teacher's guide

14
DRAFT INFORMATION AND COMMUNICATION TECHNOLOGY TEACHER’S NOTE PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA ARAS 4-8, BLOK E9, PUTRAJAYA 2006

Upload: sparklytech

Post on 28-Nov-2014

751 views

Category:

Technology


7 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Teacher's guide

DRAFT

INFORMATION AND COMMUNICATION TECHNOLOGY

TEACHER’S NOTE

PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA

ARAS 4-8, BLOK E9, PUTRAJAYA

2006

Page 2: Teacher's guide

DRAFT

This document comes together with the Learning Module for students. You are advised to read this document before getting the students to start with the Learning Module. In carrying out activities for topic 2.4 Installation Computer System and 3.4 Setting Network Facilities, DO NOT use the computers in the computer lab. You are advised to have a different set of computers for these activities. You have to ensure that all the computer components, parts and hardware are available for the students to carry out the activities found in the module.

2

Page 3: Teacher's guide

DRAFT

References:

Books 1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information

Age. Complete. Eight Edition. 2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering

Computers 2005 : A Gateway to Information, Course Technology. 3. Stallings W. (2003) Cryptography and Network Security: Principles and

Practices. Third Edition. 4. Irv Englander (2000) The Architecture of Computer Hardware and

Systems Software, An Information Technology Approach: Second Edition. 5. Tamara Dean (2000), “Network + Guide to Networks”, Thomson Course

Technology Websites addresses ICT and Society 1. Ad-Aware SE Personal ~ http://www.lavasoft.com 2. Antivirus ~ http://www.primode.com/glossary.html 3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com 5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/ 7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm

Computer System 1. http://www.scsite.com2. http://webopedia.com/3. http://www.microsoft.com/assemble4. http://www.microsoft.com/biossetup5. http://www.grisoft.com 6. http://www.pcguide.com

Computer Networks and Communications 1. http://www.lanshack.com 2. http://www.homenethelp.com 3. http://www.crossover.asp 4. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin

g.mspx

3

Page 4: Teacher's guide

DRAFT

INFORMATION AND COMMUNICATION TECHNOLOGY

AND SOCIETY

1.3 COMPUTER SECURITY

4

Page 5: Teacher's guide

DRAFT

Topic: 1.3 COMPUTER SECURITY 1.3.3 Security measures At the end of the lesson, students should be able to:

1.3.3.3 Apply the correct security procedures.

A. Antivirus B. Anti-Spyware C. Cryptography D. Firewall E. Data backup F. Human aspects

Individual / group activities Before using this module teacher has to ensure the following: A. Antivirus

i. An Antivirus Software must be preinstalled in students’ personal computer. Example: AVG Free Edition software

ii. Test file for virus check must be copied on the desktop of students’ personal computer. Example: eicar.com

iii. AVG Free Edition and Eicar.com is included in Teaching guide CD. B. Anti-spyware

i. Anti-spyware software must be preinstalled in students’ personal computer.

ii. Ad -Aware SE Personal software is included in Teaching guide CD.

Note on spyware:

Spyware and adware

Some vendors or employers use spyware to collect information about program usage or employees. Internet advertising firms often collect information about users’ Web browsing habits by hiding spyware in adware. Adware is a program that dispkays an online advertisement in a

5

Page 6: Teacher's guide

DRAFT

banner or pop-up windows on Web pages, email, or othe Internet services.

How to protect your computer from spyware? The best defence against spyware and other unwanted technologies is to prevent them from getting into your computer in the first place. Here are some steps you can take to stay safe while using the Internet and software programs.

- Keep security on your computer up to date o Update security patches o Security and privacy settings in Internet browsers

- Only download programs from web sites you trust. - Beware of the fine print: Read all security warnings, license

agreements, privacy statements, and “opt-in” notices with any software you download.

- Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,” or “Cancel” to close a window.

- Be extra careful with certain types of “free” programs. - Use available tools to detect and delete spyware.

o Anti-spyware and antivirus software o Personal firewall

C. Cryptography

i. The activity on cryptograph will be on paper not computer. ii. This is a group activity. NOTE on cryptography A process associated with scrambling plaintext (ordinary text, or cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Cryptography concerns itself with four objectives: 1) Confidentiality (the information cannot be understood by anyone for

whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit

between sender and intended receiver without the alteration being detected)

3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information)

4) Authentication (the sender and receiver can confirm each other www.stallion.com/html/support/glossary.html

6

Page 7: Teacher's guide

DRAFT

How to calculate

Encryption algorithm: C = (P + K) mod 26 with K = 3 To encrypt a letter H :

1. Substitute the letter H into number. H = 7

2. Use the algorithm. P = 7, K = 3 C = (P + K) mod 26 = (7 + 3) mod 26 = 10 mod 26 = 10

mod = balance of division

3. Convert the number 10 into letter. 10 = K

Decryption algorithm: P = (C – K) mod 26 with K = 3

To decrypt the letter K: 1. Substitute the letter K into number.

