Waktu Solat

Monday, June 30, 2008

MERAKAM DAN EDIT LAGU

Perisian Audacity adalah perisian “Audacity editor” yang membolehkan anda merakam, mengambil hanya sebahagian daripada lagu dan mengenakan kesan bunyi kepada lagu atau rakaman suara.

Perisian ini boleh dimuatturun melalui laman web http://audacity.sourceforge.net/

selamat mencuba..

Wisdom-soft Screen Hunter 4.0

Perisian ini adalah untuk menjerat tetingkap pada skrin komputer dengan mudah iaitu menggunakan kaedah ‘screenshots ‘.
ScreenHunter akan dapat menjerat kawasan yang dikehendaki, tetingkap aktif atau skrin penuh. Ia secara automatik menjerat tetingkap dalam format fail BMP, JPEG atau GIF.


Perisian ini adalah percuma, tidak ada tempoh tamat dan boleh diperolehi pada laman web berikut www.wisdom-soft.com.

KEPERLUAN MINIMA SISTEM

Pemproses
Pentium II sekurang-kurangnya 200 MHz
Sistem Operasi
Windows 98, 2000, 2003, XP, Vista
Memory Minima
64 MB
Ruang Cakera Keras
1 MB dari keseluruhan ruang simpanan

Tuesday, June 24, 2008

Motherboard

http://en.wikipedia.org/wiki/Motherboard
http://www.webopedia.com/TERM/m/motherboard.html
http://search.yahoo.com/search?p=Motherboard&ei=UTF-8&fr=yfp-t-501&fp_ip=MY&xargs=0&pstart=1&b=71

Output Devices

http://www.wacona.com/output/output.html
http://www.webopedia.com/TERM/o/output_device.html
http://en.wikipedia.org/wiki/Output_device

Input Devices

http://en.wikipedia.org/wiki/Input_device
http://www.tigerdirect.com/applications/Category/category_tlc.asp?CatId=9
http://www.webopedia.com/TERM/I/input_device.html

Clock Speed Measurement

http://www.webopedia.com/TERM/C/clock_speed.html
http://www.wisegeek.com/what-is-clock-speed.htm
http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci211799,00.html
http://search.yahoo.com/search?p=Clock+Speed+Measurement&ei=UTF-8&y=Search&rd=r1&meta=vc%3Dmy&fr=yfp-t-501&fp_ip=MY&xargs=0&pstart=1&b=81

Data Measurement

http://www.learner.org/channel/courses/learningmath/data/session1/part_b/index.html
http://www.wu.ece.ufl.edu/links/dataRate/DataMeasurementChart.html

Introduction to Binary Coding

http://www.eng.morgan.edu/~mahmud/mechatronics/binary_code.html

Data Representation

http://webster.cs.ucr.edu/AoA/DOS/pdf/ch01.pdf
http://www.osdata.com/topic/language/asm/datarep.htm

Overview of Computer Systems

http://www.sei.cmu.edu/str/descriptions/security.html
http://faculty.frostburg.edu/cosc/htracy/cosc101/1%20OVERVIEW/Overview.htm
http://search.yahoo.com/search;_ylt=A0oGkiniEc5H2hQBKolXNyoA?p=Computer+Systems&y=Search&fr=yfp-t-501&ei=UTF-8&fp_ip=MY

PROGRAMMING LANGUAGES

BASIC
http://www.answers.com/topic/basic-simple-programming-language?cat=technology
http://www.engin.umd.umich.edu/CIS/course.des/cis400/basic/basic.html
http://search.yahoo.com/search;_ylt=A0oGklPjcxpILIYAPE1XNyoA?p=BASIC+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy

PASCAL
http://en.wikipedia.org/wiki/Pascal_programming_language
http://www.pascal-central.com/ppl/
http://www.pascal-central.com/ppl/
http://pascal-central.com/ppl/chapter5.html#Today


Smalltalk
http://www.engin.umd.umich.edu/CIS/course.des/cis400/smalltalk/smalltalk.html
http://www.outbacksoftware.com/smalltalk/smalltalk.html
http://search.yahoo.com/search;_ylt=A0geu5zYcRpI37YAdGZXNyoA?p=Smalltalk+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy
http://www.dmoz.org/Computers/Programming/Languages/Smalltalk/desc.html


