notes ict master

64
Panitia ICT KSAH INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) 1.1.1. 1 Define ICT. ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime. INFORMATION Information refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks. COMMUNICATION Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge. TECHNOLOGY Technology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication. 1.1.1. 2 Describe the brief evolution of computers. COMPUTER GENERATIONS First Generation (1940-1956) The 1 st . generation computer were huge, slow, expensive and often unreliable. In 1946, two Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical Integrator and Computer). It use vacuum tube instead of mechanical switches of the MARK 1. In 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000 addition per seconds. The new invention of hardware were needed with the new computer technology. Among them are vacuum tube, punched card, magnetic tape. Problems: the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control the tubes also burnt out frequently people operating the computer did not know that the problem was in the programming machine SECOND GENERATION (1956-1963) The creation of transistor spark the production of 2 nd . generation. Transistor was small devices use to transfer electronic signals across a resister. Compared to other hardware technology, transistors had many advantages such as: transistors were smaller than vacuum tubes they needed no warm up time 1 fauzi&ghozes@ksah2009

Upload: hz93

Post on 17-Nov-2014

581 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Notes Ict Master

Panitia ICT KSAH

INFORMATION AND COMMUNICATION TECHNOLOGY

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1.1.1.1 Define ICT.

ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.INFORMATIONInformation refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks. COMMUNICATIONCommunication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge. TECHNOLOGYTechnology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication.

1.1.1.2 Describe the brief evolution of computers.

COMPUTER GENERATIONSFirst Generation (1940-1956)The 1st. generation computer were huge, slow, expensive and often unreliable. In 1946, two Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical Integrator and Computer). It use vacuum tube instead of mechanical switches of the MARK 1.In 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000 addition per seconds. The new invention of hardware were needed with the new computer technology. Among them are vacuum tube, punched card, magnetic tape.Problems:

the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control

the tubes also burnt out frequently people operating the computer did not know that the problem was in the programming

machineSECOND GENERATION (1956-1963)The creation of transistor spark the production of 2nd. generation. Transistor was small devices use to transfer electronic signals across a resister. Compared to other hardware technology, transistors had many advantages such as:

transistors were smaller than vacuum tubes they needed no warm up time consumed less energy generated much less heat faster and more reliable

THIRD GENERATION (1964-1971)In the 3rd. generation era, the IBM 370 series were introduced in 1964. It came in several models and sizes. It was used for business and scientific programs. Other computer models introduced were CDC 7600 and B2500.The development of integrated circuit (IC) signal the beginning of the 3 rd. generation. Silicone chips were manufactured in 1961. Then came the IC technology, which had reduced the size and cost of computers. It is a complete electronic circuit on a small chip of silicone which is also known as semi conductor. Other than that, the Magnetic Core Memory was replaced by a

1 fauzi&ghozes@ksah2009

Page 2: Notes Ict Master

Panitia ICT KSAH

device called the microchip. Also the first 256 bit RAM was introduced and it was the basis for development of 1K bit RAM.Advantages:A new concept in this generation was that of a family of computer which allowed computer to be upgraded and expanded as necessary.

Silicone chips were reliable, compact and cheaper. Sold hardware & software separately which created the software industry. customer service industry flourished (reservation and credit checks)

FOURTH GENERATION (1971- PRESENT)The growth of the computer industry developed technologies of computer inventions. There are many types of computer models such as Apple Macintosh, IBM, DELL & ACER.In 1971 Intel created the first microprocessor. In 1976, Steve Jobs built the first Apple computer. Then, in 1981, IBM introduced its first personal computer.During the 4th. generation, hardware technology such as silicone chips, microprocessor and storage devices were invented. A microprocessor is a chip which is developed for computer memory and logic.The microprocessor is a large-scale integrated circuit which contained thousands of transistors. The transistors are capable of performing all of the functions of a computer's CPU.Advantages:

Computers became 100 times smaller than ENIAC the first computer Gain in speed, reliability and storage capacity Personal & software industry boomed

FIFTH GENERATION (PRESENT & BEYOND)The 5th. generation are technologically advance and are still being development to become more efficient. The inventions of new hardware technology have grown rapidly including many other computer devices such as silicone chips, processor, robotics, virtual reality intelligent systems & programs which translate languagesNEW ERA COMPUTERAfter the 5th. generation computer, the technology has become more advanced, modern & sophisticated. The latest invention in are Super Computers, Mainframe Computers, Mini Computers, Personal Computers & Mobile Computers.In the new era of computers, expert system such as teleconferencing & speech-recognition system have been invented as part of communication tools.

1.1.2.1 List the usage of ICT in everyday life.

EDUCATIONIn education, teachers, students, researchers and school administrators benefits from the usage of ICT. Computers offer interactive experiences, enhanced learning, cognitif development & better management.Teachers:~ use computers to search for teaching materials, participate in online forums and online

conferences as well as to aid their teaching.Students:~ use the computers as a reference tool. They use computers to browse the internet to look

for information.Researchers:~ use computers to collect and process data.School Administrators:~ use computers for administrative purposes to make sure that the entire operation runs

smoothly.BANKINGIn the banking, customers, businessman & bank administrator benefits from the usage of ICT.Customers:~ can make any transactions at the 24 hour service centres or via online.These services

allow them to do transaction at anytime they want.Businessman:

2 fauzi&ghozes@ksah2009

Page 3: Notes Ict Master

Panitia ICT KSAH

~ can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.

Bank Administrator:~ can oversee the entire banking activities such as reconciliations, inter-branch transactions

(IBT), telegraphic transfer and others by referring to the banking system.INDUSTRYComputers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT.Workers:~ use machines that are connected to computers to operate. In some productions, robots are

used to take over jobs that are dangerous to the workers. Researchers:~ use computers to analyse and collect research data for future reference. Administrators:~ use computers to oversee the entire operations in the plant or factory to detect specific

errors or defects that occurred in the process.E-COMMERCEE-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.Customers:~ use computers to be connected online with suppliers to purchase products. This method

can save time and cost as they do not have to go to any outlets. Suppliers: ~ use computers to keep track of their transactions. All products are bar coded and can be

read by the computer scanner to help in determining prices and managing inventory.Employees:~ use computers and telephones to communicate with their customers for any enquiries. The

system helps employees to get the latest updates on inventory to be informed to the customers.

OTHER SECTORS:Among other sectors that benefit from the usage of ICT are archiecture, arts, career, goverment, healthcare, home, law enforcement, transportation and travel

1.1.2.2 State the differences between computerised and non-computerised systems.

Before ICT With ICT

EDUCATION

depends strictly on teachers & textbook

no or limited technology in the teaching & learning process

more interesting & interactive experiences

enhanced learning

BANKING SYSTEM

banking was done manually by taking deposits directly

transactions can only be made during working hours

takes time to approve any loan applications

all transactions are done by computers

transaction can be done at anytime and place

online services, phone banking system, credit cards are available

INDUSTRY

Production was slow because everything was done manually and totally depended on human labour.

Computers and telecommunications industry became very popular and profitable since production can be increased through an all day operation.

COMMERCE Trading was made using the barter system and it was then

E-commerce plays an important role in the economic scene. It

3 fauzi&ghozes@ksah2009

Page 4: Notes Ict Master

Panitia ICT KSAH

Before ICT With ICT

later developed into currency. Advertisement was in the form of

word of mouth, billboards and printed flyers.

Trading globally was extremely slow, late and expensive. Traders had to find ways to market local products in the global market.

includes distribution, buying, selling and servicing products that are done electronically

1.1.2.3 State the impact of ICT on society.

1. FASTER COMMUNICATION SPEEDWith the Internet, news or messages are sent via e-mail to anyone efficiently. With the capability and connection speed on the Internet, any information can travel fast and at an instant. It saves time and is inexpensive.

2. LOWER COMMUNICATION COSTUsing the Internet is cost-effective than other modes of communication such as telephone, mailing or courier service. It allows access to large amounts of data at a very low cost. We do not have to pay for any basic services provided by the Internet. The cost of connection is relatively cheap.

3. RELIABLE MODE OF COMMUNICATIONComputers are reliable. Information could be accessed and retrieved from anywhere and at anytime. This makes it a reliable mode of communication.

4. EFFECTIVE SHARING OF INFORMATIONWith ICT, information can be shared all around the world. People can share and exchange opinions, news and information through discussion groups, mailing list and forums. This will contribute to the development of knowledge based society.

5. PAPERLESS ENVIRONMENTICT has created the term paperless environment which means information can be stored & retrieved through the digital medium instead of paper. Online communication via emails, online chat and instant messaging also helps in creating the paperless environment.

6. BORDERLESS COMMUNICATIONInternet has become a borderless sources for services and information. Through the Internet, information and communication can be borderless. It offers fast information retrieval, interactivity, accessibility and versatility. It

7. SOCIAL PROBLEMSThere are some negative effects of ICT. It has created social problems in the society. Nowadays, people tend to choose online communication rather than having real time conversations. People tend to become more individualistic and introvert. Another negative effect of ICT are fraud, identity theft, pornography & hacking. This will result a moral decedent and generate threads to the society.

8. HEALTH PROBLEMSA computer may harm users if they use it for long hours frequently. Computer users are also exposed to bad posture, eyestrain, physical and mental stress. In order to solve the health problems, an ergonomic environment can be introduced.

1.2.1.1Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime & Cyber Law.

1. COMPUTER ETHICSComputer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited.

4 fauzi&ghozes@ksah2009

Page 5: Notes Ict Master

Panitia ICT KSAH

2. CODE OF ETHICSEthics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.

3. INTELLECTUAL PROPERTY Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more.

4. PRIVACYPrivacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

5. COMPUTER CRIMESComputer crimes is defined as any criminal activities that are related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

6. CYBER LAW Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

1.2.1.2 Differentiate between ethics and law.

ETHICS LAW

Guideline: As a guideline to computer users.

Control: As a rule to control computer users.

Moral Standards: Ethical behaviour is judged by moral standards.

Judicial Standards: Law is judged by judicial standards.

Free To Follow: Computer users are free to follow or ignore the code of ethics.

Must Follow: Computer users must follow the regulations and law.

No Punishments: No punishment for anyone who violates ethics.

Punishments: Penalties, imprisonments and other punishments for those who break the law.

Universals: Universal, can be applied anywhere, all over the world

Depends On Country: Depends on country and state where the crime is committed.

Produce Ethical Computer Users: To produce ethical computer users.

Prevent Misusing Of Computers: To prevent misuse of computers.

Immoral: Not honouring computer ethics means ignoring the moral elements (immoral).

Crime: Not honouring the law means committing a crime.

1.2.1.3 State the need for intellectual property laws.

Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.

5 fauzi&ghozes@ksah2009

Page 6: Notes Ict Master

Panitia ICT KSAH

1.2.2.1 List ways to protect privacy.

Privacy can be protected by privacy law and utilities software:(a) Privacy lawThe privacy laws in Malaysia emphasises on the following:

Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment

(b) Utilities softwareExample: anti-spam program, firewall, anti-spyware and antivirus.

1.2.2.2 State authentication & verification methods/ technologies.

Methods of AuthenticationThere are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user.

