Tuesday, September 21, 2010
Soalan dari Negeri Sembilan
Soalan dari Negeri Pahang
Soalan dari Negeri Perlis
Soalan dari Negeri Kelantan
Soalan dari Negeri Kedah
akan dimuatnaik dari masa ke semasa. Jika tuan-tuan ada koleksi, silalah berkongsi untuk kebaikan bersama.
Sunday, August 8, 2010
1.1. Definition network
1.2. Definition computer network
1.3. Definition communication
1.4. Definition analog signal (diagram + explaination )
1.5. Definition digital signal (diagram + explaination )
- Network Topology
2.1. Definition Network Topology
2.2. Types of network topology
- Star Topology
3.1. Definition star topology
3.4. Advantages – 3 example
3.5. Disadvantages – 3 example
- Ring Topology
4.1. Definition ring topology
4.4. Advantages – 3 example
4.5. Disadvantages – 3 example
- Bus Topology
5.1. Definition bus topology
5.4. Advantages – 3 example
5.5. Disadvantages – 3 example
- Conclusion ( the best topology and why?)
Tarikh hantar :
Tarikh hantar :
Group A : 18 Ogos
Group A : 18 Ogos
Group B : 19 Ogos
Group B : 19 Ogos
Thursday, June 3, 2010
Anda diminta untuk mencari dan mengenal pasti prospek pendidikan selepas SPM yang ditawarkan oleh 5 IPTA dan 5 IPTS dalam bidang ICT.
Anda dikehendaki mendapatkan (bagi setiap satu IPT)
1. nama kurus yang ditawarkan
2. Nama IPTA dan IPTS tersebut
3. Kandungan kursus (mata pelajaran atau subjek sepanjang pengajian)
4. syarat kelayakan masuk
5. tempoh belajar
6. taraf diploma atau ijazah
7. peluang kerjaya yang akan diperolehi selepas tamat pengajian.
Buat dalam bentuk folio
tiada had muka surat
markah akan dikira untuk Peperiksaan
Selamat menjalankan kerja kursus sambil bercuti..................
Tuesday, May 11, 2010
1.1. Definition Network
1.2. Definition Communication
2. Mobile Computing
2.1. Definition Mobile Computing
2.2. Example of device
2.3. Specification of device selected
2.4. Service or Special Features of device
2.5. Frequencies of device
3. Internet Technology and Services
3.1.1. Definition VoIP
3.2.1. Definition Blog
3.2.3. Picture of blog (print skrin)
4. Types of Network
5. Conclusion (benefit of network)
Wednesday, April 14, 2010
Tugasan "Scrap Book" adalah tentang Immersive Multimedia.
bagi pelajar2 saya, sy hanya meminta mereka memilih salah satu bidang sahaja, iaitu Immersive in Edutication ke, Business ke, Entertainmnet ke... tak kisah. Tak semestinya kena buat ketiga-tiga.
Bagi saya, saya telah meluaskan skp Immersive tu kepada bidang yang lain seperti :
Jadi, pelajar saya ramai yang membuat tugasan ini dalam bidang Games, Simulator dan Sports kerana lebih mudah mendapatkan gambar dan info tentang perkara tersebut.
Kesimpulannya, Immersive Multimedia ni boleh diringkaskan sebagai "suatu keadaan menggunakan aplikasi komputer, skrin komputer dan perkakasan komputer yang membuatkan kita sebagai user berada seperti keadaan sebenar, mengalami seperti perkara sebenar"
contoh paling hampir ialah
1. semua jenis simulator (ia adalah immersive)
2. permainan video (games) yang melibatkan alatan tambahan seperti alat sebenar (pistol, senapang, streng kereta, pedal minyak dll....)
untuk mencari gambar ini tidak susah, gunakan elemen image pada enjin carian, tuliskan "simlator" "sport simulator" "virtual reality games"..anda akan dpt byk gambar yang berkaitan.....
Sunday, March 28, 2010
3.1. Definition Open Source
3.2. Definition Software
3.3. Definition Open Source Software
4. Latest Open Source Operating System
4.1. Definition Open Source Operating System
4.2. Example + Picture + Explanation + Year - Two Example
5. Latest Open Source Application System
5.1. Open Source Application System
5.2. Example + Picture + Explanation + Year - Two Example
6. Latest Hardware in ICT
6.1. Example + Picture + Explanation+ Year (old hardware in same field)
6.2. Example + Picture + Explanation + Year (new hardware in same field)
7. Latest Software in ICT
7.1. Example + Picture + Explanation + Year (old software in same field)
7.2. Example + Picture + Explanation + Year (new software in same field)
8. Pervasive Computing
8.1 Definition Pervasive Computing
8.2. Example ( Two Example + picture + explanation)
Format penulisan :
1. gunakan font times new roman (size 12) atau Arial (size 11)
2. Paragraph spacing
Tarikh hantar : 12 April 2010
The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity as computing devices become progressively smaller and more powerful.
