The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

[UNOFFICIAL] BUKU TEKS SAINS KOMPUTER TINGKATAN 5 DALAM BAHASA INGGERIS (AUTO-TRANSLATE)

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Tunku Irfan, 2023-08-18 16:53:42

[BAHASA INGGERIS] BUKU TEKS SAINS KOMPUTER TINGKATAN 5

[UNOFFICIAL] BUKU TEKS SAINS KOMPUTER TINGKATAN 5 DALAM BAHASA INGGERIS (AUTO-TRANSLATE)

Keywords: sains komputer,buku teks sains komputer,sains komputer buku teks,buku teks sains komputer tingkatan 5,sains komputer tingkatan 5

COMPUTER SCIENCE MINISTRY MALAYSIA EDUCATION LEVEL 5 Machine Translated by Google


THEREFORE WE, the people of Malaysia, pledge to focus all our energy and efforts to achieve these goals based on the following principles: Preserving a democratic way of life; Achieve closer unity among the entire community; Ensure a liberal approach to its rich cultural traditions and diverse patterns; Build a progressive society that will use modern science and technology; Creating a fair society where the prosperity of the country will be shared fairly and equitably; That our country Malaysia supports the ideal of wanting; NATIONAL PILLARS BELIEF IN GOD SUPREMACY OF THE CONSTITUTION RULE OF LAW LOYALTY TO KING AND COUNTRY COURTESY AND MORALITY (Source: Information Department of the Ministry of Communications and Multimedia Malaysia) Machine Translated by Google


COMPUTER 5 SCIENCE LEVEL Oxford Fajar Sdn. Bhd. (008974-T) Abd. Halim bin Bohadean@Bohari Paridah daughter of Daud Illustrator Editor Noor Azma binti Ismail Az-zalzalamiah daughter of Anas Intan Farhanna binti Uyob Writer Designer Noor Lees binti Ismail Norlini binti Ramli Roshidah Mohamad Standard high school curriculum Machine Translated by Google


No. Book Series: 0121 MINISTRY EDUCATION MALAYSIA Appreciation © Ministry of Education Malaysia Website: http://www.oxfordfajar.com.my Malaysian education. 56000 Kuala Lumpur. KPM2017 ISBN 978-983-47-2375-0 Tel: 03-56294000 •Ready Manuscript Review Committee Rina Printing Sdn. Bhd., Lot 45, Luxury Promenade, Curriculum Development Division, Ministry 40150 Shah Alam, Pages, Textbook Division, Ministry Malaysian education. Layout and Typing: Text Typeface: Helvetica Neue LT Std 47 Light Condensed Text Typeface Size: 11 pt Oxford Fajar Sdn. Bhd. The publication of this textbook involves the cooperation of many parties. A wreath of appreciation and thanks goes out to all parties involved: All rights reserved. Any material in this book may not be reproduced, stored in a way that can be used again, or transferred in any form or manner, either by electronic, mechanical, rephotographing or recording without prior permission from the Director General of Education Malaysia , Malaysia Education Ministry. Consultations are subject to royalty or honorarium arrangements. •Face Proof Improvement Committee •Lecturer from the University of Malaya First Print 2017 Camera, Textbook Division, Ministry Fax: 03-56294009 Bandar Tun Razak, Malaysian education. Selangor Darul Ehsan. Malaysian education. Oxford Fajar Sdn. Bhd. Printed by: •Officers of the Textbook Division and 4, Jalan Pemaju U1/15, Section U1, Hicom-Glenmarie Industrial Park, •Proof Correction Review Committee Published for the Ministry of Education Malaysia by: Letter, Textbook Division, Ministry •Lecturer from Petronas University of Technology Machine Translated by Google


iii i Copyright and Credits Page 24 Reinforcement Exercise 2.1 Review 273 Enrichment Exercise 3 2 1 Enrichment Exercise 1 222 359 362 56 119 60 124 355 Index 53 i 38 274 356 Introduction Title Page 22 ADVANCED DATABASE 2.1 Structured Query Language: SQL (Structured Query Language) 224 Reinforcement Exercise 3.3 Review 361 1 1.1 Computers and the Impact of Reinforcement Training 1.1 1.2 Computer Architecture of Reinforcement Training 1.2 1.3 Logic Gates of Reinforcement Training 1.3 Review 120 123 3.1 Reinforcement Training Client Scripting Language 3.1 3.2 Reinforcement Training Server Scripting Language 3.2 3.3 Interactive Websites Reference iv 55 117 39 59 Enrichment Exercise 2 354 Glossary Chap Chap Chap Content COMPUTING 1 WEB BASED PROGRAMMING 3 2 1 Machine Translated by Google


Introduction iv The Element of Higher Level Thinking Skills (HTH) is an element that is emphasized in this book. This aims to make students able to solve problems and apply the knowledge learned by them. Through characteristics such as critical and creative thinking skills, reasoning, and thinking strategies, students are able to make decisions, innovate and create something. The Form 5 Computer Science Textbook is written based on the Form 5 Computer Science Curriculum and Assessment Standard Document (DSKP) issued by the Malaysian Ministry of Education. The Secondary School Standard Curriculum (KSSM) provides and strengthens students with the knowledge, skills and values of Computer Science as well as computational thinking that is appropriate to the student's ability level based on the Learning Standards and Performance Standards found in the DSKP. KSSM Computer Science focuses on strengthening knowledge, skills and values in four main areas, namely Computing, Database, Programming and Human-Computer Interaction. This focus aims to produce students with computational and critical skills through aspects of designing, developing and creating new applications. 21st Century Skills have been applied in the Form 5 Computer Science Textbook to form students who are resilient, good at communicating, think critically, creatively and innovatively, have a spirit of teamwork, are curious, principled, informative, caring and have a patriotic spirit . This profile is very important to produce students who are able to compete at the international level and are able to contribute to the world. Cross Curriculum Elements (EMK) are also emphasized to strengthen students' skills and abilities to face future challenges. The elements that are nurtured include the use of the correct and accurate language of introduction, the awareness to love and care for the environment, having noble values, a high patriotic spirit and elements of Information and Communication Technology. This book emphasizes teaching and learning strategies that aim to produce effective learning. Various learning activities have been suggested in this book. This activity is the basis for producing students who are responsible for self-learning, have the nature of cooperation when carrying out group activities, apply learning in daily life, are curious, able to solve problems in learning and master the lessons learned. Machine Translated by Google


Career Science Did you know? My Malaysia! KBAT Daily Application You Mind Test Computer Science Innovation Computer Application Career Science Daily Career Computer Science Science Innovation Mind Test Computer My Malaysia! Computer that, you can also develop interesting and informative digital resources, for example animations from the same portal. You can access the Form 5 Computer Science portal, which is sainskomptg5.com to get additional exercises and answers to the questions in the textbook. Besides CASE STUDY PROJECT ACTIVITY Highlighting Level-Thinking Skills questions current developments and innovations in computer science technology Various activities that are exploratory or based on stimulating materials to increase students' understanding of the learning standards that have been learned. Apply computer science knowledge in daily life Highlighting Malaysia's success in the field of computer science Expose students to Height Provides interesting information about the topic being studied Provide interesting questions to test students' understanding of the field of computer science Introducing the types of careers related to the field of computer science The icons in the Textbook and Its function v Machine Translated by Google


Think... what safety do you need to do? •What can a person who has a career in computing contribute? • How does innovation in computing impact on • How can unethical activities in computing be combated through cyber law? • If you are exposed to keyboard warrior, what are the steps humans and the environment? Machine Translated by Google


Chapter 1 Computing computer data using Caesar •Linear processors and logic and truth tables •Encryption and decryption •Basic concepts of architecture Do it data in a computer network • Produce a gate circuit •Safety needs • Access-Decode Cycle the basics of integrated circuits •Get logic as a construct computing in computing •Career in the field •Unethical activities various levels of programming languages •Translation computing between countries •Cyber law •The effect of innovation in current processor Cipher In this chapter, you will learn: The act is illegal interception ease of communication and transactions, the Internet is also used as a target for criminals to find victims. The world is now increasingly dependent on the Internet and computer systems to carry out daily activities, either communication and exposure to attacks according to current conditions. Weaknesses in law enforcement and lack of public education and awareness about this new form of crime This problem is more complicated to deal with. involving financial institutions. In addition to providing at home, at school or at work especially Machine Translated by Google


