Sunday, February 28, 2010
Friday, February 26, 2010
Tuesday, February 23, 2010
kerja kursus 1,2,3
1. Jalankan program antivirus. Scan folder atau mana-mana drive, jika jumpa virus catatkan tindakan yang perlu ambil. Cetak setiap langkah . Hantar cetakan tersebut kepada guru anda untuk difailkan.
2. Jalankan perogram anti Spy Ware. dowwload perisian Ad Aware. Jalankan dan cetak antaramuka skrin sama seperti kerja kursus pertama. Cetakan antaramuka skrin yang memaklumkan pelaksanaan proses perlu dihantar kepada guru anda untuk difailkan.
3. Membina persembahan powerpoint dan sesi pembentangan tajuk terpilih
Semua pelajar diminta serius melaksanakan kerja kursus ini kerana markah pembentangan akan diambilkira.
Pelajar diingatkan bahawa anda mempunyai masa seminggu untuk membuat persediaan. Kepada ahli kumpulan, sila beri kerjasama pada kumpulan anda. Setiap ahli kumpulan turut akan membuat pembentangan di hadapan kelas mengikut giliran.
Selepas pembentangan sila serahkan softcopy dan hardcopy kepada guru anda untuk difailkan.
Semua markah kerja kursus ini adalah sebahagian 30% markah sebenar peperiksaan SPM anda pada tahun 2011.
Ujian setara 1 yang akan dilaksanakan pada 8 Mac 2010 ini turut mengambilkira markah kerja kursus anda.
Ujian bertulis 70% daripada pemarkahan
Kerja kursus (Learning area 1) - 30 %
Jumlah markah = 100%
Saturday, February 20, 2010
Lesson 27
These devices are examples of computer hardware.A computer system needs to have these hardware to function.
COMPUTER SYSTEM
A computer system is defined as combination of components designed to
Lesson 22 Computer Users
HOME USER
The computer is a basic necesssity.each home user spends time on the computer for different reasons :
- business
- communication
- entertainment
- education
SOHO users use computer to manage their work effectively.they advertise their products and services through websites.they also take orders from the websites.
To save cost,SOHO connect one printer to many employees to share.SOHO also have their own basic business software
Lesson 21
The computer has change the society today as much as industrial revolution changed society in
18th and 19th century.people interacts directly with computer in education,finance,government,health care,science,publishing,tourism,and industry.
Computer help them to their work faster and more efficient by using the software application that consist of special program for specific task.
SOFTWARE APPLICATION
Software applications are used ror many reasons.such as to enhance the learning process,to help in business,to assist the graphics and multimedia project and to fasilitate communication.
these software application cames in packages.
SOFTWARE APPLICATIONS PACKAGES
HOME AND EDUCATION
Today,computers are used in schools,colleges and universities in order to promote better education by using computers.in the labs,students use software packages to complete their assignments.at the same time,some educators use the computer-based training and wabe-based training as replacements for lecture presentation.
Some of the software applications that are usually used in schools and universities include microsoft office,adobe photoshop,macromedia flash,autoCAD,macromedia dreamweaver and macromedia director.
COMPUTERS FOR HIGHER EDUCATION
Open distance (ODL)or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations.
This type of learning consists of online forum,discussion,quizzes,test questions and many more. the example of the open distance learning institution is the open university of malaysia (www.oum.edu.my).
BUSINESS
People use finance or accounting software to balance check books,pay bills,track personal income andexpences,manage investments and evaluate their financial plans.
Accounting software helps companies to report their financial transactions. Examples of these software applications include MYOB,intuit quick books and peachtree complete accounting.
COMPUTERS IN BANKING
In the banking sector,many financial institutions offer online banking.people can access their financial records from anywhere in the world.one example of online banking is MAYBANK2U (www.maybank2u.com)
most of the packages on banking offer a variety of online servises.which requires acess to the web.
For example we can track our investment online,compare insurance rates and do online banking.
INDUSTRY
By using the CAM system,computers record actual labour,material,machine and computer time used to manufacture a particular product.
Computers process this data and automatically update inventory,production,payroll and accounting records on the company's network.
Examples of companies using this system are proton(www.proton.com.my)and perodua (www.perodua.com.my)
GRAPHICS AND MULTIMEDIA
Computers are crucial in publishing especially in the process of making works available to the public.these work include magazines,books,newspapers,music and film production.
Special software applications are used to assist graphic designers to develop graphics,texts,photographs and composing songs.
Computer-aided design,desktop publishing,paint/image editing,video and audio editing and multimedia authoring are among the popular applications software.
COMMUNICATION
A government provides society with direction by making and administering policies.most government offices or agencies have websites in order to provide citizens with up-to-date or latest information.
Examples of software applications used for communication include e-mail,web browsers,newsgroups,instant messaging and video conferencing.
