Documente Academic
Documente Profesional
Documente Cultură
What is ICT?
A.) Information
B.) Communication
C.) Technology
Year Creation
3500 BC Sumerians developed cuneiform writing
1500 BC The Phoenicians developed the alphabet
105 BC Tsai Lun of China invented paper
1454 The first printing began with the creation of printing
machine.
1793 Telegraph line was invented
1876 The first telephone was introduced
1925 Television was made known to public
1941 Computer was created
1958 Photocopier machine was introduced
1963 Communication satellite was introduced
1969 The first internet known as ARPANET started.
3 Form 4 Lesson Notes Part 1 ICT & Society
Before the era of computer begins, counting machine was invented to help
people with business industry. The usage of counting machine, begin as early
as 200 B.C. Evolution of computers can be traced at 7 stages:
a) The early years
b) First generation
c) Second generation
d) Third generation
e) Fourth generation
f) Fifth generation
g) New era generation
Year Invention
200 BC Chinese Abacus (First counting machine)
500 BC Egyptian Abacus
1620 John Napier invented Napier’s Bone (Multiplication table carves
on bones)
1653 Blaise Pascal invented Pascaline
1673 Gottfried Wilhelm Von Leibniz invented Leibniz’s Rechner
(which use first binary mathemathic calculating machine)
1801 Joseph Marie Jacquard invented weaving loom (using punch
card technology)
1823 Charles Babbage invented mechanical calculator machine.
1941 Mark 1 was invented in Harvard University. The first computer
which is slow, expensive and unreliable. It uses mechanical
switches
1. IBM 370 series were introduced in 1964. It came in several models and
sizes. It is used for business and scientific programs.
2. Other computer models introduced were CDC 7600, BZ 500.
3. New hardware technology:
a) Silicone chip were manufactured in 1961 at the silicone valley.
5 Form 4 Lesson Notes Part 1 ICT & Society
b) Integrated circuit technology, which had reduced the size and cost of
computers. It is a complete electronic circuit or a small chip of silicone
which is also known as semiconductor.
c) The magnetic core memory was replaced by microchip. (The first 253
bit Ram, basis for the development of the 1K bit Ram).
4. Advantages:
a) Silicone chips were reliable, compact and cheaper.
b) Sold hardware and software separately which created the software
industry.
c) Customer service industry flourished (reservation and credit checks)
5. Software technology:
a) More sophisticated
b) Several programs run at the same time
c) Sharing computer resources
d) Support interactive processing
9. Advantages:
a) 100 times smaller than ENIAC (the first computer)
b) Faster
c) Reliable
d) Greater storage capacity
e) Personal and software industry boomed
1. Super Computers
- Fastest, most powerful, most expensive.
- Used in applications such as sending astronauts into space, testing safety
and aerodynamic features on cars and aircraft, controlling missile
guidance systems, and weather forecasting which required extreme
accuracy and immense speed to perform the complex calculation.
2. Mainframe computers
- Large, expensive, powerful computer that can handle hundreds or
thousands of connected user simultaneously.
- used in large organization to handle high volume processing of business
transactions and routine paperwork.
3. Mini computer
- Medium sized computer
- Usually used as servers, with several PCs or other devices networked to
access the midrange computer’s resources.
4. Personal computers
- Small computer system, designed to be used by one person at a time.
- Widely used in small and large bussineses. Examples: tracking
merchandise, billing customer, manage company accounts.
5. Mobile computers – personal computer that you can carry from place to
place
6. Expert system – teleconferencing, speech recognition system.
7 Form 4 Lesson Notes Part 1 ICT & Society
Computer plays major roles in our daily lives. We need computers to assists us
in completing various tasks and jobs.
Among the sector where ICT is used widely are:
a.) education
b.) banking
c.) industry
d.) business
A.) Education
1. Today, most schools and higher education institution have computer in the
classroom for teachers and students.
2. Computer is used in the sector of education because they can offer
a) enhanced learning
b) cognitive development
c) interactive experiences
3. User who benefits are
a) Teacher – Teacher uses computers to research for teaching materials,
participate in online forums and online conferences as well as to aid
their teaching.
b) Students – Students use the computers as a reference tool. They use
computers to browse the internet to look for information
c) Researchers – Researchers use computers to collect and process data.
d) School administrators – They use computers for administrative
purposes to make sure that the entire operation runs smoothly.
