Sunday, February 28, 2010

Friday, February 26, 2010

Tuesday, February 23, 2010

kerja kursus 1,2,3

Pelajar 4B dikehendaki membuat semua kerja kursus Learning Area 1

1. Jalankan program antivirus. Scan folder atau mana-mana drive, jika jumpa virus catatkan tindakan yang perlu ambil. Cetak setiap langkah . Hantar cetakan tersebut kepada guru anda untuk difailkan.

2. Jalankan perogram anti Spy Ware. dowwload perisian Ad Aware. Jalankan dan cetak antaramuka skrin sama seperti kerja kursus pertama. Cetakan antaramuka skrin yang memaklumkan pelaksanaan proses perlu dihantar kepada guru anda untuk difailkan.

3. Membina persembahan powerpoint dan sesi pembentangan tajuk terpilih

Semua pelajar diminta serius melaksanakan kerja kursus ini kerana markah pembentangan akan diambilkira.

Pelajar diingatkan bahawa anda mempunyai masa seminggu untuk membuat persediaan. Kepada ahli kumpulan, sila beri kerjasama pada kumpulan anda. Setiap ahli kumpulan turut akan membuat pembentangan di hadapan kelas mengikut giliran.

Selepas pembentangan sila serahkan softcopy dan hardcopy kepada guru anda untuk difailkan.

Semua markah kerja kursus ini adalah sebahagian 30% markah sebenar peperiksaan SPM anda pada tahun 2011.

Ujian setara 1 yang akan dilaksanakan pada 8 Mac 2010 ini turut mengambilkira markah kerja kursus anda.

Ujian bertulis 70% daripada pemarkahan
Kerja kursus (Learning area 1) - 30 %

Jumlah markah = 100%

Saturday, February 20, 2010

Lesson 27

OVERVIEW OF COMPUTER SYSTEM

These devices are examples of computer hardware.A computer system needs to have these hardware to function.

COMPUTER SYSTEM

A computer system is defined as combination of components designed to

Lesson 30

Lesson 29

Lesson 28

Lesson 26

Lesson 22 Computer Users

People around the world rely on computers to do so many things.they are from different backgrounds and are divided in 5 categories.

HOME USER

The computer is a basic necesssity.each home user spends time on the computer for different reasons :
  • business
  • communication
  • entertainment
  • education
SMALL OFFICE/HOME OFFICE (SOHO) USER

SOHO users use computer to manage their work effectively.they advertise their products and services through websites.they also take orders from the websites.

To save cost,SOHO connect one printer to many employees to share.SOHO also have their own basic business software

Lesson 21

COMPUTER APPLICATIONS IN THE COCIETY

The computer has change the society today as much as industrial revolution changed society in
18th and 19th century.people interacts directly with computer in education,finance,government,health care,science,publishing,tourism,and industry.

Computer help them to their work faster and more efficient by using the software application that consist of special program for specific task.

SOFTWARE APPLICATION

Software applications are used ror many reasons.such as to enhance the learning process,to help in business,to assist the graphics and multimedia project and to fasilitate communication.

these software application cames in packages.

SOFTWARE APPLICATIONS PACKAGES


HOME AND EDUCATION

Today,computers are used in schools,colleges and universities in order to promote better education by using computers.in the labs,students use software packages to complete their assignments.at the same time,some educators use the computer-based training and wabe-based training as replacements for lecture presentation.

Some of the software applications that are usually used in schools and universities include microsoft office,adobe photoshop,macromedia flash,autoCAD,macromedia dreamweaver and macromedia director.

COMPUTERS FOR HIGHER EDUCATION

Open distance (ODL)or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations.

This type of learning consists of online forum,discussion,quizzes,test questions and many more. the example of the open distance learning institution is the open university of malaysia (www.oum.edu.my).

BUSINESS

People use finance or accounting software to balance check books,pay bills,track personal income andexpences,manage investments and evaluate their financial plans.

