worksheet complete set 180111
TRANSCRIPT
Panitia ICT SMK Kanowit 2011
Learning Area One – ICT and Society1.1 – Introduction to ICT.1.1.1 – Overview of ICT.1.1.1.1 – Define ICT
1.1.1.2 – Describe the brief evolution of computers
1
ICT is defined as
Information is defined as
Communication is defined as
Technology is defined as
First Generation (1940-1956)Technology:
Problems:
Scientists:
Example:
Second Generation (1956 - 1963)Technology:
Advantages:
Scientists:
Third Generation (1964-1971)Technology:
Advantages:
Scientist:
Panitia ICT SMK Kanowit 2011
1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce1.1.2.1 – List the usage of ICT in everyday life.
Education
1. Students can use computer as references tool and browse internet for information
2.
Industry
1.
2.
Banking
1.
2.
Commerce
1.
2.
1.1.2.2 – State the differences between computerised and non-computerised systems.
Field Non- Computerised Computerised
Education
1. Students listen mainly to teacher explanation.
2.
1. Students can use internet to search for information and do not rely mainly on teacher.
2.
2
Fourth Generation (1971 - present)Technology:
Advantages:
Scientists:
Example:
Fifth Generation (Present & beyond)Technology:
Panitia ICT SMK Kanowit 2011
Banking
1.
2.
1.
2.
Industry
1.
2.
1.
2.
Commerce
1.
2.
1.
2.
1.1.2.3 – State the impact of ICT on society.
3
Positive Impact
Negative Impact
Good examples:Bad examples:1.1.
2. 2.
Panitia ICT SMK Kanowit 2011
1.2 – Computer Ethics and Legal Issues1.2.1 – Definition 1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
4
Computer Ethics is a
Code of Ethics:
Definition:
Intellectual property refers to
______________________________________
______________________________________
______________________________________
_____________________. These works are
____________________
______________________________________
______________________________
Computer Crimes
Any criminal activity ________________________
__________________________________________
________________________________________
There are 4 types of computer crimes:
Privacy in IT refers to
Information privacy is described as
Cyber law refers to
Panitia ICT SMK Kanowit 2011
1.2.1.2 – Differentiate between ethics and law.
Ethics Law
Keywords Explanations Keywords Explanations
Moral standards
As a rule to control computer users
Computer users are free to follow or ignore the codes of ethics
Must follow
Depends on country and state where the crime is committed
Universals
Crime
1.
2.Examples
1.
2.
5
Definition of Ethics
Definition of Law
Similarity between ethics and law
1.
2.
Panitia ICT SMK Kanowit 2011
1.2.1.3 – State the need for Intellectual property laws
1.2.2 – Privacy1.2.2.1 – List ways to protect privacy.
6
Why do we need intellectual property law???
Privacy is threatened through …
Ways to protect privacy
Panitia ICT SMK Kanowit 2011
1.2.2.2 – State authentication and verification methods / technologies
Methods Pictures Name Functions / Explanation
Biometric Devices
Analyses the features that exist in the coloured tissue surrounding the pupil.
Scanning of retina and analyzing the layer of blood vessels at the back of the eye.
This method is commonly used in bank operation and business transactions.
7
Authentication is a process
Panitia ICT SMK Kanowit 2011
1.2.3 – Controversial Contents and Control1.2.3.1 – List the effects of controversial content on society (pornography & slander)
Pornography
Impacts????
Slander
Examples
1.2.3.2 – Describe the process of filtering to control access to controversial contents.
Methods Website / site blocking
How???
Uses lists of banned words.
If filter search found any words listed, it will stop downloading and block the page.
Rated by RSACI for the content of the website.
Browser is set to accept pages with certain levels of ratings.
8
Verification is the act of
Examples
Methods of verification
Panitia ICT SMK Kanowit 2011
1.2.4 – Computer Crimes1.2.4.1 – Explain the need for Cyber Law.