K = 10 2. Use the algorithm. C = 10, K = 3

P = (C – K) mod 26 = (10 – 3) mod 26 = 7 mod 26

= 7

3. Convert the number 10 into letter.

7 = H

7

Page 8: Teacher's guide

DRAFT

D. Firewall

i. Ensure the windows firewall is disabled in students’ computer before they start the module.

ii. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewall is turned on by default. (However, some computer manufacturers and network administrators might turn it off.)

iii. You do not have to use Windows Firewall —you can install and run any firewall that you choose. Evaluate the features of other firewalls and then decide which firewall best meets your needs. If you choose to install and run another firewall, turn off Windows Firewall.

iv. As enrichment, you can ask the students to disable the firewall and surf the Internet. Then, try surfing the Internet again but this time with the firewall enabled. Ask students to observe any differences? Normally the firewall will block the download and upload files activities if you are using instant messaging like Yahoo messenger.

E. Data backup

i. Provide students with a blank diskette or a floppy disk. ii. Make sure My document folder is on the desktop. iii. Save a file or document in My Documents folder.

F. Human Aspect Note on security risk generally done by human. Computers are exposed to several types of security risks .

Security Risks Descriptions Unauthorized access and use

• Unauthorized access - the use of a computer or network without permission.

• Unauthorized use – the use of a computer or its data for unapproved or possibly illegal activities.

Hardware Theft and Vandalism

• Hardware theft – the act of stealing computer equipment.

• Hardware vandalism – the act of destroying computer equipment.

Identity Theft When someone steals personal or confidential information.

Software Theft When someone • steals software media • intentionally erases programs • illegally copies a program

8

Page 9: Teacher's guide

DRAFT

How to protect your computer from perpetrators? User may take several measures to help protect computer from perpetrators.

Security Risks Safeguards Unauthorized access and use

• Company should have a written acceptable use policy (AUP) that outlines the computer activities for which computer and network may and may not be used.

• Users should be identified and authenticated. • Users should disable file and printer sharing on your

Internet connection. Hardware Theft and Vandalism

• Users should have common sense and a constant awareness of the risk.

• Organisations should implement physical access control (locked doors, windows and equipment).

• Computers use passwords, possessed objects and biometrics.

Software Theft • Organisations should keep original software boxes and media in a secured location.

• Manufacturers should issue users license agreement to protect from software piracy

Identity Theft • Organisations should implement user identification and authentication controls.

• Oganisations use a variety of encryption techniques to keep data secured and private.

9

Page 10: Teacher's guide

DRAFT

COMPUTER SYSTEM

2.4 Installation

10

Page 11: Teacher's guide

DRAFT

Topic: 2.4 Installation 2.4.1 Personal Computer (PC) Assembling

2.4.2 Hard Disk Partitioning and Formatting

2.4.3 Software Installation

At the end of the lesson, students should be able to:

2.4.3.1 Assemble the parts of a PC correctly 2.4.3.2 Participate in assembling the parts of a PC correctly 2.4.3.3 Display cooperation in assembling the parts of a PC

correctly 2.4.3.4 Format and partition the hard disk 2.4.3.5 Install operating system, applications software and utility

programs ACTIVITIES (Group activity) 1. Ensure all components are available by using the checklist below. Students’

copy is in the module.

2. Do not use the computers in the computer lab. Buy a different set or use

other computers in the school.

3. Teacher has to demonstrate first.

4. It is advisable to wear an anti-static wrist strap that is properly grounded.

5. Encourage students to handle all the components with great care.

11

Page 12: Teacher's guide

DRAFT

Checklist

No. Components Tick (√) if available

1 CPU casing and power supply

2 CPU chip 3 Motherboard 4 Hard disk 5 Floppy disk drive 6 CD Rom drive

7 Cables o IDE cable o floppy cable o audio cable

8

Cards o modem card o display card o sound card o network card

(not needed if all devices are integrated on-board)

9 RAM chips 10 Mouse 11 Speakers 12 Keyboard

12

Page 13: Teacher's guide

DRAFT

COMPUTER NETWORKS AND COMMUNICATIONS

3.4 SETTING NETWORK FACILITIES

MODULE

13

Page 14: Teacher's guide

DRAFT

TOPIC: 3.4 SETTING NETWORK FACILITIES 3.4.1 Installation of Network Interface Cards (NIC) 3.4.2 Cable Crimping and Testing 3.4.3 Configuration and Testing of Network 3.4.4 Share Data

At the end of the lesson, students should be able to:

3.4.1.1 Insert network interface cards (NIC) 3.4.1.2 Install drivers for the NIC 3.4.2.1 Crimp and test UTP cable

• Straight cable • Crossed cable

3.4.2.2 Exercise care and caution when crimping a cable 3.4.3.1 Configure the workstation to join a Local Area Network

• Internet Protocol (IP) Address • Subnet Mask • Server name

3.4.3.2 Test the network connection 3.4.4.1 Create a shared folder

Activities (Group work)

1. Ensure all components are available by using the checklist below.

Students’ copy is in the module.

2. Do not use computers in the computer lab. Buy a different set or

use other computers found in the school.

3. You need to have 3 sets of computers for this activity.

4. Teacher has to demonstrate first.

Checklist

No. Hardware Tick (√) if available

Network Interface Card (NIC) NIC driver Switch / Hub CAT5E cable (UTP cable) RJ45 connectors LAN cable tester Crimp tool Cable stripper Cutter Screwdrivers

14