CD 1form4

download CD 1form4

of 39

Transcript of CD 1form4

  • 8/9/2019 CD 1form4

    1/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    INTRODUCTION

    TO INFORMATION ANDCOMMUNICATION TECHNOLOGY

    LESSON 1INTRODUCTION TO INFORMATION AND COMMUNICATION

    TECHNOLOGY (ICT)

    EVOLUTION OF COMMUNICATIONCommunication has improved and evolved to facilitate our daily activities. Inthe 21st century, everything related to communication utilizes technology to

    send out or disseminate information to a wider audience. Information canbe sent out in many ways. he inventions of cellular phones, television andother electronic devices are important in enhancing communication.

    WHAT IS ICT?IC is the technology re!uired for information processing, in particular, the

    use of electronic computers, communication devices and softwareapplications to convert, store, protect, process, transmit and retrieveinformation from anywhere, anytime.

    INFORMATIONInformation refers to the "nowledge obtained from reading, investigation,study or research.

    1

  • 8/9/2019 CD 1form4

    2/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    he tools to transmit information are the telephone, television and radio.

    #e need information to ma"e decisions and to predict the future. $ore%ample, scientists can detect the formation of a tsunami using the latesttechnology and warn the public to avoid disasters in the affected areas.

    Information is "nowledge and helps us to fulfill our daily tas"s. $or e%ample,forecasting the stoc" e%change mar"et.

    COMMUNICATION

    Communication is an act of transmitting messages. It is a process wherebyinformation is e%changed between individuals using symbols, signs or verbalinteractions. &reviously, people communicated through sign or symbols,performing drama and poetry. #ith the advent of technology, these olderforms of communication are less utilised as compared to the use of theInternet, e'mail or video conferencing.

    Communication is important in order to gain "nowledge. #ith "nowledge, we

    are more confident in e%pressing our thoughts and ideas.TECHNOLOGY

    2

  • 8/9/2019 CD 1form4

    3/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    echnology is the use of scientific "nowledge, e%perienceand resources to create processes and products that fulfillhuman needs. echnology is vital in communication.

    Aiding Communi!"ionelephone and fa% machines are the devices used in

    e%tending communication.

    S#$%!ding In&o$m!"iono broadcast information such as news or weather reportseffectively. (adio, television, satellites and the #orld #ide#eb )www* are powerful tools that can be used.

    TECHNOLOGY TIMELINE

    T%'noog Y%!$

    In +-- C, the /umeriansdeveloped cuneiform writing.

    In 1-- C, the &hoeniciansdeveloped the alphabet

    In 1- C, sai 0un of Chinainvented paper.

    In 1, the first printing beganwith the creation of a printingmachine.

    3

  • 8/9/2019 CD 1form4

    4/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    In 13+, the telegraph line wasinvented.

    In 145, the first telephone wasintroduced.

    In 132, television was made"nown to public.

    In 131, the computer wascreated.

    In 134, the photocopier machinewas introduced.

    4

  • 8/9/2019 CD 1form4

    5/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    In 135+, the communicationsatellite wasintroduced.

    In 1353, the first Internet "nownas 6(&678 was introduced.

    LESSON *EVOLUTION OF COM+UTERS

    In the early years, before the computer was invented, there are severalinventions of counting machines.

    9ear

    2--C

    C:I78/8 66C;/

    --

    C

    8

  • 8/9/2019 CD 1form4

    6/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    152-

    =>:7 76&I8( 76&I8(?/ >78/

    15+

    06I/8 &6/C60 &6/C60I78

    15+

    $(I8@ #I0:80A B>708I7I

    08I7I?/ (8C:78(

    14-1

    =>/8&: A6(I8 =6CD;6(@ #86BI7< 0>>A

    6

  • 8/9/2019 CD 1form4

    7/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    142+

    C:6(08/ 66(

    A6C:I78

    131

    :6(B6(@ ;7IB8(/I9A6(E 1

    COM+UTER GENERATIONS

    FIRST GENERATION (1,-./1,0)

    he first generation of computer were huge, slow, e%pensive and oftenunreliable. In 135, two 6mericans, &resper 8c"ert and #illian Aauchly build

    the ENIAC)8lectronic 7umerical Integrator and Computer*. It use vacuumtube instead of mechanical switches of the A6(E 1.

    In 131, 8c"ert and Aauchly build the;7IB6C, which could calculate at the rateof 1-,--- addition per seconds.

    7

    Presper Eckert Willian Mauchly

    Vacuum tube

    MAR 1

    !"#VA$ % !"#VER&A' A!()MA(#$ $)MP!(ER

  • 8/9/2019 CD 1form4

    8/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    H!$d2!$% T%'noog7ew invention of hardware were needed with the new computer technology.

