Search This Blog

Saturday, February 20, 2010

homework cuti tahun baru cina

1)Kekuatan dan kelemahan anda dalam menjawab soalan PK1 dan cara untuk mengatasinya. Nyatakan sekali langkah-langkah yang anda rancangkan agar anda dapat skor A dalam subjek ICT.


-kekuatan ketika menjawab soalan ICT ialah saya telah membuat ulangkaji dengan menggunakan nota-nota yang telah dibekalkan oleh guru ICT saya iaitu Puan Zalina.
 
-kelemahan ketika menjawab soalan ICT ialah saya telah terlupa nota yang telah saya baca dan saya keliru dengan kehendak soalan.
 
-cara-cara untuk mengatasi masalah ini ialah dengan melakukan lebih banyak ulangkaji dan latihan.Saya juga seharusnya memberikan sepenuh perhatian ketika guru sedang mengajar dan menyiapkan segala kerja yang telah di berikan.
 
-langkah-langkah yang telah saya rancang agar saya mendapat A dalam subjek ICT ialah saya akan bertanya kepada guru jika tidak memahami apa yang telah di ajar oleh beliau.Selain itu,saya juga akan melipat gandakan usaha saya untuk lebih berjaya di masa akan datang,insya-ALLAH.

Thursday, February 11, 2010

Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem.




The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".
 
 
 
Computer theft is a common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed.




A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.