Thursday, October 14, 2010
Session 49
Session 48
Date 23.9.2010
Activities:
- Teacher attended conferencing
- My classmates and I cleaned up the computer lab
Session 45
Date:19.8.2010
Activities:
- Hands on activities
- Connected 2 PC using cross cables
- Shared file
Session 44
Date:17.8.2010
Activities:
- Hands on activities
(PC connections)
a)Followed learning module
b)Ping IP address
c)Shared file
Session 41
Wednesday, August 4, 2010
Session 40
Date:3.8.2010
Activities:
- Discussed about Network Operating system
A network operating system (NOS) is a software program that controls other software and hardware that runs on a network. It also allows multiple computers, also known as network computers, to communicate with one main computer and each other, so as to share resources, run applications, and send messages, among other things. A computer network can consist of a wireless network, local area network (LAN), a wide area network (WAN), or even two or three computer networks. The heart of any of these networks, however, is the network operating system.
Session 38
Date:27.7.2010
Activities:
- Mr Zainuddin attended Kepeperiksaan SPM meeting
So,we did our own work
Session 37
Date:22.7.2010
Activities:
- Discussed about needed in computer network communication.
• Network Interface Card (NIC)
• Wireless Network Interface Card
• Modem (internal and external)
• Hub
• Router
• Wireless Access Point
A network interface card (NIC) is a communication device that enables a computer or device to access a wired network (via cable)
• Wireless Network Interface Card
A wireless network interface card is a communication device that enables a computer or device to access a wireless network (via radiowave)
• Modem (internal and external)
Modem
A modem (a modulator/demodulator) lets you connect your computer to a standard telephone line so you can transmit and receive electronically transmitted data. It is the key that unlocks the world of the Internet and its World Wide Web, commercial online services, electronic mail (E-mail), and bulletin board systems (BBSes).
External modem.
This is the simplest type of modem to install because you don't have to open the computer. External modems have their own power supply and connect with a cable to a computer's serial port. The telephone line plugs into a socket on the rear panel of the modem.
Internal Modem
Most internal modems come installed in the computer you buy. Internal modems are more directly integrated into the computer system and, therefore, do not need any special attention. Internal modems are activated when you run a communications program and are turned off when you exit the program. This convenience is especially useful for novice users.
Internal modems usually cost less than external modems, but the price difference is usually small. The major disadvantage with internal modems is their location: inside the computer. When you want to replace an internal modem you have to go inside the computer case to make the switch.
• Hub
Hub
A hub is a communication device that is used for connecting wired computers or devices on a Local Area Network (LAN).A hub provides a common connection wireless computers or devices on a Local Area Network (LAN).
• Router
A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.Very little filtering of data is done through routers.
• Wireless Access Point
Wireless access points (APs or WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.
Tuesday, August 3, 2010
Session 36
Date:20.7.2010
Activities:
- Discussed about Protocols
Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
Session 35
Date:15.7.2010
Activities:
- Teacher was still at the launching of Microsoft Kodu Game Lab software
So,we did our own work....again
Session 34
Date:13.7.2010
Activities:
- Mr Zainnudin was still at the launching of Microsoft Kodu Game Lab software
So,we did our own work again
I:-
a)Updated my blog
b)Went youtube for movie trailers
c)Discussed with my friends about the learning outcomes
Session 33
Session 32
Date:6.7.2010
Activities:
- Discussed about three main types of network topology
• bus
• ring
• star
Bus topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message. However, bus networks work best with a limited
number of devices. If more than a few dozen computers are added to a network bus,
performance problems will likely result. In addition, if the backbone cable fails, the entire
network effectively becomes unusable.
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
Star Topology
Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Session 31
Session 31
Date:1.7.2010
Activities:
- Discussed about types of networks
* LAN - Local Area Network
* WLAN - Wireless Local Area Network
* WAN - Wide Area Network
* MAN - Metropolitan Area Network
* SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
* CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
* PAN - Personal Area Network
* DAN - Desk Area Network
LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution.
* Wireless Local Area Network - a LAN based on WiFi wireless network technology
* Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.
* Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.
* Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel.
* System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.
Session 30
Date:30.6.2010
Activities:
- Assignments were given
(Send Mr Zainuddin lesson plans 10-14)
- Discussed about Basic Concepts of Computer Networks and Communications
A computer network is a collection of computers and devices connected together via communications devices and transmission media. For examples it may connect computers, printers and scanners.
Communication describes a process in which two or more computer devices transfer data, instructions and information.
Importance of computer network
i) Sharing of devices such as printer and scanner.
ii) Sharing of program/software.
iii) Sharing of files.
iv) Sharing of data.
v) Sharing of information.
vi) Sharing of single high-speed internet connection.
vii) Can access server centered database.
viii) Better communication using internet services such as e-mail, mailing list and Internet Relay Chat (IRC).