1.1 Standard Learning 1.1.1 Impact of Innovation in Computing Copyright infringement 1.1.1 Analyze the impact of innovation in data using Caesar 1.1.6 Study cyber laws between countries and decryption At the end of learning students can Threats Hacking encryption Historical Technological Innovation Examples goo.gl/ glua44 1.1.4 Implement Cyber crime 2 Computer Science Form 5 Fraud Pornography viruses 1.1.3 Explain the need for data security in computer networks and security measures (encrypted email, double verification, password) Figure 1.1.1 Example of cyber crime Attack computing 1.1.5 Discuss the social implications related to software hacking and piracy 1.1.2 Identify unethical activities in 1.1.7 Research careers related to the field of future computing Cipher computing The challenge in the 21st century education system is to produce students who can think critically, creatively, solve problems and have leadership to compete at the global level. One of the pillars of the Secondary School Standard Curriculum (KSSM) education system is science and technology. These two technologies have changed the way we learn, socialize, do politics, work and do business. Although these technologies are a positive development, there are also unhealthy agendas going along with these developments. The term borderless world has given rise to various activities that can be exploited by criminals who commit crimes in cyberspace called "cyber crime". Examples of these crimes are fraud, pornography, threats, copyright infringement, virus attacks on computers and so on. Criminals will always find ways to exploit new technologies. Now, the challenge for all countries is to ensure that criminal laws, including cyber crimes, can be implemented perfectly to control the agenda of cyber criminals. Digital technology in the field of computing is developing rapidly along with the development of network communication systems. The existence of the Internet has greatly changed the current learning landscape, from the traditional classroom to the 21st century classroom regulated by technology. Innovations in information and communication technology (ICT) have changed teaching and learning patterns, Computers and Impact Machine Translated by Google


Cyber crime Storage technology Impact of innovation in computing Network technology One of the factors that requires change to support the development of IoT (Internet of Things) is the change in the increase in the number of IP numbers for electronic devices, i.e. IPV6 instead of IPV4. Contribute to the existence of online systems Figure 1.1.2 Impact of innovation in computing Operating system CHAPTER 1 Computing 3 Innovation in Network Technology Innovation in Storage Technology Positive effect Did you know? You IBM introduced the first hard disk in 1956 with a capacity of 5 MB. Research is constantly being done to create better types and forms of storage to meet the needs of current use such as increasing storage capacity, disk construction material, device size and speed that influence innovation in The positive effects resulting from innovation in computing are described as follows: In the early stages, the computer operated alone (stand alone). Change occurs by establishing a connection between a computer and another computer or device. Later, this change was extended to the concept of network that started with local area network (LAN), wide area network (WAN) and then the creation of the Internet. as well as in the work environment and communication with the outside world without borders. The impact of innovation in the field of computing can be illustrated as in Figure 1.1.2. Machine Translated by Google


Online System Development Operating System Innovation Cyber crime Negative effect Social media makes it easy for users to interact online. Examples of social media are Facebook, Twitter, WhatsApp and Instagram. goo.gl/ Pn4fKa Application 4 Form 5 Computer Science Many Malaysian Firms Unconcerned About Cyber Crimes and Incidents Daily This data can also be accessed anytime and anywhere through various devices as long as there is Internet service coverage. Computers operate with an operating system. The operating system controls the operation of the entire computer system. Phones that used to be used to make calls and send texts only, now with the advancement of operating system technology, smart phones have the features of a computer and a normal phone. The results of innovation in all three areas of technology discussed have stimulated the development of online systems and cybercrimes. Cybercrime can be defined as the misuse of computing technology and the Internet to carry out criminal activities, which is to damage, steal or change data in a computer system for a specific purpose. The crime committed will have a negative impact or loss on the victim. However, cyber crime is difficult to prove who is involved, the way, purpose and place of the crime. This happens because cyber crimes can be committed from a long distance with the help of the Internet, without the physical presence of the criminal. Along with the development in Internet technology, the existence of cloud storage (cloud storage), which allows data to be stored in the cloud. In addition to computers, the OS is also used for other devices, such as mobile devices, for example Android, iOS and BlackBerry. storage technology. In addition to hard disk, data is also stored in floppy disk, optical disk or pen drive. The impact of innovations in network technology, storage technology and operating systems has stimulated the development of online systems. For example, creating e-banking systems, e-commerce systems, electronic entertainment systems, e-learning systems, egovernment, legislation and unlimited telecommunications networks. With the rapid development in software system technology and network technology, the creation of an operating system (Operating system - OS) for computer servers to control the network. The negative effects resulting from innovation in computing are as follows: Machine Translated by Google


hacking and activism). •Cybercrime from the perspective of private users and institutions and Distributed Denial-of-Service (DDoS), fake websites, and hacking. 3 Phishing is the theft of information, usually done via email, to trick users into revealing user details to attackers or cybercriminals. Phishing emails usually appear to be sent by a well-known organization and ask for personal information such as credit card numbers, account numbers or login names and passwords. In Malaysia, most of the detected targets of phishing attacks consist of Internet banking users by tricking users into revealing their banking information. Cyber crime can be classified into: Including cyber terrorist attacks against critical national infrastructure such as government systems, air traffic control systems, electricity generating systems, telecommunications network infrastructure, military systems, industrial control systems and hacktivism (a combination Including fraud, cyberbullying, email fraud, theft of information (phishing), online gambling, child abuse images, pornography, get-rich-quick schemes, illegal copying of software, modification or destruction of computer programs and data, unauthorized access , malware or virus spread 1 Cybercriminals spread viruses through smartphones or computers to obtain banking passwords from social media accounts when the victim's phone is connected via mobile broadband service (Wi-Fi) in public places, hackers will use a special device to insert malware into the smartphone victim to get information. •Cybercrime from a national security perspective 2 Cybercriminals will send emails loaded with viruses to victims' email lists. When the email is opened by the recipient, the virus is activated and will perform activities according to its program such as reducing memory space, deleting data in the victim's computer, accessing personal information and sending information or viruses to other computers through the victim's email list. Among the examples of cyber crime situations are as follows: Malware is short for malicious software . Malware is a program specially designed to infect a computer system without the owner knowing. What is malware? CHAPTER 1 Computing 5 In 2015, the number of spam cyber crime cases recorded in Malaysia was 35 000 while for fraud it was 2960 cases. Based on CyberSecurity Malaysia, criminals look for targets through social media. You You Did you know? Did you know? Types of Cyber Crime Machine Translated by Google


Group work Cyber crime No It is forbidden to use the computer with the intention of harming others Ethics Using a computer to create virus software and spread viruses with the intent to damage or manipulate other users' data or files. 1 Examples of unethical activities in computing Choose cybercrime according to the perspective you have studied. Explain the cybercrime according to the selected perspective and the way the cybercrime occurs. Suggest measures to prevent the occurrence of such attacks. If you are a victim, suggest what you should do. Discuss with your group mates and present the results of the discussion in class, either using the blackboard or through acting. Did you know? You ÿ Professional You can visit goo.gl/ c7n8fb to learn how to identify phishing emails . 6 Computer Science Form 5 Table 1.1.1 Ethical guidelines for computer users ÿ Confidence There are seven important components of ethics in computing, namely: ÿ Communication ÿ Respect Daily ÿ Obey the law ÿ Responsibility ÿ Honesty Application This guide has been proposed by the Computer Ethics Institute (Computer Ethics in computing refer to guiding standards to control the behavior of computer users so that they are more moral. Table 1.1.1 shows guidelines to help users determine whether the following actions are ethical or not. Although a code of ethics is provided as a guide to computer users, there are still unethical practices. The following are examples of unethical activities in computing: 4 The Internet is the “information superhighway” because the Internet allows people to find, share and disseminate information quickly and easily. The illegal access and distribution of digital copies of copyrighted books, movies, music, artwork, software, and other content by cybercriminals is a form of copyright infringement, commonly referred to as "piracy." Ethics Institute) as a reference for all computer users. 1.1.2 Ethics in Computing ACTIVITY 1 Machine Translated by Google


It is forbidden to use other people's intellectual property as property No 4 8 Software developers create video games or educational software without considering the type of content that has bad elements and has a negative impact on children. Examples of unethical activities in computing Using a computer to steal personal data for the purpose of obtaining financial resources. 9 10 Using a computer to spread fake news by changing information about a person can damage their reputation. It is forbidden to hack into other users' computer files It is forbidden to use a computer to act as a false witness It is recommended to use the computer with consideration and respect for other users Also, one is inconsiderate of new computer users. Making illegal copies of copyrighted software without the permission of the creator. 3 Do not use other users' computer resources without permission 7 Do not ask permission in advance from the owner of the computer before using the computer. Obtaining data from other people's personal files without permission. Spying on other people's files or reading other people's private messages violates privacy rights. Make copies or commercialize the software without the permission of the owner. It is forbidden to use a computer to steal Ethics 2 Considering the social impact of the programs and systems developed It is forbidden to disturb other people's privacy or computer tasks 5 It is forbidden to use or copy other people's software without permission Interfering with the privacy rights of others and downloading illegal software onto other people's computers so as to interfere with the functioning of the computer. 6 While communicating over the Internet, one does not treat others with respect, invades another's personal space, uses abusive language, makes false statements about others, is impolite while communicating over the Internet and does not respect other people's time and resources. CHAPTER 1 Computing 7 Machine Translated by Google


