Report on Computing in Enterprises – A Mini Research of School of ICT

Report on Computing in Enterprises – A Mini Research of School of ICT, Sultan Saiful Rijal Campus

Name : Nazura Binti Awang Asnan
Group Code : ICT02/H/ITN/05
Programme : HNTEC in Information Technology
Module Tittle : Computing in Enterprises
Assessor Name : Hjh Rahmah binti Abdullah
?
TABLE OF CONTENTS
Introduction 3
School of ICT Sultan Saiful Rijal Campus 4
Office furniture for the staff and classrooms 13
Suggestions for Ergonomic Office Furniture 18
Sharing documents online 20
Cyber Threats in Sultan Saiful Rijal Campus 22
Conclusion 23
References 24
Appendices 25

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

?
INTRODUCTION

In this report, we were given a scenario where me and my group are ICT researchers conducting a mini research for IBTE HQ. We will conduct a mini research regarding our School of ICT Sultan Saiful Rijal campus. There are 3 tasks given. Task 1 is to collect information about School of ICT in our campus, task 2 is the group meeting and lastly, task 3 is to write a report of our School of ICT Sultan Rijal Campus.
Student will be divided into group to collect information and necessary evidences needed in writing a report of our School of ICT in our campus. We will do research about our School of ICT Sultan Saiful Rijal Campus, the office furniture used in the school and make recommendations and Cyber Threats Issues and their counter measures.
Each group will schedule themselves into 3 meetings. First meeting is to plan out our actions before our mini research is conducted. Second meeting is to discuss about the findings of the mini research and lastly, the third meeting is to check, update and edit the report before finally submitting it.
Ergonomic can roughly be defined as the study of people in their working environment. More specifically, an ergonomist designs or modifies the work to fit the worker, not the other way around. The goal is to eliminate discomfort and risk of injury due to work. In other words, the employee is our first priority in analysing a workstation.
Cyber threat is a malignant and destructive act that tries to access a computer network through a data communication pathway, without gaining the right authorization or consent from the owners. With the advent of personal computers, cyber threats also came into the limelight. Cyber threats are often executed by hackers, trying to achieve unauthorized access to an individual personal information for either financial gain or to perform troublesome and mischievous acts; the hope to access private files by infiltrating and stealing data.?
SCHOOL OF ICT SULTAN SAIFUL RIJAL CAMPUS

School of ICT Sultan Saiful Rijal Campus was located at Simpang 125, Jalan Muara, Bandar Seri Begawan. In the School of ICT Sultan Saiful Rijal campus, Hassen Mohamed Zahir Hussain is the head school of ICT. The program leader of Sultan Saiful Rijal campus is Huraizul Abu Bakar. The desktop in every lab is Lenovo and the staff’s personal computer is HP. The school have two course that is Information Technology(IT) and Information Library Studies(ILS).
There are 24 staffs in School of ICT.
Name
Hassan Mohamed Zahir Hussain (Head of School)
Huraizul bin Hj Abu Bakar (Program Leader)
Hjh Nor Nasriah Hj Nor Shah (Assistant Program Leader)
Hjh Rahmah binti Abdullah (Assistant Program Leader)
Khairul Anuar Ismail (Asssistant Program Leader)
Thien Yuh Perng
Dk Izzati binti Pg Hj Ahmad
Insyirah binti Abdullah Ling
Hjh Azriana binti Hj Zahari
Zuriani binti Chuchu
Nur Amanina Auni binti Abdullah
Hj Mohammad Alimin bin Hj Matyassin
Norliha binti Mohd Din
Vivi Ruzylinanissmah Hj Mahmud
Hjh Yusnitasari binti Hj Mohammad Ali
Siti Nursyafiah binti Hanapi
Mohammad Azwan bin Manudin
Mariani binti Hj Nayan
Nurul Hikmah binti Haji Mohammad
Hjh Salwana binti Hj Abas
Ratnasari binti Suhaili
Pg Md Waliyuddin Shah bin Pg Hj Yusof

Under the Information Technology course, there are 2 course that are Higher National Technical education certificate(HNTec) Information Technology(IT) and National Technical education certificate(NTec) Information Technology(IT). Ak Khairul Anwar bin Pg Ismail handle the NTec IT as in Level 3 Diploma. The duration for this couse is 1 year which 9 months is institution based training and 3 months is industrial attachment. The modules in this course are:
• Islamic Religious Knowledge
• Melayu Islam Beraja
• Life Skills for the Workplace
• Health, Safety and Environment
• PC Support Essentials
• Office Applications
• Basic Database
• Multimedia Essentials
• Basic Web Design
• PC Hardware and Networking
• Industrial attachment
There are 2 group under this course. The group name are ICT02/N/ITN/05 with 25 students handle by Ak Khairul Anuar bin Pg Ismail and ICT02/N/ITN/06 with 25 students handle by Haji Mohammad Alimin bin Haji Matyassin.

