CD 1form4
Transcript of CD 1form4
-
8/9/2019 CD 1form4
1/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
INTRODUCTION
TO INFORMATION ANDCOMMUNICATION TECHNOLOGY
LESSON 1INTRODUCTION TO INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)
EVOLUTION OF COMMUNICATIONCommunication has improved and evolved to facilitate our daily activities. Inthe 21st century, everything related to communication utilizes technology to
send out or disseminate information to a wider audience. Information canbe sent out in many ways. he inventions of cellular phones, television andother electronic devices are important in enhancing communication.
WHAT IS ICT?IC is the technology re!uired for information processing, in particular, the
use of electronic computers, communication devices and softwareapplications to convert, store, protect, process, transmit and retrieveinformation from anywhere, anytime.
INFORMATIONInformation refers to the "nowledge obtained from reading, investigation,study or research.
1
-
8/9/2019 CD 1form4
2/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
he tools to transmit information are the telephone, television and radio.
#e need information to ma"e decisions and to predict the future. $ore%ample, scientists can detect the formation of a tsunami using the latesttechnology and warn the public to avoid disasters in the affected areas.
Information is "nowledge and helps us to fulfill our daily tas"s. $or e%ample,forecasting the stoc" e%change mar"et.
COMMUNICATION
Communication is an act of transmitting messages. It is a process wherebyinformation is e%changed between individuals using symbols, signs or verbalinteractions. &reviously, people communicated through sign or symbols,performing drama and poetry. #ith the advent of technology, these olderforms of communication are less utilised as compared to the use of theInternet, e'mail or video conferencing.
Communication is important in order to gain "nowledge. #ith "nowledge, we
are more confident in e%pressing our thoughts and ideas.TECHNOLOGY
2
-
8/9/2019 CD 1form4
3/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
echnology is the use of scientific "nowledge, e%perienceand resources to create processes and products that fulfillhuman needs. echnology is vital in communication.
Aiding Communi!"ionelephone and fa% machines are the devices used in
e%tending communication.
S#$%!ding In&o$m!"iono broadcast information such as news or weather reportseffectively. (adio, television, satellites and the #orld #ide#eb )www* are powerful tools that can be used.
TECHNOLOGY TIMELINE
T%'noog Y%!$
In +-- C, the /umeriansdeveloped cuneiform writing.
In 1-- C, the &hoeniciansdeveloped the alphabet
In 1- C, sai 0un of Chinainvented paper.
In 1, the first printing beganwith the creation of a printingmachine.
3
-
8/9/2019 CD 1form4
4/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
In 13+, the telegraph line wasinvented.
In 145, the first telephone wasintroduced.
In 132, television was made"nown to public.
In 131, the computer wascreated.
In 134, the photocopier machinewas introduced.
4
-
8/9/2019 CD 1form4
5/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
In 135+, the communicationsatellite wasintroduced.
In 1353, the first Internet "nownas 6(&678 was introduced.
LESSON *EVOLUTION OF COM+UTERS
In the early years, before the computer was invented, there are severalinventions of counting machines.
9ear
2--C
C:I78/8 66C;/
--
C
8
-
8/9/2019 CD 1form4
6/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
152-
=>:7 76&I8( 76&I8(?/ >78/
15+
06I/8 &6/C60 &6/C60I78
15+
$(I8@ #I0:80A B>708I7I
08I7I?/ (8C:78(
14-1
=>/8&: A6(I8 =6CD;6(@ #86BI7< 0>>A
6
-
8/9/2019 CD 1form4
7/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
142+
C:6(08/ 66(
A6C:I78
131
:6(B6(@ ;7IB8(/I9A6(E 1
COM+UTER GENERATIONS
FIRST GENERATION (1,-./1,0)
he first generation of computer were huge, slow, e%pensive and oftenunreliable. In 135, two 6mericans, &resper 8c"ert and #illian Aauchly build
the ENIAC)8lectronic 7umerical Integrator and Computer*. It use vacuumtube instead of mechanical switches of the A6(E 1.
In 131, 8c"ert and Aauchly build the;7IB6C, which could calculate at the rateof 1-,--- addition per seconds.
7
Presper Eckert Willian Mauchly
Vacuum tube
MAR 1
!"#VA$ % !"#VER&A' A!()MA(#$ $)MP!(ER
-
8/9/2019 CD 1form4
8/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
H!$d2!$% T%'noog7ew invention of hardware were needed with the new computer technology.