People can access government websites to :
- check information on taxes (www.hasil.org.my
- apply for permits and licenses (www.jpj.gov.my)
- check for MYKAD (www.jpn.gov.my)
- pay parking tickets and check summons (www.jpj.gov.my
- renew vehicle registration (www.jpj.gov.my)
- register online for IPTA/IPTS application (www.moe.gov.my)
Today, people will go online to get all related information about travelling. They can visit websites to get information on destinations,prices,hotels, flights and car rentals.
They can also purchase ticket online, all payment can made by using credit card.
Lesson 20
Computers should have alarm systems to guard them from any attacks such as viruses and data corruption.The alarm system is the security measures that we take to ensure its safety.
DATA PROTECTION
We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire,flood,lightning,machine failures and even human errors.
There are a few ways to protect the information namely :
- make backup files
- detect the virus and clean the computer
- warn others on virus attack
1) BACKUP FILES
Users can do backups of file systems by :
- keeping the duplicated files in external storage such as in the floppy disk and thumb drive
- do backup frequently
2) DETECT VIRUS AND DO CLEANUP
A computer virus is able to affect and infect the way computer works.Viruses can be detected when we run an antivirus program.We can also delete the infected files and documents.
3) WARN OTHERS ON VIRUS ATTACK
We can warn others on virus attacks or new viruses by sending e-mails to them.
DETECTING ILLEGAL ACCESS TO SYSTEMS
The computer system is able to detect any illegal access to the system by a user who does not have any authorisation.Basically, a corporation will simply use tcpwrappers and tripwire to detect any illegal access to their system.User's access will be reviewed periodically by computer operations.On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data.
TCPWRAPPERS
Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains.The system will run tcpwrappers to logg access to ftp, tftp, rch, rlogin, rexec and telnet.
TRIPWIRE
Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.
PREVENTING ILLEGAL ACCESS TO SYSTEMS
Have any of you ever been to airport? Do you know the do's and dont's when you are at airport?
There are things that cannot be taken inside the airplane. It is for the purpose of security procedures.
It is the same as computer systems. It woud not allow any unauthorised users to simply access the system.
Ways to prevent illegal access to system:
- Run anlpassword to make password cracking difficult.
- Run tcpwrappers to check if the name for an ip address can be provided by DNC.
- Use a callback system to prevent unauthorised use of stolen passwords.
PREVENTING ILLEGAL ROOT ACCESS
To prevent any illegal root access, we should have Sudo, so that people can perform on some machine without getting access to entire root if that is not required. In addition, with Sudo we did not have to give out the root password.
Sudo stands for (Superuser do) and is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programsin the form of another user (normally on the form of system's superuser).
Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.
PATCH
Patch supplies small updates to software, provided tha the source code is available.
Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file.
Resources are not enough to patch all security holes that we hear about through the bugtrag list.
(Bugtrag is a full disclosure mailing list dedicated to the issues of computer security. On-topic discussions are new discussions about vulnerabilities, methods of exploitation and how to fix them. It is a high volume mailing list and almost all new vulnerabilities are discussed there.)
Lesson 19 RELATIONSHIP BETWEEN SECURITY THREATS AND SECURITY MEASURES
Security threats may come from in many forms.For example,when someone is invading your account information from a trusted bank,this act is considered as a security threat.
Security measures can be used to prevent this invader from getting the account information.For example,the bank can use a firewall to prevent unauthorised access to its database.
SECURITY THREADS
Security threats may come from in many forms.For example,when someone is invading your account information from a trusted bank,this act is considered as a security threat.
Security measures can be used to prevent this invader from getting the account information.For example,the bank can use a firewall to prevent unauthorised access to its database.
MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-SPYWARE
Security threats include virus,Trojan horse,logic bomb,trapdoor and backdoor, and worm.
Antivirus and anti-spyware can be used to protect the computer from the threats by :
- limiting connectivity
- allowing only authorised media for loading data and software
- enforcing mandatory acces controls
- blocking the virus from the computer program
HACKING VS. FIREWALL
Hacking is an unauthorised access to the computer system dony by a hacker.We can use firewall or cryptography to prevent the hacker from accessing our computers.
A firewall permits limited access to unauthorised users or any activities from the network environment.Cryptography is a process of hiding information by changing the actual information into different representation,for example,an APA can be written as 7&*.
NATURAL DISASTER VS. DATA BACKUP
The natural and environmental disasters may include :
- flood
- fire
- earthquakes
- storms
- tornados
Natural disasters may threaten a computer's hardware and software easily.Computers are also sensitive to their operating environment such as excessive heat or the inadequacy of power supply.
The backup system is needed to backup all data and applications in the computer.With the backup sytem,data can be recovered in case of an emergency.
