2011年5月24日星期二

School Holiday Project Lower 6

1.4  Information Technology Applications (8 theory periods) 
 1.4.1  Commerce areas  1
Electronic Commerce
Electronic Banking

 1.4.2  Management areas  2
Office Automation
Management Information System
Electronic Government

1.4.3  Education areas  3
E-learning

1.4.4  Manufacturing areas   3
computer aided manufacture, vehicle assembly system 

1.4.5  Transportation areas   4
automatic toll payment system, ticket reservation system 

 1.4.6  Control system and embedded system areas   4
home appliances, patient monitoring system, house control system

1.4.7        Creativity areas   5, 14
computer games, animation, advertisement 
Note: Candidates need not have the specific knowledge of each application type, but should be able to comment logically any proposed application with the use of specific  relevant examples.   
(b)  describe an example of information technology application in each area listed in (a) above from the following aspects: 
 (i)  The purpose of the application 
(ii)  The outcome of the application 
(iii)  The requirements of systems hardware, software, and communication 
(iv)  Input data and methods of inputting data 
(v)  The need for recovery in the event of a system failure 
 (vi)  The interface between the system and its users 
(vii)  The effectiveness of the system in practice 
(viii)  Effects and implications of the application on individuals/organisations/society 

1.5  Security and Privacy (2 theory periods) 
 1.5.1  Security and privacy issues   6, 15
Computer Security
Privacy
Cookies
Electronic profile
Spyware
(a) Privacy law
(b) Utilities software

 1.5.2  Types of security threat     7, 16  
Malicious Codes
a) Virus
b) Trojan Horse
c) Logic Bomb
d) Trapdoor Or Backdoor
e) Worm
Primary Differences Between Worms And viruses
Computer Crimes
Computer Fraud
Copyright Infringement
Computer Theft
Computer Attack
NATURAL AND ENVIRONMENTAL THREATS

 1.5.3  Physical control   8
describe the physical control steps, eg security control, key, smart card, and fire resistance  room, to guarantee the security and reliability of computer systems and data integrity; 

 1.5.4  Procedural control   9, 17
Hiring Procedures
Separate Employee Functions
Restrict System Use
Protect Resources using Authorisation Check
Data Encryption
Monitor System Transaction
Conduct Frequent Audit
Disaster Recovery
Data Backup
Security Measures Training

 1.5.5  Information system control   10
 
 Explanatory notes   
         Candidates should be able to 
(e)  describe the steps of information system control, eg input control, processing control, hardware control, output control, and storage control, to guarantee the security and  reliability of computer systems and data integrity; 
 (f) explain the effects of the failure of physical control, procedural control, and information system control steps. 

1.6  Information Technology Ethics and Issues (2 theory periods)   
 1.6.1  Ethics of the use of information technology   11, 18
Unauthorised Access and Use
Software theft (piracy)
Information Theft
Intellectual property rights
Codes of conduct
Information privacy
Green Computing

 1.6.2  Health issues   12
  (b)  explain the health risks, eg nape pain, eye strain, and repetitive strain injury (RSQ, as a   result of using computers; 
 (c) explain the ergonomics steps to avoid the health risks and increase productivity, eg keyboard design, monitor screen filters, computer tables, and computer chairs; 

1.6.3        Environmental friendly issues   13
Recycling
Importance to People
Energy Star Program
Environmental Importance

2011年5月8日星期日

Chapter 1.2

1. Information and Communication Technology    (40 theory periods)   

 1.2  Computer Technology  (12 theory periods)
 1.2.1  Data representation 
(a)  understand binary, octal, and hexadecimal systems; 
(b)  express numbers in binary, octal, and hexadecimal; 
(c)  explain methods of data representation in the computer; 
(d)  explain bit, byte, and word; 
(e)  explain the use of codes such as ASCII, BCD, EBCDIC, and Unicode to represent a character set; 

1.2.2  Computer system components 
(f) draw the block diagram of the components of a computer;
(g)  explain the function of each component of a computer system and the relationship between one component and another; 

 1.2.3  Central processing unit and memory 
(h)  understand the functions of the central processing unit (CPU) components: control unit, arithmetic logic unit (ALU), register, and bus; 
 (i)  explain the machine cycle; 

 1.2.4  Secondary storage 
(j)  explain the function of memory; 
 (k)  distinguish the types of memory, eg RAM, ROM, PROM, EPROM, EAROM, SRAM, DRAM, and SDRAM; 
 (l)  distinguish between secondary storage and memory (primary storage);
 (m)  describe the advantages of secondary storage compared to memory; 
 (n)  describe the types of secondary storage, eg diskette, hard disk, optical disk (CD-ROM,    CD-I, CD-R, CD-RW, and DVD-ROM), and magnetic tape; 

