You are on page 1of 9

Information & Communication Technology

LA1 ICT & Society

LEARNING AREA 1 ICT & SOCIETY Information refers to the knowledge obtained from reading, investigation, study or research. Communication is an act of transmitting messages. It is a process here!y information is e"changed !et een individuals using sym!ols, signs or ver!al interactions. Technology is the use of scientific knowledge, e"perience and resources to create processes and products that fulfill human needs. Information an Communication Technology !ICT" ICT is the technology required for information processing, in particular, the use electronics computers, communication devices and application software to convert, store, protect, process, transmit and retrieve information from any here, anytime. #e$cri%e the %rief e&olution of com'uter$ T#C$%&L&'( TI)#LI%# *+,, -C ./ The Sumerians developed cuneiform riting In 1+,, -C ./ The 0hoenicians developed the alphabet In 1,+ -C ./ Tsai Lun of China invented paper. In 11+1 ./ Creation of a printing machine. In 123* ./ Telegraph line as invented. In 1425 ./ Telephone as introduced. In 136+ ./ Television as introduced. In 1311 ./ Computer as created. In 13+4 ./ Photocopier machine as introduced. In 135* ./ The Communication satellite as introduced. In 1353 ./ The first Internet 7no n as ARPA !T as introduced. (ir$t generation com'uter$!1)*+,1)-." "acuum tubes as introduces, is an electronic tu!e made of glass used as computer components to store and process data. ! IAC is first generation computer that contains eights of *, tons, 14,,, vacuum tu!es, *,/+, foot space and 15,,, atts of po er. Secon generation com'uter$!1)-.,1)./# Transistors replace vacuum tu!es. Transistors are small devices that transfer electronic signal across resistor. Transistor do not produced lots of heats and use less power also faster, cheaper and smaller than vacuum tu!es. Thir generation com'uter$!1).*,1)01" Integrated circuits $IC# replaced transistor. An IC is a complete electronic circuit on a small chip made of silicone% IC as reliable, compact and chea'er than transistors. &ourth generation computers$'()'*present# +icroprocessor as introduced, from thousand of integrated circuits change onto single silicone chip. The Intel 1,,1 chip developed in 1321, located all the components of the computer from the central processing units and memory to input8output controls on a single

Information & Communication Technology

LA1 ICT & Society

chip. Computer is ',, times smaller than #%IAC computer in first generation.

(ifth generation com'uter!'re$ent %eyon " 1ased on artificial intelligence are still in development though there are some applications such as voice recognition that are !eing used today. ICT in E&ery ay Life2 E ucation3 1an4ing3 In u$try an Commerce 1.1.6.1 List the usage of ICT in everyday life. a5 E ucation Teachers use computers to research for teaching materials, participate in online forums and online conferences . -tudents use the computers as a reference tool and !ro se the Internet . Researchers use computers to collect and process data. -chool administrators use computers for administrative purposes to ma7e sure that the entire operation runs smoothly. %5 1an4ing !lectronic .anking -ervices. Automated Teller )achine 9AT):,Che;ue <eposit,#lectronic =und Tranfer, <irect <eposit, 0ay !y phone system, 0ersonal computer 8 internet !an7ing. Cu$tomer$ can ma7e any transactions at the 61 hour service centres or via online. 1u$ine$$men using the online services , access company accounts for loan applications, !usiness transactions and update their cash flo at any time. 1an4 a mini$trator$ can oversee the entire !an7ing activities such as reconciliations, inter/!ranch transactions 9I-T:, telegraphic transfer and others !y referring to the !an7ing system. c5 In u$try Computers are used to facilitate production planning and control systems Computers help /orkers operate machines. Computers help Researchers to analyse and collect research data for future reference. Administrators use computers to oversee and control the entire operations in the factory. 5 E,Commerce Computer ma7es buying and selling activities easier, more efficient and faster. Customers use computers online ith suppliers to purchase products. -uppliers 7eep trac7 of their transactions. All products are !ar coded and can !e read !y the computer scanner to help in determining prices and managing inventory. !mployees use computers and telephones to communicate ith their customers for any en;uiries. 1.1.6.6 State the differences !et een computeri>ed and non/computeri>ed systems. -A%@I%' -#=&?# ICT -an7ing as done manually !y ta7ing deposits directly Transactions can only !e made A=T#? ICT Transactions are done !y computers Transaction can !e done at

