Followers

Sunday 15 May 2016

Ethical, social and legal issues

Assalamualaikum,

Pada minggu ini, pensyarah kami iaitu Dr. Johari telah menerangkan topik terakhir bagi kelas telekomunikasi dan rangkaian. Topik yang terakhir ini adalah amat penting dalam kehidupan kita kerana ia merangkumi etika, sosial dan isu undang-undang dalam rangkaian yang terdapat di dalam komputer kita. Saya telah membuat sedikit rumusan berkaitan topik yang diajar :

Intellectual Property Rights

  • Refers to creations of the mind, original creative works from the creator-software, applications, systems, websites, etc.
  • IP is protected in law by, for example, patents, copyright and trademarks, which enable people to learn recognition or financial benefit from what they invent or create.
  • By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.
Copyrights

  • Copyright is the exclusive right given to the owner of a copyright for a specific period.
  • Permission must be obtained to use a copyrighted material from the copyright holder (and pay any required fee)
  • Exception: concept of fair use which permits limited duplication and use of a portion of copyrighted material for special purposes, such as teaching, research, news reporting, commentary, criticism.
http://bookwormtranslations.com/copyright-law-and-translation-what-you-need-to-know/
Trademarks

  • A trademark is a sign which distinguishes the goods and services of one trader from those of another.
  • A mark includes words, logos, pictures, names, letters, numbers or a combination of these.
  • A trademark is used as a marketing tool to enable customers in recognizing the product of a particular trader.
https://www.zepo.in/blog/2013/08/31/guide-how-to-register-trademark-for-your-brand-in/
Patents

  • A patent is an exclusive right granted for an invention, which is a product or a process that provides a new way of doing something, or offers a new technical solution to a problem.
  • A patent or utility innovation protection gives the owner of the patent/utility innovation the exclusive right to stop others from manufacturing, using and/or selling the owner's invention without the owner's consent or permission.

Network and computer security

Assalamualaikum,

Pada minggu ini, saya dan rakan-rakan telah diajar tentang network and computer security. Apa yang saya tahu ialah network and computer security adalah untuk mencegah dan memantau akses yang tidak dibenarkan, penyalahgunaan, pengubahsuaian serta penafian dalam rangkaian komputer. Tujuan security dibuat juga adalah untuk mengelak sebarang pencurian data, maklumat peribadi dan sebagainya. Saya telah membuat sedikit rumusan berkaitan topik tersebut :

SSL or Secure Socket Layer Certificates
  • Small data files that digitally bind a cryptography key to an organization's details.
  • Allow secure connections from a web server to a browser.
  • When installed on a web server, it activates the padlock and the http protocol.
  • Typically, SSL is used to secure credit card transactions, data transfer and logins.
Client Security Issues

Phishing

  • Attacks are performed with the intention to acquire personal information.
  • One common approach of performing phishing attack - send e-mails to stem from an official representative of a well-known company.
  • The recipient are encouraged to enter personal identification data.
http://blog.hotspotshield.com/2013/10/15/prevent-phishing-attacks/
Web Spoofing

  • Mocking the web presences of trusted corporations with the intention to trick customers.
  • Also employed for phishing attacks.
  • Typically relies on the following factors such as convincing website and email design, use of convincing URLs and pretending "secure" connections.
http://www.texascollaborative.org/SmithModule01/sec3_con.php
Desktop Security Issues

Adware
  • Programs used to deliver advertising contents.
  • Visible to the user, experienced to be annoying.
Spyware
  • Intends to remain unrecognized.
  • Used to gather personal info like login details, etc.
  • Spyware monitors the user's activities and scan the system.
Viruses
  • Programs that are attached to executable files or documents.
  • Virus is executed when the host program is executed or documents is loaded.
  • Spread through sharing of infected files or sending emails with viruses contained in the attachment.
  • Some only replicating, while some can cause further damage to the systems.
Worms
  • Programs that can replicate or copy themselves
  • For example, when it is being distributed as email attachments, a worm might send a copy to all the addresses listed in the local email address book.
Trojan horses
  • Programs that do not replicate themselves but typically cause damage or compromise security of infected computers.
  • It appears to be useful software and often the pretended useful functionality.
  • But when executed, they perform other kind of functionality.
  • Damage caused varies - include data theft and destruction or illegitimate access.
http://www.bbc.co.uk/education/guides/zp8mxnb/revision/2

Saturday 14 May 2016

Internet Application

Assalamualaikum,

Pembelajaran pada minggu ini lebih tertumpu kepada aplikasi internet dalam proses pengajaran dan pembelajaran. Apabila ia datang kepada pembelajaran dalam talian, pelajar menggunakan komunikasi segerak (synchronous) dan tidak segerak (asynchronous) untuk menyelesaikan kerja-kerja yang dilakukan. Saya telah merumuskan apa yang telah dipelajari di bawah:

Asynchronous communication is a communication that is not occurring at the same time. Discussion forums and email are two examples of how asynchronous communication is employed in online learning. There are pros and cons in asynchronous communication:

Pros:
  • Students have plenty of time to formulate thoughts.
  • Students are able to respond in detail to a question or topic that they might have answered incompletely in a real-time conversation.
  • Helps students internalize information by giving them time to research certain ideas or merely extra time for contemplation.
Cons:
  • Time lost waiting for a response
https://blog.codepath.com/2012/11/15/asynchronous-processing-in-web-applications-part-1-a-database-is-not-a-queue/
Synchronous communication is a communication that is occurring at the same time. Chat rooms and online conferences are good example of synchronous communication. In a chat room, people's comments to each other are relayed immediately, enabling a real-time discourse. Similarly, online conferencing with the benefit of voice over Internet protocol (VOIP) tools enable real-time conversations to take place online. Real-time conversations allow people to explore, through writing or talking, the class concepts. The act of verbalizing helps students build bridges between different ideas and concepts, thus helping them retain information more effectively.

Example :
http://blogs.skype.com/2014/10/09/improved-skype-desktop-clients-for-a-dynamic-new-chat-experience/
Difference between 3G & 4G 

http://www.slideshare.net/rAosAhAboO7/4g-technology-ppt-by-rahul-yadv

Monday 2 May 2016

Internet Infrastructure

Assalamualaikum,

Pada permulaan minggu ini, saya dan rakan-rakan dikehendaki untuk menjawab mid test bagi topik yang telah dipelajari sepanjang 8 minggu di dalam kelas telekomunikasi dan rangkaian. Selepas itu, pensyarah memulakan sesi p&p dengan menerangkan topik yang bertajuk infrastruktur internet. Saya telah membuat sedikit rumusan berkaitan topik yang diajar :

What is internet?
  • A global collection of network.
  • Interconnected computers work by transmitting data through a special type of packet switching which is known as the IP (internet protocol).
  • When you connect to the Internet. your computer becomes part of a network.
A hierarchy of network :
  • From a single computer to LAN
  • From LAN to ISP
  • ISP to WWW
Internet Service Provider :
  • ISP Also called IAP (Internet Access Provider).
  • Company that provides access to the internet.
  • Usually ISP provide software package, username, password and access phone number and modem.
  • ISP are connected to one another through Network Access Points (NAPs)
  • Example of ISP : TM
http://www.slideshare.net/dulithsl/internet-protocol-ip-ppt
http://webpage.pace.edu/ms16182p/networking/protocols.html
An IP address consist of 32 bits, often shown as 4 octets of numbers from 0-255

Domain Main System:
http://www.seopearl.com/internet-web-technologies/module4/domainName-service-structure.php

HTTP (HYPER TEXT TRANSFER CONTROL) :


• HTTP defines how messages are formatted and transmitted and what actions
Web servers and browsers should take in response to various command.
• For example, when you enter a URL in browser, this actually send an HTTP
command to the web server directing it to fetch and transmit the requested
page.

Type of internet connection and access:

-dial connection
-cable
-satellite internet access
-fixed wireless
-broadband
-mobile access

Saturday 30 April 2016

After Mid Semester Break

Assalamualaikum,

Selepas cuti pertengahan semester, pensyarah kelas telekomunikasi dan rangkaian telah diganti dengan pensyarah kedua iaitu Dr. Johari. Beliau akan meneruskan sesi pengajaran dan pembelajaran bagi subjek ini. Pada minggu ini, beliau telah mengajar topik baru iaitu Email. Saya telah membuat rumusan bagi topik yang telah diajar :

What is Email ?



• A mail, but is sent electronically across the Internet.
• Quickly delivered in seconds or minutes.

Advantages:
–Convenience, Fast speed, Inexpensive, Printable, Reliable, Global, Generality
(not limited to text, but graphics, programs, even sounds)
Disadvantages:
–Misdirection, Interception, Forgery, overload, Funk (Spamming), No response
(from the receiver).

Email Client and Server:
• Email client – software / program that can transfer e-mail from a local host
to a local e-mail server.
• Email server – software/program that can send/receive e-mail from/to other
email servers.
• Mailbox – An electronic mailbox is a disk file which holds email messages.

Carbon Copy Section (cc)
  • Send a message to more than one person, all the recipients will see the list of email address.
Blind Carbon Copy Section (bcc)
  • The addresses won't be seen by the recipients.
  • When email is sent to a large group of people who don't know each other.
Spam Mail

https://www.goodthingsguy.com/the-good-stuff-from-abroad/this-is-what-happens-when-you-reply-to-spam-mail/
  • Email spam, also known as junk email sending messages to numerous recipients by email.
  • The messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.
  • Spam email may also include malware as scripts or other executable file attachments.

Thursday 21 April 2016

Basic Web Development & Sanako Lab

Assalamualaikum,


Pembelajaran pada minggu ini meliputi tajuk 'Basic Web Development' dan lawatan sambil belajar ke makmal digital. Saya telah membuat sedikit rumusan berkaitan dengan tajuk yang diajar pada minggu ini serta laporan berkaitan lawatan ke makmal digital tersebut :

Basic Web Development:

What is HTML?
  • An acronym for HyperText Markup Language, HTML is the language used to tag various parts of a Web document so browsing software will know how to display that document's links, text, graphics and attached media. 
What is an HTML file?
  • HTML stands for Hyper Text Markup Language  
  • An HTML file is a text file containing small markup tags   
  • The markup tags tell the Web browser how to display the page   
  • An HTML file must have an htm or html file extension  
  • An HTML file can be created using a simple text editor
HTML: Head, Title, Body 
<html>
<head>
<title>Title of page</title>
</head>
<body>This is my homepage.
<b>This text is bold</b>
</body>
</html>


Hasil carian imej untuk different between file with .asp and .php

HTML Editor:

You can easily edit HTML files using a WYSIWYG (what you see is what you get) editor like FrontPage, Publisher, Adobe Dreamweaver, Adobe Flash, Claris Home Page, or Adobe Page Mill instead of writing your markup tags in a plain text file.

To learn more about using HTML, you can go to this site:

Laporan lawatan ke makmal digital:

Saya dan rakan-rakan diarah untuk ke akademik bahasa di D-05 pada minggu lepas. Banyak info baru berkaitan komputer dan perisian komputer yang kami dapat semasa lawatan. Antaranya:
  • semua makmal digital di bangunan akademik bahasa telah menggunakan perisian komputer sanako iaitu sanako 300 dan sanako 12 hundred.
  • makmal tersebut mempunyai 37 buah komputer termasuk komputer pensyarah.
  • makmal tersebut jugak telah menggunakan CAT5 iaitu cable Lan dan jugak cable internet.
Terdapat beberapa gambar yang diambil semasa lawatan ke makmal digital tersebut:

susunan komputer di dalam salah sebuah makmal.
pensyarah di dalam makmal tersebut tengah membuat
penerangan berkaitan kegunaan sanako lab
gambar saya dan rakan sekumpulan bersama En. Syed
Pada minggu ini, saya dan rakan-rakan dikehendaki membentangkan laporan berkaitan makmal digital di dalam bentuk power point.

 

Pada minggu ini juga merupakan hari terakhir kelas bersama Dr. Norashikin. Saya disini mengambil kesempatan untuk mengucapkan ribuan terima kasih kepada dr. kerana telah memberi ilmu dr. kepada kami tanpa jemu sepanjang 7 minggu kelas bersama dengan dr.

Gambar saya dan rakan- rakan sekelas bersama dengan Dr. Norashikin

Thursday 24 March 2016

Wireless Technology & Web Searching

Assalamualaikum,

Pembelajaran pada minggu ini meliputi dua topik iaitu Wireless Technology & Web searching. Saya telah membuat beberapa rumusan berkaitan kedua-dua topik tersebut :

Wireless Technology :
  • Used to send data through the airwaves between devices, instead of physical cable.
  • Wireless technology is generally used for mobile IT equipment. It encompasses cellular telephones, personal digital assistants (PDA's), and wireless networking.
  • Other examples of wireless technology: GPS units, garage door openers and or garage doors, wireless computer mice and keyboards, satellite television and cordless telephones.
Types of wireless network :

Wireless wide area networks (WWANs)
Wireless metropolitan area networks (WMANs)
Wireless local area networks (WLANs)
Wireless personal area networks (WPANs)


http://www.fortnightly.com/sites/default/files/styles/story_large/public/1407-TC.jpg?itok=ni-NN7Ra

Types of wireless technology :

Infra Red
Wireless local area networks (WLANs) , WiFi
Broadband wireless.
Bluetooth,
WiMax

http://www.exuberantsolutions.com/images/wireless.jpg
Web Searching :
  • World Wide Web (or WWW, It is called a “web” because the interconnections between documents resemble a spider’s web).
  • A software application that makes it easy and possible for nearly anyone to publish and browse hypertext documents on the Internet.
Types of web searching :

-Directories
-Search engines
-Meta-search engines
-Yellow pages

Web Browser :

• Can be defined as a software application used to locate and display web.
• Popular browser
–IE (Internet Explorer)
–Netscape
–Mozilla Firefox
–Safari
–Opera
–Mosaic and ask

How does searching work :

• User Interface–Allows you to type a query and displays the results.
• Searcher –The engine searches the database for matching your query.
• Evaluate–The engine assigns scores to the retrieved information.
• Gatherer–The component that travels the WEB, and collects information.
• Indexer –The engine that categorizes the data collected by the gatherer.

http://www.dominateurmarket.com/wp-content/uploads/2014/08/searchengines.jpg