    T%'noog D%"!i3

    B6C;;A ;8 he vacuum tube was an e%tremely

    important step of the advancement ofcomputers.In a computer, a vacuum tubewhich is an electronic tube about the size oflight bulbs, was used as the internalcomputer components. housands of themwere used.

    &;7C:8@ C6(@&unched card was used to store data.

    A6

  • 8/9/2019 CD 1form4

    9/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    signals across a resister. ransistors had many advantages compared toother hardware technology.

    transistors were smaller than vacuum tubes

    they needed no warm up time

    consumed less energy

    generated much less heat faster and more reliable

    THIRD GENERATION (1,-/1,51)

    In the third generation era, the IA +- series were introduced in 135.It came in several models and sizes.It was used for business andscientific programs. >ther computer models introduced were C@C 5--and 2--.

    he development of integrated circuit )IC*, signal thebeginning of the third generation computers. /iliconechips were manufactured in 1351 at the /ilicone Balley.hen came the integrated circuit technology, which hadreduced the size and cost of computers.

    It is a complete electronic circuit on a small chip of silicone. #hich is also"nown as semi conductor. >ther than that, the Aagnetic Core Aemorywas replaced by a device called the microchip. 6lso the first 25 bit (6Awas introduced and it was the basis for development of 1E bit (6A.

    Ad6!n"!g%36 new concept in this generation was that of a family of computer whichallowed computer to be upgraded and e%panded as necessary.

    /ilicone chips were reliable, compact and

    cheaper.

    /old hardware and software separately

    which created the software industry.

    customer service industry flourished

    )reservation and credit chec"s*

    FOURTH GENERATION (1,51/+RESENT)

    It too" only years for the generations toevolve. he growth of the computer industrydeveloped technologies of computer inventions.here are many types of computer models such asF

    6pple Aacintosh

    IA @800

    6C8(

    +

  • 8/9/2019 CD 1form4

    10/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    In 131 Intel created the first microprocessor. In 135, /teve =obs built thefirst 6pple computer. hen, in 1341, IA introduced its first personalcomputer.

    @uring the fourth generation, hardware technology such as silicone chips,microprocessor and storage devices were invented. 6 microprocessor is aspecialized chip which is developed for computer memory and logic.

    he microprocessor is a large'scale integrated circuit which containedthousands of transistors. he transistors on this one chip are capable ofperforming all of the functions of a computer?s central processing unit.

    Ad6!n"!g%3

    Computers became 1-- times smaller than 87I6C )8lectronic

    7umerical Integrator and Computer* the first computer

  • 8/9/2019 CD 1form4

    11/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    programs which translate languages

    NEW ERA COM+UTER

    6fter the fifth generation computer, the technology of computer has becomemore advanced, modern and sophisticated. he latest invention in the era ofcomputers are F

    /uper Computers

    Aainframe Computers

    Aini Computers

    &ersonal Computers

    Aobile Computers

    In the new era ofcomputers, e%pertsystem such asteleconferencing andspeech'recognition

    system have beeninvented as part of modern worldcommunication tools.

    LESSON 4USAGE OF ICT IN DAILY LIFE

    EDUCATION

    oday, most schools and higher educational institutions have computers inthe classroom for teacher and students. In education, teachers, students,researchers and school administrators benefits from the usage of IC.

    11

    Mini $/mputers

    Mainrame $/mputers

    Pers/nal $/mputers

    M/bile $/mputer

    &uper $/mputers

  • 8/9/2019 CD 1form4

    12/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    eachers

    eachers use computers toresearch for teaching materials,participate in online forums andonline conferences as well asto aid their teaching.

    /tudents

    /tudents use the computers as areference tool. hey usecomputers to browse theInternet to loo" for information.

    (esearchers

    (esearchers use computers tocollect and process data.

    /chool administrators

    /chool administrators usecomputers for administrativepurposes to ma"e sure that theentire operation runs smoothly.

    12

  • 8/9/2019 CD 1form4

    13/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    8AN9ING

    he computer is the nerve centre of theban"ing system around the world. It functionsto control the entire ban"ing system that alsoincludes ?8lectronic an"ing /ervices?.

    8lectronic ban"ing provides 2 hour services.he services include F

    6utomated eller Aachine )6A*

    Che!ue @eposit

    8lectronic $und ranfer

    @irect @eposit

    &ay by phone system

    &ersonal computer ban"ingG internetban"ing

    In the ban"ing sector, customers, businessmanand ban" administrator benefits from theusage of IC.

