Professional Documents
Culture Documents
Creation
Sumerians developed cuneiform writing
The Phoenicians developed the alphabet
Tsai Lun of China invented paper
The first printing began with the creation of printing
machine.
Telegraph line was invented
The first telephone was introduced
Television was made known to public
Computer was created
Photocopier machine was introduced
Communication satellite was introduced
The first internet known as ARPANET started.
Invention
Chinese Abacus (First counting machine)
Egyptian Abacus
John Napier invented Napiers Bone (Multiplication table carves
on bones)
Blaise Pascal invented Pascaline
Gottfried Wilhelm Von Leibniz invented Leibnizs Rechner
(which use first binary mathemathic calculating machine)
Joseph Marie Jacquard invented weaving loom (using punch
card technology)
Charles Babbage invented mechanical calculator machine.
Mark 1 was invented in Harvard University. The first computer
which is slow, expensive and unreliable. It uses mechanical
switches
b) Integrated circuit technology, which had reduced the size and cost of
computers. It is a complete electronic circuit or a small chip of
silicone which is also known as semiconductor.
c) The magnetic core memory was replaced by microchip. (The first 253
bit Ram, basis for the development of the 1K bit Ram).
4. Advantages:
a) Silicone chips were reliable, compact and cheaper.
b) Sold hardware and software separately which created the software
industry.
c) Customer service industry flourished (reservation and credit checks)
5. Software technology:
a) More sophisticated
b) Several programs run at the same time
c) Sharing computer resources
d) Support interactive processing
E. Fourth Generation (1971 Present)
1. It took only 55 years for the 4th generations to evolve.
2. The growth of the computer industry developed technologies of computer
inventions.
3. There are many types of computer models such as
a) Apple Macintosh
b) IBM
c) DELL
d) ACER
4. In 1971, Intel created first microprocessor
5. In 1976, Steve Jobs built the first Apple computer
6. In 1981, IBM introduced its first personal computer
7. Among the famous inventors in fourth generations were:
a) Bill Gates who invented Microsoft
b) Michael Dell who invented Dell Computer
8. Hardware technology invented in fourth generation were
a) Silicone chip
b) Microprocessor
- a specialised chip developed for computer memory and logic
- it is a large-scale integrated circuit which contained thousands of
transistors.
- the transistors on this one chip are capable of performing all of the
functions of a computers central processing unit.
c) Storage devices
9. Advantages:
a) 100 times smaller than ENIAC (the first computer)
b) Faster
c) Reliable
d) Greater storage capacity
e) Personal and software industry boomed
F. Fifth generation (present and beyond)
1. New hardware technology:
a) Silicone chips
b) Processor
c) Robotics
d) Virtual reality
e) Intelligent system
f) Programs which translate languages
G. New Era Computer
1. Super Computers
- Fastest, most powerful, most expensive.
- Used in applications such as sending astronauts into space, testing safety
and aerodynamic features on cars and aircraft, controlling missile
guidance systems, and weather forecasting which required extreme
accuracy and immense speed to perform the complex calculation.
2. Mainframe computers
- Large, expensive, powerful computer that can handle hundreds or
thousands of connected user simultaneously.
- used in large organization to handle high volume processing of business
transactions and routine paperwork.
3. Mini computer
- Medium sized computer
- Usually used as servers, with several PCs or other devices networked to
access the midrange computers resources.
4. Personal computers
- Small computer system, designed to be used by one person at a time.
- Widely used in small and large bussineses. Examples: tracking
merchandise, billing customer, manage company accounts.
5. Mobile computers personal computer that you can carry from place to
place
6. Expert system teleconferencing, speech recognition system.
d) direct deposit
e) pay by phone system
f) personal computer banking
g) internet banking
3. User who benefits are
a) Customers Customers can make any transactions at the 24 hour
service centres or via online. These services allowed them to do
transaction at anytime they want.
b) Businessmen Businessmen can save their time by using the online
services offered by banks. They can access company accounts for loan
applications, business transactions and update on their cash flow at
anytime
c.) Bank administrators Bank administrators can oversee the entire
banking activities such as reconciliations, inter-branch transaction
(IBT), telegraphic transfer and others by referring to the banking
system
C.) Industry
1. Computers are used to
a)
facilitate production planning and control systems,
b)
to support chain management
c)
to help in product design in the industrial sector
2. User who benefits are
a) Workers Workers use computers to analyze and collect research data
for future reference.
b) Researchers Researchers use computers to analyze and collect
research data for future reference.
c.) Administrators Administrators use computers to oversee the entire
operations in the plant or factory to detect specific errors or defects that
occurred in the process.
