Tuesday, January 29, 2013

PBS: S01.1

School Based Assessment (PBS)

Learning Area: LA1-Information Communication & Technology
Topic: Security Measures(Lesson 19)

Activity 1

S01.1 Apply correct security procedures using antivirus. 

STEPS:
1. Choose antivirus software to be used. 
2. Start the antivirus software and select area to be scanned.
3. Scan the selected area. List the name(s) of the virus detected.
4. Choose and apply any or all of the following when a virus is detected - delete/remove, clean/heal, quarantine/move to vault.


 
Activity 2

S01.2 Apply correct security procedures using spyware. 

STEPS:
1. Choose anti-spyware software to be used. 
2. Start the anti-spyware software and select area to be scanned.
3. Scan the selected area. List the name(s) of the spyware detected.
4. Choose and apply any or all of the following when a spyware is detected - delete/remove, clean/heal, quarantine/move to vault.

Worksheet 3: Lesson 16-20

Lesson 23: How To Conduct Study

Lesson 22: Computers Users


Lesson 21: Computer Application In Society


Lesson 20: Security Procedures


Lesson 19: Security threats and security measures relationship

Lesson 18: Security Measures


Lesson 17: Computer Threats


Lesson 16: Computer Security


Worksheet 2: Lesson 6-10


Lesson 6: 

1. What is ethics?

I. A study about moral principles.
II. A custom that guides human behaviour.
III. A regulation that must be obeyed by the public.
IV. A knowledge about what is good and what is bad.

A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV

2. Which of the following statements shows the impact of using a company’s computer without authorisation?

I. Decreasing company’s expense.
II. Increasing the company’s expense.
III. Improvement in term of staff personal skills.
IV. Creating an unhealthy relationship
between employer and worker.

A. I and II
B. II and III
C. II and IV
D. III and IV

3. Which of the following statements shows against the code of conduct in computing?
A. Accessing the computer without authorisation.
B. Using the computer to create useful computer codes.
C. Using the original computer software from legal vendors.
D. Using computer knowledge to contribute to human life.

Lesson 7
Task: Identify Ethics & Law

  • Main objective is to produce ethical computer users, who uses computer to do good things.
  • Universal, can be applied anywhere all over the world.
  • As a rule to control computer users.
  • To prevent computer users from doing any action that is referred to as computer misuse.
  • Judged by judicial standards.
  • Depends on country and state where the crime is committed.
  • As a guideline to computer users.
  • Judged by moral standards.

Lesson 15: Computer Crime


                                                                         OVERVIEW
What are Computer Crimes?

Computer FRAUD.............................................................................................................................
Copyright infringement......................................................................................................................
Computer Theft and...........................................................................................................................
Computer Attack................................................................................................................................
are considered as computer crimes. These activities are using computer or ICT application and that 100% illegal according to the Cyber Law.

Lesson 14: Cyber LAW



Synopsis

What is Cyber Law? 

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

Why Cyber Law is needed?

Concern of protecting the privacy of certain individual, intellectual property right and valuable information in the cyber world. Cyber Law may help people from any lost due to cyber crime or criminal acts done by the cyber criminals.

What are the Cyber Law in Malaysia?

1. Digital Signature Act 1997
2. Telemedicine Act 1997
3. Computer Crime Act 1997
4. Communication & Multimedia Act 1998

Drafted Cyber Law
1. Private Data Protection Bills
2. Electronic Government Activities Bills
3. Electronic Transactions Bills

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Date: 21st Feb 2013
Class: 4B(12/14)
Resources: school local site http://10.192.230.90/sementanet/ictspm, PC, Projector, score A module.
Activities:
1. Revise the internet filtering method(Verbal discussion, in pairs)
2. Explanation on Cyber Law by the teacher.
3. Observe the video clip entitled " Facts of Cyber Crime "
4. In pairs: Give the reason why cyber law is needed?
5. Worksheet 1: Matching the correct Cyber Law in Malaysian

Rating : Very Good!

Date: 21st Feb 2013
Class: 4A(17/18)
Resources: school local site http://10.192.230.90/sementanet/ictspm, PC, Projector, score A module.
Activities:
1. Revise the internet filtering method(Verbal discussion, in pairs)
2. Explanation on Cyber Law by the teacher.
3. Observe the video clip entitled " Facts of Cyber Crime "
4. Homework & incoming presentation: Why Cyber Law is needed?