    Customers

    Customers can ma"e any

    transactions at the 2 hour servicecentres or via online.heseservices allow them to dotransaction at anytime they want.

    usinessmen

    usinessmen can save their timeby using the online servicesoffered by ban"s. hey can accesscompany accounts forloan applications, businesstransactions and update on theircash flow at any time.

    13

  • 8/9/2019 CD 1form4

    14/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    an" administrators

    an" administrators can overseethe entire ban"ing activities suchas reconciliations, inter'branchtransactions )I*, telegraphictransfer and others by referring to

    the ban"ing system.

    INDUSTRY

    Computers are used to facilitate productionplanning and control systems, to support chain

    management and to help in product design in theindustrial sector.In the industrial sector ,wor"ers,researchers and administrator benefits from theusage of IC.

    #or"ers

    #or"ers use machines that areconnected to computers tooperate. In some productions,robots are used to ta"e over

    Hobs that are dangerous to thewor"ers.

    (esearchers

    (esearchers use computers toanalyse and collect research datafor future reference.

    6dministrators

    6dministrators use computers tooversee the entire operations inthe plant or factory to detectspecific errors or defects thatoccurred in the process.

    14

  • 8/9/2019 CD 1form4

    15/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    E/COMMERCE

    8'commerce helps in boosting the economy. It ma"es buying and sellingactivities easier, more efficient and faster. $or this application, computers,Internet and shared software are needed.

    In the e'commerce sector ,customers r, suppliers and employees benefitsfrom the usage of IC.

    Customers

    Customers use computers to beconnected online with suppliers topurchase products. his methodcan save time and costas they do not have to go to any

    outlets.

    /uppliers

    /uppliers use computers to "eeptrac" of their transactions. 6llproducts are bar coded and can beread by the computer

    scanner to help in determiningprices and managing inventory.

    8mployees

    8mployees use computers andtelephones to communicate withtheir customers for any en!uiries.

    he system helps employees to

    get the latest updates oninventory to be informed to thecustomers.

    15

  • 8/9/2019 CD 1form4

    16/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    OTHER SECTOR

    LESSON -

    COM+UTERISED AND NON/COM+UTERISED SYSTEMS

    COM+UTER SYSTEM

    6 system is an arrangement of elements that whenit is put together it becomes an organised andestablished procedure. 6 system typically consistsof components connected together in order tofacilitate the flow of information, matter or energy.

    6 computer system consists of a set of hardware and software whichprocesses data in a meaningful way.

    EDUCATION

    16

  • 8/9/2019 CD 1form4

    17/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    education is the science of teaching and learning of specific s"ills

    it also imparts "nowledge, good Hudgement and wisdom

    8AN9ING SYSTEM

    8AN9ING 8EFORE ICT

    ban"ing was done manually by ta"ing

    deposits directly

    transactions can only be made during

    wor"ing hours

    ta"es time to approve any loan applications

    8AN9ING WITH ICT

    all transactions are done by computers

    transaction can be done at anytime and place

    online services, phone ban"ing system, credit

    cards are available

    INDUSTRY

    INDUSTRY 8EFORE ICT

    &roduction was slow because everything was donemanually and totally depended on human labour.

    INDUSTRY WITH ICTComputers and telecommunications industry becamevery popular and profitable since production can beincreased through an all day operation.

    COMMERCE

    Commerce is an activity of e%changing, buying and selling of commodities ona large scale involving transportation from place to place.

    COMMERCE 8EFORE ICT

    rading was made using the barter system and it

    was then later developed into currency.

    6dvertisement was in the form of word of mouth,

    billboards and printed flyers.

    rading globally was e%tremely slow, late and

    e%pensive. raders had to find ways to mar"et localproducts in the global mar"et.

    17

  • 8/9/2019 CD 1form4

    18/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    COMMERCE WITH ICT8'commerce plays an important role in the economic

    scene. It includes distribution, buying, selling andservicing products that are done electronically.

    LESSON 0THE IM+ACT OF ICT ON SOCIETY

    FASTER COMMUNICATION S+EEDIn the past, it too" a long time for any news ormessages to be send. 7ow with the Internet, news ormessages are sent via e'mail to friends, businesspartners or to anyone efficiently. #ith the capability ofbandwidth, broadband and connection speed on theInternet, any information can travel fast and at aninstant. It saves time and is ine%pensive.

    LOWER COMMUNICATION COST

    ;sing the Internet is cost'effective than the other modes of communicationsuch as telephone, mailing or courier service. It allows people to haveaccess to large amounts of data at a very low cost. #ith the Internet we donot have to pay for any basic services provided by the Internet.$urthermore, the cost of connection to the Internet is relatively cheap.

