16 November 2011

Mesyuarat Penyelarasan 5

Tarikh : 16 hingga 17 November 2011
Masa : 8.00 pagi hingga 4.30 petang
Tempat : PKG Pasir Pekan
Status : Hadir

14 November 2011

Mesyuarat Penyelarasan 4

Tarikh : 14 hingga 15 November 2011
Masa : 8.00 pagi - 4.30 petang
Tempat : PKG Pasir Pekan
Status : Hadir

13 November 2011

Peperiksaan SPM 2011

Selamt menduduki peperiksaan SPM pada tahun ini kepada semua pelajar dan khasnya kepada pelajar ICT SMK Mahmud Mahyidin. Buat yang terbaik.

06 November 2011

SELAMAT HARI RAYA AIDILADAHA

Syukur kepada Allah kerana dengan limpah kurniaNya kita semua masih dapat bernafas untuk menyambut Hari Raya Aidiladaha pada tahun ini.

Suasana umat Islam semasa di Kaabah.

28 October 2011

Mesyuarat Penyelarasan 3

Tarikh : 28 hingga 30 Oktober 2011
Masa : 8.00 pagi - 4.30 petang
Tempat : PKG Pasir Pekan
Status : Hadir

19 October 2011

Mesyuarat Penyelarasan 2

Tarikh : 19 hingga 23 Oktober 2011
Masa : 8.30 pagi hingga 4.30 petang
Tempat : Pearl Internasional Hotel, KL.
Status : Hadir

23 September 2011

List of Games (Guitar Hero)

20 September 2011

List of Games (Need For Speed)

30 August 2011

SELAMAT HARI RAYA AIDILFITRI

SELAMAT HARI RAYA AIDILFITRI DIUCAPKAN KEPADA SEMUA PENGUNJUNG BLOG SAYA INI, MAAF ZAHIR DAN BATIN SERTA SELAMAT MENYAMBUT HARI KEMERDEKAAN KE-54.

IKHLAS DARI :
MOHD BARHANUDIN BIN SULAIMAN
PENGENDALI BLOG

01 August 2011

































This wiring schematic is showing a connection for network cabel. This connection is using pair twisted cabel. Stright cabel is used to connect computers to a network through a hub or switch, while a crossed cabel is used to connect two computing devices directly.


ICT's student on making stright cabel for network. It's one of the assessment in ICT subject.

Crimping tool that used to crimp the wire with RJ45.


Example of network cabel after crimp with RJ45.

26 July 2011

Kursus Pengendalian EduWeb TV

Tarikh : 25 - 26 Julai 2011
Masa : 8.00 pagi - 4.30 petang
Tempat : PKG Pasir Pekan
Status : Hadir

21 July 2011

Tarikh : 19 hingga 21 Julai 2011
Masa : 8.00 pagi - 4.30 petang
Tempat : PKG Tumpat.
Status : Hadir

07 July 2011

National Robotics Competition (NRIC)

Tarikh : 7 Julai 2011
Masa : 8.30 pagi - 4.30 petang
Tempat : Dewan SMK Berangan
Status : Hadir / AJK Kawalan

02 July 2011

Assembler A PC

01 July 2011

Example of Comparison on Hardware

New Product : Olympus PEN E-PL1

The Olympus PEN E-PL1, is Olympus Corporation's third camera that uses the Micro Four Thirds mount after the Olympus PEN E-P1 and Olympus PEN E-P2. It is the lowest cost Micro Four Thirds camera currently available, with a US dollar MSRP of $500 as of  June 2011. In terms of market, DPReview considers the E-PL1 more aimed at the point-and-shoot (compact camera) market, rather than the DSLR market (like the E-P1 & E-P2) – it is more of a large-sensor compact than a small format DSLR. The E-PL1 is easy to use in automatic mode, but due to the small number of dedicated dials and buttons, it can be more awkward to use in manual modes compared to a DSLR.
Avalible on : February 3, 2010

 Old Product : Olympus PEN E-P1

The design of the camera is reminiscent of the Olympus PEN half frame film cameras and is marketed as the Olympus digital PEN. The model  was very similar to the Olympus PEN F. Initially, two lenses were available from Olympus, one 14–42 mm f/3.5–5.6 zoom and a 17 mm f/2.8 pancake prime lens. In addition to Micro Four Thirds lenses, Olympus offers adapters allowing the use of Four Thirds lenses, or OM Zuiko lenses originally manufactured for use on the classic OM series of film SLR cameras that Olympus was famed for years ago.The E-P1 does not have an optical or electronic viewfinder and uses a live preview screen, although a detachable optical viewfinder is included in a kit also comprising the camera and the 17 mm lens. It autofocuses using contrast-detection autofocus or face detection in live view mode.
Avalible on : June 16, 2009

References :
http://en.wikipedia.org/wiki/Olympus_Pen_E-P1
http://en.wikipedia.org/wiki/Olympus_PEN_E-PL1


26 June 2011

List of Software (Video Editor)

25 June 2011

Computer Ethics (Definition)

Computer ethics is a system of moral standards or moral values used as guideline for computer user.

A few definition by others writer ;


Maner’s Definition
The name “computer ethics” was not commonly used until the mid-1970s when Walter Maner began to use it. He defined this field of study as one that examines “ethical problems aggravated, transformed or created by computer technology.” Some old ethical problems, he said, were made worse by computers, while others came into existence because of computer technology. He suggested that we should use traditional ethical theories of philosophers, such as the utilitarian ethics of the English philosophers Jeremy Bentham and John Stuart Mill, or the rationalist ethics of the German philosopher Immanuel Kant.

Johnson’s Definition
In her book, Computer Ethics (1985), Deborah Johnson said that computer ethics studies the way in which computers “pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms.” Like Maner before her, Johnson adopted the “applied philosophy” approach of using procedures and concepts from utilitarianism and Kantianism. But, unlike Maner, she did not believe that computers create wholly new moral problems. Rather, she thought that computers gave a “new twist” to ethical questions that were already well known.

Moor’s Definition
In his influential article “What Is Computer Ethics?” (1985), James Moor provided a definition of computer ethics that is much broader and more wide-ranging than those of Maner or Johnson. It is independent of any specific philosopher’s theory; and it is compatible with a wide variety of approaches to ethical problem-solving. Since 1985, Moor’s definition has been the most influential one. He defined computer ethics as a field concerned with “policy vacuums” and “conceptual muddles” regarding the social and ethical use of  information technology: A typical problem in Computer Ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of Computer Ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions. . . .
One difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem in Computer Ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a coherent conceptual framework within which to formulate a policy for action. (Moor 1985, p. 266)
Moor said that computer technology is genuinely revolutionary because it is “logically malleable”: Computers are logically malleable in that they can be shaped and molded to do any activity that can be characterized in terms of inputs, outputs and connecting logical operations. . . . Because logic applies everywhere, the potential applications of computer technology appear limitless. The computer is the nearest thing we have to a universal tool. Indeed, the limits of computers are largely the limits of our own creativity. (Ibid.) According to Moor, the computer revolution will occur in two stages. The first stage is that of “technological introduction” in which computer technology is developed and refined. This already occurred during the first 40 years after the Second World War. The second stage – one that the industrialized world has only recently entered – is that of “technological permeation” in which technology gets integrated into everyday human activities and into social institutions, changing the very meaning of fundamental concepts, such as “money,” “education,” “work,” and “fair elections.” Moor’s way of defining computer ethics is very powerful and suggestive. It is broad enough to be compatible with a wide range of philosophical theories and methodologies, and it is rooted in a perceptive understanding of how technological revolutions proceed.

Bynum’s Definition
In 1989 Terrell Ward Bynum developed another broad definition of computer ethics following a suggestion in Moor’s 1985 paper. According to this view, computer ethics identifies and analyzes the impacts of information technology on such social and human values as health, wealth, work, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, etc. This very broad view of computer ethics employs applied ethics, sociology of computing, technology assessment, computer law, and related fields. It employs concepts, theories, and methodologies from these and other relevant disciplines. This conception of computer ethics is motivated by the belief that – eventually – information technology will profoundly affect everything that human beings hold dear.

Gotterbarn’s Definition
In the 1990s, Donald Gotterbarn became a strong advocate for a different approach to computer ethics. From his perspective, computer ethics should be viewed as a branch of professional ethics, concerned primarily with standards of good practice and codes of conduct for computing professionals: There is little attention paid to the domain of professional ethics – the values that guide the day-to-day activities of computing professionals in their role as professionals. By computing professional I mean anyone involved in the design and development of computer artifacts. . . . The ethical decisions made during the development of these artifacts have a direct relationship to many of the issues discussed under the broader concept of computer ethics. (Gotterbarn 1991, p. 26)
With this “professional ethics” approach to computer ethics, Gotterbarn co-authored the 1992 version of the ACM Code of Ethics and Professional Conduct and led a team of scholars in the development of the 1999 ACM/IEEE Software Engineering Code of Ethics and Professional Practice. (Both of these codes of ethics are included in this book in Part III.) Each of these definitions of computer ethics has influenced this textbook to some extent. Part I makes special use of the ideas of Moor and Maner; later parts of the book bring in other ideas as well.

Albert Einstein said "It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors."

Original text at : http://www.blackwellpublishing.com

21 June 2011

Example of Pervasive Computing

How to write an example of pervasive computing :

ASUS Eee Pad 101TC


The Eee Pad 101TC is in some respects a whole different kettle of fish to its bigger brother. It's not just the 10 inches of glass that follows in the iPad's footsteps, but also the metal sleeve around the edge now. Either way, this has become an aesthetically acceptable style and the textured backside also looks good and adds grip, however in the early sample on show the quality of manufacture still needs some tweaking around the edges.
Avalible on : 31 May 2011

 ASUS EEE PAD 101

Other links that lead to example of perversive computing
1. The Japanese Wrist Mounted Finger Piano
2. Auto Pilot Emotional ConnectionsThrough AI
3. 

20 June 2011

Open source software, hardware & software.

Open source software is computer software that is available in source code form, the source code and certain other rights normally reserved for copyright holders are provided under a software license that permits users to study, change, improve and at times also to distribute the software. Some open source software is available within the public domain. Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-source development and often compared to user-generated content or open content movements.

Hardware is a general term for the physical artifacts of a technology. It mean the physical  devices or physical components of a computer system, in the form of computer hardware. Hardware of a modern personal computer are monitor, motherboard, CPU, RAM, expansion cards, power supply, optical disc drive, hard disk drive, keyboard and mouse.

Software is a collection of computer programs and related data that provide the instructions telling a computer what to do and how to do it. We can also say software refers to one or more computer programs and data held in the storage of the computer for some purposes. In other words software is a set of programs, procedures, algorithms and its documentation. Program software performs the function program it implements, either by directly providing instructions to the computer hardware or by serving as input to another piece of software. Software is intangible, meaning it "cannot be touched". Software is also sometimes used in a more narrow sense, meaning application software only.

 References :

1. http://en.wikipedia.org/wiki/Open-source_software
2. http://en.wikipedia.org/wiki/Computer_software
3. http://en.wikipedia.org/wiki/Hardware
4. http://en.wikipedia.org/wiki/Personal_computer_hardware

18 June 2011

COMPUTER LAB RULES AND REGULATIONS

1. Pupils are prohibited to enter the lab unless authorised by the teacher.
2. Scan pen drive before using them.
3. Report all problems related to the system to the teacher.
4. Do not attempt to repair or tamper with lab equipment.
5. Be responsible when using equipment, software and facilities in the lab.
6. Do not move any equipment from its original position.
7. Do not remove or load any software into the computer.
8. Do not change the settings in the computer.
9. Save all work in external storage device and not in the computer.
10. Do not bring in bags, food and drinks into the lab.
11. Turn off the computer accordingly after use.
12. Switch off all power suplies before leaving the lab.
13. Internet facility is strictly for educational purpose only.
14. Teachers shoul record the use of computer lab in the lab log book.
15. All user should record the use of computers in the the computer log book.
16. The Lab should be kept clean and tidy at all times.

Coment :
This Computer Lab Rules and Regulation is post as a guide line for student when they enter the computer's lab. This post is under educational proposes only. With this post, I hope that student can read and obey the  Rules and Regulations state above. Thank you.

15 June 2011

Computer Component & Hardware
































Gambar perkakasan komputer yang di ambil dari dalam Makmal komputer SMKPC2. Ini sebagai pengetahuan kepada generasi baru tentang beberapa perkakasan komputer yang sudah tiada dalam pasaran sekarang disamping kegunaan pelajar-pelajar yang mengambil ICT dalam mengenal perkasasan komputer.
Bolehkah anda membuat pengkelasan perkakasan-perkakasan tersebut ?




14 June 2011

Tarikh : 13 & 14 Jun 2011
Hari : Isnin & Selasa
Masa : 8.00 pagi hingga 5.00 petang
Tempat : SMK Kutan

Status : Hadir / AJK Statistik

12 June 2011

MS Windows Operating System



Slide ini memaparkan beberapa sistem operasi Microsoft Windows yang dikeluarkan oleh Microsoft. Bermula pada awal 90an Microsoft telah melalui zaman perubahan dalam pengeluaran sistem operasi untuk komputer. Antara sistem operasi yang mashur ialah Microsoft Windows 95 yang dilancarkan pada 24 Ogos 1995. Ianya adalah sistem operasi yang pertama yang dikeluarkan oleh Microsoft yang menggunakan sepenuhnya antaramuka grafik. Penghasilan sistem operasi ini diteruskan lagi kerana persaingan perniagaan dengan Apple. Windows 95 ditingkatkan dengan dipasarkan Windows 95 A, B dan C.

Perlumbaan dalam sistem ini juga telah mengalakan Microsoft dengan mengeluarkan Microsoft Windows 98. WIndows 98 ini juga ditingkatkan dengan adanya Windows 98 Second Edition.
Pengkajian dalam memuaskan hati pelanggan telah merangsang Microsoft sebagai syarikat pengeluar sistem operasi komputer mempromosikan tahun 2000 dengan mengeluarkan Windows 2000 dan juga Windows Melenium (Windows Me). Disebabkan masalah dalam pengoperasian Windows ME, Microsoft mengeluarkan pula Windows XP pada Oktober 2001.

Windows XP merupakan antara sistem operasi yang amat berjaya oleh Microsoft. Windows XP juga mempunyai beberapa siri seperti Servis Pack 1, Servis Pack 2 dan Servis Pack 3. Pada 30 Januari 2007 Microsoft melancarkan pula sistem operasi yang baru iaitu Windows Vista. Vista dikeluarka dalam 4 pakej dengan harga yang berlainan. Microsoft mendapat kritikan yang amat teruk atas pengeluaran Windows Vista.

Sistem operasi yang terbaru dikeluarkan oleh Microsoft ialah Windows 7 yang dilancarkan pada 22 Julai 2009. Windows 7 juga antara sistem operasi yang stabil yang dikeluarkan oleh Microsoft. Mengikut maklumat semasa melancarkan Windows 7 ini satu sistem operasi akan dikeluarkan selepas 2 tahun iaitu Windows 8.

Selain dari mengeluarkan sistem operasi untuk komputer, Microsoft juga mengeluarkan sistem operasi untuk komputer server dan juga sistem operasi untuk aksesori lain seperti PDA dan telefon tangan.

Pautan untuk penerangan setiap sistem operasi :

Sistem operasi komputer
Windows 3.0
Windows 3.1x
Windows 95
Windows 98
Windows ME
Windows XP
Windows Vista
Windows 7

Sistem operasi komputer server
Windows NT
Windows 2000
Windows Server 2003
Windows Home Server
Windows Server 2008

Sistem operasi mobile
Windows CE
Windows Phone 7
Windows Mobile

04 June 2011

Device Driver

In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware connects. When a calling program invokes a routine in the driver, the driver issues commands to the device. Once the device sends data back to the driver, the driver may invoke routines in the original calling program. Drivers are hardware-dependent and operating-system-specific. They usually provide the interrupt handling required for any necessary asynchronous time-dependent hardware interface.

Taken from  http://en.wikipedia.org/wiki/Software_driver

28 May 2011

List of Game Console

27 May 2011

List of Software (Anti Virus)

1. Norton Anti Virus
2. Kaspersky Anti Virus
3. ESET NOD
4. AVIRA
5. avast
6. AVG
7. McAfee
8. Panda
9. BitDefender
10. Norman

A few of the anti virus software in the market. Click at the anti-virus name for more details.

26 May 2011

List Of Hardware (Cameras)

1. Let Go Digital
2. Panasonic LUMIX
3. Sony DC
4. Sony alfa DSLR
5. Canon EOS DSLR
6. Canon DC
7. Nikon DSLR
8. Nikon DC

This is a few of link to product of cameras. Let Go Digital is the link to all type of cameras.

25 May 2011

Mesyuarat KKR Daerah Tumpat 3/2011

Tarikh : 25 Mei 2011
Hari : Rabu
Masa : 2.30 ptg
Tempat : Bilik Mesyuarat, PPD Tumpat.

Status : Hadir

24 May 2011

Input device (slide.com)



This is a few example of input devices for computers.

23 May 2011

Open Source Definition

Open Source Definition

Introduction

Open source doesn't just mean access to the source code.

The distribution terms of open-source software must comply with the following criteria:

1. Free Redistribution

The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.

2. Source Code

The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.

3. Derived Works

The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software.

4. Integrity of The Author's Source Code

The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software.

5. No Discrimination Against Persons or Groups

The license must not discriminate against any person or group of persons.

6. No Discrimination Against Fields of Endeavor

The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research.

7. Distribution of License

The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.

8. License Must Not Be Specific to a Product

The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.

9. License Must Not Restrict Other Software

The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software.

10. License Must Be Technology-Neutral

No provision of the license may be predicated on any individual technology or style of interface.

22 May 2011

Example of Computer's Input Devices

Type of input device

21 May 2011

Example of Computer's Output Devices

12 May 2011

Mesyuarat KKR Daerah Tumpat

Tarikh : 12 Mei 2011
Hari : Khamis
Masa : 2.30 petang
Tempat : Bilik Mesyuarat, PPD Tumpat.

Status : Hadir

05 May 2011

Perjalanan

4 Mei : Kuantan, Pahang.
5 Mei : Kota Bharu, Kelantan.

04 May 2011

Kursus Data Base untuk Subjek ICT

Tarikh : 2 hingga 4 Mei 2011
Hari : Isnin hingga Rabu
Tempat : Makmal Komputer, SMK Pahi, Kuala Krai, Kelantan.

22 April 2011

Kelas Tambahan

Tarikh : 23 April 2011
Hari : Sabtu
Tingkatan : 3C

Catatan :
Kelas tambahan bermula pada bulan April, ini bertujuan untuk memberi peluang mengulangkaji pelajaran kepada pelajar. Diharap para pelajar tidak akan melepaskan peluang untuk belajar dengan lebih tekun untuk mencapai kejayaan yang cemerlang samada SPM atau PMR nanti.

07 April 2011

How to create a New Post in Blog

Click here to learn how to create a New Post.

Student are riquired to follow the link to learn how to create a New Post.

06 April 2011

Sample of Slideshow


 

blogger templates | Make Money Online