1.2.4.2 – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks.
1.3 – Computer security 1.3.1 – Definition1.3.1.1 – Define computer security
9
For:
For:
For:For:
For:
Computer Crimes Definition Example
Computer security means
Needs for Cyber Law
Types of computer security
Panitia ICT SMK Kanowit 2011
1.3.2 – Security Threats1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster,
theft.
1.3.3 – Security Measures1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup,
human aspect
Identify and write the appropriate security procedures in the SECURITY column and the security threats in the THREATS column.
Situation THREATS SECURITYAhmad’s has asked his secretary, Minah, to send an email to his business partner in Japan. Minah tries to read Ahmad’s email.
Every two weeks Harry would save a copy of his files from his laptop to his external hard disk in case his computer breaks down.
10
Security Threats
Malicious Code Hacking Natural Disaster Theft
Definition: Definition: Definition: Definition:
Examples: Examples: Flood Fire Earthquakes
Examples:
Panitia ICT SMK Kanowit 2011
One day, Karim found out his files has been corrupted. He needs to scan using appropriate utility.
While using the internet, Flora founds out that some of her private information showed up in an unknown browser.
Daisy is a software engineer. One day, she found out that on her computer pops out a message that writes “An unknown source is trying to by-pass your security system”Bank safe vault is one of the restricted areas in the office. Only authorized personal are allow to enter.
Questions 1. Copyright infringement is defined as a violation of the rights secured by Copyright Act.
a. Give two examples of copyright infringement.
b. Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats for:
i. Data lost
ii. Hiding information.
2. Which of the following are biometric devices?I. Hand geometry
II. Callback SystemIII. Retinal ScanningIV. Signature Verification System
A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV
11
INPUT
PROCESS
OUTPUT
STORAGE
Description of Information Processing Cycle
Panitia ICT SMK Kanowit 2011
Learning Area Two – Computer System.
2.1 – System Concept2.1.1 – Overview of computer systems2.1.1.1 – Define computer systems
2.1.1.2 – State the meaning of input, processor, output and storage.
2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage.
12
COMPUTER SYSTEM
Panitia ICT SMK Kanowit 2011
2.1.2 – Data Representation2.1.2.1 – State the relationship of data representation: Bit, byte, and character.
2.1.3 – Introductory to binary coding2.1.3.1 – Explain the function of ASCII code
Functions:
13
MACHINE CYCLE
Fetch
_______ bits 1 byte _______ character
ASCII: American _______________________________________________________________________
____________________________________________________________________________________
1.
2.
Panitia ICT SMK Kanowit 2011
Criteria ASCII EBCDIC Unicode
Number of bits in a byte
Usage
Supported languages
Example
2.1.4 – Data measurement2.1.4.1 – State the units of data measurement.
Term Abbreviation Approx. size Exact Amount Index power
Bit -- -- -- --
Byte -- -- -- --
KB
Megabyte
GB
Terabyte 240
2.1.5 – Clock Speed Measurement2.1.5.2 – State the units of clock speed measurement.
Unit used : __________________________________ = ____________ cycle per second
Term Abbreviation Cycle per second
Megahertz
Gigahertz GHz
2.2 – Hardware
14
Motherboard
Types of hardware
Panitia ICT SMK Kanowit 2011
2.2.1 – Input Devices2.2.1.1 – Identify the input devices used for text, graphics, audio and video
Types Picture Name Other examples
Text
1.
2.
Graphics
1.
2.
Audio
1.
2.
Video
1.
2.
2.2.2 – Output devices2.2.2.1 – Identify the output devices used for text, graphics, audio and video
Output Device Text graphics audio video
Monitor
Speaker
2.2.3 – Motherboard
15
Panitia ICT SMK Kanowit 2011
2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot, ports and connectors on the motherboard.
