Вы находитесь на странице: 1из 49

Panitia ICT KSAH

INFORMATION AND COMMUNICATION TECHNOLOGY

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1.1.1.1 Define ICT.

ICT is the technology required for information processing, in particular, the use of electronic
computers, communication devices and software applications to convert, store, protect,
process, transmit and retrieve information from anywhere, anytime.
INFORMATION
Information refers to the knowledge obtained from reading, investigation, study or research.
The tools to transmit information are the telephone, television and radio. Information is
knowledge and helps us to fulfill our daily tasks.
COMMUNICATION
Communication is an act of transmitting messages. It is a process whereby information is
exchanged between individuals using symbols, signs or verbal interactions. Communication is
important in order to gain knowledge.
TECHNOLOGY
Technology is the use of scientific knowledge, experience and resources to create processes
products that fulfill human needs. Technology is vital in communication.

1.1.1.2 Describe the brief evolution of computers.

COMPUTER GENERATIONS
First Generation (1940-1956)
The 1st. generation computer were huge, slow, expensive and often unreliable. In 1946, two
Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical
Integrator and Computer). It use vacuum tube instead of mechanical switches of the MARK 1.
In 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000
addition per seconds.
The new invention of hardware were needed with the new computer technology. Among them
are vacuum tube, punched card, magnetic tape.
Problems:
• the vacuum tubes generated a great deal of heat causing many problems in
temperature regulation and climate control
• the tubes also burnt out frequently
• people operating the computer did not know that the problem was in the programming
machine
SECOND GENERATION (1956-1963)
The creation of transistor spark the production of 2nd. generation. Transistor was small devices
use to transfer electronic signals across a resister. Compared to other hardware technology,
transistors had many advantages such as:
• transistors were smaller than vacuum tubes
• they needed no warm up time
• consumed less energy
• generated much less heat
• faster and more reliable
THIRD GENERATION (1964-1971)
In the 3rd. generation era, the IBM 370 series were introduced in 1964. It came in several
models and sizes. It was used for business and scientific programs. Other computer models
introduced were CDC 7600 and B2500.
The development of integrated circuit (IC) signal the beginning of the 3 rd. generation. Silicone
chips were manufactured in 1961. Then came the IC technology, which had reduced the size
and cost of computers. It is a complete electronic circuit on a small chip of silicone which is also
known as semi conductor. Other than that, the Magnetic Core Memory was replaced by a

1 fauzi&ghozes@ksah2009
Panitia ICT KSAH

device called the microchip. Also the first 256 bit RAM was introduced and it was the basis for
development of 1K bit RAM.
Advantages:
A new concept in this generation was that of a family of computer which allowed computer to
be upgraded and expanded as necessary.
• Silicone chips were reliable, compact and cheaper.
• Sold hardware & software separately which created the software industry.
• customer service industry flourished (reservation and credit checks)
FOURTH GENERATION (1971- PRESENT)
The growth of the computer industry developed technologies of computer inventions. There are
many types of computer models such as Apple Macintosh, IBM, DELL & ACER.
In 1971 Intel created the first microprocessor. In 1976, Steve Jobs built the first Apple
computer. Then, in 1981, IBM introduced its first personal computer.
During the 4th. generation, hardware technology such as silicone chips, microprocessor and
storage devices were invented. A microprocessor is a chip which is developed for computer
memory and logic.
The microprocessor is a large-scale integrated circuit which contained thousands of transistors.
The transistors are capable of performing all of the functions of a computer's CPU.
Advantages:
• Computers became 100 times smaller than ENIAC the first computer
• Gain in speed, reliability and storage capacity
• Personal & software industry boomed
FIFTH GENERATION (PRESENT & BEYOND)
The 5th. generation are technologically advance and are still being development to become
more efficient. The inventions of new hardware technology have grown rapidly including many
other computer devices such as silicone chips, processor, robotics, virtual reality intelligent
systems & programs which translate languages
NEW ERA COMPUTER
After the 5th. generation computer, the technology has become more advanced, modern &
sophisticated. The latest invention in are Super Computers, Mainframe Computers, Mini
Computers, Personal Computers & Mobile Computers.
In the new era of computers, expert system such as teleconferencing & speech-recognition
system have been invented as part of communication tools.

1.1.2.1 List the usage of ICT in everyday life.

EDUCATION
In education, teachers, students, researchers and school administrators benefits from the
usage of ICT. Computers offer interactive experiences, enhanced learning, cognitif
development & better management.
Teachers:
~ use computers to search for teaching materials, participate in online forums and online
conferences as well as to aid their teaching.
Students:
~ use the computers as a reference tool. They use computers to browse the internet to look
for information.
Researchers:
~ use computers to collect and process data.
School Administrators:
~ use computers for administrative purposes to make sure that the entire operation runs
smoothly.
BANKING
In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
Customers:
~ can make any transactions at the 24 hour service centres or via online.These services
allow them to do transaction at anytime they want.
Businessman:

2 fauzi&ghozes@ksah2009
Panitia ICT KSAH

~ can save their time by using the online services offered by banks. They can access
company accounts for loan applications, business transactions and update on their cash
flow at any time.
Bank Administrator:
~ can oversee the entire banking activities such as reconciliations, inter-branch transactions
(IBT), telegraphic transfer and others by referring to the banking system.
INDUSTRY
Computers are used to facilitate production planning and control systems, to support chain
management and to help in product design in the industrial sector. In the industrial sector,
workers, researchers and administrator benefits from the usage of ICT.
Workers:
~ use machines that are connected to computers to operate. In some productions, robots are
used to take over jobs that are dangerous to the workers.
Researchers:
~ use computers to analyse and collect research data for future reference.
Administrators:
~ use computers to oversee the entire operations in the plant or factory to detect specific
errors or defects that occurred in the process.
E-COMMERCE
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more
efficient and faster. For this application, computers, Internet and shared software are needed.
In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
Customers:
~ use computers to be connected online with suppliers to purchase products. This method
can save time and cost as they do not have to go to any outlets.
Suppliers:
~ use computers to keep track of their transactions. All products are bar coded and can be
read by the computer scanner to help in determining prices and managing inventory.
Employees:
~ use computers and telephones to communicate with their customers for any enquiries. The
system helps employees to get the latest updates on inventory to be informed to the
customers.
OTHER SECTORS:
Among other sectors that benefit from the usage of ICT are archiecture, arts, career,
goverment, healthcare, home, law enforcement, transportation and travel

1.1.2.2 State the differences between computerised and non-computerised systems.

Before ICT With ICT


• depends strictly on teachers &
• more interesting & interactive
textbook
EDUCATION experiences
• no or limited technology in the
• enhanced learning
teaching & learning process
• all transactions are done by
• banking was done manually by computers
taking deposits directly • transaction can be done at
BANKING
• transactions can only be made anytime and place
SYSTEM
during working hours • online services, phone banking
• takes time to approve any loan system, credit cards are
applications available

• Computers and
• Production was slow because telecommunications industry
everything was done manually became very popular and
INDUSTRY
and totally depended on human profitable since production can
labour. be increased through an all day
operation.

3 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Before ICT With ICT


• Trading was made using the
barter system and it was then
later developed into currency.
• Advertisement was in the form of • E-commerce plays an important
word of mouth, billboards and role in the economic scene. It
COMMERCE
printed flyers. includes distribution, buying,
• Trading globally was extremely selling and servicing products
slow, late and expensive. that are done electronically
Traders had to find ways to
market local products in the
global market.

1.1.2.3 State the impact of ICT on society.

1. FASTER COMMUNICATION SPEED


With the Internet, news or messages are sent via e-mail to anyone efficiently. With the
capability and connection speed on the Internet, any information can travel fast and at an
instant. It saves time and is inexpensive.
2. LOWER COMMUNICATION COST
Using the Internet is cost-effective than other modes of communication such as telephone,
mailing or courier service. It allows access to large amounts of data at a very low cost. We
do not have to pay for any basic services provided by the Internet. The cost of connection is
relatively cheap.
3. RELIABLE MODE OF COMMUNICATION
Computers are reliable. Information could be accessed and retrieved from anywhere and at
anytime. This makes it a reliable mode of communication.
4. EFFECTIVE SHARING OF INFORMATION
With ICT, information can be shared all around the world. People can share and exchange
opinions, news and information through discussion groups, mailing list and forums. This will
contribute to the development of knowledge based society.
5. PAPERLESS ENVIRONMENT
ICT has created the term paperless environment which means information can be stored &
retrieved through the digital medium instead of paper. Online communication via emails,
online chat and instant messaging also helps in creating the paperless environment.
6. BORDERLESS COMMUNICATION
Internet has become a borderless sources for services and information. Through the
Internet, information and communication can be borderless. It offers fast information
retrieval, interactivity, accessibility and versatility. It
7. SOCIAL PROBLEMS
There are some negative effects of ICT. It has created social problems in the society.
Nowadays, people tend to choose online communication rather than having real time
conversations. People tend to become more individualistic and introvert. Another negative
effect of ICT are fraud, identity theft, pornography & hacking. This will result a moral
decedent and generate threads to the society.
8. HEALTH PROBLEMS
A computer may harm users if they use it for long hours frequently. Computer users are also
exposed to bad posture, eyestrain, physical and mental stress. In order to solve the health
problems, an ergonomic environment can be introduced.

Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy,


1.2.1.1
Computer Crime & Cyber Law.

1. COMPUTER ETHICS
Computer ethics is a system of moral standards or values used as a guideline for computer
users. It is needed to stop the current technology products from being exploited.

4 fauzi&ghozes@ksah2009
Panitia ICT KSAH

2. CODE OF ETHICS
Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it.
Code of ethics in computing means moral guidelines to refer to when using the computer
and the Internet.
3. INTELLECTUAL PROPERTY
Intellectual property refers to any product of human intellect that is unique and has value in
the market place. This covers ideas, inventions, unique name, computer program codes and
many more.
4. PRIVACY
Privacy in IT refers to data and information privacy. In general, data include texts, numbers,
sounds, images and video. Information privacy is described as the rights of individuals and
companies to deny or restrict the collection and use of information about them.
5. COMPUTER CRIMES
Computer crimes is defined as any criminal activities that are related to the use of
computers. These activities include computer fraud, copyright infringement, computer theft
and computer attack.
6. CYBER LAW
Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.

1.2.1.2 Differentiate between ethics and law.

ETHICS LAW

Guideline: As a guideline to computer Control: As a rule to control computer


users. users.

Moral Standards: Ethical behaviour is Judicial Standards: Law is judged by


judged by moral standards. judicial standards.

Free To Follow: Computer users are free to Must Follow: Computer users must follow
follow or ignore the code of ethics. the regulations and law.

Punishments: Penalties, imprisonments


No Punishments: No punishment for
and other punishments for those who break
anyone who violates ethics.
the law.

Universals: Universal, can be applied Depends On Country: Depends on country


anywhere, all over the world and state where the crime is committed.

Produce Ethical Computer Users: To Prevent Misusing Of Computers: To


produce ethical computer users. prevent misuse of computers.

Immoral: Not honouring computer ethics


Crime: Not honouring the law means
means ignoring the moral elements
committing a crime.
(immoral).

1.2.1.3 State the need for intellectual property laws.

Intellectual property laws are needed to establish and safeguard the intellectual property which
refers to works created by inventors, authors and artists. It is also needed as businesses today
continue to expand globally. There are four types of Intellectual Property protection. They are
patents for invention, trademarks for brand identity, designs for product appearance and
copyright for material.

5 fauzi&ghozes@ksah2009
Panitia ICT KSAH

1.2.2.1 List ways to protect privacy.

Privacy can be protected by privacy law and utilities software:


(a) Privacy law
The privacy laws in Malaysia emphasises on the following:
• Security Services to review the security policy
• Security Management to protect the resources
• Security Mechanism to implement the required security services
• Security Objects, the important entities within the system environment
(b) Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.

