Materi TIK Terbaru

tik-buku

Inilah usulan materi Terbaru TIK yang dirancang oleh Pak Onno W Purbo:

1. Pilihan Nama Mata Pelajaran
– Prakarya Konsentrasi TeknoIogi Informasi (sesuai dengan nama prodi di Perguruan Tinggi)
– Prakarya Konsentrasi Ilmu Komputer (sesuai dengan nama prodi di Perguruan Tinggi)
– Prakarya konsentrasi TIK
– Prakarya konsentrasi Computer Science
– Prakarya fokus TIK
– Prakarya fokus Computer Science

2. Sarana & prasarana yang perlu disiapkan
– lab komputer
– jaringan lokal, server lokal
– e-learning menggunakan server moodle lokal di sekolah
– fasilitas untuk sharing soal, bank soal & bahan antar sekolah

Solusi untuk sekolah daerah
+ kerjasama lintas sektoral – CSR PLN, Telkom, Operator, KOMINFO, TNI dll.
+ lab komputer menggunakan raspberrypi / orangepi (contoh Dewis Akbar)
+ server moodle, dapat menggunakan moodlebox + raspberrypi (contoh Dewis Akbar)
+ listrik tenaga surya + power bank (raspberrypi bisa menggunakan power bank)
+ perkiraan investasi Rp. 300-500.000,- / raspberrypi.

Optional / Advanced
– mengoperasikan server untuk perpustakaan digital, sharing materi antar guru & sekolah.
– mengoperasikan server video streaming lokal, sharing materi antar guru & sekolah
– mengoperasikan server SIM sekolah, contoh SISFOKOL

3. Penyiapan kompetensi guru TIK
– Standarisasi komptensi guru TIK
+ sarjana komputer, perlu pelatihan untuk menjadi guru
+ bisa mengikuti program pembelajaran berkelanjutan (SIMPKB)
+ bisa lulus ujian kompetensi guru TIK
+ sarjana non-komputer penyetaraan melalui P4TK
– mekanisme training / pemberdayaan guru TIK
– pembuatan e-learning utk pemberdayaan guru

4. Pilihan Substansi Mata Pelajaran untuk SMP
Tujuan Utama
– Membuat anak tertarik pada dunia komputer
– Mengasah kemampuan sharing di dunia maya
– Menguasai skill agar aman di dunia maya

Materi
– Sejarah tokoh-tokoh IT dunia dan Indonesia
– Sejarah komputer, sejarah Internet dunia & Indonesi
– computational thinking
– berinternet yang aman / cyber safety
– skill office, komputer, grafik
– menulis / bercerita di blog / media sosial

Optional / Advanced Topik
– Dasar Basis Data
+ struktur database, DBMS, DDL, DML
+ Prakteknya menggunakan MySQL CLI
Alasan : sampai sekarang banyak pelajar / mahasiswa sampai pekerja yang salah memahami database
padahal ilmu database merupakan ilmu terapan paling awal di dunia komputasi
– Pemrogramman HTML I- CSS I

5. Pilihan Substansi Mata Pelajaran untuk SMA
Tujuan Utama
– Memberikan dasar pola berfikir komputer
– Memberikan skill dasar komputasi
– menulis / bercerita di blog / media sosial

Materi
– computational thinking
– belajar coding sederhana scratch & app inventor
– belajar cyber safety untuk pengguna biasa
– membuat content (video, audio, text) online
– Blogging, CMS WordPress, kompasiana, ucweb
– Sejarah tokoh-tokoh TI di dunia dan di Indonesia

Optional / Advanced Topik
– pemrogramman Python CLI
+ sequence, loop, branch, pengenalan variabel sampai array, fungsi dan prosedur, dasar-dasar konsep OOP
– Database lanjutan (RDBMS / normalisasi / web database
– Pemrogramman HTML II- CSS II- JAVA
– robotic, LEGO Mindstorm
– embedded system, arduino
– 3D design, 3D printing

6. SMK
– Nama mata pelajaran tetap TKJ, RPL, Simdig
– harus di fokuskan pada pembuatan produk2 TIK (baik TKJ & RPL)
– bukan mengajarkan siswa untuk menggunakan TIK

Robotic LEGO MindStorm

Chapter 1: Tomb, Trap, and Trigger
Day 2: King Ixtua Tomb Excavation, 4:42 PM
Tunnel Challenge
Evan’s Solution

Chapter 2: ExploroBot: Planning and Design
The ExploroBot
The Robot Description
The Task List
Limitations and Constraints
Mindstorm
Sketches

Chapter 3: ExploroBot: Build It
Never Be Afraid to Experiment
Step by Step
First Section: Infrared Sensor and Neck
Second Section: Bot Body and Motors
Third Section: Rear-Wheel Assembly and Reinforcement Strut
Engineering: Axles as Reinforcements: Strong and Adjustable
Fourth Section: Put It All Together