Rating: Very Good!

Lesson 13: Internet Filtering

Date: 18 Feb 13
Class: 4B ( 3 boys, 9 girsl) 
Resources: ICT, F4 CD1, module score A, internet, powerpoint
Activities: 
1. Conduct a simple research using internet - google
2. Find information on keyword blocking(group 1), web site rating(group 2), web filtering(group 3)


Rating : good!

Date: 19 & 21 Feb 13
Class: 4A(18 Ss)
Resources: Score A module, school local site http://10.192.230.90/sementanet/ictspm
Activities: 
1. Read and copy the notes from the module.
2. Answer 5 objectives question.
3. Discussion + Summary

Rating: good!

Keynotes:
Internet filtering approach is to prevent the controversial contents intruding our computer and privacy.
1. Keyword Blocking 2. Site Blocking 3. Web Rating Approach

Lesson 12: Controversial Contents




Date: 18 Feb 13
Class: 4B ( 3 boys, 9 girsl) 
Resources: ICT, F4 CD1, Score A module, internet, powerpoint
Activities: cd exploring( contents, synopsis, summary)

Rating : good!

Date: 19 Feb 13
Class: 4A(18 Ss)
Resources: Score A module, school local site http://10.192.230.90/sementanet/ictspm
Activities: Self study & task given
Task:
1. Explain the meaning of controversial content in full sentences.
2. Give 3 impact of slander to the society.

Rating: can be improved!

Keynotes:
Controversial Issues - Popular facts or cases that give impact to the community.
Controversial content in ICT are any materials or information that content violence, pornography and slander.
Pornography : exploitation of human sexual behavior that can lead to social problem and low moral attitude in the society!
Slander : spreading lies and rumors in order to make the other party fall or destroyed!
Violence: War, Shooting, Fighting, Killing etc.

Lesson 11: Verification

DEFINITION

Verification is the act of proving or disproving the correctness of a system with respect to a certain formal specification.

There are two methods commonly used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.

Lesson 10: Authentication

Definition
 
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. 

The use of digital certificates issued and verified by a Certificate Authority (CA) as part of a public key infrastructure is considered likely to become the standard way to perform authentication on the Internet. Logically, authentication precedes authorization (although they may often seem to be combined).

Lesson 9: Privacy

WHAT IS PRIVACY? 

Data and Information privacy. 

Data: a collection of raw unprocessed facts, figures and symbols. Then, computer is used to process data into information. In general, data include texts, numbers, sounds, images and video.

Rights of individuals and companies to deny or restrict the collection and use of information about them.

Data & Information privacy are threaten through;
1. Electronic Profile
2. Cookies
3. Spyware

Privacy is needed because we don't want any part of our private and valuable information fall to other parties especially bad parties!

Monday, January 28, 2013

Lesson 8: Intellectual Property Rights






Hey..... where are the notes? Ok...why not we use the internet to find out about the terms below.  
Your Task: WRITE THE INFORMATION USING COMMENT! 

Group 1:State the definition of Intellectual Property Rights

Group 2:What is Intellectual Property Law?

Group 3: What is Protected Invention?

Group 4: Patents for inventions & Trademarks for brand identity?

Group 5: Design for product appearance & Copyright for material?

Lesson 7 : Differences between Ethics & Law

ETHICS

GUIDELINE: As a guideline to computer users.
MORAL STANDARDS: Ethical behavior standards is judged by moral.
FREE TO FOLLOW: Computer users are free or ignore the code of ethics.
NO PUNISHMENTS: No punishment for anyone who ignore ethics. 

UNIVERSALS: can be applied anywhere, all over the world.
PRODUCE ETHICAL COMPUTER: To produce ethical computer users.
USERS IMMORAL: Not honoring computer ethics means ignoring the moral elements(immoral).


LAWS

CONTROL: As a rule to control computer users.
JUDICIAL STANDARDS: Law is judged by judicial standards.
MUST FOLLOW: Computer users must follow the regulations and law.
PENALTIES, IMPRISONMENTS AND OTHER PUNISHMENTS: Penalties, imprisonments and punishments for those who break the law.

DEPENDS ON COUNTRY: Depends on country and state where the crime is committed.
PREVENT MISUSING OF COMPUTERS: To prevent misuse of computers. 

CRIME Not honoring the law means committing a crime.










