Suche senden
Hochladen
Synopsis
•
0 gefällt mir
•
1,507 views
Kak Yong
Folgen
Bildung
Melden
Teilen
Melden
Teilen
1 von 6
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Ict topic 3
Ict topic 3
kwongliik
Notacd02
Notacd02
Azmiah Mahmud
Notacd05
Notacd05
Azmiah Mahmud
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
Distributed systems
Distributed systems
sree kanth
Notacd051
Notacd051
cikgushaharizan
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
Kak Yong
Module1 introduction to network
Module1 introduction to network
Miz Malinz
Empfohlen
Ict topic 3
Ict topic 3
kwongliik
Notacd02
Notacd02
Azmiah Mahmud
Notacd05
Notacd05
Azmiah Mahmud
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
Distributed systems
Distributed systems
sree kanth
Notacd051
Notacd051
cikgushaharizan
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
Kak Yong
Module1 introduction to network
Module1 introduction to network
Miz Malinz
Networking technology
Networking technology
SmritiGurung4
Presentation3 network
Presentation3 network
Rana Muzffar
Fcn assignment ( second mold )
Fcn assignment ( second mold )
Al-Madinah International University (MEDIU)
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4
cikgushaharizan
Cybercrimes
Cybercrimes
Elanthendral Mariappan
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
How our network_works
How our network_works
Robin Nappi
2 1 lan
2 1 lan
Danielle Douglas
What is a network
What is a network
Rowan Nave
Chapter 8
Chapter 8
uabir
Information communication technology (ict)
Information communication technology (ict)
NILISSL
3.1 Network Basic
3.1 Network Basic
Fizaril Amzari Omar
Lesson 25
Lesson 25
Tracie King
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
IJECEIAES
Computer Network ASsignment
Computer Network ASsignment
Bijay Bista
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
mhuntsman0002
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Mehar Arslan
Internet2
Internet2
sunsonbaba
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
vivatechijri
Punit kumar
Punit kumar
Punit Kumar
ITED.docx
ITED.docx
MariaAdalinaBejarinC
The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to Students
Mhister Laagan
Weitere ähnliche Inhalte
Was ist angesagt?
Networking technology
Networking technology
SmritiGurung4
Presentation3 network
Presentation3 network
Rana Muzffar
Fcn assignment ( second mold )
Fcn assignment ( second mold )
Al-Madinah International University (MEDIU)
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4
cikgushaharizan
Cybercrimes
Cybercrimes
Elanthendral Mariappan
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
How our network_works
How our network_works
Robin Nappi
2 1 lan
2 1 lan
Danielle Douglas
What is a network
What is a network
Rowan Nave
Chapter 8
Chapter 8
uabir
Information communication technology (ict)
Information communication technology (ict)
NILISSL
3.1 Network Basic
3.1 Network Basic
Fizaril Amzari Omar
Lesson 25
Lesson 25
Tracie King
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
IJECEIAES
Computer Network ASsignment
Computer Network ASsignment
Bijay Bista
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
mhuntsman0002
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Mehar Arslan
Internet2
Internet2
sunsonbaba
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
vivatechijri
Punit kumar
Punit kumar
Punit Kumar
Was ist angesagt?
(20)
Networking technology
Networking technology
Presentation3 network
Presentation3 network
Fcn assignment ( second mold )
Fcn assignment ( second mold )
Cd ict-worksheet-la3-form-4
Cd ict-worksheet-la3-form-4
Cybercrimes
Cybercrimes
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
How our network_works
How our network_works
2 1 lan
2 1 lan
What is a network
What is a network
Chapter 8
Chapter 8
Information communication technology (ict)
Information communication technology (ict)
3.1 Network Basic
3.1 Network Basic
Lesson 25
Lesson 25
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
Computer Network ASsignment
Computer Network ASsignment
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Internet2
Internet2
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
Punit kumar
Punit kumar
Ähnlich wie Synopsis
ITED.docx
ITED.docx
MariaAdalinaBejarinC
The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to Students
Mhister Laagan
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
RowellRizalte
ICT in the Context of global communication
ICT in the Context of global communication
KAYJOANNELIWANAGAN
Ijcatr04061002
Ijcatr04061002
Editor IJCATR
Advantage and Disadvantage of ICT in Education
Advantage and Disadvantage of ICT in Education
Multan Post Graduate College, Multan
Essays On Information Technology
Essays On Information Technology
Paper Writing Service Reviews
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
NonSy1
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
UNED
ET.pptx
ET.pptx
Sasi Kumar
K017157582
K017157582
IOSR Journals
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
IOSR Journals
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
IOSR Journals
Information Technology For Educational Development
Information Technology For Educational Development
Theresa Singh
Cp in4 n6
Cp in4 n6
nathihlongwane
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
Jude Rainer
ICT and its understanding.pdf
ICT and its understanding.pdf
Pratibha Sagar
Assignment
Assignment
Deepthi Muraleedas
Educational technology
Educational technology
alagappa university, Karaikudi
Ähnlich wie Synopsis
(20)
ITED.docx
ITED.docx
The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to Students
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
ICT in the Context of global communication
ICT in the Context of global communication
Ijcatr04061002
Ijcatr04061002
Advantage and Disadvantage of ICT in Education
Advantage and Disadvantage of ICT in Education
Essays On Information Technology
Essays On Information Technology
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
ET.pptx
ET.pptx
K017157582
K017157582
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
Information Technology For Educational Development
