Monday, October 26, 2009

The True 4 Alfa...!!! One for all, All for one...

in this picture : chip , khairil , amir , choka , munet , pavi , aizudin , hakim , peyek , kert , jelok , syaamil , pidot , wak , qutub , syamil izudin

missing in this picture : all the chinese students , shuk , afiq , amirul ashraf , fathi , azrie , shafiq bariz , aisamudin , hafiz rohaimi .
-This picture was taken on 26.10.2009...
-The location is... i think you guys already know...
-Someone 'sesat'....try to find him...
-like '1 Malaysia a.k.a 1 Kolej'




- kert ,pidot-

Friday, October 23, 2009

2.3.3.1 Differentiate between the types and usage of utility programmes (file management, diagnostic & file compression).

Utility programs (also known as service programs) perform maintenance-type tasks related to the managing of a computer, its devices, @ its programs. They provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software. However they may also be bought separately as external utility programs such as Norton SystemWorks and McAfee Utilities.
File Manager:
It is used to manage files on a disk. It provides functions to delete, copy. move, rename and view files as well as create and manage folders. It performs tasks of formatting and copying disks, displaying a list of files on a storage medium, checking the amount of used or free space on a storage medium, organising, copying, renaming, deleting, moving and sorting files and also creating shortcuts.
Diagnostic Utility:
It compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems.Information in the report assists technical support staff in remedying any problems.
Disk Defragmenter:
It reorganises the disk so that the files are stored in contiguous sectors. A fragmented disk has many files stored in non-contiguous sectors. Defragmenting will speeds the access time.
Data Compression:
It removes redundant elements, gaps and unnecessary data from a computer’s storage space so that less space is required to store or transmit data. Compressed files are sometimes called zipped files and it must be unzipped before being used. Two popular file compression utilities are PKZIP and WinZip.

2.3.2.2 Describe the uses of Application Software

Usages of Word Processing Software:
It allows users to create and manipulate documents containing mostly text and sometimes graphics. It provides the ability to create, check spelling, edit and format a document on the screen before printing it to paper. The software can be used to produce documents such as letters, memos, reports, fax cover sheets, mailing labels, newsletters, and web pages. Eg: Microsoft Word, StarOffice Writer, TexMaker and Corel WordPerfect.
Usages of Spreadsheet Software:
It is an application that allows users to organise and manipulate data in rows and columns. It produces worksheets that require repetitive calculations – budgeting, maintaining a grade book, balancing accounts, tracking investment, calculating loan payments, estimating project costs and preparing financial statements. Eg: Microsoft Excel, Corel Quattro Pro and Sun Staroffice Calc.
Usages of Presentation Software:
It is an application that allows users to create visual aids for presentations to communicate ideas, messages and other information to an audience. Eg: Microsoft PowerPoint, StarOffice Impress and CorelDraw.
Usages of Graphics Software:
It is an application that allows users to work with drawings, photos and pictures. It provides the users the ability of creating, manipulating and printing graphics. Eg: Microsoft Paint, Adobe Photoshop, Adobe Illustrator, Corel Painter and Macromedia Fireworks.

Wednesday, October 21, 2009

Berbangga

Pak G masih ingat pada awal tahun yang lalu, ada di kalangan kita menganggap bahawa kelas Alfa adalah kelas yang paling terut di kalangan kelas-kelas lain. Persepsi tersebut ternyata tidak benar.
Malah Pak G is VERY PROUD kerana:
1. Yang menang pertandingan mencipta logo adalah dari kelas kita.
2. Bila nak buat pertandingan yang baru (mencipta kulit majalah), pengetua menyuruh Pak G memberitahu budak-budak IT (4 Alfa la tu ...) & bukan kelas lain.
3. Pak G juga is very happy melihat presentation team Formula One - dimonopoli oleh geng 4 Alfa. To them Pak G doakan kejyaan & best of luck.
4. Cikgu-cikgu yang mengajar anda dah mula "cayang" kat kelas kita. Cuba baca post yang Pak G buat sebelum ini dengan tajuk "Lu Pikir La Sendiri"
So guys keep our name high.
Note:
Bagaimana perkembangan lawatan ke Cameron??? Any problem jumpa Pak Anas. Jumpa Pak G pun OK juga.

Another Competition


There will another competition. This time it will be on designing the front cover for our 2009 school magazine, "Darulaman" for the year 2009. Pengetua told me this morning.
I'm drafting the details about the competition & will be publish at our school web site after getting aproval from our Pengetua. I'm not very sure when, but just keep in touch regularly to our school web site. I hope you will participate.
Note:
Pak G would like to take this opportunity to congratulates (those who won) & thanks (those who participate) for the previous "1 Kolej" competition.

2.3.2.1 State the types of application software (word processing, spreadsheet, presentation, graphic)

Application software is a computer program or a suite of computer programs that performs a particular function. Application software includes all programs that perform specific tasks for user such as word processing, spreadsheet, database, presentation, e-mail and web browsing.

