Dunia ICT

Mengenali ICT dengan lebih dekat.

Monday, 28 February 2011

keluarga Windows

Microsoft adalah pengeluar Sistem pengoperasian yang terkenal sejak dahulu lagi. Disamping itu juga ia menjadi pilihan masyarakat untuk di jadikan OS dalam komputer peribadi mereka kerana, antara muka pengguna yang mudah digunakan serta icon yang mesra pengguna. Lihat sahaja-lah bagaimana perubahan yang ditampikan oleh microsoft dalam memenuhi hati pengguna dulu dan sekarang, berikut screen shhot yang ditampilkan bermuala dari awal windos hinggalah sekarang.. :) Realsed date: November 1985, Windows 1.0 Realsed date: November 1987, Windows 2.0 Realsed date: May 1990, Windows 3.0 Realsed date: March 1992, Windows 3.1 Realsed...

Wednesday, 23 February 2011

Intel Sandy Bridge

Sandy Bridge adalah jembatan teknologi prosesor ke masa depan. Pantas saja jika kami sebut begitu. Pasalnya, Sandy Bridge adalah perubahan terbesar yang dilakukan Intel sejak era Pentium 4.Pada mikroarsitektur sebelumnya, Intel lebih banyak mengoptimasi kinerja tiap komponen, tanpa mengubah cara kerja komponen tersebut. Jika prosesor dianalogikan sebagai sebuah rumah, Intel cuma melakukan renovasi terhadap rumah tersebut. Namun di Sandy Bridge, Intel betul-betul membangun sebuah rumah baru. Seluruh komponen diperbarui, mulai dari branch predictor, out-of-order execution, sampai kerjamemory subsystem.Namun yang terpenting adalah Sandy Bridge...

Tuesday, 22 February 2011

INTRODUCTION COMPUTER THREATS

The computer is a great tool to store important information. In certain cases, the information is very vital that losing it will harm the computer system. Computer threats can come from many ways either from human or natural disasters. For example, when someone is stealing your account information from a trusted bank, this threat is considered as a human threat. However, when your computer is soaked in heavy rain, then that is a natural disaster threat.MALICIOUS CODE Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with...

DEFINITION OF COMPUTER SECURITY

DEFINITION OF COMPUTER SECURITYComputer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.We need to protect our computer from any intruders such as hackers, crackers and script kiddie.We do not want strangers to read our e-mail, use our computer to attack other systems, send forged e-mail from our computer, or examine personal information stored on our computer such as financial statemen...

COMPUTER CRIMES

COMPUTER CRIMESA computer crime is defined as any criminal activity that is related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.COMPUTER FRAUDComputer fraud is the crime obtaining money by deceiving people through the use of computers.There are many forms of computer frauds which include:-e-mail hoaxes(an attempt to make people believe something that is not true)Program fraudinvestment schemessales promotionsclaim of expertise on certain fieldsCOPYRIGHT INFRINGEMENTCopyright infringement is defined as a violation of the rights secured by a copyright. Copyright infringement...

X Perlu Registration

Kebanyakan Lawan web sekarang memerlukan username dan password untuk melayarinya, anda terpaksa mendaftar dengan memasukkan nama, e-mel, dan sebagainya.Bagi sesetengah orang, proses pendaftaran ini adalah leceh dan menyusahkan. Kadang2 meraka akan memberikan nama dan e-mel palsu kerana tidak mahu e-mel terdedah kepada spam."Spam juga berbentuk junk mail adalah penyalahgunaan email (termasuk media penyiaran dan Email) untuk mengirim berita iklan dan keperluan lainnya. Secara umumnya, spam menampilkan email yang dihantar secara berulang tanpa diminta dan sering kali tidak dikehendaki oleh penerimanya. Pada akhirnya, spam dapat menimbulkan rasa...

Monday, 21 February 2011

CYBER LAW

CYBER LAWWhat is Cyber Law?Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.Why Need For Cyber Law?Almost all companies extensitively depend upon their computer network and keep their valuable data in electronoc form.Goverment forms including income tax return, company law forms etc are now filled in electronic form.Most people are using email, cell phones and SMS messages for communication.These concerns and issues clearly indicate why cyber laws are needed in online activities.THE CYBER LAW ACTS IN MALAYSIAThe Malaysian Government has already passed several cyber laws to control and...

THE PROCESS OF INTERNET FILTERING

INTERNET FILTERING It is our responsibility to ensure that the teenagers are protected from these corruptions of the mind by filtering access to the Internet.Internet filtering is a process that prevents or blocks access to certain materials on the Internet. It is our responsibility to ensure that the teenagers are protected from these corruptions of the mind by filtering access to the Internet. What is Internet filtering? Internet filtering is a process that prevents or blocks access to certain materials on the Internet. Filtering is most commonly used to prevent children from accessing inappropriate material and to keep employees...