2.2.4 – Storage
16
Ports
OS Platform
Example Example Example
Panitia ICT SMK Kanowit 2011
2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic medium, optical medium, flash memory)
Primary storage is located at _______________________________________________
What is ROM?____________ Only Memory: memory whose contents can be accessed and read but ______________ be changed. The memory of a ROM is ________________________ which means the program and data will not be __________________.
Types of ROM:
What is RAM?Random _____________________ Memory: memory whose contents can be _________________, read and ______________. The memory of a RAM is ________________________ which means the program and data will be __________________.
2.3.1 – Operating System (OS)2.3.1.1 – State the various types of OS used on different platforms.
2.3.1.2 – State the functions of OS
17
PROM EPROM EEPROM
Functions of OS
Panitia ICT SMK Kanowit 2011
2.3.1.3 – State the different interfaces of OS
2.3.2 – Application Software
18
Panitia ICT SMK Kanowit 2011
2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic)2.3.2.2 – Describe the uses of application software.
Types Examples Functions / Usages
Word processor
Microsoft Excel Corel Quattpro Pro Sun StarOffice Calc
Provides pre-defined presentation format Applying special effects to the slide transition. Enhance text, charts and graphical images.
Edit digital non-text information such as photo and drawings
Draw pictures using various tools such as brush and pen
Modifying contrast and brightness Adding special effects
2.3.3 – Utility program2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and
file compression)
Types Examples Functions / Usages
File managements
1.
2.
1.
2.
Diagnostics
1.
2.
1.
2.
File Compression
1.
2.
1.
2.
2.3.4 – Proprietary and Open Source Software.
19
Panitia ICT SMK Kanowit 2011
2.3.4.1 - Differentiate between proprietary and open source
Criteria Proprietary Open Source
Advantages
1.
2.
3.
1. It is Free2.
3.
Disadvantages
1. User need to buy the product key (license key) in order to use
1.
2.
3.
Example for application software
1. Microsoft Office 20102.
1.
2.
Example for OS
1.
2.
1. Ubuntu2.
Learning Area 3 – Computer Network and Communications
20
Panitia ICT SMK Kanowit 2011
3.1 – Basic Concepts of Computer Networks and Communications3.1.1 – Definition3.1.1.1 – Define computer networks3.1.1.2 – Define communication
3.1.2 – Importance of Computer Network.3.1.2.1 – State two importance of computer networks and communication in the following fields
3.1.3 – Types of Network3.1.3.1 - Define types of Computer network.
a. ______________ Area __________________.
b. __________________ network compare to ___________ and WAN.
c. Operated within a limited _________________________________________.
d. Devices connected usually are less than ____________________________.
e. Hardware used: ______________________________, ________________________________,
________________________________, _____________________________________.
f. Transmit data at a very _______________ speed.
a. ___________________ Area _________________________.
b. Located at ____________________ cities such as _________________________.
c. Used ____________________________________ as transmission media.
d. Can be collections of ______________.
21
Education E-Business
E-Commerce E-Banking
LAN
MA
WA
Computer network is
Communication is
Panitia ICT SMK Kanowit 2011
a. ________________________ Area __________________________.
b. ______________________ network of all. An example is __________________________.
c. Generally it covers large ______________________ such as a state, ________________ or
___________________.
d. A group of _____________ or ____________ or a mixture of ____________.
e. Uses transmission media such as _________________________________________________.
f. Need ___________________ to connect two or more network.
3.1.3.2 – Differentiate between the three types of computer network.
Criteria LAN MAN WAN
Network size
Number of computers
Transmission media types
Speed
Cost
3.1.4 – Network Architecture3.1.4.1 – Define two types of network architecture.
Network Architecture Client/Server Peer-to-Peer
Definition
Cabling cost
Network usage
Ease to manage
Software needed
3.1.5 – Network Topology.
22
Panitia ICT SMK Kanowit 2011
3.1.5.1 – State three types of network topologies: Bus, Ring, Star
Definition: structure or configuration of ______________________ for ____________________.
