Sunday, November 25, 2012

NOTA GIMP (aazizmyunos.blogspot.com)


NOTA GIMP (aazizmyunos.blogspot.com)

1. Menukar imej gambar baru menjadi lama

  • Klik File New
  • Tukar resolusi kepada 1024 x 768
  • Open imej gambar yang baru dari folder gambar
  • Klik Filter, Decor, Old Photo, OK
  • Kemudian klik Filter, Décor, Coffee Stain.
  • Jumlah Stain boleh di setkan sama ada 1,2,3 atau lebih.
  • Klik Imej, Flatten Imej (Hasilnya, kesemua layer imej akan bergabubg jadi satu)

  1. Membentuk Corak

    • Klik File New
    • Tukar resolusi kepada 1024 x 768
    • Kemudian tukar warna forground yang ada pada menu tools sebelah kiri
    • Contoh tukar pada warna merah
    • Kemudian klik Filter, Render, Line Nova, OK
    • Lihat pada hasilnya

  1. Membina Frame Pada Gambar

  • Klik File New
  • Tukar resolusi kepada 1024 x 768
  • Open imej gambar yang baru dari folder gambar
  • Klik pada butang add new layer yang ada pada menu layer di sebelah kanan
  • Pilih White
  • Kemudian lukis rectangle pada skrin
  • Pilih Filters, Light and Shadow, Drop Shadow
  • Adjust Opacity kepada 100
  • Tekan Delete
  • Press Ctrl a, Ctrl x dan Ctrl v
  • Select Pain bucket tool
  • Pada Fill Type tukar kepada Pattern Fill dan pilih corak yang di gemari
  • Pergi semula pada skrin gambar dan klik pada ruang di luar gambar’
  • Sebuah Frame Gambar yang dipilh akan terhasil
GIMP : GNU Image manupulation Program (GNU – Gyeongsang National Uni)
  1. Menggunakan Layer Mask Pada Gambar

  • Open imej gambar yang baru dari folder gambar
  • Contoh pilih gambar seekor Panda
  • Klik butang kanan pada layer gambar Panda
  • Pilih New Layer, White , OK
  • Pada New Layer tadi, klik butang sebelah kanan dan Pilih Add Layer Mask dan pilih White Full Opacity & klik add
  • Kemudian pilih Paint Brush & brush pada skrin ( Size brush boleh disetkan pada scale – guna 10.00 paling maksima)
  • Lihat pada hasilnya

  1. Mengubah suai rupa bentuk gambar seseorang

  • Open imej gambar wajah seseorang
  • Klik Filters, Distorts, Iwarp
  • Deform Mode pilih move
  • Kemudian corakkan rupa wajah yang baru
  • Lihat hasilnya

  1. Membentuk gambar kucing supaya kelihatan senyum

  • Open imej gambar seekor kucing
  • Klik Filters, Distorts, Iwarp, Move
  • Kemudian bentuk imej senyum pada bibir si kucing dengan guna move
  • Setelah itu, pilih butang animate.
  • Klik animate dan ping pong
  • Number of frames pilih 2 atau lebih. Klik OK
  • Klik File dan pilih save as
  • Pastikan waktu save, nama fail itu ditukar kepada format gif
  • Kemudian tick pada save as animation dan export
  • Akhir sekali klik save
  • Setelah selesai, buka gambar yang telah di save itu dan lihat hasilnya.

  1. Menghasilkan thumb print ( cap jari )

Monday, October 22, 2012

Q-Pre-PSPM1 2012/2013 KM...

(<a href="https://sites.google.com/a/chekguwan.co.cc/main-page/Tutorial" target="_new">Tutorial</a>)-tutorial
  1. One of the bad aspects of computer use is that even the children who cannot read and write yet, are already used to this machine. They develop at a very early age the habit of playing on the computers for hours on end.”
    source : http://www.buzzle.com/articles/harmful-influence-of-the-computer.html
    1. The paragraph above mention the negatives impact of computers technology in society.
      1. List another two (2) bad impact of a computers in society. [2 marks]
      2. Explain either one of your answer in 1(i) [2 marks]

    2. Computer is an electronic devices that is build to help people in completing certain task. Furthermore the term 'IT' is being brought up as a concept to determine the operation of digitals world.
      1. Briefly describes the meaning of 'IT' . [2 marks]
      2. Garmin GPS is an example of IT device use to enhance driving experiences.
        State another two (2) application of IT with a suitable specific examples for each.

