Generation of Computer

Each generation of computer is characterized by a major technological development that fundamentally changed the way computers operate, resulting in increasingly smaller, cheaper, more powerful and more efficient and reliable devices.

The iPad is one of the hottest gadgets of 2010

The iPad essentially revolutionises the concept of a tablet computer. Previously tablet devices addressed a legitimate consumer need (casual, lazy, couch-bound computing), but left most people frustrated with a stylus-driven handwriting recognition system and an operating system that was really designed to be used on a desktop PC.

The Technology of Mobile Phone

Mobile phones also support a wide variety of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these more general computing capabilities are referred to as smartphones.

The Technology of Internet

The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

The Categories of Software

Software is often divided into application software (programs that do work users are directly interested in) and system software.

Modul Penerbitan Atas Meja - Microsoft Publisher 2010 (Bahasa Melayu)

The first module was produced for special education students in Sekolah Menengah Pendidikan Khas Vocational Kuantan, Pahang. Hopefully it is beneficial to teachers how to teach ICTL subject for the students here.

Ethics in Computer

Ethics in using computer

1. Have you ever asked for permission to download materials from the internet such as music, articles, graphic and other material. 

2. If you have, you are following the computer code of conducts. There are many web sites with restriction where the public is allowed to use their material. 

3. Users may have to pay royalty (fee) to the owner or quote the website in their assignment or project, in order to be able to use this material.

4. Examples of ethical computer code of conducts include:

• sending warning about viruses to other computer users

•asking permission before sending any business advertisements to others

using information with authorization

** from Module from BPK - Ethics in Computer

Installing and Uninstalling Application Software


1) Installing Software

Steps you should take before you Install Software.

   · You should run Scan Disk to check the Drive for Errors. Also you may want to check to see if the disk is Fragmented, if it is more then 80%, you should Defragment the drive.

Click the Check Now button-check the Automatically fix system errors-click Start. It will tell you it cannot run now and will run at the next boot, click Ok and restart the computer.

   · Scan Disk and Disk Defragmentor . Go to -Start-Programs-Accessories-System Tools, run Scan Disk first, then run Defragmentor, before you Defrag.

   · It wouldn't hurt to run System File Checker. Start-Programs-Accessories-System Tools-System Information-Software Environment, this is a Windows Utility that scans Windows files for corrupted files, if it finds one it will ask for the Windows Disk or your Restore Disk to fix the file. After you install software, you may want to run this. Installs will sometimes replace Windows files or entries, this utility will restore them the way Windows wants them.

     Leave it like this and Windows will scan to see if any of it's files have been corrupted, if so it will ask you for the Windows install or restore disk , so it can fix the corruption. You can also replace a file if you know which one you need.

   · Turn off any Virus Software you have running in the background.

   · Here is a shut down short cut, press and hold down, Ctrl-Alt-Delete, this will take you to Windows-Close Programs Utility, highlight the virus program and click End Task and wait for a End Task Window to pop up, you may have to do this twice to turn it off. The programs will start up again when you reboot or restart your Computer, you will need to know the name of your Virus program so you know what to disable. Actually you can End Tasks on all those Programs, Except, SysTray and Explorer these run your desktop.

   · Now your ready to Install the software. At present, most of the included CD to install the application software is automatic. You only need to press the next only.

  · After the Install is done, you should Reboot your system, if the program didn't, some do not require you to, but I do, just to be safe.

2) Uninstalling Software

Use the Uninstall a Programs in the Control Panel to uninstall program.

   This is where you Remove Software from your Computer. Click on the Program, you want to Uninstall, Click on the Add/Remove Button. If it ask you if you want to leave some files ( usually .dll files ) click Yes to All button, these can be cleaned up later with Norton WinDoctor ( if you have it ). Some other program may need those files to run properly.

  · Most Good Software Products come with a Uninstall Link. It will be in the Control Panels, Add/Remove Utility, Start--Settings--Control Panel-- Add/Remove Programs, if it isn't in Add/Remove it may be in the Programs Menu under that Programs Name, it will say Uninstall ----. Find the Program in the list Add/Remove, highlight it, click on the Add/Remove button, if it asks you, if you would like to leave shared files usually .dll files, say yes to all, leaving them will not bother anything .Besides the next steps will remove them if they are a problem.

  · Next, assuming there was a Removal Program. Go to Start--Find, type in the name of the Software you uninstalled, delete any entries or folders for that Software, BE careful ! make sure they are that program, I always find files with a programs name, but it belongs to some other Software, usually when you use the Add/Remove Program, if it can't remove a folder or file it will tell you and give you Details of what it left behind write the info down.

  · If the Company did not give you a removal program, use an Uninstall Program like Revo Uninstaller which is free

Cyber Law

What is Cyber Law?

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.


- In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

- These concerns and issues clearly indicate why cyber laws are needed in online activities.

- The need for cyber law :

1) Integrity and Security of Information

2) Security of Government Data

3) Legal Status of Online Transactions

4) Intelectual Property Rights

5) Privacy and Confidentially of Information


- The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse.

These cyber laws include:

- Digital Signature Act 1997

- Computer Crimes Act 1997

- Telemedicine Act 1997

- Communications and Multimedia Act 1998

Beside these cyber laws, there are three other cyber laws being drafted.

- Private Data Protection Bill

- Electronic Government Activities Bill

- Electronic Transactions Bill

Slide Powerpoint: Important of Cyber Law

Related Posts Plugin for WordPress, Blogger...