B.) Banking
1. The computer is the nerve centre of the banking system around the world.
It functions to control the entire banking system that also includes
‘Electronic Banking Services’.
2. Electronic Banking Services provide 24 hour services. The services
include
a) ATM (Automatic Teller Machine)
b) cash deposit
c) electronic fund transfer
8 Form 4 Lesson Notes Part 1 ICT & Society
d) direct deposit
e) pay by phone system
f) personal computer banking
g) internet banking
3. User who benefits are
a) Customers – Customers can make any transactions at the 24 hour
service centres or via online. These services allowed them to do
transaction at anytime they want.
b) Businessmen – Businessmen can save their time by using the online
services offered by banks. They can access company accounts for loan
applications, business transactions and update on their cash flow at
anytime
c.) Bank administrators – Bank administrators can oversee the entire
banking activities such as reconciliations, inter-branch transaction
(IBT), telegraphic transfer and others by referring to the banking
system
C.) Industry
D.) E-commerce
Sector Benefit
Architecture Use computer graphic to experience with possible interiors to
give client a visual image.
Arts Modern artists use computers to express their creativity
Career Job opportunities that are related to ICT such as computer
engineers, graphic designer, software engineers and
programmer offer more technical skill and knowledge
Government To forecast weather, process immigrant
Healthcare Computers are use to promote telemedicine. Researchers
found it useful in information sharing. Doctors and medical
practical are able to apply modern treatment such as laser
treatment.
Home Computer are use for record keeping, writing letters,
preparing budget and communicating with others
Law In maintaining national fingerprints floes, modeling DNA and
Enforcement others information.
Transportation In rapid transit system and tracking railway system
Travel Computers are use to do room reservation. It helps tourists to
plan their holiday well
10 Form 4 Lesson Notes Part 1 ICT & Society
Computer System
A.) Education
C.) Industry
D.) Commerce
ICT development has changed every aspect of the human society. It has
affected our life in many ways.
A.) Faster communication speed
1. In the past, it took a long time for any news or messages to be sent. Now
with the internet, news or messages are sent via e-mail to friends, business
partners or to anyone efficiently.
2. With the capability of bandwidth, broadband and connection speed on the
internet, any information can travel fast and at an instant. It saves time and
is inexpensive.
B.) Lower communication cost
1. Using the Internet is cost-effective than the other mode of communication
such as telephone, mailing or Korea Service. It allows people to have
access to large amounts of data at a very low cost.
2. With the internet we do not have to pay for any basic services provided by
the Internet. Furthermore, the cost of connection to the internet is
relatively cheap.
C.) Reliable mode of communication
1. Computers are reliable. With the Internet we can access and retrieved
information from anywhere and at anytime. This makes it a reliable mode
of communication.
2. However, the input to the computer is contributed by the human. If the
data pass through the computer is faulty, the result will be faulty as well.
This is related to the form GIGO. GIGO is a short form for Garbage In
Garbage Out. It refers to the quality of output produced according to the
input. Normally bad input produces bad output.
D.) Effective sharing of information
1. With the advancement of ICT, information can be shared by people all
around the world. People can share and exchange opinions, news and
information through discussion groups, mailing lists and forums on the
Internet. This enables knowledge sharing which will contribute to the
development of a knowledge-based society.
2. Some examples of popular discussion groups on the Internet are:
a) Google Groups (www.googlegroups.com)
b) Yahoo! Groups (www.yahoogroups.com)
c.) Classic discussion group
13 Form 4 Lesson Notes Part 1 ICT & Society
Summary
1. Ethics refers to a standard of moral guideline that is used to determine
proper behavior.
2. There are two codes of conducts that can be referred to which are the Ten
Commandments of Computer Ethics by the United States Institute of
Computer Ethics and the e-mails and Internet guidelines by the
Department of Public Services of Malaysia.
3. Unethical computer code of conducts include modifying the accuracy of
the information, selling information to other parties without the owner’s
permission, using information without authorization, involvement in
stealing software and invasion privacy.
4. Ethical computer code of conducts include sending warning about viruses
to other computer users, asking permission before sending any business
advertisements to others and using information with authorization.
17 Form 4 Lesson Notes Part 1 ICT & Society
1. Law is a legal system comprising of rules and principles that govern the
affairs of a community and controlled by a political authority.