Topology Diagram
3.1.5.2 - Differentiate between the three types of network topology
Aspect Ring Topology Star Topology Bus Topology
Host failure
Node Failure
Structure
Ease of adding/removing nodes
Ease of troubleshooting
Number of nodes when extending network
Connection between nodes
Host existence
3.1.6 - Protocol
23
Panitia ICT SMK Kanowit 2011
3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitate communication over computer network.
3.1.7 – Internet, Intranet, Extranet.3.1.7.1 – Describe the types of network communications technology (Internet, Intranet, Extranet)
Criteria Internet Intranet Extranet
Definition
Usage
Services
Accessibility
Security
3.2 – Hardware Requirements
24
Definition: Protocol is ………..
Importance of protocol:
TCP/IP:
Panitia ICT SMK Kanowit 2011
3.2.1 – Devices 3.2.1.1 – Identify the function of the devices needed in computer network communication.3.2.1.2 – State the function of the devices needed in computer network communication.
Diagram Device Name Function
Diagram Device Name Function
3.2.2 – Medium
25
From router
To MODEM
Panitia ICT SMK Kanowit 2011
3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable.
3.2.2.2 – Identify various types of wireless transmission media.
3.3 – Software Requirements.3.3.1 – Server Software3.3.1.1 – Define Network Operating System.
3.3.1.2 – Name various Network Operating System Software.
26
1
2
3
4
Network Operating System or known as __________ allows to ____________________ computers
and peripheral to a ______________________________.
Most frequently used with ______________ and ____________________ but also have application
to larger _____________________________________________.
It is not the same as the ____________________________________________ provided by some
existing __________________________________________.
It is specifically written to keep __________________________ running at
__________________________________________________.
Panitia ICT SMK Kanowit 2011
3.3.2 – Client Software3.3.2.1 – State the functions of various client software.
Client Software Function Example
Web Browser
1.
2.
3.
1. Internet Explorer (IE)
2.
3.
E-mail client
1. 1. Outlook Express
2.
Network Utilities
1.
2.
1. Ping
2.
Network File Manager
1.
2.
1. Network Neighbourhood
2.
3.4 – Setting Network Facilities
27
1. Window NT
2.
3.
4.
NOS
Panitia ICT SMK Kanowit 2011
3.4.1 – Installation of Network Interface Cards (NIC)
28
This is a
Step 1a: Place your
___________________________________ in the
PCI of your computer
Step 1b: Window will ____________________ that
it has found new hardware
Step 1c: The “Found New Hardware Wizard” will
then ___________________.
Click __________ to continue
Step 2a: Select “CD-ROM Drives” and click “Next”
to ________________. Window will find suitable
_____________ for your device.
Panitia ICT SMK Kanowit 2011
3.4.1.2 – Install drivers for NIC (for WinXP)
29
Step 2b: The NIC driver is now properly installed.
__________________ the computer to complete
the installation.
Step 1: Windows will indicate a new hardware found after the NIC has been inserted into its slot. Click Next to continue.
Step 2: Select “Search for the best driver for my device (recommended)” and click “________________” to continue
Step 3: Select “CD-ROM Drives” and click “Next” to continue. Windows will now search for the best driver for your device.
Panitia ICT SMK Kanowit 2011
3.4.2 – Cable Crimping and Testing3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable).
3.4.3 – Configuration and Testing Network.
30
Step 4: Windows will locate the correct driver for your device and indicate that it is now ready to install the driver. Click “Next” to continue.
Step 4: The NIC driver is now properly __________________________.
TOOLS
2 types
From PC to PC From PC to hub/switch/router
Panitia ICT SMK Kanowit 2011
3.4.3.1 – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Test the network connection.
3.4.3.2 - Steps to test a network connection:
3.4.4 Share Data3.4.4.1 – Create a share folder.
Questions
31
IP is _________________________________________________________.
