Somewhere out of no where

Description here....

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday, 7 October 2014

ICT Section 52

Section 52
30.9. 2014

Today , Mr.Z has discussing about our coming ICT exam and all about the important planning for next year . So here they are,
We are going to do 3 things after our last term exam.
1. Database
2. multimedia
3. programming

For next year Form 5, we all will spend our time in Documentation.
And so , at the end of the year , those note that you have recorded, combined it and become a book . It can be sell out to the others. (by doing our LO.

Beside, there will be some others school teacher come to our school to check and visit what have we done in that year .

No longer, we are going to start to learn those software now before the new year .
-about powerpoint
-microsoft excess
-database

First, we need to learm how to explore all the software, such as
• Text
• Audio
• animation
• graphic

Meanwhile, we also have to learn about how to make the powerpoint looks interesting

Graphic » choose any picture from internet
              » come out with your own picture
              » original file
              » snack picture and put it in your slide

Video » need to edit
          » need to cut
*these all must using Graph editor and Video editor

Database
• You have to use microscope excess
• Learn information system
• How to define inform-process data
• Primal ID
• Prepare information system

Programming
• Visual basic
• Create simple programme

ICT Section 51

Section 51
23.9.2014

It has been a mid - semester 2 break in 13-21 September 2014 . So, today we were having a Revision of Learning Area 03

ICT Section 50

Section 50
11.9.2014

Revision Learning Areas 01 - 02

ICT Section 49

Section 49
9.9.2014

Revision of Learning Areas 01 - 02

ICT Section 48

Section 48
4.9.2014

Revision of Learning Areas 01 - 02

ICT Section 47

Section 47
2.9.2014

Revision of Learning Areas 01 - 02

ICT Section 46

SPM Documentation- paper two

Monday, 1 September 2014

ICT Section 45

Section 45  26.8.2014


ICT Section 44

Section 44  21.8.2014


ICT Section 43

Section 43    19.8.2014

Example of Open Source Application software

ICT Section 42

ICT Section 41

Section 41       12.8.14

File Transfer Protocol (FTP)

File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet.

ICT Section 40

Section 40   7.8.2014

State the function of various client software

WEB BROWSER
A web browser is a software application that enables a user to display and interact with HTML documents hosted by web servers or held in a file system.Text and images on a web page can contain hyperlinks to other web pages at the same or to different websites.Web browsers allow a user to quickly and easily access information provided on many web pages at many websites by surfing these links.
Web browsers available for personal computers include Microsoft Internet Explorer, Safari, Netscape and Opera. Web browsers are the most commonly used type of Hypertext Transfer Protocol (HTTP) user agent. Although browsers are typically used to access the World Wide Web, they can also be used to access information provided by web servers in private networks or content in file systems.

EMAIL CLIENT
An email client is a computer program that is used to read and send email.

FILE TRANSFER PROTOCOL (FTP) CLIENT
File Transfer Protocol (FTP) client is used to connect two computers over the Internet so that the user of one computer can transfer files and perform file commands on the other computer.

Saturday, 26 July 2014

ICT Section 39

Section 39  24.7.14

This coming holiday , Mr.Z informed us to do some homework . Although this holiday is for Hari Raya celebrating seasons , as an ICT student , we might not be lazy . We have to find out some information that we do not know in ICT world.

I am appreciated that this holiday might be useful for me. It will be great if I have found out some interested things in ICT that I do not know ...

ICT Section 38

Section 38  22.7.14

Cable section.

ICT Section 37

Section 37  17.7. 14

Today is the day that we were doing the network facilities setup activity.
Cross cable & Straight cable

ICT Section 36 (Network Facilities Setup)

Section 36   15.7.14

Students have to complete all fourth tasks:
1. Crimp a straight cable
    a. Skin off the cable jacket
    b. Untwist and straighten each wire
    c. Arrange the wire according to the 568B wiring schematic order for both ends
    d. Cut and insert the wires into using RJ45 connector.
    e. Crimp the cable using a crumping tool.

2. Check the straight cable is crimped successfullly using a cable tester

3. Crimp a crossed cable

4. Check the crossed cable  is crimped successfully using a cables tester

Friday, 11 July 2014

ICT Section 35

Section 35   10.7.14

Network Interface card

Short for Network Interface Card, a NIC is also commonly referred to as an Ethernet card and network adapter and is an expansion card that enables a computer to connect to a network such as a home network or the Internet using an Ethernet cable with a RJ-45 connector.

