Professional Documents
Culture Documents
SMK DATO HARUN, TANJONG KARANG INFORMATION AND COMMUNICATION TECHNOLOGY SCHEME OF WORK 2013 FORM 4 1.0 INFORMATION TECHNOLOGY AND SOCIETY TOPICS AND SCOPE LEARNING OUTCOME SUGGESTED ACTIVITIES
STREAMING FORM FOUR FOLLOW THE RESULT & FORM FOUR ORIENTATIONS
2 7/1/13 13/1/13 3 14/1/13 20/1/13 1.1 Introduction to Information Technology (4 periods) INTRODUCTION TO SUBJECT SYLLABUS
Learners should be able to: 1.3.1 Define Information Technology in general. 1.1.2 Discuss the roles of IT in everyday life: Education Banking Industry Commerce. 1.2.1 Define Computer Ethics. 1.2.2 Identify the Code of Ethics.
Students state the definition of Information Technology in general. Group Activity: Discussing the roles of IT in everyday life. Students cite an example of a technology used in everyday life. Students adhere the rules and regulations set for the ICT lab.
4 21/1/13 27/1/13
Birthday of Prophet Nabi Muhammad S.A.W : 24/1/2013 Thaipusam : 27/1/2013
1.2
Students explain Computer Ethics and Code of Ethics. Students describe Intellectual Property and Privacy. Students carry out research on controversial contents and control. Students discuss computer crime and Security threats. Students carry out research on Cyber Law and its importance.
1.2.3 Define Intellectual Property. 1.2.4 Define Privacy: - 1authorized access : user authentication and verification Login (Personal Identification Numbers (PIN), User Identification, password) Biometrics physical control 1.2.5 Controversial contents and control: Pornography Slander Filtering (Example : NetNanny, CyberPatrol, BlockNow) 1.2.6 Computer crime and Security threats: Definition : Computer crime Security threats Examples of computer crimes: o Fraud identity fraud credit card fraud Copyright infringement unauthorized copy unauthorized file sharing Theft: data, information, equipment Attacks: Examples salami attack, virus, worms, hacking 1.2.7 Examples of Security threats : malicious codes: e.g. virus, Trojan horse, worms, spy ware, Phishing hacking: ethical (hackers) and nonethical hacking (crackers) Natural/environmental: e.g. fire and natural disasters Theft : e.g. physical, data, information
Form 4 Scheme Of Work For ICT (2013) SMK Dato Harun, Tanjong Karang
1.3.1 Define Computer Security 1.3.2 State Security measures: data backup cryptography 1.3.3 encryption and decryption antivirus anti-spyware Firewall Human aspects : awareness (policy, training)
Students discuss the meaning of Computer Security and its measures. Students describe encryption and decryption. Students carry out research on topics: antivirus anti-spyware Firewall Policy and training of computer security
7 11/2/13 17/2/13
Chinese New Year : 11/2/13
1.4.1 Impact of IT on society, 1.4.2 Copyright and Piracy from the moral and legal standpoint 1.4.3 Lack of security and its effects in industry/economy/ government. 1.4.4 Malaysian Cyber-law, electronic government law
Learners discuss the meaning of Copyright and Piracy. Learners list down the impact of piracy activities from the perspectives of: moral legal
8 18/2/13 24/2/13
2.0 COMPUTER SYSTEM WEEK TOPICS AND SCOPE MARCH 10 4/3/13 10/3/13 2.1 System Concept (6 periods)
LEARNING OUTCOME Learners should be able to: 2.1.1 Overview of computer system 2.1.2 Data Representation: bit byte character 2.1.3 Introduction to Binary coding : ASCII Data measurement: bit byte Kilobyte (KB) Megabyte (MB) Gigabyte (GB) Terabyte (TB)
SUGGESTED ACTIVITIES Individual/Group Task Complete a task sheet (a block diagram) on The Computer System. Identify the units used in data and clock speed measurements.
11 11/3/13 17/3/13
2.1.4
2.1.5 Clock speed measurement: megahertz (MHz) gigahertz (GHz) 12 18/3/13 24/3/13 MONTHLY TEST 1
Form 4 Scheme Of Work For ICT (2013) SMK Dato Harun, Tanjong Karang
APRIL 13 1/4/13 7/4/13 14 8/4/13 14/4/13 2.2 Hardware (12 periods) 2.2.1 Input Devices : Identify the input devices used for : text graphic audio video 2.2.2 Output Devices Identify the output devices used for : text graphic audio video 15 15/4/13 21/4/13 2.2.3 Motherboard Identify the location of the : central processing unit (CPU) expansion slots expansion cards RAM slots ports and connectors 2.2.4 Storage Explain types and functions of : primary storage (RAM, ROM) secondary storage (magnetic medium optical medium, flash memory) 2.3 Software (12 periods) Hands-on. Teacher shows different parts and components of the motherboard. Students identify the parts and components of the motherboard Individual/Group Task Retrieve photos of input and output devices from the Internet or other resources. REVISION SCHOOL ASSESSMENT (PBS)
Hands-on. Differentiate between primary and secondary storage by completing a task sheet.
Individual/Group task Collect information on different OS, application software and application software from relevant materials or the Internet. Find information on different types of proprietary and open source OS and application software. Find, download and explore one open source application software and give your comment.
2.3.2 Application Software: types and usage (word processing, spreadsheet, presentation, graphics) 2.3.3 Utility Program: types and usage (file management, antivirus, diagnostic, file compression) 2.3.4 Proprietary and open source software
Individual/Group task Assemble components. Follow step-by-step installation instructions provided. Test the functionality of the PC.
