Monday, September 27, 2010

PMR is coming 2 YOU!!


Heartbeat..beat..beat..beat..beat
4 all Form 3 students, do your best in PMR next week..
may God bless you!


Sunday, September 26, 2010

Raya..pk4..Raya..pk4

Huh..raya or pk4?which one to choose?
Whatever your result might be..you still need to read more and more books..
Well, good luck!!

Wednesday, August 18, 2010

Network Communications Technology

Today, we learn about Internet, Intranet and Extranet.
Internet is a public network and can share all kind of informations.
Intranet is a private network used by an organization while extranet can connects more than one organizations.
And thats all 4 today!

Wednesday, August 4, 2010

More and More Homework

There will be more and more homework to be done at the end of the year..
For PMR and SPM students, gambatte!!

ULBS

Can you feel my heartbeat? yup, cuz this week, the students of 4 U will be taking ULBS.
I hope that the teacher will satisfy with our group's performance..Amin!!

Free Time

Hooray!Today, I've got a lot of free time cuz teacher Rusya is taking mc.
However, There's still a lot of homeworks to be done like ULBS, Bio module and bla..bla..bla..
Wish me a happy day u guyz!!

Tuesday, July 13, 2010

Operating system (OS)

OS is a set of programs that coordinates all the data transmissions among computer.

3 types of OS:
i. Stand-Alone OS
ii. Network OS
iii. Embedded OS

Functions of OS:
i. starting a computer
ii. Provide a user interface
iii. Managing programs
iv. Managing memory
v. Configuring devices


Tuesday, June 29, 2010

Software

Today,we learn about differences between Microsoft Word and OpenOffice Write.
Here are some comparisons:

Basic Differences for the Casual User

There are notable differences when comparing Writer and Word. One worth mentioning is the ability to convert a document into a PDF. A big plus, since this is not an option in Word without applying an add-on. In fact, the ability to convert to PDF is available in all but the database application in OpenOffice.org.

Converting a Writer document to PDF is simple. When ready:

  • Click the "Export Directly as PDF" button on the Standard Toolbar, or from the File menu, select Explort as PDF, choose options in PDF options window, click Export button
  • The Export window will appear
  • Choose destination drive and/or folder for the PDF
  • Give the PDF a file name
  • Click the Save button



Sunday, June 6, 2010

Planning for Holiday

How to plan for your holiday?
These are some of the tips to spend an enjoyable holiday!
~Go out of town
~Go shopping
~Movie night
~Pick up the phone
~Help others
~Remember your bond and blessings
~Plan an outing
With these tips,I'm sure you guys can plan an exciting holiday.
Have fun!

Saturday, June 5, 2010

Holiday in The House!

Finally,holiday is coming again this year..Students of 4 Utarid can enjoy the holidays after a hard day of exam..we've already got back our chemistry paper which the score was unbelieveable..haha
we can enjoy the holidays but homeworks need to be done as well..so,make sure you guys take care of yourself during the holidays!HAPPY HOLIDAYS!

Friday, May 21, 2010

The First Day of The Exam

OMG! The first day of the exam is really killing me. As soon as the BM papers were answered, I realised I did a lot of mistakes but just hopping that my grades will be much better than the PK2 test.

Mid-year Exam 2010

Starting this week, we will be facing mid-year exam. OMG! I didn't prepare anything at all but I did my revisions after all. I can't wait for the last paper at the last day of the exam. I can imagine the form 4 Utarid's students shout and sream as loud as they can. So, make sure you guys are studying hard and well prepared for the test so that you guys can enjoy a great holiday.
Gambatte!

Monday, April 26, 2010

Rest and Rest!

Today, Teacher Hani don't teach us anything. Yeahh!!Well, we supposed to learn about motherboard's components today. But, Teacher Hani Delayed the topic for tomorrow.