  2. Hexadecimal number is one of the number system implemented in computers.
    1. What is a number system ? [2 marks]
    2. State another two (2) types of number system. [2 marks]
    3. Convert decimal number, 34 into binary number. [2 marks]
    1. Convert your answer in (c) into hexadecimal number. [2 marks]
    1. Based on the boolean expression, Y =A( B + A’), draw the logic circuit. [2 marks]
    1. Sally bought a new technology car, Prius C(Hybrid). Prius C automatically started fuel engine if electronic engine was started and she drove at 10 metres.
      1. Based on the situations above, draw a logic circuit and clearly label with a proper notation. [2marks]
      1. Write boolean expression for your answer in f(i). [2 marks]
      2. Write the output if the electronic engine start and she drives for 3 metres. [1 mark]
  1. Computer hardware is the collection of physical elements that comprise a computer and also refers to the physical parts or components of computer.
    1. Define output device. [2 marks]
    2. Give two (2) types of output devices normally used in mobile devices. [2 marks]
    3. Aiman wants to create a web site about Internet Technology for his practical class.
      1. His lecturer wants him to include pictures from magazines and recorded voice over. Suggest the two (2) input devices to help him to complete the task. [2 marks]
      2. Give two (2) output devices that he can use to present his work. [2 marks]
    4. The Central Processing Unit (CPU) interprets and carries out the basic instruction that make a computer function. When someone used an application in a computer such as Open office Calc, a few operations take place in the CPU. State four (4) main operations of the CPU. [4 marks]
    5. Storage (also called mass storage or auxiliary storage) refers to the various ways a computer system can store software and data.
      1. State two (2) types of primary storage. [2 marks]
      2. Give one (1) example for either one of your answer in (e)i. [1 marks]
  1. Computer software, or a computer program – is a collection of instructions that tell a computer on how to perform specific task.
    1. Identify types of input devices based on the situations below;
      1. allowing user to control on the screen [1 mark]
      2. capturing a full-motion images and store them on computer’s storage medium such as hard disk or optical disc [1 mark]
      3. authenticates a person identity by verifying a personal characteristic. [1 mark]
    2. Computer becoming slow when opening a certain software. Suggest three (3) utility programs that we can use to overcome this problem. [3 marks]
    3. Operating system is a set of programs contain instructions that coordinate all the activities among computer hardware. Function of operating system includes process of starting the computer.
      1. State two (2) types of process involved in starting the computer. [2 marks]
      2. State another two (2) functions of an operating system. [2 marks]
  1. Amir work in TMNet's Planning Division based in Klang, Selangor. Currently he's working with a new national grand project, to provide a blueprint for a new, fast and speed communications infrastructures in a specific target area – most probably in rurals. This is to fulfill government vision in creating a nation with a respectable digital-knowledges community.
    1. What is TMNet ? [3 marks]
    2. The statement “.. to provide a blueprint for a new fast speed communications infrastructures in a specific target area .. “ best refers to. [2 marks]
    3. TMNet is expect to provide a more cheaper rate/month for their Internet-Procotol TV (IPTV) services, linking to the ideas stated in the above paragraph.
      1. Identify another business that provides an IPTV services to customers. [1 mark]
      2. State a connection that deliver a fast and smooth streaming of a TV-programmes via Internet [1 mark]
      3. Study the image above, and list three (3) WISP that is popular among students in Malaysia [3 marks]
    1. Differentiate these two (2) wireless technology;
      1. WiFi and WiMAX. [4 marks]
      2. State the data transfer rate speed for a dial-up Internet connection. [1 mark]
  1. IPCONFIG is a command (in Windows-based OS) that display the network configuration of a PC's. Study the screenshot below :-
    1. From the screenshot above;
      1. Identify IP address shown in the image. [1 mark]
      2. What is an IP address ? [2 mark]
      3. IPV6 is a new version of an IP address, why does it (the new standards) exist? [2 marks]
      1. Name a system that use to map an IP address accordingly whenever devices connected into a network. [1 mark]
  1. Bibi create her own personal site from scratch by using Kompozer – an open-source software. The URL for her site is http://bibibercerita.com.my
    1. The word URL , is an acronym for .. [1 mark]
      1. From the given URL, identify each part of the web address [2 marks]
      2. What is the Internet services that enables Bibi to upload and update her site's contents (file, image, video, etc) in her web server. [1 mark]
      3. From the screenshot above, state the top-level domain (TLD), path and the web filename. [3 marks]
      http://www.takepart.com/education?cmpid=tpedu-eml-2012-10-11-intel
    1. Study the image above and,
      1. Identify the area (with dotted lines) X and Y [2 marks]
      2. What is the effects on clicking any of the icons available in X ? [1 mark]
      3. What is the function of the textRead More >>” [2 marks]
      4. Name a suitable types of website for the screenshot. [1 marks]
    2. Web browser is an application softwares that enable user to view a webpage over the Internet. List three (3) commonly use web browsers. [3 marks]
      1. Nowadays, almost all web browsers has a built-in search engine. Describes the functions of a search engine. [2 marks]
      2. Name the most popular search engines available in the world wide web. [1 mark]
  1. Computer and network threats grow as the technology evolve. There are many ways of preventing activities to be taken to protect our network and devices as well as data and information. There are also rules and regulations to protect our digital ideas, invention, products in many fields.
    1. What is Intellectual Property? [2 marks]
    2. Based on the description given, identify types of Intellectual Property. [ 3marks]
Num.
Description Types
1
Distinctive sign identifies certain goods and services.

2
Legal term describing rights given to creator for literary and artistic works.

3
Exclusive right granted for invention or new solution of problem.

    1. Based on the situations given, identify unethical activities done by unscrupulous programmers and end-users.
      1. Raziq bought an original CD movie of Green Lantern at Shopping Mall. He duplicated the movie and gave to Ranjit and Fatimah. Then, they watch the movie with their family during school holidays. [1 mark]
      2. Maznah was assigned to design backdrop for annual dinner of her company. She did not have any suitable software to design it, so she downloaded one of proprietary software from Internet. Then she installed in her computer and using keygen to activate the software. [1 mark]
      3. Farouk, an Information Technology Executive was terminated immediately from IDN Sdn. Bhd. The last day of his work, he erased one of the company program created by him in his office's PC. [1 mark]
    1. Identify types of computer and network threats refering to the table below [2 marks]
Num
Description
Types
1
Hides in a computer and allows someone from remote location take a full control of computer.

2
Disruption of computer in accessing Internet Services.






Friday, October 19, 2012

Ans Pre-PSPM1 2012/2013 - KMM

Question Number
Answer
Marks
1 (a)
  • Information Technology (IT) is defined as the use of computer hardware and software to store, retrieve, and manipulate information.
    OR
  • The study, design, development, implementation, support or management of computer-based information systems.
    OR
  • Computer and communication technologies, such as communication links to the Internet that provides help and understanding to the end user.
    OR
  • The use of computer-based information systems to process, transmit and store data and also information.
    OR
  • The use of computer and communications equipment and software to create, design, store, transmit, interpret and manipulate information in various format.
J2
1 (b)
  • Self access learning
  • Distance learning
  • Online forum
  • Smart School
  • Edutainment
J1
J1
1 (c)
  • Cloud computing is an Internet service that provides computing needs to computer users, whereby data is stored at a server on the Internet and available anywhere the Internet can be accessed.

OR

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices.
    OR
  • Cloud computing is an Internet services provided by a cloud provider to computer users. The services provided can be server resources, computing needs, networking, computer security, etc.
J2
1 (d)
  • Client
  • Internet
  • Service Provider
J1
J1
J1
1 (e)
  • Google - Verizon
  • Amazon - Openstack
  • Microsoft - Salesforce
  • AT&T - VMware
  • Citrix
  • OR any acceptable answer
J1
2 (a)

=


= 16384 + 3840 + 96 + 4


= 20324




J1 (working)


J1 (working)


J1
2(b)

1 1 0 1 0 1 0 1
8 4 2 1 8 4 2 1
8 + 4 + 0+1 0 + 4+0+1


= D5









J1 (working)


J1 (working)


J1
2(c)

2 180
2 90 0
2 45 0
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
2 0 1

= 10110100




JIJI (working)


JI (working)






















J1
3 (a)
F = X + Y' Z
J2
3 (b)
1
J1
3 (c)





J3

(each gate correct - J1)
3 (d)
Unicode → 1 character = 16 bits

Cloud Computing = 15 character = 15x16 =

240 bits




J2
3 (e) i
512/1024 = 0.5 GB
J1
3 (e) ii
2 x 1024 = 2048 MB
J1
3 (e) iii
1 x 1024 x 1024 = 1048756 bytes
J1
4 (a)
Processor → Interprets and carries out the basic instructions that operates a computer.

