Google Drive Definition and Functions - Google Drive is a storage service that is owned by Google. Google Drive is long dilunjurkan ie since 24 April 2012. Google users will get the service drive of 5 GB of free storage. Google Drive is a change from Google Docs, if my friend opened google docs then google will be redirected to the drive. Functions and Advantages of Google Drive
Google Drive has a function like Dropbox is syncing data from your PC, so my friend can make and share data and documents in the Google drive. Moreover buddy can also access data files from anywhere in the home or in the office by connecting to the internet of course.
Another advantage that is Google Drive has been integrated with Google services including gmail liannya, Gplus, google search and more.
If my friend wants to try this google drive drive.google.com please go directly to the login is using email buddy so that my friend can use Google Drive. Later will appear as shown below if google buddy drive is activated, but if not please wait for the notification from google email to my friend,
If you've successfully logged in and Google Drive is already active friend can directly download files / folders as shown below,
Windows 8.1 is an update of the Windows 8 operating system. First unveiled and released as a public beta in June 2013, it was released to manufacturing on August 27, 2013, and reached general availability on October 17, 2013, almost a year after the retail release of its predecessor. Windows 8.1 is available as a free update for existing Windows 8 and Windows RT users via Windows Store, but unlike the service packs of previous versions of Windows, it is not distributed through Windows Update, and users who obtained 8 outside of retail copies or pre-loaded installations (i.e. volume licensing) must obtain 8.1 through new installation media from their respective subscription or enterprise channel. According to Microsoft's software lifecycle policies, installation of Windows 8.1 is required to maintain access to Windows 8's mainstream support after January 12, 2016.[1]
Released as part of a shift by Microsoft towards regular, yearly updates for its platforms and services, Windows 8.1 was primarily intended to address the complaints of Windows 8 users and reviewers on launch. Visible enhancements includes an upgraded Start screen, additional snap views, additional bundled apps, tighter SkyDrive integration, Internet Explorer 11, a Bing-powered unified search system, restoration of a visible Start button on the taskbar, and the ability to restore the previous behavior of opening the user's desktop on login instead of the Start screen. Windows 8.1 also added support for emerging technologies such as high resolution displays, 3D printing, Wi-Fi Direct, and Miracast streaming.
Windows 8.1 received relatively positive reception, with critics praising the expanded functionality available to apps in comparison to 8, its SkyDrive integration, along with its user interface tweaks and the addition of expanded tutorials for operating the Windows 8 interface. Despite these improvements, 8.1 was still panned for not addressing all of the digressions of 8 (such as a poor level of integration between Metro-style apps and the desktop interface), and the potential privacy implications of 8.1's expanded use of online services.
NAMA : TITI NUR JAYANTI KELAS : XI RPL 2 How to Install Kaskus Emoticons in WordPress Blog
Install Kaskus emoticons in wordpress blog is easy. This is because Kaskus Emoticons will didinstal a wordpress plugin. Kaskus emoricon very useful to make emoticons Kaskus style. As we know, kaskus Indonesia is the largest forum in the motto written The Largest Indonesian Community. Jump aja gan emotions we put the plugin in our wordpress blog. the following ways: How to Install Kaskus Emoticons 1. Login to your wordpress.org blog. 2. At Plugins feature, click Add New. 3. Type kaskus emoticons in the field provided and click Search Plugins. 4. The results are as shown below, and then click Install.
5. Click Install Now, and then click Active plugin to activate it. How to Use Emoticons Kaskus To insert an emoticon kaskus in wordpress blog post, just click the K button and just select what you want to use emoticons..
Meanwhile, for readers who want to use emoticons kaskus when commenting, how can just click the + sign at the bottom of the comment form and select emoticons as you wish.
Another way to install it is to download the plugin Kaskus emoticons from the web wordpress.org plugin download kaskus emoticons here. Then uploaded to the hosting wordress and activate the above way. Thanks.
NOER IZZA AFCARINA XI RPL2 how to create a blog via hp or OperaMini
بسم االلهالرحمن اارحيم
Assalamu wr.wb Good afternoon sob , at noon today Warim want to post ni .. Tpi before posting Warim , Warim want aidzin dlu terminal sma blogger friends , terminal aidzin walfaidzin , sorry sob lahin and inner well , good x Warim got the same one blogger friend , Warim 'm sorry ,
yes already , go to the topic , How to Create a Blog Through operamini it is not impossible anymore . If you are thinking of making a blog should be connected to the Internet by using a computer , Laptop etc then do you think it's wrong. Then Is How to create a blog via operamini this could be? Javanese , " Of course I can
To create a blog using my HP recommends that enroll in mywapblog Mywapblog.com because its already quite full , we need to create a blog in Mywapblog is a HP ( surely you've got dong ) and a decent internet connection ( my connection saranin internet more than 3 KB / s though not until slam tuh hp gara2 slow haha ) if it please enter Mywapblog.com deh friend then you will see a bleak picture below
Then isiformulir registration and use original email to the email as it will be useful for confirmation . Mywapblog available in several subdomains such as : mywapblog.com , heck.in , pun.bz , mwb.im , and yu.lt if the form has been filled all just click Register .
Now the final step shob , stay in confirmation by the way , open the email shobat in use to register earlier , there was an email from mywapblog and open the email and click on the link in the email and your blog is finished taraa made . Please Create post buddy . Happy Blogging
well maybe it's just who can Warim write , how to create a blog via hp or operamini .
The Most Powerful Speed up Internet Connection What's up buddy ? On this occasion I will write an article about how to speed up internet connection , it is mate .. if we are happy air ria internet its slow but otherwise this connection we also take a long time to be bored , do not you think ? For my friend who was bored with slow internet connection , my friend can listen to the following article : Powerful Ways to Speed up Internet Connection Change the setting Bandwidth In this way we can eliminate buddy restrictions on bandwidth , because the Windows OS is limited banwidthnya up by 20 % .
• Click Start - > Run - > gpedit.msc • Then select the Administrative Templates • Then click on QOS Packet Scheduler option
• Change the " limit reservable bandwidth " so " Enable " . • Then change " Bandwidth limit " of 20 to 0 , and then click Apply - > OK
• After all the process is completed restart the computer • See the results . ^ _ ^
Ubuntu is a free computer operating system ( OS ) that is useful for the basic operation of the computer . The latest version of this program is 12:04 Ubuntu Beta 2 , which was released on March 29, 2012 . Ubuntu software created and developed by Canonical Ltd. .
This computer software has advantages in its open source and free . In addition , Ubuntu also has been equipped with a variety of computer applications for various purposes , so that users no longer need to install software for office applications such as general , internet , and multimedia . Ubuntu is an operating system based on GNU / Linux ( Debian ) . Ubuntu is routinely updated version , stable version was released about 6 months. Ubuntu open source operating system became the most popular in the country .
Ubuntu program widely applied and used by many computer users , especially those fond of Open Source software . Ubuntu is free software ( open source ) . To install the latest version of this program , your computer must have a minimum specification Pentium 4 processor 1 GHz CPU , memory ( RAM ) 1 GB , monitor resolution of 800 x 600 pixels , and a hard drive with at least 15 GB of free space .
Ubuntu Operating System Software Info
Type : Operating System Functionality and usability : The fundamental operation of computer Target circles penggguna : All computer users Developer : Canonical Ltd. . Latest version : Beta 2 Ubuntu 12:04 Released: March 29, 2012 Product info page : http://www.ubuntu.com/ Download : Download Ubuntu 12:04 Beta 2 here The size of the source file : 701 MB Price : Free
System Requirements & Requirements Installing Ubuntu Beta 2 12:04
Capacity Hard Drive : Minimum 15 GB Memory / Random Access Memory ( RAM ) : At least 1 GB Monitor resolution : 800 x 600 pixels
4 Benefits SmadAV Newest smadav now focus on 4 main benefits so that : 1 ) additional protection for your computer , 100 % compatible with the following antivirus ! most antivirus can not be installed simultaneously next antivirus , antivirus because it is designed for primary protection on your computer . different with smadav , smadav antivirus is a type of in - design so additional protection , up to 100 % compatible and can work well although there have been other antivirus in your computer , in this matter smadav plays a 2nd layer of defense . smadav has its own way (behavior , heuristic , and whitelisting ) in detecting and cleaning viruses will further add to the security of the computer . resource usage because very small smadav , smadav will not add to the weight of its use in the performance of your computer . so , with a mix of protection and on smadav antivirus has been installed on your computer will strengthen the defense of your computer from virus infection .
2 ) best usb antivirus ( total protection usb flash ) usb flash media is among the largest spread of the virus in Indonesia . smadav have special technology for total prevention of virus that spreads via a usb pendrive . smadav mission is no longer 100 % viral infection of the flash . smadav have enough signatures of viruses that infect the flash , and has a special power for detecting new viruses in flash though not in the database SmadAV . not just prevention , smadav also can clean the viruses that infect and restore virus hidden files in the USB flash
3 ) best for off line use ( no need to keep up to date ) smadav very well be used for computers that rarely or let alone not connected to the internet . smadav do not need anti-virus up to date as often as the next up date that generally do much less per week / day . smadav generally do up date only 1 month (monthly ) . smadav not rely heavily on signature / virus database , but rather relies on behavior detection techniques , heuristic , and whitelisting .
4 ) tools make cleaner and clean the virus smadav also can clean the virus that has infected the computer and do the repair registry altered by the virus . The next antivirus does not usually do the cleaning up the computer registry has not been cleared to return to normal after the antivirus. many supporting tools are included in smadav so weapons do the cleaning for viruses . note : not all types of viruses can be cleaned smadav , smadav have still not been able to clean the virus type or types of rootkits penginfeksi program ( eg : virus Ramnit , Sality , Alman , virut , and others. ) because this type of virus has destroyed most large files your program . Our focus today is thoroughly cleaning for two types of viruses not only the types ( eg : wormshortcut virus , cervical , mso , eagle , etc.
Delphi is a programming language (development language ) used remedy designing an application program .
a. usefulness of Delphi 1 . to make a windows application 2 . To design a graphical program applications 3 . To create a network -based program ( client / server ) 4 . To design the program . Net ( internet -based )
b . Delphi excellence 1 . IDE ( Integrated Development Environment ) or application development environment itself is one of the few advantages of Delphi , in which there is a menu - a menu that allows us to create a program project . 2 . The compilation process fast , by the time we make the application run on Delphi , it will automatically be read as a program , without a separate run . 3 . Easy to use , Delphi source code which is a derivative of Pascal , so an adjustment is not needed anymore . 4 . Multi purphase , meaning the Delphi programming language can be used to develop a variety of application development purposes
How to Use Delphi for Beginners First open the Delphi application ( Start- Program Files - Embarcadero Rad Studio Delphi 2010 to 2010 ) if the first is then lngkah 1 . Click File - New - Delphi VCL Delphi VCL Application Form Application .
2 . Save first if you want to run or operate Delphi sehinggadata Suchreplay can be edited , click the red circle on the way to the keyboard or Ctrl + Shift + S. So All Units / Forms will be recorded
3 . In the Tool Palette select additional right click on the image and the shape will be red sepertipanah leads to the left shows the image will be displayed . red kirilingkaran mounting the image in the picture as a picture 4 . Click on the image shown in the red circle then appeared gambardi editor where we find the desired image and then click the image you are looking for such bebanyang and OK
5 . In the Standard Tool Palette , Enter TLabel , TEdit , TButton
6 . Click Properties on the left Label1 Caption seek to change the name as well as how to replace andnamelabel Button 1 .
7 . Click Properties on the left Label1 Caption seeking to rename andnamelabel as well as how to replace Button1 .
8 . 2x click on the red circle Preview/Button1 then loaded like this : " MessageDlg ( ' Name : ' + Edit1.Text , mtinformation , [ mbok , mbcancel ] , 0 ) ; " biruuntuk circle back to Form Design / Display .
9 . Starting the last way Delphinya Click the green button on the form or click F9 , ifsomething wrong and will not appear check back on Codingan / tool less fitting . If you want to add 2x Button Exit Button Click on it and fill out the " Close ";
Asus plans to introduce a mobile device with two operating systems, Android and Windows, is likely to be inhibited, or it could be stopped. Because, Microsoft and Google both do not want the operating system to be in a single device.
Asus reported by The Wall Street Journal (14/03/2014) gets pressure from Google and Microsoft fatherly delay production duo laptop Transformer Book TD300 which features a dual-boot Android and Windows. TD300 Asus introduced at the International Consumer Electronic Show in January 2014.
TD300 was developed based on the Asus Transformer tablet. Tablets are modified by adding a physical keyboard (the keyboard) so that the model resembles a laptop.
Microsoft has a good reason why they do not want to share space with Google in one device. The main reason is Google considered to be undermined business desktops and laptops that had been controlled by microsoft.
While Google, opens his heart to share space with Windows. But, in the Duet Transformer Book TD300, Google demanded that Asus uses pure Android. That is, do not do any modification on Android being used on the device.
In addition to Asus, the actual producers also participated prosesorIntel harmed by inhibition of the production of laptops that run Android and Windows. Intel is currently trying to expand its market into the mobile realm, by producing prosesoruntuk smartphones and tablets.
Products that run two operating systems at once like the Asus Transformer Book artificial Duet, Intel is believed to attract the attention of consumers who want to work and relaxation with a mobile device. PC-oriented applications can be run with Windows, while the mobile application can be enjoyed by Android.
Intel had previously been working closely with Microsoft in the PC market. But the success of Windows on the PC and notebook market is not followed by success in the market of smartphones and tablets. Hope Intel was also placed on two devices running the operating system.
Intel's processor with the x86 architecture is also designed so that run well on the Android operating system, in order to compete with ARM architecture processors. Do not stop there, Intel also conducted business with the release of firmware that supports both Windows and Android.
Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be viewed as an evolution of the classic Visual Basic (VB), implemented on the .NET Framework. Microsoft currently supplies two main editions of IDEs for developing in Visual Basic: Microsoft Visual Studio 2012, which is commercial software and Visual Basic Express Edition 2012, which is free of charge. The command-line compiler, VBC.EXE, is installed as part of the freeware .NET Framework SDK. Mono also includes a command-line VB.NET compiler. The most recent version is VB 2013, released November 18, 2013.
2002 (VB 7.0) The first version, Visual Basic .NET, relies on .NET Framework 1.0. The most important feature is managed code, which contrasts with the classic Visual Basic.
2003 (VB 7.1) Visual Basic .NET 2003 was released with .NET Framework 1.1. New features included support for the .NET Compact Framework and a better VB upgrade wizard. Improvements were also made to the performance and reliability of .NET IDE (particularly the background compiler) and runtime. In addition, Visual Basic .NET 2003 was available in the Visual Studio.NET Academic Edition, distributed to a certain number of scholars from each country without cost.
2005 (VB 8.0) After Visual Basic .NET 2003, Microsoft dropped ".NET" from the name of the product, calling the next version Visual Basic 2005.
2008 (VB 9.0) Visual Basic 9.0 was released along with .NET Framework 3.5 on 19 November
2007. 2010 (VB 10.0) In April 2010, Microsoft released Visual Basic 2010. Microsoft had planned to use Dynamic Language Runtime (DLR) for that release but shifted to a co-evolution strategy between Visual Basic and sister language C# to bring both languages into closer parity with one another. Visual Basic's innate ability to interact dynamically with CLR and COM objects has been enhanced to work with dynamic languages built on the DLR such as IronPython and IronRuby. The Visual Basic compiler was improved to infer line continuation in a set of common contexts, in many cases removing the need for the "_" line continuation character. Also, existing support of inline Functions was complemented with support for inline Subs as well as multi-line versions of both Sub and Function lambdas.
2012 (VB 11.0) Visual Basic .NET 2012 was released along .NET Framework 4.5.
2013 (VB 12.0) Visual Basic 2013 was released .NET Framework 4.5.1 and Visual Studio 2013 but did not include new language features
How to Strengthen WIFI signal Strong wifi signal will ensure optimal data transfer speed . While a weak wifi signal will make the process of data transfer will run slower than it should be .
1 . Check the router settings Many routers support standard 2 wifi , 802.11b and 802.11g . Make sure you select the 802.11g because the technology is newer than that - b . If your router has the support of more recently as 802.11ac , please use it after confirming that a laptop , a smartphone and your computer supports . 2 . Move the Router Next is to make sure that the device you have a router with minimal obstruction . Wall , electronic devices and room divider will weaken the wifi signal . To increase coverage, you should place the router in the middle of the room . 3 . Use omni antenna
Omni antenna to the router Omni antenna beam works to increase wifi signal so as to reach a larger area even without repeaters . To replace the standard antenna of your router with this device . 4 . Use Repeater As the name implies , Repeater will capture and amplify the signal so it can be spreading more widely . Put in place the repeater least get 1 bar signal . If you have more than one router , check whether the router has a function as a repeater .
How to Strengthen WIFI signal Strong wifi signal will ensure optimal data transfer speed . While a weak wifi signal will make the process of data transfer will run slower than it should be .
1 . Check the router settings Many routers support standard 2 wifi , 802.11b and 802.11g . Make sure you select the 802.11g because the technology is newer than that - b . If your router has the support of more recently as 802.11ac , please use it after confirming that a laptop , a smartphone and your computer supports . 2 . Move the Router Next is to make sure that the device you have a router with minimal obstruction . Wall , electronic devices and room divider will weaken the wifi signal . To increase coverage, you should place the router in the middle of the room . 3 . Use omni antenna
Omni antenna to the router Omni antenna beam works to increase wifi signal so as to reach a larger area even without repeaters . To replace the standard antenna of your router with this device . 4 . Use Repeater As the name implies , Repeater will capture and amplify the signal so it can be spreading more widely . Put in place the repeater least get 1 bar signal . If you have more than one router , check whether the router has a function as a repeater .
JavaScript (JS) is a dynamic computer programming language. It is most commonly used as part of web browsers, whose implementations allow client-side scripts to interact with the user, control the browser, communicate asynchronously, and alter the document content that is displayed. It is also being used in server-side programming, game development and the creation of desktop and mobile applications.
JavaScript is a prototype-based scripting language with dynamic typing and has first-class functions. Its syntax was influenced by C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. The key design principles within JavaScript are taken from the Self and Scheme programming languages. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.
The application of JavaScript to use outside of web pages—for example, in PDF documents, site-specific browsers, and desktop widgets—is also significant. Newer and faster JavaScript VMs and platforms built upon them (notably Node.js) have also increased the popularity of JavaScript for server-side web applications. On the client side, JavaScript was traditionally implemented as an interpreted language but just-in-time compilation is now performed by recent (post-2012) browsers. tugas minggu ke 2
muhammad safreza 11 rpl 2 (JavaScript) JavaScript was formalized in the ECMAScript language standard and is primarily used as part of a web browser (client-side JavaScript). This enables programmatic access to computational objects within a host environment.
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu ke : 2
Debian is an operating system composed of free software mostly carrying the GNU General Public License. The operating system is developed by an internet collaboration of volunteers aligned with The Debian Project. Debian systems can use either the Linux kernel (known as the Debian GNU/Linux distribution), the FreeBSD kernel (known as the Debian GNU/kFreeBSD distribution) or, more recently, the GNU Hurd kernel (more precisely, the GNU Mach microkernel and its servers; known as the Debian GNU/Hurd distribution). Debian GNU/Linux is one of the most popular Linux distributions for personal and Internet server machines. Debian is seen as a solid Linux, and as a consequence has been used as a base for other Linux distributions; DistroWatch lists 144 active Debian derivatives. Debian has been forked many times but is not affiliated with its derivatives. The vital role the Debian project plays in free software is demonstrated by its advancement of development and security patches relating to its strong participation in CVE compatibility efforts. The Debian project released a new kernel as of Wheezy's release date: the Debian GNU/kFreeBSD kernel. Debian now supports two kernels, Linux and kFreeBSD, and offers other kernels as development works (GNU Hurd and NetBSD). This project's new kernel has recently come out of preview but still lacks the amount of software available as on Debian's Linux. The kernel is offered for Intel/AMD 32-bit and 64-bit architecture machines. Wheezy is officially supported on ten machine architectures and also brought support for two new architectures: s390x and armhf. Debian is still primarily known as a Linux distribution with access to online repositories hosting over 37,500 software packages. Debian officially hosts free software on its repositories but also allows non-free software to be installed. Debian includes popular programs such as LibreOffice, Iceweasel (a rebranding of Firefox), Evolution mail, CD/DVD writing programs, music and video players, image viewers and editors, and PDF viewers. The cost of developing all the packages included in Debian 5.0 lenny (323 million lines of code) using the COCOMO model, has been estimated to be about US$ 8 billion. Ohloh estimates that the codebase (68 million lines of code) using the same model, would cost about US$ 1.2 billion to develop.
Charger or battery charger gadgets eg : mobile phones , laptops , Ipad , digital cameras , tablets , etc. usually immediately wrote us to plug into a power source or outlet . But there ya clay technological innovation from a Swedish company that makes the charger with the power source is called PowerTrekk water weleh2 ...! . How could just use water can be electric ? what similar to hydroelectricity ? kekeke . The trick is to utilize processes and chemical reactions , namely Sodium Silicide substance combines with water to produce hydrogen , which is then be processed into electrical energy . With only 1 tablespoon of water , equipment charger to charge your mobile phone energy consumption for 10 hours loh .
Sodium Silicide itself is not a pure substance produced by nature , but is a new chemical developed by the company SiGNa Chemistry , a chemical company from New York , USA . PowerTrekk itself is the first commercial product that uses substances ini.Peralatan charger is capable of charging the battery almost all electronic gadgets devices using a USB connection . In addition , the Water Power Charger can be used on all types of water , be it fresh water , rain water , even salt water and sewage water puddles aka ... kekeke ..
This cool product recently showcased at CES ( Consumer Electronics Show ) 2012 in Las Vegas , with prices priced around € 199 ( or about $ 260 ) and the replacement of "fuel " Sodium Silasida for € 2/buah .
Excess Water Power Charger This is the tool is not affected by the power and radiance of the sun as well as Solar Charger . But even so , it looks like this tool will not sell well in Africa and the desert areas like in the countries of the Arabian Peninsula , as the availability of water is quite difficult in the area , but for coastal areas , this tool seems to be a good alternative for mobile phone charger portable .
In the process of charging or battery charging electronic gadgets with this tool is quite easy . Sodium Silicide stored at the bottom of a small container called PowerPukk , at the top of this powerpukk , pour water in as needed . after it locks the container , and let the chemistry between Sodium Silicide and water occurs and turns it into electricity . After that , power is applied to the USB port located on PowerTrackk body , which can be used mencharger HP or your gadgets with a USB connector equipment . Chemical process is safe and non-toxic to the environment , the only " dregs " that happens is water vapor .
Yuni Anggarawati (XI RPL 2) Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
Certainly not upset that my friend has a memory card , but in it there is a file that is exposed to the virus , so that the file is corrupt and his friend wants to format it , but not upset berhasil.Pasti not ? ?
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to . Formatting Through PC ( Windows Explorer ) 1 . Put the memory card into the card reader 2 . Plug it into a PC buddy 3 . Look for memory card drive , the example in the drive ( F , G , H , I) 4 . Then right click on the memory drive , then select " Format " 5 . After that will appear like this , replace with the FAT file system .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
6 . Berlah then check the option " Quick Format " . 7 . Click " START " , wait until the completion poses . 8 . Last eject memory , and input into the phone .
using Properties 1 . Put the memory card into the card reader 2 . Tancapkankan to PC buddy . 3 . Right click on the memory card drive and select " Properties " .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
4 . Then click Tools > click Check Now . 5 . Tick the option "Automatically check for system errors " and " Scan for and attempt recovery of bad sectors " .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
6 . Then click start and wait until the process is complete . 7 . Then eject the memory card into the phone and input buddy .
Fixing the Command Prompt When my friend see the message " Error " in 2 ways above then the PC can not reformat again my friend can try the following steps . 1 . Put the memory card into the card reader . 2 . Tancapkankan to PC buddy . 3 . Look for memory card driver . 4 . Then Click START > Run > and type CMD . Then the Command Prompt window will appear 5 . Then type ' FORMAT i :/ FS : FAT ' . ( i ) is a memory card drive will be in the format , if memory drive is on drive G then wrote G. ( FORMAT G :/ FS : FAT ) , etc.
Yuni anggarawati (XI RPL 2) How to Make a Bootable flash Through the Windows 8 100 % Work
How to Make a Bootable Through the Windows 8 stick - Hi my friend this time to share a little about the way we order the flash can be used as a CD installer to install the Windows OS , Linux etc. With using this flash would we gain several advantages and benefits, such as the installation process will be faster than mengguanakan OS install CD . Well just my friend who wanted to try to make a bootable Windows 7 , 8, etc. please read the following ways :
Easy Ways to Create Bootable Flashdisk Through
1 . Provide a minimum of 4 GB flash 2 . Please download the application Rufus or Click here 3 . Well after the application window opens , select Drive FD buddy on the other device and to leave them at the default 4.When Create a bootable disk , please click on the CD image ISO file search windows 8 pal 5 . Then click the start button and wait until the process is complete ( usually a very long process so wait aja sob over a cup of coffee !)
Well after all steps completed now my friend can use a flash my friend to install the OS Windows 8 from the flash .
Powerful Ways Delete Shortcut Virus on flash - Hi friend all ? This time I will share information about the new How to Overcome Shortcut Virus on flash . These viruses often be found on the flash , usually after we transfer data from the cafe . Actually, this virus is not very dangerous . But if ignored will cause effects that can damage your computer system . This shortcut virus can reproduce itself like a virus in general . This virus can hide files on the flash and make a new shortcut icon that can harm your PC if clicked pal .
Well , now I will look at how to remove the shortcut virus from pendrive friend
Attach the flash buddy on your computer / laptop . Then open a command prompt : Click Start > All Programs > Accessories > Command Prompt . Command Prompt window opens . Now in the command prompt window select driveflashdisk anda.misalnya name " F : " ( without the quotes ) and press Enter ( adjusted to the destination drive on your computer ) . Next type the command " attrib - s - h * . * / S / d " ( without the quotes ) and press Enter . Process will run approximately 1-2 minutes . Once the notice is complete , now you see the flash and data If you do not want complicated to remove shortcut virus , my friend can download anti- virus software that can protect your flash from harmful viruses .
How to Install and Configure DNS Server in Ubuntu Server 12:04 How to Install and Configure DNS Server in Ubuntu Server 12.04 ~ now we will discuss about how to install and configure a DNS server, install the TPI before this friend you should first install the Web server! - how to install DNS ( sudo apt - get install bind9 )
- par with DNS I use the IP address 192.168.1.2 with the domain name ubuntu.lan $ Sudo su # Cd / etc / bind / # Nano named.conf.local tamabahkan following script ;
zone " ubuntu.lan " { type master ; file " / etc / bind / db.ubuntu " ; } ;
zone " 1.168.192.in - addr.arpa " { type master ; notify no ; file " / etc/bind/db.1 " ; } ;
Writing on line IP zone " 1.168.192.in - addr.arpa " ( written upside down . ) Copy file db.local
# Cp db.local db.ubuntu # Cp db.local db.1
Edit db.ubuntu , script ;
; ; BIND the data file for local loopback interface ; $ TTL 604800 @ IN SOA ns.ubuntu.lan . root.ubuntu.lan . ( 2 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL ; @ IN NS ubuntu.lan . @ IN A 192.168.1.1 ns IN A 192.168.1.1 www IN CNAME ubuntu.lan .
Edit db.1 , script ;
; ; BIND the data file for local loopback interface ; $ TTL 604800 @ IN SOA ns.ubuntu.lan . root.ubuntu.lan . ( 2 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL ; @ IN NS ubuntu.lan . 1 IN PTR ubuntu.lan . ns IN PTR 192.168.1.1 www IN PTR 192.168.1.1
Add DNS - nameserver configuration interface
# Nano / etc / network / interfaces dns - nameservers 192.168.1.1 dns - search ubuntu.lan Configuring the DNS - server Name dns client - ipv4 settings
; ; Query time : 6 msec ; ; SERVER : 192.168.1.1 # 53 ( 192.168.1.1 ) ; ; WHEN : Sun Sep 9 08:00:55 2012 ; ; MSG SIZE rcvd : 56
How to Install and Configure DNS Server in Ubuntu Server 12.04 ~ so that I can install and how to menegenai konfigursi hopefully bermamfaat DNS Server for my friends , there apabaila kekuranagan and similarities articles apologize because I am just an ordinary person who can not stand alone .
LUTVIATUS SAADA XI RPL 2 EXPLANATION GIMP GIMP image processing tool is multi - platform . GIMP stands for GNU Image Manipulation Program . GIMP is suitable for a variety of image processing work , including photo repair , merging and image making . GIMP has a wide range of capabilities . This software can be used for a simple paint program , high -quality photo repair program , an online batch processing system , a mass production image rendering , image format converter , etc. . GIMP is included in the category of open-source software or free software . GIMP does not require a license such as Adobe Photoshop , or Corel Photo-Paint . In addition this software is open-source software , this software also includes a multi - platform software or means can be operated in many OS (Operating System ) including Windows and Linux . For those beginners who are interested in editing and image manipulation , this software will be very helpful , because you can learn the basic - basic image editing . You certainly do not need to worry because this software also supports many image formats , including JPG and PNG and many more other image formats . The GNU Image Manipulation Program, or better known as GIMP is a graphics software for raster-based manipulation. GIMP runs on the GNOME desktop, and released by the GNU General Public License GIMP was originally developed for the X11 desktop that runs on a Unix platform, however this time the GIMP has been ported to some other operating system platforms ie MS Windows and Mac OS. The graph produced by the GIMP XCF format and stored can be exported into various image formats such as bmp, jpg, gif, pdf, png, svg, tiff, and many others.
A simple example using a photo editing application GIMP Image Editor:
Open Applications GIMP Image Editor
At the beginning of the application GIMP Image Editor will look like that Toolbox (left), the working window is empty (middle), and Layer, chanels (right).
Pictures That Will Open In-Edit Select File> Open from working window is empty. Then select the image to be edited.
At the time of this simple example, we will try to change the display a little brightness, contrast, and sharpness of the image with merubahLevels, Brightness & Contrast, Curves and Colors menu in the facility.
Levels Changing Picture
To change the Levels image, do the following manner: select the Colors> Levels
Fox Input Levels and Output Levels according to our wishes, or to facilitate click Auto that automatically adjusts the picture Levelsyang accordance with our earlier edit.
Changing Brightness & Sharpness Picture
Go to Colors> Brightness-Contrast
Adjust the Brightness value (brightness) and Contrast (sharpness) as we want to edit our pictures.
Changing curves of Figure
Go to Colors> Curves
arrange the curve of the image by dragging the curve as shown above.
Saving edited photos that have been completed after finished editing the image when you save it will ask a few questions like the screenshot below:
Hard drive is one of the most important components in a computer , for that you should be familiar with the type of hard drive that matches the condition of your computer . In Outline of HD can be classified into 3 Piece That IDE , ATA , and SATA , then what is the difference of the three types of HD Above ? ? ? The following I will explain one by one on the hard disk type
1 . IDE
IDE ( Integrated Drive Electronics ) is a standard interface between a computer motherboard data bus with disk storage . IDE interface created by the IBM PC Industry Standard Architecture ( ISA ) 16 - bit bus . IDE interface is an interface for storage devices that can teringrasi to disk or CD - ROM drive . Although IDE is a general technology , most people use the term to refer to the IDE ATA specification . While the AHCI ( Advanced Host Controller Interface ) is a hardware mechanism that allows software to communicate with such SATA host bus adapters are designed for hot - plugin and native command queuing ( NCQ ), which can increase the ability of computer / system / hard disk , especially in a multi- tasking environment by allowing the drive to run the read and write commands are sent at random with the aim to optimize head movement in the reading process . AHCI has been supported by various operating systems such as Windows Vista and Linux kernel 2.6.19 .
2 . ATA
Most types of drives used by computer users is the type of ATA ( known as IDE drives ) . Type ATA standard created by 1986 by using 16-bit parallel and continues to grow with the addition of transfer speed and the size of a disk . Final standard is ATA - 7 was first introduced in 2001 by the T13 committee ( the committee responsible for determining the standard ATA ) . Type ATA - 7 has a data transfer rate of 133 MB / sec . later during the year 2000 set a standard for parallel ATA which has a data rate of 133 MB / sec , but there are problems with parallel ATA singnal things thymine , EMI ( interference electromognetic ) and intergitas data. Then the industry in trying to resolve the problems caused by the parallel ATA and created a new standard called Serial ATA ( SATA )
ATA ( Advanced Technology Attachment ) using a 16-bit parallel computer used to control the equipment , and has been in use for 18 years as the standard . Differences SATA and ATA easiest data cable and power is different .
ATA standards , such as the 200GB Western Digital model , have a two -inch ribbon cable with 40 pin data connections and requires 5V to each pin of the 4 pin connection . While the 120 GB SATA such as Digital western half inch models have wide , 7 connector so that the data connection is thinner and easier to organize data kebel . SATA data cable has a maximum length of 1 meter ( 39.37 inches ) longer than the ATA is only 18 inches .
3 . SATA
With 15-pin SATA power cable with a 250 mV , seems to require a lot more power in comparison with the 4-pin ATA , but in fact the same . And most good SATA capability is perhaps reaching a maximum bandwidth of 150 MB / sec
Other advantage of SATA is SATA is made with hot-swap capability so that it can turn off and turn on without shut down the computer system .
While in the price , a little more expensive SATA drives compared ATA drives , SATA kesimpulanya have advantages over ATA connector, power , and most importantly performance. ATA standard has now started on the left and choose the manufacturer of the SATA standard .
Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C. The language provides constructs intended to enable clear programs on both a small and large scale.
Python supports multiple programming paradigms, including object-oriented, imperative and functional programming or procedural styles. It features a dynamic type system and automatic memory management and has a large and comprehensive standard library.
Like other dynamic languages, Python is often used as a scripting language, but is also used in a wide range of non-scripting contexts. Using third-party tools, such as Py2exe, or Pyinstaller, Python code can be packaged into standalone executable programs. Python interpreters are available for many operating systems.
CPython, the reference implementation of Python, is free and open source software and has a community-based development model, as do nearly all of its alternative implementations. CPython is managed by the non-profit Python Software Foundation.
Methods
Methods on objects are functions attached to the object's class; the syntax instance.method(argument) is, for normal methods and functions, syntactic sugar for Class.method(instance, argument). Python methods have an explicit self parameter to access instance data, in contrast to the implicit self in some other object-oriented programming languages (for example, Java, C++ or Ruby).
NOER IZZA AFCARINA XI RPL2 TUGA MINGGU KE-3 In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to . Formatting Through PC ( Windows Explorer ) 1 . Put the memory card into the card reader 2 . Plug it into a PC buddy 3 . Look for memory card drive , the example in the drive ( F , G , H , I) 4 . Then right click on the memory drive , then select " Format " 5 . After that will appear like this , replace with the FAT file system .
6 . Berlah then check the option " Quick Format " . 7 . Click " START " , wait until the completion poses . 8 . Last eject memory , and input into the phone .
using Properties 1 . Put the memory card into the card reader 2 . Tancapkankan to PC buddy . 3 . Right click on the memory card drive and select " Properties " .
4 . Then click Tools > click Check Now . 5 . Tick the option "Automatically check for system errors " and " Scan for and attempt recovery of bad sectors " .
6 . Then click start and wait until the process is complete . 7 . Then eject the memory card into the phone and input buddy .
Fixing the Command Prompt When my friend see the message " Error " in 2 ways above then the PC can not reformat again my friend can try the following steps . 1 . Put the memory card into the card reader . 2 . Tancapkankan to PC buddy . 3 . Look for memory card driver . 4 . Then Click START > Run > and type CMD . Then the Command Prompt window will appear 5 . Then type ' FORMAT i :/ FS : FAT ' . ( i ) is a memory card drive will be in the format , if memory drive is on drive G then wrote G. ( FORMAT G :/ FS : FAT ) , etc.
A few buddies Some Powerful Ways to Overcome Memory Card Could Not Diformat.Silahkan tried Hopefully useful . ^ _ ^
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 3
Ajax. (also AJAX; /ˈeɪdʒæks/; an acronym for Asynchronous JavaScript and XML)[1] is a group of interrelated web development techniques used on the client-side to create asynchronous web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data can be retrieved using the XMLHttpRequest object. Despite the name, the use of XML is not required (JSON is often used instead. See AJAJ), and the requests do not need to be asynchronous.[2] Ajax is not a single technology, but a group of technologies. HTML and CSS can be used in combination to mark up and style information. The DOM is accessed with JavaScript to dynamically display, and allow the user to interact with, the information presented. JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads. The term Ajax has come to represent a broad group of web technologies that can be used to implement a web application that communicates with a server in the background, without interfering with the current state of the page. In the article that coined the term Ajax,[1] Jesse James Garrett explained that the following technologies are incorporated: • HTML (or XHTML) and CSS for presentation • The Document Object Model (DOM) for dynamic display of and interaction with data • XML for the interchange of data, and XSLT for its manipulation • The XMLHttpRequest object for asynchronous communication • JavaScript to bring these technologies together Since then however there have been a number of developments in the technologies used in an Ajax application, and the definition of the term Ajax. XML is not required for data interchange and therefore XSLT is not required for the manipulation of data. JavaScript Object Notation (JSON) is often used as an alternative format for data interchange,[7] although other formats such as preformatted HTML or plain text can also be used.[8] Asynchronous HTML and HTTP (AHAH) involves using XMLHTTPRequest to retrieve (X)HTML fragments which are then inserted directly into the web page.
Benefits of Microsoft Word 1 . Facilitate the Work Completed The fact that MS Word help us finish all the work can not be denied anymore . Ms Word has hundreds of tools that help us . Start of fad writing , arithmetic tables , to make the images can be done in MS . Just a small example , in MS Word we can make a line with a wide range of choices with only 1 or 2 times of click a mouse . Imagine how hard if you have to use a ruler . Your work can be completed for a long time .
2 . saves Time This benefit is a logical consequence of the benefits at number one . The more we eat the more easily complete the work much time can we save . Just imagine if you want to print the same invitation in large quantities by simply using a typewriter . Can be completed in days . Kalu with ms word we can use the copy and paste , or mail merge .
3 . saves Paper Because microsoft can be edited if something goes wrong , it can greatly save paper consumption . Save paper means also saving paper pulp logging means also reduce deforestation and help prevent global warming . Hehehe up everywhere.
4 Benefits SmadAV Newest smadav now focus on 4 main benefits so that : 1 ) additional protection for your computer , 100 % compatible with the following antivirus ! most antivirus can not be installed simultaneously next antivirus , antivirus because it is designed for primary protection on your computer . different with smadav , smadav antivirus is a type of in - design so additional protection , up to 100 % compatible and can work well although there have been other antivirus in your computer , in this matter smadav plays a 2nd layer of defense . smadav has its own way (behavior , heuristic , and whitelisting ) in detecting and cleaning viruses will further add to the security of the computer . resource usage because very small smadav , smadav will not add to the weight of its use in the performance of your computer . so , with a mix of protection and on smadav antivirus has been installed on your computer will strengthen the defense of your computer from virus infection .
2 ) best usb antivirus ( total protection usb flash ) usb flash media is among the largest spread of the virus in Indonesia . smadav have special technology for total prevention of virus that spreads via a usb pendrive . smadav mission is no longer 100 % viral infection of the flash . smadav have enough signatures of viruses that infect the flash , and has a special power for detecting new viruses in flash though not in the database SmadAV . not just prevention , smadav also can clean the viruses that infect and restore virus hidden files in the USB flash
3 ) best for off line use ( no need to keep up to date ) smadav very well be used for computers that rarely or let alone not connected to the internet . smadav do not need anti-virus up to date as often as the next up date that generally do much less per week / day . smadav generally do up date only 1 month (monthly ) . smadav not rely heavily on signature / virus database , but rather relies on behavior detection techniques , heuristic , and whitelisting .
4 ) tools make cleaner and clean the virus smadav also can clean the virus that has infected the computer and do the repair registry altered by the virus . The next antivirus does not usually do the cleaning up the computer registry has not been cleared to return to normal after the antivirus. many supporting tools are included in smadav so weapons do the cleaning for viruses . note : not all types of viruses can be cleaned smadav , smadav have still not been able to clean the virus type or types of rootkits penginfeksi program ( eg : virus Ramnit , Sality , Alman , virut , and others. ) because this type of virus has destroyed most large files your program . Our focus today is thoroughly cleaning for two types of viruses not only the types ( eg : wormshortcut virus , cervical , mso , eagle , etc.
Way Menginstall Windows XP. For you that not yet tau way menginstal windows xp or again nyari-nyari article way menginstall windows xp can read steps way menginstall windows xp under. Perhaps to some people this thing is very easy but to all the laity user very difficult due to idiosyncratic factors menginstal the computer that less. This article Kamu Klik for for anyone who want learn way menginstal his own computer aright without afraid made a mistake because this tutorial Kamu Klik sertakan with pictures that are very easy understood.
Yuk disimak Langkah-langkah Cara Menginstall Windows XP under:
* -CD Windows XP input is first, then we CD input to CDROM / DVDROM. Then restart computer, then in booting moment we push Delete button in keybord so that we stepped into BIOS (Basic Input Output System) computer. In screen display usually occurred by writing 'Press DEL run Setup to' can we see in picture hereunder:
* Then we will enter in BIOS then choose Boot in menu and choose item Boot Device Priority like in picture under:
* After that Kita will do changes at 1st Boot Device position namely we substitute with CDROM. the way, click ENTER then choose CDROM. Then compress F10 to keep the configuration. choose YES, so will me Restart.
* After in appearance followings compress Enter to further in instal process.
* Further in Lisencing Agreement compress F8 to further.
* In picture, position partition not yet filled by windows system. Compress Enter to menginstal immediately without make partition.
* Or if make partition, Tekan C to make partition. Then input how large capacity partition that in inginkan. and compress Enter to make the partition like seen in picture.
* Then compress Enter to do instal process.
* And choose NTFS file system or FAT file system then compress Enter.
* If move installation process above already true so will appear like picture.
* After that you right up to screen followings click Next.
* Then fill with Nama and Kamu Organisation then compress Next.
* Here Kamu will loaded Produk Key or Serial Number from type windows Kamu compress Next again.
* Isikan name computer and password to access him then compress Next.
* Set Time Zone on course click Next.
* Typical settings: In option settingan network will made by default windows and Custom settings: For mensetting your network by manual last click Next.