Lesson 6: Computer Ethics & Legal Issues

THE TEN COMMANDMENTS OF COMPUTER ETHICS(USA)

1. You shall not use a computer to harm other people.
2. You shall not interfere with other people's computer work.
3. You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you
have not paid.
7. You shall not use other people's computer resources without
authorization or proper compensation.
8. You shall not appropriate other people's intellectual output.
9. You shall think about the social consequences of the program
you are writing or the system you are designing.
10. You shall always use a computer in ways that ensure
consideration and respect


REVIEW(COMMENTS)

1. Define ETHICS in general.
2. State TWO examples of ethical computer ethics.
3. State TWO examples of unethical computer ethics.

Worksheet 1: Lesson 1-5


Lesson 3:
 
1. A bank clerk transfers money into your account. This transaction is stored in the
_____________.
A. workstation
B. supercomputer
C. embedded computer
D. mainframe computer

2. ____________ uses computers to experiment new graphic designs with possible interiors.
A. An artist
B. A scientist
C. An architect
D. A researcher

3. Customers benefit from Electronic Banking in terms of:
I. 24 hours service
II. Electronic Fund Transfer
III. Electronic Cash Deposits
IV. Electronic Loan Application
A. I, II, and III
B. I, II, and IV
C. I, III, and IV
D. I, II, III, and IV

4. Teachers benefit from the use of  computers in schools because computers…
I. weaken learning
II. can enhance interactive learning
III. can be used as an effective teaching aids
IV. can strengthen cognitive development
A. I and III
B. II and III
C. II, III, and IV
D. I, II, III, and IV


Lesson 5:

1. Using computers frequently and for long hours is not harmful.
A. TRUE
B. FALSE

2. The usage of ICT technologies such as to create pornographic websites can have a negative
impact on the society.
A. TRUE
B. FALSE

3. We can only find limited sources of information on the internet.
A. TRUE
B. FALSE

4. The cost of using the internet is more expensive compared to other modes of communication.
A. TRUE
B. FALSE

5. With the internet, the interaction among societies is unlimited.
A. TRUE
B. FALSE

6. Using ICT technologies can create a paperless office environment.
A. TRUE
B. FALSE

7. It takes ages for someone to receive information through the internet.
A. TRUE
B. FALSE

8. ICT brings positive changes to the society’s lifestyle.
A. TRUE
B. FALSE

9. Normally the “computer error” is caused by the machine itself.
A. TRUE
B. FALSE

10. There is only one way of communication through ICT technology and that is via Yahoo!
Messenger.
A. TRUE
B. FALSE

Lesson 5: The Impact Of ICT To Society

REVIEW THIS!

POSITIVE IMPACTS

1. Faster Communication Speed
2. Low Communication Cost
3. Paperless Environment
4. Reliable Mode of transportation

NEGATIVE IMPACTS

1. Fraud
2. Pornography
3. Hacking
4. Identity Theft
5. Social Problems
6. Health Problems.

Lesson 4: Computerized & Non Computerized

REVIEW THIS!

BANKING SYSTEM

Before ICT
...................................................................................................
...................................................................................................

With ICT
...................................................................................................
...................................................................................................   



SUMMARY

Computerized System
- Use electricity
- Faster & reliable
- Good Productivity

Non Computerized System

- Manually, electricity is not compulsory 
- Slow & not so reliable
- Less productivity

































Lesson 3: Usage Of ICT In Daily Life

EDUCATION

Teachers use computers to research for teaching materials, participate in online forum or discussion and doing research.
Students use the computers as a reference tool. They use computers to browse the Internet to look for information.

                                         OTHER AREA OR SECTOR

              INDUSTRY
                                                          E-COMMERCE
CAREER
                                           TRAVEL
                 HEALTH


Lesson 2: Evolution Of Computer

FIRST GENERATION (1940-1956)

The first generation of computer was huge, slow, expensive and often unreliable. In 1946, two Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical Integrator And Computer). It use vacuum tube that has so many problem such as produce massive heat that caused the computer to malfunction.

HOW ABOUT
2nd ?
3rd ?
4th ?
5th ?


What are the main characteristic in each generation. Think about how computer changed through out the time.  

Lesson 1: Introduction to ICT

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)


ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.


Information refers to the knowledge obtained from reading, investigation, study or research.We need information to make decisions and to predict the future. 
For example, scientists can detect the formation of a tsunami using the latest technology and warn the public to avoid disasters in the affected areas.
Information is knowledge and helps us to fulfill our daily tasks. 

