BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Monday, September 28, 2009

Test 2 (8 september 2009)

QUESTION 2 :

The sequence of events in the development of an information system (application), which requires mutual effort on the part of user and technical staff.

1. SYSTEMS ANALYSIS & DESIGN

feasibility study

general design

prototyping

detail design
functional specifications
2. USER SIGN OFF
3. PROGRAMMING
design
coding
testing
4. IMPLEMENTATION
training
conversion
installation
5. USER ACCEPTANCE


The process of developing a new system will have to follow a strict order of a cycle called the system development cycle.The activities in this system development firstly is planning.In planning it must review project requires.
Analysis is the second process in the system development cycle.Which is it must context pull monary investigation before developing a new system.
Thirdly is design for the nem system.To make a design the team must know that their design acquire hardware and software if necessary.
Lastly is implementation.Implementation process must be develop programs if necessary. Then install the new system to know the system is better with the process of the new system.Then convert the new system to replace the old system.

QUESTION 3 :

The advancement of computing industry and computer networking bring about major threat to mankind especially in the area of information privacy. Security is breached and identities are stolen by culprits for personal gain. Identify ways the culprits use to access personal information and what we can do to stop this issue once at all, by using the including available technologies that can determine our true identities especially when we go online.

The ways that the culprits use to access the personal information is by sending a spyware to the computer. This spyware will take the information about the users and send it to the culprits. Next, the culprits also may can use a virus in order to access the one's personal information where the virus for example will spoil or damage the security system of the computer. So, the computer will be easily exploited by the culprits. The example of these viruses are like worm and trojan. Worm virus will duplicate the files and will make the computer hang or jammed. The trojan virus will cause the infected files corrupted. So, if the security files of the computer will no longer protect the computer. Hence, the culprits can be easily access the person's personal information.



extra assgmnt : test 1 ( 11 AUGUST 2009)

QUESTION 1:

a)Computer is an electronic device which square-shaped look with the other output and input device such as processor,system unit,mouse,motherboard etc..

Explanation:
1.To turn on the computer,click on the button start.
2.The users click on the button(shift+T) to make capital letter of T and it will sent to the system unit.
3.The system unit will received the data and converted it in application and stored the information in the memory
4.The system unit will sent the complete information to the computer and it will display an image of capital letter of T

b)Computer literacy is the knowledge about computer on how to use it.

c)Nowadays,computers become a necessary device to us in our daily life.Every part of our life needs and use computers as a medium to make our life better.every one is not sxcepted from this modern and important device included kids,teenagers,adult,and also old folks.Every one of them use computers in a different way,different places.For example for kids,they are learn about computers started from the kingdergarden.Sometimes,they learn more early about the computers

QUESTION 2 :

a)It use the internet connection to connect with others and a blog also can be shared with others as a form of group ware. Other than that, blog also have the security login which is by using password in order to enable someone to open or start blogging.

b) Advantages of blog

  1. The consumer and citizen are potentially better informed and this can only be good for the long-term health of our societies and economies.
  2. Blogs have potential to help the organization develop stronger relationships and brand loyalty with its customers, as they interact with the ‘human face’ of the organization through blogs.
  3. Blogs, in an intranet environment, can be an excellent way of sharing knowledge within the organization.
  4. Blogs can be a positive way of getting feedback, and keeping your finger on the pulse, as readers react to certain pieces, suggest story ideas, etc.
  5. Blogs can build the profile of the writer, showcasing the organization as having talent and expertise.
Disadvantages of blog
  1. Most people don’t have very much to say that’s interesting, and/or are unable to write down their ideas in a compelling and clear manner.
  2. I have often found that the people who have most time to write have least to say, and the people who have most to say don’t have enough time to write it. Thus, the real expertise within the organization lays hidden, as you get drowned in trivia.
  3. Like practically everything else on the Web, blogs are easy to start and hard to maintain. Writing coherently is one of the most difficult and time-consuming tasks for a human being to undertake. So, far from blogs being a cheap strategy, they are a very expensive one, in that they eat up time. As a result, many blogs are not updated, thus damaging rather than enhancing the reputation of the organization.


Monday, June 15, 2009

chapter1 : introduction to computer


~electronic device, operating under the control of instruction stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the result for future use


~advntage:speed, reliability, consistency, storage, and communication
~disadvntge: voaltion of privacy, public safety,health risk


~input devices, output device, system unit, storage devices, and communication devices


~a network is a collection of computer and device connected together, often wireless
~the internet is a worldwide colection of network


~personal computer, mobile computer, game consoles, servers, mainframes, supercomputer, embedded computer

Tuesday, June 2, 2009

1st ASSIGNMENT...

OBJECTIVE:
my objective 4 diz class...?i think la...my objective 4 diz class,erm..i wanna to be expert about cmputer??actually i only noe juz a little bit about sofware and hardware...sofware tu tau la jugak psal power point, word, excel, flash.so ..i really need diz class 4 my future..hahahah(nk msk court pon kn la gak blaja cmputer...).in addition...i also want to know about computer information.yeah...such as whats the latest cmputer edition..latest sofware..window vista...window 7...n sumthing like that la.bila dah blajar psal hardware2 ni...i think i can repair,format..my own laptop or computer right?yeah..diz is my main objective!

ASPECTATION:
my aspectation for diz class....erm..i hope i can be a best student in diz class.i want to be a bestest among the best...i wanna be a person that not so'ketinggalan zaman' about computer.i also hope that i can accept the assignment that given by our lecturer..(kn siap,by date!).i hope that i can explore more about ICT...n more interesting to computer..

sekapur sireh,pembuka bicara....

assalamualaikum....diz is my 1st assignment in diz class!i really dunno what to do wif diz blog...but our sir,mr.shahadan wanna us to use diz blog 4 his class.4 csc134 class actually mr.shahadan wanna us to do diz assignment about our objective 4 diz class n 2nd posting about our aspectation to his class...actually diz is my 2nd blog..n i'm as a blogger ...suka la nk ngarut2 ni..hehehe..sorry SIR!