T%'noog D%"!i3
B6C;;A ;8 he vacuum tube was an e%tremely
important step of the advancement ofcomputers.In a computer, a vacuum tubewhich is an electronic tube about the size oflight bulbs, was used as the internalcomputer components. housands of themwere used.
&;7C:8@ C6(@&unched card was used to store data.
A6
-
8/9/2019 CD 1form4
9/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
signals across a resister. ransistors had many advantages compared toother hardware technology.
transistors were smaller than vacuum tubes
they needed no warm up time
consumed less energy
generated much less heat faster and more reliable
THIRD GENERATION (1,-/1,51)
In the third generation era, the IA +- series were introduced in 135.It came in several models and sizes.It was used for business andscientific programs. >ther computer models introduced were C@C 5--and 2--.
he development of integrated circuit )IC*, signal thebeginning of the third generation computers. /iliconechips were manufactured in 1351 at the /ilicone Balley.hen came the integrated circuit technology, which hadreduced the size and cost of computers.
It is a complete electronic circuit on a small chip of silicone. #hich is also"nown as semi conductor. >ther than that, the Aagnetic Core Aemorywas replaced by a device called the microchip. 6lso the first 25 bit (6Awas introduced and it was the basis for development of 1E bit (6A.
Ad6!n"!g%36 new concept in this generation was that of a family of computer whichallowed computer to be upgraded and e%panded as necessary.
/ilicone chips were reliable, compact and
cheaper.
/old hardware and software separately
which created the software industry.
customer service industry flourished
)reservation and credit chec"s*
FOURTH GENERATION (1,51/+RESENT)
It too" only years for the generations toevolve. he growth of the computer industrydeveloped technologies of computer inventions.here are many types of computer models such asF
6pple Aacintosh
IA @800
6C8(
+
-
8/9/2019 CD 1form4
10/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
In 131 Intel created the first microprocessor. In 135, /teve =obs built thefirst 6pple computer. hen, in 1341, IA introduced its first personalcomputer.
@uring the fourth generation, hardware technology such as silicone chips,microprocessor and storage devices were invented. 6 microprocessor is aspecialized chip which is developed for computer memory and logic.
he microprocessor is a large'scale integrated circuit which containedthousands of transistors. he transistors on this one chip are capable ofperforming all of the functions of a computer?s central processing unit.
Ad6!n"!g%3
Computers became 1-- times smaller than 87I6C )8lectronic
7umerical Integrator and Computer* the first computer
-
8/9/2019 CD 1form4
11/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
programs which translate languages
NEW ERA COM+UTER
6fter the fifth generation computer, the technology of computer has becomemore advanced, modern and sophisticated. he latest invention in the era ofcomputers are F
/uper Computers
Aainframe Computers
Aini Computers
&ersonal Computers
Aobile Computers
In the new era ofcomputers, e%pertsystem such asteleconferencing andspeech'recognition
system have beeninvented as part of modern worldcommunication tools.
LESSON 4USAGE OF ICT IN DAILY LIFE
EDUCATION
oday, most schools and higher educational institutions have computers inthe classroom for teacher and students. In education, teachers, students,researchers and school administrators benefits from the usage of IC.
11
Mini $/mputers
Mainrame $/mputers
Pers/nal $/mputers
M/bile $/mputer
&uper $/mputers
-
8/9/2019 CD 1form4
12/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
eachers
eachers use computers toresearch for teaching materials,participate in online forums andonline conferences as well asto aid their teaching.
/tudents
/tudents use the computers as areference tool. hey usecomputers to browse theInternet to loo" for information.
(esearchers
(esearchers use computers tocollect and process data.
/chool administrators
/chool administrators usecomputers for administrativepurposes to ma"e sure that theentire operation runs smoothly.
12
-
8/9/2019 CD 1form4
13/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
8AN9ING
he computer is the nerve centre of theban"ing system around the world. It functionsto control the entire ban"ing system that alsoincludes ?8lectronic an"ing /ervices?.
8lectronic ban"ing provides 2 hour services.he services include F
6utomated eller Aachine )6A*
Che!ue @eposit
8lectronic $und ranfer
@irect @eposit
&ay by phone system
&ersonal computer ban"ingG internetban"ing
In the ban"ing sector, customers, businessmanand ban" administrator benefits from theusage of IC.
Customers
Customers can ma"e any
transactions at the 2 hour servicecentres or via online.heseservices allow them to dotransaction at anytime they want.
usinessmen
usinessmen can save their timeby using the online servicesoffered by ban"s. hey can accesscompany accounts forloan applications, businesstransactions and update on theircash flow at any time.