For example, forecasting the stock exchange market.

Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Nowadays, we using smartphone, internet and email to communicate.

Technology is the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs. Technology is vital in communication.

About This Subject

Teachers:
Mr Steve Gaisan & Mdm Esther Linus

Consist of 6 Learning Areas:

LA1: Information and Communication Technology and Society
LA2: Computer Systems
LA3: Computer Networks and Communications
LA4: Multimedia
LA5: Programming
LA6: Information Systems

Assessment 
1. Central Based Assessment or Examination: LPM
2. School Based Assessment or 6 assessment document: PBS(coursework)

PAPER 1  (70%)
Instrument Types : Written Test  
Duration : 2 hours 30 minutes  
Section A : 25 Question, 36 Score  
Section B : 5 Question, 20 Score  
Section C : 3 Question, answer 2, 14 Score

PAPER 2  (30%)
Instrument Types : Coursework
(Demonstration, Verbal Presentation, Written Assignment, Project Work) 
No. Of Aspect : Form 4 ( 9 aspect) - 18 Score, Form 5 ( 6 aspect) - 12 Score 
Evaluation Period :
  Form 4 (Jan-Oct)
  Form 5 (Jan-July)



http://www.ictscorea.com
             Langkah-langkah mendapat skor A (tambahan)

1. Hafal. Membiarkan pelajar menghafal kesemua kandungan buku skor A. Senarai checklist hendaklah diberikan kepada pelajar. Jika pelajar sudah menghafal maka tandakan sesuatu pada checklist itu. Pada saya peringkat pertama dalam proses pembelajaran ialah pengetahuan di mana pelajar perlu menghafal perkara yang ingin mereka fahami. Peringkat kedua dalam proses pembelajaran ialah kefahaman iaitu kebolehan membandingkan dan membezakan apa yang sudah berada dalam fikiran. Bagaimana student nak faham jika mereka tidak tahu apa-apa mengenai sesuatu. Ringkasnya, kefahaman bergantung kepada berapa banyak yang mereka tahu. Semakin banyak mereka tahu semakin pula mereka akan faham. Seterusnya ialah penggunaan iaitu mengaplikasikan pengetahuan yang sedia ada setelah mereka faham kepada situasi yang baru. Secara ringkasnya ialah Tahu-Faham-Guna asasnya mesti mengingat fakta-fakta iaitu menghafal. Jika mereka tahu sahaja sudah boleh menyelesaikan bahagian A. Faham dan Guna untuk menyelesaikan bahagian B dan C soalan peperiksaan SPM ICT. Pada saya pelajar-pelajar yang hendak pergi peperiksaan umpama askar-askar yang akan menghadapi peperangan hebat itu peperiksaan SPM. Jadi senjata mereka yang utama ialah buku, nota, buku rujukan yang mereka telah hafal. Jika tiada senjata bagaimana nak berperang alamat mati kataklah. Inilah yang terjadi pada tahun 2007 di mana pada masa tu tiada senjata yang di bawa oleh pelajar atau kalau adapun senjata yang tak canggih. Senario tahun 2008 sudah berubah ramai yang mempunyai senjata jadi ramailah yang berjaya dalam peperiksaan ICT kali ni.


2. Pengajaran. Buku skor A hendaklah dijadikan rujukan utama dan sebagai bahan permulaan. Ada guru-guru yang membeli last minit. Sebulan lagi nak peperiksaan SPM baru ada buku ini. Ini adalah tindakan yang salah kerana buku ini adalah ringkas. Rasanya jika pelajar membaca mereka menjadi kurang faham. Oleh itu guru-guru hendaklah menyediakan dari peringkat awal lagi. Guru-guru perlu menerang dan menghuraikan kendungan buku skor A dengan panjang lebar. Apa yang saya maksudnya gurulah yang perlu memberi syarahan dan huraian terperinci kepada kandungan buku ini. Jadi guru-guru perlu ada bahan sampingan bagi menerangkan kandungannya. Guru-guru perlu membuat catatan bagi catatan penambahan/ pembetulan/ komen kepada buku ini. Maka pengajaran anda akan menjadi menarik kerana anda menggunakan bahan sendiri dalam membuat pengajaran. Kesimpulannya buku ini hendaklah digunakan dari awal pengajaran sehinggalah menghadapi peperiksaan SPM dan kandungan buku hendaklah dikembangkan.Sila lihat bahagian panduan menggunakan buku skor A untuk huraian terperinci