My Malaysia! 1 Get information on how to identify phishing emails. How can you protect yourself from becoming a victim? and CyberSecurity Malaysia (CSM)? 2 In your view, what is the role of the Malaysian Communications and Multimedia Commission (SKMM) Unethical Activities (SKMM) was established in 1998 to regulate industry regulations based on power 8 Computer Science Form 5 Multimedia Malaysia (1998) and Act Stronger Security For Your Google Account goo.gl/ qNftBz Multimedia Malaysia Multimedia (1998). Communication and which is enshrined in Communication and Commission Act Commission Communication and 1.1.3 Data Security Requirements in Computer Networks and Security Measures ACTIVITY 2 Individual Work There are several ways to send this email. For example, through SafeGmail from Google Chrome that allows you to send encrypted email to anyone. RMail, infoencrypt, Hushmail, iSafeguard, safe-mail.net and many other web links provide solutions for secure email delivery. Email encryption (Encrypted email) Steps to ensure data security can be done as follows: Is an additional layer of authentication that the user needs to specify when entering an account or accessing data online. With these two layers, the authentication step to access the data becomes more difficult. If the hacker is able to hack the first layer, which is the password, he still needs the security key number, next to enter your account. The more layers of authentication, the harder it is for data to be hacked. The issue of data security in computer networks needs attention because these weaknesses make it easy for cybercriminals to intercept computer networks and steal valuable personal information. Sending e-mails and performing financial transaction processes online are examples of activities performed over computer networks. The process of sending and accessing data in a computer network needs to go through several security methods. Is the process of encrypting information that will be sent via e-mail. Usually, this process involves sensitive or private information. Double verification Machine Translated by Google


Account key other safety Figure 1.1.3 Two-layer authentication method + route Number The Importance of Password Security CHAPTER 1 Computing 9 Why can theft of user information occur when users surf the Internet using WiFi in public places? Said Mind Test goo.gl/ z0apWg Data Security Requirements Individual Work ACTIVITY 3 A good password is made up of a combination of letters, symbols and numbers, i.e. between 8 and 12 characters. The probability of this combination of characters will make it difficult for hackers to guess. Password example: In order to prevent data being hacked, choosing a password is very important. Users must avoid building passwords based on names, identification card numbers, dates of birth or any data related to the user's personal information. •RZ678906 Figure 1.1.3 shows a two-factor authentication method to strengthen security features. Is the main layer of security authentication for entering user accounts. With only one layer of security, which is a password, this situation will make it easier for an intruder to enter a user's account. •W#uy4266 As a student in the 21st century, you should be more aware of the types of threats that exist at this time and learn the steps that need to be taken to protect the rights of personal data in order to enjoy a good and safe Internet browsing experience. Password 1 Give an example of a biometric method that can be used as 2 State how this biometric device can be used. In the verification process, in addition to the use of pin numbers or passwords, biometric methods are a good way if used as one of the verification layers. validation. Machine Translated by Google


Sender 2 Guarantee authenticity (authentication) Hi! How are you? cc961634.aspx 1 Maintain privacy (confidentiality) Plain text com/ en-us/ library/ 10 Form 5 Computer Science Figure 1.1.4 Symmetric encryption, ie encryption and decryption of text using the same key. to try the encryption and decryption process. Good luck! technet.microsoft. &^$#@KgySDL0v Cipher text Source: There are currently four main functions of cryptography, namely: goo.gl/ 3BZD02 You can browse Hi! How are you? delivery medium Plain text Daily Encryption Receiver Application 4 Avoid denial or fraud (nonrepudiation) (decryption) Decrypt 3 Ensure integrity Encryption is the process of translating data into a secret code that cannot be understood and is one of the most effective ways to protect data. Data that has not gone through the encryption process is called plaintext. After encryption, the data is a cipher text (ciphertext). The meaning of the terms encryption and decryption is: Cryptography (Cryptography) is a branch in the field of Computer Science and Information Technology that is especially important to deal with problems in the field of data security so that users are safe from being intercepted by third parties during processes such as online banking transactions, website logins and so on. Data encryption is the process of encoding plain text into unintelligible cipher text. (a) Symmetric encryption Figure 1.1.4 shows symmetric encryption, which is the "key". There are two types of encryption, namely symmetric encryption and asymmetric encryption. Figures 1.1.4 and 1.1.5 show the difference between the two types of encryption. used for encryption and decryption of text are of the same type. This can be done with processes such as data encryption to protect user data privacy. Data decryption is the process of encoding cipher text (ciphertext) into plaintext. Did you know? Encryption Type You Encryption 1.1.4 Data Encryption and Decryption Using Caesar Cipher Machine Translated by Google


Hi! How are you? different Hi! How are you? goo.gl/ 71HnNX Plain text Figure 1.1.5 Asymmetric encryption, which is the encryption and decryption of text using a key CHAPTER 1 Computing 11 Sender Plain text Caesar cipher Receiver &^$#@KgySDL0v Cipher text Encryption goo.gl/ UyN5yV (decryption) and decryption? Decrypt What is encryption delivery medium Caesar Cipher En(x) = (x + n) mod 26 In order to implement the data encryption and decryption process, there are several methods that can be learned and used. One of the simplest methods to understand how the encryption process works is the Caesar Cipher method. Example: letter E3 (A) = (A + 3) mod 26 = D, i.e. [A + sequence of 3 letters (B, C, D)], i.e. using shift or shift to the right 3 times. Figure 1.1.5 shows asymmetric encryption that uses the concept of a "key" pair. Different “keys” are used for the encryption and decryption process. in the Caesar Cipher method is as follows: Thus, the plain text of the letter A is equivalent to the cipher text of the letter D. mod 26 – refers to the number of letters A to Z, which is 26. If the letter is moved to the end of the alphabet, which is Z, the letter will turn to the beginning letter again, which starts with A. done in the same way but by subtracting the amount of displacement. (b) Asymmetric encryption Julius Caesar invented the Caesar Cipher method which is also known as shift cipher. Caesar Cipher is one of the simplest forms of encryption. Caesar Cipher is a substitution cipher, i.e. each letter of the plaintext is replaced with a letter that corresponds to the letter in the alphabet (A-Z). Mathematical formulas used n – refers to the number of shifts (either three or more). Decryption process of cipher text (Ciphertext) Machine Translated by Google


EXAMPLE 2 EXAMPLE 1 Solution: ENCRYPTION Solution: NRPSXWHU 12 Computer Science Form 5 RSTU N Q u PQRSUVWX P X H KLMNOPQRMNOP W TUVWEFGH R plain text From the ciphertext letters, subtract the shift three times. COMPUTER So, the decrypted plaintext is: ABCDEFGHIJKLMNOPQRSTU VWXYZ Given a displacement value, n = 3. HQFUBSWLRQ cipher text Example 2 explains the decryption process of the ciphertext shown, given the shift value, n = 3. Example 1 explains the method to encrypt the following plaintext. ABCDEFGHIJKLMNOPQRSTU VWXYZAB The process is as follows: The cipher text (ciphertext) produced is: plain text The Caesar Cipher technique is easy to implement but its simple structure is easy to break when compared to other techniques. ABCDEFGHIJKLMNOPQRSTU VWXYZ AB cipher text The process of decryption (decryption) of the ciphertext (ciphertext) is done in the same way but by subtracting the shift amount. ABCDEFGHIJKLMNOPQRSTU VWXYZ Machine Translated by Google


Piracy or copyright infringement is the act of copying, publishing or using printed material or digital recording material such as video and computer software without the permission of the copyright holder of the intellectual property with the aim of making a profit. Hackers are cybercriminals who act to intercept network communications to obtain important user data to exploit. Piracy and hacking activities are an offense under the Copyright Act 1987 (amended 1997) and the Computer Crime Act 1996 outlined by the government. Both of these illegal activities result in losses to victims, the industry and the country. ACTIVITY 4 1.1.5 Social Implications of Hacking and Software Piracy There are five location clues that participants need to decipher, namely: Given a shift value of n = 3. Form a group consisting of several members. Then, decrypt the given ciphertext. 1 NDQWLQ Teacher Ramesh held a treasure hunt competition in conjunction with a Day Together Computer Science Club at his school. Teacher Ramesh has prepared a hint at the location where there is a clue to the final location of the treasure for each participant in the form of ciphertext. Caesar Cipher 4 NRSHUDVL 3 VWRU VXNDQ Good luck! 2 SHUSXVWDNDDQ Classroom block Canteen Cooperative Library Administration block Field Sports store Group work CHAPTER 1 Computing 13 Q u B T Machine Translated by Google


