tag:blogger.com,1999:blog-69118820314628727462024-03-05T14:44:23.425+08:00Bicara Teknologi MaklumatBerkongsi Ilmu Berkongsi InformasiMayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.comBlogger92125tag:blogger.com,1999:blog-6911882031462872746.post-37672625487341982822011-04-11T03:18:00.001+08:002011-04-13T13:05:42.417+08:00History of Programming Languages and Their Evolution<div class="scriptol"><div class="separator" style="clear: both; text-align: center;"><a href="http://hopl.murdoch.edu.au/images/genealogies/ModBabel.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="313" src="http://hopl.murdoch.edu.au/images/genealogies/ModBabel.jpg" width="320" /></a></div><b>First language</b><br />
Ada Lovelace and Babbage and its nephew were writing programs for the project of "difference engine", and then the "analytical engine".<br />
In 1945, the german K. Zuse, inventor of the Z3 computer would have defined an evolved language for this engine (with arrays and records). Few documents of the epoch about this language exist.<br />
<br />
<div class="scriptol"><b>Assembly</b><br />
<a href="http://directory.fsf.org/">Fsd</a><br />
Assemblers exist since the beginning of computers. They associate a symbolic name to the machine-language code, for example:<br />
add bx, 4 <br />
cmp [adr], 3 <br />
jmp address<br />
Assembly programming is no longer frequently practiced, even to build fast routines...<br />
<br />
<div class="scriptol"><b>Autocode</b> - 1952 <br />
Alick E. Glennie <br />
Implemented firstly on Mark 1, then on other computers, this is a symbolic code. </div><div class="scriptol"><b>IPL</b> - 1956 - Information Processing Language<br />
A. Newell, H. Simon, J.C. Shaw <br />
Low-level list processing language. Implements the RECURSIVITY.<br />
<br />
to learn more, please clik to:-<br />
<a href="http://www.scriptol.com/programming/history.php%20">History of Programming Languages and Their Evolution</a> </div></div></div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-67660933514219352942011-04-11T03:06:00.002+08:002011-04-11T03:23:18.486+08:00Most Popular Computer Programming Language<div class="separator" style="clear: both; text-align: center;"><a href="http://www.jasonkolb.com/photos/uncategorized/jobs.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://www.jasonkolb.com/photos/uncategorized/jobs.png" width="320" /></a></div><div style="text-align: justify;">Computer programmers have been writing code for 50 years. New technologies continue to emerge, develop, and mature at a rapid pace. Now there are more than 2,500 documented programming languages. It is very difficult to measure which programming language are most popular. </div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Available jobs are a pretty good indicator of the number of development projects for a given language. Java pretty much dominates in this area, with C# coming in a distant second, and ASP.NET and PHP not too far behind. Not a bad showing for Microsoft, actually.</div><div style="text-align: justify;"><br />
</div>To see more, please clik here :-<br />
<a href="http://jasonkolb.com/weblog/2007/02/programming_tre.html">Most Popular CPL</a>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-423252148373712892011-04-10T15:49:00.005+08:002011-04-10T16:05:27.080+08:00ANALISIS DAN REKA BENTUK BERORIENTASIKAN OBJEK DALAM PEMBANGUNAN PERISIAN<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8ddHTwoyOFjwerey0B50-YZtIz_sdzmPbSyt0VUOiHKfxCW30ZGFANcUlPVscPMnT9b98qBRlZlaXdw7M_VjSEzPi1fyNrboIqsyFduG4ufbabx23IPdhKbw-cFdzs3aGK_dvo1CT-XI/s1600/chapter_10_introduction_to_object-relational_mappingimage1.png"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 320px; height: 196px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8ddHTwoyOFjwerey0B50-YZtIz_sdzmPbSyt0VUOiHKfxCW30ZGFANcUlPVscPMnT9b98qBRlZlaXdw7M_VjSEzPi1fyNrboIqsyFduG4ufbabx23IPdhKbw-cFdzs3aGK_dvo1CT-XI/s320/chapter_10_introduction_to_object-relational_mappingimage1.png" alt="" id="BLOGGER_PHOTO_ID_5593862633049563170" border="0" /></a><br /><p><strong><span style="color:blue;">Pengenalan</span></strong></p> <p>Dalam prinsip kejuruteraan perisian, salah satu kaedah menyelesaikan spesifikasi keperluan (keperluan pengguna) adalah berfikir secara objek. Ini bermaksud masalah atau keperluan sesebuah perisian perlu dianggap sebagai <strong>sebuah objek</strong> yang mempunyai beberapa fungsi tertentu di dalamnya. Dalam dunia sebenar, perisian dan perkakasan (hardware) yang hendak dibangunkan perlu dianalisis secara teliti, difahami secara mendalam dan <strong>konsep ‘domain’ </strong>masalah tersebut perlu jelas.</p> <p><strong><span style="color:blue;">Analisis Berorientasikan Objek</span></strong></p> <p>Mengenalpasti ciri-ciri dan konsep objek dalam sesebuah masalah. Secara ringkasnya, analisis OO ini memastikan para pembangun atau pengaturcara perisian pada jalan yang betul dalam menyelesaikan masalah tersebut mengikut kepakaran masing-masing. Satu objek boleh dipecahkan kepada beberapa sub-objek dan setiap satunya mempunyai masalah berlainan dan diselesaikan oleh orang yang berlainan.</p> <p>Sebagai contoh, sebuah <strong>kereta</strong> mempunyai beberapa bahagian tertentu yang sama-sama menjalankan fungsi sebagai sebuah kereta. Bahagian tersebut adalah <strong>enjin</strong> (satu objek), <strong>stering</strong> (satu yang objek yang lain), <strong>cermin sisi</strong> dan sebagainya. Objek-objek tersebut mempunyai <strong>fungsi yang khusus</strong> dan berinteraksi antara satu sama lain bagi menggerakkan sebuah objek (kereta). </p> <p>Begitulah juga dalam membangunkan perisian atau program <strong>berskala besar</strong>. Contohnya, <strong>Sistem Penyuraian dan Pemantauan Trafik Bandaraya Kuala Lumpur</strong> terdiri dari beberapa komponen dan dibahagikan tugasnya bagi memudahkan penyelesaian sebelum diintegrasikan. Contohnya, <em>Komponen Pemantauan CCTV</em> (objek 1), <em>Komponen Lampu Isyarat</em> (objek 2), <em>Komponen Algoritma Fuzzy Trafik</em>(objek 3) dan sebagainya. Oleh itu, perlu satu mekanisma dalam memahami dan menganalisis masalah dan keperluan terhadap sistem trafik tersebut. Apabila secara keseluruhan sistem dapat difahami sepenuhnya, peringkat rekabentuk tidak menjadi masalah kepada semua pihak (Klien, Pengurus Projek, Pengaturcara, Jurutera dan Penganalisis). </p> <p><strong><span style="color:blue;">Rekabentuk Berorientasikan Objek</span></strong></p> <p>Apabila peringkat analisis selesai, suatu rekabentuk berorientasikan objek dilakar sama ada menggunakan kaedah <em>UML</em> <strong>(Unified Modeling Language)</strong> atau <em>Patterns. </em>UML merupakan bahasa/rajah rekabentuk standard (rajah) yang memaparkan unsur-unsur model bagi sesuatu objek yang mudah difahami. Terdapat beberapa <strong>skema model</strong> dalam UML ini iaitu :</p> <ol><li><strong>Sequence Diagram</strong> – Tatacara susunan perjalanan sesebuah program atau proses.</li><li><strong>Use Case</strong> – Paparan ringkas keperluan pengguna atau sistem/proses.</li><li><strong>State Machine</strong> – Penerangan ringkas proses awal sehingga proses tamat.</li></ol> <p>Rekabentuk tersebut merupakan <strong>rangka sebenar</strong> pada sesebuah perisian / program. Oleh itu, semua pihak dalam pembangunan perlu sama-sama memahami dengan jelas bagi mengelakkan kekeliruan / salah faham ketika proses pengintegrasian sistem berlaku.