2.3.1.3 State the different interfaces of OS

The three type of user interface are: (1) Command-Line; (2) Menu-Driven; & (3) Graphical User Interface.
Command-Line User Interface
This interface requires users to type commands or press special keys to enter data & instructions that instruct the OS what to do. It has to be typed one line at a time.
It is difficult because it requires exact spelling, syntax or a set of rules of entering commands & punctuation.
We must observe the complicated rules of syntax that specify exactly what you can type in a given place. This interface also requires memorisation. The advantage is, it helps the user to operate the computer quickly after memorizing the keywords and syntax.
Menu Driven Interface
Menu-driven user interface enables the user to avoid memorizing keywords such as copy, paste and syntax. On-screen, menu-driven interface provide menus as means of entering commands. It shows all the options available at a given point in a form of text-based menu. Menu-driven user interfaces are easy to learn.
Graphical User Interface (GUI)
GUI makes use of the computer’s graphics capabilities to make the OS & programs easier to use (user-friendly). GUIs are used to create the desktop that appears after the operating system finishes loading.
We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at their desktops. GUI with menus and visual images such as buttons, icons and other graphical objects to issue commands.
On the desktop, we can initiate many actions by clicking icons that represent computer resources such as files, programs and network connections.

2.3.1.2 State the functions of OS

The main functions of OS are (1) starting a computer; (2) providing a user interface; (3) managing data & program; (4) managing memory; & (5) configuring devices.
Starting the Computer
OS is used to start the computer. This process is called booting - to load & initialize the os. It can happen in two ways: warm boot or cold boot.
A warm boot means restarting a computer that is already on - usually after installing a new software or hardware or after an application crashes or stops working.
A cold boot means starting a computer that is already off @ completely powered off.
Providing a User Interface
This function controls how the user enters data and instruction & how information is displayed. The three type of user interface are (1) Command-Line; (2) Menu-Driven; & (3) Graphical User Interface . The user interface typically enables users:
  • to start an application program
  • to manage disks and files such as formatting, copying & renaming
  • to shut down the computer safely by following the correct procedures

Managing Data & Programs
When we start an application, the CPU loads the application from storage into memory. In the early days, single-tasking OS could run only one application at a time. Multitasking os enable users to work with two or more application programs at the same time.
Managing Memory
The computer's OS is responsible for managing memory such as:

  • optimizing the use of RAM
  • allocating data & instruction to an area of memory while being processed·
  • monitoring the contents of memory
  • releasing data & instructions from being monitored in memory when the process is done

Configuring Devices
Another function of an OS is handling & enabling communication with input and output devices. Most OS come with drivers for popular input & output devices. These drivers install new devices & check whenever there is conflict with these devices.

2.3.1.1 State the various types of OS used on different platforms.

The examples of OS used on PC platforms or IBM compatible computers are (1) Disk Operating System (DOS) & (2) Microsoft Windows XP.
DOS used a command line interface when Microsoft first developed it. Microsoft Windows XP’s operating environment is a Graphical User Interface (GUI). Both are closed source software.
The OS used on Apple platforms are Mac OS & Mac OS X. It is a closed source software & are targeted for use with home desktops and workstations.
Mac OS X is a multitasking OS & targeted for use with home desktops, workstations & servers. It has better security protection compared to Mac OS, for example the integrated firewall utility.
Cross-platforms OS are (1) UNIX & (2) LINUX. UNIX is a multitasking OS. Some versions of UNIX have a command line interface but most versions of UNIX offer a graphical user interface.
Linux is a popular, free, UNIX-like graphical user interface OS. It is an open source software. Linux provides a great deal of liberty to those that interact with Linux technology. Although Linux runs on many kinds of equipment, it is best known for its support of IBM-Intel PC-based hardware.

2.2.4.1 Explain types and functions of Secondary Storage

Secondary storage can be divided into: (1) magnetic medium; (2) optical medium; & (3) flash memory.
Magnetic Medium:
It is a non-volatile. It can be any type of storage medium that utilizes magnetic patterns to represent information. The devices use disks that are coated with magnetically sensitive material. The examples of magnetic storage are:
(a) magnetic disk such as: (1) a floppy disk, used for off-line storage; (2) hard disk, used for secondary storage.
(b) magnetic tape; including video cassette, audio storage reel-to-reel tape & others.
Optical Medium:
It is a non-volatile storage that holds content in digital form that are written and read by a laser. These media include various types of CDs and DVDs.
These following forms are often commonly used:
(a) CD, CD-ROM, and DVD: Read only storage, used for distribution of digital information such as music, video and computer programs.
(b) CD-R: Write once storage, the data cannot be erased or written over once it is saved.
(c) CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data that have been saved to be erased and rewritten.
The disk capacity is more compared to magnetic media. Durability is another feature of optical media. They are able to last for up to seven times as long as traditional storage media.
Flash Memory:
It is a solid-state, non-volatile, rewritable memory that functions like RAM and a hard disk drive combined. Flash memory store bits of electronic data in memory cells just like DRAM. It works like a hard disk drive that when the power is turned off, the data remains in the memory. Flash memory cards & flash memory sticks are examples of flash memory.
Flash memory cards are also used with digital cellular phones, MP3 players, digital video cameras and other portable digital devices.
Flash memory is also called USB drives, thumb drives, pen drives or flash drives. The advantages: it offers fast reading access times, durable & requires low voltage. It is light & small.
The disadvantage: it is more expensive than the magnetic disk of the same capacity.