 RJ-45 connector.

  • RJ45 (telecommunications), a connector used for modem connections
Straight cable
Cross cable
A crossover cable connects two devices of the same type, for example DTE - DTE or DCE - DCE, usually connected asymmetrically (DTE-DCE), by a modified cable called a cross link

What is the defference between Cross Cable and Straight Cable

 Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each type will have different wire arrangement in the cable for serving different purposes.

Straight Cable
Usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (Normally used for expanding network)
5) Connect two switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.
If you need to check how straight cable looks like, it's easy. Both sides (side A and side B) of cable have wire arrangement with same color.

Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (Normally used for expanding network)
3) Connect two switches/hubs by using normal port in both switches/hubs.
In you need to check how crossover cable looks like, both side (side A and side B) of cable have wire arrangement with following different color.
This cable (either straight cable or cross cable) has total 8 wires (or we can say lines), i.e. four twisted pairs (4x2=8) with different color codes. Right now just forget about color codes. It doesn’t matter what color is given to the cable (but there is a standard).

ICT Section 34

Section 34     8.7.14




Red Hat Linux, assembled by the company Red Hat, was a popular Linux based operating system until its discontinuation in 2004
  
 Three types of client software
 We often hear about vulnerabilities in client software, such as web browsers and email applications, that can be exploited by malicious content.


Monday, 7 July 2014

ICT Section 33

Section 33    3.7.2014

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.

An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to extranet, a network between organizations, and instead refers to a network within an organization. 

An extranet is a computer network that allows controlled access from outside of an organizations intranet. Extranets are used for specific use cases including business-to-business (B2B).

In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.

ICT Section 32

Section 32  1.7.2014

Network Communication Technology

  • Intranet
  • internet
  • extranet
Protocol - a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. 

3 types of topology
http://compnetworking.about.com/od/networkdesign/a/topologies.htm

ICT Section 31

Section 31  29.6.15

A client is a computer program that, as part of its operation, relies on sending a request to another computer program(which may or may not be located on another computer). For example, web browsers are clients that connect to web servers and retrieve web pages for display. Email clients retrieve email from mail serversOnline chat uses a variety of clients, which vary depending on the chat protocol being used. Multiplayer video games or online video games may run as a client on each computer. The term "client" may also be applied to computers or devices that run the client software or users that use the client software.

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Wednesday, 25 June 2014

ICT Section 30

Section 30 24.6.14

Today we were starting the first Area 3 lesson - Basic Concept
We want to connect to server? ( we want to share program, data..)
- connection with two computer and another devices( computer network)
* When two or more network are link or connect and are able to communication with one another using suitable hardware and software called INTERNERTWORK.

LAN ( Local Area Network)
- small environment
- limited area

MAN
- large physical area
- long distance
-sharing regional resources

WAN ( Wide Area Network)

A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.

Fiber Optic

An optical fiber (or optical fibre) is a flexible, transparent fiber made of extruded glass (silica) or plastic, slightly thicker than a human hair. It can function as a waveguide, or “light pipe”, to transmit light between the two ends of the fiber.

Friday, 13 June 2014

Amazing Technology Invented By MIT - Tangible Media

Wednesday, 7 May 2014

ICT Section 29

Section 29 8.5.14

Today we have an ICT exam in the lab..and had discussion for our mid exam
everyone had past in this mid exam except one,44 sound bad for me =( But at least I had improve ..next term add oil bah..

Recall back ...

- Plotter is not an input device.

- System software controls, integrate and manages the individual component of a computer system

- Example of spreadsheet software
* Lotus 1-2-3
* Microsoft Excel
* OpenOffice Cale
* Borland Quattro Pro

- A control unit fetches instruction from the memory and then decodes and executes them.

- In a computer,1 KB is equal to 1024 bytes

- Computer use binary codes to communicate.

- Jean- Maurine-Emile Bardout(1845-1903) created the teleprinter which used the 5-digit Bardout code

- The clock speed unit in a microprocessor is measured in hertz

- A connector is used to join a cable to a device.

- Camcorders and other video equipments use a FireWire Port to transmit data onto a computer 

- MIDI port is designed to connect the system unit to a musical instrument

- IrDA port is for wireless devices to transmit infrared light wave signals to a computer

- SCSI port is a special highspeed parallel port used to attach peripheral devices such as disk drives and printers.




