tag:blogger.com,1999:blog-68803582929429292302024-02-19T02:56:48.440-08:00Using ICT to enhance learning"Success is a lousy teacher. It seduces smart people into thinking they can't lose."
Bill GatesICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.comBlogger32125tag:blogger.com,1999:blog-6880358292942929230.post-35104637693428780762012-06-09T22:35:00.002-07:002012-06-09T22:39:53.812-07:00Adakah Murid Kini Masih Lagi DiSuap ?<br />
<h2>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2aIuAIxe70AbBFD33MKBi9gkJAtxHppclbKhvSe-Y6gyaPRuLavZpg1aIKnAhRcp-dHxqiAmqTkxK5vT-A3O5lQuLwP_2PR_-kCrtNZ3HgU56XH39-CPHG5a9UuEOWlMZga30ae7Og6c/s1600/suap1.png" imageanchor="1" style="clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2aIuAIxe70AbBFD33MKBi9gkJAtxHppclbKhvSe-Y6gyaPRuLavZpg1aIKnAhRcp-dHxqiAmqTkxK5vT-A3O5lQuLwP_2PR_-kCrtNZ3HgU56XH39-CPHG5a9UuEOWlMZga30ae7Og6c/s200/suap1.png" width="200" /></a></h2>
Berdasarkan
statistik permohonan bagi mendapatkan jawapan (Soalan-Soalan
Berdasarkan Subtopik), hanya 8% permohonan daripada murid-murid ICT.
Saya bertanya sendirian sama ada dengan teknologi dan dengan gaya
pembelajaran dan pengajaran masa kini, masih memerlukan murid-murid di
berikan segala-galanya oleh guru. Saya tidak mahu memberikan contoh yang
lain kerana murid-murid saya sendiri kebanyakkannya masih memerlukan
bantuan daripada guru dalam pembelajaran mereka. Ini termasuklah
nota-nota dan soalan tambahan. Adalah amat malang bagi guru (termasuklah
saya...) kerana dengan kurikulum baru dengan ketiadaan peperiksaan
seperti upsr dan pmr yang mana murid-murid perlu membuat kerja kursus,
projek dan sebagainya. Malang kerana jika sesuatu tidak dilakukan dengan
segera mulai sekarang, maka guru akan terbeban dengan segala macam
kerja seperti mencari bahan, jawapan dan akhirnya boleh dikatakan kerja
kursus itu sebenarnya dilakukan oleh guru !! Apakah faktor penyebab
mengapa perkara ini berlaku ?? Saya cuba senaraikan dan jika ada
bangkangan, tambahan dan sebagainya silalah komen...<br />
1. Guru tidak percaya murid-murid dapat mencari bahan dengan betul..<br />
2. Guru tidak mengajar murid-murid cara mencari bahan dengan betul.<br />
3. Guru tidak tahu bagaimana mengajar murid-murid mencari bahan pembelajaran.<br />
4. Murid-murid tidak digalakkan mencari bahan pembelajaran.<br />
5. Guru dapat menjimatkan masa dengan terus memberi bahan-bahan pembelajaran.<br />
6. Murid-murid tidak kemahiran menggunakan ICT.(persekitaran)<br />
7. Murid-murid sukar untuk mencari bahan menggunakan ICT.<br />
8. Murid-murid lemah dan memang perlu terus diberi bahan pembelajaran<br />
9. Tiada sistem pemantauan yang berkesan oleh guru.<br />
10.Guru terbeban dengan kerja lain yang lebih penting<br />
11.Cara sekarang yang mudah dan berkesan<br />
..<br />
Bagaimana pendapat guru yang lain... Saya tidak tahu keadaannya di
bandar-bandar kerana saya tidak pernah mengajar dibandar dan mungkin
juga kerana saya tidak mahu mengajar di bandar...Maksud saya dari segi
murid-murid dan persekitaran mereka... Atau juga sekolah mereka... Sikap
murid-murid yang bersekolah lelaki sahaja dengan murid-murid yang
bersekolah perempuan sahaja mempunyai kelainannya tersendiri.. begitu
juga dengan murid-murid berasrama penuh dan bermacam jenis sekolah yang
lain..<br />
<br />
Jika kita lihat dari sudut-sudut tersebut yang pelbagai rencam...MAKA sebagai guru boleh kita katakan...<br />
1. Tidak perlu memikirkan perkara tersebut kerana tidak kena mengena..<br />
2. Membuang masa memikirkan masalah ini kerana masalah lain banyak yang kena difikirkan.<br />
3. Ikut cara sendiri, sekarang pun tidak ada masalah...murid-murid berjaya juga...<br />
4. Biar orang lain yang buat kajian...<br />
<br />
****Sebab itu ramai pelajar apabila berada diinstitut pengajian tinggi,
kolej dan sebagainya menghadapi masalah mencari bahan pembelajaran
semasa awal pengajian kerana telah biasa diSUAP oleh guru.... <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgURK97CCuT0i5dt15vNjRQ-YkjrO3lhdukhUQPPqOTf6nL7jtmr46mIxhQ8I158pM6CG_WC1a-ACvojuGdQvpyWHMOgP1CASKriU8gItNi5jtdKEuPIg55NAtDFhT1HPuIQyf3x1qTZxc/s1600/peratus+murid+ambil+jawapan.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgURK97CCuT0i5dt15vNjRQ-YkjrO3lhdukhUQPPqOTf6nL7jtmr46mIxhQ8I158pM6CG_WC1a-ACvojuGdQvpyWHMOgP1CASKriU8gItNi5jtdKEuPIg55NAtDFhT1HPuIQyf3x1qTZxc/s1600/peratus+murid+ambil+jawapan.png" /></a></div>
info from <i>rmmict</i><br />
<div style="clear: both;">
</div>
<div class="break">
</div>
<div class="details">
<br /></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-63515031281830023862012-06-09T22:14:00.002-07:002012-06-09T22:14:11.930-07:00CHAPTER FIVE - PROGRAMMING<strong>CHAPTER FIVE - PROGRAMMING</strong><br /><strong>5.1.1.1 State the definition of program.</strong><br />A
computer program is a series of organised instructions that directs a computer
to perform tasks. Without programs, computers are
useless.<br /><br /><strong>5.1.1.2 State the definition of programming
language.</strong><br />A programming language is a set of words, symbols and codes
that enables humans to communicate with computers. It is a language used for
writing computer programs, that direct a computer to perform computation and to
organise the flow of control between mechanical
devices.<br /><br /><strong>5.1.2.1 Identify the generations of low-level programming
languages with examples.</strong><br />A low-level programming language is a
programming language that provides little or no abstraction from computer’s
microprocessor.<br /><br /><strong>FIRST GENERATION OF PROGRAMMING LANGUAGE</strong><br />The first
generation of programming language, or 1GL, is machine language. Machine
language is a set of instructions and data that a computer's central processing
unit can execute directly. Machine language statements are written in binary
code, and each statement corresponds to one machine action.<br /><br /><strong>SECOND
GENERATION PROGRAMMING LANGUAGE</strong><br />The second generation programming
language, or 2GL, is assembly language. Assembly language is the human-readable
notation for the machine language used to control specific computer operations.
