This action might not be possible to undo. Are you sure you want to continue?
INFORMATION AND COMMUNICATION TECHNOLOGY
PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA ARAS 4-8, BLOK E9, PUTRAJAYA
This document comes together with the Learning Module for students. You are advised to read this document before getting the students to start with the Learning Module. In carrying out activities for topic 2.4 Installation Computer System and 3.4 Setting Network Facilities, DO NOT use the computers in the computer lab. You are advised to have a different set of computers for these activities. You have to ensure that all the computer components, parts and hardware are available for the students to carry out the activities found in the module.
References: Books 1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information Age. Complete. Eight Edition. 2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering Computers 2005 : A Gateway to Information, Course Technology. 3. Stallings W. (2003) Cryptography and Network Security: Principles and Practices. Third Edition. 4. Irv Englander (2000) The Architecture of Computer Hardware and Systems Software, An Information Technology Approach: Second Edition. 5. Tamara Dean (2000), “Network + Guide to Networks”, Thomson Course Technology Websites addresses ICT and Society 1. Ad-Aware SE Personal ~ http://www.lavasoft.com 2. Antivirus ~ http://www.primode.com/glossary.html 3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com 5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/ 7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm Computer System 1. http://www.scsite.com 2. http://webopedia.com/ 3. http://www.microsoft.com/assemble 4. http://www.microsoft.com/biossetup 5. http://www.grisoft.com 6. http://www.pcguide.com
Computer Networks and Communications
1. 2. 3. 4.
http://www.lanshack.com http://www.homenethelp.com http://www.crossover.asp http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin g.mspx
INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
1.3 COMPUTER SECURITY
1.3 COMPUTER SECURITY 1.3.3 Security measures
At the end of the lesson, students should be able to: 126.96.36.199 Apply the correct security procedures. A. B. C. D. E. F. Individual / group activities Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects
Before using this module teacher has to ensure the following:
A. Antivirus i. An Antivirus Software must be preinstalled in students’ personal computer. Example: AVG Free Edition software ii. Test file for virus check must be copied on the desktop of students’ personal computer. Example: eicar.com iii. AVG Free Edition and Eicar.com is included in Teaching guide CD. B. Anti-spyware i. Anti-spyware software must be preinstalled in students’ personal computer. ii. Ad -Aware SE Personal software is included in Teaching guide CD.
Note on spyware:
Spyware and adware Some vendors or employers use spyware to collect information about program usage or employees. Internet advertising firms often collect information about users’ Web browsing habits by hiding spyware in adware. Adware is a program that dispkays an online advertisement in a
DRAFT banner or pop-up windows on Web pages, email, or othe Internet services. How to protect your computer from spyware? The best defence against spyware and other unwanted technologies is to prevent them from getting into your computer in the first place. Here are some steps you can take to stay safe while using the Internet and software programs. Keep security on your computer up to date o Update security patches o Security and privacy settings in Internet browsers Only download programs from web sites you trust. Beware of the fine print: Read all security warnings, license agreements, privacy statements, and “opt-in” notices with any software you download. Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,” or “Cancel” to close a window. Be extra careful with certain types of “free” programs. Use available tools to detect and delete spyware. o Anti-spyware and antivirus software o Personal firewall
C. Cryptography i. ii. The activity on cryptograph will be on paper not computer. This is a group activity.
NOTE on cryptography
A process associated with scrambling plaintext (ordinary text, or cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Cryptography concerns itself with four objectives: 1) Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4) Authentication (the sender and receiver can confirm each other www.stallion.com/html/support/glossary.html
DRAFT How to calculate Encryption algorithm: C = (P + K) mod 26 with K = 3 To encrypt a letter H : 1. Substitute the letter H into number. H=7 2. Use the algorithm. P = 7, K = 3 C = (P + K) mod 26 = (7 + 3) mod 26 = 10 mod 26 mod = balance of division
= 10 3. Convert the number 10 into letter. 10 = K Decryption algorithm: P = (C – K) mod 26 with K = 3 To decrypt the letter K: 1. Substitute the letter K into number. K = 10 2. Use the algorithm. C = 10, K = 3 P = (C – K) mod 26 = (10 – 3) mod 26 = 7 mod 26
=7 3. Convert the number 10 into letter. 7=H
DRAFT D. Firewall
Ensure the windows firewall is disabled in students’ computer before they start the module. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewall is turned on by default. (However, some computer manufacturers and network administrators might turn it off.) You do not have to use Windows Firewall —you can install and run any firewall that you choose. Evaluate the features of other firewalls and then decide which firewall best meets your needs. If you choose to install and run another firewall, turn off Windows Firewall. As enrichment, you can ask the students to disable the firewall and surf the Internet. Then, try surfing the Internet again but this time with the firewall enabled. Ask students to observe any differences? Normally the firewall will block the download and upload files activities if you are using instant messaging like Yahoo messenger.
