Rabu, 27 Januari 2010

Database

Database is a collection of data items are related to each other which is organized under a particular scheme or structure, stored in the computer hardware and software to manipulate for specific purposes. Database is required because:

* One important component in information systems, because it is the basis of providing information
* Determine the quality of information: accurate, timely and relevant. Information can be said is worth more effective if its benefits compared to cost to get it.
* Reduce duplication of data (data redudancy)
* The relationship data can be improved (data relatability)
* Reduce waste storage places outside


source:ilmukomputer.com

Operating System

Operating system (usually abbreviated to the OS, O / S or kernel) is an interface between hardware and software in computer systems. OS is responsible for managing and coordinating activities and sharing of limited resources of the computer. Operating system that acts as host for applications that run on the computer. As the host, the main purpose of the operating system is to handle the details of hardware operation. This frees the application program to manage low-level hardware and makes it easier to write software. Almost all computers, including laptops, desktop computers, supercomputer, and even video game consoles, using the operating system from various types. Some older models may use an embedded operating system, which may be stored on compact disk or data storage device.

The operating system offers a number of services for system programs, user interface, application programs and hardware. Applications access these services through system calls and device drivers from Hardware. Through the system call, the application can request service from the operating system, pass parameters, and receive the results of operations. Users can also interact with the operating system using some type of software or hardware that offers a user interface (UI), such as keyboards, typing commands to the command line interface (CLI) or using the keyboard and mouse with a graphical user interface (GUI, commonly pronounced " Gooey ").

Contemporary operating systems are widely used as Mac OS, Windows, Linux, BSD and Solaris. Although the servers are running Unix or its derivatives, embedded devices that separate the market between several operating systems.

source:opensource.telkomspeedy.com

computer network hardware

If you want to make some network computer hardware or hardware that need to be prepared. In general to create a computer network, required the following equipment:

* At least there is one computer that acts as a server (data center)

* There is a computer workstation (work)

* The operating system support such as Windows NT networking, Netware, Linux, etc.

* Peripheral tissue such as the Network Interface Card (NIC), hubs, etc.

* Media liaison between computers such as cables, connectors, terminators, etc.



e-Learning

Glance again we need to understand what e-Learning is. E-Learning is a distance learning (distance learning) that take advantage of computer technology, computer networks and / or the Internet. E-Learning allows learners to learn through computers in their own without having to physically go to follow the lessons / lectures in the classroom. E-Learning is often also understood as a form of web-based learning that can be accessed from the intranet on a local network or the Internet. Actually, the e-Learning materials should not be distributed as on-line either through a local network or the Internet, the distribution of off-line using the media CD / DVD also includes the pattern of e-Learning. In this case the application and learning materials developed and distributed as needed through the media CD / DVD, then the learner can take advantage of the CD / DVD and learn at the place where he is.


source: elearning.gunadarma.ac.id

Internet

Literally, the Internet (short than words 'interconnected-networking') is a series of computers connected in a series. When the Internet (the letter 'I' large) is a public computer system, a globally connected and uses TCP / IP as the packet exchange protocol (packet-switching communication protocol). The largest internet series called the Internet. How to connect the circuit with Siwak F is called internetworking.

Central circuit that forms the Internet beginning in 1969 as the ARPANET, which was built by ARPA (United States Department of Defense Advanced Research Projects Agency). Some initial investigations donated by ARPANET including Siwak F-series without center (decentralised network), queuing theory, and packet exchange Siwak F (packet switching).

On January 1, 1983, the ARPANET protocol circuit switched its center, from NCP to TCP / IP. This is the beginning of the Internet as we know it today.
In about the 1990s, the Internet has evolved and most users connect computer networks that exist.