Methods of Verification

There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.

1.2.3.1 List effects of controversial contents on society:

Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour

Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person

1.2.3.2 Describe the process of filtering to control access to controversial contents.

Internet filtering is a process that prevents or blocks access to certain materials on the Internet. It is a process of controlling the access to the internet by means of filtering software. It is used to prevent children from accessing inappropriate material and to keep employees productive on the Internet. The current preferred method of choice to limit access on the Internet is to filter content either by:

keyword blocking site blocking web rating systems

These methods require software to be installed at a client of server level.

6 fauzi&ghozes@ksah2009

Page 7: Notes Ict Master

Panitia ICT KSAH

1.2.4.1 Explain the need for Cyber Law.

Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

1.2.4.2 Explain briefly the computer crimes below:

Fraud:Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. Computer fraud includes e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.Copyright Infringement:Copyright infringement is defined as a violation of the rights secured by a copyright. It involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. With the current technology, the most perfect copy of the original copy can be downloaded from the internet.Theft:Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Examples of computer theft include:

transfer of payments to the wrong accounts tap into data transmission lines on database at no cost divert goods to the wrong destination

Attacks:Computer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.Computer attack can be in the forms of:

physical attack that disrupt the computer facility or its transmission lines. an electronic attack that uses the power of electromagnetic energy to overload

computer circuitry. a computer network attack that uses a malicious code to exploit a weakness in

software, or in the computer security practices of a computer user.

1.3.1.1 Define computer security.

Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are:

hardware security software security/data security network security

We need to protect our computer from any intruders such as hackers, crackers and script kiddie.

1.3.2.1 Explain briefly the different threats to computer security:

Malicious codeMalicious code is also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The

7 fauzi&ghozes@ksah2009

Page 8: Notes Ict Master

Panitia ICT KSAH

agent for malicious code is the writer of the code who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others. HackingHacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.Natural disasterComputers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters:

Flood Fire Earthquakes, storms and tornados Excessive Heat Inadequate Power Supply

TheftTwo types of computer theft:

1) Computer is used to steal money, goods, information and resources.2) Stealing of computer, especially notebook and PDAs.

1.3.3.2 Apply the correct security procedures.

Data ProtectionWe need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. There are a few ways to protect the information namely:

• make backup files • detect the virus and clean the computer • warn others on virus attacks

Detecting Illegal Access To SystemsThe computer system is able to detect any illegal access to the system by a user who does not have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access (unauthorize) to the system. User's access will be reviewed periodically by computer operations. On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data .Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.Preventing Illegal Access To SystemsComputer systems would not allow any unauthorised users to simply access the system. Ways to prevent illegal access to systems:

Run anlpassword to make password cracking difficult. Run tcpwrappers to check if the name for an ip address can be provided by

DNC Use a callback system to prevent unauthorised use of stolen passwords.

Preventing Illegal Root AccessTo prevent any illegal root access, we should have Sudo (stands for Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser). Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.PatchPatch supplies small updates to software, provided that the source code is available. Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files

8 fauzi&ghozes@ksah2009

Page 9: Notes Ict Master

Panitia ICT KSAH

that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.

1.4.1.1 Locate information from various sources

Informations or study materials are available offline and online. We can search for the information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials for our study.Anyway, the selected materials need to be evaluated in four aspects. They are relevance, reliability/credibility, perspective & update.

1.4.1.2 Describe the impact of ICT on society

The computer has change the society today as much as industrial revolution changed society in 18th and 19th century. People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.Computers help them to do their work faster and more efficient by using the software application that consist of special program for specific task. Home & EducationToday, computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation. Computers for Higher EducationOpen Distance Learning (ODL) or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example of the Open Distance Learning institution is the Open University of Malaysia.BusinessPeople use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions. Computers in BankingIn the banking sector, many financial institutions offer online banking. People can access their financial records from anywhere in the world. One example of online banking is Maybank2u. Most of the packages on banking offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.IndustryBy using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network.Examples of companies using this system are Proton and Perodua.Graphics & MultimediaComputers are crucial in publishing especially in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs. CommunicationA government provides society with direction by making and administering policies. Most government offices or agencies have websites in order to provide citizens with up-to-date or latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:

check information on taxes (www.hasil.org.my) pay parking tickets and check summons (www.jpj.gov.my) register online for IPTA/IPTS application (www.moe.gov.my)

9 fauzi&ghozes@ksah2009

Page 10: Notes Ict Master

Panitia ICT KSAH

Computers in TourismToday, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights and car rentals. They can also purchase ticket online, all payments can be made by using credit card.

Computers in the HealthcareIn the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely:

maintaining patient records monitoring patients’ vital sign assisting doctors, nurses and technicians with medical tests by using computer and

computerised devices . using medical software to help with researching and diagnosing health conditions.

Furthermore, computers and the internet are important sources for people to get all information on medical, nutrition, fitness and other tips from several available websites. The latest development in the medical field is telemedicine which help professional to conduct live conference in separate locations around the globe.ScienceIn the scientific world, computers are used in all fields of science from biology to astronomy to meteorology and others. These are things that can be done by computers, namely:

collecting, analyzing and modelling data serving as medium of communication with colleagues around the world contributing to new inventions or breakthrough in surgery, medicine and treatment imitating functions of the central nervous system, retina of the eye and others by tiny

computers allowing a deaf person to listen through cochlear implant

1.4.1.3 Present results in a clear, concise manner.

A good presentation should contain three well-defined sections, they are:1. Introduction

is at the beginning of the research includes the objectives of the research provides a clear statement on why the study was undertaken includes the limitations/assumptions and analytical techniques

2. Content consists of facts or arguments related to subject matter can be presented in an argument format or just as an overview

3. Conclusion is a review of content (not repetition of content) relates to the statement of objectives in the introduction should not introduce new issues should contain judgment or decision that has been reached

1.4.1.4 Display cooperation in conducting study.

Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. This means it is not enough to just give out orders to people but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.

10 fauzi&ghozes@ksah2009

Page 11: Notes Ict Master

Panitia ICT KSAH

2.1.1.1 Define computer systems.

A computer system is defined as combination of components designed to process data and store files. A computer system consists of four major hardware components; input devices, output devices, processor and storage devices. A computer system requires hardware, software and a user to fully function.

2.1.1.2 State the meaning of input, process, output and storage.

InputInput is any data or instructions that we enter into the computer system for processing. There are four types of input: which are text, graphic, audio and video. Example of input devices are keyboard, light pen, joystick, microphone, mouse, video & digital camera.ProcessThe processing unit controls all activities within the system. The CPU is an example of a processor. It has the same important as the brain to human being. StorageStorage is a location which data, instruction and information are held for future use. It is the physical material that keeps keeps data, instruction and information. There are two types of storage. They are the primary storage and secondary storage. The example of storage devices are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM. OutputOutput is data that has been processed into a useful form, called information. There are four types of output, which are texts, graphics, audio and video. Example of output devices are monitor, printer, speaker and plotter.

2.1.1.3Describe the information processing cycle which includes input, process, output and storage.

InputUsers input data or instruction into the computer system to be process. Input could be either text, graphic, audio or video. Input devices are used by users to input data. Input devices are any electronic device connected to a computer and produces input signals. ProcessData or instruction being input into the computer system is then processed by the CPU which controls all activities within the system. The results of the processed data are then sent to an output device as usable data.A CPU interprets the and carries out the instructions by processing data and controlling the rest of the computer’s components.A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit (ALU). CU’s main function is to direct the CPU to process data by extracting instructions from memory and decodes and executes them. The CU manages a four-step basic operation which is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing: StorageComputer storage is important to help users store programs and data to be used at a later time.It is also useful to keep current data while being processed by the processor until the information is saved in a storage media such as a hard disk or a diskette. Computer storage also stores instructions from a computer program. There are two type of computer storage; primary storage and secondary storage.

11 fauzi&ghozes@ksah2009

Page 12: Notes Ict Master

Panitia ICT KSAH

Primary storage is known as the main memory of a computer, including RAM (Random-Access Memory) and ROM (Read-Only Memory). It is an internal memory (inside the CPU) that can be accessed directly by the processor.Secondary storage an external storage that refers to various ways a computer can store program and data. Many complex functions, such as translators for high-level languages and operating systems are placed in primary storage. Secondary storage is an alternative storage. It is very useful to store programs and data for future use. OutputOutput is the result of data processing activity when it is presented external to the system. The output from a computer can be in a form for use by people, for example, printed or displayed. There are four types of output, which are texts, graphics, audio and video.

2.1.2.1 State the relationship of data representation: bit, byte and character.

BitA bit is the smallest unit of data that the computer can process. Bit is a short for binary digit. A bit is represented by the numbers 1 and 0. These numbers represent the binary system. They correspond to the states of on and off, true and false, or yes and no. All digital data use the binary system to process the information. This information include letters, digits or special character.ByteByte is a unit of information built from bits. One byte is equals to 8 bits. Eight bits that are grouped together as a unit. A byte provides enough different combinations of 0s and 1s to represent 256 individual characters. One byte represents a single character such as the number 3, letter b or a $ symbol. Bits and bytes are the basis for representing all meaningful information and programs on computers.CharacterA byte represents a single character in the computer. One character such as A, 7, 9 and + is eight bits that are grouped together.A byte provides enough different combinations of 0s and 1s to represent 256 individual characters. For example, the capital letter F is represented by the binary code 01000110 that can be understood by the computer system. Eight bits grouped together as a unit are called a byte..

2.1.3.1 Explain the function of ASCII code.

ASCII (American Standard Code for Information Interchange) was established to: achieve compatibility between various types of data processing equipment making it

possible for the components to communicate with each other successfully. enables manufacturers to produce components that are assured to operate correctly in

a computer. make it possible for humans to interact with a computer. It also enables users to

purchase components that are compatible with their computer configurations.

2.1.4.1 State the units of data measurement:

BitA bit is represented by the numbers 1 and 0. They correspond to the states of on and off, true and false, or yes and no.Byte1 byte = 8 bitKilobyte (KB)1 KB = 1024 bytes or 1 KB = 210 bytesMegabyte (MB)1 MB = 1 048 576 bytes or 1 MB = 220 bytesGigabyte (GB)

12 fauzi&ghozes@ksah2009

Page 13: Notes Ict Master

Panitia ICT KSAH

1 GB = 1 073 741 824 bytes 1 GB = 230 bytesTerabyte (TB)1 TB = 1 099 511 627 776 bytes or 1 TB = 240 bytes

Note:1 KB = 1 024 byte1 MB = 1 024 KB = 1 048 576 byte1 GB = 1 024 MB = 1 048 576 KB = 1 073 741 824 byte1 TB = 1 024 GB = 1 048 576 MB = 1 073 741 824 KB = 1 099 511 627 776 byte

2.1.5.1 State the units of clock speed measurement:

Hertz & SecondsA hertz is one cycle per second.Megahertz (MHz)Megahertz (MHz) equals to one million cycles of the system clock. (Mega is a prefix that stands for million. A computer that operates at 933 MHz has 933 million clock cycles in one second.)Gigahertz (GHz)Gigahertz (GHz) equals to one billion cycles of the system clock. In relation with megahertz, 1.0GHz is equivalent to 1000 MHz.Giga is a prefix that stands for billion. GHz is most often used as a measurement of a PC processor chip and power, with bigger numbers meaning more speed and higher price. A microprocessor that runs at 200 GHz executes 200 billion cycles per second. For a 2.4 GHz machine . Its clock rate is 2.4 billion cycles per second..)