ICT Section 28

Section 28 6.5.14
http://www.4gamericas.org/index.cfm?fuseaction=page&sectionid=249

ICT Section27

Section 27 1.5.14

Today we log in socrative.com to have some revisions for the last term ICT exam

ICT Section 26

Section 26  29.4.14

WAP-wireless applications protocol
WAP is an open international standard for applicantion that use wireless communication. It enable access to the internet handheld wireless devices such as a mobile phone or PDAS

GPRS-General packet Radio Services
A standard for wireless which run of speed up to 115kbps. It is an efficient use of limited bandwidth and it particularly suited for sending and receiving small bursts of data ,such as email and web browsing

Electromic Mail
A method for composing, sending and recieving messages over the internet to and form in the world using on e-mail account

Internet relay Chat - IRC
 A multiuser chat system, where people meet of "channel" to talk in group, or privately to exchange comments and information about the topics addressed on the site

3G - Third generation
It is the third generation of mobile phones standards and technology. It promises increased bandwidth, up to 384kbps

HSDPA - High Speed Download Packet Access
A new protocol for the mobile telephone data transmission and also known as a 3.5G technology. It provides a downlink with data transmission up to 8.10 Mbps.

Mailing List
A system that allow people to send e-mail to one address, where upon their messages is copied and send to all of the other subscribes to the list

Boardband
A type of data transmission in which a single medium(wise) can carry multiple voice, video or data channels simultaneously.

Newsgroup
Virtual discussion groups on the internet where many Netizens World 

Thursday, 24 April 2014

ICT Section 25

Section 25 24.4.14

We have a PC assemble today..test monitor

ICT Section 24

Section 24 22.4.14

Today, we were learning the definition and the function of operating system. An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.
- Function

The basic functions of an operating system are:
  1. Booting the computer
  2. Performs basic computer tasks eg managing the various peripheral devices eg mouse, keyboard
  3. Provides a user interface, e.g. command line, graphical user interface (GUI)
  4. Handles system resources such as computer's memory and sharing of the central processing unit (CPU) time by various applications or peripheral devices
  5. Provides file management which refers to the way that the operating system manipulates, stores, retrieves and saves data.

Different Types of Application Software

Word Processing Software: This software enables users to create and edit documents. The most popular examples of this type of software are MS-Word, Word Pad and Notepad among other text editors.

Presentation Software: The software that is used to display information in the form of a slide show is known as presentation software. This type of software includes three functions, namely, editing that allows insertion and formatting of text, methods to include graphics in the text and a functionality of executing slide shows. Microsoft PowerPoint is the best example of presentation software.

Spreadsheet Software: Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software. Spreadsheet software allows users to perform calculations using spreadsheets. They simulate paper worksheets by displaying multiple cells that make up a grid.
Database Software: Database is a structured collection of data. A computer database relies on database software to organize data and enable database users to perform database operations. Database software allows users to store and retrieve data from databases. Examples are Oracle, MSAccess, etc.

Multimedia Software: They allow users to create and play audio and video files. They are capable of playing media files. Audio converters, audio players, burners, video encoders and decoders are some forms of multimedia software. Examples of this type of software include Real Player and Media Player.

*Application software utilizes the capacities of a computer directly for a dedicated task. Application software is able to manipulate text, numbers and graphics. It can be in the form of software focused on a certain single task like word processing, spreadsheet or playing of audio and video files. Here we look at the application software types along with some examples of application software

  Describe the two types of software
Two types of software are application software and system software. Application software consists of programs that perform specific tasks for users, such as a word processing program, e-mail program, or Web browser. System software consists of the programs that control the operations of a computer and its devices. The two types of system software are operating systems and utility programs. An operating system (OS) is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A utility program performs a specific task, usually related to managing a computer, its devices, or its programs.

 Cross-platform computing is becoming increasingly important as local-area networks become better at linking machines of different types.

In computing, booting (or booting up) is the initialization of a computerized system. The system can be a computer or a computer appliance. The booting process can be "hard", after electrical power to the CPU is switched from off to on (in order to diagnose particular hardware errors), or "soft", when those power-on self-tests (POST) can be avoided. Soft booting can be initiated by hardware such as a button press, or by software command. Booting is complete when the normal, operative, runtime environment is attained.


