Scheme of Work Ict f4 2014
Scheme of Work Ict f4 2014
Scheme of Work Ict f4 2014
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETY
MONTH/ WEEK JAN. WEEK 1&2 TOPICS AND SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES
Learners should be able to: 1.1.1 Define Information Technology in general. 1.1.2 Discuss the roles of IT in everyday life: o Education o Banking o Industry o Commerce. 1.2.1 1.2.2 Define Computer Ethics. Identify the Code of Ethics. Define Intellectual Property. o Define Privacy: authorised access - user authentication and verification Login (Personal Identification Numbers (PIN), User Identification, password) Biometrics physical control Controversial contents and control: Pornography Slander Filtering (Example : NetNanny, CyberPatrol, BlockNow)
1. 2.
3.
Students state the definition of Information Technology in general. Group Activity: Discussing the roles of IT in everyday life. Students cite an example of a technology used in every day life. Students adhere the rules and regulations set for the ICT lab.
JAN WEEK 3
Students explain Computer Ethics and Code of Ethics. Students describe Intellectual Property and Privacy. Students carry out research on controversial contents and control. Students discuss computer crime and Security threats. Students carry out research on Cyber Law and its importance.
1.2.3 1.2.4
1.2.1.4 1.2.1.5
1.2.6 Computer crime and Security threats: o Definition : Computer crime Security threats o Examples of computer crimes: o Fraud identity fraud credit card fraud Copyright infringement unauthorized copy unauthorized file sharing Theft: data, information, equipment Attacks: Examples salami attack, virus, worms, hacking JAN WEEK 5 1.2.7 Examples of Security threats o malicious codes: e.g. virus, Trojan horse, worms, spy ware, Phishing o hacking: ethical (hackers) and non-ethical hacking (crackers) o Natural/environmental: e.g. fire and natural disasters o Theft : e.g. physical, data, information 1.2.8 Cyber-law
1.3.1 1.3.2 o o
1.3.1.1
Students discuss the meaning of Computer Security and its measures. Students describe encryption and decryption. Students carry out research on topics: antivirus antti-spyware Firewall Policy and training of computer security
1.3.1.2. 1.3.1.2
1.3.3 encryption and decryption o antivirus o anti-spyware o Firewall o Human aspects : awareness (policy, training) FEB WEEK 2 (Chinese New year) FEB WEEK 3 1.4 Research (8 periods) 1.4.1 1.4.2 1.4.3 1.4.4 Impact of IT on society, Copyright and Piracy from the moral and legal standpoint Lack of security and its effects in industry/economy/ government. Malaysian Cyber-law, electronic government law 1.4.1.1 1.4.1.2
Learners discuss the meaning of Copyright and Piracy. Learners list down the impact of piracy activities from the perspectives of: moral legal
2.3.3
2.3.4
MAY WEEK 1-3 MAY WEEK 4 JUNE WEEK 1 JUNE WEEK 2&3
PC assembling Hard disk partitioning and formatting Software installation: operating system application software utility program
JUNE WEEK 4
JULY WEEK 4
3.1.3
State the importance of network and communication using examples in the students immediate environment. Define types of computer networks Local Area Network (LAN) MAN (Metropolitan Area Network) WAN (Wide Area Network)
3.1.4
Network WAN: A network that spans a relatively large geographical area usually consisting two or more Local-Area Network. Example: The Internet Group activity: Students list out the differences between the three types of computer network Conduct group research from information sources (library, the Internet) on types of network architecture Notes: Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities Conduct group research from information sources (library, the Internet) on types of network topology Students draw simple diagram of the 3 types of network topology
3.1.5 3.1.6
Differentiate between the three types of computer networks Define 2 types of network architecture Client/Server Peer-to-Peer
3.1.7
3.1.8 3.1.9
Differentiate between the three types of network topology Define TCP/IP as the protocol to facilitate communication over computer network
3.1.10
State types of network communication that use TCP/IP Intranet Internet Extranet research
Students list out the differences between the three types of network topology
Conduct group research from information sources (library, the Internet) on TCP/IP
3.1.11
Conduct group research from information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com
AUGUST WEEK 3 Students list down the various network devices Notes: Network Devices: Network Interface Card (Ethernet and Wi-Fi) Modem (Internal and External) Hub, Switch, Router Wireless Access Point
3.2.1
Identify the devices needed to establish a computer network communication for a client/server network organization
3.2.2
Notes: Function of the Network Interface Card: KIV Function of Hub: KIV
AUGUST WEEK 4
3.2.3
Identify various types of physical transmission media/ cables such as Unshielded Twisted Pair(UTP), Shielded Twisted Pair(STP), Coaxial Cable and Fiber Optic Cable Identify various types of wireless transmission media such as infrared, radio wave and satellite
Students list down various types of cables Students list down various types of wireless transmission media
3.2.4
SEPT WEEK 1
3.3.1
Notes: Network Operating System (NOS): An operating system that includes functions for connecting computers and devices into a local-area network (LAN). It has the capabilities to coordinate the activities of multiple computers across a network
3.3.2
State the functions of various client software web browser email client network utilities network file manager
Notes: Examples: Web Browsing: Internet Explorer, Mozilla Firefox and Opera Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora Network Utilities: Ping and Traceroute Network File Manager: Network Neighborhood and My Network Places
SEPT WEEK 3
Configure the workstation to join a Local-Area Network Internet Protocol (IP) Address Subnet Mask Gateway Hostname Activity: Ping the server from the configured workstation
SEPT WEEK 4
3.4.5 3.4.6
Activity: Set up a shared folder Save a file in the shared folder Access the file in the shared folder from other workstations
OCT. WEEK 1
3.5.1
Describe: Mobile Computing (specifications, services, frequencies), or Internet Technology and Services (VOIP, BLOG), or Types of network (PAN, VPN, WLAN, WIMAX)
Activity: Research on the chosen topic Write a short report (350 words) and save the document in the shared folder
( 6 periods ) OCT WEEK 2&3 OCT WEEK 4-5 NOV WEEK 1&2 NOV WEEK 3
FINAL EXAMINATION
ICT ASSESSMENT 3 (PORTFOLIOS) REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPUTILATION