Welcome to my blog, hope you enjoy reading
RSS

Sabtu, 17 April 2010

PeNiLaIaN KoKUrIkUlUm 2


Argghhh!!!! I did not take the examination for the subject of ict, sejarah and sport science. ..so sad!!! I do not know why the week of the test I got fever and flu.. Actually I have the asthma disease . On wednesday night I was attacked by the asthma disease .. ..I can not breathe properly.. help me????!!! ...thank god !!!!! I have medicine that can relieve me of this disease.My mom take care of me that nite. I am so glad and thankful to my mother.. The next day, I have tried to go to school for the examination but my mom did not let me go for fear of more serious.

I hope in the middle of the test I will not sick but healthy and calm during the examination. This is important because half of the year will determine the value T.O.V...
I will make sure that I can do the best in the middle test.. hope everyone will pray for my health and success in all areas that I pursue Amin.!!!
Last week, puan Zalina has taught me what is the input devices and output devices. I had no idea what it .. but when my teacher explain and teach me last week now i has a lot of information and knowledge about the input or output.

OUTPUT
Output is the result of data processing activity when it is presented external to the system

OUTPUT DEVICES
An output devices is hardware that is capable of delivering or showing information to one or more users

There are four types of output devices :

1) text output


example : monitor and facsimile machine

2) graphics and video output

example : printer and lcd projector

3) audio output

example : speakers and monitor


INPUT

Input is any data or instruction that you enter into the memory of a computer.

INPUT DEVICES

Input devices are any electronic device connected to a computer and produces input signals

There are five types of input:
1) text input


example: keyboard and card reader

2) graphics input


example: scanner and digital camera

3) audio input


example :microphone and midi keyboard

4) video input

example : cctv camera and digital video camera



5) pointing devices

example : mouse and graphics tablet






















Selasa, 30 Mac 2010

DaTa MeAsUrEmEnT

today lesson ict ..i have learn about data measurement in bo(2).Do you know that 1 kilobyte is not 1000 but 1024..strange right???so i look into the ict note and found 1) why i kb is not 10000..this is because that




so 1 kilobyte is not 1000..


2) Do you know how to pronounce 1 099 511 627 776

one trillion ninety-nine billion five hundred eleven million six hundred twenty- seven thousand seven hundred and seventy six ..

is quite hard to pronounce it..

Ahad, 28 Mac 2010





today ict class does not learn anything because many students participate in sports, kawad and more. Puan zalina commanded us to prepare a special work pending.but my pendrive included in the washing machine when I was busy washing cloth .. arghh!!!!!

student have to do alot of kerja khusus . For students required to make our ict work specifically for the bo 3 (1). Unfortunately I can not get the job done because my pendrive have been damaged..

studies are now entering the chapter b0 (2). I learned a lot about the computer system. examination more convenient. I am very afraid if not memorizing the lesson that i have learn in the class.

Sabtu, 6 Mac 2010

DEFINITION
controversial issue is one where its related articles are constantly being re-edited in a circular manner, or is otherwise the focus of edit warring.

Other articles not yet classified as "controversial" have some edit conflict issues. The divisive nature of disputed subjects have triggered arguments, since opinions on a given issue differ as they are debated.

Perspectives on these subjects are particularly subject to time, place, and culture of the editor.

1)Articles listed here may need more work to approach a neutral point of view than is usual. For articles that are currently unbalanced, see NPOV dispute instead.
2)Articles on this list should be checked from time to time to monitor developments in the presentation of the issues.
3)Discussions about those controversies should be limited to the relevant Talk pages.

Selasa, 2 Mac 2010


DeFiNiTiOn:
  1. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at h
  2. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original her profession, some hackers claim this term is offensive

- Computer hacking is most common among teenagers and young adults, although there are many older hackers as well.
- Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form.
- For these individuals, computer hacking is a real life application of their problem-solving skills.
- Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff.
- These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly.
- In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
- In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives.
-Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.”
-This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

*There are a number of ways for schools to minimize potential for hacking.*

1. Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.

2.Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others' privacy.

3. Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.