Monday, January 24, 2011

communication network.


ok...my dear followers and friends today i would like to share some information that we get from our lecture before...
that is about communication....
first of all let me explain the meaning of communication,as we all know that communication is the most popular internet activity,and the impact is cannot be estimated. At a person level,friends and family can stay in contact with one another even when seperated by thousands of mile.

here there is an example of medium communication:
E-MAIL:
trnsmission of electronic messenges over the internet.

INSTANT MESSAGING
allow two or more people to contanct each other via direct,live communication.

SOCIAL NETWORKING
one of the fastest growing uses of the iternet in social networking, or connecting individuals to one another,three basic categories of social networking sites are reuniting,friend-of-friend and common interest.

BLOGS AND WIKIS
in addition social networking sites,there are others types of sites that help ordinary people communicate across the WEB.
many individual create personal Web sites,cslled Web logs or blog,blog postings are timestamped and arrange with the newest item first. Often this readers of these site are allowed to comment. sOMe blog like:
online diariessome focus on information,story about their hobby  or sharing their experiences.
this website is to help people to fill in missing informarion or correct inaccuracies.

ok...
thats all for this entry,see u later my dear readers,after i grab all the things about new things that i'm studied,then i will share it will share it with u all okey!

Sunday, January 23, 2011

my account BEEN HACKED??




OH MY GOD MY ACCOUNT BEEN HACKED.......

that is what always happen now days.....
and the worse is....

YOU COULDNT STOP IT......
this make you feel stress out about it....



that why we have took take an action before it happens....
like famous qoution said
 
"In the case of those skilled in defense,
their opponent dont know where to
attack."

that is why the best thing to do first is.... 
to avoid those hackers and spammer....
dont give them a chance to steal our account.....



Alright let fist we talk about avoiding spammers...
  1. One of the easiest things you can do to avoid spam is to never give out your real email address.
  2. Use a junk email account for all types of correspondence when the end-user can not be trusted with your real email address.
  3. Never open email attachments unless you trust the sender and you expected an attachment
  4. Don't click on "remove" from mailing lists.
  5. Use your email program's spam blocking features. 


well ....that are some of the way for avoiding spam.....
now it time for the next one....
the one that happen is when a" hacker" breaks .....
into your computer and you don't even know it..... 
this is some action you should take concern.....
  1. Never post your IP address in a public place.
  2. Always run your Firewall and Antivirus programs first.
  3. When you are not using your computer, disconnect it from the Internet.
hahaha....now you dont need to be worry about it anymore....
once you follow the step....
you are safe for internet surfing....
and smile always......(^_^)






Monday, January 17, 2011

INFORMATION TECHNOLOGY, THE INTERNET & YOU


Technology & Information Systems

This is our first chapter in this subject.


The Introduction

1. The purpose is to help the student become competent with computer technology.
2. This is also the new ways to communicate, to make relation, and make the sales via Internet.



Do you know how many parts of an information system..?
dont know..?
Nevermind, we gonna tell you about it...

An information system has five (5) parts : 
1. people,
2. procedures,
3. software,
4. hardware,
5. data.

Firstly, let's we talk about 1st part of Information System (IS) which is PEOPLE.
People also known as USER. This is the most important part of this IS. Everyday, people use computers and  information system, even the contact is direct or non direct.


Now, the 2nd part of IS is PROCEDURES.
Procedures is a set if instructions that performs a specific task; a subroutine or function.
This also known as SUBROUTINE.
That is easy, rigth..?


We go to the 3rd parts of IS which is SOFTWARE.
Software is also known as PROGRAMS that can be used with a particular computer systems.
There are two (2) major software such as system software and application software.

~ System software - this is not single-program but it enables the application software to interact with the PC software. OPERATING SYSTEM is the one of the example of the system software.

~ Application software - this software have been designed to help the user to perform singular or multiple related specific tasks. These can be categorized as either basic or specialized applications



HARDWARE is the 4th parts of IS.
Hardware is the general for the physical artifacts of a technology and also mean the physical component of the PC system.
There are 4 types of computers: SUPERCOMPUTERS, MAINFRAME COMPUTERS, MINI COMPUTER and MICROCOMPUTERS

  •  SUPERCOMPUTERS - The most powerful type of computer. These are special high-capacity computers used by very large organizations. IBM's Blue Gene is the example of the supercomputers and the fastest computers in the world.
  • MAINFRAME COMPUTERS - Not powerful as Supercomputer but it is capable of great processing speeds and data storage. This machines occupy specially wired, air-conditioned rooms.
  • MINICOMPUTERS - Refrigerator-sized machines and also known as MIDRANGE COMPUTERS. 
  • MICROCOMPUTERS - Least powerful machines but fastest-growing type of computer. There are 4 types of microcomputer: desktop, notebook, tablet PC, and handheld.