2. Law differs from one country to another. In the era of technology,
computer law is needed to clarify goods or actions that fall under the
computer law. Computer law refers to all areas in law that requires an
understanding of computer technology such as hardware, software and
Internet.
3. Examples of laws of computing in Malaysia include the Malaysian
Communication and Multimedia Act, the computer Crime Act 1997 and
the Telemedicine Act 1997.
1. Respecting Ownership
We must respect ownership by not stealing other people’s work either by
duplicating or distributing it. Duplicating and distributing copies of audio
tapes, video tapes and computer programs without permission and
authorization from the individual or company that created the program are
immoral and illegal.
2. Respecting privacy and confidentiality
We should respect other people’s privacy and confidentiality by refraining
ourselves from reading their mails or files without their permission. If we
do so, it is considered as violating an individual’s right to privacy and
confidentiality.
18 Form 4 Lesson Notes Part 1 ICT & Society
3. Respecting property
Property here means ownership. Since an individual data and information
are considered as property, therefore, an act of tampering and changing
electronic information is considered as vandalism and disrespect for other
people’s property.
1. Both ethics and law are complimentary to each other and are made
a. to guide user from misusing computers
b. to create a healthy computer society, so that computers are used to
contribute to a better life.
c to prevent any crime.
Ethics Law
1. Guideline 1. Control
As a guideline to computer users As a rule to control computer
users.
2. Moral standard 2. Judicial standard
Ethical behavior is judged by moral Law is judged by judicial
standard. standards
3. Free to follow 3. Must follow
Computer users are free to follow or Computer users must follow the
ignore the code of ethics regulations and law
4. No punishments 4. Penalties, imprisonments and
No punishments for anyone who other punishments
violates ethics Penalties, imprisonments and
other punishments for those
who break the law.
5. Universal 5. Depends on country
Universal, can be applied anywhere, Depends on country and state
all over the world where the crime is committed.
6. Produce ethical computer user 6. Prevent misusing of computers
To produce ethical computer users To prevent misuse of computers
7. Immoral 7. Crime
19 Form 4 Lesson Notes Part 1 ICT & Society
Ethics Law
Not honoring computer ethics Not honoring the law means
means ignoring the moral elements committing a crime
(immoral).
Summary
Summary
We should respect other people’s privacy by not invading their personal lives.
People treasure privacy as there are some things that they do not wish to
disclose to others. The same goes for privacy in ICT.
A.) What is privacy?
1. Privacy in IT refers to data and information privacy.
2. Data refers to a collection of raw unprocessed facts, figures and symbols.
Then, computer is used to process data into information. In general, data
include texts, numbers, sounds, images and video.
3. Information privacy is described as the rights of individuals and
companies to deny or restrict the collection and use of information about
them.
B.) Ways computer technology threaten our privacy
1. How does computer technology threaten the privacy of our data? It is done
through:
a. Cookies
o are used to identify users by web casting, e-commerce and other
web applications.
o contain user information and are saved in the computer hard disk.
o are used by some websites to store passwords and track how
regularly we visit a website, that’s how we become potential
targets for web advertisers.
o enable web sites to collect information about your online activities
and store them for future use, then the collected details will be
sold to any company that requests for it.
b. Electronic profile
o electronic profile is the combining of data in a database that can be
sold to the Internet by the company to the interested parties.
o this database is in a form such as magazine subscription or product
warranty cards that had been filled by online subscribers.
o the information in electronic profile includes personal details such
as your age, address and marital status.
c. Spyware
o refers to a program that collects user information without user’s
knowledge.
o can enter computers, sneaking in like a virus.
o is a result of installing new programs.
24 Form 4 Lesson Notes Part 1 ICT & Society
1. Authentication is a process where users verify that they are who they say
they are. The user who attempts to perform functions in a system is in fact
the user who is authorized to do so.
2. For example, when you use an ATM card, the machine will verify the
validation of the card. Then, the machine will request for a pin number.
This is where the authentication takes place.
Identification
- present what the user has (e.g. smart card)
Authentication False
- authenticate who the
user is
True
Access granted
Summary
1. Authentication is a process where users verify that they are who they
say they are.
2. There are 2 commonly used authentication methods, which are
biometric device and callback system.
3. Biometric device is a device that translates personal characteristics
into a digital code that is compared with a digital code stored in the
database.
4. Callback system refers to the checking system that authenticates the
user.
