View wall

IDZNI BIN MOHAMED RASHID: Wall

Back to profile

HAHA GUYS INI MOK PANGGIL JER MOK

CONTINUE CHAPTER 11:

HIERARCHICAL DATABASE

Picture1.png

 

CONTINUE CHAPTER 11:

  • Data redundancy – many organizations have multiple files on the same subject or person; for example, records for the same customer may appear in different files across multiple departments
  • Data integrity – accurate updating of files
    • The advantages of having/using a database are:
    • Sharing – in organizations, information in one department can readily be shared with others
    • Security – Users are given passwords or access only to the kind of information they need
    • Less data redundancy – decrease of unnecessary duplication of data (or data redundancy) when several departments use the same database of information
    • Increased data integrity - Reduced likelihood of inconsistent, incomplete, or inaccurate data – data lacking integrity

CHAPTER 11: DATABASES

  • Examples of data include
  • Facts or observations about people, places, things, and events
  • Audio, music, photographs, and video
  • Two ways to view data
  • Physical view- actual format and location; usually only very specialized computer professionals are concerned with the physical view
  • Logical view - focuses on the meaning and content of the data; end users and most computer professionals are concerned with this view
    • Key field – unique identifier to help locate data based on specific requests
    • This field contains unique information, so that each record can be distinguished from any other
    • Used to integrate data and helps with finding records, sorting records, compiling information contained in the database
    • Two main ways to process data: batch and real-time
    • Batch processing – data collected and stored over time, several hours, days, or even weeks, and then processed at once as a “batch”
    • Example - Bank credit card billing
    • Real-time processing happens “now” instead of “later”.

CHAPTER 10: INFORMATION SYSTEMS.

  • An information system is a collection of people, procedures, software, hardware, and data
  • They all work together to provide
    information essential to running
    an organization
  • Computers are used in organizations
    to keep records of events
  • Competent end users need to
    understand how the information
    flows as it moves through an
    organization

Fundamentals_of_Business_-_Fig._8.1_-_Levels_of_Management.jpg

CONTINUE CHAPTER 9:

ETHICS:

  • echnology is moving so fast it is hard for our legal system to keep up. The essential element that controls how computers are used today is ethics.
  • Computer ethics - guidelines for the morally acceptable use of computers
  • Digital Millennium Copyright Act – the right of the owner to make a backup copy
  • Digital rights management – prevents copyright violations
  • Plagiarism – representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas as your own

CONTINUE CHAPTER 9:

Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology

Computer criminals – those using computer technology to engage in illegal action, five types

  • Employees – the largest category; may be trying to steal hardware, software, proprietary information and could be doing this out of resentment and trying to get back at the company
  • Outside users – could include employees and clients or suppliers having access to a company’s computer system; could obtain confidential passwords (key term)
  • “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly.
  • Carders – criminals who specialize in stealing, trading, and using stolen credit cards over the Internet
  • Organized crime – tracking illegal enterprises, forgery, counterfeiting
  • Terrorists – could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems

CONTINUE CHAPTER 9:

Spyware – wide range of programs that are designed to secretly record and report an individual’s activities on the Internet; in addition to Internet Ad cookies, there are also

  • Web bugs – small programs typically hidden within the HTML code for a Web page or e-mail message and can be used to secretly read e-mail message or work with cookies to collect and report information back to a predefined server on the Web
  • Computer monitoring software (key term)– invasive and dangerous type of spyware; programs record every activity and keystroke made on a computer system including credit card numbers, bank account numbers, and e-mail messages
  • Sniffer programs and keystroke loggers (key term)– can be deposited on a hard drive without detection from the Web or by someone installing programs directly onto a computer
  • Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology

     

CHAPTER 9: PRIVACY, NETWORK, AND SECURITY.

  • The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.
  • This chapter covers issues
    related to the impact of
    technology on people and
    how to protect ourselves
    on the Web.
    • Privacy – concerns the collection and use of data about individuals
    • Three primary privacy issues:
    • Accuracy
    • Property
    • Access
  • Two basic types of cookies

    • Traditional cookies provide information to a single site. Most cookies are harmless and are intended to provide customized service
    • Ad network or adware cookies record your activities across different sites – spyware. Once deposited onto a hard drive, they continue to actively collect information on Web activities; form of spyware
    • Most browsers can control many types of cookies called cookie-cutter programs – which allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.

