Thursday, 29 December 2011

Last Class @29/12/2011

what we learn today is about Chap 13 Sistem Analysis and Design

graphical user interface(gui)
macam mana muka depan, susun icon
example; assit projek mgr..(1999)
turn key untuk semua bar tender..
buku log dan kena hantar dan semak...
Macam mana nak retain maklumat... diagram,sop
fnb manager setuju barulah boleh launch..

*speaker note
Slide 5:
Preliminary Investigation (key term) First phase is to perform an investigation usually the result of a request from the user (is there a way to make this task easier, to accomplish the job more efficiently?)

Systems analysis (key term) The second phase is to analyze the current procedure(s) to determine if there is a need for a new system or a modification of the current system

Systems Design (key term) The third phase is to design a new model or make adjustments to the current model to fit new needs or changes in technology

Systems Development (key term) The fourth phase is Development This is the acquisition of new software and/or hardware and the testing of that new acquisition

Systems Implementation (key term) The fifth phase is to determine how to implement the changes from Development do we do this all at once; step by step; or phase it in?

Systems Maintenance (key term) the last phase needs to be performed as you go through the process of analyzing, as you work with the new/changed system, as you implement the new system or the new changes, and on a routine basis to be sure you are accomplishing what you set out to accomplish: making the task easier and more efficient!

Morning!!

Assalammualaikum,

pagi yang ceria untuk semua???

sekarang nie dah kat dalam kelas, dup dap dup dap nak tunggu jawap quiz...

semalam nak sambung study dah ngantuk &  penat sangat meng"update" blog..huhu

so, bangun pagi subuh  tadi baru sambung study, insyaallah blh jawap semua...=)

selamat menjawab quiz ye kawan2 semua...daaa....

Good Luck!!

BILA KUIZ, BARU MULA NAK JELAJAH

HA!!!!! KAWAN2 SEMUA JANGAN JADI MACAM deeyana K...
BILA ADA KUIZ, ASSINGMENT BARU SIBUK NAK JELAJAH SEGALA ISI YOUTUBE PASAL TAJUK KUIZ ESOK,
SECONDARY STORAGE
&
INPUT AND OUTPUT
SANGAT BURUK PERANGAI MACAM NIE..
KALAU TAK, ASYIK SEARCH KAT YOUTUBE ABOUT
CITER2 HINDUSTAN...
LAGU2 HINDUSTAN...
MASTERCHEF...
MAHARAJA LAWAK MEGA...
ISH..ISH..ISH...
TAPI, deeyana NAK KONGSI DENGAN KAWAN2 SEMUA VIDEO PEMBELAJARAN YANG AGAK MENARIK DAN SANGAT2 RELATED DENGAN INFORMATION SYSTEM & TECHNOLOGY NI...
JOM TENGOK..
CLICK LINK KAT BAWAH K..



review chapter8 secondary storage

PRIMARY AND SECONDARY STORAGE (BASIC)


Deeyana da penat baca and nak memahami ape yang terkandung dalam secondary storage nie..
and...
Deeyana amik keputusan saje jalan-jalan kat
youtube
and tangan ni gatal2 search for secondary storage
and jumpe video nie...
jom kawan2 study thru video jerk..
katun2 lagi.. memang besh la. !!!! =D =D

LETS CLICK THIS----->>>> Primary and Secondary Storage

SUARA HATI



Pada mulanya apabila mendapat tugasan membina blog terasa agak sukar kerana tak pernah terlintas di hati untuk mempunyai blog. Berbagai cabaran dan kesukaran yang dihadapi antaranya;

1) tak tahu nak register blog..
2) bagaimana nak upload picture, video....
3) bagaimana nak create page pun tak tahu

Namun atas bantuan rakan-rakan dan keluarga, akhirnya saya berasa teruja kerana dapat mempelajari dan mengembangkan ilmu yang dipelajari dalam kelas IST.

Saya ingin mengucapkan terima kasih kepada Pensyarah IST iaitu Dr Zaidi dan juga rakan-rakan iaitu Nana, Kak Chah, A-yong dan Aqila di atas kerjasama untuk menyiapkan tugasan ini..

Luahan rasa 
ikhlas dari Zila

SEBELUM TERLUPA...

Sebelum clazz IST bermula esok, DEEYANA saje2 la review balik point2 yang DR ZAIDI mintak untuk diletakkan dalam blog masing2 kan…

hahaha......

And... jeng.. jeng... jeng...

DEEYANA baru perasan yang kumpulan kami belum update tentang

MISI

VISI

Jadi, tengah2 rehat sebab dah penat study kuiz IST untuk esok pagi,

DEEYANA cube mencari apakah

VISI dan MISI

kumpalan kami nie…

and ni lah hasilnyer !!!!!!!!!!!!


