Thursday, December 31, 2009

Happy New Year

Welcome 2010
HAPPY NEW YEAR
Your SPM Year - the year that we must really work extra hard.
Note:
1. Pak G dah tak sabar to see you guys
2. I made this post from Bangkok

Tuesday, December 22, 2009

fakta ke auta

dengar ura-ura pointer periksa bawah 1.5 kena tukaq sekolah betui ka?
diminta Pak G untuk menjawab
sekian terima kasih

-remain unknown-

Saturday, December 19, 2009

Server Down

Hi Guys ...
Mulai semalam server di mana laman web kita di 'upload' telah mengalami masalah - tak boleh di akses. Laman web lain yang diletak di server yang sama juga mengalami masalah. Harap maklum ...
- Pak G -

Friday, December 18, 2009

Keputusan Peperiksaan Akhir Tahun 2009

Hi Guys,
How are you all doing? I hope this holidays will be another enjoyable moments. I also hope you will be something beneficial to improve your study.
Btw, you can now access your Final Year Exam result on-line through our school website.
Good luck.
- Pak G -

Monday, December 14, 2009

2010

kita akan jadi tingkatan lima dah tahun depan.
cikgu mana yang akan ajar kita?
pakat-pakat agak la cikgu mana yang akan ajar
Pak G habaq la kat kami siap-siap cikgu mana yang akan ajaq kami
senang buat perisapan
hehehe

Saturday, November 28, 2009

This Is For ALL 4 ALFA Students and PAK G

Friends,
I come up to meet you,
Tell you i'm sorry,

Friends,
You dont know,
How lovely you are,

I had to find you,
Tell you,
I need you,
Tell you,
I set you apart,

Friends,
Tell me,
Your secret,

Ask me,
Your question,
Let's go back to start,

Running in circles,
Coming in tales,
Heads are science apart,

Nobody said it was easy,
It's such a shame for us to part,
No one ever said it,
Would be this hard,

I was just guessing,
At numbers and figures,
Ruling your puzzle apart,

Questions of science,
Science in progress,
Do not speak,
As loud as my heart,

Friends,
Tell me you love me,
Come,
And haunt me,

Running in circles,
Chasing tails,
Nobody said it was easy,
Such a shamefor us to part,

Nobody,
Said it was easy,
No one ever,
Said it would be so hard,

Just tell me,
Friends,
That we love each other,
And haunt this love,
Before we late.


~_~"

-Mohammad Firdaus Bin Ahmad
-This is for all my lovely friends...for all 4ALFA student's...

Wednesday, November 25, 2009

Message From Ericleao

This is the actual massage from ericleao in his blog:
actually, i'm thinking of forming 1 kelas alfa band, only take band member frm kelas alpha, wan can play drum, firdaus can play bass, choka and shuk can play guitar, while i can sing + keyboard...
i dun have the access to the blog alfa0910, so i posted it here...
btw, it's just a suggestion, if u all not agree, thn nvm...^^
Posted by ericleao
Komen Pak G:
1. It is a good suggestion. Pak G sokong 100%.
2. What a pity he doesn't know how to access our blog - every one should know ...
3. Agak-agak Pak G boleh join tak? Nak main apa agaknya?
4. Bagaimana kalau kita wujudkan juga group study ... so kita akan dapat result yang baik masa SPM nanti.

Thursday, November 19, 2009

Happy Holiday

Pak G ambil kesempatan untuk ucapkan: (1) Selamat Bercuti; dan (2) Selamat Hari Raya Aidiladha. Anyway:
1. I wish you all could start the preparation for your SPM exam next year right now. The earlier you guys prepare, the better it is.
2. One of our member didn't keep his promise - returning my money. If you got problem in keeping the promise just let me know - boleh dilanjutkan. Not keeping s promise is very bad.
Lastly, Pak G thanked God for giving me the opportunity to know you guys.
-Pak G-

kisah suka dan duka sepanjang 2009

Assalamualaikum buat semua pembaca blog ini.
saya bersyukur kerana dapat meluahkan suka dan suka saya bersama rakan-rakan sepanjang tahun 2009 di kelas 4 Alfa
Saya mendapat rakan-rakan yang baru kenal dengan rakan yang belum saya pernah bertegur sapa.
Tapi,tahun ini saya berpeluang untuk bertegur sapa.
Awal tahun,kita dikejutkan dengan pelbagai pengalaman yang kita dapat ingat sampai ke hari ini tu pun kalau ampa ingat la.
antaranya:
-kita kena denda 25 push ups dengan Pak G sebab tak buat notes ICT.memang aku tengok kawan-kawan semua tak larat dah.ada yang kena penampaq..
-tu baru kita tau erti kemarahan seroang cikgu.untuk kebaikkan kita jugak.
-cikgu kelas pindah,Wan Meryani.berapa bulan cikgu tak masuk ajaq kita kimia.rasa macam nak mati tak tau apa pasal kimia...Hanya tuhan saja yang tau.
-ada seorang daripada kelaih kita kunci pintu tak mau bagi cikgu add math masuk.sampai Pak G kena mai tolong settle.
-paling latest,kelas kita jadi buah mulat satu sekolah gara-gara tepung memutihkan kelas yang tak berapa nak putih.
-kawan-kawan kita ada yang kena sebat dengan rotan.alah bisa tegal biasa.
-aku bersyukur sebab ada kawan-kawan macam ampa semua
-walaupun kita tak pi cameron,tapi spirit kita masih ada....
-aku nak berterima kasih kat semua cikgu kelas 4 Alfa terutama Pak G.
-Pak G ni macam saver kelaih kita.
-kalau ada apa doubts dia la yang akan tolong.
-aku harap kalau ampa baca ampa boleh tulis kisah ampa pulak sepanjang tahun ni.

Sekian,
Hamba Allah

Monday, November 16, 2009

i've an idea , what if we set a date for a photoshoot ?
take pictures of us , the alpharianz .

Friday, November 13, 2009

can we stop being racial ?

dlm kelas kita , melayu lepak dgn melayu .
cina lepak dgn cina .
why cant we , malays , treat the chinese like the way we treat pavi ?
=.=

Wednesday, November 11, 2009

What done has done...

I'm one of 4alfa student...
i know what we do yesterday was s0o0oo wrong...
we just think to fun but dont think about what will happen...
today... certain of our friend in class got 1 stroke of rotan from PK HEM...
i'm one of them and i'm so proud because i deserved it...
this our biggest regret...

me and all 4alfa student apologize to all teacher especially PAK G about what
had happen in our class
and our mistake...


we are very regret and sorry to all

Monday, October 26, 2009

The True 4 Alfa...!!! One for all, All for one...

in this picture : chip , khairil , amir , choka , munet , pavi , aizudin , hakim , peyek , kert , jelok , syaamil , pidot , wak , qutub , syamil izudin

missing in this picture : all the chinese students , shuk , afiq , amirul ashraf , fathi , azrie , shafiq bariz , aisamudin , hafiz rohaimi .
-This picture was taken on 26.10.2009...
-The location is... i think you guys already know...
-Someone 'sesat'....try to find him...
-like '1 Malaysia a.k.a 1 Kolej'




- kert ,pidot-

Friday, October 23, 2009

2.3.3.1 Differentiate between the types and usage of utility programmes (file management, diagnostic & file compression).

