IDZNI BIN MOHAMED RASHID's profile picture IDZNI BIN MOHAMED RASHID

Member of elearning.utm.my

Industrial Training Reflection

Industrial Training Presentation

REFLECTION ON PSM1

Video CV

Extra-curricular activities reflection reports - 01

Extra-curricular activities reflection reports - 02

UKQE3001/UKQT3001

Extra-Curricular Experiential Learning

Below is my three mini reports for all the activities that I have joined during in UTM

REPORT ACTIVITY No.3 YEAR 2: SLOT PROFILING PERSONALITI : KENALI POTENSI DIRI ANDA

LOGO-UTM.png.4

Date: 15 December 2019

Venue: School of Computing

Organizer: School of Computing UTM

Graduate attributes:

  1. Adaptability
  2. Communication skills
  3. Thinking skills
  4. Leadership and Team working skills

Role: participant

Mini Report:

The program is actually underway from 8 October 2018 to 15 December 2019. The programmed involved the background of students who did not focus on students from computing, but also from various courses. The programmed usually lasts twice every week. Various activities involving a career where all the tutoring involved must participate. Among its activities are mind testing, career testing and personal personality testing. The programmed is intended to evaluate the students ' direction in the Work field.

This program allows me to always assess both emotionally and physically. This program hone my communication skills to speak many more audiences. This program gives me the opportunity to be anonymous outside the box without any sense of restless. This program teaches me to always work with the group partners and hone his personality in leadership to bring my friend to a better direction.

In conclusion, the program needs to be held regularly. With this program, students are afraid to plan ahead with a feeling of thirst. The programmed is capable of bringing all students stand with confident in the conduct of everyday life. This is a golden opportunity that the students need to take attention to.

utmcc.jpg

Details

REPORT ACTIVITY No.2 YEAR 2: OPEN DAY RESAK 2019 (OPERA'19) RSS

EXTRA – CURRICULAR ACTIVITY REPORT No.2

OPEN DAY RESAK 2019 (OPERA'19)

OPEN DAY RESAK 2019 (OPERA'19)

LOGO-UTM.png.3

Date: 10 October 2019 - 12 October 2019

Venue: Kolej Tun Dr Ismail

Organizer: JKM KTDI

Graduate attributes:

  1. Leadership and Team working skills

Role: participation

Mini Report:

This activity was aimed at collecting residential college funds, namely Tun Dr Ismail Tau College, known as UTM KTDI. The activity has been carried out over the past years, and is accompanied by all UTM authorities. The activity lasted three days from 10 to 12 October 2019.

This activity money a good leadership spirit. For example, all member members and members of the club are very hard to squeeze and brain without difference. For me it is very good for each student to apply without any discrimination between students who are high-level or regular members.

As conclusion, activities are able to assess the level of thought of students in solving a problem wisely and sane. Throughout the programmed, there is no form of physical and oral fights because every student has its own duties and does not mix in other people's duties. I see all the students focused on the success of this programmed for the welfare of other students.

 

hantu 1.jpeg

Details

REPORT ACTIVITY No.1 YEAR 2: SC: BBQ/SPRING CLEANING PARTICIPANTS (SCSR FAMILY DAY)

LOGO-UTM.png.2

 

Date: 06 March 2020

Venue: School of Computing

Organizer: School of Computing UTM

Graduate attributes:

  1. Adaptability
  2. Communication skills
  3. Thinking skills
  4. Leadership and Team working skills

Role: participant

Mini Report:

 The purpose of this programmed was to beautify the computational school by cleaning the entire level of three Network department and Computer Safety School, it was participated by all students from year one to year four. At the same time the activity runs simultaneous with the activity "BBQ " from the network department and Computer security 

This visit allows me to think mature about the list of jobs I will follow. This visit allows me to practice my communication skills while working. This tour allows me to think out of the box in the innovation of aviation industry. This tour fosters the value of cooperation between the group in solving problems. This visit allows me to know how people are out in assessing working areas on computer safety network.

I have a watchful note that every course taken in the university has the challenges and obstacles that need to be faced in order to achieve a brighter future. This programmed fosters the spirit of cooperation between the group. It is also very important while in the world of work. In addition, there are new contacts that I see, with this I no longer afraid of being sociable with colleagues. This activity is able to strengthen among human beings. The activity is self-arranged by students without being mixed by the lecturers or the Office people. This shows that the current generation is wise in arranging the tentative smoothly and is transparent.

 

_MG_2887.JPG 

_MG_2785.JPG.1

 

 

Details

Profile information

Profile information

ALWAYS REMEMBER OUR GOD (ALLAH), HE WILL ALWAYS REMEMBER YOU

Details

SCHOOL OF COMPUTING

Details

WELCOME

IMG_20180904_080747-01.jpeg

WORK WITH SMART MOVE , DON'T WORK WITH HARD MOVE

  • First name: IDZNI BIN MOHAMED RASHID
  • Student ID: A18CS0075
  • Display name: IDZNI BIN MOHAMED RASHID
  • Email address: idzni@graduate.utm.my

PROJEK TITAS

TIS PROJECT

IDZNI BIN MOHAMED RASHID's portfolios

ExCEL UKQE 3001

ExCEL UKQE 3001

Extra-Curricular Experiential Learning UKQE3001/UKQT3001
SCSP 1513 (TECHNOLOGY INFORMATION SYSTEM)

SCSP 1513 (TECHNOLOGY INFORMATION SYSTEM)

MY WORK FOR SCSP 1513 You can scroll down to read or you can DOWNLOAD the file below 

REFLECTION ON BOTH PROJECTS

Probability statistical data analysis

PROJECT 1: it is kinda fun and truly educate me on how to do the R software. and it also tech me on how to collect data from respondents. i also thankful to my teammate because we manage to do it very successful.