1.2.2.2 State authentication & verification methods/ technologies.

Methods of Authentication
There are two commonly used authentication methods, which are biometric device and
callback system. Biometric device is a device that translates personal characteristics into a
digital code that is compared with a digital code stored in the database. Biometric devices
include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal
Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking
system that authenticates the user.
Methods of Verification
There are two methods used in verification, which are user identification and processed
object. User identification refers to the process of validating the user. Processed object refers
to something the user has such as identification card, security token and cell phone.

1.2.3.1 List effects of controversial contents on society:

Pornography:
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander:
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person

1.2.3.2 Describe the process of filtering to control access to controversial contents.

Internet filtering is a process that prevents or blocks access to certain materials on the Internet.
It is a process of controlling the access to the internet by means of filtering software. It is used
to prevent children from accessing inappropriate material and to keep employees productive on
the Internet.
The current preferred method of choice to limit access on the Internet is to filter content either
by:
• keyword blocking
• site blocking
• web rating systems
These methods require software to be installed at a client of server level.

6 fauzi&ghozes@ksah2009
Panitia ICT KSAH

1.2.4.1 Explain the need for Cyber Law.

Cyber Law is needed as in the recent years, many concerns and issues were raised on the
integrity and security of information, legal status of online transactions, privacy and
confidentiality of information, intellectual property rights and security of government data placed
on the Internet.

1.2.4.2 Explain briefly the computer crimes below:

Fraud:
Computer fraud is defined as having an intention to take advantage over or causing loss to
other people, mainly on monetary basis through the use of computers. Computer fraud includes
e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of
expertise on certain fields.
Students need to be aware of other computer frauds such as health frauds, scams and
hacking. Students will also most likely get false information while researching information on
the Internet.
Copyright Infringement:
Copyright infringement is defined as a violation of the rights secured by a copyright. It involves
illegal copy or reproduction of copyrights material by the black market group. The open
commercial sale of pirated item is also illegal. With the current technology, the most perfect
copy of the original copy can be downloaded from the internet.
Theft:
Computer theft is defined as the unauthorised use of another person’s property with the
intention to deny the owner the rightful possession of that property or its use. Examples of
computer theft include:
• transfer of payments to the wrong accounts
• tap into data transmission lines on database at no cost
• divert goods to the wrong destination
Attacks:
Computer attack may be defined as any activities taken to disrupt the equipment of computer
systems, change processing control or corrupt stored data.
Computer attack can be in the forms of:
• physical attack that disrupt the computer facility or its transmission lines.
• an electronic attack that uses the power of electromagnetic energy to overload
computer circuitry.
• a computer network attack that uses a malicious code to exploit a weakness in
software, or in the computer security practices of a computer user.

1.3.1.1 Define computer security.

Computer security means protecting our computer systems and the information they contain
against unwanted access, damage, destruction or modification. Three types of computer
security are:
• hardware security
• software security/data security
• network security
We need to protect our computer from any intruders such as hackers, crackers and script
kiddie.

1.3.2.1 Explain briefly the different threats to computer security:

Malicious code
Malicious code is also known as a rogue program. It will cause undesired effects in the
programmer’s part. The effect is caused by an agent, with the intention to cause damage. The

7 fauzi&ghozes@ksah2009
Panitia ICT KSAH

agent for malicious code is the writer of the code who causes its distribution. There are various
kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor,
worm and many others.
Hacking
Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are
persons who learn about the computer system in detail. They write program referred to as
hacks. Hackers may use a modem or cable to hack the targeted computers.
Natural disaster
Computers are also threatened by natural or environmental disaster. Examples of natural and
environmental disasters:
 Flood
 Fire
 Earthquakes, storms and tornados
 Excessive Heat
 Inadequate Power Supply
Theft
Two types of computer theft:
1) Computer is used to steal money, goods, information and resources.
2) Stealing of computer, especially notebook and PDAs.

1.3.3.2 Apply the correct security procedures.

Data Protection
We need to protect the data in the computer as it may somehow get lost or corrupted due to
some viruses or mishap like fire, flood, lightning, machine failures and even human errors.
There are a few ways to protect the information namely:
• make backup files
• detect the virus and clean the computer
• warn others on virus attacks
Detecting Illegal Access To Systems
The computer system is able to detect any illegal access to the system by a user who does not
have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access
(unauthorize) to the system. User's access will be reviewed periodically by computer
operations. On going internal audits will be made to ensure detection of violations of security
and unauthorised modifications to software and data .
Tcpwrappers will control access at the application level, rather than at the socket level like
iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin,
rexec and telnet.
Tripwire will detect and report on any changes in the thousands of strategic system files. The
system will run tripwire to determine if system files have changed.
Preventing Illegal Access To Systems
Computer systems would not allow any unauthorised users to simply access the system. Ways
to prevent illegal access to systems:
• Run anlpassword to make password cracking difficult.
• Run tcpwrappers to check if the name for an ip address can be provided by
DNC
• Use a callback system to prevent unauthorised use of stolen passwords.
Preventing Illegal Root Access
To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that
people can perform on some machine without getting access to the entire root if that is not
required. In addition, with Sudo we did not have to give out the root password.
Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows
users to run programs in the form of another user (normally in the form of the system's
superuser). Sudo allows a permitted user to execute a command as the superuser or another
user, as specified in the sudoers file.
Patch
Patch supplies small updates to software, provided that the source code is available. Patch is a
name of an UNIX utility. It applies a script generated by the different program to a set of files

8 fauzi&ghozes@ksah2009
Panitia ICT KSAH

that allows changes from one file to be directly applied to another file. Resources are not
enough to patch all security holes that we hear about through the bugtraq list.

1.4.1.1 Locate information from various sources

Informations or study materials are available offline and online. We can search for the
information that we want in books, journals, articles or other resource materials found in the
library and the Internet. A list of all the books, journals and electronic materials are available
from the library. We can use the online databases to find the most useful materials for our
study.
Anyway, the selected materials need to be evaluated in four aspects. They are relevance,
reliability/credibility, perspective & update.

1.4.1.2 Describe the impact of ICT on society

The computer has change the society today as much as industrial revolution changed society in
18th and 19th century. People interacts directly with computer in education, finance,
government, health care, science, publishing, tourism, and industry.
Computers help them to do their work faster and more efficient by using the software
application that consist of special program for specific task.
Home & Education
Today, computers are used in schools, colleges and universities to promote better education.
Students use software packages to complete their assignments. Educators use the computer-
based training and web-based training as replacements for lecture presentation.
Computers for Higher Education
Open Distance Learning (ODL) or online learning can be implemented as computers are the
main medium in delivering the knowledge from one location to the other locations. This type of
learning consists of online forum, discussion, quizzes, test questions and many more. The
example of the Open Distance Learning institution is the Open University of Malaysia.
Business
People use finance or accounting software to balance check books, pay bills, track personal
income and expenses, manage investments and evaluate their financial plans. Accounting
software helps companies to record and report their financial transactions.
Computers in Banking
In the banking sector, many financial institutions offer online banking. People can access their
financial records from anywhere in the world. One example of online banking is Maybank2u.
Most of the packages on banking offer a variety of online services which requires access to the
web. For example we can track our investment online, compare insurance rates and do online
banking.
Industry
By using the CAM system, computers record actual labour, material, machine and computer
time used to manufacture a particular product. Computers process this data and automatically
update inventory, production, payroll and accounting records on the company’s network.
Examples of companies using this system are Proton and Perodua.
Graphics & Multimedia
Computers are crucial in publishing especially in the process of making works available to the
public. These works include magazines, books, newspapers, music and film production.
Special software applications are used to assist graphic designers to develop graphics, texts,
photographs and composing songs.
Communication
A government provides society with direction by making and administering policies. Most
government offices or agencies have websites in order to provide citizens with up-to-date or
latest information. Examples of software applications used for communication include e-mail,
web browsers, newsgroups, instant messaging and video conferencing. We can access
government websites to:
 check information on taxes (www.hasil.org.my)
 pay parking tickets and check summons (www.jpj.gov.my)

9 fauzi&ghozes@ksah2009
Panitia ICT KSAH

 register online for IPTA/IPTS application (www.moe.gov.my)


Computers in Tourism
Today, people will go online to get all related information about traveling. They can visit
websites to get information on destinations, prices, hotels, flights and car rentals. They can also
purchase ticket online, all payments can be made by using credit card.

Computers in the Healthcare


In the medical field, computers are very important in running the operations. Medical staffs use
computers for various purposes, namely:
• maintaining patient records
• monitoring patients’ vital sign
• assisting doctors, nurses and technicians with medical tests by using computer and
computerised devices .
• using medical software to help with researching and diagnosing health conditions.
Furthermore, computers and the internet are important sources for people to get all information
on medical, nutrition, fitness and other tips from several available websites. The latest
development in the medical field is telemedicine which help professional to conduct live
conference in separate locations around the globe.
Science
In the scientific world, computers are used in all fields of science from biology to astronomy to
meteorology and others. These are things that can be done by computers, namely:
 collecting, analyzing and modelling data
 serving as medium of communication with colleagues around the world
 contributing to new inventions or breakthrough in surgery, medicine and treatment
 imitating functions of the central nervous system, retina of the eye and others by tiny
computers
 allowing a deaf person to listen through cochlear implant

1.4.1.3 Present results in a clear, concise manner.

A good presentation should contain three well-defined sections, they are:


1. Introduction
 is at the beginning of the research
 includes the objectives of the research
 provides a clear statement on why the study was undertaken
 includes the limitations/assumptions and analytical techniques
2. Content
 consists of facts or arguments related to subject matter
 can be presented in an argument format or just as an overview
3. Conclusion
 is a review of content (not repetition of content)
 relates to the statement of objectives in the introduction
 should not introduce new issues
 should contain judgment or decision that has been reached

1.4.1.4 Display cooperation in conducting study.

Cooperation in conducting study can be display through delegation of works among team
members. Delegation is the ability to assign tasks to others with the authority, responsibility and
accountability to finish the tasks. This means it is not enough to just give out orders to people
but as a team leader you also need to give specific instructions on what to do. Tell your team
members that they are responsible for the task given to them and explain to them what would
happen to the project if they failed to finish the task.

10 fauzi&ghozes@ksah2009
Panitia ICT KSAH

2.1.1.1 Define computer systems.

A computer system is defined as combination of components designed to process data and


store files. A computer system consists of four major hardware components; input devices,
output devices, processor and storage devices. A computer system requires hardware,
software and a user to fully function.

2.1.1.2 State the meaning of input, process, output and storage.

Input
Input is any data or instructions that we enter into the computer system for processing. There
are four types of input: which are text, graphic, audio and video. Example of input devices are
keyboard, light pen, joystick, microphone, mouse, video & digital camera.
Process
The processing unit controls all activities within the system. The CPU is an example of a
processor. It has the same important as the brain to human being.
Storage
Storage is a location which data, instruction and information are held for future use. It is the
physical material that keeps keeps data, instruction and information. There are two types of
storage. They are the primary storage and secondary storage. The example of storage devices
are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM.
Output
Output is data that has been processed into a useful form, called information. There are four
types of output, which are texts, graphics, audio and video. Example of output devices are
monitor, printer, speaker and plotter.

Describe the information processing cycle which includes input, process,


2.1.1.3
output and storage.

