Selasa, 11 Oktober 2011

2.1.1.2 State the meaning of input, process, output and storage.


Input

Input is any data or instructions that we enter into the computer system for processing. There are four types of input: which are text, graphic, audio and video. Example of input devices are keyboard, light pen, joystick, microphone, mouse, video & digital camera.

Process

The processing unit controls all activities within the system. The CPU is an example of a processor. It has the same important as the brain to human being.

Storage

Storage is a location which data, instruction and information are held for future use. It is the physical material that keeps keeps data, instruction and information. There are two types of storage. They are the primary storage and secondary storage. The example of storage devices are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM.

Output

Output is data that has been processed into a useful form, called information. There are four types of output, which are texts, graphics, audio and video. Example of output devices are monitor, printer, speaker and plotter.

2.1.1.3 Describe the information processing cycle which includes input, process, output and storage.

Input

Users input data or instruction into the computer system to be process. Input could be either text, graphic, audio or video. Input devices are used by users to input data. Input devices are any electronic device connected to a computer and produces input signals.

Process

Data or instruction being input into the computer system is then processed by the CPU which controls all activities within the system. The results of the processed data are then sent to an output device as usable data.

A CPU interprets the and carries out the instructions by processing data and controlling the rest of the computer’s components.

A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit (ALU). CU’s main function is to direct the CPU to process data by extracting instructions from memory and decodes and executes them. The CU manages a four-step basic operation which is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing:

Storage

Computer storage is important to help users store programs and data to be used at a later time.

It is also useful to keep current data while being processed by the processor until the information is saved in a storage media such as a hard disk or a diskette. Computer storage also stores instructions from a computer program. There are two type of computer storage; primary storage and secondary storage.

2.1.1 Overview Of Computer System

2.1.1.1 Define computer systems.

A computer system is defined as combination of components designed to process data and store files. A computer system consists of four major hardware components; input devices, output devices, processor and storage devices. A computer system requires hardware, software and a user to fully function.

Jumaat, 15 April 2011


1.4.1.1 Locate information from various sources

Informations or study materials are available offline and online. We can search for the information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials for our study.

1.4.1.2 Describe the impact of ICT on society

The computer has change the society today as much as industrial revolution changed society in 18th and 19th century. People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.

Computers help them to do their work faster and more efficient by using the software application that consist of special program for specific task.

Education

Today, computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation.

Computers for Higher Education

Open Distance Learning (ODL) or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example of the Open Distance Learning institution is the Open University of Malaysia.

Business

People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions.

Computers in Banking

In the banking sector, many financial institutions offer online banking. People can access their financial records from anywhere in the world. One example of online banking is Maybank2u. Most of the packages on banking offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.

Industry

By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network.

Examples of companies using this system are Proton and Perodua.

Graphics and Multimedia

Computers are crucial in publishing especially in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.

Communication

A government provides society with direction by making and administering policies. Most government offices or agencies have websites in order to provide citizens with up-to-date or latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:

  • check information on taxes (www.hasil.org.my)
  • pay parking tickets and check summons (www.jpj.gov.my)
  • register online for IPTA/IPTS application (www.moe.gov.my)
  • Computers in Tourism
Today, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights and car rentals. They can also purchase ticket online, all payments can be made by using credit card.

Computers in the Healthcare

In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely: • maintaining patient records monitoring patients’ vital sign assisting doctors, nurses and technicians with medical tests by using computer and computerised devices .

• using medical software to help with researching and diagnosing health conditions.

Furthermore, computers and the internet are important sources for people to get all information on medical, nutrition, fitness and other tips from several available websites. The latest development in the medical field is telemedicine which help professional to conduct live conference in separate locations around the globe.

Science

In the scientific world, computers are used in all fields of science from biology to astronomy to meteorology and others. These are things that can be done by computers, namely:
  • collecting, analyzing and modelling data
  • serving as medium of communication with colleagues around the world
  • contributing to new inventions or breakthrough in surgery, medicine and treatment
  • imitating functions of the central nervous system, retina of the eye and others by tiny computers
  • allowing a deaf person to listen through cochlear implant
1.4.1.3 Present results in a clear, concise manner.