Chapter 4: ExploroBot: Program It
Some Experience Required
Into the Tunnel
Engineering: Encoders: How Does a Motor “Know” Where It Is?
Out of the Tunnel
What the Degree, Kenneth? (With Apologies to REM)
Engineering: Measuring Actual Motor Rotations from the Brick Screen
Opening the Tomb Door

Chapter 5: String, Pebbles, and Gravity
Day 3: Inside King Ixtua’s Tomb, 8:13 AM
More Monkey Business
Vine Challenge
Evan’s Solution

Chapter 6: StringBot: Planning
Design and Planning
The StringBot
The Robot Description
The Task List
Limitations and Constraints
Mindstorm
Sketches

Chapter 7: StringBot: Build It
Where to Start?
Step by Step
First Section: Right-Side Motor Assembly with IR Sensor
Second Section: Left-Side Motor Assembly with Guides and Rubber Wheel
Third Section: Carrier and Pebble Release Mechanism
Fourth Section: The Intelligent Brick and Putting It All Together

Chapter 8: StringBot: Program It
Get Familiar with the Blocks
The STOP Block
The SWITCH Block
Getting to the Vase
Above the Vase
Back for More
Testing: Filling the Vase

Chapter 9: Scroll, Key, and Camera
Day 3: Tomb Reception Area, 6:08 PM
The King’s Library
Key Retrieval Challenge
Grace’s Solution

11: SnapShotBot: Build It
Engineering: “Good Enough” with a Peg-Leg?
Jump In
Step by Step
First Section: Basic Body with Hardpoints
Engineering: The Concept of Stiffness
Engineering: Hardpoints
Second Section: Color Sensor, IR Sensor, and the Camera Trigger
Engineering: Gears Trade Speed for Power
Third Section: Adjustable Camera Frame
Engineering: Early and Rapid Mechanical Testing

Chapter 12: SnapShotBot: Program It
One Block at a Time
Finding the Basket
Getting Around the Basket
Getting the Bot Home

INTRODUCTION: WHY STUDY COMPUTATIONAL THINKING?
PART I COMPUTATIONAL THINKING
WHAT IS COMPUTATIONAL THINKING?
Objectives
What is computational thinking?
How is computational thinking used?
Disclaimers
Summary
Exercises
LOGICAL AND ALGORITHMIC THINKING
Objectives
Approach
Logical thinking
Algorithmic thinking
‘Gotchas’
Summary
Exercises
PROBLEM-SOLVING AND DECOMPOSITION
Objectives
Where to start
Defining the problem
Devising a solution: Something to keep in mind
Decomposition
Other effective strategies
Patterns and generalisation
Summary
Exercises
ABSTRACTION AND MODELLING
Objectives
Abstraction
Modelling
Summary
Exercises
ANTICIPATING AND DEALING WITH ERRORS
Objectives
Coming to terms with bugs
Designing out the bugs
Mitigating errors
Testing
Debugging
Summary
Exercises
EVALUATING A SOLUTION
Objectives
Solution evaluation
Is it correct?
Is it efficient?
Is it elegant?
Is it usable?
Trade-offs
Summary
Exercises

PART II COMPUTATIONAL THINKING IN SOFTWARE DEVELOPMENT
TUTORIAL FOR PYTHON BEGINNERS
Objectives
Introducing Python
First steps
Basic types
Basic operations
Functions
Comments
Summary
Exercises
EFFECTIVE BUILDING BLOCKS
Objectives
Logic
Basic algorithmic constructs
Program state
More advanced constructs
Summary
Exercises
ORGANISING YOUR CODE
Objectives
Recap
Introducing tkinter
Separating concerns
Defining information scope
Using modules
Packages
Summary
Exercises
USING ABSTRACTIONS AND PATTERNS
Objectives
Finding patterns in programs
Abstractions in programming
Built-in types
Creating your own types
Ready-made patterns
Summary
Exercises
EFFECTIVE MODELLING
Objectives
Recap
Entities
Relationships
Processes
Usage
General advice
Summary
Exercises
TESTING AND EVALUATING PROGRAMS
Objectives
Introduction to program testing and evaluation
Anticipating bugs
Verification and validation
Testing the parts
Testing the whole
Debugging
Summary
Exercises
A GUIDED EXAMPLE
Problem definition
Problem decomposition
Finding patterns
Form generalisations and abstractions
Models
Annotated source code
Testing
Opportunities for improvement

ARDUINO

Part I: Getting to Know Arduino
Chapter 1: What Is Arduino and Where Did It Come From?
Chapter 2: Finding Your Board and Your Way Around It
Chapter 3: Downloading and Installing Arduino
Chapter 4: Blinking an LED

Part II: Getting Physical with Arduino
Chapter 5: Tools of the Trade
Chapter 6: A Primer on Electricity and Circuitry
Chapter 7: Basic Sketches: Inputs, Outputs, and Communication
Chapter 8: More Basic Sketches: Motion and Sound