 

CONTINUE CHAPTER 8:

TYPE OF TOPOLOGY:

...............................star.gif............................

 

.........................................................................................................................

network-topology.png

CONTINUE CHAPTER 8:

TYPE OF NETWORKS:

computer-network-and-its-topologies-8-638.jpg.1

CHAPTER 8: COMMUNICATION & NETWORK

WHAT IS COMMUNICATION?

process of sharing data, programs, and information between computer (eg: e-mail, instant messaging, electronic commerce)

WHAT IS NETWORKS?

communication system that connect 2 or more computer, for exchange information.

 

 

 

CONTINUE CHAPTER 7:

Secondary Storage

The disk drives in the computer are the most common form of secondary storage. The disk drive is nonvolatile and retains the information written to it after the power is turned off to the computer. Because it is a mechanical device, the disk drive is much slower than primary storage devices. All nonvolatile storage devices fall into the secondary storage class, including optical and tape drives.

CHAPTER 7: SECONDARY STORAGE.

Primary Storage

Random access memory (RAM) is the main form of primary storage. The computer processor uses this RAM to hold code, perform computations and manage the operation of the machine because it is the fastest form of storing bytes of information. It is volatile, however, which means when the computer is turned off everything in RAM is deleted. Other types of primary storage include the processor cache and, for non integrated graphics cards, the on-board memory that serves the graphics processing unit (GPU).

CHAPTER 6: SYSTEM UNIT

what-is-a-computer-system-unit-function-components-definition_110959.jpgScreenshot (77).png

The system unit, also known as a "tower" or "chassis," is the main part of a desktop computer. It includes the motherboardCPURAM, and other components. The system unit also includes the case that houses the internal components of the computer.

CONTINUE CHAPTER 5:

System software consists of two primary types of programmes : the operating system and utility programs

The OS :  

  • Manages the computers hardware, including the processor ,memory, and storage devices, as well as peripheral devices such as printer
  • responsible for the management, scheduling and coordination of tasks.

Utility programs :

  • small program that performs many of the general housekeeping  tasks for your computer, such as system maintenance and file compression.

Device drivers : 

  • Plug and Play (PNP) is  a software and hardware standard design to facilitates the installation of a new hardware in PCs by including the OS the drivers these devices need in order to run.

Middle ware :

  • Software that connects software components or enterprise applications.
  • It is the software layer that lies between the operating system and the applications on each side of a distributed computer network.

SCSP 1513

CHAPTER 5: SYSTEM SOFTWARE

Operating System is a software that :

  • Manages the computers hardware, including the processor ,memory, and storage devices, as well as peripheral devices such as printer
  • responsible for the management, scheduling and coordination of tasks.

SCSP 1513

WhatsApp Image 2018-10-21 at 11.52.15 AM.jpegWhatsApp Image 2018-10-21 at 11.36.05 PM(1).jpegWhatsApp Image 2018-10-21 at 11.36.05 PM(2).jpeg

SCSP 1513: PRACTICAL TEST PC DISASSEMBLY AND ASSEMBLY

 

IMG_20181008_142141.jpgIMG_20181008_144428.jpg

Thanks to our lecturer Mr. Hairudin for let us visited this CCNA lab at N28 level-4 

  WhatsApp Image 2018-10-08 at 10.10.30 PM.jpeg

WhatsApp Image 2018-10-08 at 10.10.32 PM.jpegScreenshot (7).png

Industrial visit to CICT UTM

speaker : Mr Zahari

 

aksnj.jpgasjk.jpg

df.jpg 

My team: Firdaus, Cecilia, Wan Ling  and me at NALI exhibition conference

IMG_20180928_180424_741.jpg.1 

industrial talk 1 : Global Online Workforce, GLOW

speaker : miss Nor Ashikin Bt Halil

 

CHAPTER 4: SPECIALIZED APPLICATION SOFTWARE.

Specialized applications let users perform advanced computing tasks such as web design, graphics, audio and video editing, AI and cell phone apps.

1) Describe graphics, including desktop publishers, image editors, illustration programs, and image galleries.