2.2.1.1 Identify the input devices used for text, graphic, audio and video.

Input Devices For TextsKeyboard, virtual keyboard (on the screen) & an optical reader (uses a light source to read characters, marks and codes and then converts them into digital data that a computer can process.Input Devices For GraphicsScanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display. Digital camera allows you to take pictures and store the photographed images digitally.Input Devices For AudioAudio input devices are such microphone and digital musical instruments like the Musical Instrument Digital Interface (MIDI) keyboard.Input Devices For VideoClosed-Circuit Television (CCTV) video camera is a type of digital video camera that enables a home or small business user to capture video and still images. A webcam is any video camera that displays its output on a web page. A digital video camera allows you to record full motion and store the captured motion digitally.Pointing DevicesA pointing device is another form of input device. Pointing devices such as a mouse, trackball, graphics tablet and touch screen are used to input spatial data into the computer. (Spatial data refers to data that is continuous and multi-dimensional).

13 fauzi&ghozes@ksah2009

Page 14: Notes Ict Master

Panitia ICT KSAH

2.2.2.1 Identify the output devices used for text, graphic, audio and video

A monitor is an example of an output device that can be used to display text. It can also display graphics and video. It iaccepts video signals from a computer and displays information on its screen.A printer is another example of an output device that can be used to print text, apart from graphics, on mediums such as paper, transparency film or even cloths. A photo printer is a colour printer that produces photo-lab-quality pictures.An image setter produces high quality output compared to an ordinary laser printer. An image setter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.A pair of speakers is an audio output device that generates sound. The headphone is a pair of small speakers placed over the ears and plugged into a port on the sound card. A woofer or subwoofer is used to boost the low bass sound and is connected to the port on the sound card.A Liquid Crystal Display (LCD) projector uses its own light source to project what is displayed on the computer on a wall or projection screen. A digital light processing (DLP) projector uses tiny mirrors to reflect light which can be seen clearly in a well-lit room.

2.2.3.1Identify the location of the central processing unit (CPU), expansion slots, expansion cards, RAM slots, ports and connectors on the motherboard.

Motherboard is the main circuit board which has some electronic components attached to it and others built into it. CPU, expansion slots, expansion cards, RAM slots, ports and connectors are the components on the motherboard.

2.2.4.1 Explain types and functions of:

Primary Storage (RAM, ROM)Primary storage is the main memory in a computer. It stores data and programs that can be accessed directly by the processor. There are two types of primary storage which are RAM (Random-Access Memory) and ROM (Read-Only Memory). RAM is installed inside computers. RAM is also known as a working memory.

RAM: The data in RAM can be read (retrieved) or written (stored). RAM is volatile which means the programs and data in RAM are lost when the

computer is powered off. Computer uses RAM to hold temporary instructions and data needed to complete

tasks. This enables CPU to access instructions and data stored in the memory very quickly.

RAM stores data during and after processing.ROM: ROM is another type of memory permanently stored inside the computer. ROM is non-volatile. It holds the programs and data when the computer is powered off. Programs in ROM have been pre-recorded. It can only be stored by the manufacturer;

once it is done, it cannot be changed. Many complex functions, such as start up operating instructions, translators for high-

level languages & operating systems are placed in ROM memory. All the contents in ROM can be accessed and read but cannot be changed.

ASPECT RAM ROMData and program

Stores during and after processing

Stored by manufacturer

Content Stores information temporarilyStores instructions (Information) permanently

Processing time Very fast, but uses a lot of power Fast, but uses very little powerVolatility Volatile Non-volatile

14 fauzi&ghozes@ksah2009

Page 15: Notes Ict Master

Panitia ICT KSAH

Secondary Storage (magnetic medium optical medium, flash memory)Secondary storage can be divided into magnetic medium, optical medium and flash memory.Magnetic MediumMagnetic medium is a non-volatile storage medium. It can be any type of storage medium that utilizes magnetic patterns to represent information. The devices use disks that are coated with magnetically sensitive material. The examples of magnetic storage are:

magnetic disk such as:o a floppy disk, used for off-line storageo hard disk, used for secondary storage

magnetic tape; including video cassette, audio storage reel-to-reel tape & others.Optical MediumOptical medium is a non-volatile storage media that holds content in digital form that are written and read by a laser. These media include various types of CDs and DVDs. These following forms are often commonly used :

CD, CD-ROM, and DVD: Read only storage, used for distribution of digital information such as music, video and computer programs.

CD-R: Write once storage, the data cannot be erased or written over once it is saved. CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data

that have been saved to be erased and rewritten.The disk capacity of optical media is more compared to magnetic media. Durability is another feature of optical media, they are able to last for up to seven times as long as traditional storage media.Flash MemoryFlash Memory is a solid-state, non-volatile, rewritable memory that functions like RAM and a hard disk drive combined. Flash memory store bits of electronic data in memory cells just like DRAM (Dynamic RAM), but it also works like a hard disk drive that when the power is turned off, the data remains in the memory. Flash memory cards and flash memory sticks are examples of flash memory.Flash memory cards are also used with digital cellular phones, MP3 players, digital video cameras and other portable digital devices. Flash memory is also called USB drives, thumb drives, pen drives or flash drives, are the up-and-coming players in the portable storage market. The advantages of flash memory are, it offers fast reading access times among the secondary storage devices, (though not as fast as RAM) it is durable and requires low voltage. It is also light and small. The disadvantage is, it is more expensive than the magnetic disk of the same capacity.

2.3.1.1 State the various types of OS used on different platforms.

PC Platform Operating SystemsThe examples of operating systems used on PC platforms or IBM compatible computers are:

Disk Operating System (DOS) Microsoft Windows XP

DOS used a command line interface when Microsoft first developed it. Microsoft Windows XP’s operating environment is a Graphical User Interface (GUI). Both are closed source software.Apple Platform Operating SystemsThe operating systems used on Apple platforms are Mac OS & Mac OS X.Mac OS was the first commercially successful graphical user interface. It is a closed source software and are targeted for use with home desktops and workstations.Mac OS X is a multitasking operating system and targeted for use with home desktops, workstations and servers. It also has better security protection compared to Mac OS, for example the integrated firewall utility.Cross-Platform Operating SystemsCross-platforms operating systems are:

UNIX LINUX

UNIX is a multitasking operating system. Some versions of UNIX have a command line interface but most versions of UNIX offer a graphical user interface.

15 fauzi&ghozes@ksah2009

Page 16: Notes Ict Master

Panitia ICT KSAH

Linux is a popular, free, UNIX-like graphical user interface operating system. It is an open source software. Linux provides a great deal of liberty to those that interact with Linux technology. Although Linux runs on many kinds of equipment, it is best known for its support of IBM-Intel PC-based hardware.

2.3.1.2 State the functions of OS.

The main functions of OS are starting a computer providing a user interface managing data & program managing memory configuring devices

Starting the ComputerThe first function of an operating system is to start the computer. This process is called booting. Booting means to load & initialize the operating system. It can happen in two ways: warm boot or cold boot.A warm boot means restarting a computer that is already on. It normally happens after installing a new software or hardware or after an application crashes or stops working.A cold boot means starting a computer that is already off. It happens when we turn on a computer that has been completely powered off.Providing a User InterfaceThis function controls how the user enters data and instruction and how information is displayed. The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface . The user interface typically enables users:

to start an application program to manage disks and files such as formatting, copying and renaming to shut down the computer safely by following the correct procedures

Managing Data & ProgramsWhen we start an application, the CPU loads the application from storage into memory. In the early days, single-tasking operating systems could run only one application at a time. Multitasking operating systems enable users to work with two or more application programs at the same time.Managing MemoryThe computer's operating system is responsible for managing memory such as:

optimizing the use of RAM allocating data & instruction to an area of memory while being processed monitoring the contents of memory releasing data & instructions from being monitored in memory when the process is

doneConfiguring DevicesAnother function of an operating system is handling input and output, as well as enabling communication with input and output devices. Most operating systems come with drivers for popular input and output devices. These drivers install new devices and check whenever there is conflict with these devices.

2.3.1.3 State the different interfaces of OS.

The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface .Command-Line User InterfaceThe command-line user interface requires a user to type commands or press special keys on the keyboard to enter data and instructions that instruct the operating system what to do. It has to be typed one line at a time.It is difficult to use because it requires exact spelling, syntax or a set of rules of entering commands and punctuation.We must observe the complicated rules of syntax that specify exactly what you can type in a given place.

16 fauzi&ghozes@ksah2009

Page 17: Notes Ict Master

Panitia ICT KSAH

This interface also requires memorisation. It is also easy to make a typing mistake. The advantage of command-line interface is, it helps the user to operate the computer quickly after memorizing the keywords and syntax.Menu Driven InterfaceMenu-driven user interface enables the user to avoid memorizing keywords such as copy, paste and syntax. On-screen, menu-driven interface provide menus as means of entering commands. It shows all the options available at a given point in a form of text-based menu. Menu-driven user interfaces are easy to learn.Graphical User Interface (GUI)GUI makes use of the computer’s graphics capabilities to make the operating system and programs easier to use, which is also called ‘user-friendly’. Today GUIs are used to create the desktop that appears after the operating system finishes loading into memory.We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at their desktops. GUI with menus and visual images such as buttons, icons and other graphical objects to issue commands.On the desktop, we can initiate many actions by clicking icons that represent computer resources such as files, programs and network connections. GUI is commonly used and has become a standard.

2.3.2.1State the types of application software (word processing, spreadsheet, presentation, graphic).

Application software is a computer program or a suite of computer programs that performs a particular function for the user. Application software includes all programs that perform specific tasks for user such as word processing, spreadsheet, database, presentation, e-mail and web browsing.

2.3.2.2Describe the uses of application software (word processing, spreadsheet, presentation, graphic).

Usages of Word Processing SoftwareA word processing software allows users to create and manipulate documents containing mostly text and sometimes graphics. It provides the ability to create, check spelling, edit and format a document on the screen before printing it to paper. The software can be used to produce documents such as letters, memos, reports, fax cover sheets, mailing labels, newsletters, and web pages. Examples of word processing software are Microsoft Word, StarOffice Writer, TexMaker and Corel WordPerfect.Usages of Spreadsheet SoftwareSpreadsheet software is an application that allows users to organise and manipulate data in rows and columns. It produces worksheets that require repetitive calculations – budgeting, maintaining a grade book, balancing accounts, tracking investment, calculating loan payments, estimating project costs and preparing financial statements. Examples of spreadsheet software are Microsoft Excel, Corel Quattro Pro and Sun Staroffice Calc.Usages of Presentation SoftwarePresentation software is an application that allows users to create visual aids for presentations to communicate ideas, messages and other information to an audience. Examples of presentation software are Microsoft PowerPoint, StarOffice Impress and CorelDraw.Usages of Graphics SoftwareGraphics software is an application that allows users to work with drawings, photos and pictures. It provides the users the ability of creating, manipulating and printing graphics. Examples of graphics software are Microsoft Paint, Adobe Photoshop, Adobe Illustrator, Corel Painter and Macromedia Fireworks.