A good presentation should contain three well-defined sections, they are:

1. Introduction
  • is at the beginning of the research
  • includes the objectives of the research
  • provides a clear statement on why the study was undertaken
  • includes the limitations/assumptions and analytical techniques

2. Content
  • consists of facts or arguments related to subject matter
  • can be presented in an argument format or just as an overview

3. Conclusion

  • is a review of content (not repetition of content)
  • relates to the statement of objectives in the introduction
  • should not introduce new issues
  • should contain judgment or decision that has been reached

1.4.1.4 Display cooperation in conducting study.

Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. This means it is not enough to just give out orders to people but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.
Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security

We need to protect our computer from any intruders such as hackers, crackers and script kiddie.
 

Malicious code

Malicious code is also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The agent for malicious code is the writer of the code who causes its distribution. There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.

Hacking

Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.

Natural disaster

Computers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters:
  • Flood
  • Fire
  • Earthquakes, storms and tornados
  • Excessive Heat
  • Inadequate Power Supply
  • Theft
Two types of computer theft:

1) Computer is used to steal money, goods, information and resources.

2) Stealing of computer, especially notebook and PDAs.

1.3.3.2

Apply the correct security procedures.

Data Protection

We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. There are a few ways to protect the information namely:

• make backup files

• detect the virus and clean the computer

• warn others on virus attacks

Detecting Illegal Access To Systems

The computer system is able to detect any illegal access to the system by a user who does not have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access (unauthorize) to the system. User's access will be reviewed periodically by computer operations. On going internal audits will be made to ensure detection of violations of security and unauthorised modifications to software and data .

Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.

Tripwire will detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.

Preventing Illegal Access To Systems

Computer systems would not allow any unauthorised users to simply access the system. Ways to prevent illegal access to systems: • Run anlpassword to make password cracking difficult. Run tcpwrappers to check if the name for an ip address can be provided by DNC Use a callback system to prevent unauthorised use of stolen passwords.

Preventing Illegal Root Access

To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.

Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser). Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.

Patch

Patch supplies small updates to software, provided that the source code is available. Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.
 
Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. Computer fraud includes e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.

Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.

Copyright Infringement:

Copyright infringement is defined as a violation of the rights secured by a copyright. It involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. With the current technology, the most perfect copy of the original copy can be downloaded from the internet.

Theft:

Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Examples of computer theft include: • transfer of payments to the wrong accounts tap into data transmission lines on database at no cost divert goods to the wrong destination

Attacks:

Computer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.

Computer attack can be in the forms of: physical attack that disrupt the computer facility or its transmission lines. an electronic attack that uses the power of electromagnetic energy to overload computer circuitry. a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user.

Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

Pornography
Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour

Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person

1.2.3.2 Describe the process of filtering to control access to controversial contents.

Internet filtering is a process that prevents or blocks access to certain materials on the Internet.


It is a process of controlling the access to the internet by means of filtering software. It is used to prevent children from accessing inappropriate material and to keep employees productive on the Internet.

The current preferred method of choice to limit access on the Internet is to filter content either by: keyword blocking site blocking web rating systems
These methods require software to be installed at a client of server level.

(a) Privacy law

The privacy laws in Malaysia emphasises on the following: • Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment

(b) Utilities software

Example: anti-spam program, firewall, anti-spyware and antivirus.

1.2.2.2 State authentication & verification methods/ technologies.


Methods of Authentication

There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user.

Methods of Verification

There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone

1. COMPUTER ETHICS


Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited.

Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.

2. INTELLECTUAL PROPERTY

Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more.

3. PRIVACY

Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

4. COMPUTER CRIMES

Computer crimes is defined as any criminal activities that are related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

5. CYBER LAW

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

EDUCATION

EDUCATION

In education, teachers, students, researchers and school administrators benefits from the usage of ICT.
Computers offer interactive experiences, enhanced learning, cognitif development & better management.

Teachers:

~ use computers to search for teaching materials, participate in online forums and online conferences as well as to aid their teaching.

Students:

~ use the computers as a reference tool. They use computers to browse the internet to look for information.

Researchers:

~ use computers to collect and process data.

School Administrators:

~ use computers for administrative purposes to make sure that the entire operation runs smoothly.

BANKING

In the banking, customers, businessman & bank administrator benefits from the usage of ICT.

