LA 1: INTRODUCTION TO ICT LESSON 1 - 27

joinherbalistΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 10 μήνες)

83 εμφανίσεις














ACTIVITY SHEET :

TEACHER
’S

RESOURCES



INTRODUCTION

TO INFORMATION AND

COMMUNICATION TECHNOLOGY


By Ahmad Shaberi Hanapi















LA 1: INTRODUCTION TO ICT

LESSON 1
-

27


1

ICT FORM 4 : ANSWER SHEET



Lesson 1: Introduction to Information and Communication Technology (ICT)


ACT
IVITY 1


1.

In 3500 BC, the Sumerians developed cuneiform writing.

2.

In 1958, photocopier machine was introduced.

3.

In 105 BC, Tsai Lun of China invented paper.

4.

In 1500 BC, the Phoenicians developed the alphabet.

5.

In 1793, telegraph line was invented.

6.

In 1876, the

first telephone was introduced.

7.

In 1963, communication satellite was introduced.

8.

In 1969, the first Internet known as ARPANET, started.

9.

In 1925, television was made known to public.

10.

In 1454, the first printing began with the creation of a printing.

11.

In 194
1, computer was created.


ACTIVITY 2


1.

P a p e r

2.

P h o e n i c i a n s

3.

b e d u k

4.

i n f o r m a t i o n

5.

A R P A N E T

6.

m e s s a g e s

7.

I C T

8.

c h a r t

9.

m a c h i n e

10.


E ma i l



Lesson 2: Evolution of Computers


ACTIVITY 1



2

ACTIVITY 2


1.

B. Abacus

2.

D. Apple Mac
intosh

3.

C. fourth generation

4.

C. 1961

5.

D. Robotic computers

6.

C. 1876 Pascaline

7.

A. Steve Jobs

8.

D. Gottfried Wilhelm Von Leibniz

9.

D. Mechanical Calculator Machine

10.

B. 19
5
1



Lesson 3: Usage of ICT in Daily Life


ACTIVITY 1





ACTIVITY 2


Situation 1:

e
-
commerce

Situation 2:

Telemedicine

Situation 3:

Distance education/elearning/courseware/teleconference



3


ACTIVITY 3





Lesson 4: Computerised and NonComputerised Systems


ACTIVITY 1


1.

People used to cook using firewood but nowadays, people use
microwave
oven
to pr
epare food.

2.

We need to use the
computer
to run business through ECommerce.

3.

Before the invention of the
car
, the transportation used to go from one place to
another was to ride a horse.

4.

We normally watch the prime news on the
television.

5.

The
air conditioner

is a great way to help us cool ourselves on a hot day.


ACTIVITY 2



Correct Step:


1.

nsert the ATM card

2.

Type the pin number

3.

Select the menu

4.

Choose an account

5.

Enter an amount

6.

ATM card is taken out

7.

Money is received

8.

Take the receipt



4

ACTIVITY 3





Lesson
5: The Impact of ICT on the Society


ACTIVITY 1


1.

B. FALSE

2.

A. TRUE

3.

B. FALSE

4.

B. FALSE

5.

A. TRUE

6.

A. TRUE

7.

B. FALSE

8.

A. TRUE

9.

B. FALSE

10.

B. FALSE



5

ACTIVITY 2




Lesson 6: Computer Ethics


ACTIVITY 1



ACTIVITY 2


Fill in the blank with the correct answer.

1.

You shal
l not use a computer to
harm

other people.

2.

You shall not use a computer to bear false
witness.

3.

You shall not copy or use proprietary
software

for which you have not paid.

4.

You shall not use other people's computer resources without
authorisation

or
proper c
ompensation.

5.

You shall think about the

social

consequences of the program you are writing
or the system you are designing.



6

Lesson 7: Differences between Ethics and Law


ACTIVITY 1



ACTIVITY 2


1.

B. Law breaking

2.

A. Unethical

3.

B. Law breaking

4.

A. Unethical

5.

B. Law breaking

6.

B. Law breaking



Lesson 8: Intellectual Property Rights



ACTIVITY 1

1.

B. Intellectual Property

2.

A. Intellectual Property Right

3.

E. Intellectual Property Law

4.

C. Copyright Act

5.

D. Trademark Law


ACTIVITY 2



7

Lesson 9


Privacy in Computer Usag
e


ACTIVITY 1


1. How does computer technology invade our privacy?



cookies



electronic profile



spyware

2. Why do we need data privacy?



anonymity



confidentially

3. How can privacy be protected?



privacy law



utilities software

4. The information in electronic
profile includes very personals detail such as?



age



address



marital status



ACTIVITY 2


Read this paragraph and fill in the blanks with the correct answers. You can choose
the answer from the box provided below.


Cookies
are used to identify users by web
casting, ecommerce and other web
applications. Its files contain
user information
and are saved in the computer
hard
disk
. Some web sites use cookies to
store passwords
, track how regularly you visit
a site and as potential targets for advertisers.


Spywar
e refers to a
program
that collect users’ information without the users’
knowledge.
Spyware
can enter
computers
, sneaking like a
virus
or as a result of
installing new programs. Spyware communicates information it collects to third party
outsiders while yo
u are
online.


Spam
is unsolicited email messages, advertisements or newsgroup postings sent to
many

recipients at once.




8

Lesson 10: Authentications


ACTIVITY 1




1.

To prevent
fake
fingers from being used, many biometrics fingerprint
systems also measure

blood flow.

2.

Hand scanning involves the measurement and analysis of the
shape
of one's
hand.

3.

Iris

scanning analyses the features that exist in the coloured tissues
surrounding the pupil.

4.

Retinal scanning involves using a
low intensity
light source.

5.

Voice r
ecognition biometrics requires the user to speak his
password
or an
access phrase.

6.

Signature verification system recognises the shape of your
handwritten
signature.

7.

The accuracy in voice recognition is fair and the
cost
involved is very
reasonable.

8.

Retinal

biometrics involves the scanning of retina and
analysing
the layer of
blood vessels at the back of the eye.

9.

Iris scanning uses a regular video
camera
and can be done from further
away than a retinal scan.

10.

Voice recognition biometrics requires the user to
speak into a
microphone.




9

ACTIVITY 2