WIndows 8

New Microsoft OS.

Majalah PC

"Majalah Pc" is Malay version of ICT magazine that have many useful information about computer.

LiveWatch V

Telefon Pintar sebagai Jururawat.

Bitdefender Antivirus and Internet Security 2013 software and key

You can download for free. The key is cheap.

Tuesday, 31 July 2012

The ethical and social issues in cyberspace of ICT and multimedia: privacy, obscenity, defamation, Internet and information security, Internet and computer crime.

Defamation

Defamation is a false statement related to someone's reputation published with fault, often as a result of malice or negligence. Defamation is defined under state law, so the considerations related to defamation will vary in every state. Slander is spoken defamation; libel is written defamation. In the context of the Internet, libel is the applicable cause of action, as statements published on the internet are similar to written defamation. Although statements on YouTube and other services are spoken, the online publication of these statements renders them more similar to defamation than libel.


Obscenity

An obscenity is any statement or act which strongly offends the prevalent morality of the time.The definition of what constitutes obscenity differs from culture to culture, between communities within a single culture, and also between individuals within those communities. Many cultures have produced laws to define what is considered to be obscene, and censorship is often used to try to suppress or control materials that are obscene under these definitions. In a legal context, the term obscenity is most often used to describe expressions (words, images, actions) of an explicitly sexual nature. As such censorship restricts freedom of expression, crafting a legal definition of obscenity presents a civil liberties issue.


Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive.




Internet and Information security

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.




Internet and computer crime

Computer crime refers to any crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Translate into BM :

Majalah PC

The Laptop That Turns Into a Tablet

This is the Lenovo's IdeaPad Yoga that turn Laptop into a Tablet. Watch this video for more information about the Lenovo's IdeaPad Yoga. 


For more information about this product, please visit this website:

Monday, 30 July 2012

SQL – Joining two or more tables


A database consists of three relations, namely STUDENT, ENROLL and LECTURE. The data for these relations is given by the following tables:

Express each of the following queries in SQL and also write the answer of the query
1)      List major of all students.
2)      For each student, list his/her name and the code all courses he/she enrolls in
3)      List the lecture time for all courses enrolled in by the student whose name is Jamal
4)      List the name and major of all the students who do not enroll in any course.


ANSWER

  1) SELECT DISTINCT Major
FROM STUDENT;

Economy
Communication
Management
Computer Sc
Mathematic

2) SELECT Name, Code
          FROM STUDENT, ENROLL
                  WHERE STUDENT.Stud_id= ENROLL.Stud_id;

Jamal
ECO4405
Putih
COM1200
Bakar
ECO4405
Bakar
SAK2500
Remi
COM2000
Remi
MTK4100
Remi
SAK2500


  3) SELECT Time                        
      FROM STUDENT S, ENROLL E, LECTURE L
            WHERE S.Stud_id = E.Stud_id AND E.Code= L.Code AND Name=’Jamal’;

MWF3

4)      SELECT Name, Major
FROM STUDENT
      WHERE Stud_id NOT IN
                  (SELECT Stud_id FROM ENROLL);
Gibson
Management
Rohaya
Computer Sc

TRIAL ICT SPM STATE 2011

Just Click to download the files you like : 


P/s : we are not responsible the files you are download in term of content, suitability or any damage. 

Question Bank : ICT SPM

Just click to download the files you want.

ICT SPM

PASSING ARRAYS TO FUNCTIONS

The following program demonstrates how to pass an array to a function.