  • DESKTOP PUBLISHERS - allow users to create publications. Most of it is mix text and graphics such as brochures and posters.  Usual software Adobe In-design, Microsoft Publisher and QuarkXPress.
  • IMAGE EDITORS - editing & modifying digital photographs. Software adobe photoshop.
  • ILLUSTRATION PROGRAMS - for drawing programs. Software, adobe illustrator.
  • IMAGE GALLERIES - provided libraries for electronic images such as clip arts, google photos.

2) What is audio and video editing software and multimedia?

  • AUDIO & VIDEO EDITING - audio editing create and edit audio clips, add audio effects, and filter out pops or scratches. Video editing is to reorganize and add effect such as adobe premiere
  • MULTIMEDIA - the integration of a variety of media into one presentation. Such as, video, music, voice, graphics and text and also include user interactivity.

SCSP 1513

 

SCSJ 1013: ARRAY (finding found)

#include <iostream>
using namespace std;

int main()
{
int abc[5] = {0};
abc[2] = 1;
for(int i = 0; i < 5; i++)
{
if (abc[i] == 1)
{
cout<<"found"<<endl;
}
else
{
cout<<"not found"<<endl;
}
}
return 0;
}

OUTPUT:

not found

not found

found

not found

not found  

 SCSJ 1013: ARRAY (USING #define)

#include <iostream>
using namespace std;
#define size 2       //TENTUKAN SAIZ OUTPUT
int main()
{
int abc[size],i=0;

while (i<size)
{
abc[i] = 1234;       //1234 TU OUTPUT
cout<<"abc["<<i<<"] is:"<<abc[i]<<endl;
i++;
}
return 0;
}

OUTPUT:

abc[0] is:1234

abc[1] is:1234

SCSJ 1013: ARRAY (calculate average, define max, min )

#include <iostream>
using namespace std;
int main()
{
int num[3];
float average;
int sum=0;
int i=0,max=-9999999,min=999999999;
while(i<3)
{
cout<<"Enter num "<<i+1<<":";
cin>>num[i];
if(num[i]>max)
{
max=num[i];
}
if(num[i]<min)
{
min=num[i];
}
sum=sum+num[i];
i=i+1;
}
average=sum/i;
cout<<"Sum all of number is "<<sum<<".\n";
cout<<"Average:"<<average<<".\n";
cout<<"Max:"<<max<<endl;
cout<<"Min:"<<min<<endl;
return 0;
}

OUTPUT:

Enter num 1:10

Enter num 2:20

Enter num 3:30

Sum all of number is 60.

Average:20.

Max:30

Min:10

SCSJ 1013: LOOPING ARRAY

#include <iostream>
using namespace std;

int main()
{
int num[7];
int i = 0;
int sum = 0;

while (i < 7);
{
cout<<"enter num:"<<i + 1<<":";
cin>>num[i];

sum = sum + num[i];

i = i + 1;
}
cout<<"sum is:"<<sum<<endl;

return 0;
}

SCSJ1013: ARRAY

#include <iostream>
using namespace std;

int main()
{
int num[7];
int sum;

cout<<"enter num 1:";
cin>>num[0];
cout<<"enter num 2:";
cin>>num[1];
cout<<"enter num 3:";
cin>>num[2];
cout<<"enter num 4:";
cin>>num[3];
cout<<"enter num 5:";
cin>>num[4];
cout<<"enter num 6:";
cin>>num[5];
cout<<"enter num 7:";
cin>>num[6];

sum=num[0]+num[1]+num[2]+num[3]+num[4]+num[5]+num[6];

cout<<"sum is:"<<sum<<endl;
cin>>sum;

return 0;
}

OUTPUT:

enter num 1:456

enter num 2:123

enter num 3:789

enter num 4:963

enter num 5:258

enter num 6:741

enter num 7:0

sum is:3330

SCSJ1013:

#include <iostream>
using namespace std;

int main()
{
int a, b, c, d, e, total;

cout<<"number wey:"<<endl;
cin>>a>>b>>c>>d>>e;

total = a+b+c+d+e;

cout<<"number is"<<endl<<total<<endl;
cin>>total;

return 0;
}

OUTPUT:

number wey:

5

5

5

5

5

number

is 25

CHAPTER 3 : BASIC APPLICATION SOFTWARE.

Application software is end user software that is used to accomplish a variety of tasks.