C++
http://www.research.att.com/~bs/applications.html
http://www.research.att.com/~bs/C++.html
http://search.yahoo.com/search;_ylt=A0oGklkvdhpIRgcBoLdXNyoA?p=C+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy
http://en.wikipedia.org/wiki/C_programming_language


web-based application
http://en.wikipedia.org/wiki/Web_application
http://updates.zdnet.com/tags/web-based+application.html
http://updates.zdnet.com/tags/web-based+application.html
http://www.cs.ucsb.edu/~vigna/publications/2007_cova_felmetsger_vigna_webvuln.pdf

Thursday, June 19, 2008

Technorama-IT 2008 peringkat Kota Marudu



Progaram ini anjuran bersama Kementerian Pembangunan Sumber Manusia melalui agesinya iaitu Unit Kemajuan IT Negeri Sabah dan Jabatan Pelajaran Negeri Sabah.

Antara objektif utama Technorama-IT ini adalah untuk menggalakkan kerjasama antara pelajar-pelajar yang berlainan sekolah melalui IT, menggalakkan semangat belajar dan bekerjasama dalam satu kumpulan serta untuk mededahkan aktiviti pembelajaran yang berkait rapat dengan nilai kekeluargaan.

Pada tahun ini, SMK Tandek, Kota Marudu menjadi tuan rumah bagi peringkat daerah Kota Marudu dan sekolah yang terlibat adalah SMK Kota Marudu, SMK Kota Marudu 2 dan SMK Langkon serta tuan rumah SMK Tandek. Setiap sekolah menghantar seramai 10 orang pelajar dan dua orang guru pengiring. Program ini dijalankan pada 10 Julai 2008 bertempat di Makmal Komputer SMK Tandek.

Semua sekolah yang terlibat hendaklah menghantar butir-butir peserta (Nama sekolah, nama dan e-mail peserta, telefon, faks dan guru yang terlibat) satu minggu (3 Julai 2008) sebelum program dijalankan kepada Unit Kemajuan IT Negeri melalui email kit@sabah.gov.my atau faks 088248916.

Tugasan Ting 4/2008 : Programming

Tugasan ini dibuat secara individu dan hendaklah dibuat dalam kertas A4
Tarikh hantar pada 23 JUN 2008 pukul 10.00 pagi.


1. State the definition of program.
2. State the definition of programming language.
3. Identify the generations of low-level programming languages with examples.
4. Identify the generations of high-level programming languages with examples.

sekian..

Wednesday, June 18, 2008

Perisian untuk menyembunyikan aplikasi dan mencipta pintasan

Perisian Plancoin 0.3 boleh membantun anda untuk menyembunyikan tetingkap apabila ia terbuka dengan menekan kekunci shortcut yang ditetapkan. Anda boleh tetapkan kekunci untuk menyembunyikan atau membuka semula tetingkap tertentu berdasarkan judulnya. Selain bersifat mudahalih ia juga boleh berfungsi secara latar dalam emod tersorok.

Cubalah perisian ini secara percuma pada web berikut
http://wistinga.online.fr/plamcoin/
http://www.softpedia.com

semalamt mencuba..

Tuesday, June 17, 2008

Mesyuarat Jawatankuasa ICT Bil2/08

Mesyuarat akan diadakan seperti ketetapan di bawah:

TARIKH : 24 JUN 2008
HARI : SELASA
TEMPAT : BILIK GERAKAN, SMK Tandek

Senarai yang terlibat adalah seperti berikut :

1. LAZIMIN PANSANG
2. JASON WONG
3. MAJARON MASIAL
4. NOLIAH ATIN
5. PAULUS ASUN
6. KEPLE ABAS
7. SANALEH DAUD
8. RIDWAN YAKUB
9. RINAWATI MAIKOL
10. ABDUL MALIK

Kehadiran adalah wajib.

Sekian harap maklum.