* If you connected kejaringan local with domain choose option Yes, then content with DOMAIN name that equal DOMAIN your network and vice versa if not connected kejaringan or connected but without DOMAIN choose option No, again compress Next.
Way Overcome Laptop Die Contracted By Water Sunday, March yang ke 2 2014. | Improve Laptop, Tips Computer
Way Overcome Laptop Terkena Air, Pernahkah you experience incident that unforeseen namely laptop contracted the good water coffee as well as tea. If thing happened you do not panic previously, there is some tips or steps all you have got to do if laptop contracted by water.
Do thing followings for preventing thing that is more fatal if laptop contracted by water, especially in part part which allowed water seep enter like the instance in part keyboards. Overcome Laptop Contracted By Water Cannot Flame
1. Sesegera probably matikan your laptop in a way withdraw power PLN electricity and battery laptop revoked for preventing happened by him konsleting in series in laptop. 2. Dissociating all set that connected to laptop to for preventing happened by konslet so not spread to set others. 3. Immediate turnover laptop until water which might enter can decline and not spread to internal other part in laptop. However if already rash much water that go inside, like it or not you should dismantle part laptop, especially usahakan to can open keyboards because part surely is that likeliest become place seep him water. Besides by exposing part laptop will facilitate air inlet into until accelerate water drainage process.
way overcome laptop contracted by water 4. Wear cloth with absorption that high in part part that can reached and usahakan that parts can dry. If not reached utilized cotton buds meekly. 5. If your laptop occurred by sticker or aksesoris, immediate off sticker if indeed probably occurred by water over there and something moment can seep to laptop internal part. 6. If contracted by spill coffee or other liquid which left / rest residue, utilized cotton buds for cleaning nya.Karena residue could just held water to still are inside laptop internal part.
Read Also : Way Improve Laptop That Die Total
7. Still in laptop with frontality, angin-anginkan laptop so that faster process drainage and do not utilized hair dryer because set issue hot, until water can yawn and steam can spread quickly in interior laptop. 8. If you already confident dry so raft back component laptop and supposing to activate laptop whether can flame or not. And if laptop not flame immediately contact service center to your laptop and informasikan that your laptop have to water to facilitate technician in reform process. Need to be known that though laptop still in period guarantee but if happened by damage due to spill water so guarantee will not apply.
If only information on tersiram laptop prevention way water can be thing that useful.
nama:ario wibowo kelas:XI rpl 2 Instal XAMPP way in Windows
1. Download XAMPP xampp-win32-1.8.1-VC9-installer.exe application. 2. Duplex click file xampp that just You download, next will appear "installer language" window as below: instal xampp, xampp localhost 3. Next choose language. Choose that England Bahasa. Click OK. 4. Sometimes in this process appear error message. If there is, neglect only and keep on with click OK and YES. 2-instal-xampp 3-instal-xamp 5. The following will appear window that the content ask You closes all applications that underway. If all applications been closed, so click Next button. 4-instal-xampp 6. Next You will be asked to choose application that want being installed. Ticks only all options and click Next button. 5-instal-xampp 7. Then You will be asked to determine file " file storage folders location and XAMPP folders. By default will be directed to c location:\xampp. However if You want to keep him in other folders can click browse and tentukan by manual folders who want used. If have finished, keep on and click Install button. 6-instal-xampp 8. Wait few minutes until intalasi process completes. If already appear window as below, click Finish button to complete him. 7-instal-xampp 9. The following, will appear window dialogue like picture hereunder that ask You whether want immediately run XAMPP application or not. If yes, so click YES. 8-instal-xampp
Way Run XAMPP Application
1. Open XAMPP application, can through Start Menu or Desktop, and click icon XAMPP. Or, if You open him that process installation complete so click Yes such as those which seen in picture on. 2. After being opened, go ahead click Start button in Action column until button turns into Stop. By click button, it means that application undertaken. Usually if I use XAMPP , that I start only Apache application and MySQL, because I did not need application like Filezilla, and others. 9-instal-xampp 10-instal-xampp 3. Now open browser You delight, and supposing ketikkan http://localhost / xampp in address bar. If appear appearance like picture hereunder, installation has succeeded. 11-instal-xampp
Safe, finally You succeed menginstal XAMPP application. You now computer already function like server and can run applications based web.
Nama: Moch Nur Rohman Kelas:XI RPL 2 tugas mingguan 1
understanding of disk space
Hard disk is an important component in a computer , because the operating system and all programs stored in the hard drive and its data contributing . Hard disks are perishable goods . To perform maintenance done in terms of hardware and software . For treatment of hard disk hardware side , should be added a fan to reduce the heat on the hard disk . Fan is highly recommended for the hard disk with a speed of 7200 rpm upwards .
In addition it should be noted the data cable settings for air circulation can run smoothly . For care of the software side , enough with the tools you have available when installing the operating system . The tool includes scandisk , and disk defragmenter .
In addition to these tools there are also tools used to perform low - level formatting . Low level format is used to reconfigure the settings on the hard disk head covering , cylender , and sectors .
Low level format is the format of the physical aspect . For each brand hard disk has a separate program for low -level format . To use traditional Seagete SGATFMT4 brands , use the Quantum zerrofill or zdisk , MAXTOR with mud and for western digital with wd_diag . Scandisk is a tool that is used to examine the structure of the file system , the file location table ( file allocation table ) , and be able to determine whether there is a bad sector . Scandisk will run automatically every start if the computer is not shut down properly or power failure occurs . Disk Defragmenter is a tool that is used to regulate the structure or layout of the file so that it will reduce the fragmentation of a hard disk space . Disk defragmenter needs to be done regularly it will improve system performance and hard disk space . How to display the Disk Defragmenter is as follows : 1 . Right click on the Start - select Explorer 2 . Klick a Hard Disk Partition - Right Klick - Properties 3 . After that the menu select Tools - Defragment Now 4 . Analyze Klick first so before we can know how to Defragment Your Hard Disk Condition 5 . If already completed Klick Defragment Keep in mind the greater Hard Disk and The More data will then process the longer we wait any longer than my previous experience Hard Disk Defragment I have never been totally takes 1 hour with a capacity of 160 Gb .
Nama:Moch Nur Rohman Kelas:XI RPL 2 tugas mingguan 2
divide the disk partition
For most computer users ( PC ) sometimes less or little attention to the problem setting / Hard disk usage . Usually given to another person , from purchasing to installation of other programs , and then stay put , never noticed a problem Hard disk .
Here are tips xtypo_info } { set hard disk so that the division could be better and easier . { / xtypo_info }
With the cheapening of this one device and increasing capacity , then its use must also be considered . Although we could have split the 500 GB HDD Being 1 or 2 partitions ( drive C : and drive D :) , but it is a poor way . Here are our tips are partly the result of personal experience .
The division of hard drive there is no specific standard , usually based on the experiences or needs . The best way is to first determine which category will be used . For example Operating System , Data , Master Program , Audio / Video and more .
Keep in mind that the HDD 80 GB ( gigabytes ) of data are not fully able to store 80 GB , as well as read on the computer . For 80 GB HDD , usually only able to store data or to read a maximum of 74 GB . For 40 GB to 37 GB , 160 GB = 149 GB , 250 GB = 232 , 320 = 298 GB , 500 GB = 465 GB , 640 = 596 GB , 1 TB ( terabyte ) = 931 GB and so on . So we can not split the HDD 80 GB drive with 4 each the same size and read all 20 GB .
Here's an example of the division of 160 GB HDD ( read about 149 GB ) , with the Windows XP operating system Drive C : 20 GB ( Label " WinXP " , to install the Windows XP operating system and other programs ) Drive D : 40 GB ( label " Master " , to store various master programs before the install ) Drive E : 40 GB ( The label " Data " , to store data or documents ) Drive F : 49 GB or rest ( label " Media " , for storing a variety of audio and video files )
Why drive C only 20 Gb ? For most people , the C drive as the installation location of the operating system does not require a lot of places . For Windows XP most only 2 GB , Office of 1 GB and the rest of other programs and usually is sufficient . So with a small size would be easier to take care of , such as virus scan , spyware , defragment the hard drive faster and more
In format the HDD , the size usually included in MB ( Mega Bytes ) . In order then read for 20 GB HDD , then we enter the size in MB should be greater than 20,000 . Suppose we specify size 21.500 MB , then this measure will be read around 20 GB . Or it could be added a little like 22,000 MB ( read 20.5 GB ) . Similarly, when determining the size of 40 GB ( filled about 43,000 MB ) . To more easily able to see GigaByte Conversion
When we open Windows Explorer then there will be a My Documents directory and the initial location of My Documents is on drive C ; , complete generally in the folder C : \ Documents and Settings . Storing documents on the C drive by us less safe , and should be moved to a drive other than C. For example, from the example above is drive E :
To change the order of My Documents to open drive / other folder , how to right-click My Documents and select Properties and then click the Move button and select a new location where to store the documents , such as drive E : . { xtypo_sticky } This only changes the location of My Documents to the new location , so that if there is data in My Documents , it must be moved manually to the new location . Old data is still there and not deleted . { / Xtypo_sticky }
After moving locations / changed , then when we save in My documents , the data will be stored on the drive / folder proficiency level ( example above drive E :) , not stored on drive C :
Nama:Moch Nur Rohman Kelas:XI RPL 2 tugas mingguan 3
how to create a bootable os windows 7 using pendrive
1 ) Download the application EasyBCD > EasyBCD is a program that supports windows system 32bit and 64bit . 2 ) run the EasyBCD application , click the Add New Entry button on the left , under Portable / External Media Extender BIOS switch to the tab . BIOS Extender can be used to boot from the network , although the CD or USB computer / laptop does not support it . 3 ) is still below the BIOS Extender tab , click the Install button to add an entry plop plop into the boot menu . 4 ) We have made the computer bootable from flash 5 ) Now we install plop and EasyBCD BIOS Extender , 6 ) time to test your usb flash in order to install windows 7 7 ) input usb stick into the USB port , and then restart the computer . 8 ) We will find a new entry in the boot menu called EasyBCD BIOS extender . EasyBCD BIOS extender select , then press the enter key to enter the next option screen , here we will see a list of options . 9 ) Select the option to boot from USB to USB flash , from here then follow the steps to install windows 7 10 ) success we sing ! .
Easy Way Data Sharing Files Through WiFi in Windows 7/8
How Easy File Sharing Data Through Wifi - hi mate this time I will share knowledge on how easy that we can share game data files etc via wifi access . because of the nature of the wifi in general can be used to access the Internet , this tool also can be used to share the data , thus slightly reducing the habit of using the flash , which certainly less efficient . Rata2 achieve data transfer speeds of 2-3 MB / s . To measure the speed of data transfer is sufficient if it is to share files . Immediately following an easy and fast way of data sharing via Wi - Fi :
1 . Provide a folder that will be shared / distributed , then right click - > select properties
2 . Once the Properties window appears select the Sharing tab , in the Sharing tab select Advanced Sharing
3 . Then give centan on Share this folder
4 . After that is done in order to share quickly and easily we turn off the firewall , because it would be difficult to access the files be shared if the firewall is enabled . Login to the Control Panel , and then disable the firewall
5 . Then we go on CMD ( Command Prompt ) , press the Windows key + R , then type cmd in the dialog box are available
6 . After typing the command ipconfig / all , and then look at the IPv4 adddress , it is our IP address
7 . If the other computer ( should be 1 network ) who want to take the file sharing that we had had to enter the ip address on the menu RUN
Well after entering the folder dishairng earlier , my friend can directly copy it to a computer buddy .
A few tips this time the Easy Way Data Sharing Files Through WiFi , hopefully useful ! !
Oracle DBMS arguably quite voracious in memory consuming , at least it is there my mind when I heard Oracle in college . Actual memory usage by Oracle can be set .
The structure of the memory usage on the Oracle divided by 2 kinds , PGA ( Program Global Area ) and SGA ( System Global Area ) . PGA memory allocated is there any Oracle client access . SGA is the Oracle memory allocated for the needs of the system , ie to Shared Pool , Buffer Cache , and Redolog Buffer .
For the purposes of exploration , learning , or development , it seems to shrink the memory in use Oracle ( SGA ) is not a problem , so that our computer RAM consumption mediocre to be optimal . Here are the steps :
1 . Login using SQL Plus as sysdba SYS user .
Login SQL Plus
2 . Type the password of the SYS user .
3 . Check first how SGA allocated default Oracle
SHOW PARAMETERS SGA_MAX_SIZE ;
If thats enough , then no need to proceed to the next step .
4 . Set SGA Max Size , for example be 100M
ALTER SYSTEM set SGA_MAX_SIZE = 100M SCOPE = SPFILE ;
5 . Set SGA Target , for example, be 90M . SGA_TARGET value can not exceed SGA_MAX_SIZE .
ALTER SYSTEM set SGA_TARGET = 90M SCOPE = BOTH ;
6 . Restart the Oracle service that SGA updated .
STARTUP FORCE ;
7 . To make sure , check the return value SGA_MAX_SIZE and SGA_TARGET
Yuni anggarwati (XI RPL 2) How to Install Drivers Through the Device Manager
Indeed, how to install these files is sometimes done typing drivers that we have not in fact form the setup file which means double-clicking the installation was staying alone at last filennya in the next -next live alone , but when getting a driver file that is not in the form of setup files forced to do the manual way through the Device Manager .
For how to install the hardware drivers through the device manager simply by way of :
Click Start on the Windows taskbar , Right-click My Computer , and select Properties , and the System Properties window will appear , In the System Properties window , select the Hardware tab , then select another button labeled Device Manager , and will appear again the Device Manager window
system properties In the Device Manager window , look for hardware that will install the drivers , the drivers are usually not detected by the Windows operating system will be a question mark ( ? ) Are colored yellow ,
device manager Well when my friend got it, just stay in the right-click tuh drivers have not detected that marked the question ( ? ) Are colored yellow , and then click Update Driver on the menu that pops up from the right-click a buddy and will do the Hardware Update Wizard window appears , In the Hardware Update Wizard window , select the option Install from a list or specific location ( Advanced ) and click Next , and select another option in the Include this search locations . Do not forget the Browse button , first determine the location of a file folder that the drivers will be installed .
update wizard
location update wizard After determining the location of the folder that the driver had a buddy , continue by clicking Next and wait until the process is complete . If this process goes smoothly , it will automatically be in the driver installation is done .
Up here I feel I have enough explanation ya , well sorry if the explanation is rather confused muter - muter soanya jelasin model would also like how , if there are comrades who still do not understand please ask , ok !
understanding Router A router is a network device that is used to divide the protocol to the other members of the network , with the router then a protocol can be shared to other network devices . An example application is that if we want to split the IP Address to the members of the network , we can use this router , the router features of the facility is a DHCP ( Dynamic Host Configuration Procotol ) , with DHCP setting , then we can divide the IP Address , the other facilities of the Router is the existence of NAT ( Network Address Translator ) that can allow an IP address or internet connection to be shared another IP address .
for example, if on a network device ( computer ) has the IP Address 192.168.0.1 , the other computers can communicate , must be given the IP address of the Network Identification 192.168.0 and the Host Identification 2-254 , example 192.168.0.10 , 192.168.0.11 and so on . Problems will arise when the networks connected very much ( usually above 20 device ) , an administrator will be forced to get around to setting up the IP address of each host , therefore we can use the Router . Types of Routers 1 . router Application 2 . router Hardware 3 . router PC Router application is an application that can be installed pad operating system , so the operating system will have capabilities such as a router , an example of this application is WinRoute , WinGate , SpyGate , WinProxy and others. Hardware is a hardware router that has the ability sepertiu router , so that the hardware can emit or divide the IP Address and IP Address to sharing , in practice, a hardware router is used to share Internet connection on a space or area , this is an example of an access router point , the area to get Ip address and an internet connection called Hot Spot Area . Router is a PC Operating System has the facility to divide and mensharing IP address , so if a network device ( pc ) connected to a computer will be able to enjoy the IP Address or Internet connection is propagated by the operating system , the operating system instance that can be used is all client server -based operating systems , such as Windows NT , Windows NT 4.0 , Windows 2000 server , Windows 2003 server , MikroTik ( Linux-based ) , and others .
Wi-Fi stands for Wireless Fidelity . Wi-Fi is a wireless networking technology that uses high frequency . Frequency used by WiFi technology is at 2.4 Ghz spectrum . We can connect to the internet with Wi-Fi using a notebook and a PDA equipped with a WiFi card ( WiFi card) . If we use the notebook processor equipped with Centrino Mobile technology , the WiFi card is not needed .
By using WiFi , you can access the Internet quickly . WiFi has the ability to access the internet at speeds up to 11 Mbps . We do not need a cable to connect kejaringan WiFi . However , we should be in areas that have a WiFi signal . Areas that have a WiFi signal is a region located at a radius of 100 meters from the access point that is often called a hotspot . There are three kompunen contained in a hotspot location , among others, as follows :
1 . Access pint ( access point ) is a device that connects to the Ethernet LAN Wireless technologies contained in the computer . The access point has the ability to serve as many as 128 users . The area can be reached by an access point reaches 25-1000 meters .
2 . Access controller ( access control ) is a device that serves as an authentication tool to check whether a user is a person who has the right or permission to access .
3 . Internet link is a device that connects to the internet hotspot locations . Internet links kemamuan have an internet connection to speed 512 kbps . The connection capability is used to serve all the users in one location . The downside of internet access with WiFi access can only be done in areas as far as 100 m from the access point , and to date , only certain places that have been fitted with the access point . Certain places that usually are college campuses , hotels , cafes , airports and other public places . Share on Facebook Share on Twitter
Deep Freeze is a program made in a software development company named Faronics . Selling price is $ 45 with a program capacity of up to 4 MB . Deep Freeze works to restore the computer to the default settings in a way to freeze all files are installed on the computer . With its unique functions , the software is very powerful ward off virus attacks and user -friendly ignorant especially on computers that use a lot of people . If using anti- virus , we need a lot of time to always upadenya . In fact , with the Deep Freeze , simply install it. Before installing Deep Freeze should be used to clean your computer of viruses in the virus would not be conserved in the computer . Suggested to format the hard drive clean of viruses and other destructive programs . In addition, should the hard drive is divided into two partitions with the C partition as the system partition .
Installing Deep Freeze
If using the trial version , the following steps mengcracknya :
a) Show Deep Freez by pressing ( Ctrl + Alt + Shift + F6 ) or ( hold down Shift and click 2 times on the Deep Freeze icon ) . Put the Deep Freeze password the first time we install . If the status is still in the Boot " Boot Frozen " move to " Boot Thawed " and press OK and Restart Computer .
b ) Run the installer the deep freeze . Select Uninstall . Note , the installer must use versi2 used . Run the installer the deep freeze . select Uninstall . Note , the installer that is in use must use the newer version , or at least equal . If not , the second step can not be executed .
c ) Then enter Regedit via Start menu > Run > Regedit and go to HKEY Local Machine - Software - Microsoft - Windows NT - Current Version .
d ) Select the item ' AncillaryDev ' in the right column . Delete the contents of the item.
e ) Then install Deep Freeze again . The next Deep Freeze can be used all time .
Actually , Windows also has software that has a function similar to Deep Freeze named Steady Safe and can be downloaded from the Microsoft site . However , the windows are in use should be original, not pirated windows .
2 . Weakness Deep Freeze Unable to save files permanently , install programs , delete files , rename files , move files , uninstall programs that have been enabled on the directory Deep Freeze . If there is a virus or malware after Deep Freeze is activated , then the threat will still exist after the restart , Deep Freeze except in first disable ( thawed ) after it was cleaned . If the computer is installed Antivirus , Antivirus updates that require the disabling Deep Freeze , after the update process is complete , the Deep Freeze must be activated again and the need to restart the computer 2 times .
One advantage of wearing deepfreeze is to maintain a computer from attacks virus.karena deepfreeze will instantly freeze / delete the files installed when the computer is in shoutdown .
C# is a modern and innovative programming language that carefully incorporates features found in the most common industry and research languages. In keeping with the design philosophy of C#, Microsoft has introduced several potential new features to the C# language that increase developer productivity with language constructs.
Microsoft C#
Since its introduction in February 2001, a number of developers have begun building software using the C# programming language. Even within Microsoft, C# has been used to build several shipping applications, including the .NET Framework, MSN Web properties, and the Tablet PC SDK. As such, C# has proven itself as a language suitable for the construction of high-quality commercial software.
Many of the features in the C# language were created with four different design goals in mind:
1 A unified type system and simplifying the way that value and reference types are used by the language. 2 A component-based design established through features such as XML comments, attributes, properties, events and delegates. 3 Practical developer headroom established through the unique capabilities of the C# language, including safe pointer manipulation, overflow checking, and more. 4 Pragmatic language constructs, such as the foreach and using statements, which improve developer productivity.
In the "Visual Studio for Yukon" version of the C# language, Microsoft plans to build on an already elegant and expressive syntax by incorporating a variety of features across a broad spectrum of research and industry languages. Included among these language features are generics, iterators, anonymous methods and partial types.
Potential Future Features
Indeed, it is on the pillars of a unified type system, component-based development, developer headroom, and pragmatic language constructs that future innovation in C# is based. The following summarizes four key new features that Microsoft is planning on delivering in the next major version of the C# language. The design of these features has not yet been finalized and the Microsoft Corporation invites comment on them from the developer community.
Generics
As their projects get more sophisticated, programmers increasingly need a means to better reuse and customize their existing component-based software. To achieve such a high level of code reuse in other languages, programmers typically employ a feature called generics. C# will include a type-safe, high-performance version of generics which differs slightly in syntax and greatly in implementation from templates as found in C++ and generics as proposed for the Java language.
Nama :Moch Nur Rohman Kelas:XI RPL 2 tugas mingguan 4
How to Create Reports in Microsoft Visual Basic 6.0 by Using Crystal Report
Crsytal Report is an application used to create reports from multiple data sources . Data source database meant to say , so with Crystal Report we can create a report that the data obtained from any database , such as SQLServer , MS . Access , MySQL , etc. . However on this occasion we will use the database in MS . Access. crystal report can also be accessed from several languages pembograman include Visual Basic , Visual C / C + + , Visual Interdev , and Borland Delphi and others. For the initial stage , we first try to make a report of a single database only . If you do not have the Crystal Report 8.5 at champion please download Google alone : D . Here are things that need to be provided before making a report with Crystal Report :
Prepare the database by using the Mc . Access After that , Open Software Crystal Reportnya : Select Using the Report Expert and click OK . Then select the Standard section and click OKKemudian select Database and click Next After that , select the database that you created earlier with 2x click on the Find Database File , then click AddSelanjutnya database search , select one of the existing tables in the database to be used as a report . then select Add , if it is done then just select Close.Kemudian enter fields that we will enter into a report , by clicking the Add ( for each one ) or Add All ( for all fields ) and then directly click Finish . After you perform the steps above it will show you the results of a report that has been designed . ,
nama : titi nur jayanti Install WordPress on Localhost Using XAMPP I will discuss how your way to install WordPress on localhost using XAMPP . Quite easily actually , but it does require a bit of precision and often trial and error . Try try and try teruuus ... Installing WordPress in Localhost
Prepare the latest WordPress files . If you do not have to ngunduh first or direct download at WordPress.org . Open the XAMPP folder on your computer . Then open the folder htdocs . Copy the WordPress files into this folder . More simply , open Windows Explorer , and then type in C : \ xampp \ htdocs folder on the address as shown in the figure below . xampp folder in windows
* ) NB : Htdocs folder is the folder used to store files that can be opened in a browser . If we put aside in this folder , then the browser will not be able to open it . Usually that is the default setting , the folder is on drive C. So make sure not one drop ya .. If the file is still in the form of compressed, then extract it first. Default is usually extracted folder called ' wordpress ' . If desired , you can change the name later became the name of the folder that you like . Say the name of your website . Here I replace it with the name of ' my blog ' . If accessed , the result will look like the image below : install wordpress on localhost , xampp htdocs folder , xampp Now open your favorite browser . To open the wordpress site is offline , we will be able to access it with the address http://localhost/nama_folder . If yes open it wear mine http://localhost/blogku address . If yours still use the default folder , the address http://localhost/wordpress . Type in the address bar . Then click Create a Configuration File . install wordpress on localhost Click the Let's Go . 9 - wordpress -start Fill in the database name , user name , and password that you created earlier . If not , you can read the tutorial how to create a database using XAMPP . In the Database Host fill with localhost only. Click Submit . 10 - stuffing - form - wordpress - database - is offline Click Run the Install . 11 - run - wordpress - installation - offline Fill in the data required for the admin and the name of the website . After that click install wordpress . 12 - stuffing - information - wordpress - install Congratulations ! WordPress is offline you 've finished . Please login . 13 - install- wordpress - offline - success Enter the username and password you created in step no.8 to login to the Dashboard . How else can just type the address in the browser http://localhost/nama_folder/wp-admin . If in the place I mean using http://localhost/blogku/wp-admin address . 14 - wordpress - login
Well , so the steps of how we install WordPress on localhost using XAMPP offline
nama : titi nur jayanti minggu ke-2 How to Properly Install a VGA Driver
Malik Falasifa | Tips Many users who experience a failure or an error when installing the vga driver . Whether it mapun nVidia driver vga ATI . This time we will menejlaskan VGA on how to install vga correctly . How? Let's look into the steps .
How To Install a VGA Driver
Prepare your vga driver . You can download vga driver according to the type of car you [ AMD | nVidia ] How To Install a VGA Driver
How to Install ATI VGA Diver
How to Properly Install a VGA Driver
a. Run the installer . b . click next c . I suggest you choose Express to ease , and then click next . d . Wait for it to finish , then Finish and restart .
How to Install Nvidia VGA Diver
How to Properly Install a VGA Driver
a. Run the installer . b . At the License Agreement , select Agree . c . Select Express and click next . d . Tick the Always Trust then click install
Nama :Anisatul Khoiroh Kelas :XI RPL 2 Minggu ke-4
Understanding Appserv
, appserv an application that serves to installl some programs, such as Apache , PHP , MySQL in 1 minute . Many people in this world have problem when Install Apache , PHP , MySQL because it took a long time to configure and can sometimes cause dizziness . Given the extremely spoiled Appserv once :)
Some features are Appserv
Apache PHP MySQL phpMyAdmin
The purpose of the Application Appserv
The purpose of AppServ is Easing to install . You can create a web server , a database server in 1 minute AppServ some questions can be a real production web server or database server . The OS can use the Os windows or linux OS , but Windows OS is not good enough for a heavy load on your web or database server memory . We recommend you to use a Linux / Unix for servicing heavy workload . Because Linux / Unix has more speed and requires less memory and CPU usage . If you compare the attack when using Windows OS and Linux / Unix you can find the speed difference . eg Windows can serve 1000 users per second but Linux / Unix OS can handle more than 1000 users per second and eat less memory and cpu .
paint : Windows Os can also be use to this program , cuman if your server dabase weight , are suggested use the linux OS :)
NOER IZZA AFCARINA XI RPL2 TUGAS MINGGU KE-4 Some Functions and How to Use gpedit.msc in Windows 7 - Gpedit.msc is a program which also includes a configuration where all of the settings contained in the operating system . Some functions of the program is as an alternative way , quickly and secretly to change the setting .
There are several options if my friend wants to open the program , including : 1 . Open the RUN ( Windows + R ) typing gpedit.msc 2 . Open the Command Prompt ( DOS ) and typing gpedit.msc 3 . Open drive C : \ Windows \ system32 \ gpedit.msc 4 . Right-click on the desktop or Windows Explorer, select New Shortcut , type gpedit.msc in the type column of the location of the item , click next to the type name fill the shortcut name , finish
All the settings list there are 3 options , namely : • Enable ( Enable ) • Disable ( Disable ) • Not Configured ( Not Set )
Several of Use gpedit.msc :
How to Lock Desktop Background User Configuration | > Administrative Templates | > Control Panel | > Personalize | > Prevent Changing the Desktop Background
How To Lock Mouse Pointer User Configuration | > Administrative Templates | > Control Panel | > Personalize | > Prevent Changing the mouse pointer
How to Disable Access regedit ( registry editor ) Go to User Configuration | > Administrative Templates | > System | > Prevent access to registry editing tools
How to Hide / Hidden Drive ( like C , D , E ) Go to User Configuration | > Administrative Tools | > Windows Components | > Windows Explorer | > Hidden These spesified Drive in My Computer
How to Disable Access to the drive ( such as C , D , E ) Go to User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer | > Prevent Access to Drives from My Computer
How to disable Right Click Desktop Access User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer | > Remove Default Windows Explorer Context Menu
How to Disable My Computer -Manage Access User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer - > Hides the Manage Item On The Windows Explorer Context Menu
How to Disable Task manager / Lock Computer / Change Password / Log Off : User Configuration | > Administrative Templates | > System | > Ctrl + Alt + Del Option Then there will be 4 options : Remove Task Manager Remove Lock Computer Remove Change Password Remove Log Off
How to Disable Autoplay Feature User Configuration | > Administrative Templates | > System | > Turn Of Autoplay | > Select Disk Drive
How to Clear Recent History or Document User Configuration | > Disk Administrative Templates | > Start Menu and Taskbar | > Clear History of Recently Documents on Exit
How to Remove LogOff from the Start Menu User Configuration | > Administrative Templates | > Start Menu and Taskbar | > Remove Logoff on the Start menu
Maybe it's just enough that I can share about the function and use of Gpedit.msc in Windows 7 . Good luck and hopefully useful
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 4
Install Windows On Android
Smartphones today's increasingly sophisticated in terms of hardware even more powerful when compared with computer hardware specifications during the period 10-15 years ago that allows us to install the OS at a time 10-15 years ago such as Windows 95 for example. How? In maxiandroid this article, let us share together about how to run windows on android.
This article is the opposite of the articles that I have written in previous maxiandroid on "Run android on PC" which you can read here, but the article maxiandroid this time let's share "Install windows on android".
To run windows on android emulator requires, some of which are QEMU and Bochs. Like the emulator image that definitely need to run the application, as well as QEMU and Bochs that require image files as well.
Qemu vs Bochs Qemu emulator is very fast, but it has a bug. SB16 emulation works, but no MIDI music. FPU emulation is incorrect / incomplete, so it may cause some programs not to run or not run perfectly. The network does not work. Keyboard / mouse emulation is still far from sempurna.Windows 9x would work in QEMU if you'll disable 32-bit disk driver in it. This is a bug in Android (pread / pwrite function does not work). Windows 9x will run at a very fast pace.
Bochs is emulatoru too slow to be used, but bochs very stable compared to use qemu.
How to install windows on android In this article will discuss windows 95 on android, but could have windows 98 or xp, but remember not all readers maxiandroid using HH with a high spec so I decided to windows 95.
How to install Windows 95 on an android 1.Download file qemu95eng here.
2.Cari folder "SDL" then move to the root / sdcard. (The files contained in the folder. Should you install the apk)
3.install file "SDLapp.apk" inside the folder "SDL".
4.Choose and run "libSDL" have you installed earlier.
1 . Extract VB 6.0 Proffesional full version then click setup.exe 2x See the picture below : 2 . Will look like Figure 2 below , choose Run Program
3 . After the Run Program No. 3 will appear . If you want to read the Readme , if not please click Next . 4 . After Next No Licence Agreement . Check the I Accept The Agreement used to it and then click Next to continue . 5 . Because the full version please see the CD Key , have downloaded all right? ? Find and click the file 2x CD_KEY.txt 6 . It has performed its CD Key ? ? Copy wrote it directly in the product column ID Number as No. 6 in the image below, and then Next again .
7 . After the next click will appear on the display as shown no 7 . Select Install Visual Basic 6.0 . because we're tujuanya install VB 6 .
8 . Figure 8 will appear . Next again . 9 . 9 When the image appears , Select run program again .
10 . Next will come the picture no 10 . Select Continue .
11 . Select OK
12 . OK Again
13 . After selecting OK in the figure 12 , VB 6 will pass copying an installation folder on drive C. Wait until the installation is complete .
14 . Select Ok
15 . Loading again , wait until the end .
16 . After that will appear Figure 16 and make sure it is correct Folder and Select the Typical yes .
17 . Select Yes .
18 . And now VB 6 will do the installation to complete all components .
19 . After installation is complete all the VB 6 will be asked to restart Windows . Choose Restart Windows . And remember Before Restart Ensure Document or all applications in order to secure the lid .
20 . Once the computer is back to life again as the image will appear 20 . Select Run Program . 21 . Up above everything is finished installasinya . And now I 'll Love Tips For bro who use its Windows 7 that VB6 can walk normally and smoothly . Follow the procedures below . In his Icon VB6 program right click and Select propertise . See Figure 21 below . 22 . After that Select the Compatibility tab , then Check Run Program in Compatibiliti mode for , and select the Windows XP (Service page 3 ) . Then Tick also Disable Desktop Composision ( this is to make vb6 run to turn off the animation or theme that is not in need in windows 7 ) . And Mark is also an Administrator Run the program . Then press Ok .
23 . Finished Installing Visual Basic 6 Full Version and below the display on my computer .
That's all I can say on Tutorial Install Visual Basic 6.0 ( VB6 ) In computer and Tips For VB6 run smoothly and support with Windows 7 . Hopefully this simple tutorial for all of us . Happy coding , programmers Indonesian hopefully for the better .
Nama :Moch Nur Rohman Kelas:XI RPL 2 tugas mingguan 5
How to Speed up Internet Connection Wifi
How to Speed up Internet Connection Wifi - For tips this time the internet will rohman menshare how to speed up internet connection without software more precisely how to speed up wifi internet connection , sometimes when we 're browsing using wifi network connection often slow and not as expected due to the user access the wifi network is not only one person alone . Well, here is the trick How to Speed up Wi-Fi Internet connection , which may be useful to the reader . How to Speed up Wi-Fi Internet Connection on Windows 7 : 1 ) You must are connected to a wifi signal . 2 ) Find the IP number that you use . I click the wifi icon 3 ) Right-click on the network you're using 4 ) Then click the status and select details 5 ) Next you find the phrase " IPv4 address 6 ) Once you know the IP using IP then memorize the 7 ) Then press Windows + R. then type CMD 8 ) Next type ping then typing the ip that you memorized earlier For example :
" ping 10.10.10.456 - t " do not remember there was a sign " ( quotes)
9 . Finally, the CMD step No. 7 on the way do not leave it closed .
Firdaus Akbar Maulana XI RPL2 Tugas mingguan minggu ke-1
10 Tips on Buying a New Laptop
Dear readers there are some simple tips for ya readers more willing to buy a laptop for school or college
Here are some tips:
1 . First , check the boxes ? good or not
2 . when the laptop is removed from the cardboard check the plastic cover above the keyboard keys and the plastic frame cover part of LCD screen . Is tacked neatly ?
3 . Check the bottom of the laptop .
4 . Check the manufacture date is printed on the bottom left of the carton .
5 . Check the serial number does not equal or cardboard with the body of the laptop .
6 . Checks whether the body of the laptop keyboard and looks clean from dust ? ( if dusty laptop means never opened before )
7 . Check at the time of the test dihidupin whether the windows OS is way ahead or prepared installation path when it means the laptop had been turned on and run windowsnya
8 . Check whether there is a death pixel screen visually ask replaced the wallpaper with white and black colors .
9 . Check and test the bluetooth and wifi connectivity features are good and stable running .
10 . After the connectivity path , then check out his internet serial number to the product website whether registered or not there warranty
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-2
10 tips on caring for laptops
1 . Do not carelessly download software " of the internet .
2 . Do not install the software " that if it is rarely used and useless .
3 . Do not put the laptop on the mattress when it is lit The impact is quite large , based on the experience of my friend . After a few hours the laptop is put on the bed , the next morning adapter directly damaged .
4 . Keep your laptop Keep your laptop there should be no dust at all , always wipe after every use with a clean white cloth that is free of dust .
5 . Avoid electromagnetic vibration . Keep your laptop from electromagnetic devices such as megaphones , loudspeakers , machines , mobile phones , and other sources of vibration .
6 . Arrange them connected . As much as possible the cables to the laptop it should be neatly trimmed .
7 . Take care of laptop batteries on a regular basis Should when using the laptop for a long time , the battery is fully charged first with a record time of being charged is not played . Then if it is full then unplug chargerannya play a little longer until the rest of the battery . Keep air circulation as well , because this is very important if there is no air circulation smoothly , it can lead to over-heating .
8 . Do not put heavy objects on the laptop .
9 . Never try to move, move to a laptop while still alive . It is no explanation , here's the story : Laptops are still alive or not in shutdown / sleep means the hard drive is also being driven to work so that if the hard drive can cause scraping the cylinder head , the result is fatal .
10 . If the laptop is in trouble , do not try to try to fix that yourself . Better left to the nearest handyman service .
Of the 10 tips above , there is the most critically important , namely : Warranty card you do not lose it
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-3
10 things you need to know to buy a gaming laptop
1 . processor
Intel Core 2 Duo Processor is a standard gaming laptop . Looking for a processor with a larger cache as Intel Core 2 Duo Q9550 ( 2.83Ghz 6MB Cache ) or Intel Core 2 Extreme X9000 processor clocking at 2.8 GHz with 6MB cache . If you are able you can also get top notch Intel ® Core ™ 2 Quad processor Q9550 2.83GHz , 12MB Cache , 1333MHz . However , a simple 2.4 GHz Intel Core 2 Duo processor will be able to handle most of the game the next game .
2 . Video Card
The main hardware video controller for dynamic lighting , explosion , landscape and action sequences make the modern game so fun to play . Standard for desktop video card big enough to fit into a laptop , but with today's technological advances can make graphics cards for laptops even 512MB or 1GB video card compatible with a laptop .
Recently, we saw some laptop appears equipped with dual video cards . Nvidia SLI technology leverages the full power of two video cards at high time . Standard for gaming systems have been tried and tested as the Nvidia GeForce 8800M , 9800M or ATI Radeon HD 3870 .
3 . display
To meet the game play a bigger screen with a higher resolution . Currently 20 + inch screen sold but is recommended if you want good results you can select the screen which is more than 18 inches because that way you should not need to use the laptop screen . On the other hand , a less than 18 -inch screen is not going to give
4 . RAM
RAM is also required to load the game to execute the file . 4GB DDR2 RAM is a standard for gaming laptops . But for future game play , you will probably need a higher Ram again , and you need DDR3 RAM , because every year the game software that appears to require kuwalitas and RAM requirements are higher and the RAM access speed .
5 . hard Disk
Currently for the games require HDD capacity of 15GB disk space . If you will save a lot of movies , music and photos on your hard drive then you need more disk space . Standard upcoming gaming laptop need 500GB of storage space and you can also get a large TB drive according to your ability . Ensure that the hard drive rotation speed of 7200 rpm to ensure fast data transfer speeds .
6 . Sound Card Sound Card
Games of the past may not be much use or design a game with high audio quality is important but for gaming now high definition audio along with high- definition graphics are needed . So , if you do not get a dedicated sound card like those from Creative , you will lose the best sound quality . But the hardware is not too important . If you do not have a cost, integrated sound card will do it for you .
7 . keyboard
Every gamer knows about the importance of a keyboard for extreme gaming . Before buying a computer game you need to check whether the keyboard is comfortable to you . Check also whether the separate number pad for playing games bersama.Periksa use arrow keys position is in accordance with the style of your game .
8 . guarantee
You definitely got a 1 year manufacturer's warranty on every purchase but you can see some of the options extended warranty service from the manufacturer that can be called to the house for those gamers like you . Usually gamers gamers really busy playing all day and night . so that the gamers are too busy to go to the service repair their computers .
9 . accessories
Mouse is the most important as an accessory for gaming . If you want the best advice , do not use the mouse wireles . Because when you 're cool to play the game mouse wirelesnya battery runs out or weakened , then your game will be interrupted .
10 . WiFi
You can enjoy the entire game online wirelessly through your laptop . Each laptop is now equipped with WiFi . Verify wifinya fast enough to handle the needs of the game .
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-4
refresh function on the computer
Most computer users especially computer with Windows Operating System output ever or often even pressing the right click button and click Refresh on the desktop or use the shortcut key on the keyboard is the F5 function key , in order for the computer to work faster , so it is becoming a habit anywhere and on any computer will do the same
What worries of them , probably because they do not know the real reason why they push this button . Worse yet , those who have a strong reason why they push this button actually believe the myth about the function of the refresh button .
Please note different from the desktop refresh page refresh or reload the page in a browser . Sometimes because Internet traffic is congested , there is internet page could not be loaded completely . Refresh on the browser function is to reload the page failed to load previously . While , the refresh on the desktop have different functions with the refresh button contained in the browser . Most new computer user or a layman , like the author himself , at first believing that serves the refresh button to update or renew standby ( idle ) after a change of computer and delete the previous command of RAM , so the computers that we use will run more smoothly and faster . However , as mentioned previously , it is a mere myth .
The function keys are actually Refresh Refresh Desktop desktops actually used to update the display or reload the display on the desktop after a change . Refresh the desktop does not work to renew the conditions of RAM , and do not clean up your computer or your computer refreshing . Hence desktop refresh is also not contribute anything to the performance increase computer performance . To make it easier for you to understand explanation of the function of the desktop refresh button , then consider the following illustration .
Sometimes when you make changes to the shortcut on the desktop , these changes do not appear instantaneously . In this case , then you need to do a refresh on your desktop to display the changes that have been done on the desktop . For example , you have set up a shortcut on the desktop that his name in alphabetical order . When you add a new shortcut on the desktop , new shortcut will not be immediately sorted out in alphabetical order , but it will be at the very bottom of the list of shortcuts .
If you hit the refresh button the desktop , all shortcuts will be reset again and the new shortcut will occupy the position corresponding alphabet . It is a function of the actual desktop refresh button . In addition , the refresh also have the same function in Windows Explorer . So , if you have a habit of doing a refresh on your desktop many times without knowing the actual purpose and function of this button , then you should stop the habit. Because you are just wasting your time and attention to do the actual work in vain .
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-5
10 ways to make your laptop battery last long.
1 . Clean Laptop Regularly Many laptop users are lazy to clean the laptop . This often makes the laptop ventilation holes clogged by dust etc. . Blockage of the ventilation holes makes laptops heat up quickly and force the fan ( fan ) to work harder . Of course this makes your laptop battery faster. To avoid this, make sure you are diligent about cleaning the laptop , especially in the area of the vent holes .
2 . Lower Screen Brightness Lower Brightness
Laptop screen brightness takes quite a lot of battery power . Lowering the laptop screen brightness level although one or two could make your laptop battery last longer .
3 . Avoid Using CD / DVD
CD / DVD - ROM is very hungry for battery power . If it is not needed , you should not use the CD / DVD - ROM . Also make sure there is no CD / DVD that remains in the CD / DVD - ROM even if you do not use it .
