SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Lesson 1 

Lesson 1 defines information and communication technology. It also introduces the technologies 
used in communicating and dispersing information. These technologies include the satellite, the 
World Wide Web (www), the telephone, the television, the radio, and so on.  Communication 
technology is important to aid communication and to spread information. 


Lesson 2 

Lesson 2 reveals the history of computer evolution from the early years to the current generation. 
Many technology devices were invented to aid communication throughout these generations. 
These inventions include the Chinese abacus, Napier’s bones, the Pascaline, Leibniz Rechner, 
the weaving loom, the calculator and the computer. 


Lesson 3 

Lesson 3 describes the usage of ICT in different sectors such as in education, banking, industry, 
and e­commerce. ICT facilitates these sectors in their operations such as to support in enhanced 
learning, to assist in the production planning and control system, and to help in product design. 


Lesson 4 

Lesson 4 states the differences between computerised and non­computerised system. This 
lesson provides comparisons on how tasks are done before and after the existence of the 
computerised system. The computerised system assists people in making their works easier and 
faster. 


Lesson 5 

Lesson 5 discusses the impact of ICT on society in terms of speed, cost, reliable modes of 
communication, effective ways of communication, paperless environment, and borderless 
communication. 


Lesson 6 

Lesson 6 defines computer ethics and describes the code of conducts or moral standards that are 
used by the computer users. These codes of conducts are considered the effective code of 
conducts for the proper use of information technology.




                                                                                                 1 
Lesson 7 

Lesson 7 defines computer law. This lesson also clarifies the differences between computer 
ethics and law. Computer ethics and law is needed for people to respect ownership, privacy, 
confidentiality, and property. 


Lesson 8 

Lesson 8 explains the need for intellectual property law to safeguard the works created by 
inventors, authors, and artists that are unique and have value in the marketplace. These works 
can be protected through patents, trademarks, designs and copyright laws. 


Lesson 9 

Lesson  9  explains  the  concept  of  data  privacy  in  computer  usage  and  list  of  ways  to  protect 
privacy in computing. Computer technology can threaten data privacy through cookies, electronic 
profile,  spyware,  spam,  and  others.  Data  privacy  can  be  protected  by  privacy  law  and  utilities 
software such as the anti­spam, firewall, anti­spyware, and antivirus. 


Lesson 10 

Lesson 10 defines authentication as a process where users verify that they are who they say they 
are. There are two authentication methods, which are biometric device and callback system. 
These methods can protect data against unauthorised access and use. 


Lesson 11 

Lesson 11 defines verification as the act of proving or disproving the correctness of a system with 
respect to a certain formal specification. There are two methods used to verify users, which are 
user identification and possessed object. These methods can verify users in terms of who they 
are and what they have via identification card, security token, key, badge, and others. 


Lesson 12 

Lesson 12 defines controversial content as information that causes disagreement in opinions and 
may cause the disruption of peace because different people or culture will have different views 
about the content. Examples of controversial contents are pornography and slander.




                                                                                                          2 
Lesson 13 

Lesson 13 describes the process of Internet filtering that prevents access to certain materials on 
the Internet. Filtering is used to prevent children from accessing inappropriate material and to 
keep employees productive on the Internet. The methods used to filter content are keyword 
blocking, site blocking, and Web rating systems. 


Lesson 14 

Lesson 14 defines cyber law as any laws protecting the Internet and other online communication 
technologies and users. Cyber law is needed to protect the issues on online activities such as on 
the integrity and security of information, legal status of online transactions, privacy and 
confidentiality of information, intellectual property rights and others. 


Lesson 15 

Lesson 15 describes computer crimes as any criminal activity that is related to the use of 
computers as the fundamental tool. These activities include fraud, copyright infringement, theft, 
and computer attack. 


Lesson 16 

Lesson 16 defines computer security as protecting the computer systems and the information 
they contain against unwanted access, damage, destruction or modification. There are three 
types of computer security, which are hardware security, software security or data security, and 
network security. 


Lesson 17 

Lesson 17 states that computer threats can come from many ways either from human or natural 
causes. Security threats can cause damage and undesired effect to the computer hardware and 
software. The examples of security threats include malicious code, hacking, natural environment, 
and theft. 


Lesson 18 

Lesson 18 identifies six types of security measures that can be used to protect computers and 
data from loss, damage, and misuse. These security measures include data backup, 
cryptography, antivirus, anti­spyware, firewall, and human aspects.




                                                                                                     3 
Lesson 19 

Lesson 19 suggests the appropriate security measures to use in order to overcome the identified 
computer threats. People can select the suitable security measures such as data backup, 
cryptography, or antivirus to protect their computer and data from the computer threats like 
malicious code, hacking, natural environment, and theft. 


Lesson 20 

Lesson 20 provides security procedures to be used in protecting data in the computer. Data may 
get lost or corrupted due to virus attack or mishaps like fire, flood, lightning, machine failures and 
even human errors. These procedures include making back­up files, detecting virus, cleaning the 
computer, and warn others of possible virus attacks. 


Lesson 21 

Lesson 21 discusses the various computer applications in society. Computer applications are 
used for many reasons such as to enhance the learning process, to help in business activities, to 
assist in graphics and multimedia projects, and to facilitate communication. These applications 
include integrated software, personal finance, legal, word processing, spreadsheet, and 
database. 


Lesson 22 

Lesson 22 describes the various types of computer users in the society. They are from different 
backgrounds and are divided into five categories which are home users, small office or home 
office (SOHO) users, mobile users, power users, and large business users. 