NTEC IN INFORMATION TECHNOLOGY
1 YEAR (INCLUSIVE ATTACHEMNT)
PROGRAMME STRUCTURE
Module Code Module Title Status Semester Credit Value Module Passing Mark
I/N/HC01 Islamic Religious Knowledge for ISQ, NTec ; HNTec Compulsory 2 5 50
I/N/HC01 Melayu Islam Beraja for ISQ, NTec ; HNTec Compulsory 2 5 50
NCG01.6 Life Skills for The Workplace NTec Core-Generic 1 10 50
I/N/HCG02 Life Skills for The Personal Development Core-Generic 1 ; 2 – 50
N/H/HACG03.1 Healthy, Safety and Environment Core-Generic 1 10 70
NITN01 PC Support Essentials Core-Specialised 1 10 50
NITN02 Office Applications Core-Specialised 1 10 50
NITN03 Basic Database Core-Specialised 1 5 50
NITN04 Multimedia Essentials Core-Specialised 1 5 50
NITN05 Basic Web Design Core-Specialised 2 5 50
NITN06 PC Hardware and Networking Core-Specialised 2 10 50
Industrial Attachment **- Core-Specialised 2 –
Total 75

Hjh Noor Nasriah binti Hj Nor Shah handle the HNTec IT as in Level 4 Diploma. The duration for this course is 2 years which 1 year 9 months is institution based training and 3 months is industrial attachment. It was higher than NTec IT. There are one group called progress class where only 25 students from NTec IT can go up to HNTec IT after they finished their course. The modules are:
• Islamic Religious Knowledge
• Melayu Islam Beraja
• Life Skills for Workplace
• Health, Safety and Environment
• Computer Systems
• Office Application
• Programming Essentials
• Creative Digital Media
• Database Systems
• PC Hardware and Servicing
• Computing in Enterprises
• Intermediate Web Design
• Internet Programming
• Networking Essentials
• Project
• Industrial Attachment
There are 5 group under the HNTec IT. The group name are ICT02/H/ITN/01 with 25 students handle by Thien Yuh Perng, ICT02/H/ITN/02 with 25 students handle by Hjh Azriana binit Hj Zahari, ICT02/H/ITN/05 with 25 students handle by Haji Muhd Aizuddin bin Haji Zawawi, ICT02/H/ITN/06 with 23 students handle by Insyirah bte Abdullah Ling and lastly ICT02/H/ITN/07 with 25 students handle by Suzlinawati binti Haji Ibrahim.

HNTEC IN INFORMATION TECHNOLOGY
2 YEARS (INCLUSIVE ATTACHMENT)
PROGRAMME STRUCTURE
Module Code Module Title Status Semester Credit Value Module Passing Mark
I/N/HC01 Islamic Religious knowledge for ISQ/NTec/HNTec Compulsory 1 5 50
I/N/HC01 Melayu Islam Beraja for ISQ/NTec/HNTec Compulsory 1 5 50
HCG01.5 Life Skills for Workplace for HNTec Core-Generic 1 10 50
I/N/HCG02 Life Skills for Personal Development Core-Generic 1, 2, 3 and 4 – 50
N/H/HACG03.1 Health, Safety and Environment Core-Generic 1 10 70
HITN01 Computer Systems Core-Specialised 1 10 50
HITN02 Office Applications for Information Technology Core-Specialised 2 15 50
HITN03 Programming Essentials Core-Specialised 2 15 50
HITN04 Creative Digital Media Core-Specialised 2 10 50
HITN05 Database Systems Core-Specialsed 2 10 50
HITN06 PC Hardware and Servicing Core-Specialised 2 10 50
HITN07 Computing in Enterprises Core-Specialised 3 5 50
HITN08 Intermediate Web Design Core-Specialised 3 5 50
HITN09 Internet Programming Core-Specialised 3 10 50
HITN10 Networking Essentials Core-Specialised 3 10 50
HITN11 Project Core-Specialised 4 15 50
**Industrial Attachment Core-Specialised 4 –
Total 140

