Upload
shaharizan-hassan
View
267
Download
0
Embed Size (px)
Citation preview
Form 4 Yearly Plan For ICT 2014
SMK DENGKIL, SEPANG
INFORMATION AND COMMUNICATION TECHNOLOGYSCHEME OF WORK 2014
FORM 41.0 INFORMATION TECHNOLOGY AND SOCIETYMONTH/
WEEKTOPICS AND
SCOPELEARNING OUTCOME SUGGESTED ACTIVITIES
JANWEEK
12/1-3/1
1.1 Introduction to Information Technology
(1 periods)
Learners should be able to:1.1.1 Define Information Technology
in general.
Students state the definition of InformationTechnology in general.
WEEK2
6/1-10/1ORIENTASI PELAJAR TINGKATAN 4
WEEK3
13/1-17/1
MAULIDUR RASUL
THAIPUSAM
(4 periods) Learners should be able to:1.1.1 Define Information Technology in general.
1.1.2 Discuss the roles of IT in everyday life:
o Educationo Bankingo Industry
Commerce.
1. Students state the definition of Information Technology in general.
2. Group Activity:- Discussing the roles of
IT in everyday life.- Students cite an
example of a technology used in every day life.
Students adhere the rules and regulations set for the ICT lab.
WEEK4
20/1-24/1
WEEK5
27/1-30/1
(TAHUN BARU CINA)
FEBWEEK
6
1.2 Computer Ethics and Legal Issues
(8 periods)
1.2.1 Define Computer Ethics.
1.2.2 Identify the Code of Ethics.
1.2.3 Define Intellectual Property.
1.2.4 Define Privacy:o authorised access
- user authentication and verification- Login (Personal
Identification Numbers (PIN), User Identification, password)
- Biometrics- physical control
1.2.5 Controversial contents and control:
o Pornographyo Slandero Filtering (Example : NetNanny,
CyberPatrol, BlockNow)1.2.6 Computer crime and Security threats:
o Definition : Computer crime Security threats
o Examples of computer crimes:o Fraud
identity fraud credit card fraud
Copyright infringement unauthorized copy unauthorized file sharing
Theft: data, information, equipmentAttacks: Examples salami attack, virus, worms, hacking
1.2.7 Examples of Security threatso malicious codes: e.g. virus,
Trojan horse, worms, spy ware, Phishing
o hacking: ethical (hackers) and
1.2.1.1 Students explain Computer Ethics and Code of Ethics.
1.2.1.2 Students describe Intellectual Property and Privacy.
1.2.1.3 Students carry out research on controversial contents and control.
1.2.1.4 Students discuss computer crime and Security threats.
1.2.1.5 Students carry out research on Cyber Law and its importance.
Form 4 Yearly Plan For ICT 2014
3/2-7/2 non-ethical hacking (crackers)o Natural/environmental: e.g. fire
and natural disasterso Theft : e.g. physical, data,
information1.2.8 Cyber-law
WEEK7
10/2-14/2
1.3 Computer Security
(4 periods)
1.3.1 Define Computer Security
1.3.2 State Security measures:o data backupo cryptography
1.3.3 encryption and decryptiono antiviruso anti-spywareo Firewallo Human aspects : awareness
(policy, training)
1.3.1.1 Students discuss the meaning of Computer Security and its measures.
1.3.1.2. Students describe encryption and decryption.
1.3.1.2 Students carry out research on topics:- antivirus- antti-spyware- Firewall- Policy and training of
computer security
WEEK8
17/2-21/2
WEEK9
24/2-28/2
1.4 Research
(8 periods)
