s

Monday, November 8, 2010

TOP 10 REASONS WHY I LOVE FACEBOOK

10. I get to start my day with a few friendly pokes. :)

9. I get to add a song to an email if I want, thereby adding another layer of communication strategy on to my note. Again, this is really one-to-one IM. You can’t cc: anyone as far as I can tell.

8. My good friend from college who lives in MALTA just connected with me. Along with skype, Facebook makes keeping up my international friends and colleagues a heck of a lot easier (and cheaper).

7. When I “facebook” with my teenage niece and nephew, I feel ultra cool, and assure myself that I can keep up with the kids.

6. Birthdays are a snap! No additional reminders required.. It’s all right there. I can’t wait until my birthday on Facebook (October 3rd, btw…)

5. A lot of the people I know and work with are there. Not all, but a lot. In addition to working with affiliates, customers, partners, friends and family – I can also meet new colleagues and explore bus dev opportunities.

4. For NOW – it is a lot less ugly than MySpace and has less spam. Let’s see how that evolves. I already saw one flashing, vegas-style ad. Yikes.

3. Groups make life easier for a social butterfly like me: Chris Brogan has been quite prolific on the topic of why he moved Grasshoppers group off Facebook and onto Ning. For that group in particular, Ning rocks. For more amorphous collections and/or events, I think the volume I’ll get on Facebook is the way to go. Example – being a good alumna, I formed groups for my graduating classes for high school and college. I always get pulled into helping with reunions. Facebook will make planning a reunion or other general gathering a lot easier. That is.. if people keep logging in.

2. FEED ME SEYMOUR: It’s all about THE FEED!!! I love the feed. What a good way to quickly scan and see what’s goin’ through the collective consciousness. After all, this is a marketing TOOL. Great for branding, exposure and reach! This topic warrants an entire post. Ask Scoble how many people join groups after he joins them. The feed works.

1. My avatar doesn’t have to fly!

Jenayah siber meningkat di Malaysia

JENAYAH siber dan pencabulan keselamatan Internet di Malaysia meningkat dalam lima tahun lalu dengan purata sebanyak 500 kes dilaporkan setiap tahun, kata Kementerian Tenaga, Komunikasi dan Multimedia baru-baru ini.

NSTP emedia/Berita Harian Online melaporkan timbalan menterinya, Datuk Tan Chai Ho, berkata dari Ogos 1997 hingga Julai 2002, Malaysia mengalami 3,050 kes terkumpul jenayah berkaitan Teknologi Maklumat dan Komunikasi (ICT).

Menurut beliau, bilangan kes yang dilaporkan sebanyak 503 pada tahun 2000 telah meningkat kepada 923 kes pada 2001, dengan sebanyak 14 individu telah disabitkan mengikut undang-undang siber pada 2000 dan 10 pada tahun lalu.

Katanya lagi, antara Ogos hingga Disember 1997, sebanyak 115 kes dilaporkan terdiri daripada pemalsuan komputer, serangan virus, gangguan, pencerobohan, pemusnahan melalui mel, mel tidak diundang dan ancaman pencerobohan komputer.

Pada 1998, terdapat 342 kes, 1999 (728 kes), 2000 (503 kes), 2001 (932 kes) dan bagi enam bulan pertama tahun ini, angkanya berjumlah 430 kes.

Sunday, November 7, 2010

Firefox : Enjin Carian paling popular kini...

2010Internet ExplorerFirefoxChromeSafariOpera
October29.7 %44.1%19.2%3.9%2.2%
September31.1 %45.1%17.3%3.7%2.2%
August30.7 %45.8%17.0%3.5%2.3%
July30.4 %46.4%16.7%3.4%2.3%
June31.0 %46.6%15.9%3.6%2.1%
May32.2 %46.9%14.5%3.5%2.2%
April33.4 %46.4%13.6%3.7%2.2%

Seawal 2009 sehingga kini Firefox telah menjadi enjin carian (web browser) yang paling ramai digunakan oleh pengguna internet di dunia. Walaupun Google Chrome mendakwa mereka adalah enjin carian paling pantas kini, namun ia berada ditempat ketiga di belakang Internet Explorer (IE) dan diikuti Safari di tangga keempat dan Opera di tangga kelima.

Monday, November 1, 2010

Karnival ICT Daerah Sabak Bernam

IP ADDRESS

What is an IP address?Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.

Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).

Topology ( nota utk Form 4)




Ring topology: As the name implies, in a ring topology all the devices on a network are connected in the form of a ring or circle. This topic describes a ring topology.

Unlike thephysical Bus Topology , a ring type of topology has no beginning or end that needs to be terminated. Data is transmitted in a way that is very different from the logical bus topology. In one implementation, a “token” travels around the ring, stopping at each device. If a device wants to transmit data, it adds that data and the destination address to the token. The token then continues around the ring until it finds the destination device, which takes the data out of the token. The advantage of using this type of method is that there are no collisions of data packets. There are two types of ring topology: single-ring and dual-ring.

