Sunday, April 17, 2011

CINTA ;JATUH CINTA....BERCINTA....BERCITA-CITA...


L.O.V.E



 

SUDAH TIBA MUSIM CINTA......






 SECAWAN KOPI UNTUK YANG TERSAYANG..DI MUSIM.....CINTA....


LOVE AND FRIENDSHIPS ...






JANAH~AZZA~IRA~SYU~FADH

YIBBBBAAAA..YEBBBAAAA...

SUDAH TIBA MUSIM EXAM!!!!!!!!!


PENING..PENING LALAT...WAAAAAA..HAHAHA......





 DON'T WORRY...SMILE...=)

JANGAN 'fanic'...heheheeee




TIPS UNTUK EXAM....BELUM TERLAMBAT LAGI....

EXAM ICT....~ 8 MEI 2011 (AHAD) 2.30pm-5.30pm~


TERBAHAGI KEPADA 3 PART MERANGKUMI 5 BAB

CHAPTER 11-15
PART A : MCQ's Questions
PART B : SUBJECTIVES  Questions
PART C : ESSAYS




TERIMA KASIH YANG TIDAK TERHINGGA
KEPADA 
MADAM SHARIN HAZLIN HUSPI

ATAS TUNJUK AJAR & BIMBINGAN SERTA GALAKAN YG MEMBINA & BERNAS..

SYABAS!! KERANA BERJAYA MENYUNTIK MINAT YANG MENDALAM KEPADA KAMI SUPAYA MENCINTAI & MENCEBURI BIDANG ICT INI...SANGAT MENARIK  !!!...BANYAK YANG KAMI PELAJARI & DAPAT KAMI PRAKTIKKAN.... 
JASAMU DIKENANG..... SEMOGA TUHAN MEMBALAS USAHA MURNI MU WAHAI GURU....

SEMOGA BERJUMPA LAGI DI LAIN MASA.....HAVE A NICE DAY!!!

"~JANAH_ADNIN & THE GANGS...."

Tuesday, April 12, 2011

Perfect!!

Hey guys!!


Hope korang semua ceria2 slalu~~
=
=
Di saat2 nak final exam nie,,semestinya kite sume
pressure dgn asgment,report,nk stdy lg..
So, hope korang semua taw la manage time wisely k..!!


So for final attach from me today,,
I would like to give a short summary for this subject.,,
Urmmm...ala2 evaluation la plak kan:))

First,,banyak yg kite dpt pelajari dr sbject IT nie,,
Dari dlu yg xtaw motherboard kat mane
Sekarang da taw..!!
Punyer excited kalau dibawak nye topik It nie dlm
perbualan seharian kami kat kolej..
Its fun!

Ok,,then kite semua taw psal Edmodo vs Moodle
Final asgment kitorang..
Comparison,,features,,advantages,,disadvantages..
Each person kene submit report 2..
Quite intetresting,,rupenye bnyak lg yg kite semua xtaw
psal Moodle nie,,walhal,,kita semua slalu sgt pkai
That was e-learning..!

Sebenarnye bnyak lg yg kite semua tak explore psal dunia IT nie
Macam2 bleh jadi on future.
Mane taw lptop pun boleh jadi touchscreen kan??
hehe^^


Think


maybe 5G,6G bkal muncul..??
Ermmm..terlalu ramai golongan genius IT
Sampai terlalu bnyak kamajuan dlm bidang nie..
So,,guys...explore yourself in IT..!!
Its so interesting once you get in into it..
Like fall in love maybe.??^^


Ok..!thats all from me
Hope(again) blog ni akan diteruskan..
=
=
Thanx to all group mmbers!
azza,fath,syu,jannah,n me,,fira^^

=
=
 The End


Saturday, April 9, 2011

Final touch-up:)

Hey guys!!
Anyeong...


Post yg nie juz saje2 nk imbau kmbali bile first time
berkecimpung  kne buat blog project.
Sedar xsedar kite semua da end our IT class..
We'll gonna miss u Mdm Sharin!
So,,dlm kesibukan nk siapkn report OB,Sttstik
Kene gak beri komitmen tok update blog
kite as final evaluation.!
Bersama2 la kite compete untuk mengumpul carry marks kite
untuk sem nie:)

At the first class
==
Ad blog project!
yg mane da ad blog mmg sronok lyan buat blog IT nie
Yg mane mmg xreti 2..berusaha untuk
blajar mengupdate blog mereka..
Ye la stiap mgu kene update bile
blaja chapter baru..

