NOTES Information Communication Technology (ICT)

3y ago
152 Views
23 Downloads
1.20 MB
16 Pages
Last View : 11d ago
Last Download : 2m ago
Upload by : Elise Ammons
Transcription

pter 1: ICT and SocietyChapter 2: Computer SystemsChapter 3: Computer Networks andCommunicationsChapter 4: MultimediaChapter 5: ProgrammingChapter 6: Information SystemsName : .Class : .Created by Kim (2013)32

Chapter 1 : ICT and Society1. ComputerGenerations1st generation (1940 – 1956) Huge, slow, expensive, unreliable Presper Eckert & William Maunchly built ENIAC (vacuumtube) Problem vacuum tube – generates heat, burns out frequently2nd generation (1956 – 1963) Uses transistors which were smaller than vacuum tubes, Advantages : no need warm up time, consumed less energy,generate less heat, faster & more reliable Famous computer scientists: John Bardeen, Walter HouseBrattain, William ShockleyNOTES3rd generation (1964 – 1971) IBM 370 series - 1964. CDC 7600 and B2500 Integrated circuit begins Use silicon chips – reliable, compact, cheaper Hardware and software sold separately First 256 bit RAM were introduced and was the basis fordevelopment of 1K bit RAM4th generation (1971 – present) Famous computer scientists: Steve Jobs (built the 1st Applecomputer), Bill Gates, Michael Dell Silicone chips, microprocessor, storage devices wereinvented Computer became 100 times smaller than ENIAC Gain in speed, reliability and storage capacity Personal and software industry bloomed5th generation (Present – beyond) Based on Artificial Intelligence (AI) New hardware technology was introduce: Silicone chips,Processor, Robotics, Virtual reality, Intelligent system,Programs which translate languagesCreated by Kim (2013)231

9. DatamanipulationUpdate – to correct inaccurate data and to change old data withnew data2. Positive impactof ICT on thesociety6 positive impacts :Faster communication speedLower communication costReliable mode of communicationInsert – to add new records in the file when new data are obtained.Effective sharing of informationPaperless environmentBorderless communicationDelete – to remove a record from a file when it is no longer neededRetrieve – to obtain specific information from the tables in order torefer or make changes the information.Sort – To arrange the records according to ascending or descendingorder based on a specific field.Filter – to exclude unwanted records from being retrieved by usingcertain condition or criteria in a query.3. Negative impact 2 negative impacts :of ICT on theSocial problemssocietyHealth problems4. Why ethics andlaw incomputing isneeded?Respecting ownership – not steal other people’s work either byduplicating or distributingRespecting privacy and confidentiality – refraining oneself frominvading other’s privacy without permissionRespecting property – do not tamper and change electronicinformationSearch – To find specific records that fulfills the user’s requirements.5. IntellectualPropertyprotectionPatent for inventions : utility, design, plant patent, (protectinventions and improvements)Trademark for brand identity : Words, names, symbols, devices,images (represent products, goods or services)Copyright for material : Literary and artistic material, music, films,sounds recording and road castsDesign for product appearance : particular lines, contours, colour,shape, texture, ornamentations.Created by Kim (2013)303