    RELIA8LE MODE OF COMMUNICATIONComputers are reliable. #ith the internet, information could be accessed andretrieved from anywhere and at anytime. his ma"es it a reliable mode ofcommunication. :owever, the input to the computer is contributed byhumans. If the data passed to the computer is faulty, the result will be faultyas well. his is related to the term

  • 8/9/2019 CD 1form4

    19/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    EFFECTIVE SHARING OF INFORMATION#ith the advancement of IC, information can be shared by people all

    around the world. &eople can share and e%changeopinions, news and information through discussiongroups, mailing list and forums on the Internet. hisenable "nowledge sharing which will contribute to the

    development of "nowledge based society.

    +A+ERLESS ENVIRONMENT

    IC technology has created the term paperless environment. his termmeans information can be stored and retrieved through the digital mediuminstead of paper. >nline communication via emails, online chat and instantmessaging also helps in creating the paperless environment.

    8ORDERLESS COMMUNICATION

    Internet offers fast information retrieval, interactivity, accessibility andversatility. It has become a borderless sources for services and information.hrough the Internet, information and communication can be borderless.

    SOCIAL +RO8LEMS

    1+

  • 8/9/2019 CD 1form4

    20/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    here are some negative effects of IC. It has created social problems in thesociety. 7owadays, people tend to choose online communication rather thanhaving real time conversations. &eople tend to become more individualisticand introvert.

    6nother negative effect of IC is F

    fraud

    identity theft

    &ornography

    :ac"ing

    his will result a moral decedent and generate threads to the society.

    HEALTH +RO8LEMS

    6 computer may harm users if they use it for long hours fre!uently.

    Computer users are also e%posed to bad posture, eyestrain, physical andmental stress. In order to solve the health problems, an ergonomicenvironment can be introduced. $or e%ample, an ergonomic chair canreduces bac" strain and a screen filter is used to minimize eye strain.

    COM+UTER ETHICSAND LEGAL ISSUES

    LESSON COM+UTER ETHICS

    ETHICS IN GENERAL6 guideline is needed to stop the current technology products from beinge%ploited for e%ample replicating original C@s and selling them as piratedsoftware, this unethical behaviour can be controlled by the code of conducts.

    ;nethical refers to any code of conducts that are not conforming toapproved standards of social or professional behaviour.

    2,

  • 8/9/2019 CD 1form4

    21/39

  • 8/9/2019 CD 1form4

    22/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    8%amples of unethical computer code of conducts includeF

    modifying certain information on the Internet, affecting the

    accuracy of the information selling information to other parties without the owners

    permission

    using information without authorization

    involvement in stealing software

    invasion of privacy

    Intellectual property refers to any product of human intellect that is uni!ueand has value in the mar"et place. his covers ideas, inventions, uni!uename, computer program codes and many more.

    ETHICAL COM+UTER CODE OF CONDUCTS8%amples of ethical computer code of conducts includeF

    sending warning about viruses to other computer users

    as"ing permission before sending any business advertisements

    to others

    using information with authorization

    LESSON 5THE DIFFERENCES 8ETWEEN ETHICS AND LAW

    DEFINITION OF ETHICSIn general, ethics is a moral philosophy where aperson ma"es a specific moral choice and stic"s toit.>n the other hand, ethics in computing meansmoral guidelines to refer to when using thecomputer and computer networ"s. his includes

    the Internet.

    DEFINITION OF LAW0aw is a legal system comprising of rules and principles that govern theaffairs of a community and controlled by a political authority.

    0aw differs from one country to another. In the era oftechnology, computer law is needed to clarify goods oractions that fall under the computer law. Computer law

    refers to all areas in law that re!uires an understandingof computer technology such as hardware, software andInternet.

    22

  • 8/9/2019 CD 1form4

    23/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    8%amples of laws of computing in Aalaysia include the AalaysianCommunication and Aultimedia 6ct, the Computer Crime 6ct 133 and theelemedicine 6ct 133.

    WHY DO WE NEED ETHICS AND LAW INCOM+UTING?

    (especting >wnership

    (especting &rivacy

    (especting &roperty

    RES+ECTING OWNERSHI+#e must respect ownership by not stealing other peoples wor" either byduplicating or distributing it. @uplicating and distributing copies of audiotapes, video tapes and computer programs without permission andauthorisation from the individual or company that created the programare immoral and illegal.

    RES+ECTING +RIVACY AND CONFIDENTIALITY#e should respect other people?s privacy and confidentiality by refrainingourselves from reading their mails or files without their permission. If we doso, it is considered as violating an individuals rights to privacy andconfidentiality.

    RES+ECTING +RO+ERTY&roperty here means ownership. /ince an individual data and informationare considered as property, therefore, an act of tampering and changingelectronic information is considered as vandalism and disrespect for otherpeoples property.