2.3.3.1Differentiate between the types and usage of utility programmes (file management, diagnostic and file compression).

17 fauzi&ghozes@ksah2009

Page 18: Notes Ict Master

Panitia ICT KSAH

Utility programs, also known as service programs, perform maintenance-type tasks related to the managing of a computer, its devices, or its programs. They provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software. However they may also be bought separately as external utility programs such as Norton SystemWorks and McAfee Utilities.File ManagerFile manager is the software used to manage files on a disk. It provides functions to delete, copy. move, rename and view files as well as create and manage folders (directories). File manager performs tasks of formatting and copying disks, displaying a list of files on a storage medium, checking the amount of used or free space on a storage medium, organising, copying, renaming, deleting, moving and sorting files and also creating shortcuts.Diagnostic UtilityA diagnostic utility compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems.Information in the report assists technical support staff in remedying any problems.Disk DefragmenterWhen an operating system stores data on a disk, it places the data in the first available sector on the disk. The process of defragmentation is the reorganising of the disk so the files are stored in contiguous sectors. A fragmented disk has many files stored in non-contiguous sectors. Defragmenting reorganises the files so they are located in contiguous sectors, which speeds access time.Data CompressionData compression is a utility that removes redundant elements, gaps and unnecessary data from a computer’s storage space so that less space is required to store or transmit data. With the increasing use of large graphics, sound, and video files, data compression is necessary to reduce the time required to transmit such large files over a network.Compressed files are sometimes called zipped files and it must be unzipped to its original form before being used. Two popular file compression utilities are PKZIP and WinZip.

2.3.4.1 Differentiate between proprietary and open source software.

Proprietary Software Proprietary software is also called closed source software. The closed source software or proprietary software offers a stable system with support if the software fails or malfunctions. Examples of Proprietary Software are Ms-Dos, Mac OS, UNIX & Solaris.Open Source SoftwareOpen source software is not a closed software. It is provided for use, modification and redistribution. Any programmer can make improvements which can result in better quality software. A programmer can download from the Internet for free and modify with suggested improvements. The only qualification is that changes can't be copyrighted.Linux is an example of Open Source Software. Linux is the popular multi-tasking UNIX type operating system. Some version of Linux are command line. Others are GUI. The two most popular GUIs available for Linux are GNOME and KDE.Many application programs, uitlities and plugins have Linux versions including OpenOffice.org, PHP-Nuke,The GIMP, Mozilla, ClamAV, OpenLDAP, Audacity and RedHat.Users can obtain Linux in a variety of ways. Some download it for free from the web. Others purchase it from vendors.The comparision between proprietary and open source software

SOFTWARE PROS CONS

Windows XP (Propriety Software)

runs on a wide range of hardware

has largest market share has many built-in utility

security poblems not efficient as a server OS have to reboot every time a

network configuration is changed

Mac OS X(Propriety Software)

easy to install best Graphical User

Interface (GUI) secure and stable

supports only Apple computers

base hardware more expensive than other platforms

18 fauzi&ghozes@ksah2009

Page 19: Notes Ict Master

Panitia ICT KSAH

SOFTWARE PROS CONS fewer utilities available fewer games than Windows many appications still being

uodated to run wth OS X

Linux(Open Source Software)

runs on a wide range of hardware

has largest number of user interface types

can be used as destop PC OS or server

limited support for games limited commercial

application available can be difficult to learn

2.4.1.1 Assemble the components of a PC.

2.4.1.2 Display cooperation in assembling the components of a PC.

Assemble components.Follow step-by-step installation instructions provided.Test the functionality of the PC.

2.4.2.1 Format and partition the hard disk.

2.4.3.1 Install operating system, application software and utility programs.

2.5.1.1Explain the latest open source OS and application software available in the market.

2.5.2.1 Explain the latest ICT hardware and software

2.5.2.2 Explain pervasive computing.

Pervasive computing means the technology that is gracefully integrated in our everyday life. The user is no longer aware of this embedded technology. Pervasive computing uses web technology, portable devices, wireless communications and nomadic or ubiquitous computing systems. Other terms for pervasive computing are Ubiquitous Computing, Calm Technology, and Things That Think.Pervasive computing devices are not personal computers, but very tiny - even invisible - devices, either mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various consumer goods - all communicating through interconnected networks.Thee xamples of pervasive computing in our daily lives are which is the automatic Touch 'n Go, SmartTAG toll gate & the 3G technology video phone.

19 fauzi&ghozes@ksah2009

Page 20: Notes Ict Master

Panitia ICT KSAH

3.1.1.1 Define computer networks.

Computer network is a system of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras.

Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications. In a network, computers can exchange and share information and resources. A computer network may operate on wired connections or wireless connections.

When two or more networks are linked or connected and are able to communicate with one another using suitable hardware and software, it is called an internetwork.

3.1.1.2 Define communications.

COMMUNICATIONSCommunications is about the transfer of information from a sender, across a distance, to a receiver. Using electricity, radio waves or light, information and data in the form of codes are transmitted through a physical medium such as wire, cable, or even the atmosphere. The information that is transmitted (sent) can be text, voice, sound, video, graphics and images, or a combination of all these, which we call multimedia. We transmit information or data by using two types of signals, namely analog and digital.

3.1.2.1 State the importance of computer networks and communications.

Information is now made easy with the availability of network communications. In a clinic for example, network communications plays an important part in keeping patients’ database for easy retrieval. Unlike in conventional practice, doctors and nurses have to look for a patient’s personal file from hundreds or maybe thousands of records. With network communication, the clinic saves time and manpower. Allocation can be effectively planned.E-BusinessE-business refers to conducting business transactions on the internet, not only limited to buying and selling but also servicing customers and collaborating with business partners.E-business supports many types of business transactions, including online shopping, selling and renting. Users can browse the website and choose from the list of items or services to buy. Payment is usually via credit card.Online EducationWith a network connections, online education is made possible. Students at any location around the world can participate in an online classroom, download tutorial questions and submit their assignments.E-BankingE-banking handles all types of banking transactions like account management, fund transfer and payments primarily over the internet. User can pay bills, check the account balance and transfer money to other parties, using e-banking facilities twenty four hours a day and seven days a week.With e-banking, most of the transactions can be done at home or from the office, thus users save time on traveling and queuing at the bank counters.Long Distance CommunicationLong distance communication is made easy via network availability. Communication is possible via voice, text or video. The cost of having this type of communication is cheaper than making a normal phone call and definitely faster and more effective than corresponding via letters of fax.In business, important decisions can effectively made through video conference meeting.

3.1.3.1 Define types of computer networks:

20 fauzi&ghozes@ksah2009

Page 21: Notes Ict Master

Panitia ICT KSAH

Local Area Network (LAN)A LAN covers a small region of space, typically a single building ~ Eg: within a school lab.Metropolitan Area Network (MAN)A MAN is a collection of LANs with the same geographical area, for instance a city ~ Eg: within a a cityWide Area Network (WAN)A WAN can be a collection of LANs or MANs or the mix of two with a very large geographical area, for instance a country or even beyond the border ~ Eg: between KL and London

3.1.3.2 Differentiate between the three types of computer networks.

LAN is a group of computers and network devices connected together, usually within the same building. It is the smallest network compared to the other two networks. The simplest form of LAN is to connect two computers together. LAN is operated within a limited physical area, such as at home, school, a single building or several buildings. A network which consists of less than 500 interconnected devices across several buildings, is still recognised as a LAN.Inexpensive hardware used in LAN previously include twisted pair, coaxial cables and the higher end is fiber optic or wireless. However, coaxial cables are now being replaced by a higher speed cabling system such as CAT5 using RJ45 connectors.LAN is a very high speed network (from previously 10Mbps) to 100Mbps, which is faster than MAN and WAN.MAN can be defined as a group of computers and network devices connected together within a large physical area. It is a network of computers located at different sites within a large physical area, such as a city. Companies that have several branches within the Kuala Lumpur city such as banks, might find a MAN useful to them.In this case, setting up a MAN across long distances can be best connected using fiber optics. Sometimes, a MAN can be a collection of several LANs within the same city. MAN often acts as a high speed network (although not as fast as a LAN) to allow sharing of regional resources.WANis the largest network of all network types. The Internet is the largest WAN in the world. WAN generally covers large distances such as states, countries or continents.An example in the society using WAN is the banking organisation. Local banks have always maintained their business online by connecting all computers of their branches in the countries. International banks also use WAN to connect their computers all over the world.Actually, WAN is a group of MANs or LANs or the mixture of both networks.A device called a router is needed to connect the MANs and LANs all over a large physical area. A router is a special networking device that connects two or more different networks and keeps data flowing between them.A router makes all the different networks communicate, such as connecting LAN to LAN, LAN to WAN or WAN to WAN. The transmission media in WAN uses the fibre optic cable. WAN is still considered a fast network with speeds 20 – 2000 Kbps, but slower than LAN and MAN.

3.1.4.1 Define two types of network architecture:

Client/ServerA client/server network is a network in which the shared files and applications are stored in the server but network users (clients) can still store files on their individual PCs. A server is a computer that shares information and resources with other computers on a network. A client is a computer which requests services or files from a server computer.

Peer-to-PeerPeer-to-peer network is a network with all the nodes acting as both servers and clients. A PC can access files located on another PC and can also provide files to other PCs. With peer-to-peer network, no server is needed; each computer in the network is called a peer. All computers in the peer-to-peer network has equal responsibilities and capabilities to use the resources available on the network.

21 fauzi&ghozes@ksah2009

Page 22: Notes Ict Master

Panitia ICT KSAH

3.1.5.1 State three types of network topologies:

Bus TopologyA bus topology consists of a single central cable to which all computers and other devices connect. It refers to the main physical pathway or central cable where all other devices are connected to it. All nodes share the backbone to communicate with each other on the network. Sometimes, a bus network has more than one server. Sometimes, a server is not needed on the network. If one of the nodes fails, the bus network would still function as long as the backbone is working.Ring TopologyA ring topology consists of all computers and other devices that are connected in a loop. Ring topology is also known as a ring network. In a ring network each node directly connect to two neighbouring nodes. A server may exist in a ring network, but it will not connect to all the nodes in the network. The server, like other nodes, will only communicate to its two neighbouring nodes.Star TopologyA star topology consists of a central host which acts as the centre, and all nodes connect to the host. The host can be a server, hub or router. In a star network, every node will not connect to the neighbouring nodes. Every node must connect to the host in order to communicate.The host will control the flow of communication in the network. If one of the nodes fails, the star network can still function as long as the host is working.

3.1.5.2 Differentiate between the three types of network topology.

Bus Topology Ring Topology Star Topology

Structure

There is a single central cable (backbone) and all computers and other devices connect to it

All computers and other devices are connected in a circle

There is a central host and all nodes connect to it

Host existenceDepends on network needs

Depends on network needs

Yes

Connection between nodes

It has no connection between the nodes.

