2011年5月24日星期二

School Holiday Project Lower 6

1.4  Information Technology Applications (8 theory periods) 
 1.4.1  Commerce areas  1
Electronic Commerce
Electronic Banking

 1.4.2  Management areas  2
Office Automation
Management Information System
Electronic Government

1.4.3  Education areas  3
E-learning

1.4.4  Manufacturing areas   3
computer aided manufacture, vehicle assembly system 

1.4.5  Transportation areas   4
automatic toll payment system, ticket reservation system 

 1.4.6  Control system and embedded system areas   4
home appliances, patient monitoring system, house control system

1.4.7        Creativity areas   5, 14
computer games, animation, advertisement 
Note: Candidates need not have the specific knowledge of each application type, but should be able to comment logically any proposed application with the use of specific  relevant examples.   
(b)  describe an example of information technology application in each area listed in (a) above from the following aspects: 
 (i)  The purpose of the application 
(ii)  The outcome of the application 
(iii)  The requirements of systems hardware, software, and communication 
(iv)  Input data and methods of inputting data 
(v)  The need for recovery in the event of a system failure 
 (vi)  The interface between the system and its users 
(vii)  The effectiveness of the system in practice 
(viii)  Effects and implications of the application on individuals/organisations/society 

1.5  Security and Privacy (2 theory periods) 
 1.5.1  Security and privacy issues   6, 15
Computer Security
Privacy
Cookies
Electronic profile
Spyware
(a) Privacy law
(b) Utilities software

 1.5.2  Types of security threat     7, 16  
Malicious Codes
a) Virus
b) Trojan Horse
c) Logic Bomb
d) Trapdoor Or Backdoor
e) Worm
Primary Differences Between Worms And viruses
Computer Crimes
Computer Fraud
Copyright Infringement
Computer Theft
Computer Attack
NATURAL AND ENVIRONMENTAL THREATS

 1.5.3  Physical control   8
describe the physical control steps, eg security control, key, smart card, and fire resistance  room, to guarantee the security and reliability of computer systems and data integrity; 

 1.5.4  Procedural control   9, 17
Hiring Procedures
Separate Employee Functions
Restrict System Use
Protect Resources using Authorisation Check
Data Encryption
Monitor System Transaction
Conduct Frequent Audit
Disaster Recovery
Data Backup
Security Measures Training

 1.5.5  Information system control   10
 
 Explanatory notes   
         Candidates should be able to 
(e)  describe the steps of information system control, eg input control, processing control, hardware control, output control, and storage control, to guarantee the security and  reliability of computer systems and data integrity; 
 (f) explain the effects of the failure of physical control, procedural control, and information system control steps. 

1.6  Information Technology Ethics and Issues (2 theory periods)   
 1.6.1  Ethics of the use of information technology   11, 18
Unauthorised Access and Use
Software theft (piracy)
Information Theft
Intellectual property rights
Codes of conduct
Information privacy
Green Computing

 1.6.2  Health issues   12
  (b)  explain the health risks, eg nape pain, eye strain, and repetitive strain injury (RSQ, as a   result of using computers; 
 (c) explain the ergonomics steps to avoid the health risks and increase productivity, eg keyboard design, monitor screen filters, computer tables, and computer chairs; 

1.6.3        Environmental friendly issues   13
Recycling
Importance to People
Energy Star Program
Environmental Importance

没有评论:

发表评论