30 Form 4 Lesson Notes Part 1 ICT & Society
Identification
- present what the user has (e.g. smart card)
Identification
- present what the user is (e.g. pin number)
1. There are two methods, commonly used in verification, which are user
identification and processed object.
2. User identification refers to the process of validating the user.
3. Processed object refers to something the user has such as identification
card, security token and cell phone.
Summary
C.) Pornography
D.) Slander
Pornography Slander
1. Can lead to criminal acts such as 1. Can develop into a society that
exploitation of women and disregards honesty and truth.
children
2. Can lead to sexual addiction or 2. Can develop bad habit of
perversion. spreading untruths and rumours.
3. Can develop low moral value 3. Can lead to unnecessary
towards other men, women or argument.
children.
4. Can erode good religious, cultural 4. Can cause people to have
and social beliefs and behaviour. negative attitudes towards another
person.
Summary
False True
Keyword = Blocked database
b. Site blocking
i. This software is more sophisticated than word blocking as it
involve people visiting the site and evaluating them.
ii. This method compiles a list a ‘dubious Internet sites’ which
the software then can prevent people from accessing it.
iii. ‘Denial list’ regularly updated and can be automatically
downloaded to the software purchaser.
iv. Some example of ‘dubious Internet sites’ are www.xxx.xom,
www.poker.com, www.porn.com
v. ‘Site blocking process’
Type URL
Falseee True
URL checks for blocked
Access Access
False True
Content to be accessed > allowed websites
Summary
Nowadays, we found that many peoples are selling pirated computer software
to customers at a much cheaper price than the original CDs. Do you think this
is a criminal act or just a way of doing business?
COMPUTER CRIMES
1. A computer crime is defined as any criminal activity that is related to
the use of computers.
2. Any illegal act involving a computer is referred as a computer crime.
3. These activities include computer fraud, copyright infringement,
computer theft and computer attack.
A. COMPUTER FRAUD
1. Computer fraud is defined as having an intention to take advantage
over or causing loss to other people, mainly on monetary basis through
the use of computers.
2. There are many forms of computer fraud which include e-mail hoaxes,
program fraud, investment schemes, sales promotion, claims of
expertise on certain field, health frauds, scams and hacking.
B. COPYRIGHT INFRINGEMENT
1. Copyright infringement is defined as a violation of the right secured
by a copyright.
2. Copyright infringement involves illegal copying or reproduction of
copyright materials by the black market groups.
3. The open commercial sale of pirated items is also illegal. Copyright
infringement involves illegal copying or reproduction of copyright
4. With the current technology, the most perfect copy of the original
copyright materials can be downloaded from the Internet.
5. For example, the widespread of illegal downloading activities and
sharing of recorded music in MP3 format. Also the unauthorized
copying of movies even after the closing down of Nepster.
C. COMPUTER THEFT
1. Computer Theft is defined as the unauthorized use of another person’s
property with the intention to deny the owner the rightful possession
of that property or its use.
2. Insurance companies and drug companies have access to private
medical records. These medical records can be used to determine the
43 Form 4 Lesson Notes Part 1 ICT & Society
HARDWARE SECURITY
1. Hardware security refers to security measures used to protect the
hardware specifically the computer and its related documents.
2. The examples of security measures used to protect the hardware
include PC-locks, keyboard-lock, smart cards and biometric devices.
3. Besides these Cyber Laws, there are three other Cyber Laws being
drafted
NETWORK SECURITY
1. The transfer of data through network has become a common practice
and the need to implement network security has become significant.
2. Network security refers to security measures used to protect the
network system.
3. One example of network security measures is firewall. With firewall,
network resources can be protected from the outsiders.
SUMMARY
1. Computer security is a process of preventing and detecting
unauthorized use of the computer.
2. There are three types of computer, which are hardware security,
software/data security and network security.
46 Form 4 Lesson Notes Part 1 ICT & Society
A MALICIOUS CODE
1. Malicious code is also known as a rouge program. It is a threat to
computing assets by causing undesired effects in the programmer’s
part. The effect is caused by an agent, with the intention to cause
damage.
2. The agent for malicious code is the writer of the code or any person
who causes its distributions.
3. There are various kinds of malicious code. They include
o virus
Virus is a program that can pass on the malicious code to other
non-infected programs by modifying them.
To infect a computer, the virus needs to attaches itself to the
program, usually files with .doc (document), .xls (spread
sheet), .exe (executable file) extensions.