D.) E-commerce
a. E-commerce helps in boosting the economy. It makes buying and selling
activities easier, more efficient and faster. For this application, computers,
internet and shared software are needed.
Government
Healthcare
Home
Law
Enforcement
Transportation
Travel
Benefit
Use computer graphic to experience with possible interiors to
give client a visual image.
Modern artists use computers to express their creativity
Job opportunities that are related to ICT such as computer
engineers, graphic designer, software engineers and
programmer offer more technical skill and knowledge
To forecast weather, process immigrant
Computers are use to promote telemedicine. Researchers
found it useful in information sharing. Doctors and medical
practical are able to apply modern treatment such as laser
treatment.
Computer are use for record keeping, writing letters,
preparing budget and communicating with others
In maintaining national fingerprints floes, modeling DNA and
others information.
In rapid transit system and tracking railway system
Computers are use to do room reservation. It helps tourists to
plan their holiday well
are
done
by
C.) Industry
Industry before ICT
Industry
was
slow
because
everything was done manually and
totally depended on human labor.
D.) Commerce
1. Commerce is an activity of exchanging and buying and selling of
commodities in large scale involving transportation from place to
place.
Commerce before ICT
Trading was made using the barter E-commerce plays an important role
system and it was then later in the economic scene. It includes
developed into currency.
distribution, buying, selling and
servicing products that are done
electronically.
Advertisement was in the form of
word of mouth, billboards and
printed flyers.
Trading globally was extremely slow,
late and expensive. Traders had to
find ways to market global products
in the global market.
1. We often see pirated CDs, software and VCD being sold at the night
market. Buying pirated software is an example of unethical activity in
computer ethic.
2. A guideline is needed to stop the current technology products from being
exploited, for example by replicating originals CDs and selling them as
pirated software. This unethical behavior can be controlled by the code of
conducts.
3. Under the Malaysia Copyright act 1987, any individual charge with piracy
will be fine up to 10,000 for each copy or up to 5 years imprisonment or
both.
4. Computer ethics is a system of moral standards or values used as a
guideline for computer users.
B.) The ten commandments of computer ethics
1. The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics.
2. These principles consider the effective code of conducts for the proper use
of information technology.
3. The ten commandments of computer ethics
i. You shall not use a computer to harm other people.
ii. You shall not interfere with other peoples computer work.
iii. You shall not snoop around in other peoples computer files.
iv. You shall not use a computer to steal.
v. You shall not use a computer to bear false witness.
vi. You shall not copy or use proprietary software for which you have not
paid.
vii. You shall not use other peoples computer resources without
authorization or proper compensation.
viii. You shall not appropriate other peoples intellectual output.
ix. You shall think about the social consequences of the program you are
writing or the system you are designing.
x. You shall always use a computer in ways that ensure consideration
and respect for your fellow humans.
3.
Respecting property
Property here means ownership. Since an individual data and information
are considered as property, therefore, an act of tampering and changing
electronic information is considered as vandalism and disrespect for other
peoples property.
5. Universal
Universal, can be applied anywhere,
all over the world
6. Produce ethical computer user
To produce ethical computer users
7. Immoral
Law
1. Control
As a rule to control computer
users.
2. Judicial standard
Law is judged by judicial
standards
3. Must follow
Computer users must follow the
regulations and law
4. Penalties, imprisonments and
other punishments
Penalties, imprisonments and
other punishments for those
who break the law.
5. Depends on country
Depends on country and state
where the crime is committed.
6. Prevent misusing of computers
To prevent misuse of computers
7. Crime
Ethics
Not honoring computer ethics
means ignoring the moral elements
(immoral).
Law
Not honoring the law means
committing a crime
1.
2.
3.
Unethical
Using the office computer to do
personal thing
Reading your friends e-mail without
his or her permission.
Law breaking
1. Sending a computer virus via
e-mail
2. Hacking into your school
database to change your
examination results.
Plagiarising and using materials from 3. Selling pirated software in a
the
Internet
for
your
class
night market.
assignments without giving credits to
the original author.
Summary
1.
2.
3.
Verification
- verify the validity of
the ID
Valid (T)
Identification
- present what the user is (e.g. biometric)
Authentication
- authenticate who the
user is
Access
denied
False
True
Access granted
o Iris scanning analyses the features that exist in the coloured tissues
surrounding the pupil which has more than 200 points that can be used
for comparison, including rings, furrows and freckles.
o The scans use a regular video camera and can be done from further
away than a retina scan.
o It will work perfectly fine through glasses and in fact has the ability to
create an accurate enough measurement that it can be used for
identification purposes.
o The accuracy of this method is excellent while the cost involved is
high.
e.) Retina Scanning
o Retina scanning requires the user to remove glasses, place their eye
close to the device and focus on a certain point.
o The accuracy in retina scanning is very good and the cost involves is
fair.
f.) Voice Recognition
o For example, when you book for the taxi services, the operator will
ask you to hang up and she will call you back to confirm for the
service required.