4 . Use Sleep Mode
The process ignites laptop battery takes quite a lot of power . To outsmart , you can use the sleep mode when the laptop is shut off . When the laptop is in sleep mode , the laptop battery using a very low energy . All files and programs that are open will be stored in temporary memory . When you turn it on again , and the program files will be immediately ready for use . In addition to saving time , sleep mode can also save battery usage . But remember , this trick is only effective if you plan to use the laptop some time after the laptop is turned off . If you want to turn off the laptop for a long time , use the shutdown menu as usual .
5 . Close Unnecessary Programs
Often we do not open a lot of programs that we use . In fact there may be also a variety of processes that we do not need running in the background . Shutting down the program and the process does not need to be able to help reduce the use of laptop battery significantly.
6 . Unplug the USB device Make sure you unplug the USB device is not needed . For example, you copy files from flash or an external hard drive , unplug the device immediately after copying the files . Each USB devices require power and can make your laptop battery runs out quickly .
7 . Perform Power - Savings Almost every operating system must be power- savings settings menu . Arrange each power - savings features are and adjust to your needs . For example, when the display will be dimmed or turned off , when the hard drive will be turned off , etc. . Setting appropriate to their needs can make the laptop battery to be more durable and long lasting .
8 . Turn off Wireless Card Wireless card is very draining power from the laptop battery , even when you are not connected to a Wi - Fi connection . If it is not currently required , make sure you turn off your laptop wireless card .
9 . defrag HDD Fragmented files to make the hard drive work harder . Hard drive must find the fragmented files and put them together when accessed . As a result, the hard drive will require a larger battery power . To fix this , you can do a defrag the hard drive when the laptop you 're connected to the electrical power . Remember , do not do a defrag when the laptop is not connected to electricity . Defrag process requires a large enough power and could make the laptop battery power is exhausted in a short time .
10 . Clean the battery Often dirty battery contacts for a variety of dust and dirt . This can reduce the effectiveness and efficiency of the battery . Clean the battery with a metal pole using a cotton swab moistened with alcohol .
So 10 Tips for Long-Lasting Laptop Batteries . Hopefully my tips useful and give your laptop battery last longer .
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-6
Here is how to cope with a slow computer : 1 . Check the program / application that takes quite a lot of memory . To be checked through the ' Task Manager ' . Ctrl + Alt + Del - > Task Manager - > tab " Process " Through task manager you will see applications that use memory . Please do you close / close / end process unneeded programs . 2 . Teralalu number of modules installed will make the computer becomes slow . Sometimes we often install a lot of modules to perform a task , especially a student , or anyone who would like trial and error . It makes the application so the application does not accumulate although often used . You can examine the module what is already installed on your computer by clicking the add / remove modules in the carry out row as well as un - install programs / apps that just became the accesories . 3 . For Windows 7 , if still slow you can do the following: Control Panel - > Performance Information and Tools ( take advantage of the search feature ) - > Adjust Visual Effects . On the tab " Visual Effects " , select " Adjust for best performance " . Alternatively, you can also uncheck the list located at the bottom . That is to eliminate unneeded visual display that memory consumption is reduced and the computer will be faster . 4 . Take advantage defragment feature . This time trying to do " Disk Defragment " . In the search box in the start- type " Defragment " and press Enter . After that defragment hard drive is . 5 . Delete the files that are not necessary located in prefect . How: Open explorer - > C :/ / windows / prefetch - > delete all files in the prefetch folder . 6 . Use CCleaner . Please download CCleaner on the website . That is the information that I can say about Easy Ways to Overcome Slow Computer hopefully can solve your problem .
Warning system in the operating system Windows 7 make the most of its confusion . Yellow exclamation mark on the LAN connection icon in the lower right corner of the desktop screen a lot more meaning than with Windows XP , Windows XP yellow exclamation mark just tell that the IP conflict or limited connection to the computer is a DHCP client .
In Windows 7 there are some additional meaning when the warning signs appear . Here are a few things that should be known to be associated with a yellow exclamation mark that appears on the emblem of the LAN connection on the right corner of the computer desktop windows 7 or windows the same version and the version that is on it .
1 . internet connection
If there is no internet connection then a yellow exclamation mark will appear . Usually quite confusing , especially for users whose computers are connected to a LAN that is not connected to the internet .
Yellow exclamation point can be ignored during local or LAN connection no problem . This feature is only applicable for the generation Windows 7 and Windows versions on it .
2 . Unidentified Network
Yellow exclamation mark appears when there is no logical connection or data stream . Connection Limited is part of the Unidentified Network .
Although limited connection is nothing new in the warning system in windows , but on windows 7 , the situation is further confused by warning others particularly those associated with the Internet connection .
For computers using DHCP make sure your computer is getting the correct IP address .
Yuni anggarawati (XI RPL 2) On the Connection Types Smartphone and Tablet Devices
Network connection data on a smartphone or tablet devices are generally divided into two , namely through the wires and without wires .
Data connection using a USB cable normally or mini USB , drawbacks of this data connection on your smartphone is very limited on the connection between the smartphone and the tablet with your PC or laptop computer . Excess cable connection is a high speed data transfer and stable in addition to functioning as a battery charger .
Other cable connections are commonly encountered are using an HDMI cable connection , usually only on the tablet . Connections aims to connect the tablet to the TV so that an image that is visible on the tablet screen is also on the TV screen , the image displayed on the TV screen to adjust the size of the TV screen and the resolution of the displayed picture or video . Many benefits can be taken , for example, to watch HD quality movies with large screens we can do to connect the tablet to a TV with an HDMI cable , easier and not have to turn on a computer or a special player .
For a wireless network connection consists of several types , among others, the following :
1 . GSM network connection ; 2G , 2.5G , 3G , 3.5G and 4G • Connection 2G and 2.5G ( GPRS and EDGE ) The second generation network connection is seldom used , usually used only as a backup if the primary network is disconnected or is not excluded by the 3G network . You can choose to continue to use this connection to connect to the internet through your subscription provider . Weakness is a 2G connection bandwidith small capacity ( although premium Internet subscription package ) , but the range or area of coverage is very broad .
• Connection via 3G and 3.5 G ( HSDPA , UMTS ) 3G network connection is a network connection data that popular and most widely used , with a large bandwidth and subscription costs are getting cheaper then the 3G connection is the ultimate choice in connecting to the internet .
• 4G Connection Konekesi 4G network is the latest technology of data connection . 4G connection has advantages in large bandwidth , but this time the area coverage is still limited and the cost is still quite expensive compared to the 3G network .
2 . Wireless connection or wifi Wifi connection using radio frequency signals , the frequency used is 2.4GHz and 5GHz . Technically using a wifi connection has a very high speed but its range is very limited . With our wifi connection is not just connected to the internet but can also be connected to the local network privately with other types of gadgets and devices that have wifi connection , such as televisions ( TVs ) , printers , scanners , digital cameras , PCs , laptops and so on .
3 . bluetooth connection Bluetooth connection of usage is limited because its range is limited , only about 3 meters . Nevertheless Bluetooth connection is reliable enough to be used to send or share files with sesame devices in close proximity , to connect to this device available Bluetooth connection , such as printers and so on .
Similarly, the types of connections that you can use on smartphones and tablets , make sure the other devices you want to connect with your gadgets , already available the same type of connection with one of the existing connection on your smartphone and tablet .
How to Extend Reach Wi - Fi Signals Limited range constraints into consideration is the media liaison for not using a cordless or wireless computers on their network .
There are several solutions that can be used to overcome or widen the range of Wi-Fi signals , one of which is to add the wifi access point and router or wi - fi .
If you 've already bought 2 pieces wifi router then you do not have to regret it and sell it back , the wifi device can be used to extend the range of the wifi signal and also as a backup in case one is damaged .
If the wifi router in use is running normally , but it is less far -reaching and you want that certain areas are not able to receive the signal gets wi-fi signal then the other routers can be used to be added to the network with the aim of amplifying the signal .
Here are the steps that must be done .
1 . The initial step is often asked is what should be set in the first wifi router ?
Wi - Fi router is the first that has been going well , do not need to be left unharmed leave it alone . All you have to do is find out how the router 's IP address and how the IP address range ( DHCP IP ) is shared by the first router .
The aim is that the IP address later mounted on the second router does not clash with the existing IP address on the network .
2 . IP address on the second router be set with a static IP that is one segment with the DHCP IP address and make sure it is not the same as the IP address on the router first .
3 . Besides should not be the same as the IP address of the first router , the IP address of the second router is also not allowed in the list of DHCP IP range but should one segment to the first router ip address .
example : - IP address of the router is 192.168.1.1 Subnet mask 255.255.255.0 1 - IP address of the DHCP Range : 192.168.1.10 s / d 192.168.1.100 Subnet 255.255.255.0 - IP address must be static with the second router with , it can be given the IP : 192.168.1.111 and so on with subnemask 255.255.255.0 An explanation of the Subnet
4 . On the second router , set or configuration settings for a wireless connection to the same wifi router at first . Enable security such as WEP and WPA
5 . Connect the first and second router using a straight cable .
6 . Put Wirelees router in the right position . Tips to determine position .
6 . Test the connection .
By making it function as an access point router and DHCP is not used , the practical features of the access point is used alone .
Likewise, if the signal is less strong there then you can add the third router or access point , must be arranged in advance as the instructions above to function .
Yuni anggarawati (XI RPL 2) How Much Power Wi-Fi Signal Reach 2.4 GHz and 5 GHz
One of the factors that determine the choice we are using wireless or wi - fi is a signal range of a wifi device to the wireless access point to the client . The signal range of a wireless client is determined by the main factors , namely the type of frequency used or the frequency of wi - fi how they operate . Based on international standards that are used wifi frequency is 2.4 GHz and 5 GHz , with a frequency standard , then we can determine where we need to consider how far jangkaun wifi access point router used later .
It used to be a wifi only device operates on only one type of frequency ATAPI currently a wifi access point router can operate using two different frequencies , 2.4 and 5 GHz by using a hardware only . Practical way to determine the frequency of how a wifi device operates by checking the IEEE standard is used by the device , check the specifications if using the standard IEEE 802.11b or g then the frequency used is 2.4GHz , if using the IEEE 802.11a standard uses frequency 5 GHz , if the stamp is the IEEE 802.11n standard frequency used is 2.4 GHz and 5GHz .
In practice , the range of a wifi signal is not only determined by the type of frekuesinya course there are several factors that determine quite like the power of the transmit antenna transmitter , the grasp of a receiver , a barrier material between the transmitter and receiver and interference factors . In this post I will discuss how the initial considerations should we think about the decision to use the wifi frequencies and also how the data rate must be set so that the performance of the wifi network that we build can be run with maximum performance .
Here is the data the relationship between frequency , data rate and also a range of a wifi .
1 . IEEE 802.11b standard wifi is 2.4GHz frequency Wifi with this standard has a data rate of 1Mbps to 11Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is 350ft or 105 meters . The maximum range can only be achieved at a data rate of 1Mbps . If maximizing the data rate of 11Mbps then its range is only about 50 meters .
2 . IEEE 802.11g is standard with 2.4GHz wifi Wifi with this standard has a data rate of 6Mbps to 54Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is approximately 300ft or 90meter . The maximum range can only be achieved at a data rate of 6Mbps . If maximizing data rate of up to 54Mbps then its range is only about 30 meters . Distance of 30 meters away is enough for small -scale home or office with high data rate .
3 . IEEE 802.11a is a standard wifi with 5GHz frequency Wifi with this standard has a data rate of 6 Mbps to 54Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is approximately 60meter . The maximum range can only be achieved at a data rate of 6 Mbps . If maximizing data rate of up to 54Mbps then its range is only about 22 meters . Distance of 22 meters far enough to scale the home or small office . Of this condition is seen that the lower the frequency , the more distant a range of signal even with the same data rate .
Before considering to increase your wifi signal beam then make sure first that you have to consider the use of a low frequency . The use of low frequency can be set by adjusting the channel of the wifi , usually the smaller the channel , the lower the frequency . The drawback of this method is the low frequency is very susceptible to interference , to be sure there are no or few other frekuesi residing on the small channel before use .
Yuni anggarawati(XI RPL 2) Way or deface Web -Based Hacking Joomla With Technique " Exploit MyTube "
This time I want mebagi hacking way that is easy to apply , but with little success . Actually there are a lot of ways in this joomla based web hacking . Moreover, from a list of existing dork . Okay , immediately wrote
Finding the Target and Exploit
Exploit is a code that specifically attack computer security . Exploit widely used for penentrasi whether legally or illegally to look for weaknesses ( vulnerability ) on the destination computer . It could also be said that attacks a vulnerability of software security (security vulnerability ) are specific but not always aims to launch an unwanted action . Many computer security researchers use the exploit to demonstrate that a system has a fragility .
The way is easy , go to google.com and paste inurl : " option = com_mytube " and press enter . Choose one of the websites that you want. Already ? Further to the next stage .
Suppose you have a web address is http://alamattarget.com/index.php?option=com_mytube&Itemid=12 get it , add
& view = videos & type = member & user_id = 62 + AND +1 = 2 + UNION + SELECT +
0x3a , activation % 29,13,14,15,16,17,18,19,20,21,22,23,24,25 + from +
jos_users + where + id = 62 -
after number 12 earlier, and then press enter .
If it is , it will look like the following
There, we can see the admin and the admin email . Okay , then open a new tab , go to http://alamattarget.com/index.php?option=com_user&view=reset is a common form to reset the password .
Then enter your email address which has been found earlier, and then click submit . After that , move to the start tab , click F5 to refresh the page , then writing ea044f8847 ... will change , inilh tokennya . Well , if you find the sign " $ " after the refresh , then this technique can not run and you have to find another target . If successful , then proceed to the next stage .
The next stage is entered into the login panel . After inserting the token before, then you will be prompted to enter a new password , that is where you enter the new password as you prefer . after all went well , then you have to do is go to this http://alamattarget.com/administrator a common betuk login panel of joomla .
After that , go to Extensions >> Template Manager >> Default Template Name >> Edit HTML . In the edit HTML , you can enter the code deface , then click save , and apply . Done .
Macromedia Fireworks Fireworks is a graphics design application that is devoted to creating websites . In accordance with this definition , Fireworks preferred use for a website designer with a background in graphic design expertise , which involves the image , editing , such as Adobe Photoshop or Corel Draw .
The features available in Fireworks customized with a background image editing skills , among which are :
- Ability to edit various types of image in one application - The ability to create animated effects on image - Ability to edit images and web pages in one application
To produce a website that is professional and elegant , Fireworks should be combined in accordance with the allocation and use of the unique features of each application . There are various alternatives for generating a data card at the website include:
- Microsoft FrontPage - Macromedia Dreamwaver - Macromedia Fireworks
Minimum computer system for Macromedia Fireworks program .
Windows - 800 MHz Intel Pentium III or better processor system - Windows 2000 or higher - Netscape Navigator or Internet Explorer 5.0 or higher - 256 MB RAM or higher - 150 MB hard drive or higher - 1024 x 768 or higher
Macintosh - 600 MHz Power PC G3 processor - Mac OS X 10.3 or higher - Netscape Navigator or Internet Explorer 5.0 or higher - 256 MB RAM or higher - 150 MB hard drive or higher - 1024 x 768 or higher
nama: Muhammad Safreza kelas: 11 RPL 2 tugas: Mingguan 5 DATA VALIDATION DEFINITIONS AND CONCEPTS:
Data validation, as explained above, is making sure that all data (whether user input variables, read from file or read from a database) are valid for their intended data types and stay valid throughout the application that is driving this data. What this means is data validation, in order to be as successful as it can be, must be implemented at all parts that get the data, processes it and saves or prints the results. Let's take the time and list those parts here and explain why they should be considered.
* User Interactivity Screens And Forms: Any part of an application that requires the user to enter the data (in a data entry screen for example) should most definitaly be considered as a prime candidate for data validation. Human error always end up as the prime suspect for invalid data no matter how well intended the users are. You'll find that statistically, a very big majority of the invalid data situations are usually caused by human error.
* File Manipulation Routines: This entails all file related operations such reading from the file or writing to the file. Because usually, the data saved is the result of user supplied information, it is good practice to install a data validation procedure at this level. This includes database driven applications or even just a game screen for the settings to the game for example. when reading a file, double checking what you are reading is also good practice if not for anything else, to validate that the datafile is valid and not corrupted in any way.
* Import and Export Routines: Indeed, when you plan to have your application able to save the same data in different file formats for different other applications, you need to make sure that the other applications will be able to open the file, as expected, without a problem. The reason I distinguish Import and Export from regular File Manipulation is because they are, in most cases independant of one another. These reasons as especially true when the import/export is to/from another database system. And let's face it, today, Import and Export are a very sought after feature.
These are the 3 major areas where you'd want to be sure that proper data validation is applied properly. This will only help with the rest of the application because you'll be able to cross out the data as being a cause for problem in possible errors that might slip into the application. That is, of course, once the data validation is debugged. But making sure that these are implemented in the development process rather than after the program is done will help minimize the burdon of integrating data validation in your application. Let's take a look and the types of validation that exist and are commonly used to give you an idea of where they can be used as well as how.
well ..take the validation in your program. coz the validation make perfect your program..
is a computer network concept that emphasizes the process of computing the server side and client side which performs a minimum. With PC Cloning , client side that has lower specs can run all the applications installed on the server without having to install the application in question on the client side . This thesis discusses measures such as installation of PC Cloning software installation , configuration and application systems using third-party software that is Winconnect . Clone duplication or cloning is a technique that has the same system as the original . Cloning or cloning techniques can also be applied in the computer system on the hard drive so the hard drive has a system similar to the original hard drive or master . Kagiatan clone a hard drive can be applied to a computer lab with a number of computers that much . This will save time and effort because we just install a computer with an operating system and a complete program . Next we just clone the hard drive already installed to another hard drive , then the number of existing computers will have the same system as the master hard drive . In a technique to clone a hard drive can use the media to the hard drive disk , CD to the hard drive and the hard drive to the Image . For hard disk cloning program can search the internet using google search engine with keywords in www.google.com or clone a hard drive cloning hard drive . For the record disk cloning activities , I never clone 18 pc by using pc hddclone and all turned out to have a system and a program similar to the original .
Benefits of PC Cloning save , because you only need one unit of high -speed computers to be used as Sender While the PC Client can use the old computer as a PC Pentium 486 or longer . Efficiency , Installation all done on the server applications only . Client computers need only system with a hardware device with lower specs . Even the client computer can work without a hard disk , floppy enough ( of course, with the modification process ) .
NOER IZZA AFCARINA TUGAS MINGGU KE-5 How are you my friend on this day ? ? The following article discusses the performance Powerful Ways to Speed up Mozilla Firefox , which would certainly help my friend to solve lemot.Silahkan browsing listened .
Follow the following ways :
1 . Open the application Mozilla Firefox belong pal . 2 . Then type in the address bar = about: config , and then press ENTER
3 . Then the image will appear as the " I'll be careful , I promise " , click .
4 . Then my friend will be shown many options , point the mouse to scroll down and find my friend network.http.max-connections , double click it and then enter the number 64 , click OK
5 . Then find network.http.max-connections - per - server , double -click , enter the number 21
6 . Then find network.http.max -persistent -connections - per - server , double -click , enter the number 8 , click OK
7 . Search network.http.pipelining , and then double -click will turn out to be true
8 . Search network.http.pipelining.maxrequests , double -click and enter a value of 100
9 . Then find network.http.proxy.pipelining change to true , in a way to double clicks .
10 . Right-click anywhere and select New - > then type nglayout.initialpaint.delay integrar , click OK
11 . Enter the number 0 on the Enter integer value , click OK
12 . Last Close Mozilla Firefox buddy . Then go back and try the comparison . ^ _ ^ vvvvvvvvvvv
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 5
8 Software Restore Deleted Files
1 . PCInspector File Recovery PCInspector File Recovery can recover data from FAT and NTFS boot sector even when the damage though . With this software , my friend also can save the file recovery outcomes such as photos , images , videos , songs , files on network drives .
2 . PCInspector Smart Recovery This software is designed specifically for a memory card , is able to restore the data to the file type . Jpg | . Tif | . Amr | . Bmp | . Gif | Canon . Crw | RICOH . Raw | Fuji . Raf | Olympus . Orf ( E - XX ) | Olympus . orf ( C5050 ) | Nokia 3gp | Kodak . DCR | Minolta . MRW | Nikon . nef ( D1H/D1X ) | Nikon . nef ( D2H/D2X ) | Nikon . nef ( E5000/E5700 ) | Sigma - Foveon . x3f | mp4 | QuickTime mov ( Konica Minolta ) .
3 . Recuva Recuva is a free Windows utility to restore files accidentally deleted from the computer either . This free software is very easy to use and user friendly . Recuva has many advanced features . Recuva can recover data from Hard Disk , External Drives ( USB Drives , flash , etc. ) . Even Recuva can restore the data from the iPod . Recuva works on Windows operating systems , 32 bit or 64 bit .
4 . The Pandora Recovery Pandora Recovery can recover permanently deleted files from the Recycle Bin . This software has a powerful search option that also allows to display a preview of the image files and written. Pandora also has a Surface Scan Mode feature that can help recover data on damaged or formatted partitions .
5 . TOKIWA DataRecovery File recovery software is a very simple, yet effective . With a size of only 420KB of this friend can restore deleted files from hard disks , memory cards , USB drives and other external media .
6 . Undelete Free Is a program to restore other files simple . The large size is also very small instalannya file , just 1MB . Free Undelete supports NTFS 1.0 , NTFS 2.0, FAT12 , FAT16 and FAT32 . This software can work well on all versions of Windows such as Vista , XP , etc. .
7 . Glary Undelete Glary Undelete is also very easy to use . Glary Undelete can recover files deleted from the Recycle Bin , DOS Windows , or from Windows Explorer . The program supports recovery of files to the hard drive , floppy and other external media .
8 . Restoration Restoration is a free recovery software that is simple and easy to use . Even to use it , my friend does not need to install it . Restoration can restore deleted files from hard disks , memory cards , USB drives and other external storage media .
Nama : choirul anam kelas : 11Rpl 2 mingguan ke : 2
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to . Formatting Through PC ( Windows Explorer ) 1 . Put the memory card into the card reader 2 . Plug it into a PC buddy 3 . Look for memory card drive , the example in the drive ( F , G , H , I) 4 . Then right click on the memory drive , then select " Format " 5 . After that will appear like this , replace with the FAT file system . 4 . RAM RAM is also required to load the game to execute the file . 4GB DDR2 RAM is a standard for gaming laptops . But for future game play , you will probably need a higher Ram again , and you need DDR3 RAM , because every year the game software that appears to require kuwalitas and RAM requirements are higher and the RAM access speed .
5 . hard Disk Currently for the games require HDD capacity of 15GB disk space . If you will save a lot of movies , music and photos on your hard drive then you need more disk space . Standard upcoming gaming laptop need 500GB of storage space and you can also get a large TB drive according to your ability . Ensure that the hard drive rotation speed of 7200 rpm to ensure fast data transfer speeds .
How to Reset Printer Canon MP145 and MP160 the E27 Error
Error in Computer Printer Problems can not be avoided . Its a printer error is actually a lot of causes , one of them not because of the use of which may not be true that this kind of problem arises . nah specifically for colleagues who have the type of Canon printer MP 145 & 160 are problematic . Few tips to fix it in a way to reset the printer .
Before going into how to improve , you should first identify your buddy what the error code appears on the printer . for details, the following error codes which frequently appear on the printer Canon MP 145 & 160
E2 - 2 = No paper ( ASF ) E3 - 3 = Paper jam E4 = no ink / cartridge E5 - 5 = ink cartridges are not installed or installed incorrectly cartirdge ( not -compatible ) E8 = absorber full , or platen waste ink absorber full reset mita E9 = connection to a digital camera / video camera does not support E14 = Ink Cartridges Whose destination are wrong E15 = Ink cartridge is not installed E16 - Ink remaining is unknown E16 - E19 = problems on the scan head alignment sheet E22 = Carriage error E23 = Paper feed error E24 = Purge unit error ( part dry pump head ) E25 = ASF ( cam ) sensor error E26 = Internal temperature rise error E27 = ink absorber full or platen waste ink absorber full > reset with such tools E28 = Ink cartridge temperature rise error - E29 = EEPROM error E33 = Paper feed position error E35 15 = USB Host VBUD overcurrent error - USB E37 17 = Abnormal motor driver E40 20 = Other hardware error E42 22 = Scanner error
Especially for E27 Error message , how to fix that 1 . Turn off the printer ( make sure the power cord is still attached ) , press and hold the STOP / RESET and then press and hold the ON / OFF and release the STOP / RESET , then press the STOP / RESET 2x 2 . Release both buttons , the printer is now in a position SERVICE MODE ( on the printer's LCD show the number " 0 " ) 3 . After the lights on / off green , please press the STOP / RESET accordance with the following instructions : The press 1x = Orange flame lights > for Service pattern print The press 2x = Green flame lights > for EEPROM print The press 3x = Orange flame lights > for EEPROM reset The press 4x = Light Green Flame > for Waste ink counter reset 4 . Turn off the printer and unplug the POWER . 5 . Relive your printer
NAMA : CHOIRUL ANAM KELAS : 11 Rpl 2 MINGGUAN KE : 4
Windows
- 800 MHz Intel Pentium III or better processor system - Windows 2000 or higher - Netscape Navigator or Internet Explorer 5.0 or higher - 256 MB RAM or higher - 150 MB hard drive or higher - 1024 x 768 or higher
Macintosh 600 MHz P-ower PC G3 processor - Mac OS X 10.3 or higher - Netscape Navigator or Internet Explorer 5.0 or higher - 256 MB RAM or higher - 150 MB hard drive or higher 2003 (VB 7.1) Visual Basic .NET 2003 was released with .NET Framework 1.1. New features included support for the .NET Compact Framework and a better VB upgrade wizard. Improvements were also made to the performance and reliability of .NET IDE (particularly the background compiler) and runtime. In addition, Visual Basic .NET 2003 was available in the Visual Studio.NET Academic Edition, distributed to a certain number of scholars from each country without cost.
although linux-known as a stable operating system, but crashes can happen at any time. and in the event of a crash, it would be difficult to fix. The following are a few things to note for linux does not crash the system in operation: 1. Should not log in as root when not needed. it is done to avoid mistakes that could damage the system command 2. Created an emergency boot disk with the latest kernel. The disk we use a time when the system fails to recompile the kernel 3. Use UPS to maintain system stability 4. The computer to shut down, use the shutdown command and avoid emphasis ON / OFF button to turn it off 5. Use fsck or badblocks to check the 6. Should not run fsck on a mounted file system 7. Avoid the installation of programs that are not needed 8. Make backups on floppy disks for important files
WINDOWS SEVEN History of Windows 7 : Windows 7 previously known as Blackcomb and Vienna , it has a kennel Windows NT 6.2 SP2 version of Windows Server 2008 and Windows 7 has security features that are new . Windows 7 is a kind of Windows Server 2008 SP2 . Windows was released on October 22, 2009 , features - features of windows 7 is : Jump Lists , Taskbar which opens the program with a small display , Windows Media Player 12 , Internet Explorer 8 , and others . windows 7 there are 6 types: * Windows 7 Starter * Windows 7 Home Basic * Windows 7 Home Premium * Windows 7 Professional * Windows 7 Ultimate * Windows 7 Enterprise Difference Windows 7 ( Seven ) : * Features adjustable Gadgertnya unlike windows vista gadgets put in place its * How mengistal seven not so long ( each loe Company Varies ) * The interface is not much different from vista * Speed of Windows 7 Faster Access WINDOWS VISTA History of Vista : Windows Vista was released on November 30, 2006 , for the business for the home user while released on January 30, 2007 , Windows Vista was launched in order to have a more robust security than previous versions , the new applications ( such as Windows Calendar , Windows DVD Maker and a few new games including Chess Titans , Mahjong , and Purble Place ) . In addition , Windows Vista also offers a version of Microsoft Internet Explorer more secure , as well as Windows Media Player Latest version , Windows Vista uses the version number 6.0 Type of Windows Vista there are 6 Namely : * Windows Vista Starter * Windows Vista Home Basic * Windows Vista Home Premium * Windows Vista Business * Windows Vista Enterprise * Windows Vista Ultimate Differences Windows Vista : * Features Gadgertnya can not be regulated like windows 7 * How mengistal Vista so long ( each loe Company Varies ) * The interface is not much different from the Seven * Windows Vista also introduces a feature graph is much more " alluring " , which is called Windows Aero GUI
Troubleshooting 1 ; At the time of booting the computer , the monitor turns on at first . This is evident from the appearance of the BIOS reports that can be read properly . But after the windows loading process , the monitor suddenly went dark and did not live longer . solution : If the monitor suddenly went dark for loading windows , most likely due to the monitor driver setup is not right . What often happens is that the screes on display , frequency setting is too high . To try to overcome this problem , do the windows boot in safe mode . The trick , press F8 after the BIOS and reports on the Command menu that appears select safe mode . Later in the safe mode , reinstall the graphics card driver . After that select the appropriate type of monitor that will determine the maximum frequency ( refresh rate ) which will be displayed windows . Troubleshooting 2 ; When the computer is doing activities , suddenly appeared dots or colored pixels on the monitor , which in turn causes the computer hangs and crashes . solution : Problems like the above are usually related to temperature , either in general or on a computer graphics card specifically , especially if your computer is using modern graphics card is usually faster heat . To solve the problem , do efforts to the maximum cooling fan and check function on your computer , if still in good condition . You can also move other cards into the slot slightly apart with the graphics card slot in order to provide sufficient air circulation . Troubleshooting 3 ; Monitor blinking - blinking when used solution : The problem occurs because of a problem with the refresh rate setting on your computer . The refresh rate is the maximum capacity that made the monitor to display the frames in one second . Monitor that has a refresh rate is very small will make monitors like moving and unstable , to set the refresh rate , we must use the display properties. The trick is to right click on your desktop and then select Properties . After the display properties appears , select the settings menu - advanced - adapter . At the option of the display refresh rate will be used . Press the arrows to select the optimal choice and . Troubleshooting 4 ; At run time , look at the angle of the monitor there are patches of bluish disturbing appearance . solution : This problem occurs because of the presence of magnetic fields produced several electronic devices on the monitor . To eliminate it , try using a degaussing features that exist on the monitor control menu . If you 've tried it , and there has been no change in the last resort is you have to disassemble your monitor and try to adjust the existing magnet near the end of the tube . Troubleshooting 5 ; quality of changing color on the monitor display solution : Such cases were often occur . For example, initially we use 32 bits , but suddenly we find we are only able to monitor up to 16 bits . Most likely it is influenced by influenced by the quality of the VGA that we use or just the drivers are problematic . If it turns out your problematic drivers , you have to do is reinstall the driver . However , if these measures are still not able to resolve the problem , then there is a problem on vga card . For this problem , you should bring this to your hardware service center . Troubleshooting 6 ; The monitor turns on , but does not issue the display solution : Check the installation of video cable connecting the monitor to the cpu . Tighten the cable with the supplied screws , if it is still loose . Note also plug the VGA cable to the port . If it turns out bent pins , straighten using pliers or tweezers . If after doing the repair still no change , there is a problem on the VGA card. Change your vga card with another , this is done to ensure there is damage to the VGA card.
Nama : Anisatul Khoiroh Kelas: XI RPL 2 Minggu ke- 6
Google Desktop Google desktop is a desktop virtualization technology is the result of the concept of virtual desktop infrastructure ( VDI ) is growing.
Where the desktop is also called a working computer table computer that is used for day-to- day work in one location to be at home or at the office .
Causes of Desktop Virtualization
According to a new study of 200 IT recently conducted a study describing how the services of IT professionals suffer from the complexity of the environment they deal with it everyday .
This challenge is the focus of the problem to begin Vendor can simplify computing by delivering IT as a service On- demand.dan one technology that can dramatically reduce IT complexity are doing desktop virtualization .
Technical Definitions Google Desktop
The concept is that the server environment in hardware memory and large processors will be made in a virtualized environment .
The use and communication theory On the user has enough clients , ( LAN , WAN , INTERNET ) and has the right of access to virtual desktops technically is using remote function that already exist in each operation or additional applications .
The advantages And Disadvantages Google Desktop
Ø Excellence : 1.Penyerdahanaan operating systems and applications 2.Mengurangi downtime if: A. Hardware Failure B. The process of data migration 3.Mobile access to centralized data ØKekurangan : 1.Potensi network security risk is not managed properly 2.Kesulitan complex applications (such as multimedia ) 3.Ketergantungan public network connectivity
NetBeans IDE provides first-class comprehensive support for the newest Java technologies and latest Java specification enhancements before other IDEs. It is the first free IDE providing support for JDK 8, JDK 7, Java EE 7 including its related HTML5 enhancements, and JavaFX 2.
With its constantly improving Java Editor, many rich features and an extensive range of tools, templates and samples, NetBeans IDE sets the standard for developing with cutting edge technologies out of the box.
Fast & Smart Code Editing
An IDE is much more than a text editor. The NetBeans Editor indents lines, matches words and brackets, and highlights source code syntactically and semantically. It also provides code templates, coding tips, and refactoring tools.
The editor supports many languages from Java, C/C++, XML and HTML, to PHP, Groovy, Javadoc, JavaScript and JSP. Because the editor is extensible, you can plug in support for many other languages.
Easy & Efficient Project Management
Keeping a clear overview of large applications, with thousands of folders and files, and millions of lines of code, is a daunting task. NetBeans IDE provides different views of your data, from multiple project windows to helpful tools for setting up your applications and managing them efficiently, letting you drill down into your data quickly and easily, while giving you versioning tools via Subversion, Mercurial, and Git integration out of the box.
When new developers join your project, they can understand the structure of your application because your code is well-organized
How are you my friend on this day ? ? The following article discusses the performance Powerful Ways to Speed up Mozilla Firefox , which would certainly help my friend to solve lemot.Silahkan browsing listened .
Follow the following ways :
1 . Open the application Mozilla Firefox belong pal . 2 . Then type in the address bar = about: config , and then press ENTER
3 . Then the image will appear as the " I'll be careful , I promise " , click .
4 . Then my friend will be shown many options , point the mouse to scroll down and find my friend network.http.max-connections , double click it and then enter the number 64 , click OK
5 . Then find network.http.max-connections - per - server , double -click , enter the number 21
6 . Then find network.http.max -persistent -connections - per - server , double -click , enter the number 8 , click OK
7 . Search network.http.pipelining , and then double -click will turn out to be true
8 . Search network.http.pipelining.maxrequests , double -click and enter a value of 100
9 . Then find network.http.proxy.pipelining change to true , in a way to double clicks .
10 . Right-click anywhere and select New - > then type nglayout.initialpaint.delay integrar , click OK
11 . Enter the number 0 on the Enter integer value , click OK
12 . Last Close Mozilla Firefox buddy . Then go back and try the comparison . ^ _ ^
• Free Brushes Layer Styles Place the *.asl files into: Program Files\Adobe\Adobe Photoshop X\Presets\Styles where X is the version number for your version of Photoshop.
• Free Layer Styles Shapes Place the *.csh files into: Program Files\Adobe\Adobe Photoshop X\Presets\Custom Shapes where X is the version number for your version of Photoshop.
To load a file, go to the Styles palette, then click the small arrow in the top right corner and choose one of the layer style collections from the menu.
• Free Shapes Patterns Place the *.pat files into: Program Files\Adobe\Adobe Photoshop X\Presets\Patterns where X is the version number for your version of Photoshop.
To load a pattern set, go to the Patterns palette (in the fill tool, Pattern overlay style, etc.), then click the small arrow in the top right corner and choose one of the pattern collections from the menu, or choose "Load Patterns" if the set is not listed in the menu. You can also load patterns via the Preset Manager in Photoshop 6 and up.
• Free Patterns Gradients Place the *.grd files into: Program Files\Adobe\Adobe Photoshop X\Presets\Gradients where X is the version number for your version of Photoshop.
To load a file, go to the Gradients palette, then click the small arrow in the top right corner and choose one of the gradient sets collections from the menu.
• Free Gradients Color Swatches Place the *.aco files into: Program Files\Adobe\Adobe Photoshop X\Presets\Color Swatches where X is the version number for your version of Photoshop.
To load a file, go to the Swatches palette, then click the small arrow in the top right corner and choose one of the swatch collections from the menu. Actions Place the *.atn files into: Program Files\Adobe\Adobe Photoshop X\Presets\Photoshop Actions where X is the version number for your version of Photoshop.
To load an action set, go to the Actions palette, then click the small arrow in the top right corner and navigate to the location where you saved the action. Select the file you'd like to load and it will be added to the actions palette. Learn more about creating and using actions from my links to Photoshop Action Tips.
• Free Actions Zip Files Most of the free Photoshop content on this site is distributed as Zip files to reduce download time. Before the files can be used, they must first be extracted. Zip file extraction is built into the operating system in Macintosh OS X and Windows XP. Consult your computer help if you're not sure how to extract zip files. For earlier operating system versions, you will need an unzipping tool such as Winzip (Win), Stuffit Expander (Mac), or ZipGenius (Win) to extract the files. After extracting the files, place them in the appropriate folder as indicated above.
Note: Most of these files can actually be saved anywhere on your computer, but to make them available from each tool's menu, they should be located in the appropriate folder under Presets. If you keep the files in another location, you will need to navigate to that location each time you want to use them.
Mac OS or Macintosh Operating System is a computer operating system made by Apple Computer that is used to operate the notebook computer apple macbook. Macintosh was first introduced in January 1984 through the Super Bowl ad. At that time, the steps taken by Apple is a revolutionary development in the world of personal computers.
Initially Apple intentionally made the usual Macintosh Macintosh that can more easily be run by people who are just learning the computer once. Macintosh Operating System was originally identified as a system, such as "System 6.0.7? or "System 7?. In the beginning was also recognized as a "toolbox" that there are several advantages that can be used to replace the computer linkage to the toolbox itself.
Apple also intentionally concealed the existence of the operating system to distinguish the Mac with other operating systems such as MS-DOS, which is easier to use than the Macintosh.
Macintosh Systems a. Mac OS Classic Mac OS "Classic" is a system created by the Mac in 1984 to Mac OS 9. Classic Mac-OS recognized as a system that does not have any command line or the command line and also a system that uses the user interface (UI) is fully . Because it is easy to use, this system is also criticized for using cooperative multitasking.
b. Mac OS X Mac OS X (the letter "X" is called ten, namely Roman letters) are newer. Mac OS X include elements of BSD Unix, OpenStep and Mac OS 9. Mac OS X has a Unix-style memory and pre-emptive multitasking to the Mac platform. Handling is much better memory can do more simultaneously charging and charging rule against charging will destroy each other.
Excess Macintosh a. More stable because it uses the UNIX b. Multitasking. c. Get to know the file format of the windows. d. More glossy look so good for graphic design / multimedia. e. Documents created in Mac OS can be read in another, and vice versa. Both the format of a 'generic' (eg pdf, html, mp3, text) as well as the specific format (eg. Doc,. Xls,. Ppt). Provided that no application program (application) on both platforms (Mac and Windows) that can read that format. f. Open source code so that the Mac OS is difficult to plow. g. There is a 'Time Machine' that will work automatically in the background without interrupting the running application to backup system and the ongoing changes in the data. h. There is a program "Sherlock" are not just looking for the file on the disk and in the local network, but can also act on the Internet and search by keyword. i. Macintosh has security against viruses, spyware, and so forth. This is the biggest reason why many people choose a Mac as to avoid the virus. j. Mac Operating System is simple to use and easy to learn. Because the source is unclear, its training center there, and in general when people are faced with the Mac OS is easy to learn. k. Macs have certainty and clear hardware support.
Disadvantages Macintosh a. The price is expensive. b. Only suitable for a graphic designer. c. Mac OS can not be used together other operating systems that do not use the Mac OS system d. Mac could not be assembled because Apple has not given license for other companies to make hardware that can use the Mac OS. e. Software in the Mac OS is not so complete. f. Less suitable for server applications and games.
Nama:Moch Nur Rohman kelas:XI RPL2 tugas mingguan 6
HOW TO OVERCOME THE LAPTOP NO PROBLEM . DISPLAY ( NO DISPLAY ) , BUT POWER ON BUTTON 1 . Tried to check on the MEMORY / RAM on your computer , remove the MEMORY / RAM and clean the rust on the connecting groove RAM, MOTHERBOARD , if you do not know that that was yellow on the momory / RAM , then plug it back in and try to turn it on again your laptop , if the flame is RAM / MEMORY just gross , if not try to USE Flash RAM / MEMORY NEW ..
2 . If you have to replace the MEMORY / RAM but no flame , try replacing the LCD CABLE , the cable that connects the motherboard to the LCD directly , if the flame is the lcd cable is damaged and must be replaced
3 . Ultimate solution if you have to replace both of his , and still not be able to perform / DISPLAY , try changing the LCD of your computer , if the flame is , chances are you have too DARK LCD / LCD DAMAGED due to falling weve already when his or CHANGE , hahaha : D
nahh above are some of the solutions or how to fix it , if you have difficulty in this case you can be in consultation with your LAPTOP SERVICE CENTRE , due to problems finding a point to go through the proper process of analysis , thus directly on target / her subject matter
so the info can give to you , may be useful ( note : only for display but the problem there is no power on just lhoooo , , , / klo others no.coment )
Symbian Operating System which was established since 1998 and was previously used by Nokia to date has been used by many vendors Smartphone, Symbian has experienced drastic growth and till now remains the number one category for the OS Smartphone. There are many versions of Symbian OS from version 6 to 9 but the Symbian OS has made a category for grouping the OS according to the form and function rather than his own, this is done so that users and developers are not too dizzy with a fairly varied versions of this but enough to understand the type of its course, for example, is a group S60 (Series 60), S80, S90, and Symbian UIQ. Symbian does not mention electronic products that use its OS as a PDA or PDA phone but always use a name designation "Smartphone". Symbian operating system open source software is not full because there is still availability of APIs. Symbian operating system developed by Symbian Ltd is designed for use in mobile equipment (mobile). Since its establishment, has been leading the Symbian operating system to mobile devices such as smartphones and communicator. Many applications can be used on these operating systems. Applications that can be made using the language C + +, Java or VC + +. On the Symbian operating system was created using the programming language C + +. Symbian also provides the ability to surf the PPP, FTP, TCP / IP and can also transfer data or files using Bluetooth and Infrared. Application development on the Symbian operating system using the software "Series 60 SDK for Symbian C + +" which is provided by nokia. The software consists of a compiler, emulator, and documentation of Symbian C + + language. In general, the architecture of Symbian OS is divided into four layers based on the use of the API, namely: · Supporting the application layer (Layer Utility Application) · The service layer framework and graphical user interface (GUI framework) · Communication layer · Basic layer API system
For interoperability memasimumkan kategoridalam classification API available, namely: · General Symbian API · General Symbian API irreplaceable · Optional Symbian API
On the Symbian operating system that is capable of multitasking, can open more than one application at once. Symbian OS v9.2 update them on bluetooth application. While Symbian OS v9.3 made additional applications, namely, wi-fi. And finally issued the latest version of Symbian, s60v5. Types of mobile phones that use the latest version is nokia 5800xm, n97 and nokia 5530. Applications are usually installed on symbian format. Sis or. Sisx. whereas the usual format for java. jar. Often many applications that are not installed or says "certificate error" or "expired certificate". Mobile is in because they are certified. However, as the sophistication of technology, finally able to hack Symbian. Even symbian nokia s60v5 is the latest version can be hacked as well.
