Form 4: Scheme of Work 2012
Form 4: Scheme of Work 2012
Form 4: Scheme of Work 2012
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETY
MONTH/ WEEK JAN. WEEK 1&2 TOPICS AND SCOPE 1.1 Introduction to Information Technology (4 periods) LEARNING OUTCOME Learners should be able to: 1.1.1 Define Information Technology in general. 1.1.2 Discuss the roles of IT in everyday life: o Education o Banking o Industry o Commerce. 1.2.1 1.2.2 1.2.3 (8 periods) 1.2.4 o JAN WEEK 4 (Chinese New Year) 1.2.5 o o o Define Privacy: authorised access - user authentication and verification Login (Personal Identification Numbers (PIN), User Identification, password) Biometrics physical control Controversial contents and control: Pornography Slander Filtering (Example : NetNanny, CyberPatrol, BlockNow) Define Computer Ethics. Identify the Code of Ethics. Define Intellectual Property. 1.2.1.3 1.2.1.4 1.2.1.5 Students carry out research on controversial contents and control. Students discuss computer crime and Security threats. Students carry out research on Cyber Law and its importance. 1. 2. SUGGESTED ACTIVITIES Students state the definition of Information Technology in general. Group Activity: Discussing the roles of IT in everyday life. Students cite an example of a technology used in every day life. Students adhere the rules and regulations set for the ICT lab. Students explain Computer Ethics and Code of Ethics. Students describe Intellectual Property and Privacy.
3.
1.2.1.1 1.2.1.2
1.2.6 Computer crime and Security threats: o Definition : Computer crime Security threats o Examples of computer crimes: o Fraud identity fraud credit card fraud Copyright infringement unauthorized copy unauthorized file sharing Theft: data, information, equipment Attacks: Examples salami attack, virus, worms, hacking 1.2.7 Examples of Security threats o malicious codes: e.g. virus, Trojan horse, worms, spy ware, Phishing o hacking: ethical (hackers) and nonethical hacking (crackers) o Natural/environmental: e.g. fire and natural disasters o Theft : e.g. physical, data, information 1.2.8 Cyber-law 1.3 Computer Security (4 periods) 1.3.1 1.3.2 WEEK 1 o o Define Computer Security State Security measures: data backup cryptography 1.3.1.1 1.3.1.2. Students discuss the meaning of Computer Security and its measures. Students describe encryption and decryption.
FEB
Form 4 Scheme Of Work For ICT 1.3.3 encryption and decryption o antivirus o anti-spyware o Firewall o Human aspects : awareness (policy, training) 1.3.1.2 Students carry out research on topics: antivirus anti-spyware Firewall Policy and training of computer security
1.4.1.1 1.4.1.2
Impact of IT on society, Copyright and Piracy from the moral and legal standpoint Lack of security and its effects in industry/economy/ government. Malaysian Cyber-law, electronic government law
Learners discuss the meaning of Copyright and Piracy. Learners list down the impact of piracy activities from the perspectives of: moral legal
2.1.5 Clock speed measurement: o megahertz (MHz) o gigahertz (GHz) MARCH WEEK 1 MARCH WEEK 2 MARCH WEEK 3&4
APRIL WEEK 1
Form 4 Scheme Of Work For ICT 2.3.2 Application Software: types and usage (word processing, spreadsheet, presentation, graphics) Utility Program: types and usage (file management, antivirus, diagnostic, file compression) Proprietary and open source software
MAY WEEK 1
2.3.3
2.3.4 MAY WEEK 2-4 MAY WEEK 5 JUNE WEEK 1 JUNE WEEK 2&3
PC assembling Hard disk partitioning and formatting Software installation: operating system application software utility program
(6 periods) 3.1.3 State the importance of network and communication using examples in the students immediate environment. Define types of computer networks Local Area Network (LAN) MAN (Metropolitan Area Network) WAN (Wide Area Network)
3.1.4
larger than Local-Area Network WAN: A network that spans a relatively large geographical area usually consisting two or more Local-Area Network. Example: The Internet Group activity: Students list out the differences between the three
Form 4 Scheme Of Work For ICT 3.1.5 3.1.6 Differentiate between the three types of computer networks Define 2 types of network architecture Client/Server Peer-to-Peer
types of computer network Conduct group research from information sources (library, the Internet) on types of network architecture Notes: Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities Conduct group research from information sources (library, the Internet) on types of network topology Students draw simple diagram of the 3 types of network topology
3.1.7
3.1.8
Students list out the differences between the three types of network topology Conduct group research from information sources (library, the Internet) on TCP/IP
3.1.9
Define TCP/IP as the protocol to facilitate communication over computer network State types of network communication that use TCP/IP Intranet Internet Extranet
3.1.10
3.1.11
AUGUST WEEK 3 3.2 Hardware Requirements (8 periods ) 3.2.1
Cooperation in conducting group research Identify the devices needed to establish a computer network communication for a client/server network organization
Conduct group research from information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com
Students list down the various network devices Notes: Network Devices: Network Interface Card (Ethernet and WiFi) Modem (Internal and External) Hub, Switch, Router Wireless Access Point
3.2.2
Notes: Function of the Network Interface Card: KIV Function of Hub: KIV
Students list down various types of cables Students list down various types of wireless transmission media
3.2.4
SEPT WEEK 1
3.3.1
Form 4 Scheme Of Work For ICT (4 periods ) 3.3.2 Name various Network Operating System Software (LAN). It has the capabilities to coordinate the activities of multiple computers across a network Notes: Examples: Windows 2000 Server, Windows NT, LINUX, UNIX Notes: Examples: Web Browsing: Internet Explorer, Mozilla Firefox and Opera Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora Network Utilities: Ping and Trace route Network File Manager: Network Neighborhood and My Network Places
3.3.3
State the functions of various client software web browser email client network utilities network file manager
SEPT WEEK 2 SEPT WEEK 3 SEPT WEEK 4 3.4.1 3.4.2 3.4.3 Install network interface card Setup the driver for the network card Crimp and test UTP cable 3.4.4 Straight cable Crossed cable
Configure the workstation to join a Local-Area Network Internet Protocol (IP) Address Subnet Mask Gateway Hostname
3.4.5
3.4.6
Test the network connection Activity: Ping the server from the configured workstation Activity: Set up a shared folder Save a file in the shared folder Access the file in the shared folder from other workstations
OCT. WEEK 1
3.5.1
Describe: Mobile Computing (specifications, services, frequencies), or Internet Technology and Services (VOIP, BLOG), or Types of network (PAN, VPN, WLAN, WIMAX)
Activity: Research on the chosen topic Write a short report (350 words) and save the document in the shared folder
( 6 periods )
FINAL EXAMINATION
ICT ASSESSMENT 3 (PORTFOLIOS) REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPUTILATION
NOV WEEK 2