Monday, June 16, 2008

Muat turun Percuma Perlindungan Sekuriti Panda

Perisian ini boleh download secara percuma melalui walam web http://www.pandasecurity.com/enterprise/downloads/beta
ia menyediakan perlindungan menentang ancaman tidak diketahui serta Firewall pengurusan peribadi untuk keselamatan PC dan sistem kerja.

What is Privacy ?

Privacy in IT refers to data and information privacy.
Data refers to a collection of raw unprocessed facts, figures and symbols. Then, computer is used to process data into information. In general, data include texts, numbers, sounds, images and video.

http://www.iaeng.org/WCE2007/doc/ICISIE_Talk.pdf
http://www.imagecontent.com/lucis/pdf/Privacy%20Policy.pdf
http://www.cylab.cmu.edu/default.aspx?id=171
http://www.derbyshiredales.gov.uk/CouncilGovernmentDemocracy/Data
http://www.south-derbys.gov.uk/CouncilGovernmentDemocracy/DataProtechttp://search.msn.com/results.aspx?q=data+and+information+privacy&go

SECURITY THREATS

Computer threats can come from many ways either from human or natural disasters. For example, when someone is stealing your account information from a trusted bank, this threat is considered as a human threat. However, when your computer is soaked in heavy rain, then that is a natural disaster threat.
TYPE OF SECURITY THREATS

MALICIOUS CODE -Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage.
a) VIRUS
a program that can pass on the malicious code to other programs by modifying them
attaches itself to the program, usually files with .doc, .xls and .exe extensions
destroys or co-exists with the program
can overtake the entire computing system and spread to other systems
b) TROJAN HORSE
a program which can perform useful and unexpected action must be installed by users or intruders before it can affect the system’s assets an example of a Trojan horse is the login script that requests for users’ login ID and password the information is then used for malicious purposes
c) LOGIC BOMB
logic bomb is a malicious code that goes off when a specific condition occurs.
an example of a logic bomb is the time bomb it goes off and causes threats at a specified time or date
e) TRAPDOOR OR BACKDOOR
a feature in a program that allows someone to access the program with special privileges
f) WORM
a program that copies and spreads itself through a network
HACKER-Hacking is a source of threat to security in computer. It is defined as unauthorised access to the computer system by a hacker.
Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
NATURAL AND ENVIRONMENTAL THREAT-Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles. Examples of natural and environmental disasters:

THEFT-Two types of computer theft:
Computer is used to steal money, goods, information and resources.
Stealing of computer, especially notebook and PDAs.
Three approaches to prevent theft:
prevent access by using locks, smart-card or password
prevent portability by restricting the hardware from being moved
detect and guard all exits and record any hardware transported

http://www.albany.edu/its/security_threats.htm
http://search.yahoo.com/search?p=SECURITY+THREATS&fr=
https://www.securitymetrics.com/securitythreats_home.adp

SECURITY MEASURES

Security measures mean the precautionary measures taken toward possible danger or damage. There are 6 type of security measures.
DATA BACKUP -Data Backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency.
CRYPTOGRAPHY-Cryptography is a process of hiding information by altering the actual information into different representation, for example, an APA can be
written as I? X.
ANTIVIRUS-An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files.
An antivirus program scans for programs that attempt to modify the boot program, the operating system and other programs that normally are read from but not modified.
ANTI-SPYWARE -Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user.
An anti-spyware application program sometime called tracking software or a spybot is used to remove spyware.
Among of the popular anti-spyware programs are:
• Spybot Search and Destroy
• Ad-aware
• Spyware Blaster
FIREWALL-Firewall is a piece of hardware or software which functions in a networked environment to prevent some Communications forbidden by the security policy.

http://en.wikipedia.org/wiki/Security
http://www.jmu.edu/computing/security/
http://search.yahoo.com/search?ei=computer+security+measures&rs=
http://www.casdn.neu.edu/~etam/military/FM19-30/93011ch.pdf
http://search.yahoo.com/search;_SECURITY+MEASURES&y=Search

BASIC Programming Concept

Definition of Programming...

http://www.its.bldrdoc.gov/fs-1037/dir-035/_5154.htmhttp://en.wikipedia.org/wiki/Event-driven_programminghttp://search.yahoo.com/search;_definition+of+programming&yProgramming