</p>khaihttp://www.blogger.com/profile/06646555393289669776noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-81393522459575146032011-04-10T15:34:00.003+08:002011-04-10T15:42:40.974+08:00FUNGSI BAHASA PENGATURCARAAN<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitlZ5lfFYCvfz0FJ6x16wRNUKszevvTh1nSZprQT6YHHA7ujfyphI6lteUFEtUTj3ALyefmDaLjWwmTYV14vrTSKh0yodu5asHFqne-Pqy-EJh4tPSs2HhRt4J2uhGR3mjK0edRdNwoKI/s1600/index.jpg"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 240px; height: 171px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitlZ5lfFYCvfz0FJ6x16wRNUKszevvTh1nSZprQT6YHHA7ujfyphI6lteUFEtUTj3ALyefmDaLjWwmTYV14vrTSKh0yodu5asHFqne-Pqy-EJh4tPSs2HhRt4J2uhGR3mjK0edRdNwoKI/s320/index.jpg" alt="" id="BLOGGER_PHOTO_ID_5593857034656896610" border="0" /></a><br /><p>Fungsi utama <strong>Bahasa Pengaturcaraan (Programming Language)</strong> ialah untuk membenarkan Juruaturcara menyampaikan hasratnya bagi proses perkomputeran, dengan lebih mudah berbanding dengan apa yang mereka boleh lakukan dengan Bahasa Tahap Rendah atau Kod Mesin. Disebabkan tujuan ini, Bahasa Pengaturcaraan secara amnya direkabentuk untuk menggunakan sintaks tahap tinggi, yang lebih mudah difahami oleh Juruaturcara. Bahasa Pengaturcaraan adalah peralatan yang penting bagi membantu Jurutera Perisian (Software Engineer) untuk menulis Aturcara(program) yang lebih baik dengan lebih cepat.</p> <p>Pemahaman terhadap Bahasa Pengaturcaraan adalah penting bagi mereka yang mendalami bidang Sains Komputer. Ini adalah kerana sebarang bentuk proses perkomputeran dilakukan dengan Bahasa Komputer. Dalam beberapa dekad kebelakangan ini, kebanyakan Bahasa Komputer telah diperkenalkan, bersilih-ganti, dan telah diubahsuai atau digabungkan. Walaupun terdapat beberapa percubaan untuk menghasilkan hanya satu Bahasa Pengaturcaraan universal yang boleh diguna untuk pelbagai tujuan, namun kebanyakan percubaan ini telah gagal. Beberapa Bahasa-bahasa Pengaturcaraan lain masih diperlukan kerana:</p> <ul><li> Penggunaannya yang berbeza dari segi penghasilan perisian perniagaan, sains, serta hobi.</li><li>Sesetengah Bahasa Pengaturcaraan tidak sesuai digunakan oleh pengguna baru, dan memerlukan kepakaran.</li><li>Juruaturcara mempunyai citarasa tersendiri</li><li>Masa larian mungkin berbeza bagi aturcara yang *dilarikan pada pengawal mikro(microcontroller), dengan aturcara yang dilarikan pada Superkomputer. *”dilarikan” di sini bermaksud melancarkan aturcara</li></ul> <p><strong>Terdapat pelbagai Bahasa dengan fungsi khusus dan digunakan untuk situasi tertentu:</strong></p> <ul><li> PHP ialah Bahasa Pengskripan yang digunakan dalam pembangunan web</li><li>Perl lebih sesuai untuk memanipulasi perkataan</li><li>Bahasa C lebih luas penggunaan dalam pembangunan Sistem Pengoperasian dan Pengkompil</li></ul> <p>Bahasa Pengaturcaraan membolehkan aturcara komputer kurang bergantung pada mesin atau persekitaran tertentu sahaja. Ini kerana Bahasa Pengaturcaraaan ditukar menjadi kod mesin untuk mesin tertentu, dan bukan dilarikan secara terus oleh mesin. Ini merupakan tujuan utama penghasilan Bahasa Pengaturcaraan <strong>FORTRAN</strong>, (salah satu daripada Bahasa Pengaturcaraan yang pertama), iaitu ketidak-bergantungan terhadap mesin.<br />Terdapat 2 mekanisme yang digunakan untuk menterjemah sesuatu aturcara, yang ditulis dalam Bahasa Pengaturcaraan, kepada kod mesin tertentu pada komputer:</p> <ul><li> Mekanisme kompilasi</li><li>Mekanisme Penterjemah</li></ul> <p><strong>Mekanisme Kompilasi</strong><br />Mekanisme terjemahan yang menterjemah teks aturcara secara keseluruhan dan kemudian melarikan format dalamannya. Aturcara Pengkompil menerima teks aturcara(dikenali sebagai Kod Sumber) sebagai data input, dan membekalkan kod objek sebagai output. Kod Objek yang dihasilkan adalah kod mesin yang boleh dilarikan secara terus oleh CPU komputer, atau kod yang padan dengan spesifikasi Mesin Maya(Virtual Machine)</p> <p><strong>Mekanisme Penterjemah</strong><br />Mekanisme terjemahan yang menterjemah kod aturcara pada masa-larian(runtime), di mana setiap langkah yang diterjemah dilarikan terus. Penghasilan aturcara dengan cara ini biasanya dilarikan lebih lambat berbanding aturcara yang dikompil. Bagaimanapun, ianya lebih fleksibel kerana boleh berinteraksi dengan persekitaran larian. Untuk lebih lanjut, lihat Bahasa Pengaturcaraan Diterjemah(?)(Interpreted Language). Bahasa Pengaturcaraan yang mengguna cara ini dikenali sebagai Bahasa Pengaturcaraan Pengskripan.<br />Kebanyakan Bahasa Pengaturcaraan boleh diterjemah dengan kedua-dua cara, tetapi kebanyakannya lebih sesuai untuk salah satu cara.</p> <p>Adakah korang tahu? Apa bahasa pengaturcaraan pertama di dunia?<br />Ia adalah <strong>LISP</strong> dan <strong>FORTRAN</strong>.. sehingga ke hari ini, 2 jenis bahasa pengaturcaraan itu masih di gunapakai oleh para programmer dan hackers elit sedunia (Terutamanya adalah <strong>LISP</strong>..)</p>khaihttp://www.blogger.com/profile/06646555393289669776noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-60430449287271731482011-04-07T12:58:00.004+08:002011-04-07T17:32:59.883+08:00Technology and PeopleThere are 4 different coping styles of people when it comes to technology. The styles are as follows :<br /><br /><br />1. Cynicism<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.millionaireacts.com/wp-content/uploads/2009/11/counter-cynicism.png"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 141px; height: 141px;" src="http://www.millionaireacts.com/wp-content/uploads/2009/11/counter-cynicism.png" alt="" border="0" /></a> - Person who feels that the idea of using a microcomputer is overrated and too troublesome to learn.<br /><br /><br /><br /><br /><br /><br /><br /><br />2. Naivete - <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.retailshakennotstirred.com/wp-content/uploads/2010/11/science_questioning.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 151px; height: 125px;" src="http://www.retailshakennotstirred.com/wp-content/uploads/2010/11/science_questioning.gif" alt="" border="0" /></a>Person who underestimate the difficulty of changing computer systems or generating information.<br /><br /><br /><br /><br /><br /><br /><br />3. Frustration - Pers<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://thecalmspace.com/wp-content/uploads/2009/08/technology-frustration.jpg"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 204px; height: 106px;" src="http://thecalmspace.com/wp-content/uploads/2009/08/technology-frustration.jpg" alt="" border="0" /></a>on who feels it is an imposition to have to learn something new like computer technology.<br /><br /><br /><br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://029ca60.netsolhost.com/dc/images/home_photo.jpg"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 157px; height: 104px;" src="http://029ca60.netsolhost.com/dc/images/home_photo.jpg" alt="" border="0" /></a>4. Proactivity - Person who looks at technology in a positive, realistic way.<br /><br /><br /><br /><br /><br />Reference : Computing Essentials, Timothy and Linda, Mc Graw Hill (2011)norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-35760602153167809932011-04-07T12:50:00.002+08:002011-04-07T12:58:04.238+08:00System Analysis and Design<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZnmQ8pevTK_nrvSE_qYU3L60DFsr6hMH41mIqfzxSlRlAWJLc8JjURhyO-K5fwFts-_01srvSx25sH-K2JFEDcawDghRUGXaLGHhdF7hns__6XzMrwP6tUQl4fFMIZIqT_sdmTG9PTbv8/s320/3.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 294px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZnmQ8pevTK_nrvSE_qYU3L60DFsr6hMH41mIqfzxSlRlAWJLc8JjURhyO-K5fwFts-_01srvSx25sH-K2JFEDcawDghRUGXaLGHhdF7hns__6XzMrwP6tUQl4fFMIZIqT_sdmTG9PTbv8/s320/3.jpg" alt="" border="0" /></a><br />System analysis and design is a six-phase problem-solving procedure for examining an information system and improving it. The six phases make up what is known as the systems development life cycle. The System Development Life Cycle (SDLC) is the step-by-step process that many organizations follow during systems analysis and design.