E. Data backup i. Provide students with a blank diskette or a floppy disk. ii. Make sure My document folder is on the desktop. iii. Save a file or document in My Documents folder. F. Human Aspect
Note on security risk generally done by human.
Computers are exposed to several types of security risks Security Risks Unauthorized access and use • .
Descriptions Unauthorized access - the use of a computer or network without permission. • Unauthorized use – the use of a computer or its data for unapproved or possibly illegal activities. Hardware Theft • Hardware theft – the act of stealing computer and Vandalism equipment. • Hardware vandalism – the act of destroying computer equipment. Identity Theft When someone steals personal or confidential information. Software Theft When someone • steals software media • intentionally erases programs • illegally copies a program
DRAFT How to protect your computer from perpetrators? User may take several measures to help protect computer from perpetrators. Security Risks Unauthorized access and use • • • Hardware Theft • and Vandalism • • Software Theft • • Identity Theft • • Safeguards Company should have a written acceptable use policy (AUP) that outlines the computer activities for which computer and network may and may not be used. Users should be identified and authenticated. Users should disable file and printer sharing on your Internet connection. Users should have common sense and a constant awareness of the risk. Organisations should implement physical access control (locked doors, windows and equipment). Computers use passwords, possessed objects and biometrics. Organisations should keep original software boxes and media in a secured location. Manufacturers should issue users license agreement to protect from software piracy Organisations should implement user identification and authentication controls. Oganisations use a variety of encryption techniques to keep data secured and private.
DRAFT Topic: 2.4 Installation 2.4.1 Personal Computer (PC) Assembling 2.4.2 Hard Disk Partitioning and Formatting 2.4.3 Software Installation
At the end of the lesson, students should be able to: 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 Assemble the parts of a PC correctly Participate in assembling the parts of a PC correctly Display cooperation in assembling the parts of a PC correctly Format and partition the hard disk Install operating system, applications software and utility programs
ACTIVITIES (Group activity) 1. Ensure all components are available by using the checklist below. Students’ copy is in the module. 2. Do not use the computers in the computer lab. Buy a different set or use other computers in the school. 3. Teacher has to demonstrate first. 4. It is advisable to wear an anti-static wrist strap that is properly grounded. 5. Encourage students to handle all the components with great care.
No. 1 2 3 4 5 6 7 Components CPU casing and power supply CPU chip Motherboard Hard disk Floppy disk drive CD Rom drive Cables o IDE cable o floppy cable o audio cable Cards o modem card o display card o sound card o network card (not needed if all devices are integrated on-board) RAM chips Mouse Speakers Keyboard Tick (√) if available
9 10 11 12
COMPUTER NETWORKS AND COMMUNICATIONS
3.4 SETTING NETWORK FACILITIES MODULE
DRAFT TOPIC: 3.4 SETTING NETWORK FACILITIES
3.4.1 Installation of Network Interface Cards (NIC) 3.4.2 Cable Crimping and Testing
3.4.3 Configuration and Testing of Network 3.4.4 Share Data At the end of the lesson, students should be able to: 126.96.36.199 Insert network interface cards (NIC) 188.8.131.52 Install drivers for the NIC 184.108.40.206 Crimp and test UTP cable • Straight cable • Crossed cable 220.127.116.11 Exercise care and caution when crimping a cable 18.104.22.168 Configure the workstation to join a Local Area Network • Internet Protocol (IP) Address • Subnet Mask • Server name 22.214.171.124 Test the network connection 126.96.36.199 Create a shared folder Activities (Group work) 1. Ensure all components are available by using the checklist below. Students’ copy is in the module. 2. Do not use computers in the computer lab. Buy a different set or use other computers found in the school. 3. You need to have 3 sets of computers for this activity. 4. Teacher has to demonstrate first.
No. Hardware Network Interface Card (NIC) NIC driver Switch / Hub CAT5E cable (UTP cable) RJ45 connectors LAN cable tester Crimp tool Cable stripper Cutter Screwdrivers Tick (√) if available
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.