Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
15Activity
0 of .
Results for:
No results containing your search query
P. 1
ICT Form 4_Yearly Plan 2010

ICT Form 4_Yearly Plan 2010

Ratings: (0)|Views: 1,583|Likes:
Published by orientus86

More info:

Published by: orientus86 on Jan 15, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

02/08/2012

pdf

text

original

 
Siti Nur Baiti binti Had [P.41853
]
 
2010
ICT YEARLY PLANFORM 4
Sekolah Menengah Kebangsaan Serian
 
INFORMATION AND COMMUNICATION TECHNOLOGY (3765/2)YEARLY PLAN 2010 - FORM 4
WEEKTOPICSSCOPES & LEARNING OUTCOMESDURATIONSUGGESTED ACTIVITIES
1.0 INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY (6 WEEKS)
WEEK 2
1.1 Introduction toInformation andCommunicationTechnology(4 periods)1.1.1
Overview of Information and CommunicationTechnology (ICT)
2 Periods1.1.1.11.1.1.2Define ICT.Describe the brief evolution of computers.
 
1.1.2
ICT In Everyday Life: Education, Banking, Industryand Commerce
2 Periods
Individual/Group task
List the differences between computerisedand non-computerised systems usingsearch engines.
Discuss and list the differences betweencomputerised and non-computerisedsystems.
Conduct a simple survey of ICT usage in thecommunity.
Discuss the effects of controversial contentson society.1.1.2.11.1.2.21.1.2.3List the usage of ICT in everyday life.State the differences betweencomputerised and non-computerisedsystems.State the impact of ICT on society.
WEEK 3
1.2 Computer Ethics andLegal Issues(6 periods)1.2.1
Definition
2 periods1.2.1.11.2.1.21.2.1.3Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.Differentiate between ethics and law.State the need for intellectual property laws1.2.2
Privacy
2 periodsStudy on:
available technologies for authentication andverification (include: what it is, where it is1.2.2.11.2.2.2List ways to protect privacy.State authentication and verification methods/technologies.
Panitia ICT, SMK Serian 2010 
2
 
WEEKTOPICS
SCOPES & LEARNING OUTCOMESDURATION
SUGGESTED ACTIVITIES
 used, its efficiency, its availability)
common ethical practices (10Commandments of Computer Ethics)computer criminals(examples: Kevin Mitnickand Aman Shah)1.2.3
Controversial Contents and Control
 1.2.3.11.2.3.2List effects of controversial contents on society:
Pornography
Slander Describe the process of filtering to controlaccessto controversial contents.
WEEK 4
1.2.4
Computer Crimes
 2 periods
Group Task
Brainstorming
Slide presentation in groups for eachtopic1.2.4.1Explain the need for Cyber Law.1.2.4.2Explain briefly the computer crimes below:
Fraud
Copyright Infringement
Theft
Attacks1.3 Computer Security(6 periods)1.3.1
Definition
2 periods
Individual/Group task
Conduct a study on effects of computer security breaches on an organization
Compile the study in a portfolio1.3.1.1Define computer security.1.3.2.1Explain briefly the different threats tocomputer security:
Malicious code
Hacking
Natural disaster 
Theft
Panitia ICT, SMK Serian 2010 
3

Activity (15)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
kcmak liked this
kcmak liked this
WanM.Syamim liked this
Jalaluddin Adam liked this
Adam Irfany liked this
rynn liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->