


How technology help environmet?
•Wireless communications and Web-based information will help reduce the mounds of paper in our lives as well as the environmental impacts from paper and ink manufacturing and use.
•Advanced display systems will imitate paper in their flexibility and portability, and images may be projected directly on the retina of the eye. "This capability, coupled with a cellular phone, could provide everyone from couch potatoes to business travelers with faxes and customized news anywhere," says the report.
•Genetic engineering and plant manipulation will pave the way for crops that use nutrients more efficiently, requiring less fertilizer or water while providing higher yields.
•"Smart" filters will improve water treatment at sewage plants and municipal water supplies by adjusting to unclog themselves. Membranes and other techniques will remove organic compounds, which currently can result in undesired reactions with chlorine.
•"Green" companies will create products -- plastics, paper, beverage containers, and inks, as well as cars and computers -- that will be more biodegradable or recyclable.
•Lighter cars will be built with less steel and more lightweight aluminum, magnesium, titanium, and composites. A family sedan will be able to get at least 80 miles per gallon of gas, generate less pollution, and use less gas.
The lab's forecast is the first of a series of annual updates on environmental science and technology, and where they are headed in the 21st century.
Sunday, October 18, 2009
Journal 10:Technology & Environment
Posted by Nur Liyana Rusli at 12:47 PM 0 comments
Journal 9:E-Learning Among Kids


The concept of alifelong learning is aims to enable people to learn autonomously throughout their whole life. In this way the concept meets the requirements of the knowledge-based society, in which the resource of knowledge is a central precondition for performance and competitiveness.
eLearning is an important instrument for the support of learning processes, in particular allowing for an individualisation of the learning content and flexibility with regard to the times and locations of learning. As a result eLearning is an appropriate tool, especially in the context of lifelong learning, to fulfil target group-specific characteristics and requirements according to the phase of life and learning situation.
Children as target group
The first educational goal for children in their early phase of life considered to be the development of competencies. This comprises a combination of personality development, learning skills, the ability to acquire and to apply knowledge, linguistic, social and motor skills, as well as media skills. Informal learning is thus considered to be the most important type of learning with respect to scope and quality. As it is not only the informal background, but rather also the influence of educational institutions and peer groups which are crucial for learning success in the early learning phase. In addition, there is a nedd to guide them with counselling and preparation.
Media as a medium to attract kids
Consideration should be given to the fact that educational influences and measures are effective with children as a target group in addition to their own child-related preferences. For children the computer is an appliance which is predestined for informal learning, as it is preferably used for playing games. In order to understand informal learning with media, it is important that it also portrays itself as experiential learning, implicit learning, everyday learning, self-directed learning and competence development learning.
Posted by Nur Liyana Rusli at 12:17 PM 0 comments
Journal 8:New technology
ASIMO, standing for Advanced Step in Innovative Mobility, is Honda's take on robots. He/she/it is a step on the way to designing a robot capable of living, interacting and working with people. ASIMO has the appearance of a child in a space suit, his smaller size, about 120 cm, allows him to interact with people seated at a table and gives him a more likable and less 'intimidating' appearance. After all who wants to be served coffee by a machine that looks like it could snap you in two. One of Honda's predeccessors to ASIMO was 6'2" and 386 lbs. ASIMO has recently been given the ability to run, something very difficult for robots to do as the computations required to maintain balance are far greater then those required to walk where one foot is always in contact with the ground. Honda's research into humanoid robots began in 1986, key elements to the development of this robot was the research done regarding intelligence and maneuverability. The first ASIMO robot prototype was unveiled in 2000 and since then many upgrades and improvements have been made.
Posted by Nur Liyana Rusli at 11:45 AM 0 comments
Journal 7:Latest gadget



Mimo Mini USB monitor
It is powered entirely via USB, no external AC adaptor or video card needed. This miniature display marvel also runs in landscape or portrait mode and also comes in a touchscreen version.
GPS
Garmin nĂ¼vi line,a widescreen models with built-in Bluetooth and FM. The Garmin nuvi 760 has a 4.3" touch screen color backlit display, Bluetooth for hands-free calling and traffic broadcasts via "silent" FM data channel for intelligent routing based on traffic conditions.
Red Special Edition Nintendo Dsi
Amazingly consoles with color appeared, and all was good in appearances. Nintendo DSi had its nifty dual cameras and coming DSi Facebook integration. Special edition of red colours Nintendo dsi are really eye-catchy to their fan.
http://www.youtube.com/watch?v=ELUkNX1NBmI
Posted by Nur Liyana Rusli at 11:16 AM 0 comments
Journal 6:Learning about virus, trojan and worm
VIRUS
A computer virus is a computer program that can copy itself and infect a computer. A true virus can only spread from one computer to another.The virus can also be carried by removable disk medium such as floppy disk and USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system.
Type of virus: Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks.
Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus
Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, and .EXE. The virus becomes active in memory, making copies of it and infecting files on disk. Examples: Sunday, Cascade
Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. Examples: Invader, Flip, and Tequila
TROJAN
Trojan is a term used to describe malware that appears to the user, to perform a desirable function and had unauthorized access to the user's computer system. It does not self-replicating but require interaction with a hacker to fulfill their purpose.
Types of Trojan:
Remote Access Trojans
Most of these Trojans are often a combination of the other variations described below. The idea of these Trojans is to give the attacker a total access to someone's machine and therefore access to files.
Keyloggers
The only thing they do is logging the keystrokes of the victim and then letting the attacker search for passwords or other sensitive data in the log file. Most of them come with two functions like online and offline.
Destructive
The only function of these Trojans is to destroy and delete files. Trojan can be activated by the attacker or sometimes works like a logic bomb and starts on a specific day and at specific hour.
WORMS
Computer worm is a program which copies itself across a network. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
Types of worms:
Email Worms
Spread through infected email messages which may contain an attachment or a link of an infected website.
Instant Messaging Worms
These worms spread via instant messaging applications by sending links of infected websites to the entire contact list.
Internet Worms
Internet worm tries to gain access to any vulnerable machine either by scanning the Internet and/or using the local operating system.
Posted by Nur Liyana Rusli at 10:39 AM 0 comments
Journal 5:Social network
Social networking has encouraged new ways to communicate and share information. Social networking websites are being used regularly by millions of people. Many people involved with social network because there is no need to pay for the service.
Apart from all the advantages, there is also drawback of the social network service which is some user hide their identity and pretend to be other person. Other than that, they are addicted with the social network friends and seems to forgetting the real world. Thus, the prefer to sit in front of the computer and drown into the virtual world.
Popular social network service that are widely used by people in Malaysia are face book, my space, friendster and tagged.
Posted by Nur Liyana Rusli at 8:46 AM 0 comments
Journal 4:History of Emoticon
Here is a little history lesson on how Smileys and Emoticons were created.
Posted by Nur Liyana Rusli at 7:25 AM 0 comments