An assembly language programmer writes instructions using symbolic instruction
codes that are meaningful abbreviations or mnemonics. An assembler is a program
that translates assembly language into machine language. Since assembly language
consist of human-readable abbreviations, the assembler must first convert
assembly language into machine-readable language before the computer can readily
understand its instructions.<br /><br /><strong>5.1.2.2 Identify the generations of
high-level programming languages with examples.</strong><br /><br />A high-level programming
language is a programming language that is more abstract, easier to use, and
more portable across platforms.<br /><br /><strong>THIRD GENERATION PROGRAMMING
LANGUAGE</strong><br />The third generation of programming language, 3GL, or procedural
language uses a series of English-like words, that are closer to human language,
to write instructions.<br /><br />High-level programming languages make complex
programming simpler and easier to read, write and maintain.Programs written in a
high-level programming language must be translated into machine language by a
compiler or interpreter.<br /><br />PASCAL, FORTRAN, BASIC, COBOL, C and C++ are
examples of third generation programming languages.<br /><br /><strong>FOURTH GENERATION
PROGRAMMING LANGUAGE</strong><br />The fourth generation programming language or
non-procedural language, often abbreviated as 4GL, enables users to access data
in a database.<br /><br />
<strong>CHAPTER FIVE - PROGRAMMING</strong><br />
A
very high-level programming language is often referred to as goal-oriented
programming language because it is usually limited to a very specific
application and it might use syntax that is never used in other programming
languages.<br /><br />SQL, NOMAD and FOCUS are examples of fourth generation
programming languages.<br /><br /><strong>FIFTH GENERATION PROGRAMMING LANGUAGE</strong><br />The
fifth generation programming language or visual programming language, is also
known as natural language. Provides a visual or graphical interface, called a
visual programming environment, for creating source codes.<br /><br />Fifth
generation programming allows people to interact with computers without needing
any specialised knowledge. People can talk to computers and the voice
recognition systems can convert spoken sounds into written words, but these
systems do not understand what they are writing; they simply take
dictation.<br /><br />Prolog and Mercury are the best known fifth-generation
languages.<br /><br /><strong>5.1.3.1 Define structured approach in
programming.<br /><br />STRUCTURED PROGRAMMING EDUCATION</strong><br />Structured
programming often uses a top-down design model where developers map out the
overall program structure into separate subsections from top to
bottom.<br /><br />In the top-down design model, programs are drawn as rectangles. A
top-down design means that the whole program is broken down into smaller
sections that are known as modules. A program may have a module or several
modules.<br /><br />Structured programming is beneficial for organising and coding
computer programs which employ a hierarchy of modules. This means that control
is passed downwards only through the hierarchy.<br /><br />Examples of structured
programming languages include Ada, Pascal and
Fortran.<br /><br /><strong>5.1.3.2 Define object-oriented approach in
programming.</strong><br />The object-oriented approach refers to a special type of
programming approach that combines data with functions to create objects. In an
object-oriented program, the object have relationships with one another. One of
the earliest OOP languages is Smalltalk. Java, Visual Basic and C++ are examples
of popular OOP languages.<br /><br /><strong>5.1.3.3 Differentiate between structured
approach and object-oriented approach in programming.</strong> Structured programming
often uses a top-down design model. The object-oriented programming approach
uses objects.<br /><br /><strong>5.1.4.1 Describe the translation method of
programming using assembler, interpreter and
compiler.</strong><br /><strong>ASSEMBLER</strong><br />An assembler is a computer program for
translating assembly language — essentially, a mnemonic representation of
machine language — into machine language.<br /><br />For example in intel 80836, the
assembly language for the ’no operation’ command is NOP and its machine code
representation is 10010000. Example of assemblers are MACRO-80 Assembler and
Microsoft MASM.<br /><br /><br /><strong>INTERPRETER</strong><br />Interpreter is used to interpret and
execute program directly from its source without compiling it first. The source
code of an interpreted language is interpreted and executed in real time when
the user execute it.<br /><br />The interpreter will read each codes converts it to
machine code and executes it line by line until the end of the program. Examples
of interpreter-based language are BASIC, Logo and
Smalltalk.<br /><br /><strong>COMPILER</strong><br />The source code (in text format) will be
converted into machine code which is a file consisting of binary machine code
that can be executed on a computer. If the compiler encounters any errors, it
records them in the program-listing file.<br /><br />When a user wants to run the
program, the object program is loaded into the memory of the computer and the
program instructions begin executing. A compiled code generally runs faster than
programs based on interpreted language. Several programming languages like C++,
Pascal and COBOL used compilers as their
translators.<br /><br /><strong>5.1.5.1 Differentiate between constants and
variables.</strong><br /><strong>Constants Variables</strong><br />Characteristics<br /><br />Value is not
changeable during the course of the program.<br /><br />Value can be changed anytime
during the course of the program.<br /><br />Usage<br /><br />Use constant when you want
to declare someting that won’t be changed midway in your program
execution.<br /><br />Use variable to store data that may or will change during the
running of the program.<br /><br /><strong>5.1.5.2 Differentiate between the data
types: Boolean, integer, double, string and date.</strong><br /><strong>Integer</strong><br />Integer
data type contains any whole number value that does not have any fractional
part.<br /><br /><strong>Double</strong><br />Any number value that may and could contain a
fractional part.<br /><br /><strong>String</strong><br />Any value that contains a sequence of
characters.<br /><br /><strong>Boolean</strong><br />Boolean type consists either a True or False
value. Programmers usually use it to store
status.<br /><br />Based on that, the programmer will design a
flow chart that represents the needs of the client<br /><br /><br /><br />
<div style="clear: both;">
</div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-76197192512329406592012-06-09T19:54:00.005-07:002012-06-09T19:54:53.152-07:00Apabila ICT Menjadi TMK<br />
<div id="header">
<div class="section" id="catmenu">
<div class="widget Label" id="Label1">
<div class="widget-content">
<div>
</div>
</div>
</div>
</div>
</div>
<div id="content">
<div class="main section" id="main">
<div class="widget Blog" id="Blog1">
<div class="blog-posts hfeed">
<div class="latest single">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAKEaegPIGBtCfVwhUP6Yzq7iIRZ7g-Uyyh960a50wSyOvXVQUD8hdYQf1QKWtk-ZopQzXsI-pW2sMd1k7Hu9n0D0Ix4JYm8zQrVqMcAJ4aAM8vjVZdMGHo5UySFHf_tk0-CRCyeuLuiM/s1600/ict+students+to+pelajar+tmk.png" imageanchor="1" style="clear: left; display: inline !important; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAKEaegPIGBtCfVwhUP6Yzq7iIRZ7g-Uyyh960a50wSyOvXVQUD8hdYQf1QKWtk-ZopQzXsI-pW2sMd1k7Hu9n0D0Ix4JYm8zQrVqMcAJ4aAM8vjVZdMGHo5UySFHf_tk0-CRCyeuLuiM/s200/ict+students+to+pelajar+tmk.png" width="200" /></a><span style="font-weight: normal;">Subjek
ICT akan menjadi TMK pada tahun hadapan bermula dengan tingkatan 4. Ini
juga bermakna jika mengikut perancangannya SPM ICT 2013 menggunakan
bahasa melayu sepenuhnya. Ada beberapa kesan daripada perubahan ini.
Perkara ini mungkin terjadi kepada segelintir sekolah sahaja.
Pengambilan murid yang mengambil subjek ini datang daripada pelajar
kelas pertengahan. Jika sebelum ini ia menjadi masalah kerana guru perlu
mengajar dalam Bahasa Inggeris yang mana murid-murid sukar mencapai
objektif pengajaran. Oleh kerana kerja kursus yang merangkumi 30%
daripada keseluruhan markah SPM, maka mungkin agak mudah untuk lulus
100% namun dengan kualiti yang tidak seberapa. Apabila ICT menjadi TMK,
ada terdengar juga berita terdapat sekolah yang ingin pelajar yang
mengambil ICT ini datang daripada kelas yang jauh ke bawah. Ini tentunya
akan memeningkan guru yang mengajar. Pihak sekolah beranggapan apabila
sudah diajar dalam bahasa melayu. maka TMK tidak lah sesukar mana untuk
diajar. Benarkah begitu ?? </span><br />
<div>
<br /></div>
</div>
</div>
</div>
</div>
</div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-43248435086389968372012-06-09T19:49:00.000-07:002012-06-09T19:50:53.774-07:00ICT Ke TMK. Bila Bermula ???<br />
<h2>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-kOKB_bt1R5-5NLUzRu5LYTajbAINsEFPUP9pQCNV0FWmltjdVJD40zfdmhKPzHqMPUxlscDSPFDrC_o7MSL247amm0fabuASxaRB6mL6GccLHIKXRmulrgkVxxgPOMeK37K3cFMn_Hg/s1600/ictmk.png" imageanchor="1" style="clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-kOKB_bt1R5-5NLUzRu5LYTajbAINsEFPUP9pQCNV0FWmltjdVJD40zfdmhKPzHqMPUxlscDSPFDrC_o7MSL247amm0fabuASxaRB6mL6GccLHIKXRmulrgkVxxgPOMeK37K3cFMn_Hg/s200/ictmk.png" width="200" /></a></h2>
Selaras
dengan pemansuhan PPSMI, subjek ICT juga tidak terkecuali akan berubah
semula kepada TMK (Teknologi Maklumat & Komunikasi). Pada tahun
hadapan tingkatan 4 akan mula diajar dalam bahasa melayu. Seterusnya
pada 2013, SPM subjek TMK akan bermula. NAMUN begitu bagaimana pula
dengan silibusnya. Melalui info yang saya perolehi, belum ada perubahan
besar dari silibus untuk tahun hadapan. Guru masih menggunakan apa yang
ada cuma pengajaran sahaja yang dilakukan sepenuhnya dalam bahasa
melayu. Secara berperingkat bahan-bahan pengajaran dalam bahasa melayu
dibuat (buat sendiri !!)<br />
Perubahan drastik yang akan berlaku adalah apabila KSSM bermula. Dapatan awal tidak rasmi adalah <i>6 Learning Area</i> sedia ada kini akan hanya menjadi 5 sahaja. <i>Learning Area 1 </i>akan
dipecahkan. Tingkatan satu hingga 3 akan mempunyai subjek ict (nama
subjek belum diputus secara rasmi) di mana kebanyakan topik <i>learning Area 1 </i>akan
berada di situ. Diberitakan juga Ms Access (topik database) akan
diganti dengan MySQL. jadi jika guru ict tidak mahir, maka boleh la mula
belajar serba sedikit agar jika ia menjadi kenyataan tidaklah terkejut
sangat nanti..<br />
<br />
**<i>info-info ini diperolehi semasa mengikuti mesyuarat dengan BPK
tahun lepas dan awal tahun ini dimana saya tidak lagi mengikutinya
kerana dah penat... Barang diingat, ianya belum rasmi lagi...sebarang
perubahan saya tidak bertanggungjawab ke atasnya...jadi saya minta maaf
awal2..jika tak sama dengan kenyataan diatas...</i><br />
<div style="clear: both;">
</div>
<div class="break">
</div>
<div class="details">
Info from rmmict</div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-63470010111678519592012-06-09T18:43:00.001-07:002012-06-09T19:57:55.296-07:00The Future of Glass Technology<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/gplbpAIjMq8?fs=1" width="480"></iframe>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-15953182698404158622012-06-09T18:22:00.000-07:002012-06-09T18:22:09.203-07:004.1.5.1 Multimedia element<div id="adi_top_right"><a href="http://adiwidget.blogspot.com/"></a> </div><span style="color: black;"><strong>4.1.5.1 Multimedia element</strong></span> <br />
