SCL Questoins 3

Question 1

OPERATING SYSTEM USED IN DESKTOPS/LAPTOPS
List of latest operating system that are used in desktops/laptops :
* Microsoft windows
* Mac OS
* DOS
* UNIX and LINUX
Most users in the world used Microsoft Windows as its operating system.

HOW OPERATING SYSTEM WORKS?

  • * It manages the hardware and software resources of the system. In a desktop computer, these resources include such things as the processor, memory, disk space and more.
  • * Computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit (CPU). It's the operating system's job to make sure that each application gets its fair share of your computer's finite resources in the most efficient way possible.
  • * The operating system provides a consistent set of rules for applications to use in order to be able to interface with your computer's hardware. 




Operating System
Advantage
Disadvantage
Microsoft windows
v  consumer-oriented. Tightly integrated.
v  vulnerable to viruses. Tightly integrated
Mac OS
v  Mac viruses are rare compared to PCs, but mac viruses do exist. 
v  Very user friendly. 
v  Able to run both Windows and OSX. 
v  Great computer for professional applications such as business, photo editing, rendering, movie editing, etc. 
v  Unix based, thus more secure + stable. 
v  Good multimedia computer. 
v  Upgradeability is limited. 
v  Overpriced. 
v  Interface is flashy and childish, bullshit. 
v  People who switched from a PC to a Mac may be confused for the first few days. 
v  Many programs do not work on Macs. (unless you buy OSX software). 
v  Nearly ALL PC games DONT work on a MAC. 
v  Fixing macs is rather difficult than fixing PCs. 
DOS
v  The advantages of MS-DOS is that it was the most popular operating system for IBM computers in the early 1980s and it was very easy for novices to learn and use
v  The disadvantages of MS-DOS is that it was replaced by more advanced operating systems and is now an old operating system
 
v  While graphical user interfaces are now used, MS-DOS uses a character-based interface.
UNIX and LINUX
v  No need to worry about viruses.
v   
v  Shows its technical origins and derivation from Unix in things like tar (short for Tape ARchive) cp (copy without the vowels) and other command line tools which are often used as back-ends for GUI programs.



Question 2


ANDROID
 
WINDOWS 8
GOOGLE PLAY
DISTRIBUTOR
MICROSOFT CORP
ORIGINALITY OF GOOGLE PLAY APPLICATIONS WAS EASILY TO BE COPIED NOWADAYS
THE ORIGINALITY OF OPERATING SYSTEM
ORIGINALITY OF WINDOWS 8 OF MICROSOFT STILL CAN BE MAINTAINED
NEED TO DOWNDLOAD APPLICATIONS TO READ OR VIEW FILES/PDF.
FILE OR DOC. VIEWING
ALREADY AVAILABLE WITH MICROSOFT TOOLS OFFICE (e.g MICROSOFT WORDS , POWERPOINT , EXCEL)
ONCE UPGRADED , THE PREVIOUS INSTALLENT TERMINATED
VERSION UPGRADES
EVENTHOUGH IT IS UPGRADED , THE PREVIOUS APPLICATION IS STILL THERE
 
OFTEN
VERSION UPDATES APP
SELDOM
MORE THAN 700K APPS
APPS AVAILABLE
AROUND 100K APPS
MORE THAN WINDOWS USER
USERS
LESS THAN ANDROID USER
 
 
THE SPEED , STABILITY AND FEATURES OF ANDROID CAN VARY FROM ONE TO ANOTHER , BUT WINDOWS PHONE IS FRIENDLY AND FAST.
 


*CONCLUSION WE MADE , ANDROID WAS MORE TO SOCIAL WHILE WINDOWS MORE TO EDUCATIONAL AND BUSSINESS WORKING.
 

 

SCL QUESTIONS 2


Question 1

 Open source software is any operating system that is free to use and which provides the original code where the source code is available (under a copyright license) to the public, which enables them to use, modify / enhance the operating system, and redistribute the modified (or unmodified) form of the operating system.

People nowadays prefer to use open software because of the availability of the source code and the right to modify them. People can use the source code and modify it into something they prefer to. They also have the right to redistributae and improves the source code, they can easily share it with their friends and even change the code if there are something they don’t like about.

5 Popular Open Source Software:

  • Firefox vs Internet Explorer
  • Thunderbird vs Microsoft Outlook
  • Abiword vs Microsoft Word
  • OpenOffice vs Microsoft Excel and Microsoft Powerpoint
  • VLC Media Player vs Windows Media Player, Quick Player and Real Player.
 