It will then destroy or co-exists with the program.
Once the infected file is open, the virus will copy itself into
that particular system and perform its functions.
Eventually, it can overtake the entire computing system and
spread to other connected systems.
o Trojan Horse
A program which can perform useful but unexpected actions.
Must be installed by users or intruders before it can affect the
system’s assets.
47 Form 4 Lesson Notes Part 1 ICT & Society
B HACKER
1. Hacking is a source of threat to security in computer. It is defined as
unauthorized access to the computer system by a hacker.
2. Hackers are persons who learn about the computer systems in detail.
They wrote program referred to as hacks. Hackers may use a modem
or cable to hack the targeted computers.
3. Kevin Mitnick is the most notorious hacker ever caught. He had
stolen millions of dollars worth of software and credit card
information on the net. He used new identities and cleverly concealed
his locations. He spent 5 years in jail for his hacking activity.
48 Form 4 Lesson Notes Part 1 ICT & Society
D THEFT
1. Two types of computer theft:
a. Computer is used to steal money, goods, information and
resources.
b. Actual stealing of computer, especially notebook and PDA. (This
type of stealing causes loss of the expensive item and also the
valuable information.)
2. Three approaches to prevent theft
a) Prevent access by using locks, smart card application and
password activation
b) Prevent portability of your computer by restricting all hardware
from physically being moved to other places.
c) Detect and guard all exits and record any hardware (such as disk
or CD) before being transported
SUMMARY
1. Security threats include malicious code, hacking, natural environment
and theft.
2. There are various types of malicious code that include virus, Trojan
horse, logic door, trapdoor or backdoor and worm.
3. Virus is a program that can pass malicious code to other non-infected
program by modifying them.
4. Computers are also threatened by natural or environmental disaster
such as flood, fore, earthquakes, storms and tornados.
5. Computer theft includes stealing money, goods, information and
computer resources.
49 Form 4 Lesson Notes Part 1 ICT & Society
B.) Cryptography
1. Cryptography is a process of hiding information by altering the actual
information into different representation, for example APA can be
written as I?X.
2. Almost all cryptosystem depend on a key such as a password like the
numbers or a phase that can be used to encrypt or decrypt a message.
3. The traditional type of cryptosystem used on a computer network is
called a symmetric secret key system.
4. With this approach, the sender and the recipient use the same key, and
they have to keep the share key a secret from anyone else.
C.) Antivirus
1. User should install an Antivirus program and update it frequently.
2. An Antivirus program protects a computer against viruses by
identifying and removing any computer viruses found in the computer
memory, on storage media or incoming e-mail files.
50 Form 4 Lesson Notes Part 1 ICT & Society
3. Identifying virus:
o Two techniques are use to identify the virus:
a) Virus signature – also called a virus definition. It is a specific
pattern of the virus code.
b) Inoculating a program file – the Antivirus program records
information such as the file size and file creation date in a
separate inculcation file. The Antivirus program then uses this
information to detect if a virus tampers with the data
describing the inoculated program file.
o If an Antivirus program identifies an infected file, it attempts to
remove its virus, worm or Trojan horse. If the Antivirus program
cannot remove the infection, it often quarantines the infected file.
Quarantine is a separate area of a hard disk that holds the infected
file until the infection can be removed. This step ensures other
files will not become infected.
4. An Antivirus program scans for programs that attempt to modify the
boot program, the operating system and other programs that normally
are read from but not modified.
5. Many Antivirus program automatically scan files downloaded from
the web, e-mail attachments and all types of removable media inserted
into the computer.
D.) Anti-Spyware
1. Spyware is a program placed on a computer without the user’s
knowledge. It secretly collects information about the user.
2. The Spyware program communicates information to the outside
source.
3. An Anti-Spyware application program sometimes called tracking for
threat or a Spybot is used to remove Spyware.
4. Among the popular Anti-Spyware programs are:
o Spybot Search and destroy
o Ad-aware
o Spyware Blaster
51 Form 4 Lesson Notes Part 1 ICT & Society
E.) Firewall
1. Firewall is a piece of hardware or software which functions in a
networked environment to prevent some communications forbidden by
the security policy.
2. The purpose of a firewall is to keep bad thing outside a protected
firewall implement a security policy. It might permit limited access
from in or outside the network perimeters or from certain users or for
certain activity.
