Welcome! My name is Daniel Lim Jhao Jian. Here is where I share my experience, knowledge and ideas. You are welcome to leave comments and follow my blog. You are free to copy anything from this blog. Please recommend this blog to your friends.

Wednesday, 16 December 2009

Convert a Casio fx-350MS Calculator into fx-570MS

The scientific calculators used by many students in secondary schools and colleges are Casio fx-350MS and fx-570MS. Casio fx-570MS has more functions than fx-350MS. However, it is possible to convert a Casio fx-350MS calculator into fx-570MS.

After the conversation, however, not all fx-570MS functions will be available. The keys layout will change, some following fx-350MS, some following fx-570MS and some different from both 350MS and 570MS. You have to test it out by yourself.

These are the functions added to the fx-350MS calculator after conversation:
COMP, SD and REG mode: Added CONST and CONV function only. Other fx-570MS functions are still unavailable.
CMPLX and EQN mode: All functions will be available.
BASE-N mode: All functions will be available except some LOGIC functions.
MAT and VCT mode: No function available. Matrix and vector cannot be used.

To convert a Casio fx-350MS calculator into fx-570MS, follow these steps:
1. Press [MODE] and select 2 (SD).
2. Press 1.
3. Press [M+] eighty-two times. It should display "EditOFF ESC".
4. Select 2 (ESC).
5. Press ^ (REPLAY UP).
6. Press 131313131...... until no more numbers can be entered.
7. Press [=] two times. It should display "EditOFF ESC".
8. Press [0] followed by [1]. Note that you must press [0].
9. It should display "1          _". Press [AC].
10. Press [MODE] and you will notice that your calculator has the fx-570MS functions. Well done.

To cancel this and return to fx-350MS, just press [ON]. Start over from step 1 to convert again. So if you want to remain in fx-570MS, you can only press [AC].

1. The method above may not work for some older or non-original versions of fx-350MS calculators. For those calculators, you may not be able to press [MODE] at step 10, or the screen may show some strange displays. In that case, it is not possible to convert the calculator into fx-570MS.
2. The method above does not work for fx-350ES (Natural Display) calculators.
3. As I stated above, after converting your fx-350MS calculator into fx-570MS, only some but not all fx-570MS functions will be available. Also, the keys layout will change.

Monday, 14 December 2009

The girl that I hate

When I was in primary and secondary school, I had many friends, but I also had an enemy. I won't mention her name here, I am just writing about the reasons I hated her.

I knew her since Standard 2. Initially, there were 49 students in my class. However, my class had 8 columns and 6 rows of seats, which was enough for 48 students only. Therefore, an extra table was added behind the class. This girl sat on that seat at first. Then in May 2003, someone in my class transferred to another school. The teacher rearranged the students' seats in class and as a result this girl sat beside me. This was how I began to know her.

In the beginning, I was willing to be friends with her. However, the problem was that she liked to disturb me and then tell the teachers that I disturbed her instead. The teachers were very unfair. They always believed her whenever she made a report about me, but they would not believe me whenever I made a report about her. The Chinese teacher would punish me without allowing me to explain, the Malay teacher would force me to admit that what the girl reported was true by promising she would not tell the principal about that, while the English teacher kept saying that the girl would not have made a report if I didn't do anything.

In Standard 3, a temporary teacher came to our school and she taught Chinese in our class for three months. During that time, this teacher often let us have group activities. I was in the same group with the girl and she was a terrible group member. She wasn't the leader but she always wanted to make all decisions for our group by herself. She often complained to the teacher that I was uncooperative. This teacher was unfair too. She kept telling me not to make reports about small issues, but yet she allowed the girl to do so. In the end, our group was ranked the second last among all groups.

However, in Standard 4 and 5, I and the girl became good friends. This was because we had common friends at that time and we were also living quite close to each other after I moved to a new house. She stopped disturbing me or making reports to the teacher about me.

