Monday, May 31, 2010

Session 25

Session 25
Date:18.5.2010

Activities:
- Teacher was absent so all of the students did their own work.
- Updated blog
- Researched about Apple and Microsoft technology

Session 24

Session 24
Date:13.5.2010

Activities:
- Discussed about project work
- 3 assignments were given
a)Give 2 examples of pervasive multimedia and application
b)Give 2 examples of pervasive business
c)Give 2 examples of pervasive entertainment and education

Session 23

Session 23
Date:11.5.2010

Activities:
- 4th Malaysia - Australia Conferencing
We log into illuminate again for the conferencing.During the conferencing,we were ask 3 questions.

a)Why should we blog?
My answer:To show people what we have done.
b)What is your favorite song?
My answer:Fields by Adam Lambert
c)Which country would you like to visit most and which friend from the other school would you like to take?
My answer:Spain and I would bring George.

Session 22


Session 22
Date:6.5.2010

Activities:
- Discussed about operating systems

An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless.


The main functions of an OS include:

In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn.

It manages the sharing of internal memory among multiple applications.

It handles and monitors input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. [8]

It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred.

It can offload the management of what are called batch jobs (for example, printing) so that the initiating application is freed from this work.

On computers that can provide parallel processing, an operating system can manage how to divide the program so that it runs on more than one processor at a time.

Scheduling the activities of the CPU and resources to achieve efficiency and prevention of deadlock. [9]

Friday, May 28, 2010

Session 21

Session 21
Date:4.5.2010

Activities:
- Pc Reformatting
(Hands on activities)

Session 20

Session 20
Date:28.4.2010

Activities:
- 3rd Malaysia - Australia Conferencing
- 3 questions were ask during the conferencing
a)What are you proud of your country?
My answer:The food
b)Do you prefer to live in the city or country?Why?
My answer:Country because the environment is cleaner and peaceful
c)What is the symbol of your country?
My answer:The Hibiscus

Session 19

Session 19
Date:22.4.2010

Activities:
- PC Assembly
(Hands on activities)

Session 18

Session 18
Date:14.4.2010

Activities:
- Logged in to Illuminate
- 2nd Malaysia - Australia Conferencing

Session 17

Session 17
Date:10.4.2010

Activities:
- Proceeded with learning outcomes 05
- Send teacher learning outcomes

Session 16

Session 16
Date:8.04.2010

Activities:
- 1st Malaysia - Australia Conferencing
- Used Illuminate to communicate

Session 15

Session 15
Date:8.4.2010

Activities:
- Assignments

a)Send Lesson Plans 05-09 before 9.4.2010
b)Do correction for exam
c)Proceed with learning outcome 05
d)Download Learning Module(PC Assemble)

Session 14


Session 14
Date:23.3.2010

Activities:
- Discussed about computer systems

The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes.
A computer system is sized for the total user workload based on (1) number of users sharing the system simultaneously, (2) type of work performed (interactive processing, batch processing, CAD, engineering, scientific), and (3) amount of storage. Following are the components of a computer system and their significance.

Session 13

Session 13
Date:11.3.2010

Activities:
- Discussed about malicious codes

Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage.The agent for malicious code is the writer of the code, or any person who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.
a) Virus
- A program that can pass on the malicious code to other programs by modifying them.
- Attaches itself to the program, usually files with .doc, .xls and .exe extensions.
- Destroys or co-exists with the program.
- Can overtake the entire computing system and spread to other systems.

b) Trojan Horse
- A program which can perform useful and unexpected action .
- Must be installed by users or intruders before it can affect the system’s assets.
- An example of a Trojan horse is the login script that requests for users’ login ID and password.
- The information is then used for malicious purposes.

c) Logic Bomb
- Logic bomb is a malicious code that goes off when a specific condition occurs.
- An example of a logic bomb is the time bomb.
- It goes off and causes threats at a specified time or date.

e) Trapdoor and Backdoor
- A feature in a program that allows someone to access the program with special privileges.

f) Worm
- A program that copies and spreads itself through a network.

Session 12

Session 12
Date:9.3.2010

Activities:
- Given tips for incoming exam

- Discussed about Authentication and Verification methods





Authentication is a process where users verify that they are who they say they are.The users who attempt to peform functions in a system is in fact users who is authorized to do so.Methods of authentication are biometric device and callback system.
Verification, in engineering or quality management systems, it is the act of reviewing, inspecting or testing, in order to establish and document that a product, service or system meets regulatory or technical standards. By contrast, validation refers to meeting the needs of the intended end-user or customer. Verification (spaceflight), in the space systems engineering area, covers the processes of qualification and acceptance Verification theory, philosophical theory relating the meaning of a statement to how it is verified .Third-party verification, use of an independent organization to verify the identity of a customer.