<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-footer"> <div class="post-header-line-1"><strong><em></em></strong> </div><div class="post-header-line-1"><strong><em>4.1.5.1 Identify the multimedia elements:</em></strong></div></div><div class="post-body entry-content"> </div><div class="post-body entry-content" style="text-align: justify;"><a href="" name="more"></a></div><div class="post-body entry-content"><span style="color: purple;"><em><strong><span style="color: #444444;">1.text</span></strong></em></span></div><div style="text-align: justify;">Text is the basic element of multimedia. It involves the use of text types, sizes, colours and background colour.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In a multimedia application, other media or screen can be linked through the use of text. This is what you call Hypertext.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">To produce an effective multimedia program there are three things that need to be considered. They are: The position of the text on the screen. Length of the message And legibility of the text.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong><span style="background-color: purple;"><span style="background-color: #fce5cd;">2. graphics</span></span></strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Graphics make the multimedia application attractive. They help to illustrate ideas through still pictures. There are two types of graphics used: bitmaps (paint graphics) and vector (draw graphics).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Bitmaps images are real images that can be captured from devices such as cameras or scanners.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Vector graphics are drawn on the computer and only require a small amount of memory.</div><div style="text-align: justify;"><br />
<strong><em><span style="color: purple;"><span style="color: black;"></span></span></em></strong> </div><div style="text-align: justify;"><strong><em><span style="color: purple;"><span style="color: black;">3) audio</span></span></em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A multimedia application may require the use of speech, music and sound effects. These are called audio or the sound element. There are two basic types of audio or sound: analog and digital audio.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Analog audio refers to the original sound signal. Digital audio refers to the digital sampling of the actual sound. The sound used in multimedia is digital audio.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">We can record analog audio file. We can use special audio editors like Sound Forge to convert analog audio files into digital audio files.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: purple;"><em><strong><span style="color: black;">4) video</span></strong></em></span></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Video provides a powerful impact in a multimedia program. In multimedia applications, the digital video is gaining popularity because of the following reasons: • video clips can be edited easily the digital video files can be stored like any other files in the computer and the quality of the video can still be maintained the video files can be transferred within a computer network it allows non-linear editing in any part of the video</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">However, these digital video files are large in size. Transferring these files can take a long time especially when using the Internet.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: purple;"><strong><em><span style="color: black;">5) animation</span></em></strong></span></div><span style="color: black;"> </span><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Animation is a process of making a static image look like it is moving. In multimedia, digital animation is used. Digital animation can be categorised into two broad area: 2D (2 Dimension) and 3D (3 Dimension) animations.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">2D animation refers to creating movements in basic objects. These objects are put into various situations or positions and have movement on the screen.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">3D animation refers to creating movements to three dimensional digital objects from photographs. Movements like spinning and flying across the screen are some samples of animations.</div><div style="text-align: justify;"><br />
</div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-68554972201266229362012-06-09T18:09:00.000-07:002012-06-09T18:09:45.814-07:004.1 Multimedia Concepts<strong><em>4.1 Multimedia Concepts</em></strong> <br />
<div style="text-align: justify;"><strong><em>4.1.2.1 Identify the use of multimedia in various fields.</em></strong></div><br />
<div style="text-align: justify;">Multimedia has played an important role in other fields, such as business, arts, medicine and engineering. In business, multimedia applications are used in advertising products. Many companies nowadays develop and distribute catalogues in the form of a CD-ROM as it is more interesting to the consumers. In art, artists use multimedia elements by combining drawing and animation. In medicine, doctors can practice or be trained in performing high-risk surgery by using virtual surgery. In engineering, Computer-Aided Design or CAD is used. By using this application, engineers can view the design from many aspects and improve on it before production.</div><br />
<div style="text-align: justify;"><br />
</div><em><strong>4.1.3.1Differentiate between the characteristics of linear and non-linear multimedia.</strong></em><br />
<br />
<div style="text-align: justify;"><strong><em>LINEAR INTERACTIVITY</em></strong></div><br />
<div style="text-align: justify;">In linear interactivity, the user interacts with the multimedia application without controlling the progress of the content. In other words, the user is a passive receiver of the multimedia content most of the time.</div><br />
<div style="text-align: justify;">The linear content is usually arranged in sequence. An example of the multimedia linear content is a movie. Although a movie uses a combination of audio, graphics and animations, the user has no control over the sequence of events.</div><br />
<div style="text-align: justify;"><br />
<strong><em>NON-LINEAR INTERACTIVITY</em></strong></div><br />
<div style="text-align: justify;">Unlike linear interactivity, non-linear interactivity allows the user to interact with the content according to what the user wants from the content. In other words, it is a two-way communication.</div><br />
<div style="text-align: justify;">The user can control the progress and sequence of the multimedia content by using buttons or links. Non-linear interactivity uses tools like “hypertext” to connect a word or a phrase to another screen.</div><br />
<div style="text-align: justify;">An electronic book with links to another screen is considered as having non-linear multimedia content. Hypermedia is also used in non-linear interactivity. This tool is similar to hypertext. However, it connects to different media elements such as audio and video.</div><br />
<div style="text-align: justify;"><em><strong></strong></em> </div><div style="text-align: justify;"><em><strong>4.1.4.1Compare and contrast the mediums of delivery for multimedia applications:</strong></em></div><br />
<div style="text-align: justify;"><strong><em>• web-based</em></strong></div><br />
<div style="text-align: justify;">Web-based multimedia is a combination of multimedia technology and Internet technology. Web-based multimedia is popular nowadays.</div><br />
<div style="text-align: justify;">In the past, Web pages were filled only with static texts and graphics as there were problems in downloading large multimedia files through the Internet. Downloading a video file could take a long time as it is large.</div><br />
<div style="text-align: justify;">Now, with the advancement of both technologies, most Web pages integrate elements like text, graphic, audio, video and animation.</div><br />
<br />
These dynamic elements make the process of distributing information through the Internet more interesting and effective to the user.<br />
<br />
There are a lot of multimedia software including plug-ins, players and browsers used in the Internet. These software allow better quality multimedia programs to be stored and viewed. Software Plug-in @ Player Browser • Flash Director FrontPage Java Flash Player Media Player Internet Explorer Firefox<br />
<br />
<strong><em>• CD-based</em></strong><br />
<br />
CDs like CD-ROM (Compact Disc Read Only Memory) have been used to store and deliver multimedia content.<br />
CDs are usually used with computers. An improvement of the CD-ROM is the Blu-ray disc which can store better quality video.<br />
<br />
<br />
However, the main problem in using CD-ROMs as a medium is that, it can be costly as it takes a long time to produce a complete multimedia program.ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-55413478286477909462012-06-09T18:00:00.001-07:002012-06-09T18:02:04.313-07:004.1.1 Define Multimedia<strong><em>4.1 Multimedia Concepts</em></strong><br />
<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"><div class="post-body entry-content"><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>4.1.1.1 Define multimedia.</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Multimedia is the presentation of information by using a combination of text, audio, graphic, video and animation.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>4.1.2.1 Identify the use of multimedia in various fields.</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Multimedia has played an important role in other fields, such as business, arts, medicine and engineering. In business, multimedia applications are used in advertising products. Many companies nowadays develop and distribute catalogues in the form of a CD-ROM as it is more interesting to the consumers. In art, artists use multimedia elements by combining drawing and animation. In medicine, doctors can practice or be trained in performing high-risk surgery by using virtual surgery. In engineering, Computer-Aided Design or CAD is used. By using this application, engineers can view the design from many aspects and improve on it before production.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong>4.1.3.1Differentiate between the characteristics of linear and non-linear multimedia.</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>LINEAR INTERACTIVITY</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In linear interactivity, the user interacts with the multimedia application without controlling the progress of the content. In other words, the user is a passive receiver of the multimedia content most of the time.</div><div style="text-align: justify;">The linear content is usually arranged in sequence. An example of the multimedia linear content is a movie. Although a movie uses a combination of audio, graphics and animations, the user has no control over the sequence of events.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>NON-LINEAR INTERACTIVITY</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Unlike linear interactivity, non-linear interactivity allows the user to interact with the content according to what the user wants from the content. In other words, it is a two-way communication.</div><div style="text-align: justify;">The user can control the progress and sequence of the multimedia content by using buttons or links. Non-linear interactivity uses tools like “hypertext” to connect a word or a phrase to another screen.</div><div style="text-align: justify;">An electronic book with links to another screen is considered as having non-linear multimedia content. Hypermedia is also used in non-linear interactivity. This tool is similar to hypertext. However, it connects to different media elements such as audio and video.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong>4.1.4.1Compare and contrast the mediums of delivery for multimedia applications:</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>• web-based</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Web-based multimedia is a combination of multimedia technology and Internet technology. Web-based multimedia is popular nowadays.</div><div style="text-align: justify;">In the past, Web pages were filled only with static texts and graphics as there were problems in downloading large multimedia files through the Internet. Downloading a video file could take a long time as it is large.</div><div style="text-align: justify;">Now, with the advancement of both technologies, most Web pages integrate elements like text, graphic, audio, video and animation.</div><br />
<br />
These dynamic elements make the process of distributing information through the Internet more interesting and effective to the user.<br />
<br />
There are a lot of multimedia software including plug-ins, players and browsers used in the Internet. These software allow better quality multimedia programs to be stored and viewed. Software Plug-in @ Player Browser • Flash Director FrontPage Java Flash Player Media Player Internet Explorer Firefox<br />
<br />
<strong><em>• CD-based</em></strong><br />
<br />
CDs like CD-ROM (Compact Disc Read Only Memory) have been used to store and deliver multimedia content.<br />