<br /><br />For further information about System Analysis and Design, kindly click the following links :<br /><br /><a href="http://en.wikipedia.org/wiki/Systems_Development_Life_Cycle">http://en.wikipedia.org/wiki/Systems_Development_Life_Cycle</a>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-85395239385499164192011-04-07T11:31:00.005+08:002011-04-07T11:43:55.944+08:00Pseudocode<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://users.ece.utexas.edu/%7Evalvano/assmbly/AssFig7.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 412px; height: 354px;" src="http://users.ece.utexas.edu/%7Evalvano/assmbly/AssFig7.gif" alt="" border="0" /></a><br /><p style="font-weight: bold; color: rgb(255, 102, 0);" class="columnSubtitle">What is pseudocode?</p> <p class="bodyText">Pseudocode consists of short, English phrases used to explain specific tasks within a program's algorithm. Pseudocode should not include keywords in any specific computer languages. It should be written as a list of consecutive phrases. You should not use flowcharting symbols but you can draw arrows to show looping processes. Indentation can be used to show the logic in pseudocode as well. For example, a first-year, 9th grade Visual Basic programmer should be able to read and understand the pseudocode written by a 12th grade AP Data Structures student. In fact, the VB programmer could take the other student's pseudocode and generate a VB program based on that pseudocode.</p> <p style="color: rgb(255, 102, 0); font-weight: bold;" class="columnSubtitle">Why is pseudocode necessary?</p> <p class="bodyText">The programming process is a complicated one. You must first understand the program specifications, of course, Then you need to organize your thoughts and create the program. This is a difficult task when the program is not trivial (i.e. easy). You must break the main tasks that must be accomplished into smaller ones in order to be able to eventually write fully developed code. Writing pseudocode WILL save you time later during the construction & testing phase of a program's development.</p> <p class="columnSubtitle">How do I write pseudocode?</p> <p class="bodyText">First you may want to make a list of the main tasks that must be accomplished on a piece of scratch paper. Then, focus on each of those tasks. Generally, you should try to break each main task down into very small tasks that can each be explained with a short phrase. There may eventually be a one-to-one correlation between the lines of pseudocode and the lines of the code that you write after you have finished pseudocoding.</p> <p class="bodyText">It is not necessary in pseudocode to mention the need to declare variables. It is wise however to show the initialization of variables. You can use variable names in pseudocode but it is not necessary to be that specific. The word "Display" is used in some of the examples. This is usually general enough but if the task of printing to a printer, for example, is algorithmically different from printing to the screen, you may make mention of this in the pseudocode. You may show functions and procedures within pseudocode but this is not always necessary either. Overall, remember that the purpose of pseudocode is to help the programmer efficiently write code. Therefore, you must honestly attempt to add enough detail and analysis to the pseudocode. In the professional programming world, workers who write pseudocode are often not the same people that write the actual code for a program. In fact, sometimes the person who writes the pseudocode does not know beforehand what programming language will be used to eventually write the program.</p> <p class="columnSubtitle">Example:</p> <blockquote> <p class="bodyText">Original Program Specification: </p> <blockquote> <p class="bodyText">Write a program that obtains two integer numbers from the user. It will print out the sum of those numbers.</p></blockquote> <p class="bodyText">Pseudocode: </p> <blockquote> <p class="bodyText">Prompt the user to enter the first integer<br />Prompt the user to enter a second integer<br />Compute the sum of the two user inputs<br />Display an output prompt that explains the answer as the sum<br />Display the result</p>References :<br /><br />http://www.minich.com/education/wyo/stylesheets/pseudocode.htm<br /></blockquote></blockquote>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-89801839114434672802011-04-07T11:02:00.006+08:002011-04-07T11:20:09.116+08:00Differences between "Do Until" and "Do While"<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.vb6.us/files/VBPrograms/RepetitionStructure/image008.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 420px; height: 371px;" src="http://www.vb6.us/files/VBPrograms/RepetitionStructure/image008.jpg" alt="" border="0" /></a>The difference between "do while" and "do until" is that a "do while" loops while the test case is true, whereas "do until" loops UNTIL the test case is true (which is equivalent to looping while the test case is false).<br /><div style="border: medium none; text-align: left; background-color: transparent; color: rgb(0, 0, 0); overflow: hidden; text-decoration: none;"><div> <p><br /></p> <p>The difference between a "do ...while" loop and a "while {} " loop is that the while loop tests its condition before execution of the contents of the loop begins; the "do" loop tests its condition after it's been executed at least once. As noted above, if the test condition is false as the while loop is entered the block of code is never executed. Since the condition is tested at the bottom of a do loop, its block of code is always executed at least once.</p> <p><span style="font-weight: bold;">To further clear your concept on this, understand the syntax and description of the two loop types:</span></p> <p><span style="font-weight: bold;">while</span><br />The <span style="font-style: italic;">while</span> loop is used to execute a block of code as long as some condition is true. If the condition is false from the start the block of code is not executed at al. The while loop tests the condition before it's executed so sometimes the loop may never be executed if initially the condition is not met. Its syntax is as follows.</p> <p>while (tested condition is satisfied)<br />{<br />block of code<br />}</p> <p>In all constructs, curly braces should only be used if the construct is to execute more than one line of code. The above program executes only one line of code so it not really necessary (same rules apply to if...else constructs) but you can use it to make the program seem more understandable or readable.</p> <p>Here is a simple example of the use of the while loop. This program counts from 1 to 100.</p> <p><br />#include <stdio.h></stdio.h></p> <p>int main(void)<br />{<br /><br />int count = 1;</p> <p>while (count <= 100)<br />{<br />printf("%d\n",count);<br />count += 1; // Notice this statement<br />}</p> <p>return 0;<br /><br />}</p> <p>Note that no semi-colons ( ; ) are to be used after the while (condition) statement. These loops are very useful because the condition is tested before execution begins. However i never seem to like these loops as they are not as clear to read as the do ...while loops. The while loop is the favorite amongst most programmers but as for me, i definitely prefer the do ...while loop.</p> <p><span style="font-weight: bold;">do ....while</span><br />The do loop also executes a block of code as long as a condition is satisfied.</p> <p><span style="font-style: italic;">Again, The difference between a "do ...while" loop and a "while {} " loop is that the while loop tests its condition before execution of the contents of the loop begins; the "do" loop tests its condition after it's been executed at least once. As noted above, if the test condition is false as the while loop is entered the block of code is never executed. Since the condition is tested at the bottom of a do loop, its block of code is always executed at least once.