Wednesday, July 7, 2010
Session 29
Date 24.6.2010
Activities:
- Assignments were given
a)Help Encik Abu to install kodu game lab
b)Complete my 'ICT Contribution' Form
Monday, June 21, 2010
Session 28
Session 26
Date:20.5.2010
Activities:
-Discussed about motherboards
The main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards. Typically, the motherboard contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices, such as the display screen, keyboard, and disk drive. Collectively, all these chips that reside on the motherboard are known as the motherboard's chipset.
On most PCs, it is possible to add memory chips
directly to the motherboard. You may also be able to upgrade to a faster PC by replacing the CPU chip. To add additional core features, you may need to replace the motherboard entirely.
Monday, May 31, 2010
Session 25
Date:18.5.2010
Activities:
- Teacher was absent so all of the students did their own work.
- Updated blog
- Researched about Apple and Microsoft technology
Session 24
Date:13.5.2010
Activities:
- Discussed about project work
- 3 assignments were given
a)Give 2 examples of pervasive multimedia and application
b)Give 2 examples of pervasive business
c)Give 2 examples of pervasive entertainment and education
Session 23
Date:11.5.2010
Activities:
- 4th Malaysia - Australia Conferencing
We log into illuminate again for the conferencing.During the conferencing,we were ask 3 questions.
a)Why should we blog?
My answer:To show people what we have done.
b)What is your favorite song?
My answer:Fields by Adam Lambert
c)Which country would you like to visit most and which friend from the other school would you like to take?
My answer:Spain and I would bring George.
Session 22
Session 22
Date:6.5.2010
Activities:
- Discussed about operating systems
An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless.
The main functions of an OS include:
In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn.
It manages the sharing of internal memory among multiple applications.
It handles and monitors input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. [8]
It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred.
It can offload the management of what are called batch jobs (for example, printing) so that the initiating application is freed from this work.
On computers that can provide parallel processing, an operating system can manage how to divide the program so that it runs on more than one processor at a time.
Scheduling the activities of the CPU and resources to achieve efficiency and prevention of deadlock. [9]
Friday, May 28, 2010
Session 20
Date:28.4.2010
Activities:
- 3rd Malaysia - Australia Conferencing
- 3 questions were ask during the conferencing
a)What are you proud of your country?
My answer:The food
b)Do you prefer to live in the city or country?Why?
My answer:Country because the environment is cleaner and peaceful
c)What is the symbol of your country?
My answer:The Hibiscus
Session 18
Date:14.4.2010
Activities:
- Logged in to Illuminate
- 2nd Malaysia - Australia Conferencing
Session 17
Date:10.4.2010
Activities:
- Proceeded with learning outcomes 05
- Send teacher learning outcomes
Session 16
Date:8.04.2010
Activities:
- 1st Malaysia - Australia Conferencing
- Used Illuminate to communicate
Session 15
Date:8.4.2010
Activities:
- Assignments
a)Send Lesson Plans 05-09 before 9.4.2010
b)Do correction for exam
c)Proceed with learning outcome 05
d)Download Learning Module(PC Assemble)
Session 14
Session 14
Date:23.3.2010
Activities:
- Discussed about computer systems
The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes.
A computer system is sized for the total user workload based on (1) number of users sharing the system simultaneously, (2) type of work performed (interactive processing, batch processing, CAD, engineering, scientific), and (3) amount of storage. Following are the components of a computer system and their significance.
Session 13
Date:11.3.2010
Activities:
- Discussed about malicious codes
Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage.The agent for malicious code is the writer of the code, or any person who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.
a) Virus
- A program that can pass on the malicious code to other programs by modifying them.
- Attaches itself to the program, usually files with .doc, .xls and .exe extensions.
- Destroys or co-exists with the program.
- Can overtake the entire computing system and spread to other systems.
b) Trojan Horse
- A program which can perform useful and unexpected action .
- Must be installed by users or intruders before it can affect the system’s assets.
- An example of a Trojan horse is the login script that requests for users’ login ID and password.
- The information is then used for malicious purposes.
c) Logic Bomb
- Logic bomb is a malicious code that goes off when a specific condition occurs.
- An example of a logic bomb is the time bomb.
- It goes off and causes threats at a specified time or date.
e) Trapdoor and Backdoor
- A feature in a program that allows someone to access the program with special privileges.
f) Worm
- A program that copies and spreads itself through a network.
