Welcome to my blog, hope you enjoy reading
RSS

Sabtu, 17 April 2010

PeNiLaIaN KoKUrIkUlUm 2


Argghhh!!!! I did not take the examination for the subject of ict, sejarah and sport science. ..so sad!!! I do not know why the week of the test I got fever and flu.. Actually I have the asthma disease . On wednesday night I was attacked by the asthma disease .. ..I can not breathe properly.. help me????!!! ...thank god !!!!! I have medicine that can relieve me of this disease.My mom take care of me that nite. I am so glad and thankful to my mother.. The next day, I have tried to go to school for the examination but my mom did not let me go for fear of more serious.

I hope in the middle of the test I will not sick but healthy and calm during the examination. This is important because half of the year will determine the value T.O.V...
I will make sure that I can do the best in the middle test.. hope everyone will pray for my health and success in all areas that I pursue Amin.!!!
Last week, puan Zalina has taught me what is the input devices and output devices. I had no idea what it .. but when my teacher explain and teach me last week now i has a lot of information and knowledge about the input or output.

OUTPUT
Output is the result of data processing activity when it is presented external to the system

OUTPUT DEVICES
An output devices is hardware that is capable of delivering or showing information to one or more users

There are four types of output devices :

1) text output


example : monitor and facsimile machine

2) graphics and video output

example : printer and lcd projector

3) audio output

example : speakers and monitor


INPUT

Input is any data or instruction that you enter into the memory of a computer.

INPUT DEVICES

Input devices are any electronic device connected to a computer and produces input signals

There are five types of input:
1) text input


example: keyboard and card reader

2) graphics input


example: scanner and digital camera

3) audio input


example :microphone and midi keyboard

4) video input

example : cctv camera and digital video camera



5) pointing devices

example : mouse and graphics tablet






















Selasa, 30 Mac 2010

DaTa MeAsUrEmEnT

today lesson ict ..i have learn about data measurement in bo(2).Do you know that 1 kilobyte is not 1000 but 1024..strange right???so i look into the ict note and found 1) why i kb is not 10000..this is because that




so 1 kilobyte is not 1000..


2) Do you know how to pronounce 1 099 511 627 776

one trillion ninety-nine billion five hundred eleven million six hundred twenty- seven thousand seven hundred and seventy six ..

is quite hard to pronounce it..

Ahad, 28 Mac 2010





today ict class does not learn anything because many students participate in sports, kawad and more. Puan zalina commanded us to prepare a special work pending.but my pendrive included in the washing machine when I was busy washing cloth .. arghh!!!!!

student have to do alot of kerja khusus . For students required to make our ict work specifically for the bo 3 (1). Unfortunately I can not get the job done because my pendrive have been damaged..

studies are now entering the chapter b0 (2). I learned a lot about the computer system. examination more convenient. I am very afraid if not memorizing the lesson that i have learn in the class.

Sabtu, 6 Mac 2010

DEFINITION
controversial issue is one where its related articles are constantly being re-edited in a circular manner, or is otherwise the focus of edit warring.

Other articles not yet classified as "controversial" have some edit conflict issues. The divisive nature of disputed subjects have triggered arguments, since opinions on a given issue differ as they are debated.

Perspectives on these subjects are particularly subject to time, place, and culture of the editor.

1)Articles listed here may need more work to approach a neutral point of view than is usual. For articles that are currently unbalanced, see NPOV dispute instead.
2)Articles on this list should be checked from time to time to monitor developments in the presentation of the issues.
3)Discussions about those controversies should be limited to the relevant Talk pages.

Selasa, 2 Mac 2010


DeFiNiTiOn:
  1. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at h
  2. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original her profession, some hackers claim this term is offensive

- Computer hacking is most common among teenagers and young adults, although there are many older hackers as well.
- Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form.
- For these individuals, computer hacking is a real life application of their problem-solving skills.
- Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff.
- These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly.
- In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
- In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives.
-Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.”
-This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

*There are a number of ways for schools to minimize potential for hacking.*

1. Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.

2.Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others' privacy.

3. Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.

AbOuT vErIfIcATiOn!!!


verification [ vérrifi káysh'n ] (plural verifications)


noun


Definition:


1. establishment of truth: the establishment of the truth or correctness of something by investigation or evidence
2. evidence: the evidence that proves something is true or correct
3. international law confirmation of procedures: in international law, the process of confirming that procedures laid down in an agreement such as a weapons limitation treaty are being followed
4. law affidavit: in law, an affidavit swearing to the truth of a pleading
5. law confirmatory evidence: evidence or testimony that confirms something
verificative [ vérrifi kaytiv ] adjective

The word verification may refer to:

Verification and validation, in engineering or quality management systems, it is the act of reviewing, inspecting or testing, in order to establish and document that a product, service or system meets regulatory or technical standards. By contrast, validation refers to meeting the needs of the intended end-user or customer.
Verification (spaceflight), in the space systems engineering area, covers the processes of qualification and acceptance
Verification theory, philosophical theory relating the meaning of a statement to how it is verified
Third-party verification, use of an independent organization to verify the identity of a customer
Authentication