Subnet mask specifies __________________________________ of the network.
_________________________________ are used to connect other network and the
_____________________________________________
1.
2.
3.
4.
1.
2.
3.
4.
Panitia ICT SMK Kanowit 2011
1. Figure 1 shows a network configuration.
Figure 1
a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other. [4 marks]
b. Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then filled the table below for the new configuration.
Computer IP address Subnet MaskPC 1PC 2
2.
Figure 2a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the
computers that able to communicate with each other. Justify your answer. [ 3 marks]
32
PC 1IP address: 192.168.1.5Subnet Mask: 255.255.253.0Gateway: 192.168.1.1
PC 2IP address: 192.168.1.5Subnet Mask: 255.255.253.0Gateway: 192.168.1.1
INTERNET
ADSL MODEMIP address: 192.168.1.1Subnet Mask: 255.255.255.0
Computer AIP address: 192.168.1.36Subnet Mask: 255.255.255.0Gateway: 192.168.1.1
Computer BIP address: 192.168.1.110Subnet Mask: 255.255.255.0Gateway: 192.168.1.1
Computer CIP address: 192.168.1.36Subnet Mask: 255.255.250.0Gateway: 192.168.1.1
ADSL MODEMIP address: 192.168.1.1Subnet Mask: 255.255.255.0
Panitia ICT SMK Kanowit 2011
b. There is one computer that unable to communicate with the other computer in the network. Identify that computer. Then identify the problem and re-configure the computer so that it can communicate with the other computers in the network. [3 marks]
3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1.
Based on Table 1, answer the following questions.a. As the school network administrator, you are asked to suggest a suitable network topology to Pn.
Malsiah, the school principal. Justify your answer. [4 marks]
b. You are also asked to suggest a suitable network architecture. Justify your answer. [3 marks]
4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to set up in his company.
a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks]
b. Give 2 services, with the examples, provided by the internet to Mr. Ali. [ 4 marks]
33
20 desktops 1 modem1 switch 1 routerLAN cables A server
Table 1
Panitia ICT SMK Kanowit 2011
Learning Area Four – Multimedia4.1 – Multimedia Concepts4.1.1 – Definition of Multimedia4.1.1.1 – Define multimedia
4.1.2 – Multimedia in various of fields4.1.2.1 – Identify the use of multimedia in various fields
Fields Example Usage
Education
Business
Art
Medicine
4.1.3 – Interactivity of multimedia4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia.
Types File format ExampleText Notepad, Microsoft Words
Audio
Video *.mov, *.avi
Animations
Graphics Paint, Photoshop
34
Multimedia is a
Interactivity refers to
Medium of delivery
Application Quality
Production Time
Production Cost
Up-to-Date
Panitia ICT SMK Kanowit 2011
Linear Criteria/Characteristics Non-Linear
User interaction with application
User control over the application
Application flow / arrangement
Example
4.1.4 – Medium of delivery4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications.
4.1.5. – Multimedia Elements4.1.5.1 – Identify the multimedia elements
35
Audio editor Example:
Text editor Example:
Graphics and image editor Example:
Video and animation editor Example:
Panitia ICT SMK Kanowit 2011
4.2 – Hardware and software4.2.1 – Hardware4.2.1.1 – Identify the hardware that can be used to produce multimedia products.