Satu lagi perkara penting dalam pengajaran ialah perancangan. Perancangan yang rapi akan membolehkan pengajaran kita efisien dan lengkap. Tetapi apa yang lebih penting ialah perancangan supaya pengajaran kita habis dengan cepat. Misalnya pada tingkatan 4 kita habiskan 4 chapter iaitu Chapter 1 : ICTS, Chapter 2 : Computer System, Chapter 3 : Networking dan Chapter 4 : Multimedia. Kalau boleh perkara yang menganggu kita ialah Coursework.

Jadi pada Tingkatan 5 , hanya tinggal 2 chapter je lagi. Pastikan pula dua chapter itu di habiskan dengan cepat maka kita boleh membuat ulangkaji dengan secepat mungkin. Ingat lagi cepat habis lagi baik.

Dan seterusnya perlu juga membuat persediaan untuk peperiksaan percubaan pertama. Gunakan kertas percubaan tahun lagi dari negeri-negeri lain. Jika masih lagi belum habis silibus anda boleh abaikan tajuk-tajuk yang belum diajar dalam peperiksaan percubaan pertama tetapi pastikan ianya mengikut format SPM. Semoga berjaya.

3. Soalan Peperiksaan. Setelah dihafal semua kandungannya (hafal sedikit demi sedikit) jangan lupa pula untuk memberikan soalan-soalan percubaan tahun lepas boleh cari dari internet (lihat link soalan percubaan SPM 2008 dalam laman web ini) dan tahun ini (perlu dapatkan dari kawan-kawan) kepada pelajar sekurang-kurangnya empat set soalan. Soalan-soalan ini kita ambil terus dari soalan-soalan percubaan SPM ICT tahun lepas dari negeri-negeri lain seluruh malaysia. Soalan-soalan inilah yang penting untuk persediaan para pelajar sebelum menghadapi peperiksaan SPM. Jika sekolah saya saya akan mengedarkan soalan-soalan ini sebagai buku soalan dan minta pelajar menjawab. Saya akan berbincang dengan mereka mengenai jawapannya. Adakan seberapa banyak peperiksaan percubaan. Peperiksaan Awal Tahun ialah peperiksaan percubaan SPM 1. Peperiksaan Pertengahan Tahun ialah peperiksaan Percubaan SPM 2. Peperiksaan Pra Percubaan ialah Peperiksaan SPM ke 3. Peperiksaan Percubaan SPM ialah Peperiksaan Percubaan SPM ke 4. Dan ulangkaji lagi sehingga mereka sekurang-kurangnya menghadapi peperiksaan percubaan SPM sebanyak 4 kali. Insyallah peperiksaan percubaan pertama SPM mereka gagal kerana tak memahami topik dan format, peperiksaan kedua makin baik, peperiksan ketiga, seterusnya sehingga mereka bersedia menghadapi peperiksaan SPM sebenar. Jika ada yang bertanya mengapa perlu ada begitu banyak peperiksaan percubaan Anggaplah mereka seperti wakil sekolah dalam pertandingan silat ke, takwando ke, badminton ke....sekali pun tak pernah bertanding tiba-tiba nak pergi peringkat kebangsaan....jika sudah bertanding peringkat daerah, pergi pulak bertanding peringkat zon....menang pulak tu pada peringkat-peringkat ni ....baru boleh menang peringkat yang lebih tinggi iaitu peringkat kebangsaan...perlu juga diingat jurulatih mereka juga mesti hebat jika tidak bagaimana nak menang. Biasanya jurulatihlah yang memainkan peranan penting jadi mereka mesti meningkatkan diri dengan pengetahuan tentang sukan ini....

4. Teknik Menjawab. Anda perlu berbincang dengan pelajar terutama bahagian B dan C. Kerana bahagian B dan C soalannya tidak direct seperti bahagian A. Mereka perlu berfikir dan dan menjawab mengikut situasi dan maklumat dari soalan. Perlukan bimbingan guru kerana soalan pada bahagian ini memerlukan kreativiti.