3. There are three types of firewall
a. Screening routers
o Simplest
o Sees only addresses and service protocol type
o Screen based on connection rules.
b. Proxy gateway
o Complex
o Sees full text of communication
o Screen based on behaviour proxies
c. Guard
o Most complex
o Sees full text of communication
o Screens based on interpretation of message content.
o Some threat also come from within the organization and not
just from the outside.
b. Organisational User Self Awareness
o Provide employee with adequate training and the importance
of security and control.
o Even a very high-tech protection system could not protect the
system against incompetent users.
c. Individual User Self Awareness
o Threat often comes in beautiful offers and packages.
o Do not download or install software from unreliable sources.
o Do not expose important information to strangers.
Summary
1. Data backup is a program of file duplication.
2. Security measures mean the precautionary measures taken to ward off
possible danger or damage.
3. Cryptography is a process of hiding information by altering the actual
information into different representation.
4. An Antivirus program protects a computer against viruses.
5. Spyware is a program placed on a computer without the user’s
knowledge and secretly collects information about the user.
6. Firewall prevents some communications forbidden by the security
policy.
7. Human aspects refer to the user and also the intruder of a computer
system which is one of the hardest aspects to give protection to.
53 Form 4 Lesson Notes Part 1 ICT & Society
Security threats may come in many forms. For example, when someone is
invading our account information from a trusted bank, this act is considered as
a security threat. Security measures can be used to prevent this invaders from
getting the getting the account information. For example, the bank can use a
firewall to prevent unauthorized access to its database.
Summary
1. The relationship between the security threats and the security
measures.
55 Form 4 Lesson Notes Part 1 ICT & Society
a) Tcpwrappers
o Tcpwrappers will control access at the application level, rather
than at the application level, rather than at the socket level like
iptables and ipchains. The system will run tcpwrappers to log
access to fttp, tftp, rch, rlogin, rexe and telnet.
o Tcpwrappers stop the attempted connection examines its
configuration files will decide whether to accept or reject
the request.
b) Tripwire
o Tripwire will detect and report on any changes in the
thousands of strategic system files. The system will run
tripwire to determine if system files have changed.
3. User’s access will be reviewed periodically by computer operations.
On going internal audits will be made to ensure detection of violations
of security and unauthorized modifications to software and data.
E.) Patch
1. Patch is a name of an UNIX utility. It applies a script generated by the
different program to a set of files that allows changes from one file to
be directly applied to another file.
2. Patch supplies small updates to software, provided that the source
code is available.
3. Resources are not enough to patch all security holes that we can hear
about through the bugtraq list.
4. Bugtraq is a full disclosure mailing list dedicated to the issues of
computer security. On-topic discussions are new discussions about
vulnerabilities, methods of exploitation and how to fix them. It is a
high volume mailing list and almost all new vulnerabilities are
discussed there.
Summary
There are a few ways to protect information. They are
o Make backup files
o Detect the virus and clean the computer
o Warn others on virus attack.
59 Form 4 Lesson Notes Part 1 ICT & Society
SOFTWARE APPLICATION
B) BUSINESS
1 People use finance or accounting software to balance check books, pay
bills, track personal income & expenses, manage investments &
evaluate their financial plans.
2 Accounting software helps companies to record & report their
financial transactions. One example of these software applications
includes MYOB, Intuit Quick Books & Peachtree Complete
Accounting.
3 Computer In Banking
o In the banking sector. Many financial institutions offer online
banking. People can access their financial records from anywhere
in world. Example of online banking is Maybank2u.
(www.maybank2u.com)
4 Industry
o By using the CAM system, computers record actual labour,
material, machine & computer time used to manufacture a
particular product.
o Computer process this data & automatically update inventory,
production, payroll & accounting records on the company’s
networks.
o Examples of companies using this system are Proton
(www.proton.com.my) & Perodua (www.perodua.com.my).
D) COMMUNICATION
1. A government provides society with direction by making &
administering policies. Most government offices or agencies have
website in order to provide citizen with up-to-date or latest
information.
2. Examples of software applications used for communication include
email, web browser, newsgroups, instant messaging & video
conferencing.
3. People can access government websites to :
o Check information on taxes (www.hasil.org.my)
o Apply for permit & licenses (www.jpj.gov.my)
o Check for MyKad (www.jpn.gov.my)
o Pay parking tickets & check summons (www.jpj.gov.my)
o Renew vehicle registration (www.jpj.gov.my)
o Register online for IPTA/IPTS application (www.moe.gov.my)
4 Computer In Tourism
o Today, people will go online to get all related information about
traveling. They can visit websites to get information on
destinations, prices, hotels, flights & car rentals.