 
 
Question 2

No.

Types of threats and malicious program

The effect on device

How to repaired or remove

1

Ransomware trojans (e.g. Pgcoder, FBI Virus)

Encrypt data files on the infected system, then demand money from the victims in exchange for the decryption key. This type of malware adds insult to injury - not only has the victim lost access to their own important files, they've also become victim to extortion.

To detect and remove ransomware and other malicious software that might be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products can detect and remove this threat:

  •  Windows Defender Offline (Some ransomware will not allow you to use the products listed here, so you might have to start your computer from a Windows Defender Offline disk.)

 

2

Keylogger trojan

Surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner. Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity - like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.

 

The best way to remove keyloggers is to make use of software that work in many ways to get rid of this hidden virus. It is quite easy to run software to remove keylogger. In order to make the most out of the software, it is imperative to run it at least once in a week. This is a must to keep a Trojan, like keylogger, at bay and to protect your data and necessary information from hackers. However, prior downloading any removal software makes sure you are shopping it from a reputed and authorized site. Else others can refill it with unwanted viruses, instead of cleaning it.

3

Storm worm

 gives attackers full access to the system (hence the term 'root') and typically hides the files, folders, registry edits, and other components it uses. In addition to hiding itself, a rootkit typically hides other malicious files that it may be bundled with.

Most antivirus programs that have been updated with the latest worm definitions will detect and remove the worm. You can also use an online worm scanner if you don’t have one installed. This type of program is available from companies such as Trend Micro and Symantec. A free anti-malware program, such as Malwarebytes or Spybot Search & Destroy, will also do the trick. Another program that can defeat the Storm worm might already be installed on your computer: The Microsoft Malicious Software Removal Tool (MSRT) is a free program you can use to remove the Storm worm from your system.

4

Android plankton origin 2

Hide itself in apps that addressed themselves as supplementary programs to Angry Birds, but when in the device would steal user browser data and could access a remote server to add even more malicious files to the device.

You would need to remove the entire application, and check for the viruses in the entire file directory of yours. If there is something fishy that you still find, the only way you can proceed is re-installation of the operating system. The two things you need to do is delete the application along with the app data and memory of the app.

 
 
 

 

SCL Questions

Question 1

Target group: Students.

We choose a Laptop

  • Intel Pentium (Dual-Core) processor (1.86 GHz)
  • 2 MB L2 Cache
  • 4GB DDR3 , SDRAM
  • 2.5" SATA
  • Super Multi DVD +/-R/RW
  • Integrated Intel HD-Graphics 3000

We choose laptop because it is easier to carry around unlike desktop. Besides, students nowadays only use laptops for their studies for example in doing assignments, obtaining information via Internet and connecting with lecturers online, so, this type is better and user-friendly. Though it was difficult to be upgraded, for example to upgrade its RAM, we might consider to use a portable external hard-disk instead.
For student , we also preferred to use Intel Pentium with Dual-Core Processors as it less expensive compare to i7/i5/i3. With Dual-Core means it got two processing units to decrease heat in cpu by increasing more its efficiency during working. The different between i7 core and pentium is only based on speed and cache (5%). Our thoughts , students did not work on video encoding , unless watching youtube. So to do a research and assignments , it is preferably to choose Intel Pentium with Dual Core.
Many operating systems can be used on Intel Pentium. So , we choose to use Windows 7 as Windows 8 just new in operating system.


Question 2

h3group4.blogspot.com

We've decided to compare our choice with Group 4 from Hayat 3.
They choose a laptop with Intel Core I7.

As we all know it, a laptop with a processor of Intel Core I7 costs much more than a laptop with a processor of Intel Pentium. Since our target group are students, a cheap laptop will do. Most of time, students will use their laptop to do assignments and researchers. Intel Pentium can do those little stuffs as well. It maximize the usage of the processors. On the other hand, if a student only uses a laptop for assignments and researches with the processor of Intel I7, then the usage of the processor will be a waste since it is not being use thoroughly.


Question 3

Raspberry Pi is a new hardware of this modern technology era.
We kind of intrested into this Raspberry Pi because it might be carried anywhere in pockets and also can connect to the internet connection as this things was plugged in (on). Raspberry Pi is built for learning programming.