Figure 1.1.6 Implications of hacking and piracy activities Ministry official portal The production of natural products decreases 14 Computer Science Form 5 goo.gl/ 1GBxmV There is unemployment in the creative and software industries Report from Domestic Trade, Cooperatives and Consumerism (KPDNKK) on the crime of piracy. Affecting the stability of the country's economy Loss of investor confidence in the country Piracy can threaten the country's creative and software industries Daily Application Implications resulting from hacking and piracy activities •Loss of investor confidence in the country • There is unemployment in the creative industry and software This is said to be so because the investment costs are very high but the returns are not convincing. Investors will lose confidence because they feel that the country does not provide adequate protection of intellectual property and also data security. Figure 1.1.6 shows the implications of the results of hacking and piracy activities for the country. The low quality of pirated products will have an impact on genuine goods and will subsequently affect the production of genuine products. Piracy activities will harm the owners of original works and legitimate producers. Negative impact, especially to the operators of video and song recording companies, films, book publishing and other creative products. Individuals who are directly or indirectly involved in this industry will feel the impact. In order to produce a quality product, we need a research and development (R&D) process. In order to accommodate the smoothness of the research and development process, companies need high investment, especially from companies with large capital from developed countries. If piracy and hacking activities are still prevalent, it is certain that investors will not invest in our country. •Piracy threatens the country's creative and software industry • Production of natural products decreases Piracy and hacking also have a negative impact on the software industry because companies today operate online and use computer systems to manage their operations such as e-banking and e-commerce. User trust will be lost if the security of the user's personal data cannot be properly managed by the company dealing with it. If the customer withdraws, the company will incur losses and will inevitably cease operations. Machine Translated by Google


CASE STUDIES 1.1.6 International Cyber Law Cyber Law Acts in Malaysia goo.gl/ eB4iYes CHAPTER 1 Computing 15 Visit goo.gl/5zxd9M to get more information together with your group members. or the i-Think map. Make sure the software you use is original! Based on the information obtained from the newspaper, state the main industries involved in the use of pirated software. Then, suggest four factors that activate this activity. Come up with a reasonable solution to deal with this problem. Then, present your group's work using software such as PowerPoint, Google Slides The following article is quoted from a local newspaper. The crime of piracy also affects the country's economy when people are distracted by buying pirated goods. This situation increases the unemployment rate if the company is unable to continue operations in the field. Cyber law is a rule set by the authorities in a country to punish offenders who commit crimes online. The country will experience a loss from tax revenue which is one of the country's sources of income. • Affecting the stability of the country's economy The Internet has opened up cyberspace to criminal behavior in ways never before possible. The Internet has offered new and more sophisticated opportunities for criminals to carry out traditional crimes in a modern way. The Malaysian government has enacted cyber crime laws by introducing several acts in cyber laws as shown in Figure 1.1.7. Machine Translated by Google


(through 1997 amendment). In connection with that, the scope of copyright has been expanded, namely the author/creator The creation of an act for cybercrime is a challenge for a country. To deal with the issue of cybercrime, there is no organization, agency or country that is capable of restraining and defending the country from its private attacks. Developing countries, such as Malaysia can refer to the experience of more developed countries such as Australia, the United States and the United Kingdom to analyze the law for the prosecution of increasingly complex cyber crime cases. Existing laws need improvement against crimes such as online gambling, child pornography, intellectual property theft, fraud and identity theft. Table 1.1.2 shows the differences in cyber laws between countries in general. 1997 Telemedicine was introduced. Later, the Copyright Act was amended to meet cyber issues also has the exclusive right to control his invention according to the World Intellectual Technology Property Ownership (WIPO) Copyright Treaty 1996. Along with the development of the current world, more acts have been enacted until now. Differences in cyber laws between countries are not significant due to the existence of joint efforts between government agencies and other national agencies to deal with computer crimes that cross international borders. The implementation of punishment and the way of enforcement depends on the government policy of a country. Among the issues that are often highlighted at the moment are issues such as freedom of speech, obscenity and defamation. Initially, the Computer Crime Act 1997, the Digital Signature Act 1997 and the Act 2006 You Did you know? 1997 1998 2000 2007 2010 and observe how these agencies are handling cyber issues in the United States. Create (amend) Personal data Digital Homeland Communication and Government Optics goo.gl/ Opmzu3 Multimedia Act Electronics Commission Figure 1.1.7 Acts under cyber law trade Criminal Act Multimedia Act Act Students can visit the Department of Homeland Security website Bill of Rights Signature Protection Department of Disc Act Security-USA Act Activities Act Act Act Telemedicine Communication and Electronics 16 Computer Science Form 5 Computer Machine Translated by Google


CHAPTER 1 Computing 17 There is freedom on the issue of pornography except for pornography that involves the abuse of children absolutely Blocking access to the Internet freely, i.e. not allowing access to social media such as There is no absolute freedom No freedom Table 1.1.2 Differences in cyber laws between countries China America Not allowed Company including the media Not allowed Computer 1986, absolutely Facebook by conducting Internet censorship, which is The Great Malaysia No restrictions on social media Block access to the Internet freely Saudi Arabia Not allowed No freedom There is freedom Not allowed Facebook Does not prevent online gambling except illegal gambling subject to the illegal Internet gambling enforcement act from 2006 Criminal Act Not allowed social, like Department of Justice Not allowed Firewall of China Anti-Cyber Crime Law by Royal Decree No. M/17 of March 26, 2007 Computer 1997 Country Criminal Act (PSB) which is responsible for security in the country Gambling Security Bureau The issue of freedom of speech Law by Public Control over social media 1997 Cybersecurity Establishment Security Malaysia Obscenity issue MCMC, Cyber Cyber No restrictions on social media Law (Bill of Guarantees), to ensure no Internet censorship (no censorship of the Internet). However, this matter is still regulated under the jurisdiction of the government that regulates the use of the Internet to ensure the safety and rights of Internet users are protected. The government has created agencies such as the Malaysian Communications and Multimedia Commission (SKMM) and CyberSecurity Malaysia which are given the responsibility to regulate every Internet use activity that may disturb the peace of the country and the business of foreign investors. Freedom in the use of the Internet in Malaysia is subject to the initiative provided by MSC Malaysia, which is the seventh point of the BoG Machine Translated by Google


If we examine the document from the Cybercrime Laws of The United States (refer to the website link: https://www.oas.org/juridico/spanish/us_cyb_ For Muslim countries, activities such as gambling, pornography and sex advertising are a crime but these things are not crimes in most countries. For example, in the United States, such things are not considered crimes. They focus more on security and trade. The Malaysian government also implements joint venture programs with private bodies or organizations to deal with problems in cybercrime. To increase public awareness of the importance of keeping personal information safe, CyberSecurity Malaysia has started publishing a book with Karangkraf, which is a book of true 999 stories, from several cyber crime cases that have been handled by Cyber999. Cyber999 is the agency below According to the report from the US Government Laws regarding the protection of personal data, many more detailed acts have been provided to protect the personal rights of users or citizens. There are some differences in the definition of cybercrime between countries. In addition to domestic agencies, the United States also conducts joint ventures with European countries. Countries that are in the European Union also outline common laws to deal with the problem of cybercrime in their union territory. Joint efforts will be more perfect to deal with cyber problems that cross borders. In Malaysia, the government bodies that monitor, curb the spread and enact cybercrime acts are the Malaysian Communications and Multimedia Commission (SKMM) and CyberSecurity Malaysia. Joint enforcement is also carried out with several other government agencies such as the Royal Malaysian Police (PDRM) (digital forensics division), the Ministry of Domestic Trade, Cooperatives and Consumerism (KPDNKK), Bank Negara Malaysia and the Ministry of Health Malaysia. laws.pdf), the offense of each crime has been detailed and the punishment commensurate with the offense is also stated. In an effort to increase control over cybercrime in addition to law enforcement, the United States authorities also work together with private bodies or agencies to hold awareness campaigns and provide websites for citizens' reference. With that, the people's dependence is not only on government bodies, they can also make complaints through any website that has joint venture programs with legal bodies and bodies that maintain legal affairs for cybercrime cases. A centralized database is needed to serve the needs of access through various websites. Safety Award The Malaysian Cyber Security Award is the industry's highest recognition and appreciation for their contributions in terms of innovation, commitment, industry leadership and also contributions to the general public through the provision of educational services and security awareness. cyber as a community service with no aim to make a profit. Siber Malaysia 2014 is one of the CSM– ACE 2014 events that saw seven categories awarded to companies and individuals for their contribution to 18 Computer Science Form 5 cyber in Malaysia. goo.gl/ MzHA7Q empowering the security industry China Cyber crime Law in Did you know? You Machine Translated by Google