</span></p> <p>Some people don't like these loops because it is always executed at least once. When i ask them "so what?", they normally reply that the loop executes even if the data is incorrect. Basically because the loop is always executed, it will execute no matter what value or type of data is supposed to be required. The "do ....while" loops syntax is as follows</p> <div style="padding: 0px 26px 0px 63px; margin: 0px; font: 11px verdana,tahoma,arial,sans-serif; color: rgb(0, 0, 96);" id="quote">do<br />{<br />block of code<br />} while (condition is satisfied);</div> <p><br />Note that a semi-colon ( ; ) must be used at the end of the do ...while loop. This semi-colon is needed because it instructs whether the while (condition) statement is the beginning of a while loop or the end of a do ...while loop. Here is an example of the use of a do loop.<br /></p> <p>include <stdio.h></stdio.h></p> <p>int main(void)<br />{</p> <div style="padding: 0px 26px 0px 63px; margin: 0px; font: 11px verdana,tahoma,arial,sans-serif; color: rgb(0, 0, 96);" id="quote">int value, r_digit; printf("Enter a number to be reversed.\n");<br />scanf("%d", &value); do<br />{<br />r_digit = value % 10;<br />printf("%d", r_digit);<br />value = value / 10;<br />} while (value != 0); printf("\n"); return 0;</div> <p><br />}<a href="http://wiki.answers.com/Q/What_is_the_difference_between_do_while_and_do_until_loop_in_c_programing"><span style="text-decoration: underline;"><br /></span></a></p><p>References :</p><p>http://wiki.answers.com/Q/What_is_the_difference_between_do_while_and_do_until_loop_in_c_programing</p></div></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-17952123430716267772011-04-02T23:49:00.004+08:002011-04-07T19:39:18.963+08:00Apakah peranan pangkalan data yg sebenarnya??<div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; color: rgb(51, 51, 51); line-height: 20px; "><div>Peranan pangkalan data menjadi penting apabila organisasi mempunyai data yang banyak dan berkait antara satu sama lain. Antara kelebihannya:</div><div><br />
</div><div>1) <b><span class="Apple-style-span" >Simpanan dan kawalan data secara berpusat</span></b></div><div><span class="Apple-tab-span" style="white-space:pre"> </span>Apa yang di maksudkan berpusat? apa yang saya tahu, ia di panggil secara berpusat di kerana data yang ada akan disimpan di satu tempat di dalam sistem yang di sediakan khas utk penyimpanan data.</div><div><br />
</div><div>2) <span class="Apple-style-span" >Pengurusan data secara cekap</span></div><div><span class="Apple-style-span" ><span class="Apple-tab-span" style="white-space:pre"> </span><span class="Apple-style-span" >Cekap ke? sistem yang dicipta sememangnya khusus untuk pemprosesan data, ia bergantung kepada cara bagaimana sistem itu di uruskan... ketepatan maklumat, kelajuan sistem untuk memproses data juga diambil kira...</span></span></div><div><span class="Apple-style-span" ><span class="Apple-style-span" ><br />
</span></span></div><div>3) <span class="Apple-style-span" >Mengelakkan gejala data yang disimpan berulang2 dan data yang disimpan berselerak</span></div><div><span class="Apple-style-span" ><span class="Apple-tab-span" style="white-space:pre"> </span><span class="Apple-style-span" >biasanya lah, yg saya tahu setiap sistem sememangnya akan dapat kesan sekiranya berlaku perkara yang berulang2 dalam bentuk nama, nombor kod,monbor ID, dan macam2 lagi.seperti laptop atau komputer ia akan menunjukkan data yang sedia ada jika sekiranya nama fail yang baru kita masukkan adalah sama dengan nama data yang sedia ada.</span></span></div><div><span class="Apple-style-span" ><br />
</span></div><div><span class="Apple-style-span" ><br />
</span></div></span></div>faishalhttp://www.blogger.com/profile/09583632866137487862noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-23075884761654397842011-03-28T13:02:00.003+08:002011-03-28T13:04:04.154+08:00Kelebihan pangkalan data<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD9InDmRAfPGNq6BIEZQDhs278odLLqBA68npGCLG8oy54oPsvSJhK_akeUg50XOFv2hAHfGZ7oMK-TgDzvSA1a-oiImZvdoIkMn8iZE6d0pr76_5WwxjdNyax8AwE7lmvBnLQt88mVlE/s1600/thumbnailCAVRW0I8.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 160px; FLOAT: left; HEIGHT: 119px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5588992060517930818" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD9InDmRAfPGNq6BIEZQDhs278odLLqBA68npGCLG8oy54oPsvSJhK_akeUg50XOFv2hAHfGZ7oMK-TgDzvSA1a-oiImZvdoIkMn8iZE6d0pr76_5WwxjdNyax8AwE7lmvBnLQt88mVlE/s320/thumbnailCAVRW0I8.jpg" /></a> <br /><div>Untuk individu dan organisasi,terdapat banyak kebaikan memiliki pangkalan data : </div><br /><div>· <span style="color:#3366ff;">Perkongsian</span> : Dalam organisasi,maklumat daripada satu jabatan boleh dikongsi dengan yang lain.Jabatan pengebilan boleh membenarkan jabatan pemasaran mengetahui pelanggan yang memesan barangan dalam kuantiti yang besar. </div><br /><div>· <span style="color:#3366ff;">Keselamatan</span> : Pengguna diberi kata laluan atau capaian hanya kepada jenis maklumat yang mereka kehendaki.Oleh itu,jabatan pembayaran gaji boleh melihat kadar gaji pekerja,tetapi jabatan lain tidak mencapai capaian tersebut. </div><br /><div>· <span style="color:#3366ff;">Lewahan data</span> : Dengan beberapa jabatan mencapai satu fail,bilangan fail adalah sedikit.Kegunaan storan yang berlebihan dapat dikurangkan.Mikrokomputer yang disambungkan pleh rangkaian kepada pelayan fail,contohnya,boleh menggantikan cakera keras yang berada dalam beberapa mikrokomputer individu. </div><br /><div>· <span style="color:#3366ff;">Integriti data</span> : Sistem fail yang lama tidak mempunyai “integrity” iaitu perubahan yang dibuat dalam fail di satu jabatan mungkin tidak dilakukan pada jabatan lain.Sebagaimana yang anda jangkakan,ini boleh menyebabkan masalah yang serius dan percanggahan apabila data digunakan untuk keputusan yang penting yang melibatkan beberapa jabatan.</div>khaihttp://www.blogger.com/profile/06646555393289669776noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-74812509750975301602011-03-28T13:00:00.002+08:002011-03-28T13:02:04.370+08:00pangkalan data berhak milik<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHN5qXWKlN2eV0QDSt6EikKB4EByFI6KTvQ-FV_NtTTYQHr-9h-0DqYRtO4P0hCvmcv-BwNs-GGJTaJwVa-xWAE0wHvFffJq1y1E4QERngYDNBmi60ynPW4yhfyx3LQ-HfNawSdEfuF3A/s1600/thumbnail.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 160px; FLOAT: right; HEIGHT: 80px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5588991297421250738" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHN5qXWKlN2eV0QDSt6EikKB4EByFI6KTvQ-FV_NtTTYQHr-9h-0DqYRtO4P0hCvmcv-BwNs-GGJTaJwVa-xWAE0wHvFffJq1y1E4QERngYDNBmi60ynPW4yhfyx3LQ-HfNawSdEfuF3A/s320/thumbnail.jpg" /></a> <br /><div><span style="color:#6600cc;">Pangkalan data berhak milik</span> pada umumnya ialah satu pangkalan data yang besar di mana organisasi membangunkannya untuk meliputi subjek tertentu.Ia menawarkan capaian terhadap pangkalan data ini kepada awam atau individu luaran yang terpilih dengan mengenakan yuran.Kadangkala pangkalan data berhak milik juga dikenali sebagai utiliti maklumat atau bank data.Contohnya ialah Penerbitan Interaktif Dow Jones,di mana ia menawarkan berbagai-bagai jenis perkhidmatan kewangan.Antara pangkalan data berhak milik adalah seperti berikut: · <span style="color:#000066;">CSi</span> : Menawarkan perkhidmatan pengguna dan perniagaan,termasuklah elektronik mel. · <span style="color:#000066;">Perkhidmatan Maklumat Dialog</span> : Menawarkan maklumat perniagaan,begitu juga maklumat teknikal dan saintifik. · <span style="color:#000066;">Penerbitan Interaktif Dow Jones</span> : Menyediakan berita dunia dan maklumat mengenai perniagaan,pelaburan dab saham. · <span style="color:#000066;">Prodigy </span>: Menawarkan berita dan maklumat mengenai perniagaan dan ekonomi,begitu juga perkhidmatan masa lapang.</div><br /><div>Kebanyakan pangkalan data berhak milik direka bentuk untuk kegunaan organisasi begitu juga individu.Organisasi selalunya membayar yuran keahlian ditambah yuran penggunaan mengikut jam.</div>khaihttp://www.blogger.com/profile/06646555393289669776noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-79038178985242585652011-03-28T02:08:00.004+08:002011-03-28T02:12:47.787+08:00Operation Research<div class="separator" style="clear: both; text-align: center;"><a href="http://www.kaboodle.com/hi/img/a/0/0/d/5/AAAACqScoXQAAAAAAA1T8w.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="265" src="http://www.kaboodle.com/hi/img/a/0/0/d/5/AAAACqScoXQAAAAAAA1T8w.jpg" width="320" /></a></div><br />