Monday, April 19, 2010

PK2 Result

Huhu..today, I've got my ICT paper..the score is...
During PK1, I've got A- for the test, but today I've got B+, which is surely not a good thing to me.
But, as the Malays said "Gagal sekali tidak bermakna gagal selamanya", so do I.
I will work harder and harder for the next mid-year exam.
WISH ME LUCK!

Saturday, April 10, 2010

Can LCD produced audio?

Teacher Hani asked us if LCD can produced audio? All I know is LCD can produced Text, Graphics and Video, but I didn't know about Audio at all?? Can LCD produced Audio?? somebody help me!!

PK2 next week!!

Ahhhhhh!!!PK2 is coming near.Next week, once again we will face exam physically and mentally.
There will be many differences between exam during form 3 and form 4.
The teachers said that we need to prepare and do a lot of revisions for this exam.
Well, I wish all of the form 4s' students do well in PK2.GAMBATTE!

Monday, March 29, 2010

What I Have Learn Today.

Today, Teacher Hani tought us about Clock Speed Measurement. Teacher Hani tought us about the units used in a clock system. There are Megahertz (MHz) and Gigahertz (GHz) and so on.
It was hard to understand for a while, but Teacher Hani divided us into two groups, A and B. My groups win and the end of lesson. Haha..

Saturday, March 27, 2010

Explain what is cryptography and firewall.

Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by security policy.
We use firewall to prevent hacking (unauthorized access is the use of a computer or network without permission).

Cryptography is a process of transforming plaintext into ciphertext then back again.
Encryption is a process of converting plaintext into ciphertext. Decryption is the process of converting ciphertext into plaintext.
An encryption key is a formula that the sender of that data uses to encrypt plaintext. A decryption key is a formula that the recipient of that data uses to decrypt ciphertext.
Until recently, encryption was used only by intelligence service, militaries, and banks. We use cryptography to secure the information and prevent hacking or unauthorized access.

Wednesday, March 17, 2010

There are six types of security measures that can be used to protect our computer.

Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

  • Antivirus software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
  • Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs. Anti-spyware products are available from a number of vendors, including Sunbelt Software, TrendMicro and Webroot.
  • A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer based application upon a set of rules and other criteria.
  • A backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are typically called "backups." The verb is back up in two words, whereas the noun is backup.
  • Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
  • Human security is an emerging paradigm for understanding global vulnerabilities whose proponents challenge the traditional notion of national security by arguing that the proper referent for security should be the individual rather than the state. Human security holds that a people-centered view of security is necessary for national, regional and global stability.


Tuesday, March 16, 2010

State two differences between worm and viruses.


Virus:
A program that can pass on the malicious code to other program by modifying them.
It attaches itself to the program usually files with .doc, .xls, and .exe.

Worm:
A program that copies itself and spread through the network.

The differences between worm and virus:

  • Worm operates through the network while viruses spreads through any medium.
  • Worm spread copies of itself as a stand alone program while viruses spread copies of itself as a program that attaches to other program.

Sunday, March 14, 2010

Name 4 main sectors that use ICT in their management.

Education:
Teacher and students use computers to research for teaching materials, participate in online forum and online conferences.

Banking:
Businessman can save their time by using online services offered by banks. Customers can make any transaction at 24 hours service centers.

Industry:
Workers can gain help to operate machine by using computers. Researchers can analyze and collect research data for future references.

E-Commerce:
Customers can make buying and selling activities faster and more efficient through internet. Suppliers can also keep track of their transactions.

Wednesday, February 3, 2010

Impact of ICT on Society

ICT or Information and Communication Technology is the technology required for information processing.ICT help people in managing several sectors.Therefore, there are a lot of impacts of ICT on society.

> Faster communication speed
With the Internet, news or messages are sent via e-mail to anyone efficiently.With the usage
of internet, any information can be travel.

> Lower communication cost
With the internet, we do not have to pay any basic services provided by in the internet.
Furthermore, the cost of the connection provided is indeed cheap and affordable.

> Share ideas and information
The usage of the internet alllowed people to change opinions and gather information at the
same time.