1.2.5  Input/output devices 
(o)  explain the types and functions of input devices, eg keyboard, mouse, light pen, joystick,   track ball, scanner, touch screen, digital camera, microphone, character reader (MICR,   OMR, OCR), and smart card; 
 (p)  explain the types and functions of output devices, eg screen, loudspeaker, printer, and   plotter; 
 (q)  distinguish the functions of input/output devices; 

 1.2.6  Operating systems 
(r)  explain the functions of operating systems: resource allocation, resource scheduling, memory management, input/output control, interrupt operation, file management, and interface; 
 (s)  recognise the brands of operating systems, eg Windows, MS-DOS, Mac OS, Unix, Linux,   and OS/2, and recognise the computer platform on which the operating system can be   run. 

Chapter 1.1

 1.1  Development of Information Technology  (4 theory periods)  
 1.1.1  Meaning of information technology 
    (a) Data, Information And Knowledge

 1.1.2  Components of information technology 
    (b)  explain the meaning of information technology and the components of information technology; 
 (c)  distinguish the types of computers; 
(d)  distinguish between systems software and applications software; 
(e)  distinguish between copyrighted software, shareware, groupware, freeware, and suite software; 
(f) discuss the requirements and uses of software packages such as word-processing packages, electronic spreadsheets, databases, and graphics packages; 

 1.1.3  Development of information technology 
(g)  describe the development of information technology, ie the development of hardware, software, telecommunication and networking, and the Internet; 
(h)  describe the generations of computer from the first generation to the latest generation; 
(i)  describe the development of systems software and applications software until today; 
(j)  distinguish between stand alone computers, computer networks, and the Internet; 
(k)  distinguish between centralised processing and distributed processing; 
         (1)  distinguish between wired communication and wireless communication; 

 1.1.4  Contributions and motivations of individuals and organisations 
(m) describe the contributions and motivations of individuals and organisations towards the   development of information technology. 
m on which the operating system can be run. 

2011年5月7日星期六

Computing/958 As A Form 6 Elective Subject (Jit Sin Student)

Jit Sin Computing (Form 6)

Starting from 2009, a new elective subject known as Computing/958 will be offered as an elective subject to Lower 6 students.

This subject is not new to the school. It was first offered in the year 2001 and 2002. 80% of those who took the subject obtained grade A in 2002 STPM examination. The subject was not offered from 2003 onwards because of the lack of response from students.

This subject is to be reintroduced in 2008. There is quite a sizable number of Lower 6 students who wish to take up the subject.  However, there was no reply from the state education department on the application from the school. As such it is not introduced this year.

Eventually, the green light from Majlis Peperiksaan Malaysia, MPM came at the end of November 2008.  Hence the subject will be offered to all students who wish to take up the subject as an extra elective subject. Those students who took ICT subject at SPM level in 2008 are encouraged to apply as the two subjects are closely related.

The subject conducted by Mr Tor Peng Chiang (till May 2011). Now this subject conducted by me.

The scored for STPM 2010 : ALL A's

The following is the synopsis of the subject:

1. Information and Communication Technology (Lower 6)
1.1 Development of Information Technology
1.2 Computer Technology
1.3 Communication Technology
1.4 Information Technology Applications
1.5 Security and Privacy
1.6 Information Technology Ethics and Issues


2. Information System Development  (Lower 6)
2.1 Introduction to Systems Analysis and Design
2.2 Planning Phase
2.3 Analysis Phase
2.4 Design Phase
2.5 Implementation Phase
2.6 Maintenance Phase
2.7 Introduction to Databases
2.8 Basic Concept of Database
2.9 Planning and Design of Database System
2.10 Query Language
2.11 Implementation of Database Application System


3. Multimedia  (Upper 6)
3.1 Multimedia Evolution
3.2 Multimedia Technology
3.3 Multimedia Page
3.4 Multimedia in Network
3.5 Multimedia Development

4. Programming   (Upper 6)
4.1 Steps of Problem Solving
4.2 Algorithm Construction
4.3 Standard Algorithms
4.4 Basic Data Types
4.5 Evolution of Programming Languages
4.6 Programming Concepts of C Language
4.7 Declaration
4.8 Operators
4.9 C Language Statements
4.10 Functions
4.11 Data Structure Statements
4.12 File Operation of Type ASClI/Text
4.13 Problem Solving with C Language


Those who wish to know more on the subject may visit the MPM web site at:
http://www.mpm.edu.my/