Internet guarded by treaties or multilateral bi-and technical specifications (which describe the protocol of the transfer of data between circuits). These protocols established under discussion Internet Engineering Task Force (IETF), which is open to the public. The agency issued a document known as RFC (Request for Comments). Some of the RFC used Internet Standard (Internet Standard), by the Internet Architecture Board (Internet Architecture Board - IAB). Internet protocols are commonly used such as, IP, TCP, UDP, DNS, PPP, SLIP, ICMP, POP3, IMAP, SMTP, HTTP, HTTPS, SSH, Telnet, FTP, LDAP, and SSL.


source: mig33purwakarta.forumotion.com

Newest Technology predictions for 2010

Portable devices are always connected to the Internet will be consumed as many as 10 million people around the world this year 2010, according to industry observers predicted the result, Deloitte. NetTabs, known as a touchscreen tablet, designed for web surfing, has shape larger than a smartphone, but smaller than a laptop, will become the new consumption in 2010, continued the company Deloitte.

Gadget that will reap huge profits is a smartphone, Deloitte claims, because the smartphone offers a bigger screen for web surfing and watching videos. However, unlike the netbook and notebook, which both offer larger display than a smartphone, NetTabs much lighter and cheaper.
While the wireless connection will be popular for NetTabs, supported by network providers, but consumers seem to prefer the subsidy from the carrier, because NetTabs will dibandrol cheaper prices than most smartphones, Deloitte added. NetTabs even expected to threaten the existence of market e-book reader, where Deloitte predicts that sales of e-book reader will reach 5 million units globally, the end of the year.

Deloitte also predicts the existence of the development of a broader technology, which is based conversations with more than 7000 technology, media and telecom expert who will create the gadgets of technology also during 2010.


source: www.beritanet.com

Use Bitmap Effects in CorelDRAW X3

In Corel Draw 13 you can give special effects to the image or text by using the menu to give effect to the object. To use the command bitmaps are also some things to note include:

* Object images or text must be converted into a type of bitmap.
* Securities bitmap that you can only use the bitmap image.
* Each bitmap effects are processed in RAM memory.
* Application of bitmap effects on the large image will take a long time in processing.

Penggunaan Efek Bitmap" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">-> Use Bitmap Effects
Giving effect to Bitmap Images
Some show a preview bitmap effect before the effect is applied.
Below are the steps to give effect to a bitmap image object:

1. Import" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">Import the object image with the File menu> Import

2. Click the menu bitmaps and select one type of effect from the displayed submenu. For example: Radial Blur dialog box that appears Radial Blur.

3. Click the Expand button to display the preview window and press the button to display the Multiple Page 2 preview display.
Picture Description

Left window is the object of the original image and the right window is the result of bitmap effects.

4. Specify a value or option to adjust the effects resulting from the bitmap effect. For example, the content value of 26.
You can shrink or enlarge an existing object display in the left pane (Object Original)
You can also specify the particular object that is not obscured by clicking the plus button and then click the object that will not be obscured in the left pane (Object Original).

5. Press the Preview button to see the results of a bitmap effect to the entire image. Click the OK button and watch the results.


source: www.beritanet.com

computer components

1. Input section

For parts, computer components general we need to know is:

A. Keyboard

The keyboard is a device usually placed in front of computer screens and functions as an external data penginputan by typing on the keyboard. I'm sure most of you surely know of this component. Keyboards usually resembles a manual typewriter (for composition of laying letters). We have been circulated in the market to adopt the keyboard with a wireless system. And usually more expensive when compared with ordinary keyboard. The types of keyboards on the market today for more detailed information is: Serial, PS / 2, USB and wireless. Then some keyboard brand in the market were: Logitech (usually the most muahal price for the market in Indonesia), Accer, Komic and much more.

B. Mouse

Own mouse pointer to direct the functioning of your computer screen. In the presence of the mouse will allow us to set the pointer position in accordance with our desires quickly. The characteristics of a good mouse is a very high sensitivity and do not require a complex treatment (bias and wireless optical mouse with these requirements, do not use the mouse to be manually cleaned regularly to remove dust). Brand mouse that I like is the Logitech (for durable, reliable, sensitive good, and have a good shift, but a little bit more expensive in terms of price).

