<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d2903480847704358081\x26blogName\x3dThe+Malicious+Code\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLACK\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://ismasyakict.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://ismasyakict.blogspot.com/\x26vt\x3d8028931419552557183', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script> <iframe src="http://www.blogger.com/navbar.g?targetBlogID=3054107564476057249&blogName=url.blogspot.com&publishMode=PUBLISH_MODE_BLOGSPOT&navbarType=BLACK&layoutType=CLASSIC&homepageUrl=http%3A%2F%2Furl.blogspot.com%2F&searchRoot=http%3A%2F%2Furl.blogspot.com%2Fsearch" height="30px" width="100%" marginwidth="0" marginheight="0" scrolling="no" id="navbar-iframe" frameborder="0"></iframe> <div id="space-for-ie"></div>
ismasyakila
A typical 16y/o girl named Isma Syakila, learning ICT in her school. Its time to recall what she had learnt. :)
Love Notes
Comments are appreciated. ^_^

The Queue
School's Official Website
Blog Panatia ICT
Teacher Hani's Blog


Musics


News
Apr 20, 2010
PK2

A for ICT 82%


by ismasyakila ended @ 10:06 AM

Mar 30, 2010
Processing speed and microprocessor speed

Today we study about Processing speed, and microprocessor speed.

Below is a chart that compares and contrasts important features found on some of the more popular chips in the market today.
  Transistors CPU Speed L2 Cache Front-Side Bus Speed
Celeron 7,500,000 1.06 GHz - 2 GHz 256 KB,
full speed
133 MHz and 400 MHz
Pentium II 7,500,000 233 MHz - 450 MHz 512 KB,
half speed
100 MHz
Pentium III 9,500,000 450 MHz - 1 GHz 256 KB,
full speed
133 MHz
Pentium III Xeon 28,100,000 500 MHz - 1 GHz 256 KB - 2 MB,
full speed
100 MHz
Pentium 4 55,000,000 1.4 GHz - 3.4 GHz 256 KB,
full speed
800 MHz
K6-II 9,300,000 500 MHz - 550 MHz N/A 100 MHz
K6-III 21,300,000 400 MHz - 450 MHz 256 KB,
full speed
100 MHz
Athlon (K7) 22,000,000 850 MHz - 1.2 GHz 256 KB,
full speed
200 MHz and 266 MHz
Athlon XP 37,500,000 1.67 GHz 384 KB,
full speed
266 MHz
Duron N/A 700-800 MHz 64 KB,
full speed
200 MHz
PowerPC G3 6,500,000 233 MHz - 333 MHz 512 KB, 1 MB,
half speed
100 MHz
PowerPC G4 10,500,000 400 MHz - 800 MHz 1 MB,
half speed
100 MHz
Athlon 64 105,900,000 800 MHz 1 MB,
half speed
1.6 GHz
G5 58,000,000 2.5GHz 512 KB 900MHz - 1.25GHz

1 GHz(Gigahertz) = 1000MHz (Megahertz)

by ismasyakila ended @ 10:24 AM

Mar 10, 2010
EBCIDC CODE

EBCDIC (Extended Binary Coded Decimal Information Code) is an eight-bit character set that was developed by International Business Machines (IBM). It was the character set used on most computers manufactured by IBM prior to 1981.

EBCDIC is not used on the IBM PC and all subsequent "PC clones". These computer systems use ASCII as the primary character and symbol coding system. (Computer makers other than IBM used the ASCII system since its inception in the 1960s.)

EBCDIC is widely considered to be an obsolete coding system, but is still used in some equipment, mainly in order to allow for continued use of software written many years ago that expects an EBCDIC communication environment.

The EBCDIC code assignments are shown in the following table.

Least Significant Bits
Most Sig. Bits \/
0
0000
1
0001
2
0010
3
0011
4
0100
5
0101
6
0110
7
0111
8
1000
9
1001
A
1010
B
1011
C
1100
D
1101
E
1110
F
1111
0
0000
NUL
(0)
00
SOH
(1)
01
STX
(2)
02
ETX
(3)
03
PF
(4)
04
HT
(5)
05
LC
(6)
06
DEL
(7)
07
GE
(8)
08
RLF
(9)
09
SMM
(10)
0A
VT
(11)
0B
FF
(12)
0C
CR
(13)
0D
SO
(14)
0E
SI
(15)
0F
1
0001
DLE
(16)
10
DC1
(17)
11
DC2
(18)
12
TM
(19)
13
RES
(20)
14
NL
(21)
15
BS
(22)
16
IL
(23)
17
CAN
(24)
18
EM
(25)
19
CC
(26)
1A
CUI
(27)
1B
IFS
(28)
1C
IGS
(29)
1D
IRS
(30)
1E
IUS
(31)
1F
2
0010
DS
(32)
20
SOS
(33)
21
FS
(34)
22
 