Under the Information Library Studies, there are only one course that is Higher National Technical education certificate(HNTec) Information Library Studies(ILS). Hjh Rahmah binti Abdullah handle the HNTec ILS as in Level 4 Diploma. The duration for this course is 2 years which 1 year 9 months is institution based training and 3 months is industrial attachment. The modules are:
• Islamic Religious Knowledge
• Melayu Islam Beraja
• Life Skills for Workplace
• Health, Safety and Environment
• Introduction to Library Management
• Organization of Knowledge
• Acquisition and Serials
• Customer Service
• Automated Library System
• Information Literacy
• Reference and Information Services
• Basic Conservation and Preservation
• Basic Web Design for Library
• Project
• Industrial Attachment
There are 2 groups under this course that are ICT02/H/ILS/01 with 25 students handle by Nor Liha binti Mohd Din and ICT02/H/ILS/02 with 25 students handle by Nur Amanina Auni binti Abdullah.

HNTEC IN INFORMATION ; LIBRARY STUDIES
2 YEARS (INCLUSIVE ATTACHMENT)
PROGRAMME STRUCTURE
Module Code Module Title Status Semester Credit Value Module Passing Mark
I/N/HC01 Islamic Religious Knowledge for ISQ/NTec/HNTec Compulsory 1 5 50
I/N/HC02ed2 Melayu Islam Beraja for ISQ/NTec/HNTec Compulsory 1 5 50
HCG01.13 Life Skills for Workplace for HNTec Core-Generic 1 10 50
I/N/HCG.02 Life Skills for Workplace for HNTec Core-Generic 1, 2, 3 and 4 – 50
HCG03.12 Health, Safety and Environment Core-Generic 1 10 70
HLBS01 Introduction to Library Management Core-Specialised 1 10 50
HLBS02 Organisation of Knowledge Core-Specialised 2 15 50
HLBS03 Acquisition and Serials Core-Specialised 2 10 50
HLBS04 Customer Service Core-Specialised 2 15 50
HLBS05 Automated Library System Core-Specialised 3 10 50
HLBS06 Information in Literacy Core-Specialised 3 5 50
HLBS07 Reference and Information Services Core-Specialised 3 15 50
HLBS08 Basic Conversation and Preservation Core-Specialised 3 10 50
HLBS09 Basic Web Design for Library Core-Specialised 4 5 50
HLBS10 Project Core-Specialised 4 15 50
**Industrial Attchment Core-Specialised 4 –
Total 140

?
ORGANIZATION CHART OF SCHOOL OF ICT, IBTE

?
ORGANIZATION CHART OF SCHOOL OF ICT GROUP LEADERS?
OFFICE FURNITURE FOR THE STAFF AND CLASSROOMS

After the research of the existing office furniture for the staff and classrooms, we found out that some of the furniture can cause risk and effect and we are going to make a suggestion to improve the safety of all people.
• Chair

Every classroom has blue chairs. Chair legs tend to bend that cause the student to fall. Its either due to the loose screw at the legs or the chair is not in good condition. The seats cushion has 2 nails inside. The nails are facing up from the bottom. Every student gets poked at their bottom because of the nails that cause the clothes or trousers tear. Our recommendation is to change all the blue chair to plastic chair or chair with cushion but no nails inside it.

Figure 2 Nails in the cushion
• Table

The table in figure 3 shows that the table is covered with cardboard. The cardboard is peeling off the table. Some of the cardboard are taped to keep it still. Taping it would not solve the case. Some student clothes might get stuck there or someone might get a scar from hitting the corner of the cardboard. Our recommendation is to replace the table with the new one or use a table with no cardboard.

• Keyboard drawer

Figure 4 Keyboard drawer
The figure shows that the keyboard drawer is broken. All the keyboards are mostly placed on the table but not on the keyboard drawer. For the comfort of the people, it is better to renew the drawer or remove the drawer if it is not used.

• Shelves

Figure 5 Staffroom shelf
There are not many shelves around the staff rooms. Mostly the projectors, laptops and camera were put in the shelves. The papers are not placed in the shelves that cause the paper to be placed on the table and eat space. Our recommendation is to add another shelves to put enough papers to save space around the class.