C. Floppy Disk Drive

It is a hardware that connects to the computer diskettes, So you want to transfer data from one computer to another using floppy disks, then this is where you should enter disketnya. But for today the use of floppy disks eroded by the development of computer technology. Because of the size of a CD disk and almost can save a smaller memory, so diskiet abandoned by most users. We have more ngetren tools is to use flash.

D. Scanner

This is a very rarely used by people, as well as for pemiliknya.Oleh because it is not surprising if one uses this tool dirental services then you will be charged fairly expensive enough, ie less than USD $ 1000.00 per scan. For now mostly found in scanner with the connecting port to the computer using a USB model.

E. Optical devices

For those of you who like to watch the efficient package (do not want to go to the movies, but enough to buy his film "in perparah with pirated movies") then the tool must have on your computer. Here are some types of optical computers can be customized to your needs:

(1). CD ROM, is the optical reading devices Inputan from the CD. Lack of this tool is not able to rewrite on the CD (insert the data to a CD).

(2). CD RW, are optical devices that can serve to read and rewrite files to CD. With this tool you can create a CD by inserting a file into it.

(3). Optical DVD, is a device whose function is similar to the CR ROM, except that if the CD ROM to a CD then DVD optics to read DVD and CD.

(4). DVD RW (DVD COMBO), can be used for all types of applications related to either optic used for CD or DVD.

F. Process Tool

In this section are tools that make why expensive computer. In the central part of the process is called the CPU (Central processing units) which is the main process units and the most important in the computer that controls the entire process from data processing to read data from input devices, process or process until the issue of information (output) to the output equipment.

source:go-kerja.com

Minggu, 17 Januari 2010

Java - Programming Language

          Java is a programming language-based computer to Object Oriented Programming is simple and does not depend on a variety of operating system platforms. Java was created after the C + + and designed such that the small size, modest, and portable (moveable between various platforms and operating systems). The program generated by the Java language can be applets (small application that works on the web browser) or a standalone application that runs with Java Interpreter program. This language developed by Sun Microsystems Corporation. and has many advantages, such as a simple, object oriented, supports the use of distributed, both in the network or the Internet, but it also is open system.Tingkat performance of the resulting system is optimal. Java Programming has been developed for the development of secure web sites and interactive. Besides, by using this programming language, we can include a variety of application programs animation, multimedia, and databases to the Web site. That is why Java became very popular and widely used by system developers and Web Developer.

source:www.beritanet.com

History Hacker and Cracker

Hackers appeared in the early 1960s among the members of student organizations Tech Model Railroad Club in Artifisial Intelligence Laboratory Massachusetts Institute of Technology (MIT). Student group is one of the pioneers of the development of computer technology and they operate with a number of mainframe computers. The word hacker first appeared with a positive sense to refer to a member who has expertise in the field of computers and able to make computer programs better than what has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. The problem, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee USA. 414 is their local area code. The group that came to be called a hacker was convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.

Then, further up other groups to mention themselves hackers, but it's not. They are (especially the men) who have the satisfaction of breaking through computer and phone-jockey (phreaking). True hackers call these people 'crackers' and do not like to hang out with them. True hackers crackers as people look lazy, not
responsible, and not too bright. Real hackers do not agree to say that with a person through the security has become a hacker.

The hackers meeting each year which is held once every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

Understanding Hacker and Cracker

1. Hacker

Hacker is the name for those who provide a useful contribution to the computer network, making a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a group that specializes in the field of games and computers. This Digigumi hexadecimal engineering techniques to change the text contained in the game. For example, the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer. Hacker here means, seek, learn and change things for hobbies and development by following the prescribed legal by game developers. Hackers usually do infiltration-infiltration with the intent to satisfy the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction outsiders "crackers", the network testing of possible aperture into an opportunity of a cracker mengobrak - going through the network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients.