Symbian is deemed superior because: 1. The operating system from the beginning was designed specifically for mobile phones. In contrast to Microsoft and Linux are adopted from the computer.
2. Blessing feature CC +, Java (J2ME) MIDP 2.0, PersonalJava 1.1.1a, and WAP, Symbian operating system is very open so anyone can develop it. proven many outstanding additional applications for Symbian OS or the Java platform.
Symbian provides a user interface (UI) framework that is flexible, so that the vendor can vary the products. Symbian has released the latest operating system for its smartphones, namely version 9.3, version 9.3 Symbian stated that this will further accelerate, mempermurah mobile phone vendors and operators to get the best services and facilities such as WiFi support, an online firmware update (FOTA), HSDPA support , VoIP over IPSec, native support for Push To Talk, Java JSR 248 support, security platform more stable and better to protect from viruses and spam, facilities support for better 3D graphics (vector floating point).
Nama:Moch Nur Rohman kelas:XI RPL 2 tugas minggu 7 How to Solve Computer Not Logged Loading Windows After Boot
How to mitigate or Laptop Computer in Windows 7 boot time error and can not get into loading Windows can only enter the BIOS . After using Windows 7 or Windows 7 Loader Activator then discharged restart , can not get into Windows just continued to restart over and over again .
Actually the above problems can be corrected without having to install Windows 7 on your birthday . Perhaps these problems , can also occur due to breakage and errors that occur because the Master Boot Record ( MBR ) that crashes or errors . Other damage can also occur because of corupt windows registry or registry has been edited by viruses . Actually , you can still use the Windows Recovery or Repair Computer with a System Image backup if you ever do .
If this happens to your computer or laptop , follow the following ways so that you can run Windows normally.
1 . You must have a Windows 7 DVD tapes first. Both the Ultimate , Home Basic , Professional , Starter depending on the OS ( Operating System) that were previously used .
2 . Turn on your computer or laptop . When you see the BIOS , press F2 or F12 key to change the First Boot . Change to the CD / DVD Room Drive , Hard Drive into a second order from the top .
3 . Insert the CD / DVD Master the Windows 7 . Then , restart again . 4 . Press any key on the keyboard , when it says " Press Any Key To Boot From CD / DVD ... " 5 . Upon booting the computer via DVD Room , it will display the installed now 6 . Click on " Repair Your Computer" as the intended image above . 7 . Wait a moment , because the computer will check and scan data. Then click Next or OK . 8 . Then appear 2 options , the top is for Recovery Windows . Bottom is the restore point , which is an option if you ever do a backup before. 9 . Choose the top of the recovery , then the display appears as below .
10 . Here you can use various options to repair the damage to your Windows , usually I try Startup Repair first. Then perform hard drive capacity on Local Disk C or D. If the emerging Local Disk Local Disk D , usually the Repair option can not be used , use System Restore to restore data to the previous schedule ( the second option ) .
11 . If not it could be , use System Image Recovery . 12 . For the last option is to use the Command Prompt , just click on Command Prompt . It will appear as a black box in cmd .
13 . Typing DIR C : and press enter , in order to see the contents of the local disk C and open it . Retype one of the options below , start one by one to try .
type : bootsect.exe/nt60 c :
bootsect.exe/nt60 all
Bootrec.exe / fixmbr
Bootrec.exe / fixboot
bootsect / nt60 all / force / mbr
Type was one by one starting from the top , and then press ENTER . If not it says The operation has been succesfull . Try writing a second type above .
After that , click the Restart button at the bottom next to the Shut Down button . If the above methods , it can not fix everything on your Windows system boot . Meaning you have to do a reinstall. However , nearly 80 % , way above can overcome the problems often encountered that can not be entered until after loading the Windows boot process . May be useful for friends .
nama : muhammad safreza 11 rpl 2 tugas minggu 7 algorithm design
Algorithm design is a specific method to create a mathematical process in solving problems. Applied algorithm design is algorithm engineering.
Algorithm design is identified and incorporated into many solution theories of operation research, such as dynamic programming and divide-and-conquer. Techniques for designing and implementing algorithm designs are algorithm design patterns,[1] such as template method pattern and decorator pattern, and uses of data structures, and name and sort lists. Some current day uses of algorithm design can be found in internet retrieval processes of web crawling, packet routing and caching.
Mainframe programming languages such as ALGOL (for Algorithmic language), FORTRAN, COBOL, PL/I, SAIL, and SNOBOL are computing tools to implement an "algorithm design"... but, an "algorithm design" (a/d) is not a language. An a/d can be a hand written process, e.g. set of equations, a series of mechanical processes done by hand, an analog piece of equipment, or a digital process and/or processor.
Steps in development of Algorithms
*Problem definition *Development of a model *Specification of Algorithm *Designing an Algorithm *Checking the correctness of Algorithm *Analysis of Algorithm *Implementation of Algorithm *Program testing *Documentation Preparation
Nama : Anisatul Khoiroh Kelas : XI RPL 2 Minggu ke-7
Various Kinds Beep Beep For Warning Damage On Computer Leave a comment To determine the type of damage or problems that often occur when the computer is turned on , can be recognized through the beeps that appear on the mainboard speaker at the first time the computer is turned on . With the familiar beep on each motherboard we can know keruksakan or problems on our motherboard .
Mainboard with Award BIOS and Phoenix BIOS :
Short beep 1 time : Normal System .
Short beep 2 times : Damage / errors in CMOS .
1 long beep and short times 1 times : Damage / errors in DRAM / short ram or ram happen .
1 long beep 2 times and short times : Damage / error on the VGA card / often occurs when using the onboard vga .
1 long beep 3 times and short times : Damage / error on the keyboard or on the VGA card , often characterized by menyalanya LED lights on the keyboard .
1 long beep and a short time 9 times : Damage / error at ROM
Long beep repeatedly : Damage / error In DRAM , DRAM not installed correctly , or is not compatible with the mainboard DRAM , the DRAM pci note that the pairs
Short beep repeatedly : Power on the power supply is not enough , immediately replace the power supply or check the power supply cables .
Mainboard with the AMI BIOS :
No beeps : Damage / fault on the mainboard , powersupply , or the internal speaker .
Short beep 1 time : the normal system .
Short beep 2 times : Damage / errors in DRAM .
Short beep 3 times : Damage / same error with a short beep 2 times .
Short beep 4 times : Errors in the system date and time .
Short beep 5 times : Damage to the processor / mainboard .
Short beeps 6 times : Damage / error on the keyboard .
Short beep 7 times : Damage / same error with a short beep 5 times .
Short beep 8 times : Damage / VGA error .
Short beep 9 times : rom checksum error at the time .
Short beep 10 times : Damage / errors in CMOS .
Short beep 11 times : Damage / error on Cache Memory .
1 long beep 3 times and short times : Error during memory test .
1 long beep and a short time 8 times : mistakes when checking VGA . And below there is little sense of a beep, indicating the presence of faults / failures in one of the components of your computer .
Type AMI BIOS :
1x long BEEP sound There is a possibility of death or RAM installed improperly , thus causing failure DRAM refresh .
2x Parity circuit failure . At the time of the transmitted data in the computer , usually added parity bits are used to detect errors . This work was carried out a series of parity on the computer . This is probably caused by a problem with the memory or the mainboard .
3x Base 64K memory failure , the failure is usually due to the memory slots are grouped into modules which have a defective chip . Base 64K memory is the memory of the first 64 KB of RAM .
4x Failure of the system timer , the possibility of an error in one or more timers are used to control functions on the motherboard .
5x Processor failure , can be caused by excessive heat , or because the process is not inserted properly into the socket .
6x Failure keyboar controller / gate A20 , the keyboard controller is a chip on the motherboard that controls your keyboard
7x processor reading error possibility of damage to the processor
8x error read / write memory display
9x damage BIOS
10x CMOS error
11x Damage cache memory
All types of Motherboards
1 . Beeb Beep if there is a short 1 x , it means that computers fine Beep sound 2.kalau ... 1x long , hard disk problems on . 3 . Beep .. then Beeb pndek long 1x 1x , the motherboard problem . 4.Beeb .. Beeb short length keeps 1x 2x , VGAnya problematic . 5 . 3x Long Beep , The keyboard error 6.Beep , Beep ( short ) terus2an , check Power supplynya 7.Beep ... Long terus2an , there is a problem on Its memory .
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 6
Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2. The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on. Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key also owns the matching private key. In all versions of SSH it is important to verify unknown public keys, i.e. associate the public keys with identities, before accepting them as va. Proprietary, freeware and open source (e.g. PuTTYlid. Accepting an attacker's public key without validation will authorize an unauthorized attacker as a valid user.
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 7
Software And Application Which There Is Mandatory Computer We
A. Software To Improve Computer Performance . • CCleaner . Many people who regard this software does not need to be in the computer . But for me the very bullet karnena CCleaner can improve performance of our computer such as cleaning the Registry , Chace , or History on your computer with Safe . with a clean and sleek registry will berimpas on a computer that runs with more fast.CCleaner have an interface ( interface) is simple and user friendly easy to use. the Cleaner section you will find a function to cleanse both temporary files generated by Windows and other applications . in this section you will find the option cleans traces of your internet browser be it cookies , history , lastdownload to Autocomplete . B. Anti- Virus • My friend can use Anti- Virus that has been in production and is distributed free on the Internet . Whether it's AVG , Avast or Norton and latest Kaspersky . Try to always update . I think a scan once a week is enough .
C. Adobe Reader or Foxit Reader • It's good buddy install this application on the laptop . to search in Google friend use the keyword " Adobe Reader " or Foxit Reader " on the Google search engine .
D. Adobe Flash Player • To watch Youtube or play poker this application may needs. Usually when buying a new laptop this application is not installed in it . There may be from my friend who can not open Youtube and flash blend Fucking her lai . my friend needs this application . To download get the usual no writing in the Fucking are not open please click the recommendations or the words " Adobe Flash Player " in the Google Search engine
E. Microsoft Net . Framework • Do not Ignore This application because it had a function . there are some applications can not be installed in because of the lack of Microsoft Net . This framework . Please check in the control panel at the Computers Unistaler mate , already installed, please or not if not installed in accordance with the Computer pal . First puncture of the Microsoft Net . This Framework is to facilitate lawyer codingan and command execution .
F. Design • If the friend can design please install Photoshop or Corel Draw if you can not or do not use at all please keep the software on your computer as it is very heavy and takes up a lot of the storage capacity .
G. Winrar and zip • Do not Forget This application is a very useful course
Google Bookmarks is a free online bookmarking service, available to Google Account holders.[1] It is completely separate from browser-based bookmarking and should not be confused with the Bookmarks function on any popular browser, Google Chrome included. Google Bookmarks was launched on October 10, 2005.[2] It is cloud based service that allows users to bookmark webpages and add labels or notes.
Users can access their bookmarks from any browser on any computer by signing into their Google account. The bookmarks are searchable, and searches are performed on the full text of the bookmarked pages, not just the labels and notes.[citation needed]
Google Toolbar has a tool enabling users to easily bookmark pages and access them. Bookmarks can also be created manually from the web interface, or by use of third-party tools such as Firefox extensions created for the purpose of managing the user's Google Bookmarks account[3] and keeping them synchronized to the browser's bookmarks. VIVI FONI D.N
A simple JavaScript function labeled Google Bookmark is created on the Firefox Bookmarks Toolbar, which opens a window to save the bookmark to the Google Bookmarks. This same function can be imported into other browsers as a bookmarklet.[4]
Google Bookmarks is a free online bookmarking service, available to Google Account holders.[1] It is completely separate from browser-based bookmarking and should not be confused with the Bookmarks function on any popular browser, Google Chrome included. Google Bookmarks was launched on October 10, 2005.[2] It is cloud based service that allows users to bookmark webpages and add labels or notes.
Users can access their bookmarks from any browser on any computer by signing into their Google account. The bookmarks are searchable, and searches are performed on the full text of the bookmarked pages, not just the labels and notes.[citation needed]
Google Toolbar has a tool enabling users to easily bookmark pages and access them. Bookmarks can also be created manually from the web interface, or by use of third-party tools such as Firefox extensions created for the purpose of managing the user's Google Bookmarks account[3] and keeping them synchronized to the browser's bookmarks.
A simple JavaScript function labeled Google Bookmark is created on the Firefox Bookmarks Toolbar, which opens a window to save the bookmark to the Google Bookmarks. This same function can be imported into other browsers as a bookmarklet.[4]
The sound of " beep " will generally be out of the laptop or computer each time before finally booting the laptop or computer managed to get into the operating system .
But basically the sound of " beep " not because it does not accidentally appear . The sound of " beep " coming out of the laptop or computer is a sign of certain problems that occur on your laptop or computer . Analysis of sounds like this is often used for a computer analyzer problems .
The sound of " beep " once meant short or laptop computer managed to do a friend's apartment and turn on all the components needed for prosse boot up a computer device . If the sound is heard but the device does not turn on , check the monitor of my friends .
The sound of " beep " short 2 times means there is a problem in the configuration or the CMOS settings .
The sound of " beep " so long and so short it means there is a hardware problem on the motherboard or memory my friends . Make sure both devices have been installed properly .
The sound of " beep " once long and 2 short time indicates a problem with the monitor or the VGA card .
The sound of " beep " long 1 short times and 3 times it means there is a problem on the keyboard of my friends . Try to clean the keyboard of my friends .
The sound of " beep " once long and short sounds 9 times if there is a problem in the BIOS RIOM my friends .
The sound of " beep " continuous length means there is a problem with the RAM my friends .
The sound of " beep " sounds short and continuously indicate acceptance of voltage or power problem on Laptops .
Local Area Network ( LAN ) is the most common type of network data. As the name suggests , serves local area LAN typical installation in industrial plants , office buildings , college or university , or similar locations . In such location is feasible to build a high -quality network , communication links interconnecting the nodes speed . Typical data transmission speed is 1/100 megabits per detik.LAN allows users to share computer resources within an organization , and can be used to provide access ( shared ) to the organization remotely through a router connected to the Metropolitan Area Network ( MAN ) or Wide Area Network ( WAN ) .
MAN ( Metropolitan Area Network ) .
MAN is a relatively new class of network , serving a role similar to the ISP , but for corporate users with large LANs . MAN typically covers an area of between 5 to 50 km in diameter . A MAN ( like a WAN ) is not generally owned by a single organization . MAN , its communications links and equipment are generally owned by a consortium of users or by a single network provider who sells the service to the user . The level of service provided to each user so it must be negotiated with the MAN operator , and some guarantee of performance usually ditentukan.M AN often act as a high speed network to allow sharing of regional resources ( similar to large LANs ) . It is also often used to provide a shared connection to other networks using a link to the WAN .
WAN ( Wide Area Network ) .
Understanding WAN is a wide area computer network combines multiple LANs that are geographically dispersed . This is done by connecting the LAN using a range of services dedicated phone line rental , dial-up phone lines ( both synchronous and asynchronous ) , satellite links , and data packet carrier services . WAN modem can run with or contrary to the remote access server using special routing protocols and filters to minimize the cost of data transmission over vast distances . Term Wide Area Network ( WAN ) usually refers to a network that covers a large geographical area , and use communications circuits to connect the intermediate nodes . The main factors affecting the performance of a design is a WAN circuit requirements that they lease from company communications or other communications telephone operators . The transmission rate of typically 2 Mbps, 34 Mbps , 45 Mbps , 155 Mbps , 625 Mbps ( or sometimes much more ) . Mencajup network is vast geographical areas such as provinces , island , country , continent or the whole world ( 50 Km ) . Example national telecommunication networks , mobile telecommunications and national television .
ruangberkas.com_imagesClear CMOS / Reset BIOS merupakan trik untuk merubah setingan BIOS kembali seperti semula (defaulnya/setingan dari pabrikannya). Untuk melakukan ini Anda tidak usah mencabut batery yang ada pada Motherboard tetapi cukup menindahkan posisi jumper CMOS, jumper ini biasanya terpasang di sekitar batery.
Jumper tersebut terpasang diatas 3 pin. Untuk setingan awal jumper berada di pin 1,2 sedangkan pin 3 tidak diisi. Jika Anda ingin melakukan clear CMOS maka Anda hanya lakukan cabut jumper tersebut dan pasang jumper tersebut ke pin 2,3 pin 1 tidak diisi. Setelah itu diamkan komputer kurang lebih 5 menit (untuk lebih memastikan CMOS clear). Setelah itu cabut lagi jumpernya kemudian pasang keposisi semula ke pin 1,2 dan pin 3 tidak diisi. Kalo tidak mau ribet dan susah, cabut saja Batery BIOS tersebut dan diamkan selama beberapa menit dalam kondisi komputer tidak tertancap power listrik. setelah beberapa menit lalu pasang kembali baterynya, dan nyalahkan komputernya.
Jangan lupa seting ulang BIOS, jam, tanggal sistem, dan setingan yang lainnya kemungkinan berubah.
Ingat kalo mau clear CMOS/BIOS kondisi komputer harus mati dan usahakan tidak ada listrik yang menancap ke komputer.
ruangberkas.com_imagesClear CMOS / Reset BIOS merupakan trik untuk merubah setingan BIOS kembali seperti semula (defaulnya/setingan dari pabrikannya). Untuk melakukan ini Anda tidak usah mencabut batery yang ada pada Motherboard tetapi cukup menindahkan posisi jumper CMOS, jumper ini biasanya terpasang di sekitar batery.
Jumper tersebut terpasang diatas 3 pin. Untuk setingan awal jumper berada di pin 1,2 sedangkan pin 3 tidak diisi. Jika Anda ingin melakukan clear CMOS maka Anda hanya lakukan cabut jumper tersebut dan pasang jumper tersebut ke pin 2,3 pin 1 tidak diisi. Setelah itu diamkan komputer kurang lebih 5 menit (untuk lebih memastikan CMOS clear). Setelah itu cabut lagi jumpernya kemudian pasang keposisi semula ke pin 1,2 dan pin 3 tidak diisi. Kalo tidak mau ribet dan susah, cabut saja Batery BIOS tersebut dan diamkan selama beberapa menit dalam kondisi komputer tidak tertancap power listrik. setelah beberapa menit lalu pasang kembali baterynya, dan nyalahkan komputernya.
Jangan lupa seting ulang BIOS, jam, tanggal sistem, dan setingan yang lainnya kemungkinan berubah.
Ingat kalo mau clear CMOS/BIOS kondisi komputer harus mati dan usahakan tidak ada listrik yang menancap ke komputer.
Overcoming Bluescreen erorr Of course many of you have ever experienced a Blue Screen problem on a computer . Tips and tricks I got from a forum , I am posting here as a reminder to me if one day experiencing problems related to BS and also , perhaps there is among you now are experiencing this problem and wondering how to handle . With this article , I hope to provide a solution to the problem of the settlement of the BS that you face . Immediately following to - 10 error codes , causes and workarounds :
1 . IRQL_NOT_LESS_OR_EQUAL ( 0X0000000A ) This is a culprit in the mastermind BSOD . Why ? Since most of the BSOD , this message appears most often . This error message is caused generally , due to the incompatibility of the drivers installed on your computer . Cause List : ? Conflicting driver problem or do not match ? Issues Video Card , this includes video card overclocked beyond the limit or you just changed your video card and you have not uninstalled the old video card drivers from different chipset ? Problems Audio Card , include configuration errors or bugs in the sound card driver 2 . NTFS_FILE_SYSTEM or FAT_FILE_SYSTEM ( 0X00000024 ) or ( 0X00000023 ) Well , the message is at least a little "disconnected " gives an overview of where the damage is located , which is in a partition or filesystem but not in HD. We can check by check or PATA or SATA cable can check the partition with chkdsk tool . 3 . UNEXPECTED_KERNEL_MODE_TRAP ( 0x0000007F ) When you get a message like this , can be caused by : ? Hardware Overclock excessive ? Computer components are overheating ? BIOS is corrupt ? Memory and CPU are defective 4 . DATA_BUS_ERROR message is caused because of the possibility that memory or the memory slot on the motherboard is damaged . 5 . PAGE_FAULT_IN_NONPAGED_AREA Caused due to hardware damage , including main memory , video card memory , or memory in the processor ( L2 Cache ) 6 . INACCESSIBLE_BOOT_DEVICE Due to an error in the configuration jumpers wrong disk , boot sector viruses , wrong IDE controller driver , or chipset driver error . 7 . VIDEO_DRIVER_INIT_FAILURE error occurs on the video card driver installation is less than perfect , restarts during installation or can also occur because of errors in the installation of the driver . 8 . BAD_POOL_CALLER This error can occur because of errors or incompatible drivers . Often occurs during installation of XP upgrade , or not of new installations . 9 . PEN_LIST_CORRUPT message is caused due to damage to the RAM 10 . MACHINE_CHECK_EXCEPTION disability caused by the CPU , overclocked or aggressively , as well as the power supply or faulty power shortage .
Address List , grouping IP addresses based on name . Asynchronous , serial PPP Supports dial-in/dialout , with CHAP authentication , PAP , MSCHAPv1 and MSCHAPv2 , Radius , dial on demand , up to 128 ports modem pool . Bonding , Support in combining multiple ethernet interfaces into 1 pipe on a fast connection . Bridge , Supports spanning tree bridge function , multiple bridge interfaces , bridge firewalling . Data Rate Management , QoS -based with the use busrt HTB , PCQ , RED , SFQ , FIFO queue , CIR , MIR , limit between peer to peer . DHCP , DHCP Supporting each interface ; DHCP relay ; DHCP client , DHCP multiple networks ; static and dynamic DHCP leases . Firewall and NAT , filtering Supports peer to peer connection , source NAT and destination NAT . Being able to filter based on MAC , IP address , port range , IP protocols , protocol options such as selecting ICMP , TCP flags and MSS . Hotspot , hotspot gateway with RADIUS authentication . Supports data rate limit , SSL , HTTPS . IPSec , AH and ESP protocols for IPSec ; MODP Diffie-Hellman groups 1 , 2 , 5 ; MD5 and SHA1 hashing algorithms ; using the DES encryption algorithm , 3DES , AES - 128 , AES - 129 , AES - 256 ; Perfect Forwarding Secresy ( PFS ) MODP groups 1 , 2 , 5 . ISDN , ISDN Support dial-in/dial out . With authentication PAP , CHAP , and MSCHAPv2 MSCHAPv1 , Radius . Supports 128K bundle , Cisco HDLC , x751 , x75ui , x75bui line protocol . M3P , Mikrotik Package Packer Protocol for wireless and ethernet links . MNDP , Mikrotik Neighbor Discovery Protocol , also supports Cisco Discovery Protocol ( CDP ) . Monitoring / Accounting , IP traffic reports , logs , statistics graphs accessible via HTTP . NTP , the Network Time Protocol server and client ; synchronization use the GPS system . Point to Point Tunneling Protocol , PPTP , PPPoE and L2TP Access Concentrators ; authentication protocol using PAP , CHAP , MSCHAPv1 , MSCHAPv2 ; RADIUS authentication and reporting ; MPPE encryption ; compression for pppoe ; Limit data rate . Proxy , Cache Proxy for FTP and HTTP servers ; HTTPS proxy ; transparent proxy for DNS and HTTP ; SOKCS protocol support ; parent proxy support ; static DNS . Routing , static and dynamic routing ; RIP v1/v2 , OSPF v2 , BGP v4 . SDSL , Supports Single Line DSL ; termination mode and network connection point . Simple Tunnels , and EoIP IPIP Tunnel ( Ethernet over IP ) . SNMP read-only access mode . Synchronous , V.35 , V.24 , E1/T1 , X21 , DS3 ( T3 ) media types ; sync - PPP , Cisco HDLC ; Frame Relay line protocol ; ANSI - 617d ( ANDI or annex D ) and Q933a ( CCIT or annex A ) ; Frame Relay LMI types . Tool , Ping ; traceroute ; bandwidth test ; ping flood ; telnet ; SSH ; packet sniffer ; Dynamic DNS update. UPnP , universal interface supports Plug and Play . VLAN , Virtual LAN Support IEEE802.1q for ethernet and wireless networks ; multiple VLANs ; VLAN bridging . VOIP , supports voice over IP applications . VRPP , Supports Virtual Router Protocol redudant . Winbox , Application GUI mode to remotely and configure MikroTik RouterOS .
Modifications to the blog template " Background Technique "
Make the blog interesting CSS techniques require complicated , I find new ways to make your blog look attractive without the need for complicated settings CSS . This technique is great for those of you who do not understand the CSS code . The technique I named engineering background .
Engineering background as the name of this technique makes the background as the main view blog . In order for this technique to be successful you have little knowledge of Corel , Photoshop or other image design programs . The technique I use on this blog template .
* note this technique is applicable to "simple default template blogger "
simple template This tutorial we will change the appearance of the blog header . With a background technique you only need to set the background as below
This background has been adjusted by a margin of simple templates . So that when combined , the results will be as below .
Her appearance would be much nicer if you have graphic design skills . You just need to adjust the magin - magin the original template . Size above the background you can make reference to create other bakgground .
How to add a background to the blog template find the following css code :
. fauxcolumn - outer - body . stamp - top { position: absolute ; z - index : 1 ; height: 400px ; width: 100 % ; background: $ ( body.background ) ; $ ( body.background.override ) background: url ( " http://3.bp.blogspot.com/-9BvRkailQzs/Tztv0wAtRsI/AAAAAAAAE3I/rtnnTCZheC0/s000/wrapper.jpg " ) no-repeat center 0px ; }
description : black is the color code in your template code red and blue code is the code that you add code blue is your image url backgrund
If it is all save your template .
The next step you go to the template > select adjust
The next will appear as below
click to enlarge
select settings ( advanced ) > background > main screen > select transparent and Terapakan on blogs
During this time I lock the computer by using the conventional way is to lock your computer with a password on windows.Tapi memberikkan since some time ago I started using the computer to lock the flash ! So that will automatically lock the computer screen and lock your computer keyboard . How To Lock kompter with passwords Secret Techniques How To Lock Computer With flash
And Locking Using computer flash is much more effective than on the computer lock with password through the windows .
While the software to lock the computer in call dengna Predator.Dan steps to lock the computer from the flash please refer to the following :
Please download legally and free to lock the computer that is predatory in http://download.cnet.com/Predator-Free-Edition-32-bit/3000-2144_4-10915340.html Then run your application and plug predators or plug your flash to the computer or laptop when you plug the flash drive anda.Pada will display a dialog box that asks you to enter any password Click Ok Furthermore, we will enter the Preferences window . Rates in some settings menu . And you have to do is enter a new password and Uniq safe course by clicking on the " New password " . This function A When you lose your flash or damaged then you will meunggunkaan yes as key to login computers . please click on the check on the option " Always Required " If you want to make a Predator Software is always asking for a password to unlock . It is important bagiaan on " Flash Drive " you should memastikkan that you have selected the correct usb flash drive . Then click on "Create key" > Ok If the Above steps have been done correctly then you will automatically exit the application predators . Next click on the task bar icon predators to make an application to be restarted predator predators application icon in your Hijau.Dan color it turns into a sign that the predators applications already running on your computer . Remember every 30 seconds then you will apilkasi predator check if your flash masi stuck in your computer . Automatically plugged Otherwise your computer will be locked .
So How Lock computer with password using software to lock the computer with the stick. Hopefully useful
London - Land Rover automaker recently showed their latest concept car , Concept Vision Discovery . This car is fairly advanced . Because it can be controlled with the mobile phone as a remote control .
With Discovery Vision Concept , Land Rover wants to redefine the segment that has long been infiltrated by Discovery .
" And it's very appropriate that the 25th anniversary of Discovery 's see how this evolution will take us forward into the brave new era . Discovery Vision Concept gives us an amazing glimpse into a very exciting future ," said Phil Popham , Group Marketing Director , Jaguar Land Rover .
The design now looks very modern without leaving the impression of a typical masculine Land Rover and a roomy cabin .
Loose talk about the design , the main advantages of this concept car is a technology that is carried. Land Rover says that this is the initial map them to step into the future .
First there is the technology Human - Machine Interface ( HMI ) that is able to create a new multimedia experience for all passengers . With this technology , a phone call or a video can be displayed on the screen infotaiment .
Cool again , the whole glass used in this car has been using Smart Glass technology . So , like a touch screen , the glass in the window can be used to access a variety of things and can even be operated by Gesture Control .
CALIFORNIA - AMD today updated the program " Forever Never Settle " , the famous game bundling program for the purchase of AMD Radeon products . Starting today , the promotion program " Never Settle Forever " will be more widely available for purchase AMD Radeon graphics card , graphics card includes up to R7 Series enthusiast class AMD Radeon highest R9 295X2 .
Through an official statement received Okezone , Friday ( 25/04/2014 ) , for the first time , the program " Never Settle Forever " will be available for the entry-level graphics card AMD : AMD Radeon 250X R7 , R7 250 and R7 240 . Programs " Never Settle Forever " is dedicated to gamers in selecting games most desirable renowned as a reward for buying a graphics card AMD Radeon .
Users can get up to three free games with a choice of AMD Radeon Reward coupons redeemed . The number of choices will depend on the type of gift , ie Gold , Silver or Bronze . " We are pleased to be able to develop programs ' Never Settle Forever ' which was so successful , like what we had last year promised by the Unified Gaming Strategy , " said Matt Skynner , corporate vice president and general manager , Graphics Business Unit , AMD .
" AMD's graphics technology , combined with our cooperation with game developers , demonstrated our leadership in the gaming industry . The latest games to be released Square Enix , " Murdered : Suspect Soul " , will be available for the program " Forever Never Settle " Gold and Silver Radeon through Rewards for the first time .
Optimized for Graphics Core Next architecture ( GCN ) , gamers can get a game code that can be claimed or redeemable when the game is released in June 2014. " Through ' Murdered : Suspect Soul ' , we continued cooperation between Square Enix and AMD . We are dedicated to bringing world-class experience for PC gamers and can not wait to launch our games in the AMD program ' Never Settle ' , said Naoto Sugiyama , executive producer , ' Murdered : Suspect Soul ' .
For the first time , AMD also include PC games from independent developers into the program " Never Settle Forever " as one of its options . Bundled with the name " indie pack , " gamers can choose the indie pack in which there are two independent gaming titles .
" We are very pleased to be presenting ' The Banner Saga ' as one independent games that will be offered in the AMD program ' Never Settle Forever ' . We are looking for a new audience of game titles for the AMD Radeon users around the world , " said Steve Escalante , GM , Versus Evil . ( ahl )
CALIFORNIA - Giant processor manufacturers , AMD , today announced the availability of a new platform AM1 globally . AM1 APU platform has a dual - core and quad - core processors code-named " Kabini " .
AM1 APU Platform with AMD Athlon and AMD Sempron will use the architecture of the Graphics Core Next ( GCN ) and the CPU cores ' Jaguar ' to the motherboard of a variety of hardware manufacturers . AMD Athlon 5150/5350 and AMD Sempron 2650/3850 offers the best computing for users with a platform that can be upgraded .
AMD Athlon and AMD Sempron present quad-core APU solution for users with two SATA 6Gbps ports , two USB 3.0 ports , eight USB 2.0 ports , PCIe 2.0 lanes for graphics cards , and three video outputs ( DisplayPort , HDMI , and VGA ) .
AMD platform is claimed to provide performance computing AM1 3-fold better than its competitors . This technology is also supported by DirectX 11.2 and Windows 8.1 OS .
" The new platform Sempron and Athlon provide price and outstanding performance with low power consumption that were previously not available in the market . We are pleased to see many mainboard manufacturers are ready to support the socket comprising FS1b microATX board and MiniITX to build an efficient system of PCs , " said Patrick Choy , Director of CPU Product Management , Newegg .
As is known , the Jaguar is a CPU technology found on gaming consoles PlayStation 4 and Xbox One . For the price varies , reportedly AMD 's latest APU sell at a price below $ 40 . ( ahl )
CALIFORNIA - AMD recently announced a new partnership with 2K Games to bring support API Mantle into the game Sid Meier 's Civilization ® : Beyond Earth . This technology to improve performance and quality graphics for AMD Radeon graphics card users .
Mantle is effective and efficient API which can improve performance for gamers to maximize multi-core CPU , simplifying and streamlining the code execution in the game , eliminating bottlenecks in virtual software , and take advantage of GPU capabilities with highly efficient .
" API API Mantle became the first and only proven -effective and efficient for gamers and developers , " said Ritche Corpus , director of ISV alliances gaming and AMD through its official statement .
He said that , the performance generated by the API as Mantle can be very powerful , especially for a game with a lot of display objects on the screen . " We are very proud to have worked closely with 2K Games Sid Meier 's game Civilization : Beyond Earth and present these advantages into a game franchise that is so beloved fans , " he explained .
Sid Meier 's Civilization : Beyond Earth is a sci - fi themed game from the latest Civilization franchise where players explore the world of bias , leads and bring their forces into new territories controlled by aliens and make a new life there . ( ahl )
Indonesian 5C 8GB iPhone Not Coming Monday, 21/04/2014 09:04 pm
Jakarta - Apple has just launched another version of the iPhone 5C with an internal memory capacity of 8GB to a number of countries . From the list, there is no Indonesian name in it .
Apple announced the iPhone 8GB 5C to complement previous versions of 16GB , 32GB and 64GB . Although capacity is small , do not expect big price will be more affordable .
Because 5C 8GB iPhone is priced at USD 717 or about USD 7.3 million . Indeed USD67 cheaper than the 16GB version of the iPhone 5C . So that was quoted from MacRumors , Monday ( 04/20/2014 ) .
The countries that will be the arrival of the iPhone 5C ' Cheap ' is the Netherlands , Italy , Belgium , Sweden , Poland , Czech Republic , Ireland , Portugal , Austria , Spain . Norway, Finland , Denmark , Switzerland , Hungary and Luksembroug .
When viewed from the list of the country , the 8GB iPhone 5C is not intended for developing countries . But more to propel LTE mobile penetration in European countries .
IPhone 5C own fate is inversely proportional to his brother , the iPhone 5S . Plastic smart phones that are not selling well , even stock piled up in warehouses .
Apple iPhone 5C actually created in response to users who want to buy the latest iPhone at an affordable price , but it seems less well received .
Graphics Card 'Monster' Nvidia Gliding End of April
Jakarta - The presence of a dual-GPU graphics card Radeon R9-295x2 taken seriously by Nvidia. AMD's competitors also ensure 'monster' challenger already on store shelves by the end of this April.
Carrying the title GTX Titan-Z, offal graphics card 'monster' is composed of two GK110 GPU with 28 nm manufacturing in it. The combination of both thrusting 880 CUDA cores, 240 TMU, and 48 ROPs.
Memory capacity is also not kidding, immerse Nvidia GDDR5 chips with a total size of 12 GB, which is the sum divided by 2 for each core by 6 GB. As for its memory bandwidth is equal to 384 bits.
However, when compared to the Radeon R9-295x2 which combines dry and liquid cooling, graphics card Nvidia GPU conference was announced in last month's Technology is only equipped with dry cooling via fan large enough.
Even so, it actually leads to the swelling of Titan GTX-Z dimension, so that the user shall prepare a space that takes 3 PCI slots.
As quoted from VR-Zone, Friday (25/04/2014), although referred to already begin to be distributed throughout the world, Titan GTX-Z new plan will begin to enter the store shelves on April 28.
While the price offered to sign him is USD 2,999 or approximately USD 34 million.
The official price is much higher than the Radeon R9-295x2 offered by AMD of $ 1,499 or approximately USD 17 million.
Microsoft Bring Back the Start Menu In Windows Version 8.1 Updates to Come
exciting news for users of Microsoft's latest Windows Build Developers Conference 2014! Microsoft reportedly has just decided to bring back the presence of the Start menu on the Windows version of the upcoming renewal in its efforts to make the popular operating systems can be more in line with the operation of a desktop computer Yes, it is very reasonable, considering the recent one Microsoft representative named Terry Myerson have confirmed that the presence of the Start menu will soon be back in use. But as mentioned regarding when it will be realized, it unfortunately still reluctant to disclose it.
While such post what is exhibited from the above image on the Windows operating during the keynote, look look look Start menu that blends classic design latest with a modern twist, the second shows a list of installed applications, as well as live tiles display. Moreover, thanks to the existing central power options make it easier later on you can turn off or reboot the computer.
In addition, the same screenshot also shows that the users are welcome to start a Metro app in windows private itself, which indicates that the Microsoft is working hard to integrate modern UI with Windows desktop display on the upcoming renewal.
ADATA DDR4 RDIMM memory Presenting the latest in 3 Capacity
ADATA, which is a leading manufacturer of DRAM modules and high-performance products NAND Flash applications, has announced the launch of the new DDR4 module. In collaboration with Intel ®, ADATA has successfully developed and released DDR4 RDIMM (Registered ECC DIMMs) platforms that are fully compatible with the new generation of the product family of Intel ® Xeon ™ processor E5-2600 v3 which was recently launched. DDR4 RDIMM memory products are available in capacities of 4, 8 and 16 gigabytes, runs at a voltage of 1.2 volts, and at a frequency of 2133MHz. Higher clock frequency, data transfer speeds are much faster, and the ability to operate at low voltages of DDR4 memory makes it suitable for use in the growing cloud servers, storage and other networking applications.
The following types of variations are available in a wide choice of capacities:
Specification
Type
Capacity
Tension
Frequency
Part Number
DDR4
RDIMM
4GB
1.2V
2133MHz
AD4R2133W4G15
DDR4
RDIMM
8GB
1.2V
2133MHz
AD4R2133Y8G15
DDR4
RDIMM
16GB
1.2V
2133MHz
AD4R2133Y16G15
Jacky Yang, ADATA Product Manager, said that ADATA is developing DDR4 version of ECC SO-DIMM, VLP RDIMM, and LRDIMM, so we hope to provide the stability and reliability of the ADATA you already know to work at low voltage while still giving performance high
Perform Algorithm Changes in Microsoft Windows Store, Downloadable Games No Longer Show Game At Most Downloaded
Microsoft is enacting a new policy related category in the Windows Store Top Games hers. The category now contains not many games played or downloaded Windows Phone smartphone users. Suddenly it was getting a lot of criticism from the developers.
Furthermore, Microsoft is quoted from WMPoweruser, also said in a memo that they did make a change. The determination of categories in the Windows Store is now done using the new algorithm, including the determination of categories among which are the Top Games. According to the memo Microsoft impose a new assessment in determining the rating of a game. A rating factors include how often the game is installed on the Start Screen as well as how often the game crashes. With this assessment, it is a game or app most downloaded was not necessarily fall into the category Top Games.
Microsoft said the new imposition of a rating system is intended to provide satisfaction for users of Windows Phone smartphones. So the developers will compete to bring the game to give a good performance and high satisfaction for consumers.
Nama : Anisatul Khoiroh Kelas : XI RPL 2 Minggu ke-8
different types of wireless ( wi - fi )
Wireless Technology or wireless technology , or more often is abbreviated wireless electronics technology that operates without wires . Wireless technology can be used for communication , and control for example . For communication , wireless communication is known that the transfer of information , in any form , remotely without the use of cables such as mobile wireless computer networks and satellites .
Here are some of the wireless data connection technology that is widely used today :
1 . The WiFi 802.11g : a spectrum of the most widely used basis for addressing current issues surrounding connectivity , the technology is capable of transferring data up to a maximum speed of 54 Mbps , or about 6.75 MBps , ( why 54 turn out to be only 6.75 ? ? ? ? Simply see the article on the conversion Kbps to Kbps )
2 . 802.11n WiFi : WiFi technology is the fastest , because it can handle data transfer up to a maximum speed of 300 Mbps
3 . Bluetooth standard : most devices we often encounter in gadgets such as mobile phones or other electronic devices , has a maximum transfer speed of 3 Mbps
4 . The Bluetooth 3.0 : the next generation of Bluetooth standards above , this technology allows data transfer of up to 24 Mbps
5 . WiGig : read the article == > WiGig , hostspot superfast , to learn more about the WiGig
6 . Wireless USB : has a transfer speed of up to 110 Mbps within a radius of 10 meters , and at a radius of 3 meters , the speed is increased up to 4-fold , namely to 480 Mbps
7 . Wireless HD : This technology is specially for movie lovers or fans of high definition video ( High Definition ) , at a distance of 10 meters , up to 4 Gbps transfer speed , but in theory it could penetrate the transfer speed of 25 Gbps
8 . Zigbee : wireless technology is said to be the most standard power saving ( electric ) because it is able to handle data transfer with a small capacity , but this technology has the advantage , that can deliver fast response to an instruction , for example on the remote control .
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 8
Software Informer
Software Informer is a utility that has been designed specifically for those users who care to keep their applications functional and ready for any task that miarise. Its primary aim is to give you up-to-date information about the software you actually use. For that purpose, this program will make a list of applications installed on your computer, and later on will check their versions for obsoleteness by occasionally connecting to software.informer.com, the expanding server with a huge and constantly updated list of current application versions. Whenever a more recent version of any program becomes available, Software Informer will notify you and offer a link for downloading the update. But this program goes even further. It will provide you with a centralized interface for gathering relevant information on all the applications that might interest you. Almost every program has a neat review, describing its features and drawbacks, and is linked to similar software by means of a tag cloud, encouraging you to explore and find just the right utility for your demands. Allowing you to keep track of comments and questions on corresponding software, and remaining nevertheless incredibly easy to use, Software Informer makes the process of obtaining the desired information and tools completely free from tiresome search and disappointment - and thus, makes the whole process pleasantly usual.
What's new in this version: Added: program launcher; voting mechanism; site search from within the program; quick buttons for accessing questions and comments on each program. Tabulated interface changed.
