Thursday, 29 September 2016

Chapter 4 

Activity 1 : List four Web 2.0 tools that you commonly use
The Web 2.0 tools and list out that i usually use are google, wikipedia, twitter, youtube and facebook.

Activity 2 : The Browsers Crossword Challenge
1. The name  is related to the zoo. safari.
2. KHTML-based open-source browser konqueror.
3. Reminds you of drama. opera.
4. The name has an animal on it. firefox.
5. Comes with Windows Operating System 7 across. internet explorer.
6. One of the earliest internet browsers. netscape.
7. Developed by the famous search engine company. chrome.

Activity 3 : Internet Censorship - Views
My opinion on internet censorship is the control suppression of what can be accessed, published or viewed on the internet. The extent of internet censorship varies on a country-to country basis. While most democratic countries have moderate censorship internet, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Many of the issues associated with internet censorship are similar to those for offline censorship of more traditional media such as newspaper, magazines, books, music, radio, television and film. One difference is that national borders are more permeable online: the residents of a country that bans certain information can find it on websites hosted outside the country. Thus censor must work to prevent access to information even though they lack physical or legal control over the websites themselves. The government should filter the internet contents and restrict our access to certain websites.

Friday, 23 September 2016

Chapter 3

Activity 1 : LAN vs WAN

The two differences between these two forms of computer networks are:

LAN- Local Area Network
WAN- Wider Area Network
Modern LAN based on the Ethernet.
WAN can be wired, using fiber-optic cable.
Higher data transfer.
Lower data transfer.
Have a fast connecting speed.
Slow connecting speed.
Example: The two ways to implement Ethernet are twisted- pair cable or wireless. Twisted-pair cable plug into switches using RJ-45 connectors similar to phone jacks.   
Example: A wireless might use microwave or infrared(IR) transmission technology or even satellite.

Activity 2

Types of network hardware

Type of network hardware
Main function
Is able to both send and receive of information for computer network.

Is a multiport network bridge that use hardware addresses to proses and forward data.
Network interface card
Network card that enable to connect your computer to local data network or internet.

Monday, 19 September 2016

Chapter 2

Activity 3 
Windows 8
- computer boots are faster than before
- windows app store can download games, music
- restoration of problem pc's and devices is possible through the Windows Recovery Environment. If the computer is not working correctly, it can be refreshed & the user's profile & documents preserved.
- touch screen optimization provides users with a familiar user interface regardless of which computing device they are using
- security features 
AppLocker - can be used to limit access to data. This is help prevent accidental modification or exposure of sensitive data.

Chapter 2

Activity 2: managing files in your computer
The files that I manage in my computer are using my documents to store my personal documents and then back up my files in one place. Then, I will keep my files separate from programs as it can reduce  the risk of accidentally deleting my documents when install or upgrade a program. I will adopt consistent methods for file and folder naming and keep the names short. The feedback from others are they will create a new folder with different types of the subject and the names of the folder will not be too long to keep it easy to find the files that needed.

Chapter 2

Chapter 2  Activity 1                                                                                               

3.main memori
4.expansion cari
5.power supaya unit
6.optical disk drive
7.hard disk drive
11.system software
12.application software
15.external disk

Wednesday, 7 September 2016


Three key differences of ICT-based devices of now and then:
  1. Nowadays device is smaller and portable compare to the 70's device
  2. Compare to the 70's device , device in 90's able to do multitasking
  3. 90's device is more friendly user compare to the 70's
  4. 90's device is more cheaper than 70's device.
  5. The performance in 90's device faster than 70's device.
  6. 90's device have internet connectivity compare to 70's device.
  7. 90's device have a large capacity compared to 70's device. 
  8. 90's device have less voltage and power requirement compared to 70's device.


The vision of ICT would be like in the future after 20 to 30 years from now is the eye tracking technology. The eye tracking technology measures eye positions and movements which are analysed through computer applications. The eye tracking technology could have many possible applications in future including law enforcement, airport security, health care and human-computer interaction. Besides that, the technology of voice and tone recognition not only can be used to confirm a person's identity but tone recognition can be use to detect a person's health or emotional state. It can be help in security and health care in the future. The future technology may be have the brain wave sensing that enables the control of technology functions by the brain and is totally hands free. The possibilities for this technology to be used in games,sports,educations,health automobile and so on.