Figure 6 papers at the table

• Computer workstation

The chair is not suitable for computer workstation as it was considering as poor posture or a non-ergonomically designed workplace. It will cause Repetitive Strain Injury(RSI). Repetitive strain injury is a general term used to describe the felt in muscles, nerves and tendons caused by repetitive movement and overuse. It’s also known as work-related upper limb disorder, or non-specific upper limb pain.
Symptoms of RSI are:
• Sensation loss
• Strength loss
• Tingling sensation in the affected area
• Throbbing sensation in the affected area
• Muscle or joint pain in the affected area
• Muscle or joint tenderness

SUGGESTIONS FOR ERGONOMIC OFFICE FURNITURE

The ideal computer workstation is:
• Computer monitor
o Same height level with eyes
o Distance from face approximately arm length
o Document holder available

• Keyboard and Mouse
o Avoid hitting keys too hard
o Wrist rest comfortable
o Learn keyboard shortcuts to save movements and additional typing
o Do not grip tightly
o Distance from body appropriate

• Desk and Work surface
o Neat space
o Acceptable height, sufficient leg room
o Adequate storage, drawers and shelving

• Telephone
o Available hands free
o Volume adjustment available

• Chair
o No arm rests
o Available height and back adjustment
o Footrest for short people

• Electrical fittings
o Cables secure and in good condition

?
SHARING DOCUMENTS ONLINE

In this sharing documents online, I use google drive to send the files to send to others.

This is the homepage of google drive.

After I clicked the round blue plus symbol, it shows what you want to upload.

I chose picture and upload it to google drive.

Before I send, I turned on the link sharing to allow the receiver to view the picture.

Lastly, I send the picture through email.?

CYBER THREATS IN SULTAN SAIFUL RIJAL CAMPUS

After the research, we have found some problems that may lead to cyber threat. The problems are:
1. Some desktop does not have anti-virus installed
Each desktop must have anti-virus installed as it will protect from getting worms, Trojan viruses, horses and other unwanted invaders that can create problem in the desktop. It performs malicious acts such as accessing to personal data and deleting files. To prevent form getting viruses, install any antivirus software to protect your desktop from losing information.

2. Desktop located in library at Student Resource Centre have virus
The USB flash drive does not show files and it was empty inside when there are data exists after it get inserted to the desktop. It shows that the USB flash drive are getting attacked by the virus. To recover the USB flash drive back, install the SmadAv antivirus which it detects a virus and protect it to avoid virus infection.

3. Firewall installed double security (school and government security) in the desktop
A firewall is a system designed to prevent unauthorized access to or from a private network. It was installed so the unauthorized users cannot access to private network when connected to the internet.

4. User identification
User identification is use so not every people can access or can use the desktop in school. There is desktop that only staff could access. Even then, there are people who tried to access the user identification. The desktop for students at school can access just by fill in the username. To prevent from people stealing or checking your work, it is better to not put it at the desktop. Save it in your USB flash drive.

CONCLUSION

In conclusion, we get to know more information about our school, improving our skills and understanding about organisational chart. We also learned about the ergonomic for our health and safety. We get to identify the cyber threat happening around our school. As it was for every people safety personal information from getting hacked or access, we state the counter measure to prevent it from happening.
?
REFERENCES

Andiinteriors.com. (2018). online Available at: http://www.andiinteriors.com/wp-content/uploads/elegant-computer-desk-posture-erogonomic-comfort-microsoft-accessories.jpg Accessed 1 Sep. 2018.
Environment, Health and Safety. (2018). Ergonomics – Environment, Health and Safety. online Available at: https://ehs.unc.edu/workplace-safety/ergonomics/ Accessed 2 Sep. 2018.
Kb.iu.edu. (2018). What is a firewall?. online Available at: https://kb.iu.edu/d/aoru Accessed 2 Sep. 2018.
nhs.uk. (2018). Repetitive strain injury (RSI). online Available at: https://www.nhs.uk/conditions/repetitive-strain-injury-rsi/ Accessed 1 Sep. 2018.
Review, C. (2018). What is Cyber Threats – Definition and Explained. online Whatis.ciowhitepapersreview.com. Available at: https://whatis.ciowhitepapersreview.com/definition/cyber-threats/ Accessed 2 Sep. 2018.