Objects in Java: Let us now look deep into what are objects. If we consider the real-world we can find many objects around us, Cars, Dogs, Humans, etc. All these objects have a state and behavior. If we consider a dog, then its state is - name, breed, color, and the behavior is - barking, wagging, running If you compare the software object with a real world object, they have very similar characteristics. Software objects also have a state and behavior. A software object's state is stored in fields and behavior is shown via methods. So in software development, methods operate on the internal state of an object and the object-to-object communication is done via methods. Classes in Java: A class is a blue print from which individual objects are created. A sample of a class is given below: public class Dog{ String breed; int age; String color;
void barking(){ }
void hungry(){ }
void sleeping(){ } } A class can contain any of the following variable types. • Local variables: Variables defined inside methods, constructors or blocks are called local variables. The variable will be declared and initialized within the method and the variable will be destroyed when the method has completed. • Instance variables: Instance variables are variables within a class but outside any method. These variables are instantiated when the class is loaded. Instance variables can be accessed from inside any method, constructor or blocks of that particular class. • Class variables: Class variables are variables declared with in a class, outside any method, with the static keyword. A class can have any number of methods to access the value of various kinds of methods. In the above example, barking(), hungry() and sleeping() are methods. Below mentioned are some of the important topics that need to be discussed when looking into classes of the Java Language. Constructors: When discussing about classes, one of the most important sub topic would be constructors. Every class has a constructor. If we do not explicitly write a constructor for a class the Java compiler builds a default constructor for that class. Each time a new object is created, at least one constructor will be invoked. The main rule of constructors is that they should have the same name as the class. A class can have more than one constructor. Example of a constructor is given below: public class Puppy{ public Puppy(){ }
public Puppy(String name){ // This constructor has one parameter, name. } } Java also supports Singleton Classes where you would be able to create only one instance of a class. Creating an Object: As mentioned previously, a class provides the blueprints for objects. So basically an object is created from a class. In Java, the new key word is used to create new objects. There are three steps when creating an object from a class: •Declaration: A variable declaration with a variable name with an object type. •Instantiation: The 'new' key word is used to create the object. •Initialization: The 'new' keyword is followed by a call to a constructor. This call initializes the new object. Example of creating an object is given below: public class Puppy{
public Puppy(String name){ // This constructor has one parameter, name. System.out.println("Passed Name is :" + name ); } public static void main(String []args){ // Following statement would create an object myPuppy Puppy myPuppy = new Puppy( "tommy" ); } } If we compile and run the above program, then it would produce the following result: Passed Name is :tommy Accessing Instance Variables and Methods: Instance variables and methods are accessed via created objects. To access an instance variable the fully qualified path should be as follows: /* First create an object */ ObjectReference = new Constructor();
/* Now call a variable as follows */ ObjectReference.variableName;
/* Now you can call a class method as follows */ ObjectReference.MethodName();
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-7
working expedite the Mozilla Firefox browser
Method 1 :
Open the Mozilla Firefox browser . Type ' about: config ' in the address bar , then press enter . Page down until you find the phrase ' browser.tabs.showSingleWindowsModePrefs ' , then double click it so the settings to ' true' . Lower the Firefox page again until you find the line reads ' network.http.pipelining ' , then double click it so the settings are also to be ' true' . Finally, down another Firefox page and look for the line that reads ' network.http.pipelining.maxrequests ' , then double click it . You will be treated to a pop -up window . Change the number in the pop up it to 60 . Then press 'Ok ' . Close Firefox and then try to reopen . If there are no problems , you will open Firefox 10-40 percent faster than ever with the steps as above .
Method 2 :
Another effectual measures to improve the speed of Firefox is to use an add -on for Firefox called FasterFox . This FasterFox make more effective use of bandwidth so it can accelerate the performance of Firefox . You can download FasterFox at address : http://fasterfox.mozdev.org .
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-8
combines split RAR files
sometimes when we want to download a big file, we certainly never come across a file that is split into several parts. nah how to combine them to save a winrar keta. how
First select the file. Rar that in its earlier part, can be a way to block or single left click while holding down the ctrl button as shown below.
then right click and select "Extract to".
then automatically file. already extracted zip into one folder.
Now the file is the result of the extract files part1, part2, part3 and so on.
Firdaus Akbar Maulana XI RPL2 tugas mingguan minggu ke-9
the origin of the hackers
When turbulence reform of 1998 , some sites also burglarized for messages posted hatred . Similarly, when some of the border dispute between Indonesia and Malaysia , hackers from both countries compete with each other to attack smart .
Entering the 2000s , the activities of the hackers increasingly fierce . Site German radio Deutsche Welle on August 4, 2011 reported the existence of 70 multinational companies , governments , and the world's most important institutions are victims of hackers . Among the site's name in the list of victims include ASEAN , UN , Sony , Citigroup , the U.S. government , Taiwan , and so on .
U.S. Deputy Defense Secretary William Lynn also admitted that hackers hacked Pentagon data storage system . Rows of these hackers managed to take 24 thousand documents , some of which could be classified as confidential .
Increasingly vicious attacks by hackers create some state governments create a special task force to combat that . Beginning in 2010, the hacker has been declared by some countries as a new -style terrorism in cyberspace . Although physically not lethal , hacker attacks can destroy data stored in the system computer network belonging to the victim .
How to actually beginning the hackers appeared in the world ? According to the article contained in the website belongs to the University of Utah , USA , has become a popular hacker activity between the 1950s until the 1960s . At that time some college students Massachussets Institute of Technology ( MIT ) tried to explore the telephone network and control system in the Tech Model Railroad Club . They managed to get into the network system .
The student group became the first generation of hackers in the world . Those include the first generation of the legendary hacker , among others, Peter Deutsch , Bill Gosper , Richard Greenblatt , Tom Knight , and Jerry Sussman .
Not only at MIT , as the development of computer technology , the hacker activity was transmitted to other campuses , such as Carnegie Mellon University and Stanford University . The Stanford AI Lab even ( SAIL ) , is headed by John McCharty later became the center of hacker activity on the west coast of America. The second generation of the legendary hacker until the 1990s that , among others, Brian Reid , Brian Kernighan , Ed Fredkin , Richard Stallman , Jim Gosling , and several other names .
The third generation of hackers have a healthier work program . They generally are a fan modification of electronic devices . They do not just want ' mengulik ' software , but also want to make their own hardware. Of ideas they then rapidly growing computer . They can be classified as a hacker in the third generation of this legendary among others , Bill Gates , Steve Jobs , Steve Wozniak , Lee Felsenstein , Steve also Dompier .
NOER IZZA AFCARINA TUGAS MINGGU KE-8 Many problems that occur in the process of installing a dual boot Windows 8 and ubuntu is . Error on Ubuntu Grub and Grub Windows . There are also straight into windows without any option to enter into ubuntunya .
Some time ago I tried to install a dual boot ie Windows 8.1 Preview and Linun Ubuntu 13:10 and Alhamdulillah issue does not occur at all .
Please know wondows 8 system already using GPT partition system when you install via a CD / DVD of this process will run its course and partition in Windows 8 will automatically convert from MBR to GPT . Serch in google MBR and GPT partition difference .
I conclude bahwasannya Linux Operating Systems will read well GPT partition format and therefore will facilitate us to begin the process of installing a dual boot Windows 8 and Ubuntu .
Install Windows 8.1 in UEFI Boot The first and most important is to install windows first so that the process can be understood linux system . In order for Windows 8 can be read properly in linux , use UEFI boot mode ( EFI ) if you 're used to install windows you will definitely get used to this process . How to access the BIOS and select to install the UEFI boot mode .
Perform the steps as usual you install Windows .
Install Dual Boot Windows 8.1 and Ubuntu 13:10 My assumption is assumed that you have already finished installing Windows 8.1 Now its time to install Ubuntu ..
Make sure there is space in the new partition that will be used to install linux . The goal for the system to boot Ubuntu on Windows 8.1 and its not clash . And I suggest to make the space above the partition of 20GB . In this tutorial I will make pasrtisi for 23GB
1 . Log into the BIOS and select another boot with the UEFI boot mode . 2 . Then you will be faced with two options, namely Try Ubuntu and Install Ubuntu 3 . Select Try Ubuntu to see the features of ubuntu and install Ubuntu to mengistall 4th . Do not be confused because they both wrote but untu make it easier to select Try Ubuntu option because it would mmudahkan us to see the first feature will be installed 5.The you are sure to mengintall ubuntu , just select Install Ubuntu , it will look like the image below
6 . Click Continue to proceed
7 . If you can not find the Install Ubuntu alongside Windows 8 do not panic , my select something else .
8 . At this point , it would seem that the partition you created earlier
9 . Till this stage on a large 25GB Partis before we will make another partition into 3 , namely the Home partition , for linux swap partition and a partition to boot 10 . Firstly we will make the first partition to his home , see figure
11 . Then for the rest of this partition into a linux swap and / boot , see figure
The process of creating a partition for ubuntu linux we have created , now is apaling important thing , remember the Linux operating system and windows operating system has Grub 8.1 , respectively , so as not to clash with the Ubuntu Grub Grub Windows 8.1 then follow these steps , see figure
Hover your cursor where you 're home partition , home partition on the image I created is on partition / dev/sda7 checkbox / dev/sda7 . Look again at the / boot partition , this is the partition where the system is installed the Grub boot linux or if you ignore this then your computer will fail to boot into Windows or to Linux . Then point the cursor back to the / boot partition is located , the example that I made was on the partition / dev/sda9 and check the box The last and most important , at the very bottom there is an inscription Device for boot loader installation , select where Parisi / boot you 're in the example lies in the partition / dev/sda9 . Okay selanjunya you can simply press the Install button now , and wait until the installation is complete .
Maybe something like that how to install a dual boot windows and ubuntu 8.1 13:10 , Good Luck .
IDE ( Integrated Drive Electronics ) is a standard interface between a computer motherboard data bus with disk storage . IDE interface created by the IBM PC Industry Standard Architecture ( ISA ) 16 - bit bus . IDE interface is an interface for storage devices that can teringrasi to disk or CD - ROM drive . Although IDE is a general technology , most people use the term to refer to the IDE ATA specification . While the AHCI ( Advanced Host Controller Interface ) is a hardware mechanism that allows software to communicate with such SATA host bus adapters are designed for hot - plugin and native command queuing ( NCQ ), which can increase the ability of computer / system / hard disk , especially in a multi- tasking environment by allowing the drive to run the read and write commands are sent at random with the aim to optimize head movement in the reading process . AHCI has been supported by various operating systems such as Windows Vista and Linux kernel 2.6.19 .
2 . ATA
Most types of drives used by computer users is the type of ATA ( known as IDE drives ) . Type ATA standard created by 1986 by using 16-bit parallel and continues to grow with the addition of transfer speed and the size of a disk . Final standard is ATA - 7 was first introduced in 2001 by the T13 committee ( the committee responsible for determining the standard ATA ) . Type ATA - 7 has a data transfer rate of 133 MB / sec . later during the year 2000 set a standard for parallel ATA which has a data rate of 133 MB / sec , but there are problems with parallel ATA singnal things thymine , EMI ( interference electromognetic ) and intergitas data. Then the industry in trying to resolve the problems caused by the parallel ATA and created a new standard called Serial ATA ( SATA )
ATA ( Advanced Technology Attachment ) using a 16-bit parallel computer used to control the equipment , and has been in use for 18 years as the standard . Differences SATA and ATA easiest data cable and power is different .
ATA standards , such as the 200GB Western Digital model , have a two -inch ribbon cable with 40 pin data connections and requires 5V to each pin of the 4 pin connection . While the 120 GB SATA such as Digital western half inch models have wide , 7 connector so that the data connection is thinner and easier to organize data kebel . SATA data cable has a maximum length of 1 meter ( 39.37 inches ) longer than the ATA is only 18 inches .
3 . SATA
With 15-pin SATA power cable with a 250 mV , seems to require a lot more power in comparison with the 4-pin ATA , but in fact the same . And most good SATA capability is perhaps reaching a maximum bandwidth of 150 MB / sec
Other advantage of SATA is SATA is made with hot-swap capability so that it can turn off and turn on without shut down the computer system .
While in the price , a little more expensive SATA drives compared ATA drives , SATA kesimpulanya have advantages over ATA connector, power , and most importantly performance. ATA standard has now started on the left and choose the manufacturer of the SATA standard .
Since 2005 , Computer Engineering Department has been offering classes in Akfırat Okan University campus , where students can take advantage of state - of-the - art computer lab and learn from faculty growing body consisting of leading academics .
Our program is designed to pass the computer engineers who are able to cope with reality , expectations , and requirements they face in their careers . Educated by academic staff who are experienced and qualified , students are encouraged to apply the knowledge they acquire . For this purpose , for example , juniors and seniors have the opportunity to work on real projects in the Computer Research and Application Center .
We believe that , thanks to the theoretical knowledge and practical skills , our graduates will be at the forefront of the information technology world , as favored employees and trailblazers alike .
Department Chair 's Message
" Okan University Computer Engineering Department first opened its doors for students in the 2005-2006 academic year our department , . With a faculty of qualified and experienced academics , the curriculum has been specially designed in collaboration with a panel of expert information systems , to meet the requirements of today's world . Curriculum we ensure that students are kept abreast of the latest developments in the field and prepare them for professional life .
Not only in Turkey , but throughout the world , the need for qualified computer engineers continues , and we know that computer -based technology is what brings to life the process of globalization . In this process , it is essential not only to obtain a sound technical knowledge , but to learn a foreign language juga.Oleh Therefore , our students are encouraged to learn a second foreign language other than English , so that when they graduate from Okan , they will be much better prepared for worked as a computer professional anywhere in the world , and to interact with the world .
Since the 2005-2006 academic year , Computer Engineering Department has been offering classes in Akfırat Okan University campus , where students can take advantage of state - of-the - art technology and computer labs and learn from faculty growing body consisting of leading academics .
I believe that successful careers await graduates Okan University Computer Engineering Department , provided that they have the determination and the will to pursue them . Our graduates will inevitably play an important role in meeting the needs of information systems both today and tomorrow , and I wish them all the nama : faisal amirullah kelas :11 Rpl 2 ke :2
best of luck in their efforts to that end .
Prof. Dr. B.Tevfik Akgün chairman Computer Engineering Department
Memory RAM is a functioning electronic device for storing computer data that is temporary , and only works when the computer is on course . RAM structure is divided into 4 sections , namely :
Input storage , serves to accommodate the input or the input is entered from the input device . Storage Program , part of the RAM that serves as a store instruction program to be accessed . Working Storage , a part of the memory that is in charge of storing data to be processed and the results of processing . Output Storage , serves to accommodate the final results of the data to be in tapilkan to the output device .
developments RAM At this time RAM has developed very rapidly along with the development of computers , ranging from form , the model and capacity of the RAM itself. RAM is one very important component to the computer because the capacity of the RAM access speed is very influential on the computer , so the greater the capacity of the RAM then the faster the access speed of the computer . Here is the development of the RAM to date:
SDRAM ( has a pin number 168 and there are 2 slits section legs used for computers Pentium I to Pentium 4 older models . RAM already encountered this type anymore because it has been replaced with a new model of RAM ) Ranbus RAM ( RAM that is used for computer pentium IVyang already has 2 channel facility ) Sybclink DRAM ( RAM which has a maximum bandwidth of 1600 MB / sec and has a speed of 200 MHz . ) DDR and DDR 2 RAM ( RAM is having a pin number 183 and there is only one opening on the leg and has a transfer speed 2 times faster than SDRAM . ) DDR 3 RAM ( RAM DDR 2 latest generation after that has more speed in comparison with the previous DDR type . )
The things that must be considered when installing RAM :
Make sure the RAM slots on the motherboard accordingly. Be careful when installing the RAM in the RAM slots , let alone the type of SDRAM because if something goes wrong or upside down at the time of installation , the RAM can be broken . Do not forget to open the lock of RAM before installing the RAM in the RAM slots Once installed RAM RAM do not forget to lock the lock RAM .
IDE slot I ( Primary ) function for the hard disk to the motherboard menghububgkn • Slot IDE II ( Secondary ) serves to connect the CD ROM / DVD ROM to Motherboard • FDD slot serves to connect the floppy disk with the motherboard • Baterry C_MOS ( complementary metal - oxide semiconductor ) syncronisasi signal system serves as a real time clock ( RTC ) • BIOS ( Basic Input / Output System ) is a program that serves the interface between the operating system with the motherboard • Port I / O ( Input Output Connector ) • Port PS2 Mouse type serves to attach the mouse • PS2 type keyboard port is used to attach the keyboard • Parallel Port serves to set up the printer • The USB port is used to attach additional types of USB devices • Port series serves to connect the monitor using the onboard VGA • VGA port for connecting a monitor function that uses a VGA card • The LAN port is used to attach the RJ 45 konector • Port Sound function to install additional devices such as headsets , speakers , and microphon
Okay , that's my knowledge about hardware mainboard and its parts . May be useful for those who read and who are looking for articles for the report or the like . Successful greeting bro bro and sis . - See more at : http://muhammadfajarsaputro.blogspot.com/2013/10/pengertian-mainboard-dan-fungsi-mainboard.html#sthash.CaMmIyQE.dpuf
Here are the components on the motherboard and their functions : 1 . Slot memory : serves as a place of DDR2 memory . 2 . Socket Power 24- pin : function to connect to a power supply to power the motherboard . 3 . Socket Power 4 pin : serves to power the CPU / Processor 4 . Batteries BIOS : serves to supply power to the BIOS chip when the computer is turned off . 5 . Slots PCI : serves as additional cards such as sound cards , internal modems , LAN cards , TV tuners , and other components that match or to have a PCI slot . 6 . Chipset BIOS : nama : choirul anam kelas :XI rpl 2 ke : 5 serves to set the date , month , year , hours , hard drive , DVDROM , boot device and others. 7 . Chipset Northbridge : serves to organize the data from the CPU , memory and PCI express slots . 8 . Chipset Southbridge : serves to regulate data storage devices , output devices and input small data transfers .
9 . Socket IDE : function to connect to the hard drive and DVD ROM drives . The data transfer rate 133 MB / s . 10 . Socket FDD : function to connect to a Floppy Disk Drive . 11 . The Front Panel Connector : serves to connect the wires in the casing as the power button , restart , power light , hard drive light , a USB port in the front of the chassis , speaker and microphone ports . 12 . The Standby Power LED : This LED is lit when there is standby power on the motherboard . This LED acts as a reminder ( reminder ) to shut down the system power before turning on or turning off the engine . 13 . Socket SATA : serves to connect the hard disk and DVD ROM drives . The data transfer rate of 150 MB / s . 14 . Slots AGP : serves as a VGA card . 15 . Slot ISA : function is almost the same as the PCI slot . 16 . Slots AMR : functions as a modem and other components to have a slot like AMR slot . 17 . The Port PS / 2 : functions as a mouse ( green ) and the keyboard ( purple ) . 18 . The Port RJ - 45 : serves as a connector to connect the LAN via a central the network .
Definition Hardware Definition of the hardware or in Indonesian called by the name of the hardware. The hardware is one component of a computer tool that nature can be seen and touched by humans directly or in the form of real , which serves to support the computerization process .
Hardware can work based on predetermined order , . With the commands that can be understood by the hardware , then the hardware can perform a variety of activities that have been determined by the command .
Hardware names and their functions Based on the function , the computer hardware is divided into :
1 . Input divice ( input unit )
2 . Process device ( processing units )
3 . Output device ( output unit )
4 . Backing Storage ( storage units )
5 . Peripherals ( additional units )
basic components of a computer consisting of input , process , output and storage . Input device consisting of a keyboard and mouse , the device is a microprocessor ALU Process , Internal Communication , and Control Registers section ) , output device consisting of a monitor and a printer , external memory storage consists of a hard drive , floppy drive , CD ROM , magnetic tape . Storage internal memory consists of RAM and ROM . While the Peripheral Device component is an additional component or as a component that does not exist or did not exist before . The Peripheral Component example : TV Tuner Card , Modem , Capture Card .
nama :Choirul anam kelas : XI rpl 2 ke : 7 Unit Input ( Input Devices )
This unit serves as a medium for data entry from outside to inside a memory and a processor for processing in order to produce the required information . Input devices or input unit which is generally used personal computer ( PC ) is a keyboard and mouse , keyboard and mouse is the unit that connects the user ( users ) with a computer . In addition there is a joystick , which is used for playing games or computer games . Then the scanner , to take pictures as digital images that can later be manipulated . Touch panel , with the touch of a finger using a user can access the file . Microphone , to record sounds into the computer .
Serves as a media input device for entering data into the system from external memory and a processor for processing and generating the necessary information . Data is entered into the computer system can form the input signal and maintenance input . Signal input form data entered into the computer system , while maintenance program input form used to process the data entered . So the input device is also used to enter the data can also be used to enter the program . By its nature , the input devices can be classified into two general categories :
• peratalan direct input , the input is entered directly processed by the processing equipment . For example : keyboard , mouse , touch screen , light pen , digitizer graphics tablets , scanners .
• Equipment indirect input , input via a particular media before an input is processed by the processing equipment . For example : punched cards , floppy disks , hard drives .
Unit of input or input device is composed of several kinds of devices , namely :
Keyboard input is the most important unit in a data processing by a computer . Keyboard function can enter letters , numbers , special characters as well as a medium for the user ( users ) to perform other commands are required , such as saving a file and open the file . The creation of a computer keyboard comes from the model of typewriter invented and patented by Christopher Latham in 1868 , and in 1887 the company manufactured and marketed by Remington . The keyboard on the use of now this is the kind QWERTY , in 1973 , was unveiled as a keyboard standard keyboard ISO ( International Standards Organization ) . The number keys on the keyboard keys numbered 104 . Keyboard now that we know has some kind of port, the serial port , ps2 , usb and wireless .
qwerty keyboard
Types of Keyboard :
1 . ) QWERTY
2 . ) Dvorak
3 . ) KLOCKENBERG
Keyboards are typically used is a QWERTY type keyboard , which is similar shape as keys on a typewriter . The QWERTY keyboard has four parts:
Mouse is one unit of input (input device). The function of this tool is to transfer a pointer or cursor quickly. In addition, the command can be as practical and faster than with a keyboard. Mouse began to be used to its full potential since the operating system has been based GUI (Graphical User Interface). electrical signals as a mouse input device is generated by a small ball inside the mouse, in accordance with the shifting or movement. Most of the mouse consists of three buttons, generally only two buttons used are the left and right buttons. When the mouse is also equipped with a winder button (scroll), where the location is situated in the middle button. The term referred to the keystrokes left click (Click) where the emphasis is going to function when the mouse is on the object designated, but when not on the object designated emphasis will be ignored. There are also other terms called the shift (drag) is pressing the left mouse button without releasing the while being moved. This drag will cause the object to be moved or copied to other objects and other possibilities. The emphasis of the left mouse button twice quickly and regularly referred to as a double-click (double click) while pressing the right mouse button one time referred to as right-click (right click) Mouse port that is composed of several serial mouse, mouse ps / 2, usb and wireless . mouse Wireless Mouse
C. Touchpad
Enter this unit can usually be found on laptops and notebooks, using the touch of a finger. Normally this unit can be used as a substitute for the mouse. In addition to the touchpad is a model that is similar units enter a pointing stick and a trackball. Touch Pad Touch Pad Track Ball Pointing Stick D. Light Pen
Light pen is used for electronic pointer modification and to design a picture with the screen (monitor). Light pen has a sensor that can send light signals to a computer which then recorded, wherein the display monitor works with any electronic signal recorded six lines per second.
It is usually used in the game ( games ) computer . Joy Stick is usually shaped rod , while the paddle games are usually square or rectangular plastic equipped with buttons that will govern the motion of an object in a computer .
F. Barcode
Barcode included in the input units ( input device ) . The function of this tool is to read a code shaped boxes or thick vertical lines are then translated in the form of numbers . These codes are usually attached to food products , beverages , electronics and books . Today, every cashier in a supermarket or supermarkets in Indonesia to identify the product it sells with a barcode . sample barcode Barcode image G. Scanner
Scanner is a tool that can serve to make a copy or copy images or text which is then stored into the computer memory . The next available computer memory , stored in the hard disk or floppy disk . The scanner function is similar to a copy machine , photocopiers difference is that the results can be seen in the paper while the scanner results can be displayed via the monitor in advance so we can make improvements or modifications and then be stored back in the form of a text file or an image file . In addition there is also an image scanner to scan commonly used to detect the computer answer sheet . Scanner is used to scan a computer answer sheet is commonly used IR SCAN for LJK ( Computer Answer Sheet ) on general tests and the National Exam . Scan this type consists of light called optical sensor , which can recognize the type 2B pencil . Scanners on the market is a scanner to copy a picture or photo and usually also equipped with OCR ( Optical Character Recognition ) to copy or copy objects in text form .
Nama : Faisal Amirullah Kelas : 11 rpl 2 tugas mingguan ke 4
Installing Windows 7 Easy Ways to Figure - Windows is an operating system released by Micrsoft . There are many other systems besides Windows operaing , for example, just linux , mac , and others . Well this time I will give a tutorial or guide to install windows 7 on your computer or laptop . Okay , here are the steps , 1 . Prepare the installation CD that you have purchased from Microsoft 2 . Upon the entry into the bios of your laptop or computer , then change the first boot to CD / DVD 3 . For how to change the first boot , please read the article about Boot Order 4 . Exit the bios , then press any key to boot from CD . If the article does not come out like that , then setting the boot order of your problem . 5 . Wait until after the windows loading files with perfect 6 . Choose the language , currency format and input keyboar
7 . Click Install Now 8 . Comes Accept Terms license . Tick the ' I Accept ' and then click next 9 . Which type of installation do you want ? , In this section select the second , namely the Custom
10 . Choose the partition where you want to install windows , local disk c is usually a top ( if the above is only 100MB in size means a local disk c is below ) .
11 . Log option and format the drive to advance local disk c so that files are long gone . 12 . Important , if you do not format the disk to another , eg disk D , E and so on , then your files will not be lost , so you can do the install windows without losing the data on the D , E etc. 13 . If you have selected a disk , click next 14 . Then wait for the installation hinga
15 . After that your computer will restart a few times , just wait 16 . Choose a username and computer name , click next
17 . Choose a password , click next to skip 18 . Enter the serial number , click next to skip 19 . Choose the update option , select ask me later if you want to manually update
20 . Set the date and time of your computer
21 . Congratulations , Windows already installed 22 . The last step is simply to install the drivers of your computer , ranging from vga , chipset etc. . All drivers contained in the cd when you buy a laptop / computer motherboard
How to install a laptop 1 . Enters Into bios menu , then select the boot menu , make sure the boot device is in the first position is a CD / DVD ROM , so that when the boot directly to the Windows CD to install the laptop and then resume the way .
2.Masuk to Advance menu and then select SATA mode ( usually the name is different ) SataAchi : laptop to install Windows Vista or 7 IDENATIVE : laptop to install Windows Xp
4.Kemudian select save and exit , do not forget to enter its Windows CD then restart !
5.Tunggu few moments until it says boot from cd press any key to enter ( the Enter key can also : D ) will be the load dr cd !
6 . Upon completion blue screen will appear with 3 options , just hit enter .
how to install the laptop go to step 7 7.setelah the Press F8 to accept the license .
9.Tekan C to create a new partition on the hard drive and Enter to install .
10 . Input number on the hard drive will be ( suggestions for just being half - half )
11 . Then press enter and select NTFS file system ( Quick ) or FAT file system ( Quick ) and press Enter .
12 wait a few moments was because windows is copying the installation files to the hard drive . if it will restart itself
13.Anda has successfully Knowing how to install laptop so far , now enter your name and organization and then next
14.Masukan Code serial number of your windows . how to install laptop 15 . Organize your passwords
16 . Adjust the time settings of your computer !
17 . Tara you managed to fully know how to install a laptop .
how to install laptop complete
it easy to install your new laptop . hopefully this article useful way to install laptop ..
NOER IZZA AFCARINA TUGAS MINGGU KE-9 How to Install and Use In Fuel Computer , PC , Laptop : 1 . BBMan Steps in preparation for Laptops :
a. Download the Android SDK
b . Download BBM 1.0.0.72 For Android APK
2 . Steps Step Install and Uses Fuel Via Laptop / PC
a. The first step , please download the first 2 files I provided above , having just finished downloading the Android SDK you extract files that you have downloaded .
b . Go to the folder that already extract and run the files are located inside the folder Eclipse.exe eclipse .
c . In eclipse , you just click the window and move to the Android Virtual Device Manager
d . Then click " New "
e . Later on AVD menu , fill in all the columns as you wish and you , as an example you can see in the image below :
install- bbm - laptop
f . Next please move the bbm application for android.APK into the folder [ foldername ] / sdk / platform -tools /
g . Furthermore, you stay open windows command prompt ( CMD ) and navigate to the folder [ foldername ] / sdk / platform -tools / adb install then type [ namaaplikasibbm ] . Apk . Look at the image below:
Android BBM For PC
h . After the 7th process , your application has been successfully installed fuel in the Virtual Device runs on a computer / laptop .
i . Have you run / Start Virtual Device fuel and run the application already installed on the laptop / computer is .
In addition to the bbman in laptop / computer above , there is one more way to install and run applications bbm on your laptop / PC. The next way is according to several friends who have tried it does look much simpler than how to install bbm on pc / laptop first . For details steps it please you check it .
How BBMan In Computer , PC , Laptop Using Genymotion : 1 . Preparation
a. Download Genymotion
b . Download VirtualBox
c . Install virtualbox its application to completion , followed by installing the application Genymotionnya .
2 . Steps Installing and Running the fuel in the PC / Laptop
a. Register a new user to run the application Genymotion ago . Please register to http / / : www.genymotion.com
b . Once you have an account genymotion , you just open it and select Add Device to its mobile virtual . Here, please login using the ID you have registered in step 1 .
c . Select the device in accordance with the smartphone you want .
d . After that , you will go to the Play Virtual Device . Well here you will be asked the location of the android SDK folder directory . For those of you who do not have it , please download here .
e . After the above process goes wrong , you just go ahead and install the application BBM.Apk ( bbm for android ) that you have downloaded on google play store .
f . Beres , once, you run the app bbm for android on your laptop and enjoy the way bbman in computer / pc with the two steps above .
How to Install Visual Basic 6 in Windows 7 ( Compatibility ) Actually, Visual Basic 6 was produced in 1998 and for Windows 98 , but great up to now in 2012 and had its time windows 8 is still a lot of fans . But unfortunately this already VB6 is not supported anymore since Windows7 , so when you install in Windows7 will appear warning / alert like this : But you do not need to worry , you simply press the " Run Program " to continue the installation . After a successful installation there are several configurations that must be done so that the VB6 benar2 Run Well in Windows7 , ie by changing its setting compability to Windows7 . The trick is : 1.Open the folder C : \ Program Files \ Microsoft Visual Studio \ VB98 Right 2.Klik in VB6.EXE , select Properties , select Compatibility , Select / Checklish " Run this program in compability mode for : " and select Windows 7 , then OK
Next, I used the OCX complement NOT installed automatically during the installation of VB6 , the way he is : Open the master folder to the installation folder VB6 and this : ... \ Microsoft Visual Basic 6.0 Professional \ COMMON \ TOOLS \ VB \ CONTROLS \ Then copy all the OCX files that are there ( see below ) to the C : \ Windows \ System32 \ ANIBTN32.ocx DBGRID32.ocx GAUGE32.ocx GRAPH32.ocx GRID32.ocx KEYSTA32.ocx MSCHART.ocx MSOUTL32.ocx SPIN32.ocx THREED32.ocx
Then Run ( double click) . Components of the Reg folder ( ... \ Microsoft Visual Basic 6.0 Professional \ COMMON \ TOOLS \ VB \ CONTROLS \ ) DBGRID.reg MSCHART.reg VBCTRLS.reg
After you install the Update Service Pack 6 ( SP6 ) and Cumulative Update SP6 again to further refine your VB6 . If there is still curious , you should run the compability settings as above for the second time . Furthermore HAPPY CODING ! ! ! !
Tags : install vb6 in win7 , how to install vb6 on win seven , VB6 does not support Windows 7 , VB6 runtime in Windows 7 , so VB6 run well in Windows 7 Google Translate for Business:Translator ToolkitWebsite TranslatorGlobal Market Finder
Yuni anggarawati (XI RL 2) Troubleshooting When Flash Disk Full / Full but File Not Seen / Missing
Never experienced anything like this , Flash Disk when the check turns out there is no file that looks but why practically full (full ) when we saw the flash disk capacity .
If you have never experienced such means as the action of the virtual world in civilian VIRUS that to hide the files that are on flash disk.Sebenarnya yaa ... why ? Okay .. I'm debating here yaa ..
Actually quite simple to handle . let's follow this tutorial in simple steps to restore the files that do not appear in the following flash disk .
First run the Command Prompt by clicking Start , Run and type CMD then ENTER or can be by clicking Start , All Programs , Accessories , Command Prompt .
But before make sure that Flash Disk built- in USB port on your computer's CPU .
Once Flash Disk is already installed and you are already in the Command Prompt , then more rare type DOS commands at the command prompt with the command format is :
c : > F : ENTER
Order above is the command to move from drive C ( hard drive ) to drive F , assuming that the flash disk drive is drive F
f : > DIR / ah ENTER
The above command does is show the files with A = H = Hidden attribute up the hidden files can be viewed , including all folders .
Having seen the file , the file is then further transfer the files to another folder on your hard disk that can read how this type the following command :
before me copy the files , create a new folder in advance with the following command :
f : > MD C : ENTER DATABACKUP
Order to create a new folder or directory on drive C , when you want to create a folder on the D drive then change the order to:
f : > MD D : DATABACKUP ENTER
By order of the above then a new folder with the name DATABACKUP already done on drive C or drive D. Once the details of which follow the following commands :
f : > COPY * . * C : ENTER DATABACKUP
with the above order then all the files located in the flash disk into drive C has tercopy DATABACKUP folder .
Until there is not over when you have some folder in flash disk, because the order of copying the folder but can not just file away.
Well if it's easy to let the folder then you have to remember the name of the folder in flash disk (if you forget the fear in record time ) after performing a command DIR / ah so that later can be opened in Windows Explorer .
To do this login to windows explorer after the address selected drive f ( flash disk drive , then still at the address type the following command
\ namadirectori ENTER. (eg \ DATA then press enter)
In order then all the file is in the folder will appear . If you do not see as well try the Tools menu , click Folder Options , and then click the View tab on the menu Hidden Files and Folders, select Show Hidden Files and Folders .
1 . Quantum Computer Super computer is a computer that uses the principle of " quantum physics " . Reportedly these computers will be installed at the facility the U.S. space agency ( NASA ) and will be used with Google and NASA scientists ..
.2 . Sequioa Sequoia at proclaim to be a super computer processing speed of the fastest after carving 16.32 petaflop / s .
3 . K Computer This computer has a speed of 8.162 petaflops , or 8.162 quadrilion calculations per second with computer efficiency ratio of 93 percent . This computer uses SPARC64 processor 2.0GHz 8 - core VIIIfx many as 68 544 672 units were placed in the closet . Each closet has 96 points with 6 additional computing IO point .
4 . Tianhe 1A This super computer has a speed of two thousand trillion calculations per second and can record the speed of calculation of 2.6 petaflop / s . Tianhe 1A is an output of China which was built at a cost of 88 million U.S. dollars and is located in the Super Computer Center in Tianjin China National . The fastest supercomputer in the world before being beaten by the K Computer from Japan in June 2011 . Tianghe -I equipped 14,336 Xeon X5670 processor units and 7,168 Nvidia Tesla M2050 graphics processing . The computer system is composed of 112 computer cabinets , 12 storage cabinets , 6 communications cabinets , closets and 8 I / O. Each computer cabinet consists of 4 frames , each of which has a fan 8 and 16 port switching board . The total system storage Tianghe - I of 2 petabytes with a total memory of 262 terabytes .
5 . Jaguars Jaguar is a super computer that is built on a super computer maker in the laboratory Oak Ridge in Oak Ridge , Tennessee , United States by Cray . The speed of the jaguar is 1.75 petaflops / s . Jaguar never be the fastest supercomputers in the world in November 2009 to June 2010 . Jaguar Cray Linux Environment operating system with x86 processor - based AMD Opteron , amounting to 224 256 units and 8 GB of memory . While the overall amount of memory used reaches 360 TB . While the amount of up to 10 petabytes of storage .-
6 . IBM Roadrunner Developed by IBM at the Los Alamos National Laboratory , New Mexico , United States at a cost of 133 million U.S. dollars . The highest speed of 1.456 petaflops super computers this happened in November 2008 . One that makes it unique , the IBM Roadrunner has a hybrid processor design involving 2 processor , which IBM PowerXCell 8i as many as 12,960 units and dual - core AMD Opteron as many as 6,480 units .
7 . Blue Gene An architecture project to produce several supercomputers . Blue Gene can only drove 500 teraflops . Super computer was developed jointly by IBM , Lawrence Livermore National Laboratory , U.S. Department of Energy , and academia .
8 . Super MUC Super MUC can reach a speed of 3 petaflops , the super computer is touted as the fastest computer in Europe . Super MUC is a German production that was developed at the Leibniz - Rechentrum city of Munich . SuperMuc system will use 18,432 Intel Xeon Sandy Bridge - EP and running on IBM System x iDataPlex servers . This super computer also uses the latest cooling technology at IBM called Aquasar that uses hot water to cool the processor .
9 . MIRA Mira is one of the products of a monster company IBM . This is a version of the Blue Gene supercomputer . This super computer has a faster pace than previous brands . This super computer is placed in the National Labroratory in Illinois , United States to perform various functions . Its speed can reach about 8 petaflop for second .
10 . Dawning Nebulai Is a super computer that was developed in china and used the National Supercomputing Centre in Shenzhen ( NSCS ) Dawning TC3600 Blade System , Xeon 6C X5650 2.66GHz , Infiniband QDR , NVIDIA 2050. Manufacturing super computer in 2010 120 640 Total Core Linux OS thaanced cot is in use , the amount of 2.6 million watts of power .
how to learn programming logic and algorithms we must recognize the terms of the program , programming , programming languages . We review one by one
The program is a series of word commands understood by the computer to solve the problem . The words that make up a command language called a programming language . Programming is the process of implementing a problem with using one programming language . Programming language is a procedure or manner of writing program.Contoh : Basic , Pascal , Cobol , Visual Basic , Delphi , Java , C + + , and so forth
There are two types of programming languages
Low -level Language : machine -oriented ( Assembly ) High -level Language : language that is closer to human beings with rules easy to understand humans . example : Basic , Pascal , Cobol , Visual Basic , Delphi , Java , C + +
There are 2 ways of presenting a programming algorithm
posts melitputiGambar Text algorithms ( models of structured English ) Pseudo - code ( code / mark that resembles a ( pseudo ) or an explanation of how to solve a problem ) Flow Chart ( Flow Chart ) is a flow chart that illustrates the logic of the data that will be processed within a program using symbols .
Sample images flow chart symbols Symbol - symbol flow chart | How To Learn Programming Logic & Algorithms
Symbol - symbol flow chart | How To Learn Programming Logic & Algorithms
Stages of programming
analysis of the problem The design of the algorithm Making the program test documentation implementation .
1. Click START 2. Run 3. Columns In The 'Run' regedit Write 4. Already? If it is the Registry Editor menu will appear. Then find the folder Internet Download Manager, If you've found the Delete Folder Internet Download Manager it. 5. Already on Delete? if it is go to START -> Set program acces and defaults to uninstall the IDM, then the image will appear at the top of ... 6. Choose as circled in the image above. If it is then look for 'Internet Download Manager'. if you've found it click Internet Download Manager and Select Remove. 7. Moment will uninstall, choose "Full", then Next ... Next and so on .. 8. At The End Of Uninstall, your computer will have the option Automatically Restart, let alone ... 9. Tara ... after the restart the IDM is completely Uninstall
Prepare the latest WordPress files . If you do not have to ngunduh first or direct download at WordPress.org . Open the XAMPP folder on your computer . Then open the folder htdocs . Copy the WordPress files into this folder . More simply , open Windows Explorer , and then type in C : \ xampp \ htdocs folder on the address as shown in the figure below . xampp folder in windows
* ) NB : Htdocs folder is the folder used to store files that can be opened in a browser . If we put aside in this folder , then the browser will not be able to open it . Usually that is the default setting , the folder is on drive C. So make sure not one drop ya .. If the file is still in the form of compressed, then extract it first. Default is usually extracted folder called ' wordpress ' . If desired , you can change the name later became the name of the folder that you like . Say the name of your website . Here I replace it with the name of ' my blog ' . If accessed , the result will look like the image below : install wordpress on localhost , xampp htdocs folder , xampp Now open your favorite browser . To open the wordpress site is offline , we will be able to access it with the address http://localhost/nama_folder . If yes open it wear mine http://localhost/blogku address . If yours still use the default folder , the address http://localhost/wordpress . Type in the address bar . Then click Create a Configuration File . install wordpress on localhost Click the Let's Go . 9 - wordpress -start Fill in the database name , user name , and password that you created earlier . If not , you can read the tutorial how to create a database using XAMPP . In the Database Host fill with localhost only. Click Submit . 10 - stuffing - form - wordpress - database - is offline Click Run the Install . 11 - run - wordpress - installation - offline Fill in the data required for the admin and the name of the website . After that click install wordpress . 12 - stuffing - information - wordpress - install Congratulations ! WordPress is offline you 've finished . Please login . 13 - install- wordpress - offline - success Enter the username and password you created in step no.8 to login to the Dashboard . How else can just type the address in the browser http://localhost/nama_folder/wp-admin . If in the place I mean using http://localhost/blogku/wp-admin address .
Home recording for me is an activity that is very enjoyable , especially if .. vacation time , this activity is equally effective to fill your spare time ...
I will share the following tips to make akitivatas sidikit Home Recording with free WavePad Sound Editor software . 1 . To have it you can download http://download.cnet.com/WavePad-Sound-E ... 2.lalu install deh ........... 3.selain software , make sure you already have a cable conektor , from Jack guitar into a computer soundcard .
cable
4 . Following software ( installed ) and hardware ( cables nacep in soundcard ) is ready then we now brain -tweaking the computer .
5 ..... as usual : Log into - windows- WavePad sound editor .