Customers:

~ can make any transactions at the 24 hour service centres or via online.These services allow them to do transaction at anytime they want.

Businessman:

~ can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.

Bank Administrator:

~ can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic transfer and others by referring to the banking system.

INDUSTRY


Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT.

Workers:

~ use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.

Researchers:

~ use computers to analyse and collect research data for future reference.

Administrators:

~ use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

E-COMMERCE

E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.

Customers:

~ use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.

Suppliers:

~ use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.

Employees:

~ use computers and telephones to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.

OTHER SECTORS:

Among other sectors that benefit from the usage of ICT are archiecture, arts, career, goverment, healthcare, home, law enforcement, transportation and travel

COMPUTER GENERATIONS

First Generation (1940-1956)

The 1st. generation computer were huge, slow, expensive and often unreliable. In 1946, two Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical Integrator and Computer). It use vacuum tube instead of mechanical switches of the MARK 1.

In 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000 addition per seconds.

The new invention of hardware were needed with the new computer technology. Among them are vacuum tube, punched card, magnetic tape.

Problems: • the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control the tubes also burnt out frequently people operating the computer did not know that the problem was in the programming machine

SECOND GENERATION (1956-1963)

The creation of transistor spark the production of 2nd. generation. Transistor was small devices use to transfer electronic signals across a resister. Compared to other hardware technology, transistors had many advantages such as: transistors were smaller than vacuum tubes they needed no warm up time consumed less energy generated much less heat faster and more reliable

THIRD GENERATION (1964-1971)

In the 3rd. generation era, the IBM 370 series were introduced in 1964. It came in several models and sizes. It was used for business and scientific programs. Other computer models introduced were CDC 7600 and B2500.

The development of integrated circuit (IC) signal the beginning of the 3rd. generation. Silicone chips were manufactured in 1961. Then came the IC technology, which had reduced the size and cost of computers. It is a complete electronic circuit on a small chip of silicone which is also known as semi conductor. Other than that, the Magnetic Core Memory was replaced by a device called the microchip. Also the first 256 bit RAM was introduced and it was the basis for development of 1K bit RAM.

Advantages:
A new concept in this generation was that of a family of computer which allowed computer to be upgraded and expanded as necessary. • Silicone chips were reliable, compact and cheaper. Sold hardware & software separately which created the software industry. customer service industry flourished (reservation and credit checks)

FOURTH GENERATION (1971- PRESENT)

The growth of the computer industry developed technologies of computer inventions. There are many types of computer models such as Apple Macintosh, IBM, DELL & ACER.

In 1971 Intel created the first microprocessor. In 1976, Steve Jobs built the first Apple computer. Then, in 1981, IBM introduced its first personal computer.

During the 4th. generation, hardware technology such as silicone chips, microprocessor and storage devices were invented. A microprocessor is a chip which is developed for computer memory and logic.

The microprocessor is a large-scale integrated circuit which contained thousands of transistors. The transistors are capable of performing all of the functions of a computer's CPU.

Advantages: Computers became 100 times smaller than ENIAC the first computer Gain in speed, reliability and storage capacity Personal & software industry boomed

FIFTH GENERATION (PRESENT & BEYOND)

The 5th. generation are technologically advance and are still being development to become more efficient. The inventions of new hardware technology have grown rapidly including many other computer devices such as silicone chips, processor, robotics, virtual reality intelligent systems & programs which translate languages

NEW ERA COMPUTER

After the 5th. generation computer, the technology has become more advanced, modern & sophisticated. The latest invention in are Super Computers, Mainframe Computers, Mini Computers, Personal Computers & Mobile Computers.

In the new era of computers, expert system such as teleconferencing & speech-recognition system have been invented as part of communication tools.

Selasa, 22 Februari 2011



You see the letters ICT everywhere - particularly in education. But what does it mean? Read our brieintroduction to this important and fast-changing subject.