CDs are usually used with computers. An improvement of the CD-ROM is the Blu-ray disc which can store better quality video.<br />
<br />
<br />
However, the main problem in using CD-ROMs as a medium is that, it can be costly as it takes a long time to produce a complete multimedia program.<br />
<br />
</div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-15285613050784054562012-06-09T17:54:00.006-07:002012-06-09T18:23:56.759-07:004.0 Multimedia<div class="separator" style="clear: both; text-align: left;"><strong><span style="color: purple; font-family: Georgia, "Times New Roman", serif;">4.0 MULTIMEDIA</span></strong> </div><br />
<br />
<span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/06/4.html">4.1.1 Definition of Multimedia</a></span><br />
<br />
4.1.1.1 Define multimedia.<br />
<br />
<br />
4.1.2 Multimedia in Various Fields<br />
<br />
4.1.2.1 Identify the use of multimedia in various fields.<br />
<br />
<br />
4.1.3 Interactivity of Multimedia<br />
<br />
4.1.3.1 Differentiate between the characteristics of linear and non-linear multimedia.<br />
<br />
4.1.4 Medium of Delivery<br />
<br />
<br />
<span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/06/41-multimedia-concepts.html">4.1 Multimedia Concepts</a></span><br />
<br />
4.1.4.1 Compare and contrast the mediums of delivery for multimedia applications:<br />
<br />
• web-based<br />
• CD-based<br />
<br />
<br />
<a href="http://ictatyourfingertips.blogspot.com/2012/06/4151-multimedia-element.html"><span style="color: #61882b;">4.1.5 Multimedia Elements</span></a><br />
<br />
4.1.5.1 Identify the multimedia elements:<br />
<br />
• text<br />
• audio<br />
• video<br />
• graphic<br />
• animation<br />
<br />
4.2 Hardware and Software<br />
<br />
4.2.1 Hardware<br />
<br />
4.2.1.1Identify hardware that can be used to produce multimedia products:<br />
<br />
• scanner<br />
• video camera<br />
• camera<br />
• audio devices<br />
• video capture devices<br />
<br />
4.2.2 Editing Software<br />
<br />
4.2.2.1 Identify editing software that can be used to produce multimedia elements:<br />
<br />
• text editor<br />
• graphics and image editor<br />
• audio editor<br />
• video and animation editor<br />
<br />
<br />
4.2.3 Authoring Tools<br />
<br />
4.2.3.1 Define the various concepts in authoring tools:<br />
• time frame concept<br />
• icon concept<br />
• card concept<br />
4.2.4 Web Editor<br />
<br />
4.2.4.1 Describe and give examples of web editors:<br />
• text-based<br />
• WYSIWYG<br />
<br />
<br />
4.3.1 User Interface Principles<br />
<br />
4.3.1.1State user interface principles.<br />
<br />
4.3.1.2 Apply suitable user interface principles in a project.<br />
<br />
4.3.2 Development Team<br />
<br />
4.3.2.1 State the role of each member in a development team (examples: project manager, subject <br />
matter expert, instructional designer, graphics artist, audio-video technician and programmer).<br />
<br />
4.3 Multimedia Development<br />
<br />
4.3.3 Multimedia Production<br />
<br />
4.3.3.1 Describe the phases in multimedia production:<br />
• analysis<br />
• design<br />
• implementation<br />
• testing<br />
• evaluation<br />
• publishing<br />
<br />
4.3.3.2 Apply all the phases of multimedia production to produce an interactive educational multimedia <br />
project.<br />
<br />
4.4 Current and Future Developments<br />
<br />
4.4.1 Immersive Multimedia<br />
4.4.1.1 Give an example of immersive multimedia in education, business or entertainment.ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-39851740717912218132012-04-30T11:48:00.004-07:002012-04-30T11:57:15.501-07:003.2.1 Devices<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"><div class="post-body entry-content"><div style="text-align: justify;"></div><div style="text-align: justify;"><em><strong>3.2.1.1 Identify the devices needed in computer network communication :</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• Network Interface Card (NIC)</div><div style="text-align: justify;">• Wireless Network Interface Card</div><div style="text-align: justify;">• Modem (internal and external)</div><div style="text-align: justify;">• Hub / Switch</div><div style="text-align: justify;">• Router</div><div style="text-align: justify;">• Wireless Access Point</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>3.2.1.2 State the functions of the following:</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• Network Interface Card (NIC)</div><div style="text-align: justify;">A Network Interface Card (NIC) is an adapter card or PC card that enables the computer to access the network</div><div style="text-align: justify;">• Wireless Network Interface Card</div><div style="text-align: justify;">Wireless Network Interface Card (WNIC) is a network card that provides wireless data transmission</div><div style="text-align: justify;">• Modem (internal and external)</div><div style="text-align: justify;">There are two types of modem, internal modem and external modem. An internal modem only works in stand-alone computers. It is built into the computer. An external modem is separated from the computer and is also mobile.</div><div style="text-align: justify;">• Hub / Switch</div><div style="text-align: justify;">Hub or switch is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.</div><div style="text-align: justify;">• Router</div><div style="text-align: justify;">A router is a communications device that connects multiple computers or other routers together and transmits data to the correct destination</div><div style="text-align: justify;">• Wireless Access Point</div><div style="text-align: justify;">A wireless access point is a central communications device that allow computers to transfer data. This device can help information to be transferred wirelessly to other wireless devices or to a wired network. Wireless access point has high quality antennas for optimal signals</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-31406475669697502252012-04-30T11:45:00.000-07:002012-04-30T11:45:09.564-07:003.1.7.1 Describe the types of network communications technology<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content">3.1.7.1 Describe the types of network communications technology:<br />
<a href="" name="more"></a><br />
<div style="text-align: justify;"><strong><em>Internet</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The Internet is the worldwide, publicly accessible system of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It consists of millions of smaller business, academic, domestic and government networks, which together carry various information and services, such as electronic mail, online chat, and the interlinked Web pages and other documents of the World Wide Web. Internet is one of the uses of communication. Through the Internet, society has access to global information and instant communication.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong>Intranet</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">An Intranet is an internal network that uses Internet technologies and it is a small version of the Internet that exists within an organisation. It is a private computer network that uses Internet protocols, network connectivity and possibly the public telecommunication system to securely share part of an organisation’s information or operation with its employees.</div><div style="text-align: justify;">Intranet generally make company information accessible to employees and facilitate working in groups. Simple intranet applications include electronic publishing of organisational materials such as telephone directories, event calendars and job postings.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>Extranet</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">An extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of a business’s information or operations with suppliers, vendors, partners, customers or other businesses.</div><div style="text-align: justify;">Package shipping companies, for example, allow customers to access their network to print air bills, schedule pickups, and even track shipped packages as the packages travel to their destinations.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong>3.2.1.1 Identify the devices needed in computer network communication :</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• Network Interface Card (NIC)</div><div style="text-align: justify;">• Wireless Network Interface Card</div><div style="text-align: justify;">• Modem (internal and external)</div><div style="text-align: justify;">• Hub / Switch</div><div style="text-align: justify;">• Router</div><div style="text-align: justify;">• Wireless Access Point</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>3.2.1.2 State the functions of the following:</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• Network Interface Card (NIC)</div><div style="text-align: justify;">A Network Interface Card (NIC) is an adapter card or PC card that enables the computer to access the network</div><div style="text-align: justify;">• Wireless Network Interface Card</div><div style="text-align: justify;">Wireless Network Interface Card (WNIC) is a network card that provides wireless data transmission</div><div style="text-align: justify;">• Modem (internal and external)</div><div style="text-align: justify;">There are two types of modem, internal modem and external modem. An internal modem only works in stand-alone computers. It is built into the computer. An external modem is separated from the computer and is also mobile.</div><div style="text-align: justify;">• Hub / Switch</div><div style="text-align: justify;">Hub or switch is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.</div><div style="text-align: justify;">• Router</div><div style="text-align: justify;">A router is a communications device that connects multiple computers or other routers together and transmits data to the correct destination</div><div style="text-align: justify;">• Wireless Access Point</div><div style="text-align: justify;">A wireless access point is a central communications device that allow computers to transfer data. This device can help information to be transferred wirelessly to other wireless devices or to a wired network. Wireless access point has high quality antennas for optimal signals.</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-19012591776819107672012-04-30T11:42:00.002-07:002012-04-30T11:42:54.749-07:003.1.6 Protocol<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content">3.1.6.1 Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol to facilitate communication over computer network.</div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-42568396838735442202012-04-30T11:41:00.000-07:002012-04-30T11:41:24.623-07:003.1.5 Network Topology<div style="text-align: justify;">3.1.5.1 State three types of network topologies:</div><br />
<br />
<div style="text-align: justify;"><strong><em>Bus Topology</em></strong></div><br />
<div style="text-align: justify;">A bus topology consists of a single central cable to which all computers and other devices connect. It refers to the main physical pathway or central cable where all other devices are connected to it. All nodes share the backbone to communicate with each other on the network. Sometimes, a bus network has more than one server. Sometimes, a server is not needed on the network. If one of the nodes fails, the bus network would still function as long as the backbone is working.</div><br />
<br />
<div style="text-align: justify;"><strong><em>Ring Topology</em></strong></div><br />
<br />
<div style="text-align: justify;">A ring topology consists of all computers and other devices that are connected in a loop. Ring topology is also known as a ring network. In a ring network each node directly connect to two neighbouring nodes. A server may exist in a ring network, but it will not connect to all the nodes in the network. The server, like other nodes, will only communicate to its two neighbouring nodes.</div><br />
<br />
<div style="text-align: justify;"><strong><em>Star Topology</em></strong></div><br />
<br />
<div style="text-align: justify;">A star topology consists of a central host which acts as the centre, and all nodes connect to the host. The host can be a server, hub or router. In a star network, every node will not connect to the neighbouring nodes. Every node must connect to the host in order to communicate.</div><br />
<br />
