Welcome
Thank's for visiting our blog. This blog created as a place to share information about ICT Literacy For Secondary School (ICTLSS) Programme which is started on July 2007. It is organised by Kelantan JU ICTLSM Team and supervised by Unit ICT, Sektor Pengurusan Akademik, JPN Kelantan. We are welcome any comments and suggestions for our benefit.
Kursus Membina Blog Untuk Guru ICTL
Tarikh : 21 Mei 2008
Tempat : Makmal Komputer, SK Pengkalan Kubor 2
Jurulatih: En. Mohd Azman Che Min
En. Mohd Saidi Ahmad
En. Mohd Shuhaimi Zakaria
Blog Peserta :
http://ictlsmkbs.blogspot.com/
http://ictsmksungaipinang.blogspot.com/
http://ictlfalahiah.blogspot.com/
http://ictlnetsmkgeting.blogspot.com/
http://ictlnetkglaut.blogspot.com/
http://ictlsmktumpat.blogspot.com/
http://ictlsmkwb.blogspot.com/
http://smkchabang4.blogspot.com/
http://ictlsmkdbw.blogspot.com/
http://ictlsmkmm.blogspot.com/
Syabas kepada semua peserta . Anda sekarang sudah bergelar 'Blogger' !Friday, June 6, 2008
Para pengguna internet perlu berhati-hati apabila memberi data peribadi mereka ketika melayari laman web kerana wujudnya banyak penipuan sejak akhir-akhir ini sehingga mangsa boleh kehilangan wang dalam bank, kata Timbalan Menteri Sains, Teknologi dan Inovasi, Fadillah Yusof.
Katanya taktik penjenayah siber ini sangat licik kerana mereka hanya memerlukan data seperti nombor kad pengenalan, nombor akaun bank, kata laluan dan sebagainya untuk mencuri wang mangsa dari bank.
"Antara contoh penipuan dalam laman web ialah mengatakan anda menang dalam satu pertandingan dan memerlukan anda memasukkan semua butiran peribadi untuk menuntut hadiah wang tunai atau hadiah," katanya kepada pemberita pada satu sidang media di sini hari ini.
Justeru itu, CyberSecurity Malaysia, sebuah agensi di bawah Kementerian Sains, Teknologi dipertanggungjawab oleh kerajaan untuk menyediakan bantuan keselamatan siber dalam bentuk pendidikan, promosi dan bimbingan kepada semua pengguna Internet di dalam negara.
Pengguna internet yang memerlukan bantuan atau ingin membuat aduan mengenai kes berkaitan keselamatan internet boleh melayari www.cybersecurity.org.my. - Bernama
SUMBER :http://www.bharian.com.my/
Saturday, May 3, 2008
Kursus Membina Blog Untuk Guru ICTLSM
Tarikh : 28 April 2008
Tempat : Makmal Komputer, SK Lati, Pasir Mas
Jurulatih: En. Mohd Azman Che Min
En. Mohd Saidi Ahmad
En. Mohd Shuhaimi Zakaria
Blog Peserta :
http://lankangkong.blogspot.com/
http://ictlsmkkangkong.blogspot.com/
http://panglimaraja.blogspot.com/
http://zura69.blogspot.com/
http://ramxxx2.blogspot.com/
http://amansofea.blogspot.com/
http://smktcictl.blogspot.com/
http://ictlsmksid.blogspot.com/
http://cikgu-siti.blogspot.com/
http://nafaizsmkkb.blogspot.com/
http://ictsmkbp.blogspot.com/
http://mahussain-smkrp.blogspot.com/
http://azmanmahmud.blogspot.com/
Tahniah kepada semua peserta kursus!
Thursday, April 10, 2008
Why should I start a blog?
You can add new entries (also called posts) to your blog whenever you like — in fact, the more often you post, the better! Your blog can include words, photos, or both, and address anything you like, from your recent vacation or your favorite music to breaking business news. You might use your blog to keep your family up-to-date on the milestones in your newborn's life, or let your friends know how your wedding planning is going. Business owners often use blogs to test ideas or solicit feedback about new products.
Unlike a newsletter or advertisement, a blog is an interactive medium, a way for you to personally engage with your site visitors. Readers will be able to post comments about your entries, which will be marked with the date and time of publication and automatically archived. (You'll be able to delete any comments that don't seem right for your blog.) You can reply to those comments or simply watch the conversation unfold!
Tuesday, April 8, 2008
GUIDELINES ON THE E-MAIL AND INTERNET USAGE
Some guidelines from the Department of Public Services of Malaysia:
1.Use only individual e-mail address to forward individual opinion
2.Keep the identity name and password a secret to avoid the misuse of your e-mail without your knowledge
3.E-mail must be active to promptly reply the necessary actions needed for any matters
4.Ensure the total mail kept in the box is within the computer storage capacity
5.Scan files regularly to avoid the transmission of virus from one computer to another
6.Do not send e-mails that contain classified information which can be used to tarnish other people or country
7.Choose a suitable time to search the Internet to save access time and cost
8.Beware of prohibited sites which could affect one's moral, organisation or nation
9.Print only relevant documents that you think can be used in future to save cost
Computer ethics
Computer ethics is a system of moral standards or values used as a guideline for computer users.
THE TEN COMMANDMENTS OF COMPUTER ETHICS
1.You shall not use a computer to harm other people.
2.You shall not interfere with other people's computer work.
3.You shall not snoop around in other people's computer files.
4.You shall not use a computer to steal.
5.You shall not use a computer to bear false witness.
6.You shall not copy or use proprietary software for which you have not paid.
7.You shall not use other people's computer resources without authorisation or proper compensation.
8.You shall not appropriate other people's intellectual output.
9.You shall think about the social consequences of the program you are writing or the system you are designing.
10.You shall always use a computer in ways that ensure consideration and respect for your fellow humans.
WHAT IS ICT?
ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
INFORMATION
Information refers to the knowledge obtained from reading, investigation, study or research.The tools to transmit information are the telephone, television and radio.
COMMUNICATION
Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Previously, people communicated through sign or symbols, performing drama and poetry. With the advent of technology, these 'older' forms of communication are less utilised as compared to the use of the Internet, e-mail or video conferencing.
TECHNOLOGY
Technology is the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs. Technology is vital in communication.
Aiding Communication
Telephone and fax machines are the devices used in extending communication.
Spreading Information
To broadcast information such as news or weather reports effectively. Radio, television, satellites and the World Wide Web (www) are powerful tools that can be used
TV ONLINE, RADIO, MP3