    SIMILARITIES 8ETWEEN ETHICS AND LAWoth ethics and law are complimentary to each other and are madeF

    to guide user from misusing computers

    to create a healthy computer society, so that computers are used

    to contribute to a better life

    to prevent any crime

    23

  • 8/9/2019 CD 1form4

    24/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    DIFFERENCES 8ETWEEN ETHICS AND LAWS

    ETHICS(60 /67@6(@/ 8thical behaviour is Hudged by moral

    standards.

    $(88 > $>00># Computer users are free to follow orignore the code of ethics.

    7> &;7I/:A87/ 7o punishment for anyone whoviolates ethics.

    ;7IB8(/60/ ;niversal, can be applied anywhere,all over the world.

    &(>@;C8 8:IC60 C>A&;8(

    ;/8(/

    o produce ethical computer users.

    IAA>(60 7ot honouring computer ethicsmeans ignoring the moral elements)immoral*.

    LAWC>7(>0 6s a rule to control computer users.

    =;@ICI60 /67@6(@/ 0aw is Hudged by Hudicial standards.

    A;/ $>00># Computer users must follow theregulations and law.

    &8760I8/, IA&(I/>7A87/67@ >:8( &;7I/:A87/

    &enalties, imprisonments and otherpunishments for those who brea" thelaw.

    @8&87@/ >7 C>;7(9 @epends on country and state wherethe crime is committed.

    &(8B87 AI/;/I7< >$ C>A&;8(/ o prevent misuse of computers.

    C(IA8 7ot honouring the law meanscommitting a crime.

    UNETHICAL VS: LAW 8REA9ING CONDUCTS;nethicalF

    using the office computer to do personal things

    reading your friends e'mail without his or her permission

    plagiarising and using materials from the Internet for your class

    assignment without giving credit to the original author.

    0aw brea"ingF

    sending a computer virus via e'mail

    24

  • 8/9/2019 CD 1form4

    25/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    hac"ing into your schools database to change your e%amination

    results.

    selling pirated software in a night mar"et

    LESSON ;INTELLECTUAL +RO+ERTY RIGHTS

    DEFINITION OF INTELLECTUAL +RO+ERTYIntellectual &roperty refers to wor"s created by inventors, authors andartists. hese wor"s are uni!ue and have value in the mar"et place.In ourdaily lives, we are surrounded by things that are protected by I&. 9our schoolbags, your shoes and even your soc"s are protected by Intellectual &ropertyrights. 7i"e, ata or 6didas, for e%ample, are all protected by a group oflegal rights.

    INTELLECTUAL +RO+ERTY LAWIntellectual &roperty laws cover ideas, inventions, literary creations, uni!uenames, business models, industrial processes, computer program codes andmore.

    INVENTIONS +ROTECTED 8Y INTELLECTUAL+RO+ERTY LAWS6s businesses continue to e%pand globally, business owners must realise theimportance of getting professional advice on how to establish and safeguardtheir intellectual property rights. hese include F

    rademar"s

    /ervice mar"s

    radeGcompany names

    @omain names

  • 8/9/2019 CD 1form4

    26/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    INTELLECTUAL +RO+ERTY +ROTECTIONhere are four types of Intellectual &roperty protection. hey are patents forinvention, trademar"s for brand identity, designs for product appearance andcopyright for material.

    &atents for inventions

    rademar"s for brand identity

    @esign for product appearance

    Copyright for material

    +!"%n"3 &o$ in6%n"ion3

    ;tility, design or plant patents that protect inventions and improvements toe%isting inventions

    T$!d%m!$

  • 8/9/2019 CD 1form4

    27/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    can also threaten privacy through spam. @o you "now what spam is /pamis unsolicited e'mail messages, advertisements or newsgroup postings sentto many recipients at once.

    :ow does computer technology threaten the privacy of our data

    It is done throughF

    Coo"ies

    8lectronic profile

    /pyware

    Computer technology threatens our privacy through electronic profiling. $ore%ample, when we fill out a form such as a magazine subscription,purchasing products or contest entry form on the Internet, this data is "ept

    in the database. It will include age, address, marital status and otherpersonal details.

    Coo

  • 8/9/2019 CD 1form4

    28/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    WHY DO WE NEED +RIVACY?#e need privacy for anonymity. $or e%ample, the Internet creates anelaborate trail of data detailing a person surfing on the #eb because allinformation is stored inside coo"ies. #e do not want our trail to be detected.

    #e also need privacy for confidentiality. $or e%ample, online informationgenerated in the course of a business transaction is routinely used fora variety of other purposes without the individuals "nowledge or consent.

    #e do not want our private lives and habits e%posed to third parties.