Utility programs (also known as service programs) perform maintenance-type tasks related to the managing of a computer, its devices, @ its programs. They provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software. However they may also be bought separately as external utility programs such as Norton SystemWorks and McAfee Utilities.
File Manager:
It is used to manage files on a disk. It provides functions to delete, copy. move, rename and view files as well as create and manage folders. It performs tasks of formatting and copying disks, displaying a list of files on a storage medium, checking the amount of used or free space on a storage medium, organising, copying, renaming, deleting, moving and sorting files and also creating shortcuts.
Diagnostic Utility:
It compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems.Information in the report assists technical support staff in remedying any problems.
Disk Defragmenter:
It reorganises the disk so that the files are stored in contiguous sectors. A fragmented disk has many files stored in non-contiguous sectors. Defragmenting will speeds the access time.
Data Compression:
It removes redundant elements, gaps and unnecessary data from a computer’s storage space so that less space is required to store or transmit data. Compressed files are sometimes called zipped files and it must be unzipped before being used. Two popular file compression utilities are PKZIP and WinZip.

2.3.2.2 Describe the uses of Application Software

Usages of Word Processing Software:
It allows users to create and manipulate documents containing mostly text and sometimes graphics. It provides the ability to create, check spelling, edit and format a document on the screen before printing it to paper. The software can be used to produce documents such as letters, memos, reports, fax cover sheets, mailing labels, newsletters, and web pages. Eg: Microsoft Word, StarOffice Writer, TexMaker and Corel WordPerfect.
Usages of Spreadsheet Software:
It is an application that allows users to organise and manipulate data in rows and columns. It produces worksheets that require repetitive calculations – budgeting, maintaining a grade book, balancing accounts, tracking investment, calculating loan payments, estimating project costs and preparing financial statements. Eg: Microsoft Excel, Corel Quattro Pro and Sun Staroffice Calc.
Usages of Presentation Software:
It is an application that allows users to create visual aids for presentations to communicate ideas, messages and other information to an audience. Eg: Microsoft PowerPoint, StarOffice Impress and CorelDraw.
Usages of Graphics Software:
It is an application that allows users to work with drawings, photos and pictures. It provides the users the ability of creating, manipulating and printing graphics. Eg: Microsoft Paint, Adobe Photoshop, Adobe Illustrator, Corel Painter and Macromedia Fireworks.

Wednesday, October 21, 2009

Berbangga

Pak G masih ingat pada awal tahun yang lalu, ada di kalangan kita menganggap bahawa kelas Alfa adalah kelas yang paling terut di kalangan kelas-kelas lain. Persepsi tersebut ternyata tidak benar.
Malah Pak G is VERY PROUD kerana:
1. Yang menang pertandingan mencipta logo adalah dari kelas kita.
2. Bila nak buat pertandingan yang baru (mencipta kulit majalah), pengetua menyuruh Pak G memberitahu budak-budak IT (4 Alfa la tu ...) & bukan kelas lain.
3. Pak G juga is very happy melihat presentation team Formula One - dimonopoli oleh geng 4 Alfa. To them Pak G doakan kejyaan & best of luck.
4. Cikgu-cikgu yang mengajar anda dah mula "cayang" kat kelas kita. Cuba baca post yang Pak G buat sebelum ini dengan tajuk "Lu Pikir La Sendiri"
So guys keep our name high.
Note:
Bagaimana perkembangan lawatan ke Cameron??? Any problem jumpa Pak Anas. Jumpa Pak G pun OK juga.

Another Competition


There will another competition. This time it will be on designing the front cover for our 2009 school magazine, "Darulaman" for the year 2009. Pengetua told me this morning.
I'm drafting the details about the competition & will be publish at our school web site after getting aproval from our Pengetua. I'm not very sure when, but just keep in touch regularly to our school web site. I hope you will participate.
Note:
Pak G would like to take this opportunity to congratulates (those who won) & thanks (those who participate) for the previous "1 Kolej" competition.

2.3.2.1 State the types of application software (word processing, spreadsheet, presentation, graphic)

Application software is a computer program or a suite of computer programs that performs a particular function. Application software includes all programs that perform specific tasks for user such as word processing, spreadsheet, database, presentation, e-mail and web browsing.

2.3.1.3 State the different interfaces of OS

The three type of user interface are: (1) Command-Line; (2) Menu-Driven; & (3) Graphical User Interface.
Command-Line User Interface
This interface requires users to type commands or press special keys to enter data & instructions that instruct the OS what to do. It has to be typed one line at a time.
It is difficult because it requires exact spelling, syntax or a set of rules of entering commands & punctuation.
We must observe the complicated rules of syntax that specify exactly what you can type in a given place. This interface also requires memorisation. The advantage is, it helps the user to operate the computer quickly after memorizing the keywords and syntax.
Menu Driven Interface
Menu-driven user interface enables the user to avoid memorizing keywords such as copy, paste and syntax. On-screen, menu-driven interface provide menus as means of entering commands. It shows all the options available at a given point in a form of text-based menu. Menu-driven user interfaces are easy to learn.
Graphical User Interface (GUI)
GUI makes use of the computer’s graphics capabilities to make the OS & programs easier to use (user-friendly). GUIs are used to create the desktop that appears after the operating system finishes loading.
We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at their desktops. GUI with menus and visual images such as buttons, icons and other graphical objects to issue commands.
On the desktop, we can initiate many actions by clicking icons that represent computer resources such as files, programs and network connections.

2.3.1.2 State the functions of OS

The main functions of OS are (1) starting a computer; (2) providing a user interface; (3) managing data & program; (4) managing memory; & (5) configuring devices.
Starting the Computer
OS is used to start the computer. This process is called booting - to load & initialize the os. It can happen in two ways: warm boot or cold boot.
A warm boot means restarting a computer that is already on - usually after installing a new software or hardware or after an application crashes or stops working.
A cold boot means starting a computer that is already off @ completely powered off.
Providing a User Interface
This function controls how the user enters data and instruction & how information is displayed. The three type of user interface are (1) Command-Line; (2) Menu-Driven; & (3) Graphical User Interface . The user interface typically enables users:
  • to start an application program
  • to manage disks and files such as formatting, copying & renaming
  • to shut down the computer safely by following the correct procedures

Managing Data & Programs
When we start an application, the CPU loads the application from storage into memory. In the early days, single-tasking OS could run only one application at a time. Multitasking os enable users to work with two or more application programs at the same time.
Managing Memory
The computer's OS is responsible for managing memory such as:

  • optimizing the use of RAM
  • allocating data & instruction to an area of memory while being processed·
  • monitoring the contents of memory
  • releasing data & instructions from being monitored in memory when the process is done

Configuring Devices
Another function of an OS is handling & enabling communication with input and output devices. Most OS come with drivers for popular input & output devices. These drivers install new devices & check whenever there is conflict with these devices.

2.3.1.1 State the various types of OS used on different platforms.

The examples of OS used on PC platforms or IBM compatible computers are (1) Disk Operating System (DOS) & (2) Microsoft Windows XP.
DOS used a command line interface when Microsoft first developed it. Microsoft Windows XP’s operating environment is a Graphical User Interface (GUI). Both are closed source software.
The OS used on Apple platforms are Mac OS & Mac OS X. It is a closed source software & are targeted for use with home desktops and workstations.
Mac OS X is a multitasking OS & targeted for use with home desktops, workstations & servers. It has better security protection compared to Mac OS, for example the integrated firewall utility.
Cross-platforms OS are (1) UNIX & (2) LINUX. UNIX is a multitasking OS. Some versions of UNIX have a command line interface but most versions of UNIX offer a graphical user interface.
Linux is a popular, free, UNIX-like graphical user interface OS. It is an open source software. Linux provides a great deal of liberty to those that interact with Linux technology. Although Linux runs on many kinds of equipment, it is best known for its support of IBM-Intel PC-based hardware.