<div class="pageTitleOverview" style="color: #741b47;"><b>What Operations Research Is???</b><br />
</div><div style="text-align: justify;">Operations research (O.R.) is the discipline of applying advanced analytical methods to help make better decisions.<br />
</div><div></div><div style="text-align: justify;">By using techniques such as mathematical modeling to analyze complex situations, operations research gives executives the power to make more effective decisions and build more productive systems based on:<br />
</div><ul class="bulletedList"><li class="listItem">More complete data </li>
<li class="listItem"> Consideration of all available options </li>
<li class="listItem"> Careful predictions of outcomes and estimates of risk </li>
<li class="listItem"> The latest decision tools and techniques</li>
</ul><div style="text-align: justify;">O.R. professional offers the ability to define specific challenge in ways that make the most of data and uncover most beneficial options.To achieve these results, O.R. professionals draw upon the latest analytical technologies, including: </div><ul class="bulletedList"><li class="listItem"> <b style="background-color: white; color: #4c1130;"><span class="listItemTitle">Simulation</span></b><span style="color: #4c1130;"> ~ </span>Giving the ability to try out approaches and test ideas for improvement</li>
<li class="listItem"> <b style="color: #4c1130;"><span class="listItemTitle">Optimization</span>~</b>Narrowing choices to the very best when there are virtually innumerable feasible options and comp<span style="background-color: white;"></span>aring them is difficult<span style="background-color: white;"></span></li>
<li class="listItem"> <b><span class="listItemTitle" style="color: #4c1130;">Probability and Statistics~</span></b> Helping measure risk, mine data to find valuable connections and insights, test conclusions, and make reliable forecasts </li>
</ul>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-14215101350465038202011-03-28T00:16:00.004+08:002011-03-28T01:42:40.843+08:00What is BI - Business Intelligence?<div class="separator" style="clear: both; text-align: center;"><a href="http://www.businessintelligencetoolbox.com/bi-business-intelligence-and-data-warehouse.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="303" src="http://www.businessintelligencetoolbox.com/bi-business-intelligence-and-data-warehouse.png" width="400" /></a></div><br />
<div style="text-align: justify;"><span style="font-size: small;"><b>BI</b> is an abbreviation of the two words <u>B</u>usiness <u>I</u>ntelligence, bringing the <span style="color: purple;">right information at the right time to the right people in the right format.</span> </span><br />
<br />
<br />
<span style="font-size: small;">It is a 5-step process to run your business smarter, starting with registering the right data correctly, collecting the data from multiple sources, transforming, combining and storing it in a data warehouse.</span><br />
</div><div></div><div style="text-align: justify;"><br />
<span style="font-size: small;">This data should be reported, analyzed and distributed to the right people at the right time in the right format. Please refer to this website to learn more about BI :-</span><br />
<span style="font-size: small;"><a href="http://www.businessintelligencetoolbox.com/what-is-bi.htm">http://www.businessintelligencetoolbox.com/what-is-bi.htm</a> </span></div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-56059392461923059182011-03-27T23:58:00.003+08:002011-03-28T01:43:54.847+08:00What is ZOHO reports???<div class="separator" style="clear: both; text-align: center;"><object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://1.gvt0.com/vi/T47d0_vsFE0/0.jpg" height="266" width="320"><param name="movie" value="http://www.youtube.com/v/T47d0_vsFE0&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><embed width="320" height="266" src="http://www.youtube.com/v/T47d0_vsFE0&fs=1&source=uds" type="application/x-shockwave-flash"></embed></object> </div><div class="separator" style="clear: both; text-align: center;"><br />
</div><b style="color: magenta;">ZOHO Reports</b> is Online Reporting and Business Intelligence that can be use to visually analyze for Business Information. Its features includes;<br />
<ul><li class="adtext"><b>Upload or synchronize data</b> from spreadsheets, web or traditional applications</li>
<li class="adtext"><b>Build</b> powerful reports and dashboards<b> in minutes</b> with our <b>easy drag-and-drop interface</b> </li>
<li class="adtext"><b>Share reports and dashboards</b> with key performance indicators</li>
</ul><div class="separator" style="clear: both; text-align: left;"><img border="0" height="163" src="http://www.mediamix.com.my/images/zohocrm-arch_000.gif" width="200" /> </div><div class="separator" style="clear: both; text-align: left;">To learns more, you can visit the following website;</div><div class="separator" style="clear: both; text-align: left;"><a href="http://www.mediamix.com.my/zohocrm.htm">http://www.mediamix.com.my/zohocrm.htm</a></div><span style="color: blue;"></span><br />
<br />
<br />
<ul></ul>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-90907583912409862442011-03-25T11:35:00.006+08:002011-03-25T12:41:26.662+08:00Database Management System (DBMS)<a href="http://www.cch.kcl.ac.uk/legacy/teaching/av1000/dbms/intro/dbms.gif"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 299px; FLOAT: left; HEIGHT: 240px; CURSOR: hand" border="0" alt="" src="http://www.cch.kcl.ac.uk/legacy/teaching/av1000/dbms/intro/dbms.gif" /></a> <div>DBMS is a set of software program that control the organization, storage, management, and retrieval of data in a database.<br /><br />DBMS programs have five subsystems : DBMS engine, data definition, data manipulation, applications generation, and data administration.<br />The examples of database management system are Microsoft Access, Oracle, OB2, Microsoft SQL Server and File Maker Pro.<br /><br />Features of typical DBMS are as follows :<br /><br /><ol><li>Accepts data input from operators and stores that data for later retrieval.</li><br /><li>Provides query languages for searching, sorting, and other "decision support" activities that help users correlate and make sense of collected data.</li><br /><li>Provides multi user access to data, along with security features that prevent some users from viewing and/or changing certain types of information.</li><br /><li>Provides data integritiy features that prevent more than one user from accessing amd changing the same information simultaneously.