<div style="text-align: justify;">The host will control the flow of communication in the network. If one of the nodes fails, the star network can still function as long as the host is working.</div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-71145237284488995212012-04-30T11:39:00.002-07:002012-04-30T11:39:31.302-07:003.1.4 Network Architecture<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-header-line-1"></div><div class="post-body entry-content"> <div style="text-align: justify;">3.1.4.1 Define two types of network architecture:</div><div style="text-align: justify;"> </div><div style="text-align: justify;"><strong>Client/Server</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A client/server network is a network in which the shared files and applications are stored in the server but network users (clients) can still store files on their individual PCs. A server is a computer that shares information and resources with other computers on a network. A client is a computer which requests services or files from a server computer.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Peer-to-Peer</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Peer-to-peer network is a network with all the nodes acting as both servers and clients. A PC can access files located on another PC and can also provide files to other PCs. With peer-to-peer network, no server is needed; each computer in the network is called a peer. All computers in the peer-to-peer network has equal responsibilities and capabilities to use the resources available on the network.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">3.1.5.1 State three types of network topologies:</div><div style="text-align: justify;"></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>Bus Topology</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A bus topology consists of a single central cable to which all computers and other devices connect. It refers to the main physical pathway or central cable where all other devices are connected to it. All nodes share the backbone to communicate with each other on the network. Sometimes, a bus network has more than one server. Sometimes, a server is not needed on the network. If one of the nodes fails, the bus network would still function as long as the backbone is working.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>Ring Topology</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A ring topology consists of all computers and other devices that are connected in a loop. Ring topology is also known as a ring network. In a ring network each node directly connect to two neighbouring nodes. A server may exist in a ring network, but it will not connect to all the nodes in the network. The server, like other nodes, will only communicate to its two neighbouring nodes.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>Star Topology</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A star topology consists of a central host which acts as the centre, and all nodes connect to the host. The host can be a server, hub or router. In a star network, every node will not connect to the neighbouring nodes. Every node must connect to the host in order to communicate.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The host will control the flow of communication in the network. If one of the nodes fails, the star network can still function as long as the host is working.</div><div style="clear: both;"></div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-35410244195681735492012-04-30T11:37:00.002-07:002012-04-30T11:37:46.413-07:003.1.3 TYPES OF NETWORK<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content"> <div style="text-align: justify;"><strong><em>3.1.3.1 Define types of computer networks:</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Local Area Network (LAN)</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A LAN covers a small region of space, typically a single building ~ Eg: within a school lab.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Metropolitan Area Network (MAN)</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A MAN is a collection of LANs with the same geographical area, for instance a city ~ Eg: within a a city</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Wide Area Network (WAN)</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A WAN can be a collection of LANs or MANs or the mix of two with a very large geographical area, for instance a country or even beyond the border ~ Eg: between KL and London</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">3.1.3.2 Differentiate between the three types of computer networks.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">LAN is a group of computers and network devices connected together, usually within the same building. It is the smallest network compared to the other two networks. The simplest form of LAN is to connect two computers together. LAN is operated within a limited physical area, such as at home, school, a single building or several buildings. A network which consists of less than 500 interconnected devices across several buildings, is still recognised as a LAN.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Inexpensive hardware used in LAN previously include twisted pair, coaxial cables and the higher end is fiber optic or wireless. However, coaxial cables are now being replaced by a higher speed cabling system such as CAT5 using RJ45 connectors.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">LAN is a very high speed network (from previously 10Mbps) to 100Mbps, which is faster than MAN and WAN.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">MAN can be defined as a group of computers and network devices connected together within a large physical area. It is a network of computers located at different sites within a large physical area, such as a city. Companies that have several branches within the Kuala Lumpur city such as banks, might find a MAN useful to them.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In this case, setting up a MAN across long distances can be best connected using fiber optics. Sometimes, a MAN can be a collection of several LANs within the same city. MAN often acts as a high speed network (although not as fast as a LAN) to allow sharing of regional resources.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">WANis the largest network of all network types. The Internet is the largest WAN in the world. WAN generally covers large distances such as states, countries or continents.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">An example in the society using WAN is the banking organisation. Local banks have always maintained their business online by connecting all computers of their branches in the countries. International banks also use WAN to connect their computers all over the world.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Actually, WAN is a group of MANs or LANs or the mixture of both networks.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A device called a router is needed to connect the MANs and LANs all over a large physical area. A router is a special networking device that connects two or more different networks and keeps data flowing between them.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A router makes all the different networks communicate, such as connecting LAN to LAN, LAN to WAN or WAN to WAN. The transmission media in WAN uses the fibre optic cable. WAN is still considered a fast network with speeds 20 – 2000 Kbps, but slower than LAN and MAN</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-65160375405810423152012-04-30T11:36:00.000-07:002012-04-30T11:36:10.169-07:003.1.2 Importance of Computer Network<div style="text-align: justify;"><strong><em>3.1.2.1 State the importance of computer networks and communications</em></strong></div><br />
<br />
<div style="text-align: justify;">Information is now made easy with the availability of network communications. In a clinic for example, network communications plays an important part in keeping patients’ database for easy retrieval. Unlike in conventional practice, doctors and nurses have to look for a patient’s personal file from hundreds or maybe thousands of records. With network communication, the clinic saves time and manpower. Allocation can be effectively planned.</div><br />
<div style="text-align: justify;"> </div><br />
<div style="text-align: justify;"><strong>E-Business</strong></div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">E-business refers to conducting business transactions on the internet, not only limited to buying and selling but also servicing customers and collaborating with business partners.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">E-business supports many types of business transactions, including online shopping, selling and renting. Users can browse the website and choose from the list of items or services to buy. Payment is usually via credit card.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;"><strong>Online Education</strong></div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">With a network connections, online education is made possible. Students at any location around the world can participate in an online classroom, download tutorial questions and submit their assignments.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;"><strong>E-Banking</strong></div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">E-banking handles all types of banking transactions like account management, fund transfer and payments primarily over the internet. User can pay bills, check the account balance and transfer money to other parties, using e-banking facilities twenty four hours a day and seven days a week.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">With e-banking, most of the transactions can be done at home or from the office, thus users save time on traveling and queuing at the bank counters.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;"><strong>Long Distance Communication</strong></div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Long distance communication is made easy via network availability. Communication is possible via voice, text or video. The cost of having this type of communication is cheaper than making a normal phone call and definitely faster and more effective than corresponding via letters of fax.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">In business, important decisions can effectively made through video conference meeting.</div><br />
<div style="clear: both;"></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-86438885106468745882012-04-30T11:33:00.000-07:002012-04-30T11:33:20.831-07:003.1 Basic Concepts of Computer Networks and Communications<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content"> <div style="text-align: justify;"><strong><em><span style="color: purple;">3.1.1.1 Define computer networks</span></em></strong></div><div style="text-align: justify;"> </div><div style="text-align: justify;">Computer network is a system of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications. In a network, computers can exchange and share information and resources. A computer network may operate on wired connections or wireless connections.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">When two or more networks are linked or connected and are able to communicate with one another using suitable hardware and software, it is called an internetwork.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: purple;"><strong><em>3.1.1.2 Define communications</em></strong></span></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>COMMUNICATIONS</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Communications is about the transfer of information from a sender, across a distance, to a receiver. Using electricity, radio waves or light, information and data in the form of codes are transmitted through a physical medium such as wire, cable, or even the atmosphere.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The information that is transmitted (sent) can be text, voice, sound, video, graphics and images, or a combination of all these, which we call multimedia. We transmit information or data by using two types of signals, namely analog and digital.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>3.1.2.1 State the importance of computer networks and communications.</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Information is now made easy with the availability of network communications. In a clinic for example, network communications plays an important part in keeping patients’ database for easy retrieval. Unlike in conventional practice, doctors and nurses have to look for a patient’s personal file from hundreds or maybe thousands of records. With network communication, the clinic saves time and manpower. Allocation can be effectively planned.