2.2.4.1 Explain types and functions of Secondary Storage

Secondary storage can be divided into: (1) magnetic medium; (2) optical medium; & (3) flash memory.
Magnetic Medium:
It is a non-volatile. It can be any type of storage medium that utilizes magnetic patterns to represent information. The devices use disks that are coated with magnetically sensitive material. The examples of magnetic storage are:
(a) magnetic disk such as: (1) a floppy disk, used for off-line storage; (2) hard disk, used for secondary storage.
(b) magnetic tape; including video cassette, audio storage reel-to-reel tape & others.
Optical Medium:
It is a non-volatile storage that holds content in digital form that are written and read by a laser. These media include various types of CDs and DVDs.
These following forms are often commonly used:
(a) CD, CD-ROM, and DVD: Read only storage, used for distribution of digital information such as music, video and computer programs.
(b) CD-R: Write once storage, the data cannot be erased or written over once it is saved.
(c) CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data that have been saved to be erased and rewritten.
The disk capacity is more compared to magnetic media. Durability is another feature of optical media. They are able to last for up to seven times as long as traditional storage media.
Flash Memory:
It is a solid-state, non-volatile, rewritable memory that functions like RAM and a hard disk drive combined. Flash memory store bits of electronic data in memory cells just like DRAM. It works like a hard disk drive that when the power is turned off, the data remains in the memory. Flash memory cards & flash memory sticks are examples of flash memory.
Flash memory cards are also used with digital cellular phones, MP3 players, digital video cameras and other portable digital devices.
Flash memory is also called USB drives, thumb drives, pen drives or flash drives. The advantages: it offers fast reading access times, durable & requires low voltage. It is light & small.
The disadvantage: it is more expensive than the magnetic disk of the same capacity.

Tuesday, October 20, 2009

2.2.4.1 Explain types and functions of Primary Storage

Primary storage is the main memory in a computer. It stores data and programs that can be accessed directly by the processor. There are two types of primary storage which are (1) RAM (Random-Access Memory); and (2) ROM (Read-Only Memory).

RAM:
  • RAM is installed inside computers. RAM is also known as a working memory.
    The data in RAM can be read (retrieved) or written (stored).
  • It is volatile (the programs & data are lost when the computer is powered off).
  • Computer uses RAM to hold temporary instructions & data needed to complete tasks. This enables CPU to access instructions and data stored in the memory very quickly.
  • RAM stores data during and after processing.

ROM:

  • ROM is another type of memory permanently stored inside the computer.
  • It is non-volatile (holds the programs and data when the computer is powered off).
  • Programs in ROM have been pre-recorded by the manufacturer. Once it is done, it cannot be changed.
  • Many complex functions, such as start up operating instructions, translators for high-level languages & operating systems are placed in ROM memory.
  • All the contents in ROM can be accessed and read but cannot be changed.

ICT Notes

Hi guys,
Please update your ICT notes. The following posts are the continuation of the previous notes. I will collect your ICT notebook before your final exam.
-Pak G-

Lu Pikirlah Sendiri

Berikut ialah pengalaman yang Pak G alami dengan your Math teacher (kini guru kanan sains) pada petang 20/08/09 yang lalu ketika sedang menguruskan perubahan jadual waktu. Ceritanya begini:
Pihak sekolah mengalami masalah untuk mendapatkan guru yang akan mengajar Matematik di Tingkatan 6. Pengetua mencadangkan your Math teacher. Pengetua terus telefon untuk mendapatkan persetujuan. Your Math teacher menolak. Beliau kemudiannya sms Pak G meminta tolong agar beliau tidak mengajar Tingkatan 6.
Pak G membalas sms dengan mengatakan yang Pak G tidak ada kuasa. Beliau kemudiannya membalas sms tersebut dengan mengatakan dia sangat berharap pertolongan Pak G kerana dia SAYANGKAN kelas 4 Alfa. Katanya lagi beliau ada program dengan 4 Alfa. Pak G tunjukkan sms tersebut kepada Pengetua & dia akhir bersetuju & cadangan tersebut dibatalkan.
So guys ... lu pikirlah sendiri how to treat your Math teacher.
- Pak G -

Wednesday, October 14, 2009

Network Topology

I took the given notes from Khairil Hafiz's blog. He responded to what I asked during our ICT class. Thanks, Khairil Hafiz. So guys, please read.
NETWORK TOPOLOGY
Introduction:
Arrangement and configuration of cables, computers and other peripheral devices is called network topology. Topology may be a physical or logical depending on the network. There are different types of topologies used in networking. These are bus topology, star topology, ring topology, tree topology, and hybrid or mix topology. Bus topology consists of backbone cable and nodes. Each node is connected with central cable. Bus topology is very easy, simple and inexpensive than other topologies. Star topology consists of central device called hub or connector. All computers in star topology are directly connected to central devices. All functions are control and manage by central device. Star topology is very easy to install but it is expensive due to the cost of central device. Tree topology is combination of star and bus topologies. Group of star configured computers are connected to a central cable or backbone cable like bus topology. This network is very easy to extend and facilities the organizations to meet their requirements. Tree topology is mostly supported by number of hardware and software manufacturers. In tree topology if central cable breaks then all the nodes goes down. Hybrid or Mix topology is combination of different topologies such as star bus topology, star of star, star wired ring, hybrid mesh.
Bus Topology:
Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.
Ring Topology:
In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.
To implement a ring network, one typically uses FDDI, SONET or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
Star Topology:
Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switchor router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Tree Topology:
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology:
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
source : http://compnetworking.about.com/od/networkdesign/a/topologies.htm
- Pak G-

Lawatan Ke Cameron

Pak G harap lawatan tersebut dapat sokongan daripada semua pihak. Dengar khabar ada rakan-rakan kita tak mau pergi. Don't like that ma ... Show other that we (our class) are:
One for all, all for one
-Pak G-

Friday, October 9, 2009

Duit Lawatan

Duit Lawatan sekarang sudah boleh dikumpul.
Berdasarkan pidot,harga sekarang ialah RM 50.Tertakluk kepada sebarang perubahan.

Saturday, September 19, 2009

Ucapan Selamat Hari Raya

Dengan rasa rendah diri & penuh kesyukuran Pak G & keluarga menghulurkan ucapan
Selamat Hari Raya Aidil Fitri dan Maaf Zahir & Batin
kepada semua pelajar 4 Alfa Tahun 2009.
Semoga anda semua akan betul-betul menjadi
"THE BEST"

Saturday, August 22, 2009

Cadangan....

Asalamualaikum all 4 ALFA student and salam sejahtera dan perpaduan to non muslim student...
i am one of 4 alfa student...
i want to inform you what i was thinking...
i want to discuss with you all...

i want to ask permission from PAK G to make a 'rombongan' to anywhere in Malaysia (because we dont have enough money to LONDON)...

we can go to Cameron Highland if you all want because i know a little bit best place over there...
we can eat a fresh plucking strawbery and many more fresh...

My father have a friend over there that can give us apartment for rent at very low price...
one apartment have 3 bedroom, 2 bathroom, 1 kitchen, and the most improtant is, it have 'astro' and beautiful environment...

We can stay there about 3 days and 2 night...


i hope my post will get attention...
thank you...

Pidot (4 ALFA)...