Input
Users input data or instruction into the computer system to be process. Input could be either
text, graphic, audio or video. Input devices are used by users to input data. Input devices are
any electronic device connected to a computer and produces input signals.
Process
Data or instruction being input into the computer system is then processed by the CPU which
controls all activities within the system. The results of the processed data are then sent to an
output device as usable data.
A CPU interprets the and carries out the instructions by processing data and controlling the rest
of the computer’s components.
A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit
(ALU). CU’s main function is to direct the CPU to process data by extracting instructions from
memory and decodes and executes them. The CU manages a four-step basic operation which
is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing:
Storage
Computer storage is important to help users store programs and data to be used at a later time.
It is also useful to keep current data while being processed by the processor until the
information is saved in a storage media such as a hard disk or a diskette. Computer storage

11 fauzi&ghozes@ksah2009
Panitia ICT KSAH

also stores instructions from a computer program. There are two type of computer storage;
primary storage and secondary storage.
Primary storage is known as the main memory of a computer, including RAM (Random-
Access Memory) and ROM (Read-Only Memory). It is an internal memory (inside the CPU) that
can be accessed directly by the processor.
Secondary storage an external storage that refers to various ways a computer can store
program and data. Many complex functions, such as translators for high-level languages and
operating systems are placed in primary storage. Secondary storage is an alternative storage.
It is very useful to store programs and data for future use.
Output
Output is the result of data processing activity when it is presented external to the system. The
output from a computer can be in a form for use by people, for example, printed or displayed.
There are four types of output, which are texts, graphics, audio and video.

2.1.2.1 State the relationship of data representation: bit, byte and character.

Bit
A bit is the smallest unit of data that the computer can process. Bit is a short for binary digit. A
bit is represented by the numbers 1 and 0. These numbers represent the binary system. They
correspond to the states of on and off, true and false, or yes and no. All digital data use the
binary system to process the information. This information include letters, digits or special
character.
Byte
Byte is a unit of information built from bits. One byte is equals to 8 bits. Eight bits that are
grouped together as a unit. A byte provides enough different combinations of 0s and 1s to
represent 256 individual characters. One byte represents a single character such as the
number 3, letter b or a $ symbol. Bits and bytes are the basis for representing all meaningful
information and programs on computers.
Character
A byte represents a single character in the computer. One character such as A, 7, 9 and + is
eight bits that are grouped together.A byte provides enough different combinations of 0s and 1s
to represent 256 individual characters. For example, the capital letter F is represented by the
binary code 01000110 that can be understood by the computer system. Eight bits grouped
together as a unit are called a byte..

2.1.3.1 Explain the function of ASCII code.

ASCII (American Standard Code for Information Interchange) was established to:
• achieve compatibility between various types of data processing equipment making it
possible for the components to communicate with each other successfully.
• enables manufacturers to produce components that are assured to operate correctly in
a computer.
• make it possible for humans to interact with a computer. It also enables users to
purchase components that are compatible with their computer configurations.

2.1.4.1 State the units of data measurement:

Bit
A bit is represented by the numbers 1 and 0. They correspond to the states of on and off, true
and false, or yes and no.
Byte
1 byte = 8 bit

12 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Kilobyte (KB)
1 KB = 1024 bytes or 1 KB = 210 bytes
Megabyte (MB)
1 MB = 1 048 576 bytes or 1 MB = 220 bytes
Gigabyte (GB)
1 GB = 1 073 741 824 bytes 1 GB = 230 bytes
Terabyte (TB)
1 TB = 1 099 511 627 776 bytes or 1 TB = 240 bytes

Note:
1 KB = 1 024 byte
1 MB = 1 024 KB = 1 048 576 byte
1 GB = 1 024 MB = 1 048 576 KB = 1 073 741 824 byte
1 TB = 1 024 GB = 1 048 576 MB = 1 073 741 824 KB = 1 099 511 627 776 byte

2.1.5.1 State the units of clock speed measurement:

Hertz & Seconds


A hertz is one cycle per second.
Megahertz (MHz)
Megahertz (MHz) equals to one million cycles of the system
clock.
(Mega is a prefix that stands for million. A computer that
operates at 933 MHz has 933 million clock cycles in one
second.)
Gigahertz (GHz)
Gigahertz (GHz) equals to one billion cycles of the system
clock. In relation with megahertz, 1.0GHz is equivalent to
1000 MHz.
Giga is a prefix that stands for billion. GHz is most often used as a measurement of a PC
processor chip and power, with bigger numbers meaning more speed and higher price. A
microprocessor that runs at 200 GHz executes 200 billion cycles per second. For a 2.4 GHz
machine . Its clock rate is 2.4 billion cycles per second..)

2.2.1.1 Identify the input devices used for text, graphic, audio and video.

Input Devices For Texts


Keyboard, virtual keyboard (on the screen) & an optical reader (uses a light source to read
characters, marks and codes and then converts them into digital data that a computer can
process.
Input Devices For Graphics
Scanner is a device that captures images from photographic prints, posters, magazine pages
and similar sources for computer editing and display.
Digital camera allows you to take pictures and store the photographed images digitally.
Input Devices For Audio
Audio input devices are such microphone and digital musical instruments like the Musical
Instrument Digital Interface (MIDI) keyboard.
Input Devices For Video
Closed-Circuit Television (CCTV) video camera is a type of digital video camera that enables a
home or small business user to capture video and still images.
A webcam is any video camera that displays its output on a web page.
A digital video camera allows you to record full motion and store the captured motion digitally.
Pointing Devices
A pointing device is another form of input device. Pointing devices such as a mouse, trackball,
graphics tablet and touch screen are used to input spatial data into the computer. (Spatial data
refers to data that is continuous and multi-dimensional).

13 fauzi&ghozes@ksah2009
Panitia ICT KSAH

2.2.2.1 Identify the output devices used for text, graphic, audio and video

A monitor is an example of an output device that can be used to display text. It can also display
graphics and video. It iaccepts video signals from a computer and displays information on its
screen.
A printer is another example of an output device that can be used to print text, apart from
graphics, on mediums such as paper, transparency film or even cloths. A photo printer is a
colour printer that produces photo-lab-quality pictures.
An image setter produces high quality output compared to an ordinary laser printer. An image
setter is a high resolution output device that can transfer electronic text and graphics directly to
film, plates, or photo-sensitive paper.
A pair of speakers is an audio output device that generates sound. The headphone is a pair of
small speakers placed over the ears and plugged into a port on the sound card. A woofer or
subwoofer is used to boost the low bass sound and is connected to the port on the sound card.
A Liquid Crystal Display (LCD) projector uses its own light source to project what is displayed
on the computer on a wall or projection screen. A digital light processing (DLP) projector uses
tiny mirrors to reflect light which can be seen clearly in a well-lit room.

Identify the location of the central processing unit (CPU), expansion slots,
2.2.3.1
expansion cards, RAM slots, ports and connectors on the motherboard.

Motherboard is the main circuit board which has some electronic components attached to it and
others built into it. CPU, expansion slots, expansion cards, RAM slots, ports and connectors are
the components on the motherboard.

2.2.4.1 Explain types and functions of:

Primary Storage (RAM, ROM)


Primary storage is the main memory in a computer. It stores data and programs that can be
accessed directly by the processor. There are two types of primary storage which are RAM
(Random-Access Memory) and ROM (Read-Only Memory). RAM is installed inside
computers. RAM is also known as a working memory.
RAM:
• The data in RAM can be read (retrieved) or written (stored).
• RAM is volatile which means the programs and data in RAM are lost when the
computer is powered off.
• Computer uses RAM to hold temporary instructions and data needed to complete
tasks. This enables CPU to access instructions and data stored in the memory very
quickly.
• RAM stores data during and after processing.
ROM:
• ROM is another type of memory permanently stored inside the computer.
• ROM is non-volatile. It holds the programs and data when the computer is powered off.
• Programs in ROM have been pre-recorded. It can only be stored by the manufacturer;
once it is done, it cannot be changed.
• Many complex functions, such as start up operating instructions, translators for high-
level languages & operating systems are placed in ROM memory.
• All the contents in ROM can be accessed and read but cannot be changed.

ASPECT RAM ROM


Data and Stores during and after Stored by manufacturer
program processing
Content Stores information temporarily Stores instructions (Information)

14 fauzi&ghozes@ksah2009
Panitia ICT KSAH

permanently
Processing time Very fast, but uses a lot of power Fast, but uses very little power
Volatility Volatile Non-volatile

15 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Secondary Storage (magnetic medium optical medium, flash memory)


Secondary storage can be divided into magnetic medium, optical medium and flash memory.
Magnetic Medium
Magnetic medium is a non-volatile storage medium. It can be any type of storage medium that
utilizes magnetic patterns to represent information. The devices use disks that are coated with
magnetically sensitive material. The examples of magnetic storage are:
• magnetic disk such as:
o a floppy disk, used for off-line storage
o hard disk, used for secondary storage
• magnetic tape; including video cassette, audio storage reel-to-reel tape & others.
Optical Medium
Optical medium is a non-volatile storage media that holds content in digital form that are written
and read by a laser. These media include various types of CDs and DVDs.
These following forms are often commonly used :
• CD, CD-ROM, and DVD: Read only storage, used for distribution of digital information
such as music, video and computer programs.
• CD-R: Write once storage, the data cannot be erased or written over once it is saved.
• CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data
that have been saved to be erased and rewritten.
The disk capacity of optical media is more compared to magnetic media. Durability is another
feature of optical media, they are able to last for up to seven times as long as traditional
storage media.
Flash Memory
Flash Memory is a solid-state, non-volatile, rewritable memory that functions like RAM and a
hard disk drive combined. Flash memory store bits of electronic data in memory cells just like
DRAM (Dynamic RAM), but it also works like a hard disk drive that when the power is turned
off, the data remains in the memory. Flash memory cards and flash memory sticks are
examples of flash memory.
Flash memory cards are also used with digital cellular phones, MP3 players, digital video
cameras and other portable digital devices.
Flash memory is also called USB drives, thumb drives, pen drives or flash drives, are the up-
and-coming players in the portable storage market.
The advantages of flash memory are, it offers fast reading access times among the secondary
storage devices, (though not as fast as RAM) it is durable and requires low voltage. It is also
light and small. The disadvantage is, it is more expensive than the magnetic disk of the same
capacity.

2.3.1.1 State the various types of OS used on different platforms.

PC Platform Operating Systems


The examples of operating systems used on PC platforms or IBM compatible computers are:
• Disk Operating System (DOS)
• Microsoft Windows XP
DOS used a command line interface when Microsoft first developed it. Microsoft Windows XP’s
operating environment is a Graphical User Interface (GUI). Both are closed source software.
Apple Platform Operating Systems
The operating systems used on Apple platforms are Mac OS & Mac OS X.
Mac OS was the first commercially successful graphical user interface. It is a closed source
software and are targeted for use with home desktops and workstations.
Mac OS X is a multitasking operating system and targeted for use with home desktops,
workstations and servers. It also has better security protection compared to Mac OS, for
example the integrated firewall utility.
Cross-Platform Operating Systems
Cross-platforms operating systems are:
• UNIX
• LINUX

16 fauzi&ghozes@ksah2009
Panitia ICT KSAH

UNIX is a multitasking operating system. Some versions of UNIX have a command line
interface but most versions of UNIX offer a graphical user interface.
Linux is a popular, free, UNIX-like graphical user interface operating system. It is an open
source software. Linux provides a great deal of liberty to those that interact with Linux
technology. Although Linux runs on many kinds of equipment, it is best known for its support of
IBM-Intel PC-based hardware.

2.3.1.2 State the functions of OS.

The main functions of OS are


• starting a computer
• providing a user interface
• managing data & program
• managing memory
• configuring devices
Starting the Computer
The first function of an operating system is to start the computer. This process is called
booting. Booting means to load & initialize the operating system. It can happen in two ways:
warm boot or cold boot.
A warm boot means restarting a computer that is already on. It normally happens after
installing a new software or hardware or after an application crashes or stops working.
A cold boot means starting a computer that is already off. It happens when we turn on a
computer that has been completely powered off.
Providing a User Interface
This function controls how the user enters data and instruction and how information is
displayed. The three type of user interface are Command-Line, Menu-Driven and Graphical
User Interface . The user interface typically enables users:
• to start an application program
• to manage disks and files such as formatting, copying and renaming
• to shut down the computer safely by following the correct procedures
Managing Data & Programs
When we start an application, the CPU loads the application from storage into memory. In the
early days, single-tasking operating systems could run only one application at a time.
Multitasking operating systems enable users to work with two or more application programs at
the same time.
Managing Memory
The computer's operating system is responsible for managing memory such as:
• optimizing the use of RAM
• allocating data & instruction to an area of memory while being processed
• monitoring the contents of memory
• releasing data & instructions from being monitored in memory when the
process is done
Configuring Devices
Another function of an operating system is handling input and output, as well as enabling
communication with input and output devices. Most operating systems come with drivers for
popular input and output devices. These drivers install new devices and check whenever there
is conflict with these devices.