E.) Why is authentication important?
Authentication is important in order to safeguard against the unauthorized
access and use.
Summary
1. Authentication is a process where users verify that they are who they
say they are.
2. There are 2 commonly used authentication methods, which are
biometric device and callback system.
3. Biometric device is a device that translates personal characteristics
into a digital code that is compared with a digital code stored in the
database.
4. Callback system refers to the checking system that authenticates the
user.
Verification
- verify the validity of
the ID
Valid (T)
Access granted
Access
denied
Identification
- present what the user is (e.g. pin number)
i.
Pornography
Can lead to criminal acts such
as exploitation of women and
children
Can lead to sexual addiction
or perversion.
Can develop low moral value
towards other men, women or
children.
Can erode good religious,
cultural and social beliefs and
behaviour.
Slander
1.
Can develop into a society
that disregards honesty and truth.
2.
Summary
1. Controversial content is the information that causes dispute among people
with different beliefs and values.
2. Controversial contents such as slander and pornography can give effect to
the society in the following manner.
a) Causes arguments and quarrels
b) Can harm reputation of people.
c) Lowers moral behaviour
d) May exploit men, women and children
e) Can lead to sexual addiction and crimes
f) Erodes good religious, cultural and social beliefs and behaviour.
Access granted
iv.
True
Access denied
and Penistone. The word breast will also block searches for
recipes using chicken breast.
b. Site blocking
i.
This software is more sophisticated than word
blocking as it involve people visiting the site and
evaluating them.
ii.
This method compiles a list a dubious Internet sites
which the software then can prevent people from accessing
it.
iii.
Denial list regularly updated and can be
automatically downloaded to the software purchaser.
iv.
Some example of dubious Internet sites are
www.xxx.xom, www.poker.com, www.porn.com
v.
Site blocking process
Type URL
Falseee
Access
vi.
vii.
viii.
ix.
x.
True
Access
ii.
iii.
Access granted
True
Access denied
o Cyber Law refers to any laws relating to protecting the Internet and
other laws relating to protecting the Internet and other online
communication technologies.
B.) Needs For Cyber Law
o In the recent years, many concerns and issues were raised on the
integrity and security of information, legal status of online
transactions, privacy and confidentiality of information, intellectual
property rights and security of government data placed on the Internet.
o These concerns and issues clearly indicate why Cyber Laws are
needed in online activities.
C.) The Cyber Law Acts in Malaysia
i. The
Summary
1. Cyber law refers to any laws relating to protecting the Internet and other
online communication technologies.
2. Cyber Law is needed to protect
i.
ii
iii
iv
v
4.
5.
SUMMARY
1. Computer crime is any criminal activity that is related to the use of
computers such as fraud, copyright infringement, theft and computer
attack.
2. Computer fraud includes health frauds, scams and hackers.
3. Copyright infringement includes the illegal downloading and sharing
of recorded music and unauthorized copying of movies online.
4. Computer theft includes the unauthorized use of another persons
property with the intention to deny the owner the rightful possession
of that property or its use.
5. Computer attack includes any activities taken to disrupt the equipment
of computer system, change processing control or corrupt data stored.
3. Besides these Cyber Laws, there are three other Cyber Laws being
drafted
SOFTWARE AND DATA SECURITY
1. Software and data security refers to the security measures used to
protect the software and the loss of data files.
2. Examples of security measures used to protect the software are
activation code and serial number.
3. An example of security measure used to protect the loss of data files is
the disaster recovery plan method.
4. The idea of this plan is to stored data, program and other important
documents in a safe place that will not be affected by any major
destruction.
NETWORK SECURITY
1. The transfer of data through network has become a common practice
and the need to implement network security has become significant.
2. Network security refers to security measures used to protect the
network system.
3. One example of network security measures is firewall. With firewall,
network resources can be protected from the outsiders.
PERSONAL COMPUTER SECURITY CHECKLIST
In order to make sure our computers are secured, here are the computer
security checklists to follow.
a) Do not eat, drink or smoke near the computer.
b) Do not place the computer near open windows or doors.
c) Do not subject the computer to extreme temperatures.
d) Clean the equipment regularly.
e) Place a cable lock on the computer.
f) Use a surge protector.
g) Store disks properly in a lock container.
h) Maintain backup copies of all files.
i) Stores copies of critical files off sites.
j) Scan a floppy disk before you open it.
k) Do not open any unknown email received.
SUMMARY
2. The agent for malicious code is the writer of the code or any person
who causes its distributions.
actions.