Friday, August 7, 2009

One Kolej

Semasa memberi ucapan pada Majlis Anugerah Cemerlang (MAC) 2009 yang lalu, pengetua ada menyebut "1 Kolej - One for all. All for one."
Beberapa hari lalu, pengetua bercakap dengan saya tentang kemungkinan mengadakan logo "1 Kolej" (macam logo 1 Malaysia) yang akan digunakan secara rasmi. Beliau membuat keputusan bahawa satu pertandingan mencipta perlu diadakan & hadiah akan diberikan kepada pencipta yang logonya terpilih.
Berikut adalah beberapa panduan mengenai pertandingan tersebut:
1. Logo mesti mengandungi tema yang diperkatakan oleh pengetua semasa MAC 2009.
2. Dihantar kepada Pak G dalam bentuk soft copy & hard copy (cetakan pada kertas A4).
Catatan:
1. Details of the competition will be publish in school's web.
2. I hope you guys will particape in the competiton. Show that 4 Alfa is the best. Good Luck.
-Pak G-

SMS

Our pengetua sent me a sms stated:
On August 7th. 2009 at 12hr 34mins 56sec this year, the time and the date will be:
123456789 (12:34.56 07/08/09)
This will never happen in ur life again!
All the best!
-Pak G-

Monday, August 3, 2009

Cancellation of ICT Class

This week (3rd. - 5th. August 2009) ICT classes are cancelled because Cikgu Rozi & me are attending ICT course at our school lab.
Since there is no class, please complete your computer system note. Your note book will be collected next week.
Thank you guys.
-Pak G-

Friday, July 24, 2009

Web Messages

One of your friend (alfarian2) wrote, "yup, web mssge ni x de faedah langsung ..."
I do not agree with the statement 100%. So far, it is quite beneficial for me in helping you guys in your study. Through it, some of your friend sent messages that had help me to help you. Eg:
(1) The CCTV crew passed a message that he was noob when helping me during the Majlis Anugerah Cemerlang - cikgu Rozi & me will have a special class for that.
(2) Some one mention about your chemistry class - you will get a new teacher by next week.
I knew both problems through web messages ...
-Pak G-

Wednesday, July 22, 2009

NOT HAPPY AT ALL

Hi Guys,
I feel very unhappy after going through our blog web messages - especially after today's class. To me, some of you don't behave the way you should be. Using other people's name, such as our pengetua's name is UNFORGIVABLE.
Do you all know that our blog is being read by a lot of Internet users. Our blog is one of the link in our school official web - the only class blog which we should be very proud.
So guys ... please give a thought - if this is the way you behave I have these FOUR options:
1. remove the web messages.
2. remove the link from sahc web - already removed temporarily
3. stop this blog
4. ~ ^ ~ ... %% ^ $$ ! +++)&^%$#
You all decide and let me know ... IF I DON'T HEAR anything from you guys by this coming Sunday, I will make the decision. If I have to make the decision, I am very sure that YOU WON'T LIKE WHAT I HAVE IN MIND.

Cadangan

Untuk menubuhkan kelas hacking.boleh x?

proposal

aku nak cadagkan untuk kelaas kita pergi melawat ke mana-mana tempat yang menarik.........
kalau boleh minta cikgu untuk uruskan untuk satu lawatan ke mana-mana tempat menarik
contohnya Bukit Merah Water Park atau mana-mana lagi tempat menarik
lawatan ini untuk kelas alfa ....
mungkin selepas periksa akhir tahun boleh jadi masa yang sesuai

-forbidden_angel-

2.3.1.3 State the different interfaces of OS.

The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface.
Command-Line User Interface
This interface requires users to type commands or press special keys to enter data and instructions that instruct the operating system what to do. It has to be typed one line at a time.
It is difficult because it requires exact spelling, syntax or a set of rules of entering commands and punctuation.
We must observe the complicated rules of syntax that specify exactly what you can type in a given place. This interface also requires memorisation. It is also easy to make a typing mistake. The advantage of command-line interface is, it helps the user to operate the computer quickly after memorizing the keywords and syntax.
Menu Driven Interface
Menu-driven user interface enables the user to avoid memorizing keywords such as copy, paste and syntax. On-screen, menu-driven interface provide menus as means of entering commands. It shows all the options available at a given point in a form of text-based menu. Menu-driven user interfaces are easy to learn.
Graphical User Interface (GUI)
GUI makes use of the computer’s graphics capabilities to make the operating system and programs easier to use (user-friendly). GUIs are used to create the desktop that appears after the operating system finishes loading.
We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at their desktops. GUI with menus and visual images such as buttons, icons and other graphical objects to issue commands.
On the desktop, we can initiate many actions by clicking icons that represent computer resources such as files, programs and network connections.

2.3.1.2 State the functions of OS.

The main functions of OS are:
  • starting a computer
  • providing a user interface
  • managing data & program
  • managing memory
  • configuring devices

Starting the Computer
The first function of an operating system is to start the computer. This process is called booting. Booting means to load & initialize the operating system. It can happen in two ways: warm boot or cold boot.
A warm boot means restarting a computer that is already on. It normally happens after installing a new software or hardware or after an application crashes or stops working.
A cold boot means starting a computer that is already off. It happens when we turn on a computer that has been completely powered off.
Providing a User Interface
This function controls how the user enters data and instruction and how information is displayed. The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface . The user interface typically enables users:
to start an application program
to manage disks and files such as formatting, copying and renaming
to shut down the computer safely by following the correct procedures
Managing Data & Programs
When we start an application, the CPU loads the application from storage into memory. In the early days, single-tasking operating systems could run only one application at a time. Multitasking operating systems enable users to work with two or more application programs at the same time.
Managing Memory
The computer's operating system is responsible for managing memory such as:
· optimizing the use of RAM
· allocating data & instruction to an area of memory while being processed
· monitoring the contents of memory
· releasing data & instructions from being monitored in memory when the process is done
Configuring Devices
Another function of an operating system is handling input and output, as well as enabling communication with input and output devices. Most operating systems come with drivers for popular input and output devices. These drivers install new devices and check whenever there is conflict with these devices.

2.3.1.1: State the various types of OS used on different platforms.

PC Platform Operating Systems
The examples of operating systems used on PC platforms or IBM compatible computers are:
· Disk Operating System (DOS)
· Microsoft Windows XP
DOS used a command line interface when Microsoft first developed it. Microsoft Windows XP’s operating environment is a Graphical User Interface (GUI). Both are closed source software.
Apple Platform Operating Systems
The operating systems used on Apple platforms are Mac OS & Mac OS X.
Mac OS was the first commercially successful graphical user interface. It is a closed source software and are targeted for use with home desktops and workstations.
Mac OS X is a multitasking operating system and targeted for use with home desktops, workstations and servers. It also has better security protection compared to Mac OS, for example the integrated firewall utility.
Cross-Platform Operating Systems
Cross-platforms operating systems are:
· UNIX
· LINUX
UNIX is a multitasking operating system. Some versions of UNIX have a command line interface but most versions of UNIX offer a graphical user interface.
Linux is a popular, free, UNIX-like graphical user interface operating system. It is an open source software. Linux provides a great deal of liberty to those that interact with Linux technology. Although Linux runs on many kinds of equipment, it is best known for its support of IBM-Intel PC-based hardware.