2.3.1.3 State the different interfaces of OS.

The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface
.Command-Line User Interface
The command-line user interface requires a user to type commands or press special keys on
the keyboard to enter data and instructions that instruct the operating system what to do. It has
to be typed one line at a time.

17 fauzi&ghozes@ksah2009
Panitia ICT KSAH

It is difficult to use because it requires exact spelling, syntax or a set of rules of entering
commands and punctuation.
We must observe the complicated rules of syntax that specify exactly what you can type in a
given place.
This interface also requires memorisation. It is also easy to make a typing mistake. The
advantage of command-line interface is, it helps the user to operate the computer quickly after
memorizing the keywords and syntax.
Menu Driven Interface
Menu-driven user interface enables the user to avoid memorizing keywords such as copy,
paste and syntax. On-screen, menu-driven interface provide menus as means of entering
commands. It shows all the options available at a given point in a form of text-based menu.
Menu-driven user interfaces are easy to learn.
Graphical User Interface (GUI)
GUI makes use of the computer’s graphics capabilities to make the operating system and
programs easier to use, which is also called ‘user-friendly’. Today GUIs are used to create the
desktop that appears after the operating system finishes loading into memory.
We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at
their desktops. GUI with menus and visual images such as buttons, icons and other graphical
objects to issue commands.
On the desktop, we can initiate many actions by clicking icons that represent computer
resources such as files, programs and network connections. GUI is commonly used and has
become a standard.

State the types of application software (word processing, spreadsheet,


2.3.2.1
presentation, graphic).

Application software is a computer program or a suite of computer programs that performs a


particular function for the user. Application software includes all programs that perform specific
tasks for user such as word processing, spreadsheet, database, presentation, e-mail and
web browsing.

Describe the uses of application software (word processing, spreadsheet,


2.3.2.2
presentation, graphic).

Usages of Word Processing Software


A word processing software allows users to create and manipulate documents containing
mostly text and sometimes graphics. It provides the ability to create, check spelling, edit and
format a document on the screen before printing it to paper. The software can be used to
produce documents such as letters, memos, reports, fax cover sheets, mailing labels,
newsletters, and web pages. Examples of word processing software are Microsoft Word,
StarOffice Writer, TexMaker and Corel WordPerfect.
Usages of Spreadsheet Software
Spreadsheet software is an application that allows users to organise and manipulate data in
rows and columns. It produces worksheets that require repetitive calculations – budgeting,
maintaining a grade book, balancing accounts, tracking investment, calculating loan payments,
estimating project costs and preparing financial statements. Examples of spreadsheet software
are Microsoft Excel, Corel Quattro Pro and Sun Staroffice Calc.
Usages of Presentation Software
Presentation software is an application that allows users to create visual aids for presentations
to communicate ideas, messages and other information to an audience. Examples of
presentation software are Microsoft PowerPoint, StarOffice Impress and CorelDraw.
Usages of Graphics Software
Graphics software is an application that allows users to work with drawings, photos and
pictures. It provides the users the ability of creating, manipulating and printing graphics.
Examples of graphics software are Microsoft Paint, Adobe Photoshop, Adobe Illustrator, Corel
Painter and Macromedia Fireworks.

18 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Differentiate between the types and usage of utility programmes (file


2.3.3.1
management, diagnostic and file compression).

Utility programs, also known as service programs, perform maintenance-type tasks related to
the managing of a computer, its devices, or its programs. They provide services not supplied by
other system software programs. Most computers come with built-in utilities as part of the
system software. However they may also be bought separately as external utility programs
such as Norton SystemWorks and McAfee Utilities.
File Manager
File manager is the software used to manage files on a disk. It provides functions to delete,
copy. move, rename and view files as well as create and manage folders (directories). File
manager performs tasks of formatting and copying disks, displaying a list of files on a storage
medium, checking the amount of used or free space on a storage medium, organising, copying,
renaming, deleting, moving and sorting files and also creating shortcuts.
Diagnostic Utility
A diagnostic utility compiles technical information about a computer's hardware and certain
system software programs and then prepares a report outlining any identified
problems.Information in the report assists technical support staff in remedying any problems.
Disk Defragmenter
When an operating system stores data on a disk, it places the data in the first available sector
on the disk. The process of defragmentation is the reorganising of the disk so the files are
stored in contiguous sectors. A fragmented disk has many files stored in non-contiguous
sectors. Defragmenting reorganises the files so they are located in contiguous sectors, which
speeds access time.
Data Compression
Data compression is a utility that removes redundant elements, gaps and unnecessary data
from a computer’s storage space so that less space is required to store or transmit data. With
the increasing use of large graphics, sound, and video files, data compression is necessary to
reduce the time required to transmit such large files over a network.
Compressed files are sometimes called zipped files and it must be unzipped to its original form
before being used. Two popular file compression utilities are PKZIP and WinZip.

2.3.4.1 Differentiate between proprietary and open source software.

Proprietary Software
Proprietary software is also called closed source software. The closed source software or
proprietary software offers a stable system with support if the software fails or malfunctions.
Examples of Proprietary Software are Ms-Dos, Mac OS, UNIX & Solaris.
Open Source Software
Open source software is not a closed software. It is provided for use, modification and
redistribution. Any programmer can make improvements which can result in better quality
software. A programmer can download from the Internet for free and modify with suggested
improvements. The only qualification is that changes can't be copyrighted.
Linux is an example of Open Source Software. Linux is the popular multi-tasking UNIX type
operating system. Some version of Linux are command line. Others are GUI. The two most
popular GUIs available for Linux are GNOME and KDE.
Many application programs, uitlities and plugins have Linux versions including OpenOffice.org,
PHP-Nuke,The GIMP, Mozilla, ClamAV, OpenLDAP, Audacity and RedHat.
Users can obtain Linux in a variety of ways. Some download it for free from the web. Others
purchase it from vendors.
The comparision between proprietary and open source software
SOFTWARE PROS CONS
• security poblems
• runs on a wide range of
hardware • not efficient as a server OS
Windows XP
(Propriety Software) • has largest market share • have to reboot every time a
network configuration is
• has many built-in utility
changed
Mac OS X • easy to install • supports only Apple

19 fauzi&ghozes@ksah2009
Panitia ICT KSAH

SOFTWARE PROS CONS


computers
• base hardware more
expensive than other
• best Graphical User platforms
(Propriety Software) Interface (GUI)
• fewer utilities available
• secure and stable
• fewer games than Windows
• many appications still being
uodated to run wth OS X
• runs on a wide range of
hardware • limited support for games
Linux
• has largest number of user • limited commercial
(Open Source
interface types application available
Software)
• can be used as destop PC • can be difficult to learn
OS or server

2.4.1.1 Assemble the components of a PC.

2.4.1.2 Display cooperation in assembling the components of a PC.


Assemble components.
Follow step-by-step installation instructions provided.
Test the functionality of the PC.

2.4.2.1 Format and partition the hard disk.

2.4.3.1 Install operating system, application software and utility programs.

Explain the latest open source OS and application software available in the
2.5.1.1
market.

2.5.2.1 Explain the latest ICT hardware and software

2.5.2.2 Explain pervasive computing.

Pervasive computing means the technology that is gracefully integrated in our everyday life.
The user is no longer aware of this embedded technology.
Pervasive computing uses web technology, portable devices, wireless communications and
nomadic or ubiquitous computing systems. Other terms for pervasive computing are Ubiquitous
Computing, Calm Technology, and Things That Think.
Pervasive computing devices are not personal computers, but very tiny - even invisible -
devices, either mobile or embedded in almost any type of object imaginable, including cars,
tools, appliances, clothing and various consumer goods - all communicating through
interconnected networks.
Thee xamples of pervasive computing in our daily lives are which is the automatic Touch 'n Go,
SmartTAG toll gate & the 3G technology video phone.

20 fauzi&ghozes@ksah2009
Panitia ICT KSAH

3.1.1.1 Define computer networks.

Computer network is a system of interconnected computers and peripheral devices. For


example, it may connect computers, printers, scanners and cameras.
Using hardware and software, these interconnected computing devices can communicate with
each other through defined rules of data communications. In a network, computers can
exchange and share information and resources. A computer network may operate on wired
connections or wireless connections.
When two or more networks are linked or connected and are able to communicate with one
another using suitable hardware and software, it is called an internetwork.

3.1.1.2 Define communications.

COMMUNICATIONS
Communications is about the transfer of information from a sender, across a distance, to a
receiver. Using electricity, radio waves or light, information and data in the form of codes are
transmitted through a physical medium such as wire, cable, or even the atmosphere.
The information that is transmitted (sent) can be text, voice, sound, video, graphics and
images, or a combination of all these, which we call multimedia. We transmit information or
data by using two types of signals, namely analog and digital.

3.1.2.1 State the importance of computer networks and communications.

Information is now made easy with the availability of network communications. In a clinic for
example, network communications plays an important part in keeping patients’ database for
easy retrieval. Unlike in conventional practice, doctors and nurses have to look for a patient’s
personal file from hundreds or maybe thousands of records. With network communication, the
clinic saves time and manpower. Allocation can be effectively planned.
E-Business
E-business refers to conducting business transactions on the internet, not only limited to buying
and selling but also servicing customers and collaborating with business partners.
E-business supports many types of business transactions, including online shopping, selling
and renting. Users can browse the website and choose from the list of items or services to buy.
Payment is usually via credit card.
Online Education
With a network connections, online education is made possible. Students at any location
around the world can participate in an online classroom, download tutorial questions and
submit their assignments.
E-Banking
E-banking handles all types of banking transactions like account management, fund transfer
and payments primarily over the internet. User can pay bills, check the account balance and
transfer money to other parties, using e-banking facilities twenty four hours a day and seven
days a week.
With e-banking, most of the transactions can be done at home or from the office, thus users
save time on traveling and queuing at the bank counters.
Long Distance Communication
Long distance communication is made easy via network availability. Communication is possible
via voice, text or video. The cost of having this type of communication is cheaper than making a
normal phone call and definitely faster and more effective than corresponding via letters of fax.
In business, important decisions can effectively made through video conference meeting.

3.1.3.1 Define types of computer networks:

21 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Local Area Network (LAN)


A LAN covers a small region of space, typically a single building ~ Eg: within a school lab.
Metropolitan Area Network (MAN)
A MAN is a collection of LANs with the same geographical area, for instance a city ~ Eg: within
a a city
Wide Area Network (WAN)
A WAN can be a collection of LANs or MANs or the mix of two with a very large geographical
area, for instance a country or even beyond the border ~ Eg: between KL and London

3.1.3.2 Differentiate between the three types of computer networks.

LAN is a group of computers and network devices connected together, usually within the same
building. It is the smallest network compared to the other two networks. The simplest form of
LAN is to connect two computers together. LAN is operated within a limited physical area, such
as at home, school, a single building or several buildings. A network which consists of less than
500 interconnected devices across several buildings, is still recognised as a LAN.
Inexpensive hardware used in LAN previously include twisted pair, coaxial cables and the
higher end is fiber optic or wireless. However, coaxial cables are now being replaced by a
higher speed cabling system such as CAT5 using RJ45 connectors.
LAN is a very high speed network (from previously 10Mbps) to 100Mbps, which is faster than
MAN and WAN.
MAN can be defined as a group of computers and network devices connected together within a
large physical area. It is a network of computers located at different sites within a large physical
area, such as a city. Companies that have several branches within the Kuala Lumpur city such
as banks, might find a MAN useful to them.
In this case, setting up a MAN across long distances can be best connected using fiber optics.
Sometimes, a MAN can be a collection of several LANs within the same city. MAN often acts as
a high speed network (although not as fast as a LAN) to allow sharing of regional resources.
WANis the largest network of all network types. The Internet is the largest WAN in the world.
WAN generally covers large distances such as states, countries or continents.
An example in the society using WAN is the banking organisation. Local banks have always
maintained their business online by connecting all computers of their branches in the countries.
International banks also use WAN to connect their computers all over the world.
Actually, WAN is a group of MANs or LANs or the mixture of both networks.
A device called a router is needed to connect the MANs and LANs all over a large physical
area. A router is a special networking device that connects two or more different networks and
keeps data flowing between them.
A router makes all the different networks communicate, such as connecting LAN to LAN, LAN
to WAN or WAN to WAN. The transmission media in WAN uses the fibre optic cable. WAN is
still considered a fast network with speeds 20 – 2000 Kbps, but slower than LAN and MAN.