(35)
23
BYP
(36)
24
LF
(37)
25
ETB
(38)
26
ESC
(39)
27
 
(40)
28
 
(41)
29
SM
(42)
2A
CU2
(43)
2B
 
(44)
2C
ENQ
(45)
2D
ACK
(46)
2E
BEL
(47)
2F
3
0011
 
(48)
30
 
(49)
31
SYN
(50)
32
 
(51)
33
PN
(52)
34
RS
(53)
35
US
(54)
36
EOT
(55)
37
 
(56)
38
 
(57)
39
 
(58)
3A
CU3
(59)
3B
DC4
(60)
3C
NAK
(61)
3D
 
(62)
3E
SUB
(63)
3F
4
0100
SP
(64)
40
 
(65)
41
 
(66)
42
 
(67)
43
 
(68)
44
 
(69)
45
 
(70)
46
 
(71)
47
 
(72)
48
 
(73)
49
¢
(74)
4A
.
(75)
4B
<
(76)
4C
(
(77)
4D
+
(78)
4E
Note1
(79)
4F
5
0101
&
(80)
50
 
(81)
51
 
(82)
52
 
(83)
53
 
(84)
54
 
(85)
55
 
(86)
56
 
(87)
57
 
(88)
58
 
(89)
59
!
(90)
5A
$
(91)
5B
*
(92)
5C
)
(93)
5D
;
(94)
5E
¬
(95)
5F
6
0110
-
(96)
60
/
(97)
61
 
(98)
62
 
(99)
63
 
(100)
64
 
(101)
65
 
(102)
66
 
(103)
67
 
(104)
68
 
(105)
69
|
(106)
6A
,
(107)
6B
%
(108)
6C
_
(109)
6D
>
(110)
6E
?
(111)
6F
7
0111
 
(112)
70
 
(113)
71
 
(114)
72
 
(115)
73
 
(116)
74
 
(117)
75
 
(118)
76
 
(119)
77
 
(120)
78
`
(121)
79
:
(122)
7A
#
(123)
7B
@
(124)
7C
'
(125)
7D
=
(126)
7E
"
(127)
7F
8
1000
 
(128)
80
a
(129)
81
b
(130)
82
c
(131)
83
d
(132)
84
e
(133)
85
f
(134)
86
g
(135)
87
h
(136)
88
i
(137)
89
 
(138)
8A
 
(139)
8B
 
(140)
8C
 
(141)
8D
 
(142)
8E
 
(143)
8F
9
1001
 
(144)
90
j
(145)
91
k
(146)
92
l
(147)
93
m
(148)
94
n
(149)
95
o
(150)
96
p
(151)
97
q
(152)
98
r
(153)
99
 
(154)
9A
 
(155)
9B
 
(156)
9C
 
(157)
9D
 
(158)
9E
 
(159)
9F
A
1010
 
(160)
A0
~
(161)
A1
s
(162)
A2
t
(163)
A3
u
(164)
A4
v
(165)
A5
w
(166)
A6
x
(167)
A7
y
(168)
A8
z
(169)
A9
 
(170)
AA
 
(171)
AB
 
(172)
AC
 
(173)
AD
 
(174)
AE
 
(175)
AF
B
1011
 
(176)
B0
 
(177)
B1
 
(178)
B2
 
(179)
B3
 
(180)
B4
 
(181)
B5
 
(182)
B6
 
(183)
B7
 
(184)
B8
 
(185)
B9
 
(186)
BA
 
(187)
BB
 
(188)
BC
 
(189)
BD
 
(190)
BE
 
(191)
BF
C
1100
{
(192)
C0
A
(193)
C1
B
(194)
C2
C
(195)
C3
D
(196)
C4
E
(197)
C5
F
(198)
C6
G
(199)
C7
H
(200)
C8
I
(201)
C9
 
(202)
CA
 
(203)
CB
Note2
(204)
CC
 
(205)
CD
Note3
(206)
CE
 
(207)
CF
D
1101
}
(208)
D0
J
(209)
D1
K
(210)
D2
L
(211)
D3
M
(212)
D4
N
(213)
D5
O
(214)
D6
P
(215)
D7
Q
(216)
D8
R
(217)
D9
 
(218)
DA
 
(219)
DB
 
(220)
DC
 
(221)
DD
 
(222)
DE
 
(223)
DF
E
1110
\
(224)
E0
 
(225)
E1
S
(226)
E2
T
(227)
E3
U
(228)
E4
V
(229)
E5
W
(230)
E6
X
(231)
E7
Y
(232)
E8
Z
(233)
E9
 
(234)
EA
 
(235)
EB
Note4
(236)
EC
 
(237)
ED
 
(238)
EE
 
(239)
EF
F
1111
0
(240)
F0
1
(241)
F1
2
(242)
F2
3
(243)
F3
4
(244)
F4
5
(245)
F5
6
(246)
F6
7
(247)
F7
8
(248)
F8
9
(249)
F9
 
(250)
FA
 
(251)
FB
 
(252)
FC
 
(253)
FD
 
(254)
FE
 
(255)
FF

by ismasyakila ended @ 12:54 PM

Mar 3, 2010
Identify Verification

Identity verification technique using multi-factor

By FIRKHAN HAMID ALI KHAN



TRACKING SYSTEM USING THE BEST BETWEEN biometrics to verify INDIVIDUAL IDENTITY

--------------------------------------------------------------------------------



Now, security issues over access to an information system, especially for Internet applications become a major problem in a transaction, especially in affairs related to banking.

Processes and technologies used to manage user applications and their relationship with the network and Internet applications increasingly challenging from day to day.

So, multi-factor authentication system is the best alternative for the present to address security issues arising in the Internet application.

Application authentication system is a system of proof for a consumer real self and it will ensure that only authorized access to areas only accessible by the user.

Application authentication system can function at all levels of computer network infrastructure starting from the use of computer applications fire wall, E-mail application, database, router and applications of information technology is another.

Application authentication system will provide a very important safety information that is information with respect to whom and when an application is accessed or in and out of an information system and computer network.

Application authentication system that is used often to be based on several features of self-identification or identity of a user with the method as follows: --

1. Something that user knows, such as identification number (PIN), passwords and other.

2. Something that consumers have as identity cards, driving licenses and other.

3. Something about the physical self as a user or biometric fingerprint, voice, retina and other eye.

What will happen if the authentication system applications only focus on one factor only, such as smart card or password only.

What if you lose your smart card or password was obtained through the invasion on the Internet?

So, it is something that is very weak in security verification system user. Instead, the application authentication system based on biometrics is between very good and more secure with the addition of at least two-factor authentication is another.

This is because whatever you dimilliki equipment such as smart cards and others can be stolen by anyone and so are the things that you know, it can be guessed, shared or forgotten with arbitrary.

However, it is something that is difficult for you being intruded and became the strongest factor in the authentication system.

This combination will create a system of multi-factor authentication is more secure applications for penetrated by any party.

For example, in a process of withdrawal to an account that requires an account holder uses the card with fingerprint identification and electronic signature was also required on the withdrawal form.

This is the best example of which is multi-factor authentication system is used and it can be expanded to use in system verification applications on the Internet, especially those involving financial transactions such as Internet banking.

Use authentication techniques can be implemented for any purpose that is critical in an information system.

Kritikalnya situation that it can cause great loss to the organization.

Where, invasion activity of this verification system will result in loss of data, information or any sources of the important high-value.

Data that low-risk or low value is already sufficient to verify the system is often used.

System or process or verification techniques can be implemented more efficiently with several other components such as system identification with the name or log inSystem-level control of up to a level where a user can access to the information in the computerized system and others.

Combination of the three components is also more popular known as access control involving all three components of this control should answer to four basic questions like who is that yourself?

Are you a member here? What are your rights? Are you saying that you yourself is yourself?

Questions that must be answered before one is allowed access to information or resources that are protected either through the computer, application server, router and others.

However, existing applications authentication system known as the Management Information System Identity and sold in market access which includes the three elements and equipped with multi-factor authentication technique is.

It is up to the user or company concerned whether or not to use it.

This is because there are a few things or issues that need to be taken care before the implementation of knowledge such as user applications, information technology infrastructure needs, suitability of use with applications, and other costs.

Multi-factor authentication is also known as thick or strong authentication and two factor authentication techniques are also sometimes discussed under this category.

Irrespective of whatever technology and techniques used, kebolehgunaannya by users is a major factor and very important.

In addition, it helps to create a verification system applications more secure and reliable manner.