13
-
8/9/2019 CD 1form4
14/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
an" administrators
an" administrators can overseethe entire ban"ing activities suchas reconciliations, inter'branchtransactions )I*, telegraphictransfer and others by referring to
the ban"ing system.
INDUSTRY
Computers are used to facilitate productionplanning and control systems, to support chain
management and to help in product design in theindustrial sector.In the industrial sector ,wor"ers,researchers and administrator benefits from theusage of IC.
#or"ers
#or"ers use machines that areconnected to computers tooperate. In some productions,robots are used to ta"e over
Hobs that are dangerous to thewor"ers.
(esearchers
(esearchers use computers toanalyse and collect research datafor future reference.
6dministrators
6dministrators use computers tooversee the entire operations inthe plant or factory to detectspecific errors or defects thatoccurred in the process.
14
-
8/9/2019 CD 1form4
15/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
E/COMMERCE
8'commerce helps in boosting the economy. It ma"es buying and sellingactivities easier, more efficient and faster. $or this application, computers,Internet and shared software are needed.
In the e'commerce sector ,customers r, suppliers and employees benefitsfrom the usage of IC.
Customers
Customers use computers to beconnected online with suppliers topurchase products. his methodcan save time and costas they do not have to go to any
outlets.
/uppliers
/uppliers use computers to "eeptrac" of their transactions. 6llproducts are bar coded and can beread by the computer
scanner to help in determiningprices and managing inventory.
8mployees
8mployees use computers andtelephones to communicate withtheir customers for any en!uiries.
he system helps employees to
get the latest updates oninventory to be informed to thecustomers.
15
-
8/9/2019 CD 1form4
16/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
OTHER SECTOR
LESSON -
COM+UTERISED AND NON/COM+UTERISED SYSTEMS
COM+UTER SYSTEM
6 system is an arrangement of elements that whenit is put together it becomes an organised andestablished procedure. 6 system typically consistsof components connected together in order tofacilitate the flow of information, matter or energy.
6 computer system consists of a set of hardware and software whichprocesses data in a meaningful way.
EDUCATION
16
-
8/9/2019 CD 1form4
17/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
education is the science of teaching and learning of specific s"ills
it also imparts "nowledge, good Hudgement and wisdom
8AN9ING SYSTEM
8AN9ING 8EFORE ICT
ban"ing was done manually by ta"ing
deposits directly
transactions can only be made during
wor"ing hours
ta"es time to approve any loan applications
8AN9ING WITH ICT
all transactions are done by computers
transaction can be done at anytime and place
online services, phone ban"ing system, credit
cards are available
INDUSTRY
INDUSTRY 8EFORE ICT
&roduction was slow because everything was donemanually and totally depended on human labour.
INDUSTRY WITH ICTComputers and telecommunications industry becamevery popular and profitable since production can beincreased through an all day operation.
COMMERCE
Commerce is an activity of e%changing, buying and selling of commodities ona large scale involving transportation from place to place.
COMMERCE 8EFORE ICT
rading was made using the barter system and it
was then later developed into currency.
6dvertisement was in the form of word of mouth,
billboards and printed flyers.
rading globally was e%tremely slow, late and
e%pensive. raders had to find ways to mar"et localproducts in the global mar"et.
17
-
8/9/2019 CD 1form4
18/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
COMMERCE WITH ICT8'commerce plays an important role in the economic
scene. It includes distribution, buying, selling andservicing products that are done electronically.
LESSON 0THE IM+ACT OF ICT ON SOCIETY
FASTER COMMUNICATION S+EEDIn the past, it too" a long time for any news ormessages to be send. 7ow with the Internet, news ormessages are sent via e'mail to friends, businesspartners or to anyone efficiently. #ith the capability ofbandwidth, broadband and connection speed on theInternet, any information can travel fast and at aninstant. It saves time and is ine%pensive.
LOWER COMMUNICATION COST
;sing the Internet is cost'effective than the other modes of communicationsuch as telephone, mailing or courier service. It allows people to haveaccess to large amounts of data at a very low cost. #ith the Internet we donot have to pay for any basic services provided by the Internet.$urthermore, the cost of connection to the Internet is relatively cheap.