Information & Communication Technology

LA1 ICT & Society

during working hours Takes time to approve any loan applications I%<AST?( #/C&))#?C# Production as slow !ecause done manually and depended on human la!our Trading using the barter system and currency. Advertisement as in the form of word of mouth, !ill!oards and printed flyers. Trading e"tremely slo , late and e"pensive. Teachers use Chal7 and tal7 for teaching ,forums and conferences

anytime and place &ast . online services, phone !an7ing system, credit cards are availa!le Production fast . can !e increased through an all day operation <istri!ution, !uying, selling and servicing products that are done electronically

#<ACATI&%

Teachers use computers to research for teaching materials, participate in online forums and online conferences

1.1.6.* State the impact of ICT on society. 6o$iti&e im'act$ a. =aster communication speed !. Lo er communication cost c. Can share opinions and information d. 0aperless environment e. Information and communication !orderless through internet. Negati&e im'act$ a. Can !e negative !ecause it courage people to access pornography and violence e! sites. !. Can harm uses for long hours used

CO768TER ET9ICS AN# LEGAL ISS8ES 1.6.1.1 <efinition #efine Com'uter Ethic$3 Co e of Ethic$3 Intellectual 6ro'erty3 6ri&acy3 Com'uter Crime an Cy%er La:5 Com'uter ethic$ is a system of moral standards or values used as a guideline for computer users ethical. Co e of ethic$ is guidelines in ICT that help determine hether a specific computer action is ethical or unethical5 Intellectual 6ro'erty refers to or7s created !y inventors, authors and artists.

Information & Communication Technology

LA1 ICT & Society

6ri&acy refers to the right of individuals and companies to deny or restrict and collection and used of information a!out them. Com'uter Crime is any illegal acts involving computers. Cy%er la: refers to any la s relating to protecting the Internet and other online communication technologies 1.6.1.6 <ifferentiate !et een ethics and la . Ethic$ La: As a guideline to computer users. As a rule to control computer users. #thical !ehavior is Budged !y moral To prevent misuse of computers standards. Computer users are free to follo or ignore Computer users must follo the regulations the code of ethics. and la . %o punishment for anyone ho %& 0A%IS$)#%TS violates ethics. Aniversal, can !e applied any here, <epend on country and state here the all over the orld. crime is committed %ot follo ing ethics are called immoral %ot o!eying la s are called crime 1.6.1.* State the need for intellectual property la s Co'yright$ for material$ Tra emar4$ for %ran i entity 6atent$ for in&ention$ #e$ign for 'ro uct a''earance to e$ta%li$h an $afeguar their intellectual 'ro'erty right$ 1.6.6 0rivacy 1.6.6.1 List ays to protect privacy. 0rivacy can !e protected !y. !a" 6ri&acy la: The privacy la s in )alaysia emphasises on the follo ing. / Security Services to revie the security policy / Security )anagement to protect the resources / Security )echanism to implement the re;uired security services / Security &!Bects, the important entities ithin the system #nvironment !%" 8tilitie$ $oft:are / Install anti/spam program, fire all, anti/spy are and antivirus / 0urchase goods ith cash rather than credit card / Clear your history file hen you are finished !ro sing / =ill in only necessary information on arranty and registration form.

Information & Communication Technology

LA1 ICT & Society

1.6.6.6 State authentication and verification methods8 technologies. Authentication is a process here users verify their identity. Authentication deals ith the pro!lem of determining hether a user should !e allo ed access to a particular system. 7ET9O#S O( A8T9ENTICATION There are t o commonly used authentication methods, call!ac7 system. hich are !iometric device and

1iometric e&ice is a device that translates personal characteristics into a digital code that is compared ith a digital code stored in the data!ase. Call%ac4 $y$tem refers to the chec7ing system that authenticates the user <erification is the act of proving or disproving the correctness of a system to a certain formal specification 7ET9O#S O( <ERI(ICATION 6 methods . 8$er i entification refers to the process of validating the user. 6roce$$e o%=ect refers to something the user has such as identification card, security to7en and cell phone. ith respect

