JellyMuffin.com - The place for profile layouts, flash generators, glitter graphics, backgrounds and codes

Friday, July 4, 2008

Local E-commerce site

The mobile88.com provides features articles on cell phone, cellular phone, mobile phone and lifestyle, mobile blog, and telecommunication activities in Malaysia. It also provides a comprehensive directory of mobile phone brand, phone accessories, reload card, and more in Malaysia. Mobile phone resources center provide latest Phone details, news, review on mobile phone and gadgets. Prepaid phone users one-stop shop for reload coupons, internet starter pack and SIM packs. Located in Taman Maluri, Cheras.


This website provides downloadable products such as ringtones, animated graphic,color graphic and mobile games. Besides, it also promote Malaysia Handphone, Mobile phone, Prepaid Reload, Prepaid Topup, Logo and so on. The design of this web site is simple and save space, everything arrange needly so user feel comfortable and convenience when serve net. The background of the website is white in colour so it is seem nicer for users. The website advertise latest movie in the right hand site of it. Search engine is available in the website such as Google.com or Yahoo.com and the font is blue in color. The mobile88 support team encourage users to go for face-to-face transactions of the products.
This website allows users to sell, exchange, search and auction for mobile products such as MP3 player, notebook, digital camera, handphone, PDA, software, camorder and so on. Furthermore, mobile88.com also brief about different kind of magazines such as entertainment, cooking &food, leisure, home garden, computer, fashion/lifestyle, business and more.
In conclusion, mobile88.com can help users search for more electronic tools that they need with a valuable price in a convenience and easy way.

Thursday, July 3, 2008

Mobile Payment System in Malaysia


Mobile payment is a point-of-sale payment made through a mobile device, such as a cellular telephone, a smartphone, or a personal digital assistant (PDA). Using mobile payment, a person with a wireless device could pay for items in a store or settle a restaurant bill without interacting with any staff member. The earliest mobile payment trials were based on the wide area network (WAN) used for cellular phones. That meant, however, that users had to pay cell phone charges to make a payment, and also had to punch in long sequences of digits each time.



Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd. When mobile money comes to online selling, selecting a payment gateway is one of the major obstacles faced by the merchants in Malaysia. Mobile money will encourage more consumers to shop online. This will definitely be a great boon to the e-commerce industry in Malaysia. It will surely encourage more merchants to adopt online selling as an extra sales channel which complement perfectly with their offline sales channel to help them sell more of their goods and services. Realizing these needs of merchants in Malaysia, we are the 1'st shopping cart software provider who has integrated Mobile Money as a payment method in our webShaper e-commerce software.
Mobile payment system have lots of benefits for consumers such as:
-sell to Anyone, Anywhere at Anytime
-no minimum monthly transaction
-no rental fee
-no merchant account required
-super Low transaction fee at 1.5%
-safe and secure, Low signup fees
-get paid super fast
-multi methods to request for payment
-refund and reversal features
By informing consumers about the benefits of mobile payment system, it will increase their confidence to this technology product and more people will use the system for payment purposes.

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Electronic auctions (e-auctions), auctions conducted online, have been in existence for several years on local area networks and were started on the Internet in 1995. Host sites on the Internet serve as brokers, offering services that enable sellers to post their goods for sale and allow buyers to bid on those items. The following are some of anti fraud measures:
  • Escrow services. With an escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. (An example of a provider of online escrow services is tradenable.com.)
  • Feedback Forum. The Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.
  • Verification. One way of confirming the identity and evaluating the condition of an item is through verification.With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes.
  • Appraisal services. Appraisers use a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months.

Wednesday, July 2, 2008

Coporate blogging

Corporate blogging is another communications and marketing channel. However, unlike a press release, advertisement in a magazine or a listing in the Yellow Pages, corporate blogs are two-way communications.If your organisation is not blogging, you’re losing out on major benefits that corporate blogging can bring.

The benefits of corporate blogging are:
1.Build rapport with customers- which is give customers a channel to interact and get to know your brand and organisation in a format that they’re familiar and comfortable with.

2.Free feedback and suggestions from key constituents-gives you insights to what people are saying about your products, your brand, your competitors, your marketing from the comfort of your office chair.

3.Increased website traffic from higher search engine rankings-Search engines favour websites with fresh content and ranks your blog higher in search results, which in turn results in a greater number of referrals from search engines to your website and blog.