Yes No

Host failure Network can still run Network will fail Network will fail

Node failure Network can still run Network will fail Network can still run

Ease of troubleshooting

Difficult. Need to search for the problematic node one by one

Depends on backbone. If there is a backbone, troubleshooting is difficult. If there is no backbone, the focus is on the two nodes not communicating

Depends on the host. It is easier to repair the problematic host. However, if the nodes fail, then each node has to be searched

Ease of adding or removing nodes

Easy Difficult Average

Number of nodes when

Many Limited Limited

22 fauzi&ghozes@ksah2009

Page 23: Notes Ict Master

Panitia ICT KSAH

Bus Topology Ring Topology Star Topology

extending network

3.1.6.1Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol to facilitate communication over computer network.

TCP/IP is the internet communication protocol. It is a standard that sets the rules computers must follow in communicating with each other on a network. Some refer TCP/IP as the Internet Protocol Suite.When you use any applications or programs to access the Internet, these application will use TCP/IP to achieve the task. For example, when you want to surf a network, you will use the internet browser. Your browser then uses TCP/IP to request services from Internet servers. These servers will use TCP/IP to send the web pages you requested back to your browser.

3.1.7.1 Describe the types of network communications technology:

InternetThe Internet is the worldwide, publicly accessible system of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It consists of millions of smaller business, academic, domestic and government networks, which together carry various information and services, such as electronic mail, online chat, and the interlinked Web pages and other documents of the World Wide Web. Internet is one of the uses of communication. Through the Internet, society has access to global information and instant communication.IntranetAn Intranet is an internal network that uses Internet technologies and it is a small version of the Internet that exists within an organisation. It is a private computer network that uses Internet protocols, network connectivity and possibly the public telecommunication system to securely share part of an organisation’s information or operation with its employees.Intranet generally make company information accessible to employees and facilitate working in groups. Simple intranet applications include electronic publishing of organisational materials such as telephone directories, event calendars and job postings.ExtranetAn extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of a business’s information or operations with suppliers, vendors, partners, customers or other businesses.Package shipping companies, for example, allow customers to access their network to print air bills, schedule pickups, and even track shipped packages as the packages travel to their destinations.

3.2.1.1 Identify the devices needed in computer network communication :

  • Network Interface Card (NIC)

  • Wireless Network Interface Card

  • Modem (internal and external)

  • Hub / Switch

  • Router

23 fauzi&ghozes@ksah2009

Page 24: Notes Ict Master

Panitia ICT KSAH

  • Wireless Access Point

3.2.1.2 State the functions of the following:

  • Network Interface Card (NIC)

A Network Interface Card (NIC) is an adapter card or PC card that enables the computer to access the network

  • Wireless Network Interface Card

Wireless Network Interface Card (WNIC) is a network card that provides wireless data transmission

  • Modem (internal and external)

There are two types of modem, internal modem and external modem. An internal modem only works in stand-alone computers. It is built into the computer. An external modem is separated from the computer and is also mobile.

  • Hub / Switch

Hub or switch is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.

  • Router

A router is a communications device that connects multiple computers or other routers together and transmits data to the correct destination

  • Wireless Access Point

A wireless access point is a central communications device that allow computers to transfer data. This device can help information to be transferred wirelessly to other wireless devices or to a wired network. Wireless access point has high quality antennas for optimal signals.

3.2.2.1Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable.

UNSHIELDED TWISTED-PAIR CABLE

The twisted-pair cable is generally a common form of transmission medium. It consists of two wires or conductors twisted together, each with its own plastic insulation.

The twisted wires cancel out electromagnetic interference that can cause, the noise generated by adjacent pairs. Undesired coupling of a signal from one circuit, part of a circuit, or channel, to another. The most common connector used for twisted-pair cable is RJ-45. A wave produced by the interaction of time-varying electric and magnetic fields.

24 fauzi&ghozes@ksah2009

Page 25: Notes Ict Master

Panitia ICT KSAH

Registered Jack-45 (RJ-45) is an eight-wire connector used commonly to connect computers onto Local Area Networks (LAN), especially Ethernets. The Unshielded Twisted-Pair or UTP is the most common twisted-pair cable used in communications.

Cables that consist of pairs of unshielded wire twisted together. It is the most common kind of copper telephone wiring. It has four pairs of colour-coded twisted-pair cables that are covered with a plastic outer jacket.

SHIELDED TWISTED-PAIR CABLE

The Shielded Twisted-Pair or STP is another form of twisted-pair cable. Twisted-pair cable wires that consist of an outer covering or shield. Its four pairs of colour-coded wires are each wrapped in metallic foil, and all four are then collectively wrapped in a layer of metallic braid or foil. Finally, this layer is wrapped with a plastic outer jacket.

COAXIAL CABLE

The coaxial cable, often referred to as ‘coax’, consists of a single copper wire surrounded by at least three layers. They are an insulating material, a woven or braided metal and a plastic outer coating.

This cable is often used as cable television (CATV) network wiring because it can be cabled over longer distances in comparison to the twisted-pair cable.

FIBRE OPTIC CABLE

The fibre optic cable is a networking medium that uses light for data transmission. The intensity of light is increased and decreased to represent binary one and zero. The binary system is a way of counting using just the two numbers 0 and 1.

Its core consists of dozens or hundreds of thin strands of glass or plastic which uses light to transmit signals. Each strand, called an optical fibre, is as thin as a human hair.

3.2.2.2Identify various types of wireless transmission media such as infrared, radio wave and satellite.

WIRELESS TECHNOLOGY

The use of wireless technology as a method of data transport appears very similar to a wired technology. In a wireless media however, signal transmission is unguided and the device communicates without using wires between nodes, usually by relying on radio frequencies instead.

Infrared is used in devices such as the mouse, wireless keyboard and printers. Some manufacturers provide a special port called the IrDA port that allows a wireless keyboard to communicate with a PC. Infrared signals have frequencies between 300 GHz to 400 THz. They are used for short-range communication. Infrared signals have high frequencies and cannot penetrate walls. Due to its short-range communication system, the use of an infrared communication system in one room will not be affected by the use of another system in the next room.

Radio waves are normally omnidirectional. When an antenna transmits radio waves, they are propagated in all directions. This means that the sending and receiving antennas do not have to be aligned. The omnidirectional characteristics of radio waves make them useful for multicasting, in which there is one sender but many receivers. Our AM and FM radio stations, cordless phones and televisions are examples of multicasting.

3.3.1.1 Define Network Operating System.

An operating system is the program that first loads when a computer boots and manages any other software or hardware on the computer. A Network Operating System or known as NOS, has additional functionality that allows it to connect computers and peripherals to a network.

25 fauzi&ghozes@ksah2009

Page 26: Notes Ict Master

Panitia ICT KSAH

A Network Operating System is most frequently used with Local Area Networks and Wide Area Networks, but could also have application to larger network systems.Text String, A NOS is not the same as the networking tools provided by some existing operating systems, Windows XP for instance. NOS is an operating system that has been specifically written to keep networks running at optimal performance.

3.3.1.2 Name various Network Operating System Software.

Windows NT Windows 2000 Server Windows Server 2003 Red Hat Linux

3.3.2.1 State the functions of various client software.

WEB BROWSER

A web browser is a software application that enables a user to display and interact with HTML documents hosted by web servers or held in a file system.Text and images on a web page can contain hyperlinks to other web pages at the same or to different websites.Web browsers allow a user to quickly and easily access information provided on many web pages at many websites by surfing these links.

Web browsers available for personal computers include Microsoft Internet Explorer, Safari, Netscape and Opera. Web browsers are the most commonly used type of Hypertext Transfer Protocol (HTTP) user agent. Although browsers are typically used to access the World Wide Web, they can also be used to access information provided by web servers in private networks or content in file systems.

EMAIL CLIENT

An email client is a computer program that is used to read and send email.

FUNCTIONS OF FILE TRANSFER PROTOCOL (FTP) CLIENT

File Transfer Protocol (FTP) client is used to connect two computers over the Internet so that the user of one computer can transfer files and perform file commands on the other computer.

3.4.1.1 Insert network interface cards (NIC).

3.4.1.2 Install drivers for the NIC.

3.4.2.1 Crimp and test UTP cable

• Straight cable

• Crossed cable

3.4.2.2 Create awareness of the correct way when crimping a cable.

3.4.3.1 Configure the workstation to join a LAN :

  • Internet Protocol (IP) Address

  • Subnet Mask

26 fauzi&ghozes@ksah2009

Page 27: Notes Ict Master

Panitia ICT KSAH

  • Server name

3.4.3.2 Test the network connection.

3.4.4.1 Create a shared folder.

3.5.1.1 Describe

  • Mobile Computing (specifications, services, frequencies)

NOTEBOOK COMPUTER

A notebook computer or notebook is a small mobile personal computer, usually weighing from one to three kilograms. Using the technology from Symbionics Networks Ltd., a wireless LAN adapter can be made to fit on a PCMCIA card in a laptop or notebook computer to provide mobile computing.

TABLET PC

A tablet PC is a notebook or slate-shaped mobile computer.

Its digitising tablet technology allows the user to operate the computer using a stylus or digital pen and a touch screen instead of the usual keyboard and mouse.

Most Tablet PCs offer built-in support for wireless networks.

PDA

Personal digital assistants or PDAs are handheld devices that were originally designed as personal organisers but became much more versatile over the years.

Many PDAs can access the Internet, intranets or extranets via Wi-Fi or Wireless Wide-Area Networks or WWANs

SMART PHONE

A smart phone is an electronic handheld device that integrates the functionality of a mobile phone and a personal digital assistant or PDA or other information appliance.

This is often achieved by adding telephone functions to an existing PDA or PDA Phone or putting "smart" capabilities such as PDA functions into a mobile phone.

  • Internet Technology and Services (VOIP, BLOG)

VOICE OVER INTERNET PROTOCOL (VoIP)

Protocols used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP. VoIP is one of the Internet technologies that allows a user to make telephone calls using a broadband Internet connection instead of a regular (or analog) phone line.

VoIP is a method for taking analog audio signals and turning them into digital data that can be transmitted over the Internet. There are three different VoIP services in common use today. They are Analog Telephone Adapter (ATA), IP Phones and computer-to-computer.

BLOGGING

A blog (web log or weblog) is one of the popular activities on the Internet. Most of these blogs are publicly shared and the authors frequently update the content on a regular basis.

A blog is usually referred to the text produced by the author about his or her thoughts, experiences or interests.

The world of blogging is referred as blogosphere. Another new term is the blogonomics, which refers to people using the blogosphere to generate money.

27 fauzi&ghozes@ksah2009

Page 28: Notes Ict Master

Panitia ICT KSAH

The posts to a blog are usually arranged in this order, the most recent entries will always be on top of the journal.

WORLD WIDE WEB (WWW)

The World Wide Web or the Web consists of a worldwide collection of electronic documents. Each electronic document on the Web is called a web page which can contain text, graphics, audio and video. These pages are written in Hypertext Markup Language (HTML).

Every website has an address or Uniform Resource Locator (URL). The URL is formed by the protocol, domain, directory and the document name.

EMAIL

An electronic mail or email is the transmission of messages and files via a computer network.

