|
No.
|
Keyword(s)
|
Referring to:
|
|
1.
|
Computer Generations
|
1st generation (1940 – 1956)
2nd
generation (1956 – 1963)
3rd generation (1964 – 1971)
·
IBM 370 series were
introduced in 1964. Also CDC 7600 and B2500
·
Development of
Integrated circuit begins.
·
Use silicon chips –
reliable, compact, cheaper
·
Hardware and
software sold separately.
·
First 256 bit RAM
were introduced and was the basis for development of 1K bit RAM.
4th generation (1971 – present)
·
Famous computer
scientists: Steve Jobs (built the 1st Apple computer), Bill Gates,
Michael Dell
·
Silicone chips, microprocessor, storage
devices were invented.
·
Computer became 100
times smaller than ENIAC.
·
Gain in speed,
reliability and storage capacity
·
Personal and
software industry bloomed.
5th
generation (Present – beyond)
·
Based on Artificial
Intelligence (AI)
·
New hardware technology was introduce: Silicone chips,Processor,Robotics,Virtual
reality,Intelligent system,Programs
which translate languages
|
|
2.
|
Positive impact of ICT on the society
|
The six positive impacts:
Faster communication speed
Lower communication cost
Reliable mode of communication
Effective sharing of information
Paperless environment
Borderless communication.
|
|
3.
|
Negative impact of ICT on the society
|
The two negative impacts:
Social problems
Health problems
|
|
4.
|
Why ethics and law in computing is needed?
|
Respecting ownership – not steal other people’s work either by duplicating or distributing
Respecting privacy and confidentiality – refraining oneself from invading other’s privacy
without permission.
Respecting property – do not tamper and change electronic information.
|
|
5.
|
Intellectual property protection
|
Patent for inventions: utility, design, plant patent, (protect inventions and improvements)
Trademark for brand identity: Words, names, symbols, devices, images (represent
products, goods or services)
Copyright for material : Literary and artistic material, music, films, sounds recording and
road casts
Design for product appearance: particular lines, contours, colour, shape,
texture, ornamentations.
|
|
6.
|
Methods of authentications
|
authentications - a process where
users verify their identity.
2 types:
Biometric devices – a device that translate personal characteristic into digital code
·
Fingerprint
recognition
·
Facial recognition
·
Hand geometry
scanning
·
Iris scanning (the
area near to the coloured area of the pupil)
·
Retinal scanning
(the eyeball)
·
Voice recognition
·
Signature
verification system.
Callback system – checking system that authenticates the user. (Commonly used in the
bank operation and business transaction.)
|
|
7.
|
Methods of verification
|
Verification - the
act of proving or disproving the correctness of a system with respect to a
certain formal specification.
2 common methods:
User identification – show passport, key-in user name & password, show exam slip.
Processed object – swipe security card to enter building, police check the driver’s
license to identify valid driver.
|
|
8.
|
Controversial content
|
Pornography – any form of media or material that depicts erotic behavior and is
intended to cause sexual excitement.
Slander – legal
term for false and malicious statement.
|
|
9.
|
Internet filtering
|
3 common methods:
Keyword blocking – uses a list of banned words to filter access to the site
Website / site blocking – uses software to prevent access to any sites on the list
Web rating system – browser gain access to a certain level of ratings
|
|
10.
|
Cyber law acts in Malaysia
|
Digital Signature Act 1997 – secures electronic communications especially on the
internet.
Computer Crimes Act 1997 – gives protection against misuse of computers and computer criminal
activities.
Telemedicine Act 1997 – Ensure only qualified medical practitioners can practice
telemedicine.
Communications and Multimedia Act 1998 – ensures that information is secure, network is
reliable, and service is affordable all over Malaysia.
|
|
11.
|
Computer Crimes
|
Computer Fraud – intention to take advantage or causing loss (mainly monetarily
basis)
Copyright Infringement – involves illegal copy or reproduction of copyright material by
black market group
Computer Theft – unauthorized use of another person’s property
Computer Attack – to disrupt the equipment of computer systems …
|
|
12.
|
Computer Security
|
Hardware Security – measure used to protect the computer hardware
Software and Data Security – measure used to protect software and the loss of
data files
Network Security – measure used to protect the network system.
|
|
13.
|
Security Threat
|
Malicious code
Hacker –
unauthorised person who access (hack) into computer
Natural and environmental threat – flood, fire, earthquake
Theft – steal money,
goods, information and resources.
|
|
14.
|
Security Measures
|
Data backup – a program of file duplication. It is necessary so that they can be
recovered in case of an emergency
Cryptography – process of hiding information by altering the actual information
into different representation.
Antivirus – program that protects a computer against viruses by identifying and
removing any computer viruses found in the computer memory, storage or
incoming email files.
Anti-spyware – program used to remove spyware.
Firewall – hardware or software which functions in a networked environment to
prevent some communications forbidden by the security policies.
Human aspect – refer to the user and also the intruder of a computer system.
|
|
15.
|
Security Procedures
|
Data Protection
Detecting illegal access to systems
Preventing illegal access to system
Preventing illegal access to root
Patch – small updates to software
|
Neetharaman's Corner
Monday, 2 November 2015
Subscribe to:
Comments (Atom)