Professional Documents
Culture Documents
JAN. 1.1 Introduction Learners should be able to: 1. Students state the definition of
to 1.1.1 Define Information Technology in Information Technology in general.
WEEK Information general. 2. Group Activity:
2&3 Technology - Discussing the roles of IT in
11 JAN 1.1.2 Discuss the roles of IT in everyday life.
-- (4 periods) everyday life: - Students cite an example of
22 JAN o Education a technology used in every
o Banking day life.
o Industry 3. Students adhere the rules and
o Commerce. regulations set for the ICT lab.
JAN 1.2 Computer 1.2.1 Define Computer Ethics. 1.2.1.1 Students explain Computer Ethics and
WEEK 4 Ethics and Code of Ethics.
25 JAN Legal 1.2.2 Identify the Code of Ethics. 1.2.1.2 Students describe Intellectual Property
-- Issues and Privacy.
29 JAN 1.2.3 Define Intellectual Property.
(8 periods) 1.2.1.3 Students carry out research on
1.2.4 Define Privacy: controversial contents and control.
o authorised access
- user authentication and 1.2.1.4 Students discuss computer crime and
verification Security threats.
- Login (Personal Identification
Numbers (PIN), User 1.2.1.5 Students carry out research on Cyber
Identification, password) Law and its importance.
- Biometrics
- physical control
1.2.8 Cyber-law
FEB 1.3 Computer 1.3.1 Define Computer Security 1.3.1.1 Students discuss the meaning of
WEEK 7 Security Computer Security and its measures.
15 FEB 1.3.2 State Security measures:
-- (4 periods) o data backup 1.3.1.2. Students describe encryption and
19 FEB o cryptography decryption.
1.3.3 encryption and decryption 1.3.1.2 Students carry out research on topics:
o antivirus
o anti-spyware - antivirus
Form 4 Scheme Of Work For ICT
o Firewall - antti-spyware
o Human aspects : awareness - Firewall
(policy, training) - Policy and training of computer
security
FEB
WEEK 8 1.4 Research 1.4.1 Impact of IT on society, 1.4.1.1 Learners discuss the meaning of
22 FEB Copyright and Piracy.
-- (8 periods) 1.4.2 Copyright and Piracy from the
26 FEB moral and legal standpoint 1.4.1.2 Learners list down the impact of piracy
activities from the perspectives of:
MAC 1.4.3 Lack of security and its effects in - moral
WEEK 9 industry/economy/ government. - legal
29 FEB/ 1
MAC 1.4.4 Malaysian Cyber-law, electronic
-- government law
4 MAC
MAC
WEEK 10 ICT ASSESSMENT (PBS) / UJIAN SUMATIF 1
7 MAC
--
11 MAC
3 rd Week MID-SEMESTER HOLIDAY 1 (12 MARCH -20 MARCH )
MARCH
3.1.4 State the importance of network Discovering Computers, Shelly Cashman Series
and communication using (ISBN 0-619-25525-0)
examples in the student’s http://www.webopedia.com
immediate environment. Notes:
LAN: A network that spans a small area usually
JUNE/JULY 3.1.5 Define types of computer confined to a single building or a group of
WEEK 23 networks buildings
Local Area Network (LAN)
27 JUNE MAN (Metropolitan Area MAN: A network designed for town and city
-- Network) usually larger than Local-Area Network
1 JULY WAN (Wide Area Network)
WAN: A network that spans a relatively large
3.1.6 Differentiate between the three geographical area usually consisting two or
types of computer networks more Local-Area Network.
Example: The Internet
3.1.7 Define 2 types of network
JULY architecture Group activity:
WEEK 24 Students list out the differences between the
4 JULY Client/Server three types of computer network
-- Conduct group research from information
8 JULY Peer-to-Peer
sources (library, the Internet) on types of
( HARI RAYA
AIDIL FITRI:
3.1.8 State three types of network network architecture
6 & 7 JULY )
topology Notes:
Bus Client/Server Architecture: A network
JULY architecture in which each computer or process
WEEK 25 Ring on the network is either a client or a server
11 JULY Star
Peer-to-Peer Architecture: A type of network in
-- 3.1.9 Differentiate between the three
15 JULY which each workstation has equivalent
types of network topology capabilities and responsibilities
Form 4 Scheme Of Work For ICT
18 JULY Intranet
-- Internet Students list out the differences between the
22 JULY three types of network topology
Extranet
3.1.12 Cooperation in conducting group
research Conduct group research from information
sources (library, the Internet) on TCP/IP
Hostname
Activity:
3.4.5 Test the network connection Set up a shared folder
Save a file in the shared folder
Access the file in the shared folder from other
3.4.6 Create a shared folder workstations