Language is..
http://en.wikipedia.org/wiki/Programming_languagehttp://www.ugrad.cs.ubc.ca/spider/cs311/2006W1/index.htmlhttp://faculty.juniata.edu/rhodes/lt/pldefn.htmhttp://www.webopedia.com/TERM/p/programming_language.htmlhttp://search.yahoo.com/search;_definition%20of%20programming%20language&fr=y

Generations of programming languages..http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci211502,00.html
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol2/mjbn/article2.html
http://search.yahoo.com/search;_=Generations+of+low-level+programming+languages&y=
http://search.yahoo.com/search;_y=Generations+of+high-level+programming+languages&y
http://www.cs.oswego.edu/~bosch/Chpt12_13_OL.html

programming language

BASIC
http://www.answers.com/topic/basic-simple-programming-language?cat=technology
http://www.engin.umd.umich.edu/CIS/course.des/cis400/basic/basic.html
http://search.yahoo.com/search;_ylt=A0oGklPjcxpILIYAPE1XNyoA?p=BASIC+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy


PASCAL
http://en.wikipedia.org/wiki/Pascal_programming_language
http://www.pascal-central.com/ppl/
http://www.pascal-central.com/ppl/
http://pascal-central.com/ppl/chapter5.html#Today


Smalltalk
http://www.engin.umd.umich.edu/CIS/course.des/cis400/smalltalk/smalltalk.html
http://www.outbacksoftware.com/smalltalk/smalltalk.html
http://search.yahoo.com/search;_ylt=A0geu5zYcRpI37YAdGZXNyoA?p=Smalltalk+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy
http://www.dmoz.org/Computers/Programming/Languages/Smalltalk/desc.html


C++
http://www.research.att.com/~bs/applications.html
http://www.research.att.com/~bs/C++.html
http://search.yahoo.com/search;_ylt=A0oGklkvdhpIRgcBoLdXNyoA?p=C+programming+language&y=Search&fr=yfp-t-367&ei=UTF-8&fp_ip=MY&rd=r1&meta=vc%3Dmy
http://en.wikipedia.org/wiki/C_programming_language


web-based application
http://en.wikipedia.org/wiki/Web_application
http://updates.zdnet.com/tags/web-based+application.html
http://updates.zdnet.com/tags/web-based+application.html
http://www.cs.ucsb.edu/~vigna/publications/2007_cova_felmetsger_vigna_webvuln.pdf

translator

ASSEMBLER (penghimpun)– a computer program for translating assembly language
INTERPRETER (pentafsir)- To interpret and excute program directly from its source without compailing it first.
COMPILER(penyusun)-the source code will be converted into machine code which is a file consisting of binary machine code that can be executed on a computer.
http://world.std.com/~ric/what_is_int.html
http://www.translation-services-usa.com/articles/productive_bilingualism3.shtml
http://en.wikipedia.org/wiki/Assembler
http://en.wikipedia.org/wiki/Interpreter_(computing)
http://home.earthlink.net/~huston2/dp/interpreter.html
http://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci211604,00.html
http://search.yahoo.com/search;INTERPRETER&y=
http://search.yahoo.com/search;=ASSEMBLER+&y
http://www.webopedia.com/TERM/c/compiler.html
http://search.yahoo.com/search;_COMPILER&y=Search&fr=y

PC Assembling

Before assembling a PC, we should know the importance of safety in handling computer components. Do not assemble or touch any components while the power is plugged in. There are possibilities of short circuit or someone else accidentally switching the power on causing the user being electrocuted.

http://www.compufield.net/assembling.htmlhttp://www.geocities.com/binnyva/binny/others/techno/assembling/page_1.htmlhttp://search.yahoo.com/search;_PC+ASSEMBLING&y=Search&fr

HARD DISK PARTITIONING AND FORMATTING

Disk partitioning is the process of dividing and organising a disk into different specific section.
We create partitions on the hard disk for different purposes. For example:

http://www.pcguide.com/proc/setup/hdd-c.html
http://en.wikipedia.org/wiki/Disk_partitioning
http://support.microsoft.com/kb/313348http://search.yahoo.com/search;HARD+DISK+PARTITIONING+AND+FORMATTING

KRITIK DEMI KEMAJUAN

Anda boleh mengkritik dan membuat aduan terhadap kerajaan, agensi kerjaan, jabatan dan yang berkaitan melalui laman berikut http://kritik2.tripod.com/

Cubalah..

