Friday, October 9, 2009

:: ONLINE ACRONYM ::

As we can see...many people nowadays use short form when they chat with their friends either in online world or through SMS...sometimes there are many abbreviations that we cannot understand as they are really advance in to use short form in order to save their time...


What is online acronym?


It is an online database of abbreviations (acronyms) and their meanings. It includes over 750,000 human-edited and verified definitions, many of them related to computers, technology, telecommunications, science, medicine and the military.



While the database is not open content, users can help to expand the database by submitting new definitions, which are subject to editorial control. The name of anyone contributing more than 50 definitions is listed on the website.



Anyway....Thanks to these contributors, the new acronym are actually increase the rate of over 6,000 new definitions each month...



Below are the examples and the list of ONLINE ACRONYMS that we can share together:

A3

Anytime, anywhere, anyplace

AA

As above

AAF

As a matter of fact

AAF

As a friend

AAK

Asleep at keyboard

AAK

Alive and kicking

AAMOF

As a matter of fact

BHL8

Be home late

BIB

Boss is back

BIBO

Beer in, beer out

BIF

Before I forget

CMON

Come on

CU

See you

EOD

End of day

EOD

End of discussion

FYI

For your information

GUD

Good

H8

Hate

ILY

I love you

L8R

Later

LOL

Laugh out loud

LOL

Lots of love

MUSM

Miss you so much

PLZ

Please

RUMOF

Are you male or female?

TYVM

Thank you very much

UW

You're welcome


You may use all the acronyms as you like.....i'm sure these acronyms may helps u a lots....



Sunday, October 4, 2009

:: CYBERLANGUAGE ::

What is cyberlanguage?

- A language of the net...cyberlaguage is a term not yet recorded in traditional dictionary...

Creating Cyberlanguage

-used device to describe new concept
-borrow word from other familiar context to describe new concept
-for example:
Bookmark
Mouse
Crash
Web

The creation never ending process and unpredictable one..new term will introduce as technical evolved..

AMERICAN INFLUENCE

American control of IT and consequently has many influence on cyberlanguage...cyberlanguage use names often hold out promise of success and perfection..

For example: WordPerfect, SuccessMaker (name of software)


THE MALENESS OF CYBERLANGUAGE

Most of cyberlanguage created by male..there must be a chance for them to create violance on sexism term...

Example of term created:

Kill - delete

Abort - cancel

Execute - software


In a nutshell, cyberlanguage can be perceived as providing as serious threat to educational standards...for example short form in essay

:: CYBERSPACE ::


Using the Internet, it is now entirely possible to live an online life (or lives) that are completely separated from one’s real life (RL). All over the world a vast number of people log onto a life that has no relationship to their flesh-and-blood world.


Online friends and those that we meet online may never truly ‘know’ who they are. The idea that the Internet can afford us lives beyond our physical circumstances introduces many fascinating possibilities.


For example...CASE STUDY: MUD

The Star Trek game, TrekMUSE and LambdaMOO, are both computer programs that can be accessed through the Internet.

The games known as MUD, Multi User Domains. MUD is also known as Multi User Dungeon, taken from the story Dungeons and Dragons, the fantasy role-playing game.

MUD is a multi-player computer game that combines elements of role-playing games, hack and slash style computer games and social instant messaging chat rooms. MUD often have a fantasy setting, while many others are set in science fiction-based universe or themed on popular books, movies, animations, history, etc.


In MUD, we can be an aggressive person, using all violence to defeat your enemies. Or we can be a nerdy person, obeying all commands from other persons. MUD provides worlds for anonymous social interaction in which one can play a role as close to or as far away from one’s “real self” as one chooses.


Example others online games that bring us negative impact are:

counter strike may teach us violence


IMPACT OF THE INTERNET


MUD is dramatic examples of how computer mediated communication can serve as a place for the construction and reconstruction of identity.

One problem that arises is that of the differentiation between real life and Internet crimes that are committed.


In MUD, it is completely acceptable to use violence to other persons...BUT can we think
What happens when the players of these programs are children??

It must completely surprise beacuse nowadays..in this new era...many childrens are more advance even more advance than their parents!!!!!