There are some example of corporate blogging:

1.Jonathan's blog-The blog of Jonathan Schwartz, CEO of Sun Microsystems. Although John is the CEO of a USD$15 billion company, he blogs just like a regular guy.



2.The official google blog.



3.Blue flavor blog.Blue Flavor is another successful small business that effectively employs a thought leadership strategy in their blog.
http://blueflavor.com/blog/

4.Kit Chan studio blog-A good example of a corporate blog from a Malaysian company.
http://www.kidchanstudio.com/blog/?page_id=102

5.Exabytes Blog-Another Malaysian blog, the Exabytes Blog does a good job of humanising a ‘virtual’ company and notifying readers of special offers.
http://blog.exabytes.com.my/

Besides that corporate also have their disadvantages such as:
1.The workers maybe warned or fired because of wrote something in the blog.

2.Blogs make many organization look like disorganization,with multiple tones and opinions.

3.There will be a risk that ill-judged comment could be seized upon the media or disgruntled investors.



E-Government in Malaysia

E-government is the use of information technology in general, and e-commerce in particular, to provide citizens and organization with more convenient access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector. The implementation of e-government was initiated by the introduction of the Multimedia Super Corridor (MSC) in 1996. In 18 April 2008, Deputy Prime Minister Datuk Seri Najib Razak launched the online renewal service, provided by MY E.G. Services Bhd.
http://thestar.com.my/news/story.asp?file=/2008/4/18/nation/20990393&sec=nation

Common problems encountered by consumers

  1. Lack of computer literacy : some citizens does not have any computer literacy especially those elderly citizen. They can't renewal road tax and driving licenses online without assistance of others.
  2. Do not have proper guidance : Without providing proper guidance, they can't complete the renewal process.
  3. Methods of payment : there are only 2 types of payment available for this service which are credit card and debit card. This is inconvenient for those citizen does not own credit and debit card.
  4. Methods of collection the road tax slip : either can collect it by visit the nearest MyEG or by delivery. If collect by delivery it charges quite high and we still need to wait for few days just can get it. While if we collect the road tax slip by our own, this is troublesome and this is nothing different with we renew the road tax directly through the JPJ.


Ways to encourage more citizen to use E-Government

  1. Do more promotion : The government can do some promotion to promote the e-government and it will let e-government become more and more popular. For example, government can set up a roadshow to promote e-government and provide demonstration to citizens.
  2. Security and privacy issues : Government need to make sure that all the information provided by citizen wont be leaked out and it also can increase the confident of citizens to using e-government.

Tuesday, July 1, 2008

The application of pre-paid cash for consumer

The prepaid cash is same as a debit card or credit card. This cards' function is let people do some transaction such as shopping or travel without take so much money in hand because when you do some transaction you can straight pay by card and you only will pay the money at the end of each month to related bank.This make people life more safety and more convinient.There are many pre-paid cash card has been use in Malaysia.The latest prepaid debit card are tune card.This tune card is no-frills products and services offering insurance package as well as prepaid Visa card.



Besides that, the most popular prepaid cash card in Malaysia is Touch n Go. The touch n go are mainly for transportation purposes.The touch n go is mainly use in highways tol,LRT, bus and for parking but now a days the touch n go expanding services toward retail purchase and purchase fast food.For example, now with touch n go you can buy burger king. A&W and Dunkin's Dougnut without holding any cash in hand.The only thing that we need to do is just reload the card and make sure there are cash available then can do any transaction.Touch ‘n Go uses contactless smartcard technology. The card looks similar to a credit card. User can continue using the card as long as it is pre-loaded with electronic cash. User can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorised third party outlets.




http://www.touchngo.com.my/

Other than that, there are pre-paid cash card in others countries such as Hong Kong and London which Hong kong is using octopus card while London is using oyster card.Octopus card readers can be found, not only in most modes of public transport in Hong Kong but in other places such as car parks, shops, cafes, wet markets - which sell livestock and fish - and leisure facilities. They can even be used for access control in schools and apartment blocks.People can travel around the city and pay for items in some shops without the need for cash.




http://www.octopus.com.hk/

Monday, June 30, 2008

Electronic Currency


In 1982, Dr. Chaum founded the International Association for Cryptologic Research (IACR), which currently organizes some of the most important academic conferences in cryptography research. He has contributed to the industry advancement of electronic cash, partially in his role a founder of DigiCash is an electronic cash company, in 1990.