Session 12
Date:9.3.2010
Activities:
- Given tips for incoming exam
- Discussed about Authentication and Verification methods
Authentication is a process where users verify that they are who they say they are.The users who attempt to peform functions in a system is in fact users who is authorized to do so.Methods of authentication are biometric device and callback system.
Verification, in engineering or quality management systems, it is the act of reviewing, inspecting or testing, in order to establish and document that a product, service or system meets regulatory or technical standards. By contrast, validation refers to meeting the needs of the intended end-user or customer. Verification (spaceflight), in the space systems engineering area, covers the processes of qualification and acceptance Verification theory, philosophical theory relating the meaning of a statement to how it is verified .Third-party verification, use of an independent organization to verify the identity of a customer.
Session 11
Date:23.2.2010
Activities:
- Given Assignments
a)Add links about the learning outcomes for nicenet
b)Download Hardcopy pro(A program that enables the computer to screen capture)
Session 10
Date:11.2.2010
Activities:
- Given assignment
Hand over lessons plans before 24 February
- Discussed about computer security
Computer security is a branch of computer technology known as information
security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster,while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. There are three types of computer security which are hardware security, software security and network security.
Session 9
Session 9
Date:9.2.2010
Activities:
- Discussed about computer crimes
Fraud
Computer fraud can be defined as the use of a computer to gain unauthorized access to information or perform activities with the explicit goal of gaining material goods at the expense of others through criminal means. While fraud has been around since the advent of humanity, computer fraud is a relatively recent phenomenon, and since computers are so ubiquitous in the everyday lives of most of us, we are all exposed to its dangers to some degree.
Copyright Infringement
Copyright infringement (or copyright violation) is the unauthorized or prohibited use of works covered by copyright law, in a way that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.
Theft
There a lot of types of thefts with the usage of computer.The most common among all are identity theft. Identity theft is a term used that is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.
Attacks
Computer attacks is the attacks towards a computer by physically or by using another computer.Viruses is common to attack computers.Damaging a computer physically is damaging the computer by hitting or throwing it.
Session 8
Date:4.2.2010
Activities:
- Assignments were given by Mr Zainuddin
a)Download module sent by teacher via Yahoo Mail
b)Read the learning module for the incoming exam
- Discussed about Authentication
Authentication is a process where user verifies their identity.The four commonly authentication methods are:-
a)User identification
b)Possessed object
c)Biometric device
d)Callback system
Session 7
Date:2.2.2010
Activities:
- Discussed about computer ethics and legal issues
Ethics, in the classical sense, refers to the rules and standards governing the conduct of an individual with others. As technology and computers became more and more a part of our everyday lives, we must understand that the problems that have always plagued business and conduct will continue to be a problem. In fact, a new medium can provide even more difficult questions of judgement. In other words, since the introduction of the World Wide Web, the definition of ethics has evolved, too. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers.
Law
Most of the time laws are written, approved, and then enforced by the level of government where they were written. For example, a State law is enforced by the state. A Federal law is enforced by the Feds.
Ethics
Ethics are like rules of conduct. Most occupations have ethics that come along with the job. They are not written done, they are unspoken rules of conduct that people adhere to.
Wednesday, May 26, 2010
Session 6
Date:28.1.2010
Activities:
(Mr Zainuddin was absent so I used computer no 5 to do my assignments)
- Signed up for net class.
- Posted links about the five generation of computers.
- Searched for information about learning outcomes.
- Went to Youtube.
Session 5
Date:25.1.2010
Activities:
-Discussed about the services of the Internet
a)Worldwideweb
b)E-Mail
c)IRC
d)Mailing
e)Newsgroup
f)FTP(File transfer protocol)
g)Telnet(Remote log in)
-Given a task to make an account in nicenet
www.nicenet.org
Session 4
Date:23.1.2010
Activities:
-Discussed the definition of ICT
I-Information
C-Communication
T-Technology
Session 3
Date:19.1.2010
Activites:
-Discussed on what are we going to study in the future
Form 4 Learning Outcomes and Specifications
a)Information and Communication Technology and Society
b)Computer Systems
c)Computer Networks and Communications
Form 5 Learning Outcomes and Specifications
a)Multimedia – Toolbook Assistant
b)Programming – Visual Basics
c)Information Systems
Session 2
Date:14.1.2010
Activities:
-Discussed about the usage for internet in school
Pusat Akses (Ascess Room) in school
Computer Lab in school
Personal computer at home
-Wrote an essay (What you specialize in ICT)
Session 1
Date:12.1.2010
Activities:
-Introduction to ICT
ICT also known as information and communications technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.ICT are the technologies used in the conveying, manipulation and storage of data by electronic means.
