Welcome to my blog, hope you enjoy reading
RSS

Ahad, 28 Februari 2010

LeSsOn !!!


huhu..

today pn zalina want my class do the E-Assessment..
my class ,4 pluto is the last class to know about this exersice after 4 zuhrah and 4 utarid.. (latih tubi)..
kuang3
the questions is located in blog panitia ict..
there are many types questions that we can do.
i think the question is quite easy for multiple choice ,true or false and matching but the questions fill in the blanks i found very difficult because i never do such that questions..arghhh!!!!
i only got 50 marks for that questions
i will do at least 3 exercise to improve my score and archive full mark...
so i must study and do more and more revision about the ict lesson...
i want to thank my ict teacher for giving me a lot of question in blog panitia.. <3<3<3

Jumaat, 26 Februari 2010

Presentation Kerja Kursus



My friend and I has been asked by Puan Zalina to do a presentation about the computer virus. Before we do our presentation, we do some researches about the virus. From that, we can conclude that there are many types of viruses. They are trojan horse virus, worm virus, and virus. We took 5 days to finished this presentation. This presentation is very important because the score for this presentation is included for the SPM examination. So, we hope that we will success in this presentation.

Ahad, 21 Februari 2010

PeNiLaIan kOkUrIkUlUm 1


assalamualaikum...
this time i would like to say about the PENILAIAN KURIKULUM 1 (PK1).
Honestly many of them are not so hard as what i have aspected...its just me who not read the books thoroughly...thee...=0


for the ICT subject i find it quite hard....
at first, the question seems like student-friendly. but when reached the middle i feel like want to scream because that question suppose to be easy to answer but i didn't aspected that question would out....
finally, pk1 is ended. thursday is for ict, biology, sejarah and sivik too. at that day. huhh.
however i will try my best in the next PK2 that is more important for now...before i reach the SPM!!!!!!
So i hope anyone please pray for my success....thanks...

The Differences Between Computerised And Non-Computerised Systems

COMPUTERISED AND NON-COMPUTERISED SYSTEMS

COMPUTER SYSTEM

A system is an arrangement of elements that when it is put together it becomes an organised and established procedure. A system typically consists of components connected together in order to facilitate the flow of information, matter or energy.

A computer system consists of a set of hardware and software which processes data in a meaningful way.

EDUCATION


• education is the science of teaching and learning of specific skills
• it also imparts knowledge, good judgement and wisdom

BANKING SYSTEM




BANKING BEFORE ICT
• banking was done manually by taking deposits directly
• transactions can only be made during working hours
• takes time to approve any loan applications

BANKING WITH ICT
• all transactions are done by computers
• transaction can be done at anytime and place
• online services, phone banking system, credit cards are available

INDUSTRY

INDUSTRY BEFORE ICT
Production was slow because everything was done manually and totally depended on human labour.

INDUSTRY WITH ICT
Computers and telecommunications industry became very opular and profitable since production can be increased through an all day operation.

COMMERCE




Commerce is an activity of exchanging, buying and selling of commodities on a large scale involving transportation from place to place.

COMMERCE BEFORE ICT
• Trading was made using the barter system and it was then later developed
into currency.
• Advertisement was in the form of word of mouth, billboards and printed
flyers.
• Trading globally was extremely slow, late and expensive. Traders had to find
ways to market local products in the global market.

COMMERCE WITH ICT
E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically

Define ICT




ICT (Information, communication and technologies) is the technlogy required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert store, protect, transmit, and retrieve information from anywhere, anytime.According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only serve to exacerbate the already-existing economic gap between technological "have" and "have not" areas. Internationally, the United Nations actively promotes ICTs for Development as a means of bridging the digital divide.

Jumaat, 19 Februari 2010

CNY Homework

1.0 INFORMATION & COMMUNICATION TECHNOLOGY & SOCIETY
1.1 Introduction to Information and Communication Technology
1.1.1.1 Define ICT.
1.1.1.2 Describe the brief evolution of computers.
1.1.1.3 List the usage of ICT in everyday life.
1.1.1.4 State the differences between computerised and non-computerised systems.
1.1.1.5 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property laws.
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification technologies :
1.2.3.1 User identification, Possessed Object, Biometric device
1.2.3.2 List effects of controversial contents on society: Pornography and Slander
1.2.3.3 Describe the process of filtering to control access to controversial contents.
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes: Fraud, Copyright Infringement, Theft, Attacks
1.3 Computer Security
1.3.1.1 Define computer security.
1.3.2.1 Explain briefly the different threats to computer security:* Malicious code * Hacking * Natural disaster * Theft
1.3.3.1 Select the appropriate security measures to overcome the computer threats
1.3.3.2 Apply the correct security procedures : Antivirus, Anti-Spyware, Firewall, Data backup* Cryptography (Cipher text, Plain text), Human aspects

Isnin, 15 Februari 2010

Define ‘computer theft and give an example of an activity that reflects computer theft.

Computer theft is a common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed.A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.

Define hacking and give an example of hacking activity.

Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem.The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".