In Standard 6, the girl's mother asked my grandparents to send her home after school every day since we were living in the same area, and my grandparents agreed. In the beginning, I was happy about that, hoping that it would further improve our friendship. However, this turned out to be really terrible. Since she knew everything that I did in class, she often threatened to report my wrongdoings to my grandparents if I didn't follow her instructions. She was essentially blackmailing me. For a few times, I was scolded by my grandparents because of her reports. My grandparents believed very much in what she said. Because of that, I began to hate her again.

In Form 1, the girl studied at the same secondary school with me. I immediately rejected her mother's request to let my grandparents send her home again. During the first few weeks, a few Chinese students in school kept disturbing me for no reason. Later, I took revenge by damaging someone's bottle. Since those students were her friends, the girl reported that to my grandfather. As a result, my grandparents scolded me badly.

Since then, I hated the girl very much. I would never forget what she had done and I would never be friends with her again. Some other students in my school disliked her as well because of her attitude.

Saturday, 8 August 2009

Be Alert On The Internet

I am sure most people enjoy surfing the internet. The invention of internet does bring many advantages to us, but it can also be dangerous if you are not careful enough. There are several things that you have to beware of.

1. Malware:
Malware is the short form for 'malicious software'. Malware are softwares that can harm your computer. Malware threats usually infect your computer through infected e-mails, websites, programs, files, pendrives, memory cards and diskettes. There are many different types of malware, different types of malware harms your computer in different ways.
a) Virus: Viruses can damage your computer and destroy files stored in the computer. It can even format your hard drive and cause you unable to start your computer.
b) Spyware: Spywares can spy on what you are doing on your computer and steal personal information. It can even see you through your webcam.
c) Adware: Adwares display unwanted advertisements on your computer. It can ruin the appearance of your computer. The contents of the displayed advertisements are usually inappropriate.
d) Worm: Worms can cause your computer to have problems. It can cause your computer to slow down and often hangs. It can even cause programs and Windows features to stop working properly.
e) Trojan: Trojans can control over your computer. It secretly makes harmful changes to your computer and also steal personal informations.
f) Hijacker: Hijackers change the home page of your internet browser. It can even force your internet browser to enter a specific web page. The web page usually contains viruses.
g) Dialler: Diallers secretly connect your computer to the internet, causing you to be charged for the internet connection fee.
h) Enabler: Enabler does not harm your computer, but it is used by other malware threats to harm your computer. Enablers cannot function by itself without other malware threats.
i) Rootkit: Rootkits are hidden threats in your computer that can provide other malware threats with administrative access to your computer. It is difficult to be detected by ordinary security programs.
j) Hacker/Hack tool: Hackers can bypass a password protection and steal the password. It can even attack security programs on your computer in order to deliver malware threats.
k) Scareware/Fake Antivirus: Scarewares are fake security programs. It tricks you by saying that your computer is infected with malware and wants you to purchase it in order to remove the detected malware threats.

2. Spam and Junk Mail:
Spam and junk mails are unwanted emails that contains unwanted advertisement. It may even contain viruses and fraud. Some companies send spam to people's email address in order to earn a profit. They get the email addresses by searching for them on the internet and by tricking people to give them their email address. Spam and junk mails can use up the storage space of your email inbox and can be very irritating.

3. Fraud and Phishing Sites:
Fraud and phishing sites are fake websites. It looks the same like a particular website but actually it is not. The purpose of people creating fraud and phishing sites is to steal passwords. When other people arrive on the fraud or phishing site, they may not be aware of that, so they will just sign in to that website with their user name and password. If this happens, their password had been stolen by the creator of the fraud or phishing sites. Fraud and phishing sites are commonly used to steal passwords from social networking website like Facebook, but some even steal passwords of bank accounts.

4. Bad People:
Bad people is everywhere on the internet, especially in social networking and chat programs such as Facebook, Friendster, Twitter, Tagged, MSN, Yahoo Messenger and Skype. They uses fake identities like name, gender, age, address and photo. For example, a 30 year old man may say that he is a 15 year old girl, and uses a 15 year old girl photo. They use the fake identities to interact with other users on the internet, mainly children and teenagers. They will trick the other person to give them their personal information like address and telephone. After that, they will disturb the other person and the family through calls and visits. Some bad people even trick a person to go alone to a particular place to meet each other, then use that change to kidnap that person.

