ict - teacher's guide
TRANSCRIPT
-
8/14/2019 ICT - Teacher's Guide
1/14
DRAFT
INFORMATION AND COMMUNICATION
TECHNOLOGY
TEACHERS NOTE
PUSAT PERKEMBANGAN KURIKULUMKEMENTERIAN PELAJARAN MALAYSIA
ARAS 4-8, BLOK E9, PUTRAJAYA
2006
-
8/14/2019 ICT - Teacher's Guide
2/14
DRAFT
This document comes together with the Learning Modulefor students. You are advised to read this documentbefore getting the students to start with the LearningModule.
In carrying out activities for topic 2.4 Installation ComputerSystem and 3.4 Setting Network Facilities, DO NOT usethe computers in the computer lab. You are advised tohave a different set of computers for these activities. You
have to ensure that all the computer components, partsand hardware are available for the students to carry outthe activities found in the module.
2
-
8/14/2019 ICT - Teacher's Guide
3/14
DRAFT
References:
Books
1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An InformationAge. Complete. Eight Edition.2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering
Computers 2005 : A Gateway to Information, Course Technology.3. Stallings W. (2003) Cryptography and Network Security: Principles and
Practices. Third Edition.4. Irv Englander (2000) The Architecture of Computer Hardware and
Systems Software, An Information Technology Approach: Second Edition.5. Tamara Dean (2000), Network + Guide to Networks, Thomson Course
Technology
Websites addresses
ICT and Society1. Ad-Aware SE Personal ~ http://www.lavasoft.com2. Antivirus ~ http://www.primode.com/glossary.html3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm
Computer System1. http://www.scsite.com2. http://webopedia.com/3. http://www.microsoft.com/assemble4. http://www.microsoft.com/biossetup5. http://www.grisoft.com6. http://www.pcguide.com
Computer Networks and Communications
1. http://www.lanshack.com2. http://www.homenethelp.com
3. http://www.crossover.asp4. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin
g.mspx
3
http://www.lavasoft.com/http://www.primode.com/glossary.htmlhttp://www.antispywarecoalition.org/definitions.pdfhttp://www.grisoft.com/http://privacy.getnetwise.org/browsinghttp://www.faqs.org/faqs/cryptography-faq/http://www.shodor.org/interactivate/discussions/cipher.htmlhttp://www.signalguard.com/security/encryption.htmhttp://www.scsite.com/http://webopedia.com/http://www.microsoft.com/assemblehttp://www.microsoft.com/biossetuphttp://www.crossover.asp/http://www.crossover.asp/http://www.microsoft.com/biossetuphttp://www.microsoft.com/assemblehttp://webopedia.com/http://www.scsite.com/http://www.signalguard.com/security/encryption.htmhttp://www.shodor.org/interactivate/discussions/cipher.htmlhttp://www.faqs.org/faqs/cryptography-faq/http://privacy.getnetwise.org/browsinghttp://www.grisoft.com/http://www.antispywarecoalition.org/definitions.pdfhttp://www.primode.com/glossary.htmlhttp://www.lavasoft.com/ -
8/14/2019 ICT - Teacher's Guide
4/14
DRAFT
INFORMATION AND
COMMUNICATION TECHNOLOGYAND SOCIETY
1.3 COMPUTER SECURITY
4
-
8/14/2019 ICT - Teacher's Guide
5/14
DRAFT
Topic: 1.3 COMPUTER SECURITY1.3.3 Security measures
At the end of the lesson, students should be able to:
1.3.3.3 Apply the correct security procedures.
A. AntivirusB. Anti-SpywareC. CryptographyD. FirewallE. Data backupF. Human aspects
Individual / group activities
Before using this module teacher has to ensure the following:
A. Antivirus
i. An Antivirus Software must be preinstalled in students personalcomputer.Example: AVG Free Edition software
ii. Test file for virus check must be copied on the desktop of studentspersonal computer.Example: eicar.com
iii. AVG Free Edition and Eicar.com is included in Teaching guide CD.
B. Anti-spywarei. Anti-spyware software must be preinstalled in students personal
computer.ii. Ad -Aware SE Personal software is included in Teaching guide CD.
Note on spyware:
Spyware and adware
Some vendors or employers use spyware to collect information aboutprogram usage or employees. Internet advertising firms often collectinformation about users Web browsing habits by hiding spyware inadware. Adware is a program that dispkays an online advertisement in a
5
-
8/14/2019 ICT - Teacher's Guide
6/14
DRAFT
banner or pop-up windows on Web pages, email, or othe Internetservices.
How to protect your computer from spyware?
The best defence against spyware and other unwanted technologies is toprevent them from getting into your computer in the first place. Here aresome steps you can take to stay safe while using the Internet andsoftware programs.
- Keep security on your computer up to dateo Update security patcheso Security and privacy settings in Internet browsers- Only download programs from web sites you trust.- Beware of the fine print: Read all security warnings, license
agreements, privacy statements, and opt-in notices with any
software you download.- Dont be tricked into clicking: You dont have to click OK, Agree,or Cancel to close a window.- Be extra careful with certain types of free programs.- Use available tools to detect and delete spyware.
o Anti-spyware and antivirus softwareo Personal firewall
C. Cryptography
i. The activity on cryptograph will be on paper not computer.ii. This is a group activity.
NOTE on cryptography
A process associated with scrambling plaintext (ordinary text, or cleartext)into ciphertext (a process called encryption), then back again (known asdecryption).