Accounting software helps companies to report their financial transactions. Examples of these software applications include MYOB,intuit quick books and peachtree complete accounting.

COMPUTERS IN BANKING

In the banking sector,many financial institutions offer online banking.people can access their financial records from anywhere in the world.one example of online banking is MAYBANK2U (www.maybank2u.com)

most of the packages on banking offer a variety of online servises.which requires acess to the web.
For example we can track our investment online,compare insurance rates and do online banking.

INDUSTRY

By using the CAM system,computers record actual labour,material,machine and computer time used to manufacture a particular product.

Computers process this data and automatically update inventory,production,payroll and accounting records on the company's network.

Examples of companies using this system are proton(www.proton.com.my)and perodua (www.perodua.com.my)

GRAPHICS AND MULTIMEDIA

Computers are crucial in publishing especially in the process of making works available to the public.these work include magazines,books,newspapers,music and film production.

Special software applications are used to assist graphic designers to develop graphics,texts,photographs and composing songs.

Computer-aided design,desktop publishing,paint/image editing,video and audio editing and multimedia authoring are among the popular applications software.

COMMUNICATION

A government provides society with direction by making and administering policies.most government offices or agencies have websites in order to provide citizens with up-to-date or latest information.

Examples of software applications used for communication include e-mail,web browsers,newsgroups,instant messaging and video conferencing.

People can access government websites to :

  • check information on taxes (www.hasil.org.my
  • apply for permits and licenses (www.jpj.gov.my)
  • check for MYKAD (www.jpn.gov.my)
  • pay parking tickets and check summons (www.jpj.gov.my
  • renew vehicle registration (www.jpj.gov.my)
  • register online for IPTA/IPTS application (www.moe.gov.my)
COMPUTERS IN TOURISM

Today, people will go online to get all related information about travelling. They can visit websites to get information on destinations,prices,hotels, flights and car rentals.
They can also purchase ticket online, all payment can made by using credit card.

Lesson 20

SECURITY PROCEDURES

Computers should have alarm systems to guard them from any attacks such as viruses and data corruption.The alarm system is the security measures that we take to ensure its safety.

DATA PROTECTION

We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire,flood,lightning,machine failures and even human errors.

There are a few ways to protect the information namely :
  • make backup files
  • detect the virus and clean the computer
  • warn others on virus attack

1) BACKUP FILES

Users can do backups of file systems by :

  • keeping the duplicated files in external storage such as in the floppy disk and thumb drive
  • do backup frequently

2) DETECT VIRUS AND DO CLEANUP

A computer virus is able to affect and infect the way computer works.Viruses can be detected when we run an antivirus program.We can also delete the infected files and documents.

3) WARN OTHERS ON VIRUS ATTACK

We can warn others on virus attacks or new viruses by sending e-mails to them.

DETECTING ILLEGAL ACCESS TO SYSTEMS

The computer system is able to detect any illegal access to the system by a user who does not have any authorisation.Basically, a corporation will simply use tcpwrappers and tripwire to detect any illegal access to their system.User's access will be reviewed periodically by computer operations.On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data.

TCPWRAPPERS

Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains.The system will run tcpwrappers to logg access to ftp, tftp, rch, rlogin, rexec and telnet.

TRIPWIRE

Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.

PREVENTING ILLEGAL ACCESS TO SYSTEMS

Have any of you ever been to airport? Do you know the do's and dont's when you are at airport?

There are things that cannot be taken inside the airplane. It is for the purpose of security procedures.

It is the same as computer systems. It woud not allow any unauthorised users to simply access the system.

Ways to prevent illegal access to system:

  1. Run anlpassword to make password cracking difficult.
  2. Run tcpwrappers to check if the name for an ip address can be provided by DNC.
  3. Use a callback system to prevent unauthorised use of stolen passwords.

PREVENTING ILLEGAL ROOT ACCESS

To prevent any illegal root access, we should have Sudo, so that people can perform on some machine without getting access to entire root if that is not required. In addition, with Sudo we did not have to give out the root password.

