You are on page 1of 3

SEKOLAH MENENGAH KEBANGSAAN (L) METHODIST KUALA LUMPUR

HURAIAN SUKATAN PELAJARAN TAHUNAN


COMPUTER LITERACY
FORM 4
LEARNING AREA

1.0 Data Processing


1.1 Information

LEARNING OUTCOMES

1.1.1

Processing Cycle

1.1.2
1.1.3
1.2 Data
Representation

SUGGESTED LEARNING ACTIVITIES


REVISION ICAS ICT

Understand and explain how a


computer processes data
List down the processing
components and state their
functions
Identify the components in the
machine cycle

1.2.1 Define binary digit


1.2.2 Convert numbers into binary
1.2.3
1.2.4

numbers or vice versa


State the metric prefixes for data
capacity and speed measurement
List down different binary coding,
e.g. ASCII

Presentation about parts of a computer


Search online the processing components in a computer
Draw the machine cycle

Convert decimal into binary or vice versa


Convert numbers in standard form to metric prefixes or vice versa
Complete the table for ASCII coding

Assignment 1:
Using computer skills to create a drawing of the machine cycle.
State the actions taken in each step and also show the picture of the processing components involved.
Relate a real situation with the process.

2.0 Network
2.1 Types of net
2.2
2.3 work

2.1.1. List types of computer network:


Local Area Network (LAN)
Wide Area Networks (WAN)
Metropolitan Area Networks
(MAN)

List various types of network: LAN, WAN and MAN

Identify the differences between types of computer networks in terms of


the coverage area

2.4 Network topology

2.2.2 State and explain the types of


network topology:

Star Network
Ring Network
Bus Network, etc.
2.2.2 Compare different network topology

Show and explain different types of network topology


Sketch the types of network topology
List down the advantages and disadvantages of the network topology

State different situations that involves sharing using network


Create a shared file and folder
Share files and folders
Print documents using shared printer

Discussing current/latest network technology used by computers/ smart


devices: WIFI, Bluetooth, Cloud Service, etc.

Assignment 2:
Explain the network topology using I-think maps/ mind maps.

2.0 Network
2.3 Share using
network

2.3.1 Understand and state the different


forms of sharing using network: sharing
documents, sharing peripheral devices,
etc.
2.3.2 Share documents with other users
through Local Area Network (LAN),
Cloud Service or other methods.

2.4 Current Technology 2.4.1 Explain current technology in


in Computer
Network

computer network

Assignment 3:
Introduce one of the network technologies using PowerPoint presentation.
Complete a task of sharing the presentation using network.

3.0 Computer Risks


and Cyber Issues
3.1 Computer risks and
security measures

3.1.1 Identify the types of computer

3.2 Cyber Issues

3.2.1Understand and explain the privacy


concern in cyber world
3.2.2Understand and explain the
intellectual property

crimes and threats


3.1.2 State the types of the malicious
codes and explain what the effects
of the codes
3.1.3 Explain the types of computer
security: Hardware, Software/ data,
Network
3.1.4 List the examples of security
measures and explain each functions

List down the types of malicious codes


Compare the actions taken by the malicious codes
List the security measures
Explain how security measure work

Discuss the cyber issues involving the invasion of privacy and


intellectual property in cyber world

Compare the difference between verification and authentication


List out the methods used for verification and authentication

Assignment 4:
Discuss the cyber issues and the impact to the society
Discuss the precaution
Design a poster about the cyber issues

3.0 Computer Risks


and Cyber Issues
3.2 Cyber Issues

3.2.3Compare the methods used for


verification and authentication.

INTRODUCTION TO PROGRAMMING : MOBILE APPS BUILDER

You might also like