"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Ict form 4 chapter 1(answer)
1.
2. TECHNOLOGY TIMELINE 3500 BC (Sumerians-Cuneiform writing) 1500 BC (Phoencians- alphabet ) 1941 Computer 1793 telegraph 1925 Television 1454 First Printing machine 105 BC Tsai Lun- paper 1876 First telephone 1958 photocopier 1963 Satellite 1969 APRANET -internet
3. LESSON 2 EVOLUTION OF COMPUTERS 200 BC ( Chinese Abacus) 1801 Joseph Marie Jacquard – Weaving Loom 500 BC (Egyptian abacus ) 1620 John Napier –Napier’s Bones 1653 Blaise Pascal- Pascaline 1673 Gottfried Wilhelm Von Leibniz - Leibniz’s Rechiner 1941 Harvard University- Mark 1 1823 Charles Baggage – Mechanical calculator Machine
4.
5.
6.
7. LESSON 3 & 4 USAGE OF ICT IN DAILY LIFE A) EDUCATION BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Teacher lectures Teacher as a facilitator. Students study by their own. 2. Students write in their notes / exercise books Students do the exercise in the computer 3. Teacher write notes On the board Teacher use the LCD projector and computer 4. Students use textbooks Students use teaching courseware
8.
9.
10. B) BANKING SYSTEM BEFORE ICT (Non-computerized ) AFTER ICT (computerized) 1. Done manually by taking deposit directly All transaction are done with computer 2. Transactions can only be made during working hours Transactions can only be made 24 hours a day 3. Takes times to approve any loan applications Loan application can be approved faster Eg: online services, phone banking system, credit cards
11.
12.
13.
14.
15. LESSON 6 Ethics is a moral philosophy where a person make a specific moral choice and Sticks to it. GUIDELINES Meaning of the …. Ethics Any code of conducts that are not conforming to approved standards of social or processional behavior Law is legal system comprising of rules and principles that govern the affairs Of a community and controlled by a political authority. Unethical Law
16. Differences between Ethics and Law ETHICS LAW As a Guideline As a rule to control Moral standards Judicial standards Free to follow the code of ethics Must follow the regulation and law No punishments Penalties, imprisonments and others law Universal Depends on country Produce ethical computer users Prevent misusing of computers Immoral Crime
17.
18.
19. Types of Intellectual Property Protection Literary & artistic material, music, film, Sound recording & roadcasts, including Software & multimedia Words, names, symbols, devices & images that represent product, Goods or services Utility, design, plant That protect inventions & improvement to existing inventions Lines, contours, colors, shape, Texture, or material of the product or Its ornamentation 1 ) Patents for inventions 2) Trademark for brand identity 3) Design for product appearance 4) Copyright for material
20.
21.
22.
23. THE WAYS OF COMPUTER PRIVACY PASSWORD ENCRYPTION EMAIL PRIVACY Not just to protect the computer but to make sure that the computer issues by authorized worker or user only. With public key encryption there are two keys, one public and the other private. When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The public key needs to be known The number of packets depends on the size of message. To send a message to a friend, you uses his public key to encrypt the message. Each message has the internet address of the recipient. Your friend then uses his private key to decode the message after receiving it. This means there may be some places between the packets could be intercepted and examined.
24.
25.
26.
27.
28. LESSON 14 Any laws relating to protecting the internet and other online communication Technologies What is Cyber Law? Needs for Cyber Law Integrity and Security Information Legal status of online transaction Privacy and confidentially of information Intellectual property Rights Security of government data
29. The Cyber Law Acts in Malaysia 1 ) Digital Signature Act 1997 – Secure electronic communications especially on the internet 2 ) Computer Crimes Act 1997 – gives protection against misuse of computer and computer criminal activities 3) Telemedicine Act 1997 – ensure only qualified medical practitioners practice telemedicine 4) Communication and multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia
30. LESSON 15 Computer Crimes 1. Computer Fraud Defined as having an intention to take advantage over or causing loss to other people . Eg: e-mail hoaxes, programme fraud, sales promotion, investment schemes. 2. Copyright Infringement Defined as a violation of the right secured by a copyright. Involve illegal copy or reproduction of copyright material by the black market group. Eg: Pirated CD 3. Computer Theft Defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg: transfer of payment to the wrong account 4. Computer Attacks Defined as any activities taken to disrupt the equipment of computer system, change processing control or corrupt stored data. Eg: malicious code (virus, worm…)
31. computer security Means protecting our computer system and the information they Contain against unwanted access, damage, destruction or modification. Network security Hardware Security Software security / data security 3 types Eg: pc-lock, keyboard lock, Smart card Eg: activation code, Serial number Eg: firewall
32.
33.
34. Primary differences between worms and viruses Worm Virus Operates through the network Spreads through any medium Spreads copies on itself as a standalone program Spreads copies itself as a program that attaches to other programs
35.
36. LESSON 18 Security Measures Anti-spyware Firewall Anti-virus Human Aspects Data backup Cryptography
37. Security Measures so m Explanation 1.Data backup File duplication – daily, weekly , biweekly backup 2. Cryptography Is a process of hiding information by altering the actual information into different representation. 3. Antivirus Protects a computer against viruses by identifying and removing any computer viruses found in the computer. (kaspersky) 4. Anti-spyware Is a program placed on a computer without the user’s knowledge. (spy-bot, ad-adware) 5. Firewall Piece of hardware software which functions in a networking environment to prevent some communication forbidden by the security policy. (screening routers, proxy gateway, guard) 6. Human Aspects Refer to the user and also the intruder of a computer system.
38.
39. LESSON 21 Computer application in the society Area Examples of software applications Home & education Microsoft office, adobe photoshop, macromedia flash, autoCAD… Business Spreadsheet, database, presentation, graphics… Graphics & multimedia Computer Aided design (CAD), paint/image editing Communication E-mail, web browsers, chat rooms, Newgroups, video conferencing
40. Computer users Home user Power user Large business user Mobile user SOHO