2.2.4.1 Explain types and functions Primary & Secondary Storage

Primary Storage (RAM, ROM)
Primary storage is the main memory in a computer. It stores data and programs that can be accessed directly by the processor. There are two types of primary storage which are RAM (Random-Access Memory) and ROM (Read-Only Memory). RAM is installed inside computers. RAM is also known as a working memory.
RAM:
• The data in RAM can be read (retrieved) or written (stored).
• RAM is volatile (the programs & data in RAM are lost when the computer is powered off).
• Computer uses RAM to hold temporary instructions and data needed to complete tasks. This enables CPU to access instructions and data stored in the memory very quickly.
• RAM stores data during and after processing.
ROM:
• ROM is another type of memory permanently stored inside the computer.
• ROM is non-volatile (holds the programs and data when the computer is powered off).
• Programs in ROM have been pre-recorded by the manufacturer. Once it is done, it cannot be changed.
• Many complex functions, such as start up operating instructions, translators for high-level languages & operating systems are placed in ROM memory.
• All the contents in ROM can be accessed and read but cannot be changed.


Secondary Storage
Secondary storage can be divided into magnetic medium, optical medium and flash memory.
Magnetic Medium
Magnetic medium is a non-volatile. It can be any type of storage medium that utilizes magnetic patterns to represent information. The devices use disks that are coated with magnetically sensitive material. The examples of magnetic storage are:
• magnetic disk such as:
- a floppy disk, used for off-line storage
- hard disk, used for secondary storage
• magnetic tape;
- including video cassette, audio storage reel-to-reel tape & others.
Optical Medium
Optical medium is a non-volatile storage that holds content in digital form that are written and read by a laser. These media include various types of CDs and DVDs.
These following forms are often commonly used :
• CD, CD-ROM, and DVD: Read only storage, used for distribution of digital information such as music, video and computer programs.
• CD-R: Write once storage, the data cannot be erased or written over once it is saved.
• CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data that have been saved to be erased and rewritten.
The disk capacity of optical media is more compared to magnetic media. Durability is another feature of optical media, they are able to last for up to seven times as long as traditional storage media.
Flash Memory
Flash Memory is a solid-state, non-volatile, rewritable memory that functions like RAM and a hard disk drive combined. Flash memory store bits of electronic data in memory cells just like DRAM (Dynamic RAM), It also works like a hard disk drive that when the power is turned off, the data remains in the memory. Flash memory cards and flash memory sticks are examples of flash memory.
Flash memory cards are also used with digital cellular phones, MP3 players, digital video cameras and other portable digital devices.
Flash memory is also called USB drives, thumb drives, pen drives or flash drives, are the up-and-coming players in the portable storage market.
The advantages of flash memory are, it offers fast reading access times (though not as fast as RAM) it is durable and requires low voltage. It is also light and small. The disadvantage is, it is more expensive than the magnetic disk of the same capacity.

Monday, July 13, 2009


kmi wat bju so bg spa yg bminat ngan bju² indie , sila hubungi kami .
http://www.myspace.com/kamymain.
bg yg bminat leh contact aku , - 0175506087 .
antara bju² yg akan dprint . . .





- kert -

Friday, July 10, 2009

Majlis Anugerah Cemerlang

Tahniah kepada anda semua yang menerima anugerah sempena Majlis Anugerah Cemerlang 2009. Harapan saya:
1. Kepada yang menerima anugerah hendaklah teruskan usaha. Kejayaan kali ini tidak menjamin yang anda juga akan terus berjaya.
2. Kepada yang tidak menerima anugerah juga hendaklah teruskan usaha. Kegagalan kali ini tidak anda juga akan terus gagal.
3. Make your family proud of yourself.
-Pak G-

Thursday, June 25, 2009

Interaksi Guru-Waris-Pelajar

Saya langsung tidak berkesempatan melihat perjalanan program Interaksi Guru-Waris-Pelajar yang diadakan pada hari ini. Semasa sesi tersebut diadakan (mulai 12.30pm hingga 2.10pm) saya ada dengan kelas PraU1.
Walau bagaimana pun, saya ada beberapa persoalan untuk anda beri komen iaitu:
  1. Adakah waris anda hadir?
  2. Adakah pencapaian akademik anda akan meningkat selepas program ini?
-Pak G-

Band Competition

Yesterday, Cikgu Sahrul told me that the band competition will be held:
Date: 1st. July, 2009 (Wednesday)
Time: 8.00pm
Venue: Stadium Sultan Abdul Halim, Suka Menanti, Alor Setar.
A few of our friends are the band members. They are training very hard now. So guys, let's support them by going to the venue as stated above.
To our band, "GOOD LUCK, BE THE BEST".
-Pak G-
p/s:
1. Tahniah kepada Cikgu Sahrul & Cikgu Ramzi yang dilantik sebagai guru cemerlang (atau guru pakar).

Wednesday, June 24, 2009

Tournament Karate

Kejohanan Karate Peringkat Kebangsaan akan dilangsungkan di Dewan Beret Polis Taman Derga Jaya pada 26-27 Jun ini .
Mai la rmai² , pkat p sokong team Kedah .
huhu .
Aku tlibat gak :)

- kert -

Tuesday, June 9, 2009

EDUWEBTV

Saksikan kehebatan KSAH melalui rencana di EDUWEB TV. You'll be very proud of our school. You can get the link through our school website: http://sahc.kedah.edu.my/
-Pak G-

Wednesday, May 27, 2009

Another Transfer

I just received a sms saying that Cik Wan Meryani (your Form Teacher) will be transferred to Perak (following her husband who was transferred earlier) starting the 1st. June 2009. Let us thank her & wish her the best.
I heard a new teacher is coming.
-Pak G-

Tuesday, May 26, 2009

Naik Pangkat

~ Pengetua SMK Gulau ~
Cikgu Turin bin Ahmad (Penolong Kanan) akan bertukar ke SMK Gulau sebagai Pengetua. Tahniah kita ucapkan.
Juga kita berterima kasih di atas jasa & sumbangan beliau yang mula memimpin KSAH sejal tahun 2000. What ever, we will miss him & will always remember him for this popular saying:
Saya dengar saya lupa.
Saya tulis saya ingat.
Saya buat saya faham.
On behalf of 4 Alfa 2009, I wish him all the best.
-Pak G-

Sunday, May 17, 2009

Missing?

I met only a few of you today. Where are all the others? I didn't see any Chinese. Where are they?
I think most of you didn't reached the school today. On the way to school this morning I think I saw one of your Chinese friend at City Plaza. I saw the St. Michael boys & girls are there too. If what I saw is true, it is very bad. I hope you change.
Do your best in this coming Mid Term Exam. Good Luck.
-Pak G-

Saturday, May 16, 2009

Help Me, Please

~ Scholar, Sportsman, Gentleman ~
There will be an in-house training for us (teachers) this coming Saturday (23/05/09). I was assigned by our principal to give a talk on ICT in teaching-learning process to our teachers.
I asked our principal what he really want me to talk about. He told me that he want me to show the teachers few things including our school web & your blogs. What an honour for you guys. For your information, he has been following your progress in blogging since I introduced your blogs to him. So, please update your blog.
I know you all are quite busy with your mid-year exam, but please find time to update your blog. I'm looking forward for your help.
-Pak G-

Friday, May 15, 2009

Amanat Pidot

buat semua plajar klas alfa,
sila jelaskan baki bayaran baju kelas sbnyak RM18 kt pidot selewat-lewatnya ari slasa ni.
klau x,dikira burn .
apa² tnya pidot , aku smpaikan amanat dy ja .
hrp maklum .