Lesson 23 

Lesson 23 states the basic steps of conducting a study. These basic steps, arranged in sequence 
are:

        ·    Get an overview of the topic to be studied.
        ·    Narrow down the topic and form some specific questions related to it.
        ·    Find study materials related to the topic.
        ·    Evaluate the study materials.
        ·    Write out the study paper and mention the sources.




                                                                                                     4 
Lesson 24 

Lesson 24 presents the necessary steps in presenting a study. A presentation must clearly state 
the purpose of the study paper. A good presentation should contain three well­defined sections, 
which are the introduction, the content, and the conclusion. 


Lesson 25 

Lesson 25 defines delegation as the ability to assign tasks to others with the authority, 
responsibility and accountability to finish the tasks. Delegation is important in order to save time, 
to negotiate, to utilise team members’ expertise, and to complete the tasks. 


Lesson 26 

Lesson 26 explains how a study group should be done. The students have to work together to 
organise a study portfolio and do a presentation in class. 


Lesson 27 

Lesson 27 defines a computer system as a combination of components designed to process data 
and store files. A computer system consists of four major hardware components; input devices, 
output devices, processor, and storage devices. A computer system requires hardware, software, 
and a user to fully function. 


Lesson 28 

Lesson 28 describes and explores the four major hardware components of a computer system; 
input devices, output devices, processor, and storage devices. An input device feeds raw data to 
the processor. A processor processes raw data and turns it into useful information. A storage 
device keeps or stores both the processed and unprocessed data for later use. An output device 
shows or displays the processed data. 


Lesson 29 

Lesson 29 explains the function of the Central Processing Unit (CPU). All processing activities 
are done in the CPU. The CPU utilises the computer memory to execute instructions from the 
application software and accomplish a task.




                                                                                                     5 
Lesson 30 

Lesson 30 explains data representation. Data is represented by two digits, 0 and 1. Both 0 and 1 
are called ‘bit’ in the binary system. Combinations of 0s and 1s represent larger numbers. All 
digital data uses the binary system to process information. This information includes letters, digits 
or special characters. 


Lesson 31 

Lesson 31 explains the history of character codes. Character codes are the basis for processing 
textual data. With the advancement of technology, ASCII codes were created. ASCII is a 
standard of 7­bit code used to represent characters, which include letters, numbers, and 
punctuation marks. 


Lesson 32 

Lesson 32 explains the units of data measurement such as kilobyte (KB), megabyte (MB), 
gigabyte (GB), and terabyte (TB). 


Lesson 33 

Lesson 33 explains the units of clock speed measurement. The system clock controls the speed 
of all the operations within a computer. The speed of the clock is measured by how many cycles 
per second the clock makes. The faster the clock, the more instructions the CPU can process per 
second.




                                                                                                    6 

Weitere ähnliche Inhalte

Was ist angesagt?

Networking technology
Networking technologyNetworking technology
Networking technologySmritiGurung4
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4cikgushaharizan
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...pharmaindexing
 
How our network_works
How our network_worksHow our network_works
How our network_worksRobin Nappi
 
What is a network
What is a networkWhat is a network
What is a networkRowan Nave
 
Chapter 8
Chapter 8Chapter 8
Chapter 8uabir
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...IJECEIAES
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]mhuntsman0002
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
 

Was ist angesagt? (20)

Networking technology
Networking technologyNetworking technology
Networking technology
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
Fcn assignment ( second mold )
Fcn assignment ( second mold )Fcn assignment ( second mold )
Fcn assignment ( second mold )
 
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
 
How our network_works
How our network_worksHow our network_works
How our network_works
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
What is a network
What is a networkWhat is a network
What is a network
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
Internet2
Internet2Internet2
Internet2
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 

Ähnlich wie Synopsis

The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to StudentsThe Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to StudentsMhister Laagan
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxRowellRizalte
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communicationKAYJOANNELIWANAGAN
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxNonSy1
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsWidget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsUNED
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemIOSR Journals
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemIOSR Journals
 
Information Technology For Educational Development
Information Technology For Educational DevelopmentInformation Technology For Educational Development
Information Technology For Educational DevelopmentTheresa Singh
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolJude Rainer
 
ICT and its understanding.pdf
ICT and its understanding.pdfICT and its understanding.pdf
ICT and its understanding.pdfPratibha Sagar
 

Ähnlich wie Synopsis (20)

ITED.docx
ITED.docxITED.docx
ITED.docx
 
The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to StudentsThe Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to Students
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
 
ICT in the Context of global communication
ICT in the  Context of global communicationICT in the  Context of global communication
ICT in the Context of global communication
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
Advantage and Disadvantage of ICT in Education
Advantage and Disadvantage of ICT in EducationAdvantage and Disadvantage of ICT in Education
Advantage and Disadvantage of ICT in Education
 
Essays On Information Technology
Essays On Information TechnologyEssays On Information Technology
Essays On Information Technology
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsWidget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
 
ET.pptx
ET.pptxET.pptx
ET.pptx
 
K017157582
K017157582K017157582
K017157582
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
 
Information Technology For Educational Development
Information Technology For Educational DevelopmentInformation Technology For Educational Development
Information Technology For Educational Development
 
Cp in4 n6
Cp in4   n6Cp in4   n6
Cp in4 n6
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 
ICT and its understanding.pdf
ICT and its understanding.pdfICT and its understanding.pdf
ICT and its understanding.pdf
 
Assignment
AssignmentAssignment
Assignment
 
Educational technology
Educational technologyEducational technology
Educational technology
 

Mehr von Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Kak Yong
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Kak Yong
 

Mehr von Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
 

Kürzlich hochgeladen

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Synopsis