:: NETIQUETTE ::

~ A term given to those who live, work and spend time on the internet.
~ Netizen = net + citizen
~ Definition netiquette : Etiquette guidelines for posting messages to online services.
~ When surfing the Internet, we must follow certain standard to communicate with others

Netiquette guideline


l. DO NOT CAPITALISE EVERYTHING!
-It looks as if you are shouting at people.


2. Think Before Posting
It is important to note, what is posted online today, may come back and haunt the writer tomorrow.


3. Reply Quickly
People will expect to receive a reply within a day


4. Avoid Humour
- Some people might not understand the jokes at all.
- Instead, you can use emoticons:

:) Happy :( Sad :-p Cheeky :-0 Surprised


When you’re working for a company…


To conclude....

There are many guideline for us to communicate with other people in the cyber world...

:: INTERNET SECURITY ::

As we all know, internet make all people around the world exchange information between each other. But at the same time, without realize, they also bring problems. Anyone can access the computer but not everyone has good intention.


Therefore, here are the SECURITY TIPS for all users to be implemented:



Ø Use anti-virus software.
Viruses spread rapidly and can damage or destroy our computer. So, we must install and update anti-virus software regularly. Use the program to scan all the files on the system once a week, deleting the infected ones.

Ø Be wary of e-mail attachments.
A virus can hide in an attachment. Opening it will unleash the virus. Don't open an attachment from anyone we don't know. Even if we do know the sender, an infected attachment may have been surreptitiously sent from an infected machine. The safest thing to do is to scan the attachment with anti-virus software before open it.

Ø Install a firewall on your computer.
A firewall is a software program that blocks unauthorized access to our computer. This is particularly important if you have a broadband connection, such as DSL or a cable modem. Windows XP, Vista and Mac OS X have built-in firewalls, so make sure they're activated if we use those operating systems.

Ø Protect our passwords.
Many online services, such as banking, brokerage and e-mail require the use of passwords. A secure password is the first line of defense against cybersnoops. Use a different password for each account, don't divulge them to anyone and change them periodically.

Ø Back up your data.
Make copies of our files in case they become corrupted, our system fails or our computer is damaged or stolen. Get in the habit of doing this regularly, at least once a week.
What is computer virus?
- Software program designed to interfere with computer or spread themselves to other computer, and causing a problem.
- Some are harmful ..They replicate itself to other program via host


BE AWARE!!!How do I know if a virus has infected my computer?
-Your computer runs slower than normal
-Your computer stops responding or locks up often
-Your computer crashes and restarts every few minutes
-Your computer restarts on its own and then fails to run normally
-Applications on your computer do not work correctly
-Disks or disk drives are inaccessible
-You can not print correctly
-You see unusual error messages
-You see distorted menus and dialog boxes


How to remove virus?
Normally, users only know how to use the computer but we lack of information about virus that may affect the computer. Basically, it is hard to do if we do not know the way to prevent or avoid the virus form spreading…
2 ways to remove viruses:
- use antivirus
- format your computer
FAMOUS VIRUS that we need to know:
MBDF & Melissa
What does anti-virus software do?
Anti-virus software scans files or our computer's memory for certain patterns that may indicate an infection
Famous Worm:
I LOVE YOU WORM
Famous Trojan:
NetBus
What is a spyware?
- Designed to collect personal information and transmit it to advertisers.
- Example of spyware: Bonzi Buddy
Tips !!!How to prevent spyware?
- Install only well-known software.
- Do not click any dialog box unwittingly.
- Use pop-up blocker.
- Treat email attachment with suspicion

Junk mail may refer to:
Ø Advertising mail received through the post

Saturday, October 3, 2009

:: BROWSING ::

In online world, we can use 2 methods to browse information..Those are two methods:


  1. Web directory




  2. Search engine


WEB DIRECTORY is a site that stores lists and list of internet site. We can select the category that best describes the information we would want to view. There are no special skills neededin this site. Example of web directory are






When to use?
- When we have a little idea of what to look for.
- It is intuitive and easy to use.

Drawbacks
- Spend too much time on clicking; we might get lost.
- Sometimes, it is difficult to find what we really want.


SEARCH ENGINE

• A website that has access to an incredible large index of websites right across the network.
• Search engine does not categorize websites, instead it provides a textbox to search.
• Popular search engines: Google, Yahoo, AltaVista, Ask.com



bing.com
When to use?
- when you want to get result directly.
- easier than web directory once you have mastered it.