ICT Diary - May
Date:4.5.2010
Activities:Hands on activities
Session 22
Date:6.5.2010
Activities:
- Discussed about Microsoft and Windows Operating System
Session 23
Date:11.5.2010
Activities:
-Malaysian-Australian Conferencing
Session 24
Date:13.5.2010
Activities:
-Discussed about Computer Systems
Session 25
Date:18.5.2010
Activities:
-Updated blog - Technical Error
-Found about Apple Technology and latest products
Monday, May 3, 2010
ICT Diary 2010 Session 1 to 20
ICT Diary 2010
Session | Lesson | Date |
1 Introduction to ICT 12.1.2010
ICT :- Information Communication and Technology
ICT also known as information and communications technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.ICT are the technologies used in the conveying, manipulation and storage of data by electronic means.
2 Usage for the internet 14.1.2010
- Pusat Akses (Ascess Room) in school
- Computer Lab in school
- Personal computer at home
3 Learning Outcomes and Specifications 19.1.2010
Form 4 Learning Outcomes and Specifications
a)Information and Communication Technology and Society
b)Computer Systems
c)Computer Networks and Communications
Form 5 Learning Outcomes and Specifications
a)Multimedia – Toolbook Assistant
b)Programming – Visual Basics
c)Information Systems
4 Definition of ICT 23.1.2010
Communication
- Important to gain knowledge
Tools that transmit ICT are
a)Televisyen
b)Radio
c)Handphones
5 Services of Internet 25.1.2010
1.Worldwide web
2.E-mail
3.IRC
4.Mailing List
5.Newsgroup
6.FTP = File Transfer Protocol
7.Telnet = Remote log in
6 Usage of computer NO.5 28.1.2010
- Signed up for net class.
- Posted links about the five generation of computers.
- Searched for information about learning outcomes.
- Went to Youtube.
7 Computer Ethics and Legal Issues 2.2.2010
- Guidelines on the e-mail and the internet usage
- Unethical computer code of conducts
- Ethics refers to a standard of moral guidelines that is used to determine proper behaviour
8 Authentication 4.2.2010
Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.
9 Computer Crimes 9.2.2010
- Fraud
- Copyright Infringment
- Theft
- Attacks
10 Computer Security 11.2.2010
o Hardware Security
o Software Security/Data Security
o Network Security
11 Assignment 23.2.2010
Download Hardcopy Pro
12 Antivirus 9.3.2010
Antivirus Programs
- Panda Internet Security
- Avira Antivirus
- AVG Antivirus
- Norton Antivirus
13 Malicious Code 11.3.2010
- Virus
- Spyware
- Logic Bomb
- Trojan Horse
14 Input and Output Devices 23.3.2010
Input devices
Send data by :-
- Typing Keyboard
- Use microphone
- Click Mouse
- Webcam
Output Devices
Receive data by :-
- Monitor
- Speaker
- Printer
15 Assignments 8.4.2010
o Send Lesson Plans 05 – 09 before the next day
o Do correction for the exam
o Do Learning Outcomes 05
o Download Learning Module – PC Assembling
o Go through lesson plans 06 - 09
16 Malaysia – Australia Conferencing 14.4.2010
17 Assignments 16.4.2010
o Proceeded with learning outcomes 05
o Send teacher learning outcomes
18 Malaysia – Australia Conferencing 20.4.2010
19 PC Assembling 22.4.2010
20 Malaysia – Australia Conferencing 28.4.2010
Malaysia - Australia Connection Day 1
On the 13th April of the year 2010,my ICT class had been given a chance to communicate with the students of Year 11 ITC class of Hawkesdale P12 College.With the invention of skype and illuminate,this was made possible.I was very honored and grateful to be in this class because not many students were given a golden chance like this.When my friends and I entered the computer lab of our school :-
1)We downloaded javascript in order for illuminate to work but the internet was slow so it took quite a while to download.While downloading javascript,my friends and I introduced ourselves to the Australian students through skype through Mr Zainuddin's(Our ICT teacher) laptop.When I first saw the Australian students,I was shy and tried to hide behind my friends but all of them including Mr Zainuddin chose me to do the introduction and I was the first to introduce myself.
2)After we downloaded Javascript,we logged into Illuminate.I could see a white board with a lot of drawings.
3)We tried to communicate but some of our microphones were not working properly.
4)Unfortunately,the bell of the Australian student's school rang so they had to go.
We had encountered a lot of technical difficulties but we hope this won't happen again.I believe this was an great chance to communicate with the people from other countries and make new friends.We will be going to have conferencing again the following Tuesday.Can't wait.
Our introduction board also known as wallwisher :-
Our pictures during the conferencing and by the way , I am the guy with the blue name tag.
Our view of the Australia students from Malaysia :-