6. Methods ofauthentications - a process where users verify their identityauthentications 2 types of authentications :Biometric devices – a device that translate personal characteristicinto digital code Fingerprint recognition Facial recognition Hand geometry scanning Iris scanning (the area near to the coloured area of the pupil) Retinal scanning (the eyeball) Voice recognition Signature verification system7. Primary keyand foreignkeyForeign key – the field that matches the primary key in another table.It may have duplicate values.8. Phases ofSystemDevelopmentCallback system – checking system that authenticates the user(commonly used in the bank operation and business transaction) When booking the taxi service Operator call and call back for confirm the service required7. Methods ofverificationAnalysis PhaseDevelopers will perform problem analysis by finding out the needs oftarget users.Developers also identify the input, process and output for the newsystem.Design PhaseBased on the needs of target users, the system developers will designan Entity Relationship Diagram (ERD)Verification - the act of proving or disproving the correctness of asystem with respect to a certain formal specification2 common methods:User identification – show passport, key-in user name & password,show exam slipProcessed object – swipe security card to enter building, police checkthe driver’s license to identify valid driver8. ControversialcontentPrimary key – these keys must not be null values, and it is unique. Ithelps to avoid duplicationImplementation PhaseDevelopers create database using database software.Testing PhaseThe system will be tested by the target users in the Testing Phase Ifthere is any error detected; the system developers will fix the error.Documentation PhaseDevelopers will produce the documents for the programMaintenance Phase – monitor the system performance and makechanges when needed.Pornography – any form of media or material that depicts eroticbehavior and is intended to cause sexual excitement Slander – legal term for false and malicious statement3 types of maintenance:Corrective maintenance – to repair error in the system design.Perfective maintenance – to improve a computer program.9. Internetfiltering3 common methods :Keyword blocking – uses a list of banned words to filter access to thesiteWebsite / site blocking – uses software to prevent access to anysites on the listWeb rating system – browser gain access to a certain level of ratingsCreated by Kim (2013)4Preventive maintenance – aim for future breakdowns and failures.29

4.Hierarchy ofData10. Cyber law actsin MalaysiaBits Bytes Fields Records Files DatabaseDigital Signature Act 1997 – secures electronic communicationsespecially on the internetComputer Crimes Act 1997 – gives protection against misuse ofcomputers and computer criminal activitiesBit – smallest unit of data the computer can store. It is in binary digit(1 and 0).Byte – 8 bits 1 byte 1 character.Telemedicine Act 1997 – Ensure only qualified medical practitioners can practice telemedicineField – smallest unit of meaning information in the database. It isalso unit of data consist of one or more characters. Example: fieldthat describe Name, Class, AddressCommunications and Multimedia Act 1998 – ensures thatinformation is secure, network is reliable, and service is affordableall over MalaysiaRecord – collection of related fields. Example: Data about a student[Name, StudentID, Age]11. ComputerCrimesFile – collection of related records.Computer Fraud – intention to take advantage or causing loss(mainly monetarily basis)Database – Structured collection of information on specific subjects.5.Benefits ofusing databaseCopyright Infringement – involves illegal copy or reproduction ofcopyright material by black market groupMinimise data redundancy – no need to repeat recording the samedata.Data Integrity is assured – changes of data in database will beautomatically for all files.Computer Theft – unauthorized use of another person’s propertyData can be shared – allow ease of sharing data especially over thenetwork.Computer Attack – to disrupt the equipment of computer systemsInformation can be easily accessed6.12. ComputerSecurityFeatures ofTable – stores a collection of information about specific topic.table, query,form and report Query – request for a specific data from a databaseHardware Security – used to protect the computer hardwareSoftware and Data Security – used to protect software and the lossof data filesForm – interface to enter information.Report – summary of information from the database.Network Security – used to protect the network systemCreated by Kim (2013)285

13. Security ThreatMalicious code Virus – a program that can pass in the malicious code toother programs by modifying them Trojan Horse – a program which can perform useful andunexpected action Logic Bomb – that goes off when a specific conditionoccurs Trapdoor or Backdoor – a program that allows someoneto access the program with privileges Worm – a program that copies and spreads itselfthrough a networkChapter 6 : Information Systems1.DefinitionInformation – processed data that are organized, meaningful anduseful.Information System – a set of related components that collects data,processes data and provides information.2.Component ofISData – raw inputs for information system such as number, image,figure or soundHardware – set of physical equipment such as a processor, monitor,keyboard and etc.Hacker – unauthorised person who access (hack) into computersystemNatural and environmental threat – flood, fire, earthquakeSoftware – a set of computer programs that provide step by stepinstructionTheft – steal money, goods, information and resourcesPeople – individuals who use the hardware, software and its outputProcedures – the set of instructions indicating the entire abovecomponent in order to process information and generate theexpected outcome.14. Security Measures Data backup – a program of file duplication. It is necessary sothat they can be recovered in case of an emergencyCryptography – process of hiding information by altering theactual information into different representation.3.Types of ISManagement Information System (MIS) – provide regularinformation about the daily activities of a business to the managerTransaction Processing System (TPS) – record business transactionand keep track of the daily transaction in the database.Antivirus – program that protects a computer against viruses byidentifying and removing any computer viruses found in thecomputer memory, storage or incoming email files.Decision Support System (DSS) – provides managers withinformation to make the best decisions. It also helps to analyseinformation, recognize problems and making decisions.Anti-spyware – program used to remove spywareFirewall – hardware or software which functions in a networkedenvironment to prevent some communications forbidden by thesecurity policies. Screening router Proxy gateway GuardCreated by Kim (2013)Data – raw material that are not organized, and has little value6Executive Information System (EIS) – helps top-level managementsto plan strategies. It is also used to forecast future trends.Expert System (ES) – store knowledge and make logical suggestionsfor the user.27