- cekelat -

Selamat Hari Guru

We will be celebrating the Teachers Day on Sunday 17th. May 2009. Let's wish all your teachers "Selamat Hari Guru". It is nice if you guys could see all your teachers on that day & wish them personally. Thanks them for teaching you.
As for me ... this is my GIFT for you guys on the Hari Guru:
Early of the year (if you still remember) I told you that a few of your teachers said that your class is different & the best among all the previous ICT class - even the best among this year Form 4.
But last Tuesday (12th May 2009), those same teachers told me that they would like to take back the words. They told me that recently there were:
1. those who didn't do their homework.
2. those who skipped class for the co curricular activities.
3. those who didn't pay attention during learning.
We don't have to argue on what they said. Starting this Hari Guru, let us all bring back the old (early of the year) Form 4 Alfa. I know you can & if you can, I think that's the greatest GIFT to your teachers for this year Hari Guru.
-Pak G-
Catatan:
1. Saya agak kecewa dengan situasi tersebut.
2. Selamat menduduki peperiksaan pertengahan tahun.

Wednesday, May 6, 2009

Revision

SECTION A
ANSWER ALL QUESTIONS
1. The Phoenicians developed __________ in 1500 BC.
A. internet
B. telephone
C. alphabet writing
D. cuneiform writing

2. Before the invention of computer, several counting machines were invented. In 1823, Charles Babbage invented _______________ .
A. Mark1
B. Weaving Lom
C. Napier’s Bones
D. Mechanical Calculator Machine

3. ENIAC VACUUM TUBE MARK1 UNIVAC
All the above are related to the computer invented during the
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation

4. Which of these is an example of slander?
A. Telling your mother via e-mail that your brother has a girlfriend.
B. Forwarding a spam e-mail that says Mc Donald’s Malaysia uses contaminated meat in their burgers.
C. E-mail a letter to the newspaper that a public official accepting bribery and you have proof that it is true.
D. Broadcasting a story that a housing developer has started building houses in a prime “Malay Reserved” land.

5. X is the fastest and most powerful computers. It may weighs over 100 tons. X may refers to
A. Supercomputers
B. Mobile computers
C. Mainframe computers
D. Midrange computers

6. Unknown author Idea can be misunderstood
X
X is one of the issues in computer ethics. X may be __________.
A. software theft
B. unauthorized use
C. authorized access
D. information accuracy

7. ___________ was one of the first generation computer scientists.
A. Bill Gates
B. Steve Jobs
C. John Napier
D. Presper Eckert

8. When we talk about privacy in computing, we know that _________.
A. We have the right to use our belongings
B. We have the right to protect our property
C. We have the right to hide in secret place
D. We have the right to disclose our personal details

9. Controversial content is dangerous because it causes ________ among people of different religious, social and cultural beliefs.
A. peace
B. dispute
C. harmony
D. high moral

10. The term _________, originally a complimentary word for computer authorisation, now refers to someone who tries to access a computer or network illegally.
A. pirate
B. hacker
C. firewall
D. cracker

11. The right to use software is called
A. copyright
B. product activation
C. license agreement
D. acceptable use policy (AUP)

12. Teachers can benefit from the use of computers in schools because computers:
I. weaken learning
II. can enhance interactive learning
III. can be used as effective teaching aids
IV. can strengthen cognitive development

A. I and III
B. II and III
C. II, III and IV
D. I, II, III and IV

13. Which of the following was used to store data during the First Generation?
I. Diskets
II. Punched Card
III. Magnetic Tape
IV. Flash Drive

A. I and II
B. II and III
C. III and IV
D. I, II, III and IV

14. Customers benefit from Electronic Banking in terms of:
I. 24 Hour Service
II. Electronic Cash Deposits
III. Electronic Funds Transfer
IV. Electronic Loan Applications

A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV

15. Which of the following is the impact of ICT on the society?
I. Sharing
II. Reliability
III. Expensive
IV. Globalization

A. II and IV
B. I, II and III
C. I, II, and IV
D. I, II, III and IV

16. Which of the following statements is related to the impact of ICT on society?
I. Information travels borderless through the Internet.
II. People can receive information faster by using ICT.
III. Using computers frequently and for long hours is harmful to health.
IV. Today the younger generation prefers to sit infront of the computer than socialize with other.
A. I and II
B. II and IV
C. II, III and IV
D. I, II, III and IV

17. Which of the following statements show the impact of using a company’s computer without authorization?
I. Decreasing the company’s expense.
II. Increasing the company’s expense
III. Improvement in terms of staff personal skill
IV. Creating an unhealthy relationship between employer and worker.

A. I and II
B. II and III
C. II and IV
D. III and IV

18. The diagram below shows the evolution of communication.

I Pigeon
II X
III Cordless Phone
IV Y
V Mobile Phone
VI PDA
VII Z

X : __________________________________
Y : __________________________________
Z : __________________________________

19. Write TRUE or FALSE for the following statements.
i. In 3500 BC, the Sumerians developed alphabet writing.
ii. The first internet known as ARPANET was introduced in 1969.
iii. Tsui Lin invented Chinese Abacus in 105 BC.
iv. ICT comprises three major elements which are computer, networking and internet.
v. We need information to make decisions and to predict the future.
vi. Information is knowledge and helps us tol fulfil our daily task.
vii. Vacuum tubes was invented to replace the transistors during the Second Generation Computer.

20.
i. The knowledge obtained through reading, investigation, study or research.
The above statement refers to _____________.

ii. An act of transmitting messages between individuals using verbal interaction, symbols or signs. It is important to gain knowledge.

The above statement refers to ______________.

iii. Unique and original works such as ideas, inventions, writing and art of an individual.

The above statement refers to _____________.
SECTION B
ANSWER ALL QUESTIONS
1. Define Information and Communication Technology
2. Identify and explain two differences between computer ethics and law.
3. Explain the concept of privacy in computer usage and list ways to protect privacy in computing.

Friday, May 1, 2009

So Sorry

~ Mina : 2006 ~
I felt very guilty reading a comment in our blog & a post from one of your friend's blog. I felt guilty not because I didn't attend your class but MORE because of making your spirit down. Honestly, I'm not going anywhere. The 4 Alfa is still my class.
It is just that it has been more than a month I'm very busy with the task (very tough) given to me by our management (pengetua & pk). The task was to lead a group of teacher to prepare our school's documentations & presentations for the cluster school.
With the burdens put on me, I have no choice. I got to skip your class due to a lot to be done in within the limited time given. You all are very lucky as Cikgu Rozi (a very good ICT teacher) is around to attend your class. We (me too) should thanks her.
For your information, I have been going home late & less sleep (affected my health). Even it happened that one of the day I went home at 5.30am - just before my subuh prayer. I'm not just ignoring you guys but also my family. Even this coming weekends, I got to be in school - no holidays for me.
In conclusion, so sorry & please forgive me. I'll be back - that's my promise. For the time being, maintain your high spirit. It will make you successful.
-Pak G-
Catatan:
Saya hanya berkesempatan untuk memakai ihram pada usia menghampiri 50 tahun. Bertuahlah anda yang berkesempatan memakainya (walaupun sekadar untuk latihan amali) pada usia belasan tahun. Semoga mendapat barakah.

Wednesday, April 29, 2009

4 ALFA Di Ambang Haji... (31 March 2009)


-------------------------Haji Shukri bersama kain ihramnya...


------------------------ Model-model pakaian haji... Nasib baik ada cahaya kat blakang tuh...
kalau dak, Black ngan pidot mesti hilang... nampak kain ja¬...


------------------------------ Para haji ready to run!!! Semua pakat posing maut...


------------------------- Haji Pidot ngan Kaabah tiruan (cetak rompak)...
Pidot ada saiz kain ihram..
hahaha¬...

