0% found this document useful (0 votes)
21 views

FMGT0213 - Basic ICT Revision Notes JULY2022

Uploaded by

mistrzzw001
Copyright
© © All Rights Reserved
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

FMGT0213 - Basic ICT Revision Notes JULY2022

Uploaded by

mistrzzw001
Copyright
© © All Rights Reserved
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
You are on page 1/ 29

FMGT0213

Basic Information and


Communication Technology

Revision Notes for Final Examination


Table of contents
01 02 03
Computer and Information Internet Word Processing
Technology Microsoft Word

04 05 06
Spreadsheet Presentation Multimedia
Microsoft Excel Micorosoft PowerPoint

07
Current Issues
In ICT
01 Computer and Information
Technology

What is?

 A process
Use
More
An jobs to
computers,
electronic Reasons
accomplish toobjectives
storage,
opportunity.
device. have Computer
network, Literacy
by using scientific
infrastructure, process,
processes,
 method
methods and knowledge.
inunder
order to control
Better communication.
Operating the accomplish tasks and objectives.
of instructions stored in its own
 Anything
New media
memory. created
– new by human
ways to make
fun.life easier and to solve
ofTechnology?
having
 problem
Having data
Accept  Process
an up-to-date news  Produce Information
datasource.
 Being
(Input)
prepared for the future. (Output)
Information Technology?

Computer?
Data  Process  Information
Look at the gif below for example…
Output
Input Devices
Devices 4 Major
Communication
 Processed
 Send
 Output and Components of Computer
Sends datadata
into computer.
(information) from computer.
receive
Motherboard messages via verbal or
Other
nonverbal.
Input examples:
examples:voice,
text, alphabet,
image, audio,
sensor.
graphics. Components
 Output
Input device
deviceexamples
examplesare areasasbelow:
below:
Communication Device
INPUT
 Transferring OUTPUT DEVICE
DEVICES between
information 2 or more
Central Processing
people/computers. Unit (CPU
COMMUNICATION
SYSTEM
Communication UNIT
Technology DEVICES
 Equipment and program used to exchange data
Random and
Access
information. Memory (RAM)
Computer Network
Definition  Set of computers connected together.

 Share computer peripherals/devices.


Benefits  Transfer files.
 Share information and resources.

Types
M
PA
W
L ANN
Technology Usage
Education Government Entertainment
• New ways of conducting • E-procurement. • New ways to watch
classes. • Better attendance taking entertainment shows –
• Online classes – UROX =) New system. Netflix, Google Play,
assessment methods – online • Better medium in sharing YouTube.
quizzes etc. information. • Better quality – sci fi
• Better access to resources for movies.
all! • Easier to be known by public
• Save time in completing – viral – Instagram, TikTok
assignments. etc.
• Issue on copyright and
Retails Publishing intellectual property rights.
• New rules and regulations.
• Online platform to trade – • New ways to read, purchase
Ebay, Lazada etc. reading materials.
• Better access to inputs and • Transition to be paperless.
outputs. • Copyright and intellectual
• Cyber crime. property issues.
• New rules and regulations.
02
INTERNET

“INTERNET is the largest NETWORK in the world.”


Internet Evolution
Internet of Internet of Internet of Internet of
Pre-Internet
Content Services People Things

Network Internet
Connected computers via Network connected to other
wire or wireless network
Internet VS Web
Internet
Web has billions
is just a of web
part of inside
internet

Search
Engine
is searching
throughout
the whole
web.
Web Browser VS Search Engine
Important notes:
Web Browser Web browser is Search Engine
view, retrieve and different with Search through information
access website search engine. Not on internet
all search engine
has its own browser
and otherwise.
For example,
Google is search
engine, while
Google Chrome is
a browser.
A picture is worth a
thousand words
Internet Protocol Domain Name
(Text version of IP Address)
(IP) Address
 When computer is connected to
internet, it is assigned with a unique IP
Address.
 IP Address is a set of four(4) numbers
separated by dots.
 Example: 12.371.288.199
 IP Address is difficult to remember, so
website are given text version called
the...
The Usage of Internet
AREA Example
Communication Skype, Whatsapp, Zoom,Email

