Friday 1 June 2012

:: The Best Product Ever ::

Hello Readers !
We meet again todays !

Are you a gadget lovers?

check out this !




The GALAXY Tan 7.0 Plus offers the best connectivity options available, from lighting fast HSPA+21Mps to Wi-Fi Channel Bonding. Wi-Fi channel bonding technology will let you receive data-rates approximately twice as fast as existing Wi-Fi. Here are the specification or benefits of Samsung Galaxy Tab 7.0 Plus :



7’’ Tablet Reloaded


Specification :
Size and weight
·         Size : 193.65 x 122.37 x 9.96mm
·         Weight : 345g

Memory
·         1GB (RAM), 16/32 GB (ROM) + microSD (up to 32GB)

Processor
·         1.2GHz dual-core processor

Battery
·         Built in 4,000mAh battery

Location
·         A-GPS
·         Location-based service with Google Maps (turn by turn navigation)

Samsung touchwiz UX
·         Live panel
·         Mini Apps
·         Clipboard

Display
·         7.0’’ 1024 x 600 WSVGA PLS
·         4 way rotation

Cellular and wireless
·        HSPA +21 900/1900/2100
·        EDGE/GPRS 850/900/1800/1900
·        Wi-Fi 802.11 a/b/g/n, Dual-band support(2.4GHz, 5GHz)
·        802.11n Wi-Fi Channel Bonding
·        Wi-Fi Direct, Allshare
·         Bluetooth v3.0, USB 2.0 Host

Video
·         Full HD video playback (1080p) @ 30fps
·         Video codec : MPEG4, H.263, H.264, WMV, DivX

Audio
·         Formats : MP3, OGG, AAC, WMA, WAV, FLAC
  
Camera
·         Back camera : HD(720p) Video recording, 3MP auto-focus camera with LED flash
·         Front camera : 2MP camera
·         Instant SNS sharing : Gmail™, Messaging, Picasa

Photo & video
·         Photo Editor
·         Video Maker*
·         Available later as Maintenance Release

sounds good right??
so what are you waiting for?
buy it now and enjoy it guys! 


:: Article Review - Accounting Information Systems Threats ::

Threats to Accounting Information Systems


Threats to accounting information systems can come from a variety of sources. If these threats are ignored, they can destroy the relevance and reliability of financial information, leading to poor decisions by various stakeholders.

At the point where data is collected, it is very important to establish security controls that ensure that transaction or event data are valid, complete, and free from material errors. Hacker activities that can occur at the data collection level include pretending to be an authorized user (masquerading) and tapping into telecommunications lines (piggybacking).
Threats to accounting information systems can also occur during the data processing phase. This can include creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly all represent threats.

Threats to database management might also include unauthorized access that allows altering, deleting, corrupting, destroying, or stealing data. The failure to maintain backup files or other retrieval techniques represents a potentially devastating loss of data. Threats to the information generation and reporting phase must also be considered. For example, the theft, misdirection, or misuse of computer output could damage the competitiveness or reputation of the company.

Advances in information technology and increased use of the Internet require that management, accountants, auditors, and professors become more knowledgeable and conversant in the design, operation, and control of accounting information systems.

In my opinion…..

A threat to an information resource is any danger to which a system may be exposed. The exposure of an information resources is the harm, loss or damage that can result if a threat compromise that resources. In order to make sure that the information system are free from any threat, it will depend on how a person use it or protect it. If not, it will be very dangerous to the users itself. In other words, they must take a preventive action before the threat occur.

It is goods for the user to have security control that ensure the transaction are safe from any threat. Besides that, the user can ensure that any processing data are free from harm and make a backup file for each of the information. By taking these step, it will help the users to face more serious threat to their information system rather than not take any action and just let it occurs.

credit to;

:: Article Review - What is e-Learning? ::



What is E-learning?
E-learning is to classroom learning as cell phones are to a pay phone at the bus station.
At least it is in some ways. For instance, e-learning allows you to learn anywhere and usually at any time, as long as you have a properly configured computerCell phones allow you to communicate any time and usually anywhere, as long as you have a properly configured phone.
E-learning can be CD-ROM-based, Network-based, Intranet-based or Internet-based. It can include text, video, audio, animation and virtual environments. It can be a very rich learning experience that can even surpass the level of training you might experience in a crowded classroom. It's self-paced, hands-on learning.
The quality of the electronic-based training, as in every form of training, is in its content and its delivery. E-learning can suffer from many of the same pitfalls as classroom training, such as boring slides, monotonous speech, and little opportunity for interaction. The beauty of e-learning, however, is that new software allows the creation of very effective learning environments that can engulf you in the material. We'll use software from Trainersoft as an example to show you how the process works.

Levels of e-learning

E-learning falls into four categories, from the very basic to the very advanced. The categories are:

·         Knowledge databases -- While not necessarily seen as actual training, these databases are the most basic form of e-learning. You've probably seen knowledge databases on software sites offering indexed explanations and guidance for software questions, along with step-by-step instructions for performing specific tasks. These are usually moderately interactive, meaning that you can either type in a key word or phrase to search the database, or make a selection from an alphabetical list.
·         Online support -- Online support is also a form of e-learning and functions in a similar manner to knowledge databases. Online support comes in the form of forums, chat rooms, online bulletin boards, e-mail, or live instant-messaging support. Slightly more interactive than knowledge databases, online support offers the opportunity for more specific questions and answers, as well as more immediate answers.