Sudo stands for (Superuser do) and is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programsin the form of another user (normally on the form of system's superuser).

Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.

PATCH

Patch supplies small updates to software, provided tha the source code is available.

Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file.

Resources are not enough to patch all security holes that we hear about through the bugtrag list.

(Bugtrag is a full disclosure mailing list dedicated to the issues of computer security. On-topic discussions are new discussions about vulnerabilities, methods of exploitation and how to fix them. It is a high volume mailing list and almost all new vulnerabilities are discussed there.)

Lesson 25

Lesson 24

Lesson 23

Lesson 19 RELATIONSHIP BETWEEN SECURITY THREATS AND SECURITY MEASURES

RELATIONSHIP BETWEEN SECURITY THREATS AND SECURITY MEASURES

Security threats may come from in many forms.For example,when someone is invading your account information from a trusted bank,this act is considered as a security threat.

Security measures can be used to prevent this invader from getting the account information.For example,the bank can use a firewall to prevent unauthorised access to its database.

SECURITY THREADS

Security threats may come from in many forms.For example,when someone is invading your account information from a trusted bank,this act is considered as a security threat.

Security measures can be used to prevent this invader from getting the account information.For example,the bank can use a firewall to prevent unauthorised access to its database.

MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-SPYWARE

Security threats include virus,Trojan horse,logic bomb,trapdoor and backdoor, and worm.

Antivirus and anti-spyware can be used to protect the computer from the threats by :

  • limiting connectivity
  • allowing only authorised media for loading data and software
  • enforcing mandatory acces controls
  • blocking the virus from the computer program

HACKING VS. FIREWALL

Hacking is an unauthorised access to the computer system dony by a hacker.We can use firewall or cryptography to prevent the hacker from accessing our computers.

A firewall permits limited access to unauthorised users or any activities from the network environment.Cryptography is a process of hiding information by changing the actual information into different representation,for example,an APA can be written as 7&*.

NATURAL DISASTER VS. DATA BACKUP

The natural and environmental disasters may include :

  • flood
  • fire
  • earthquakes
  • storms
  • tornados

Natural disasters may threaten a computer's hardware and software easily.Computers are also sensitive to their operating environment such as excessive heat or the inadequacy of power supply.

The backup system is needed to backup all data and applications in the computer.With the backup sytem,data can be recovered in case of an emergency.

THEFT VS. HUMAN ASPECTS

Computer theft can be two kinds :

  • can be used to steal money,goods,information and computer resources
  • the actual stealing of computers,especially notebooks and PDAs

Measures that can be taken to prevent theft :

  • prevent access by using locks,smart-card or password
  • prevent portability by restricting the hardware from being moved
  • detect and guard all exits and record any hardware transported

BE SUPSPICIOUS OF ALL RESULTS

There are many instances where non-programmers develop applications which are not built with proper understanding of software engineering practices.

Data produced by such applications may not be correct and may risk corrupting data received from other sources that are not compatible with the application.

Lesson 18 Security Mesure

Today..

Friday, February 19, 2010

Download perisian Ad Aware daripada internet




masuk ke site di atas dan download perisian Ad Aware secara percuma . Pelajar boleh mendownload perisian ini di rumah jika ada komputer dan kemudahan internet.


Tuesday, February 16, 2010

Laman ICT Cikgu Shima

http://www.freewebs.com/ictsmksp/ictassessment.htm

Pelajar ICT SEMEKAR boleh mengunjungi laman di atas. Banyak maklumat subjek ICT di dalamnya.