3.1.4.1 Define two types of network architecture:

Client/Server
A client/server network is a network in which the shared files and applications are stored in the
server but network users (clients) can still store files on their individual PCs. A server is a
computer that shares information and resources with other computers on a network. A client is
a computer which requests services or files from a server computer.

Peer-to-Peer
Peer-to-peer network is a network with all the nodes acting as both servers and clients. A PC
can access files located on another PC and can also provide files to other PCs. With peer-to-
peer network, no server is needed; each computer in the network is called a peer. All
computers in the peer-to-peer network has equal responsibilities and capabilities to use the
resources available on the network.

22 fauzi&ghozes@ksah2009
Panitia ICT KSAH

3.1.5.1 State three types of network topologies:

Bus Topology
A bus topology consists of a single central cable to which all computers and other devices
connect. It refers to the main physical pathway or central cable where all other devices are
connected to it. All nodes share the backbone to communicate with each other on the network.
Sometimes, a bus network has more than one server. Sometimes, a server is not needed on
the network. If one of the nodes fails, the bus network would still function as long as the
backbone is working.
Ring Topology
A ring topology consists of all computers and other devices that are connected in a loop. Ring
topology is also known as a ring network. In a ring network each node directly connect to two
neighbouring nodes. A server may exist in a ring network, but it will not connect to all the nodes
in the network. The server, like other nodes, will only communicate to its two neighbouring
nodes.
Star Topology
A star topology consists of a central host which acts as the centre, and all nodes connect to the
host. The host can be a server, hub or router. In a star network, every node will not connect to
the neighbouring nodes. Every node must connect to the host in order to communicate.
The host will control the flow of communication in the network. If one of the nodes fails, the star
network can still function as long as the host is working.

3.1.5.2 Differentiate between the three types of network topology.

Bus Topology Ring Topology Star Topology

There is a single All computers and other There is a central host


central cable devices are connected and all nodes connect
Structure (backbone) and all in a circle to it
computers and other
devices connect to it

Depends on network Depends on network Yes


Host existence
needs needs

Connection It has no connection Yes No


between nodes between the nodes.

Host failure Network can still run Network will fail Network will fail

Node failure Network can still run Network will fail Network can still run

Difficult. Need to Depends on backbone. Depends on the host. It


search for the If there is a backbone, is easier to repair the
problematic node one troubleshooting is problematic host.
Ease of
by one difficult. If there is no However, if the nodes
troubleshooting
backbone, the focus is fail, then each node
on the two nodes not has to be searched
communicating

Ease of adding Easy Difficult Average


or removing
nodes

Number of Many Limited Limited


nodes when

23 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Bus Topology Ring Topology Star Topology

extending
network

Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol


3.1.6.1
to facilitate communication over computer network.

TCP/IP is the internet communication protocol. It is a standard that sets the rules computers
must follow in communicating with each other on a network. Some refer TCP/IP as the Internet
Protocol Suite.
When you use any applications or programs to access the Internet, these application will use
TCP/IP to achieve the task. For example, when you want to surf a network, you will use the
internet browser. Your browser then uses TCP/IP to request services from Internet servers.
These servers will use TCP/IP to send the web pages you requested back to your browser.

3.1.7.1 Describe the types of network communications technology:

Internet
The Internet is the worldwide, publicly accessible system of interconnected computer networks
that transmit data by packet switching using the standard Internet Protocol (IP). It consists of
millions of smaller business, academic, domestic and government networks, which together
carry various information and services, such as electronic mail, online chat, and the interlinked
Web pages and other documents of the World Wide Web. Internet is one of the uses of
communication. Through the Internet, society has access to global information and instant
communication.
Intranet
An Intranet is an internal network that uses Internet technologies and it is a small version of the
Internet that exists within an organisation. It is a private computer network that uses Internet
protocols, network connectivity and possibly the public telecommunication system to securely
share part of an organisation’s information or operation with its employees.
Intranet generally make company information accessible to employees and facilitate working in
groups. Simple intranet applications include electronic publishing of organisational materials
such as telephone directories, event calendars and job postings.
Extranet
An extranet is a private network that uses Internet protocols, network connectivity, and possibly
the public telecommunication system to securely share part of a business’s information or
operations with suppliers, vendors, partners, customers or other businesses.
Package shipping companies, for example, allow customers to access their network to print air
bills, schedule pickups, and even track shipped packages as the packages travel to their
destinations.

3.2.1.1 Identify the devices needed in computer network communication :

• Network Interface Card (NIC)

• Wireless Network Interface Card

• Modem (internal and external)

• Hub / Switch

• Router

24 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• Wireless Access Point

3.2.1.2 State the functions of the following:

• Network Interface Card (NIC)

A Network Interface Card (NIC) is an adapter card or PC card that enables the computer to
access the network

• Wireless Network Interface Card

Wireless Network Interface Card (WNIC) is a network card that provides wireless data
transmission

• Modem (internal and external)

There are two types of modem, internal modem and external modem. An internal modem only
works in stand-alone computers. It is built into the computer. An external modem is separated
from the computer and is also mobile.

• Hub / Switch

Hub or switch is a common connection point for devices in a network. Hubs are commonly used
to connect segments of a LAN.

• Router

A router is a communications device that connects multiple computers or other routers together
and transmits data to the correct destination

• Wireless Access Point

A wireless access point is a central communications device that allow computers to transfer
data. This device can help information to be transferred wirelessly to other wireless devices or
to a wired network. Wireless access point has high quality antennas for optimal signals.

Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded
3.2.2.1
Twisted Pair (STP), Coaxial and Fibre Optic Cable.

UNSHIELDED TWISTED-PAIR CABLE

The twisted-pair cable is generally a common form of transmission medium. It consists of two
wires or conductors twisted together, each with its own plastic insulation.
The twisted wires cancel out electromagnetic interference that can cause, the noise generated
by adjacent pairs. Undesired coupling of a signal from one circuit, part of a circuit, or channel,
to another. The most common connector used for twisted-pair cable is RJ-45. A wave
produced by the interaction of time-varying electric and magnetic fields.

25 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Registered Jack-45 (RJ-45) is an eight-wire connector used commonly to connect computers


onto Local Area Networks (LAN), especially Ethernets. The Unshielded Twisted-Pair or UTP is
the most common twisted-pair cable used in communications.
Cables that consist of pairs of unshielded wire twisted together. It is the most common kind of
copper telephone wiring. It has four pairs of colour-coded twisted-pair cables that are covered
with a plastic outer jacket.
SHIELDED TWISTED-PAIR CABLE
The Shielded Twisted-Pair or STP is another form of twisted-pair cable. Twisted-pair cable
wires that consist of an outer covering or shield. Its four pairs of colour-coded wires are each
wrapped in metallic foil, and all four are then collectively wrapped in a layer of metallic braid or
foil. Finally, this layer is wrapped with a plastic outer jacket.

COAXIAL CABLE
The coaxial cable, often referred to as ‘coax’, consists of a single copper wire surrounded by at
least three layers. They are an insulating material, a woven or braided metal and a plastic outer
coating.
This cable is often used as cable television (CATV) network wiring because it can be cabled
over longer distances in comparison to the twisted-pair cable.
FIBRE OPTIC CABLE
The fibre optic cable is a networking medium that uses light for data transmission. The intensity
of light is increased and decreased to represent binary one and zero. The binary system is a
way of counting using just the two numbers 0 and 1.
Its core consists of dozens or hundreds of thin strands of glass or plastic which uses light to
transmit signals. Each strand, called an optical fibre, is as thin as a human hair.
Identify various types of wireless transmission media such as infrared, radio wave and
3.2.2.2
satellite.

WIRELESS TECHNOLOGY
The use of wireless technology as a method of data transport appears very similar to a wired
technology. In a wireless media however, signal transmission is unguided and the device
communicates without using wires between nodes, usually by relying on radio frequencies
instead.
Infrared is used in devices such as the mouse, wireless keyboard and printers. Some
manufacturers provide a special port called the IrDA port that allows a wireless keyboard to
communicate with a PC. Infrared signals have frequencies between 300 GHz to 400 THz. They
are used for short-range communication. Infrared signals have high frequencies and cannot
penetrate walls. Due to its short-range communication system, the use of an infrared
communication system in one room will not be affected by the use of another system in the
next room.
Radio waves are normally omnidirectional. When an antenna transmits radio waves, they are
propagated in all directions. This means that the sending and receiving antennas do not have
to be aligned. The omnidirectional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers. Our AM and FM radio stations,
cordless phones and televisions are examples of multicasting.

3.3.1.1 Define Network Operating System.

An operating system is the program that first loads when a computer boots and manages any
other software or hardware on the computer. A Network Operating System or known as NOS,
has additional functionality that allows it to connect computers and peripherals to a network.

26 fauzi&ghozes@ksah2009
Panitia ICT KSAH

A Network Operating System is most frequently used with Local Area Networks and Wide Area
Networks, but could also have application to larger network systems.Text String, A NOS is not
the same as the networking tools provided by some existing operating systems, Windows XP
for instance. NOS is an operating system that has been specifically written to keep networks
running at optimal performance.

3.3.1.2 Name various Network Operating System Software.

• Windows NT
• Windows 2000 Server
• Windows Server 2003
• Red Hat Linux

3.3.2.1 State the functions of various client software.

WEB BROWSER
A web browser is a software application that enables a user to display and interact with HTML
documents hosted by web servers or held in a file system.Text and images on a web page can
contain hyperlinks to other web pages at the same or to different websites.Web browsers allow
a user to quickly and easily access information provided on many web pages at many websites
by surfing these links.
Web browsers available for personal computers include Microsoft Internet Explorer, Safari,
Netscape and Opera. Web browsers are the most commonly used type of Hypertext Transfer
Protocol (HTTP) user agent. Although browsers are typically used to access the World Wide
Web, they can also be used to access information provided by web servers in private networks
or content in file systems.
EMAIL CLIENT
An email client is a computer program that is used to read and send email.
FUNCTIONS OF FILE TRANSFER PROTOCOL (FTP) CLIENT
File Transfer Protocol (FTP) client is used to connect two computers over the Internet so that
the user of one computer can transfer files and perform file commands on the other computer.