ICT Section 23

Section 23 17.4.14

Today Mr.Z informed us that today have a webinar activity on 5.00pm with Miss Jane ( teacher from Rusia).
She will going to teach us English and also will involved some ICT staff. It was free and it also is a online seminar. Mr.Z today also teach us about multimedia presentation. Multimedia professional should process various technical skills such as photography, web and graphic design. In the multimedia road map, there are showing some skills which is video editor, sound editor, animation editor, graphic editor and etc. Graphic design likely used research and analysis to conceptualize and create a flyer which communicates and advertisement message, look good and appeals to the target audience. In multimedia, design is central to working in graphic, motion, sound, typography, and particularly web design. =)

* if you interesting in animation, you may download some software which is animation video maker and etc..
- you can download Aurora 3D animation maker and try it on your own^^
Easy Make 3D Movie Title, Intro text and Logo Animation! Quickly Design your own Animation for Video and Website! Export to Video, GIF, SWF or Image Sequences and used on design or video edit software. Compatible with iMovie, Final Cut, Premiere, Photoshop and so on.

Mr.Z today also warn us about our duty for briged bestari during 7-4.30pm as well in lab. When we are duty, we must wear the west that purple in colour. We should not use the teacher computer except the teacher give you the permission. 

Wednesday, 16 April 2014

ICT Section 22

Section 21

We had a PC assemble activity on that day.

ICT Section 21

Section 21

PCI (Peripheral Component Interconnect)

PCI is an initialism of Peripheral Component Interconnect and is part of the PCI Local Bus standard.

 SERIAL PORT

 - data 

- other devices

-connected device

- attract printer 

-slower connection speed 

Parallel port

   
    USB PORT




                        
 
       
 

Thursday, 10 April 2014

ICT Section 20

Section 20 7.4.2014
1. Fetching - process of obtaining a program or data from memory
2. Decoding - translate a program into signal so it could be execute
3. Executing - instruction is execute and CPU perform required actions and calculator.
4. Store - writing result to storage.

ICT Section 19

In the hardware storage which are divided into two group. First is the primary storage and the second is the secondary storage. Primary storage which are temporary  storage with the B.I.O.S setting (Basic Input/Output System) 
- Secondary storage:
 System & Application 
 A system software is any computer software which manages and controls computer hardware so that application software can perform a task. Operating systems, such as Microsoft Windows, Mac OS X or Linux, are prominent examples of system software. System software contrasts with application software, which are programs that enable the end-user to perform specific, productive tasks, such as word processing or image manipulation.
 Application
Multiple applications bundled together as a package are sometimes referred to as an application suite. Microsoft Office and Open Office.org, which bundle together a word processor, a spreadsheet, and several other discrete applications, are typical examples. The separate applications in a suite usually have a user interface that has some commonality making it easier for the user to learn and use each application. And often they may have some capability to interact with each other in ways beneficial to the user. For example, a spreadsheet might be able to be embedded in a word processor document even though it had been created in the separate spreadsheet application.
Information Processing Cycle(IPC)
Input- text graphic
        - input data to computer system
Output - Result  * Center Processing Unit
                                    * text, number, sound, animation and video
                                    * computer screen, speaker and printer
Process -  Performing the result
Storage - The storage hold databases, files and programs.

* A Bit is represented by the number 1 and 0 = ( binary digit )
* Byte is a unit of information built from bits. One byte equal 8 bits

                       



ICT Section 19

Section 19 3.4.2014
Today our new lesson that we had learn for today was the Learning Area 02- Computer System. Lets start from the defination. Computer System is the combination of components designed to process data and store file. There are 3 things that help us to process data & store file is the software, hardware and the user. Besides that, there are 4 major hardware which is input, output, processor and storage. These are the exaple of the hardware input devices:
Keyboard
mouse
Scanner
Next is the example of hardware output devices:
Next is the hardware processor  :
CPU is same as the human brain..SMART><

Last is the hardware storage:
Hard disk.

 DVD Rom.
























Wednesday, 26 March 2014

ICT Section 18



Section 19 20.3.2014
Mr.Z today called us to start our lesson plan of the learning area 2- Computer System. The due date of the lesson plan is on 1.4.2014 after school holiday.
After that, Mr.Z also order us to prepare for the first section- assemble the components of a personal computer, it may have 13 points on it. In our module 2, it have show us the step to assemble the pc..
In detail..you may watch it.


