Wednesday, October 10, 2012

Ya Allah....aku ada block ka???? ok this is lame...dah dekat 3 tahun baru aku ingat balik aku ni pernah ada blog...teruk teruk teruk!!!

Sunday, September 27, 2009

CSC134 additional assignment

Test 2 (part C)
Question 2

The process of developing a new system will have to follow a strict order of cycle called the system development cycle. Explain in details about this activities involve in each phase.

The system development cycle is about the developing a new system which has to follow the strict order. The first step of the development cycle is planning where the computer will plan on how to develop the new system. Then it will analyse the data in order to divide which data should be fix or remove. After that, it will design the new system to replace the older system and then will implement it in the computer. Finally, all the data of the new software will be registered for the authority support in order to secure the computer.

Question 3

The advancement of computing industry and computer networking bring about major threat to mankind especially in the area of information privacy. Security is breached and identities are stolen by culprits for personal gain. Identify ways the culprits use to access personal information and what we can do to stop this issue once at all, by using the including available technologies that can determine our true identities especially when we go online.

The ways that the culprits use to access the personal information is by sending a spyware to the computer. This spyware will take the information about the users and send it to the culprits. Next, the culprits also may can use a virus in order to access the one's personal information where the virus for example will spoil or damage the security system of the computer. So, the computer will be easily exploited by the culprits. The example of these viruses are like worm and trojan. Worm virus will duplicate the files and will make the computer hang or jammed. The trojan virus will cause the infected files corrupted. So, if the security files of the computer will no longer protect the computer. Hence, the culprits can be easily access the person's personal information.

CSC134 additional assignment

Test 1 (part C)
Question 2

A blog is an online journal or a journal that is available on the web. Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog. The activity of updating blog is "blogging" and someone who keeps a blog is a "blogger"

a) List TWO (2) characteristic of a blog.

Actually there are several characteristics of blog and two of them are such as it use the internet connection to connect with others and a blog also can be shared with others as a form of group ware. Other than that, blog also have the security login which is by using password in order to enable someone to open or start blogging. We can insert picture and create our own background through this blog.

b) What are the THREE (3) advantages and THREE (3) disadvantages of a blog?

The three advantages of a blog are such as we can use it as a site for finding a new friend. We can also promote something through the blog. A blog also can be use as our electronic diary and also can be use to have a forum or discuss something through the internet. By using the blog, any news that we have publish can be spread very quickly. Last but not least, we can also store image or music in the blog. The disadvantages of blog are such as blog can only be open when there is an internet connection. It also can generate viruses. By using the blog, we cannot make a video calls. Lastly, in nowadays era blog can be use as a medium to critic something.