VISI

Menjadi peneraju utama dalam mewujudkan keadaan sekeliling sentiasa dalam suasana yang harmoni dan boleh membimbing rakan-rakan sebaya agar sentiasa berfikiran positif dan matang dalam segala hal.

MISI

Untuk merealisasikan visi, kami akan memastikan misi berikut dilaksanakan dengan jayanya:

  • Sentiasa mengambil tahu akan masalah yang dihadapi oleh rakan.
  • Membimbing rakan-rakan agar sentiasa menerapkan nilai-nilai positif dalam diri sendiri .
  • Membimbing rakan-rakan ke arah mencapai prestasi yang tinggi dalam akademik.
  • Mewujudkan suasana pembelajaran yang memberangsangkan melalui aktiviti-aktiviti luar
  • Sentiasa mengadakan sistem pembelajaran yang produktif dan dalam keadaan yang sangat ceria agar dapat menarik perhatian rakan-rakan untuk berada didalam kumpulan dan tidak bersendirian.

okeh... perasan nak nak jadi kaunselor konon.. nk bimbing rakan2... =)

Akhir nya....

Berjaya diedit...hehehe <3 it!!!

cantik kan!!!=)

Quiz Chapter 7 & 8

Assalammualaikum,

Tengok tajuk pun dah tau saya nak cerita pasal Quiz..hehe

So, Quiz kita akan diadakan pada 29 Disember 2011 dan tajuk yang akan masuk ialah....





Input and Output - Chapter 7 & Secondary Storage- Chapter 8!!!

So far so good, tak lah susah sangat tajuk nye..

cuma kat chapter 8 je, term dia agak susah sikit nak hafal... volatile storage & nonvolatile storage, apa payah benor teman nak menyebut nya..huhu

pape pun, hope kami semua dapat jawap semua soalan dengan betul esok... aminnn....hee~~

Wednesday, 28 December 2011

Editing Blog....+_+

Esok dah kena submit blog nie, harap Dr. zaidi puas hati la.. 

penat dah edit blog nie, tadi nak update kepada background yang cantik sikit,

tapiii.................bila dah siap update, dia xnak muncul-muncul!haiii,...

apalah nasib kami nie... =((

dah di update, sepatut nya keluar macam background ni, tapi tak muncul plak bila dah siap... sedihnyeer!


Revision chApter 11…..

5 cOmmOn fUnctiOns oF mOst organizatiOns…..

a) AccOunting.

- Traces all financial activity.

- Example:

Ø Accounting department tracks all sales, payments, and transfer of funds.

Ø Also produces reports detailing the financial condition of the company.

b) MarkEting

- Plans, prices, promote, sells, and distributes the organization’s goods & services.

- Example:

Ø Goods include a wide range of products related to supports and other types of physical activity.

c) Human resOurces

- Focuses on people >>> hiring, training, promoting and any number of other human-centered activities within the organization.

- Relates to people in each of the functional areas, including accountants, sales representatives, human resource specialists, production workers, and research scientist.

d) ProductiOn

- Creates finished goods & services using raw materials & personnel.

- Example:

Ø This includes manufacturing a variety of sports equipment, including surfboards.

e) ResEarch

- Identifies, investigates, and develops new products & services.

- Example:

Ø Investigating a light, inexpensive alloy for a new line of weight-training equipment.

Revision chApter 10…..

The various kinds of computer criminals…..

1. Employees....

- The largest category of computer criminals consists of those with the easiest access to computer >>> employees.

- Employees >>>> simply trying to steal something from the employer such as:

Ø Equipment

Ø Software

Ø Electronic funds

Ø Proprietary information.

Ø Computer time.

2. Outside users......

- Suppliers or clients may have access to a company’s computer system.

- Examples:

Ø Bank customers who use an automated teller machine. Authorized users may be able to obtain confidential passwords or find other ways of committing computer crime.

3. Hackers & crackers........

- Hackers >>>> people who are create or improve programs and share those programs with fellow hackers. They are not criminals (typically)

- Crackers >>>> create and share programs designed to gain unauthorized access to computer systems or disrupt networks. They are the criminals…!!!

4. Organized crime

- Members of organized crime groups have discovered that they can use computers just as people in legitimate business do, but for illegal purposes.

- Example:

Ø Computers are useful for keeping track of stolen goods or illegal gambling debts.

5. Terrorists.........

- Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.

Thursday, 15 December 2011

SUMMARY CHAPTER 12 @ 14/12/2011

DATABASE

APA TU REKOD
APA TU FILE
APA TU DATABASE

ACCOUNTANT MUST KNOW TO VIEW THE REPORT?
EG. NAK SEMAK DATA MENGENAI STAF YANG DAH ADA PHD, BELUM ADA PHD, SEDANG BUAT PHD...

