Wednesday, 8 August 2018

Computer Application (Suggestion to improve the course)

I think does not need to improve this course because our lecture, Miss Wan are teaching very well and patient. When we having a problem she will explain patiently until we understand. In this course, I learn a lot of computer skill such as word processing, multimedia and spreadsheets.

Computer Application (The Important of Privacy, Security, Legal and Green Computing Awareness for Society)


Why is Privacy Important?

There are two general reasons why privacy is important.

The first is that privacy helps individuals maintain their autonomy and individuality. People define themselves by exercising power over information about themselves and a free country does not people to answer for the choices they make about what information is shared and what is held close. At the same time, this does not mean that public policy should shield people form the costs of their choices. American privacy allows our many cultures and subcultures to define for themselves how personal information moves in the economy and society.

A second reason that privacy is important is because of its functional benefits. This area has been especially slippery for policy makers because they have often use the term "privacy" to refer to one or more of privacy's benefits.



Security services are very much important now days, when the terrorism and corruption have been explored in many countries. Security is the prime requirement for each country. Generally the government of concern country is responsible to provide security to common people of the country and they do. But many a times, it is not possible by Government to catch up all the events and person to provide the safety services to all individuals, group of the people, building or society. The role of private security company is very much important affecting to the one's life, so it must be trustworthy while selecting the agency to secure you.

It has become very much difficult for celebrities and executive people to move easily among the public, as they are the know and famous public figure and having unknown risk of life more. Thus sometimes Government providing the security to some of these people at their end and many a times the celebrities, they need to hire security their own for their safety and operation.

Security Agencies majorly run by retired army officers, police-man or the personnel that moved from the Government security services. As they are having the practice and the background from which they are more familiar and love to protect the people and server the society. Previously the security agencies were providing a mono type security services but from couple of decades, it has been revolutionary change in services took place due to increased risk of human crimes, threats and mishandling. To make life shot dead has become so easy and cheap, where the numbers of criminal have been increased significantly. Thus security services also must be equipped with more advanced instruments, arms and technology to prevent the intentional accidents by the criminals.



The law is important for a society for it serves as a norm of conduct for citizens. It was also made to provide for proper guidelines and order upon the behavior for all citizens and to sustain the equity on the three branches of the government. It keeps the society running. Without law there would be chaos and it would be survival of the fittest and every man for himself. Not an ideal lifestyle for most part.

The law is important because it acts as a guidelines as to what is accepted in society. Without it there would be conflicts between social groups and communities. it is pivotal that we follow them. The law allows for easy adoption to changes that occur in the society.

Society is a "web relationship" and social change obviously means a change in the system of social relationship where a social relationship is understood in terms of social processes and social interactions and social organizations. Thus, the term, 'social change' is used to indicate desirable variations in social institution, social processes and social organization. It includes alterations in the structure and functions of the society. Closer analysis of the role of law vis-a-vis social change leads us to distinguish between the direct and the indirect aspects of the role of law.

1. Law plays an important indirect role in regard to social change by shaping a direct impact on society. For example: A law setting up a compulsory educational system.

2. On the other hand, interacts in many cases indirectly with basic social institutions in a manner constituting a direct relationship between law and social change. For example, a law designed to prohibit polygamy.

Law plays an agent of modernization and social change. It is also an indicator of the nature of societal complexity and its attendant problems of integration. Further, the reinforcement of our belief in the age-old panchayat system, the abolition of the abhorable practices of untouchability, child marriage, sati, dowry etc are typical illustrations of social change being brought about in the country trough laws.

Law is an effective medium or agency, instrumental in bringing about social change in the country or in any region in particular. Therefore, we rejuvenate our belief that law has been pivotal in introducing changes in the societal structure and relationships and continues to be so.

Law certainly has acted as a catalyst in the process of social transformation of people wherein the dilution of caste inequalities, protective measures for the weak and vulnerable sections, providing for the dignified existence of those living under unwholesome conditions etc are the illustrious examples in this regard. Social change involves an alteration of society; its economic structure, values and beliefs and its economic, political and social dimensions also undergo modification. However, social change does not affect all aspects of society in the same manner.

While much of social change is brought about by material changes such as technology, new patterns of production, etc, other conditions are also necessary. For example, as we have discussed it before, legal prohibition of untouchability in free India has not succeeded because of inadequate social support.

Nonetheless, when law cannot bring about change without social support, it still can create certain preconditions for social change. Moreover, after independence, the Constitution of India provided far-reaching guidelines for change. Its directive principle suggested a blueprint for a new nation. The de-recognition of the caste system, equality before the law and equal opportunities for all in economic, political and social spheres were some of the high points of the Indian Constitution.


Important of Green Computing

Why Should We Have the Idea of Green Computing?

When the news claimed that the environment was not a renewable resource, it really hit home and people started realizing that they had to do their part to protect the environment. Therefore, green computing is an important idea to keep our environment clean and safe. When it gets involved in recycling computer, it is difficult to dispose the old computers and some more that they take up much space in landfills. Somehow, the problem is that the electronic waste is increasing tremendously within this decade. Many negative effects are gradually showed up towards this environment, especially to human. Due to the quick obsolescence of electronics, it resulted a dreadful 70% of all hazardous waste. Computer waste is high in many toxic materials such as heavy metals and flame-retardant plastics, which easily leach into ground water and bio-accumulated. In addition, to manufacture chips of the electronic requires huge amounts of resources and some deadliest gases and chemicals are used to man.

In an average year, 24 million computers have become obsolete in United States. Only about 14% (3.3 million) of these will be recycle or donated. Over 20 million computers, the rest in U.S. will be get off, destroyed or shipped as waste products or to be dealt with later in the temporary storage. We do not care about what happens when our laptop dies and just stop to consider it. The reality is that it either decomposed in a landfill or developing countries. The children there wresting its components apart by hand and melting toxic bits to discover traces or valuable metals like gold.

Moreover, E-waste trade chain is created in developing nations for the imported obsolete electronics. They employ several workers, collectors, segregates, middleman, scrap dealers and recycles to take components apart, reuse the functional components, burning or acid dipping and other unprofessional techniques to recycle the non-functional components. After burning and other wastes are disposed, the spent acids and other chemicals, solid wastes eventually end up in rivers.

Tuesday, 7 August 2018

Computer Application (Evolution of Internet and Web Authorization)


From the beginning ...

The origins of the Internet data back nearly 40 years, with the U.S.militaty's funding of a search network dubbed Arpanet in 1969. Since then, the Internet has undergone more than just a name change. The number of computers connected to the Internet has grown exponentially, while the number of users has risen from a handful of computer scientists to 1.5 billion consumers. The networks's reach has expanded beyond the United States to every corner of the globe. But its popularity has a dark side, as it has evolved from a friendly research network to a hotbed of criminal activity including fraud and identity theft.


Name change leaves military past behind

The World's largest network of computer networks got its original name from the U.S. military arm that funded it: Arpanet was for the Advanced Research Projects Agency. Black in 1969 when Arpanet was created, it connected five sites: UCLA, Stanford, Stanford, UC Santa Barbara, the University ofUtah and BBN. In 1983, the U.S. Defense Department spun-off MILNET*, which was the part of Arpanet that carried unclassified military communications. Arpanet was renamed the Internet 1984, when it linked 1,000 hosts at university and corporate labs.



Internet hosts grow exponentially

The number of computers connected to the Internet has grown dramatically from the network's humble beginnings, when it connected four computers at university research labs. Today, the Internet links more than 440 million computers directly, and millions more have Internet access through private addressing schemes.



Internet users top 1 billion

Internet usage has exploded since 1995, when researchers first started tracking this statistic. Although estimates vary from the Internet having 1 billion to 1.5 billion users, everyone agrees that the 'Net has room for growth as the worldwide population tops 6 billion. That leaves more than 4 billion people around the world without Internet access today.



Internet becomes a global phenomenon

The Internet has changed from a U.S. dominated communications medium to one that is seeing its fastest growth in Asia and Europe. Here's how the Internet's geographic reach stacked up then and now:




Domain name sales grow 10-fold this decade

The Inter,net's Domain Name System was created in 1984 to match complex IP addresses with easy to remember names ending in extensions such as .com, .org, .edu, .gov, .mil and country codes including .de for Germany. In 1998, the U.S. Department of Commerce privatized domain name registrations and operations through the creation of the Internet Corporation for Assigned Names and Numbers. Since then, domain name sales have risen nearly 10-fold, but  .com remains the  popular domain.


Invention of the Web drives Internet usage 

In 1990, Tim Berners-Lee invented the World Wide Web as a method of publishing information in a hypertext format on the Internet. The Web began to take off in 1993, after computer science student Marc Andreessen created the first popular Web browser, known as Mosaic. Since then the number of Web sites and Web pages has exploded.








Internet traffic keeps trucking


Experts quibble about how much traffic is on the Internet and how fast it's growing. Is it growing at 50% to 60% a year? Or 100% a year? But there's no question that the figure has exploded since 1974, when daily traffic on the Internet surpassed 3 million packets. First measured in terabytes ans petabytes, scientists say the future points to monthly traffic volumes in the exabytes - which is 10 to the 18th power bytes. Whatever you call it, that's a lot of packets!



