converted to base 2, so any written message made up of ASCII characters can be converted to a string of 0's and 1's.

Forum :

x86 = 32bit
x64 = 64bit

"As the x86 term became common after the introduction of the 80386, it usually implies a binary compatibility with the 32-bit instruction set of the 80386. This may sometimes be emphasized as x86-32 to distinguish it either from the original 16-bit x86-16 or from the newer 64-bit x86-64 (also called x64). Although most x86-processors used in new personal computers and servers have 64-bit capabilities, to avoid compatibility problems with older computers or systems, the term x86-64 is often used to denote 64-bit software, with the term x86 implying only 32-bit.


Go with the 32bit... It has more compatible drivers and support. Unless you are going to be doing 3D Rendering, Video Editing, or RAW Files in Photoshop, 64bit OSs aren't worth the trouble."


Summary:

Smallest data representation is called BIT.
8 BITS is equal to 1 BYTES
ASCII uses 7 BITS to represent each character.

Lesson 24: Overview of computer system

Keywords:
Computer System is defined as combination of several units or component to process information.
There are INPUT, OUTPUT, PROCESS & STORAGE as the main components in computer system.
In order for this system to function it must involved hardware, software and users.
The computer process is involved ; Fetching-Decoding-Execute-Store.
Bit is the smallest data representation which has only TWO conditions 1

JUST THE FACTS

  • Computers work by running programs or software. Programs are normally stored on your hard disk and loaded into memory to be executed by the CPU.
  • You control the operating system through its user interface. A GUI or graphical user interface uses the manipulation of visual components, while a command line interface requires you to type in specific commands.
  • Your computer has two kinds of software: systems software (aka the operating system), which is loaded when your computer starts up, and applications which are programs you use to accompish a particular task.
  • Computer programmers create programs by writing source code in a programming language. This source code must be converted to a native machine language that the CPU can execute.
  • Your CPU consists of two parts—the Control Unit and the Arithmetic Logic Unit (ALU)— that work together to perform the steps of the machine cycle: fetch, decode, execute, and store.
  • Just like numbers, pixels and sounds, your computer stores computer programs as binary numbers. In the end, "bits is bits".
My lesson:
Date: 5 Apr 2013  Class: 4A
Methods: Lecture, discussion & simple task
Materials: Power point notes
Rating : Good! Student can explain the process "A is pressed and displayed on screen"

Thursday, February 21, 2013

Learning Area #2: COMPUTER SYSTEM



Topics in this chapter;

2.1 System Concept
2.2 Hardware
2.3 Software
2.4 Installation
2.5 Current & Future Development

Saturday, February 2, 2013

PBS Coursework Assessment Manual

Download : PDF

Tuesday, January 29, 2013

PBS: S01.1

School Based Assessment (PBS)

Learning Area: LA1-Information Communication & Technology
Topic: Security Measures(Lesson 19)

Activity 1

S01.1 Apply correct security procedures using antivirus. 

STEPS:
1. Choose antivirus software to be used. 
2. Start the antivirus software and select area to be scanned.
3. Scan the selected area. List the name(s) of the virus detected.
4. Choose and apply any or all of the following when a virus is detected - delete/remove, clean/heal, quarantine/move to vault.


 
Activity 2

S01.2 Apply correct security procedures using spyware. 

STEPS:
1. Choose anti-spyware software to be used. 
2. Start the anti-spyware software and select area to be scanned.
3. Scan the selected area. List the name(s) of the spyware detected.
4. Choose and apply any or all of the following when a spyware is detected - delete/remove, clean/heal, quarantine/move to vault.

Worksheet 3: Lesson 16-20

Lesson 23: How To Conduct Study

Lesson 22: Computers Users


Lesson 21: Computer Application In Society


Lesson 20: Security Procedures


Lesson 19: Security threats and security measures relationship

Lesson 18: Security Measures


Lesson 17: Computer Threats


Lesson 16: Computer Security


Worksheet 2: Lesson 6-10


Lesson 6: 

1. What is ethics?

I. A study about moral principles.
II. A custom that guides human behaviour.
III. A regulation that must be obeyed by the public.
IV. A knowledge about what is good and what is bad.

A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV

2. Which of the following statements shows the impact of using a company’s computer without authorisation?

I. Decreasing company’s expense.
II. Increasing the company’s expense.
III. Improvement in term of staff personal skills.
IV. Creating an unhealthy relationship
between employer and worker.

A. I and II
B. II and III
C. II and IV
D. III and IV

3. Which of the following statements shows against the code of conduct in computing?
A. Accessing the computer without authorisation.
B. Using the computer to create useful computer codes.
C. Using the original computer software from legal vendors.
D. Using computer knowledge to contribute to human life.