Did you know? You Teamwork ACTIVITY 5 Cyber Law Study the four reasons why cybercrime cases are now increasing even though various acts have been established to punish offenders who commit such crimes. Explain your answer with recent examples. Present your research in the form of slides using PowerPoint software. Copyright is a legal protection granted for a certain period of time to works of creative expression. copyright is an offense under the Copyright Act 1987. works have exclusive rights to their works. • Violation of rights •Copyright owner CHAPTER 1 Computing 19 Computing can be divided into four main areas as shown in Figure 1.1.8. Malaysia introduced several acts in cyber law as shown in Figure 1.1.7. Each act contains Section 9 of the Computer Crime Act gives broad jurisdiction to law enforcement units but problems may arise for hackers living outside Malaysia because it will interfere with the country's criminal jurisdiction. Things that can be done are like extraditing the people of that country. This can be done if there is cooperation at the international level to solve the problem of cybercrime. Careers in computing relate to the design, creation, management and maintenance of various components of systems including software, hardware, integration and multimedia systems. several broken sections to deal with the problem in detail. Every detail of the law produced will then be improved until it reaches a better standard. For example, the Computer Crime Act 1997, which deals with offenses relating to the misuse of computers for the purpose of committing a crime was enacted. Under this act, unauthorized access or alteration of any program or data contained in a computer is wrongful and punishable. This Act contains 12 sections. Section 9 of this act states, "It is effective for any crime committed outside Malaysia even if the offense is committed by a person or from a place outside Malaysia as long as the computer, program or data is in Malaysia or can be reached, connected or used with a computer in Malaysia". CyberSecurity Malaysia which handles complaints related to identity theft, fraud and online harassment. This program is a general awareness program. 1.1.7 Career in Computing Machine Translated by Google


Table 1.1.3 shows the roles and careers available in the field of computing. Area Career: Systems analyst, computer systems engineer, software developer, computer programmer Skills: Java, C#, C++, .Net, SharePoint, Python Skills and careers Careers in this field are responsible for planning, designing, updating and managing computer software and systems through programming and software development. Career: Information security analyst Career: Database administrator, computer systems analyst, big data analyst, computer support analyst, computing manager, computer system administrator Roles and responsibilities Careers in this field are responsible for handling all aspects of network security, including encryption, firewall administration and network protocols, and may handle a variety of responsibilities from developing security policies to conducting risk assessments and security audits, or recommending improvements to data security systems to address data security intrusions. . Programming and software development Table 1.1.3 Roles and careers in the field of computing Web and digital communication Information support and services Networking and security systems Programming and software development Major field in computing network service Skills: Expertise in networking and computer security Careers in this field are responsible for integrating business management and data analysis, evaluating the implementation of computer systems to solve complex business problems, providing computing support and technical support, maintaining information systems for businesses and making recommendations about software and hardware to achieve business objectives. Network systems and network security Skills: In business application software involving database management Figure 1.1.8 Four main areas in computing 20 Computer Science Form 5 Information support and Machine Translated by Google


Cutting Edge Elements in Computing Affecting Career Development New CHAPTER 1 Computing 21 Understanding Information Technology: A Guide To IT career opportunities goo.gl/ mzLzXO ÿ When there is cloud computing (cloud computing), virtualization (virtualization), improvements in data security also receive attention. The need for expertise in the areas of encryption, authentication, certificate management, firewall infrastructure and anti-malware is increasing. The need for the careers of data security analysts, network security administrators and system security administrators also received high attention. ÿ The ability to translate, analyze and the ability to transform large quantities of raw data into information form is an important weapon in the global economy. Business • Data security The transformation in the computing industry has led to the development of new career fields in computing. Three elements have been identified as the main infrastructure components for products and services in the industrial sector today including: (business intelligence & analytics) (mobile apps and content) for devices other than computers. •Mobile ÿ Involves the production of mobile applications and content • Big data and business intelligence & analytics around the world requires trained computing specialists as data managers who have an interpretive skill set that understands how to obtain data, analyze and report on that data. Area Careers in this field are responsible for developing web-based applications, writing code, integrating systems and providing technical assistance. One needs to develop and produce interactive media, including digital and multimedia products. Multimedia software and hardware such as Adobe Photoshop. Web and digital communication Skills and careers Skills: JavaScript, HTML, AJAX, PHP, .Net, Python. Roles and responsibilities Career: Website developer, multimedia software developer, digital media specialist, graphic and multimedia designer Machine Translated by Google


1 contribute to the change of the traditional learning system to e-learning or better known as e-learning. , using two layers of authentication, i.e. using keywords security or biometrics in addition to using passwords to make data intrusion from unauthorized parties difficult. and 2 Different types of encryption. 5 3 Innovation in technology is a process of converting plain text to cipher text to prevent unauthorized access. is an encryption process that uses key pairs that 4 which was amended in 1997 aimed at addressing the issue Cybercrime Act. Did you know? You Computer science http://www.pikom.org.my/ Computer network http://www.careerjet.com.my/computer-science-graduate jobs.html The Computer and Multimedia Industry Association of Malaysia (PIKOM - The National ICT Association of Malaysia) http://www.payscale.com/research/MY/People_with_Jo bs_in_Computer%2FNetwork_Security/Salary#by_Job IT in Malaysia Research about jobs in the field Multimedia creative field php?id=21&field=7 The field of data security (iii) http://www.cybersecuritycareers.net/MY/#jobresults (ii) http://cic.jobsmalaysia.gov.my/html/kerjaya-1-1. (i) http://MDeC.my (ii) http://www.SKMM.gov.my Digital Forensics Department https://jobs.laimoon.com/malaysia/computer-forensics (i) http://www.mosti.gov.my/faqs/cybersecurity-malaysia/ strengthening exercises 1.1 related to the field of computing. Table 1.1.4 shows some website links for agencies Table 1.1.4 Links to websites in the field of computing 22 Computer Science Form 5 What is digital forensics and how does it relate to computer crime investigation? Area Link goo.gl/ wZEmtQ Machine Translated by Google


CHAPTER 1 Computing 23 No. The situation (iii) (iv) ÿ/ÿ Help spread flyers asking for help or donations through social sites such as WhatsApp, Facebook sent by friends. (ii) Sending product sales promotion ads to contacts and non-contacts via email. While building a website, it is found that there is a website similar to the desired one, then students copy, modify it and publish it as their own website. (v) Downloading free software from the Internet into school computers. Employers monitor and read employees' emails without the employee's knowledge. (i) 7 Is changing the situation during a traffic light so that it causes the traffic to become a mess and may create an accident categorized as a cyber crime? Discuss the answer and give your reasons. 8 Which cyber crime law act will be used for punish offenders who use licensed software but do not follow the prescribed conditions? For example, the number of licenses purchased is not the same as the number of hardware using them. 6 Mark “ÿ” (for ethical) or “ÿ” (for unethical) for the given situation. Machine Translated by Google


1.2.1 Explain the fetchdecode-execute cycle (FDE–Fetch, Decode, Execute Cycle) Memory Unit linear and processor At the end of learning students can program execution in a processor 1.2.5 Summarizing 1.2.3 Studying processor differences 24 Computer Science Form 5 Output Device Figure 1.2.2 Intel Core i7 Processor Input Device Unit and goo.gl/ Wfxp0q Center Timeline of Computer History Processing Unit 1.2.4 Discusses the translators of various levels of programming languages current Computer architecture Figure 1.2.1 Main components in computer architecture 1.2.2 Explain the basic concepts of architecture (Von Neuman) – Control unit, ALU (Arithmetic Logic Unit), register, clock, address bus and data bus 1.2 (a) Arithmetic and Logic Unit (ALU)—Performs arithmetic operations and logical operations. input and output devices. Figure 1.2.2 is an example of a modern processor. The Central Processing Unit is also known as the processor or CPU which is the "brain" of the computer system. The CPU consists of the following components: Computer architecture is divided into three main components as shown in Figure 1.2.1, namely the Central Processing Unit (UPP) or known as the Central Processing Unit (CPU), Memory Unit, and Input Device Unit and Output Device Unit. (b) Control Unit—The unit that controls the operation of the memory, processor and (c) Register (Register)—Functions to store data temporarily, send the instruction reached from the main memory before being processed in the ALU and receive the result from the ALU before being sent to the main memory. Computer Architecture Central Processing Unit (CPU) Introduction to Computer Architecture Learning Standard Machine Translated by Google


Figure 1.2.3 is an example of RAM main memory. Memory location cells can be described as in Table 1.2.1. Input and output devices are components used to enter data and display results from a computer system. The main function of the memory unit is to store data and instructions when the computer is in use. Memory only stores or holds data and instructions temporarily, i.e. as long as the instructions that refer to it are still operating. Memory units are not used to store data permanently because these units are volatile. Volatile memory will lose its contents if the power supply is interrupted. This is specific to the main type of memory, which is RAM (Random Access Memory). Main memory is divided into two types, namely RAM and ROM (Read Only Memory). The instruction set in ROM will remain forever. The output device displays the results processed by the computer in a form that can be understood by humans. For example, printers, monitors and speakers. Figure 1.2.4 shows some examples of input device components and output devices. Input devices convert external data into a form that can be understood and then processed by the computer. For example, keyboard, touch screen, scanner, voice recorder and mouse. Memory Unit Input and Output Devices Figure 1.2.4 Input devices and output devices Figure 1.2.3 Dynamic Random Access Memory (DRAM) Printer Monitor, keyboard and mouse CHAPTER 1 Computing 25 In addition to the input and output devices already discussed, name three other input and output devices that you know of. Table 1.2.1 Memory location cells Speaker 1110 1110 1000 0011 Memory content 1000 0010 1111 1111 1111 1110 Memory address 1000 0000 1000 0001 1100 1111 0101 0110 1000 1000 0111 0110 Mind Test Machine Translated by Google