Electronic currency is essentially a system that allows a person to pay for goods or services by transmitting a number from one computer to another. These transactions are carried out electronically, transferring funds from one party to another, by either a debit or credit.These funds are instantly cleared and secured by using strong encryption, thus eliminating the payment risk to the consumer. It is only a matter of time before electronic currency will replace the present monetary systems. Thus, electronic currency is the digital representation of money, or more accurately, the digital representation of currency. Electronic currency provides a secure means of conducting transactions in electronic commerce. Electronic Funds Transfer(EFT)
and direct deposit are examples of electronic currency.

The Basle Committee(BC) was formed to examine these new electronic payment systems such as stored-value payment products, and as a result, identified two models of electronic coin payment systems: (1) the single-issuer model; and (2) the multiple-issuer model.
In the single-issuer model, the issuer creates and distributes electronic coins to banks. The bank then issues the electronic coins to their customers by loading them onto stored value cards or computer hard drives. Using this model, consumers can also transfer electronic coins between themselves using electronic wallets. In the multiple-issuer model, consumers are able to receive electronic coins from a number of different issuers. A merchant is the party in the electronic transaction that receives coins as payment, deposits them with other issuers and then contacts the system operator.The system operator then consolidates these claims and transmits this information to the issuers

The Mondex smart card is an electronic wallet that holds five different currencies and is used to transmit electronic cash over the Internet. Using this system, a consumer can browse any online service that accepts Mondex. In order to purchase, a consumer inserts his Mondex card into the card reader attached to his personal computer.Once the consumer confirms that another valid Mondex device is present on the other end of the transaction, the customer's card transfers value to the vendor's card.
The electronic currency's unique feature is provided blinded coins so consumer can avoid the coin's redemption links its original holder to the transaction when the issuer's digital signature authenticates the serial number on each electronic coin.

There are some advantages of electronic currency like Confidentiality/Privacy. Current electronic currency systems vary in their effects on privacy from total anonymity, in which personally identifiable records are not created (blinded coins), to audited systems that collect and store every aspect of each transaction. Another advantages is Security, the security of electronic currency is provided by the use of encryption. Some experts are weary about the security of online transactions

Credit card debts: Causes and prevention

Nowadays, credit card is a very common tool for everyone and which is no longer the symbolize of wealth. With the credit card, we can spend our "future money" 1st which mean we can spend more than the money we earn now so it is one of the reasons that credit card can become so popular.

The causes of credit card debts:
  1. It is very easy to get credit cards, multiple credit cards in fact. Issuers of credit cards make it easy for you, if you have had no debt problems in the past. If they seem to take it lightly, it is understandable that their customers do too.
  2. Your friends, neighbours and work colleagues will probably all have multiple credit cards, talk about them and flash them around from time to time. That can all influence your own attitude to credit card debt.
  3. Bank's promotion of credit card is very attractive such as 0% interest, lucky draw to get a new car, etc..
  4. Poor money management will make you into very big trouble. A monthly spending plan is essential. Without planning, the debts will become more and more as the time passed.
Prevention of credit card debts:
  1. A credit card should only be used as a convenience to pay if you have no cash on you, knowing that you can pay off the balance before interest charges kick in
  2. Do not use the debt to pay off debt. You're just shuffling your debt around and incurring more debt each time you do so.
  3. Planning all your borrowing, write down a monthly budget, and then compare to your total income.
  4. Do not using any credit card at all. This is the most efficient way to prevent all the credit card debts.

Sunday, June 29, 2008

Comment for John.cow being hacked.




JohnCow was hacked by some hackers and some message is send by the hackers which shows that if Johncow din't pay $100 in 24 hours, their blog will be hack but this is just a joke which create by johncow himself. This shows that they missuse the blogging purposes.


There should be some lines of ethics or code of conducts that each blogger should adopt in this blogsphere.This could shows that the every blogger must have same attitude and ethics so that less and less website being hack.