Lesson 7
Task: Identify Ethics & Law

  • Main objective is to produce ethical computer users, who uses computer to do good things.
  • Universal, can be applied anywhere all over the world.
  • As a rule to control computer users.
  • To prevent computer users from doing any action that is referred to as computer misuse.
  • Judged by judicial standards.
  • Depends on country and state where the crime is committed.
  • As a guideline to computer users.
  • Judged by moral standards.

Lesson 15: Computer Crime


                                                                         OVERVIEW
What are Computer Crimes?

Computer FRAUD.............................................................................................................................
Copyright infringement......................................................................................................................
Computer Theft and...........................................................................................................................
Computer Attack................................................................................................................................
are considered as computer crimes. These activities are using computer or ICT application and that 100% illegal according to the Cyber Law.

Lesson 14: Cyber LAW



Synopsis

What is Cyber Law? 

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

Why Cyber Law is needed?

Concern of protecting the privacy of certain individual, intellectual property right and valuable information in the cyber world. Cyber Law may help people from any lost due to cyber crime or criminal acts done by the cyber criminals.

What are the Cyber Law in Malaysia?

1. Digital Signature Act 1997
2. Telemedicine Act 1997
3. Computer Crime Act 1997
4. Communication & Multimedia Act 1998

Drafted Cyber Law
1. Private Data Protection Bills
2. Electronic Government Activities Bills
3. Electronic Transactions Bills

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Date: 21st Feb 2013
Class: 4B(12/14)
Resources: school local site http://10.192.230.90/sementanet/ictspm, PC, Projector, score A module.
Activities:
1. Revise the internet filtering method(Verbal discussion, in pairs)
2. Explanation on Cyber Law by the teacher.
3. Observe the video clip entitled " Facts of Cyber Crime "
4. In pairs: Give the reason why cyber law is needed?
5. Worksheet 1: Matching the correct Cyber Law in Malaysian

Rating : Very Good!

Date: 21st Feb 2013
Class: 4A(17/18)
Resources: school local site http://10.192.230.90/sementanet/ictspm, PC, Projector, score A module.
Activities:
1. Revise the internet filtering method(Verbal discussion, in pairs)
2. Explanation on Cyber Law by the teacher.
3. Observe the video clip entitled " Facts of Cyber Crime "
4. Homework & incoming presentation: Why Cyber Law is needed?

Rating: Very Good!

Lesson 13: Internet Filtering

Date: 18 Feb 13
Class: 4B ( 3 boys, 9 girsl) 
Resources: ICT, F4 CD1, module score A, internet, powerpoint
Activities: 
1. Conduct a simple research using internet - google
2. Find information on keyword blocking(group 1), web site rating(group 2), web filtering(group 3)


Rating : good!

Date: 19 & 21 Feb 13
Class: 4A(18 Ss)
Resources: Score A module, school local site http://10.192.230.90/sementanet/ictspm
Activities: 
1. Read and copy the notes from the module.
2. Answer 5 objectives question.
3. Discussion + Summary

Rating: good!

Keynotes:
Internet filtering approach is to prevent the controversial contents intruding our computer and privacy.
1. Keyword Blocking 2. Site Blocking 3. Web Rating Approach

Lesson 12: Controversial Contents




Date: 18 Feb 13
Class: 4B ( 3 boys, 9 girsl) 
Resources: ICT, F4 CD1, Score A module, internet, powerpoint
Activities: cd exploring( contents, synopsis, summary)

Rating : good!

Date: 19 Feb 13
Class: 4A(18 Ss)
Resources: Score A module, school local site http://10.192.230.90/sementanet/ictspm
Activities: Self study & task given
Task:
1. Explain the meaning of controversial content in full sentences.
2. Give 3 impact of slander to the society.

Rating: can be improved!

Keynotes:
Controversial Issues - Popular facts or cases that give impact to the community.
Controversial content in ICT are any materials or information that content violence, pornography and slander.
Pornography : exploitation of human sexual behavior that can lead to social problem and low moral attitude in the society!
Slander : spreading lies and rumors in order to make the other party fall or destroyed!
Violence: War, Shooting, Fighting, Killing etc.

Lesson 11: Verification

DEFINITION

Verification is the act of proving or disproving the correctness of a system with respect to a certain formal specification.

There are two methods commonly used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.

Lesson 10: Authentication

Definition
 
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. 

The use of digital certificates issued and verified by a Certificate Authority (CA) as part of a public key infrastructure is considered likely to become the standard way to perform authentication on the Internet. Logically, authentication precedes authorization (although they may often seem to be combined).

Lesson 9: Privacy

WHAT IS PRIVACY? 

Data and Information privacy. 

Data: a collection of raw unprocessed facts, figures and symbols. Then, computer is used to process data into information. In general, data include texts, numbers, sounds, images and video.

Rights of individuals and companies to deny or restrict the collection and use of information about them.

Data & Information privacy are threaten through;
1. Electronic Profile
2. Cookies
3. Spyware

Privacy is needed because we don't want any part of our private and valuable information fall to other parties especially bad parties!