2. Cracker

Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, intentionally against computer security, to deface (changing the web home page) belonged to someone else even to delete data to other people, steal data and generally do cracking for their own benefit, malice, or for any other reason because there are challenges. Some of the piercing done to show the security weaknesses of the system.

source:wartawarga.gunadharma.ac.id

Graphic Design

Graphic design is a form of visual communication using images to convey information or messages as effectively as possible. In graphic design, text, images are also considered as an abstraction of symbols that can be sounded. Graphic design is applied in communication design and fine art. Like other types of design, graphic design can refer to the process of manufacturing, design methods, the product (design), or any discipline that is used (design).
Graphic design art include cognitive abilities and visual skills, including typography, illustration, photography, image processing, and layout.

Limitation Media

Graphic design was originally applied to static media, such as books, magazines, and brochures. In addition, in line with the times, graphic design is also applied in the electronic media, which are often referred to as interactive design or multimedia design.
One-dimensional boundary has changed over the development of thinking about design. Graphic design can be applied to a design environment that includes the processing space.

Principles and design elements

source:www.google.com

DEFINITIONS AND TYPES OF COMPUTER SOFTWARE

     Most people now divides the computer into two parts. The first part is the hardware that is a physical device in the computer. And the second part is the computer software, hardware informing them about what to do and how to do it. If the computer is likened to that of living things, then the hardware is the body such as eyes for seeing, lungs for breathing and other body parts, while the software or the software equivalent of a genius, such as image processing is seen eyes, ordered his hands to lift objects, and forcing the body to breathe using lungs.

Computer Hardware, became part of the machine, and only understand two basic concepts of light (on) and off (off), the concept of on and off is called binary. Computer software developed for the binary can be a way to tell the computer hardware in doing his job. Computer software translates and directs computer users to understand about what can be done by computer hardware.


Most of the computer software created by programmers using a programming language. Programmers write the instructions in programming languages like the language used by people at large in the conversations. The commands are called "Source Code". Other computer programs called compilers used in the source code, and then change the command to the language that can be understood by computers. And the result is called the program executable (EXE).


Computer software is divided into two main categories of software systems and software applications. System programming software that can allow the hardware running properly. Software applications provide the program that allows the user to do something besides run the hardware.


There are also several types of computer software, including:


Software Games - Type software included in the category of entertainment or entertainment, this software has a variety of types. These kinds such as MMOs (Massive Multiplayer Online games), first-person shooters, action games, Roleplaying games, and gaming adventure.


Software Driver - Program in allowing computers to be able to interact with additional hardware devices such as printers, scanners, and video cards.


Software Education - unlike the previous program, this educational software can teach anything from the computer, perform related activities such as typing or various other types of education such as chemistry.


Media player and other media software development - software designed to be able to play or editing digital media like music or video files.


Software Productivity - this type of software allows users to be more productive both in running a business or running other productive activities. Examples of this software is the letter processing software (Ms. Words), a database manager software, presentation software and other software.


Operating system - software that is the source of the other software that can allow other software to run. Examples of the software operating system is Windows Vista, Mac OS X and Linux

source:www.AsianBrain.com

Hardware

  Hardware, is one element of a computer system, a tool that can be seen and touched by humans directly, which supports the process of computerization. In the Indonesian language is called hardware. Is a tool that we can see and we can physically touch, such as the device input devices, device processing, and output devices. This equipment is generally quite sophisticated. He can work on existing orders to him, which is also called the instruction set. With the commands understood by the machine, then the command to perform various activities that the machine understood by the machine so the machine can work on the command structure obtained by it.

source:www.total.or.id

Computer Networking

Computer network is a system consisting of computers and other network devices that work together to achieve a common goal. The purpose of the computer network are:
Share resources: for example, shared use of printers, CPUs, memory, hard drive
Communication: eg electronic mail, instant messaging, chat
Access to information: for example web browsing

In order to achieve the same goal, each part of the computer network and provide service request (service). Party requesting the service is called a client (client) and that provide services called the servant (the server). This architecture is called client-server systems, and is used in almost all computer network applications.