There are few steps that the blogger can take into the consideration to prevent their blog being hack.For example, in the case of JohnCow there are few methods that can be use such as keep your personal information private. The blogger must not disclose their telephone number, Ic number, bank account number because the hacker might use this information for other purposes.Besides that is use alpha-numeric password because of the combination this two the hacker will be more difficult to get your password and it is high security. The most important thing is avoid using public computers because this could easy for the hacker through public server.Other than this there are few more prevention method such as do not use a password that can be found on your blog,set your brower according to your preferred security level and use Anti-virus software n your computer.


Here are some photo regarding how computer was hack.






Monday, June 23, 2008

The threat of online security: How safe is our data?

There are more and more threats in the society prosper that produce millions of high technology productions such as computer, handphone, PDA, i-pod and so on. So, there are happen a lots of cases that relevant to the threat of online security which mentioned how and where our data being stolen:



Symantec Internet Security Threat Report: Trends for July-07

The Symantec Internet Security Threat Report provides a six-month update of worldwide internet threat activity. It includes analysis of network-based attacks, a review of known vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007



Protecting Agency Data from Loss or Theft- Vendor Podcast

In recent years, the US federal government has suffered a slew number of high-profile security breaches that have exposed the flaws in traditional data protection strategies. To help agencies safeguard proprietary information, the federal government has issued various requirements, including DCID 6/3 and OMB 06-16. But enforcing compliance with these and other policies requires the right tools and processes.



Tangled Web: Uncover Threats, Invisible Enemies

Long gone are the "good old bad old days" when threats generally had an instant and obvious effect - when many businesses simply warned employees not to click on dubious looking email attachments in case their computers became infected with a virus or some other unwelcome visitor. Today we are seeing a rising tide of dangers that are more cunning, harder to pin down and much more difficult to defend against.
Examining recent developments in the threat landscape, this white paper focuses on the emergence of the web and covert information-gathering as key battlegrounds in the ongoing war against malware propagators and the criminal gangs increasingly active in this field.




As we can see the cases above, i encourage the users of the media electronic production should always put more protections such as antivirus software, firewall system, password and much more to avoid hacker enter into your program.

How to safeguard our personal data and financial data.

A world largerly depent on computer and most of the transaction are using internet therefore to prevent the data being stole by others; there are few ways to safeguard our personal and financial data.


To ensure that you don't fall prey to cyber fraud, there are few ways to follow:

1. Install a firewall. A firewall is a software program designed to allow good people in and keep bad people out.

2.Install and update antispyware and antivirus programs. Microsoft and numerous application vendors offer users regular updates to existing antispyware programs, so be on the lookout. As for antivirus protection, Symantec and Norton antivirus are popular choices.

3.Avoid accessing financial information in public. Resist logging on to check your bank balance when working from a coffee shop that offers wireless access. These systems are convenient, but also unknown. Casual users have no way of assessing how sturdy their firewalls are.

4.Update your browser. Updating your browser on a regular basis can help plug up security holes.

5.Look for "locks." which is look for small lock icon in the lower-right corner of the browser window.

6.Don't open mystery attachments. Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information.

Besides that, to comply with safeguarding confidential financial records and related personal information all the related party need to :

1.Designate one or more employees to coordinate the safeguards.

2.Being informed on the data that is being processed.

3.Informed of the entities or categories of entity to whom or which the personal data
may be communicated.

4.Being informed that updating, rectification or, where interested therein, integration of the data has been obtained.

Sunday, June 22, 2008

Phishing: Examples and its prevention methods


Phishing is the act of sending an e-mail to a user falsely claiming to ba an established legitimate enterprise in an attempt to scam the user into surrending private information that will be used for identity theft. The e-mail directs the user to visit a web site where they are asked to update personal information, such as passsword and credit card, social security, and bank account numbers, that the legitimate organization already has. The web site, however, is bogus and set up only to steal the user's information.

For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user's account was about to be suspended unless he clicked on the provided link and updates the credit card information that the genuine eBay already had. Beacause it is relatively simple to make a Web site look like a legitimate organization site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay's site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.

In order to prevent phishing, be suspicious of all unsolicited or unexpected emails you receive, even if they appear to originate from a reliable source. More over, legitimate companies generally address the customers by their user name and do not divulge personal information through an email nor do they request some confidential data through mail. If the mail starts with "Dear Customer" or something like that, it is most likely a Phishing mail, aimed to rob you.