/* example program to demonstrate the passing of an array */
 #include <stdio.h>
 int maximum( int [] );          /* ANSI function prototype */

 int  maximum( int values[5] )
 {
  int  max_value, i;
  
  max_value = values[0];
  for( i = 0; i < 5; ++i )
   if( values[i] > max_value )
    max_value = values[i];
  
  return max_value;
 }
 
 main()
 {
  int values[5], i, max;
  
  printf("Enter 5 numbers\n");
  for( i = 0; i < 5; ++i )
   scanf("%d", &values[i] );
  
  max = maximum( values );
  printf("\nMaximum value is %d\n", max );
 }


 Sample Program Output
 Enter 5 numbers
 7 23 45 9 121
 Maximum value is 121
 

Note: The program defines an array of five elements (values) and initializes each element to the users inputted values. The array values is then passed to the function. The declaration

 int  maximum( int values[5] )
defines the function name as maximum, and declares that an integer is passed back as the result, and that it accepts a data type called values, which is declared as an array of five integers. The values array in the main body is now known as the array values inside function maximum. IT IS NOT A COPY, BUT THE ORIGINAL.
This means any changes will update the original array.
A local variable max_value is set to the first element of values, and a for loop is executed which cycles through each element in values and assigns the lowest item to max_value. This number is then passed back by the return statement, and assigned to max in the main section.

7 Pesaing iPad

Kehadiran iPad baru mencetus fenomena malah mendapat sambutan luar dugaan diseluruh dunia. Sehingga hari ini, dilaporkan lebih 3 Juta unit iPad telah dijual diseluruh dunia 



Layar Teknologi Retina serta sambungan 4G LTE ( Long Term Evolution) menjadi fungsi utama dalam tablet pintar ini. Walaupun mendapat sambutan dan ramai yang bermimpi mimpi memilikinya, ada beberapa tablet yang dianggap ancaman serius dan pesaing rapat iPad terbaru ini. 










Berikut disenaraikan tablet yang menjadi saingan iPad dari segi harga dan kebolehan teknologi yang dilaporkan.


1. Asus Padfone 
Gajet hebat ini adalah gabungan tablet dan telefon pintar. Tablet ini beroperasi dengan OS Android 4.0, layar Super Amoled qHD serta processor dual core Snapdragon S4.
















2. Samsung Galaxy Note 10.1 
Tablet ini juga mempunyai stylus S Pen untuk melakukan pelbagai fungsi menarik seperti mencatat atau mengedit gambar.
Spesifikasi Galaxy Note 10.1 seperti 
-layar resolusi 1280x800, 
-processor dual core Exynos 1, 2GHz
-kamera belakang 3 MP dan kamera depan 2 MP
-sistem operasi Android 4.0
-Wifi serta HSPA+


3. Toshiba Excite X10


Toshiba Excite X10 memiliki ketebalan 0.76 cm dengan berat 0.5 kilogram. Beratnya ini hanya lebih beberapa gram daripada Lenovo Idea Tab S2. Tablet ini dilengkapi dengan :

-prosesor T1oMAP 4330 dual core 1.2 GHz
-RAM 1 Gb 
-kamera belakang 5 MP dan kamera depan 1.3 MP 

4. Lenovo Idea Pad S2


Tablet ini memiliki keyboard dock yang boleh disatukan dengan senang ke rangka utamanya seperti Asus Transformer. Tablet ini dibekalkan dengan :

-kamera 5MP
-OS Android 4.0 
-Prosesor Dual Core




5. Asus Transformer Pad Infinity 700


Tablet ini termasuk tab android yang paling laris di pasaran ketika ini, dibekalkan dengan prosesor quad core Nvidia Tegra 31.6 GHz dan memori dalamannya tersedia dalam dua pilihan iatu 32 GB dan 64GB. Masih boleh ditambah slot Micro SD sehingga berkapasiti 32 GB 














6. LG Optimus Pad Lite 





Tablet ini menawarkan layar True HD IPS berukuran 8.9 inci dibekali dengan prosesor dual core Qualcomm 1.5 GHz dan kamera 8MP





7. Sony Tablet P

Tablet ini memiliki dua skrin masing-masing berukuran 5.5 inci dan tablet ini boleh dilipat. Seperti buku, ukurannya cukup kompak dan boleh diletakkan dalam saku

Sony P boleh menampilkan dua halaman berbeza di kedua skrin seperti dipakai membaca e-book. Sony P diperhebatkan dengan prosesor Nvidia Tegra 2, kamera depan dan belakang serta sambungan WiFi dan LTE.





