Wednesday, September 30, 2009

test 1 & 2

(Part C:- essay answer test 1)

Question 2

1. Two characteristic of a blog are, the user or the owner of the blog must enter his/her ID address and password to enter into his/her blog. The blog also can be created by any ages. The outsider can view the blog by typing the blog address.

2. Three advantages of blog are the person can type their story or write something like journal in the blog and preview it in the internet or in the blog where someone else can read it. Blog also can communicate with the others people. The blogger can communicate with the other people in the other country. The advantages of the blog also can find information and sharing the information. The information that the person has, he can type it in the blog and the other people can read it.

Three disadvantages of blog are the blogger can write anything that he/she want including the bad things. By writing it in the blog, it may couse uncomfortable for a certain person example writing something thet related to the religion. But the identity of the blogger is secret and the reader does not know who wrote it. Others disadvantages of blog is can make unethical things. Such as write a story that been take from a story book without the writers permission. Privacy interruption. A person privacy can be interrupting byview it on the blog. This situation may couse mental or emotion problem to the person that his/her privacy that been interrupted.





Question 3

1 Malaysia

Three types of software that can be used are Winamp software, Microsoft word software and Movie Media Maker Software.
Winamp software is softwarethat can play movie or video. By using the Winamp Software, the person can used it to watch movie or video that has related to 1 Malaysia that is the video that show the cooperation between the ethic and culture. Besides that, it also can display songs. So, people can plays the songs such as 1 Malaysia song, Negaraku or patriotic songs. So, by using this software, all Malaysian can watch the movie and hear the song that can make us as 1 Malaysia.
By using the Microsoft Word Software, the person can write a journal about 1 Malaysia. By using this software, the journal can be printed and give it to everyone in Malaysia. It also can make pamphlets that show the relationship between the Malays, Chinese, and Indian. By using this Microsoft word software, it also can create poster. The posters that show 1 Malaysia can be pasted on the wall and also the poster can be use during the campaigned.
Movie media maker software also can help the government to achieve their goals to create 1 Malaysia among the Malaysian citizen. By using this software, the person can take a video that show the lifestyle among the Malays, Chinese, and Indian. The person can also take the picture and video that shows the cooperation between them and also the loving situation for example the situation that shows each of the community helps each other. The video can be combining and edited to make the full video or movie. Then the video can be published.
All of the three types of software can be used to help the government to promote 1 Malaysia and successfully achieve the goals.

(Part C:- essay answer test 2)

Question 2

The process of developing a new system will have to follow a strict order of a cycle called the system development cycle.
The first phase is planning. The company will arrange one group to developing the new system. In the first phase that is planning, the group will plan the system that they will makes. They also will discuss about what the system that their costumer want. After they plan the new system, they will go to the second phase.
The second phase is analyse. After planning the system, the will analyse the new system. They will make sure that the plan of the new system can be used and fulfil the desire of the system. They also analyse if the system can be accepted and can be used.
In the third phase, the group will design after their analysing is accepted. The group will design the new system and make sure the design are attractive. The new system must be design because to make sure that there were no mistake. It also to make sure that the system been organized in.
The forth phase is implementing. The implementing are to install and test the new system. The system is been tested and to make sure it is in the good condition. It also to save all the data and to train the user and developers.
The last phase is operating. The operating phase is the group will test or use the new system. After this phase the new system can be used.


Question 3

The advancement of computing industry and computer networking bring about major threat to mankind especially in the area of information privacy. Security is breached and identifies are stolen by culprits for personal gain. There were many ways culprits use to access personal information.
The ways of the culprits to stole the personal gain are the culprit known as the information theft. They stole the others information for their own goods. Moreover, by stealing the others information, he/she can gain money. For examples, when the culprit stole on one company, he/she can sold the information to the other company to gain money.
The culprit is professional. They can enter to the company and steal the other information by open the computer that save all the information. The culprit also can interfere the computers that has less security. The culprit will save all the information or send it to the other receiver by internet. The culprit also can send a virus, worm or Trojan horse to disturb the data.
To stop this issue once and for all are the users should use biometric device that are sing the fingerprint, iris ore eye, and voice scanner. By using this device, the owner should use their fingerprint to on or to open his/her computer or personal detail. It means that the other person cannot open it every person has different fingerprint. By using the iris scanner, the computer or the device will scan the owner eyes. For the voice scanner, the owner should say the passwords and the voice scanner can detect the voice. If the voice are different, the access will deny.
Moreover, the uses of PIN. By using the PIN, the owner can enter her/his password. The longer the PIN number, the better the passwords. So, if the culprit enter the wrong password, the computer will be block.

Tuesday, June 2, 2009

A sECret wOman MakES A wOman WoMAN

23 of Mei 2009.....
UITM, Merbok....... Here i come!!

CSC 134......

Ojective...

To improve and extend the skill of computer that important in this new era of globalisation. Many people just know the basic of the computer. So, by learning this subject, all of the function of the computer we will know deeply and we can applicate the knowledge in our daily life. Through the computer, society has instant access to information from around the globe. Moreover the objective by learning this subject, we manage to know about the data and information, components of the computer that has a different function, networks, computer sofeware and etc. Furthemore, ones can take the benefit from the advantages of using the computer.

Expectation......

My expectation by learning this subject is :-
-to learn about the computer tecnology stream deeper
- to understanding the concep about the computer information processing
- to upgrade the acknowledgment about the stream related to the science computer
- to become one of the person that manage to explore the computer widely
-makes our daily life more easier becouse nowdays everything is using the tecnology
-manage to get and to find information easily and faster
-become a student that stand in the same level of mastering the tecnology with the other student n people around the world
-to increase the number of people that expert in this field

computer & me

i use to play the computer since i was a child........
and i also got into a fight with my brother about the computer..
'its my turn now!'........
when i become older, the fight betwen us are over becouse my brother have his own laptop......
i use ta play games. then, i like to watch korean drama until midnite and was be scold by my mother in the next morning.
i also use the computer to make power point for my presentation of some subject.
i also like to listening to the music and editing photo in my father's computer.
i also surf the internet to find information about the subject that i use to learn in my school...
ok!!!
that is the conclusion all about me and the computer.
now i have my own laotop that i buy by my own money and a little bit support from my father..
i hope after i learn CSC134, i can know deeply about my MR.TOSHI..