THE SIMILARITIES BETWEEN RASPBERRY PI AND COMPUTER
  • COME COMPATIBLE WITH WEB-CAM
  • CAN CONNECT TO THE INTERNET CONNECTION
  • ALSO NEED RAM FOR STORAGE MEMORY
  • CAN PLAY DVD+/-R/RW
  • USB PORT
THE DIFFERENCES BETWEEN RASPBERRY PI AND COMPUTER
RASPBERRY PI
  • LOW COST
  • SMALL SIZE AND CAN BE CARRIED ANYWHERE
  • DOESN'T USE BATTERY SOURCES
  • NEED SCREEN TO PLUGGED IN ( e.g. TV)
  • OPERATING SYSTEM - ARM V6 ONLY
COMPUTER
  • HIGH COST
  • BIGGER IN SIZE ( BUT NOTEBOOKS CAN BE CARRIED ANYWHERE)
  • CAN USE BATTERY AS A SECOND SOURCE TO SWITCH ON
  • COMPACT WITH SCREEN ALREADY
  • CAN USE ANY OS(OPERATING SYSTEM) AND PROCESSORS

ASUS X44H - OUR CHOSEN LAPTOP ;)


By Bryan Marshall


Hey Hi Hello!

Bryan is in the house uolsss! 

So, everyone, how has UNIMAS been treating you guys so far? I bet a lot of us have our own perception and memories in UNIMAS. Its been a month already and I am sure you guys had known this place better than last month. However, our mid semester is going to start in 3 weeks time, and remember that this test does count in our assessment also known as final pointer. 

Anyway, I have a lot of stories to tell, yet so lazy to type them down. I'm a bad storyteller but an expert in procrastinating. So Ive been blogging since 2008 and I find blogging is interesting and still does, its just that I dont have time to update everytime.

  
Do visit my blog! Click here.

Listen listen listen~ :3

So yeah.. As you've read by the title, I'm sure you'll know what I mean. Of course it's about listen. Well; ,it's not about that 'listen listen listen' cases.. But something we all should know about.. The importance of listening. As we came into this world, the first thing that we actually is neither walking nor talking. But actually, the first thing we learnt was listening. Am i right??? Well, yeahhh... listening skill is very crucial and important in our daily life actually.. Where it involves you and the other party. It may sounds easy to you, BUT... if you didn't practice it, you may fail in another thing also...

 Here's a bit of the importance of listening that i've read somewhere else through website. Enjoy reading it! :)

KEY POINTS

  • The listening process involves five stages: receiving, understanding, evaluating, remembering, and responding.
  • Active listening is a particular communication technique that requires the listener to provide feedback on what he or she hears to the speaker.
  • Three main degrees of active listening are repeating, paraphrasing, and reflecting.

TERMS

  • Listening 
    The active process by which we make sense of, assess, and respond to what we hear.
  • Active listening 
    A particular communication technique that requires the listener to provide feedback on what he or she hears to the speaker.

EXAMPLES

  • Fully engaged listening might involve listening to a lecture, taking notes, considering what's being said, and asking questions.

FIGURES

  1. fig. 2
    Degrees of Active Listening
    There are several degrees of active listening.

Listening Is More than Just Hearing

Figure 1
Listening is a skill of critical significance in all aspects of our lives--from maintaining our personal relationships, to getting our jobs done, to taking notes in class, to figuring out which bus to take to the airport. Regardless of how we're engaged with listening, it's important to understand that listening involves more than just hearing the words that are directed at us. Listening is an active process by which we make sense of, assess, and respond to what we hear.
The listening process involves five stages: receiving, understanding, evaluating, remembering, and responding. These stages will be discussed in more detail in later sections. Basically, an effective listener must hear and identify the speech sounds directed toward them, understand the message of those sounds, critically evaluate or assess that message, remember what's been said, and respond (either verbally or nonverbally) to information they've received.
Effectively engaging with all five stages of the listening process lets us best gather the information we need from the world around us.

Active Listening

Active listening is a particular communication technique that requires the listener to provide feedback on what he or she hears to the speaker, by way of restating or paraphrasing what they have heard in their own words. The goal of this repetition is to confirm what the listener has heard and to confirm the understanding of both parties. The ability to actively listen demonstrates sincerity, and that nothing is being assumed or taken for granted. Active listening is most often used to improve personal relationships, reduce misunderstanding and conflicts, strengthen cooperation, and foster understanding.
When engaging with a particular speaker, a listener can use several degrees of active listening, each resulting in a different quality of communication with the speaker. This active listening chart (Figure 2) shows three main degrees of listening: repeating, paraphrasing, and reflecting.
Active listening can also involve paying attention to the speaker's behavior andbody language. Having the ability to interpret a person's body language lets the listener develop a more accurate understanding of the speaker's message.

Powered by Blogger.