6. ControlStructureSequence control – linear execution of codes within the program (insequence order)Human aspect – refer to the user and also the intruder of acomputer system.Selection control – execution of codes involving decision makingbased on the situation given. There will be decision symbol presentin the control Organisation self awareness – aware of the people theywork with Repetition control – execution of codes where the codes arerepeated while condition remains true. The arrowhead in the flowchart usually will return the part of the decision to repeat theprocess for true conditionOrganisation user self awareness – provide employee withadequate training and importance of security and control Individual user self awareness – aware of software fromunreliable sources. Do not expose important information7. ProgramdevelopmentphaseProblem analysis phase Programmer reviews and defines the problems Identify the data input, process and output for the programto stranger.Program design phase the programmer generates a top-down design model Programmer writes the pseudo code for the program based onthe top-down design model Programmer draws the flow chart that shows the data flow ofthe program Programmer also produces input and output user interfacesbase on the existing formCoding phase – the process of writing the solution using computerprogramming language. Programmer uses a program development tool which generatesor provides some or all codes.Testing and debugging phase – the process of locating andcorrecting of syntax and logic errors in a program. 3 types of errors1. Syntax error – caused by wrong spelling, case sensitive,punctuation and wrong words in command.2. Logic error – expected output and actual output do nomatch for any set of data.3. Run-time error – occurs while the program is running orexecuting.15. SecurityProceduresData Protection Backup files Detect virus and do cleanup Warn others on virus attackDetecting illegal access to systems Tcpwrappers – control access at the application levelrather than at socket level. Tripwire – detect and report on any changes in thethousands of strategic system files.Preventing illegal access to systemPreventing illegal access to rootPatch – small updates to softwareDocumentation phase – the process of written description andpseudo code of computer programs.Created by Kim (2013)267

Chapter 2 : Computer Systems4.1. ComputerSystemHardware Software User2. ComputerHardwareInput Devices – texts, graphics, audio, videoData type Integer: whole number (18, 79, 101, -6, -20) Double: Numbers with decimal or contains fractional part (14.1, - 3.5,200.10) String: value that contains a sequence of characters (Ahmad,sekolah) Boolean: consist either True or False value Currency: For currency use (RM, USD, Yen)Storage Devices – Primary (RAM & ROM), Secondary (Magnetic,Flash, Optical, ROM)Processor – the main brain in the system unitSystem Software – Operating System (Linux, Window XP, Mac OS X,Window Vista) & Utility program (Antivirus, File Manager, ScreenSaver, Diagnostic utility)Operators – symbol or notation that tells a computer to perform certainactions or operation Mathematical operators: plus ( ), minus (–), multiply (*), divide (/) Relation operators: equal to ( ), greater than ( ), less than ( ),greater than or equal to ( ), less than or equal to ( ) Logical operators: AND, OR, NOTApplication Software Word Processing – Corel Word Perfect, Microsoft Word,Sun StarOffice Writer Spreadsheet – Corel Quattro Pro, Microsoft Excel,Sun StarOffice Calc Presentation – Corel Presentations, Microsoft PowerPoint,Sun StarOffice Impress Graphics editing – Adobe Photoshop CS2, CorelDraw,Macromedia Freehand, GIMP5.Software Suite – collection of individual program sold as asingle package4. InformationprocessingdiagramConstant – value never change at any time during the course of aprogramVariables – value may change at any time during the course of a programOutput Devices – texts, graphics, audio, animations, video3. ComputerSoftwareBasicelementInputProcessFlow Chart Terminator – shows beginning or end of a programFlow line and arrowhead – shows connect symbols and indicate thesequences of operation.Input / output – shows either an input operation or output operationOutputProcess – shows process to be carried outStorage5. Machine cyclediagramDecision – shows a decision to be ecisionExecuteCreated by Kim (2013)825