Sila masuk ke sini

Kepada pelajar ICT sila masuk ke sini. Banyak maklumat berkaitan subjek ICT ada di sini.

http://www.ictpahang.myportal.my/?lang=my&cat=1&id=3&mnu=3

Copy drp laman cikgu Norsiah SMK Alor Akar Kuantan

CARTA GANTT TAKWIM PENTAKSIRAN KERTAS 2 ICT 3765
TINGKATAN 5
AGENDA
JAN
FEB
MAC
APR
MAY
JUN
JULY
OG
SEP
OKT
NOV
DIS
CATATAN
1.Penataran Kertas 2 ICT Tingkatan 5
2.Perlaksanaan Kertas 2 ICT Tingkatan 4 dan 5
3.Pentaksiran Kertas 2 ICT Tingkatan 4 dan 5
4.Penyemakan fail pelajar oleh Pentaksir Kawasan
5. Penyemakan markah pelajar oleh Pentaksir Dalaman
6. Penyerahan markah pelajar kepada S/U peperiksaan
7. Penyimpanan fail dan eviden pelajar
SEKOLAH MENENGAH KEBANGSAAN ALOR AKAR,
25050 KUANTAN , PAHANG
CARTA GANTT TAKWIM PENTAKSIRAN KERTAS 2 ICT 3765
TINGKATAN 4
AGENDA
JAN
FEB
MAC
APR
MAY
JUN
JULY
OG
SEP
OKT
NOV
DIS
CATATAN
1.Penataran Kertas 2 ICT Tingkatan 4
2.Perlaksanaan Kertas 2 ICT Tingkatan 4
3.Pentaksiran Kertas 2 ICT Tingkatan 4
4. Penyerahan markah pelajar kepada S/U Panitia TM Daerah
5. Penyimpanan fail dan eviden pelajar

Copy dari laman cikgu Norsiah SMK Alor Akar Kuantan

ICT ASSESSMENT PLAN
YEAR 2011
5 BESTARI
Code
Aspect
Type of instruments
Duration
Date Test/Submit
LA4.S08.1
Apply all the phases of multimedia production to produce an interactive educational multimedia project
Project
4 weeks
2/2 – 2/3/2011
LA4.S09.1
Gather examples of immersive multimedia in education, business or entertainment
Scrap Book
2 days
17-18/02/2011
LA5.S10.1
Apply program development phases to develop a problem-solving program
Practikal session
4 weeks
6/4 -30/4/2011
LA5.S11.1
Collect information on the latest programming languages
Report
2 weeks
15-30/4/2011
LA6.S12.1
Develop a database project
Practikal session
2 weeks
7-19/7/2011
LA6.S13.1
Find out current developments in computer information systems
Report
3 weeks
23-31/7/2011

Friday, February 12, 2010

ICT examination format

PAPER 1 : 3765/1 (21/2 hours) Writing paper

SECTION

Section A = 36 marks
Section B = 20 marks
Section C = 14 marks

TOTAL : 70 marks

PAPER 2 : 3762/2 ( 2 year - Form 4 and Form 5) -COURSE WORK

Chapter 1 -3 Aspect - 6 marks
Chapter 2-3 Aspect - 6 marks
Chapter 3-3 Aspect - 6 marks
Chapter 4-2 Aspect - 4 marks
Chapter 5-2 Aspect - 4 marks
Chapter 6-2 Aspect - 4 marks

TOTAL MARK = 30 marks

PAPER 1 (3765/1) + PAPER 2 (3765/2) = 100 MARKS

---------------------------------------

ICT ASESSMENT INSTRUMENT

Paper 1 : 70%

Instrument type - Written Test

Duration : 2 hours 30 minutes

SECTION A : 25 questions - 36 score
SECTION B : 5 questions - 20 score
SECTION C : 3 question, answer 2 - 14 score

Paper 2 : 30%

Instrument Types : Course work ( Demontration, Verbal Presentation, Written Assignment, Project Work)

Number of aspect : Form 4 ( 9 aspect) - 18 score

Form 5 ( 6 aspect ) - 12 score

Evaluation period : Form 4 ( Januari until October )
Form 5 ( Januari until July )

ICT SYLLABUS

The ICT syllabus is organized into six (6) learning area namely:

1. Information and Communication Technology and Society
2. Computer Systems
3. Computer Networks and Communications
4. Multimedia
5. Programming
6. Information Systems