RELIA8LE MODE OF COMMUNICATIONComputers are reliable. #ith the internet, information could be accessed andretrieved from anywhere and at anytime. his ma"es it a reliable mode ofcommunication. :owever, the input to the computer is contributed byhumans. If the data passed to the computer is faulty, the result will be faultyas well. his is related to the term
-
8/9/2019 CD 1form4
19/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
EFFECTIVE SHARING OF INFORMATION#ith the advancement of IC, information can be shared by people all
around the world. &eople can share and e%changeopinions, news and information through discussiongroups, mailing list and forums on the Internet. hisenable "nowledge sharing which will contribute to the
development of "nowledge based society.
+A+ERLESS ENVIRONMENT
IC technology has created the term paperless environment. his termmeans information can be stored and retrieved through the digital mediuminstead of paper. >nline communication via emails, online chat and instantmessaging also helps in creating the paperless environment.
8ORDERLESS COMMUNICATION
Internet offers fast information retrieval, interactivity, accessibility andversatility. It has become a borderless sources for services and information.hrough the Internet, information and communication can be borderless.
SOCIAL +RO8LEMS
1+
-
8/9/2019 CD 1form4
20/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
here are some negative effects of IC. It has created social problems in thesociety. 7owadays, people tend to choose online communication rather thanhaving real time conversations. &eople tend to become more individualisticand introvert.
6nother negative effect of IC is F
fraud
identity theft
&ornography
:ac"ing
his will result a moral decedent and generate threads to the society.
HEALTH +RO8LEMS
6 computer may harm users if they use it for long hours fre!uently.
Computer users are also e%posed to bad posture, eyestrain, physical andmental stress. In order to solve the health problems, an ergonomicenvironment can be introduced. $or e%ample, an ergonomic chair canreduces bac" strain and a screen filter is used to minimize eye strain.
COM+UTER ETHICSAND LEGAL ISSUES
LESSON COM+UTER ETHICS
ETHICS IN GENERAL6 guideline is needed to stop the current technology products from beinge%ploited for e%ample replicating original C@s and selling them as piratedsoftware, this unethical behaviour can be controlled by the code of conducts.
;nethical refers to any code of conducts that are not conforming toapproved standards of social or professional behaviour.
2,
-
8/9/2019 CD 1form4
21/39
-
8/9/2019 CD 1form4
22/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
8%amples of unethical computer code of conducts includeF
modifying certain information on the Internet, affecting the
accuracy of the information selling information to other parties without the owners
permission
using information without authorization
involvement in stealing software
invasion of privacy
Intellectual property refers to any product of human intellect that is uni!ueand has value in the mar"et place. his covers ideas, inventions, uni!uename, computer program codes and many more.
ETHICAL COM+UTER CODE OF CONDUCTS8%amples of ethical computer code of conducts includeF
sending warning about viruses to other computer users
as"ing permission before sending any business advertisements
to others
using information with authorization
LESSON 5THE DIFFERENCES 8ETWEEN ETHICS AND LAW
DEFINITION OF ETHICSIn general, ethics is a moral philosophy where aperson ma"es a specific moral choice and stic"s toit.>n the other hand, ethics in computing meansmoral guidelines to refer to when using thecomputer and computer networ"s. his includes
the Internet.
DEFINITION OF LAW0aw is a legal system comprising of rules and principles that govern theaffairs of a community and controlled by a political authority.
0aw differs from one country to another. In the era oftechnology, computer law is needed to clarify goods oractions that fall under the computer law. Computer law
refers to all areas in law that re!uires an understandingof computer technology such as hardware, software andInternet.
22
-
8/9/2019 CD 1form4
23/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
8%amples of laws of computing in Aalaysia include the AalaysianCommunication and Aultimedia 6ct, the Computer Crime 6ct 133 and theelemedicine 6ct 133.
WHY DO WE NEED ETHICS AND LAW INCOM+UTING?
(especting >wnership
(especting &rivacy
(especting &roperty
RES+ECTING OWNERSHI+#e must respect ownership by not stealing other peoples wor" either byduplicating or distributing it. @uplicating and distributing copies of audiotapes, video tapes and computer programs without permission andauthorisation from the individual or company that created the programare immoral and illegal.
RES+ECTING +RIVACY AND CONFIDENTIALITY#e should respect other people?s privacy and confidentiality by refrainingourselves from reading their mails or files without their permission. If we doso, it is considered as violating an individuals rights to privacy andconfidentiality.
RES+ECTING +RO+ERTY&roperty here means ownership. /ince an individual data and informationare considered as property, therefore, an act of tampering and changingelectronic information is considered as vandalism and disrespect for otherpeoples property.