Star topology: The star topology is the most common physical topology in Ethernet LANs. This topic describes both the star and extended-star topologies. When installed, the star topology resembles spokes in a bicycle wheel. It is made up of a central connection point that is a device, such as a hub, switch, or router, where all the cabling segments actually meet. Each device on the network is connected to the central device with its own cable.

Bus topology: A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.

Thursday, October 28, 2010

Alat Pemasang Kabel Fiber Optik

Hari ini syarikat yang datang bagi menyambung semula kabel fiber optik yang putus datang ke sekolah. Apa yang menarik minat adalah tool yang digunakan bagi menyambung kabel fiber optik tersebut. Sebenarnya memang tahu harga alat ini memang mahal tapi tak sangka la pula semahal itu. Satu set tool yang lengkap harganya sahaja boleh mencecah RM48 ribu. jadi tidak hairan la jika kos pemasangan kabel optik semangnya mahal.Pemasangan Wireless dan fibre optik telah dibuat selama 3 minggu yang lalu, namun belum siap sepenuhnya kerana ada beberapa barang seperti Rak server dan rak swisch belum sampai lagi. Difahamkan pihak pembekal baru mengagihkan barangan tersebut di sekolah-sekolah sekitar lembah kelang. Daerah sabak Bernam sekolah yang terpilih ialah SMKTarp, SMK Integrasi dan SMK Sungai Besar

Monday, October 25, 2010

Cable Network


Color Codes for RJ-45 Ethernet Plug

Eight-conductor data cable (Cat 3 or Cat 5) contains 4 pairs of wires. Each pair consists of a solid color wire and a white and color striped wire. Each of the pairs are twisted together. To maintain reliability on Ethernet, you should not untwist them any more than necessary (about 1/4 inch).

The pairs designated for 10BaseT Ethernet are orange and green. The other two pairs, brown and blue, are unused. The connections shown are specifically for an RJ45 plug. The wall jack may be wired in a different sequence because the wires may be crossed inside the jack. The jack should either come with a wiring diagram or at least designate pin numbers that you can match up to the color code below.

There are two wiring standards for these cables, called T-568A and T-568B. They differ only in pin assignments, not in uses of the various colors. The illustration above shows both standards. With the T-568B specification the orange and green pairs are located on pins 1, 2 and 3, 6 respectively. The T-568A specification reverses the orange and green connections, so that the blue and orange pairs are on the center 4 pins, which makes it more compatible with the telco voice connections.

Straight-Through vs Cross-Over

In general, the patch cords that you use with your Ethernet connections are "straight-through", which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end (for either standard). The only time you cross connections in 10BaseT is when you connect two Ethernet devices directly together without a hub or connect two hubs together. Then you need a "cross-over" patch cable, which crosses the transmit and receive pairs. An easy way remember how to make a cross-over cable is to wire one end with the T-568A standard and the other with the T-568B standard.

Termination

UTP cables are terminated with standard connectors, jacks and punchdowns. The jack/plug is often referred to as a "RJ-45", but that's a telco designation for the "modular 8 pin connector" terminated with a USOC pinout used for telephones. The male connector on the end of a patchcord is called a "plug" and the receptacle on the wall outlet is a "jack."

In LANs, as spec'ed by 568, there are two possible pinouts, called T568A and T568B, that differ only in which color coded pairs are connected - pair 2 and 3 are reversed. Either work equally well, as long as you don't mix them! If you always use only one version, you're OK, but if you mix A and B in a cable run, you will get crossed pairs!

The cable pairs are color coded as

Pair 1 is white-blue/blue,
Pair 2 white-orange/orange,
Pair 3 is white-green/green
Pair 4 is white-brown/brown.

Tuesday, June 29, 2010

Differences between internet, Intranet and extranet

Internet: Is now the World Wide Web (WWW) network of computers that is dispersedly managed with minimal restriction. It is what you have asked this question over.
Intranet: Operates much the same as the Internet but is restricted to a single corporate entity that has full control and management over it. Able to maximize restrictions over users.
Extranet: is an extension of an Intranet over the Internet for remote users. Typically it is heavily restricted for security reasons to a virtual private network (VPN) connection for Telecommuters or other offsite users.
Ethernet is the standard cable for computers to hook up to the network. It is also used for network devices (Routers, modems & switches) to interface with each other.

Monday, March 22, 2010

virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

Sunday, March 14, 2010

Thursday, March 4, 2010

Multimedia

Multimedia is media and content that uses a combination of different content forms. The term can be used as a noun (a medium with multiple content forms) or as an adjective describing a medium as having multiple content forms. The term is used in contrast to media which only use traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.

Multimedia is usually recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. Multimedia (as an adjective) also describes electronic media devices used to store and experience multimedia content. Multimedia is distinguished from mixed media in fine art; by including audio, for example, it has a broader scope. The term "rich media" is synonymous for interactive multimedia. Hypermedia can be considered one particular multimedia application.

Semangat Merdeka Jalur Gemilang

Soal Jawab ICT

Followers