A user utilises an email program to create, send, receive, forward, store, print and delete email messages. Some emails are called web-based email like Yahoo Mail and Hotmail.

THE INTERNET RELAY CHAT (IRC)

The Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions, and client/server software.

A chat is a real-time typed conversation that takes place on a computer. A chat room is a location on an Internet server that permits users to chat with each other. Anyone in the chat room can participate in the conversation, which usually is specific to a particular topic.

SEARCH ENGINES

Search engines are special websites on the Internet to help you find information you need. Different search engines will serve different purposes.

  • Types of network (examples: PAN, VPN, WLAN, WIMAX)

PERSONAL AREA NETWORK (PAN)

A Personal Area Network (PAN) is a computer network used for communication among computer devices including PCs, laptops, printers, telephones, digital cameras, mobile phones, video game consoles and personal digital assistants, close to one person.

PAN may be wired with USB port, Firewire port, Infrared (IrDA) and Bluetooth technologies. Bluetooth is the popular wireless PAN used by most people, especially the mobile phone technologies, and it applies the IEEE 802.15.1 standards.

VIRTUAL PRIVATE NETWORK (VPN)

A Virtual Private Network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to remote offices or individuals with secure access to their organisation's private network.

VPN uses tunnelling mechanism to maintain privacy and security of the data. Tunnelling means transmitting data packets across a public network. VPN is often used by companies to provide access from their internal network resources to their home or mobile workers.

WIRELESS LAN (WLAN)

Wireless Local Area Network (WLAN) is a type of LAN that uses high-frequency radio waves to communicate between nodes. WLAN improves user mobility, speed and scalability to move around within a broad coverage area and still be connected to the network.

The IEEE standard for Wireless LANs is 802.11

WORLDWIDE INTEROPERABILITY FOR MICROWAVE ACCESS (WiMAX)

Worldwide Interoperability for Microwave Access (WiMAX) is the industry term for broadband wireless access network that is developed based on the IEEE 802.16 standard.

28 fauzi&ghozes@ksah2009

Page 29: Notes Ict Master

Panitia ICT KSAH

WiMAX is a Wireless Metropolitan Area Network (MAN) technology that will connect WiFi hotspots to the Internet and provides a wireless extension to cable and DSL for larger broadband access.WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users.

A WiMAX system will have two major parts:

a WiMAX base station, similar in concept to a mobile phone tower a WiMAX receiver installed at home

4 MULTIMEDIA

4.1 Multimedia Concepts

4.1.1.1 Define multimedia.

Multimedia is the presentation of information by using a combination of text, audio, graphic, video and animation.

4.1.2.1 Identify the use of multimedia in various fields.

Multimedia has played an important role in other fields, such as business, arts, medicine and engineering. In business, multimedia applications are used in advertising products. Many companies nowadays develop and distribute catalogues in the form of a CD-ROM as it is more interesting to the consumers. In art, artists use multimedia elements by combining drawing and animation. In medicine, doctors can practice or be trained in performing high-risk surgery by using virtual surgery. In engineering, Computer-Aided Design or CAD is used. By using this application, engineers can view the design from many aspects and improve on it before production.

4.1.3.1 Differentiate between the characteristics of linear and non-linear multimedia.

LINEAR INTERACTIVITY

In linear interactivity, the user interacts with the multimedia application without controlling the progress of the content. In other words, the user is a passive receiver of the multimedia content most of the time.

The linear content is usually arranged in sequence. An example of the multimedia linear content is a movie. Although a movie uses a combination of audio, graphics and animations, the user has no control over the sequence of events.

NON-LINEAR INTERACTIVITY

Unlike linear interactivity, non-linear interactivity allows the user to interact with the content according to what the user wants from the content. In other words, it is a two-way communication.

The user can control the progress and sequence of the multimedia content by using buttons or links. Non-linear interactivity uses tools like “hypertext” to connect a word or a phrase to another screen.

An electronic book with links to another screen is considered as having non-linear multimedia content. Hypermedia is also used in non-linear interactivity. This tool is similar to hypertext. However, it connects to different media elements such as audio and video.

4.1.4.1 Compare and contrast the mediums of delivery for multimedia applications:

  • web-based

29 fauzi&ghozes@ksah2009

Page 30: Notes Ict Master

Panitia ICT KSAH

Web-based multimedia is a combination of multimedia technology and Internet technology. Web-based multimedia is popular nowadays.

In the past, Web pages were filled only with static texts and graphics as there were problems in downloading large multimedia files through the Internet. Downloading a video file could take a long time as it is large.

MULTIMEDIA TECHNOLOGY IN THE INTERNET

Now, with the advancement of both technologies, most Web pages integrate elements like text, graphic, audio, video and animation.

These dynamic elements make the process of distributing information through the Internet more interesting and effective to the user.

There are a lot of multimedia software including plug-ins, players and browsers used in the Internet. These software allow better quality multimedia programs to be stored and viewed.

Software Plug-in @ Player Browser

Flash

Director

FrontPage

Java

Flash Player

Media Player

Internet Explorer

Firefox

  • CD-based

CDs like CD-ROM (Compact Disc Read Only Memory) have been used to store and deliver multimedia content.

CDs are usually used with computers. An improvement of the CD-ROM is the Blu-ray disc which can store better quality video.

However, the main problem in using CD-ROMs as a medium is that, it can be costly as it takes a long time to produce a complete multimedia program.

4.1.5.1 Identify the multimedia elements:

• text

Text is the basic element of multimedia. It involves the use of text types, sizes, colours and background colour.

In a multimedia application, other media or screen can be linked through the use of text. This is what you call Hypertext.

To produce an effective multimedia program there are three things that need to be considered. They are:

The position of the text on the screen. Length of the message And legibility of the text.

• graphics

Graphics make the multimedia application attractive. They help to illustrate ideas through still pictures. There are two types of graphics used: bitmaps (paint graphics) and vector (draw graphics).

30 fauzi&ghozes@ksah2009

Page 31: Notes Ict Master

Panitia ICT KSAH

Bitmaps images are real images that can be captured from devices such as cameras or scanners.

Vector graphics are drawn on the computer and only require a small amount of memory.

• audio

A multimedia application may require the use of speech, music and sound effects. These are called audio or the sound element. There are two basic types of audio or sound: analog and digital audio.

Analog audio refers to the original sound signal. Digital audio refers to the digital sampling of the actual sound. The sound used in multimedia is digital audio.

We can record analog audio file. We can use special audio editors like Sound Forge to convert analog audio files into digital audio files.

• video

Video provides a powerful impact in a multimedia program. In multimedia applications, the digital video is gaining popularity because of the following reasons:

video clips can be edited easily the digital video files can be stored like any other files in the computer and the quality of the

video can still be maintained the video files can be transferred within a computer network it allows non-linear editing in any part of the video

However, these digital video files are large in size. Transferring these files can take a long time especially when using the Internet.

  • animation

Animation is a process of making a static image look like it is moving. In multimedia, digital animation is used. Digital animation can be categorised into two broad area: 2D (2 Dimension) and 3D (3 Dimension) animations.

2D animation refers to creating movements in basic objects. These objects are put into various situations or positions and have movement on the screen.

3D animation refers to creating movements to three dimensional digital objects from photographs. Movements like spinning and flying across the screen are some samples of animations.

STANDARD FILE FORMATS FOR EACH ELEMENT

31 fauzi&ghozes@ksah2009

Page 32: Notes Ict Master

Panitia ICT KSAH

4.2 Hardware and Software

4.2.1.1 Identify hardware that can be used to produce multimedia products:

  • scanner

  • video camera

  • camera

  • audio devices

  • video capture devices

4.2.2.1 Identify editing software that can be used to produce multimedia elements:

32 fauzi&ghozes@ksah2009

Page 33: Notes Ict Master

Panitia ICT KSAH

  • text editor

  • graphics and image editor

  • audio editor

  • video and animation editor

4.2.3.1 Define the various concepts in authoring tools:

  • time frame concept

With time frame concept authoring tools, the multimedia elements or events are presented and organised along a time line.This type of tool helps users coordinate when each multimedia element (text, graphics, audio, video or animation) plays.

In time frame concept authoring tools, a timeline consists of layers which span several frames.

For example a simple presentation could contain three layers; layer one could contain a picture of a blue sky, layer two could contain a picture of a mountain and layer three a picture of a mountain climber.

If each of the layers span 10 frames and the user presses the "play" button, then the presentation will show a picture containing all of the elements in the layers e.g. blue sky, a mountain and a mountain climber.

If layer one however only spans 5 frames from the beginning, then the blue sky would only show for 5 frames and then disappear for the remaining 5.

Examples of authoring tools using the time frame concept are Flash and Director. These two software can support multi platform.

  • icon concept

The icon concept in authoring tools provides the multimedia developer with a visual programming approach to sequencing events in the multimedia application. In this concept, elements and events are organised in a structural framework.

With icon authoring tools, users can present visually a logical flow of events by dragging icons from an icon menu.

The icon can represent graphics, audio files, animation, text, movies, and other elements should be played in a logical flow or flow chart.

33 fauzi&ghozes@ksah2009

Page 34: Notes Ict Master

Panitia ICT KSAH

These entire icon concept authoring tools use "drag and drop" to pick up and place icons on the presentation page.

These icons represent:

events such as mouse clicks, key press actions to be performed after an event e.g. a transition, a sound routines to perform loops, conditional branches

A presentation is built by inserting one object after another e.g. a simple application could contain just three icons: picture, sound icon and text icon.

When we click on the Restart button, the presentation starts.

Several multimedia authoring tools which use this icon concept are Authorware and IconAuthor. These two software can support multi platforms.

  • card concept

The card concept in authoring tools are based on the idea of card stacks containing graphics, audio, video, text and animation. Elements and events in card concept authoring tools are organised as pages in a book or a stack of cards.

When card concept authoring tools starts, a blank page is displayed. Certain objects can be inserted e.g. text, pictures and buttons. By inserting objects into several pages, a multimedia "book'' is eventually created.

The developer can create transitions between pages and on the objects themselves. Zoom text in and out, causing a picture to flow onto the page.

Examples of the card concept in Authoring Tools are ToolBook, HyperCard and SuperCard. ToolBook uses the Windows platform. ,Hypercard and Supercard uses the Macintosh platform.

4.2.4.1 Describe and give examples of web editors:

  • text-based

A text-based Web editor is a basic editor where you work with Hypertext Markup Language (HTML) tags to create a Web page. It can be used to change HTML source codes. Using a text-based Web editor requires you to have HTML knowledge to get started. Software such as Notepad and PSPad are examples of text-based editors. PSPad has additional functions that include syntax highlighting and toolbars.

  • WYSIWYG

WYSIWYG is an acronym for What You See Is What You Get. WYSIWYG web editors provide an editing interface that shows how the pages will be displayed in a web browser. Using a WYSIWYG editor does not require any HTML knowledge. It is easier for an average computer user.

Examples of WYSIWYG web editor are Microsoft FrontPage and Macromedia Dreamweaver.