Some toolbars enable the customer to see the main domain name of the site, and hence help them in recognizing legitimate site. Another very popular method of prevent phishing is by maintaining a list of known Phishing sites and blocking them. This feature is available in Internet Explorer 7, Mozilla Firefox and Opera 9.1.

Another method to prevent online Phishing is by asking the users to enter password only if they display the correct personal image. Email spam filters provided by many mail clients also have filters against Phishing sites. Any victim of Phishing can help prevention of Phishing by reporting his experience to the financial institution. They can pursue and can even lead to recovery of your losses.

Saturday, June 21, 2008

How E-commerce can reduce cycle time, improve employees' empowerment and faciliate customer support??

Nowadays, most of the services can be offered in electronic form. Those services are available anytime, anywhere and anyone who are needed.

With E-commerce, the cycle time can be reduction. It shortening the time it takes for a business to complete a productive activity from its beginning to end. Customers can directly access to the services through the extranet instead of physically appearing to the stores. It is more efficient, more convenience, and even saving the cost and time for the consumers as well as seller.

Beside that, giving employees the authority to act and make decision on their own is a strategy used by many arganization as part of productivity improvement program. Management delegates the authority to individuals or team who can execute the work faster and within fewer days. Empowered salespeople and customer service employees are given the authority to make customers happy and do it quickly, helping to increase customer loyalty too.

E-commerce can allow the customers to access to their services to get the relevant information and customers support in anytime. Other than that, customers also can send an e-mail to the customer service address to obtain the necessary information or making any complaint.

Through the powerful e-commerce, everybody can get, can sell, can buy anythings at anytime anyplace..

Sunday, June 15, 2008

An example of an E-commerce failure and its causes




Starting in 1999, well-known B2C failures include eToys, Xpeditor, MarchFirst, Drkoop.com, Webvan.com, and Boo.com. Boo.com was a United Kingdom company founded by Ernst Malmsten, Kajsa Leander and Patrik Hedelin, which later falled after having to liquidate and was placed into receivership in 18 May 2000. Boo.com’s intention is to sell branded fashion clothing through the Internet.
Boo.com is beset with problems and mismanagement from the start of the business. The site was heavily relied on JavaScript and Flash technology, but as that time it was very slow to load at a time when dial-up Internet usage was a norm. Hence, it took vast majority users to wait minutes for the page to load. The complicated design required to be displayed in a fixed size windows, which will limited the space that available to display product information to customer.

Boo.com’s founders spent £125 million in just six months, to market itself as a global company but then had to deal with different languages, pricing and tax structures in countries it performed. The company's sales was not up to their expectation, especially when there were a high numbers of returned products by their customers (the company mysteriously decided to pay postage on returns).
However in recently, Boo.com, re-launches as the “ultimate online destination for travel” under owner Web Reservations International (WRI), which claims to be one of the world’s most successful e-businesses.

Saturday, June 14, 2008

The history and evolution of E-commerce.


E-commerce are getting popular now a days. Most of the companies are using E-commerce to run their business because of E-commerce involve may activities,organizational units,and technologies.E-commerce is define as a process of buying,selling,transfering,or exchanging products,services and information via computer networks.

E-commerce are first develop in early 1970s.Before E-commerce application is being use,the first aplication found is Electronic funds transfer(EFT) but the use of these application was limited to large corporations, financial institution and few other daring business.Therefore electronic data interchange(EDI) came in.EDI allows many types of business such as manufacturers,retailers,services compare to EFT and such system were called interorganizational system.

In 1990s because of the internet became commercializad,the e-commerce application was expanded and almost all mediun-and larged-sized organization in the world has their web site which can run business through online direct sales.In 1999,E-commerce shifted from B2C toB2B,and B2B to B2E but B2C E- commerce may be the most recognizable.


The example of early company which use E-commerce are Pizza Hut ,Amazon.com and e.bay.







The E-commerce is for customer advantage,it is a world which we are building together brick by brick, laying a secure foundation for the future generations.As the expert predicts that almost all internet user will shops online in future,E-commerce growth not only from B2C but also from B2B and newer application such as e-government, e-learning,B2E.The growth of field will continue in foresseable future and everyone can shop online in future.






Thursday, June 12, 2008

An example of an E-Commerce success and its causes

Dell is a well known computer companies in the world. In 1984, Dell was founded by Michael Dell. With $1000 in startup capital and an unprecedented idea--bypass the middleman and sell custom and built the PCs directly to customers, Michael Dell registers Dell Computer Corporation. Doing business as PC's limited, the company is the first in the industry to sell customer-built computer directly to customer.