    CAN +RIVACY 8E +ROTECTED?&rivacy can be protected byF

    (!) +$i6! !2he privacy laws in Aalaysia emphasises on the followingF

    /ecurity /ervices to review the security policy

    /ecurity Aanagement to protect the resources

    /ecurity Aechanism to implement the re!uired security services

    /ecurity >bHects, the important entities within the system

    environment

    (=) U"ii"i%3 3o&"2!$%8%ampleF anti'spam program, firewall, anti'spyware and antivirus.

    LESSON 1.AUTHENTICATIONS

    6uthentication is a process where users verify that they are who they saythey are. he user who attempts to perform functions in a system is in factthe user who is authorised to do so.

    $or 8%ample F #hen you use an 6A card, the machine will verify thevalidation of the card then the machine will re!uest for a pin number. his iswhere the authentication process ta"es place.

    2*

  • 8/9/2019 CD 1form4

    29/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    AUTHENTICATION

    V!id (T)

    METHODS OF AUTHENTICATIONhere are two commonly used authentication methods, which are biometricdevice and callbac" system.

    iometric device is a device thattranslates personal characteristics

    into a digital code that is comparedwith a digital code stored in thedatabase.

    2+

    Identification

    present what the user has (e.g. smart card)

    Identification

    present what the user is (e.g. biometric)

    Access granted

    Verificatio

    n

    verify the

    validity ofthe ID

    Authenticatio

    n

    authenticate

    who

    the user is

    "/t -ali

    Access

    denied

    alse

    Vali (

    (rue

  • 8/9/2019 CD 1form4

    30/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    Callbac" system refers to the chec"ing system that authenticates the user.

    8IOMETRIC DEVICES

    Fing%$#$in" R%ogni"ionIn order to prevent fa"e fingers from being used, many

    biometrics fingerprint systems also measure blood flow, or chec" forcorrectly arrayed ridges at the edges of thefingers.

    F!i! R%ogni"ion$acial recognition analyses the characteristics of anindividual?s face images captured through a digital videocamera. $acial recognition is widely used, touted as afantastic system for recognising potential threats)whether terrorists, scam artists, or "nown criminals*.

    H!nd G%om%"$ S!nning:and scanning involves the measurement and analysisof the shape of one?s hand.

    ;nli"e fingerprints, the human hand isn?t uni!ue.Individual hand features are not descriptive enough foridentification.

    It is possible to devise a method by combining various individual featuresand measurements of fingers and hands for verification purposes.

    I$i3 S!nningIris scanning analyses the features that e%ist in thecoloured tissues surrounding the pupil which has morethan 2-- points that can be used for comparison,including rings, furrows and frec"les.

    he scans use a regular video camera and can be done from further away

    than a retinal scan.It will wor" perfectly fine through glasses and in fact hasthe ability to create an accurate enough measurement that it can be used foridentification purposes.

    3,

  • 8/9/2019 CD 1form4

    31/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    he accuracy of this method is e%cellent while the cost involved is high.

    R%"in! S!nning(etinal biometrics involves the scanning of retina andanalysing the layer of blood vessels at the bac" of theeye.

    (etinal scanning involves using a low'intensity lightsource and an optical coupler and can read the patternsat a great level of accuracy.

    (etina scanning re!uires the user to remove glasses, place their eye close tothe device, and focus on a certain point. #hether the accuracy can outweighthe public discomfort is yet to be seen.

    he accuracy in retinal scanning is very good and the cost involved is fair.

    Voi% R%ogni"ionBoice recognition system compares a persons livespeech with their stored voice pattern.

    Boice recognition biometrics re!uires user to spea" intoa microphone. #hat he spea"s can be his password oran access phrase.

    Berification time is appro%imately seconds. o prevent recorded voiceuse, most voice recognition devices re!uire the high and low fre!uencies of

    the sound to match, which is difficult for many recording instruments torecreate well. 6lso, some devices generate random number of se!uences forverification.

    he accuracy in voice recognition is fair and the cost involved is veryreasonable.

    Sign!"u$% V%$i&i!"ion S3"%m/ignature verification system uses special pen andtablet. 6fter pre'processing the signature, several

    features are e%tracted.

    he authenticity of a writer is determined by comparingan input signature to a stored reference set )template* consisting of threesignatures.

    he similarity between an input signature and the reference set is computedusing string matching and the similarity value is compared to a threshold.

    he accuracy in signature verification system is fair and the cost involved is

    e%cellent.

    31

  • 8/9/2019 CD 1form4

    32/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    CALL8AC9 SYSTEMhe callbac" system is commonly used in the ban"operation and business transaction.