Part III: Building on the Basics
Chapter 9: Learning by Example
Chapter 10: Soldering On
Chapter 11: Getting Clever with Code
Chapter 12: Common Sense with Common Sensors

Part IV: Unlocking Your Arduino’s Potential
Chapter 13: Becoming a Specialist with Shields and Libraries
Chapter 14: Sensing More Inputs and Controlling More Outputs
Chapter 15: Multiplying Your Outputs with I 2 C

Part V: Sussing Out Software
Chapter 16: Getting to Know Processing
Chapter 17: Processing the Physical World
Part VI: The Part of Tens
Chapter 18: Ten Places to Learn More about Arduino
Chapter 19: Ten Great Shops to Know
Chapter 20: Ten Places to Find Parts and Components

 

Untuk materi Internet Safety
ini outline-nya
materi detail ada di wiki saya

Dasar-dasar Keamanan Informasi

Keamanan Informasi Sederhana URL

Keamanan Pribadi di Internet URL
Kiat Memproteksi Diri dari Ancaman Cyber URL
Memblokir Situs Porno Tidak Semudah Membalik Tangan URL
Facebook dan Keamanan Anak URL
Sejarah Internet Sehat URL
Melaporkan Page Facebook yang Tidak Baik URL
Perilaku Aman di Dunia Online

Definisi Cybercrime URL

Beberapa Pertanyaan Awal Orang tua kepada Anak Generasi Now URL
Menjaga Agar Reputasi Online Kita tidak Babak Belur URL
Mewaspadai Ranjau Cinta di Internet URL
Ajakan Ber-Internet yang Aman untuk Remaja URL
Langkah Ber Internet yang Aman di Tengah Keluarga URL
Kiat Melindungi Privasi Keluarga di Internet URL
Dasar Bergaul di Jejaring Sosial URL
Contoh Kasus Prita dan Luna Maya URL
Cybersquatting URL
7 Kiat AMan Ber Internet Banking URL
10 Langkah Untuk Keamanan Internet Banking URL
6 Tip Aman Berbelanja di Internet URL
Cyber Bullying

Apakah Cyber Bullying URL

Taktik Cyber Bullying URL
Mencegah Cyber Bullying URL
Media Sosial dan Gaming URL
Pemberdayaan Orang Tua Akan Cyber Bullying URL
Membangun Aturan bagi anak akan Cyber Bullying URL
Tips untuk Guru akan Cyber Bullying URL
Melaporkan Cyber Bullying URL
Kecanduan Konten Negatif

Siasat Agar Otak Tidak Teracuni Pornografi di Internet URL

Ketagihan akan Internet URL
Menghindari Ketagihan / Addiction akan Internet URL
Mengatasi Internet Addiction Disorder URL
Keamanan Password

Tips Mengamankan Password URL

15 Tip untuk Password Security yang lebih baik URL
Panduan Keamanan Password URL
Cara Cek Kekuatan Password URL
Keamanan Email

Tip Keamanan e-Mail URL

Tip Keamanan e-Mail untuk Pengguna Biasa URL
Mengidentifikasi Phishing URL
Phishing Scam URL
Keamanan e-Mail dari Phishing URL
e-Mail spam URL
CAN-SPAM Compliance URL
Agar Tidak di tandai sebagai spam URL
Keamanan Gadget dan Perangkat Bergerak

Menjaga Smartphone Agar Tidak di Hack URL

10 Kiat Mengamankan Smartphone URL
Kiat Mengamankan Android Smartphone URL
Aman Tersambung WiFi dengan WiFi Assistant URL
Tetap Aman Saat Akses via WiFi Public URL
7 Kiat Agar Aman Berselancar di WiFi Public URL
WiFi Safety URL
Smartphone Security URL
Serangan dan Mengamankan Bluetooth URL
Keamanan Media Sosial

Mengapa Media Sosial menjadi penting, khususnya dalam bidang
Marketing? URL

Tip Keamanan di Media Sosial URL
Tip melindungi anak di Media Sosial URL
Tip melindungi diri sendiri di Media Sosial URL
Kiat Melindungi diri di Facebook URL
Tip Mengamankan Profile Facebook URL
Apa yang sebaiknya jangan di posting di Facebook URL
Cara Membedakan Friend dengan Facebook Hacker URL
Cara Mengamankan Facebook timeline URL
Bahaya terlalu banyak sharing di Facebook URL
Jika anda merasa account Facebook di hack URL
Tip Keamanan Online Dating URL
Kiat melindungi diri sendiri di Instagram URL
Tip Keamanan LinkedIn URL
Contoh Teknik Serangan

Memahami Karakteristik Komunitas Hacker URL

Pembajakan Account Facebook dan Cara Mencegahnya

Tinggalkan Balasan

Please log in using one of these methods to post your comment:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout /  Ubah )

Foto Google+

You are commenting using your Google+ account. Logout /  Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout /  Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout /  Ubah )

Connecting to %s