?
APPENDICES

MEMO

To : Nazura Binti Awang Asnan
Nur Afnizan Nazurah Binti Anizam

To : From : Abdul Qawi Bin Abd Ghani
Date : 20 August 2018

Subject: Computing in Enterprise Meeting

Notice is hereby given that there will be a meeting. Details are set out below:

Date: 21 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Saiful Rijal Campus, School of ICT, Block A Lab 3

Agenda of meeting are as follows:
– Plan out before mini research
– Assigning each member’s tasks
– Research on School of ICT, Sultan Saiful Rijal Campus
– Research on School of ICT’s Office furniture and its recommendation
– Research on Cyber Threat issues and its counter measure
– Next Meeting

Attendance is compulsory.
Thank you

______________________
(Abdul Qawi Bin Abd Ghani)
Leader?
Minutes of Meeting of Group 4 of Computing in Enterprise

No: 1, Year: 2018
Date: 21 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Sultan Saiful Rijal Campus, School of ICT, Block A Lab 3

Present
Nazura Binti Awang Asnan ______________

Nur Afnizan Nazurah Binti Anizam ______________

Abdul Qawi Bin Abd Ghani ______________

1.Planning out
The meeting started at 7:45am and each member have contributed ideas on what we can apply on all the tasks given for the task 1, task 2 and task 3.

2.Tasks for members
As a group, we have equally decided to do all the tasks separately by gathering the information and compiled the researched source on the next meeting.

3. Meeting
The meeting was adjourned at 9:45am. The next meeting will start on 22 August 2018.

Prepared By, Approved By,

______________________ ______________________
(Nazura Binti Awang Asnan) (Abdul Qawi Bin Abd Ghani)
Secretary Leader

21 August 2018 21 August 2018?
MEMO

To : Nazura Binti Awang Asnan
Nur Afnizan Nazurah Binti Anizam

From : Abdul Qawi Bin Abd Ghani
Date : 22 August 2018

Subject: Computing in Enterprise Meeting

Notice is hereby given that there will be a meeting. Details are set out below:

Date: 23 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Saiful Rijal Campus, School of ICT, Block A Lab 2

Agenda of meeting are as follows:
– Discuss about the findings of the research given by Qawi
– Discuss about the findings of the research given by Zura
– Discuss about the findings of the research given by Afni
– Next and last Meeting

Attendance is compulsory.
Thank you

______________________
(Abdul Qawi Bin Abd Ghani)
Leader?
Minutes of Meeting of Group 4 of Computing in Enterprise

No: 2, Year: 2018
Date: 23 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Sultan Saiful Rijal Campus, School of ICT, Block A Lab 3

Present
Nazura Binti Awang Asnan ______________

Nur Afnizan Nazurah Binti Anizam ______________

Abdul Qawi Bin Abd Ghani ______________

1.Research
The meeting started at 8:45am, each member has gathered all the information needed, and as we discussed, we realized most of our findings are similar. Therefore, decided to compiled them together and selected the best.

2.Meeting
The meeting was adjourned at 9:49am. The next meeting will start on 25 August 2018.

Prepared By, Approved By,

______________________ ______________________
(Nazura Binti Awang Asnan) (Abdul Qawi Bin Abd Ghani
Secretary Leader

23 August 2018 23 August 2018

MEMO

To : Nazura Binti Awang Asnan
Nur Afnizan Nazurah Binti Anizam

From : Abdul Qawi Bin Abd Ghani
Date : 24 August 2018

Subject: Computing in Enterprise Meeting

Notice is hereby given that there will be a meeting. Details are set out below:

Date: 25 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Saiful Rijal Campus, School of ICT, Block A Lab 2

Agenda of meeting are as follows:
– Finalize Assignment

Attendance is compulsory.
Thank you

______________________
(Abdul Qawi Bin Abd Ghani)
Leader
?
Minutes of Meeting of Group 4 of Computing in Enterprise

No: 3, Year: 2018
Date: 25 August 2018
Time: 7:45 AM – 9:45 AM
Venue: Sultan Saiful Rijal Campus, School of ICT, Block A Lab 3

Present
Nazura Binti Awang Asnan ______________

Nur Afnizan Nazurah Binti Anizam ______________

Abdul Qawi Bin Abd Ghani ______________

1.Finalize report
We finalize the report by checking for any grammatical errors, double checking our sources and also using the plagiarismcheck website to accurately scanned the overall percentage of our work that is compulsory and making sure it is below 40% to avoid deductions for our marks.

2. Meeting
The meeting ended at 9:40am.

Prepared By, Approved By,

(__________________________) (____________________)
Nur Afnizan Nazurah Binti Anizam Abdul Qawi Bin Abd Ghani
Secretary Leader
25 August 2018 25 August 2018

x

Hi!
I'm Dora

Would you like to get a custom essay? How about receiving a customized one?

Check it out
x

Hi!
I'm Barry!

Would you like to get a custom essay? How about receiving a customized one?

Check it out