Worm
through
B HACKER
1. Hacking is a source of threat to security in computer. It is defined as
unauthorized access to the computer system by a hacker.
2. Hackers are persons who learn about the computer systems in detail.
They wrote program referred to as hacks. Hackers may use a modem
or cable to hack the targeted computers.
3. Kevin Mitnick is the most notorious hacker ever caught. He had
stolen millions of dollars worth of software and credit card
2. There are various types of malicious code that include virus, Trojan
horse, logic door, trapdoor or backdoor and worm.
3. Identifying virus:
5.
D.) Anti-Spyware
1. Spyware is a program placed on a computer without the users
knowledge. It secretly collects information about the user.
2. The Spyware program communicates information to the outside
source.
3. An Anti-Spyware application program sometimes called tracking for
threat or a Spybot is used to remove Spyware.
4. Among the popular Anti-Spyware programs are:
E.) Firewall
Screening routers
o Simplest
o Sees only addresses and service protocol type
o Screen based on connection rules.
b.
Proxy gateway
o Complex
o Sees full text of communication
o Screen based on behaviour proxies
c.
Guard
o Most complex
o Sees full text of communication
o Screens based on interpretation of message content.
F.) Human Aspects
1. Human aspects refer to the user and also the intruder of a computer
system.
2. It is one of the hardest aspects to give protection to.
3. The most common problem is the lack of achieving a good
information security procedure.
4. There are three ways to protect computer from human aspect threat:
a.
o Some threat also come from within the organization and not
just from the outside.
b.
7. Human aspects refer to the user and also the intruder of a computer
system which is one of the hardest aspects to give protection to.
2. Data produced by such applications may not be correct and may risk
corrupting data received from other sources that are not compatible
with the application.
Summary
1. The relationship between the security threats and the security
measures.
1. The computer system is able to detect any illegal access to the system
by a user who does not have any authorization.
a)
Tcpwrappers
b)
Tripwire
2. Sudo stands for (Superuser do) and is a program in Unix, Linux and
similar operating systems such as Mac OS X that allows users to run
programs in the form of another user (normally in the form of the
systems superuser).
B) BUSINESS
1
Computer In Banking
Industry
o By using the CAM system, computers record actual labour,
material, machine & computer time used to manufacture a
particular product.
o Computer process this data & automatically update inventory,
production, payroll & accounting records on the companys
networks.
o Examples of companies using this system are Proton
(www.proton.com.my) & Perodua (www.perodua.com.my).
o
o
o
o
o
o
4
Computer In Tourism
o
Science
o
home users
small office/ house office (SOHO) users
mobile users
power users
large business users
HOME USERS
The computer is a basic necessity. Each home user spends time on computer
for different reasons :
business
entertainment
communication
education
MOBILE USER
Mobile users :
include real estate agents, insurance agents, metre readers and journalists
use notebook computers, internet-enabled PDAs or smart phones
POWER USER
Power user :
b) Perspective:
Is the evident biased? Does the author attempt to sway the readers
opinion?
c) Reliability/ Credibility
d) Update
CONTENT
CONCLUSION
As at the beginning
of the research
Includes the
objectives of the
research
Provides a clear
statement on why the
study was undertaken
Includes the
limitations/assumptio
ns and analytical
techniques
Consists of facts or
arguments related
to subject matter
Can be presented in
an argument format
or just as an
overview
Is a review of content
( not repetition of
content)
Relates to the statement
of objectives in the
introduction
Should not introduce new
issues
Should contain judgment
or decision that has been
reached
2. Style
Double-spaced
4. Clarity
5. Indicating
your Intentions
1. QUESTIONING
Discover a problem
Form a question to answer the problem
2. PLANNING
3. GATHERING
Go to agreed sources of information
Collect information
4. SORTING
Put similar information together
Highlight valuable credible information
5. SYNTHESISING
Discuss information with others
Combine different information
6. EVALUATING
Discuss if information gathered supports the answer
Test out solution and decision that supports the answer
7. REPORTING
Write or type out the report
Create an appropriate graphic or media
Prepare for question and answer
Prepare research
4. HOW TO DELEGATE
PORTFOLIO
o The purpose of team journal is to keep track the progress of the project.
o The teams initial framework is where the team should do some basic
study on the topic and decide what should be included in the presentation.
o The print out of the final presentation will be given to the teacher for final
grading.
SOURCE CITATION CARD
o Source citation card is a note card in which you write the name of the
article, author, book name, page numbers, where you found it, why it is
good information and a short summary of the important points.
Practice in advance
Prepare notes on paper or cue cards to help you remember to speak out
clearly for people at the back to hear you
Do not shout