Setelah bebapa mgu
Persaingan makin terasa 
==
jeng jeng jeng
=
=
Apabila Mdam umumkn winner of the week:)
Wah!smakin ligat kami mengupdate blog
Buat semampu mungkin
Seboleh yang mungkin
Upload gmbar
 Rasa usaha terbalas bile
ada 1mggu 2 kami jadi winner!!
Thnx to Madam again..

At last,,juz nk ucapkan kat korang semua
All the best untuk final yg akn dtg nie
Blog IT kalu boleh diteruskan
Hope dapat diteruskan dgn
entry2 yang menarik..





Wednesday, April 6, 2011

Programming language pun ad generasi dia sndiri taw

Hari nie lpas presentation dr group laz
Rase2 mcm kurang fhm tntg Programming language


so,,untuk tmbahkan info kite tntg dunia IT
Lets we explore more about Programming language.^_^
===
uurrmmmm what is Generation of Programming language actually..??
There are 5 generations all together.
=
=
First generation@machine language

Based on bits consisting of 1s and 0s,,
they may correspond to electricity's being on or off in the computer.
Coding scheme have been developed that allow us to 
constuct letter,numbers,punctuation marks and other character.
Originally, no translator was used to compile or assemble the first-generation language.

Second generation@Assembly language

The program need to convert or translate into machine language
before a computer can process any program.
This language used abbreviations or mnemonics are automatically
converted to appropriate sequence of 1s and 0s.
This language are much easier to understand and use.

Third generation@ High-level Procedural language

English like programming language.
People are able to understand language.
Procedural language-3GLs
are designed to expressed the logic,the procedure-that can
solve general problems.

Fourth generation@Task-oriented language

also known  as 4GLs
Very high-level language
Require little special training on the part of user
This fourth generation are design to solve problems.
It is nonprocedural and focus only on specific tasks program is to accomplish.
4GLs involved query language and application generators.

The Fifth Generation@Problem and constrant language

5GLs is computer language
that provide system with a problem and some constraints,and then request
a solution.
5GLs would enable a computer to learn and apply
new information as people do.




Tuesday, April 5, 2011

what is cynicism


chapter 15: competencies

in chapter 15, there is one subtopisc title: technology and people,

technology and people are diveided into 4 parts, that is:

cynicism
naivete
frustration
proactivitu



 so, here specifically i want to explain more about


The word cynicism is defined as a cynical feeling of distrust. It is a negative feeling. The term cynicism was originally used to define the philosophy of a group of ancient Greeks called the Cynics. The founder of the Cynics was Antisthenes.
The word cynicism is, however, used in the modern-day context to describe the opinions of individuals who strongly believe (much to the dismay of the advocates of the positive thinkers of the world) that human behaviour is primarily motivated and strongly influenced by self-interest. These individuals, who are known as cynics, are reluctant to rely on positive attributes such as sincerity, the virtues of human beings and altruism. Altruism is synonymous with such concepts as unselfishness, self-sacrifice, humanity, selflessness and philanthropy.
Cynicism is defined as the belief  that thinks in a negative way about people at large and the outcome of all events in general. Cynics disagree, dispute, disapprove and attempt to disprove everything that the world views as good human values
more on wiki : cynicism

P R O G R A M M I N G

Hey guys!!
^_^
Chill...!!2weeks more before we end our class
Then ready for FINAL!!
Owh..."cuak" giler...
Now,lets we see on programming.
What is a programming??



Programming or software development
involved six-step procedures for creating the list of instructions
for the computer to process data.
====


1) Program specification
Program objectives, outputs,inputs and process require are determined

2) Program design
A solution is created using programming techniques

3) Program code
Program is written or coded using programming language

4) Program test
Program is tested or debugged by looking for syntax and logic error

5) Program documentation
Formalizing the written description and processes

6) Program maintainance
Completed programs are reviewed to evaluate
accuracy,efficiency,standardization and ease of use
**
p/s:Changes are made to the program's code as needed.


Tuesday, March 29, 2011

JOM KITA 'FAMILIARIZE' KEYWORDS & ABBREVIATIONS UNTUK BAB 12 & 13

dari ku utuk mu... =)


(perhaps kalau masuk quiz...nnt boleh la tahu, xla ternganga-ngaga..skodeng mmber sebelah) HEHEHE...=)

 salah satu cara nak mulakan study smart。。。。

CHAPTER 12 : DATABASES

Data consists of facts or observations about people, places, things, and events.
TWO WAYS @ PERSPECTIVES TO VIEW DATA :
A) Physical view------> actual formats and location of data; very specialized computer professionals are concerned with this view.
B) Logical view------>focuses on meaning and content of data;end users and most computer professionals are concerned with this view.

DATA IS ORGANIZED BY THE FOLLOWING GROUPS :
  • CHARACTER
  • FIELD              
  • RECORD                           [ cha fie rec tab datab ]
  • TABLE                       ====>  [capik fikir rencong tebu dibuat]   
  • DATABASE

  • KEY FIELD = PRIMARY KEY

  • BATCH ( LATER )vs REAL TIME  ( NOW )
PROCESSING 

DBMS = Database management system
- DBMS engine
-data definition subsystem (using a data dictionary or schema)
-data manipulation subsystem, provides tools for data maintenance & data analysis; tools include query-by-example and structured query language (SQL).
 
 
-APPLICATION GENERATION SUBSYSTEM (creating data entry forms with specialized programming languages)
-DATA ADMINISTRATION SUBSYSTEM
-DATABASE ADMINISTRATORS (DBAs) are computer professionals who help define processing rights.
-multidimensional database, sometimes called a data cube.


CHAPTER 13 
system analysis and design

SAD is a 6-phase problem-solving:




P/S; DO THE BEST!! SELAMAT MENJAWAB QUIZ & SELAMAT MENJAWAB 'FINAL' 


Monday, March 28, 2011

Batch vs Real-Time Processing

Hye guys!!
Owh too lots of work..
So tired~~


smpaikan blog nie pun x terupdate..
So let we talk about Batch vs Real-time Processing.
Batch-processing
=
=
Data is collected over several hours,days or even weeks.
When you buy things and charge them to your credit card,


At the end oh the month,
the company's data processing department puts all those transactions together
and processes them at one time.
=
Then you will get your bill!!

Next

Real-time Processing
=
=
also known as online processing
occurs when data is processed at the same time the transaction occurs.
For example, when you use your ATM card
to withdraw cash.


Tuesday, March 22, 2011

tecnology use in 'smart card'


Hello everyone…
This time I would like to share something that really close to us.
We are frequently  use this ‘THING’ but…….
are we really what kind technology that been apply to this ‘THING’?
the ‘THING’that I mean is
.
.
.
.
.
.
                                                             
                                                                   

                                                        


All this medium are uses  to make our life more and more secure especially to individual security concerns by use this called
 ‘SMART CARD’
Why we should secure about our security by using technology medium?
.
.
.
This is because, by using this medium the responsible parties
cannot identified who the user 





COMMON
Issues for IT Security
…….
….

• Moving beyond user name and password
• Managing internal and remote IT access
• Developing a systems view of physical and logical security
• Servicing beyond the network edge





A personal database
– Store and safeguard information on an individual basis
                                – Local, portable storage of an individual’s private information





A personal firewall
– Intelligent guardian of cardholder data
– verifying that requestors are authorized to access information
– Cardholder control of release of information



                                                                                 

 • A personal terminal
– Validation of the authenticity and trustworthiness of card readers or terminals
– Strong validation of cardholder as rightful  owner of the ID card

DO YOU KNOW THAT……. 
ID (identity card) systems that require the highest degree of security are combining smart card and biometric technologies.







Medium that use to identify the user
‘READER PRODUCT’
.........
......
....
..
.




                                                                              ...
                                                                                .
                                                                               
    


Not this kind kind of reader

…………..
…….
..




    






                                                                    this is the reader that i mean


Challenges Facing the Secure Identification Industry?



• When is visual authentication not enough?
• The maturity of machine-readable technology with more standards-based choices at lower costs
• The recognized need that exists to bind the identity of the cardholder to the card – how do you do it?
• How do you increase security without sacrificing speed and convenience?
• Managing scalable ID solutions that need multiple technologies with security and privacy from point of issuance to the network edge.