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>E-Business</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">E-business refers to conducting business transactions on the internet, not only limited to buying and selling but also servicing customers and collaborating with business partners.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">E-business supports many types of business transactions, including online shopping, selling and renting. Users can browse the website and choose from the list of items or services to buy. Payment is usually via credit card.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Online Education</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">With a network connections, online education is made possible. Students at any location around the world can participate in an online classroom, download tutorial questions and submit their assignments.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>E-Banking</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">E-banking handles all types of banking transactions like account management, fund transfer and payments primarily over the internet. User can pay bills, check the account balance and transfer money to other parties, using e-banking facilities twenty four hours a day and seven days a week.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">With e-banking, most of the transactions can be done at home or from the office, thus users save time on traveling and queuing at the bank counters.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Long Distance Communication</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Long distance communication is made easy via network availability. Communication is possible via voice, text or video. The cost of having this type of communication is cheaper than making a normal phone call and definitely faster and more effective than corresponding via letters of fax.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In business, important decisions can effectively made through video conference meeting</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com1tag:blogger.com,1999:blog-6880358292942929230.post-13276118037074895022012-04-30T11:28:00.016-07:002012-04-30T11:57:42.572-07:003.0 COMPUTER NETWORKS AND COMMUNICATIONS3.1 Basic Concepts of Computer Networks and Communications<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/31-basic-concepts-of-computer-networks.html">3.1.1 Definition</a></span></span></strong><br />
<br />
3.1.1.1 Define computer networks.<br />
3.1.1.2 Define communications.<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/312-importance-of-computer-network.html">3.1.2 Importance of Computer Network</a></span></span></strong><br />
3.1.2.1State the importance of computer networks and communications.<br />
<br />
<span style="color: purple;"><strong><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/313-types-of-network.html">3.1.3 Types of Networks</a></span></strong></span><br />
<br />
3.1.3.1 Define types of computer networks:<br />
• Local Area Network (LAN)<br />
• Metropolitan Area Network (MAN)<br />
• Wide Area Network (WAN)<br />
3.1.3.2 Differentiate between the three types of computer networks.<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/314-network-architecture.html">3.1.4 Network Architecture</a></span></span></strong><br />
<strong><span style="color: purple;"> </span></strong>3.1.4.1 Define two types of network architecture:<br />
<br />
• Client/Server<br />
• Peer-to-Peer<br />
<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/315-network-topology.html">3.1.5 Network Topology</a></span></span></strong><br />
<br />
3.1.5.1 State three types of network topologies:<br />
• bus<br />
• ring<br />
• star<br />
3.1.5.2 Differentiate between the three types of network topology.<br />
<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/316-protocol.html">3.1.6 Protocol</a></span></span></strong><br />
3.1.6.1 Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol to facilitate <br />
communication over computer network.<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/3171-describe-types-of-network.html">3.1.7 Internet, Intranet, Extranet</a></span></span></strong><br />
3.1.7.1 Describe the types of network communications technology:<br />
• Internet<br />
• Intranet<br />
• Extranet<br />
<br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://www.teach-ict.com/as_a2/topics/networks/network%20components/network_components/index.htm">3.2 Hardware Requirements</a></span></span></strong><br />
<br />
<strong><span style="color: purple;"><span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/3171-describe-types-of-network_30.html">3.2.1 Devices</a></span></span></strong><br />
3.2.1.1 Identify the devices needed in computer network communication :<br />
• Network Interface Card (NIC)<br />
• Wireless Network Interface Card<br />
• Modem (internal and external)<br />
• Hub / Switch<br />
• Router<br />
• Wireless Access Point<br />
3.2.1.2 State the functions of the following:<br />
• Network Interface Card (NIC)<br />
• Wireless Network Interface Card<br />
• Modem (internal and external)<br />
• Hub / Switch<br />
• Router<br />
• Wireless Access Point<br />
<br />
<br />
<strong><span style="background-color: white; color: purple;">3.2.2 Medium</span></strong><br />
<br />
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted <br />
Pair (STP), Coaxial and Fibre Optic Cable.<br />
<br />
<br />
3.2.2.2 Identify various types of wireless transmission media such as infrared, radio wave and satellite.<br />
<br />
<br />
<strong><span style="color: purple;">3.3 Software Requirements</span></strong><br />
<br />
<span style="color: purple;"><strong>3.3.1 Server Software</strong></span><br />
3.3.1.1 Define Network Operating System.<br />
<br />
3.3.1.2 Name various Network Operating System Software.<br />
<br />
<span style="color: purple;"><strong>3.3.2 Client Software</strong></span><br />
3.3.2.1 State the functions of various client software.<br />
<br />
<br />
<strong><span style="color: purple;">3.4 Setting Network Facilities</span></strong><br />
<br />
<br />
<br />
<br />
3.4.1 Installation of Network Interface Cards (NIC)<br />
<br />
<br />
<br />
3.4.1.1 Insert network interface cards (NIC).<br />
<br />
3.4.1.2Install drivers for the NIC.<br />
<br />
<br />
<br />
<span style="color: purple;"><strong>3.4.2 Cable Crimping and Testing</strong></span><br />
3.4.2.1Crimp and test UTP cable<br />
• Straight cable<br />
• Crossed cable<br />
<br />
3.4.2.2 Create awareness of the correct way when<br />
crimping a cable.<br />
<br />
<span style="color: purple;"><strong>3.4.3 Configuration and Testing of Network</strong></span><br />
<br />
3.4.3.1 Configure the workstation to join a Local Area Network :<br />
<br />
• Internet Protocol (IP) Address<br />
<br />
• Subnet Mask<br />
<br />
• Server name<br />
<br />
<br />
3.4.3.2 Test the network connection.<br />
<br />
<br />
<strong>3.4.4 Share Data</strong><br />
<br />
3.4.4.1 Create a shared folder.<br />
<br />
3.5.1 Latest Development In Network and Communications<br />
3.5.1.1 Describe<br />
• Mobile Computing (specifications, services, frequencies)<br />
• Internet Technology and Services (VOIP, BLOG)<br />
• Types of network (examples: PAN, VPN, WLAN, WIMAX)ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-38985283858650045482012-04-30T11:22:00.002-07:002012-04-30T11:22:39.180-07:002.1.3 Introduction To Binary Coding<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-header-line-1"></div><div class="post-body entry-content"><strong> 2.1.3.1 Explain the function of ASCII code</strong><br />
<strong>WHAT IS ASCII?</strong><br />
<br />
<br />
<div style="text-align: justify;">ASCII pronounced as "ask-key" stands for the American Standard Code for Information Interchange and was proposed by ASA (American Standard Association) in 963 and was finalised in 1968.ASCII is a standard of 7-bit code used to represent characters, which include letters, numbers and punctuation marks.</div><div style="text-align: justify;">7 bits allow the computer to encode a total of 128 characters for the numbers 0-9, uppercase and lowercase letters A-Z and a few punctuation symbols. However this 128 bit code only suitable for english language speaking users.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">IBM and Apple expanded the amount of space reserved for the character codes to 8-bits, equivalent to 1 byte.</div><div style="text-align: justify;"><strong>FUNCTIONS OF ASCII</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">ASCII was established to achieve compatibility between various types of data processing equipment making it possible for the components to communicate with each other successfully.</div><div style="text-align: justify;">ASCII enables manufacturers to produce components that are assured to operate correctly in a computer.</div><div style="text-align: justify;">ASCII makes it possible for humans to interact with a computer. It also enables users to purchase components that are compatible with their computer configurations</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>HOW ASCII WORKS IN A COMPUTER SYSTEM?</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">When you press a key, for example the letter D on your keyboard, the electronic signal is sent to the CPU for the computer to process and store in memory. Every character is converted to its corresponding binary form. The computer the processes the letter as a byte., which actually a series of on and off of electrical states. When the computer is finished processing the byte, the software installed in the system convert the byte back which is then displayed in the screen. In this example, the letter D is converted to 01000100.</div><div style="text-align: justify;"><br />
</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-37895091530828316362012-04-30T11:21:00.000-07:002012-04-30T11:21:11.277-07:002.1.2 Data Representation<div id="adi_top_right"><a href="http://adiwidget.blogspot.com/"></a> </div><br />
<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-footer-line post-footer-line-2"> </div><div class="post-body entry-content"> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>DATA REPRESENTATION</strong></span></div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"></span></div><div style="text-align: justify;"> </div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>BINARY DIGIT</strong></span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">Computers recognize only two discrete states: on and off. These states can be represented by two digits, 0 and 1. Each 0 or 1 is called a bit in the binary system.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">Bit is the smallest unit of data a computer can process. Bit is a short for binary digit. The binary system has a base of 2 with the two digits (0 and 1). Combinations of 0s and 1s represent larger numbers.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"></div></span><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>BIT</strong></span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">A bit is the smallest unit of data that the computer can process. Bit is a short for binary digit. A bit is represented by the numbers 1 and 0. These numbers represent the binary system. They correspond to the states of on and off, true and false, or yes and no.</span></div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">All digital data use the binary system to process the information. This information include letters, digits or special character.</span></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>BYTE</strong></span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">Byte is a unit of information built from bits. One byte is equals to 8 bits. Eight bits that are grouped together as a unit. A byte provides enough different combinations of 0s and 1s to represent 256 individual characters.</span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">One byte represents a single character such as the number 3, letter b </span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">or a $ symbol. Bits and bytes are the basis for representing all meaningful information and programs on computers.</span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>CHARACTER</strong></span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">8 bits = 1 byte</span></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">One byte represents one character such as A, 7, 9 and +.Eight bits that are grouped together as a unit. A byte provides enough different combinations of 0s and 1s to represent 256 individual characters.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">For example, the capital letter F is represented by the binary code 01000110 that can be understood by the computer system. Eight bits grouped together as a unit are called a byte. A byte represents a single character in the </span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">computer.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;"><strong>CHARACTER CODES</strong></span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">There are three character codes to represent characters which are ASCII, EBCDIC and Unicode. Each byte contains eight bits. A byte provides enough </span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">different combination of 0s and 1s to represent 256 characters.</span><span style="font-family: Verdana, sans-serif;"><br />
