You are on page 1of 2

TOC.CW.LA1.AS02.

TABLE OF CONSTRUCT
Construct Aspect Instrument SCORE : : : CRITERIA 1. Locate information from more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation. 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete all FOUR tasks. S02 LA1.S02.1 Impact of ICT on Society Locate and present information on impact of ICT on society Verbal Presentation EVIDENCE NOTE Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc. Choose ONE of the following topics: 1. Copyright and Piracy from Moral and Legal Standpoints. 2. Lack of Security and its Effects on Completed Industry/Economy/ Government. ACF.CW.LA1.S02.1 3. Malaysian Cyber Law, Electronic AND Government Law. a soft copy and/or 4. Phishing hard copy of the 5. Virus (Trojan Horse, Salami presentation. Attack) 6. Hacking 7. Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc.

1. Locate information from more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation.

Completed ACF.CW.LA1.S02.1 AND Choose ONE of the following topics: a soft copy and/or 1. Copyright and Piracy from Moral hard copy of the and Legal Standpoints. presentation. 2. Lack of Security and its Effects on Industry/Economy/ Government. 3. Malaysian Cyber Law, Electronic Government Law. 4. Phishing

TOC.CW.LA1.AS02.1

SCORE

CRITERIA 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete TWO to THREE tasks.

EVIDENCE

NOTE 5. Virus (Trojan Horse, Salami Attack) 6. Hacking 7. Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc.

1. Locate information from more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation. 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete any ONE task.

Choose ONE of the following topics: 1. Copyright and Piracy from Moral and Legal Standpoints. 2. Lack of Security and its Effects on Completed Industry/Economy/ Government. ACF.CW.LA1.S02.1 3. Malaysian Cyber Law, Electronic AND Government Law. a soft copy and/or 4. Phishing hard copy of the 5. Virus (Trojan Horse, Salami presentation. Attack) 6. Hacking 7. Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible