Tuesday, March 29, 2011
ONLINE GAME
Have u ever heard of online game?
I think, it was not a new thing anymore because almost every people play game. A game is a structured activity, usually undertaken for enjoyment and sometimes used as an educational tool. Games are distinct from work, which is usually carried out for remuneration, and from art, which is more concerned with the expression of ideas. A game can also be distinguished from play which is usually unstructured, and a puzzle which requires a strong mental concentration and is undertaken alone.
From the very earliest days of networked and time-shared computers, online games have been part of the culture. Modern online games are played using an Internet connection; some have dedicated client programs, while others require only a web browser. Some simpler browser games appeal to demographic groups (notably women and the middle-aged) that otherwise play very few video games.
Example of online games...
Posted by PerinduSyurgaAbadi at 8:18 AM 0 comments
Tuesday, March 22, 2011
...HOW SMS WORKS??...
~mObile phOnes~ |
I'm sure you all have it...
did you really know how the SMS been sent to the mobile phones?
here it is...
even you are not talking to your mobile phone..
the information that you send & receive are move through the...
~ CoNTRoL CHaNNeL~
1st reason...
your mobile phone system knows which mobile phone is in...
to change cells as you move around...
2nd reason...
control channel used for call setup..
when people calls you..
the tower sends message to your mobile phones over control channel..
then..
it tells your phones to play ringtones
&
the tower gives a pair of voice channel frequencies to use for call
~ CoNTRoL CHaNNeL~
the pathway...
HOW SMS WORKS? that's all for now.. see you in the next topic!! |
BYE2!! |
Posted by PerinduSyurgaAbadi at 7:46 AM 0 comments
Labels: Chapter 9
Wednesday, March 16, 2011
~Organizational Information Flow~
FUNCTIONS OF AN ORGANIZATION IN AN INFORMATION SYSTEM
- information flows vertically & horizontally throughout an organization
- there are 5 functions:
- standard personal computers/ workstations running application
- scanning devices for standardized data entry
- electronic communication devices for electronic data interchange (EDI)
- e-commerce
- "Web-enabled’’ - allow devices to connect to the World Wide Web
PROCESS
- ranging from individual personal computers to large-scale enterprise servers
- conceptually, the underlying processing model is still the ‘‘double-entry’’ accounting system initially introduced in the 15th century
- output devices include:
- output content - financial reports from budgets & tax reports to multinational financial statements
- internal reporting systems
- marketing research systems
- marketing intelligence systems
- marketing models
- software / online solution for data entry, data tracking & data information needs of the Human Resources
- better H.R.I.S provide:
- management of employee information
- reporting & analysis of employee information
- company related documents such as employee handbooks
- applicant tracking & resume management
- manufacturing subsystem that includes all functions required to design, produce, distribute, & service a manufactured product
- current production applications :
- electronic catalogs
- website / webshop content
- product catalog
- involves the use of qualitative data, such as interviews, documents & participant observation data, to understand and explain social phenomena
- in Information Systems, a general shift in IS research away from technological to managerial & organizational issues
Posted by PerinduSyurgaAbadi at 3:06 AM 0 comments
Labels: Chapter 11
Monday, March 7, 2011
Privacy & Security
COMPUTER CRIMES
Definition
- crime activities, involve the use of the use of information technology to gain an illegal or an
unauthorized access to a computer system with intent of :
-damaging
- deleting
-altering computer data
- include the activities like electronic frauds, misuse of devices, identity theft, software theft
and data as well as system interference
Types of computer criminals
-these are some types of computer criminals :
1) Hacking
2) Cracking
3) Computer viruses
4) Cyberstalking
5) Identity theft
1) HACKING
-breaking into a computer system or defeating security capabilities to gain an unauthorized
access
-e.g. hacking of IP addresses in order to transact with a false identity
-known as hackers
-hackers generally deplore cracking
Images of hacking |
2) CRACKING
- breaking into a computer system often a network to point out weaknesses in a site's security
system
-by passwords / license in a computer programs / breaches computer security
-known as cracker
3) COMPUTER VIRUSES
- can replicate themselves and harm the computer systems on a network without the
knowledge of the system users
Images of computer viruses |
Internet or by the removable devices like USB drives and
CDs
-it forms of malicious codes written with an aim to harm a
computer system and destroy information
4) CYBERSTALKING
Images of cyberstalking |
-use of communication technology,like Internet, to torture other individuals
-cyberstalking activities include :
-false accusations
- transmission of threats and
-damage to data and equipment
-cyberstalkers target the user at the chat room, online forums and social networking websites
to gather and harass the user information
5) IDENTITY THEFT
-involves stealing money and obtaining other benefits through the use of a false identity
-act of pretending to be someone else by using someone else's identity as one's own
-financial identity theft involves the use of a false identity to obtain goods and services
Images of identity theft |
for commercial purpose
-identity cloning is the use of another user's information to pose as a false user
-e.g. illegal migration, terrorism and
blackmail
REFERENCES :
a) http://www.buzzle.com/articles/types-of-computer-crimes.html
b) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211852,00.html
Posted by PerinduSyurgaAbadi at 8:24 PM 0 comments
Labels: Chapter 10