</span> <div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">The combinations of 0s and 1s are defined by patterns. These patterns are called coding scheme. The 256-character capability of ASCII and EBCDIC is too small to handle the characters that are used by other languages such as </span></div><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">Arabic, Japanese and Chinese.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Arial;"> </span><div style="text-align: justify;"><span style="font-family: Verdana, sans-serif;">The Unicode coding scheme is designed to solve this problem. It uses two bytes (16 bits) to represent one character. Unicode will have more than 65,000 different characters. This can cover all the world’s languages.</span></div><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span><span style="font-family: Verdana, sans-serif;"> <div style="text-align: justify;"><br />
</div></span></div></div></div></div></div></div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-6207550290234077042012-04-30T11:19:00.000-07:002012-04-30T11:19:43.878-07:002.1.1 Overview Of Computer System<strong><em></em></strong><br />
<strong><em>2.1.1.1 Define computer systems.</em></strong><br />
<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"><div class="post-body entry-content"> <div style="text-align: justify;">A computer system is defined as combination of components designed to process data and store files. A computer system consists of four major hardware components; input devices, output devices, processor and storage devices. A computer system requires hardware, software and a user to fully function.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>2.1.1.2 State the meaning of input, process, output and storage.</em></strong></div><div style="text-align: justify;"><strong><em></em></strong> </div><div style="text-align: justify;"><strong>Input</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Input is any data or instructions that we enter into the computer system for processing. There are four types of input: which are text, graphic, audio and video. Example of input devices are keyboard, light pen, joystick, microphone, mouse, video & digital camera.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Process</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The processing unit controls all activities within the system. The CPU is an example of a processor. It has the same important as the brain to human being.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Storage</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Storage is a location which data, instruction and information are held for future use. It is the physical material that keeps keeps data, instruction and information. There are two types of storage. They are the primary storage and secondary storage. The example of storage devices are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Output</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Output is data that has been processed into a useful form, called information. There are four types of output, which are texts, graphics, audio and video. Example of output devices are monitor, printer, speaker and plotter.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>2.1.1.3 Describe the information processing cycle which includes input, process, output and storage.</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Input</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Users input data or instruction into the computer system to be process. Input could be either text, graphic, audio or video. Input devices are used by users to input data. Input devices are any electronic device connected to a computer and produces input signals.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Process</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Data or instruction being input into the computer system is then processed by the CPU which controls all activities within the system. The results of the processed data are then sent to an output device as usable data.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A CPU interprets the and carries out the instructions by processing data and controlling the rest of the computer’s components.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit (ALU). CU’s main function is to direct the CPU to process data by extracting instructions from memory and decodes and executes them. The CU manages a four-step basic operation which is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing:</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Storage</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Computer storage is important to help users store programs and data to be used at a later time.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">It is also useful to keep current data while being processed by the processor until the information is saved in a storage media such as a hard disk or a diskette. Computer storage also stores instructions from a computer program. There are two type of computer storage; primary storage and secondary storage.</div><div style="text-align: justify;"><br />
</div><div style="clear: both;"></div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-9358820149938041522012-04-30T11:16:00.003-07:002012-04-30T11:25:17.812-07:002.0 COMPUTER SYSTEMS<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"><div class="post-body entry-content"><br />
<strong><span style="color: purple;">2.1 SYSTEM CONCEPTS</span></strong><br />
<br />
<span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/211-overview-of-computer-system.html">2.1.1 Overview of Computer Systems</a></span><br />
<br />
2.1.1.1 Define computer systems<br />
2.1.1.2 State the meaning of input, process, output and storage.<br />
<br />
2.1.1.3 Describe the information processing cycle which includes input, process, output and storage.<br />
<br />
<span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/212-data-representation.html">2.1.2 Data Representation</a></span><br />
<br />
2.1.2.1 State the relationship of data representation: bit, byte and character.<br />
<br />
<span style="color: #61882b;"><a href="http://ictatyourfingertips.blogspot.com/2012/04/213-introduction-to-binary-coding.html">2.1.3 Introduction to Binary Coding</a></span><br />
<br />
2.1.3.1 Explain the function of ASCII code.<br />
<br />
2.1.4 Data Measurement<br />
<br />
2.1.4.1 State the units of data measurement:<br />
<br />
• Bit<br />
• Byte<br />
• Kilobyte (KB)<br />
• Megabyte (MB)<br />
• Gigabyte (GB)<br />
• Terabyte (TB)<br />
<br />
2.1.5 Clock Speed Measurement<br />
<br />
2.1.5.1 State the units of clock speed measurement:<br />
<br />
• Megahertz (MHz)<br />
• Gigahertz (GHz)<br />
<br />
<span style="color: purple;"><strong>2.2 Hardware</strong></span><br />
<br />
2.2.1 Input Devices<br />
<br />
2.2.1.1 Identify the input devices used for text, graphic, audio and video.<br />
<br />
2.2.2 Output Devices<br />
<br />
2.2.2.1 Identify the output devices used for text, graphic, audio and video<br />
<br />
2.2.3 Motherboard<br />
<br />
2.2.3.1 Identify the location of the central processing unit (CPU), expansion slots, expansion cards, <br />
RAM slots, ports and connectors on the motherboard.<br />
2.2.4 Storage<br />
<br />
2.2.4.1 Explain types and functions of :<br />
• primary storage (RAM, ROM)<br />
• secondary storage (magnetic medium optical medium, flash memory)<br />
<br />
<strong><span style="color: purple;">2.3 Software</span></strong><br />
<br />
2.3.1 Operating System (OS)<br />
<br />
2.3.1.1 State the various types of OS used on different platforms.<br />
<br />
2.3.1.2 State the functions of OS.<br />
<br />
2.3.1.3 State the different interfaces of OS.<br />
<br />
2.3.2 Application Software<br />
<br />
2.3.2.1State the types of application software (word processing, spreadsheet, presentation, graphic).<br />
<br />
2.3.2.2 Describe the uses of application software (word processing, spreadsheet, presentation, <br />
graphic).<br />
<br />
2.3.3 Utility Program<br />
<br />
2.3.3.1 Differentiate between the types and usage of utility programmes (file management, diagnostic <br />
and file compression).<br />
<br />
2.3.4 Proprietary and Open Source Software<br />
<br />
2.3.4.1 Differentiate between proprietary and open source software.<br />
<br />
<strong><span style="color: purple;">2.4 Installation</span></strong><br />
<br />
2.4.1 Personal Computer (PC) Assembling<br />
2.4.1.1 Assemble the components of a PC.<br />
2.4.1.2 Display cooperation in assembling the components of a PC.<br />
<br />
2.4.2 Hard Disk Partitioning and Formatting<br />
<br />
2.4.2.1Format and partition the hard disk.<br />
<br />
2.4.3 Software Installation<br />
<br />
2.4.3.1Install operating system, application software and utility programs.<br />
<br />
<strong><span style="color: purple;">2.5 Current and Future Developments</span></strong><br />
<br />
2.5.1 Latest Open Source Software Available<br />
<br />
2.5.1.1 Explain the latest open source OS and application software available in the market.<br />
<br />
2.5.2 Latest Development In ICT<br />
<br />
2.5.2.1 Explain the latest ICT hardware and software<br />
2.5.2.2 Explain pervasive computing.</div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-65619350755609490992012-04-30T11:00:00.000-07:002012-04-30T11:00:57.614-07:001.4 CURRENT AND FUTURE DEVELOPMENT<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content"> <div style="text-align: justify;"><strong>1.4.1 Impact of ICT on Society</strong></div><div style="text-align: justify;"> </div><div style="text-align: justify;"><strong>1.4.1.1 Locate information from various sources</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Informations or study materials are available offline and online. We can search for the information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials for our study.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>1.4.1.2 Describe the impact of ICT on society</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The computer has change the society today as much as industrial revolution changed society in 18th and 19th century. People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Computers help them to do their work faster and more efficient by using the software application that consist of special program for specific task.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Education</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Today, computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Computers for Higher Education</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Open Distance Learning (ODL) or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example of the Open Distance Learning institution is the Open University of Malaysia.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Business</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Computers in Banking</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In the banking sector, many financial institutions offer online banking. People can access their financial records from anywhere in the world. One example of online banking is Maybank2u. Most of the packages on banking offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Industry</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Examples of companies using this system are Proton and Perodua.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong><em>Graphics and Multimedia</em></strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Computers are crucial in publishing especially in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Communication</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A government provides society with direction by making and administering policies. Most government offices or agencies have websites in order to provide citizens with up-to-date or latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:</div><div style="text-align: justify;"><br />
