• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back

What Is ICT ?

is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

Information

refers to the knowledge obtained from reading, investigation, study or research.

Communication

~is an act of transmitting messages.


~information is exchanged between individuals using symbols, signs or verbal interactions.

Technology

~ is the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs. Technology is vital in communication.

Evolution of computer


(First Generation 1940-1956)

~Characteristics: Huge, slow, expansive and often unreliable 
~Technology: Vacuum Tubes 
~Storage: punched card and magnetic tape. 
~Computer: ENIAC (First digital computer)
~ Computer not using Vacuum Tubes
  1.MARK1( Machanical switches)
  2....

~Characteristics: Huge, slow, expansive and often unreliable


~Technology: Vacuum Tubes


~Storage: punched card and magnetic tape.


~Computer: ENIAC (First digital computer)


~ Computer not using Vacuum Tubes


1.MARK1( Machanical switches)


2. UNIVAC (Universal Automatic Computer)


Disadvantages of using Vacuum Tubes:


a)Vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control


b)The tube burnt out frequently


c)People operating the computer did not know the problem was in the programming machine.

Evolution of computer


(Second Generation 1956-1963)

~Characteristics: Smaller than using vacuum tube, faster, less heat, less energy and more reliable.
~Technology: Transistor 
~Storage: magnetic core

~Characteristics: Smaller than using vacuum tube, faster, less heat, less energy and more reliable.


~Technology: Transistor


~Storage: magnetic core

Evolution of computer


(Third Generation 1964-1971)

~Characteristics: Smaller than using Transistor, compact, reliable and cheaper.
~Hardware Technology: Integrated Circuit (IC) in Silicone chips.
~Storage: Microchips (RAM 256 B to 1KB)
~Computer:  IBM370, CDC7600 and B2500
~Software Technology: 
...

~Characteristics: Smaller than using Transistor, compact, reliable and cheaper.



~Hardware Technology: Integrated Circuit (IC) in Silicone chips.



~Storage: Microchips (RAM 256 B to 1KB)



~Computer: IBM370, CDC7600 and B2500



~Software Technology:


o More sophisticated


o Several programs run at the same time


o Sharing computer resources


o Support interactive processing.

Evolution of computer


(Fourth Generation 1971-present)

~Characteristics: 100 times smaller than ENIAC, faster, reliable and cheaper.
~Hardware Technology: 
  #Large-Scale Integrated Circuit (LSI) 
     first microprocessor by Intel (1971)
  #silicone chips and 
  #Very Large-Scale Integrated C...

~Characteristics: 100 times smaller than ENIAC, faster, reliable and cheaper.



~Hardware Technology:


#Large-Scale Integrated Circuit (LSI)


first microprocessor by Intel (1971)


#silicone chips and


#Very Large-Scale Integrated Circuit (VLSI)


~Storage: Microchips, magnetic disc



~Computer: IBM PC (1981), Apple Macintosh(1976), DELL, ACER



~Software Technology: software industry boomed (Microsoft)

Evolution of computer


(Fifth Generation -present & beyond)

~Characteristics: 100 times smaller than ENIAC, faster, reliable and cheaper.


~Hardware Technology: silicone chips, processor, robotic, virtual reality, intelligent systems and program which translate language.



~Storage: Microchips, magnetic disc



~Computer:


Mobile Computer, Artificial Intelligent (AI) Computer.

Usage of ICT in Daily Life


( Education Sector)

i) ICT can offer enhanced learning, interactive experiences and cognitive development.


ii) Benefit the:


(1) Teacher use computers to research for teaching materials, participate in online forums and online conference as well as to aid their teaching.


(2) Students use the computers as a reference tool. They use computer to browse the internet to look for information.


(3) Researchers use computer to collect and process data.


(4) School administrators use computer for administrative purposes to make sure that the entire operation runs smoothly.

Usage of ICT in Daily Life


( Banking Sector)

i) Electronic Banking Services’- 24 hour services, example: ATM, Cheque Deposit Machine, Electronic Fund Transfer, direct deposit Machine, pay by phone system, Personal computer banking or internet online banking.



ii) Benefit the:


(1) Customers can make any transaction at the 24 hour service centres or via online.


(2) Businessmen can save their time by using the online services offered by bank. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.


(3) Bank administrators can oversee the entire banking activities such as reconciliation, inter-branch transaction (IBT), telegraphic transfer and others by referring to the banking system.

Usage of ICT in Daily Life


(Industry Sector)

i) Computer are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector.


ii) Benefit the:


(1) Workers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.