Information Technology For Educational Development
Cp in4 n6
Cp in4 n6
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
ICT and its understanding.pdf
ICT and its understanding.pdf
Assignment
Assignment
Educational technology
Educational technology
Mehr von Kak Yong
Multimedia immersif
Multimedia immersif
Kak Yong
Module programming
Module programming
Kak Yong
Module info systems
Module info systems
Kak Yong
Module ict society
Module ict society
Kak Yong
Module computer systems
Module computer systems
Kak Yong
Module networks
Module networks
Kak Yong
La5 ict-topic-5-programming
La5 ict-topic-5-programming
Kak Yong
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
Kak Yong
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
Kak Yong
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
Kak Yong
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
Kak Yong
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
Kak Yong
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
Kak Yong
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
Kak Yong
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
Kak Yong
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
Kak Yong
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
Kak Yong
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
Kak Yong
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Kak Yong
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Kak Yong
Mehr von Kak Yong
(20)
Multimedia immersif
Multimedia immersif
Module programming
Module programming
Module info systems
Module info systems
Module ict society
Module ict society
Module computer systems
Module computer systems
Module networks
Module networks
La5 ict-topic-5-programming
La5 ict-topic-5-programming
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Kürzlich hochgeladen
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
TechSoup
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
FatimaKhan178732
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Thiyagu K
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Sapna Thakur
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
dawncurless
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
JemimahLaneBuaron
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Pooja Nehwal
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
RAM LAL ANAND COLLEGE, DELHI UNIVERSITY.
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
anjaliyadav012327
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
iammrhaywood
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
Kürzlich hochgeladen
(20)
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Synopsis
1.
Lesson 1 Lesson 1 defines information and communication technology. It also introduces the technologies used in communicating and dispersing information. These technologies include the satellite, the World Wide Web (www), the telephone, the television, the radio, and so on. Communication technology is important to aid communication and to spread information. Lesson 2 Lesson 2 reveals the history of computer evolution from the early years to the current generation. Many technology devices were invented to aid communication throughout these generations. These inventions include the Chinese abacus, Napier’s bones, the Pascaline, Leibniz Rechner, the weaving loom, the calculator and the computer. Lesson 3 Lesson 3 describes the usage of ICT in different sectors such as in education, banking, industry, and ecommerce. ICT facilitates these sectors in their operations such as to support in enhanced learning, to assist in the production planning and control system, and to help in product design. Lesson 4 Lesson 4 states the differences between computerised and noncomputerised system. This lesson provides comparisons on how tasks are done before and after the existence of the computerised system. The computerised system assists people in making their works easier and faster. Lesson 5 Lesson 5 discusses the impact of ICT on society in terms of speed, cost, reliable modes of communication, effective ways of communication, paperless environment, and borderless communication. Lesson 6 Lesson 6 defines computer ethics and describes the code of conducts or moral standards that are used by the computer users. These codes of conducts are considered the effective code of conducts for the proper use of information technology.
1
2.
Lesson 7 Lesson 7 defines computer law. This lesson also clarifies the differences between computer ethics and law. Computer ethics and law is needed for people to respect ownership, privacy, confidentiality, and property. Lesson 8 Lesson 8 explains the need for intellectual property law to safeguard the works created by inventors, authors, and artists that are unique and have value in the marketplace. These works can be protected through patents, trademarks, designs and copyright laws. Lesson 9 Lesson 9 explains
the concept of data privacy in computer usage and list of ways to protect privacy in computing. Computer technology can threaten data privacy through cookies, electronic profile, spyware, spam, and others. Data privacy can be protected by privacy law and utilities software such as the antispam, firewall, antispyware, and antivirus. Lesson 10 Lesson 10 defines authentication as a process where users verify that they are who they say they are. There are two authentication methods, which are biometric device and callback system. These methods can protect data against unauthorised access and use. Lesson 11 Lesson 11 defines verification as the act of proving or disproving the correctness of a system with respect to a certain formal specification. There are two methods used to verify users, which are user identification and possessed object. These methods can verify users in terms of who they are and what they have via identification card, security token, key, badge, and others. Lesson 12 Lesson 12 defines controversial content as information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the content. Examples of controversial contents are pornography and slander. 2
3.