4.2.2 – Editing Software4.2.2.1 – Identify editing software that can be used to be produce multimedia elements
4.2.3 – Authoring Tools4.2.3.1 – Define the various concepts in authoring tools
Criteria Time Frame Concepts Icon Concepts Card ConceptsConcepts Uses visual icon in a
structural frameworkWay of presentation Uses frames that
represents the timeSpecial features Pages are arranged like
stack of cardsExamples Adobe flash
36
Multimedia Production Team
Panitia ICT SMK Kanowit 2011
4.2.4 - Web editor4.2.4.1 – Describe and give examples of web editors
4.3 – Multimedia development4.3.1 – User interface Principles4.3.1.1 – State the user interface principles4.3.1.2 – Apply suitable user interface principles in a project
Match the user interface principles with the correct statements
Consistency Can move around the system: menus, help
Clarity Enable user to search keyword or glossary
Context Make their own personal learning
Navigation Harmony and same applies to all screen
Search Clearness of labels on all icons
Personalisation Provides support system / help files
Learnability Can navigate through all sections without limitation
Flexibility Each part should be relevant to the title
4.3.2 – Development Team4.3.2.1 – State the role of each member in a development team.
37
Text-based:
Example:
What You See Is What You Get (WYSIWYG):
Example:
Panitia ICT SMK Kanowit 2011
Multimedia Production Team
Specialise in Scope of work
Project Manager Leading the multimedia team
Research on the content of a multimedia program
Graphics editing
Audio-video technician
Educational strategies and planning
Writes program codes (scripting) Combines the multimedia elements
4.3.3 – Multimedia production phase4.3.3.1 – Describe the phases in multimedia productions
38
Contrast
Simplicity
Proximity
Repetition
Alignment
Emphasis
Usage of different types of multimedia elements
Arrangement of the elements
Simple and easy way of presentation
Concept of grouping similar elements
Create a focus point on the screen
Concept of repetition the same texture, colour, size and font
Panitia ICT SMK Kanowit 2011
Multimedia production phase
Descriptions Example of activity
Interview clients to find out their needs
Write problem statement and proposal
Ali uses flow chart draft the flow of his multimedia application.
Ali uses storyboard to sketch the interface of the page.
Implementation phase
A checklist is used to test the multimedia program.
It is also to fix any error found.
James chooses a group of selected users to evaluate and give feedback to his multimedia program using Evaluation Form.
Publishing phase
Match the screen design principles with the correct statement
39
Panitia ICT SMK Kanowit 2011
Questions
1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as shown in Table 1. He uses authoring tool software to make his project more effective and interesting.
Collect pictures of the school, hostels, classes, field and canteen. Modify the school badge image so that it can be animated. Record the school anthem. Insert the school objectives, motto and school history into different screens.
Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3
Table 1Based on Table 1,
I. What is the name of the animated file used by Halim?
II. Halim wants to record his voice as background narration. Give one suitable device to carry out this task.
III. Name two missing multimedia element that is not in the files used by Halim.
IV. From your answer in 1 (c), give one suitable file extension for each elements you have mentioned.
2. Study the following table carefully. Then answer the questions based on Table 2.
Phase Description
X The multimedia developers interview the client to find out their needs and write the problem statement and a proposal.
Y The multimedia developers will design a flow chart and storyboard.
Z The multimedia developers will use a checklist to test the multimedia program. If there are errors, he will fix the program.
Table 2a) Identify phase X, Y and Z.
b) From your answer in 2 (a), what are the missing phases?
c) State one example activity for each of the missing phases from your answer in 2 (b).
3. User interface principles are:I. Clarity
II. ColourfulIII. ConsistencyIV. Wide screen
A. I and IIB. II and IVC. I and IIID. III and IV
40
Level of programming language
Low-level programming language
Example: Example:
High-level programming language
Example: Example: Example:
Panitia ICT SMK Kanowit 2011
Learning Area Five – Programming.