Users can use for identity verification security especially for their applications on the Internet that involves financial transactions more secure and confident with applications such as Internet banking.

lPenulis is a lecturer Faculty of Information Technology and Multimedia, Universiti Tun Hussein Onn Malaysia (UTHM).

by ismasyakila ended @ 9:03 AM

Feb 24, 2010
ICT Results

I got 76% for ICT Paper. 4 marks to go to get A! Can't wait for having the next test. ^_^

By the way, congratulation to Natasha cuz get the highest marks. 88%! Whoaa..haha

by ismasyakila ended @ 12:47 PM

Feb 23, 2010
Wonder....

Write a short essay 'why I choose ICT subject rather than PA or biology?
Because ICT is moving very fast time to time. So, in future, I think most of the skills need to use ICT. All the industries nowadays using ICT in its process.

Intellectual property laws cover ideas,inuentions,literary creations,unique
names,business models,industrial processescomputer program codes and many more.
We need a laws and ethics to protect our property.

Define 'computer theft' and give an example of an activity that reflects computer theft.
Define of computer theft is as the anauthorized used of another person's property.
Example:

Hacking is a source of threat to security in computer.Define hacking and give an example of hacking.
Hacking refer to unauthorized access to the computer system by a hacker.
Example: Someone who accesses a computer network illegally but has to intent of destroying data.

by ismasyakila ended @ 10:30 AM

What is ICT?

ICT (Information, communication and technologies) is the technlogy required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert store, protect, transmit, and retrieve information from anywhere, anytime.According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations.



Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only serve to exacerbate the already-existing economic gap between technological "have" and "have not" areas. Internationally, the United Nations actively promotes ICTs for Development as a means of bridging the digital divide.

by ismasyakila ended @ 10:25 AM

Differences of Computerised and Non-computerised Systems

COMPUTERISED AND NON-COMPUTERISED SYSTEMS

COMPUTER SYSTEM

A system is an arrangement of elements that when it is put together it becomes an organised and established procedure. A system typically consists of components connected together in order to facilitate the flow of information, matter or energy.

A computer system consists of a set of hardware and software which processes data in a meaningful way.

EDUCATION


• education is the science of teaching and learning of specific skills
• it also imparts knowledge, good judgement and wisdom

BANKING SYSTEM




BANKING BEFORE ICT
• banking was done manually by taking deposits directly
• transactions can only be made during working hours
• takes time to approve any loan applications

BANKING WITH ICT
• all transactions are done by computers
• transaction can be done at anytime and place
• online services, phone banking system, credit cards are available

INDUSTRY

INDUSTRY BEFORE ICT
Production was slow because everything was done manually and totally depended on human labour.

INDUSTRY WITH ICT
Computers and telecommunications industry became very opular and profitable since production can be increased through an all day operation.

COMMERCE




Commerce is an activity of exchanging, buying and selling of commodities on a large scale involving transportation from place to place.

COMMERCE BEFORE ICT
• Trading was made using the barter system and it was then later developed
into currency.
• Advertisement was in the form of word of mouth, billboards and printed
flyers.
• Trading globally was extremely slow, late and expensive. Traders had to find
ways to market local products in the global market.

COMMERCE WITH ICT
E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically

by ismasyakila ended @ 10:24 AM

Feb 20, 2010
PK1

PK1 is extremely hard. I think I have to revise more, read more and learn more. The questions are easy but to find answers are difficult. =.=

Weakness
  1. I have trouble to answer structure questions. (Directed questions)
  2. Objective questions are confusing.
Ways to get A in ICT

  1. Do a lot of exercises, modules and e-assignments.
  2. Read more and memorize all the facts in ICT.

by ismasyakila ended @ 9:55 AM

Feb 4, 2010
Question 2

People interact directly with computer in many fields in our daily life. ICT helps people in managing several sectors. But we have threat to computer such as viruses and natural disasters.

Questions :

  1. Education sector : E-learning is used in many schools today. Teachers and students also can use a lot of information that are searched through the Internet that can be used in any subjects
  2. Health sector : Telemedicine is widely used in hospitals and clinics to transfer medical informations through Internet and telephones.
  3. Banking and business sectors :  The use of ICT in banking is involve online transactions and online payments to save time and so do energy.
  4. Government sector : Using ICT for public sector to inform the people about taxes, parties and the people also can pay the taxes through this e-government.

What Is a Virus?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause 1. only mildly annoying effects while others can damage your hardware, software or files.

Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that 2. a virus cannot be spread without a human action, (such as running an infected program) to keep it going.

3. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

What Is a Worm?

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but 1. unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example 2. would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that 3. the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
  1. Cryptography : Cryptography is a form of secret codes which is NOT known by anyone except for who invented it and to whom it refers to. This security measure is for protecting secret information and overcome computers and information being stole.
  2. Firewall : A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

by ismasyakila ended @ 10:09 AM