Post by: Mohammad Firdaus Bin Ahmad (kantoi handphone ngan ustaz)

Monday, April 27, 2009

A forum,for us :)

Our friend,Afiq(Krezimolez) has made a forum for our class.
For the time being,Afiq and I will be monitoring the forum.
Please support our effort of making our class,the real ICT class :)
Register for the forum here.

- cekelat -

Friday, April 17, 2009

Wednesday, April 15, 2009

From The Bottom Of My Heart

Wishing you guys good luck on your Ujian Selaras April 2009. I know that you can get A if you really want to.
-Pak G-

Tuesday, April 14, 2009

I'm Quite Sure

This is my 9th. year teaching ICT in KSAH. I have seen a lot of ICT students. I don't know why, but honestly I feel that you all guys (Alfa 2009 - 2010) are very close to our motto: "scholar, sportsman, gentleman".
I'm quite sure of what I said especially looking at the effort made by cekelat & support given by you all. I pray you will achieve it & I know that you guys won't let me down.
Since you are almost there all you need to be really there is a little improvement in life. Just be serious in study starting now & behave well. I;m very confident with you guys.
-Pak G-

Monday, April 13, 2009

Thank You

huhu..
Kelab karate akhirnya akan dpt ditubuhkan kt kolej.
[ terharu :) ]
thanx kpd smua yg support usaha saya..
akhirnya dpt gak cari 25 org ahli..
alhamdulillah..
terima kasih kpd semua yg mmbantu secara langsung mahupun tidak langsung.
InsyaAllah saya akan berusaha untuk memajukan kelab ini.

- Muzakkir -

Sunday, April 12, 2009

Ujian Selaras April 2009

I have just finished preparing your Ujian Selaras April 2009. I decided the questions are based not only on the given notes but also based on the notes in our school web (portal) at this URL http://www.sahc.kedah.edu.my/a_portal/portal_tekvok/ict/menu_ict.htm
Briefly, below are some tips of what you will be expected.
1. There are two sections (Section A & B). Section A consists of 30 multiple choice questions & Section B consists of three structured questions.
2. You must answer all the questions
3. Your answer must be written in the question paper - no extra paper needed.
Catatan:
1. Tahniah to our friend (Muzakir) for his efforts made succesfully collected more than 20 members to join the karate club. That's the spirit. I tabik u.
2. Thanks to others who supported Muzakir's efforts. Welcome to the karate club.
3. Puan Roszilawati will attend the ICT class tomorrow.

Saturday, April 11, 2009

Usaha & Doa

~ Sembahyanglah sebelum kita di sembahyangkan ~
One of our Alfa member wrote about 'usaha' & 'doa' in web messages. I have a story about my experience on 'usaha' & 'doa'. I'll be writing about it my blog.
-Pak G-

Wednesday, April 8, 2009

2.2.3.1 : The Location of the CPU, Expansion Slots, Expansion Cards, RAM Slots, Ports & Connectors

Motherboard is the main circuit board which has some electronic components attached to it and others built into it. CPU, expansion slots, expansion cards, RAM slots, ports and connectors are the components on the motherboard.

2.2.2.1 : The Output Devices Used for Text, Graphic, Audio & Video

Monitor is an output device that can be used to display text. It can also display graphics and video. It iaccepts video signals from a computer and displays information on its screen.
Printer is an output device that can be used to print text, apart from graphics, on mediums such as paper, transparency film or even cloths. A photo printer is a colour printer that produces photo-lab-quality pictures.
Speaker is an audio output device that generates sound. The headphone is a pair of small speakers placed over the ears and plugged into a port on the sound card. A woofer or subwoofer is used to boost the low bass sound and is connected to the port on the sound card.
Liquid Crystal Display (LCD) projector projects what is displayed on the computer on a wall or projection screen.
Digital Light Processing (DLP) projector uses tiny mirrors to reflect light which can be seen clearly in a well-lit room.

2.2.1.1 : The Input Devices used for Text, Graphic, Audio & Video.

Input Devices For Texts:
Keyboard, virtual keyboard (on the screen) & an optical reader (uses a light source to read characters, marks and codes and then converts them into digital data that a computer can process.
Input Devices For Graphics:
Scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
Digital camera allows you to take pictures and store the photographed images digitally.
Input Devices For Audio:
Audio input devices are such microphone and digital musical instruments like the Musical Instrument Digital Interface (MIDI) keyboard.
Input Devices For Video:
Closed-Circuit Television (CCTV) video camera is a type of digital video camera that enables a home or small business user to capture video and still images.
A webcam is any video camera that displays its output on a web page.
A digital video camera allows you to record full motion and store the captured motion digitally.
Pointing Devices:
A pointing device is another form of input device. Pointing devices such as a mouse, trackball, graphics tablet and touch screen are used to input spatial data into the computer. (Spatial data refers to data that is continuous and multi-dimensional).

2.1.5.1 : The Units of Clock Speed Measurement

Hertz & Seconds:
A hertz is one cycle per second.
Megahertz (MHz):
Megahertz (MHz) equals to one million cycles of the system clock.
(Mega is a prefix that stands for million. A computer that operates at 933 MHz has 933 million clock cycles in one second.)
Gigahertz (GHz):
Gigahertz (GHz) equals to one billion cycles of the system clock. In relation with megahertz, 1.0GHz is equivalent to 1000 MHz.
Giga is a prefix that stands for billion. GHz is most often used as a measurement of a PC processor chip and power, with bigger numbers meaning more speed and higher price. A microprocessor that runs at 200 GHz executes 200 billion cycles per second. For a 2.4 GHz machine, its clock rate is 2.4 billion cycles per second.

2.1.4.1 : The Units of Data Measurement

Bit
A bit is represented by the numbers 1 and 0. They correspond to the states of on and off, true and false, or yes and no.
Byte
1 byte = 8 bit
Kilobyte (KB)
1 KB = 1024 bytes or 1 KB = 210 bytes
Megabyte (MB)
1 MB = 1 048 576 bytes or 1 MB = 220 bytes
Gigabyte (GB)
1 GB = 1 073 741 824 bytes 1 GB = 230 bytes
Terabyte (TB)
1 TB = 1 099 511 627 776 bytes or 1 TB = 240 bytes

Note:
1 KB = 1 024 byte
1 MB = 1 024 KB = 1 048 576 byte
1 GB = 1 024 MB = 1 048 576 KB = 1 073 741 824 byte
1 TB = 1 024 GB = 1 048 576 MB = 1 073 741 824 KB = 1 099 511 627 776 byte

2.1.3.1 : The Function of ASCII Code

ASCII (American Standard Code for Information Interchange) was established to:
  1. achieve compatibility between various types of data processing equipment making it possible for the components to communicate with each other successfully.
  2. enables manufacturers to produce components that are assured to operate correctly in a computer.
  3. make it possible for humans to interact with a computer. It also enables users to purchase components that are compatible with their computer configurations.

2.1.2.1 : The Relationship of Data Representation: bit, byte & character

Bit:
A bit is the smallest unit of data that the computer can process. Bit is a short for binary digit. A bit is represented by the numbers 1 and 0. These numbers represent the binary system. They correspond to the states of on & off or true & false, or yes & no. All digital data use the binary system to process the information. This information include letters, digits or special character.
Byte:
Byte is a unit of information built from bits. One byte is equals to 8 bits. Eight bits that are grouped together as a unit. A byte provides enough different combinations of 0s and 1s to represent 256 individual characters. One byte represents a single character such as the number 3, letter b or a $ symbol. Bits and bytes are the basis for representing all meaningful information and programs on computers.
Character:
A byte represents a single character in the computer. One character such as A, 7, 9 and + is eight bits that are grouped together. For example, the capital letter F is represented by the binary code 01000110 that can be understood by the computer system. Eight bits grouped together as a unit are called a byte.