</div><ul><li> <div style="text-align: justify;">check information on taxes (www.hasil.org.my)</div></li>
<li> <div style="text-align: justify;">pay parking tickets and check summons (www.jpj.gov.my)</div></li>
<li> <div style="text-align: justify;">register online for IPTA/IPTS application (www.moe.gov.my)</div></li>
<li> <div style="text-align: justify;">Computers in Tourism</div></li>
</ul><div style="text-align: justify;">Today, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights and car rentals. They can also purchase ticket online, all payments can be made by using credit card.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Computers in the Healthcare</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely: • maintaining patient records monitoring patients’ vital sign assisting doctors, nurses and technicians with medical tests by using computer and computerised devices .</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• using medical software to help with researching and diagnosing health conditions.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Furthermore, computers and the internet are important sources for people to get all information on medical, nutrition, fitness and other tips from several available websites. The latest development in the medical field is telemedicine which help professional to conduct live conference in separate locations around the globe.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Science</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In the scientific world, computers are used in all fields of science from biology to astronomy to meteorology and others. These are things that can be done by computers, namely:</div><ul><li> <div style="text-align: justify;">collecting, analyzing and modelling data</div></li>
<li> <div style="text-align: justify;">serving as medium of communication with colleagues around the world</div></li>
<li> <div style="text-align: justify;">contributing to new inventions or breakthrough in surgery, medicine and treatment</div></li>
<li> <div style="text-align: justify;">imitating functions of the central nervous system, retina of the eye and others by tiny computers</div></li>
<li> <div style="text-align: justify;">allowing a deaf person to listen through cochlear implant</div></li>
</ul><div style="text-align: justify;"><em><strong>1.4.1.3 Present results in a clear, concise manner.</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A good presentation should contain three well-defined sections, they are:</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>1. Introduction</strong></div><ul><li> <div style="text-align: justify;">is at the beginning of the research</div></li>
<li> <div style="text-align: justify;">includes the objectives of the research</div></li>
<li> <div style="text-align: justify;">provides a clear statement on why the study was undertaken</div></li>
<li> <div style="text-align: justify;">includes the limitations/assumptions and analytical techniques</div></li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>2. Content</strong></div><ul><li> <div style="text-align: justify;">consists of facts or arguments related to subject matter</div></li>
<li> <div style="text-align: justify;">can be presented in an argument format or just as an overview</div></li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>3. Conclusion</strong></div><div style="text-align: justify;"><br />
</div><ul><li> <div style="text-align: justify;">is a review of content (not repetition of content)</div></li>
<li> <div style="text-align: justify;">relates to the statement of objectives in the introduction</div></li>
<li> <div style="text-align: justify;">should not introduce new issues</div></li>
<li> <div style="text-align: justify;">should contain judgment or decision that has been reached</div></li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><em><strong>1.4.1.4 Display cooperation in conducting study.</strong></em></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. This means it is not enough to just give out orders to people but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.</div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-71558986395410208832012-04-30T10:57:00.000-07:002012-04-30T10:57:21.505-07:001.3.2 Security Threats1.3.2.1 Explain briefly the different threats to computer security:<br />
<br />
<div style="text-align: justify;"><strong>Malicious code</strong></div><br />
<div style="text-align: justify;">Malicious code is also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The agent for malicious code is the writer of the code who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.</div><br />
<br />
<div style="text-align: justify;"><strong>Hacking</strong></div><br />
<br />
<div style="text-align: justify;">Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;"><strong>Natural disaster</strong></div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Computers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters:</div><br />
<ul><li> <div style="text-align: justify;">Flood</div></li>
<li> <div style="text-align: justify;">Fire</div></li>
<li> <div style="text-align: justify;">Earthquakes, storms and tornados</div></li>
<li> <div style="text-align: justify;">Excessive Heat</div></li>
<li> <div style="text-align: justify;">Inadequate Power Supply</div></li>
<li> <div style="text-align: justify;">Theft</div></li>
</ul><br />
<div style="text-align: justify;">Two types of computer theft:</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">1) Computer is used to steal money, goods, information and resources.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">2) Stealing of computer, especially notebook and PDAs.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">1.3.3.2</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Apply the correct security procedures.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Data Protection</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. There are a few ways to protect the information namely:</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">• make backup files</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">• detect the virus and clean the computer</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">• warn others on virus attacks</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Detecting Illegal Access To Systems</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">The computer system is able to detect any illegal access to the system by a user who does not have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access (unauthorize) to the system. User's access will be reviewed periodically by computer operations. On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data .</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Preventing Illegal Access To Systems</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Computer systems would not allow any unauthorised users to simply access the system. Ways to prevent illegal access to systems: • Run anlpassword to make password cracking difficult. Run tcpwrappers to check if the name for an ip address can be provided by DNC Use a callback system to prevent unauthorised use of stolen passwords.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Preventing Illegal Root Access</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser). Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Patch</div><br />
<div style="text-align: justify;"><br />
</div><br />
<div style="text-align: justify;">Patch supplies small updates to software, provided that the source code is available. Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.</div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0tag:blogger.com,1999:blog-6880358292942929230.post-12022299785480093572012-04-30T10:55:00.002-07:002012-04-30T10:55:40.934-07:001.3 COMPUTER SECURITY<div id="main-wrapper"><div class="main section" id="main"><div class="widget Blog" id="Blog1"><div class="blog-posts hfeed"><div class="post hentry uncustomized-post-template"> <div class="post-body entry-content"> <div style="text-align: justify;"><strong>1.3.1 Definition</strong></div><div style="text-align: justify;"><strong>1.3.1.1 Define computer security.</strong></div><div style="text-align: justify;"><a href="" name="more"></a></div><div style="text-align: justify;">Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">We need to protect our computer from any intruders such as hackers, crackers and script kiddie.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: purple;"><strong>1.3.2 Security Threats</strong></span></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">1.3.2.1 Explain briefly the different threats to computer security:</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Malicious code</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Malicious code is also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The agent for malicious code is the writer of the code who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Hacking</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Natural disaster</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Computers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters:</div><ul><li> <div style="text-align: justify;">Flood</div></li>
<li> <div style="text-align: justify;">Fire</div></li>
<li> <div style="text-align: justify;">Earthquakes, storms and tornados</div></li>
<li> <div style="text-align: justify;">Excessive Heat</div></li>
<li> <div style="text-align: justify;">Inadequate Power Supply</div></li>
<li> <div style="text-align: justify;">Theft</div></li>
</ul><div style="text-align: justify;">Two types of computer theft:</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">1) Computer is used to steal money, goods, information and resources.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">2) Stealing of computer, especially notebook and PDAs.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">1.3.3.2</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Apply the correct security procedures.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Data Protection</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. There are a few ways to protect the information namely:</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• make backup files</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• detect the virus and clean the computer</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">• warn others on virus attacks</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Detecting Illegal Access To Systems</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The computer system is able to detect any illegal access to the system by a user who does not have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access (unauthorize) to the system. User's access will be reviewed periodically by computer operations. On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data .</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Preventing Illegal Access To Systems</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Computer systems would not allow any unauthorised users to simply access the system. Ways to prevent illegal access to systems: • Run anlpassword to make password cracking difficult. Run tcpwrappers to check if the name for an ip address can be provided by DNC Use a callback system to prevent unauthorised use of stolen passwords.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Preventing Illegal Root Access</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser). Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Patch</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Patch supplies small updates to software, provided that the source code is available. Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.</div><div style="clear: both;"></div></div></div></div></div></div></div>ICT at your fingertipshttp://www.blogger.com/profile/00560229287542064226noreply@blogger.com0