4.3 Multimedia Development

4.3.1.1 State user interface principles.

34 fauzi&ghozes@ksah2009

Page 35: Notes Ict Master

Panitia ICT KSAH

User interface is a way a computer program communicates with the person who is using it. There are eight main principles of the user interface.

1. Consistency 2. Clarity3. Context 4. Navigation5. Search6. Personalisation7. Learnability8. Flexibility

4.3.2.1 State the role of each member in a development team

A multimedia production team consists of: Project Manager Subject Matter Expert (SME) Graphic Artist Audio-Video Technician Instructional Designer Programmer.

Project Manager's RolesThe Project Manager's roles are to define the scope of the project and discuss with the client. He has to search for financial resources, equipment and facilities. He manager also needs to coordinate the production team.Subject Matter Expert's RoleThe Subject Matter Expert's role is to do research on the content of a multimedia program. He has to provide content for the multimedia content.Graphic Artist's RoleThe Graphic Artist's role is to develop the graphic elements of the program such as backgrounds, buttons, photo collages, 3D objects, logos and animation.Audio-Video Technician's RoleThe Audio Technician is responsible for recording the voice. He edits the sound effects. He records and edits music. He is responsible for capturing, editing and digitizing the video.Instructional Designer's RolesThe Instructional Designer's roles are to decide on the best educational strategies and practices to present the information.Programmer's RoleThe Programmer’s role is to write the program code lines or scripts using the authoring tool. He combines the multimedia elements into a multimedia program.Extension : WebmasterNew technology has now made it very easy for many people to access the Web. Designing interesting Web sites is very important for many businesses.The webmaster's main job is to create and maintain the Web site. He should be able to integrate the multimedia elements into a Web page. He also handle enquiries and feedback.

4.3.3.1 Describe the phases in multimedia production:

There are six phases involved in the production of a multimedia project. The six phases involved can be categorised into 3 main stages:Pre-production is the process before producing the multimedia project.Production is the process of producing the multimedia project.

35 fauzi&ghozes@ksah2009

Page 36: Notes Ict Master

Panitia ICT KSAH

Post-production is a process after producing the multimedia project.Analysis PhaseDuring the Analysis Phase, the multimedia developers interview the clients to find out their needs and write the Problem Statement and a Proposal.Design PhaseBased on the needs of target users, the multimedia developer will design a Flow Chart and Storyboard.Implementation PhaseOnce the Storyboard is confirmed, the multimedia developers will start Implementation Phase. This phase refers to the process of converting the design plan into a multimedia program. This is the phase where the multimedia program is produced.Testing PhaseThe multimedia developers will use a Checklist to test the multimedia program. If there are any errors, the programmer will fix the program.Evaluation PhaseIn the Evaluation Phase, selected users will use an Evaluation Form to try out the program and give feedback.Publishing PhaseFinally, when the multimedia program is completed, it will be published to CD.

4.3.3.2Apply all the phases of multimedia production to produce an interactive educational multimedia project.

To produce a multimedia project, we need to undergo a series of steps. We must go through the Analysis Phase to define our project title.We need to gather the materials such as text, graphics, audio, video and animation.We use Toolbook Assistant 2004 as the authoring tool to create a multimedia program.We need to test our program.We also need someone to evaluate the program and give feedback.Once we are satisfied with the program, we can use a CD writer to produce a CD.~ REFER PAPER 2 ~

4.4.1.1Give an example of immersive multimedia in education, business or entertainment.

Immersive Multimedia is a combination of multimedia elements and interactivity in Virtual Reality. The history began with the concept of Virtual Reality with the desire of computer scientists and artists was to create, digitally-made ‘near-to-reality’ experiences through Interactive Multimedia in 1960s. This became known as Virtual Reality. Virtual Reality, today, is a computer-created environment that a user can experience through the senses of sight, hearing and touch.Example Of Immersive Multimedia

Education Business Entertainment VRML

5 PROGRAMMING

36 fauzi&ghozes@ksah2009

Page 37: Notes Ict Master

Panitia ICT KSAH

5.1.1.1 State the definition of program.

A computer program is a series of organised instructions that directs a computer to perform tasks. Without programs, computers are useless.

5.1.1.2 State the definition of programming language.

A programming language is a set of words, symbols and codes that enables humans to communicate with computers. It is a language used for writing computer programs, that direct a computer to perform computation and to organise the flow of control between mechanical devices.

5.1.2.1 Identify the generations of low-level programming languages with examples.

A low-level programming language is a programming language that provides little or no abstraction from computer’s microprocessor.

FIRST GENERATION OF PROGRAMMING LANGUAGE

The first generation of programming language, or 1GL, is machine language. Machine language is a set of instructions and data that a computer's central processing unit can execute directly. Machine language statements are written in binary code, and each statement corresponds to one machine action.

SECOND GENERATION PROGRAMMING LANGUAGE

The second generation programming language, or 2GL, is assembly language. Assembly language is the human-readable notation for the machine language used to control specific computer operations. An assembly language programmer writes instructions using symbolic instruction codes that are meaningful abbreviations or mnemonics. An assembler is a program that translates assembly language into machine language. Since assembly language consist of human-readable abbreviations, the assembler must first convert assembly language into machine-readable language before the computer can readily understand its instructions.

5.1.2.2 Identify the generations of high-level programming languages with examples.

A high-level programming language is a programming language that is more abstract, easier to use, and more portable across platforms.

THIRD GENERATION PROGRAMMING LANGUAGE

The third generation of programming language, 3GL, or procedural language uses a series of English-like words, that are closer to human language, to write instructions.

High-level programming languages make complex programming simpler and easier to read, write and maintain.Programs written in a high-level programming language must be translated into machine language by a compiler or interpreter.

PASCAL, FORTRAN, BASIC, COBOL, C and C++ are examples of third generation programming languages.

FOURTH GENERATION PROGRAMMING LANGUAGE

The fourth generation programming language or non-procedural language, often abbreviated as 4GL, enables users to access data in a database.

37 fauzi&ghozes@ksah2009

Page 38: Notes Ict Master

Panitia ICT KSAH

A very high-level programming language is often referred to as goal-oriented programming language because it is usually limited to a very specific application and it might use syntax that is never used in other programming languages.

SQL, NOMAD and FOCUS are examples of fourth generation programming languages.

FIFTH GENERATION PROGRAMMING LANGUAGE

The fifth generation programming language or visual programming language, is also known as natural language. Provides a visual or graphical interface, called a visual programming environment, for creating source codes.

Fifth generation programming allows people to interact with computers without needing any specialised knowledge. People can talk to computers and the voice recognition systems can convert spoken sounds into written words, but these systems do not understand what they are writing; they simply take dictation.

Prolog and Mercury are the best known fifth-generation languages.

5.1.3.1 Define structured approach in programming.

STRUCTURED PROGRAMMING EDUCATION

Structured programming often uses a top-down design model where developers map out the overall program structure into separate subsections from top to bottom.

In the top-down design model, programs are drawn as rectangles. A top-down design means that the whole program is broken down into smaller sections that are known as modules. A program may have a module or several modules.

Structured programming is beneficial for organising and coding computer programs which employ a hierarchy of modules. This means that control is passed downwards only through the hierarchy.

Examples of structured programming languages include Ada, Pascal and Fortran.

5.1.3.2 Define object-oriented approach in programming.

The object-oriented approach refers to a special type of programming approach that combines data with functions to create objects. In an object-oriented program, the object have relationships with one another. One of the earliest OOP languages is Smalltalk. Java, Visual Basic and C++ are examples of popular OOP languages.

5.1.3.3Differentiate between structured approach and object-oriented approach in programming.

Structured programming often uses a top-down design model.

The object-oriented programming approach uses objects.

5.1.4.1Describe the translation method of programming using assembler, interpreter and compiler.

ASSEMBLER

An assembler is a computer program for translating assembly language — essentially, a mnemonic representation of machine language — into machine language.

For example in intel 80836, the assembly language for the ’no operation’ command is NOP and its machine code representation is 10010000. Example of assemblers are MACRO-80 Assembler and Microsoft MASM.

INTERPRETER

38 fauzi&ghozes@ksah2009

Page 39: Notes Ict Master

Panitia ICT KSAH

Interpreter is used to interpret and execute program directly from its source without compiling it first. The source code of an interpreted language is interpreted and executed in real time when the user execute it.

The interpreter will read each codes converts it to machine code and executes it line by line until the end of the program. Examples of interpreter-based language are BASIC, Logo and Smalltalk.

COMPILER

The source code (in text format) will be converted into machine code which is a file consisting of binary machine code that can be executed on a computer. If the compiler encounters any errors, it records them in the program-listing file.

When a user wants to run the program, the object program is loaded into the memory of the computer and the program instructions begin executing. A compiled code generally runs faster than programs based on interpreted language. Several programming languages like C++, Pascal and COBOL used compilers as their translators.

5.1.5.1 Differentiate between constants and variables.

Constants Variables

CharacteristicsValue is not changeable during the course of the program.

Value can be changed anytime during the course of the program.

Usage

Use constant when you want to declare someting that won’t be changed midway in your program execution.

Use variable to store data that may or will change during the running of the program.

5.1.5.2 Differentiate between the data types: Boolean, integer, double, string and date.

Integer

Integer data type contains any whole number value that does not have any fractional part.

Double

Any number value that may and could contain a fractional part.

String

Any value that contains a sequence of characters.

Boolean

Boolean type consists either a True or False value. Programmers usually use it to store status.

5.1.5.3 Differentiate between mathematical and logical (Boolean) operators.

Function:

Mathematical operators perform mathematical operations such as plus or substract. Relational operators perform element-by-element comparisons between two arrays. Logical operators perform logical operations such as checking the condition of two Boolean values.

39 fauzi&ghozes@ksah2009

Page 40: Notes Ict Master

Panitia ICT KSAH

Symbols:

These operators have their own symbols based on the programming language.

5.1.5.4 Differentiate between sequence control structure and selection control structure.

ASPECTS SEQUENCE CONTROL SELECTION CONTROL

Usage

Use when want to execute code line by line.

Does not use the decision symbol.

Use when want to implement decision making process in the program.

Use the decision symbol.

Execution Flow Execute statement one by one

in linear @ consecutive order. Execute different statement for

different conditions.

Flow Chart

5.2 Program Development

5.2.1.1 Describe the five main phases in program development:

• problem analysis

During the problem analysis phase, the programmer will interview the client to find out what the client’s needs are.

• program design

Based on that, the programmer will design a flow chart that represents the needs of the client

• coding

Once the flow chart is confirmed, the programmer will perform coding.

• testing and debugging

If there are any errors, the programmer will do a debugging of the program.

  • documentation

40 fauzi&ghozes@ksah2009

Page 41: Notes Ict Master

Panitia ICT KSAH

After this, the programmer will complete the documentation for the program; this includes the user manual, a clear layout of the input and output records and a program listing.

5.2.2.1 Apply program development phases to solve problems.

PROBLEMS SOLUTIONS

Users don’t understand what they want.Programmers use whiteboards to sketch data flows of the user or client’s system.

Users won’t commit to set of written requirements

Programmers must ensure that they get the client’s signature of approval for the program requirements.

Users insist on new requirements after the cost & schedule have been fixed.

Programmers must clearly explain that they will charge extra costs for any requirements not previously specified by users.