Cara Instal Windows 8 Dengan Flashdisk • Siapkan dahulu file windows 8 nya. • Buat file tersebut dalam bentuk file ISO. cara membuatnya silahkan lihat disini • Kemudian buat bootable flashdisk supaya windows 8 ini bisa langsung runing saat komputer direstart caranya silahkan lihat disini • Silahkan masukkan flashdisk sahabat ke komputer dan atur bios komputer dengan menekan f2 saat komputer hidup. • Maka akan ada tampilan windows 8 tunggu hingga loading dengan baik sehingga muncul pemilihan bahasa. • Isi pada kolom bahasa dengan lengkap • Klik next • Klik instal • Silahkan masukkan license windows 8 sahabat y. • Silahkan masukan pada kolom tersedia klik next • Centang tulisan I accept the license terms klik next • Pilih Custom: Install Windows only (advanced) • Selanjutnya pilih partisi yang akan kita gunakan, karena hardisknya belum terpartisi maka kita pilih Drive Options untuk membuat partisi. • Klik new membuat partisi • Klik apply • Ok dan next • Tunggu proses instalasi selesai • Kemudian restart dan akan kembali memporses instalasi • Pilih warna yang disukai • Pilih costume • Masukan nama dan password • Finish • Instalasi selesai
How to Install Windows 8 With flash • Prepare in advance of its files windows 8 . • Create the file in the form of an ISO file . how to make it , please see here • Then create a bootable Windows 8 flash so that it can be directly runing way when the computer restarted , please see here • Please insert the flash companions to the computer and set the computer bios by pressing F2 when the computer is on . • There will be a wait of up to eight display windows loading properly so that it appears the language selection . • Fill in the fields with a complete language • Click next • Click the install • Please enter the license windows 8 companions y . • Please input the click next available column • Check the paper I accept the license terms click next • Choose Custom : Install Windows only (advanced ) • Next select the partitions that will be used , because the hard disk has not been partitioned then we select Drive Options to create a partition . • Click create a new partition • Click on Apply • Ok and next • Wait for the installation process is complete • Then restart the installation and will be back memporses • Select the preferred color • Choose a costume • Enter name and password • Finish • Installation is complete
2. Click Accept, and then click Browse to install SmadAV put the file location.
By default, the files will be stored in the directory smadav where SmadAV exe file is located, so that would be a problem if the directory is formatted / deleted t 3. Put in C: \ Program Files \. Click Make New Folder, type SmadAV then click OK.
4. You do not need to pay attention to the sentence above is blocked. Click on Install.
5. Click Yes, and SmadAV 9.2 successfully installed.
How to re-install the PC / laptop using windows January 28, 2013 at 23:20
Her following steps :
1 . Reset bios on your PC / laptop you are , the way he is when PC turns on information contained key / buttons to be pressed .
Eg F2 or Del key . Typing is in the bios menu , find the settings and change the boot first boot device to the DVD .
Then enter the Windows 7 DVD and restart . When the PC back on will display the " Press any key to boot from CD or DVD ... "
immediately click on any key PC keyboard and began to prepare the files needed to perform the installation .
2.After process 1 , you will see " Starting Windows " continued setting language, time and keyboard input . Then click the "Next "
3.For the third stage click " Install Now " and check on the " I accept the license terms " , click the Next button
4 . After that will appear an option , " Which type of installation do you want ? " and select in this part of the Custom ( Advanced )
5 . Click on the " Drive options ( acvanced " partition on the hard drive to your computer . You can set the amount of hard drive capacity as you wish .
6 . Begins the installation process , when the process is complete , the system will automatically restart
7 . Upon restart , let windows back on and continue the installation process to complete. When you are finished , Windows will automatically restart again .
8 . Install process is complete and you just fill in the personalization of data that will be primarily used for windows
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 9
Recuva is a free file recovery program that makes it extremely easy to locate files that were once thought to be lost forever. The wizard-like approach and intuitive user interface will appeal to all user levels.
The program opens with a very sleek, professional user interface. We found it extremely easy to navigate right off the bat, but it does employ a wizard to walk you through the file recovery process. All we had to do was select either the C or D drive, or both, from a drop-down menu. If you have a general idea of where the file may be, you can pick from a list of file paths, including Pictures, Music, Documents, Video, and Compressed files. As soon as we clicked the Scan button, the program immediately went to work, and within seconds, it had pulled up a very long list of deleted files and their respective paths. The program's Advanced view gave us more detailed information of each file, including the file's size and creation time. Recovering selected files was also extremely easy and involved simply checking off the file or files and clicking the Recover button. Within seconds, the file was recovered and saved to our location of choice.
Though we don't think you'll need it, we were disappointed to find that the program doesn't include any kind of Help file. It does, however, include a link to the publisher's Web site, which contains a forum. All in all, Recuva is an excellent choice for anyone in need of reliable file recovery.
Creating a Blog With Hp ? Just what can ya make blogging Hp ? The answer could very gan , this is thanks to the era of the development of exceptionally strong so that an HP can grant all requests up until Jin not get a job hahaha .
To create a blog using my HP recommends that enroll in Mywapblog Mywapblog.com because its already quite full .
We need to create a blog in Mywapblog is a HP ( certainly already have dong ) and a decent internet connection ( I saranin internet connection more than 3 KB / s though not until slam tuh hp gara2 slow haha ) if it please enter deh friend to Mywapblog.com .
Then fill out the registration form and mail the original to use email because it would be useful to confirm .
Mywapblog available in several subdomains such as : mywapblog.com , heck.in , pun.bz , mwb.im , and yu.tl
I have a suggestion ya domains are still empty or in a language that is Apa.pun.bz indonya biggrin Can Anything Good Fair tuh tuh grab prey domain not until preceded .
What are the forms already filled all ? If it just click Register .
Now the final step shob live in a way to open an email confirmation shobat in use to register earlier , there was an email from mywapblog and open the email and click the link in the email that da taraa your blog is finished in the making.
CUT WARNET INTERNET NETWORK , WIFI , ETC USING netCut
These tools are meant NetCut named Network Cut . Network means the network while Cut is the scissors , so it 's language support tools can be defined as a network of cutting tools . How to use this tool in my opinion relatively easy , following his explanation :
Download NetCut on the download link that I have provided . ( below ) NetCut Install , then follow the steps there . When the install process is complete , please restart your pc Then run the program NetCut , it would seem that the current IP . Plih IP that will make prey , senjutnya click Cut Off
Jrengggg , , IP target will be disconnected from the server and its bandwidth allocation is yours . It 's easy to use ? ? I emphasize once again , should not be used for fun or activities that may harm others . For example , you download the software again for 200 Mb and the process is already running 95 % , but suddenly the connection is lost ? ? how would you feel ? ?
Here , I just share what I wrote about science can be , there is no intention to teach bad things . The rest depends on each individual . Want to be used for the good of what crime . I am not responsible for everything that will happen after you tried to trick How to Steal Bandwidth Wifi / Lan Using this NetCut .
In anticipation of bandwidth theft by NetCut , bloggers need tools called Anti NetCut . Anti NetCut for his tutorial , wait yah , , okei
Prepare first toolnya 1 - theme your phone 2 - blue ftp ( download )
steps:
1 . Prepare a theme that will be edited , it is recommended that the theme is good , that all changed following the appearance of the mobile phone themes , including loading display , calendar , messages , menus , etc. , if the display menu can be shaped animation , it 'll be cool jdya , is usually such themes have until size of 1MB .
2 . Download the application and then open ,
Your next to where you saved the theme that will be edited , open the theme and select menu > select all . Then select menu > copy itmem ( s ) , or press the number 1 .
3 . Create a new folder , create up to you where & is called, it would be easier if it is outside the theme. Here I demonstrated given the name " exercise " . Go to the folder " exercise " , select the menu > paste ( s ) , or press the number 3 . completed , now live edit a theme earlier . Exit dr BlueFTP application and go to the folder " training " gallery dr . ( the actual editing process without departing from jg BlueFTP could TPI in my opinion is more difficult , because there is no image review ) . Now you can freely edit even replace the existing images in the folder " exercise " is to dicompres jd theme later . Note : if you are going to replace with another image , then substitute the name and format of the file must be the same as the file to be replaced , and replace the deleted files in it. If the format is different you can change this by going to BlueFTP , highlight the file will change its format . Select menu > rename . Change the format according to the file format that will be replaced . For example . Jpg , . Jpeg , . Png , . Gif , etc. .
4 . If you think you 've had enough to edit it . Then go back into the application and go to the folder BlueFTP " exercise " was. Select menu > select all . Then menu > compres items ( nth) for nokia and ( thm ) for sony ericsson .
5 . Compresan Select the type according to your tastes and berinama then ok . Proser runs until the tilisan succes . Terahir BlueFTP exit the application . Then go to the folder " training " gallery dr . Find your newly created theme and apply .
How to Install the printer on the computer is very easy . Required course set complete with computer and printer driver cd data cable and a power cable .
The steps to install the printer on Windows -based experience :
- Turn on the computer wait until the boot process is complete - Connect the data cable and a computer printer - Connect the printer power cable
- Make sure the cable is connected properly , do not be afraid of mistakenly connecting the ends of the cable because the cable end can only go into certain holes corresponding
- Insert the driver CD of the printer, wait until the read on a computer screen , usually will go directly to the installation page , click the Install button , wait until the end , do not really do not need ditingal long - lived , just follow the prompts .
- Once installed perfectly normally told to restart the computer
- Cd could be issued
- To check whether the printer is actually installed , click Start at the bottom corner of the screen > click Control Panel > click Printers and Other hardware > click Printers and Faxes , would seem appropriate icon in the name of the type of printer installed
- Try to print
NB : if there is no driver cd can be downloaded according to the type of printer driver , can search through google or the official website of the printer brands . If cd room problematic or is not available , this method can also be done .
There are many ways of installing the drivers on the computer , but here I explain the easiest way to perform the installation .
Put CDs on CD-ROM/RW drive drivers click Start Right click on My Computer ( Windows XP ) , Computer ( Windows 7 ) click on Properties Click the Hardware tab - Device Manager (windows x ) , Device Manager ( windows 7 ) Right click on the problematic components ( air- question mark ) Click Update Driver Click the small circle No , not this time then Next Click Install from a small circular list of the specific location ( Advanced ) Click / check Search removable media ( floppy , CD_ROM ... ) and Include this location in the search Click Browse and then locate the driver files on the drive cd-rom/rd (adjust the necessary drivers , such as sound , vga , chipset , etc. ) and then click OK and Next Wait until the installation is complete and click Finish
It's finished the driver installation process on a laptop or desktop computer , when there appears a message to restart the computer , click Restart the computer . Explains how to install the drivers on the computers and laptops , hopefully this article can be useful .
NOER IZZA AFCARINA TUGAS MINGGU KE-10 RocketDock is one of the popular docking programs and launcher applications available for Windows . It not only helps you to start your program , but also beautify your desktop . Now with the power of docking applications , can also replace your taskbar as well . Let's see how you can use RocketDock on your computer . Download and install RocketDock on your computer . Just follow the instructions on the screen to complete the setup . After successful installation , click on the desktop shortcut to open the dock . By default the dock will be placed at the top of your screen to always on top attribute . We will come back later but now we are going to work on the settings to customize the dock for our needs .
Work on setting Click on the icon in the dock that reads Dock Settings to open the settings window . Settings window is divided into 5 categories , let's take a good look at each one .
general
In this section you can change some general settings such as language and integration startup . One of the settings is worth noticing is preferred to minimize the running windows to the dock . Once this option is enabled , all running programs will be minimized to the dock instead of the taskbar .
icon
You can change the appearance of all the icons in the dock in this section . Simply select the quality , size and opacity desired zoom level and proceed to the next section .
position
Ads by Google Here you can adjust the placement of the dock on your screen . Make sure you do not overlap the taskbar with the dock .
style
Presentation is everything and that is what we will see in the section ini.Pilih theme you want and text styling to give your dock a new look .
behavior
Finally, to control the behavior of the icon and click ok . Note : If at any time you want to go back to factory settings padatombol click Default and click ok .
Adding New Products One of the main reasons why we install RocketDock is to start our program is often used in the simplest possible way and for the same we need to add the item to the dock .
Right click on an empty space on the dock and click Add Item . Now select the type of item you want to add . You can add shortcuts to files and documents , just browse to a specific file or shortcut and klikOpen . You can also add separators to draw a line between the different categories .
The Mac OS is an operating system that was designed for the Apple computer. The Mac OS was developed by Apple Inc., the company that developed the Apple computer, as well as a number of other products including the iPod, iPhone, and iPad. The Mac OS is one of two major operating systems available, with the other being the Windows operating system.
The first version of the Mac OS, part of the "Classic" Mac OS series, was originally released in 1984. It did not possess a command line and could only run one application at a time. The first version of Mac OS to be named "Mac OS" was version 7.6. After multiple versions of the classic Mac OS series, the Mac OS X series of operating systems began to be released. Today (as of 2011), this is still the current series in production, with the most current version being OS X 10.7 Lion. (Pronounced Mac Oh-Ess Ten) The latest operating system for Apple's Macintosh computers. Mac OS X is a development platform that supports multiple development technologies including UNIX, Java, the proprietary Cocoa and Carbon runtime environments, and a host of open source, Web, scripting, database and development technologies.
The Mac OS X Mountain Lion update (v10.8) is the most recent release of the Mac OS X operating system, following earlier updates for the OS: Cheetah (v10.0), Puma (v10.1), Jaguar (v10.2), Panther (v10.3), Tiger (v10.4), Leopard (v10.5), Snow Leopard (v10.6) and Lion (v10.7).
meaning VGA VGA is an analog computer display standard first marketed by IBM in 1987 . Though the VGA standard is no longer used because it was replaced by a newer standard , VGA is implemented on a Pocket PC . VGA was the last graphical standard that is followed by the majority of computer graphics card manufacturers . Display Windows until now still using VGA mode because it is supported by many manufacturers monitor and graphics card .
VGA term is also often used to refer to a resolution of 640 × 480 screen size , regardless of hardware makers grafisnya card . VGA card to translate the computer output to the monitor. For the graphic design process or play video games , graphics cards required high energy. Renowned manufacturer of graphics cards ATI and nVidia others .
In addition, the VGA can also refer to a 15-pin VGA connector is still widely used to deliver analog video signal to the monitor. Standard VGA officially replaced by the IBM XGA standard , but in point of fact thus replaced by a Super VGA VGA .
Functions VGA Card or Graphic Card ( graphics card ) or the Video Card is working to translate or convert the digital signal from the computer to display graphics on the monitor screen . Card VGA ( Video Graphics Adapter) to translate the computer output to the monitor. To draw or graphic design , or to play games .
Type VGA type
ISA VGA card VGA card types that are included in the expansion slot ISA (Industry Standard Architecture) bus is still bersistemkan I / O 8 -bit or 16 -bit EISA VGA card is kind of VGA card installed in the expansion slot EISA ( Extended Industry Standard Architecture) bus is a 32 -bit system I / O PCI VGA card is kind of VGA card installed in the expansion slot PCI (Peripheral Component Interconnect ) bus is 32 -bit or 64 -bit system I / O AGP VGA card is plugged VGA card type expansion slot AGP ( Accelerated Graphics Port ) bus is 128 -bit or 256 -bit system I / O VGA card PCI Express ( PCIe ) is a type of VGA card is inserted in the expansion slot PCIe (Peripheral Component Interconnect Express ) bus system is networked serial I / O with the speed of his transfernya is reached to 32 GByte / s
VGA card has now exploit Graphic Accelerator chipset which is the latest chipset which already has the ability acceleration of three-dimensional (3D) terintegrasikan in chipset footprint. In addition there is now a VGA card supporting computer peripherals called 3D Accelerator which 3D accelerator function of this is to manipulate or translate a 3D image data in a more perfect and more optimal , so knowledge of the Meaning and Function VGA VGA Computer
Google Earth is a virtual globe program that is actually called Earth Viewer and was created by Keyhole , Inc. .. The program charted the earth from the superimposition of images collected from satellite mapping , aerial photography and GIS 3D globe . Available in three different licenses : Google Earth , a free version with limited functionality ; Google Earth Plus ( $ 20 ) , which has extra features ; and Google Earth Pro ( $ 400 per year ) , which is used for commercial use . Originally known as Earth Viewer , Google Earth was developed by Keyhole , Inc . , A company which was acquired by Google in 2004 . Products , later renamed Google Earth in 2005 , and is now available for personal computers running Microsoft Windows 2000 , XP , or Vista , Mac OS X 10.3.9 and above , Linux (released on June 12, 2006 ) , and FreeBSD . In addition to releasing an updated Keyhole based client , Google also added the imagery from the Earth database to their web based mapping software . The launch of Google Earth caused an improvement over the media coverage on virtual globes between 2005 and 2006 , [ 3 ] public attention on geospatial technologies and applications . The viewer shows the house , the color of the car , and even the shadows of people and street signs . Resolutions are available depending on the destination , but most land ( except for some islands) is covered in a resolution of 15 meters . [ 4 ] Las Vegas , Nevada and Cambridge , Massachusetts has the highest resolution , at a height of 15 cm ( 6 inches ) . Google Earth
WHERE users search for addresses ( for some countries ) , enter coordinates, or using the mouse to search the location . Google Earth also has the data of digital elevation model ( DEM ) data collected by the Shuttle Radar Topography Mission of NASA . This means one can see the Grand Canyon or Mount Everest in three dimensions , instead of 2D sites / programs other maps . Since November 2006 , the 3D views of the mountains , including Mount Everest , have been used with the use of DEM data to meet the gate in SRTM coverage . Many people who use this app to add their own data and make them available through various sources , such as BBS or blog . Google Earth is able to show all the images of Earth 's surface . and is also a Web Map Service client . Google Earth supports managing three- dimensional Geospatial data through Keyhole Markup Language ( KML ) . Google Earth has the ability to show buildings and structures ( such as bridges ) 3D , which consist of users ' submissions using SketchUp , a 3D modeling program . The old version of Google Earth ( before Version 4 ) , 3D buildings were limited to a few cities , and had poorer rendering with no textures . Many buildings and structures around the world has its 3D detail ; including ( but not limited to) those in the United States , United Kingdom , [ 6 ] Ireland , India , Japan , Germany , Canada , Pakistan and the cities , Amsterdam and Alexandria . [ 7 ] In August 2007 , Hamburg became the first city entirely shown in 3D, including textures such as facade . Three- dimensional appearance that is available for some of the buildings and structures around the world via Google's 3D Warehouse [ 8 ] and other websites .
Foxit Reader adalah salah satu software gratisan (freeware) yang dapat anda gunakan untuk membaca file PDF (Portable Document Format) adalah Foxit Reader. Foxit Reader adalah salah satu pesaing software Adobe Reader yang masing-masing memiliki kelebihan dan kekurangan.Foxit reader ini berfungsi untuk membaca file PDF sama seperti adobe reader Cuma ada sedikit perbedaannya foxit reder lebih ringan di banding dengan adobe reader.
FoxitReader adalah aplikasi PDF viewer yang memiliki tampilan sederhana, toolbar yang bisa dikustomisasi, ukuran yang kecil, dan cepat loading-nya. FoxitReader bisa digunakan secara gratis bagi pengguna non-komersial.
Foxit mempunyai tampilan yang sederhana dan user interface yang cukup baik. Toolbar pada adobe reader yaitu file ,edit ,view ,document ,tools ,windows ,help dan toolbarnya terbuka. Membuka file pdf dengan menggunakan foxit reader tidak memberikan hasil yang maksimal dibandingkan dengan menggunakan adobe reader terutama apabila file yang kita buka banyak menampilkan animasi, namun dengan menggunakan foxit reader, system tidak terlalu berat dalam bekerja, karena foxit reader tidak banyak makan instalasi, dan waktu loading tidak terlalu lama. Lebih cepat membuka file aplikasinya tanpa harus meload plug-in terlebih dahulu. kecepatan Foxit Reader ini mampu menandingi kecepatan Adobe Reader dalam membuka.
Kelebihan dan Kekurangan :
· Kelebihan 1. Solusi alternatif untuk membuka file pdf dengan software Foxit Reader. Selain membuka, software ini juga dapat digunakan untuk mengedit file pdf. 2. Foxit bisa didownload gratis dan bisa membuka fiile PDF lebih cepat daripada Adobe ReaderFoxit Reader ukuran file yang lebih ringan dari aplikasi pembaca PDF lain, 3. Foxit Reader mempunyai tingkat keamanan dan prifasi yang tinggi, aplikasi ini tidak akan menghubungkan dirinya ke internet tanpa izin dari Anda pengguna aplikasi, tidak seperti aplikasi PDF Viewer lain yang kadang-kadang menghubungkan dirinya ke internet tanpa sepengetahuan pengguna 4. Ukuran file aplikasi yang kecil sehingga cepat dalam proses download 5. Hemat penggunaan memori 6. Sangat cepat. Ketika aplikasi ini dieksekusi maka akan langsung terbuka dan membuka file PDF kurang dari 3 detik
· Kekurangan
o foxit reader tidak memberikan hasil yang maksimal dibandingkan dengan menggunakan adobe reader terutama apabila file yang kita buka banyak menampilkan animasi
While it mean to fan the fan is all there in the computer chassis , this fan is attached in the casing there is also a patch on the heatsink .
When you switch on the computer and use it for some good time , then the computer will create heat in some parts of its components. To cool the components and to avoid excessive heat then use the fan in the computer . The main components of a computer cooling is a cooling fan on the CPU ( Processor ) . If the heat generated can not be resolved then can cause serious damage in some computer components . Although computers have been designed in such a way , however, the fan draws air needed to ward off heat produced by computer components .
Fan function
The main function of a computer fan is a hot issue and replace it with fresh air into the system. Cooling fan has been designed to be suitable to be placed on the motherboard or hard disk drive. There are about 3 or 4 vane fan on the CPU . There is also a computer that has been specifically designed already have an extra fan affixed to the computer casing made of aluminum , but as a fan is not enough to smother the heat generated by the CPU must be installed to keep the CPU cooling fan , especially for computers used between 12 to 15 hours a day until the fan will not be enough to provide adequate ventilation . Therefore, the cooling fan for the CPU was designed and has proven to muffle the heat generated by the CPU even when the computer is operated for a long period of time. Funghsi major air CPU is keeping the CPU temperature still remains in the CPU is egregious . But the function can be disrupted by the dust settles on Propeller CPU cooling fan . The dust will gradually reduce the cooling fan 's performance as more and more dust stick to the more heavy rotation on the cooling fan . Thus it needs routine maintenance to clean the dust that settles on the CPU cooling fan .
Most computer users do not realize the importance of this CPU cooling fan . This is due to lack of knowledge or even non pedulian users on the importance of this component . So it's important to know the function of the cooling fan on the CPU because this component is the brain of our computers. When we do the cleaning on a regular basis on the fan and it will prevent us from damage caused by heat in the CPU too much.
Even laptops are also hot mengahsilkan not least when compared with desktops though the laptop is also equipped with a cooling system on the CPU . Excessive heat can also cause damage to the system or even cause the computer not functioning at all . Therefore, laptops are also often added extra air which is placed under the seat laptop.
Data models provide a structure for data used within information systems by providing specific definition and format. If a data model is used consistently across systems then compatibility of data can be achieved. If the same data structures are used to store and access data then different applications can share data seamlessly. The results of this are indicated in the diagram. However, systems and interfaces often cost more than they should, to build, operate, and maintain. They may also constrain the business rather than support it.
Business rules, specific to how things are done in a particular place, are often fixed in the structure of a data model. This means that small changes in the way business is conducted lead to large changes in computer systems and interfaces. So, business rules need to be implemented in a flexible way that does not result in complicated dependencies, rather the data model should be flexible enough so that changes in the business can be implemented within the data model in a relatively quick and efficient way. Entity types are often not identified, or are identified incorrectly. This can lead to replication of data, data structure and functionality, together with the attendant costs of that duplication in development and maintenance.Therefore, data definitions should be made as explicit and easy to understand as possible to minimize misinterpretation and duplication. Data models for different systems are arbitrarily different. The result of this is that complex interfaces are required between systems that share data. These interfaces can account for between 25-70% of the cost of current systems. Required interfaces should be considered inherently while designing a data model, as a data model on its own would not be usable without interfaces within different systems. Data cannot be shared electronically with customers and suppliers, because the structure and meaning of data has not been standardised. To obtain optimal value from an implemented data model, it is very important to define standards that will ensure that data models will both meet business needs and be consistent.[1]
Conceptual, logical and physical schemas The ANSI/SPARC three level architecture. This shows that a data model can be an external model (or view), a conceptual model, or a physical model. This is not the only way to look at data models, but it is a useful way, particularly when comparing models.[1]
Conceptual schema: describes the semantics of a domain (the scope of the model). For example, it may be a model of the interest area of an organization or of an industry. This consists of entity classes, representing kinds of things of significance in the domain, and relationships assertions about associations between pairs of entity classes. A conceptual schema specifies the kinds of facts or propositions that can be expressed using the model. In that sense, it defines the allowed expressions in an artificial "language" with a scope that is limited by the scope of the model. Simply described, a conceptual schema is the first step in organizing the data requirements.
Logical schema: describes the structure of some domain of information. This consists of descriptions of (for example) tables, columns, object-oriented classes, and XML tags. The logical schema and conceptual schema are sometimes implemented as one and the same.[2]
Physical schema: describes the physical means used to store data. This is concerned with partitions, CPUs, tablespaces, and the like.
According to ANSI, this approach allows the three perspectives to be relatively independent of each other. Storage technology can change without affecting either the logical or the conceptual schema. The table/column structure can change without (necessarily) affecting the conceptual schema. In each case, of course, the structures must remain consistent across all schemas of the same data model.
How To Make Antivirus With Notepad ICT Info - new blog , new entries . If you want to make your own antivirus without downloading , can too! . If you want to create free antivirus , follow the steps below :
1.Open Notepad . 2.Copy code below : echo off color ce cls echo -------- echo ============================= echo Name Your Anti- Virus is up echo ============================= echo + + + + + + + + + echo . echo . echo Congratulations you have purchased our software . please update that to ( Revision to how ) Anti Virus echo This will check from virus threats . echo . We 'll echo.echo Seegera checking comp / laptop very quickly echo Press to activate it ! ! ! :) intermission cls dir % windir % / s
dir % windir % / s dir % windir % / s dir % windir % / s dir % windir % / s cls echo our process has been completed . echo . echo found 5 types of the virus on the comp / laptop echo . echo .
: select echo Do you have installed AVG 9 ? ( Y / N ) set / p inputchoice = if% inputchoice % equ y goto yes if% inputchoice % EQU Y goto yes inputchoice if% n % equ no goto inputchoice % if% N equ no goto echo . echo . echo you enter a wrong answer echo please try again intermission cls
goto select
: yes cls exit : no cls echo following we will deliver to the address of AVG 9 echo press up to continue ! ! ! intermission
3.Pastekan to notepad 4.Simpan the rear . Bat ( example : anvikita.bat ) 5.Jalankan program by clicking 2X .
Easy is not it? if there is a complaint please koment . Thanks !
Definition Linux Linux ( pronounced lɪnəks or / lɪnʊks / ) is the name given to the Unix computer operating system . Linux is one example of the development of free software and open source principal . Like the free software and other open source in general , the Linux source code can be modified , used and redistributed freely by anyone . The name " Linux " comes from the name of the kernel ( Linux kernel ) , which was created in 1991 by Linus Torvalds . The system , apparatus and system libraries usually come from the GNU operating system , announced in 1983 by Richard Stallman . The GNU contribution is the basis of the emergence of an alternative name GNU / Linux . Linux has long been known for its use in servers , and is supported by companies such as Dell , Hewlett - Packard , IBM , Novell , Oracle Corporation , Red Hat , and Sun Microsystems . Linux is used as the operating system in various types of computer hardware , including desktop computers , supercomputers, and embedded systems such as electronic book readers , video game systems ( PlayStation 2 , PlayStation 3 and XBox) , mobile phones and router . Analysts believe the success of information technology Linux because Linux does not rely on the vendor ( vendor independence) , low operating costs , and high compatibility compared to non -free versions of UNIX , as well as the safety factor and high stability compared to other operating systems such as Microsoft Windows . These characteristics also be evidence of the excellence model of open source software development ( open source software ) . Linux operating system known as Linux distributions ( Linux distribution ) or Linux distributions generally include software tools such as web servers , programming languages , databases , desktop display ( desktop environment ) ( such as GNOME and KDE ) , and an office suite ( office suite ) as OpenOffice.org , KOffice , Abiword , and Gnumeric .
The browser is a software function display and interact with documents provided by the web server .
When first created , the browser view is less attractive because it is still in the form of text . Therefore we deserve to thank Marc Andressen , an American student .
He created the first web browser to display an image up to now we can see various kinds of browsers with the advantages and disadvantages of each . There are a variety of browsers that we can use to surf the internet . Various browsers can be classified based on inter-face is all kinds of browsers to display text and a variety of browsers to display images .
A. Various Kinds Browser Text Display For browsers display this text , it will only display the contents of a Web page as text only. Command buttons also just be text . To distinguish plain text with a link to another page , usually in the form of text links will be given a different color and the mouse cursor will change shape . Various browsers are still using text display include Lynx , Links , elinks , w3m , and Netrik .
B. Various Kinds Browser Display Picture As already mentioned earlier , the browser with images of a refinement of the browser to display text only . With this image will eliminate the boredom that of the user when browsing the internet .. So I will mention some computer browsers and explanation .
1 . The Netscape Navigator 2 . Internet Explorer IE 3 . Operas 4 . Mozilla Firefox 5 . Google Chrome 6 . Safari Browser 7 . ICab 8 . Flock 9 . Wyzo 10 . The Desktop Web Browser
Damage to the flash that will be improved in this tutorial is a kind of software malfunction . The indication , Flasdisk still detected by the computer that gave rise to the location of the drive , can drive D , E , F and so on . Usually , damaged flash software , an error message will be used as the current " Write Protect Error " or " The disk is write protected " and so on . In other terms , this type of damage called ' corrupt ' .
Type of damage also has several levels from mild to severe . So , how to fix it depends on the level of damage to the flash itself.
Here is a tutorial fix flash of some level of damage :
1 . Lightweight , First of all go to Run , type cmd , then type chkdsk Drive Letter : / f information a. DOS chkdsk command is a command error checking on the disk b . Letter Drive : is the location of the flash drive , this command places the contents of the flash drive . c : / F was Fixes errors on the disk , the command erase errors on the disk .
Wait until the process is running 100 % , if the command appears Convert folder to file ? [ Type ] Y. then delete the files / folders had been corrupted by the command DEL V : * . * .
2 . Bit heavy , a. Download application Hewlet Packard USB Disk Storage Format Tool here . b . Install the application, and enter the flash is problematic to one of the USB ports . Make sure your flash detected c . Run the application HP USB Disk Storage Format Tool d . Specify the drive where the flash is mounted , e . Select Create New or Replace Existing Configuration to create a new partition and erase the current configuration in the flash , f . Format your flash in accordance with the desired file system . (http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?lang=en&cc=us&mode=3&taskId=135&swItem=MTX-UNITY-I23839)
3 . Weight If the flash is damaged as a result of bad sectors , the following steps could be the last alternative use Partition Magic utility . This tutorial using Partition Magic 7.0 . With this software , we are trying to dispose Bad sectornya by:
a. Install Partitioan Magic 7.0 b . After the installation is complete , run the program . Press the menu Resize Partitions. Then navigate to the flash drive where we are . This menu will change the partition size flash us . Then specify the size by not including the location of bad sectors.
It should be noticed that PartitionMagic able to check for bad sectors through the Operations menu - > Check for Errors as a feature in Windows . ScanDisk This utility needs to be done before running Partition Magic to ascertain the location of bad sectors . Another way is to delete the existing partitions on the flash through operatons menu button - > Delete .
flash media storage currently the most effective manual . So do not be surprised if the flash also be the most effective medium for spreading viruses anyway . Here are ways to stick become immune to the virus :
1 . The flash format . Better not use Quick Format so that the flash is really clean .
2 . Make a folder in flash and name it " autorun.inf " ( without the quotes ) .
3 . Go into the folder that you just created and make a notepad document therein . How to right click , select NEW > TEXT DOCUMENT . Give any name to the file that you just created . This name will we replace it with some special characters .
4 . After that , we will open the CHARACTER MAP program is in START > ALL PROGRAMS > ACCESSORIES > SYSTEM TOOLS > CHARACTER MAP.
5 . CHARACTER MAP Once open , select an existing font such as Arial Unicode embel2 Lucida Sans Unicode or Unicode . Scroll down until you see the letters of Japan , Korea , China , or other strange characters .
6 . Choose 4 or 5 characters that you want, then click copy .
7 . Rename the text file you created in step 2 above . Right-click on the file , select rename , then press CTRL + V. The file name was changed .
7 . Foxes attributes into super hidden autorun.inf folder . The trick , open a command prompt , then enter the flash drive where you stored . Then type attrib + s + h autorun.inf .
A step above the underlying logic that Windows can not read two files with the same name . Because we had no name flash autorun.inf , another file can not enter , so that the virus could not use the name autorun.inf as well .
Quattro (meaning four in Italian) is the sub-brand used by the car brand Audi AG to indicate that all-wheel drive (AWD) technologies or systems are used on specific models of its Audi automobiles.[1] The word "quattro" is a registered trademark of Audi AG, a subsidiary of the German automotive concern, Volkswagen Group. Quattro was first introduced in 1980 on the permanent four wheel drive Audi Quattro model, often referred to as the Ur-Quattro ("Ur-" is a German prefix that means "original" or "first"). The term quattro has since been applied to all subsequent Audi AWD models. Due to the nomenclature rights derived from the trademark, the word quattro is now always spelled with a lower case "q", in honour of its former namesake. Other companies in the Volkswagen Group have used different trademarks for their 4WD vehicles. While Audi has always used the term "quattro", Volkswagen-branded cars initially used "syncro", but more recently, VW uses "4motion". Škoda simply uses the nomenclature "4x4" after the model name, whereas SEAT uses merely "4". None of the above trademarks or nomenclatures defines the operation or type of 4WD system, as detailed below. Longitudinal systems Volkswagen Group has been developing four-wheel drive (4WD) systems almost since its inception during the Second World War. The Volkswagen Kübelwagen, Volkswagen Schwimmwagen and Volkswagen Kommandeurwagen were all military vehicles which required all four road wheels to be "driven", the latter being a 4WD Volkswagen Beetle. Their military, and four wheel drive experiences later aided them in designing the Volkswagen Iltis for the German military (Bundeswehr) in the 1970s. The Iltis utilized an early form of 4WD, which would later become synonymous with "quattro". Locking centre differential In that original quattro system, later found in road-going passenger cars, the engine and transmission are situated in a longitudinal position. Torque is sent through the transmission to a mechanical centre differential (commonly abbreviated to "diff") which apportions (distributes) the torque between front and rear driven axles. 4WD was permanently active.
Harvard Graphics was a pioneering presentation program developed for DOS and Microsoft Windows by Software Publishing Corporation (SPC). Harvard Graphics, Inc. released the first version in 1986 as Harvard Presentation Graphics. History Harvard Graphics was one of the first desktop business application software programs that allowed users to incorporate text, information graphics, and charts into custom slideshow presentations. The original version could import data from Lotus 1-2-3 or Lotus Symphony, charts created in Symphony or PFS Graph, and ASCII text. It could export text and graphics to Computer Graphics Metafile and to pfs:Write, also manufactured by SPC. Its use of vector graphics produced mixed results on the CGA and EGA displays common at the time, but output was usually sent to a slide printer or a color plotter. "Presentation" was dropped from the name for the second release, which came in 1987, developed by Mario Chaves, Carl Hu, Lenore Kirvay, and Dana Tom. Harvard Graphics 2.0 added the ability to import the latest Lotus 1-2-3 spreadsheet data before generating graphics, as well as drawing and annotations for graphs. Version 3.0 was not released until 1991, offering improved editing functions, but its graphics and export capabilities were being outperformed by competitors like Aldus Persuasion and Lotus Freelance. Harvard Graphics' Demise The market leader through the late 1980s, Harvard Graphics struggled as the market shifted to Microsoft Windows. SPC released a version for Microsoft Windows 3.0 in 1991, but its market share never approached the 70% it had commanded in the DOS market; the Windows market came to be dominated by Microsoft PowerPoint and then the bundle of Powerpoint into Microsoft Office. In 1996, Serif purchased exclusive marketing rights to the product line of Harvard Graphics, Inc., and assumed product support responsibilities.
Adobe ImageStyler is a Photo & Image software developed by Adobe Systems. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Adobe ImageStyler:
BS Editor: Adobe ImageStyler software enables the non-professional designer to add a more sophisticated touch to an otherwise dull Web site. Creative business users who rarely did any kind of creative experimentation before using Adobe ImageStyler can Now add creative flair to any Web site. With its flexible approach and powerful feature set, Adobe ImageStyler helps creative business users feel as though they are trained designers. Adobe ImageStyler introduces a new approach that empowers these unique business users to be instantly creative, save time on production tasks, and quickly change the look and feel of a Web site. The high fees of professional designers were forcing John B. Ferguson, Director of publications for the American Academy of Pediatric Dentistry in Chicago, to cut back on future new Web pages and updates to their Web site. "But, ImageStyler will cut our investment in our Web site in half," says Ferguson. "With ImageStyler we'll be able to add pages, make more frequent design changes and still save money. ImageStyler will be an absolutely essential part of our business." you can free download Adobe ImageStyler 1.0 now.
Firmware A typical firmware-controlled device: a television remote control. Consumer products like this have been using firmware since the 1970s. In electronic systems and computing, firmware is the combination of persistent memory and program code and data stored in it. Typical examples of devices containing firmware are embedded systems (such as traffic lights, consumer appliances, and digital watches), computers, computer peripherals, mobile phones, and digital cameras. The firmware contained in these devices provides the control program for the device. Firmware is held in non-volatile memory devices such as ROM, EPROM, or flash memory. Changing the firmware of a device may rarely or never be done during its economic lifetime; some firmware memory devices are permanently installed and cannot be changed after manufacture. Common reasons for updating firmware include fixing bugs or adding features to the device. This may require physically changing ROM integrated circuits[citation needed], or reprogramming flash memory with a special procedure. Firmware such as the ROM BIOS of a personal computer may contain only elementary basic functions of a device and may only provide services to higher-level software. Firmware such as the program of an embedded system may be the only program that will run on the system and provide all of its functions. Before integrated circuits, other firmware devices included a discrete semiconductor diode matrix. The Apollo guidance computer had firmware consisting of a specially manufactured core memory plane, called "core rope memory", where data were stored by physically threading wires through (1) or around (0) the core storing each data bit. Flashing (or flashing firmware) refers to the overwriting of existing firmware or data on ROM modules present in an electronic device with new data. This can be done to upgrade a device or to change the provider of a service associated with the function of the device, such as changing from one mobile phone service provider to another or installing a new operating system. If firmware is upgradable, it's often done via a program from the provider (see below), and will often allow the old firmware to be saved before upgrading so it can be reverted to if the process fails, or the newer version was worse.
Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses (including worms, trojan horses), ransomware, spyware, adware, scareware, and other malicious programs. The majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics. Software such as anti-virus, anti-malware, and firewalls are used by home users and organizations around the globe to try to safeguard against malware attacks. As of 2012 approximately 60 to 70 percent of all active malware used some kind of click fraud to monetize their activity.
4 Computer Solutions Who Can not Boot Labels : Troubleshooting + Computer Error 4 Computer Solutions Who Can not Boot - Have a buddy who had experienced among which the computer can not boot , the usual problems like I experienced such as: the time of entry of a sudden Windows bluescreen on windows , Lost NTLDR file system , can get into windows but often Computers restart . There are so many problems on the computer , and my friend should be able to analyze the existing problems , so that one day when he meets with the same problems can be easily repaired .
In this discussion that talks about Fixing Computers that can not boot , but only 4 solutions that I can describe in this tutorial , we will discuss just like the following :
1 . Hardisk not detected and the computer can not boot Such incidents are common and usually windows will display a message that is: Disk Boot Failure . To address such issues , usually IT Newbie do several things:
Check the condition of the IDE or SATA cable to the hard drive , my friend can make sure it is installed properly and correctly For setting 2 hardiskIDEyang 1 cable plugged in , my friend can check the position of the jumper on the hard drive , for setting the master and his slave in order to distinguish Check whether the hard drive is unreadable in the BIOS or not , try to check one by one . If the BIOS does not detect the problems exist on the hard disk My friend can try to hold the disk surface , which is good for the hard drive / good it will feel the vibration .
2 . Could not Boot Computer Due to Overheating Processor This problem never happened to my friend where the computer can not boot at all . and usually if the processor overheating or overheating will result Slows Computer Start and Restart the computer frequently . To address such issues , usually IT Newbie doing some analysis , such as:
Check the condition of the fan heatsink / fan processor Check rotation on the processor fan , if the fan starts to slow down . Check the temperature of the processor in the hardware monitor in the BIOS
3 . Could not Boot Computer Due to memory and VGA card This problem usually will sound a beep repeated times , and the display monitor does not want to appear like normally . To analyze it as follows :
Buddy can take off the first memory RAM or VGA card , slot pin can be cleaned and re- paired correctly . Buddy can try installing RAM memory in another slot For those who use more than one RAM memory , one can be removed and tested one by one . If it still sounds a beep sound , my friend can try with another computer .
4 . Because the computer can not boot Windows System Corrupt Such problems can be overcome by analyzing a message from windows that showed the presence of damaged or missing files , just to cope , as follows :
My friend can check RAM memory condition , if installed more than one memory and the memory is not compatible will usually display an error message on Windows systems . Repair Windows pal , and how to repair her friend can follow my tutorial in the article How to Fix Windows without installing Birthday
Understand and analysis of problems in computer buddy , read the tutorial above with at least a friend can understand how to fix a computer that can not boot . And my friend does not need to pay to go to handyman services . Had there are not understood from the above explanation and perhaps an error of writing the author , please maav and awaited criticism , suggestions and comments below it .
Hopefully this tutorial can be useful for IT buddy Newbie all . IT Newbie greetings .
Read more : http://www.it-newbie.com/2013/01/4-solusi-komputer-yang-tidak-bisa.html # ixzz324Ezhcwr
Buddy kutikom we do not get confused when the computer is damaged and do not panic to bring her handyman service to try to learn Improving your own computer it charges its hefty tuh let ga wasteful : D hehe ok immediately wrote in pahamin yuuk below .
Damage to the computer in the outline can be divided into two , namely : 1 . Factors Hardware (Hardware ) 2 . Factor parangkat (Software ) Damage Factor Hardware (Hardware ) can be caused by :
Installation hardware is not correct as cabling , jumpers , slots , bolts or screws etc. Damage to the hardware components , such as Processor , Motherboard , Memory , VGA card , hard drive etc. .