Tuesday, October 20, 2009

2.2.4.1 Explain types and functions of Primary Storage

Primary storage is the main memory in a computer. It stores data and programs that can be accessed directly by the processor. There are two types of primary storage which are (1) RAM (Random-Access Memory); and (2) ROM (Read-Only Memory).

RAM:
  • RAM is installed inside computers. RAM is also known as a working memory.
    The data in RAM can be read (retrieved) or written (stored).
  • It is volatile (the programs & data are lost when the computer is powered off).
  • Computer uses RAM to hold temporary instructions & data needed to complete tasks. This enables CPU to access instructions and data stored in the memory very quickly.
  • RAM stores data during and after processing.

ROM:

  • ROM is another type of memory permanently stored inside the computer.
  • It is non-volatile (holds the programs and data when the computer is powered off).
  • Programs in ROM have been pre-recorded by the manufacturer. Once it is done, it cannot be changed.
  • Many complex functions, such as start up operating instructions, translators for high-level languages & operating systems are placed in ROM memory.
  • All the contents in ROM can be accessed and read but cannot be changed.

ICT Notes

Hi guys,
Please update your ICT notes. The following posts are the continuation of the previous notes. I will collect your ICT notebook before your final exam.
-Pak G-

Lu Pikirlah Sendiri

Berikut ialah pengalaman yang Pak G alami dengan your Math teacher (kini guru kanan sains) pada petang 20/08/09 yang lalu ketika sedang menguruskan perubahan jadual waktu. Ceritanya begini:
Pihak sekolah mengalami masalah untuk mendapatkan guru yang akan mengajar Matematik di Tingkatan 6. Pengetua mencadangkan your Math teacher. Pengetua terus telefon untuk mendapatkan persetujuan. Your Math teacher menolak. Beliau kemudiannya sms Pak G meminta tolong agar beliau tidak mengajar Tingkatan 6.
Pak G membalas sms dengan mengatakan yang Pak G tidak ada kuasa. Beliau kemudiannya membalas sms tersebut dengan mengatakan dia sangat berharap pertolongan Pak G kerana dia SAYANGKAN kelas 4 Alfa. Katanya lagi beliau ada program dengan 4 Alfa. Pak G tunjukkan sms tersebut kepada Pengetua & dia akhir bersetuju & cadangan tersebut dibatalkan.
So guys ... lu pikirlah sendiri how to treat your Math teacher.
- Pak G -

Wednesday, October 14, 2009

Network Topology

I took the given notes from Khairil Hafiz's blog. He responded to what I asked during our ICT class. Thanks, Khairil Hafiz. So guys, please read.
NETWORK TOPOLOGY
Introduction:
Arrangement and configuration of cables, computers and other peripheral devices is called network topology. Topology may be a physical or logical depending on the network. There are different types of topologies used in networking. These are bus topology, star topology, ring topology, tree topology, and hybrid or mix topology. Bus topology consists of backbone cable and nodes. Each node is connected with central cable. Bus topology is very easy, simple and inexpensive than other topologies. Star topology consists of central device called hub or connector. All computers in star topology are directly connected to central devices. All functions are control and manage by central device. Star topology is very easy to install but it is expensive due to the cost of central device. Tree topology is combination of star and bus topologies. Group of star configured computers are connected to a central cable or backbone cable like bus topology. This network is very easy to extend and facilities the organizations to meet their requirements. Tree topology is mostly supported by number of hardware and software manufacturers. In tree topology if central cable breaks then all the nodes goes down. Hybrid or Mix topology is combination of different topologies such as star bus topology, star of star, star wired ring, hybrid mesh.
Bus Topology:
Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.
Ring Topology:
In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.
To implement a ring network, one typically uses FDDI, SONET or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
Star Topology:
Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switchor router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Tree Topology:
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology:
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
source : http://compnetworking.about.com/od/networkdesign/a/topologies.htm
- Pak G-

Lawatan Ke Cameron

Pak G harap lawatan tersebut dapat sokongan daripada semua pihak. Dengar khabar ada rakan-rakan kita tak mau pergi. Don't like that ma ... Show other that we (our class) are:
One for all, all for one
-Pak G-

Friday, October 9, 2009

Duit Lawatan

Duit Lawatan sekarang sudah boleh dikumpul.
Berdasarkan pidot,harga sekarang ialah RM 50.Tertakluk kepada sebarang perubahan.