Cryptography concerns itself with four objectives:1) Confidentiality (the information cannot be understood by anyone for
whom it was unintended)
2) Integrity (the information cannot be altered in storage or transitbetween sender and intended receiver without the alteration beingdetected)
3) Non-repudiation (the creator/sender of the information cannot deny ata later stage his or her intentions in the creation or transmission of theinformation)
4) Authentication (the sender and receiver can confirm each otherwww.stallion.com/html/support/glossary.html
6
http://www.google.com/url?sa=X&start=2&oi=define&q=http://www.stallion.com/html/support/glossary.htmlhttp://www.google.com/url?sa=X&start=2&oi=define&q=http://www.stallion.com/html/support/glossary.html -
8/14/2019 ICT - Teacher's Guide
7/14
DRAFT
How to calculate
Encryption algorithm: C = (P + K) mod 26 with K = 3
To encrypt a letter H :
1. Substitute the letter H into number.H = 72. Use the algorithm. P = 7, K = 3
C = (P + K) mod 26= (7 + 3) mod 26= 10 mod 26
= 10
mod = balance ofdivision
3. Convert the number 10 into letter.10 = K
Decryption algorithm: P = (C K) mod 26 with K = 3
To decrypt the letter K:1. Substitute the letter K into number.
K = 102. Use the algorithm. C = 10, K = 3
P = (C K) mod 26= (10 3) mod 26= 7 mod 26
= 7
3. Convert the number 10 into letter.7 = H
7
-
8/14/2019 ICT - Teacher's Guide
8/14
DRAFT
D. Firewall
i. Ensure the windows firewall is disabled in students computerbefore they start the module.
ii. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewallis turned on by default. (However, some computer manufacturersand network administrators might turn it off.)
iii. You do not have to use Windows Firewall you can install and runany firewall that you choose. Evaluate the features of other firewallsand then decide which firewall best meets your needs. If youchoose to install and run another firewall, turn off Windows Firewall.
iv. As enrichment, you can ask the students to disable the firewall andsurf the Internet. Then, try surfing the Internet again but this timewith the firewall enabled. Ask students to observe any differences?Normally the firewall will block the download and upload files
activities if you are using instant messaging like Yahoo messenger.
E. Data backupi. Provide students with a blank diskette or a floppy disk.ii. Make sure My document folder is on the desktop.iii. Save a file or document in My Documents folder.
F. Human Aspect
Note on security risk generally done by human.
Computers are exposed to several types of security risks .
Security Risks Descriptions
Unauthorizedaccess and use
Unauthorized access - the use of a computer ornetwork without permission.
Unauthorized use the use of a computer or its datafor unapproved or possibly illegal activities.
Hardware Theftand Vandalism
Hardware theft the act of stealing computerequipment.
Hardware vandalism the act of destroying computer
equipment.Identity Theft When someone steals personal or confidential
information.Software Theft When someone
steals software media
intentionally erases programs illegally copies a program
8
-
8/14/2019 ICT - Teacher's Guide
9/14
DRAFT
How to protect your computer from perpetrators?
User may take several measures to help protect computer from perpetrators.
Security Risks Safeguards
Unauthorizedaccess and use
Company should have a written acceptable use policy(AUP) that outlines the computer activities for whichcomputer and network may and may not be used.
Users should be identified and authenticated.
Users should disable file and printer sharing on yourInternet connection.
Hardware Theftand Vandalism
Users should have common sense and a constantawareness of the risk.
Organisations should implement physical accesscontrol (locked doors, windows and equipment).
Computers use passwords, possessed objects and
biometrics.Software Theft Organisations should keep original software boxes and
media in a secured location.
Manufacturers should issue users license agreementto protect from software piracy
Identity Theft Organisations should implement user identification andauthentication controls.
Oganisations use a variety of encryption techniques tokeep data secured and private.
9
-
8/14/2019 ICT - Teacher's Guide
10/14
DRAFT
COMPUTER SYSTEM2.4 Installation
10
-
8/14/2019 ICT - Teacher's Guide
11/14
DRAFT
Topic: 2.4 Installation
2.4.1 Personal Computer (PC) Assembling
2.4.2 Hard Disk Partitioning and Formatting
2.4.3 Software Installation
At the end of the lesson, students should be able to:
2.4.3.1 Assemble the parts of a PC correctly2.4.3.2 Participate in assembling the parts of a PC correctly2.4.3.3 Display cooperation in assembling the parts of a PC
correctly2.4.3.4 Format and partition the hard disk2.4.3.5 Install operating system, applications software and utility
programs
ACTIVITIES (Group activity)
1. Ensure all components are available by using the checklist below. Students
copy is in the module.
2. Do not use the computers in the computer lab. Buy a different set or use
other computers in the school.
3. Teacher has to demonstrate first.
4. It is advisable to wear an anti-static wrist strap that is properly grounded.
5. Encourage students to handle all the components with great care.
11
-
8/14/2019 ICT - Teacher's Guide
12/14
DRAFT
Checklist
No. Components Tick () ifavailable
1 CPU casing and powersupply
2 CPU chip3 Motherboard4 Hard disk5 Floppy disk drive6 CD Rom drive7 Cables
o IDE cableo floppy cableo audio cable
8 Cardso modem cardo display cardo sound cardo network card
(not needed if all devicesare integrated on-board)
9 RAM chips10 Mouse11 Speakers12 Keyboard
12
-
8/14/2019 ICT - Teacher's Guide
13/14
DRAFT
COMPUTER NETWORKS AND
COMMUNICATIONS
3.4 SETTING NETWORK FACILITIES
MODULE
13
-
8/14/2019 ICT - Teacher's Guide
14/14