</li><br /><li>Provides a data dictionary (metadata) that describes the structure of the database, related files, and record information.</li></ol><p>Therefore, in today's world, DBMS is become an importance tool in storage and maintaining of data records for every organization such as hospital, banks, universities and retain stores. </p><p>References :<br /><br /><a href="http://wiki.answers.com/Q/Discuss_the_capabilities_and_features_of_a_database_management_system_dbms_what_set_of_functions_does_a_dbms_provide_give_some_examples_of_dbms_software">http://wiki.answers.com/Q/Discuss_the_capabilities_and_features_of_a_database_management_system_dbms_what_set_of_functions_does_a_dbms_provide_give_some_examples_of_dbms_software</a></p></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-82870076040030490822011-03-20T20:05:00.004+08:002011-03-20T20:39:40.079+08:00Sidang Video (Video Conference)<a href="http://videoconferencebureau.co.uk/images/mp_sml_city.gif"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 330px; DISPLAY: block; HEIGHT: 330px; CURSOR: hand" border="0" alt="" src="http://videoconferencebureau.co.uk/images/mp_sml_city.gif" /></a><br /><div>Sidang video merupakan satu set teknologi komunikasi interaktif yang membenarkan orang di dua atau lebih lokasi berinteraksi melalui penghantaran video atau audio dua hala secara serentak. Ia juga dirujuk sebagai kerjasama pandang dan merupakan sejenis perisian kumpulan. Ia berbeza dari videofon kerana ianya direka untuk ditujukan kepada suatu persidangan dan bukan individu.</div><br /><div></div><div>Sidang video menggunakan telekomunikasi audio dan video untuk menghubungkan orang di beberapa tempat untuk bermesyuarat. Ia boleh semudah perbualan diantara dua orang dalam pejabat persendirian atau melibatkan beberapa tempat dengan lebih seorang dalam bilik besar di setiap tempat.</div><br /><div></div><div>Selain penghantaran audio dan visual aktiviti mesyuarat, sidang video boleh digunakan untuk berkongsi dokumen, maklumat paparan komputer dan papan putih.</div><br /><div></div><div>Komponen-komponen yang diperlukan untuk sidang video adalah seperti berikut :</div><div>1) Video input : kamera video atau webcam</div><br /><div>2) Video output : monitor komputer, televisyen atau projector</div><br /><div>3) Audio input : mikrofon</div><br /><div>4) Audio output : pembesar suara</div><br /><div>5) Data transfer : analog atau digital telephone network, LAN atau internet</div><div></div><div>Sila klik ke laman berikut untuk maklumat lanjut berkenaan kebaikan dan keburukan sidang video.</div><div><a href="http://www.ehow.com/list_5745333_advantages-disadvantages-teleconferencing.html">http://www.ehow.com/list_5745333_advantages-disadvantages-teleconferencing.html</a></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-15882912480386892032011-03-19T12:25:00.014+08:002011-03-20T19:59:30.078+08:00Management Information Systems (MIS)<a href="http://www.learnsad.com/images/typesIS.jpg"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 351px; DISPLAY: block; HEIGHT: 260px; CURSOR: hand" border="0" alt="" src="http://www.learnsad.com/images/typesIS.jpg" /></a><br /><div><div><div>A management information system (MIS) is a computer-based system that provides information and support for effective managerial decision making.</div><br /><div></div><div>MISs typically support strategic decision-making needs of mid-level and top management. However, as technology becomes more widely accessible, more employees are wired into networks, and organizations push decision making downward in the hierarchy, these kinds of systems are seeing use at all levels of the organization.</div><br /><div></div><div>MISs typically include of the following :</div><br /><div></div><div>1) Decision Support Systems (DSSs)</div><div>An interactive, computer-based system that uses decision models and specialized databases to support organization decision makers.</div><br /><div></div><div>2) Executive Information Systems (EISs)</div><div>A management information system designed to facilitate strategic decision making at the highest levels of management by providing executives with easy access to timely and relevant information.</div><br /><div></div><div>3) Business Performance Dashboard</div><div>A system that pulls data from a variety of organizational systems and databases; gauges the data against key performance metrics, pulls out the right nuggets of information; and delivers information to managers in a graphical, easy-to-intepret format.</div><br /><div></div><div>4) Groupware</div><div>Software that works on a computer network or the Internet to facilitate information sharing, collaborative work, and group decision making.</div><br /><div></div><div></div><div></div><div></div><div>Other information system as per the following links :</div><br /><div></div><div><a href="http://www.officeautomationsystem.com/">http://www.officeautomationsystem.com/</a></div><div><a href="http://wiki.answers.com/Q/What_is_the_example_of_Knowledge_work_system">http://wiki.answers.com/Q/What_is_the_example_of_Knowledge_work_system</a></div></div></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-19332203386846594332011-03-19T12:02:00.003+08:002011-03-19T12:22:32.631+08:00E-Supply Chain Management<a href="http://www.enporion.com/images/scm_3.gif"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 397px; DISPLAY: block; HEIGHT: 231px; CURSOR: hand" border="0" alt="" src="http://www.enporion.com/images/scm_3.gif" /></a> <div><strong><span style="color:#ff6600;">Supply Chain Management</span></strong> is the term of managing the sequence of suppliers and purchasers covering all stages of processing from obtaining raw materials to distributing finished goods to final consumers.</div><br /><div></div><br /><div>The most recent advances in supply chain management involve using <em><span style="color:#ff6600;"><strong>Internet technologies</strong></span></em> to achieve the right balance of low inventory levels and customer responsiveness. An <strong><span style="color:#ff6600;">e-supply</span></strong> chain creates a seamless, integrated link that stretches from customers to suppliers by establishing electronic linkage between the organization and these external partners for the sharing and exchange of data.</div><br /><div></div><br /><div>For further information about e-supply software, please click the following link :</div><div><a href="http://www1.sap.com/solutions/business-suite/scm/index.epx">http://www1.sap.com/solutions/business-suite/scm/index.epx</a></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-49370698424288822342011-03-18T15:11:00.002+08:002011-03-18T15:20:02.309+08:00Digsby = IM + Email + Social Networks<div class="separator" style="clear: both; text-align: center;"><a href="http://www.blogsdna.com/wp-content/uploads/2008/07/digsby.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br />
</a></div><div style="border-bottom: 1px solid rgb(221, 221, 221); line-height: 1px; margin-top: 6px;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://icons.iconarchive.com/icons/tribalmarkings/colorflow/256/digsby-icon.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://icons.iconarchive.com/icons/tribalmarkings/colorflow/256/digsby-icon.png" width="320" /></a></div> I'm using a new application called Digsby that helps you manage all your IM, email, and social network accounts from one place. Digsby is completely free and supports all the services you already use like <span class="yshortcuts" id="lw_1300427957_0">Facebook</span>, <span class="yshortcuts" id="lw_1300427957_1" style="background: none repeat scroll 0% 0% transparent; border-bottom: 2px dotted rgb(54, 99, 136); cursor: pointer;">Yahoo Messenger</span>, YMail, and more...<br />