THEFT VS. HUMAN ASPECTS
Computer theft can be two kinds :
- can be used to steal money,goods,information and computer resources
- the actual stealing of computers,especially notebooks and PDAs
Measures that can be taken to prevent theft :
- prevent access by using locks,smart-card or password
- prevent portability by restricting the hardware from being moved
- detect and guard all exits and record any hardware transported
BE SUPSPICIOUS OF ALL RESULTS
There are many instances where non-programmers develop applications which are not built with proper understanding of software engineering practices.
Data produced by such applications may not be correct and may risk corrupting data received from other sources that are not compatible with the application.
Friday, February 19, 2010
Download perisian Ad Aware daripada internet
Tuesday, February 16, 2010
Laman ICT Cikgu Shima
Pelajar ICT SEMEKAR boleh mengunjungi laman di atas. Banyak maklumat subjek ICT di dalamnya.
Sila masuk ke sini
http://www.ictpahang.myportal.my/?lang=my&cat=1&id=3&mnu=3
Copy drp laman cikgu Norsiah SMK Alor Akar Kuantan
AGENDA | JAN | FEB | MAC | APR | MAY | JUN | JULY | OG | SEP | OKT | NOV | DIS | CATATAN |
1.Penataran Kertas 2 ICT Tingkatan 5 | | | | | | | | | | | | | |
2.Perlaksanaan Kertas 2 ICT Tingkatan 4 dan 5 | | | | | | | | | | | | | |
3.Pentaksiran Kertas 2 ICT Tingkatan 4 dan 5 | | | | | | | | | | | | | |
4.Penyemakan fail pelajar oleh Pentaksir Kawasan | | | | | | | | | | | | | |
5. Penyemakan markah pelajar oleh Pentaksir Dalaman | | | | | | | | | | | | | |
6. Penyerahan markah pelajar kepada S/U peperiksaan | | | | | | | | | | | | | |
7. Penyimpanan fail dan eviden pelajar | | | | | | | | | | | | | |
AGENDA | JAN | FEB | MAC | APR | MAY | JUN | JULY | OG | SEP | OKT | NOV | DIS | CATATAN |
1.Penataran Kertas 2 ICT Tingkatan 4 | | | | | | | | | | | | | |
2.Perlaksanaan Kertas 2 ICT Tingkatan 4 | | | | | | | | | | | | | |
3.Pentaksiran Kertas 2 ICT Tingkatan 4 | | | | | | | | | | | | | |
4. Penyerahan markah pelajar kepada S/U Panitia TM Daerah | | | | | | | | | | | | | |
5. Penyimpanan fail dan eviden pelajar | | | | | | | | | | |
Copy dari laman cikgu Norsiah SMK Alor Akar Kuantan
Code | Aspect | Type of instruments | Duration | Date Test/Submit |
LA4.S08.1 | Apply all the phases of multimedia production to produce an interactive educational multimedia project | Project | 4 weeks | 2/2 – 2/3/2011 |
LA4.S09.1 | Gather examples of immersive multimedia in education, business or entertainment | Scrap Book | 2 days | 17-18/02/2011 |
LA5.S10.1 | Apply program development phases to develop a problem-solving program | Practikal session | 4 weeks | 6/4 -30/4/2011 |
LA5.S11.1 | Collect information on the latest programming languages | Report | 2 weeks | 15-30/4/2011 |
LA6.S12.1 | Develop a database project | Practikal session | 2 weeks | 7-19/7/2011 |
LA6.S13.1 | Find out current developments in computer information systems | Report | 3 weeks | 23-31/7/2011 |
Friday, February 12, 2010
ICT examination format
SECTION
Section A = 36 marks
Section B = 20 marks
Section C = 14 marks
TOTAL : 70 marks
PAPER 2 : 3762/2 ( 2 year - Form 4 and Form 5) -COURSE WORK
Chapter 1 -3 Aspect - 6 marks
Chapter 2-3 Aspect - 6 marks
Chapter 3-3 Aspect - 6 marks
Chapter 4-2 Aspect - 4 marks
Chapter 5-2 Aspect - 4 marks
Chapter 6-2 Aspect - 4 marks
TOTAL MARK = 30 marks
PAPER 1 (3765/1) + PAPER 2 (3765/2) = 100 MARKS
---------------------------------------
ICT ASESSMENT INSTRUMENT
Paper 1 : 70%
Instrument type - Written Test
Duration : 2 hours 30 minutes
SECTION A : 25 questions - 36 score
SECTION B : 5 questions - 20 score
SECTION C : 3 question, answer 2 - 14 score
Paper 2 : 30%
Instrument Types : Course work ( Demontration, Verbal Presentation, Written Assignment, Project Work)
Number of aspect : Form 4 ( 9 aspect) - 18 score
Form 5 ( 6 aspect ) - 12 score
Evaluation period : Form 4 ( Januari until October )
Form 5 ( Januari until July )
ICT SYLLABUS
The ICT syllabus is organized into six (6) learning area namely:
1. Information and Communication Technology and Society
2. Computer Systems
3. Computer Networks and Communications
4. Multimedia
5. Programming
6. Information Systems