(2) Researchers use computer to analyse and collect research data for future reference.


(3) Administrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

Usage of ICT in Daily Life


(Business Sector)

i) E-commerce helps in booting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computer, internet and shared software are needed.


ii) Benefit the:


(1) Customers use computer to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.


(2) Suppliers use computer to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining price and managing inventory.


(3) Employees use computers and telephone to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.

Computerised vs Non-Computerised

The Impact Of ICT On Society

a) Speed- it provide faster speed in communication.


b) Cost- lower communication cost.


c) Reliability- Reliable mode of communication.


d) Sharing- Effective information sharing.


e) Paperless environment- Encourage paperless environment.


f) Borderless- Borderless communication.


g) Health problems


h) Social problems

Computer Ethics

is a system of moral standards or values used as a guideline for computer users.

Code of Ethics in computing

means moral guideline to refer to when using the computer and the internet.

Law

is a legal system comprising of rules and principle that govern the affairs of a community and controlled by a political authority.

Differences between ethics and laws

Examples of Unethical Activities

i) Using the office computer to do personal things.


ii) Reading your friend’s e-mail without his or her permission.


iii) Plagiarizing without giving credit to the original author.

Examples of Laws Breaking Activities

i) Sending a computer virus via e-mail.


ii) Hacking into your school’s database to change your examination results.


iii) Selling pirated software in a night market.

Intellectual Property

~refers to works created by inventors, authors and artists.


~These works are unique and have value in the market place.


~Example: Nike, Bata or Adidas shoes are all protected by Intellectual Property rights

4 types of Intellectual Property protection

i) Patent for invention


Utility, design or plant patents that protect inventions and improvements to existing inventions.


ii) Trademarks for brand identity


Words, name, symbols, devices and images that represent products, goods or services.


iii) Designs for product appearance


The design for product appearance cover the whole or a part of a product resulting from the features such as the lines, contours, colours, shape, texture or material of the product itself or its ornamentation.


iv) Copyright for material


Literary and artistic material, music, films, sound recordings and broadcasts, including software and multimedia.

Privacy in IT

~refers to data and information privacy.



~Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

Computer technology threaten our privacy of data

a) Cookies

b) Electronic profile
c) Spyware
d) Spam

Ways to protect privacy in computing

a) Privacy law (in Malaysia)


i) Security Services to review the security policy.


ii) Security management to protect the resources.


iii) Security Mechanism to implement the required security services.


iv) Security Object, the important entities within the system environment.


b) Utilities software


Example: anti-spam program, firewall, anti-spyware and antivirus.

Authentication

~is a process where users verify that they are who they say they are.


~ Authentication is important in order to safeguard against the unauthorized access and use.

2 methods of authentication

i. Biometric devices


~is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database.



ii. Callback system. (Phone Call)


~refers to the checking system that authenticates the user.

Biometric device

1. Fingerprint Recognition


2. Facial Recognition


3. Hand Geometry


4. Iris Scanning


5. Retinal Scanning


6. Signature Verification system

Fingerprint Recognition

Measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.

Measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.

Facial Recognition

Records information of distance between eyes, 
nose, mouth and jaw edges.

Records information of distance between eyes, nose, mouth and jaw edges.

Hand Geometry

Involves the measuring and 
analyzing the shape of hand.

Involves the measuring and analyzing the shape of hand.

Iris Scanning

Analyses the feature that exist in the coloured tissues
 surrounding the pupil.

Analyses the feature that exist in the coloured tissues surrounding the pupil.

Retinal Scanning

Analyses the layer of blood 
vessels at the back of the eye.

Analyses the layer of blood vessels at the back of the eye.

Voice Recognition

Compares live speech with pre-recorded speech.

Compares live speech with pre-recorded speech.

6. Signature Verification system

Recognises the shape of hand written 
signature.

Recognises the shape of hand written signature.

Verification

is the act of proving or disproving the correctness of a system with respect to a certain formal specification.

2 methods of verification

1. User identification


2. Processed Object

User identification

~ refer to the process of validating the user.


~Example:


1.Key in the user name to log-in to a system and the system will verify whether the user in valid or invalid user.


2. Show the exam slip to verify that you are the valid candidate for the exam.


3. Show a passport before departure.

Processed Object

~refers to something (object) the user has, such as identification card, security token and cell phone.


~Example:


1. The policeman will check on the driver’s license to identify the valid driver.


2. Employees have to swipe their security card to enter the building


3. Buy blouses at the mall using a credit card.

Controversial content

~is information that cause disagreement in opinions and cause the disruption of peace because different people or culture will have different views about the contents.