Communication with users are slow.Programmers must constantly interact with users or clients.

Users often do not participate in views or are incapable of doing so.

Programmers should show users some samples programs (prototyping).

5.3 Current and Future Developments

Find out the latest programming languages:

• fifth generation language

Fifth generation programming language (5GL) is an advance programming language which concentrates on solving problems using constraints given to the program.

In fifth generation language, the programmer just need to define the problem to be solve and the program will automatically code the program based on the problem definition.Fifth generation languages are designed to make the computer solve the problem for you. These languages are mostly used in artificial intelligence research. Examples of fifth generation languages include Prolog and Mercury.

  • natural language

Natural Language programming aims to use natural language such as English to write a program.

41 fauzi&ghozes@ksah2009

Page 42: Notes Ict Master

Panitia ICT KSAH

Instead of using a specific programming language syntax, natural language programming will use normal English as the input to program software. Such a technique would mean less technical programming knowledge is required to write a program.The programmer needs to define the program using normal language.

  • OpenGL (Graphic Library)

OpenGL is a standard specification to describe the standard Application Programming Interface (API) for 3D/2D computer graphic applications. It’s specification describes a set of functions and the exact behaviours that the 3D/2D application must perform.

OpenGL was developed by Silicon Graphics. OpenGL is widely used in virtual reality, scientific visualisation, flight simulation and video game development

6. INFORMATION SYSTEMS

6.1 Concepts of Information Systems

6.1.1.1 Give the meaning of data, information and information systems.

DATAData is like raw material. It is not organised and has little value. Data can include text, numbers, images, audio and video.

INFORMATION Information is organised data that is valuable and meaningful to a specific user.

INFORMATION SYSTEMInformation system is a set of a related components that collects data, processes data and provides information.

6.1.2.1 State the usage of Information Systems in education, business and management.

INFORMATION SYSTEMS IN EDUCATION

Keep track of students statistic and grades.

Help students and teachers in online learning and discussion – Learning Management System, example : Moodle, University Sains Malaysia and Open University Malaysia.

Store subject content – for Online Learning Portal.

USAGE OF INFORMATION SYSTEMS IN BUSINESS

Carry out online buying and selling :In retail companies, information systems are used in online buying and selling. Examples of information systems for a retail company are Amazon.com, Lelong.com and Maybank2U.com.

Help plan the delivery of goods and services : In the transportation industry, information systems are used to help plan the delivery of goods and services. Examples of information systems in the transportation industry are UPS.com, FedEx Express and City-Link.

Make room bookings and for checking the best rates :

42 fauzi&ghozes@ksah2009

Page 43: Notes Ict Master

Panitia ICT KSAH

In the hotel industry, information systems are used to make room bookings and for checking the best rates. Examples of information systems in the hotel industry are Genting Online booking, Booking.com and Sabah Hotel Booking Center.

USAGE OF INFORMATION SYSTEMS IN MANAGEMENT

See employee records : In human resource management, information systems are used to see things like employee records.

Analyse product, services and product prices : In marketing management information systems are used to analyse products, services and product prices that give the best sales.

Process customer ordes, organise production times and keep track of product inventory : In manufacturing management, information systems are used to process customers orders, organise production times and keep track of product inventory.

6.1.3.1 List the Information System components:

  • data

  • hardware

  • software

  • people

  • procedure

6.1.3.2 Define each of the Information System components.

DATAData is very important in information systems. Without data, decision and conclusion cannot be made. The right data in information systems helps us to make the right decision. For example, the stock status report in a book store helps the book store's manager to decide when to reorder their stocks.

HARDWAREThe hardware component in an information system means all computer equipment used to perform input, processing and output functions. Hardware resources also include all media on which data is recorded, such as paper, floppy disks and compact discs.

SOFTWAREThe software component in an information system consists of programs for the computers. These programs allow the computers to carry out most of the instructions related to information processing. There are two types of software: system software and application software.System software controls basic computer operations. For example, the Operating Systems are Microsoft Windows, Linux and Macintosh. Application software are the programs that allow users to do specific tasks. Examples of application software are Microsoft Excel, Microsoft Access and SQL Server.

PEOPLEPeople involved is information systems personnel and end users.

PROCEDURESProcedures are operating instructions for the user of an information system. Procedures can be in the form of guidelines in the user manuals.

43 fauzi&ghozes@ksah2009

Page 44: Notes Ict Master

Panitia ICT KSAH

6.1.3.3 Describe the interrelation between information system components using a diagram.

44 fauzi&ghozes@ksah2009

Page 45: Notes Ict Master

Panitia ICT KSAH

6.1.4.1 List five types of Information Systems:

  • Management Information System (MIS)

  • Transaction Processing System (TPS)

  • Decision Support System (DSS)

  • Executive Information System (EIS)

  • Expert System (ES)/Artificial Intelligence (AI)

6.1.4.2 State the usage of each type of information system.

MANAGEMENT INFORMATION SYSTEM (MIS)Management Information Systems are used to provide regular information about the daily activities of a business to the manager. Management Information Systems are to help managers make the business processes and activities more efficient compared to doing them manually.

TRANSACTION PROCESSING SYSTEMS (TPS)Transaction Processing Systems are used to record business transaction. Transaction Processing Systems keep track of daily transactions in a database.

DECISION SUPPORT SYSTEMS (DSS)Decision Support Systems provide managers with information to make the best decisions. Decision Support Systems help to analyse information, recognise problems and making decisions. Most Decision Supports Systems reports are in the form of charts and diagrams.

EXECUTIVE INFORMATION SYSTEM (EIS)Executive Information System helps top-level management to plan strategies.An Executive Information System is used to forecast future trends.

45 fauzi&ghozes@ksah2009

Page 46: Notes Ict Master

Panitia ICT KSAH

EXPERT SYSTEM (ES)Expert system is used to store knowledge and make logical suggestions for the user. Expert System users can be professionals like doctors and scientist. Example : An Expert System can suggest conditions and estimate the probability of having illness.

6.1.5.1 Define bit, byte, field, record, and file

BIT, BYTE, FIELD, RECORD AND FILEThe bit is represented by 0 for OFF or 1 for ON. It is a binary digit. It is the smallest unit of data the computer can store in a database.

A byte is a collection of bits. Each byte consists of eight bits. Each byte represents a character.

A field is a unit of data consisting of one or more characters (bytes). A field is the smallest unit of meaningful information in the database. Each field has a field name. The field name describes the data that should be entered into the field, such as StudentID (Student ID), Name, Address and MyKad Number.

A record is a collection of related fields. Example : Each record stores data about a students.For example, a student record is a collection of fields about a student.

A file is a collection of related records. For example, a student file is a collection of students’ records.

6.1.5.2 State the hierarchy of data:

  • Bit → Byte (Character) → Field → Record → File → Database

6.2 Software

Define database and Database Management Systems (DBMS).

Database is structured collection of information on specific subjects. We can think of a database as an electronic filing system. An example of the database is a telephone book which contains records of names, addresses and contact numbers. A database allows its contents to be easily accessed, updated, stored and retrieved.

DATABASE MANAGEMENT SYSTEM (DBMS)A Database management System is a program that accesses information from a database. A Database Management System provides an interface between the database and the user.A Database management System enables you to extract, modify and store information from a database. Examples of DBMS are Oracle, SQL Server and Microsoft Access.

6.2.1.2 List the benefits of using database.

BENEFITS OF USING DATABASE Minimises Data Redundancy Most data item stored in only one file. With a database there is no need to repeat recording the same data. This minimises data redundancy. For example, a school database would record a student’s name. address and other details only once when the student enroll in the school.

Data Integrity Is Assured

46 fauzi&ghozes@ksah2009

Page 47: Notes Ict Master

Panitia ICT KSAH

A database ensures that data is correct for all files. When a user modifies data in one of the files in a database, the same data will change automatically in all the files. This is called data integrity.

Data Can Be SharedA database allows the ease of sharing data. Data can be shared over a network, by a whole organisation.

Information Can Be Accessed EasilyA database makes information access easy. Everyone can access and manage data in a database.

6.2.2.1 State the relationship between attribute (field), row (record) and relation (file).

FIELDField is a specific category of information in a table. In a table, fields are usually shown in columns and it has its own field name at the top. For example, StudentID, Name, MyKad Number, Date of Birth, Gender, Address and Contact Number. All the data within the same field holds the same data type.

For example, StudentID, Name, Gender, Address and ContactNumber use text as data type. MyKad Number uses number as data type. Date Of Birth uses date as data type. Several fields make up a record.

RECORDRecord is a collection of fields about one person, place or thing in a table. Records are arranged in rows. The records consist of several data type such as of text, date or numerical data. A record is also known as the row or tuple. For example, we have a total of five records in this table.

FILEA file is a set of data arranged in columns and rows. They are grouped together for a specific purpose. For example, this is a Student Registration System which records all the students’ information.

To form a file, the file must have fields and records. A file is sometimes called a table or relation.For example, a Book file and a Student file.

6.2.2.2 Define the primary key and foreign key.

DEFINE THE PRIMARY KEYA primary key is the field that uniquely represents each record in a table. These keys must not have null values. Meaning, you must not leave these keys blank.Each table in the database must have at least one primary key.

There is also another name for a primary key: the unique identifier. In the student table, student name might not be a good primary key. For example there are two Sulaiman bin Yahya in this school.

So, the Student Name is not a good primary key. You may use the MyKad Number as the primary key. Some students might not have their own MyKad Number yet, the MyKad Number is sometimes rejected as the primary key. To uniquely identify each student, you can add a special StudentID field to be used as the primary key. For example, each StudentID represents a student.

DEFINE FOREIGN KEY

47 fauzi&ghozes@ksah2009

Page 48: Notes Ict Master

Panitia ICT KSAH

A foreign key is the field that matches the primary key in another table. It contains the same data as those of the primary key in the other table. Foreign key fields are linked to fields in other tables. While a primary key must have unique values, a foreign key may have duplicate values.

For example, the StudentID is the primary key in the Student table, but the StudentID is a foreign key in the Subject table. Since a student may take more than one subject, the foreign key (StudentID) will have a duplicate value in the subject table.

6.2.2.3 State the importance of the primary key.

A primary key ensures data integrity by uniquely identifying each record. It helps to avoid duplicating records. It prevents null values being entered in the unique field.

6.2.2.4 Differentiate between the primary key and foreign key.

A foreign key links to a primary key in another table. While primary keys must have unique values, foreign keys may have duplicate values. These are the differences between the primary key and foreign key.

6.2.2.5 State the importance of relationship between the primary key and foreign key.

The primary key of one table becomes a foreign key of the other table. By matching a foreign key with a primary key, the data does not need to be entered repeatedly.

A primary key makes creating Queries, Forms and Reports easier. A primary key improves data performance by relating smaller tables into meaningful databases.

6.2.3.1 Define the following database objects/ tools: Table, form, query, report.

OBJECTSTables are one of the database objects in Microsoft Access. A Table is a collection of data that is organised as rows and columns.

Every database object such as Queries, Forms and Reports are based on one ore more Tables. A database contains at least one Table.

48 fauzi&ghozes@ksah2009