2.1.1.3 : Information Processing Cycle

~ Information Processing Cycle ~
Input:
Users input data or instruction to be process. Input could be either text, graphic, audio or video. Input devices are used to input data & they are any electronic device connected to a computer and produces input signals.
Process
Data or instruction being input is then processed by the CPU which controls all activities within the system. The processed data are then sent to an output device as usable data.
A CPU interprets the and carries out the instructions by processing data and controlling the rest of the computer’s components.
A CPU consists of the Control Unit (CU) & the Arithmetic Logic Unit (ALU). CU’s main function is to direct the CPU to process data by extracting instructions from memory, decodes & then executes them. The CU manages a four-step basic operation which is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing.
Storage:
Computer storage stores programs and data to be used at a later time. It also keeps current data while being processed until the information is saved in a storage media (hard disk or diskette). Computer storage also stores instructions from a computer program. There are two type of computer storage; primary storage and secondary storage.
Primary storage is known as the main memory of a computer, including RAM (Random-Access Memory) and ROM (Read-Only Memory). It is an internal memory (inside the CPU) that can be accessed directly by the processor.
Secondary storage is an external storage that refers to various ways a computer can store program and data. Many complex functions, such as translators for high-level languages and operating systems are placed in primary storage. Secondary storage is an alternative storage. It is very useful to store programs and data for future use.
Output:
Output is the result of data processing activity when it is presented external to the system. The output from a computer can be in a form for use for example printed or displayed. There are four types of output, which are texts, graphics, audio and video.

2.1.1.2 : Meaning of Input, Process, Output & Storage

Input:
Input is any data or instructions that we enter into the computer system for processing. There are four types of input: which are text, graphic, audio & video. Example of input devices are keyboard, light pen, joystick, microphone, mouse, video & digital camera.
Process:
The processing unit controls all activities within the system. The CPU is an example of a processor. It has the same important as the brain to human being.
Storage:
Storage is a location which data, instruction and information are held for future use. It is the physical material that keeps keeps data, instruction and information. There are two types of storage. They are the primary storage and secondary storage. The example of storage devices are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM.
Output:
Output is data that has been processed into a useful form, called information. There are four types of output, which are texts, graphics, audio and video. Example of output devices are monitor, printer, speaker and plotter.

Monday, April 6, 2009

Need Some Help...

aku plan nk tubuhkan Kelab Karate-do untuk KSAH..
S0,hrp smua dpt bg sokongan..
support cket²..
btw,tgh cari ahli baru ngan guru penasihat nt0k kelab nie..
sbb ari 2 pk ko-k ckp,klau nk buka kelab baru kna cari ahli rmai² dlu..
bru bley buka..

p/s : kalau Pak G bley join,sure kelab nie aktif sntiasa..huhu

- Muzakkir -

Class T-Shirt

I'm sorry because the design is not finish yet...
for your information,
Me and Syamil already sent the design to Bizandry...

After the design is finish,
The designer will call me...
And i will publish the design in this blog and to our class...
I hope you all be patient and wait for the design...

-Firdaus a.k.a Pidot-
p/s: RM10 for DEPOSIT

2.1.1.1 : Defination of Computer Systems

A computer system is defined as combination of components designed to process data & store files. A computer system consists of four major hardware components; input devices, output devices, processor and storage devices. A computer system requires hardware, software and a user to fully function.
-Pak G-

1.4.1.4 : Cooperation in Conducting Study

Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. It is not enough to just give out orders but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.
-Pak G-

1.4.1.3 : Presenting Results

Results should be presented in a clear, concise manner. A good presentation should contain three well-defined sections, they are:
1. Introduction:
  • is at the beginning of the research
  • includes the objectives of the research
  • provides a clear statement on why the study was undertaken
  • includes the limitations/assumptions and analytical techniques

2. Content:

  • consists of facts or arguments related to subject matter
  • can be presented in an argument format or just as an overview

3. Conclusion

  • is a review of content (not repetition of content)
  • relates to the statement of objectives in the introduction
  • should not introduce new issues
  • should contain judgment or decision that has been reached

-Pak G-

1.4.1.2 : The Impact of ICT on Society

The computer has change the society. People interacts directly with computer in various field to help them to do their work faster and more efficient.
Home & Education:
Computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation.
Computers for Higher Education:
Open Distance Learning or online learning can be implemented as the main medium of delivering from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example is the Open University of Malaysia.
Business:
People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions.
Computers in Banking:
Financial institutions offer online banking. People can access their financial records from anywhere. Most of the packages offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.
Industry:
By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network. Examples of companies using this system are Proton and Perodua.
Graphics & Multimedia:
Computers are crucial in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.
Communication:
Government provides society with direction by making and administering policies. Most government offices or agencies have websites to provide citizens with the latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:
1. check information on taxes (http://www.hasil.org.my/)
2. pay parking tickets and check summons (http://www.jpj.gov.my/)
3. register online for IPTA/IPTS application (www.moe.gov.my)
Computers in Tourism:
People will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights, rentals, purchase ticket online, all payments can be made by using credit card.
Computers in the Healthcare:
In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely:
1. maintaining patient records
2. monitoring patients’ vital sign
3. assisting doctors, nurses and technicians with medical tests by using computer and computerised devices .
4. using medical software to help with researching and diagnosing health conditions.
5. computers and the internet are important sources to get all information on medical, nutrition, fitness and other health tips.
6. The latest development is telemedicine which helps professional to conduct live conference in separate locations.
Science:
Computers are used in all fields from biology to astronomy to meteorology and others. Things that can be done by computers, namely:
1. collecting, analyzing and modelling data
2. serving as medium of communication with colleagues around the world
3. contributing to new inventions or breakthrough in surgery, medicine and treatment
4. imitating functions of the central nervous system, retina of the eye and others by tiny computers
5. allowing a deaf person to listen through cochlear implant
- Pak G-

1.4.1.1 : Locating Information From Various Sources

Informations are available offline and online. We can search for the information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials.
Anyway, any materials need to be evaluated in four aspects. They are relevance, reliability/credibility, perspective & update.
-Pak G-

1.3.3.2 : Applying the Correct Security Procedures

Data Protection:
We need to protect the data as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. Ways to protect the information:
• make backup files
• detect the virus and clean the computer
• warn others on virus attacks
Detecting Illegal Access To Systems:
The computer system detects any illegal access to the system. Tcpwrappers and tripwire are often used to detect any illegal access. User's access will be reviewed periodically (internal audits) by computer operations. It is to ensure detection of violations of security and unauthorised modifications to software and data .
Tcpwrappers:
Control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.
Tripwire:
Detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.
Preventing Illegal Access To Systems:
Computer systems would not allow any unauthorised users to simply access the system. Ways:
· Run anlpassword to make password cracking difficult.
· Run tcpwrappers to check if the name for an ip address can be provided by DNC
· Use a callback system to prevent unauthorised use of stolen passwords.
Preventing Illegal Root Acces:
To prevent we should have Sudo (Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. With Sudo we did not have to give out the root password.
Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user. Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.
Patch:
Patch supplies small updates to software, provided that the source code is available. It is a UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.
-Pak G-