<br />
<br />
<div style="background-color: #fff8cc; border: 1px solid rgb(255, 226, 34); padding: 6px;">To try Digsby, follow the link below:<br />
<div style="color: magenta;"><a href="http://www.digsby.com/?utm_medium=email&utm_campaign=emailinvite&utm_source=original" rel="nofollow" target="_blank"><span class="yshortcuts" id="lw_1300427957_2">http://www.digsby.com?utm_medium=email&utm_campaign=emailinvite&utm_source=original</span></a> </div></div><div style="border-bottom: 1px solid rgb(221, 221, 221); line-height: 1px; margin-top: 6px;"></div><br />
<div style="color: purple;"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.finestdaily.com/wp-content/uploads/2011/02/Digsby-personalization.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="238" src="http://www.finestdaily.com/wp-content/uploads/2011/02/Digsby-personalization.png" width="320" /></a></div><b>WHY USE DIGSBY?</b></div>Digsby helps you save time by managing all your online accounts from one place. Digsby merges all your IM accounts into one <span class="yshortcuts" id="lw_1300427957_3">buddy list</span>, provides email alerts with a snapshot view of your inbox that lets you perform actions such as "Mark as Read" or "Report Spam", and shows you a real time newsfeed of all the activity on your social networks.<br />
<hr />Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-65086186424554337652011-03-18T15:04:00.002+08:002011-03-18T15:33:51.398+08:00What is Digsby?<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/16grAzndW9w?feature=player_embedded' frameborder='0'></iframe></div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-15913103763333864752011-03-16T21:26:00.002+08:002011-03-16T21:28:01.580+08:00Sarat Maklumat<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitbLKAcjH6HvwHEgW9zroBVIpI0mZvw6KuJJgXp2-U2vhssP9J1QXxCpOJy_GjuEuL6WjEiBMRMTupSAJRFx2hKl5EICD0hH0MeYxP8bFsaux60f-ycChCzYiqB5zVyC2f_YYtAmFHUFE/s1600/hoarding.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 205px; height: 256px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitbLKAcjH6HvwHEgW9zroBVIpI0mZvw6KuJJgXp2-U2vhssP9J1QXxCpOJy_GjuEuL6WjEiBMRMTupSAJRFx2hKl5EICD0hH0MeYxP8bFsaux60f-ycChCzYiqB5zVyC2f_YYtAmFHUFE/s320/hoarding.jpg" alt="" id="BLOGGER_PHOTO_ID_5584668899777572194" border="0" /></a><br /><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>ZH-CN</w:LidThemeAsian> <w:lidthemecomplexscript>AR-SA</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Calibri","sans-serif";} </style> <![endif]--> <p class="MsoNormal" style="text-indent: 0.5in;">Pernahkan anda mempersoalkan nilai teknologi?Adakah ia telah benar-benar membantu kita dan menjadikan kita lebih produktif?Mungkinkah pelbagai peranti yang sepatutnya meningkatkan produktiviti kita sebenarnya telah member kesan yang sebaliknya?</p> <p class="MsoNormal" style="text-indent: 0.5in;">E-mel,telefon sel,computer buku dan Web memang hebat.Mereka membolehkan kita untuk berkomunikasi ,bekerja di mana sahaja dan mencapai amaun data yang banyak.Bagaimanapun,sekiranya tidak berhati-hati,mereka boleh disarati maklumat dan mengakibatkan kesan negatif kepada kemampuan kita untuk melakukan kerja.</p> <p class="MsoNormal" style="text-indent: 0.5in;">Beberapa kajian telah mendapati bahawa <b style="">e-mel</b> ialah punca utama sarat maklumat.Laporan menunjukkan pekerja pengetahuan di sesuatu syarikat besar menghantar dan menerima lebih daripada 100 kesej e-mel sehari.Tambahan pula,kajian tersebut merumuskan bahawa kebanyakan daripada mesej tersebut tidak diperlukan.Berikut adalah beberapa cara untuk mengawal sarat e-mel :</p> <p class="MsoListParagraphCxSpFirst" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Pilih</b> : Pertama,lihat pada baris subjek e-mel.Baca hanya e-mel yang tepat dan bersesuaian dengan apa yang anda minati.Perhati seterusnya pada baris pengirim.Baca hanya e-mel daripada orang yang penting kepada anda.Tunda atau abaikan yang lain.</p> <p class="MsoListParagraphCxSpMiddle" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Buang</b> : Selepas membaca e-mel,balas jika perlu.Seterusnya simpan e-mel dalam fail di pelipat berkaitan atau buang sahaja.</p> <p class="MsoListParagraphCxSpMiddle" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Kawa</b>l : Hadkan e-mel anda dengan member alamat hanya kepada sesiapa yang memerlukan</p> <p class="MsoListParagraphCxSpMiddle" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Ringkas</b> : Apabila membalas,mesti padat dan tepat.</p> <p class="MsoListParagraphCxSpMiddle" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Hentikan spam</b> : Spam ialah pengiklanan e-mel yang tidak diperlukan.Elak dari menyertai senarai e-mel,beri bantahan kepada mereka yang menghantar spam dan minta agar nama anda dibuang daripada senarai mel tersebut.</p> <p class="MsoListParagraphCxSpLast" style="margin-left: 1in; text-indent: -0.25in;"><span style="font-family:Symbol;"><span style="">·<span style="font: 7pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><b style="">Jangan balas</b> : Anda tidak perlu membalas e-mel.Buat pemilihan dan balas hanya kepada e-mel yang memanfaatkan masa anda.</p> <p class="MsoNormal">Adakah sarat maklumat sebahagian masa depan anda?Sekiranya kehidupan anda sibuk seperti eksekutif hari ini,ini mungkin akan terjadi.</p>khaihttp://www.blogger.com/profile/06646555393289669776noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-54393311793840931482011-03-15T05:40:00.004+08:002011-03-15T06:13:55.063+08:00Computer Ethics<a href="http://www.bandwidthblog.com/wp-content/uploads/2010/11/200652313317_windows-piracy.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 196px; FLOAT: left; HEIGHT: 196px; CURSOR: hand" border="0" alt="" src="http://www.bandwidthblog.com/wp-content/uploads/2010/11/200652313317_windows-piracy.jpg" /></a><br /><div>Computer ethics is refer to guidelines for the morally acceptable use of computers in our society.</div><br /><br /><div>There are two major issues which are related to computer ethics :</div><br /><br /><div>1) <span style="color:#ff0000;"><strong>Copyright and Digital Rights Management (DRM)</strong></span></div><br /><br /><div>Copyright : A legal concept that gives content creators the right to control use and distribution of their work</div><br /><div>DRM : Encompasses various technologies that control access to electronic media and files.</div><br /><br /><div>2) <span style="color:#ff0000;"><strong>Plagiarism</strong></span></div><br /><div>Representing some other person's work and ideas as your own without giving credit to the</div><br /><div>original source.</div><div></div><br /><div></div><br /><div>Please refer to the following links for more information about computer ethics.</div><br /><div></div><div><a href="http://www.buzzle.com/articles/computer-ethics-code-of-ethics-in-computing.html">http://www.buzzle.com/articles/computer-ethics-code-of-ethics-in-computing.html</a></div><br /><div><a href="http://www.britannica.com/EBchecked/topic/1055407/digital-rights-management-DRM">http://www.britannica.com/EBchecked/topic/1055407/digital-rights-management-DRM</a></div><br /><div><a href="http://www.ehow.com/facts_5766300_importance-computer-ethics-software-piracy.html">http://www.ehow.com/facts_5766300_importance-computer-ethics-software-piracy.html</a><br /></div><div></div>norli.ismailhttp://www.blogger.com/profile/11345375033135381351noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-89846094675771510412011-03-12T08:55:00.001+08:002011-03-12T08:57:30.401+08:00Jenis-jenis Sistem Maklumat<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgILxj7FmwfDJlLaVekmoU757b9qw-5YabkCVoT6lSEzmRfySfqXBW5m-pBnQ1RRM4wT9dj5FRdobGHEQILpCfTYSyM60NISbWN1I1295IbI27GL-xwVie1hMF8BHEnErEQOT4r5Iz1GEQW/s1600/accounting.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgILxj7FmwfDJlLaVekmoU757b9qw-5YabkCVoT6lSEzmRfySfqXBW5m-pBnQ1RRM4wT9dj5FRdobGHEQILpCfTYSyM60NISbWN1I1295IbI27GL-xwVie1hMF8BHEnErEQOT4r5Iz1GEQW/s320/accounting.jpg" width="316" /></a></div><b>Jenis-jenis Sistem Maklumat </b><br />
