Thursday, April 19, 2012

FORM 4:-
       *CHAPTER 1 : INFORMATIONANDCOMMUNICATION  TECHNOLOGY AND SOCIETY(ICTS).
       *CHAPTER 2 : COMPUTER SYSTEMS
       *CHAPTER 3 : COMPUTER NETWORKS AND COMMUNICATIONS
       *CHAPTER 4 : MULTIMEDIA

FORM 5:-
      *CHAPTER 5 : PROGRAMMING
      *CHAPTER 6 : INFORMATION SYSTEMS

Monday, January 16, 2012

happy New Year !!

          selamat tahun baru ! da masuk f5 pun saye.. wah ! cm ta caye taw c0z ase dri cm kecik lg..hakhak.. bile tg0k pintu kelas 5USM ase bangge plak..pape p0wn..azam tahun baru mesti la na sc0re spm an..na dpt result yg gmpak... and,law na dpt result yg gempak mesti laa study smart.. yess ! right ! oke sekian dari saye t0k mase nie.. bubye...:-)))

Thursday, September 8, 2011

1.4 DATA REPRESETATION: BIT, BYTE AND CHARACTER.

BIT.
A bit (short for binary digit) is the smallest unit of data computer can process. The binary system is a number system that has just two unique digits, 0 and 1 called bits. A bit is represented by the number 1 and 0. These numbers represent the binary system. They correspond to the states of on and off, true and false, or yes and no.
BYTE
Byte is a unit of information built from bits. When 8 bits are grouped together as a unit, they form byte. Bits and bytes are the basis for representing all meaningful information and programs on computers.
CHARACTER
One byte is equal to 8 bits. One byte represents a single charactersuch as the number, letter, or symbol. For example, the capital letter F is represented by binary code 01000110 that can be understood  by the computer system.
Computer does not understand letters or numbers or pictures or symbols. Computer uses a binary system to count as it only recognizas two states that are 0 an 1. Number  is represented by binary code 00111001. Eight bits grouped together as a unit are called byte. A byte represents a single character in the computer.
                                         1 byte = 8 bits = 1 character
There are three character codes or coding schemes to represent characters which are ASCII, EBCDIC and Unicode. Each byte contains eight bits. A byte provides enough different combination of 0s and 1s to represent 256 characters.
ASCII is the most widely used binary code for microcomputers (Personal Computer).
EBCDIC was developed by IBM and is used primary for large computer - mainframe and high end server.
The combinations of 0s and 1s are defined by patterns. These patterns are called coding system. The 256- character capability of ASCII and EBCDIC is too small to as Arabic, japanese and Chinese.
The Unicode coding schme is designed to solve this problem. It uses two bytes(16 bits) to represent one character. This gives it the capability for representing 65,536 different characters. This can cover all the world's languages. Unicode is downward-compatible with ASCII, meaning that Unicode can recognizes ASCII characters.
                                                        Unicode
                                      2 bytes = 16 bits = 1character

CHAPTER 2 - COMPUTER SYSTEMS

1.0  System concept
1.1  Define Computer Systems.

Computer is an electronic device, operating under the control of instructions stored its own memory,
  • that can accept data (input),
  • process the data according to specified rules (process),
  • produce results (output),
  • and store the results for future use (storage).
Meaning of input, process, output and storage.
  1. Input - input is any data and instructions entered into the memory of a computer. There are four types of input which are:text, graphics, audio, and video.
  2. Input device - Input device is any hardware component that allows users to enter data and intructions into a computer. Eg:keyboard, mouse, scanner, barcode reader. Also pointing device:mouse, joystick, trackball, touch screen, pointing stick and graphic tablets.'
  3. CPU/central processing unit - CPU is an electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. Eg: intel pentium IV, AMD Athlon, G4.
  4. Output - output is data that has been processed into a useful form, called information.
  5. Output device - Eg: speaker, monitor, LCD projector, p\printer, plotter.
  6. Storage - storage is a location in which data, instructions, and information are saved for future use. Eg: CD ROM, diskette, hard disk.

Tuesday, April 26, 2011

PROCESS OF FILTERING...

The method of choice to limit access on the internet is to filter either by:-
     a)Keyword blocking
        The method uses a list of banned word or objects terms such as xxx ,sex and nude.As the page is downloading ,the filter searches for any these words.If found,it will blocked the page completely,stop downloading the page ,block the banned words an even shut down the browser.

      b)Site blocking
      This method use software to list the web sites that will be blocked by using software.The software also prevents users from being access the web sites on list.


     c)web rating system
     Web sites are rating in terms of nudity,sex,violence and language.The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.

Sunday, March 20, 2011

CONTROVERSIAL CONTENTS AND CONTROL..

2.6  Effect of controversial contents (PORNOGRAPHY and      SLANDER) on society :

Pornography

Pornography is any form of media or material (like books, video or photos) that show erotic behaviour and intended to cause sexual excitement. The effects of pornography on society are :


  • Can lead to criminal acts such as exploitation of women.
  • Can lead to sexual addiction.
  • Can develop lower moral values towards other people.
  • Can erode good religious, cultural, behaviours and beliefs.


        Slander
Slander is a false spoken statements about someone, intended to damage his or her reputation. The effects of slander on society are :

  • Can develop society that disregards on honesty and truth
  • Can lead to bad habits of spreading rumors and untruth
  • Can cause people to have negative attitudes towards another person.

2.5 AUTHENTICATION TECHNOLOGIES..

Authentication is a process where user verifies their identity.Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:

a. User identification (something you know - have to remember). User identification is a unique combination of 
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.




b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account. 

                              




c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 



hand geometry reader










d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation andbusiness transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.
 
Free Website templatesfreethemes4all.comFree Blog TemplatesLast NewsFree CMS TemplatesFree CSS TemplatesFree Soccer VideosFree Wordpress ThemesFree Web Templates