In microcomputers, there consists 4 basic categories which is system unit, input/output, secondary storage, and communication.

  • SYSTEM UNIT - The container that houses most of the electronic components that make up a computer system. Microprocessor controls and manipulate data to produce information, while Memory is a holding area for data, instructions, and information. Random-access memory (RAM) is temporary storage because the content will be lost if the computer power is disrupted.

  • INPUT/OUTPUT - INPUT DEVICES will translate the data into a form that the PC can process. Mouse and keyboard is the common medium that used as input devices. OUTPUT DEVICES will translate the processed data from the PC into a form that human can understand. Monitors, printers, and speakers is most common output devices.


  • SECONDARY STORAGE - This storage holds data and programs even after PC has been turned off. The example of secondary storage is Hard disks, USB drives, Flash memory cards, Compact discs (CDs) and Digital versatile discs (DVDs).

  • COMMUNICATION - A microcomputers can communicate with other computer systems  located nears using Internet. Modem and Routers is the communication device that will allow the user to connect to the Internet.




Last but not least, DATA.
The raw, unprocessed facts, including text, numbers, images, and sounds.
There are 4 common types of files such as document files, worksheet files, database files, and presentation files.

DOCUMENT FILES - created by word processors to save documents.



WORKSHEET FILES - created by electronic spreadsheets to analyse things.



DATABASE FILES - created by database management programs to contain highly structured and organized data.

PRESENTATION FILES - created by presentation graphics programs to save presentation materials.



Nowadays, the advance technology allows people to communicate to entire world without borders. Wireless channels can be found in almost all places. This allows information to move quickly without borders. The world now at our fingertips. the future may be challenging with more competition. Now already advancing, in the future, who knows..?

What is your opinion...?
What ever opinion will you give, we just wait and see....(^.^)

Tuesday, January 11, 2011

Thursday, January 6, 2011

Course Objectives


To identify 
the requirements and job specification 
in brief for a career in IT

To describe
 the hardware and use of basic productivity software 
for small office and home office computers.

To explain 
different types of information systems 
and 
the lifecycle of information systems

To explain 
the fundamental issues 
related to security in computer networks 
especially related with the Internet and WWW.

Tuesday, January 4, 2011

introduction!

assalamualaikum....
dan selamat sejahtera.....
ok.....
kawan2....


Kami...S.E.C.R.E.T!!


Sebuah group!!
Tak bulat
Tak leper
Tak petak..
Telah ditubuhkan atas alasan
yang kukuh lagi hebat..
Sekarang..saat ini..detik ini..
Mewujudkan blog dengan rela hati..
~
~
~
~
~
Faktor kewujudan page ini!!~
>Kerana subject kegemaran S.E.C.R.E.T<
>Kerana lecturer kesayangan S.E.C.R.E.T<
>Kerana silibus yang telah ditetapkan UTM<
>Kerana S.E.C.R.E.T adalah terdiri daripada student UTM<
>Kerana S.E.C.R.E.T tertakluk kepada syarat-syarat yang telah ditetapkan<
>Kerana S.E.C.R.E.T mahu A+ untuk subject ini =D<
~
~
Subject apakah ini???
Yeeeee!! technology and information system
diajar oleh miss Sharin Hazlin Huspi
~
~
jom kenal kami~
~
~
~
~
~
 nama:FATIN FARAHIN BINTI SHAFFIE
status:lama menanti sejuk mentari..
 nama:NURULAIN BINTI ZAKARIA
status:Mestilah berpunya....
 nama:TUAN IKHTIARI BIN TUAN ISMAIL
status:Dalam hati ada taman tapi tak berbunga lagi
nama: FARHAN NAZMI BIN YUSUF
status:dot..dot..dot..
nama: MUHAMMAD KHALIL BIN HUSAINI
status:Sedang menunggu puteri kayangan (pending)

okey!
itu lah kami....
harapan kami...
tidak pendek...
tidak gemok...
tidak kurus...
 cuma setinggi gunung...
ingin mendapat markah penuh untuk project inie,
sekian sahaja dari kami...
untuk 1st entry!
da~