Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1of 5

YEARLY TEACHING PLAN 2008

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)


FORM 4
SMK TASEK UTARA, JOHOR BAHRU

NO MONTH WEEK DATES TOPICS / SKILLS SUGGESTED ACTIVITIES


1
1 03/01 – 04/01 ORIENTATION FORM 4

LEARNING AREA 1 1.         Students state the definition of Information Technology in general.
INFORMATION & COMMUNICATION TECHNOLOGY & SOCIETY 2.         Group Activity:
1.1 Introduction to Information and Communication Technology -          Discussing the roles of IT in everyday life.
2 07/01 – 11/01
•           Overview of ICT -          Students cite an example of a technology used in every day life.
•           ICT in everyday life 3.         Students adhere the rules and regulations set for the ICT lab.

1.2    Computer Ethics and Legal Issues 1.2.1.1        Students explain Computer Ethics and Code of Ethics.
•           Definition:
JANUARY

1.2.1.2        Students describe Intellectual Property and Privacy.


o          Computer Ethics 1.2.1.3        Students carry out research on controversial contents and control.
3 14/01 – 18/01 o          Code of Ethics 1.2.1.4        Students discuss computer crime and Security threats.
o          Intellectual Property Students carry out research on Cyber Law and its importance.
•           Privacy:
o          Authorised access: user authentication & verification
1.2    Computer Ethics and Legal Issues
•           Controversial Contents and Control:
Content examples:
4 21/01 – 25/01 o          Pornography
o          Slander
Control example:
o          filtering
2 1.2    Computer Ethics and Legal Issues
•           Computer Crimes:
o          Definition: Computer crime & cyber law
Examples of computer crimes:
5 28/01 – 01/02 o          Fraud
o          Copyright Infringement
o          Theft
o          Attacks

1.3    Computer Security 1.3.1.1        Students discuss the meaning of Computer Security and its measures.
•           Definition: Computer Security 1.3.1.2.         Students describe encryption and decryption.
•           Security threats:
BRUARY

Examples of security threats:


6 04/02 – 08/02
o          Malicious codes
FEBRU
o          Hacking
o          Natural/Environment
o          Theft
1.3 Computer Security 1.3.1.2        Students carry out research on topics:
•           Security Measures: -          antivirus
o          Data backup -          antti-spyware
o          Cryptography: encryption an decryption -          Firewall
7 11/02 – 15/02
o          Antivirus Policy and training of computer security
o          Anti-spyware
o          Firewall
o          Human aspects : awareness
1.4.1.1        Learners discuss the meaning of Copyright and Piracy.
8 18/02 – 22/02 1.4    Current and Future Development 1.4.1.2        Learners list down the impact of piracy activities from the perspectives of:
•           Impact of ICT on society -          moral
3 LEARNING AREA 2 -          legal
COMPUTER SYSTEM
2.1 System Concept
9 25/02 – 01/03
• Overview of computer system
• Data Representation

2.1 System Concept


• Introduction to Binary coding: ASCII
10 03/03 – 07/03 • Data measurement
• Clock speed measurement
MARCH

11 10/03 - 14/03 CUTI PERTENGAHAN PENGGAL 1

2.2 Hardware
• Input devices
12 17/03 – 21/03
• Output devices

2.2 Hardware
• Motherboard:
o Central processing unit (CPU)
13 24/03 – 28/03 o Expansion slots
o Expansion cards
o RAM slot
o Ports and Connectors
4 2.2 Hardware
• Storage:
o Primary storage (RAM/ROM)
14 31/03 – 04/04
o Secondary storage (magnetic medium, optical

medium, flash memory)


15 07/04 – 11/04 Assessment

2.3 Software

APRIL
• Operating System:
16 14/04 – 18/04 o Platforms
o Functions
o Interfaces
2.3 Software
• Application Software:- types and usage:
o Word processing
17 21/04 – 25/04
o Spreadsheet
o Presentation
o Graphics
5
2.3 Software
• Utility Program:- types and usage
18 28/04 – 02/05 o File management
o Diagnostic
o File compression
• Proprietary and open source software
MAY

19 05/05 - 09/05
REVISION
20 12/05 – 16/05
MID YEAR EXAMINATION
21 19/05 – 23/05
MID YEAR EXAMINATION
22, 23 24/05 - 08/06
CUTI PERTENGAHAN TAHUN
6 2.4 Installation
• PC assembling
• Hard disk partitioning and formatting
24 09/06 – 13/06 • Software installation:
o Operating system
JUNE

o Application software
o Utility program

25 16/06 -20/06 Assessment

2.5   Current and Future Development


26 23/06 – 27/06 • Latest open source software available
• Latest Hardware and Software Development In ICT
7 LEARNING AREA 3 Notes:
COMPUTER NETWORKS AND COMMUNICATIONS Network: To connect two or more computers together with the ability to
communicate with each other
3.1 Basic concepts of networks and communications Communication: The transmission of data from one device to another
27 30/06 – 04/07 • Definition: Discuss:
o Networks -           file sharing between computers
o Communications -           sending short messages using cellular services
• Importance of Networks Conduct group research from Information sources (library, the Internet) examples:
1.         Discovering Computers, Shelly Cashman Series (ISBN 0-619-
28 07/07 – 11/07 Assessment 25525-0)
2.         http://www.webopedia.com