Lesson 13 Lesson 13 describes the process of Internet filtering that prevents access to certain materials on the Internet. Filtering is used to prevent children from accessing inappropriate material and to keep employees productive on the Internet. The methods used to filter content are keyword blocking, site blocking, and Web rating systems. Lesson 14 Lesson 14 defines cyber law as any laws protecting the Internet and other online communication technologies and users. Cyber law is needed to protect the issues on online activities such as on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and others. Lesson 15 Lesson 15 describes computer crimes as any criminal activity that is related to the use of computers as the fundamental tool. These activities include fraud, copyright infringement, theft, and computer attack. Lesson 16 Lesson 16 defines computer security as protecting the computer systems and the information they contain against unwanted access, damage, destruction or modification. There are three types of computer security, which are hardware security, software security or data security, and network security. Lesson 17 Lesson 17 states that computer threats can come from many ways either from human or natural causes. Security threats can cause damage and undesired effect to the computer hardware and software. The examples of security threats include malicious code, hacking, natural environment, and theft. Lesson 18 Lesson 18 identifies six types of security measures that can be used to protect computers and data from loss, damage, and misuse. These security measures include data backup, cryptography, antivirus, antispyware, firewall, and human aspects.
3
4.
Lesson 19 Lesson 19 suggests the appropriate security measures to use in order to overcome the identified computer threats. People can select the suitable security measures such as data backup, cryptography, or antivirus to protect their computer and data from the computer threats like malicious code, hacking, natural environment, and theft. Lesson 20 Lesson 20 provides security procedures to be used in protecting data in the computer. Data may get lost or corrupted due to virus attack or mishaps like fire, flood, lightning, machine failures and even human errors. These procedures include making backup files, detecting virus, cleaning the computer, and warn others of possible virus attacks. Lesson 21 Lesson 21 discusses the various computer applications in society. Computer applications are used for many reasons such as to enhance the learning process, to help in business activities, to assist in graphics and multimedia projects, and to facilitate communication. These applications include integrated software, personal finance, legal, word processing, spreadsheet, and database. Lesson 22 Lesson 22 describes the various types of computer users in the society. They are from different backgrounds and are divided into five categories which are home users, small office or home office (SOHO) users, mobile users, power users, and large business users. Lesson 23 Lesson 23 states the basic steps of conducting a study. These basic steps, arranged in sequence are:
· Get an overview of the topic to be studied. · Narrow down the topic and form some specific questions related to it. · Find study materials related to the topic. · Evaluate the study materials. · Write out the study paper and mention the sources. 4
5.
Lesson 24 Lesson 24 presents the necessary steps in presenting a study. A presentation must clearly state the purpose of the study paper. A good presentation should contain three welldefined sections, which are the introduction, the content, and the conclusion. Lesson 25 Lesson 25 defines delegation as the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. Delegation is important in order to save time, to negotiate, to utilise team members’ expertise, and to complete the tasks. Lesson 26 Lesson 26 explains how a study group should be done. The students have to work together to organise a study portfolio and do a presentation in class. Lesson 27 Lesson 27 defines a computer system as a combination of components designed to process data and store files. A computer system consists of four major hardware components; input devices, output devices, processor, and storage devices. A computer system requires hardware, software, and a user to fully function. Lesson 28 Lesson 28 describes and explores the four major hardware components of a computer system; input devices, output devices, processor, and storage devices. An input device feeds raw data to the processor. A processor processes raw data and turns it into useful information. A storage device keeps or stores both the processed and unprocessed data for later use. An output device shows or displays the processed data. Lesson 29 Lesson 29 explains the function of the Central Processing Unit (CPU). All processing activities are done in the CPU. The CPU utilises the computer memory to execute instructions from the application software and accomplish a task.
5
6.
Lesson 30 Lesson 30 explains data representation. Data is represented by two digits, 0 and 1. Both 0 and 1 are called ‘bit’ in the binary system. Combinations of 0s and 1s represent larger numbers. All digital data uses the binary system to process information. This information includes letters, digits or special characters. Lesson 31 Lesson 31 explains the history of character codes. Character codes are the basis for processing textual data. With the advancement of technology, ASCII codes were created. ASCII is a standard of 7bit code used to represent characters, which include letters, numbers, and punctuation marks. Lesson 32 Lesson 32 explains the units of data measurement such as kilobyte (KB), megabyte (MB), gigabyte (GB), and terabyte (TB). Lesson 33 Lesson 33 explains the units of clock speed measurement. The system clock controls the speed of all the operations within a computer. The speed of the clock is measured by how many cycles per second the clock makes. The faster the clock, the more instructions the CPU can process per second.
6
Jetzt herunterladen