1.4.1 Impact of IT on society,
1.4.2 Copyright and Piracy from the moral and legal standpoint
1.4.3 Lack of security and its effects in industry/economy/ government.
1.4.4 Malaysian Cyber-law, electronic government law
1.4.1.1 Learners discuss the meaning of Copyright and Piracy.
1.4.1.2 Learners list down the impact of piracy activities from the perspectives of:- moral- legal
MARCHWEEK
103/3-7//3
1110/3-14/3
ICT ASSESSMENT (PBS)
UJIAN BULANAN 1
2.0 COMPUTER SYSTEMMONTH/WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
WEEK12
17/3-21/3
2.1 System Concept
(6 periods)
Learners should be able to:
2.1.1 Overview of computer system
2.1.2 Data Representation:o bito byteo character
2.1.3 Introduction to Binary coding: ASCII
2.1.4 Data measurement:o bito byteo Kilobyte (KB)o Megabyte (MB)o Gigabyte (GB)o Terabyte (TB)
2.1.5 Clock speed measurement:o megahertz (MHz)o gigahertz (GHz)
22/3-30/3 CUTI PERTENGAHAN PENGGAL 1
Form 4 Yearly Plan For ICT 2014
APRILWEEK
13,14,15
31/3-18/4
2.2 Hardware
(12 periods)
2.2.1 Input devices
2.2.2 Output devices
2.2.3 Motherboard:o central processing unit (CPU)o expansion sloto expansion cardo RAM sloto ports and connectors
2.2.4 Storage :o primary storage (RAM/ROM)o secondary storage (magnetic
medium, optical medium, flash memory card)
MAYWEEK16,17
21/4-2/5
HARI PEKERJA
WEEK18
5/5-9/5
2.3 Software(12 periods)
2.3.1 Operating System:o platformso functionso interfaces
2.3.2 Application Software: types and usage (word processing, spreadsheet, presentation, graphics)
2.3.3 Utility Program: types and usage (file management, antivirus, diagnostic, file compression)
2.3.4 Proprietary and open source software
JUNEWEEK19,20
12/5-23/6HARI
WESAK
ULANGKAJI
PEPERIKSAAN PERTENGAHAN TAHUN
28/5-13/6 CUTI PERTENGAHAN TAHUN( 28 MAY --- 13 JUNE)
JULYWEEK21-24
16/6-11/7
HARI KEPUTERAAN
AGONG
2.4 Installation
(6 periods)
2.4.1 PC assembling
2.4.2 Hard disk partitioning and formatting
2.4.3 Software installation:o operating systemo application softwareo utility program
WEEK25
14/7-18/7
NUZUL QURAN
2.5 Current and Future Technologies (4 periods)
2.5.1 Latest open source software available
2621/7-25/7
(HARI RAYAPUASA)
UJIAN BULANAN 2
3.0 COMPUTER NETWORKS AND COMMUNICATIONS
MONTH/WEEK
TOPICS AND SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
AUGUSTWEEK
284/8-8/8
3.1 Basic Concepts of Networks and
Learners should be able to:3.1.1 Define network3.1.2 Define communication
Notes:Network: To connect two or more computers together with the ability to communicate with each otherCommunication: The transmission of
Form 4 Yearly Plan For ICT 2014
WEEK29
11/8-15/8
WEEK30
18/8-22/8
Communications
(6 periods)