2 WAYS TO VIEW DATA
1) PHYSICAL VIEW - TECHNICAL PART
2) LOGICAL VIEW- TAK PEGI KE TECHNICAL PART EG DATABASE ADA NAMA ALAMAT

DATA ORG.
CHARACTER A,B,C...
FIELD = COLUMN
RECORD = ROW
FILE =
TABLE
DATABASE
KEY FIELD = IC IS UNIK=PRIMARY KEY

BACTH PROCESSING = EG. 2 BULAN SEKALI UPDATE
REAL TIME = ONLINE PROCESSING

INTEGRATED DATA
DATA INTEGRITY = DATA YANG SENTIASA DI UPDATE
DATA REDUNDANCY =

KEPERLUAN DATABASE
SHARING
SECURITY
LESS DATA REDUNDUCY
DATA INTERGRITY

DBMS
DATA MANIPULATION SUBSYSTEM
QUERY BY EXAMPLE-WIZARD NEXT
SQL- KENA HAFAL... SELECT APE?

DATA ADMIN SUBSYSTEM = BACKUP

5 MODEL

HIERARCHICAL DATABASE = SLOW

NETWORK DBMS= 1-1 SEORANG STUDENT ADA 1 ID
1-3 SEORANG IBU PUNYA 3 ANAK
MANY TO MANY = SATU COURSE

RELATIONAL DBMS
ROW = RECORD
COLUMN = FIELD
MESTI ADE 2 @ LEBIH TABLE = UNTUK LINK = PRIMARY KEY

MULTIDIMENSIONAL DBMS
DATA CUBE= LEBIH DIMENSI
EG= LAYER BY LAYER
        LOGTITUDE, MAGNITUTE
        KETINGGIAN, WEATHER, PHOTO
I.E= GOOGLE MAP

OBJECT-OREIANTED
ORGANIZES DATA GUNA OBJEK
CONTOHNYA;
CLASS = EMPLOYEE
OBJEK = NAMA ORANG
ATTRIBUTE = UMUR
METHOD = BAYAR GAJI

KEBAIKAN = X PAYAH TANYA BANYAK DA SEBAB MAKLUMAT DA ADA
KELEMAHAN = MAKLUMAT TERLALU BANYAK
                             CREATE LAGI SATU ATTRIBUTE = RE CYCLE

INDIVIDUAL DATABASES
EG.  I TUNES HANYA ORG YG ADE ID SAHAJA BO LOGIN

COMPANY OR SHARED DB
EG. DROPBOX.

DISTRIBUTED DB
BACKUP= DATA BASE
SECURITY

COMMERCIAL DB
MAYBANK TO YOU

DATABASE USES
STRATEGIC USED =DATA WAREHOUSE(GUDANG DATA)= MAYBANK TO YOU
SBB DATA X BOLEH DIKENDALIKAN OLEH MANUSIA

DATA MINING= NK KENAL PASTI

ADE BERAPA SYKT DGN THAILAND BORDER
YES OR NO
QUERY = KEDAH KELANTAN PERLIS
APPLY = YES









result test dah diketahui!!!!


waaaa!!!! arini da dpt result untuk test tempoh hari !!!!! congratez for all my group dapat marks tinggi2!!!!

Wednesday, 14 December 2011

Mari kita buat ulangkaji....
Quiz 2 (chap cover 7,8,12)
Today Chapter 7

1. Define Input Devices?

Any data or instruction used by computer
Input Devices translate data into what the system unit can process.

2. Describe the different types of keyboard, pointing, scanning, image capturing and audio-input devices


Keyboard
Pointing
Scanning
Image capturing
Audio-input devices
Type writer keyboard

Joystick


Barcode reader
Images can recorded /download
Voice recognition
numeric keypad

Touch screen
-Multi-touch screen
-Magnetic ink character recog. (MICR)
- Optical recog. (OCR)
- Optical-mark recog. (OMR)
Specialized digital video cam

Special purpose keys
-    Toggle
-    Combination key
stylus

Exchange messages and files with friend









OUR GROUP PHOTO
aQILA & aISYAH

                                                                   nANA & zILA
                                                                     nANA & aYONG

Friday, 9 December 2011

ADER APE DENGAN AVAST ....????

dR. Zaidi kate yang paling bagus setakat nie.....cube kite tengok ape itu avast.....

Avast! is an antivirus computer program developed by AVAST Software a.s.Avast! is based on a central scanning engine that is certified by ICSA Labs and West Coast Lab's Checkmark processand incorporates anti-spyware technology, also certified by West Coast Lab's Checkmark process, as well as anti-rootkit and self-protection capabilities. It is a multiple recipient of the Virus Bulletin VB100 Award for its detection of 100% of "in-the-wild" viruses, and is a past winner of the Secure Computing Readers' Trust Award. The name Avast is derived from "Anti-Virus – Advanced Set". Its trademarked name is styled in all lower-case and includes an exclamation mark, and a slogan 'be free'.