Classification Based on the scale:
Personal Area Network (PAN)
Campus Area Network (CAN)
Local Area Network (LAN): a computer network that connects a computer to another computer with a limited distance.
Metropolitant Area Network (MAN): principle the same as LAN, only the larger distance, ie 10-50 km.
Wide Area Network (WAN): the distance between cities, countries, and continents. This is the same with the Internet.
Global Area Network (GAN)

Based on the function: Basically every computer network is functioning as a client and server. But there is a network that has a dedicated computer as a server and the other as a client. There is also a computer that has no special function as a server only. Therefore, based on their function there are two types of computer networks:
Client-server

Network is the computer with a dedicated computer as a server. A service / service can be provided by a computer or more. An example is a domain like www.detik.com lots served by the web server computer. Or it could be a lot of service / services provided by a single computer. Examples are jtk.polban.ac.id server that is a multi-service computer with the mail servers, web servers, file servers, database servers and others.
Peer-to-peer

Namely computer networks where each host can be a server and also a client simultaneously. For example in the file sharing between computers on the Windows Network Neighborhood Network have 5 computers (we give the name of A, B, C, D and E) that provide access rights to the files they have. At one time A to access the file share from B named data_nilai.xls and also gives access to the C. soal_uas.doc files When accessing a file from B then A serves as a client and as a give file access to C then A serves as a server. Both functions were performed by the same A network like this is called peer to peer.

Based on network topology, computer networks can be divided into:
Bus topology
Star topology
Ring topology
Mesh topology
Topology tree
Linear topology

Based on the criteria, the computer network can be divided into 4, namely:

1. Based on the distribution of sources of information / data

- This network centralized network consisting of Client and server computers which Client computer that serves as an intermediary to access sources of information / data derived from a single server computer

- Network is a combination of several distributed centralized network so that there are several computer servers that are interconnected with the Client to form a specific network system.


2. Based on geographic coverage can be divided into:

- Network LAN is a network that connects 2 computers or more in coverage such as laboratories, offices, and in 1 cafe.

- MAN network is a network that includes a big city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISPs relay network Internet.

- Network WAN is a network with coverage throughout the world. PT network example. Telkom, PT. Indosat, as well as GSM networks such as Cellular Satelindo, Telkomsel, and much more.


3. Based on the roles and relationships of each computer in the data processing.

- Network Client-Server In this network there are 1 or more server computers and client computers. Computers will be computers or servers to client computers and altered through the protocol software on the network. Client computer as an intermediary to be able to access data on a server computer and the server computer to provide information needed by the client computer.

-Network Peer-to-peer in this network there are no client computer or server computer because all computers can make sending and receiving information so that all computers function as clients as well as a server.


4. Based on the data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer in the form of necessary liaison network cable. Function in the network cable to send information in the form of electrical signals between the network computer.

- Wireless Network (Wireless Network) is a network with the medium of electromagnetic waves. In this network does not need a cable to connect between computers that use electromagnetic waves to send signals between the computer information network

source: id.wikipedia.org

Understanding Computers

     Computers are tools used to process the data according to the procedures that have been formulated. Computer word originally used to describe the work people do arithmetic calculations, with or without tools, but the meaning of this word and then transferred to the machine itself. Their origins, processing information almost exclusively related to arithmetical problems, but modern computers are used for many tasks unrelated to mathematics.
In such a definition is a tool like a slide rule, mechanical calculator types ranging from abacus, and so on, until all contemporary electronic computers. Better terms suitable for a broad sense such as "computer" is "that process information" or "information-processing system."
According to the history of computers, computer generation is divided into 5 parts.


source: id.wikipedia.org