Dipetik drpd Berita Harian
:http://www.bharian.com.my/bharian/articles/7pesaingIPad/Article

Telefon Pintar sebagai Jururawat



Sebuah gajet yang hebat tidak hanya didatangkan dengan satu fungsi saja. Sebaliknya ada mempunyai pelbagai fungsi tambahan yang mampu membuatkan pengguna memiliki gajet semua dalam satu.

LiveWatch V iaitu telefon pintar Android beruaya menggabungkan rangkaian sensor yang berfungsi untuk memeriksa kesihatan penggunanya.

Dengan kata lain, memiliki teleon pintar ini seperti memiliki jururawat peribadi.

Selain boleh memeriksa kesihtan penggunanya, Live Watch V turut mempunyai aplikasi yang lain seperti laman sosial dan permainan video

Dengannya anda juga boleh melakukan beragam ujian kesihatan seperti pemantauan ECG, tekanan, denyut nadi, denyut jantung, peratusan lemak dan suhu tubuh.

Penghidap diabetes, boleh memanfaatkan LiveWatch V untuk memantau kandungan monitor glukos dalam darah dengan menambahkan alat stripetes dan jarum

Livewatch V
- Boleh mengesan suhu badan
-Memantau kandungan glukos dalam darah
- Dilengkapi aplikasi laman sosial

Dipetik dari Berita Harian:
http://www.bharian.com.my/bharian/articles/Telefonpintarsebagaijururawat/Article

Laptop 2 Dalam 1


Fujitsu memperkenalkan produk terbarunya, laptop mudah alih, Lifebook T902 yang boleh berubah bentuk menjadi tablet dilengkapi spesifikasi teknologi yang hebat.

Skrin sentuh kaca berukuran 13.3 inci HD+ (1.600◊900 piksel) membolehkan anda menyentuh secara serentak dengan sepuluh jari. 


Skrin ini dilengkapi dengan lapisan pelindung Gorilla Glass, paparan skrin lebar anti-glare, anti-microbial, spill-resistant keyboard dan trackpad. Pada bahagian prosesor, ia didatangkan dengan dua pilihan iaitu Intel Core i5 ataupun core i7 iVy Bridge (prosesor intel generasi ketiga). Selain itu, laptop ini juga menyokong RAMsehingga 16 GB DDR3-1600 MHz.

Anda juga boleh menggunakan HDD tambahan ataupun bateri tambahan.

Sebagai fungsi tambahan, laptop ini dilengkapi beberapa elemen lain seperti Smart Card, pengesan jari biometric, HDD dan perlindungan kata laluan, Computrace support, Anti kecurian Intel dan sebuah panel sekuriti.

LIFEBOOK T902 − Skrin berukuran 13.3 inci
− RAM sehingga 16 GB
− Menggunakan pemprosesan Intel Core i5


Dipetik Drpd Berita Harian 
http://www.bharian.com.my/bharian/articles/Laptop2dalam1/Article

Sunday, 29 July 2012

2 penggodam ditahan polis

SEOUL: Polis Korea Selatan menahan dua penggodam internet yang mencuri 8.7 juta data peribadi pelanggan syarikat telekomunikasi selular kedua terbesar negara ini.
KT Corporation berkata, penggodam yang ditahan secara rasmi semalam, mencuri data seperti nama, nombor telefon dan alamat pelanggan yang didaftarkan, selama lima bulan sejak Februari lalu dan menjual maklumat itu kepada firma telepemasaran.

Jurucakap KT berkata, “Jumlah mangsa hampir separuh daripada kira-kira 17 juta pelanggan kami.”

Dia berkata, syarikat telah membuat laporan polis pada 13 Julai lalu selepas mengesan kesan penggodaman.


Agensi berita Yonghap memetik polis sebagai berkata, dua penggodam, seorang daripadanya bekas pengaturcara veteran di syarikat teknologi maklumat tempatan, memperoleh pendapatan sekurang-kurangnya 1 bilion won (RM2.8 juta) dengan menjual maklumat yang dicuri.

Tujuh lagi turut ditahan kerana membeli maklumat curi untuk digunakan dalam telepemasaran, lapor Yonhap.