2 controversial contents

a) Pornography is any form of media or material (like books or photographs) that depicts erotic behavior and is intended to cause sexual excitement.




a) Slander is a legal term for false and malicious statement (Meaning knowing that it is false, or “reckless disregard” that it was false) about someone.

Impacts of controversial content on the Malaysian society

Internet filtering

is a process that prevents or blocks access to certain materials on the Internet.

3 Methods in controlling access to the internet (Internet filtering)

a) Keyword blocking


~ uses a list of banned words or objectionable terms.


b) Site blocking


~prevents access to any site on this list ( ‘denial list’ ).



c) Web rating systems


~Web site are rated in terms of nudity, sex, violence and language.

Cyber Law

~Refers to any laws relating to protecting the internet and other online communication technologies.




~Cyber Laws is needed to protect;


a) the integrity and security of information


b) the legal status of online transaction


c) the privacy and confidentiality of information


d) the intellectual property rights


e) security of government data placed on the internet.

Computer crime

~any criminal activities that is related to the use of computers.


~These activities include computer


a) fraud


b) copyright infringement


c) computer theft


d) computer attack.

Computer fraud

~is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basic through the use of computers.


~includes health frauds, scams and hackers.


~Example:


1.email hoaxes,


2.programme fraud,


3.investment schemes,


4.sales promotions


5.claims of expertise on certain fieldsinternet.

Copyright infringement

~is defined as a violation of the rights secured by a copyright.


~includes the illegal downloading and sharing of record music and unauthorized copying of movies online.


~Example:


1. the widespread of illegal downloading activities and sharing of recorded music in MP3 format.


2. unauthorized copying of movies even after the closing down of Napster.

Computer Theft

~is defined as the unauthorized use of another person’s property with the intention to deny the owner the rightful possession of that property or its use.



~Example:


1. transfer of payments to the wrong accounts


2. tap into data transmission lines on database at no cost.


3. divert goods to the wrong destination.

Computer attack

~ defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.


~Example:


1. physical attack that disrupt the computer facility or its transmission lines.


2. an electronic attack that uses the power of electromagnetic energy to overload computer circuitry.


3. a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user.

Computer security

~means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.

3 types of computer security

a.Hardware security


b.Software and data security


c.Network security

Hardware security

~ refers to security measures used to protect the hardware specifically the computer and its related documents.


~ examples:


1. PC-locks,


2. keyboard-locks,


3. smart card


4. biometric devices.

Software and data security

~refers to the security measures used to protect the software and the loss of data files.


~ Example:


1. Protect software


i. activation code


ii. serial number.


2. Protect the loss of data files


i. Disaster Recovery Plan Method. (to store data, program and other important documents in a safe place)

Network security

~ refers to security measure used to protect the network system.


~ Example: firewall

4 Types of Computer Security Threats

a. Malicious code


b. Hacking


c. Natural disaster


d. Theft

Malicious code

~ a rough program.


~ causing undesired effects in the programmer’s part to cause damage.


~ Example:


1. virus


2. Trojan horse


3. logic door


4. trapdoor


5. backdoor


6. worm.

Hacking

~ unauthorised access to the computer system by a hacker.


~Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.

Natural disaster

~ Computer are also threatened by nature or environmental disaster.


~Example :


1. flood


2. fire


3. earthquakes


4. storm


5. tornados


6. Excessive heat


7. inadequate power.

Theft

~2 types of computer theft:


Computer is used to steal money, goods, information and resources


Stealing of computer, especially notebook and PDAs.

Security Measures

~mean the precautionary measures taken to ward off possible danger or damage

6 Types of Security Measures



Data backup

~is a program of file duplication.


~Backups of data applications are necessary so that they can be recovered in case of an emergency.

Cryptography

~is a process of hiding information by altering the actual information into different representation.


~Example: an APA can be written as I?X.


~ depend on a key such as a password like the numbers or a phrase that can be used to encrypt or decrypt a message.


~ ciphertext is the massage after encryption

Anti virus

~ program protect a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files.

Anti Spyware

~ is a program placed on a computer without the user’s knowledge and secretly collects information about the user.



~ Example:


1. Spybot Search and Destroy


2. Ad-aware


3. Spyware Blaster.

Firewall

~is a piece of hardware or software which functions in a networked environment to prevents some communications forbidden by the security policy.

Human Aspects

~refer to the user and also the intruder of a computer system which is one of the hardest aspects to give protection to.

Relationship between Security Threats and Security Measures