5.1 – Basic programming concepts5.1.1 – Define program and programming language5.1.1.1 – State the definition of program
5.1.1.2 – State the definition of programming language
5.1.2 – Levels and generations of programming language
41
A computer program is
A programming language is
Structured approach
Approach: Programs are drawn in ____________________
Smaller sections of each program are known as _____________________A program may have a __________________ or several ________________________Example of structured programming languages:
Beneficial for:
Object-oriented approachApproach: The object have _____________________with one another
Combines ____________ with functions to create ____________________Example of structured programming languages:
Beneficial for:
Panitia ICT SMK Kanowit 2011
5.1.3 – Programming Language Approaches5.1.3.1 – Define structured approach in programming
5.1.3.2 – Define object-oriented approach in programming
5.1.3.3 – Differentiate between structured approach and object oriented approach in programming
Structured approach Differences Object-oriented approach
Uses
Emphasize
Suitable for
42
Translator
Assembler
Is a computer program that Example of assembler:
Interpreter
Translator method: It is interpreted and executed in ______________________ when the user execute it
Execute ____________ by _________ until the end of the program.Example:
Weakness:
Compiler
Translator methods:
Advantages: Example:
Panitia ICT SMK Kanowit 2011
5.1.4 – Translator5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler
43
Basic Elements
Panitia ICT SMK Kanowit 2011
5.1.5 – Basic elements in programming
5.1.5.1 – Differentiate between constants and variables
Constant Differences Variable
CharacteristicsThe value may change at any time during the course of the program
Usage
1. Const Pi = 3.1422. Const Speed = 30
3.
4.
Example (declaration in Visual Basic 6)
1. Dim Speed as Integer
2.
3.
5.1.5.2 – Differentiate between data types: Boolean, integer, double, strings and date
Data types Description Example Integer
Any number value that may and could contain a fractional part.
“Kuala Lumpur”“23 is larger than 20”“Today is Monday”
Consists of a TRUE or FALSE value. It is usually used to store status
Contains date and time value
44
BEGIN
END
BEGIN
END
Panitia ICT SMK Kanowit 2011
5.1.5.3 – Differentiate between mathematical and logical (Boolean) operators.Operators Functions Operators Example Mathematical
+, -, ×, ÷
Logical operators perform logical operations such as checking the condition of two Boolean values
Extra: Operators Description Operator Example
A > BC >= D
5.1.5.4 – Differentiate between sequence control and selection control
Identify the types control structure below.
Differences
Execution flow
Usage
Symbols difference
45
Panitia ICT SMK Kanowit 2011
5.2 – Program Development5.2.1 – Program Development phases5.2.1.1 – Describe the five main phases in program development
Phases of Program Development
Multimedia production phase
Descriptions Example of activity
Interview clients to find out their needs
Write problem statement and proposal
Coding Phase
46
Coding
Begin
>= 50?
Request marks
Print “You have fail your ICT examination.”
End
Print “You have pass your ICT examination.”
No
Yes
Panitia ICT SMK Kanowit 2011
Questions1. Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an
entertainment park or not. The following are the source code.
if height_boy > 162 then enter = TRUE
if height_girl > 155 then enter = TRUE
else,
enter = FALSE
Figure 1Based on the programming above, answer the following questions.a. (i) Can height_boy and height_girl be declared as constant?
(ii) Justify your answer. [3 marks] b. (i) Identify the data types used
(ii) Give one difference for the data types you have mentioned in b(i). [4 marks]
2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program.
Figure2(a)
47
Private Sub CommandCheck_Click()
Dim marks As Double, response As String
marks = TextMark.Text
If (marks >= 50) Then
response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”)
Else
response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”)
End If
Begin
Request numbers of working days.
Calculate total salary:(RM 12.50 x number of working
days)
Print total salary
End
Panitia ICT SMK Kanowit 2011
Figure 2 (b)Based on Figure 2(a) and 2(b), answer the following questions:
i. States which phase comes after the process in Figure 2(a).
ii. Design the output interface for both of the outcomes. [7 marks]
2. Find the correct pair of data types.A. Const Height = 123.8 (Integer)B. Const Members = 34233 (Double)C. Const Input_Status = TRUE (Currency)D. Const Address = “Kuala Lumpur” (String)
3. Study the flow chart below carefully.
Diagram 3
Based on Diagram 3, answer the following questions:
i. There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol.[2 marks]
ii. What is the outcome of the salary if:a. The number of working days is six (6) days? [1 mark]b. The salary is now RM 15 and the working days are five (5) days? [1 mark]
48
Panitia ICT SMK Kanowit 2011
Learning Area Six – Information Systems6.1 – Concepts of Information Systems6.1.1 – Definition6.1.1.1 – Give the meaning of data, information and information systems.