Session 11

Session 11
Date:23.2.2010

Activities:
- Given Assignments
a)Add links about the learning outcomes for nicenet
b)Download Hardcopy pro(A program that enables the computer to screen capture)

Session 10

Session 10
Date:11.2.2010

Activities:
- Given assignment
Hand over lessons plans before 24 February

- Discussed about computer security

Computer security is a branch of computer technology known as information
security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster,while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. There are three types of computer security which are hardware security, software security and network security.

Session 9


Session 9
Date:9.2.2010

Activities:
- Discussed about computer crimes

Fraud

Computer fraud can be defined as the use of a computer to gain unauthorized access to information or perform activities with the explicit goal of gaining material goods at the expense of others through criminal means. While fraud has been around since the advent of humanity, computer fraud is a relatively recent phenomenon, and since computers are so ubiquitous in the everyday lives of most of us, we are all exposed to its dangers to some degree.

Copyright Infringement

Copyright infringement (or copyright violation) is the unauthorized or prohibited use of works covered by copyright law, in a way that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.

Theft

There a lot of types of thefts with the usage of computer.The most common among all are identity theft. Identity theft is a term used that is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.

Attacks

Computer attacks is the attacks towards a computer by physically or by using another computer.Viruses is common to attack computers.Damaging a computer physically is damaging the computer by hitting or throwing it.

Session 9

Session 8

Session 8
Date:4.2.2010

Activities:
- Assignments were given by Mr Zainuddin
a)Download module sent by teacher via Yahoo Mail
b)Read the learning module for the incoming exam

- Discussed about Authentication

Authentication is a process where user verifies their identity.The four commonly authentication methods are:-

a)User identification
b)Possessed object
c)Biometric device
d)Callback system

Session 7

Session 7
Date:2.2.2010

Activities:
- Discussed about computer ethics and legal issues

Ethics, in the classical sense, refers to the rules and standards governing the conduct of an individual with others. As technology and computers became more and more a part of our everyday lives, we must understand that the problems that have always plagued business and conduct will continue to be a problem. In fact, a new medium can provide even more difficult questions of judgement. In other words, since the introduction of the World Wide Web, the definition of ethics has evolved, too. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers.

Law
Most of the time laws are written, approved, and then enforced by the level of government where they were written. For example, a State law is enforced by the state. A Federal law is enforced by the Feds.

Ethics
Ethics are like rules of conduct. Most occupations have ethics that come along with the job. They are not written done, they are unspoken rules of conduct that people adhere to.

Wednesday, May 26, 2010

Session 6

Session 6
Date:28.1.2010

Activities:
(Mr Zainuddin was absent so I used computer no 5 to do my assignments)
- Signed up for net class.

- Posted links about the five generation of computers.

- Searched for information about learning outcomes.

- Went to Youtube.

Session 5

Session 5
Date:25.1.2010

Activities:
-Discussed about the services of the Internet

a)Worldwideweb
b)E-Mail
c)IRC
d)Mailing
e)Newsgroup
f)FTP(File transfer protocol)
g)Telnet(Remote log in)

-Given a task to make an account in nicenet
www.nicenet.org

Session 4

Session 4
Date:23.1.2010

Activities:
-Discussed the definition of ICT

I-Information
C-Communication
T-Technology

Session 3

Session 3
Date:19.1.2010

Activites:
-Discussed on what are we going to study in the future

Form 4 Learning Outcomes and Specifications

a)Information and Communication Technology and Society
b)Computer Systems
c)Computer Networks and Communications

Form 5 Learning Outcomes and Specifications

a)Multimedia – Toolbook Assistant
b)Programming – Visual Basics
c)Information Systems

Session 2

Session 2
Date:14.1.2010

Activities:
-Discussed about the usage for internet in school

Pusat Akses (Ascess Room) in school
Computer Lab in school
Personal computer at home

-Wrote an essay (What you specialize in ICT)

Session 1

Session 1
Date:12.1.2010

Activities:
-Introduction to ICT

ICT also known as information and communications technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.ICT are the technologies used in the conveying, manipulation and storage of data by electronic means.