(Access-Decode-Execute) Did you know? You 1.2.1 Machine Cycle 1 Fetch—The control unit signals the processor to fetch data and instructions from main memory and store them in registers while waiting to be processed. The main task of the CPU is to execute instructions to process data. The processing of data and instructions follows a machine cycle, which is the fetch-decode-execute cycle (FDE: Fetch-Decode-Execute Cycle). FDE is also known as the instruction cycle. Figure 1.2.5 shows the processes that occur in the machine cycle in the CPU. 1 The processor sends signals so that data and instructions entered through the input device are copied into main memory. The data and instructions are processed through three main processes in the machine cycle to produce output. The processes are as follows: 3 3 Execute—The processor performs arithmetic and logical operations on the data as specified by the instructions. 2 2 Decode (decode)—The control unit decodes or translates instructions to determine the type of operation to be performed by the ALU. The processor will repeat the access-decode-execute process until all data and instructions are processed. As this process is repeated, the processing result is temporarily stored in the register until it is finished and the final result is sent to the main memory to be displayed through the output device. Figure 1.2.5 Processes in the machine cycle (access-decode-execute) (RAM) RAM (fetch) MAIN Central Processing Unit (CPU) (Execute) goo.gl/ I9qox8 MEMORY Achieve Do it The fetch-decode execute cycle (Decode) See the following diagram to remember the accessdecode-execute cycle more easily. Decode Control Control unit ALU Units ALU 26 Computer Science Form 5 Register Register Machine Translated by Google


ACTIVITY 1 Did you know? You 3 If the decryption process cannot be done, is the cycle reached 5 The third member has to perform the task from the decrypted cipher text. Access-Decode-Execute cycle 2 Build a diagram of the access-decode-execute cycle. 4 The second member needs to decrypt the given cipher text and then hand it to the third member. 3 Then, the second member will take the first card from the first member. (Note: Assignments can include areas in the classroom or outside the classroom according to the teacher's creativity.) 2 The teacher will give ten pieces of cards containing the cipher text for the task done to the first member. 1 Form a group consisting of several members. execute in the access-decode-execute cycle? 1 Which of the steps 3 to 5 resembles the process Do the following activities. decode-execute can still continue? 6 Once the assignment is complete, repeat steps 3 to 5 for the other cards. Based on the activities that have been done, answer the following questions. 1.2.2 Basic Concepts of Computer Architecture (Von Neuman) There are three main components in the Von Neuman architecture, namely the CPU, memory, and input and output devices. These components are connected by a bus system. All computer software is built from instruction sets, i.e. instructions encoded in binary. The access-decode-execute cycle is the sequence of processes that the processor must follow to process the instruction set to completion. In 1945, John Von Neuman came up with the idea of creating a method to store computer programs in a computer system. The idea is that programs and data are stored in memory and moved from the memory unit to the processor. This concept is referred to as Von Neuman architecture. 5 Once finished, the processor will return to achieved, the command needs to be decoded and executed. program to see which instructions will be executed. 4 After the instructions 1 The processor checks the counter repeat until the program ends. goo.gl/ JQptJO memory. reach-decode-execute: 6 Cycle will next command. 3 The processor reaches the value of the instruction from the location Formula for cycles John Von Neumann the memory where the next command is located. program counter to search CHAPTER 1 Computing 27 internal address 2 The program counter provides a value Group work Machine Translated by Google


Bus address Before (RAM) input/ Guidance: ARITHMETIC UNITS output AND LOGIC ALU control bus AND OUTPUT Control unit After MEMORY Control bus Table 1.2.2 Types of buses Register MAIN 28 Computer Science Form 5 Central Processing Unit (CPU) CONTROL UNIT The diagram below shows the four main components in the CPU before data bus address bus INPUT UNIT and after the construction of CPU Von Neuman. REGISTER Figure 1.2.6 Von Neuman architecture and bus system Hours CPU RAM Data bus Central Processing Unit (CPU) (a) Internal bus—Connects the internal components of the processor and allows the components to exchange information. (b) External bus—Connects the processor with external components such as memory and input and output devices. Figure 1.2.6 shows the Von Neuman architecture whose component parts such as the CPU, main memory and input/output are connected together through a bus system. The bus system is divided into two parts, namely the internal bus and the external bus as shown in Figure 1.2.6. The external bus is divided into three types, namely data bus, address bus and control bus as shown in Table 1.2.2. The Central Processing Unit (CPU) is the most important component of a computer system. Another name for CPU is processor. Data processing and instructions are done in the processor. There are three main components in the processor, namely Arithmetic and Logic Unit (ALU), registers and Control Unit. Bus System Did you know? You •bring the address of the location •between registers, units A bus containing •control signals which memory and input/ output devices The bus used to transfer data • between processors, The bus used for •contain address input/output devices used to control the operation of the entire system control and ALU which houses data and instructions in main memory Machine Translated by Google


Did you know? You (iv) MDR (Memory Data Register) Examples of the types of registers involved and their functions in the machine cycle (ii) ACC (Accumulator/Accumulator Register) Holds data and instructions that are read from memory or that are to be written to memory. The command content in the MDR will be sent to the IR, and the data content will be sent to the ACC. A component used to store data and instructions reached from the main memory before being sent to the ALU for processing and storing the processing results temporarily before being sent to the main memory and displayed through the output device. This register holds the address of the information location in main memory. When the processor wants to access data from memory, the processor will signal the address of the required memory location from the PC and copy it into MAR. (b) Register The control unit receives and generates signals to control the operation of the entire computer system. Its main input is the signal pulse from the clock system. The control unit contains the command decoder and timing and control logic. Perform arithmetic operations such as (add, subtract, divide, multiply, negative values and so on) and logical operations such as (AND, OR, NOT, X OR and so on). The ALU receives input from the registers in the CPU and generates information to be sent to the registers before being stored in memory. (c) Control Unit The PC will copy the previous address to the MAR register, the PC value will increase. This register will always point or hold the address of the next instruction to be reached. Contains the latest instructions to be executed. The control unit will decode these instructions to determine the type of operation that needs to be performed by the ALU. Used to hold the main memory address at the beginning of the machine cycle process after receiving instructions from the CPU. (iii) MAR (Memory Address Register) (v) IR (Instruction Register) (a) Arithmetic and Logic Unit (ALU) (i) PC (Program Counter/Program Counter) Used to store data that is input and output during ALU operation. data processing. ALU Signal Signal Data flow The MAR register and the MDR register are important for communication between the memory and the processor unit. The following diagram shows the relationship between the MAR register and the MDR register to explain the communication between the memory and the processor unit. Control Unit MAR MDR Processor Unit CHAPTER 1 Computing 29 Memory acc Machine Translated by Google


3 Then, build the Von Neuman computer system you have learned using the used items. 1 MHz ÿ 1,000,000 cycles per second 2 Form a group consisting of several members. •Intel Core i7 995X 3.6GHz •Intel Core Duo 2.0GHz •Intel Core i5 430M 2.27GHz Computer 4 After completion, present and present your build and the history of Von Neuman's computer architecture in class. Science Innovation Example 1 shows how to calculate processor speed in cycles per second. Given 1.3 GHz, how many cycles per second? 1 GHz = 1,000,000,000 cycles per second 1.3 GHz = 1,300,000,000 cycles per second Basic Concepts of Computer Architecture 1 The teacher instructs the students to bring used items to class. For example, paper, plastic bottles and drink cans. 1 GHz = 1,000 MHz 5 The teacher needs to give marks to each group. Teacher evaluation is based on the most creative, interesting and smooth presentation aspects of computer system construction. Group work The Wharton computer within 30 years. Scan the following QR code to see goo.gl/ vg5Z2m the innovation. conducted a survey to determine 30 innovations Bus system goo.gl/ Cxzwp0 30 Computer Science Form 5 School of Business An instruction requires one machine cycle to execute. This means, the computer can execute 160 million instructions in one second. Thus, the higher the hertz speed, the faster the computer. A clock is a chip device in a processor that generates electronic pulses at a constant rate to standardize all computer operations. The unit used to calculate the clock speed in the processor (clock speed measurement) is hertz. One hertz is one pulse/cycle per second. An example of CPU speed is as follows: If the clock has a rate of 160 Mhz, then this indicates that the clock has a frequency of 160,000,000 pulses/cycles per second. The processor will use these pulses when executing instructions in a machine cycle. Therefore, if the CPU has a clock speed of 160 Mhz, then the processor can process 160,000,000 machine cycles per second. Solution: Clock system EXAMPLE 1 ACTIVITY 2 Machine Translated by Google