5 Computer In The Healthcare
o In the medical field, computers are very important in running the
operations. Medical staffs use computers for various purposes,
namely:
i. Maintaining patient records
ii. Monitoring patients’ vital sign
iii. Assisting doctors, nurses & technicians with medical tests by
using computer & computerized devices.
iv. Using medical software to help with researching & diagnosing
health conditions.
62 Form 4 Lesson Notes Part 1 ICT & Society
6 Science
o In the scientific world, computers are used in all fields of science
from biology to astronomy to meteorology and others. These are
thing that can be done by computer, namely;
i. Collecting, analyzing & modeling data
ii. Serving as medium of communication with colleagues around
the world
iii. Contributing to new inventions or breakthrough in surgery,
medicine & treatment.
iv. Imitating functions of the central nervous system, retina of the
eye & others by tiny computers.
v. Allowing a deaf person to listen through cochlear implant
SUMMARY
1. Computers help people to do their work faster & more efficient by
using the software applications that consist of special programs for
specific tasks.
2. Software applications are used for many reasons such as to enhance
the learning process, to help in business activities, to assist the graphic
& multimedia projects & to facilitate communication.
3. Examples of software applications include integrated software,
personal finance, legal, word processing, spreadsheet, computer-aided
design (CAD), desktop publishing, email, web browser & chat rooms.
63 Form 4 Lesson Notes Part 1 ICT & Society
HOME USERS
The computer is a basic necessity. Each home user spends time on computer
for different reasons :
• business
• entertainment
• communication
• education
MOBILE USER
Mobile users :
• include real estate agents, insurance agents, metre readers and journalists
• use notebook computers, internet-enabled PDAs or smart phones
64 Form 4 Lesson Notes Part 1 ICT & Society
POWER USER
Power user :
• include engineers, scientists, architects and virtual reality animators
• use computers with extremely fast processor, bigger storage and
customized software
• work with mini computers that uses design to meet the organizational
needs
• use software such as CAD , CAM and MATLAB
• Is the evident biased? Does the author attempt to sway the reader’s
opinion?
c) Reliability/ Credibility
• Is the information accurate?
• Has the information been peer reviewed?
• Are the authors and publishers reputable?
• Do they cite their credentials?
• Are there footnotes and a bibliography?
d) Update
• How recent is the information published?
• How recent has it been updated?
• Have there been new developments on the topic?
• Could the information you are using be misleading because of the
publication date?
There are varieties of ways to write out your research. However, there is a set
of basic requirements that must be followed when it comes to submitting or
presenting written presentation.
A WHAT IS DELEGATION?
Delegation is the ability to assign tasks to others with the authority,
responsibility and accountability to finish the tasks.
C WHAT TO DELEGATE
70 Form 4 Lesson Notes Part 1 ICT & Society
1. QUESTIONING
• Discover a problem
• Form a question to answer the problem
2. PLANNING
• Set out steps to find answer
• Select sources for possible answer
• Plan a basic draft for reporting
• Assign tasks to team members
• Agree on contingency plans
3. GATHERING
• Go to agreed sources of information
• Collect information
4. SORTING
• Put similar information together
• Highlight valuable credible information
5. SYNTHESISING
• Discuss information with others
• Combine different information
6. EVALUATING
• Discuss if information gathered supports the answer
• Test out solution and decision that supports the answer
7. REPORTING
• Write or type out the report
• Create an appropriate graphic or media
• Prepare for question and answer
• Prepare research
4. HOW TO DELEGATE
71 Form 4 Lesson Notes Part 1 ICT & Society
STEPS TO DO A STUDY
PORTFOLIO
o The portfolio will contain:
1. Team journal
a. Study project introduction page
b. Minutes of team meetings
c. Initial project plan / calendar
d. Conflict resolution report
2. Initial framework for presentation
3. Final presentation
o The purpose of team journal is to keep track the progress of the project.
o The team’s initial framework is where the team should do some basic
study on the topic and decide what should be included in the presentation.
o The print out of the final presentation will be given to the teacher for final
grading.
• Practice in advance
• Prepare notes on paper or cue cards to help you remember to speak out
clearly for people at the back to hear you
• Do not shout