Nota :
Generasi pertama ( 1940-1956 ):
Generasi pertama menggunakan tiub vakum sebagai
komponen dalaman komputer.
Masalah penggunaan tiub vakum adalah penghasilan
haba yang tinggi, memerlukan ruang yang besar.
Contoh:
o ENIAC, MARK 1, UNIVAC Tiub vakum
Generasi kedua (1956-1963)
Generasi kedua menggunakan transistor
menggantikan tiub vakum. 1 transistor dapat
menggantikan 40 tiub vakum. Kelebihan transistor
adalah
Menghasilkan haba yang sedikit berbanding tiub
vakum dan menggunakan tenaga yang kecil. Transistor
Komputer lebih laju, lebih kecil dan lebih mantap
berbanding generasi pertama.
Contoh:
o IBM 1401 (model T),
COMPUTER ETHIC
Computer ethics is a system of moral standards or values used as a guideline for
computer users.
CODE OF ETHIC
Guideline in ICT that help determine whether a specific computer action is ethical and
unethical
Examples of ethical computer code of conducts include:
sending warning about viruses to other computer users
asking permission before sending any business advertisements to others
using information with authorization
INTELLECTUAL PROPERTY
Intellectual Property refers to works created by inventors, authors and artists. These
works are unique and have value in the market place.
PRIVACY
Information privacy is described as the rights of individuals and companies to deny or
restrict the collection and use of information about them.
CYBER LAW
Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.
SLANDER
- A legal term for false and malicious statement (meaning knowing that it is false,
or “reckless disregard” that it was false) untruth story about someone.
What is pornography?
- any form of media or material (like books or photographs) that depicts erotic
behaviour and is intended to cause sexual excitement.
COMPUTER CRIMES
A computer crime is defined as any criminal activity that is related
to the use of computers. These activities include computer fraud,
copyright infringement, computer theft and computer attack.
i) COMPUTER FRAUD
Computer fraud is defined as having an intention to take advantage over or causing
loss to other people, mainly on monetary basis through the use of computers.
There are many forms of computer fraud which include e-mail hoaxes, programmer
fraud, investment schemes, sales promotions and claims of expertise on certain
fields.
physical attack that disrupt the computer facility or its transmission lines.
an electronic attack that uses the power of electromagnetic energy to
overload computer circuitry.
Langkah-langkah keselamatan:
1. Antivirus
1. ‘Install’ antivirus.
2. Antispyware
Maksud – Perisian antispyware yang melindungi komputer daripada serangan
1. ‘Install’ antispyware.
3. Kriptografi
ramai. Kriptografi menukar maklumat penting kepada bentuk kod iaitu dalam
bentuk cipher.
Proses kriptografi:
Plaintext encrypt Ciphertext
decrypt
Plaintext Ciphertext
4. Firewall
komputer.
5. Data Backup
Maksud – satu proses menyalin maklumat atau data dari satu storan yang sama
Kegunaan – Memastikan data dan maklumat boleh digunakan jika data asal
hilang, rosak dan diubah suai akibat virus, trojan, worm dan logic bomb.
6. Aspek Kemanusiaan.
HERTZ
The clock speed unit is measured in hertz. A hertz is one cycle per second.
MEGAHERTZ (MHz)
Mega is a prefix that stands for million. Thus, megahertz (MHz) equals to one million
cycles of the system clock. A computer that operates at 933 MHz (megahertz) has 933
million clock cycles in one second.
GIGAHERTZ (GHz)
Giga is a prefix that stands for billion.Gigahertz (GHz) equals to one billion cycles of the
system clock.In relation with megahertz,1.0 GHz is equivalent to 1000 MHz.
For example, a microprocessor that runs at 200 GHz executes 200 billion cycles per
second. This is what they are talking about if they say a computer is a 2.4 GHz machine.
Its clock rate is 2.4 billion cycles per second.
GHz is most often used as a measurement of a PC processor chip and power, with bigger
numbers meaning more speed and higher price.