Making money on the Net

E-commerce burst on the scene in the mid-1990, and its been growing ever since both in total sales and as a percentage of all retail sales. Worldwide e-commerce statistics are hard to find , but the U.S. Commerce Department has been tracking U.S. e-commerce sales since the fourth quarter of 1999. Here's a snapshot of their findings:



Security threats rise along with usage

Back in  1988, the Morris Worm was the first major attack on the Internet, disabling 10% of the Internet's 60,000 host computers. Today, hundreds of more sinister attacks are aimed at Internet users each day. Indeed, the U.S. Computer Emergency Readiness Team (US-CERT) stopped counting the number of security incident reports received in 2004 because attacks against Internet-connected systems had become so commonplace that it felt this figure was getting too big to track.


Spam grows to be costly,dangerous

Back in 2003, an estimated 15 billion spam messages were sent over the Internet daily. That means 45% of all e-mail messages were unsolicited pitches for things such as drugs and penny stocks. Those figures seem quaint today, compared to the 164 billion spam messages being sent daily, representing 97% of all email. During the last five years, spam has changed from being annoying to being malicious, with the growth of spam driven phishing scams.


What's next for the Internet: More growth

Experts say the Internet will continue along its phenomenal growth path, despite the current global economic crisis. What's different is that the Internet will become increasingly mobile and social. By 2012, more people will access the Internet via cell phones than PCs. Their favorite activities will be downloading music, videos and ringtones rather than searching the Web or sending e-mail.


Personal (Five Native Language)


The indigenous languages of Malaysia belong to the Mon-Khmer and Malayo-Polynesian families. The nation or official language is Malay which is the mother tongue of the majority Malay ethnic group, However English may take preference in many settings and is spoken by the majority of the population. The main ethnic groups within Malaysia comprise the Malays, Chinese and Indians, with many other ethnic groups represented in smaller numbers, each with its own languages. The largest native languages spoken in East Malaysia are the Iban, Dusunic and the Kadazan languages. English is widely understood and spoken in service industries and is a compulsory subject in primary and secondary school. It is also the main language spoken in most private colleges and universities. English may take precedence over Malay in certain official contexts as provided for by the National Language Act, especially in the states of Sabah and Sarawak, where it may be the offical working language.

Malaysia contains speakers of 137 living languages, 41 of which are found in Peninsular Malaysia. The government provides schooling at the primary level in each of the three major languages, Malay, Mandarin and Tamil. Within Malay and Tamil there are a number of dialectal differences. There are a number of Chinese languages native to the ethnic Chinese who originated from southern China, which include Chinese for Guangzhou; Fujian provinces and the Hakka Chinese...

There are the few sentences in my native languages:

1. 你好 (Ni Hao) - Hi
2. 你好吗? (Nin Hao Ma?) - How Are You?
3. 欢迎光临 (Huan Ying Guang Lin) - Welcome
4. 谢谢你 (Xie Xie Ni) - Thank You
5. 再见 (Zai Jian) - Good Bye
6. 你怎么样? (Ni Zen Me Yang?) - How Are You Doing?
7. 还可以 (Hai Ke Yi) - It's Okay
8. 你吃饭了吗? (Ni Chi Fan Le Ma?) - Have You Eaten?

 

Here is the video that learning the basic greeting Mandarin.


Monday, 6 August 2018

Personal (Things That I like in Malaysia)


The most delicious Malaysian Foods: Have you tried them?

Malaysia is a country with rich culture. The population is made of Malay, Chinese and Indians. As we know Malaysia is a food paradise, there are a lot of delicious food such as Roti Canai, Chicken Curry, Satay, Nasi Lemak, Hainan Chicken Rice, Char Kuey Teow and other. But this are the famous and delicious foods.


Hainan Chicken Rice is my favorite food. I usually eat Hianan Chicken Rive 3 times a week. It originated somewhere else (Hainan,natch) but adapted to suit local taste. It's chicken boiled in stock and several cool alongside rice which has also been cooked in chicken stock and dipping sauce. "It is quite different than it is in Hainan Island, we have added chili to the ginger and garlic condiment."







Sunday, 5 August 2018

Personal (Introduction Myself)


Hi welcome to my blog, my name is Sou Tian Meng and my nickname is Ah MeNG. I 20 years old, and I born in 1998 may 4. I come from Johor, Johor Bahru but now live in Kuala Lumpur. I currently studying in UCSI university and my major is engineering in electronic and electrical.