1.6.* Controversial Contents and Control 1.6.*.1 a:List effects of controversial contents of pornography on society. 6ornogra'hy2 !Any form of me ia or material !%oo4$3&i eo3'hoto$" that $ho: erotic %eha&ior an inten e to cau$e $e;ual e;citement5" can lead to criminal acts such as e"ploitation of omen and children can lead to se"ual addiction or perversion can develop lo moral value to ards other men, omen or children can erode good religious, cultural and social !eliefs and !ehavior Slan er 2! I$ a fal$e $'o4en $tatement a%out $omeone3 inten e to amage hi$ re'utation5" can develop into a society that disregards honesty and truth can develop !ad ha!it of spreading untruths and rumors can lead to unnecessary argument can cause people to have negative attitudes to ards another person

1.6.*.6 <escri!e the process of filtering to control access to controversial contents

Information & Communication Technology

LA1 ICT & Society

Internet (iltering 1. >ey:or %loc4ing. Ases a list of %anne :or or o%=ect$ term$ such as ;;;3 $e;3 an nu e. The filter searches, If found, it ill !loc7ed. 2. Site %loc4ing. Ase soft are to li$t the :e%$ite$ that ill !e !loc7ed !y using soft are. The soft are prevents users from !eing access the e! sites on list. 3. ?e% rating $y$tem. ?e% $ite$ are rating in terms of nudity, se", violence and language. The e! sites rate can !e done !y setting the !ro ser to only accept page ith certain level of ratings. 1.6.1 Computer Crimes

1.6.1.1 #"plain the need for Cy!er La Cy%er la: refers to any la s relating to protecting the Internet and other online communication technologies. #"amples of )alaysian cy!er la s . 0igital -ignature Act '(() Computer Crimes Act '(() Telemedicine Act '(() Communications and +ultimedia Act '((1 0rivate <ata 0rotection -ill #lectronic 'overnment Activities -ill #lectronic Transactions -ill

The needs of cy!er la are i. Integrity and security Information ii. Legal status of online transactions iii. 0rivacy and confidentially of information iv. Intellectual property rights v. Security of government <ata

1.6.1.6 #"plain !riefly the computer crimes !elo . Com'uter frau . defined as having an intention to ta7e advantage over or causing loss to other people through the use of computers. #g. e/mail hoa"es, program fraud, investment schemes, sales promotions and claims of e"pertise on certain fields. Co'yright infringement . defined as a &iolation of the right$ $ecure !y a copyright. #g. illegal copy or reproduction of copyrights material !y the !lac7 mar7et group. Com'uter theft . defined as the unauthori@e u$e of another 'er$onA$ 'ro'erty :ith the intention to eny the o:ner the rightful possession of that property or its use.

Information & Communication Technology

LA1 ICT & Society

#"amples. transfer of payments to the rong accounts get online materials ith no cost tap into data transmission lines on data!ase at no cost divert goods to the rong destination

Com'uter attac4 . defined as any acti&itie$ ta4en to i$ru't the eBui'ment of com'uter $y$tem$, change processing control or corrupt stored data. #g. 6hy$ical attac4 that disrupt the computer facility or its transmission lines. An electronic attac4 that uses the po er of electromagnetic energy to overload computer circuitry. a com'uter net:or4 attac4 that uses a malicious code to e"ploit a ea7ness in soft are, or in the computer security practices of a computer user To'ic 15/ / Computer Security

1.*.1 <efinition 15/5151 #efine Com'uter $ecurity5 Computers security means protecting our computer systems and the information they contains against un anted access, damage, destruction or modification. 1. 2ardware security 2. -oftware security3data security 3. etwork security 1.*.6 Security Threats 7aliciou$ co e: known as a rouge program. It is a treat to computing assets by causing undesired effects in the programmers part. The effect cause by agent, with 1.*.6.1 #"plain !riefly the different threats to computer security. the intention to cause damage. The agent for malicious code is the writer of the code, or any person who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others. 9ac4ing is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker. ackers are persons who learn about the computer system in detail. They write program referred to as hacks. 2ackers may use a modem or cable to hack the targeted computers% Natural #i$a$ter : mean !omputers are threatened by natural or environmental disaster. "e it at home, stores, offices and also automobiles. #$amples of natural and environmental disasters: %lood,%ire,#arth&uakes, storms and tornados,#$cessive eat,Inade&uate 'ower (upply T o types of Com'uter theft. 1: Computer is used to steal money, goods, information and resources. Stealing of computer, especially note!oo7 and 0<As. 15/5/6: Security 7ea$ure$