Damage to parangkat Factor (Software ) can be caused by :
Damage to the Operating System Damage to the Program Application Damage to Drivers
Further descriptions of how mendeteksikerusakan on the PC and how to overcome them , are outlined below :
1 . HOW MENDETEKSIKERUSAKAN / ISSUES ON COMPUTER At the time of pressing the power button , there is no sign of power / electricity Stroom emerging , such as lighting control / power LED , is not lit , the power supply fan is not alive .
Possible damage
Stroom electricity does not work Power supply is broken Chasing power cable swict not or incorrectly installed on the motherboard . Motherboard CMOS jumper installed incorrectly ( in a clear position ) The motherboard is damaged ( dead )
How to cope
Check the electrical power supply if installed properly , stavol is functioning properly Check the power supply must be replaced if damaged Swict Check the power cable to the motherboard is installed correctly Check the CMOS jumper if it is installed correctly Check / Checks if the motherboard works fine / not When you have ascertained the cause , the damaged components should be repaired or replaced
2 . At the time of pressing the power button , the LED light turns on , but there is no any display monitor screen Possible damage
Power supply is not functioning optimally Processor , memory , or motherboard is not working Or VGA monitor does not work Installation of power cable and the data cable is not correctly
How to cope
Check whether the power supply is functioning optimally . Check processor , memory , or motherboard is functioning well Check the monitor / VGA is good befungsi Disconnect all power cables and data cables from his position , and try to power the computer
When you have ascertained the cause , problematic components can be replaced .
3 . At the time of pressing the power button , the display looks only monitored the BIOS program , there is a message " No System Disk / Invalid System Disk Possible damage
There diskette mounted on drive A Hard drive can not function No OS Damage to the OS
How to cope
Check if there is a diskette mounted on ploppy , if any issued and then enter . Check if AC power cord / data hard drives have been installed properly Check if there is any damage to the hard drive in the BIOS disk detection method , scandisk programs starupdisk When you have ascertained the cause , the damaged components should be repaired or replaced including reinstalling the OS .
NOER IZZA AFCARINA TUGAS MINGGU KE-11 How to Install Fuel In Computer Or Laptop Rumahinformasi.com ( 08/01/2014 ) . Since the emergence of fuel in cross platform like Android and Apple's iOS , its existence is in the interest for the penggunakanya.nah what if that does not have any Android or Apple ? Do not need brsusah now my heart will review How To Install Computer Or fuel in Laptop.banyak way that can be done one with blue Stac , but it is berat.kita kunakan just simple manner and lightweight for menjalankannya.Oke just follow the How To Install on Computer Or Laptop BBM step by step below . ( How To Install on Computer Or Laptop BBM ) Tools to be prepared , first downloaded below : - Java ( try downloading the latest version ) - SDK Manager - adb - BBM.apk 1 . Having all three of the above components you have downloaded the SDK Manager esktrack its first Android ( ADT Bundle for Windows ) . 2 . Upon entry into foldel in ekstrack ADT - bundle - windows- x86 - 20131030 , the road manager was in a way right SDK Right Click Run As Administrator 3 . Then a new window will appear SDK His manager , after the install package Androidnya.disini author uses the Android 4.3 version . and note that the installation process runs must be connected to internet.pilih package and install as shown below . 4 . Then Accept License Licensinya Android SDK and Android sysimage Intel License as on gamabr in this bawh 5 . Wait until the installation process is complete 6 . After all installation is complete , select " Tool " on the tabs at the top and then select "Manage AVDs " . after the new exit window click " New " and fill as shown below . 7 . Then Try Start.setelah road right -click your way to the right for the first time the start was rather lama.Jika look like the image below virtualisasinya means for the installation phase has been successfully 8 . Turning now to the stage for the installation of fuel nya.Nah if you already downloaded it earlier adb.zib , put it right in the folder ADT - bundle - windows- x86 - sdk >> 20,131,030 >> tool after that its adb.zip esktrack file . well as in ekstrack are installed in a folder that has adb in ekstrack tadi.copy 3 files contained in the folder that was installed at the exit adb folder and copy it also BBM.apk her into the adb folder . approximately as shown below this 9 . Then run the Android emulator once you have made , until the emulator path . After you create the Android emulator running . Please click a folder adb . Then hold down [ Shift ] and click >> open a command window here.seperti in the picture below 10 . Will then display the Command Prom.setelah appear that we install its fuel with printah : adb install BBM.apk Wait until it selesai.dan if successful it would be like in the picture below 11 . Well at this stage of the installation is finished living create your BBM account ..
Easy and simple bukan.cara Well I live in a dual - core with 2GB ram and a road with no less obvious to normal please leave jejek yes
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 10
CCleaner (also known as Crap Cleaner), developed by Piriform, is a utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer. A public version 1.01 for Mac OS X has been released along with a Network Edition. Its technology includes the ability to defrag the drives and access the system information in the online service Agomo, developed by Piriform. Features CCleaner supports the cleaning of temporary or potentially unwanted files left by certain programs, including Internet Explorer, Firefox, Google Chrome, Opera, Safari, Windows Media Player, eMule, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat, McAfee, Adobe Flash Player, Sun Java, WinRAR, WinAce, WinZip, GIMP and other applications along with browsing history, cookies, recycle bin, memory dumps, file fragments, log files, system caches, application data, autocomplete form history, and various other data. The program also includes a registry cleaner to locate and correct problems in the Windows registry, such as missing references to shared DLLs, unused registration entries for file extensions, and missing references to application paths. As of v2.27, CCleaner can wipe the MFT free space of a drive, or the entire drive itself.
Nama : Silvia Anggraeni Kelas : XI RPL 2 Minggu Ke : 11
eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders. Furthermore, eMule transmits data in zlib-compressed form to save bandwidth. eMule is coded in C++ using the Microsoft Foundation Classes. Since July 2002 eMule has been free software, released under the GNU General Public License; its popularity has led to eMule's codebase being used as the basis of cross-platform clients aMule, JMule, xMule, along with the release of many eMule mods (modifications of the original eMule) on the Internet. As of August 2013, it is the second most frequently downloaded project on SourceForge, with over 665 million downloads, only behind VLC media player.
Linux Mint 17 is a long term support release which will be supported until 2019. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
New features at a glance:
Update Manager Drivers Manager Login Screen Language Settings Software Sources Welcome Screen MATE 1.8 System Improvements Artwork Improvements Main Components LTS Strategy
For a complete overview and to see screenshots of the new features, visit: “What’s new in Linux Mint 17 MATE“.
Important info:
Login screen freezes for German speaking users NVIDIA Optimus cards do not work (yet) EFI Support Bluetooth PAE required for 32-bit ISOs Other issues
Make sure to read the “Release Notes” to be aware of important info or known issues related to this release.
System requirements:
x86 processor (Linux Mint 64-bit requires a 64-bit processor. Linux Mint 32-bit works on both 32-bit and 64-bit processors). 512 MB RAM (1GB recommended for a comfortable usage). 5 GB of disk space (20GB recommended). Graphics card capable of 800×600 resolution (1024×768 recommended). CD/DVD drive or USB port
Bug reports:
Please report bugs below in the comment section of this blog. Please visit https://github.com/linuxmint/Roadmap to follow the progress of the development team between the RC and the stable release.
Linux Mint 17 Qiana Cinnamon Edition
Linux Mint 17 is a long term support release which will be supported until 2019. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
New features at a glance:
Update Manager Drivers Manager Login Screen Language Settings Software Sources Welcome Screen Cinnamon 2.2 System Improvements Artwork Improvements Main Components LTS Strategy
For a complete overview and to see screenshots of the new features, visit: “What’s new in Linux Mint 17 Cinnamon“.
Important info:
Login screen freezes for German speaking users NVIDIA Optimus cards do not work (yet) EFI Support PAE required for 32-bit ISOs Other issues
Make sure to read the “Release Notes” to be aware of important info or known issues related to this release.
System requirements:
x86 processor (Linux Mint 64-bit requires a 64-bit processor. Linux Mint 32-bit works on both 32-bit and 64-bit processors). 512 MB RAM (1GB recommended for a comfortable usage). 5 GB of disk space (20GB recommended). Graphics card capable of 800×600 resolution (1024×768 recommended). CD/DVD drive or USB port
Bug reports:
Please report bugs below in the comment section of this blog. Please visit https://github.com/linuxmint/Roadmap to follow the progress of the development team between the RC and the stable release.
Android phone that is much in demand by many people nowadays , are able to make a portable wifi android . Maybe we previously did not know that the Android phone is capable of being used as a portable hotspot or wifi . With the convenience offered in this Android application not be surprised if the current Android sales have increased and Android still tops as the gadgets are much in demand . Ways or steps taken to make a portable wifi in with Android , the following description .
1 . Entry into the settings menu in Android phones .
2 . In the settings menu there are a lot of menus or options . Then we choose wireless and networks section .
3 . At the wireless and networks we choose Tethering & Portable Hotspot menu .
4 . If we want to make arrangements in advance hotspot , we can choose a menu set up a wifi hotspot . On the menu we could rename the hotspot name and setting up a password so that no one can access it sembaranagn .
5 . Then we go back to the menu Tethering & portable hotspote , check or tick on the portable wifi hotspot .
If all the above steps have been done then , Android phones we now have become a portable hotspot . Have an Android phone , must have a lot of knowledge to be able to take advantage of all the applications that are available and the phone will be appropriate
How to Optimize Android Speed Here is how his ways :
1 . Know How Much RAM or Your Memory
The first step is to know how much RAM is on your Android , we know that there are several types of Android phones are high-end or upper class , lower class that cost up to $ 500 thousand late . But we should be aware is how precisely the capabilities of your Android , if you choose Android underclass of low-end , then do not expect much for the use of multimedia applications or games big games are easy , because it is due to the capacity of the RAM that has been pressed so that the performance may not be can be maximized . So it might be wise to install the application and usage , adjust the amount of memory and your processor .
2 . Remove Application and Cache Periodically
The one that makes the weight is the number of applications that are not really needed , it could be because of its many shortcuts and widgets . Then delete the application on a regular basis that is not too necessary . Both also need to clear the cache on a regular basis , applications such as chat applications have a lot of cache , so just delete the cache is not needed , you can use the application cache cleaner from the Play Store .
3 . Install Android Application Maintenance
There are several applications that can take care of your android and the stability of the process that we discussed this time is two applications, namely Task Killer and Greenify . Task Killer as the name implies , is the application to forcibly close the application that is running in Backgroud . Applications running in the background can slow down the performance of Android as a whole , especially if its application is great, just close the application that takes a lot of memory with Task Killer . Both are Greenify , almost the same as Task Killer but Greenify more " wise " in the process of removing the background , which is not mengclose is " force " but do hibernate , so the required application can be used at any time quickly . 2 The application can be by downloading from the Google Play Store .
4 . Rooting and Memory Allocation
Some say that going root your Android can be dangerous and lowers the value of the sale , but they're not . By downloading rooted your Android , you more flexibility in the treatment of Android , with mensintall some important applications and some important processes , which can ultimately increase the speed of your android . In addition to the use of external memory Multimedia , do not force the internal memory to continue processing as it makes slow , allocate external memory games and also for games other large applications .
Once you take care of your Android or open it to large programs will be more comfortable , because the process is faster. Can also save your battery , all of this is related because if the frequent application in the process of making the battery run out quickly and are not durable .
Nama : Anisatul Khoiroh Minggu Ke-11 How To Hide And Open Drive Hidden In Computer
Here's the steps you can do to be concealed or open a hidden Drive command " DISKPART " :
First please you click on the Start menu >> Run >> type " CMD " ( without the quotes ) >> Click OK Please type the following command " DISKPART " and press Enter Type " list volume" in view of the CMD and press Enter ( This command is used to view a list of drives on your computer) The next step ie select the Drive you will hide , suppose we take the example here is " Drive E " To hide E Drive please type " volume 2 " then Enter ( figure 2 are obtained from the placement volume Drive E , so adjusting the figures that appear straight on your computer ) Next type " remove letter E " Step hide E Drive on the computer is finished , type " exit " to exit the DISKPART command . Restar your computer and go to my computer to make sure that Drive E is hidden . To view or restore it , please do the same command from step to step on the determination of the hidden volume that is step five . Please place order remove letter E becomes >> type " assign letter E " Restart your computer Hide Drive Computer Using gpedit command Hide Drive Computer Using gpedit command
In addition to using the DISKPART command , Drive meyembunyikan computer we can also do this with command gpedit . Here are the steps please listen completely below :
The first step that is click Start >> Run >> type the command " gpedit.msc ( without the quotes ) then click OK More will appear ampilan Group Policy , please double click on the text " User Configuration " >> Administrative Templates >> Windows Components - > Windows Explorer - > next select Hide these specified drives in my computer on the right side of the display window . After opening the Hide specified drives in My Computer window will appear just please you select " enable" and select the drive that you want to hide. Suppose you want to hide E Drive then select RESTRICT E drive only further click Apply and OK Step hide Drive E is complete, now check on my computer to see the results. To restore hidden Drive please do the same command as above later on point " Hide specified drives in My Computer " please select "Not Configured " then click Apply and OK .
Perhaps the general dah Software is widely used people , both just a fad or a tuk for a song ... Here I try to explain what and usability of the software. This software has an output Syntrilium Co. single track and multi track as shown below . From this picture we can see that this is a single track where we can do the cutting function by means of block samapai wave which one we want to delete , then press delete . I 'll tell you what ever is inside menu2 cool edit this .
1 . The file : we can create a new project ( new session ) , or open a job file ( open session ) , and save in the format we want
2 . Edit : its usefulness tuk edit the file by pressing the edit and choose , what we want , such as punch , block group , mix down files , remove blocks and lain2 snapping .
3 . In the menu view , to open and close the taskbar we want ....
4 . Effect : This effect is very important function in the edit file that will be the end of our work , in terms of improvement of our work .. No plugins volume , equalizer , normalize and lain2 ....
While in MULTI TRACK , how it works enough that we have to import file2 into file open track which provided, as shown below :
from the picture , we can see the menu Panning , Volume , mute , fx , out , useful and influential records of the file that we import .... MULTI TRACK function is usually used for Recording , which function as fx , we can insert an fx that , for improving file
record , to merecord file that will insert itself ... this might be an outline of the Cool Edit this , then I will write another tutorial software .
With USB Booting This time I wrote a trick windows , and I have tried these results are 100 % successful . Directly to the scene USB flash has completely replaced floppy disks . He is not only cheap but also very practical , durable , and can have the capacity to anticipate besar.Untuk computer will not boot , my friend must have a bootable USB drive , my friend can solve it more quickly by means of : Insert the USB into a USB port on a computer Click Start > RUN > type CMD Already munculkah Command Prompt window when I type " diskpart " without the quotes and press Enter . Then type " disklist " press Enter again Decide in advance from a list of disks that display which is a USB drive . Record the number that identifies Type the command " Select disk # # # " into the Command Prompt window to format the USB drive . Replace # # # with the number you get in step 4 earlier . Press "Enter " clean . Press "Enter " Create Partition Memory press "Enter " . Select the Partition # # # press "Enter " . Format FS = NTFS . Press "Enter " Assign . Press "Enter " exit , press "Enter " Insert the Windows installation CD buddy . The computer will read the CD , and a window will appear on the screen . Look for the letters which is a symbol of the CD - ROM and USB Drive . Type the following command to CMD : * = CD boot , replace * with letter which is a symbol of the CD - ROM , press "Enter " Bootsect.exe / NT60 @ , replace @ with a letter which is a symbol of the USB drive , press "Enter " Copy Boot Information from the installation CD to a USB drive by entering the command " xcopy @ : * . * / S / e / f & :/ " into CMD . Replace & with the letter which is the symbol of the CD - ROM and replace @ with a letter which is a symbol of the USB Drive . Press "Enter " . Allow the computer to copy the data Unplug the USB drive from the USB port , replace the lid , and label " bootable " with markers , and store safely . Remove the Windows installation CD and Done
HOW TO CORRECT BROKEN LAPTOP KEYBOARD or ERROR how to fix a laptop keyboard } } for my friends blog article computers that are experiencing damage to The keyboard then this tutorial is suitable for you and which do not need are also required to read for at least this be your insight to address the damage to the computer .
Artike short computer also useful for various problems of damage to the keyboard with all brands of Laptops :
how to repair dell laptop keyboard how to fix a compaq laptop keyboards how to fix a laptop keyboard acer aspire one how to fix the error asus laptop keyboard how to fix a laptop keyboard lenovo Here is how to cope with a broken keyboard or error :
Buttons Keyboard Error or Not Functioning
Characteristics : One of the keys of the keyboard do not work Like button depressed continuously . Arise as long beeps continuously depressed button . Usually fitted to light must press one of the letters
How to Fix the Error Keyboard Keys
Disconnect all connections energy ( carger and battrai , if not off can damage other components ) Disconnect the keyboard of his laptop Release all the keyboard keys ( be careful not to break kaki2nya let alone disappear. That mending photograph forgetful friend once wrote keybordnya let me not forget . Hee :) After all off with a hair spray evenly . given spray more on the key error . When finished reattach Laptop Keyboard / Notebook If the Fix Laptop Keyboard as above and not functioning properly , you can clean the dust / dirt keyboard with Brush / water / alcohol and dry it first .
Keyboard keys mixed up letters ( m , j , k , l , u , I, o with 0 , 1 , 2 , 3 , 4 , 5 , 6 ) Characteristics of Damaged Keyboard :
Often when finished use an external keyboard , after we unplug the keyboard and we use the default keyboard laptop it has changed : when we press the m , j , k , l , u , I, o that appears is the number 0 , 1 , 2 , 3 , 4 , 5 , 6 . causes of this condition is usually due to the Fn function key exchange . How to Fix a Laptop Keyboard on an inverted function of the Fn key by mistake : Press and hold the Fn key and wrote Do not let go , then press the numeric key function numeric.Tombol if the laptop is usually located on the top row parallel to the F1-F12 function keys , labeled Insert and NumLK . After that release both buttons . Now try to press the u , if it still appears the number 4 means have not been successful , repeat once more . In essence, the key function is similar to the caps lock key , is pressed once turned into a capital letter , capslock button is pressed again to change back to lowercase .
Keyboard Keys Not Functioning at Once The characteristics of damage to the keyboard :
All Buttons Not Working at all Even Lamp Caps Lock and Num Lock does not live Normal Macet-macetan/Tidak Keyboard Keys
How to Fix keyboard not working at all :
Perform Step on issues No. 1 to its conclusion Try cleaning with a water / alcohol and dry it first until it is completely dry . Note Button USB keyboards , there are times when the USB key ( plugs keyborad ) is not functioning properly . Try Restart your laptop first.
Hopefully this article how to fix this laptop computer is useful for friends who need and add insight to the readers of this blog . If interested please Read How To Make Antivirus
First open the site, please click http://www.pdfonline.com/pdf-to-word-converter/ Then click the "Upload a File To Convert ..", it will display the Pop Up to select the PDF file to be converted to MS Word on your computer. Wait for the process several times, [IMG]
After that click on the link "Download" as in the picture below [IMG]
Then select "Download Word Files" and save the downloaded file to your computer. [IMG]
how to edit the look of facebook , change facebook , how to install themes on facebook , how to change the look of the website , how to change the website , on facebook by giving theme , theme for facebook , facebook latest tricks 2013 , new facebook themes , latest themes , change facebook theme , create facebook theme , facebook theme , how meruba , facebook theme , how to change the theme , how to change the theme on the blog , facebook themes , how to change the theme , facebook themes , facebook theme , how to make the look more cool facebook , latest facebook theme , how to install themes The blog , create a facebook themes , themes for facebook , how to change the theme , how to change the theme , how to make facebook themes , free facebook theme , facebook theme download free , how to create facebook theme , facebook theme download , free download facebook theme , facebook theme app , how to create a theme in facebook , change facebook themes , latest facebook theme , facebook theme replace , change facebook theme , how to change theme facebook , change facebook themes , themes for facebook , how to change theme facebook , cool facebook theme , how to change facebook theme , how to change facebook theme , facebook theme download , theme facebook .
It seems like a lot of people who do not know about the background of the founder of the facebook social networking fb now so many who use it , not only in Indonesia but throughout the world have been many who use it , is really a great result at all .
Perhaps among the artists currently adele so much in talking about , but in the present figure Mark Zuckerberg really talk much in person because his company has rocked the world with a very large stock valued at all , let us try to discuss about Biogafi and Biodata Mark Zuckerberg this .
Biogafi and Biodata Mark Zuckerberg - Be aware poorer Zuckerberg was born in 1984 in White Plains , New York , still very young but very clever idea yes , and now he's really become extremely wealthy just by facebook , she has three sisters ie Randi , Donna , and Ariell , Zuckerberg on Facebook profiles , he mentions interested in " openness , creating something that help people connect and share everything that is important to them , revolutions , information flow , minimalism .
Mark Zuckerberg Biography and Biodata
Birth Name : Mark Elliot Zuckerberg Date of Birth : May 14, 1984 ( age 28 ) Place of Birth : White Plains , New York , USA Residence: Palo Alto , California [ 2 ] Tribe : Jewish Alma mater : Phillips Exeter Academy Occupation : CEO / President of Facebook Spouse : Priscilla Chan
Zuckerberg launched Facebook from his Harvard dorm room on February 4, 2004 , it was the age of facebook already quite long yes , Zuckerberg moved to Palo Alto , California, with Moskovitz and some friends . They rented a small house that serves as an office . During the summer , Zuckerberg met Peter Thiel who invested in the company . They got their first office in mid-2004 . According to Zuckerberg , they planned to return to Harvard but eventually decided to remain in California . They have rejected an offer by a large company that will buy Facebook . In an interview in 2007 , Zuckerberg explained his reasoning :
It's not about the money . For me and my colleagues , the most important thing is that we create an open information flow for people . Media company owned by conglomerates is just not an attractive idea to me . He revisits the same goals to Wired magazine in 2010 : " All I care about is the mission , making the world open . " Previously , in April 2009 , Zuckerberg sought the advice of former Netscape CFO Peter Currie about financing strategies for Facebook .
Biography and Biodata Mark Zuckerberg - On July 21, 2010 , Zuckerberg reported that the company reached 500 million users . When asked if if could get more income from advertising as a result of its phenomenal growth , he explained : I guess we could ... If you look at how much of our page is taken for serving ads compared to the average search query . Average for us is a little less than 10 percent of the pages , and the average for search is about 20 percent taken by the ad . That's the simple things we could do . But we do not like it . We make enough money . True , I mean , we are keeping things running , we are growing at the rate we want
1 . ) Fast Booting There is indeed inevitable , rapid boot process is the dream of all PC users around the world . And as has been previously known that Windows 8 has advantages in terms of boot faster than previous versions of windows . In this version of Windows 8.1 , which Microsoft tried to make the boot process becomes much faster than previous versions of Windows , even though Windows 8 .
2 . ) Better Performance One of the advantages of windows 8 is the disappearance of the Aero Themes systems are replaced by the Metro UI . Well , this 8.1 on windows microsoft have perfected the system previously diterpakan Metro UI on Windows 8 , as a result the performance of Windows 8.1 lighter and faster , the process also becoming better multitasking so that keeps us from the word " hang " or " not responding" on the PC we .
3 . ) More Elegant and Fresh Start Menu In Windows 8 earlier , we have known icon shaped tile size can be changed " larger " or "smaller " , on windows 8.1 , we can replace it with 4 kinds of sizes, Large , Wide , Medium , and Small . Not only that , the background start menu can we change the existing background on the desktop . And many other features that make the start menu we become more " alive " .
4 . ) Supercharged Search Search on Windows 8.1 system has been integrated with Bing search , so if you type something in the start menu , and it can not be found by computer search engines , there will be an option to select a search option from Bing , of course, would be useful if we are in the online state .
5 . ) And Many More Better Apps At this 8.1 windows system , windows apps default of the OS is equipped with a new application , namely Alarm , Food & Drink , Health & Fitness, Scan , Sound recorder , and Help & Tips . In addition to the application store windows can be automatically updated when we have an internet connection , so we did not bother to open the windows store if we simply update the application . This feature stores and improve its windows by minimizing the possibility of " pending downloading " and eliminates common errors encountered while using Windows 8 earlier .
6 . ) Less Storage Space Although Windows 8.1 can be said to have a more full featured than Windows 8 , but Windows 8.1 did not make this size has swollen . The size of windows 8.1 is even 8-15 % smaller than Windows 8 . This excess will certainly have an impact on saving storage system in our PC .
7 . ) Welcome back "Start Button " ! Maybe some users of Windows 8 was disappointed with the decision microsoft seaakan removing the start button is ingrained in some users of this OS . Given that , the microsoft evaluate and finally realized how about the importance of the start button on the menu . So they bring back the start button , though in the end if pressed will bring up the start menu display . But with this menunjukaan that Windows 8.1 was not aimed at the tablet / PC with touch screen only, but to all types of PCs .
Perhaps there are many other advantages of Windows 8.1 was compared to Windows 8 , but I can not mention one by one , clear windows 8.1 can be said to be better than Windows 8 . So , I recommend to update your windows to windows 8.1 .
All the points you described so beautiful. Every time i read your i blog and i am so surprised that how you can write so well. angularjs-Training in pune
Whoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.
Really very happy to say that your post is very interesting .I never stop myself to say something about it.You did a great job.Keep it up. We have an excellent IT courses training institute in Hyderabad. We are offering number of courses that are very trendy in the IT industry. For further information, please once go through our site. Python Training in Hyderabad
And indeed, I’m just always astounded concerning the remarkable things served by you. Some four facts on this page are undeniably the most effective I’ve had.
We are China Frequency Shift Repeater Manufacturers & suppliers, Specialized in Frequency signal coverage solution. More-effective to improve signal coverage and quality help operators get fast return under easy installation and maintenance. If interesting Frequency Shift Repeater, pls click here Frequency Shift Repeater.
I’m impressed, I must say. you hit the nail on the head. Your idea is outstanding; the issue is something that not enough people are speaking intelligently about. I am very happy that I stumbled across this in my search for something relating to this.
Interesting and impressive information, definitely will be helpful for those who are looking for Melbourne pc repairs and related high-quality computer repairs services in Melbourne.
Check out this page in {0} translated from {1}translated fromOriginal:Translated:Automatic translation powered by Microsoft® TranslatorStart translatingStop translatingCloseClose and show original pageSelect
Nama:Anisatul khoiroh
ReplyDeleteKelas:XI RPL2
Google Drive Definition and Functions
- Google Drive is a storage service that is owned by Google. Google Drive is long dilunjurkan ie since 24 April 2012. Google users will get the service drive of 5 GB of free storage. Google Drive is a change from Google Docs, if my friend opened google docs then google will be redirected to the drive.
Functions and Advantages of Google Drive
Google Drive has a function like Dropbox is syncing data from your PC, so my friend can make and share data and documents in the Google drive. Moreover buddy can also access data files from anywhere in the home or in the office by connecting to the internet of course.
Another advantage that is Google Drive has been integrated with Google services including gmail liannya, Gplus, google search and more.
If my friend wants to try this google drive drive.google.com please go directly to the login is using email buddy so that my friend can use Google Drive. Later will appear as shown below if google buddy drive is activated, but if not please wait for the notification from google email to my friend,
If you've successfully logged in and Google Drive is already active friend can directly download files / folders as shown below,
Buy Best Graphic Card Under 100 in 2020
Deletegraphic card
Company Profile >>>>> Download Now
Delete>>>>> Download Full
Company Profile >>>>> Download LINK
>>>>> Download Now
Company Profile >>>>> Download Full
>>>>> Download LINK k3
muhammad safreza
ReplyDelete11 rpl 2
Windows 8.1 is an update of the Windows 8 operating system. First unveiled and released as a public beta in June 2013, it was released to manufacturing on August 27, 2013, and reached general availability on October 17, 2013, almost a year after the retail release of its predecessor. Windows 8.1 is available as a free update for existing Windows 8 and Windows RT users via Windows Store, but unlike the service packs of previous versions of Windows, it is not distributed through Windows Update, and users who obtained 8 outside of retail copies or pre-loaded installations (i.e. volume licensing) must obtain 8.1 through new installation media from their respective subscription or enterprise channel. According to Microsoft's software lifecycle policies, installation of Windows 8.1 is required to maintain access to Windows 8's mainstream support after January 12, 2016.[1]
Released as part of a shift by Microsoft towards regular, yearly updates for its platforms and services, Windows 8.1 was primarily intended to address the complaints of Windows 8 users and reviewers on launch. Visible enhancements includes an upgraded Start screen, additional snap views, additional bundled apps, tighter SkyDrive integration, Internet Explorer 11, a Bing-powered unified search system, restoration of a visible Start button on the taskbar, and the ability to restore the previous behavior of opening the user's desktop on login instead of the Start screen. Windows 8.1 also added support for emerging technologies such as high resolution displays, 3D printing, Wi-Fi Direct, and Miracast streaming.
Windows 8.1 received relatively positive reception, with critics praising the expanded functionality available to apps in comparison to 8, its SkyDrive integration, along with its user interface tweaks and the addition of expanded tutorials for operating the Windows 8 interface. Despite these improvements, 8.1 was still panned for not addressing all of the digressions of 8 (such as a poor level of integration between Metro-style apps and the desktop interface), and the potential privacy implications of 8.1's expanded use of online services.
NAMA : TITI NUR JAYANTI
ReplyDeleteKELAS : XI RPL 2
How to Install Kaskus Emoticons in WordPress Blog
Install Kaskus emoticons in wordpress blog is easy. This is because Kaskus Emoticons will didinstal a wordpress plugin. Kaskus emoricon very useful to make emoticons Kaskus style. As we know, kaskus Indonesia is the largest forum in the motto written The Largest Indonesian Community.
Jump aja gan emotions we put the plugin in our wordpress blog. the following ways:
How to Install Kaskus Emoticons
1. Login to your wordpress.org blog.
2. At Plugins feature, click Add New.
3. Type kaskus emoticons in the field provided and click Search Plugins.
4. The results are as shown below, and then click Install.
5. Click Install Now, and then click Active plugin to activate it.
How to Use Emoticons Kaskus
To insert an emoticon kaskus in wordpress blog post, just click the K button and just select what you want to use emoticons..
Meanwhile, for readers who want to use emoticons kaskus when commenting, how can just click the + sign at the bottom of the comment form and select emoticons as you wish.
Another way to install it is to download the plugin Kaskus emoticons from the web wordpress.org plugin download kaskus emoticons here. Then uploaded to the hosting wordress and activate the above way. Thanks.
NOER IZZA AFCARINA
ReplyDeleteXI RPL2
how to create a blog via hp or OperaMini
بسم االلهالرحمن اارحيم
Assalamu wr.wb
Good afternoon sob , at noon today Warim want to post ni .. Tpi before posting Warim , Warim want aidzin dlu terminal sma blogger friends , terminal aidzin walfaidzin , sorry sob lahin and inner well , good x Warim got the same one blogger friend , Warim 'm sorry ,
yes already , go to the topic , How to Create a Blog Through operamini it is not impossible anymore . If you are thinking of making a blog should be connected to the Internet by using a computer , Laptop etc then do you think it's wrong. Then Is How to create a blog via operamini this could be? Javanese , " Of course I can
To create a blog using my HP recommends that enroll in mywapblog Mywapblog.com because its already quite full , we need to create a blog in Mywapblog is a HP ( surely you've got dong ) and a decent internet connection ( my connection saranin internet more than 3 KB / s though not until
slam tuh hp gara2 slow haha ) if it please enter Mywapblog.com deh friend
then you will see a bleak picture below
Then isiformulir registration and use original email to the email as it will be useful for confirmation . Mywapblog available in several subdomains such as : mywapblog.com , heck.in , pun.bz , mwb.im , and yu.lt
if the form has been filled all just click Register .
Now the final step shob , stay in confirmation
by the way , open the email shobat in use to register earlier , there was an email from mywapblog and open the email and click on the link in the email and your blog is finished taraa made . Please Create post buddy . Happy Blogging
well maybe it's just who can Warim write , how to create a blog via hp or operamini .
hufftt .. Cape ngetiknya ..
may be useful
Wassalamu'alaikum wr.wb
yuni anggarawati (XI RPL 2)
ReplyDeleteThe Most Powerful Speed up Internet Connection
What's up buddy ? On this occasion I will write an article about how to speed up internet connection , it is mate .. if we are happy air ria internet its slow but otherwise this connection we also take a long time to be bored , do not you think ? For my friend who was bored with slow internet connection , my friend can listen to the following article :
Powerful Ways to Speed up Internet Connection
Change the setting Bandwidth
In this way we can eliminate buddy restrictions on bandwidth , because the Windows OS is limited banwidthnya up by 20 % .
• Click Start - > Run - > gpedit.msc
• Then select the Administrative Templates
• Then click on QOS Packet Scheduler option
• Change the " limit reservable bandwidth " so " Enable " .
• Then change " Bandwidth limit " of 20 to 0 , and then click Apply - > OK
• After all the process is completed restart the computer
• See the results . ^ _ ^
Optimizing DNS Cache For The Fast
Open notepad and copy my friend code below :
[ HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServic es | DnscacheParameters ]
" CacheHashTableBucketSize " = dword : 00000001
" CacheHashTableSize " = dword : 00000180
" MaxCacheEntryTtILimit " = dword : 0000fa00
" MaxSOACacheEntryTtILimit " = dword : 0000012d
Then save the name dnscache.reg
Find store where my friend was , and then double -click the file , then press " yes " .
Using Open DNS
1 . Click - > Start
2 . Then click - > Control Panel
3 . Select - > Network & Internet
4 . Click - > Network and Internet
5 . Double click on Internet Protocol Version 4 ( TCP/IPv4 )
6 . Then click on " Properties "
7 . Fill in the Preferred DNS Server : 208.67.222.222
8 . Fill in the Alternate DNS Server : 208.67.220.220
9 . Then click OK .
Vivi F.D.N ..
ReplyDeleteXI RPL.2
Ubuntu is a free computer operating system ( OS ) that is useful for the basic operation of the computer . The latest version of this program is 12:04 Ubuntu Beta 2 , which was released on March 29, 2012 . Ubuntu software created and developed by Canonical Ltd. .
This computer software has advantages in its open source and free . In addition , Ubuntu also has been equipped with a variety of computer applications for various purposes , so that users no longer need to install software for office applications such as general , internet , and multimedia . Ubuntu is an operating system based on GNU / Linux ( Debian ) . Ubuntu is routinely updated version , stable version was released about 6 months. Ubuntu open source operating system became the most popular in the country .
Ubuntu program widely applied and used by many computer users , especially those fond of Open Source software . Ubuntu is free software ( open source ) . To install the latest version of this program , your computer must have a minimum specification Pentium 4 processor 1 GHz CPU , memory ( RAM ) 1 GB , monitor resolution of 800 x 600 pixels , and a hard drive with at least 15 GB of free space .
Ubuntu Operating System Software Info
Type : Operating System
Functionality and usability : The fundamental operation of computer
Target circles penggguna : All computer users
Developer : Canonical Ltd. .
Latest version : Beta 2 Ubuntu 12:04
Released: March 29, 2012
Product info page : http://www.ubuntu.com/
Download : Download Ubuntu 12:04 Beta 2 here
The size of the source file : 701 MB
Price : Free
System Requirements & Requirements Installing Ubuntu Beta 2 12:04
Capacity Hard Drive : Minimum 15 GB
Memory / Random Access Memory ( RAM ) : At least 1 GB
Monitor resolution : 800 x 600 pixels
NAMA = IZAH AFKARINA
ReplyDeleteKELAS = XI RPL2
4 Benefits SmadAV Newest
smadav now focus on 4 main benefits so that :
1 ) additional protection for your computer , 100 % compatible with the following antivirus !
most antivirus can not be installed simultaneously next antivirus , antivirus because it is designed for primary protection on your computer . different with smadav , smadav antivirus is a type of in - design so additional protection , up to 100 % compatible and can work well although there have been other antivirus in your computer , in this matter smadav plays a 2nd layer of defense . smadav has its own way (behavior , heuristic , and whitelisting ) in detecting and cleaning viruses will further add to the security of the computer . resource usage because very small smadav , smadav will not add to the weight of its use in the performance of your computer . so , with a mix of protection and on smadav antivirus has been installed on your computer will strengthen the defense of your computer from virus infection .
2 ) best usb antivirus ( total protection usb flash )
usb flash media is among the largest spread of the virus in Indonesia . smadav have special technology for total prevention of virus that spreads via a usb pendrive . smadav mission is no longer 100 % viral infection of the flash . smadav have enough signatures of viruses that infect the flash , and has a special power for detecting new viruses in flash though not in the database SmadAV . not just prevention , smadav also can clean the viruses that infect and restore virus hidden files in the USB flash
3 ) best for off line use ( no need to keep up to date )
smadav very well be used for computers that rarely or let alone not connected to the internet . smadav do not need anti-virus up to date as often as the next up date that generally do much less per week / day . smadav generally do up date only 1 month (monthly ) . smadav not rely heavily on signature / virus database , but rather relies on behavior detection techniques , heuristic , and whitelisting .
4 ) tools make cleaner and clean the virus
smadav also can clean the virus that has infected the computer and do the repair registry altered by the virus . The next antivirus does not usually do the cleaning up the computer registry has not been cleared to return to normal after the antivirus. many supporting tools are included in smadav so weapons do the cleaning for viruses . note : not all types of viruses can be cleaned smadav , smadav have still not been able to clean the virus type or types of rootkits penginfeksi program ( eg : virus Ramnit , Sality , Alman , virut , and others. ) because this type of virus has destroyed most large files your program . Our focus today is thoroughly cleaning for two types of viruses not only the types ( eg : wormshortcut virus , cervical , mso , eagle , etc.
NAMA: LUTVIATUS SAADA
ReplyDeleteKELAS: XI RPL 2
familiar with delphi
understanding Delphi
Delphi is a programming language (development language ) used remedy designing an application program .
a. usefulness of Delphi
1 . to make a windows application
2 . To design a graphical program applications
3 . To create a network -based program ( client / server )
4 . To design the program . Net ( internet -based )
b . Delphi excellence
1 . IDE ( Integrated Development Environment ) or application development environment itself is one of the few advantages of Delphi , in which there is a menu - a menu that allows us to create a program project .
2 . The compilation process fast , by the time we make the application run on Delphi , it will automatically be read as a program , without a separate run .
3 . Easy to use , Delphi source code which is a derivative of Pascal , so an adjustment is not needed anymore .
4 . Multi purphase , meaning the Delphi programming language can be used to develop a variety of application development purposes
How to Use Delphi for Beginners
First open the Delphi application ( Start- Program Files - Embarcadero Rad Studio Delphi 2010 to 2010 ) if the first is then lngkah
1 . Click File - New - Delphi VCL Delphi VCL Application Form Application .
2 . Save first if you want to run or operate Delphi sehinggadata Suchreplay can be edited , click the red circle on the way to the keyboard or Ctrl + Shift + S. So All Units / Forms will be recorded
3 . In the Tool Palette select additional right click on the image and the shape will be red sepertipanah leads to the left shows the image will be displayed . red kirilingkaran mounting the image in the
picture as a picture
4 . Click on the image shown in the red circle then appeared gambardi editor where we find the desired image and then click the image you are looking for such bebanyang and OK
5 . In the Standard Tool Palette , Enter TLabel , TEdit , TButton
6 . Click Properties on the left Label1 Caption seek to change the name as well as how to replace andnamelabel Button 1 .
7 . Click Properties on the left Label1 Caption seeking to rename andnamelabel as well as how to replace Button1 .
8 . 2x click on the red circle Preview/Button1 then loaded like this : " MessageDlg ( ' Name : ' + Edit1.Text , mtinformation , [ mbok , mbcancel ] , 0 ) ; " biruuntuk circle back to Form Design / Display .
9 . Starting the last way Delphinya Click the green button on the form or click F9 , ifsomething wrong and will not appear check back on Codingan / tool less fitting .
If you want to add 2x Button Exit Button Click on it and fill out the " Close ";
NAMA : QUROTUL AINY
ReplyDeleteKELAS : XI RPL 2
"Uniting efforts Android and Windows Delayed"
Asus plans to introduce a mobile device with two operating systems, Android and Windows, is likely to be inhibited, or it could be stopped. Because, Microsoft and Google both do not want the operating system to be in a single device.
Asus reported by The Wall Street Journal (14/03/2014) gets pressure from Google and Microsoft fatherly delay production duo laptop Transformer Book TD300 which features a dual-boot Android and Windows. TD300 Asus introduced at the International Consumer Electronic Show in January 2014.
TD300 was developed based on the Asus Transformer tablet. Tablets are modified by adding a physical keyboard (the keyboard) so that the model resembles a laptop.
Microsoft has a good reason why they do not want to share space with Google in one device. The main reason is Google considered to be undermined business desktops and laptops that had been controlled by microsoft.
While Google, opens his heart to share space with Windows. But, in the Duet Transformer Book TD300, Google demanded that Asus uses pure Android. That is, do not do any modification on Android being used on the device.
In addition to Asus, the actual producers also participated prosesorIntel harmed by inhibition of the production of laptops that run Android and Windows. Intel is currently trying to expand its market into the mobile realm, by producing prosesoruntuk smartphones and tablets.
Products that run two operating systems at once like the Asus Transformer Book artificial Duet, Intel is believed to attract the attention of consumers who want to work and relaxation with a mobile device. PC-oriented applications can be run with Windows, while the mobile application can be enjoyed by Android.
Intel had previously been working closely with Microsoft in the PC market. But the success of Windows on the PC and notebook market is not followed by success in the market of smartphones and tablets. Hope Intel was also placed on two devices running the operating system.
Intel's processor with the x86 architecture is also designed so that run well on the Android operating system, in order to compete with ARM architecture processors. Do not stop there, Intel also conducted business with the release of firmware that supports both Windows and Android.
Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be viewed as an evolution of the classic Visual Basic (VB), implemented on the .NET Framework. Microsoft currently supplies two main editions of IDEs for developing in Visual Basic: Microsoft Visual Studio 2012, which is commercial software and Visual Basic Express Edition 2012, which is free of charge. The command-line compiler, VBC.EXE, is installed as part of the freeware .NET Framework SDK. Mono also includes a command-line VB.NET compiler. The most recent version is VB 2013, released November 18, 2013.
ReplyDelete2002 (VB 7.0)
The first version, Visual Basic .NET, relies on .NET Framework 1.0. The most important feature is managed code, which contrasts with the classic Visual Basic.