SIMILARITIES 8ETWEEN ETHICS AND LAWoth ethics and law are complimentary to each other and are madeF
to guide user from misusing computers
to create a healthy computer society, so that computers are used
to contribute to a better life
to prevent any crime
23
-
8/9/2019 CD 1form4
24/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
DIFFERENCES 8ETWEEN ETHICS AND LAWS
ETHICS(60 /67@6(@/ 8thical behaviour is Hudged by moral
standards.
$(88 > $>00># Computer users are free to follow orignore the code of ethics.
7> &;7I/:A87/ 7o punishment for anyone whoviolates ethics.
;7IB8(/60/ ;niversal, can be applied anywhere,all over the world.
&(>@;C8 8:IC60 C>A&;8(
;/8(/
o produce ethical computer users.
IAA>(60 7ot honouring computer ethicsmeans ignoring the moral elements)immoral*.
LAWC>7(>0 6s a rule to control computer users.
=;@ICI60 /67@6(@/ 0aw is Hudged by Hudicial standards.
A;/ $>00># Computer users must follow theregulations and law.
&8760I8/, IA&(I/>7A87/67@ >:8( &;7I/:A87/
&enalties, imprisonments and otherpunishments for those who brea" thelaw.
@8&87@/ >7 C>;7(9 @epends on country and state wherethe crime is committed.
&(8B87 AI/;/I7< >$ C>A&;8(/ o prevent misuse of computers.
C(IA8 7ot honouring the law meanscommitting a crime.
UNETHICAL VS: LAW 8REA9ING CONDUCTS;nethicalF
using the office computer to do personal things
reading your friends e'mail without his or her permission
plagiarising and using materials from the Internet for your class
assignment without giving credit to the original author.
0aw brea"ingF
sending a computer virus via e'mail
24
-
8/9/2019 CD 1form4
25/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
hac"ing into your schools database to change your e%amination
results.
selling pirated software in a night mar"et
LESSON ;INTELLECTUAL +RO+ERTY RIGHTS
DEFINITION OF INTELLECTUAL +RO+ERTYIntellectual &roperty refers to wor"s created by inventors, authors andartists. hese wor"s are uni!ue and have value in the mar"et place.In ourdaily lives, we are surrounded by things that are protected by I&. 9our schoolbags, your shoes and even your soc"s are protected by Intellectual &ropertyrights. 7i"e, ata or 6didas, for e%ample, are all protected by a group oflegal rights.
INTELLECTUAL +RO+ERTY LAWIntellectual &roperty laws cover ideas, inventions, literary creations, uni!uenames, business models, industrial processes, computer program codes andmore.
INVENTIONS +ROTECTED 8Y INTELLECTUAL+RO+ERTY LAWS6s businesses continue to e%pand globally, business owners must realise theimportance of getting professional advice on how to establish and safeguardtheir intellectual property rights. hese include F
rademar"s
/ervice mar"s
radeGcompany names
@omain names
-
8/9/2019 CD 1form4
26/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
INTELLECTUAL +RO+ERTY +ROTECTIONhere are four types of Intellectual &roperty protection. hey are patents forinvention, trademar"s for brand identity, designs for product appearance andcopyright for material.
&atents for inventions
rademar"s for brand identity
@esign for product appearance
Copyright for material
+!"%n"3 &o$ in6%n"ion3
;tility, design or plant patents that protect inventions and improvements toe%isting inventions
T$!d%m!$
-
8/9/2019 CD 1form4
27/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
can also threaten privacy through spam. @o you "now what spam is /pamis unsolicited e'mail messages, advertisements or newsgroup postings sentto many recipients at once.
:ow does computer technology threaten the privacy of our data
It is done throughF
Coo"ies
8lectronic profile
/pyware
Computer technology threatens our privacy through electronic profiling. $ore%ample, when we fill out a form such as a magazine subscription,purchasing products or contest entry form on the Internet, this data is "ept
in the database. It will include age, address, marital status and otherpersonal details.
Coo
-
8/9/2019 CD 1form4
28/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
WHY DO WE NEED +RIVACY?#e need privacy for anonymity. $or e%ample, the Internet creates anelaborate trail of data detailing a person surfing on the #eb because allinformation is stored inside coo"ies. #e do not want our trail to be detected.
#e also need privacy for confidentiality. $or e%ample, online informationgenerated in the course of a business transaction is routinely used fora variety of other purposes without the individuals "nowledge or consent.
#e do not want our private lives and habits e%posed to third parties.