Above are all the dangers on the internet. So, how to stay safe on the internet? There are several things that you have to do in order to keep yourself safe on the internet. These are the ways:

1. Install Anti-virus Program:
Anti-virus program protects your computer from viruses, worms, trojans and other malware threats. A good anti-virus program is able to scan your computer for viruses, remove detected viruses, prevent virus attacks and update virus definitions. If you do not have a good anti-virus on your computer, or if the trial version of the anti-virus had expired, you should download and install one of the free anti-viruses below.
a) Microsoft Security Essentials:
b) AVG Anti-virus:
c) Avira Anti-virus:
d) Avast Anti-virus:
If you already have a anti-virus program on your computer, you should uninstall it before installing the anti-virus program above. Using two anti-virus program at the same time can slow down your computer. You should update your anti-virus and scan your computer at least once in a week for maximum safety. If a virus is detected, you should remove it.

2. Install Anti-spyware Program:
Anti-spyware program protects your computer from spyware, adware and other malware threats. A good anti-spyware program is able to scan your computer for threats, remove detected threats, prevent malware infections and update definitions. Windows Vista and Windows 7 computers come with Windows Defender, which is a good anti-spyware program. If you are not using Windows Vista or 7, and you do not have a good anti-spyware on your computer, or if the trial version of the anti-spyware had expired, you should download and install one of the free anti-spywares below.
a) Windows Defender:
b) Spyware Doctor with Anti-virus:
c) Ad-Aware:
d) Spyware Terminator:
If you already have a anti-spyware program on your computer, you should uninstall it before installing the anti-spyware program above. Using two anti-spyware program at the same time can slow down your computer. You should update the anti-spyware and scan your computer at least once in a week for maximum safety. If a malware threat is detected, you should remove it.

3. Install Firewall Program:
Firewall program protects your computer from hackers and other malware threats. A good firewall program is able to block hacker attacks and unauthorised access to your computer. Windows XP, Windows Vista and Windows 7 computers come with Windows Firewall, which is a good firewall program.
To turn on Windows Firewall, go to Start > All Programs > Control Panel > Windows Firewall . Select 'On (Recommended)' and click 'OK'. If a hacker attack or unauthorised access to your computer is detected, you should block it.

4. Install Netcraft Toobar:
Netcraft toolbar protects you against frauds and phishing sites. It displays the risk rating of every website that you are visiting. If the risk rating is high, that means the possibility that the website is a phishing site is high. To download and install Netcraft Toolbar, go to .

5. Install McAfee Site Advisor:
McAfee Site Advisor tells you whether the website you are visiting is safe to visit. It blocks a website if the website is dangerous to visit. To download and install McAfee Site Advisor, go to .

6. Turn On Automatic Updates:
Automatic Updates is a Windows feature that can automatically download and install updates for your computer. The updates can fix Windows loopholes and correct errors, which can reduce the risk of hacker attacks. To turn on Automatic Updates, go to Start > Control Panel > Automatic Updates . Select 'Automatic (Recommended)' and click 'OK'. When new updates are available, Automatic Updates will automatically download and install it on your computer.
Note: If your Windows is not genuine, you will be periodically informed of that after you turn on Automatic Updates. Also, you can only get access to some of the updates, but not all.

7. Good Internet Surfing Habits:
You should have good habits while surfing the internet. First, do not give your personal informations such as telephone number, address and photo to anyone else on the internet. Next, never meet with your internet friend alone. Besides that, don't simply click on any link given by your friend on the internet. Also,you should scan a download file or program for viruses and malware before opening it. In addition, scan an email attachment for viruses and malware before downloading it.

Monday, 29 June 2009

First blog post

Welcome! I have just created my blog, and this is the first post on this blog. I will write new posts from time to time.