ict - teacher's guide

Upload: sekolah-portal

Post on 31-May-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 ICT - Teacher's Guide

    1/14

    DRAFT

    INFORMATION AND COMMUNICATION

    TECHNOLOGY

    TEACHERS NOTE

    PUSAT PERKEMBANGAN KURIKULUMKEMENTERIAN PELAJARAN MALAYSIA

    ARAS 4-8, BLOK E9, PUTRAJAYA

    2006

  • 8/14/2019 ICT - Teacher's Guide

    2/14

    DRAFT

    This document comes together with the Learning Modulefor students. You are advised to read this documentbefore getting the students to start with the LearningModule.

    In carrying out activities for topic 2.4 Installation ComputerSystem and 3.4 Setting Network Facilities, DO NOT usethe computers in the computer lab. You are advised tohave a different set of computers for these activities. You

    have to ensure that all the computer components, partsand hardware are available for the students to carry outthe activities found in the module.

    2

  • 8/14/2019 ICT - Teacher's Guide

    3/14

    DRAFT

    References:

    Books

    1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An InformationAge. Complete. Eight Edition.2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering

    Computers 2005 : A Gateway to Information, Course Technology.3. Stallings W. (2003) Cryptography and Network Security: Principles and

    Practices. Third Edition.4. Irv Englander (2000) The Architecture of Computer Hardware and

    Systems Software, An Information Technology Approach: Second Edition.5. Tamara Dean (2000), Network + Guide to Networks, Thomson Course

    Technology

    Websites addresses

    ICT and Society1. Ad-Aware SE Personal ~ http://www.lavasoft.com2. Antivirus ~ http://www.primode.com/glossary.html3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm

    Computer System1. http://www.scsite.com2. http://webopedia.com/3. http://www.microsoft.com/assemble4. http://www.microsoft.com/biossetup5. http://www.grisoft.com6. http://www.pcguide.com

    Computer Networks and Communications

    1. http://www.lanshack.com2. http://www.homenethelp.com

    3. http://www.crossover.asp4. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin

    g.mspx

    3

    http://www.lavasoft.com/http://www.primode.com/glossary.htmlhttp://www.antispywarecoalition.org/definitions.pdfhttp://www.grisoft.com/http://privacy.getnetwise.org/browsinghttp://www.faqs.org/faqs/cryptography-faq/http://www.shodor.org/interactivate/discussions/cipher.htmlhttp://www.signalguard.com/security/encryption.htmhttp://www.scsite.com/http://webopedia.com/http://www.microsoft.com/assemblehttp://www.microsoft.com/biossetuphttp://www.crossover.asp/http://www.crossover.asp/http://www.microsoft.com/biossetuphttp://www.microsoft.com/assemblehttp://webopedia.com/http://www.scsite.com/http://www.signalguard.com/security/encryption.htmhttp://www.shodor.org/interactivate/discussions/cipher.htmlhttp://www.faqs.org/faqs/cryptography-faq/http://privacy.getnetwise.org/browsinghttp://www.grisoft.com/http://www.antispywarecoalition.org/definitions.pdfhttp://www.primode.com/glossary.htmlhttp://www.lavasoft.com/
  • 8/14/2019 ICT - Teacher's Guide

    4/14

    DRAFT

    INFORMATION AND

    COMMUNICATION TECHNOLOGYAND SOCIETY

    1.3 COMPUTER SECURITY

    4

  • 8/14/2019 ICT - Teacher's Guide

    5/14

    DRAFT

    Topic: 1.3 COMPUTER SECURITY1.3.3 Security measures

    At the end of the lesson, students should be able to:

    1.3.3.3 Apply the correct security procedures.

    A. AntivirusB. Anti-SpywareC. CryptographyD. FirewallE. Data backupF. Human aspects

    Individual / group activities

    Before using this module teacher has to ensure the following:

    A. Antivirus

    i. An Antivirus Software must be preinstalled in students personalcomputer.Example: AVG Free Edition software

    ii. Test file for virus check must be copied on the desktop of studentspersonal computer.Example: eicar.com

    iii. AVG Free Edition and Eicar.com is included in Teaching guide CD.