CAN +RIVACY 8E +ROTECTED?&rivacy can be protected byF
(!) +$i6! !2he privacy laws in Aalaysia emphasises on the followingF
/ecurity /ervices to review the security policy
/ecurity Aanagement to protect the resources
/ecurity Aechanism to implement the re!uired security services
/ecurity >bHects, the important entities within the system
environment
(=) U"ii"i%3 3o&"2!$%8%ampleF anti'spam program, firewall, anti'spyware and antivirus.
LESSON 1.AUTHENTICATIONS
6uthentication is a process where users verify that they are who they saythey are. he user who attempts to perform functions in a system is in factthe user who is authorised to do so.
$or 8%ample F #hen you use an 6A card, the machine will verify thevalidation of the card then the machine will re!uest for a pin number. his iswhere the authentication process ta"es place.
2*
-
8/9/2019 CD 1form4
29/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
AUTHENTICATION
V!id (T)
METHODS OF AUTHENTICATIONhere are two commonly used authentication methods, which are biometricdevice and callbac" system.
iometric device is a device thattranslates personal characteristics
into a digital code that is comparedwith a digital code stored in thedatabase.
2+
Identification
present what the user has (e.g. smart card)
Identification
present what the user is (e.g. biometric)
Access granted
Verificatio
n
verify the
validity ofthe ID
Authenticatio
n
authenticate
who
the user is
"/t -ali
Access
denied
alse
Vali (
(rue
-
8/9/2019 CD 1form4
30/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
Callbac" system refers to the chec"ing system that authenticates the user.
8IOMETRIC DEVICES
Fing%$#$in" R%ogni"ionIn order to prevent fa"e fingers from being used, many
biometrics fingerprint systems also measure blood flow, or chec" forcorrectly arrayed ridges at the edges of thefingers.
F!i! R%ogni"ion$acial recognition analyses the characteristics of anindividual?s face images captured through a digital videocamera. $acial recognition is widely used, touted as afantastic system for recognising potential threats)whether terrorists, scam artists, or "nown criminals*.
H!nd G%om%"$ S!nning:and scanning involves the measurement and analysisof the shape of one?s hand.
;nli"e fingerprints, the human hand isn?t uni!ue.Individual hand features are not descriptive enough foridentification.
It is possible to devise a method by combining various individual featuresand measurements of fingers and hands for verification purposes.
I$i3 S!nningIris scanning analyses the features that e%ist in thecoloured tissues surrounding the pupil which has morethan 2-- points that can be used for comparison,including rings, furrows and frec"les.
he scans use a regular video camera and can be done from further away
than a retinal scan.It will wor" perfectly fine through glasses and in fact hasthe ability to create an accurate enough measurement that it can be used foridentification purposes.
3,
-
8/9/2019 CD 1form4
31/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
he accuracy of this method is e%cellent while the cost involved is high.
R%"in! S!nning(etinal biometrics involves the scanning of retina andanalysing the layer of blood vessels at the bac" of theeye.
(etinal scanning involves using a low'intensity lightsource and an optical coupler and can read the patternsat a great level of accuracy.
(etina scanning re!uires the user to remove glasses, place their eye close tothe device, and focus on a certain point. #hether the accuracy can outweighthe public discomfort is yet to be seen.
he accuracy in retinal scanning is very good and the cost involved is fair.
Voi% R%ogni"ionBoice recognition system compares a persons livespeech with their stored voice pattern.
Boice recognition biometrics re!uires user to spea" intoa microphone. #hat he spea"s can be his password oran access phrase.
Berification time is appro%imately seconds. o prevent recorded voiceuse, most voice recognition devices re!uire the high and low fre!uencies of
the sound to match, which is difficult for many recording instruments torecreate well. 6lso, some devices generate random number of se!uences forverification.
he accuracy in voice recognition is fair and the cost involved is veryreasonable.
Sign!"u$% V%$i&i!"ion S3"%m/ignature verification system uses special pen andtablet. 6fter pre'processing the signature, several
features are e%tracted.
he authenticity of a writer is determined by comparingan input signature to a stored reference set )template* consisting of threesignatures.
he similarity between an input signature and the reference set is computedusing string matching and the similarity value is compared to a threshold.
he accuracy in signature verification system is fair and the cost involved is
e%cellent.
31
-
8/9/2019 CD 1form4
32/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
CALL8AC9 SYSTEMhe callbac" system is commonly used in the ban"operation and business transaction.
$or e%ample, when you boo" for the ta%i service, the
operator will as" you to hang up and she will call youbac" to confirm for the service re!uired.