3.4.1.1 Insert network interface cards (NIC).

3.4.1.2 Install drivers for the NIC.

3.4.2.1 Crimp and test UTP cable

• Straight cable

• Crossed cable

3.4.2.2 Create awareness of the correct way when crimping a cable.

3.4.3.1 Configure the workstation to join a LAN :

• Internet Protocol (IP) Address

• Subnet Mask

• Server name

27 fauzi&ghozes@ksah2009
Panitia ICT KSAH

3.4.3.2 Test the network connection.

3.4.4.1 Create a shared folder.

3.5.1.1 Describe

• Mobile Computing (specifications, services, frequencies)

NOTEBOOK COMPUTER
A notebook computer or notebook is a small mobile personal computer, usually weighing
from one to three kilograms. Using the technology from Symbionics Networks Ltd., a
wireless LAN adapter can be made to fit on a PCMCIA card in a laptop or notebook
computer to provide mobile computing.
TABLET PC
A tablet PC is a notebook or slate-shaped mobile computer.
Its digitising tablet technology allows the user to operate the computer using a stylus or digital
pen and a touch screen instead of the usual keyboard and mouse.
Most Tablet PCs offer built-in support for wireless networks.
PDA
Personal digital assistants or PDAs are handheld devices that were originally designed as
personal organisers but became much more versatile over the years.
Many PDAs can access the Internet, intranets or extranets via Wi-Fi or Wireless Wide-Area
Networks or WWANs
SMART PHONE
A smart phone is an electronic handheld device that integrates the functionality of a
mobile phone and a personal digital assistant or PDA or other information appliance.
This is often achieved by adding telephone functions to an existing PDA or PDA Phone or
putting "smart" capabilities such as PDA functions into a mobile phone.

• Internet Technology and Services (VOIP, BLOG)

VOICE OVER INTERNET PROTOCOL (VoIP)


Protocols used to carry voice signals over the IP network are commonly referred to as Voice
over IP or VoIP. VoIP is one of the Internet technologies that allows a user to make telephone
calls using a broadband Internet connection instead of a regular (or analog) phone line.
VoIP is a method for taking analog audio signals and turning them into digital data that can be
transmitted over the Internet. There are three different VoIP services in common use today.
They are Analog Telephone Adapter (ATA), IP Phones and computer-to-computer.
BLOGGING
A blog (web log or weblog) is one of the popular activities on the Internet. Most of these blogs
are publicly shared and the authors frequently update the content on a regular basis.
A blog is usually referred to the text produced by the author about his or her thoughts,
experiences or interests.
The world of blogging is referred as blogosphere. Another new term is the blogonomics, which
refers to people using the blogosphere to generate money.
The posts to a blog are usually arranged in this order, the most recent entries will always be on
top of the journal.

28 fauzi&ghozes@ksah2009
Panitia ICT KSAH

WORLD WIDE WEB (WWW)


The World Wide Web or the Web consists of a worldwide collection of electronic documents.
Each electronic document on the Web is called a web page which can contain text, graphics,
audio and video. These pages are written in Hypertext Markup Language (HTML).
Every website has an address or Uniform Resource Locator (URL). The URL is formed by the
protocol, domain, directory and the document name.
EMAIL
An electronic mail or email is the transmission of messages and files via a computer network.
A user utilises an email program to create, send, receive, forward, store, print and delete email
messages. Some emails are called web-based email like Yahoo Mail and Hotmail.

THE INTERNET RELAY CHAT (IRC)


The Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and
conventions, and client/server software.
A chat is a real-time typed conversation that takes place on a computer. A chat room is a
location on an Internet server that permits users to chat with each other. Anyone in the chat
room can participate in the conversation, which usually is specific to a particular topic.
SEARCH ENGINES
Search engines are special websites on the Internet to help you find information you need.
Different search engines will serve different purposes.

• Types of network (examples: PAN, VPN, WLAN, WIMAX)

PERSONAL AREA NETWORK (PAN)


A Personal Area Network (PAN) is a computer network used for communication among
computer devices including PCs, laptops, printers, telephones, digital cameras, mobile phones,
video game consoles and personal digital assistants, close to one person.
PAN may be wired with USB port, Firewire port, Infrared (IrDA) and Bluetooth technologies.
Bluetooth is the popular wireless PAN used by most people, especially the mobile phone
technologies, and it applies the IEEE 802.15.1 standards.
VIRTUAL PRIVATE NETWORK (VPN)
A Virtual Private Network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to remote offices or individuals with secure access to their
organisation's private network.
VPN uses tunnelling mechanism to maintain privacy and security of the data. Tunnelling means
transmitting data packets across a public network. VPN is often used by companies to provide
access from their internal network resources to their home or mobile workers.
WIRELESS LAN (WLAN)
Wireless Local Area Network (WLAN) is a type of LAN that uses high-frequency radio waves to
communicate between nodes. WLAN improves user mobility, speed and scalability to move
around within a broad coverage area and still be connected to the network.
The IEEE standard for Wireless LANs is 802.11

WORLDWIDE INTEROPERABILITY FOR MICROWAVE ACCESS (WiMAX)


Worldwide Interoperability for Microwave Access (WiMAX) is the industry term for broadband
wireless access network that is developed based on the IEEE 802.16 standard.
WiMAX is a Wireless Metropolitan Area Network (MAN) technology that will connect WiFi
hotspots to the Internet and provides a wireless extension to cable and DSL for larger

29 fauzi&ghozes@ksah2009
Panitia ICT KSAH

broadband access.WiMAX would operate similar to WiFi but at higher speeds, over greater
distances and for a greater number of users.
A WiMAX system will have two major parts:
• a WiMAX base station, similar in concept to a mobile phone tower
• a WiMAX receiver installed at home

4 MULTIMEDIA

4.1 Multimedia Concepts

4.1.1.1 Define multimedia.

Multimedia is the presentation of information by using a combination of text, audio, graphic,


video and animation.

4.1.2.1 Identify the use of multimedia in various fields.

Multimedia has played an important role in other fields, such as business, arts, medicine and
engineering. In business, multimedia applications are used in advertising products. Many
companies nowadays develop and distribute catalogues in the form of a CD-ROM as it is more
interesting to the consumers. In art, artists use multimedia elements by combining drawing and
animation. In medicine, doctors can practice or be trained in performing high-risk surgery by
using virtual surgery. In engineering, Computer-Aided Design or CAD is used. By using this
application, engineers can view the design from many aspects and improve on it before
production.

4.1.3.1 Differentiate between the characteristics of linear and non-linear multimedia.

LINEAR INTERACTIVITY
In linear interactivity, the user interacts with the multimedia application without controlling the
progress of the content. In other words, the user is a passive receiver of the multimedia content
most of the time.
The linear content is usually arranged in sequence. An example of the multimedia linear
content is a movie. Although a movie uses a combination of audio, graphics and animations,
the user has no control over the sequence of events.
NON-LINEAR INTERACTIVITY
Unlike linear interactivity, non-linear interactivity allows the user to interact with the content
according to what the user wants from the content. In other words, it is a two-way
communication.
The user can control the progress and sequence of the multimedia content by using buttons or
links. Non-linear interactivity uses tools like “hypertext” to connect a word or a phrase to
another screen.
An electronic book with links to another screen is considered as having non-linear multimedia
content. Hypermedia is also used in non-linear interactivity. This tool is similar to hypertext.
However, it connects to different media elements such as audio and video.

4.1.4.1 Compare and contrast the mediums of delivery for multimedia applications:

• web-based

Web-based multimedia is a combination of multimedia technology and Internet technology.


Web-based multimedia is popular nowadays.

30 fauzi&ghozes@ksah2009
Panitia ICT KSAH

In the past, Web pages were filled only with static texts and graphics as there were problems in
downloading large multimedia files through the Internet. Downloading a video file could take a
long time as it is large.
MULTIMEDIA TECHNOLOGY IN THE INTERNET
Now, with the advancement of both technologies, most Web pages integrate elements like text,
graphic, audio, video and animation.
These dynamic elements make the process of distributing information through the Internet
more interesting and effective to the user.
There are a lot of multimedia software including plug-ins, players and browsers used in the
Internet. These software allow better quality multimedia programs to be stored and viewed.

Software Plug-in @ Player Browser

• Flash • Java • Internet


Explorer
• Director • Flash Player
• Firefox
• FrontPage • Media Player

• CD-based

CDs like CD-ROM (Compact Disc Read Only Memory) have been used to store and deliver
multimedia content.
CDs are usually used with computers. An improvement of the CD-ROM is the Blu-ray disc
which can store better quality video.
However, the main problem in using CD-ROMs as a medium is that, it can be costly as it takes
a long time to produce a complete multimedia program.

4.1.5.1 Identify the multimedia elements:

• text

Text is the basic element of multimedia. It involves the use of text types, sizes, colours and
background colour.
In a multimedia application, other media or screen can be linked through the use of text. This is
what you call Hypertext.
To produce an effective multimedia program there are three things that need to be considered.
They are:
• The position of the text on the screen.
• Length of the message
• And legibility of the text.

• graphics

Graphics make the multimedia application attractive. They help to illustrate ideas through still
pictures. There are two types of graphics used: bitmaps (paint graphics) and vector (draw
graphics).
Bitmaps images are real images that can be captured from devices such as cameras or
scanners.
Vector graphics are drawn on the computer and only require a small amount of memory.

31 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• audio

A multimedia application may require the use of speech, music and sound effects. These are
called audio or the sound element. There are two basic types of audio or sound: analog and
digital audio.
Analog audio refers to the original sound signal. Digital audio refers to the digital sampling of
the actual sound. The sound used in multimedia is digital audio.
We can record analog audio file. We can use special audio editors like Sound Forge to convert
analog audio files into digital audio files.

• video

Video provides a powerful impact in a multimedia program. In multimedia applications, the


digital video is gaining popularity because of the following reasons:
• video clips can be edited easily
• the digital video files can be stored like any other files in the computer and the quality of the
video can still be maintained
• the video files can be transferred within a computer network
• it allows non-linear editing in any part of the video
However, these digital video files are large in size. Transferring these files can take a long time
especially when using the Internet.

• animation

Animation is a process of making a static image look like it is moving. In multimedia, digital
animation is used. Digital animation can be categorised into two broad area: 2D (2 Dimension)
and 3D (3 Dimension) animations.
2D animation refers to creating movements in basic objects. These objects are put into various
situations or positions and have movement on the screen.
3D animation refers to creating movements to three dimensional digital objects from
photographs. Movements like spinning and flying across the screen are some samples of
animations.
STANDARD FILE FORMATS FOR EACH ELEMENT

32 fauzi&ghozes@ksah2009
Panitia ICT KSAH

4.2 Hardware and Software

4.2.1.1 Identify hardware that can be used to produce multimedia products:

• scanner

• video camera

• camera

• audio devices

• video capture devices

4.2.2.1 Identify editing software that can be used to produce multimedia elements:

• text editor

• graphics and image editor

33 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• audio editor

• video and animation editor

4.2.3.1 Define the various concepts in authoring tools:

• time frame concept

With time frame concept authoring tools, the multimedia elements or events are presented and
organised along a time line.This type of tool helps users coordinate when each multimedia
element (text, graphics, audio, video or animation) plays.
In time frame concept authoring tools, a timeline consists of layers which span several frames.
For example a simple presentation could contain three layers; layer one could contain a picture
of a blue sky, layer two could contain a picture of a mountain and layer three a picture of a
mountain climber.
If each of the layers span 10 frames and the user presses the "play" button, then the
presentation will show a picture containing all of the elements in the layers e.g. blue sky, a
mountain and a mountain climber.
If layer one however only spans 5 frames from the beginning, then the blue sky would only
show for 5 frames and then disappear for the remaining 5.
Examples of authoring tools using the time frame concept are Flash and Director. These two
software can support multi platform.

• icon concept

The icon concept in authoring tools provides the multimedia developer with a visual
programming approach to sequencing events in the multimedia application. In this concept,
elements and events are organised in a structural framework.
With icon authoring tools, users can present visually a logical flow of events by dragging icons
from an icon menu.
The icon can represent graphics, audio files, animation, text, movies, and other elements
should be played in a logical flow or flow chart.
These entire icon concept authoring tools use "drag and drop" to pick up and place icons on the
presentation page.
These icons represent:

34 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• events such as mouse clicks, key press


• actions to be performed after an event e.g. a transition, a sound
• routines to perform loops, conditional branches
A presentation is built by inserting one object after another e.g. a simple application could
contain just three icons: picture, sound icon and text icon.
When we click on the Restart button, the presentation starts.
Several multimedia authoring tools which use this icon concept are Authorware and IconAuthor.
These two software can support multi platforms.