Avast! Free Antivirus is the freeware version of the Avast! antivirus software available to Microsoft Windows and Linux users, while Avast! Pro Antivirus is offered to businesses and users who want additional features. Priority updates are delivered automatically using PUSH update technology in Avast! Pro Antivirus. Avast! Pro Antivirus also has a command line scanner and a script blocker; however, in version 6, the script blocker is available to users of the free version.

so,sesape yang nk avast antivirus yang free, bolehlah ke link ni...:


GOOGLE'S STREET VIEW

want to go singapore but don't know how to go there..???
google's street view have the solution.....

Google Maps with Street View lets you explore places around the world through 360-degree street-level imagery. You can check out restaurants, visit neighborhoods, or plan your


if u want to ganywhere place in singapore,go to this link...:next trip......

http://gothere.sg/maps


nak tau bagaimana gothere.sg dpt info.....??

mengikut kate Dr Zaidi la kn,ade a man go to singapore juz bring his handset & GPS.....then go to interesting place,capture the picture n save info at gothere.......

what benefit use gothere.sg or google's street view ni ye..????

1. boleh tau tempat menarik di sesebuah tempat

2. tau restoren & tempat makan

3. how to compile public transportation

4. paling penting..~~~~~ nak tau location la kn....


so,juz click to get more info....

ni example map :




Thursday, 8 December 2011

tODAYS chapter 10.. I HAD LEARN........

SOFTWARE TURNITIN

Turnitin is an Internet-based plagiarism-detection service created by iParadigms, LLC. Typically, universities and high schools buy licenses to submit essays to the Turnitin website, which checks the documents for originality. The results can be used to detect plagiarism or can be used in formative assessment to help students learn how to avoid plagiarism and improve their writing.

FUNCTION

Turnitin checks for possible plagiarism by comparing submitted papers to several databases using a proprietary algorithm. It scans its own databases, and also has licensing agreements with large academic proprietary databases.

want to try use this software? just click this link k....^_______^

we alls jugak learn about HACKERS & CRACKERS... Macam biskut lak cracker tue kan, tapi, crackers tu adalah...
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.

The term "cracker" is not to be confused with "hacker". Hackers generally deplore cracking. However, as Eric Raymond, compiler of The New Hacker's Dictionary notes, some journalists ascribe break-ins to "hackers."


Tuesday, 6 December 2011

Individual Assignment (@_@)

Individual Assignment = Excell - dah siap
Macam mana nak upload nie??

Monday, 5 December 2011

Network Topologies (NT).

I feel sO eXcitEd tO know mOre about TOPOLOGIES whEn Dr Zaidi startEd the lEctUre tOday….T.O.P.O.L.O.G.I.E.S…sUch a unic name… ! ;)

What is TOPOLOGIES?????

netwOrk tOpOlOgiEs is a nEtwOrk can be arranged or cOnfigured in several different ways. This arrangement is called the network’s topology….

6 basic categories of NT represent the past and present….

The past NT still can be found today but have been replaced in large part by newer…

1. Bus nEtwOrk….

· each device is connected tO a cOmmOn cable called a bus or back-bOne…nOt james bOnd… ;) (; and all cOmmunicatiOns travel along this bUs…



2. Ring nEtwOrk….

· each device is cOnnected to 2 other dEvices, fOrming a ring….when a message is sEnt, it is passed arOund the ring until it reaches the intended destination….




The present represented by 4 NT that are widely used tOday….

3. Star nEtwOrk…

· Each device is cOnnected directly tO a cEntral netwOrk switch.

· Whenever a nOde sends a message, it is rOutEd to the switch, which thEn passes the message alOng to the intended recipient.

· The star nEtwOrk is the mOst widely used netwOrk tOpOlOgy tOday.




4. Tree network….

· Each device is connected to a central node, either directly or through one or more other devices.

· The central node is connected to two or more subordinate nodes, and so forth, forming a treelike structure.

· Also known as a hierarchical network is often used to share corporatewide data.


5. Hybrid network.

· Is a cOmbinatiOn of different topologies.

· Example: large organizations today typically have a complex network of smaller networks. These smaller networks have been create over time and use a variety of different topologies.

· Connected together, these smaller networks form a hybrid network.




6. Mesh network.

· The newest type and does not use a specific physical layout

· Requires that each node have more than one connection to the nodes.

· The resulting pattern forms the appearance of a mesh.



LinkWithin

Related Posts Plugin for WordPress, Blogger...