ctshuhada.blogspot.com
ABOUT ICT: Mac 2011
http://ctshuhada.blogspot.com/2011_03_01_archive.html
Isnin, 7 Mac 2011. Or just a program. Is a sequence of instructions. Written to perform a specified task for a computer. A computer requires programs to function, typically executing. The program's instructions in a central processor. The program has an executable. Form that the computer can use directly to execute the instructions. The same program in its human-readable source code. Form, from which executable. Programs are derived (e.g., compiled. To study and develop its algorithms. Or may be embedded.
ctshuhada.blogspot.com
ABOUT ICT: KARNIVAL ICT SABAK BERNAM 2010
http://ctshuhada.blogspot.com/2010/11/karnival-ict-sabak-bernam-2010.html
Selasa, 2 November 2010. KARNIVAL ICT SABAK BERNAM 2010. Karnival ini berlangsung selama 3 hari iaitu daripada 29-31 oktober 2010. Pelbagai aktiviti telah dijalankan di sana. Antaranya ialah 'Mini Cyberfision, Ict Explorace, Pc Assemble dan pelbagai aktiviti menarik yang diadakan di DEWAN BERNAM SUNGAI BESAR. Bermula pada pukul 9.00 pagi - 10.00 malam. Terbuka kepada semua orang yang mengunjungi pameran tersebut. Dicatat oleh TENTNG DIRIKU. Langgan: Catat Ulasan (Atom). Lihat profil lengkap saya.
ctshuhada.blogspot.com
ABOUT ICT: Jun 2010
http://ctshuhada.blogspot.com/2010_06_01_archive.html
Ahad, 13 Jun 2010. THE HISTORY OF OPERATION SYSTEM. Was a master of this on the early Manchester Mark 1 machine, and he was already deriving the primitive conception of an operating system from the principles of the Universal Turing machine. Later machines came with libraries of software. Which would be linked to a user's program to assist in operations such as input and output and generating computer code. From human-readable symbolic code. Was released as an integrated utility for the IBM 704. Was prov...
ctshuhada.blogspot.com
ABOUT ICT: PERANG CYBER
http://ctshuhada.blogspot.com/2010/11/perang-cyber.html
Selasa, 9 November 2010. Dikomando Jaringan Perang Angkatan Laut AS, ancaman terbesar terhadap jaringan komputer AS berasal dari hacker China. Menurut laporan dari Federal Computer Week. FCW), hacker China "terus-menerus melancarkan perang habis-habisan terhadap jaringan Departemen Pertahanan.". Pengumuman mengakibatkan respons internasional, dan Menlu AS Hillary Clinton mendesak China untuk menyelidiki serangan tersebut. Namun, AS telah menyadari akan kegiatan cyberwarfare. China selama beberapa tahun.
ctshuhada.blogspot.com
ABOUT ICT: JENAYAH CYBER
http://ctshuhada.blogspot.com/2010/11/jenayah-cyber.html
Selasa, 9 November 2010. Apakah jenayah yang dilakukan? Di mana jenayah dilakukan? Organisasi perniagaan mungkin menjadi sasaran pesaingnya, pekerja atau bekas pekerja. Bank serta institusi kewangan oleh perompak dan penjenayah profesional. Manakala, pihak universiti menjadi sasaran pelajar atau bekas pelajar. Agensi kerajaan pula mungkin menjadi mangsa pengganas dan komputer militari mungkin disabotaj. Kalaulah orang yang melakukan jenayah tidak di kenali undang-undang yang di rangka untuk membendungnya...
ctshuhada.blogspot.com
ABOUT ICT: PROGRAMMING
http://ctshuhada.blogspot.com/2011/03/programming.html
Isnin, 7 Mac 2011. Or just a program. Is a sequence of instructions. Written to perform a specified task for a computer. A computer requires programs to function, typically executing. The program's instructions in a central processor. The program has an executable. Form that the computer can use directly to execute the instructions. The same program in its human-readable source code. Form, from which executable. Programs are derived (e.g., compiled. To study and develop its algorithms. Or may be embedded.
ctshuhada.blogspot.com
ABOUT ICT: Mei 2010
http://ctshuhada.blogspot.com/2010_05_01_archive.html
Rabu, 5 Mei 2010. Using the binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be converted into a string of bits. Or binary digits, each of which has a value of 1 or 0. The most common unit of storage is the byte. Equal to 8 bits. A piece of information can be handled by any computer whose storage space is large enough to accommodate the binary representation of the piece of information, or simply data. A typical computer could store a short novel. Compon...
ctshuhada.blogspot.com
ABOUT ICT: Mac 2010
http://ctshuhada.blogspot.com/2010_03_01_archive.html
Isnin, 22 Mac 2010. These varied in computing power and the models included:. ICT 1905 (similar to the 1904 but incorporating an autonomous floating-point unit. ICT 1907 (similar to the 1906 but incorporating an autonomous floating-point unit). ICT 1909 (similar to the 1905 but with low-cost 6µs core store). The first machine was the 1904 which was a Canadian design from the Ferranti-Packard. Company, originally called the FP6000. By 1968 ICT had merged with English Electric. Computers and become ICL.
ctshuhada.blogspot.com
ABOUT ICT: April 2010
http://ctshuhada.blogspot.com/2010_04_01_archive.html
Rabu, 28 April 2010. Founded in 1996, the International Institute for Counter-Terrorism (ICT) is the leading academic institute for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability and risk assessment, intelligence analysis and national security and defense policy. Dicatat oleh TENTNG DIRIKU. Pautan pada catatan ini.