PROJECT 2: on this project 2, i learn so much based on previous project 1. project 1 taught me on how to do the project 2

PSDA SCSI12143

IDZNI BIN MOHAMED RASHID's wall

HAHA GUYS INI MOK PANGGIL JER MOK

CONTINUE CHAPTER 11:

HIERARCHICAL DATABASE

Picture1.png

 

CONTINUE CHAPTER 11:

  • Data redundancy – many organizations have multiple files on the same subject or person; for example, records for the same customer may appear in different files across multiple departments
  • Data integrity – accurate updating of files
    • The advantages of having/using a database are:
    • Sharing – in organizations, information in one department can readily be shared with others
    • Security – Users are given passwords or access only to the kind of information they need
    • Less data redundancy – decrease of unnecessary duplication of data (or data redundancy) when several departments use the same database of information
    • Increased data integrity - Reduced likelihood of inconsistent, incomplete, or inaccurate data – data lacking integrity

CHAPTER 11: DATABASES

  • Examples of data include
  • Facts or observations about people, places, things, and events
  • Audio, music, photographs, and video
  • Two ways to view data
  • Physical view- actual format and location; usually only very specialized computer professionals are concerned with the physical view
  • Logical view - focuses on the meaning and content of the data; end users and most computer professionals are concerned with this view
    • Key field – unique identifier to help locate data based on specific requests
    • This field contains unique information, so that each record can be distinguished from any other
    • Used to integrate data and helps with finding records, sorting records, compiling information contained in the database
    • Two main ways to process data: batch and real-time
    • Batch processing – data collected and stored over time, several hours, days, or even weeks, and then processed at once as a “batch”
    • Example - Bank credit card billing
    • Real-time processing happens “now” instead of “later”.

CHAPTER 10: INFORMATION SYSTEMS.

  • An information system is a collection of people, procedures, software, hardware, and data
  • They all work together to provide
    information essential to running
    an organization
  • Computers are used in organizations
    to keep records of events
  • Competent end users need to
    understand how the information
    flows as it moves through an
    organization

Fundamentals_of_Business_-_Fig._8.1_-_Levels_of_Management.jpg

CONTINUE CHAPTER 9:

ETHICS:

  • echnology is moving so fast it is hard for our legal system to keep up. The essential element that controls how computers are used today is ethics.
  • Computer ethics - guidelines for the morally acceptable use of computers
  • Digital Millennium Copyright Act – the right of the owner to make a backup copy
  • Digital rights management – prevents copyright violations
  • Plagiarism – representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas as your own

CONTINUE CHAPTER 9:

Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology

Computer criminals – those using computer technology to engage in illegal action, five types

  • Employees – the largest category; may be trying to steal hardware, software, proprietary information and could be doing this out of resentment and trying to get back at the company
  • Outside users – could include employees and clients or suppliers having access to a company’s computer system; could obtain confidential passwords (key term)
  • “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly.
  • Carders – criminals who specialize in stealing, trading, and using stolen credit cards over the Internet
  • Organized crime – tracking illegal enterprises, forgery, counterfeiting
  • Terrorists – could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems

CONTINUE CHAPTER 9:

Spyware – wide range of programs that are designed to secretly record and report an individual’s activities on the Internet; in addition to Internet Ad cookies, there are also

  • Web bugs – small programs typically hidden within the HTML code for a Web page or e-mail message and can be used to secretly read e-mail message or work with cookies to collect and report information back to a predefined server on the Web
  • Computer monitoring software (key term)– invasive and dangerous type of spyware; programs record every activity and keystroke made on a computer system including credit card numbers, bank account numbers, and e-mail messages
  • Sniffer programs and keystroke loggers (key term)– can be deposited on a hard drive without detection from the Web or by someone installing programs directly onto a computer
  • Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology

     

CHAPTER 9: PRIVACY, NETWORK, AND SECURITY.

  • The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.
  • This chapter covers issues
    related to the impact of
    technology on people and
    how to protect ourselves
    on the Web.
    • Privacy – concerns the collection and use of data about individuals
    • Three primary privacy issues:
    • Accuracy
    • Property
    • Access
  • Two basic types of cookies

    • Traditional cookies provide information to a single site. Most cookies are harmless and are intended to provide customized service
    • Ad network or adware cookies record your activities across different sites – spyware. Once deposited onto a hard drive, they continue to actively collect information on Web activities; form of spyware
    • Most browsers can control many types of cookies called cookie-cutter programs – which allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.

 

View whole wall

IDZNI BIN MOHAMED RASHID's friends