Online banking Maybank2U, CIMB click

Online shopping Lazada, Zalora, Shopee, Mudah.my

Education Fullamark, Urox

Entertainment Netflix, Youtube, Spotify

Transportation Grab, Uber, GOjek


How to behave when using
E-MAIL, CHAT ROOMS AND ONLINE
DISCUSSION

Avoid typing in all


Avoid multiposting, caps or grossly
cross-posting, off- enlarging script for
Avoid flamewars Do not send text
topic posting and emphasis, which is
and spam. containing viruses.
hijacking a considered to be the
discussion thread. equivalent of
shouting or yelling.
It’s Netiquette (Not Ettique!)
Correct and acceptable way of using the
INTERNET

DON’T!
DO
 Name call or offensive
 Respect other people’s
opinions
privacy
 Post private or
 Verify facts before posting
embarrassing pics
 Check messages & respong
 Exclude people and talk
promptly
behind their back
03 04 05
Word
Spreadsheet Presentation
Processing

MICROSOFT OFFICE
Microsoft Office

Ms Word Ms Excel Ms Powerpoint

Performing calculations,
Used to create and edit Communicating process of
analyzing data and
personal and business ideas and information to a
integrating information
documents group
from different programs
Short-cut Keys Excel Tools
Tips for a good Presentation

To prepare a presentation ask yourself a few questions such as topics, the audiences, the
objectives, timeline, classification and so on.
Speak clearly and loudly enough for all to hear.
Do not speak in a monotone voice. Use inflection to emphasize your main points..

Address your audiences (preferable title to be called ) and learn the name of participants
as quickly as possible. Actively engage the audience.
Use bright and bold colors, and pictures as well as text.
Something that is easy to remember. Use presentation tools to hold audience’s attention.

Relax, breathe and enjoy.


06 MULTIMEDIA
Multimedia can be referred as combination of
various elements such as text, audio, images,
video, graphics and so on
Multimedia Softwares

Desktop Image
Video Editing Webpage Drawing
Publishing Editing
Sotware Software Software
Software Software
07
Current Issues in
ICT
“What are the current issues in ICT field???”
Real issues happening in ICT field
Social Isolation Privacy Child Safety Adaptation Cybercrime

Spending too Exposes them to a


It concerns about number of risks, Use computer
much time
data protection including graphic The rapid growth technology to
online can be sexual images,
and privacy. of technology is access personal
socially isolating. sexual predators
Failure to sometimes information,
Lack of real who solicit
protect your difficult to adapt business trade
human contact youngsters on chat
computer from rooms and through to certain people, secrets or use the
may have an
hackers can email, and online especially those internet for
adverse effect on
compromise bullying, in the middle exploitative or
people's particularly on
personal ages. malicious
emotional and social networking
information. purposes.
social wellbeing. sites.
Examples of Cybercrimes
Cyber-stalking Online Harrassment Online Bullying
Stalk people online for bad Harrass people online that Bully people online or isolate
purposes makes them annoyed or feel them
threaten.

Child sexual exploit Scams Phishing


Target youngster who involve Lie and deceive people Create a copy/fake website to
in social media especially to get money get login information from
people

Ransomware virus Malware virus Identity theft


Demand money to unlock files Attack computer system with Steal other people identity and
that has been encrypted. malicious virus makes it look like they are
theirs
A PICTURE
ALWAYS
REINFORCES
THE CONCEPT
Images reveal large amounts of data, so
remember: use an image instead of a long
text. Your audience will appreciate it
Types of Cyber Security
Application Security Network Security Information Security

Software and hardware Protect the usability, Protect the users' private
methods to tackle external integrity, and safety of a information from
threats that can arise in the network, associated unauthorized access,
development stage of an components, and data identity theft.
application. shared over the network

Intranet Security Notes: Perimeter Security


Find the examples
Protect individual devices of the cyber Serves as a barrier between
and computers from security in the the Internet and your
malware that has managed to lectures slide. network.
infiltrate your local
network.
All the best for
your final
examination!
Do you have any questions?
[email protected]
CREDITS: This
+60 presentation
112500template
9670 was created by Slidesgo, and includes
icons by Flaticon and infographics & images by Freepik

You might also like