Information & Communication Technology

LA1 ICT & Society

1.*.*.1 Select the appropriate security measures to overcome the identified computer threats. 1" ANTI<IR8S An anti&iru$ 'rogram 'rotect$ a com'uter again$t &iru$e$ . #"amples. virus, orm or TroBan horse. C" 987AN AS6ECTS Refer to the u$er an al$o the intru er of a com'uter $y$tem5 #"ample. )ost common pro!lem is the lac7 of achieving a good information security procedure. /" #ATA 1AC>86 #ata 1ac4u' i$ a 'rogram of file u'lication5 Importance information can !e !ac7ups daily, ee7ly or !i ee7ly from a hard dis7. *" (IRE?ALL I$ a 'iece of har :are or $oft:are :hich function$ in a net:or4e en&ironment to 're&ent $ome communication$ for%i en %y the $ecurity 'olicy5 * Types . SCREENING RO8TERS 6RODY GATE?AY G8AR# Simplest Some hat comple" )ost comple" See only add & service See full te"t of See full te"t of communication protocol type communication Screen !ased on Screen !ased on Screens !ased on interpretion of connection rules !ehaviour pro"ies message content -" CRY6TOGRA69Y I$ a 'roce$$ of hi ing information %y altering the actual information into ifferent re're$entation. #"ample, an A6A can !e ritten as IE D. 0LAI%T#CT !ncryption CI0$#?T#CT 0ecryption 0ALI%T#CT -" ANTI,S6Y?ARE I$ a 'rogram 'lace on a com'uter :ithout the u$erA$ 4no:le ge5 It $ecretly collect$ information a%out the u$er5 #"amples popular anti/spy are programs . D Spy!ot Search and <estroy D Ad/a are D Spy are -laster Security Threat$ Security 7ea$ure$ 7ALICIO8S CO#E ANTI<IR8S AN# ANTI,S6Y?ARE 9AC>ING (IRE?ALL NAT8RAL #ISASTER #ATA 1AC>86 T9E(T 987AN AS6ECTS 9AC>ING (IRE?ALL RELATIONS9I6 1ET?EEN SEC8RITY T9REATS AN# SEC8RITY 7EAS8RES Security threat$ may come from in many forms. #"ample. hen someone is invading your account information from a trusted !an7, this act is considered as a security threat. Security mea$ure$ can !e used to prevent this invader from getting the account information. #"ample. the !an7 can use a fire all to prevent unauthorised access to its data!ase.

Information & Communication Technology

LA1 ICT & Society

7ALICIO8S CO#E T9REATS <S5 ANTI<IR8S AN# ANTI,S6Y?ARE Security threats include virus, TroBan horse, logic !om!, trapdoor and !ac7door, and orm. Antivirus and anti/spy are can !e used to protect the computer from the threats !y. limiting connectivity allo ing only authorised media for loading data and soft are enforcing mandatory access controls !loc7ing the virus from the computer program 9AC>ING <S5 (IRE?ALL $ac7ing is an unauthorised access to the computer system done !y a hac7er. Ee can use fire all or cryptography to prevent the hac7er from accessing our computers. A fire all permits limited access to unauthorised users or any activities from the net or7 environment. Cryptography is a process of hiding information !y changing the actual information into different representation, for e"ample, an A0A can !e ritten as 2&F. NAT8RAL #ISASTER <S5 #ATA 1AC>86 The natural and environmental disasters may include. D flood, D fire, D earth;ua7es, D storms , D tornados %atural disasters may threaten a computerGs hard are and soft are easily. Computers are also sensitive to their operating environment such as e"cessive heat or the inade;uacy of po er supply. The !ac7up system is needed to !ac7up all data and applications in the computer. Eith the !ac7up system, data can !e recovered in case of an emergency. T9E(T <S5 987AN AS6ECTS Computer theft can !e of t o 7inds. can !e used to steal money, goods, information and computer resources the actual stealing of computers, especially note!oo7s and 0<As

)easures that can !e ta7en to prevent theft. prevent access !y using loc7s, smart/card or pass ord prevent porta!ility !y restricting the hard are from !eing moved detect and guard all e"its and record any hard are transported

You might also like