Also called ubiquitous computing
Penerangan cikgu Shahrul :
Pervasive computing ni bermaksud, teknologi komputer yang terdapat pada peralatan lain yang biasa digunakan seharian (tetapi bukan komputer)
Peralatan yang mempunyai mikrocip, yang mempunyai arahan yang diprogramkan juga dikenali sebagai pervasive computing.
Antaranya ialah :
1. mesin basuh automatik
2. mp3 player
5. Smart phone
6. Astro Decoder
7. GPS device
8. Blood pressure tester
8. dan lain-lain lagi................
Generically, open source refers to a program in which the source code is available to the general public for use and/or modification from its original design free of charge.
Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community. Open source sprouted in the technological community as a response to proprietary software owned by corporations.
Penerangan cikgushahrul :
Open source ni benda yg free, yang boleh dpt secara percuma. Biasanya ia boleh diperolehi dengan memuat turun program tersebut.
Dalam dunia ICT, Open Source (sumber terbuka) boleh dikategorikan kepada beberapa kategori, antaranya Open Source Operating System, Open Source Application System dan Open Source Utility System.
Jika andatelah mempelajari topik Software, anda tentu faham tentang 3 jenis software yang saya nyatakan tadi.
Operating System :
The most important program that runs on a computer.
Ia adalah perisian utama yang membolehkan komputer berfungsi, tanpa Operating System, sesebuah komputer tidak akan dapat digunakan. Ia ibarat enjin bagi sesebuah kenderaan.
Application System :
Programs that designed for end user (end-user program).
Ia adalah perisian aplikasi, iaitu program yang kita gunakan untuk membuat sesuatu tugas.
Ada beberapa jenis iaitu : Word Processing, Presentation, Database, Desktop Publishing, Web Browser dll.
Application system ini juga terbahagi kepada Open Source dan Proprietary.
Utility Programs :
Programs that perform special task, to managing system resources.
Ia adalah perisian yang khusus untuk menjalankan tugas-tugas khas. Ibaratnya adalah untuk "menjaga" komputer. Ada tiga jenis iaitu Disk Managing, Antivirus & Compression.
Utility system ini juga terbahagi kepada Open Source dan Proprietary.
Lawan kepada Open Soure ialah Proprietary, iaitu berbayar (paid software). ia bermaksud software yang dijual dan perlu dibeli jika hendak menggunakannya.
Tuesday, March 9, 2010
When data is entered into the computer system, it is called an input. Input comes in various forms; texts, graphics, audio and video. Input devices are needed to input data into the computer system.
Keyboard, mouse, scanner, barcode reader and digital camera are some example of input devices.
Output is data that has been processed into a useful form, called information. There are four types of output, which are texts, graphics, audio and video.
The text consists of characters that are used to create texts, sentences and paragraphs.
Graphics are digital representations of non text information such as drawings, charts and photographs.
Audio is music, speech or any other sound. Video consists of images that provide the appearance of full motion
Output is the result of raw input data that has been processed by the central processing unit into meaningful information. Common forms of output are texts, numbers, graphics, sounds, animations and videos.The most common output devices are computer screens, speakers and printers.
The system’s primary storage, Random Access Memory (RAM) can only hold data temporarily. Thus, secondary storage is needed to provide additional storage. The data stored in the secondary storage is considered permanent until it is deleted or removed.
Secondary storage can be magnetic disks and optical disks. Examples of secondary storage are hard disks, rewritable CDs and DVDs as well as removable disks such as pen drives
External hardware devices attached to the computer are called peripheral equipments
The central processing unit or the CPU is the brain of the computer.
All processing activities are done in the CPU. It utilises the computer memory to execute instructions from the application software and accomplish a task. For example: editing a letter, drawing a picture and sorting numbers.
The processor must be connected to input devices, output devices and storage devices to carry out the above mentioned tasks.
Input is any data or instructions that we enter into the computer system for processing.
There are some common ways of feeding input data into the system, which are:
• typing on a keyboard
• pointing with a mouse
CPU accepts instruction from the user and translates the instruction into readable information (decode).