3.1.3 State the importance of network and communication using examples in the student’s immediate environment.
3.1.4 Define types of computer networks Local Area Network (LAN) MAN (Metropolitan Area
Network) WAN (Wide Area Network)
3.1.5 Differentiate between the three types of computer networks
3.1.6 Define 2 types of network architecture Client/Server Peer-to-Peer
3.1.7 State three types of network topology Bus Ring Star
3.1.8 Differentiate between the three types of network topology
3.1.9 Define TCP/IP as the protocol to facilitate communication over computer network
3.1.10 State types of network communication that use TCP/IP Intranet Internet Extranet
3.1.11 Cooperation in conducting group research
data from one device to anotherDiscuss: - file sharing between computers - sending short messages using cellular servicesConduct group research from Information sources (library, the Internet) examples:
Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0)http://www.webopedia.comNotes:LAN: A network that spans a small area usually confined to a single building or a group of buildings
MAN: A network designed for town and city usually larger than Local-Area Network
WAN: A network that spans a relatively large geographical area usually consisting two or more Local-Area Network.Example: The InternetGroup activity:Students list out the differences between the three types of computer networkConduct group research from information sources (library, the Internet) on types of network architectureNotes:Client/Server Architecture: A network architecture in which each computer or process on the network is either a client or a server
Peer-to-Peer Architecture: A type of network in which each workstation has equivalent capabilities and responsibilities
Conduct group research from information sources (library, the Internet) on types of network topologyStudents draw simple diagram of the 3 types of network topology
Students list out the differences between the three types of network topology
Conduct group research from information sources (library, the Internet) on TCP/IP
Conduct group research from information sources (library, the Internet) examples:Discovering Computers, Shelly Cashman Series (ISBN 0-619-25525-0)http://www.webopedia.com
WEEK31
25/8-29/8
HARI KEBANGSAA
N
3.2 Hardware Requirements(8 periods )
3.2.1 Identify various types of physical transmission media/ cables such as Unshielded Twisted Pair(UTP), Shielded Twisted Pair(STP), Coaxial Cable and Fiber Optic Cable
3.2.2 Identify various types of wireless transmission media such as infrared, radio wave and satellite
Students list down various types of cablesStudents list down various types of wireless transmission media
Form 4 Yearly Plan For ICT 2014
SEPTWEEK
322/9-5/9
-ICT ASSESSMENT 2 (PORTFOLIOS)
WEEK33
8/9-12/9
3.3 Software Require-ments
(4 periods )
3.3.1 Define Network Operating System
3.3.2 Name various Network Operating System Software
3.3.3 State the functions of various client software
web browser email client
network utilities network file manager
Notes:Network Operating System (NOS): An operating system that includes functions for connecting computers and devices into a local-area network (LAN). It has the capabilities to coordinate the activities of multiple computers across a networkNotes:Examples: Windows 2000 Server, Windows NT, LINUX, UNIXNotes:Examples:
Web Browsing: Internet Explorer, Mozilla Firefox and Opera
Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora
Network Utilities: Ping and Traceroute
Network File Manager: Network Neighborhood and My Network Places
13/9-21/9HARI
MALAYSIA
CUTI PERTENGAHAN PENGGAL 2 (13 SEPT – 21 SEPT)
WEEK34
22/9-26/9
OCTWEEK
3529/9-3/10
3.4 Setting Network Facilities
(12 periods )
3.4.1 Install network interface card3.4.2 Setup the driver for the
network card3.4.3 Crimp and test UTP cable
Straight cable Crossed cable
3.4.4 Configure the workstation to join a Local-Area Network Internet Protocol (IP)
Address Subnet Mask Gateway Hostname
3.4.5 Test the network connection
3.4.6 Create a shared folder
Activity:Ping the server from the configured workstationActivity:Set up a shared folder Save a file in the shared folderAccess the file in the shared folder from other workstations
WEEK35
29/9-3/10
3.5 Current and Future Develop-ment
( 6 periods )
3.5.1 Describe: Mobile Computing
(specifications, services, frequencies), or
Internet Technology and Services (VOIP, BLOG), or
Types of network (PAN, VPN, WLAN, WIMAX)
Activity:
Research on the chosen topicWrite a short report (350 words) and save the document in the shared folder
WEEK36,37
7/10-24/10
HARI RAYA QURBAN
DEEPAVALI
ULANGKAJI
PEPERIKSAAN AKHIR TAHUN
AWAL MUHARAM
NOVWEEK38-41
27/10-21/11
- ICT ASSESSMENT 3 (PORTFOLIOS)- REINFORCEMENT OF FORM FOUR SYLLABUS- OVERVIEW OF FORM FIVE SYLLABUS- RECAPUTILATION
WEEK42
22/11-4/1CUTI AKHIR TAHUN (22 NOV – 4 JAN 2015)