Drawback
- spend more time thinking about the keyword.

MASTERING SERACH ENGINE

1. Use keyword rather than sentences
2. Use double quote (“ ”) to search for exact word.
3. Search for : implementation and unit testing.
4. Use ‘+’ sign
- search for the chess game between Garry Kasparov and the computer ‘Deep Blue
Type in: chess+kasparov+deep blue
The result would be more precise.

5. Use Boolean Search
- Boolean Search is using the words ‘AND’ and ‘AND NOT’ keywords.
This will save you a lot of time

6. Use alternatives
Try ‘advantage’ as well as ‘benefit’.
- ‘disadvantage’ as well as ‘drawback’.
- ‘overview’ as well as ‘introduction’.
- ‘steps’ as well as ‘guideline’.

7. Maximize the usage of the toolbar of the search engine

Thursday, October 1, 2009

:: PODCAST ::

I'm sure not everyone familiar with the term "PODCAST"...




Podcast created by former MTV VJ Adam Curry. It is a term to describe the technology used to push audio content from websites down to consumer of that content, who typically listen to it on their iPod or other audio player that support mp3 format.

The term "podcast" is a of the words "iPod" and "broadcast". Podcasters' web sites may also offer direct download or streaming of their content.
A podcast is distinguished from other digital media formats by its ability to be syndicated, subscribed to, and downloaded automatically when new content is added, using an aggregator or feed reader capable of reading feed formats such as RSS (Really Simple Syndication)...when you see the icon, that's mean you can download the files from the website.




RSS





icon on Apple




Podcasting is not unlike time-shifted video software and devices like TiVo, which let us watch what we want and when we want by recording and storing video, except that podcasting is used for audio and is currently free of charge.

Podcasting is the process by which we can share the multimedia files with our friends over the internet. These files can be viewed on the portable media devices or on the personal computers. Podcasting thus combines broadcasting and iPod. We can broadcast our audio and video formats on the internet. Our friends can download these files on their portable MP3 or iPod and view them.




What makes podcasting special is that it allows individuals to publish (podcast) radioshows, that interested listeners can subscribe to. Before podcasting we can of course record a radio show and put it on our website or blog like everyone own nowadays, but now people can automatically receive new shows, without having to go to a specific site and download it from there.

Podcasting thus has number of benefits both the for the community within and without. A unique mass media which does not cost a lot to distribute and develop content for. Like all new technologies, the technology will have some teething issues but the force promoting it should be good enough to get the technology roaring with success in the very near future.




About Podcast.com:





Podcast.com is the premier podcast destination that provides access to a growing list of over 60,000 curated and constantly updated podcast feeds representing more than 1 million episodes of audio and video content.



Podcast.com is owned by Treedia Labs:


Treedia Labs is the leading developer of media aggregation and distribution platforms that provide feed management and distribution to any Internet connected device. It is a company from London...
...you may go to the http://www.podcast.com/ for many entertainment and make yourself enjoy to watch and see the video from over the world...



Drwaback of Podcast



Every technology has a darker side. This is true for podcasting as well. The process seems simple and innovative way that supports creativity and sharing of ideas. But as we create our own files, we always ignore the size. Some podcast files can be very large with most of them exceeding 75MB size. Thus the main problem is the bandwidth. Each time we download the file, it uses the bandwidth. We can use only a certain limit of the bandwidth.


Sometimes, when the size is too large, then the download process will become slower than we expected..

:: WEBLOGS ::

Weblogs sound far from my knowlegde...I believe that when the first time we heard weblogs we may assume that we don't know what's that function...in reality, it is actually sames like blog that many people have nowadays...
Know the definiton first...
Websites that are updated often which means always keep with new things. Often the design is of a very simple nature. They are easy to write and require no or little programming skill. Some are personal diaries, others operate as watchers of media, sport, entertainment, and many more. The writer of the weblog is known as Blogger. Other term for weblog is blog.
In 1998 there were less than 50 weblogs, now there are hundreds of thousands. It has become the de facto ‘weapon of choice’ for voices of dissent, that are often unable to make themselves heard in mainstream media. According to Blood:
"Blogging everyday make him become more confident writer. Being met with friendly voices, he may gain more confidence in his view of the world."
Example weblogs can be found through those websites:

:: WEB BROWSER ::

People may be confuse between the term web brower and search engine...Sometimes they may think wrongly without they realize...
As for our information, web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users to easily navigate their browsers to related resources.

Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems. The major web browsers are Windows Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, and Opera. Below are two examples of web browser:




Mozilla Firefox

Internet Explorer


Available web browsers range in features from minimal, text-based user interfaces with bare-bones support for HTML to rich user interfaces supporting a wide variety of file formats and protocols. Browsers which include additional components to support e-mail, Usenet news, and Internet Relay Chat (IRC), are sometimes referred to as "Internet suites" rather than merely "web browsers".

All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window. Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent.

Most web browsers can display a list of web pages that the user has bookmarked so that the user can quickly return to them. Bookmarks are also called "Favorites" in Internet Explorer. In addition, all major web browsers have some form of built-in web feed aggregator. In Mozilla Firefox, web feeds are formatted as "live bookmarks" and behave like a folder of bookmarks corresponding to recent entries in the feed. In Opera, a more traditional feed reader is included which stores and displays the contents of the feed.

Furthermore, most browsers can be extended via plug-ins, downloadable components that provide additional features. Most major web browsers have these user interface elements in common:
- Back and forward buttons to go back to the previous resource and forward again.
- A refresh or reload button to reload the current resource.
- A stop button to cancel loading the resource.
- A home button to return to the user's home page
- An address bar to input the Uniform Resource Identifier (URI) of the desired resource
- A search bar to input terms into a search engine
- A status bar to display progress in loading the resource and also the URI of links when the cursor hovers over them, and page zooming capability.

Do you know that disabilities people also have their own web?? I think many of us did not realize that disabilities people also can search the internet with their own special technology created for them. More explanation as followed:

•People with disabilities, such as hearing, visual or physical; use a wide range of alternative approaches to browse for information.

•People with visual impairment or reading difficulties rely on speech output, Braille displays or screen magnification.

•Available web browsers:

i. Braillesurf – Speech output, Braille output and large text.

ii. Marco Polo - A plug-in from Netscape navigator with speech output and audio icons


•People who cannot use a keyboard rely either on voice recognition, or devices which can be controlled by head, mouth or eye movements.

•Available web browsers:
ConversaWeb – voice-activated browser allowing spoken selection of links using ‘sayicon’.



Wednesday, September 30, 2009

:: THE INTERNET ::


Nowadays we can see many people know how to surf the internet...even the children know how to explore the online world such as through facebook, myspace and friendster..but do they know what is the internet actually?
Formally, the Internet is a global system of interconnected computer networks that use the standardized Internet Protocol Suite to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. Voice over Internet Protocol (VoIP) applications allow person-to-person communication via voice and video.

The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. In addition it supports popular services such as online chat, file transfer and file sharing, gaming, social networking, publishing, video on demand, and teleconferencing and telecommunications.

The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. The period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.

The Internet transmits data from one computer (host) to another. The Internet can be connected in the 3 simple steps:


  • Get a computer

  • Choose Internet Service Provider (ISP)

  • Set up internet software

The Internet allows computer us to remotely access other computers and information stores easily, wherever we may be across the world. We may do this with or without the use of security, authentication and encryption technologies, depending on the requirements. This is encouraging new ways of working from home, collaboration and information sharing in many industries.

Using the Web, it is also easier than ever before for individuals and organizations to publish ideas and information to a potentially large audience. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available. Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition, however. Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result.

:: E-LEARNING ::

What is E-Learning?


E-Learning is a term the use of process and technology to create, distribute, manage and enable learning via electronic network. Lately in most Universities, e-learning is used to define a specific mode to attend a course or programmes of study where the students rarely or never meet face-to-face, nor access on-campus educational facilities, because they study online.

E-Learning also often refers to the first generation of systems supporting the learning process (such as LMS, LCMS), that relied on the idea of replicating the concept of the classroom in an online setting.
E-Learning lessons are generally designed to guide students through information or to help students perform in specific tasks. Information based e-Learning content communicates information to the student. Examples include content that distributes the history or facts related to a service, company, or product. In information-based content, there is no specific skill to be learned. In performance-based content, the lessons build off of a procedural skill in which the student is expected to increase proficiency.