ICT Diary - May

Session 21
Date:4.5.2010

Activities:Hands on activities

Session 22
Date:6.5.2010

Activities:
- Discussed about Microsoft and Windows Operating System

Session 23
Date:11.5.2010

Activities:
-Malaysian-Australian Conferencing

Session 24
Date:13.5.2010

Activities:
-Discussed about Computer Systems

Session 25
Date:18.5.2010

Activities:
-Updated blog - Technical Error
-Found about Apple Technology and latest products

Monday, May 3, 2010

ICT Diary 2010 Session 1 to 20

ICT Diary 2010

Session

Lesson

Date

1 Introduction to ICT 12.1.2010

ICT :- Information Communication and Technology

ICT also known as information and communications technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.ICT are the technologies used in the conveying, manipulation and storage of data by electronic means.

2 Usage for the internet 14.1.2010

- Pusat Akses (Ascess Room) in school

- Computer Lab in school

- Personal computer at home

3 Learning Outcomes and Specifications 19.1.2010

Form 4 Learning Outcomes and Specifications

a)Information and Communication Technology and Society

b)Computer Systems

c)Computer Networks and Communications

Form 5 Learning Outcomes and Specifications

a)Multimedia – Toolbook Assistant

b)Programming – Visual Basics

c)Information Systems

4 Definition of ICT 23.1.2010

Communication

- Important to gain knowledge

Tools that transmit ICT are

a)Televisyen

b)Radio

c)Handphones

5 Services of Internet 25.1.2010

1.Worldwide web

2.E-mail

3.IRC

4.Mailing List

5.Newsgroup

6.FTP = File Transfer Protocol

7.Telnet = Remote log in

6 Usage of computer NO.5 28.1.2010

- Signed up for net class.

- Posted links about the five generation of computers.

- Searched for information about learning outcomes.

- Went to Youtube.

7 Computer Ethics and Legal Issues 2.2.2010

- Guidelines on the e-mail and the internet usage

- Unethical computer code of conducts

- Ethics refers to a standard of moral guidelines that is used to determine proper behaviour

8 Authentication 4.2.2010

Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.

9 Computer Crimes 9.2.2010

- Fraud

- Copyright Infringment

- Theft

- Attacks

10 Computer Security 11.2.2010

o Hardware Security

o Software Security/Data Security

o Network Security

11 Assignment 23.2.2010

Download Hardcopy Pro

12 Antivirus 9.3.2010

Antivirus Programs

- Panda Internet Security

- Avira Antivirus

- AVG Antivirus

- Norton Antivirus

13 Malicious Code 11.3.2010

- Virus

- Spyware

- Logic Bomb

- Trojan Horse

14 Input and Output Devices 23.3.2010

Input devices

Send data by :-

- Typing Keyboard

- Use microphone

- Click Mouse

- Webcam

Output Devices

Receive data by :-

- Monitor

- Speaker

- Printer

15 Assignments 8.4.2010

o Send Lesson Plans 05 – 09 before the next day

o Do correction for the exam

o Do Learning Outcomes 05

o Download Learning Module – PC Assembling

o Go through lesson plans 06 - 09

16 Malaysia – Australia Conferencing 14.4.2010

17 Assignments 16.4.2010

o Proceeded with learning outcomes 05

o Send teacher learning outcomes

18 Malaysia – Australia Conferencing 20.4.2010

19 PC Assembling 22.4.2010

20 Malaysia – Australia Conferencing 28.4.2010

Malaysia - Australia Connection Day 1

On the 13th April of the year 2010,my ICT class had been given a chance to communicate with the students of Year 11 ITC class of Hawkesdale P12 College.With the invention of skype and illuminate,this was made possible.I was very honored and grateful to be in this class because not many students were given a golden chance like this.When my friends and I entered the computer lab of our school :-


1)We downloaded javascript in order for illuminate to work but the internet was slow so it took quite a while to download.While downloading javascript,my friends and I introduced ourselves to the Australian students through skype through Mr Zainuddin's(Our ICT teacher) laptop.When I first saw the Australian students,I was shy and tried to hide behind my friends but all of them including Mr Zainuddin chose me to do the introduction and I was the first to introduce myself.

2)After we downloaded Javascript,we logged into Illuminate.I could see a white board with a lot of drawings.

3)We tried to communicate but some of our microphones were not working properly.

4)Unfortunately,the bell of the Australian student's school rang so they had to go.

We had encountered a lot of technical difficulties but we hope this won't happen again.I believe this was an great chance to communicate with the people from other countries and make new friends.We will be going to have conferencing again the following Tuesday.Can't wait.

Our introduction board also known as wallwisher :-




Our pictures during the conferencing and by the way , I am the guy with the blue name tag.


Our view of the Australia students from Malaysia :-