WHY IS AUTHENTICATION IM+ORTANT?6uthentication is important in order to safeguard against the unauthorisedaccess and use.
LESSON 11VERIFICATIONS
VERIFICATIONBerification is the act of proving or disproving the correctness of a systemwith respect to a certain formal specification.
METHODS OF VERIFICATIONhere are two methods commonly used inverification, which are user identification andprocessed obHect.
;ser identification refers to the process ofvalidating the user.
&rocessed obHect refers to something the user
has such as identification card, security to"enand cell phone.
32
#E"(##$A(#)"
present 8hat the user has e9: A(M car
VER##$A(#)"
-eriy the -aliity / the #
#E"(##$A(#)"
present 8hat the user has e9: pin number
Access rante
Access enie
Vali
"/t Vali
-
8/9/2019 CD 1form4
33/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
USER IDENTIFICATIONhe e%amples of validating process using the user identification areF
Eey in the user name to log'in to a system and thesystem will verify whether the user is valid or invaliduser
/how the e%am slip to verify that you are the valid
candidate for the e%am.
show a passport before departure.
+ROCESSED O8>ECThe e%amples of validating process using the processed obHect areF
the policeman will chec" on the drivers license to
identify the valid driver employees have to swipe their security card to enter
the building
buy blouses at the mall using a credit card
LESSON 1*
CONTROVERSIAL CONTENT
CONTROVERSIAL CONTENT6 controversial content is information that causes disagreement in opinionsand may cause the disruption of peace because different people or culturewill have different views about the contents.
ISSUES ON CONTROVERSIAL CONTENTShe issues on controversial contents are always focusing on pornographyand slander. Aalaysia considers pornography and slander as illegal.
&ornographic and slanderous activities can be in the forms ofplots and actions displayed on video games, controversialrhythm or lyrics of music, controversial contents of boo"s andcontroversial issues on religion and philosophy.
&ornography Creative activity (writing or pictures or films etc.) of no literary or artisticvalue other than to stimulate sexual desire.
/landerOral communication of false statements injurious to a person's reputation.A false and malicious statement or report about someone.
33
-
8/9/2019 CD 1form4
34/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
+ORNOGRA+HY#hat is pornography #hy is pornography considered JnegativeK content
oth pictures are very cute pictures of innocent babies. 7either can beconsidered pornographic by normal standards.
DEFINITION OF +ORNOGRA+HY
he definition of pornography is any form of media or material )li"e boo"s orphotographs* that depicts erotic behaviour and is intended to cause se%uale%citement.
&ornography tends to e%ploit men, women and children in a distastefulmanner.
SLANDER/lander is another e%ample of controversial content.
/lander is a legal term for false and malicious statement)meaning "nowing that it is false, or Jrec"less disregardKthat it was false* about someone.
xamples !
9ou wrote an e'mail that a fellow classmate was having an affair with ateacher, even though it was not true. 9ou then sent it to five other friends.
6hmad is a Auslim. >ne day, he received a JspamK e'mail stating that his
favourite soda drin" J/oda AodaK uses non'halal food colouring, but he doesnot "now if the source of the content is credible or true. :e decides toforward the e'mail to - of his friends.
Chin #ei spreads a rumour that a
-
8/9/2019 CD 1form4
35/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
can develop low moral value towards other men, women or children
can erode good religious, cultural and social beliefs and behaviour
/lander
can develop into a society that disregards honesty and truth
can develop bad habit of spreading untruths and rumours
can lead to unnecessary argument can cause people to have negative attitudes towards another person
LESSON 14
THE +ROCESS OF INTERNET FILTERING
INTERNET FILTERINGIt is our responsibility to ensure that the teenagers areprotected from these corruptions of the mind by filtering
access to the Internet. Internet filtering is a process thatprevents or bloc"s access to certain materials on theInternet.
It is our responsibility to ensure that the teenagers are protected fromthese corruptions of the mind by filtering access to the Internet.
W'!" i3 In"%$n%" &i"%$ing?Internet filtering is a process that prevents or bloc"s access to certainmaterials on the Internet. $iltering is most commonly used to preventchildren from accessing inappropriate material and to "eep employeesproductive on the Internet.
CONTROLLING ACCESS TO THE INTERNETControlling access to the internet by means of filtering software has becomea growing industry in Aalaysia and elsewhere. Its use has increase as themandatory response to the current plague of society, namely internetpornography, politically incorrect site, hatred, violence, hate and in generalanything viewed to be unpleasant or threatening.
he current preferred method of choice to limit access on the Internet is tofilter content either byF
"eyword bloc"ing
site bloc"ing
web rating systems
hese methods re!uire software to be installed at a client of server level.