                                   
A short video..not a full version..

ICT Section 18

Section 18 18.3.2014
Mr.Z had tell us about the SPM assessment . In our paper, it include paper 1 and paper 2. Time for paper is 2 hours 30 minutes. It also cover with ICT syllabus. In paper 1, there will have different level- Low(R), Medium(S) and High(T) = R:S:T- 5:3:2. It will be classify to 3 section A,B,C. In A section, there will be ( true or false, Fill in the blanks and matching etc) Number of question: 25. For the B section, it will be subjective with limited response, number of question: 5. Last the C section, Essay..( i hate it actually) it will have 3 question and you may just choose 2 to ans. *Read the question properly before you answer the essay question, sometimes it will have some trick ...
Next is paper 2.
30 points..
  • Remostration
  • Presentation
  • Writing assignment
  • Project work

ICT Section 17

Section 17 13.3.2014
We also had presentation for today but with different title. The title was including the computer security. Present it by 2 people. We all have skype section with Mr.Z too. So like normal, take turn presented it and teacher will record the names that had present and gave us the marks. On that day, Zi Wei and I had present about the trojan horse.
A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

Example 1

Example 2

 

ICT Section 16

 Section 16 11.3.2014
Because our ICT teacher oversea, so we had a presentation activity on this week lesson. First presentation was the title of ICT and Society with 5 slides each ppl.
We take turn and performed it with our ict classmates. During this process, I had learn many things and get some information from each and everyone about this title.
ICT make us easier

ICT Section 15

Section 15 6.3.2014
We had test also on this day. Just because we don't have took account or biology so we must come down to the computer lab for our ICT lesson. At first, teacher told and show us the marks of the ICT test. It was terrible. Everyone shock when recieved the mark from teacher..so many failler.. just a few past on this paper. We  had let our teacher,Mr.Z felt very disappointed. The worst thing was that the Mr.Z told us that we were so stupid. I agree with it. I was wonder that why on that time I din realized that all ans on that question paper are very near with us. Why i did not walk trough behind and search it..It was so stupid mennn..=="

ICT Section 14

Section 14 4-3-2014
Today we had some ICT test, the first test in this year. It was very hard for me.xD

ICT Section 13

Section 13 27-3-2014
http://www.slideshare.net/sayacintakamoe/current-and-future-development-of-open-source-software-and-latest-development-in-ict
In this slide, it may show some information about the current and future developments.

Friday, 7 March 2014

ICT Section 12

Section 12 24-2-14
That day, En.Z called us to find what is blog. Then we all start searching blog trough website. Finally, we found that blog is a web blog also is a personal notes, record down the things that you did everyday.

Friday, 21 February 2014

ICT Section 11

Section 11-20.2.2014
Today En.Z called us to download module 1. He also told us about a part of the ICT Tests. First, we have to scan virus and spyware in our computer and screen capture it. Follow that, print out that result. Spyware is the one that try to steal information from our computer.  In our computer will have a consultmant that hide inside the software. A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.En.Z called us to use Microsoft security essentials. He also teach us about the cyber law. There are set of rules that if you go against you will be punished . The 1st rule is digital signature, 2nd is computer crime, 3rd is telemedicine , communication and multimedia . The third of the test was prepare the 5 slides of the impact of ICT and Society. 1st slides is title and the last slides is ending. The middle of the slides is about Education, Medicine and many but just 3 and give 2 example in each society. The due date of this slides is on 18 March. The last order by En.Z was choose any topic in Learning Area 1 and prepare 3 slides. We do it in pair and Zi Wei is my partner and we had choose a topic was Trojan horse. We are going to present it to those US ICT students . En.Z told us that the due of this assignment was on 4th March.

Tuesday, 18 February 2014

ICT Section 10

Section 10
Today, En. Z teach us about the computer security. Hmm..how to save our computer security?The answer is set a password on your computer. Nowadays, many cyberbullies are happening in the world. So, we must protecting our data. En.Z had told us today that we must find out what is Malicious software(program that made you life suffer). Now, skypedrive had change the name called onedrive . Last, we had learn the funtion of key log, is safe all websites or keys that we press. That's all i had learn today and i will find out the meaning of malicious software after this..^^I had find out = Malicious software is any software that bring harm to computer system.