“Kami memohon maaf kerana gagal menyimpan maklumat peribadi anda yang sangat penting... kami akan cuba sedaya upaya untuk memastikan ia tidak berlaku lagi,” kata KT dalam satu kenyataan kepada pelanggan.

Serangan penggodam komputer ke atas syarikat besar untuk mendapatkan akses data peribadi pelanggan mereka sering berlaku di Korea Selatan, satu daripada negara dunia yang paling banyak menggunakan internet.

Pihak berkuasa Seoul berkata pada Julai tahun lalu, penggodam menggunakan alamat Internet yang didaftar di China untuk mengakses laman web besar di Korea Selatan termasuk laman portal Nate.com dan mungkin telah mencuri kira-kira 35 juta data peribadi pengguna.

Pada 11 November tahun lalu, pembina permainan terkenal di Seoul, Nexon mendapati maklumat peribadi 13 juta pengguna di laman web permainan popular, MapleStory, dicuri penggodam. - AFP
Artikel ini disiarkan pada : 2012/07/30

DLINK - DNS-320 ShareCenter Pulse

 

Safely Share Digital Files Locally and Over The Internet

The ShareCenter Pulse 2-Bay Network Storage, when used with internal SATA drives*, enables users to share documents, files, and digital media such as music, photos, and videos with other users on a home or office network. Remotely accessing files through the Internet is also possible using the built-in secure FTP server and web file server. Keep data safe by giving rights to specific users or groups and assign them to folders with specific read/write permissions. This function is ideal for the home, where childrens access can be restricted to only age-appropriate materials.

References : http://www.dlink.com.my/products/?idproduct=477&type=business&idCategory=255&product=business

ICT Notes for Form 4 and Form 5

These notes and worksheets are from the courseware that has been converted to word documents by my friend Ramadan, ICT teacher from SMK Pekan, Pahang. Click on the link to download the notes.

Form 4

  1. CD 1 - ICT
  2. CD 2 - ICT
  3. CD 3- Computer System
  4. CD 4 -Computer System
  5. CD 5 - Networking
  6. CD 6 - Networking
Form 5
  1. CD 1-  Programming
  2. CD 2 - Programming  - VB
  3. CD 3 - Multimedia
  4. CD 4 - Multimedia - ToolBook
  5. CD 5- Information System
  6. CD 6 - Information System - Ms Access
 HOW TO DOWNLOAD :





Saturday, 28 July 2012

STPM : Marks and Grade


Marks

Grade

NGMP

75-100

A

4

70-74

A-

3.65

60-69

B+

3.33

55-59

B

3

50-54

B-

2.67

45-49

C+

2.33

40-44

C

2

35-39

C-

1.67

30-34

D+

1.33

25-29

D

1

0-24

F

0

The purpose of acts that govern the usage of ICT and multimedia in Malaysia: Communication and Multimedia Act 1998, Computer Crimes Act 1997, Telemedicine Act 1997 and Digital Signature Act 1997;

CYBERLAWS 

The following is only a brief description of the Cyberlaws enacted to-date as part of the initiative to take Malaysia into the e-World. The hyperlinks below will lead you to off-site resources for more detailed information, the accuracy of which is not vouched for by the NITC.

Digital Signature Act 1997
(http://www.agc.gov.my/agc/Akta/Vol.%2012/Act%20562.pdf)
Why the Act exists
Transactions conducted via the Internet are increasing. As identities in cyberspace can be falsified and messages tampered with, there is a need for transacting parties to ascertain each other's identity and the integrity of the messages, thereby removing doubt and the possibility of fraud when conducting transactions online.
What the Act is about
The Act mainly provides for the licensing and regulation of Certification Authorities (CA). CAs issue Digital Signatures and will certify the identity (within certain limits) of a signor by issuing a certificate. The Act also makes a digital signature as legally valid and enforceable as a traditional signature. The Digital Signature Act was brought into force on 1st October 1998.