·         Asynchronous training -- This is e-learning in the more traditional sense of the word. It involves self-paced learning, either CD-ROM-based, Network-based, Intranet-based or Internet-based. It may include access to instructors through online bulletin boards, online discussion groups and e-mail. Or, it may be totally self-contained with links to reference mater
·         Synchronous training -- Synchronous training is done in real-time with a live instructor facilitating the training. Everyone logs in at a set time and can communicate directly with the instructor and with each other. You can raise your cyber hand and even view the cyber whiteboard. It lasts for a set amount of time -- from a single session to several weeks, months or even years. This type of training usually takes place via Internet Web sites, audio- or video-conferencing, Internet telephony, or even two-way live broadcasts to students in a classroom.ials in place of a live instructor.

In my opinion…
E-learning is a good teaching, no matter how it’s done. The features of e-learning that we can see is it give self paced and gives student a chance to speed up or slow down as necessary, allowing students to choose content and tools appropriate to their differing interests, needs, and skill levels, enhances computer and internet skills, more effective for certain learners and save the travel time and associated costs like parking, fuel, vehicle maintenance.
It also can give benefits for the student who learns online like give a convenience and portability to them, have choice and selection, flexibility, higher retention, greater collaboration and global opportunities.


Thursday 31 May 2012

:: 4 Simple Tips To Protect Your Privacy On Facebook ::

bismillahhirahmanirrahim..

dear my readers..

Facebook is a social networking website that was originally designed for college students, but is now open to anyone 13 years of age or older. Facebook users can create and customize their own profiles with photos, video, and information about themselves. Each facebook also has a wall, where friends can post comments and allows each user to set privacy settings, which by default are pretty strict. For example when you added x certain person as a friend, the person will not be able to view your profile. That is why a person that use facebook need to take some action to protect their privacy. Here, there are a few tips that you can use to protect your privacy in facebook.

Watch who is accessing your account.If somebody succeed in hacking your facebook account, then your privacy will have been completely not save. So you need to protecting your account with a strong password will help to reduce the chances of it happening.

Limit the information in your profile. Facebook enables you to create and share a very detailed profile that includes everything from your birthday, address, telephone and cell numbers and etc, where in other word, information that may help somebody steal your identity. The best methods is to enter only information that people will need to be able to find and connect with you and to use the privacy settings to restrict what you share.

Making lists to restrict access. Another way Facebook has previously given users control over who sees your information is the creation of friend lists. You can create lists and restricts access to your page to people on a given list. It can be done by click on the Friends menu at the top of your home page

Watch what your post. Don’t easily share any post or information about others or about yourself in chat rooms or wall in facebook because other people can see it. They can use that privacy information to misuse it and affect your privacy. So, beware about your words while chatting or posting anything in Facebook because it can be seen by others.

P/s: Actually, there are a lot of tips that you can use, but I only list the basic things that you should done first. Please always be ware about your personal information and take a preventive action needed to protect it. Watch out ya!!

Friday 25 May 2012

:: How Technology Affects Us ::

Bismillahhirahmanirrahim...
dear my readers....

As we can see, everyone has seen the moody, a kid with music blasting out his white ear buds, or the girl rapidly texting on her phone. The youth today are constantly immersed in technological advancements that offered nonstop communications and instant gratification, whether through cell phones, gaming system, laptops, or MP3 players. However, are these technological advancements a good thing? In my opinion, technology has negatively influenced the social interactions of today’s youth because it isolates individuals from reality, hinder communication, and reach the immediate satisfaction.


Technology is a negative influence on us because it separates individuals from reality. The iPod is one example, by putting in your ear buds and immersing yourself in music while in public, you are disconnecting yourself from the real world.

Technology also hinders personal communication, which negatively impacts our age group. According to Norman H. Nie and D. Sunshine Hillyguys in their paper, data shows that those who use the Internet frequently spend over 100 minute less time with friend and family than non-internet users. When youth immersed with the technology, they will ignore people that say word to them and focus with their gadget.

Technology will also affect us by perpetuating the mindset of immediate satisfaction. The creation of various portable technological devices has slowly brings the idea of instant gratification. With gadget like PS3, which allow users to play games anywhere, or cell phones that let us keep in touch virtually everywhere and at any time. We grow up learning that whenever we want enjoyment, it will automatically be granted to us.


However, some argue that internet has a positive effect on social interactions because it allows us to form friendship online, can solve many problems that people face, play an important role in the development of many countries and make today life be more better and quicker.


In conclusion, technology can give us a negative and positive impact, it depends on us on how to manage and use it wisely. Society must be able to utilize technology while not allowing it to prevent or delay social interactions, particularly for those who are easily influenced. 

Thursday 24 May 2012

:: Me, Myself & My Life ::

Hello everybody!

You do not know too much about me, I’ll introduce you to it! My name is Nurul Atika Bte Mahat. Which bring the meaning of cahaya, pemurah, bersih, berani and yang murni. This year I was 21, I am in my second semester of Business Administration in Human Resources at Uitm Kampus Bandaraya Melaka. In this memo, I am going to tell you little bit about my background, interests, and my goals.

 I live at Johor since I was small. I was born in a small village called Felda Kemelah. It is located at Segamat, Johor. I spent my first 21 years of life in Segamat. But then I go to hostel to further my studies. My primary school name SKLKTP Kemelah, then my secondary school name Sek. Men. Keb. Dato’. Bentara Dalam then I move to Sek. Men. Teknik Kota Tinggi.

I like hanging out with my friends. We go for window shopping, watch movie, go vacation together and many more activities. By that, I hanging out with my friend, I can releases tension with them. My goals is that I can get  Dean List every semester in my studies and I can get better job to help my family. That’s all that I can share with all my readers, thanks for your attention…

tarraaa ! 
this is me ! hehe

that's all !!