MID-YEAR EXAM
Individual/Group task (Refer to provided module) Assemble components. Follow step-by-step installation instructions provided. Test the functionality of the PC.
Form 4 Scheme Of Work For ICT (2013) SMK Dato Harun, Tanjong Karang
2.5.1 Latest Open Source Software Available 2.5.2 Latest Development In ICT
Individual/Group task Collect related information on open source software and compile it into a portfolio/digital portfolio.
3.0 COMPUTER NETWORKS AND COMMUNICATIONS WEEK TOPICS AND SCOPE LEARNING OUTCOME JULY 24 1/7/13 7/7/13 3.1 Basic Concepts of Networks and Communication (6 periods) 3.1.1 Define computer networks. 3.1.2 Define communications. 3.1.3 State the importance of network and communication using examples in the students immediate environment. 3.1.4 Define types of computer networks: LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network) 3.1.5 Differentiate between the three types of Computer networks. 3.1.6 Define two types of network architecture: Client/Server Peer-to-Peer 3.1.7 State three types of network topologies: bus ring star 3.1.8 Differentiate between the three types of Network topology. 3.1.9 Define Transmission Control protocol / Internet Protocol (TCP/IP) as a protocol to facilitate communication over computer network. 3.1.10 Describe the types of network communications technology : Internet Intranet Extranet 3.1.11 Cooperation in conducting group research
SUGGESTED ACTIVITIES Notes: Network: To connect two or more computers together with the ability to communicate with each other.
25 8/7/13 14/7/13
Individual/Group task : Discuss: - file sharing between computers - sending short messages using cellular services Conduct group research from Information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com Notes: LAN: A network that spans a small area usually confined to a single building or a group of buildings MAN: A network designed for town and city usually larger than Local-Area Network WAN: A network that spans a relatively large geographical area usually consisting two or more LocalArea Network. Example: The Internet Group activity: Students list out the differences between the three types of computer network Conduct group research from information sources (library, the Internet) on types of network architecture Notes: Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities Conduct group research from information sources (library, the Internet) on types of network topology Students draw simple diagram of the 3 types of network topology Students list out the differences between the three types of network topology Conduct group research from information sources (library, the Internet) on TCP/IP Conduct group research from information sources (library, the Internet) examples: Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0) http://www.webopedia.com
26 15/7/13 21/7/13
27 22/7/13 28/7/13
Nuzul Al-
3.2.1
Identify the devices needed to establish a computer network communication for a client/server network organization
Individual/Group Task Students list down the various network devices Notes: Network Devices:
Form 4 Scheme Of Work For ICT (2013) SMK Dato Harun, Tanjong Karang Quran : 26/7/13
Network Interface Card (Ethernet and Wi-Fi) Modem (Internal and External) Hub, Switch, Router Wireless Access Point
Notes: 3.2.2 Describe the functions of the Network Interface Card and hub Identify various types of physical transmission media/ cables such as Unshielded Twisted Pair(UTP), Shielded Twisted Pair(STP), Coaxial Cable and Fiber Optic Cable Identify various types of wireless transmission media such as infrared, radio wave and satellite Function of the Network Interface Card: KIV Function of Hub: KIV
3.2.3
3.2.4
28 29/7/13 4/8/13
3.3.1
Notes: Network Operating System (NOS): An operating system that includes functions for connecting computers and devices into a local-area network (LAN). It has the capabilities to coordinate the activities of multiple computers across a network Notes: Examples: Windows 2000 Server, Windows NT, LINUX, UNIX Notes: Examples: Web Browsing: Internet Explorer, Mozilla Firefox and Opera Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora Network Utilities: Ping and Traceroute Network File Manager: Network Neighborhood and My Network Places
3.3.2
3.3.3
State the functions of various client software : web browser email client network utilities network file manager
Install network interface card Setup the driver for the network card Crimp and test UTP cable Straight cable Crossed cable Configure the workstation to join a Local-Area Network Internet Protocol (IP) Address Subnet Mask Gateway Hostname Test the network connection Create a shared folder
Individual/Group Task Insert NIC correctly. Follow step-by-step installation instructions provided.
3.4
3.5 3.6
Activity: Set up a shared folder Save a file in the shared folder Access the file in the shared folder from other workstations
Form 4 Scheme Of Work For ICT (2013) SMK Dato Harun, Tanjong Karang
3.5.1 Describe: Mobile Computing (specifications, services, frequencies) Internet Technology and Services (VOIP, BLOG) Types of network (examples: PAN, VPN, WLAN, WIMAX)
Individual/Group Task Research on the chosen topic Write a short report (minimum of 350 words) and save the document in the shared folder.
34, 35 & 36 23/9/13 29/9/13 & OCTOBER 30/9/13 6/10/13 & 7/10/13 13/10/13 37 14/10/13 20/10/13
Hari Raya Aidil Adha : 15 16/10/2013
ICT ASSESSMENT (PORTFOLIOS) LA1 REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPITULATION
ICT ASSESSMENT (PORTFOLIOS) LA2 REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPITULATION
NOV 40 & 41 4/11/13 10/11/13 & 11/11/13 17/11/13 ICT ASSESSMENT (PORTFOLIOS) LA3 REINFORCEMENT OF FORM FOUR SYLLABUS OVERVIEW OF FORM FIVE SYLLABUS RECAPITULATION
SUMMARY : 2013 : 1) INFORMATION TECHNOLOGY AND SOCIETY 2) COMPUTER SYSTEM 3) COMPUTER NETWORKS AND COMMUNICATIONS 6 WEEKS 10 WEEKS 9 WEEKS (24 PERIODS) (40 PERIODS) (36 PERIODS)
Disediakan oleh :