    B. Anti-spywarei. Anti-spyware software must be preinstalled in students personal

    computer.ii. Ad -Aware SE Personal software is included in Teaching guide CD.

    Note on spyware:

    Spyware and adware

    Some vendors or employers use spyware to collect information aboutprogram usage or employees. Internet advertising firms often collectinformation about users Web browsing habits by hiding spyware inadware. Adware is a program that dispkays an online advertisement in a

    5

  • 8/14/2019 ICT - Teacher's Guide

    6/14

    DRAFT

    banner or pop-up windows on Web pages, email, or othe Internetservices.

    How to protect your computer from spyware?

    The best defence against spyware and other unwanted technologies is toprevent them from getting into your computer in the first place. Here aresome steps you can take to stay safe while using the Internet andsoftware programs.

    - Keep security on your computer up to dateo Update security patcheso Security and privacy settings in Internet browsers- Only download programs from web sites you trust.- Beware of the fine print: Read all security warnings, license

    agreements, privacy statements, and opt-in notices with any

    software you download.- Dont be tricked into clicking: You dont have to click OK, Agree,or Cancel to close a window.- Be extra careful with certain types of free programs.- Use available tools to detect and delete spyware.

    o Anti-spyware and antivirus softwareo Personal firewall

    C. Cryptography

    i. The activity on cryptograph will be on paper not computer.ii. This is a group activity.

    NOTE on cryptography

    A process associated with scrambling plaintext (ordinary text, or cleartext)into ciphertext (a process called encryption), then back again (known asdecryption).

    Cryptography concerns itself with four objectives:1) Confidentiality (the information cannot be understood by anyone for

    whom it was unintended)

    2) Integrity (the information cannot be altered in storage or transitbetween sender and intended receiver without the alteration beingdetected)

    3) Non-repudiation (the creator/sender of the information cannot deny ata later stage his or her intentions in the creation or transmission of theinformation)

    4) Authentication (the sender and receiver can confirm each otherwww.stallion.com/html/support/glossary.html

    6

    http://www.google.com/url?sa=X&start=2&oi=define&q=http://www.stallion.com/html/support/glossary.htmlhttp://www.google.com/url?sa=X&start=2&oi=define&q=http://www.stallion.com/html/support/glossary.html
  • 8/14/2019 ICT - Teacher's Guide

    7/14

    DRAFT

    How to calculate

    Encryption algorithm: C = (P + K) mod 26 with K = 3

    To encrypt a letter H :

    1. Substitute the letter H into number.H = 72. Use the algorithm. P = 7, K = 3

    C = (P + K) mod 26= (7 + 3) mod 26= 10 mod 26

    = 10

    mod = balance ofdivision

    3. Convert the number 10 into letter.10 = K

    Decryption algorithm: P = (C K) mod 26 with K = 3

    To decrypt the letter K:1. Substitute the letter K into number.

    K = 102. Use the algorithm. C = 10, K = 3

    P = (C K) mod 26= (10 3) mod 26= 7 mod 26

    = 7

    3. Convert the number 10 into letter.7 = H

    7

  • 8/14/2019 ICT - Teacher's Guide

    8/14

    DRAFT

    D. Firewall

    i. Ensure the windows firewall is disabled in students computerbefore they start the module.

    ii. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewallis turned on by default. (However, some computer manufacturersand network administrators might turn it off.)

    iii. You do not have to use Windows Firewall you can install and runany firewall that you choose. Evaluate the features of other firewallsand then decide which firewall best meets your needs. If youchoose to install and run another firewall, turn off Windows Firewall.

    iv. As enrichment, you can ask the students to disable the firewall andsurf the Internet. Then, try surfing the Internet again but this timewith the firewall enabled. Ask students to observe any differences?Normally the firewall will block the download and upload files

    activities if you are using instant messaging like Yahoo messenger.