Linear with Current Processor sequential instructions. Given three instructions to process each instruction will be completed according to three phases (IF, ID, EX) in the machine cycle. Assume that each phase is assigned the same value of processing time. Thus, to complete the three instructions, the total time required is nine. Figure 1.2.8 shows the use of pipeline techniques in the current processing. Linear processing is also known as serial processing, i.e. the processor processes data and instructions sequentially as illustrated in Figure 1.2.7. The processor processes data and instructions The following description is an example of a sequential representation of data processing stages and instructions by machine cycle (IF, ID, EX) for linear processing and current processing. Figure 1.2.7 shows the processing This technique allows the processing of overlapping instructions (overlapping) as illustrated in Figure 1.2.8. The measure of how fast a computer performs a task depends on its processor's capabilities. Processor components are constantly being studied in terms of their logic circuit manufacturing technology so that they can process data at a high speed. There are two types of processing, namely linear processing and nonlinear processing implemented in the current processing. Current processing is also known as non-linear processing or parallel processing. This processor can be configured to perform multiple tasks at one time (multitasking). Current processors are able to execute several instructions simultaneously by using pipelining techniques. This technique is used as one of the methods to improve the performance of current processors. This technique divides the processing into several phases. Each phase will complete a part of the instructions and be executed in parallel and concurrently. At one point, phase overlap can occur according to the cycle of the machine, that is access(IF)-decode(ID)-execute(EX) and this step is repeated until the data and instructions are finished processing. Linear processors are only suitable for executing simple instructions. 1.2.3 Differences between Processors Current You Current Processing Comparison of Instruction Execution between Linear Processing Did you know? Linear Processor with Processor Larger para memory compared to Level 1. The more Level 2 and Level 3 there are, the faster computer instructions can be executed. goo.gl/ CL80F3 CHAPTER 1 Computing 31 3 Level 2 and Level 3 The memory is part of the CPU chip itself. education/ guides/ zmb9mp3/ revision/ 3 3 Level 1 Pipelining http:// www.bbc.co.uk/ is a small memory in the CPU. Para memory is used as a temporary storage place for instructions and data that the CPU will use again. Para's memory has several levels, namely Level 1, Level 2 and Level 3. The size is limited between 8 KB to 64 KB. Source: Memory (cache) Machine Translated by Google


Based on your knowledge in the use of pipelines, color the spaces in the diagram for pipelined and linear execution of instructions. Happy Decode Instructions 1 2 3 4 See the following diagram. try it! Achieve Figure 1.2.7 Execution of instructions linearly Instructions 5 6 7 8 32 Computer Science Form 5 Hours 1 2 3 4 Decode Hours 5 6 7 8 Do it Achieve Do it Figure 1.2.8 Execution of instructions using the pipeline technique (pipelining) Ex Ex 1 Instructions 1 2 Ex Instruction 3 2 id Ex IF IF 6 Ex 3 Time (milliseconds) First instruction Third command Ex 8 Time (milliseconds) IF 1 9 id 4 IF 6 Instruction 2 IF IF Second command id 7 id id 5 4 id 3 5 To complete three instructions, three cycles are required with a total time of nine milliseconds. Cycle 1 for the first command To complete three instructions, the total time is five milliseconds. This technique is used in current processors such as in Intel Core processors and used in microcomputers or supercomputers. Table 1.2.3 shows the difference between linear processing and current processing. because there are phases that are implemented simultaneously. For example in the second millisecond, two phases are executed simultaneously, namely the ID phase of the first instruction and the IF phase of the second instruction. Thus, the time required to process three commands to completion is five milliseconds. Processing time becomes shorter. This will improve the performance of command processing. Cycle 3 for the third command instructions for linear processors and current processors. Cycle 2 for the second command Figure 1.2.7 and Figure 1.2.8 show the difference in implementation Mind Test Guidance: Machine Translated by Google


1.2.4 Programming Language Translator Current processing • Linear processors are less effective in data processing • Linear processors can only do one task at a time, these processors are slower. Pipeline Techniques Linear processing and long and complex instructions. With that, the processor can quickly perform multiple tasks at a time. You and your friend are given the task of using current processing to solve the following problem. complex. Suren, Amar and Kok Shoon have opened a laundry shop. Every day, they will separate the received clothes into six sacks. The clothes in each sack need to be washed, dried and folded. Each wash takes 20 minutes, drying 30 minutes and folding 40 minutes. They often do this task starting from 4 pm until 10 pm. How can Suren, Amar and Kok Shoon save their time to do all these tasks? By what time would all the tasks be completed by them if a smarter alternative were used? • More effective because the instructions are divided into several parts and executed separately. • More effective for the execution of long instructions and Computers will perform tasks by following instructions or sets of instructions written by programmers using various types of programming languages. Computers only understand language in the form of machine code (binary digits 0,1). Figure 1.2.9 shows a program written in the form of a programming language that needs to be translated into a form of machine language before being understood by a computer. Programming language Else Need a translator Printf (....) Communicate Using machine language 101010101 Sum no1 + no2 If (condition) Printf (....) Table 1.2.3 Differences between linear processing and current processing Figure 1.2.9 Communication between humans and computers CHAPTER 1 Computing 33 Group work ACTIVITY 3 Machine Translated by Google


EXAMPLE 2 Programming languages can be categorized into two levels as shown in Figure 1.2.10. High-level languages use statements that are easy for programmers to understand because the language is very similar to human natural language. High-level languages can be categorized into two types, namely object-oriented programming languages and structured languages. These high-level languages are easier to learn and thus, easier to use for building programs. As a programmer, students do not need to have knowledge or understand hardware and instruction sets in the form of computer binary code because all of them have been implemented by highlevel programming languages. Total = number1 number2 For example, JAVA, Visual Basic, PHP, Python are object-oriented languages while examples of structured languages are C, PASCAL, COBOL and FORTRAN. Example 2 shows instructions in a program to get the product of two numbers using a high-level language. Programming Language You Did you know? Object-oriented and visual language 3 Portability Machine Language Level language height low The advantages of using a highlevel programming language are as follows: http:// mathstat.slu. edu/ Level language Source: (Assembly language) Assembly language 3 Have good support from the aspect of software maintenance Categories of programming languages 3 Have better support from the aspect of software reuse 3 Has many types of data and memory management 34 Computer Science Form 5 Structured language (portability) that is better Figure 1.2.10 Categories of programming languages High Level Programming Language Machine Translated by Google


A low-level language is a statement used to construct instructions for a computer, in the form of simple symbols, as shown in Table 1.2.4. Machine language is a language that is difficult to understand and manipulate. The form of machine language statements depends on the type of computer. A program in machine language is built from a sequence of binary digits (01011100). Not many programmers write programs in assembly language except for certain reasons such as using special hardware and doing tasks quickly. Programmers need to understand processor architecture and the function of each piece of hardware in a computer system. EXAMPLE 4 EXAMPLE 3 Low Level Programming Language Machine Language CHAPTER 1 Computing 35 Table 1.2.4 Use of symbols in assembly language Command Symbol Meaning ADD Add Example 4 shows a program written in machine code instructions to add two numbers. 1111 00000000 (halt) Hexadecimal Machine code (binary) Saves results to memory LOAD (ACC ÿ number1) 0100 00001000 1 (total ÿ ACC) 4 Example 3 shows the instruction to multiply two numbers written using assembly language. MUL or MPY Reject Meaning MUL number 2 DIV Logical functions in Boolean Y = 12 + 8 0010 00001100 Access data from memory OR, NOT, AND STORE amount F (ACC ÿ ACC × number2) STORE 0 0000 00011110 Instructions Share SUB Multiplication LOAD number1 Machine Translated by Google


The Java programming language is a language that involves two processes during translation, i.e. it is compiled and interpreted before being processed by the processor. In the early stages of Java programming, the javac compiler converts the program into a form called bytecode. This process takes place in JVM memory. The bytecode is then interpreted by another program called Java. These Java programs interpret the bytecode line by line and convert it into machine code form for execution by the processor. Figure 1.2.11, Figure 1.2.12 and Figure 1.2.13 show the process that occurs when a high-level programming language is translated into machine code before processing. Translator (translator) Programming Language The task of the translator is to convert instructions in a form understood by humans to a form understood by machines, that is from high and low level programming languages to machine language before the program is executed. The high-level language translation process is done either by compilers or interpreters. The compiler converts the entire source code of the program into machine code before execution. An interpreter converts a program's source code line by line, one line at a time. Interpreter is more interactive than compiler while assembly language is translated into machine language by Assembler. Table 1.2.5 shows the programming languages that operate under the respective translators. Figure 1.2.11 Use of interpreters and compilers High level programming language Compiler Java, Visual Basic, C# 36 Computer Science Form 5 Table 1.2.5 Programming languages with their translators Figure 1.2.13 Use of an interpreter Python, Perl, PHP, Ruby Figure 1.2.12 Use of a compiler (compiler) C, C++, COBOL Interpreter ÿ ÿ programming ÿ Machine code C ÿ bytecode programming Java Machine code programming Machine code Language Language Compiled (Compile) Interpreted Language Interpreted Compiled (Compile) Python Machine Translated by Google


