Вы находитесь на странице: 1из 2

TOC.CW.LA1.AS02.

TABLE OF CONSTRUCT
Construct Aspect Instrument SCORE : : : CRITERIA S02 LA1.S02.1 Impact of ICT on Society Locate and present information on impact of ICT on society Verbal Presentation EVIDENCE NOTE Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc. Choose ONE of the following topics:

1. Locate information from


more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation.

1.
Completed ACF.CW.LA1.S02.1 AND a soft copy and/or hard copy of the presentation.

Copyright and Piracy from Moral and Legal Standpoints.

2. 3. 5. 7.

Lack of Security and its Effects on Industry/Economy/ Government. Malaysian Cyber Law, Electronic Government Law. 4. Phishing Virus (Trojan Horse, Salami Attack) 6. Hacking Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible

4. Display cooperation.
a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete all FOUR tasks.

1. Locate information from more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or

Completed ACF.CW.LA1.S02.1 AND a soft copy and/or hard copy of the presentation.

Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc. Choose ONE of the following topics:

1. 2. 3.

Copyright and Piracy from Moral and Legal Standpoints. Lack of Security and its Effects on Industry/Economy/ Government. Malaysian Cyber Law,

TOC.CW.LA1.AS02.1

SCORE

CRITERIA hard copy of the presentation. 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete TWO to THREE tasks.

EVIDENCE

NOTE Electronic Government Law. 4. Phishing

5. 7.

Virus (Trojan Horse, Salami Attack) 6. Hacking Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible Candidates locate information in groups of 2 4 but must prepare and present slides individually. Source of information can be from websites, books, magazines or newspapers etc. Choose ONE of the following topics:

1. Locate information from more than one source. Write the number of sources referred. 2. Present the information in 5 to 10 slides. Write the number of slides used. 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation. 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessors observation. Complete any ONE task.

1.
Completed ACF.CW.LA1.S02.1 AND a soft copy and/or hard copy of the presentation.

Copyright and Piracy from Moral and Legal Standpoints.

2. 3. 5. 7.

Lack of Security and its Effects on Industry/Economy/ Government. Malaysian Cyber Law, Electronic Government Law. 4. Phishing Virus (Trojan Horse, Salami Attack) 6. Hacking Security Measures (Biometrics, Authentication) Suggested presentation duration: 5 minutes Values: Cooperate Responsible

Вам также может понравиться