ADUAN DAN KRITIKAN TERHADAP KEMENTERIAN PELAJARAN

Sekarang, sesiapa boleh membuat aduan atau kritikan terus kepada Kementerian Pelajaran Malaysia melalui laman berikut http://yourwebapps.com/WebApps/db-submit.cgi

buatlah sebarang yang berfaedah dan memberikan manfaat kepada semua bukannya utk suka-suka.

WHAT IS PERVASIVE COMPUTING?

Pervasive computing means the technology that is gracefully integrated in our everyday life. The user is no longer aware of this embedded technology.

Pervasive computing uses web technology, portable devices, wireless communications and nomadic or ubiquitous computing systems. Other terms for pervasive computing are Ubiquitous Computing, Calm Technology, and Things That Think.
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci759337,00.html
http://www.webopedia.com/TERM/P/pervasive_computing.html
http://www.fincher.org/tips/web/Pervasive.shtml
http://search.yahoo.com/search;WHAT+IS+PERVASIVE+COMPUTING
http://www.parliament.uk/documents/upload/postpn263.pdf

computer storage

Information and documents are stored in computer storage so that it can be retrieved whenever they are needed later on.
Primary storage is known as the main memory of a computer, including RAM (Random-Access Memory) and ROM (Read-Only Memory). It is an internal memory (inside the CPU) that can be accessed directly by the processor. Primary storage is installed internally. Two main types of primary storage are RAM and ROM.Data from RAM can be read or retrieved and written or stored during processing whereas data from ROM can just be read only.RAM is volatile, which means the program and data will be lost when the computer is turned off.
ROM is non-volatile which means it holds the programs and data even when the computer is turned off.
Secondary storage is the alternative storage in a computer. It is an external storage that refers to various ways a computer can store program and data.
Secondary storage is an alternative storage. It is very useful to store programs and data for future use. Secondary storage is required for two reasons.
The working memory of the CPU is limited in size and cannot always hold the amount of data required.
Data and programs in secondary storage do not disappear when the power is turned off.

http://search.yahoo.com/search;_ylt=A0oGkmTe.MZHfQEB9_9XNyoA?phttp://search.yahoo.com/search;_ylt=A0oGklZ2.cZHlSAAqPxXNyoA?p

central porcessing Unit

A Central Processing Unit or CPU is a microprocessor (or processor for short). It is an integrated circuit chip that is capable of processing electronic signals. The CPU is the most important element in a computer system.A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit (ALU).



http://en.wikipedia.org/wiki/Central_processing_unit
http://search.yahoo.com/search;_ylt=A0oGkkJB.MZH1FAAyhJXNyoA?p

system software

A system software is a program that controls or maintains the operations of a computer and its devices. A system software also serves as the interface between the user, the application software and the computer’s hardware.
There are two types of system software:
• operating system
• utility program
http://en.wikipedia.org/wiki/System_software
http://search.yahoo.com/search;_ylt=A0oGklxL9MZHZGkBiUpXNyoA?p
http://search.yahoo.com/search;_ylt=A0oGknHJ9sZHIKYA6N1XNyoA?p
http://search.yahoo.com/search;_ylt=A0oGkwX79sZHZfcAmhpXNyoA?p
http://search.yahoo.com/search;THE+DIFFERENCES+BETWEEN+OPERATING+SYSTEMS

blog untuk hebahan dan perkongsian maklumat tentang ICT

Blog ini dibina adalah untuk memudahkan pelajar ICT semekta mendapatkan maklumat dan tugasan yang akan diberikan secara online kepada pelajar.

Di samping itu perkongsian maklumat dan petua berkaitan dengan ICT kepada mereka yang berminat, blog ini ada memuatkan perkara sedemikan walaupun tidak terkini dan secara menyeluruh.

Sebarang komen adalah dialu-alukan.

Terima kasih

sardotcom