* TPS <br />
* MIS<br />
* DSS<br />
* EIS<br />
* ES<br />
<br />
<div style="text-align: justify;"><b>Transaction Processing System</b> solves routine problems at the operational level and produce periodic reports , focus on transaction handling and records keeping.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Management Information System</b> solves structured problems and provided information for all levels of management.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Decision Support System</b> solves semistructured and unstructured problems , use query languages ,modeling and graphic , user-friendly , interactive.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>EIS is a subset of DSS</b> emphasize using graphic and external data.</div><div style="text-align: justify;">ES a knowledge base system , interactive , makes recommendation , response to users'question , knowledge tends to grow because it learns from user feedback.</div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com1tag:blogger.com,1999:blog-6911882031462872746.post-8070772879551336282011-03-12T08:47:00.000+08:002011-03-12T08:47:03.505+08:00Sistem Pemprosessan Transaksi (SPT)<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjcPpyvDgAe9l7E5tDAMerMZdezvpboEf-JqmGJ7jMzqWZJgC7dqt0qDFNiH_xFwA9rOlVaZAdBi00hUiEr6iPsTJLCosY4VP4W2HcCbvTfQKMkF9MOYTGzzKgcfOjUG5aoFs05s4o4vaP/s320/rajah7_3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="165" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjcPpyvDgAe9l7E5tDAMerMZdezvpboEf-JqmGJ7jMzqWZJgC7dqt0qDFNiH_xFwA9rOlVaZAdBi00hUiEr6iPsTJLCosY4VP4W2HcCbvTfQKMkF9MOYTGzzKgcfOjUG5aoFs05s4o4vaP/s200/rajah7_3.png" width="200" /></a></div><div style="text-align: justify;"> SPT boleh didefinasikan sebagai sistem berkomputer yang melaksanakan dan merekodkan rutin transaksi harian dan menyimpanya ke dalam database. Maklumat pada database boleh dicapai dengan mudah pada bila-bila masa. Sebagai contoh, SPT pada sistem perakaunan mempunyai tiga fungsi utama iaitu menyimpan akaun, mengeluarkan dokumen dan menghasilkan laporan. Fungsi menyimpan akaun melibatkan proses menyimpan data-data kewangan dengan tepat. Mengeluarkan dokumen ialah seperti resit pembelian, invois dan penyata bulanan transaksi. Penjanaan laporan merupakan hasil daripada transaksi yang berlaku dan digunakan untuk mengawal operasi.</div><div style="text-align: justify;"> </div><div style="text-align: justify;"> </div><div class="separator" style="clear: both; text-align: center;"><a href="http://aboutaccountancy.com/wp-content/uploads/2011/01/about-accountancy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://aboutaccountancy.com/wp-content/uploads/2011/01/about-accountancy.jpg" /></a></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfuCEw10cjsIgESINr4CrDr-e28RF5I9X0rergovHa6TyOOs-l2d4i-rW1w-umfLcC8U-OXT5Wa2MT7ek5kkV3J1NJ9_1ciMr6mnMOnKC_wzDIj33wm6Bs-6lexd7kinRDdTukLmk4u8v_/s320/rajah7_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a></div><div align="center"><br />
</div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com0tag:blogger.com,1999:blog-6911882031462872746.post-36646901666902113572011-03-12T06:27:00.007+08:002011-03-12T07:04:10.680+08:00Mengenali apa itu "Trojan horses"<div style="text-align: justify;"><b style="color: blue;">Trojan Horses</b><span style="color: blue;"> </span>merupakan salah satu daripada 3 jenis malware yang biasa menyerang sistem komputer selain virus dan cecacing (worm). </div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.linux4windows.com/Articles/digital_trojan_horse_in_business_home_software.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="239" src="http://www.linux4windows.com/Articles/digital_trojan_horse_in_business_home_software.gif" width="320" /></a></div><h3 style="text-align: center;"><b><b>"Digital Trojan Horse, as sneaky as in old Troy"</b></b></h3><h3 style="text-align: center;"><b><b></b></b></h3><div style="color: #e06666;"><u><b>Mengetahui Sejarah Trojan Horse </b> </u></div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.linux4windows.com/Articles/trojan_horse_in_business_home_software.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="288" src="http://www.linux4windows.com/Articles/trojan_horse_in_business_home_software.jpg" width="320" /></a></div><div style="text-align: justify;">Nama Trojan Horse berasal dari sejarah Yunani Kuno dimana terjadi peperangan antara bangsa Yunani dengan Troy selama lebih dari 10 tahun. Penyusup dari Yunani dipanggil Sinon menawarkan hadiah Trojan yang berbentuk Kuda dari kayu berukuran besar dan berhasil meyakinkan Troy bahwa Kuda Kayu (Trojan) tersebut dapat memberi kekuatan abadi kepada bangsa Troy. Setelah Kuda Kayu tersebut masuk ke kota Troy, dengan tidak disangka telah banyak pasukan Yunani yang bersembunyi di dalamnya. Yunani berhasil melumpuhkan dan membakar habis kota Troy. Kisah tersebut mengilhami para hacker untuk menciptakan “penyusup” ke komputer orang lain yang disebut dengan Trojan Horse. <span style="color: purple;">Daniel Edwards</span> dari National Security Agency (NSA) yang diakui mencetuskan istilah Trojan Horse untuk program jahat yang menyelinap dalam komputer mangsa. (detik.com,12/06/2008)<b> </b><br />
<br />
<h3 style="text-align: center;"><b>"Don't be like the Trojans, don't open your gates to invaders"</b></h3><b></b></div><br />
<div style="color: #741b47;"><u><b>Trojan Horse dalam dunia IT? </b></u></div><a href="http://www.systemdisc.com/wp-content/uploads/2010/12/The-Trojan-Horse-Virus-272x300.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://www.systemdisc.com/wp-content/uploads/2010/12/The-Trojan-Horse-Virus-272x300.jpg" width="181" /></a>Trojan Horse (Kuda Troya) tidak sama dengan virus kerana ia tidak memiliki kemampuan untuk menggandakan dirinya. Walaubagaimanapun, Trojan Horse lebih berbahaya jika dibandingkan dengan virus. Trojan Horse biasanya dikemas dalam bentuk software yang mampu menarik minat pengguna komputer. Namun disebalik daya tarikan software tersebut, tersembunyi fungsi lain yang mampu merosakkan sistem komputer.Trojan biasanya merupakan program perosak dan program kendali. Contohnya kaHt, Back Orifice dan Netbus.<br />
Apabila mangsa telah terkena salah satu dari program ini, si pengirim trojan dapat mengendalikan komputer mangsa dari jauh dengan membuka port-port tertentu dengan niat memusnahkan dari jauh.<br />
<br />
<div style="color: red;"><i><b>Tahukah anda "screen saver waterfalls.scr" merupakan salah satu jenis Trojan?????</b></i></div>Sila klik ke laman berikut untuk mengetahuinya ;<br />
<a href="http://www.linux4windows.com/Articles/trojan_horse_software.html">http://www.linux4windows.com/Articles/trojan_horse_software.html</a><br />
Setelah mengetahuinya, tentu sekali kita perlu lebih peka dengan pelbagai jenis software atau program-program lain yang boleh diperolehi dengan mudah dan percuma melalui internet. Jadi, berhati-hatilah...!!<br />
<br />
<div style="color: magenta;"><u><b>Pelajari bagaimana cara untuk membuang screen saver waterfall.scr dan jenis-jenis file yang berkaitan.</b></u></div><div style="color: black;">Sila klik link berikut ;</div><a href="http://www.exterminate-it.com/malpedia/remove-ScreenSaver.Waterfalls">http://www.exterminate-it.com/malpedia/remove-ScreenSaver.Waterfalls</a><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><br />
</div>Mayuzeihttp://www.blogger.com/profile/03136596098427227238noreply@blogger.com1