Chapter 5 : Programming1.Generations Low Level Programming Languageof1GL (Machine Language) – in binary codes and each statement areprogramming corresponds to one machine actionlanguage2GL (Assembly Language) – human readable notation, using symbolicinstructions codes that are meaning abbreviations or mnemonicsHigh Level Programming Language3GL (Procedural language) – uses a series of English-like words thatare closer to human language to write instructions.Example: PASCAL, FORTRAN, BASIC, COBOL, C, C 6. Datarepresentation7. Character codes ASCII (American Standard Code for Information Interchange) Pronounced as ASK-KEY Most widely used coding system to represent data Used mostly in PC and midrange server. Uses 7 out of 8 bits in the character.EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced as EB-SEE-DIC Primarily used in mainframe computers and high-end server4GL (Non-procedural language) – enables user to access data in adatabase. Limited to a very specific applicationExample : SQL, NOMAD and FOCUSUnicode Support all the world language including Asian Language Example: Chinese, Japanese, Korean Uses 16 bits instead of the usual 8 bit per character5GL (Visual programming / Natural language) – provides a visual orgraphics interface, allows people to interact with computers withoutneeding any specialised knowledgeExample: Prolog and Mercury2.8. Component ofmotherboardProgramming Structured programming (top-down design model) – map out theapproachesoverall program structure into separate subsection from top to bottomExample : Ada, Pascal and FortranObject oriented programming (OOP) – combines data with functionsto create objects. The object has relationships with one another.Example: Smalltalk, Java, Visual Basic, C 3.TranslatorCompiler – execute the program after translates the entire programstatement, if any errors found, it records them in the program-listingfile, it runs faster than interpreterExample: COBOL, FORTRAN, C, C Interpreter – interpret and execute program directly from its sourcewithout compiling it first. Execute in real time when user execute it.Example: BASIC, Logo and SmalltalkAssembler – computer program for translating assembly language intomachine language.Example: MACRO-80 Assembler and Microsoft MASMCreated by Kim (2013)8 bits 1 byte 1 character24Central Processing Unit (CPU) – control the operations of thecomputer. It interpret and carries basic instructions that operate acomputer. It have 2 subcomponent that is Control Unit (CU) andArithmetic Logic Unit (ALU).Expansion Slots – sockets where the circuit board or the adaptercard can be inserted into the motherboard.RAM Slot – slot where computer memory (RAM) is placed on thecomputer’s motherboard.Ports – the point where peripherals attaches to a system unit. Serial port – connect a device to the system unit by transmittingdata one bit at a time. Parallel port – connect devices by transferring informationmore than one bit at a time. Universal Serial Bus (USB) port – socket on a computer orperipheral devices into which a USB cable is plugged in. Canconnect up to 127 different peripherals together with a singleconnector. FireWire port – connect multiple types of devices that requiresfaster data transmission speeds. Can daisy-chain connect up to63 devices to one FireWire port.Connectors – a connector joints a cable to a peripheral.9