JULY
3.1 Basic concepts of networks and communications Notes:
LAN: A network that spans a small area usually confined to a single building or a
• Types of Networks: group of buildings
29 14/07 – 18/07 o LAN MAN: A network designed for town and city usually larger than Local-Area Network
WAN: A network that spans a relatively large geographical area usually consisting
o MAN two or more Local-Area Network.
o WAN Example: The Internet
3.1 Basic concepts of networks and communications Group activity:
• Network Architecture: Students list out the differences between the three types of computer network
30 21/07 – 25/07 Conduct group research from information sources (library, the Internet) on types of
o Client/Server network architecture
o Peer-to-Peer Notes:
Client/Server Architecture: A network architecture in which each computer or process
8 3.1 Basic concepts of networks and communications on the network is either a client or a server
• Network Topology:
o Bus
31 28/07 – 01/08 o Star
Peer-to-Peer Architecture: A type of network in which each workstation has
o Ring equivalent capabilities and responsibilities
Conduct group research from information sources (library, the Internet) on types of
network topology
Students draw simple diagram of the 3 types of network topology
3.1 Basic concepts of networks and communications Students list out the differences between the three types of network topology
AUGUST

32 04/08 – 08/08 • Protocol Conduct group research from information sources (library, the Internet) on TCP/IP
• Internet, intranet, extranet Conduct group research from information sources (library, the Internet) examples:
1.         Discovering Computers, Shelly Cashman Series (ISBN 0-619-
3.2 Hardware Requirements 25525-0)
33 11/08 – 15/08 • Network Interface Card (NIC) and Wireless Network Interface 2.         http://www.webopedia.com
Card, Internal and External Modem, Hub, Switch,
Students list down the various network devices
34 18/08 - 22/08 CUTI PERTENGAHAN PENGGAL 2
Notes:
3.2 Hardware Requirements Network Devices:
• Router and Wireless Access Point •        Network Interface Card (Ethernet and Wi-Fi)
35 25/08 – 29/08
•        Modem (Internal and External)
•        Hub, Switch, Router
9 3.2 Hardware Requirements •        Wireless Access Point
• Medium: Students list down the functions of the stated devices
36 01/09 – 05/09 o Cables: Unshielded Twisted Pair, Shielded Notes:
Twisted Pair, Coaxial and Fibre Optic Function of the Network Interface Card: KIV
o Wireless: infrared, radio wave, and satellite Function of Hub: KIV
SEPTEMBER

3.3 Software Requirements Students list down various types of cables


37 08/09 – 12/09 • Server Software (Network Operating System) Students list down various types of wireless transmission media
• Client Software Notes:
SEPT
Network Operating System (NOS): An operating system that includes functions for
connecting computers and devices into a local-area network (LAN). It has the
3.4 Setting networks Facilities capabilities to coordinate the activities of multiple computers across a network
38 15/09 – 19/09
• Installation of Network Interface Cards
• Cable Crimping and Testing Notes:
• Configuration and Testing of Network Examples: Windows 2000 Server, Windows NT, LINUX, UNIX
• Share Data (folder and files) and Resources Activity:
10 3.5    Current and Future Development Ping the server from the configured workstation
• Mobile Computing: Activity:
o Specifications Set up a shared folder
o Services Save a file in the shared folder
o Frequencies Access the file in the shared folder from other workstations
• Internet Technology and Services: Activity:
39 22/09 – 26/09 o VoIP Research on the chosen topic
o BLOG Write a short report (350 words) and save the document in the shared folder
• Types of Network: Notes:
OCTOBER

o PAN Examples:
o VPN •        Web Browsing: Internet Explorer, Mozilla Firefox and Opera
o WLAN •        Email Client: Microsoft Outlook, Mozilla Thunderbird and Eudora
o WIMAX •        Network Utilities: Ping and Traceroute
•        Network File Manager: Network Neighborhood and My Network Places

40 29/09 – 03/10
REVISION

41 06/10 – 10/10

FINAL EXAMINATION
42 13/10 – 17/10

11 FINAL EXAMINATION
43 20/10 -24/10
NOVEMBER

44 27/10 – 31/10

45 03/11 – 07/11

46 10/11 - 14/11

You might also like