ICT is an acronym that stands for Information Communications Tecnology
However, apart from explaining an acronym, there is not a universally accepted defininition of ICT? Why? Because the concepts, methods and applications involved in ICT are constantly evolving on an almost daily basis. Its difficult to keep up with the changes - they happen so fast.
Lets focus on the three words behind ICT:
- INFORMATION
- COMMUNICATIONS
- TECHNOLOGY
A good way to think about ICT is to consider all the uses of digital technology that already exist to help individuals, businesses and organisations use information.
ICT covers any product that will store, retrieve, manipulate, transmit or receive information electronically in a digital form. For example, personal computers, digital television, email, robots.
So ICT is concerned with the storage, retrieval, manipulation, transmission orreceipt of digital data. Importantly, it is also concerned with the way these different uses can work with each other.
In business, ICT is often categorised into two broad types of product: -
(1) The traditional computer-based technologies (things you can typically do on a personal computer or using computers at home or at work); and
(2) The more recent, and fast-growing range of digital communication technologies(which allow people and organisations to communicate and share information digitally)
Let's take a brief look at these two categories to demonstrate the kinds of products and ideas that are covered by ICT:
Traditional Computer Based Technologies
These types of ICT include:
Application
Use
Standard Office Applications - Main Examples
Word processing
E.g. Microsoft Word: Write letters, reports etc
Spreadsheets
E.g. Microsoft Excel; Analyse financial information; calculations; create forecasting models etc
Database software
E.g. Oracle, Microsoft SQL Server, Access; Managing data in many forms, from basic lists (e.g. customer contacts through to complex material (e.g. catalogue)
Presentation software
E.g. Microsoft PowerPoint; make presentations, either directly using a computer screen or data projector. Publish in digital format via email or over the Internet
Desktop publishing
E.g. Adobe Indesign, Quark Express, Microsoft Publisher; produce newsletters, magazines and other complex documents.
Graphics software
E.g Adobe Photoshop and Illustrator; Macromedia Freehand and Fireworks; create and edit images such as logos, drawings or pictures for use in DTP, web sites or other publications
Specialist Applications - Examples (there are many!)
Accounting package
E.g. Sage, Oracle; Manage an organisation's accounts including revenues/sales, purchases, bank accounts etc. A wide range of systems is available ranging from basic packages suitable for small businesses through to sophisticated ones aimed at multinational companies.
Computer Aided Design
Computer Aided Design (CAD) is the use of computers to assist the design process. Specialised CAD programs exist for many types of design: architectural, engineering, electronics, roadways
Customer Relations Management (CRM)
Software that allows businesses to better understand their customers by collecting and analysing data on them such as their product preferences, buying habits etc. Often linked to software applications that run call centres and loyalty cards for example.

Traditional Computer Based Technologies
The C part of ICT refers to the communication of data by electronic means, usually over some distance. This is often achieved via networks of sending and receiving equipment, wires and satellite links.
The technologies involved in communication tend to be complex. You certainly don't need to understand them for your ICT course. However, there are aspects of digital communications that you needs to be aware of. These relate primarily to the types of network and the ways of connecting to the Internet. Let's look at these two briefly (further revision notes provide much more detail to support your study).
Internal networks
Usually referred to as a local area network (LAN), this involves linking a number of hardware items (input and output devices plus computer processing) together within an office or building.
The aim of a LAN is to be able to share hardware facilities such as printers or scanners, software applications and data. This type of network is invaluable in the office environment where colleagues need to have access to common data or programmes.
External networks
Often you need to communicate with someone outside your internal network, in this case you will need to be part of a Wide Area Network (WAN). The Internet is the ultimate WAN - it is a vast network of networks.

ICT in a Broader Context
Your ICT course will almost certainly cover the above examples of ICT in action, perhaps focusing on the use of key applications such as spreadsheets, databases, presentation, graphics and web design software.
It will also consider the following important topics that deal with the way ICT is used and managed in an organisation:
- The nature of information (the "I" in ICT); this covers topics such as the meaning and value of information; how information is controlled; the limitations of ICT; legal considerations
- Management of information - this covers how data is captured, verified and stored for effective use; the manipulation, processing and distribution of information; keeping information secure; designing networks to share information
- Information systems strategy - this considers how ICT can be used within a business or organisation as part of achieving goals and objectives
As you can see, ICT is a broad and fast-changing subject. We hope our free study materials (revision notes, quizzes, presentations etc) will help you master IT!f 

Isnin, 17 Januari 2011

Menbina Laman Blog

18 Jan 2011 Kelas 4USM telah dikenalkan dengan modul menbina Laman Blog Individu