Local Area Network (LAN) is a network that connects to the computer and
devices in a limited geographical area. The simplest form of LAN is to connect two
computers together.
LAN is operated within a limited physical area, such as at home, school, a single
Examples LAN :
connected together located at different sites within a large physical area such as a city.
MAN can be best connected using fiber optics. Sometimes, a MAN can be a
Examples MAN :
Wide Area Network (WAN)
have always maintained their business online by connecting all computers of their
A device called a router is needed to connect the MANs and LANs all over a large
physical area.
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet
Protocol Suite. Creates a reliable connection between two computers. TCP establishes a
communications session between two computers connected via the Internet. During this
Notes:
NETWORK INTERFACE CARD (NIC)
1. A network card is an adapter card or PC card.
INTERNAL MODEM
An internal modem only works in stand-alone computers. It is built into the
computer.
Function of Modem
converts the digital signals from a computer to
an analogue signals that can be transmitted along
an ordinary phone line
EXTERNAL MODEM
allows computers to connect to the Internet
An external modem is separated from the
through a telephone line
computer and is also mobile.
converts information send into sounds (the
MOdulator part) which a modem on the other end
of the phone line can translate back into
information (the DEModulator part).
HUB/SWITCH
Hub or switch is a common connection point for devices in a network. Hubs are
commonly used to connect segments of a LAN hub or switch
ROUTER
A router is a communications device that connects multiple computers or other routers
together and transmits data to the correct destination.
Each of the five elements mentioned has various standard file formats. file format is a
particular way to store information in a computer. The formats will allow you to make
decisions of the type of text, graphic, audio, video and animation to use when developing
your own multimedia program.
File
Element Full Name
Format
Text .doc Microsoft Word Document
.txt Text File
.rtf Rich Text File
Graphic .jpg Joint Photographic Expert Group
.gif Graphics Interchange Format
.tiff Tagged Image File Format
.bmp Bitmap
.png Portable Network Graphics
.psd Kodak Photoshop Document
Video .avi Audio Video Interleaved
.mov Apple Quicktime Movie
.mpeg Moving Picture Experts Group
.wmv Window Media Video
.mp4 MPEG-4 Part 14
Audio .wav Wave form (Microsoft)
.midi Musical Instrument Digital Interface
.aiff Audio Interchange File Format
.au Audio (Sun Microsystem)
.wma Windows Media Audio
.mp3 Moving Picture Experts Group-1 Audio Layer 3
Animation .swf Macromedia Flash
.gif Gif Animation
.swi Swish Animation
Multimedia .au7 Macromedia Authorware 7
Application .fla Macromedia Flash 8
(Authoring .tbk Sumtotal Toolbook Assistant
Tools)
Web Pages .asp Active Server Page
.php PHP Hypertext Preprocessor
.htm Hypertext Markup Language
.jsp Java Server Page
PHASES IN MULTIMEDIA PRODUCTION
Editing Software is a software that can be used to produce multimedia elements. The
examples of editing software that available for producing a multimedia program are:
KWord
Graphic Graphic Editor - To manipulate Adobe Photoshop CS3
Corel Draw 12
Ulead PhotoImpact 12
Audio Audio Editor - To edit audio such as Sound Forge 7.0
WavPad
Adobe Audition
Video Video Editor – To edit video Pinnacle Studio
Adobe Premier
Sony Vegas
Swish
3D Studio Max
Maya
Lightwave 3D
Note:
Constants
Constant is a data container that stores information. The value will never change (remains
Declare is the official term used in programming to announce to the program the
Variable is a data container that stores information. The value inside may change at any
Constants Variables
Characteristics Value is not changeable during Value can be changed anytime
program execution.
There are three types of errors uncovered during this phase: syntax
errors, logic errors and run-time errors.
SYNTAX ERROR
When the code violates the syntax of the programming language, a
syntax
error occurs.
They either show up as you type the program code, or if you have
turned off the automatic syntax error check, the syntax errors show up
when you try to run or compile the program.