EXAMPLE 5 in a Processor Y = MX + C Solution: STORE Y [ Store the final result Y into memory ] Example 5 describes the process behind each instruction written in assembly language to solve an equation in a high-level language. What is the instruction set for solving the following equation? ADD Y, C [ YY + C; the product of M * X value + C value ] Translation MUL Y, X [ YY * X; M value * X value stored in Y ] MOVE Y, M [ Y M; moved the X value into the Y register ] Figure 1.2.13 is a representation of the implementation of C programming that is input through an input device and compiled with a translator according to the type of compiler that is usually built together with the programming language itself. For example, DEV software C+ +, Microsoft Visual C, and Turbo C. These compilers convert high-level programming languages into machine language and send them to memory to be stored while being processed. The control unit will provide signals to access data and give instructions from main memory. The data and instructions will be sent to the memory registers in the processor via the data bus. Data and instructions will go through the machine cycle (access-decode-execute) in the processor (CPU) until all instructions are completed and then save the processing results to the main memory through the data bus to be displayed on the output device. Figure 1.2.14 shows a summary of the implementation of command processing in a computer system. Using instructions in assembly language, write instructions to process the following equations: Y = A / (B + C) •F = A – B/C Supercomputers goo.gl/ vPDUuA CHAPTER 1 Computing 37 Individual Work 1.2.5 Summary of Program Implementation ACTIVITY 4 Machine Translated by Google


3 Give two examples of input and output devices other than those mentioned in this book. 7 is a memory component in the CPU (Central Processing Unit). types of compilers and interpreters. 10 Give the difference between a linear processor and a current processor. 2 6 What is the purpose of using translator software? Give examples of translator software , 9 What is the function of the clock system in the CPU? . . and 1 State the three main components in computer architecture. oriented language) is . 8 One example of a high-level programming language that is object-oriented (object 5 The three basic activities in the machine cycle in sequence are is in the category of low-level programming languages. 4 Data fetched from main memory is decoded at and C E A B D Data and instructions printf(“%d”,y);} Decode temporarily stored in main memory u y=m*c; 38 Computer Science Form 5 Data and instructions L {int y,m=10,c=3; Data and instructions in the form of programming language become input to the computer system A #include<stdio.h> main() Figure 1.2.14 Summary of the implementation of command processing in a computer system The output is displayed on the computer screen Through the machine cycle Access data and instructions from main memory Register Control Unit 2 Main Do it (RAM) compiled/interpreted Memory Central Processing Unit (CPU) 1 3 3 1 2 strengthening exercises 1.2 Machine Translated by Google


1.3.1 Introduction to Integrated Circuits 1.3 (NOT, AND, OR) (ii) Combination of logic gates (NOT AND, NOT OR, XOUT, XTOUT OR) Pin (i) Basic logic gates (i) Basic logic gates (NOT, AND, OR) The host 1.3.3 Construct a truth table and Boolean expression to describe the following logic gate actions: Gold sheet 1.3.2 List and draw the following logic gate symbols: Chips 1.3.1 Explain logic gates as the basic construction of integrated circuits 1.3.6 Generate logic gate circuits and truth tables based on logic statements CHAPTER 1 Computing 39 At the end of learning students can 1.3.7 Generate logic gate circuits with truth tables and complete Boolean expressions in solving problems 1.3.5 Construct a Boolean expression for a combinational logic circuit that has two inputs (NOT AND, NOT OR, XATAU, XTATAU) (ii) Combination of logic gates 1.3.4 Construct a truth table for a combinational logic circuit that has two inputs Figure 1.3.1 B13-1 Integrated circuit construction Logic Gate An integrated circuit is an electronic circuit consisting of a combination of electronic components (transistors, resistors, diodes and capacitors) necessary to perform the various functions of a logic gate. These gates are connected into a complete circuit and reduced thousands of times from the original size, then placed on a piece of silicon and called a chip or microchip (chip). Gold foil is used to connect the chips to the pins of the integrated circuit. Binary logic uses two states, namely '0' for no current or 'low current' and '1' representing current or 'high current' in digital electronic systems. Electronic circuits in computers are built with thousands of logic gates. Logic gates are the basic building blocks of integrated circuits. A logic gate has two inputs and one output. A logic gate accepts input in binary form (0,1) and also produces output in binary form. Integrated circuit chips are divided into several types based on the number of gates in them. Table 1.3.1 shows the evolution of integrated circuits. A plastic or metal housing is usually used to protect the debris from damage. The more pins on an integrated circuit, the more functions it has. Figure 1.3.1 shows an overview of the construction of an integrated circuit. Digital electronic devices are now becoming more popular along with developments in integrated circuit technology (integrated circuit) or IC. Standard Learning Machine Translated by Google


You Did you know? Did you know? You The use of this integrated circuit is very widespread, for example used in mobile phones, computers, televisions and various electronic equipment. Figure 1.3.2 shows the types of components in an integrated circuit. goo.gl/ 07EPvP Figure 1.3.2 Transistor, resistor, diode and capacitor ÿ Can control Integrated Circuits Resistor Table 1.3.1 Evolution of integrated circuit (IC) at low voltage Diode Transistors These two circuits are often distinguished because each has its own advantages. Among the advantages of integrated circuits are: Capacitor ÿ Can work (ANSI) is a standards body that creates gate symbols used in digital logic circuits. In addition to the integrated circuit (IC), there is another circuit known as a discrete circuit. ÿ Cheap Institute of Electrical and Electronics Engineers (IEEE) / American National Standards Institute ÿ Has a small size limited power 40 Computer Science Form 5 MSI: Mid-scale integration Year Number of logic gates per chip Type Usage SSI: Small scale integration NOT OR) 1967 – 1971 VLSI: 1991 – 1999 <12 (AND, OR, NOT AND, 100 – 9999 Get logical 1961 – 1966 1972 – 1980 >1,000,000 LSI: Large scale integration Microprocessor for graphics processing GSI: Giga-scale integration 2000 – present Pentium IV processor 100,000 – 999,999 8 bit microprocessor Ultra large scale integration 1981 – 1990 10,000 – 99,999 16 bit and 32 bit microprocessors Multiplexer & Computer memory ULSI: Demultiplexer Adder/counter flip-flops 12 – 99 The integration of scale is enormous Machine Translated by Google


B13-7 B13-8 1.3.2 Logic Gate Symbols B13-13 B13-9 B13-11 Basic Logic Gates (NOT, AND, OR) Logical Gate Combinations (NOT AND, NOT OR, XOUT, XTOUT) Get AND + Get NOT + Get OR ANSI, which is an international standards body, has created logic gate symbols to facilitate the process of understanding and learning. Logic gate symbols can be classified into two groups, namely basic logic gates and combinational logic gates. Get AND + Get NOT Logic gates are the basic elements to form an electronic circuit for a digital system. IEEE/ Get OR + Get NO Table 1.3.3 shows the types of logic gates resulting from the combinations of basic logic gates specified in Table 1.3.2. Get AND + Get NOT + Get NOT OR Table 1.3.2 shows the types of basic logic gates and symbols to represent logic gates used by the IEEE/ ANSI standard organization body. Table 1.3.3 Names and symbols of combinational logic gates CHAPTER 1 Computing 41 Table 1.3.2 Basic logic gate names and symbols B13-10 (Said to be exclusive OR A combination of logic gates XATAU NO AND AND The name of the logic gate (Referred to as exclusive The name of the logic gate NO OR XTAKATAU NOT-OR) Logic gate symbol NOT OR) Logic gate symbol Machine Translated by Google


Number of input variables Sum of input probabilities The number of inputs for a logic gate is two and can be more except for the TAK gate which has only one input. goo.gl/ GDvmXO 42 Computer Science Form 5 Table 1.3.4 Determines the total probability of input combinations Boolean Algebra Truth Tables Individual Work Logic Gate Draw the following logic gate symbol. In order to build a truth table, the number of inputs needs to be considered first. Input can be represented in the form of variables that can be expressed with letters such as A, B, C, D, X, Y, Z and so on. The number of inputs will determine the probability of a combination of inputs passing through the gate. Table 1.3.4 shows the method of determining the total probability of actual input combinations to the circuit based on the number of input variables given. A truth table is used to check the output produced from logic gates or from logic circuits. Truth tables are also used to prove Boolean algebra theorems. 1.3.3 Build Permission Table and You Did you know? Gate name Symbol OR NO OR NOT NO AND 2 22 = 4 1 21 = 2 4 24 = 16 3 23 = 8 ACTIVITY 1 Boolean expressions Machine Translated by Google


Click to View FlipBook Version