    $or e%ample, when you boo" for the ta%i service, the

    operator will as" you to hang up and she will call youbac" to confirm for the service re!uired.

    WHY IS AUTHENTICATION IM+ORTANT?6uthentication is important in order to safeguard against the unauthorisedaccess and use.

    LESSON 11VERIFICATIONS

    VERIFICATIONBerification is the act of proving or disproving the correctness of a systemwith respect to a certain formal specification.

    METHODS OF VERIFICATIONhere are two methods commonly used inverification, which are user identification andprocessed obHect.

    ;ser identification refers to the process ofvalidating the user.

    &rocessed obHect refers to something the user

    has such as identification card, security to"enand cell phone.

    32

    #E"(##$A(#)"

    present 8hat the user has e9: A(M car

    VER##$A(#)"

    -eriy the -aliity / the #

    #E"(##$A(#)"

    present 8hat the user has e9: pin number

    Access rante

    Access enie

    Vali

    "/t Vali

  • 8/9/2019 CD 1form4

    33/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    USER IDENTIFICATIONhe e%amples of validating process using the user identification areF

    Eey in the user name to log'in to a system and thesystem will verify whether the user is valid or invaliduser

    /how the e%am slip to verify that you are the valid

    candidate for the e%am.

    show a passport before departure.

    +ROCESSED O8>ECThe e%amples of validating process using the processed obHect areF

    the policeman will chec" on the drivers license to

    identify the valid driver employees have to swipe their security card to enter

    the building

    buy blouses at the mall using a credit card

    LESSON 1*

    CONTROVERSIAL CONTENT

    CONTROVERSIAL CONTENT6 controversial content is information that causes disagreement in opinionsand may cause the disruption of peace because different people or culturewill have different views about the contents.

    ISSUES ON CONTROVERSIAL CONTENTShe issues on controversial contents are always focusing on pornographyand slander. Aalaysia considers pornography and slander as illegal.

    &ornographic and slanderous activities can be in the forms ofplots and actions displayed on video games, controversialrhythm or lyrics of music, controversial contents of boo"s andcontroversial issues on religion and philosophy.

    &ornography Creative activity (writing or pictures or films etc.) of no literary or artisticvalue other than to stimulate sexual desire.

    /landerOral communication of false statements injurious to a person's reputation.A false and malicious statement or report about someone.

    33

  • 8/9/2019 CD 1form4

    34/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    +ORNOGRA+HY#hat is pornography #hy is pornography considered JnegativeK content

    oth pictures are very cute pictures of innocent babies. 7either can beconsidered pornographic by normal standards.

    DEFINITION OF +ORNOGRA+HY

    he definition of pornography is any form of media or material )li"e boo"s orphotographs* that depicts erotic behaviour and is intended to cause se%uale%citement.

    &ornography tends to e%ploit men, women and children in a distastefulmanner.

    SLANDER/lander is another e%ample of controversial content.

    /lander is a legal term for false and malicious statement)meaning "nowing that it is false, or Jrec"less disregardKthat it was false* about someone.

    xamples !

    9ou wrote an e'mail that a fellow classmate was having an affair with ateacher, even though it was not true. 9ou then sent it to five other friends.

    6hmad is a Auslim. >ne day, he received a JspamK e'mail stating that his

    favourite soda drin" J/oda AodaK uses non'halal food colouring, but he doesnot "now if the source of the content is credible or true. :e decides toforward the e'mail to - of his friends.

    Chin #ei spreads a rumour that a

  • 8/9/2019 CD 1form4

    35/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    can develop low moral value towards other men, women or children

    can erode good religious, cultural and social beliefs and behaviour

    /lander

    can develop into a society that disregards honesty and truth

    can develop bad habit of spreading untruths and rumours

    can lead to unnecessary argument can cause people to have negative attitudes towards another person

    LESSON 14

    THE +ROCESS OF INTERNET FILTERING

    INTERNET FILTERINGIt is our responsibility to ensure that the teenagers areprotected from these corruptions of the mind by filtering

    access to the Internet. Internet filtering is a process thatprevents or bloc"s access to certain materials on theInternet.

    It is our responsibility to ensure that the teenagers are protected fromthese corruptions of the mind by filtering access to the Internet.

    W'!" i3 In"%$n%" &i"%$ing?Internet filtering is a process that prevents or bloc"s access to certainmaterials on the Internet. $iltering is most commonly used to preventchildren from accessing inappropriate material and to "eep employeesproductive on the Internet.

    CONTROLLING ACCESS TO THE INTERNETControlling access to the internet by means of filtering software has becomea growing industry in Aalaysia and elsewhere. Its use has increase as themandatory response to the current plague of society, namely internetpornography, politically incorrect site, hatred, violence, hate and in generalanything viewed to be unpleasant or threatening.

    he current preferred method of choice to limit access on the Internet is tofilter content either byF

    "eyword bloc"ing

    site bloc"ing

    web rating systems

    hese methods re!uire software to be installed at a client of server level.