CONTROVERSIAL CONTENT

CONTROVERSIAL CONTENTA controversial content is information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different viewsISSUES ON CONTROVERSIAL CONTENTSThe issues on controversial contents are always focusing on pornography and slander. Malaysia considers pornography and slander as illegal.Pornography Creative activity (writing or pictures or films etc.) of no literary or artistic value other than to stimulate sexual desire.Slander Oral communication of false statements injurious to a person's reputation.A false and malicious statement or report about someone.DEFINITION...

VERIFICATION

VERIFICATIONVerification is the act of proving or disproving the correctness of a system with respect to a certain formal specification. METHODS OF VERIFICATION There are two methods commonly used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone. USER IDENTIFICATIONThe examples of validating process using the user identification are: Key in the user name to log-in to a system and the system will verify whether the user is valid or invalid userShow...

Team View

NETWORK 1.Install perisian Komputer Dari Jarak Jauh.Dengan mengunakan TeamView ,kita boleh melakukan banyak aktiviti pada komputer pengguna yang lain dari jarak jauh disampiang itu juga ia boleh mengawal 80% sistem komputer penguna lain daripada komputer pelayan. Perisian ini juga membolehkan pelayan untuk meng-install perisian pada komputer penguna.2.Storan Maya.Teamview membenarkan pengguna kedua untuk mengawal storan.*share application software, utility and other 3.Membaik Pulih Sistem Komputer.teamview itu pengguna boleh mengawal 80% sistem komputer tersebut serta boleh mengawal control panel,run dan sebagainya. Disamping itu juga perisian...

Friday, 18 February 2011

Kongsi Masalah Komputer

Senario PermasalahanFahmi telah menformat komputer-nya berdasarkan buku yang dibelinya beberapa hari yang lalu tetapi selepas memformat, fahmidapati komputer-nya selalu tiba-tiba “shut down” semasa sedang melakukan kerja atau menginstall apa-apa software. Fahmicuba memformat sekali lagi dan beberapa kali komputer “shut down” sendiri sebelum selesai.Sampai sekarang keadaan masih serupa Tetapi komputer masih boleh on jika fahmi menutup semua supply dan on kembali selepas beberapa minit. Button “stand by”semasa ingin shut down juga tak aktif.Jawapan: Pada pendapat saya komputer yang telah diformat jarang berlaku masalah seperti ini. Komputer...

Thursday, 17 February 2011

Tingkatkan Virtual Memori

Virtual Memory low adalah disebabkan kekurangan memori komputer untuk load dan run sesuatu program, ia berlaku apabila physical memory anda habis digunakan, secara amnya terdapat virtual memory yang berkapasiti kecil terdapat di local disk anda.Cara terbaik utk mengatasinya adalah dgn menambah kapasiti RAM anda, kapasiti yg anda perlukan terpulang kepada tahap penggunaan, untuk XP, 1Gb untuk kegunaan kasual sudah memadai manakala untuk Vista dan Windo 7adalah 2Gb. Walaubagaimanapun, tetap ada alternatif lain, iaitu dgn memberikan lebih ruang utk virtual memory (guna ruang dari hard disk).Cara-caranya :-Right Click "My Computer" - "Properties"Di...

Wednesday, 16 February 2011

AUTHENTICATIONS

AUTHENTICATIONS Authentication is a process where users verify that they are who they say they are. The user who attempts to perform functions in a system is in fact the user who is authorised to do so. For Example : When you use an ATM card, the machine will verify the validation of the card then the machine will request for a pin number. This is where the authentication process takes place. METHODS OF AUTHENTICATION There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with...

PRIVACY IN COMPUTER USAGE

WHAT IS PRIVACY? Privacy in IT refers to data and information privacy. Data refers to a collection of raw unprocessed facts, figures and symbols. Then, computer is used to process data into information. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them. WAYS COMPUTER TECHNOLOGY THREATEN OUR PRIVACY Every time you click on an advertisement or register a software product online, your Information is entered into a database. Computer technology can also threaten...

INTELLECTUAL PROPERTY RIGHTS

DEFINITION OF INTELLECTUAL PROPERTY Intellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place. In our daily lives, we are surrounded by things that are protected by IP. Your school bags, your shoes and even your socks are protected by Intellectual Property rights. Nike, Bata or Adidas, for example, are all protected by a group of legal rights. INTELLECTUAL PROPERTY LAW Intellectual Property laws cover ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes and more. INVENTIONS PROTECTED...

THE DIFFERENCES BETWEEN ETHICS AND LAW

DEFINITION OF ETHICS In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. DEFINITION OF LAW Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority. Law differs from one country to another. In the era of technology, computer law is needed to clarify goods or actions that fall under the computer law. Computer law refers to all areas in law that requires...

Pages 291234 »

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More