Monday, January 28, 2013

Lesson 8: Intellectual Property Rights






Hey..... where are the notes? Ok...why not we use the internet to find out about the terms below.  
Your Task: WRITE THE INFORMATION USING COMMENT! 

Group 1:State the definition of Intellectual Property Rights

Group 2:What is Intellectual Property Law?

Group 3: What is Protected Invention?

Group 4: Patents for inventions & Trademarks for brand identity?

Group 5: Design for product appearance & Copyright for material?

Lesson 7 : Differences between Ethics & Law

ETHICS

GUIDELINE: As a guideline to computer users.
MORAL STANDARDS: Ethical behavior standards is judged by moral.
FREE TO FOLLOW: Computer users are free or ignore the code of ethics.
NO PUNISHMENTS: No punishment for anyone who ignore ethics. 

UNIVERSALS: can be applied anywhere, all over the world.
PRODUCE ETHICAL COMPUTER: To produce ethical computer users.
USERS IMMORAL: Not honoring computer ethics means ignoring the moral elements(immoral).


LAWS

CONTROL: As a rule to control computer users.
JUDICIAL STANDARDS: Law is judged by judicial standards.
MUST FOLLOW: Computer users must follow the regulations and law.
PENALTIES, IMPRISONMENTS AND OTHER PUNISHMENTS: Penalties, imprisonments and punishments for those who break the law.

DEPENDS ON COUNTRY: Depends on country and state where the crime is committed.
PREVENT MISUSING OF COMPUTERS: To prevent misuse of computers. 

CRIME Not honoring the law means committing a crime.










Lesson 6: Computer Ethics & Legal Issues

THE TEN COMMANDMENTS OF COMPUTER ETHICS(USA)

1. You shall not use a computer to harm other people.
2. You shall not interfere with other people's computer work.
3. You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you
have not paid.
7. You shall not use other people's computer resources without
authorization or proper compensation.
8. You shall not appropriate other people's intellectual output.
9. You shall think about the social consequences of the program
you are writing or the system you are designing.
10. You shall always use a computer in ways that ensure
consideration and respect


REVIEW(COMMENTS)

1. Define ETHICS in general.
2. State TWO examples of ethical computer ethics.
3. State TWO examples of unethical computer ethics.

Worksheet 1: Lesson 1-5


Lesson 3:
 
1. A bank clerk transfers money into your account. This transaction is stored in the
_____________.
A. workstation
B. supercomputer
C. embedded computer
D. mainframe computer

2. ____________ uses computers to experiment new graphic designs with possible interiors.
A. An artist
B. A scientist
C. An architect
D. A researcher

3. Customers benefit from Electronic Banking in terms of:
I. 24 hours service
II. Electronic Fund Transfer
III. Electronic Cash Deposits
IV. Electronic Loan Application
A. I, II, and III
B. I, II, and IV
C. I, III, and IV
D. I, II, III, and IV

4. Teachers benefit from the use of  computers in schools because computers…
I. weaken learning
II. can enhance interactive learning
III. can be used as an effective teaching aids
IV. can strengthen cognitive development
A. I and III
B. II and III
C. II, III, and IV
D. I, II, III, and IV


Lesson 5:

1. Using computers frequently and for long hours is not harmful.
A. TRUE
B. FALSE

2. The usage of ICT technologies such as to create pornographic websites can have a negative
impact on the society.
A. TRUE
B. FALSE

3. We can only find limited sources of information on the internet.
A. TRUE
B. FALSE

4. The cost of using the internet is more expensive compared to other modes of communication.
A. TRUE
B. FALSE

5. With the internet, the interaction among societies is unlimited.
A. TRUE
B. FALSE

6. Using ICT technologies can create a paperless office environment.
A. TRUE
B. FALSE

7. It takes ages for someone to receive information through the internet.
A. TRUE
B. FALSE

8. ICT brings positive changes to the society’s lifestyle.
A. TRUE
B. FALSE

9. Normally the “computer error” is caused by the machine itself.
A. TRUE
B. FALSE

10. There is only one way of communication through ICT technology and that is via Yahoo!
Messenger.
A. TRUE
B. FALSE

Lesson 5: The Impact Of ICT To Society

REVIEW THIS!

POSITIVE IMPACTS

1. Faster Communication Speed
2. Low Communication Cost
3. Paperless Environment
4. Reliable Mode of transportation

NEGATIVE IMPACTS

1. Fraud
2. Pornography
3. Hacking
4. Identity Theft
5. Social Problems
6. Health Problems.

Lesson 4: Computerized & Non Computerized

REVIEW THIS!

BANKING SYSTEM

Before ICT
...................................................................................................
...................................................................................................

With ICT
...................................................................................................
...................................................................................................   



SUMMARY

Computerized System
- Use electricity
- Faster & reliable
- Good Productivity

Non Computerized System

- Manually, electricity is not compulsory 
- Slow & not so reliable
- Less productivity