9.User InterfaceCommand-line user interface requires user to type commands or press special keys on thekey board to enter data and instructions that instruct theoperating system what to do. It has to be typed one line at atime.9. Screen DesignPrincipleScreen Designhow the multimedia program will look when it is displayed on thecomputer screen.Contrastthe usage of different types of multimedia elementsMenu driven Interface provides menus as means of entering commands.Alignmentthe arrangement of multimedia elements on the screen. For example,graphics or text should be arranged at the most suitable positionGraphical User Interface (GUI) provides interface by means of clicking icon that representcomputer resources.Simplicitythe simple and easy way of presenting the multimedia programProximitythe concept of grouping a similar or related elementEmphasisto creating the focus point on the screenCommand-lineRepetitionrepeating the same texture, colour, size of font and style in themultimedia program.Menu drivenUSER INTERFACE PRINCIPLESUser interface is a way acomputer program communicates with the person who isusing it. There are eight mainprinciples of the user interface.Graphical User Interface (GUI)10. Function ofoperatingsystem1.2.3.4.5.6.7.8.Starting a computer – warm boot, cold bootProving a user interface – Command line, Menu Driven, GUIManaging data and programsManaging memoryConfiguring DevicesCreated by Kim (2013)10Co

Information and Communication Technology (ICT) Chapter 1 : ICT and Society . IBM 370 series - 1964. CDC 7600 and B2500 Integrated circuit begins Use silicon chips – reliable, compact, cheaper . society 6 positive impacts : Faster communication speed

Related Documents:

Afhankelijk van de onderwijsambities en de ICT inzet van de school kan dit zijn; een ICT kartrekker (Professional) een ICT-coördinator (Pionier) een ICT coach (Specialist) De rol van de ICT'er op school is vooral inspireren en adviseren bij een goede inzet van ICT en krijgt hierbij ondersteuning van de Adviseur ICT Onderwijs en .

Het aandeel van de ICT-sector is dus gegroeid. — In 2013 realiseerden Nederlandse ICT-bedrijven een lagere omzet dan in 2012. De krimp bedroeg 1,4 procent. Zowel de ICT-industrie, de ICT-groothandel als de ICT-dienstverlening zagen hun omzet dalen in 2013. — In 2012 zorgden ICT-bedrijven voor 5 procent van de toegevoegde waarde

LIST OF ELECTIVE COURSES Select one course each from Networking and Information Systems 5 NETWORKING ICT 450 Wireless Communication 3 0 3 ICT 452 Mobile Computing 3 0 3 Code Course T P C 1. ICT 453 Computer Network Security 3 0 3 2. ICT 455 Social and Professional Issues in IT 2 1 2 3 ICT 457 Information Systems 3 0 3 4.

obvious. ICT developments have created an 'information society' with consequential new possibilities and challenges in all areas of work and life. This is especially true of ICT work itself. ICT practitioners - skilled and highly skilled ICT staff - are needed to manage business and work processes in both the core ICT

7.3 Children’s use of ICT 64 7.4 Use of ICT to support children’s learning 65 Supporting children’s learning 65 Documenting children’s learning 65 7.5 Use of ICT to communicate with parents, caregivers, and whānau 66 7.6 Staff use of ICT for their own learning 66 7.7 Staff readiness and confidence to use ICT 67

berdasarkan peringkat kesediaan, penggunaan, penerapan dan transformasi. d. Mengenal pasti fokus latihan ICT untuk meningkatkan kompetensi ICT pemimpin sekolah. 1.4 Soalan Kajian 1. Apakah tahap kompetensi ICT dalam kalangan pemimpin sekolah berdasarkan domain Dasar dan Kepimpinan ICT, Pembudayaan ICT organisasi, Pengetahuan dan Kemahiran

worden aangepakt door de huidige ICT-omkadering. Vanuit het onderwijsveld komt de vraag om het statuut van de ICT-coördinator te versterken en de taakomschrijving van de ICT-coördinatoren te actualiseren. Het is de ambitie van de Vlaamse overheid om de taak van de ICT-coördinator breder in te bedden in een teamgerichte ICT-werking van de .

Regelmatig overleg met de ICT-coördinator over alle relevante zaken betreffende ICT. Het eigentijdse onderwijs waarborgen . Dat de veranderingscapaciteit van ICT van de school ook ingezet wordt. In samenspraak met ICT-coördinator en het team een scholingsplan opstellen. Het bewaken van de opbrengsten van de inzet van ICT.