6.1.2 – Usage of information systems in various fields6.1.2.1 – State the usage of information system in education, business and management.
Fields
Education
1.
2.
Business
1.
2.
Management
1.
2.
6.1.3 – Information System Components6.1.3.1 – List the Information System components6.1.3.2 – Define each of the Information System components
Hardware ProcedureEnd users who uses the system and information system personnel who creates the system.
49
Data Information Information System
Definition Definition Definition
Software
Types of Information System
Usage:
Usage:
Usage:
Usage:
Usage:
Panitia ICT SMK Kanowit 2011
6.1.3.3 – Describe the interrelation between information system components using a diagram.
6.1.4 – Types of Information Systems6.1.4.1 – List five types of Information systems6.1.4.2 – State the usage of each types of information system.
50
Description:
Bit
Record
Field
Byte
Fields
Database
Panitia ICT SMK Kanowit 2011
6.1.5 – Hierarchy of Data6.1.5.1 – Define bit, byte, field, record and file
6.1.5.2 – State the hierarchy of data
6.2.1 – Definition6.2.1.1 – Define database and Database Management System (DBMS)
51
Benefits of using database
Specific category of information in a table.Field
Record
File
Panitia ICT SMK Kanowit 2011
6.2.1.2 – List the benefits of using database
6.2.2 – Features6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file)
Name Age
Class
Amirullah 13 1ASarah 15 3CChai Leng 16 4S1
52
Database Management
System
Provides an interface between the database and the user
Primary key???The field that ___________________________________________________It must not have __________________ value.Each table must have at least ____________ primary key.It is also known as ___________________________.
Foreign key???The field that ___________________________________________________It can have __________________ value.It is ______________________________________ in other tables.It is also known as ___________________________.
Panitia ICT SMK Kanowit 2011
6.2.2.2 – Define the primary key and foreign key
6.2.2.3 – State the importance of the primary key.
6.2.2.4 – Differentiate between the primary key and foreign key.
Primary key Property Foreign keyUsage
Null valueDuplicate
6.2.2.5 – State the importance of the relationship between the primary key and foreign key.
6.2.3 – Database Objects6.2.3.1 – Define the following database objects / tools: Table, form, query, report
Database Object Definition
Table
Form
53
Panitia ICT SMK Kanowit 2011
Query
Report
6.2.4 – Data Manipulation6.2.4.1 – List the basic operations of data manipulation6.2.4.2 – State the usage of basic operations in data manipulation
Basic operation of data manipulation
Usage
Sort
To remove record(s) from the database
Filter
6.3 – Database Development6.3.1 – Phases of System Development6.3.1.1 – Describe the phases of System Development
System Development phase
Descriptions Example of activity
Interview clients to find out their needs
Write problem statement and proposal
Ali chooses the data he has collected during his interview.
Ali draft out the table contains necessary data.
54
Panitia ICT SMK Kanowit 2011
Implementation phase
It involves the system developer and users
It is to ensure the quality of a database.
James documents all the information from source code to user manual to troubleshooting information.
Maintenance phase
Involves three types of maintenance:o
o
o
55
Panitia ICT SMK Kanowit 2011
QuestionsTable 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a Simple Query Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria.
Table 1 Figure2
Figure 3
a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view the grades of the co curriculum activities for each student. Justify your answer. [3 marks]
b) Based on the query design in Figure 10, complete the query result below to show the information obtained. [ 3 marks]
Class Stu_ID Name Position CoCu
c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify your answer. [3 marks]
56