There are two types of application software:

  • BASIC APPLICATIONS: used in nearly every discipline and occupation. common types basic applications are Word processors, spreadsheets, DBMS and presentation graphic.
  • SPECIALIZED APPLICATIONS: is a software that is specially designed for an individual or company's specific needs. Includes graphics programs, audio and video editors, multimedia authoring programs, web authoring programs and virtual reality programs.

 

CONTINUE CHAPTER 3:

2)What are databases and database management systems?  

  • DATABASES - is a collection of information that users have inside the computer that is organized so that it can be easily accessed, managed and upload. All data organized into rows, columns and tables. 
  • DATABASE MANAGEMENT SYSTEMS (DBMS) - is a collection of related data. DBMS essentially serves as an interface between the database and end users or application programs. Ensuring that data is consistently organized and remains easily accessible. Example, Microsoft Access is the most popular desktop database management software

CHAPTER 2: THE INTERNET THE WEB & ELECTRONIC COMMERCE.

1)Discuss the Internet, including its origins and most common uses. What activities have you participated in? Which one do you think is the most popular?

  • internet is the largest global network connecting smaller networks in world wide web.
  •  fundamental Internet technologies started in the early 1960s, but in 1969 National Computer Network and ARPANET was funded by US were introduced.
  • World Wide Web (WWW) was introduced on 1991 at CERN.
  • internet was originally create to transfer data to military.

Conclusion I've been many  participating in internet by surfing through Google, Youtube and etc. to find source. and People nowadays most likely to watch Youtube for entertainments and knowledge.

SCSP 1513 

CONTINUE CHAPTER 2:

2)What is cloud computing? Describe the three basic components of cloud computing.

  • cloud computing is a mechanism where a bunch of computer activities from the user's desktop in internet
  • frees end-users from owning, maintaining and storing software programs and data;
  • three basic component :
  1. clients (end-users = person who used a software that server provided)
  2. service providers (vendor that provides IT solutions and/or services to end users and organizations.)
  3. the internet (The Internet is the global system of interconnected computer network that use the internet protocol suite (TCP/IP) to link devices worldwide. 

SCSP 1513

CHAPTER 1: INFORMATION TECHNOLOGY, THE INTERNET AND YOU.

1) Explain the five parts of an information system. What part do people play in this system?

  • PEOPLE: most important part in any systems. Computer uses for entertainment, businesses, medicine and education.
  • PROCEDURES: users need to follow the procedures to get output in computer.
  • SOFTWARE: where users can create a data. System software (OS, utilities, device drivers) and Application software (Microsoft words, Adobe)
  • HARDWARE: is a device that users can see and touch in real life (Printer, Supercomputers, Mainframe computers, Minicomputers, Microcomputers)
  • DATA: raw unprocessed fact. When Data is processed it's become information. Example where data can be stored Document files, Worksheet files, Database files, Presentation files.

Conclusion is, all of the five parts is important to run a project smoothly. Part that people play in this system mostly in software, hardware and data

SCSP 1513

#include <iostream>
using namespace std;

int main()
{
int i;
int num;


cout<<"number:";
cin>>num;

i = 0;
while ( i < num)
{
cout<<"A"<<endl;
i = i + 1;
}
return 0;
}

OUTPUT:

number: 1          number: 2

A                                 A

                                   A

#include <iostream>
using namespace std;

int main()
{
int i;
int num;


cout<<"number:";
cin>>num;

i = 0;
while ( i < num)
{
cout<<i<<endl;
i = i + 1;
}
return 0;
}

OUTPUT :

number:1        number:2

0                            0

                              1

scsj1013

 

#include <iostream>
#include <string>

int main()
{
std::string name;
std::cout << "What is your name? ";
getline (std::cin, name);
std::cout << "Hello, " << name << "!\n";
}

>What is Computer Forensic Analyst?

=The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings.

>What do they do?

  • Litigation Support
  • Computer Fraud and Criminal Investigations
  • Digital Artifact Forensic
  • Digital Artifact Discovery and Recovery
  • Secret and Lawful Surveillance
  • Digital Crime Scene Investigation (D-CSI)

SCSP1513

>What is the latest version of Microsoft Office?

= Microsoft office 2017 is the latest version full suite of Microsoft productivity software, comprising of Excel, PowerPoint, Word, OneNote, Publisher and Access

SCSP1513