9EYWORD 8LOC9ING>ne of the strategies is by using the "eyword bloc"ingmethod.his method uses a list of banned words orobHectionable terms.
35
-
8/9/2019 CD 1form4
36/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
6s the page is downloading, the filter searches for any of these words. Iffound, it will bloc" the page completely, stop downloading the page, bloc"the banned words and even shut down the browser.
SITE 8LOC9ING software company maintains a list of dubious Internet sites
the software prevents access to any sites on this list
denial lists regularly updated
some software provides control over what categories of information
you bloc"
#ho decides what goes on the denial list and what criteria are they
using
can you "eep trac" of the whole of the Internet
filters can use both site bloc"ing and word bloc"ing
WE8 RATING SYSTEMS#eb sites are rated in terms of nudity, se%, violence and language. he(ecreational /oftware 6dvisory Council )(/6CI* is responsible for the ratingof the websites on the content on the internet.
ratings done either by the web page author or by the
independent bureau.
browsers set to only accept pages with certain levels of ratings.
LESSON 1-CY8ER LAW
W'!" i3 C=%$ L!2?Cyber law refers to any laws relating to protecting theInternet and other online communication technologies.
NEEDS FOR CY8ER LAWIn the recent years, many concerns and issues were raised on the integrityand security of information, legal status of online transactions, privacy andconfidentiality of information, intellectual property rights and security ofgovernment data placed on the Internet.
36
$;0ER 'AW
#nte:rity an &ecurity
/ #n/rmati/n
'e:al &tatus / )nline
(ransacti/ns
Pri-acy an $/nientially
/ #n/rmati/n
&ecurity /
/-ernment ata
#ntellectual Pr/perty
Ri:hts
-
8/9/2019 CD 1form4
37/39
-
8/9/2019 CD 1form4
38/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
TELEMEDICINE ACT 1,,5he elemedicine 6ct 133 ensures that only !ualifiedmedical practitioners can practice telemedicine and that
their patient?s rights and interests are protected.
hese act provides the future development and deliveryof healthcare in Aalaysia.
COMMUNICATIONS AND MULTIMEDIA ACT 1,,;he implementation of Communication andelecommunication 6ct 1334 ensures that information issecure, the networ" is reliable and the service isaffordable all over Aalaysia.
his 6ct also ensures high level of user?s confidence inthe information and communication technology industry.
LESSON 10
COM+UTER CRIMES
COM+UTER CRIMES
6 computer crime is defined as any criminal activity thatis related to the use of computers.hese activitiesinclude computer fraud, copyright infringement,computer theft and computer attac".
COM+UTER FRAUDComputer fraud is defined as having an intention to ta"e advantage over orcausing loss to other people, mainly on monetary basis through the use ofcomputers.
here are many forms of computer fraud which include e'mail hoa%es,programme fraud, investment schemes, sales promotions and claims ofe%pertise on certain fields.
/tudents need to be aware of other computer frauds suchas health frauds, scams and hac"ing. /tudents will alsomost li"ely get false information while researchinginformation on the Internet.
CO+YRIGHT INFRINGEMENTCopyright infringement is defined as a violation of therights secured by a copyright. Copyright infringementinvolves illegal copy or reproduction of copyrights
3*
-
8/9/2019 CD 1form4
39/39
INFORMATION AND COMPUTER TECHNOLOGY Form 4
material by the blac" mar"et group. he open commercial sale of pirateditem is also illegal.
#ith the current technology, the most perfect copy of the original copy canbe downloaded from the internet.
COM+UTER THEFTComputer theft is defined as the unauthorised use ofanother persons property with the intention to deny theowner the rightful possession of that property or its use.
8%amples of computer theft includeF
transfer of payments to the wrong accounts
tap into data transmission lines on database at no cost
divert goods to the wrong destination
COM+UTER ATTAC9Computer attac" may be defined as any activities ta"ento disrupt the e!uipment of computer systems, changeprocessing control or corrupt stored data.
Computer attac" can be in the forms ofF
physical attac" that disrupt the computer facility or its
transmission lines.
an electronic attac" that uses the power of electromagnetic
energy to overload computer circuitry.
a computer networ" attac" that uses a malicious code to
e%ploit a wea"ness in software, or in the computer securitypractices of a computer user