ICTL F2 : PEMBENTANGAN LENGKAP


https://docs.google.com/presentation/d/1xKhnNi9hmHeQXPTJkFOg67JKi9KX6FXPLhWTkwaM0io/edit?usp=sharing

Dapatkan Grafik Yang diperlukan disini :

ITEM
Penerangan
1
ini adalah gambar wallpaper
2

3

4

5

6

7

8

9

10


ICT F4 : 2 Kaedah / Teknologi Pembuktian dan Pengesahan

Pengesahan / Authentication
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Pengesahan boleh dibuat melalui : Pengenalan Pengguna, Objek Yang Dimiliki

Pembuktian / Pengecaman / Verification
An Identity verification service is used by businesses to ensure thatusers or customers provide information that is associated with the identity of a real person.
Pengesahan boleh dibuat melalui : Alat Biometrik, Sistem Panggilan Semula

ICTL F5 : Coding VB - Area Of Cuboid



Pautan Imej Ini :
https://docs.google.com/drawings/d/1KadsNr0TSMJWqR-g1Uxbq2rvcFCFrjW0TJCEGHKgIn4/pub?w=597&h=473
ANALYSIS
Problem Statement

Required Input

Expected Output

Formula Used

DESIGN
Flowchart / Pseudocode

Input Interface

Output Interface

CODING
Program File Name
.vbp
Write Source Code

TESTING & DEBUGGING
Fix Error

Input Item, Input Data


Output Item, Actual Output


Executable File Name
.exe
DOCUMENTATION
Complete Assessment Form

ICTL F1 : 5 Kategori Komputer



Kini, banyak lagi kategori baru yang muncul sebagai komputer masa depan.

ICTL F2 : Starting MS PowerPoint dan Office yang lain

ICT F4 : KEBERSENDIRIAN / Privacy

PRIVACY = = KEBERSENDIRIAN

BAGAIMANA MELINDUNGI PRIVACY ANDA?
  1. How To Protect Your Online Privacy : http://www.techsupportalert.com/content/how-protect-your-online-privacy.htm
  2. Get Safe Online : https://www.getsafeonline.org/protecting-yourself/privacy/
  3. 10 Low Tech Ways To Protect Your Privacy Online : http://www.cnbc.com/2015/06/22/ten-low-tech-ways-to-protect-your-privacy-online.html
  4. 10 Tips To Protect Your Privacy : https://www.oaic.gov.au/individuals/privacy-fact-sheets/general/privacy-fact-sheet-8-ten-tips-to-protect-your-privacy
  5. 10 Ways To Protect Your Privacy and Stay Safe Online : http://www.lifehack.org/articles/technology/10-ways-protect-your-privacy-and-stay-safe-online.html
  6. The ULTIMATE GUIDE To Protecting Your Privacy and Identity Online : https://www.hotspotshield.com/protect-your-privacy-online/

ICT F4 : 4 KATEGORI HARTA INTELEK


AKTA-AKTA YANG BERKAITAN DENGAN HARTA INTELEK DI MALAYSIA :
1. Akta Cap Dagangan 1976
2. Akta Paten 1983
3. Akta Hakcipta 1987
4. Akta Rekabentuk Ciptaan Industri 1996

ETIKA Menggunakan Komputer, Laptop, Smartphone, Smartwatch, Tablet & Gadget ICT, Kamera Digital yang lain

ETIKA Menggunakan Komputer, Laptop, Smartphone, Smartwatch, Tablet dan Gadget ICT, Kamera Digital emel, akaun bank online, akaun social networking, dan lain-lain.

ICT F4 : Etika Komputer Dan Isu Undang-Undang


1.2 Etika Komputer Dan Isu Undang-Undang

1.2.1 Definisi
1.2.1.1 Mendefinisikan Etika Komputer, Kod Etika, Harta Intelek, Kebersendirian, Jenayah Komputer dan Undang-Undang Siber
1.2.1.3 Menyatakan keperluan undang2 harta intelek

1.2.2 Privacy / Kebersendirian
1.2.2.1 Menyenaraikan cara melindungi kebersendirian
1.2.2.2 Menyatakan kaedah/teknologi pembuktian dan pengesahan

BAHAN RUJUKAN TAMBAHAN
  1. Digital Citizenship by Orange County Public Schools : https://www.ocps.net/CS/RAG/SDSTI/DCIT/DIGITALLITERACY/Pages/default.aspx
  2. Tech Terms Computer Ethics : http://techterms.com/definition/computerethics
  3. BBC Bitesize : Computer Laws and Ethics : http://www.bbc.co.uk/education/guides/zkhykqt/revision/1