• card concept

The card concept in authoring tools are based on the idea of card stacks containing graphics,
audio, video, text and animation. Elements and events in card concept authoring tools are
organised as pages in a book or a stack of cards.
When card concept authoring tools starts, a blank page is displayed. Certain objects can be
inserted e.g. text, pictures and buttons. By inserting objects into several pages, a multimedia
"book'' is eventually created.
The developer can create transitions between pages and on the objects themselves. Zoom text
in and out, causing a picture to flow onto the page.
Examples of the card concept in Authoring Tools are ToolBook, HyperCard and SuperCard.
ToolBook uses the Windows platform. ,Hypercard and Supercard uses the Macintosh platform.

4.2.4.1 Describe and give examples of web editors:

• text-based

A text-based Web editor is a basic editor where you work with Hypertext Markup Language
(HTML) tags to create a Web page. It can be used to change HTML source codes. Using a
text-based Web editor requires you to have HTML knowledge to get started. Software such as
Notepad and PSPad are examples of text-based editors. PSPad has additional functions that
include syntax highlighting and toolbars.

• WYSIWYG

WYSIWYG is an acronym for What You See Is What You Get. WYSIWYG web editors provide
an editing interface that shows how the pages will be displayed in a web browser. Using a
WYSIWYG editor does not require any HTML knowledge. It is easier for an average computer
user.

Examples of WYSIWYG web editor are Microsoft FrontPage and Macromedia Dreamweaver.

4.3 Multimedia Development

4.3.1.1 State user interface principles.

User interface is a way a computer program communicates with the person who is using it.
There are eight main principles of the user interface.
1. Consistency
2. Clarity
3. Context
4. Navigation
5. Search

35 fauzi&ghozes@ksah2009
Panitia ICT KSAH

6. Personalisation
7. Learnability
8. Flexibility

4.3.2.1 State the role of each member in a development team

A multimedia production team consists of:


• Project Manager
• Subject Matter Expert (SME)
• Graphic Artist
• Audio-Video Technician
• Instructional Designer
• Programmer.
Project Manager's Roles
The Project Manager's roles are to define the scope of the project and discuss with the client.
He has to search for financial resources, equipment and facilities. He manager also needs to
coordinate the production team.
Subject Matter Expert's Role
The Subject Matter Expert's role is to do research on the content of a multimedia program. He
has to provide content for the multimedia content.
Graphic Artist's Role
The Graphic Artist's role is to develop the graphic elements of the program such as
backgrounds, buttons, photo collages, 3D objects, logos and animation.
Audio-Video Technician's Role
The Audio Technician is responsible for recording the voice. He edits the sound effects. He
records and edits music. He is responsible for capturing, editing and digitizing the video.
Instructional Designer's Roles
The Instructional Designer's roles are to decide on the best educational strategies and
practices to present the information.
Programmer's Role
The Programmer’s role is to write the program code lines or scripts using the authoring tool. He
combines the multimedia elements into a multimedia program.
Extension : Webmaster
New technology has now made it very easy for many people to access the Web. Designing
interesting Web sites is very important for many businesses.
The webmaster's main job is to create and maintain the Web site. He should be able to
integrate the multimedia elements into a Web page. He also handle enquiries and feedback.

4.3.3.1 Describe the phases in multimedia production:

There are six phases involved in the production of a


multimedia project. The six phases involved can be
categorised into 3 main stages:
Pre-production is the process before producing the
multimedia project.
Production is the process of producing the multimedia
project.
Post-production is a process after producing the
multimedia project.
Analysis Phase
During the Analysis Phase, the multimedia developers interview the clients to find out their
needs and write the Problem Statement and a Proposal.
Design Phase

36 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Based on the needs of target users, the multimedia developer will design a Flow Chart and
Storyboard.
Implementation Phase
Once the Storyboard is confirmed, the multimedia developers will start Implementation Phase.
This phase refers to the process of converting the design plan into a multimedia program. This
is the phase where the multimedia program is produced.
Testing Phase
The multimedia developers will use a Checklist to test the multimedia program. If there are any
errors, the programmer will fix the program.
Evaluation Phase
In the Evaluation Phase, selected users will use an Evaluation Form to try out the program and
give feedback.
Publishing Phase
Finally, when the multimedia program is completed, it will be published to CD.

Apply all the phases of multimedia production to produce an interactive


4.3.3.2
educational multimedia project.

To produce a multimedia project, we need to undergo a series of steps.


We must go through the Analysis Phase to define our project title.
We need to gather the materials such as text, graphics, audio, video and animation.
We use Toolbook Assistant 2004 as the authoring tool to create a multimedia program.
We need to test our program.
We also need someone to evaluate the program and give feedback.
Once we are satisfied with the program, we can use a CD writer to produce a CD.
~ REFER PAPER 2 ~
Give an example of immersive multimedia in education, business or
4.4.1.1
entertainment.
Immersive Multimedia is a combination of multimedia elements and interactivity in Virtual
Reality. The history began with the concept of Virtual Reality with the desire of computer
scientists and artists was to create, digitally-made ‘near-to-reality’ experiences through
Interactive Multimedia in 1960s. This became known as Virtual Reality. Virtual Reality, today, is
a computer-created environment that a user can experience through the senses of sight,
hearing and touch.
Example Of Immersive Multimedia
• Education
• Business
• Entertainment
• VRML

5 PROGRAMMING

5.1.1.1 State the definition of program.

A computer program is a series of organised instructions that directs a computer to perform


tasks. Without programs, computers are useless.

37 fauzi&ghozes@ksah2009
Panitia ICT KSAH

5.1.1.2 State the definition of programming language.

A programming language is a set of words, symbols and codes that enables humans to
communicate with computers. It is a language used for writing computer programs, that direct a
computer to perform computation and to organise the flow of control between mechanical
devices.

5.1.2.1 Identify the generations of low-level programming languages with examples.

A low-level programming language is a programming language that provides little or no


abstraction from computer’s microprocessor.

FIRST GENERATION OF PROGRAMMING LANGUAGE


The first generation of programming language, or 1GL, is machine language. Machine
language is a set of instructions and data that a computer's central processing unit can execute
directly. Machine language statements are written in binary code, and each statement
corresponds to one machine action.
SECOND GENERATION PROGRAMMING LANGUAGE
The second generation programming language, or 2GL, is assembly language. Assembly
language is the human-readable notation for the machine language used to control specific
computer operations. An assembly language programmer writes instructions using symbolic
instruction codes that are meaningful abbreviations or mnemonics. An assembler is a program
that translates assembly language into machine language. Since assembly language consist of
human-readable abbreviations, the assembler must first convert assembly language into
machine-readable language before the computer can readily understand its instructions.

5.1.2.2 Identify the generations of high-level programming languages with examples.

A high-level programming language is a programming language that is more abstract, easier to


use, and more portable across platforms.

THIRD GENERATION PROGRAMMING LANGUAGE


The third generation of programming language, 3GL, or procedural language uses a series of
English-like words, that are closer to human language, to write instructions.
High-level programming languages make complex programming simpler and easier to read,
write and maintain.Programs written in a high-level programming language must be translated
into machine language by a compiler or interpreter.
PASCAL, FORTRAN, BASIC, COBOL, C and C++ are examples of third generation
programming languages.
FOURTH GENERATION PROGRAMMING LANGUAGE
The fourth generation programming language or non-procedural language, often abbreviated
as 4GL, enables users to access data in a database.
A very high-level programming language is often referred to as goal-oriented programming
language because it is usually limited to a very specific application and it might use syntax that
is never used in other programming languages.
SQL, NOMAD and FOCUS are examples of fourth generation programming languages.
FIFTH GENERATION PROGRAMMING LANGUAGE
The fifth generation programming language or visual programming language, is also known as
natural language. Provides a visual or graphical interface, called a visual programming
environment, for creating source codes.

38 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Fifth generation programming allows people to interact with computers without needing any
specialised knowledge. People can talk to computers and the voice recognition systems can
convert spoken sounds into written words, but these systems do not understand what they are
writing; they simply take dictation.
Prolog and Mercury are the best known fifth-generation languages.

5.1.3.1 Define structured approach in programming.

STRUCTURED PROGRAMMING EDUCATION


Structured programming often uses a top-down design model where developers map out the
overall program structure into separate subsections from top to bottom.

In the top-down design model, programs are drawn as rectangles. A top-down design means
that the whole program is broken down into smaller sections that are known as modules. A
program may have a module or several modules.
Structured programming is beneficial for organising and coding computer programs which
employ a hierarchy of modules. This means that control is passed downwards only through the
hierarchy.
Examples of structured programming languages include Ada, Pascal and Fortran.

5.1.3.2 Define object-oriented approach in programming.

The object-oriented approach refers to a special type of programming approach that combines
data with functions to create objects. In an object-oriented program, the object have
relationships with one another. One of the earliest OOP languages is Smalltalk. Java, Visual
Basic and C++ are examples of popular OOP languages.
Differentiate between structured approach and object-oriented approach in
5.1.3.3
programming.
• Structured programming often uses a top-down design model.
• The object-oriented programming approach uses objects.
Describe the translation method of programming using assembler, interpreter and
5.1.4.1
compiler.

ASSEMBLER
An assembler is a computer program for translating assembly language — essentially, a
mnemonic representation of machine language — into machine language.
For example in intel 80836, the assembly language for the ’no operation’ command is NOP and
its machine code representation is 10010000. Example of assemblers are MACRO-80
Assembler and Microsoft MASM.

INTERPRETER
Interpreter is used to interpret and execute program directly from its source without compiling it
first. The source code of an interpreted language is interpreted and executed in real time when
the user execute it.
The interpreter will read each codes converts it to machine code and executes it line by line
until the end of the program. Examples of interpreter-based language are BASIC, Logo and
Smalltalk.
COMPILER
The source code (in text format) will be converted into machine code which is a file consisting
of binary machine code that can be executed on a computer. If the compiler encounters any
errors, it records them in the program-listing file.

39 fauzi&ghozes@ksah2009
Panitia ICT KSAH

When a user wants to run the program, the object program is loaded into the memory of the
computer and the program instructions begin executing. A compiled code generally runs faster
than programs based on interpreted language. Several programming languages like C++,
Pascal and COBOL used compilers as their translators.

5.1.5.1 Differentiate between constants and variables.

Constants Variables

Value can be changed anytime


Value is not changeable during
Characteristics during the course of the
the course of the program.
program.

Use constant when you want to


Use variable to store data that
declare someting that won’t be
Usage may or will change during the
changed midway in your
running of the program.
program execution.

5.1.5.2 Differentiate between the data types: Boolean, integer, double, string and date.

Integer
Integer data type contains any whole number value that does not have any fractional part.
Double
Any number value that may and could contain a fractional part.
String
Any value that contains a sequence of characters.
Boolean
Boolean type consists either a True or False value. Programmers usually use it to store status.

5.1.5.3 Differentiate between mathematical and logical (Boolean) operators.

Function:
Mathematical operators perform mathematical operations such as plus or substract. Relational
operators perform element-by-element comparisons between two arrays. Logical operators
perform logical operations such as checking the condition of two Boolean values.
Symbols:
These operators have their own symbols based on the programming language.

5.1.5.4 Differentiate between sequence control structure and selection control structure.

ASPECTS SEQUENCE CONTROL SELECTION CONTROL

Usage • Use when want to execute code • Use when want to implement
line by line. decision making process in the
program.

40 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• Does not use the decision • Use the decision symbol.


symbol.

Execution Flow • Execute statement one by one • Execute different statement for
in linear @ consecutive order. different conditions.

Flow Chart

5.2 Program Development

5.2.1.1 Describe the five main phases in program development:

• problem analysis

During the problem analysis phase, the programmer will interview the client to find out what the
client’s needs are.

• program design

Based on that, the programmer will design a flow chart that represents the needs of the client

• coding

Once the flow chart is confirmed, the programmer will perform coding.

