Wednesday, September 30, 2009

test 1 & 2

(Part C:- essay answer test 1)

Question 2

1. Two characteristic of a blog are, the user or the owner of the blog must enter his/her ID address and password to enter into his/her blog. The blog also can be created by any ages. The outsider can view the blog by typing the blog address.

2. Three advantages of blog are the person can type their story or write something like journal in the blog and preview it in the internet or in the blog where someone else can read it. Blog also can communicate with the others people. The blogger can communicate with the other people in the other country. The advantages of the blog also can find information and sharing the information. The information that the person has, he can type it in the blog and the other people can read it.

Three disadvantages of blog are the blogger can write anything that he/she want including the bad things. By writing it in the blog, it may couse uncomfortable for a certain person example writing something thet related to the religion. But the identity of the blogger is secret and the reader does not know who wrote it. Others disadvantages of blog is can make unethical things. Such as write a story that been take from a story book without the writers permission. Privacy interruption. A person privacy can be interrupting byview it on the blog. This situation may couse mental or emotion problem to the person that his/her privacy that been interrupted.





Question 3

1 Malaysia

Three types of software that can be used are Winamp software, Microsoft word software and Movie Media Maker Software.
Winamp software is softwarethat can play movie or video. By using the Winamp Software, the person can used it to watch movie or video that has related to 1 Malaysia that is the video that show the cooperation between the ethic and culture. Besides that, it also can display songs. So, people can plays the songs such as 1 Malaysia song, Negaraku or patriotic songs. So, by using this software, all Malaysian can watch the movie and hear the song that can make us as 1 Malaysia.
By using the Microsoft Word Software, the person can write a journal about 1 Malaysia. By using this software, the journal can be printed and give it to everyone in Malaysia. It also can make pamphlets that show the relationship between the Malays, Chinese, and Indian. By using this Microsoft word software, it also can create poster. The posters that show 1 Malaysia can be pasted on the wall and also the poster can be use during the campaigned.
Movie media maker software also can help the government to achieve their goals to create 1 Malaysia among the Malaysian citizen. By using this software, the person can take a video that show the lifestyle among the Malays, Chinese, and Indian. The person can also take the picture and video that shows the cooperation between them and also the loving situation for example the situation that shows each of the community helps each other. The video can be combining and edited to make the full video or movie. Then the video can be published.
All of the three types of software can be used to help the government to promote 1 Malaysia and successfully achieve the goals.

(Part C:- essay answer test 2)

Question 2

The process of developing a new system will have to follow a strict order of a cycle called the system development cycle.
The first phase is planning. The company will arrange one group to developing the new system. In the first phase that is planning, the group will plan the system that they will makes. They also will discuss about what the system that their costumer want. After they plan the new system, they will go to the second phase.
The second phase is analyse. After planning the system, the will analyse the new system. They will make sure that the plan of the new system can be used and fulfil the desire of the system. They also analyse if the system can be accepted and can be used.
In the third phase, the group will design after their analysing is accepted. The group will design the new system and make sure the design are attractive. The new system must be design because to make sure that there were no mistake. It also to make sure that the system been organized in.
The forth phase is implementing. The implementing are to install and test the new system. The system is been tested and to make sure it is in the good condition. It also to save all the data and to train the user and developers.
The last phase is operating. The operating phase is the group will test or use the new system. After this phase the new system can be used.


Question 3

The advancement of computing industry and computer networking bring about major threat to mankind especially in the area of information privacy. Security is breached and identifies are stolen by culprits for personal gain. There were many ways culprits use to access personal information.
The ways of the culprits to stole the personal gain are the culprit known as the information theft. They stole the others information for their own goods. Moreover, by stealing the others information, he/she can gain money. For examples, when the culprit stole on one company, he/she can sold the information to the other company to gain money.
The culprit is professional. They can enter to the company and steal the other information by open the computer that save all the information. The culprit also can interfere the computers that has less security. The culprit will save all the information or send it to the other receiver by internet. The culprit also can send a virus, worm or Trojan horse to disturb the data.
To stop this issue once and for all are the users should use biometric device that are sing the fingerprint, iris ore eye, and voice scanner. By using this device, the owner should use their fingerprint to on or to open his/her computer or personal detail. It means that the other person cannot open it every person has different fingerprint. By using the iris scanner, the computer or the device will scan the owner eyes. For the voice scanner, the owner should say the passwords and the voice scanner can detect the voice. If the voice are different, the access will deny.
Moreover, the uses of PIN. By using the PIN, the owner can enter her/his password. The longer the PIN number, the better the passwords. So, if the culprit enter the wrong password, the computer will be block.