Jangan lupa tekan dengan katatugas. Katatugas penting kerana dari sini pelajar boleh tahu samada jawapan perlu panjang ataupun pendek sahaja. Ramai pelajar yang hilang markah kerana tidak menjawab mengikut kata tugas yang terdapat pada soalan

5. Kembangkan kandungan buku. Untuk mendapat skor yang baik kandungan buku skor A perlu dikembangkan iaitu dengan menambahkan dengan mengambil rujukan dari ICT CD courseware, layari internet dan lain-lain rujukan.

Anda boleh gunakan cara anda sendiri bagaimana untuk mereka menghafal kandungan buku skor A.

Sebarang komen dan cadangan mengenai buku ini dialu-alukan.

Semoga berjaya untuk mendapat skor A untuk para pelajar.

                              Kaedah Magik Pentaksiran

Cuba bayangkan di sekolah saya terdapat hampir 200 orang pelajar yang mengambil ICT. Sedangkan saya seorang sahaja yang mengajar di sekolah ini. Ada tujuh kelas dan saya mengajar 28 waktu. Saya juga terlibat dengan pelbagai pihak dan sering keluar dari sekolah. Bagaimana untuk menyiapkan kerja-kerja wajib dengan baik di samping dapat berkhidmat dengan pihak lain. Maka setelah mengajar beberapa lama saya mendapat idea dan tercetuslah yang diberi nama kaedah magik pentaksiran dalam usaha menyelesaikan urusan pentaksiran coursework pelajar.

Di sini saya ingin berkongsi dengan guru-guru sekalian bagaimana saya menyelesaikan masalah mengenai tugasan yang diberikan kepada pelajar bagi menyiapkan kerja kursus.

1. Projek Multimedia

Menyediakan semua bahan yang diperlukan pelajar untuk membuat projek. Semua elemen multimedia kita sediakan. Projek yang saya pilih ialah storage. Jadi pelajar membuat projek berdasarkan bahan-bahan kita sediakan. Letakkan semua elemen tersebut ke dalam CD. Maka pelajar boleh menyalinkan bahan-bahan itu ke dalam PC masing-masing.

Dengan menggunakan perisian PowerPoint maka saya meminta mereka menyiapkan projek tersebut. Bahan-bahan tersebut boleh cikgu muat turun pada bahagian download

2. Projek Programming

Dengan menggunakan module Visual Basic yang saya buat sendiri maka saya mengajar mereka langkah demi langkah untuk membuat pengaturcaraan. Sehingga mereka mahir. Dalam module itu ada lebih dari 6 projek maka setiap hari mereka dimintakan menyiapkan projek tersebut.

Setelah 6 kelas berlalu saya akan mengadakan ujian maka mereka diminta menjawab soalan dan menyiapkan tugasan secara serentak. Maka selesailah tugasan pengaturcaraan

3. Projek Database

Dengan menggunakan module DBMS yang reka sendiri (maaf module pada bahagian download masih lagi belum siap - semua langkah-langkah masih lagi berada dalam fikiran saya belum sempat dibukukan sepenuhnya) saya mengajar pelajar langkah demi langkah sehingga mereka mahir menggunakan microsoft access. Perlu juga diingatkan kepada guru-guru bahagian ini penting kerana akan ditanya dalam peperiksaan SPM. Kita perlu mengajar para pelajar dengan selengkapnya supaya mereka faham. Disamping dapat menyiapkan coursework assessment kita juga dapat menyediakan pelajar kepada peperiksaan SPM.

Jika kita menggunakan module DBMS yang disediakan oleh PPK module itu terlampau rumit. Lagipun ada satu projek je... Mana boleh pelajar pandai...sekurang-sekurangnya pelajar dengan buat 3 projek ke.....langkah-langkah demi langkah. Hari pertama buat table dengan form je...Hari kedua buat table dengan report. Hari ketiga buat table dengan query. Hari kempat cantumkan kesemuanya table, form, query, relationship, report.

Buat projek kedua....hari seterusnya....buat projek ketiga.....

Setelah beberapa kelas berlalu saya akan mengadakan ujian maka mereka diminta menjawab soalan dan menyiapkan tugasan secara serentak. Maka selesailah tugasan mengenai DBMS

4. Written Assignment

1. Semua pelajar diwajibkan mendaftar akaun untuk gmail. space 7MB (besar)

2. Dengan adanya akaun maka mereka boleh menggunakan web-based application iaitu google apps/google docs

Others sources:
http://ictsmktsni.blogspot.com