    E. Data backupi. Provide students with a blank diskette or a floppy disk.ii. Make sure My document folder is on the desktop.iii. Save a file or document in My Documents folder.

    F. Human Aspect

    Note on security risk generally done by human.

    Computers are exposed to several types of security risks .

    Security Risks Descriptions

    Unauthorizedaccess and use

    Unauthorized access - the use of a computer ornetwork without permission.

    Unauthorized use the use of a computer or its datafor unapproved or possibly illegal activities.

    Hardware Theftand Vandalism

    Hardware theft the act of stealing computerequipment.

    Hardware vandalism the act of destroying computer

    equipment.Identity Theft When someone steals personal or confidential

    information.Software Theft When someone

    steals software media

    intentionally erases programs illegally copies a program

    8

  • 8/14/2019 ICT - Teacher's Guide

    9/14

    DRAFT

    How to protect your computer from perpetrators?

    User may take several measures to help protect computer from perpetrators.

    Security Risks Safeguards

    Unauthorizedaccess and use

    Company should have a written acceptable use policy(AUP) that outlines the computer activities for whichcomputer and network may and may not be used.

    Users should be identified and authenticated.

    Users should disable file and printer sharing on yourInternet connection.

    Hardware Theftand Vandalism

    Users should have common sense and a constantawareness of the risk.

    Organisations should implement physical accesscontrol (locked doors, windows and equipment).

    Computers use passwords, possessed objects and

    biometrics.Software Theft Organisations should keep original software boxes and

    media in a secured location.

    Manufacturers should issue users license agreementto protect from software piracy

    Identity Theft Organisations should implement user identification andauthentication controls.

    Oganisations use a variety of encryption techniques tokeep data secured and private.

    9

  • 8/14/2019 ICT - Teacher's Guide

    10/14

    DRAFT

    COMPUTER SYSTEM2.4 Installation

    10

  • 8/14/2019 ICT - Teacher's Guide

    11/14

    DRAFT

    Topic: 2.4 Installation

    2.4.1 Personal Computer (PC) Assembling

    2.4.2 Hard Disk Partitioning and Formatting

    2.4.3 Software Installation

    At the end of the lesson, students should be able to:

    2.4.3.1 Assemble the parts of a PC correctly2.4.3.2 Participate in assembling the parts of a PC correctly2.4.3.3 Display cooperation in assembling the parts of a PC

    correctly2.4.3.4 Format and partition the hard disk2.4.3.5 Install operating system, applications software and utility

    programs

    ACTIVITIES (Group activity)

    1. Ensure all components are available by using the checklist below. Students

    copy is in the module.

    2. Do not use the computers in the computer lab. Buy a different set or use

    other computers in the school.

    3. Teacher has to demonstrate first.

    4. It is advisable to wear an anti-static wrist strap that is properly grounded.

    5. Encourage students to handle all the components with great care.

    11

  • 8/14/2019 ICT - Teacher's Guide

    12/14

    DRAFT

    Checklist

    No. Components Tick () ifavailable

    1 CPU casing and powersupply

    2 CPU chip3 Motherboard4 Hard disk5 Floppy disk drive6 CD Rom drive7 Cables

    o IDE cableo floppy cableo audio cable

    8 Cardso modem cardo display cardo sound cardo network card

    (not needed if all devicesare integrated on-board)

    9 RAM chips10 Mouse11 Speakers12 Keyboard

    12

  • 8/14/2019 ICT - Teacher's Guide

    13/14

    DRAFT

    COMPUTER NETWORKS AND

    COMMUNICATIONS

    3.4 SETTING NETWORK FACILITIES

    MODULE

    13

  • 8/14/2019 ICT - Teacher's Guide

    14/14