Power Point form 4 dan 5

INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY 

1.1 Introduction to Information and Communication Technology
       1.1.1 Overview of Information and Communication Technology (ICT)
                1.1.1.1 Define ICT.
                1.1.1.2 Describe the brief evolution of computers.

       1.1.2 ICT In Everyday Life: Education, Banking, Industry and Commerce
                1.1.2.1 List the usage of ICT in everyday life.
                1.1.2.2 State the differences between computerised and non-computerised systems.
                1.1.2.3 State the impact of ICT on society.

1.2 Computer Ethics and Legal Issues
              1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime 
                          and Cyber Law.
              1.2.1.2 Differentiate between ethics and law.
              1.2.1.3State the need for intellectual property laws.
     
       1.1.2 Privacy
                1.2.2.1 List ways to protect privacy.
                1.2.2.2 State authentication and verification methods/ technologies

      1.2.3 Controversial Contents and Control 
               1.2.3.1 List effects of controversial contents on society:
                           • Pornography
                           • Slander
             1.2.3.2 Describe the process of filtering to control access to controversial contents.

      1.2.4 Computer Crimes
               1.2.4.1 Explain the need for Cyber Law.
               1.2.4.2 Explain briefly the computer crimes below:
                          • Fraud
                          • Copyright Infringement
                          • Theft
                          • Attacks
1.3 Computer Security 
      1.3.1 Definition
               1.3.1.1 Define computer security.
      1.3.2 Security Threats
              1.3.2.1 Explain briefly the different threats to computer security:
                         • Malicious code
                         • Hacking
                         • Natural disaster
                         • Theft
      1.3.3 Security Measures
               1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
               1.3.3.2 Apply the correct security procedures.
                          • Antivirus
                          • Anti-Spyware
                         • Cryptography
                         • Firewall
                         • Data backup
                         • Human aspects
1.4 Current and Future Developments
      1.4.1 Impact of ICT on Society
               1.4.1.1 Locate information from various sources (example: Internet, library or magazines).
               1.4.1.2 Describe the impact of ICT on society.
               1.4.1.3 Present results in a clear, concise manner
               1.4.1.4.Display cooperation in conducting study.