Michael S. Dell
Chairman of the Board and Chief Executive Officer
Director since May 1984


Michael Dell, born in February 1965, is the chairman of the Board of Directors and chief executive officer of Dell. In 1992, Mr. Dell became the youngest CEO ever to earn a ranking on the Fortune 500. Mr. Dell is the author of Direct From Dell: Strategies That Revolutionized an Industry, his story of the rise of the company and the strategies he has refined that apply to all businesses.

Dell can be so success this is due to
  1. Direct Relationship-- Dell believe in being direct in all they do. They are committed to behaving ethically, responding to customer needs in a timely and reasonable manner, fostering open communications and building effective relationships with customers, partners, suppliers and each other; and operating without inefficient hierarchy and bureaucracy.
  2. Customers-- Dell believe in creating loyal customers by providing a superior experience at a great value. With a simple concept which is selling computer system directly to customers, Dell could best understand customer's need & efficiently provides the most effective computing solutions to meet those needs.
  3. The Dell Team-- Dell continued success lies in the teamwork and they committed to being a meritocracy, and to developing, retaining and attracting the best people to their worldwide marketplace.
With a excellent operational, superior customers experience, and the good relationship with all parties, Dell gains the competitive advantages over the other companies in the same industry and make the Dell become so success until today..



Sunday, June 8, 2008

about jiun mein

Hi, i m chang jiun mein. I come from Port Dickson in Negeri Sembilan.I m Utar student and i study in BAC 4, now i stay in Bandar Mahkota Cheras with my brother. My hobby is watch movie, play ping pong and on-line. The animal i like is dog and my home got a lots of dogs. As i live in KL, my life is boring and if i go out it might be costly so i prefer on-line at home.I also like to bring my dog walk around the place i live in the evening and i can know more people here. The five websites i like to visit are friendster, hotmail, tom365, chinapress, and google website. Nowadays, the speed of computer is really fast we can do a lots of thing through computer to make our life easy and convenience.The five activities that i doing by computer are chat with friend, download music or movie, search information for homework, play on-line games, and on-line shopping. Although i m not familiar with computer but i hope through computer i can have lots of new friends and learn much more new computer's techniques.

Hello everyone~!!!

Hi my name is Tan Bee Hwee. I am from Johor Bahru and now is in BAC group 4. Just like the normal girls i like to shopping, watch movie, swimming and chit chat with my friends.

About the top 5 websites that i visited most are friendster, hotmail, utar, gougou and facebook. friendster and the facebook websites are use to know new friends and through those websites i can more understand all of my friends, and most of them will upload photo to friendster and facebook so i will know how are them recently. Hotmail website of course is use to check my e-mail and i also will use it to pass my assignment to my others group members in order to complete our assignment as soon as possible. Utar website is use to check my result(normally in the semester break) and i will always check the calendar in Utar website so that i can know when will have holidays. Last one is gougou website, this is the website that use to download drama, movie, cartoon, etc... So sometimes i will download some drama or movie as my entertainment when i cant back my hometown.

The most common internet activities are chit chat with my friends through MSN or SKYPE, download the drama, play some online games, find the information to do my assignment or just viewing others people blogs or photo album...

Saturday, June 7, 2008

About Me..

Hello.My name is Hoo Chia Chien. I m BAC 4 student.I come from Port Dickson. My hobby is play badminton and watch tv.But the favorite thing that i like is holiday coz during holiday i can do anyhting that i like. For example :watch drama, go travel and sleeping without worry about my studies.I m a not a hardworking student because i will study before having exam but i hope that i can change my view bcoz the subjects are getting harder and harder so must try to do something before is too late.I hope that i can do it.


Although I m staying in Sg long but i will go back hometown every weekend no matter having any activities such as friends gathering ,this is because for me nothing is important than my family.I m a very simple person. For me "happy go lucky" but since study in UTAR my life change to bcom stress. Finally i hope that i can manage all the subject well without stress anymore.I will try to enjoy my study life.



The website that normally i will log in are friendster, hotmail (chit chiat , check e-mail),haoting .com(listen music),google( for assignment purpose) and finally is UTAR website ( check result and do lecturer and tutor survey).