<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/2903480847704358081?origin\x3dhttp://ismasyakict.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script> <iframe src="http://www.blogger.com/navbar.g?targetBlogID=3054107564476057249&blogName=url.blogspot.com&publishMode=PUBLISH_MODE_BLOGSPOT&navbarType=BLACK&layoutType=CLASSIC&homepageUrl=http%3A%2F%2Furl.blogspot.com%2F&searchRoot=http%3A%2F%2Furl.blogspot.com%2Fsearch" height="30px" width="100%" marginwidth="0" marginheight="0" scrolling="no" id="navbar-iframe" frameborder="0"></iframe> <div id="space-for-ie"></div>
ismasyakila
A typical 16y/o girl named Isma Syakila, learning ICT in her school. Its time to recall what she had learnt. :)
Love Notes
Comments are appreciated. ^_^

The Queue
School's Official Website
Blog Panatia ICT
Teacher Hani's Blog


Musics


News
Feb 23, 2010
Wonder....

Write a short essay 'why I choose ICT subject rather than PA or biology?
Because ICT is moving very fast time to time. So, in future, I think most of the skills need to use ICT. All the industries nowadays using ICT in its process.

Intellectual property laws cover ideas,inuentions,literary creations,unique
names,business models,industrial processescomputer program codes and many more.
We need a laws and ethics to protect our property.

Define 'computer theft' and give an example of an activity that reflects computer theft.
Define of computer theft is as the anauthorized used of another person's property.
Example:

Hacking is a source of threat to security in computer.Define hacking and give an example of hacking.
Hacking refer to unauthorized access to the computer system by a hacker.
Example: Someone who accesses a computer network illegally but has to intent of destroying data.

by ismasyakila ended @ 10:30 AM