    9EYWORD 8LOC9ING>ne of the strategies is by using the "eyword bloc"ingmethod.his method uses a list of banned words orobHectionable terms.

    35

  • 8/9/2019 CD 1form4

    36/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    6s the page is downloading, the filter searches for any of these words. Iffound, it will bloc" the page completely, stop downloading the page, bloc"the banned words and even shut down the browser.

    SITE 8LOC9ING software company maintains a list of dubious Internet sites

    the software prevents access to any sites on this list

    denial lists regularly updated

    some software provides control over what categories of information

    you bloc"

    #ho decides what goes on the denial list and what criteria are they

    using

    can you "eep trac" of the whole of the Internet

    filters can use both site bloc"ing and word bloc"ing

    WE8 RATING SYSTEMS#eb sites are rated in terms of nudity, se%, violence and language. he(ecreational /oftware 6dvisory Council )(/6CI* is responsible for the ratingof the websites on the content on the internet.

    ratings done either by the web page author or by the

    independent bureau.

    browsers set to only accept pages with certain levels of ratings.

    LESSON 1-CY8ER LAW

    W'!" i3 C=%$ L!2?Cyber law refers to any laws relating to protecting theInternet and other online communication technologies.

    NEEDS FOR CY8ER LAWIn the recent years, many concerns and issues were raised on the integrityand security of information, legal status of online transactions, privacy andconfidentiality of information, intellectual property rights and security ofgovernment data placed on the Internet.

    36

    $;0ER 'AW

    #nte:rity an &ecurity

    / #n/rmati/n

    'e:al &tatus / )nline

    (ransacti/ns

    Pri-acy an $/nientially

    / #n/rmati/n

    &ecurity /

    /-ernment ata

    #ntellectual Pr/perty

    Ri:hts

  • 8/9/2019 CD 1form4

    37/39

  • 8/9/2019 CD 1form4

    38/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    TELEMEDICINE ACT 1,,5he elemedicine 6ct 133 ensures that only !ualifiedmedical practitioners can practice telemedicine and that

    their patient?s rights and interests are protected.

    hese act provides the future development and deliveryof healthcare in Aalaysia.

    COMMUNICATIONS AND MULTIMEDIA ACT 1,,;he implementation of Communication andelecommunication 6ct 1334 ensures that information issecure, the networ" is reliable and the service isaffordable all over Aalaysia.

    his 6ct also ensures high level of user?s confidence inthe information and communication technology industry.

    LESSON 10

    COM+UTER CRIMES

    COM+UTER CRIMES

    6 computer crime is defined as any criminal activity thatis related to the use of computers.hese activitiesinclude computer fraud, copyright infringement,computer theft and computer attac".

    COM+UTER FRAUDComputer fraud is defined as having an intention to ta"e advantage over orcausing loss to other people, mainly on monetary basis through the use ofcomputers.

    here are many forms of computer fraud which include e'mail hoa%es,programme fraud, investment schemes, sales promotions and claims ofe%pertise on certain fields.

    /tudents need to be aware of other computer frauds suchas health frauds, scams and hac"ing. /tudents will alsomost li"ely get false information while researchinginformation on the Internet.

    CO+YRIGHT INFRINGEMENTCopyright infringement is defined as a violation of therights secured by a copyright. Copyright infringementinvolves illegal copy or reproduction of copyrights

    3*

  • 8/9/2019 CD 1form4

    39/39

    INFORMATION AND COMPUTER TECHNOLOGY Form 4

    material by the blac" mar"et group. he open commercial sale of pirateditem is also illegal.

    #ith the current technology, the most perfect copy of the original copy canbe downloaded from the internet.

    COM+UTER THEFTComputer theft is defined as the unauthorised use ofanother persons property with the intention to deny theowner the rightful possession of that property or its use.

    8%amples of computer theft includeF

    transfer of payments to the wrong accounts

    tap into data transmission lines on database at no cost

    divert goods to the wrong destination

    COM+UTER ATTAC9Computer attac" may be defined as any activities ta"ento disrupt the e!uipment of computer systems, changeprocessing control or corrupt stored data.

    Computer attac" can be in the forms ofF

    physical attac" that disrupt the computer facility or its

    transmission lines.

    an electronic attac" that uses the power of electromagnetic

    energy to overload computer circuitry.

    a computer networ" attac" that uses a malicious code to

    e%ploit a wea"ness in software, or in the computer securitypractices of a computer user