The processing unit controls all activities within the system. For every instruction, the control unit repeats a set of four basic operations called the machine cycle
Storage is a location which data, instruction and information are held for future use. Every computer uses storage to hold system software and application software.
When we issue a command to start the application software, the operating system locates the program in storage and loads it into memory.
A storage medium, also called secondary storage is the physical material in the computer that keeps data, instruction and information.
A storage device is the computer hardware that records or retrieves items to and from storage media.
A computer system is defined as combination of components designed to process data and store files.
A computer system consists of four major hardware components; input devices, output devices, processor and storage devices.
A computer system requires hardware, software and a user to fully function.
Software refers to set of instructions that tell the hardware what to do. Software can also have various other functions such as performing computation, communication with other software and human interaction.
User refers to a person who uses the computer for any purposes such as work, business and entertainment.
A programmable machine. The two principal characteristics of a computer are:
All general-purpose computers require the following hardware components:
In addition to these components, many others make it possible for the basic components to work together efficiently. For example, every computer requires a bus that transmits data from one part of the computer to another.
Computers can be generally classified by size and power as follows, though there is considerable overlap:
Sunday, February 28, 2010
There are 6 types of security measures which are :
1. Data backup
6. Human aspects.
Data backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency.Depending on the importance of the information, daily, weekly or biweekly backups from a hard disk can be performed
Cryptography is a process of hiding information by altering the actual information into differentrepresentation. Almost all cryptosystem depend on a key such as a password like the numbers or a phase that can be used to encrypt or decrypt a message. The traditional type of cryptosystem used on a computer network is called a symmetric secret key system. With this approach, the sender and the recipient use the same key, and they have to keep the share key a secret from anyone else.
User should install an Antivirus program and update it frequently.
An Antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files.
v Two techniques are use to identify the virus:
a) Virus signature – also called a virus definition. It is a specific pattern of the virus code.
b) Inoculating a program file – the Antivirus program records information such as the file size and file creation date in a separate inculcation file. The Antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file.
v If an Antivirus program identifies an infected file, it attempts to remove its virus, worm or Trojan horse. If the Antivirus program cannot remove the infection, it often quarantines the infected file. Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures other files will not become infected.
Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user. The Spyware program communicates information to the outside source. An Anti-Spyware application program sometimes called tracking for threat or a Spybot is used to remove Spyware.
Among the popular Anti-Spyware programs are:
a. Spybot Search and destroy
c. Spyware Blaster
Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.
The purpose of a firewall is to keep bad thing outside a protected firewall implement a security policy. It might permit limited access from in or outside the network perimeters or from certain users or for certain activity.
There are three types of firewall
a. Screening routers
ii. Sees only addresses and service protocol type
iii. Screen based on connection rules.
b. Proxy gateway
v Sees full text of communication
v Screen based on behaviour proxies
v Most complex
v Sees full text of communication
v Screens based on interpretation of message content.
Human aspects refer to the user and also the intruder of a computer system.
It is one of the hardest aspects to give protection to. The most common problem is the lack of achieving a good information security procedure. There are three ways to protect computer from human aspect threat:
a. Organisation Self Awareness
i. Organisations need to be aware of the people they work with.
ii. Some threat also come from within the organization and not just from the outside.
b. Organisational User Self Awareness
v Provide employee with adequate training and the importance of security and control.
v Even a very high-tech protection system could not protect the system against incompetent users.
c. Individual User Self Awareness
v Threat often comes in beautiful offers and packages.
v Do not download or install software from unreliable sources.
v Do not expose important information to strangers.
1. Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker.
2. Hackers are persons who learn about the computer systems in detail. They wrote program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
3. Kevin Mitnick is the most notorious hacker ever caught. He had stolen millions of dollars worth of software and credit card information on the net. He used new identities and cleverly concealed his locations. He spent 5 years in jail for his hacking activity.
- Two types of computer theft:
a. Computer is used to steal money, goods, information and resources.
b. Actual stealing of computer, especially notebook and PDA. (This type of stealing causes loss of the expensive item and also the valuable information.)
- Three approaches to prevent theft
a) Prevent access by using locks, smart card application and password activation
b) Prevent portability of your computer by restricting all hardware from physically being moved to other places.
c) Detect and guard all exits and record any hardware (such as disk or CD) before being transported
Operates through the network.
Spreads through any medium. (Usually copied programs or data files)
Spreads copies of itself as a standalone program.
Spread copies of itself as a program that attaches to other program.