• testing and debugging

If there are any errors, the programmer will do a debugging of the program.

• documentation

After this, the programmer will complete the documentation for the program; this includes the
user manual, a clear layout of the input and output records and a program listing.

5.2.2.1 Apply program development phases to solve problems.

PROBLEMS SOLUTIONS

41 fauzi&ghozes@ksah2009
Panitia ICT KSAH

Programmers use whiteboards to sketch


Users don’t understand what they want.
data flows of the user or client’s system.

Programmers must ensure that they get


Users won’t commit to set of written
the client’s signature of approval for the
requirements
program requirements.

Programmers must clearly explain that


Users insist on new requirements after they will charge extra costs for any
the cost & schedule have been fixed. requirements not previously specified by
users.

Programmers must constantly interact


Communication with users are slow.
with users or clients.

Users often do not participate in views Programmers should show users some
or are incapable of doing so. samples programs (prototyping).

5.3 Current and Future Developments

Find out the latest programming languages:

• fifth generation language

Fifth generation programming language (5GL) is an advance programming language which


concentrates on solving problems using constraints given to the program.
In fifth generation language, the programmer just need to define the problem to be solve and
the program will automatically code the program based on the problem definition.Fifth
generation languages are designed to make the computer solve the problem for you. These
languages are mostly used in artificial intelligence research. Examples of fifth generation
languages include Prolog and Mercury.

• natural language

Natural Language programming aims to use natural language such as English to write a
program.
Instead of using a specific programming language syntax, natural language programming will
use normal English as the input to program software. Such a technique would mean less
technical programming knowledge is required to write a program.The programmer needs to
define the program using normal language.

• OpenGL (Graphic Library)

OpenGL is a standard specification to describe the standard Application Programming Interface


(API) for 3D/2D computer graphic applications. It’s specification describes a set of functions
and the exact behaviours that the 3D/2D application must perform.
OpenGL was developed by Silicon Graphics. OpenGL is widely used in virtual reality, scientific
visualisation, flight simulation and video game development

42 fauzi&ghozes@ksah2009
Panitia ICT KSAH

6. INFORMATION SYSTEMS

6.1 Concepts of Information Systems

6.1.1.1 Give the meaning of data, information and information systems.

DATA
Data is like raw material. It is not organised and has little value. Data can include text, numbers,
images, audio and video.

INFORMATION
Information is organised data that is valuable and meaningful to a specific user.

INFORMATION SYSTEM
Information system is a set of a related components that collects data, processes data and
provides information.

6.1.2.1 State the usage of Information Systems in education, business and management.

INFORMATION SYSTEMS IN EDUCATION

• Keep track of students statistic and grades.

• Help students and teachers in online learning and discussion – Learning


Management System, example : Moodle, University Sains Malaysia and Open
University Malaysia.

• Store subject content – for Online Learning Portal.

USAGE OF INFORMATION SYSTEMS IN BUSINESS

• Carry out online buying and selling :


In retail companies, information systems are used in online buying and selling.
Examples of information systems for a retail company are Amazon.com, Lelong.com
and Maybank2U.com.

• Help plan the delivery of goods and services :


In the transportation industry, information systems are used to help plan the delivery of
goods and services. Examples of information systems in the transportation industry are
UPS.com, FedEx Express and City-Link.

• Make room bookings and for checking the best rates :


In the hotel industry, information systems are used to make room bookings and for
checking the best rates. Examples of information systems in the hotel industry are
Genting Online booking, Booking.com and Sabah Hotel Booking Center.

USAGE OF INFORMATION SYSTEMS IN MANAGEMENT

• See employee records : In human resource management, information systems are


used to see things like employee records.

• Analyse product, services and product prices : In marketing management


information systems are used to analyse products, services and product prices that
give the best sales.

43 fauzi&ghozes@ksah2009
Panitia ICT KSAH

• Process customer ordes, organise production times and keep track of product
inventory : In manufacturing management, information systems are used to process
customers orders, organise production times and keep track of product inventory.

6.1.3.1 List the Information System components:

• data

• hardware

• software

• people

• procedure

6.1.3.2 Define each of the Information System components.

DATA
Data is very important in information systems. Without data, decision and conclusion cannot be
made. The right data in information systems helps us to make the right decision. For example,
the stock status report in a book store helps the book store's manager to decide when to
reorder their stocks.

HARDWARE
The hardware component in an information system means all computer equipment used to
perform input, processing and output functions. Hardware resources also include all media on
which data is recorded, such as paper, floppy disks and compact discs.

SOFTWARE
The software component in an information system consists of programs for the computers.
These programs allow the computers to carry out most of the instructions related to information
processing. There are two types of software: system software and application software.
System software controls basic computer operations. For example, the Operating Systems are
Microsoft Windows, Linux and Macintosh. Application software are the programs that allow
users to do specific tasks. Examples of application software are Microsoft Excel, Microsoft
Access and SQL Server.

PEOPLE
People involved is information systems personnel and end users.

PROCEDURES
Procedures are operating instructions for the user of an information system. Procedures can be
in the form of guidelines in the user manuals.

6.1.3.3 Describe the interrelation between information system components using a diagram.

44 fauzi&ghozes@ksah2009
Panitia ICT KSAH

45 fauzi&ghozes@ksah2009
Panitia ICT KSAH

6.1.4.1 List five types of Information Systems:

• Management Information System (MIS)

• Transaction Processing System (TPS)

• Decision Support System (DSS)

• Executive Information System (EIS)

• Expert System (ES)/Artificial Intelligence (AI)

6.1.4.2 State the usage of each type of information system.

MANAGEMENT INFORMATION SYSTEM (MIS)


Management Information Systems are used to provide regular information about the daily
activities of a business to the manager. Management Information Systems are to help
managers make the business processes and activities more efficient compared to doing them
manually.

TRANSACTION PROCESSING SYSTEMS (TPS)


Transaction Processing Systems are used to record business transaction. Transaction
Processing Systems keep track of daily transactions in a database.

DECISION SUPPORT SYSTEMS (DSS)


Decision Support Systems provide managers with information to make the best decisions.
Decision Support Systems help to analyse information, recognise problems and making
decisions. Most Decision Supports Systems reports are in the form of charts and diagrams.

EXECUTIVE INFORMATION SYSTEM (EIS)


Executive Information System helps top-level management to plan strategies.
An Executive Information System is used to forecast future trends.

46 fauzi&ghozes@ksah2009
Panitia ICT KSAH

EXPERT SYSTEM (ES)


Expert system is used to store knowledge and make logical suggestions for the user. Expert
System users can be professionals like doctors and scientist. Example : An Expert System can
suggest conditions and estimate the probability of having illness.

6.1.5.1 Define bit, byte, field, record, and file

BIT, BYTE, FIELD, RECORD AND FILE


The bit is represented by 0 for OFF or 1 for ON. It is a binary digit. It is the smallest unit of data
the computer can store in a database.

A byte is a collection of bits. Each byte consists of eight bits. Each byte represents a character.

A field is a unit of data consisting of one or more characters (bytes). A field is the smallest unit
of meaningful information in the database. Each field has a field name. The field name
describes the data that should be entered into the field, such as StudentID (Student ID), Name,
Address and MyKad Number.

A record is a collection of related fields. Example : Each record stores data about a students.
For example, a student record is a collection of fields about a student.

A file is a collection of related records. For example, a student file is a collection of students’
records.

6.1.5.2 State the hierarchy of data:

• Bit → Byte (Character) → Field → Record → File → Database

6.2 Software

Define database and Database Management Systems (DBMS).

Database is structured collection of information on specific subjects. We can think of a


database as an electronic filing system. An example of the database is a telephone book which
contains records of names, addresses and contact numbers. A database allows its contents to
be easily accessed, updated, stored and retrieved.

DATABASE MANAGEMENT SYSTEM (DBMS)


A Database management System is a program that accesses information from a database. A
Database Management System provides an interface between the database and the user.
A Database management System enables you to extract, modify and store information from a
database. Examples of DBMS are Oracle, SQL Server and Microsoft Access.

6.2.1.2 List the benefits of using database.

BENEFITS OF USING DATABASE


Minimises Data Redundancy
Most data item stored in only one file. With a database there is no need to repeat recording the
same data. This minimises data redundancy. For example, a school database would record a
student’s name. address and other details only once when the student enroll in the school.

Data Integrity Is Assured

47 fauzi&ghozes@ksah2009
Panitia ICT KSAH

A database ensures that data is correct for all files. When a user modifies data in one of the
files in a database, the same data will change automatically in all the files. This is called data
integrity.

Data Can Be Shared


A database allows the ease of sharing data. Data can be shared over a network, by a whole
organisation.

Information Can Be Accessed Easily


A database makes information access easy. Everyone can access and manage data in a
database.

6.2.2.1 State the relationship between attribute (field), row (record) and relation (file).

FIELD
Field is a specific category of information in a table. In a table, fields are usually shown in
columns and it has its own field name at the top. For example, StudentID, Name, MyKad
Number, Date of Birth, Gender, Address and Contact Number. All the data within the same
field holds the same data type.

For example, StudentID, Name, Gender, Address and ContactNumber use text as data type.
MyKad Number uses number as data type. Date Of Birth uses date as data type. Several fields
make up a record.

RECORD
Record is a collection of fields about one person, place or thing in a table. Records are
arranged in rows. The records consist of several data type such as of text, date or numerical
data. A record is also known as the row or tuple. For example, we have a total of five records in
this table.

FILE
A file is a set of data arranged in columns and rows. They are grouped together for a specific
purpose. For example, this is a Student Registration System which records all the students’
information.

To form a file, the file must have fields and records. A file is sometimes called a table or
relation.For example, a Book file and a Student file.

6.2.2.2 Define the primary key and foreign key.

DEFINE THE PRIMARY KEY


A primary key is the field that uniquely represents each record in a table. These keys must not
have null values. Meaning, you must not leave these
keys blank.Each table in the database must have at least one primary key.

There is also another name for a primary key: the unique identifier. In the student table, student
name might not be a good primary key. For example there are two Sulaiman bin Yahya in this
school.

So, the Student Name is not a good primary key. You may use the MyKad Number as the
primary key. Some students might not have their own MyKad Number yet, the MyKad Number
is sometimes rejected as the primary key. To uniquely identify each student, you can add a
special StudentID field to be used as the primary key. For example, each StudentID represents
a student.

DEFINE FOREIGN KEY

48 fauzi&ghozes@ksah2009
Panitia ICT KSAH

A foreign key is the field that matches the primary key in another table. It contains the same
data as those of the primary key in the other table. Foreign key fields are linked to fields in
other tables. While a primary key must have unique values, a foreign key may have duplicate
values.

For example, the StudentID is the primary key in the Student table, but the StudentID is a
foreign key in the Subject table. Since a student may take more than one subject, the foreign
key (StudentID) will have a duplicate value in the subject table.

6.2.2.3 State the importance of the primary key.

A primary key ensures data integrity by uniquely identifying each record. It helps to avoid
duplicating records. It prevents null values being entered in the unique field.

6.2.2.4 Differentiate between the primary key and foreign key.

A foreign key links to a primary key in another table. While primary keys must have unique
values, foreign keys may have duplicate values. These are the differences between the primary
key and foreign key.

6.2.2.5 State the importance of relationship between the primary key and foreign key.

The primary key of one table becomes a foreign key of the other table. By matching a foreign
key with a primary key, the data does not need to be entered repeatedly.

A primary key makes creating Queries, Forms and Reports easier. A primary key improves
data performance by relating smaller tables into meaningful databases.

6.2.3.1 Define the following database objects/ tools: Table, form, query, report.

OBJECTS
Tables are one of the database objects in Microsoft Access. A Table is a collection of data that
is organised as rows and columns.

Every database object such as Queries, Forms and Reports are based on one ore more
Tables. A database contains at least one Table.

49 fauzi&ghozes@ksah2009

Вам также может понравиться