Ahad, 28 Februari 2010

LeSsOn !!!


huhu..

today pn zalina want my class do the E-Assessment..
my class ,4 pluto is the last class to know about this exersice after 4 zuhrah and 4 utarid.. (latih tubi)..
kuang3
the questions is located in blog panitia ict..
there are many types questions that we can do.
i think the question is quite easy for multiple choice ,true or false and matching but the questions fill in the blanks i found very difficult because i never do such that questions..arghhh!!!!
i only got 50 marks for that questions
i will do at least 3 exercise to improve my score and archive full mark...
so i must study and do more and more revision about the ict lesson...
i want to thank my ict teacher for giving me a lot of question in blog panitia.. <3<3<3

Jumaat, 26 Februari 2010

Presentation Kerja Kursus



My friend and I has been asked by Puan Zalina to do a presentation about the computer virus. Before we do our presentation, we do some researches about the virus. From that, we can conclude that there are many types of viruses. They are trojan horse virus, worm virus, and virus. We took 5 days to finished this presentation. This presentation is very important because the score for this presentation is included for the SPM examination. So, we hope that we will success in this presentation.

Ahad, 21 Februari 2010

PeNiLaIan kOkUrIkUlUm 1


assalamualaikum...
this time i would like to say about the PENILAIAN KURIKULUM 1 (PK1).
Honestly many of them are not so hard as what i have aspected...its just me who not read the books thoroughly...thee...=0


for the ICT subject i find it quite hard....
at first, the question seems like student-friendly. but when reached the middle i feel like want to scream because that question suppose to be easy to answer but i didn't aspected that question would out....
finally, pk1 is ended. thursday is for ict, biology, sejarah and sivik too. at that day. huhh.
however i will try my best in the next PK2 that is more important for now...before i reach the SPM!!!!!!
So i hope anyone please pray for my success....thanks...

The Differences Between Computerised And Non-Computerised Systems

COMPUTERISED AND NON-COMPUTERISED SYSTEMS

COMPUTER SYSTEM

A system is an arrangement of elements that when it is put together it becomes an organised and established procedure. A system typically consists of components connected together in order to facilitate the flow of information, matter or energy.

A computer system consists of a set of hardware and software which processes data in a meaningful way.

EDUCATION


• education is the science of teaching and learning of specific skills
• it also imparts knowledge, good judgement and wisdom

BANKING SYSTEM




BANKING BEFORE ICT
• banking was done manually by taking deposits directly
• transactions can only be made during working hours
• takes time to approve any loan applications

BANKING WITH ICT
• all transactions are done by computers
• transaction can be done at anytime and place
• online services, phone banking system, credit cards are available

INDUSTRY

INDUSTRY BEFORE ICT
Production was slow because everything was done manually and totally depended on human labour.

INDUSTRY WITH ICT
Computers and telecommunications industry became very opular and profitable since production can be increased through an all day operation.

COMMERCE




Commerce is an activity of exchanging, buying and selling of commodities on a large scale involving transportation from place to place.

COMMERCE BEFORE ICT
• Trading was made using the barter system and it was then later developed
into currency.
• Advertisement was in the form of word of mouth, billboards and printed
flyers.
• Trading globally was extremely slow, late and expensive. Traders had to find
ways to market local products in the global market.

COMMERCE WITH ICT
E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically

Define ICT




ICT (Information, communication and technologies) is the technlogy required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert store, protect, transmit, and retrieve information from anywhere, anytime.According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only serve to exacerbate the already-existing economic gap between technological "have" and "have not" areas. Internationally, the United Nations actively promotes ICTs for Development as a means of bridging the digital divide.

Jumaat, 19 Februari 2010

CNY Homework

1.0 INFORMATION & COMMUNICATION TECHNOLOGY & SOCIETY
1.1 Introduction to Information and Communication Technology
1.1.1.1 Define ICT.
1.1.1.2 Describe the brief evolution of computers.
1.1.1.3 List the usage of ICT in everyday life.
1.1.1.4 State the differences between computerised and non-computerised systems.
1.1.1.5 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property laws.
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification technologies :
1.2.3.1 User identification, Possessed Object, Biometric device
1.2.3.2 List effects of controversial contents on society: Pornography and Slander
1.2.3.3 Describe the process of filtering to control access to controversial contents.
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes: Fraud, Copyright Infringement, Theft, Attacks
1.3 Computer Security
1.3.1.1 Define computer security.
1.3.2.1 Explain briefly the different threats to computer security:* Malicious code * Hacking * Natural disaster * Theft
1.3.3.1 Select the appropriate security measures to overcome the computer threats
1.3.3.2 Apply the correct security procedures : Antivirus, Anti-Spyware, Firewall, Data backup* Cryptography (Cipher text, Plain text), Human aspects

Isnin, 15 Februari 2010

Define ‘computer theft and give an example of an activity that reflects computer theft.

Computer theft is a common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed.A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Define hacking and give an example of hacking activity.

Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem.The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".