Computer Crime Act 1997
(http://www.agc.gov.my/agc/Akta/Vol.%2012/Act%20563.pdf)
Why the Act exists:
As computing becomes more central to people's life and work, computers become both targets and tools of crime. This Act serves to ensure that misuse of computers is an offense.
What the Act is about
The Act makes it an offense to:
1. Enter or attempt to enter into computers and computer systems without authorization
2. Damage or alter data/information in computers or computer systems by planting viruses or other means
3. Aid people in doing items 1 & 2
4. Give passwords to people who are not authorized to receive it
The Computer Crimes Act was brought into force on 1st June 2000.

Telemedicine Act 1997
(http://www.agc.gov.my/agc/Akta/Vol.%2012/Act%20564.pdf)
Why the Act exists
Healthcare systems and providers around the world are becoming interconnected. People and local healthcare providers can thus source quality healthcare advice and consultation from specialists from around the world, independent of geographical location. Conversely, interconnectivity also allows for non-quality healthcare advice and consultation from around the world. The Act serves to regulate the practice of teleconsultations in the medical profession.

What the Act is about
The Act provides that any registered doctor may practise "telemedicine" but other healthcare providers (such as a medical assistant, nurse or midwife) must first obtain a license to do so.

The Copyright (Amendment) Act 1997
(http://www.agc.gov.my/agc/Akta/Vol.%207/Act%20332.pdf)
Why the Act exists
Copyright serves to protect the expression of thoughts and ideas from unauthorized copying and/or alteration. With the convergence of Information and Communication Technologies (ICT), creative expression is now being captured and communicated in new forms (example: multimedia products, broadcast of movies over the Internet and cable TV). These new forms need protection.

What the Amendment Act is about
The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. There is now clear protection accorded to multimedia works. The transmission of copyright works over the Internet now clearly amounts to infringement. Technological methods of ensuring works and authorship info are not altered or removed is also protected. The Copyright (Amendment) Act 1997 was brought into force on 1st April 1999.

The Communications and Multimedia Act 1998
(http://www.agc.gov.my/agc/Akta/Vol.%2012/Act%20588.pdf)
Why the Act exists
Convergence of technologies is also resulting in the convergence of the following industries: telecommunications, broadcasting, computing and content. Previously, each of these industries was regulated by several different pieces of legislation (example: the Telecommunications Act 1950 and the Broadcasting Act 1988). The old regulatory framework cannot cope with convergence and inhibits the growth of the new converged industry.

What the Act is about
The CMA provides for a restructuring of the converged ICT industry. It creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. Though intended to allow the converged ICT industry to be self-regulating, the Act also provides for the existence of the Communication and Multimedia Commission (the roles and powers of which are more clearly defined by the Communications and Multimedia Commission Act 1998) as a new regulatory authority to oversee the converged ICT industry. The Communications and Multimedia Act was brought into force on 1st April 1999.

The Electronic Government Activities Act 2007
(http://www.mampu.gov.my/mampu/pdf/aktaegaabi.pdf)
To facilitate the electronic delivery of government services to the public.

 Reference :
http://nitc.mosti.gov.my/portalnitc/index.php?option=com_content&view=article&id=145:cyberlaws-in-malaysia&catid=2:national-ict-policies&Itemid=109

Multimedia Flow Chart : Example

Over of the project in the flow chart : Each section / module must be related to each module of storyboard.

Multimedia Storyboard : Example 2

This storyboard is sketch using word processing (ex: ms word). Each modules are related with each other.

Multimedia Storyboard : Example 1

Design the storyboard and the navigation scheme. Include a template design if
appropriate and specify the hyperlinks.






Friday, 6 July 2012

Mobile88

Mobile88

Mobile88 is a website to get information about handphone like handphone price, handphone specification and other information about handphone. If you are planning to buy handphone, try this website to compare the prices between handphone.



                                                                    www.mobile88.com

Start Page

Start Page.

Most search engines, including Google, store information about you such as your IP address, search terms you have used and links you've followed. Starting Page helps to protect you privacy by continuing to deliver the results you want without spying on you.

The site is powered by Google, so you'll get exactly the same result, but it won't record your IP address, use tracking cookies or share information with third parties.

   http://startpage.com