Memory → Electronic components that store instructions, data, and results





J2


J2
4.(b)
Primary storage
Secondary storage
- Fast data access - Slower data access
- Expensive - Cheaper
- RAM, ROM - CD, DVD,Hard Disk,etc




J2 (choose one of them)

J1 J1
4. (c)
i) Fetch
ii) Decode

* Must follow the sequence
J1
J1

4.(d)
Sound Card
J2
4.(e) i
Operating System
Utility Program
J1




4 (e) ii
Allows user to perform a specific tasks.
J2
4 (e) iii
Electronic Spreadsheet Software
J2
4 (e) iv
MS Excel
Calc
Lotus 123
J1
4 (e) v
  • Calculation can be done automatically
  • Changing data automatically updates calculations
  • More flexibility
  • or any acceptable answer
J2
5 (a)
Network is a collection of computers and
devices connected together via
communication devices and
transmission media.
J2
5 (b)
To share hardware, software or resources,
or any acceptable answer
J1
5 (c)
Communication Device : modem, switch, hub etc.
Transmission media : wireless, wired , cable, AP. etc.
J1
J1
5 (d) (i)

J1 for correct topology
J1 for correct terminator position
5(d)(ii)
To prevent signal bounce back into network
J1
5(d)(iii)
1. If one device fails, ONLY that device is affected.
2. Devices can be added to or removed from
network with little or no disruption.
3. Easy to troubleshoot and isolate problem.



J1 for correct answer. Maximum J2
5(e)
- A cable forms a closed loop (ring) with all computers and devices arranged along the ring.
- Token Ring
J1
J1
6 (i)
-University of California at Los Angeles
-University of California at Santa Barbara
-The Stanford Research Institute
-University of Utah



J1 for correct answer. Maximum J2
6(ii)
Not-for-profit R&D project

J2
6(iii)
  • Dial Up
  • Broadband
J1
J1
6(iv)
-Data is transmitted through radio waves. Or
- Provide high-speed Internet connections to compatible or properly equipped wireless computers and device.

J2 for any answer
6(v)
- Satellite Internet Broadband
J1
6(vi)
  • DSL
  • Cable Modem
  • Fixes Wireless
  • Cellular radio network
  • Fiber to primises
J1 for correct answer. Maximum J3
6(vii)
Any number that separate by 4 dot, which number is between 0-255
J1
7(i)
-An electronic document on the Web, which can contain text, graphics, audio, video, animation
- Dynamic pages
- Static pages


J1

J1

J1
7(ii)
A Web browser is an Application Software that allows users to access and view Web pages.
- Firefox, IE, Safari, and any acceptable answer



J1

J2
7(iii)
An e-mail address is a combination of a user name and a domain name that identifies a user.
J1


-location on an Internet server that permits users to chat with each other.
- real-time Internet communications service that notifies you when one or more people are online .

J1


J1
7(iv)
Newsreader is an application needed to join newsgroup
J1





6

7

8 (a) i
    Information theft
J2
8 (a) ii
    Software theft
    OR
    Information theft
J2
8 (a) iii
    Unauthorised access
    OR
    Internet / Network Attack
J2
8 (b) i
  • Malicious Code / Malware – (Virus, Worm, Trojan Horse, Rootkit, Spyware)
  • Botnet
  • DoS Attack
  • Spoofing
  • Backdoor
  • Unauthorised access and use
  • Natural Disaster
  • Information theft
  • System Failure
J1 (Select any one)
8 (b) ii
  • Antivirus
  • Antispyware
  • Data backup
  • Firewall
  • Cryptography
  • Human aspect: awareness
  • Identification & authentication
J1
JI
(Select any two)
8 (c)
    Cryptography
J1

Thursday, October 18, 2012

Q- CompSys DK3

What is Computer?
What is Computer System?
Input-Process-Output Model (IPO)

Convert MB to GB -
a. 2200 MB
b. 3600 MB
c. 8700 MB
d. 5600 MB

Convert the number to the binary system
a) 34
b) 47
c) 59
d) 73

Convert the binary numbers to decimal number
a) 110011
b) 100001
c) 101010
d) 100100

Convert AFB2 to decimal number
Convert BA8 to decimal number
Convert AFFA to decimal number
Convert the binary number 10010 to hexadecimal.
Convert the binary number 1111 to hexadecimal.
Convert the hexadecimal number 3FD to binary number
Convert the hexadecimal number 1A2 to binary number
Convert the hexadecimal number AF1 to binary number

Examples of coding systems :
 

a)   1. (1 + 0)
b)   (1 + 1). (1 + 0)
c)   (1.1) + (0.1)

Y =  A . B . C


Y= (A . B) + C
Y= (A + B) . C
 X = ( A + B ) + C

cloud computing ? components ?
memory ? processor ?
application software ?
system software ?
storage - primary & secondary