2003 (VB 7.1)
Visual Basic .NET 2003 was released with .NET Framework 1.1. New features included support for the .NET Compact Framework and a better VB upgrade wizard. Improvements were also made to the performance and reliability of .NET IDE (particularly the background compiler) and runtime. In addition, Visual Basic .NET 2003 was available in the Visual Studio.NET Academic Edition, distributed to a certain number of scholars from each country without cost.
2005 (VB 8.0)
After Visual Basic .NET 2003, Microsoft dropped ".NET" from the name of the product, calling the next version Visual Basic 2005.
2008 (VB 9.0)
Visual Basic 9.0 was released along with .NET Framework 3.5 on 19 November
2007.
2010 (VB 10.0)
In April 2010, Microsoft released Visual Basic 2010. Microsoft had planned to use Dynamic Language Runtime (DLR) for that release but shifted to a co-evolution strategy between Visual Basic and sister language C# to bring both languages into closer parity with one another. Visual Basic's innate ability to interact dynamically with CLR and COM objects has been enhanced to work with dynamic languages built on the DLR such as IronPython and IronRuby. The Visual Basic compiler was improved to infer line continuation in a set of common contexts, in many cases removing the need for the "_" line continuation character. Also, existing support of inline Functions was complemented with support for inline Subs as well as multi-line versions of both Sub and Function lambdas.
2012 (VB 11.0)
Visual Basic .NET 2012 was released along .NET Framework 4.5.
2013 (VB 12.0)
Visual Basic 2013 was released .NET Framework 4.5.1 and Visual Studio 2013 but did not include new language features
NOER IZZA AFCARINA
ReplyDeleteXI RPL 2
How to Strengthen WIFI signal
Strong wifi signal will ensure optimal data transfer speed . While a weak wifi signal will make the process of data transfer will run slower than it should be .
1 . Check the router settings
Many routers support standard 2 wifi , 802.11b and 802.11g . Make sure you select the 802.11g because the technology is newer than that - b . If your router has the support of more recently as 802.11ac , please use it after confirming that a laptop , a smartphone and your computer supports .
2 . Move the Router
Next is to make sure that the device you have a router with minimal obstruction . Wall , electronic devices and room divider will weaken the wifi signal . To increase coverage, you should place the router in the middle of the room .
3 . Use omni antenna
Omni antenna to the router
Omni antenna beam works to increase wifi signal so as to reach a larger area even without repeaters . To replace the standard antenna of your router with this device .
4 . Use Repeater
As the name implies , Repeater will capture and amplify the signal so it can be spreading more widely . Put in place the repeater least get 1 bar signal . If you have more than one router , check whether the router has a function as a repeater .
NOER IZZA AFCARINA
ReplyDeleteXI RPL 2
How to Strengthen WIFI signal
Strong wifi signal will ensure optimal data transfer speed . While a weak wifi signal will make the process of data transfer will run slower than it should be .
1 . Check the router settings
Many routers support standard 2 wifi , 802.11b and 802.11g . Make sure you select the 802.11g because the technology is newer than that - b . If your router has the support of more recently as 802.11ac , please use it after confirming that a laptop , a smartphone and your computer supports .
2 . Move the Router
Next is to make sure that the device you have a router with minimal obstruction . Wall , electronic devices and room divider will weaken the wifi signal . To increase coverage, you should place the router in the middle of the room .
3 . Use omni antenna
Omni antenna to the router
Omni antenna beam works to increase wifi signal so as to reach a larger area even without repeaters . To replace the standard antenna of your router with this device .
4 . Use Repeater
As the name implies , Repeater will capture and amplify the signal so it can be spreading more widely . Put in place the repeater least get 1 bar signal . If you have more than one router , check whether the router has a function as a repeater .
JavaScript (JS) is a dynamic computer programming language. It is most commonly used as part of web browsers, whose implementations allow client-side scripts to interact with the user, control the browser, communicate asynchronously, and alter the document content that is displayed. It is also being used in server-side programming, game development and the creation of desktop and mobile applications.
ReplyDeleteJavaScript is a prototype-based scripting language with dynamic typing and has first-class functions. Its syntax was influenced by C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. The key design principles within JavaScript are taken from the Self and Scheme programming languages. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.
The application of JavaScript to use outside of web pages—for example, in PDF documents, site-specific browsers, and desktop widgets—is also significant. Newer and faster JavaScript VMs and platforms built upon them (notably Node.js) have also increased the popularity of JavaScript for server-side web applications. On the client side, JavaScript was traditionally implemented as an interpreted language but just-in-time compilation is now performed by recent (post-2012) browsers.
tugas minggu ke 2
muhammad safreza
11 rpl 2
(JavaScript)
JavaScript was formalized in the ECMAScript language standard and is primarily used as part of a web browser (client-side JavaScript). This enables programmatic access to computational objects within a host environment.
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu ke : 2
Debian is an operating system composed of free software mostly carrying the GNU General Public License. The operating system is developed by an internet collaboration of volunteers aligned with The Debian Project.
Debian systems can use either the Linux kernel (known as the Debian GNU/Linux distribution), the FreeBSD kernel (known as the Debian GNU/kFreeBSD distribution) or, more recently, the GNU Hurd kernel (more precisely, the GNU Mach microkernel and its servers; known as the Debian GNU/Hurd distribution).
Debian GNU/Linux is one of the most popular Linux distributions for personal and Internet server machines. Debian is seen as a solid Linux, and as a consequence has been used as a base for other Linux distributions; DistroWatch lists 144 active Debian derivatives. Debian has been forked many times but is not affiliated with its derivatives.
The vital role the Debian project plays in free software is demonstrated by its advancement of development and security patches relating to its strong participation in CVE compatibility efforts.
The Debian project released a new kernel as of Wheezy's release date: the Debian GNU/kFreeBSD kernel. Debian now supports two kernels, Linux and kFreeBSD, and offers other kernels as development works (GNU Hurd and NetBSD). This project's new kernel has recently come out of preview but still lacks the amount of software available as on Debian's Linux. The kernel is offered for Intel/AMD 32-bit and 64-bit architecture machines. Wheezy is officially supported on ten machine architectures and also brought support for two new architectures: s390x and armhf.
Debian is still primarily known as a Linux distribution with access to online repositories hosting over 37,500 software packages. Debian officially hosts free software on its repositories but also allows non-free software to be installed. Debian includes popular programs such as LibreOffice, Iceweasel (a rebranding of Firefox), Evolution mail, CD/DVD writing programs, music and video players, image viewers and editors, and PDF viewers. The cost of developing all the packages included in Debian 5.0 lenny (323 million lines of code) using the COCOMO model, has been estimated to be about US$ 8 billion. Ohloh estimates that the codebase (68 million lines of code) using the same model, would cost about US$ 1.2 billion to develop.
Nama: Anisatul Khoiroh
ReplyDeleteKelas: XI RPL 2
Water -powered portable gadget charger
Charger or battery charger gadgets eg : mobile phones , laptops , Ipad , digital cameras , tablets , etc. usually immediately wrote us to plug into a power source or outlet . But there ya clay technological innovation from a Swedish company that makes the charger with the power source is called PowerTrekk water weleh2 ...! . How could just use water can be electric ? what similar to hydroelectricity ? kekeke . The trick is to utilize processes and chemical reactions , namely Sodium Silicide substance combines with water to produce hydrogen , which is then be processed into electrical energy . With only 1 tablespoon of water , equipment charger to charge your mobile phone energy consumption for 10 hours loh .
Sodium Silicide itself is not a pure substance produced by nature , but is a new chemical developed by the company SiGNa Chemistry , a chemical company from New York , USA . PowerTrekk itself is the first commercial product that uses substances ini.Peralatan charger is capable of charging the battery almost all electronic gadgets devices using a USB connection . In addition , the Water Power Charger can be used on all types of water , be it fresh water , rain water , even salt water and sewage water puddles aka ... kekeke ..
This cool product recently showcased at CES ( Consumer Electronics Show ) 2012 in Las Vegas , with prices priced around € 199 ( or about $ 260 ) and the replacement of "fuel " Sodium Silasida for € 2/buah .
Excess Water Power Charger This is the tool is not affected by the power and radiance of the sun as well as Solar Charger . But even so , it looks like this tool will not sell well in Africa and the desert areas like in the countries of the Arabian Peninsula , as the availability of water is quite difficult in the area , but for coastal areas , this tool seems to be a good alternative for mobile phone charger portable .
In the process of charging or battery charging electronic gadgets with this tool is quite easy . Sodium Silicide stored at the bottom of a small container called PowerPukk , at the top of this powerpukk , pour water in as needed . after it locks the container , and let the chemistry between Sodium Silicide and water occurs and turns it into electricity . After that , power is applied to the USB port located on PowerTrackk body , which can be used mencharger HP or your gadgets with a USB connector equipment . Chemical process is safe and non-toxic to the environment , the only " dregs " that happens is water vapor .
Yuni Anggarawati (XI RPL 2)
ReplyDeletePowerful Ways to Fix Memory Card Error Can not Format or File Not Detected
Certainly not upset that my friend has a memory card , but in it there is a file that is exposed to the virus , so that the file is corrupt and his friend wants to format it , but not upset berhasil.Pasti not ? ?
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to .
Formatting Through PC ( Windows Explorer )
1 . Put the memory card into the card reader
2 . Plug it into a PC buddy
3 . Look for memory card drive , the example in the drive ( F , G , H , I)
4 . Then right click on the memory drive , then select " Format "
5 . After that will appear like this , replace with the FAT file system .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
6 . Berlah then check the option " Quick Format " .
7 . Click " START " , wait until the completion poses .
8 . Last eject memory , and input into the phone .
using Properties
1 . Put the memory card into the card reader
2 . Tancapkankan to PC buddy .
3 . Right click on the memory card drive and select " Properties " .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
4 . Then click Tools > click Check Now .
5 . Tick the option "Automatically check for system errors " and " Scan for and attempt recovery of bad sectors " .
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
6 . Then click start and wait until the process is complete .
7 . Then eject the memory card into the phone and input buddy .
Fixing the Command Prompt
When my friend see the message " Error " in 2 ways above then the PC can not reformat again my friend can try the following steps .
1 . Put the memory card into the card reader .
2 . Tancapkankan to PC buddy .
3 . Look for memory card driver .
4 . Then Click START > Run > and type CMD . Then the Command Prompt window will appear
5 . Then type ' FORMAT i :/ FS : FAT ' . ( i ) is a memory card drive will be in the format , if memory drive is on drive G then wrote G. ( FORMAT G :/ FS : FAT ) , etc.
Yuni anggarawati (XI RPL 2)
ReplyDeleteHow to Make a Bootable flash Through the Windows 8 100 % Work
How to Make a Bootable Through the Windows 8 stick - Hi my friend this time to share a little about the way we order the flash can be used as a CD installer to install the Windows OS , Linux etc. With using this flash would we gain several advantages and benefits, such as the installation process will be faster than mengguanakan OS install CD . Well just my friend who wanted to try to make a bootable Windows 7 , 8, etc. please read the following ways :
Easy Ways to Create Bootable Flashdisk Through
1 . Provide a minimum of 4 GB flash
2 . Please download the application Rufus or Click here
3 . Well after the application window opens , select Drive FD buddy on the other device and to leave them at the default
4.When Create a bootable disk , please click on the CD image ISO file search windows 8 pal
5 . Then click the start button and wait until the process is complete ( usually a very long process so wait aja sob over a cup of coffee !)
Well after all steps completed now my friend can use a flash my friend to install the OS Windows 8 from the flash .
yuni anggarawati (XI RPL 2)
ReplyDeletePowerful Ways Delete Shortcut Virus on flash
Powerful Ways Delete Shortcut Virus on flash - Hi friend all ? This time I will share information about the new How to Overcome Shortcut Virus on flash . These viruses often be found on the flash , usually after we transfer data from the cafe . Actually, this virus is not very dangerous . But if ignored will cause effects that can damage your computer system . This shortcut virus can reproduce itself like a virus in general . This virus can hide files on the flash and make a new shortcut icon that can harm your PC if clicked pal .
Well , now I will look at how to remove the shortcut virus from pendrive friend
Attach the flash buddy on your computer / laptop .
Then open a command prompt : Click Start > All Programs > Accessories > Command Prompt .
Command Prompt window opens .
Now in the command prompt window select driveflashdisk anda.misalnya name " F : " ( without the quotes ) and press Enter ( adjusted to the destination drive on your computer ) .
Next type the command " attrib - s - h * . * / S / d " ( without the quotes ) and press Enter
. Process will run approximately 1-2 minutes .
Once the notice is complete , now you see the flash and data
If you do not want complicated to remove shortcut virus , my friend can download anti- virus software that can protect your flash from harmful viruses .
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
How to Install and Configure DNS Server in Ubuntu Server 12:04
How to Install and Configure DNS Server in Ubuntu Server 12.04 ~ now we will discuss about how to install and configure a DNS server, install the TPI before this friend you should first install the Web server!
- how to install DNS
( sudo apt - get install bind9 )
- par with DNS
I use the IP address 192.168.1.2 with the domain name ubuntu.lan
$ Sudo su
# Cd / etc / bind /
# Nano named.conf.local
tamabahkan following script ;
zone " ubuntu.lan " { type master ;
file " / etc / bind / db.ubuntu " ; } ;
zone " 1.168.192.in - addr.arpa " { type master ; notify no ;
file " / etc/bind/db.1 " ; } ;
Writing on line IP zone " 1.168.192.in - addr.arpa " ( written upside down . )
Copy file db.local
# Cp db.local db.ubuntu
# Cp db.local db.1
Edit db.ubuntu , script ;
;
; BIND the data file for local loopback interface
;
$ TTL 604800
@ IN SOA ns.ubuntu.lan . root.ubuntu.lan . (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS ubuntu.lan .
@ IN A 192.168.1.1
ns IN A 192.168.1.1
www IN CNAME ubuntu.lan .
Edit db.1 , script ;
;
; BIND the data file for local loopback interface
;
$ TTL 604800
@ IN SOA ns.ubuntu.lan . root.ubuntu.lan . (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS ubuntu.lan .
1 IN PTR ubuntu.lan .
ns IN PTR 192.168.1.1
www IN PTR 192.168.1.1
Add DNS - nameserver configuration interface
# Nano / etc / network / interfaces
dns - nameservers 192.168.1.1
dns - search ubuntu.lan
Configuring the DNS - server Name
dns client - ipv4 settings
Penujian ;
$ Nslookup ubuntu.lan
nslookup ubuntu.lan
Server : 192.168.1.1
Address : 192.168.1.1 # 53
Name : ubuntu.lan
Address : 192.168.1.1
$ Dig ubuntu.lan
; << >> Dig 9.8.1 - P1 << >> ubuntu.lan
; ; Global options : + cmd
; ; Got answer :
; ; - >> HEADER << - opcode : QUERY , status : noerror , id : 58 799
; ; Flags : qr aa rd ra ; QUERY : 1 , ANSWER : 1 , AUTHORITY : 1 , ADDITIONAL : 0
; ; QUESTION SECTION :
; ubuntu.lan . IN A
; ; ANSWER SECTION :
ubuntu.lan . 604800 IN A 192.168.1.1
; ; AUTHORITY SECTION :
ubuntu.lan . 604800 IN NS ubuntu.lan .
; ; Query time : 6 msec
; ; SERVER : 192.168.1.1 # 53 ( 192.168.1.1 )
; ; WHEN : Sun Sep 9 08:00:55 2012
; ; MSG SIZE rcvd : 56
How to Install and Configure DNS Server in Ubuntu Server 12.04 ~ so that I can install and how to menegenai konfigursi hopefully bermamfaat DNS Server for my friends , there apabaila kekuranagan and similarities articles apologize because I am just an ordinary person who can not stand alone .
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
EXPLANATION GIMP
GIMP image processing tool is multi - platform . GIMP stands for GNU Image Manipulation Program . GIMP is suitable for a variety of image processing work , including photo repair , merging and image making . GIMP has a wide range of capabilities . This software can be used for a simple paint program , high -quality photo repair program , an online batch processing system , a mass production image rendering , image format converter , etc. .
GIMP is included in the category of open-source software or free software . GIMP does not require a license such as Adobe Photoshop , or Corel Photo-Paint . In addition this software is open-source software , this software also includes a multi - platform software or means can be operated in many OS (Operating System ) including Windows and Linux .
For those beginners who are interested in editing and image manipulation , this software will be very helpful , because you can learn the basic - basic image editing . You certainly do not need to worry because this software also supports many image formats , including JPG and PNG and many more other image formats .
The GNU Image Manipulation Program, or better known as GIMP is a graphics software for raster-based manipulation.
GIMP runs on the GNOME desktop, and released by the GNU General Public License GIMP was originally developed for the X11 desktop that runs on a Unix platform, however this time the GIMP has been ported to some other operating system platforms ie MS Windows and Mac OS.
The graph produced by the GIMP XCF format and stored can be exported into various image formats such as bmp, jpg, gif, pdf, png, svg, tiff, and many others.
A simple example using a photo editing application GIMP Image Editor:
Open Applications GIMP Image Editor
At the beginning of the application GIMP Image Editor will look like that Toolbox (left), the working window is empty (middle), and Layer, chanels (right).
Pictures That Will Open In-Edit
Select File> Open from working window is empty. Then select the image to be edited.
At the time of this simple example, we will try to change the display a little brightness, contrast, and sharpness of the image with merubahLevels, Brightness & Contrast, Curves and Colors menu in the facility.
Levels Changing Picture
To change the Levels image, do the following manner: select the Colors> Levels
Fox Input Levels and Output Levels according to our wishes, or to facilitate click Auto that automatically adjusts the picture Levelsyang accordance with our earlier edit.
Changing Brightness & Sharpness Picture
Go to Colors> Brightness-Contrast
Adjust the Brightness value (brightness) and Contrast (sharpness) as we want to edit our pictures.
Changing curves of Figure
Go to Colors> Curves
arrange the curve of the image by dragging the curve as shown above.
Saving edited photos that have been completed
after finished editing the image when you save it will ask a few questions like the screenshot below:
click Save
Edited Picture The End Result
Nama: Anisatul Khoiroh
ReplyDeleteKelas:XI RPL 2
Differences IDE hard drive type , Ata , Sata
Hard drive is one of the most important components in a computer , for that you should be familiar with the type of hard drive that matches the condition of your computer .
In Outline of HD can be classified into 3 Piece That IDE , ATA , and SATA , then what is the difference of the three types of HD Above ? ? ? The following I will explain one by one on the hard disk type
1 . IDE
IDE ( Integrated Drive Electronics ) is a standard interface between a computer motherboard data bus with disk storage . IDE interface created by the IBM PC Industry Standard Architecture ( ISA ) 16 - bit bus . IDE interface is an interface for storage devices that can teringrasi to disk or CD - ROM drive . Although IDE is a general technology , most people use the term to refer to the IDE ATA specification . While the AHCI ( Advanced Host Controller Interface ) is a hardware mechanism that allows software to communicate with such SATA host bus adapters are designed for hot - plugin and native command queuing ( NCQ ), which can increase the ability of computer / system / hard disk , especially in a multi- tasking environment by allowing the drive to run the read and write commands are sent at random with the aim to optimize head movement in the reading process . AHCI has been supported by various operating systems such as Windows Vista and Linux kernel 2.6.19 .
2 . ATA
Most types of drives used by computer users is the type of ATA ( known as IDE drives ) . Type ATA standard created by 1986 by using 16-bit parallel and continues to grow with the addition of transfer speed and the size of a disk . Final standard is ATA - 7 was first introduced in 2001 by the T13 committee ( the committee responsible for determining the standard ATA ) . Type ATA - 7 has a data transfer rate of 133 MB / sec . later during the year 2000 set a standard for parallel ATA which has a data rate of 133 MB / sec , but there are problems with parallel ATA singnal things thymine , EMI ( interference electromognetic ) and intergitas data. Then the industry in trying to resolve the problems caused by the parallel ATA and created a new standard called Serial ATA ( SATA )
ATA ( Advanced Technology Attachment ) using a 16-bit parallel computer used to control the equipment , and has been in use for 18 years as the standard . Differences SATA and ATA easiest data cable and power is different .
ATA standards , such as the 200GB Western Digital model , have a two -inch ribbon cable with 40 pin data connections and requires 5V to each pin of the 4 pin connection . While the 120 GB SATA such as Digital western half inch models have wide , 7 connector so that the data connection is thinner and easier to organize data kebel . SATA data cable has a maximum length of 1 meter ( 39.37 inches ) longer than the ATA is only 18 inches .
3 . SATA
With 15-pin SATA power cable with a 250 mV , seems to require a lot more power in comparison with the 4-pin ATA , but in fact the same . And most good SATA capability is perhaps reaching a maximum bandwidth of 150 MB / sec
Other advantage of SATA is SATA is made with hot-swap capability so that it can turn off and turn on without shut down the computer system .
While in the price , a little more expensive SATA drives compared ATA drives , SATA kesimpulanya have advantages over ATA connector, power , and most importantly performance. ATA standard has now started on the left and choose the manufacturer of the SATA standard .
Inspirated from Dukom
muhammad safreza
ReplyDeletetgas minngu 3
PHYTON (new programming language)
Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C. The language provides constructs intended to enable clear programs on both a small and large scale.
Python supports multiple programming paradigms, including object-oriented, imperative and functional programming or procedural styles. It features a dynamic type system and automatic memory management and has a large and comprehensive standard library.
Like other dynamic languages, Python is often used as a scripting language, but is also used in a wide range of non-scripting contexts. Using third-party tools, such as Py2exe, or Pyinstaller, Python code can be packaged into standalone executable programs. Python interpreters are available for many operating systems.
CPython, the reference implementation of Python, is free and open source software and has a community-based development model, as do nearly all of its alternative implementations. CPython is managed by the non-profit Python Software Foundation.
Methods
Methods on objects are functions attached to the object's class; the syntax instance.method(argument) is, for normal methods and functions, syntactic sugar for Class.method(instance, argument). Python methods have an explicit self parameter to access instance data, in contrast to the implicit self in some other object-oriented programming languages (for example, Java, C++ or Ruby).
NOER IZZA AFCARINA
ReplyDeleteXI RPL2
TUGA MINGGU KE-3
In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to .
Formatting Through PC ( Windows Explorer )
1 . Put the memory card into the card reader
2 . Plug it into a PC buddy
3 . Look for memory card drive , the example in the drive ( F , G , H , I)
4 . Then right click on the memory drive , then select " Format "
5 . After that will appear like this , replace with the FAT file system .
6 . Berlah then check the option " Quick Format " .
7 . Click " START " , wait until the completion poses .
8 . Last eject memory , and input into the phone .
using Properties
1 . Put the memory card into the card reader
2 . Tancapkankan to PC buddy .
3 . Right click on the memory card drive and select " Properties " .
4 . Then click Tools > click Check Now .
5 . Tick the option "Automatically check for system errors " and " Scan for and attempt recovery of bad sectors " .
6 . Then click start and wait until the process is complete .
7 . Then eject the memory card into the phone and input buddy .
Fixing the Command Prompt
When my friend see the message " Error " in 2 ways above then the PC can not reformat again my friend can try the following steps .
1 . Put the memory card into the card reader .
2 . Tancapkankan to PC buddy .
3 . Look for memory card driver .
4 . Then Click START > Run > and type CMD . Then the Command Prompt window will appear
5 . Then type ' FORMAT i :/ FS : FAT ' . ( i ) is a memory card drive will be in the format , if memory drive is on drive G then wrote G. ( FORMAT G :/ FS : FAT ) , etc.
A few buddies Some Powerful Ways to Overcome Memory Card Could Not Diformat.Silahkan tried Hopefully useful . ^ _ ^
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 3
Ajax. (also AJAX; /ˈeɪdʒæks/; an acronym for Asynchronous JavaScript and XML)[1] is a group of interrelated web development techniques used on the client-side to create asynchronous web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data can be retrieved using the XMLHttpRequest object. Despite the name, the use of XML is not required (JSON is often used instead. See AJAJ), and the requests do not need to be asynchronous.[2]
Ajax is not a single technology, but a group of technologies. HTML and CSS can be used in combination to mark up and style information. The DOM is accessed with JavaScript to dynamically display, and allow the user to interact with, the information presented. JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads.
The term Ajax has come to represent a broad group of web technologies that can be used to implement a web application that communicates with a server in the background, without interfering with the current state of the page. In the article that coined the term Ajax,[1] Jesse James Garrett explained that the following technologies are incorporated:
• HTML (or XHTML) and CSS for presentation
• The Document Object Model (DOM) for dynamic display of and interaction with data
• XML for the interchange of data, and XSLT for its manipulation
• The XMLHttpRequest object for asynchronous communication
• JavaScript to bring these technologies together
Since then however there have been a number of developments in the technologies used in an Ajax application, and the definition of the term Ajax. XML is not required for data interchange and therefore XSLT is not required for the manipulation of data. JavaScript Object Notation (JSON) is often used as an alternative format for data interchange,[7] although other formats such as preformatted HTML or plain text can also be used.[8]
Asynchronous HTML and HTTP (AHAH) involves using XMLHTTPRequest to retrieve (X)HTML fragments which are then inserted directly into the web page.
NAMA: IZAH AFKARINA
ReplyDeleteKELAS : XI RPL 2
MINGGU KE-2
Benefits of Microsoft Word
1 . Facilitate the Work Completed
The fact that MS Word help us finish all the work can not be denied anymore . Ms Word has hundreds of tools that help us . Start of fad writing , arithmetic tables , to make the images can be done in MS . Just a small example , in MS Word we can make a line with a wide range of choices with only 1 or 2 times of click a mouse . Imagine how hard if you have to use a ruler . Your work can be completed for a long time .
2 . saves Time
This benefit is a logical consequence of the benefits at number one . The more we eat the more easily complete the work much time can we save . Just imagine if you want to print the same invitation in large quantities by simply using a typewriter . Can be completed in days . Kalu with ms word we can use the copy and paste , or mail merge .
3 . saves Paper
Because microsoft can be edited if something goes wrong , it can greatly save paper consumption . Save paper means also saving paper pulp logging means also reduce deforestation and help prevent global warming . Hehehe up everywhere.
NAMA: IZAH AFKARINA
ReplyDeleteKELAS : XI RPL 2
MINGGU KE-3
4 Benefits SmadAV Newest
smadav now focus on 4 main benefits so that :
1 ) additional protection for your computer , 100 % compatible with the following antivirus !
most antivirus can not be installed simultaneously next antivirus , antivirus because it is designed for primary protection on your computer . different with smadav , smadav antivirus is a type of in - design so additional protection , up to 100 % compatible and can work well although there have been other antivirus in your computer , in this matter smadav plays a 2nd layer of defense . smadav has its own way (behavior , heuristic , and whitelisting ) in detecting and cleaning viruses will further add to the security of the computer . resource usage because very small smadav , smadav will not add to the weight of its use in the performance of your computer . so , with a mix of protection and on smadav antivirus has been installed on your computer will strengthen the defense of your computer from virus infection .
2 ) best usb antivirus ( total protection usb flash )
usb flash media is among the largest spread of the virus in Indonesia . smadav have special technology for total prevention of virus that spreads via a usb pendrive . smadav mission is no longer 100 % viral infection of the flash . smadav have enough signatures of viruses that infect the flash , and has a special power for detecting new viruses in flash though not in the database SmadAV . not just prevention , smadav also can clean the viruses that infect and restore virus hidden files in the USB flash
3 ) best for off line use ( no need to keep up to date )
smadav very well be used for computers that rarely or let alone not connected to the internet . smadav do not need anti-virus up to date as often as the next up date that generally do much less per week / day . smadav generally do up date only 1 month (monthly ) . smadav not rely heavily on signature / virus database , but rather relies on behavior detection techniques , heuristic , and whitelisting .
4 ) tools make cleaner and clean the virus
smadav also can clean the virus that has infected the computer and do the repair registry altered by the virus . The next antivirus does not usually do the cleaning up the computer registry has not been cleared to return to normal after the antivirus. many supporting tools are included in smadav so weapons do the cleaning for viruses . note : not all types of viruses can be cleaned smadav , smadav have still not been able to clean the virus type or types of rootkits penginfeksi program ( eg : virus Ramnit , Sality , Alman , virut , and others. ) because this type of virus has destroyed most large files your program . Our focus today is thoroughly cleaning for two types of viruses not only the types ( eg : wormshortcut virus , cervical , mso , eagle , etc.
nama:ario wibowo
ReplyDeletekelas:xi rpl 2
Way Menginstall Windows XP.
For you that not yet tau way menginstal windows xp or again nyari-nyari article way menginstall windows xp can read steps way menginstall windows xp under.
Perhaps to some people this thing is very easy but to all the laity user very difficult due to idiosyncratic factors menginstal the computer that less. This article Kamu Klik for for anyone who want learn way menginstal his own computer aright without afraid made a mistake because this tutorial Kamu Klik sertakan with pictures that are very easy understood.
Hardware specification minimum that needed:
* Pentium processor 1.5 Ghz / AMD that equivalent
* CDROM / DVDROM drive
* Window 128 MBS
Yuk disimak Langkah-langkah Cara Menginstall Windows XP under:
* -CD Windows XP input is first, then we CD input to CDROM / DVDROM. Then restart computer, then in booting moment we push Delete button in keybord so that we stepped into BIOS (Basic Input Output System) computer. In screen display usually occurred by writing 'Press DEL run Setup to' can we see in picture hereunder:
* Then we will enter in BIOS then choose Boot in menu and choose item Boot Device Priority like in picture under:
* After that Kita will do changes at 1st Boot Device position namely we substitute with CDROM. the way, click ENTER then choose CDROM. Then compress F10 to keep the configuration. choose YES, so will me Restart.
* After in appearance followings compress Enter to further in instal process.
* Further in Lisencing Agreement compress F8 to further.
* In picture, position partition not yet filled by windows system. Compress Enter to menginstal immediately without make partition.
* Or if make partition, Tekan C to make partition. Then input how large capacity partition that in inginkan. and compress Enter to make the partition like seen in picture.
* Then compress Enter to do instal process.
* And choose NTFS file system or FAT file system then compress Enter.
* If move installation process above already true so will appear like picture.
* After that you right up to screen followings click Next.
* Then fill with Nama and Kamu Organisation then compress Next.
* Here Kamu will loaded Produk Key or Serial Number from type windows Kamu compress Next again.
* Isikan name computer and password to access him then compress Next.
* Set Time Zone on course click Next.
* Typical settings: In option settingan network will made by default windows and Custom settings: For mensetting your network by manual last click Next.
* If you connected kejaringan local with domain choose option Yes, then content with DOMAIN name that equal DOMAIN your network and vice versa if not connected kejaringan or connected but without DOMAIN choose option No, again compress Next.
* Next you live click Ok, Next, Skip
nama:ario wibowo
ReplyDeletekelas:XI rpl 2
Way Overcome Laptop Die Contracted By Water
Sunday, March yang ke 2 2014. | Improve Laptop, Tips Computer
Way Overcome Laptop Terkena Air, Pernahkah you experience incident that unforeseen namely laptop contracted the good water coffee as well as tea. If thing happened you do not panic previously, there is some tips or steps all you have got to do if laptop contracted by water.
Do thing followings for preventing thing that is more fatal if laptop contracted by water, especially in part part which allowed water seep enter like the instance in part keyboards.
Overcome Laptop Contracted By Water Cannot Flame
1. Sesegera probably matikan your laptop in a way withdraw power PLN electricity and battery laptop revoked for preventing happened by him konsleting in series in laptop.
2. Dissociating all set that connected to laptop to for preventing happened by konslet so not spread to set others.
3. Immediate turnover laptop until water which might enter can decline and not spread to internal other part in laptop. However if already rash much water that go inside, like it or not you should dismantle part laptop, especially usahakan to can open keyboards because part surely is that likeliest become place seep him water. Besides by exposing part laptop will facilitate air inlet into until accelerate water drainage process.
way overcome laptop contracted by water
4. Wear cloth with absorption that high in part part that can reached and usahakan that parts can dry. If not reached utilized cotton buds meekly.
5. If your laptop occurred by sticker or aksesoris, immediate off sticker if indeed probably occurred by water over there and something moment can seep to laptop internal part.
6. If contracted by spill coffee or other liquid which left / rest residue, utilized cotton buds for cleaning nya.Karena residue could just held water to still are inside laptop internal part.
Read Also : Way Improve Laptop That Die Total
7. Still in laptop with frontality, angin-anginkan laptop so that faster process drainage and do not utilized hair dryer because set issue hot, until water can yawn and steam can spread quickly in interior laptop.
8. If you already confident dry so raft back component laptop and supposing to activate laptop whether can flame or not. And if laptop not flame immediately contact service center to your laptop and informasikan that your laptop have to water to facilitate technician in reform process. Need to be known that though laptop still in period guarantee but if happened by damage due to spill water so guarantee will not apply.
If only information on tersiram laptop prevention way water can be thing that useful.
nama:ario wibowo
ReplyDeletekelas:XI rpl 2
Instal XAMPP way in Windows
1. Download XAMPP xampp-win32-1.8.1-VC9-installer.exe application.
2. Duplex click file xampp that just You download, next will appear "installer language" window as below:
instal xampp, xampp localhost
3. Next choose language. Choose that England Bahasa. Click OK.
4. Sometimes in this process appear error message. If there is, neglect only and keep on with click OK and YES.
2-instal-xampp
3-instal-xamp
5. The following will appear window that the content ask You closes all applications that underway. If all applications been closed, so click Next button.
4-instal-xampp
6. Next You will be asked to choose application that want being installed. Ticks only all options and click Next button.
5-instal-xampp
7. Then You will be asked to determine file " file storage folders location and XAMPP folders. By default will be directed to c location:\xampp. However if You want to keep him in other folders can click browse and tentukan by manual folders who want used. If have finished, keep on and click Install button.
6-instal-xampp
8. Wait few minutes until intalasi process completes. If already appear window as below, click Finish button to complete him.
7-instal-xampp
9. The following, will appear window dialogue like picture hereunder that ask You whether want immediately run XAMPP application or not. If yes, so click YES.
8-instal-xampp
Way Run XAMPP Application
1. Open XAMPP application, can through Start Menu or Desktop, and click icon XAMPP. Or, if You open him that process installation complete so click Yes such as those which seen in picture on.
2. After being opened, go ahead click Start button in Action column until button turns into Stop. By click button, it means that application undertaken. Usually if I use XAMPP , that I start only Apache application and MySQL, because I did not need application like Filezilla, and others.
9-instal-xampp
10-instal-xampp
3. Now open browser You delight, and supposing ketikkan http://localhost / xampp in address bar. If appear appearance like picture hereunder, installation has succeeded.
11-instal-xampp
Safe, finally You succeed menginstal XAMPP application. You now computer already function like server and can run applications based web.
Nama: Moch Nur Rohman
ReplyDeleteKelas:XI RPL 2
tugas mingguan 1
understanding of disk space
Hard disk is an important component in a computer , because the operating system and all programs stored in the hard drive and its data contributing .
Hard disks are perishable goods . To perform maintenance done in terms of hardware and software .
For treatment of hard disk hardware side , should be added a fan to reduce the heat on the hard disk .
Fan is highly recommended for the hard disk with a speed of 7200 rpm upwards .
In addition it should be noted the data cable settings for air circulation can run smoothly .
For care of the software side , enough with the tools you have available when installing the operating system .
The tool includes scandisk , and disk defragmenter .
In addition to these tools there are also tools used to perform low - level formatting .
Low level format is used to reconfigure the settings on the hard disk head covering , cylender , and sectors .
Low level format is the format of the physical aspect .
For each brand hard disk has a separate program for low -level format .
To use traditional Seagete SGATFMT4 brands , use the Quantum zerrofill or zdisk , MAXTOR with mud and for western digital with wd_diag .
Scandisk is a tool that is used to examine the structure of the file system , the file location table ( file allocation table ) , and be able to determine whether there is a bad sector .
Scandisk will run automatically every start if the computer is not shut down properly or
power failure occurs .
Disk Defragmenter is a tool that is used to regulate the structure or layout of the file so that it will reduce the fragmentation of a hard disk space .
Disk defragmenter needs to be done regularly it will improve system performance and hard disk space .
How to display the Disk Defragmenter is as follows :
1 . Right click on the Start - select Explorer
2 . Klick a Hard Disk Partition - Right Klick - Properties
3 . After that the menu select Tools - Defragment Now
4 . Analyze Klick first so before we can know how to Defragment Your Hard Disk Condition
5 . If already completed Klick Defragment
Keep in mind the greater Hard Disk and The More data will then process the longer we wait any longer than my previous experience Hard Disk Defragment I have never been totally takes 1 hour with a capacity of 160 Gb .
Nama:Moch Nur Rohman
ReplyDeleteKelas:XI RPL 2
tugas mingguan 2
divide the disk partition
For most computer users ( PC ) sometimes less or little attention to the problem setting / Hard disk usage . Usually given to another person , from purchasing to installation of other programs , and then stay put , never noticed a problem Hard disk .
Here are tips xtypo_info } { set hard disk so that the division could be better and easier . { / xtypo_info }
With the cheapening of this one device and increasing capacity , then its use must also be considered . Although we could have split the 500 GB HDD Being 1 or 2 partitions ( drive C : and drive D :) , but it is a poor way . Here are our tips are partly the result of personal experience .
The division of hard drive there is no specific standard , usually based on the experiences or needs . The best way is to first determine which category will be used . For example Operating System , Data , Master Program , Audio / Video and more .
Keep in mind that the HDD 80 GB ( gigabytes ) of data are not fully able to store 80 GB , as well as read on the computer . For 80 GB HDD , usually only able to store data or to read a maximum of 74 GB . For 40 GB to 37 GB , 160 GB = 149 GB , 250 GB = 232 , 320 = 298 GB , 500 GB = 465 GB , 640 = 596 GB , 1 TB ( terabyte ) = 931 GB and so on . So we can not split the HDD 80 GB drive with 4 each the same size and read all 20 GB .
Here's an example of the division of 160 GB HDD ( read about 149 GB ) , with the Windows XP operating system
Drive C : 20 GB ( Label " WinXP " , to install the Windows XP operating system and other programs )
Drive D : 40 GB ( label " Master " , to store various master programs before the install )
Drive E : 40 GB ( The label " Data " , to store data or documents )
Drive F : 49 GB or rest ( label " Media " , for storing a variety of audio and video files )
Why drive C only 20 Gb ? For most people , the C drive as the installation location of the operating system does not require a lot of places . For Windows XP most only 2 GB , Office of 1 GB and the rest of other programs and usually is sufficient . So with a small size would be easier to take care of , such as virus scan , spyware , defragment the hard drive faster and more
In format the HDD , the size usually included in MB ( Mega Bytes ) . In order then read for 20 GB HDD , then we enter the size in MB should be greater than 20,000 . Suppose we specify size 21.500 MB , then this measure will be read around 20 GB . Or it could be added a little like 22,000 MB ( read 20.5 GB ) . Similarly, when determining the size of 40 GB ( filled about 43,000 MB ) . To more easily able to see GigaByte Conversion
{ xtypo_sticky Moving My Documents Location } { / xtypo_sticky }
When we open Windows Explorer then there will be a My Documents directory and the initial location of My Documents is on drive C ; , complete generally in the folder C : \ Documents and Settings . Storing documents on the C drive by us less safe , and should be moved to a drive other than C. For example, from the example above is drive E :
To change the order of My Documents to open drive / other folder , how to right-click My Documents and select Properties and then click the Move button and select a new location where to store the documents , such as drive E : .
{ xtypo_sticky } This only changes the location of My Documents to the new location , so that if there is data in My Documents , it must be moved manually to the new location . Old data is still there and not deleted . { / Xtypo_sticky }
After moving locations / changed , then when we save in My documents , the data will be stored on the drive / folder proficiency level ( example above drive E :) , not stored on drive C :
Nama:Moch Nur Rohman
ReplyDeleteKelas:XI RPL 2
tugas mingguan 3
how to create a bootable os windows 7 using pendrive
1 ) Download the application EasyBCD > EasyBCD is a program that supports windows system 32bit and 64bit .
2 ) run the EasyBCD application , click the Add New Entry button on the left , under Portable / External Media Extender BIOS switch to the tab . BIOS Extender can be used to boot from the network , although the CD or USB computer / laptop does not support it .
3 ) is still below the BIOS Extender tab , click the Install button to add an entry plop plop into the boot menu .
4 ) We have made the computer bootable from flash
5 ) Now we install plop and EasyBCD BIOS Extender ,
6 ) time to test your usb flash in order to install windows 7
7 ) input usb stick into the USB port , and then restart the computer .
8 ) We will find a new entry in the boot menu called EasyBCD BIOS extender . EasyBCD BIOS extender select , then press the enter key to enter the next option screen , here we will see a list of options .
9 ) Select the option to boot from USB to USB flash , from here then follow the steps to install windows 7
10 ) success we sing ! .
Yuni anggarawati (XI RPL 2)
ReplyDeleteTugas mingguan ke 5
Easy Way Data Sharing Files Through WiFi in Windows 7/8
How Easy File Sharing Data Through Wifi - hi mate this time I will share knowledge on how easy that we can share game data files etc via wifi access . because of the nature of the wifi in general can be used to access the Internet , this tool also can be used to share the data , thus slightly reducing the habit of using the flash , which certainly less efficient . Rata2 achieve data transfer speeds of 2-3 MB / s . To measure the speed of data transfer is sufficient if it is to share files . Immediately following an easy and fast way of data sharing via Wi - Fi :
1 . Provide a folder that will be shared / distributed , then right click - > select properties
2 . Once the Properties window appears select the Sharing tab , in the Sharing tab select Advanced Sharing
3 . Then give centan on Share this folder
4 . After that is done in order to share quickly and easily we turn off the firewall , because it would be difficult to access the files be shared if the firewall is enabled . Login to the Control Panel , and then disable the firewall
5 . Then we go on CMD ( Command Prompt ) , press the Windows key + R , then type cmd in the dialog box are available
6 . After typing the command ipconfig / all , and then look at the IPv4 adddress , it is our IP address
7 . If the other computer ( should be 1 network ) who want to take the file sharing that we had had to enter the ip address on the menu RUN
Well after entering the folder dishairng earlier , my friend can directly copy it to a computer buddy .
A few tips this time the Easy Way Data Sharing Files Through WiFi , hopefully useful ! !
YUNI ANGGARAWATI (XI RPL 2)
ReplyDeleteOptimizing Memory Use Oracle Database
Oracle DBMS arguably quite voracious in memory consuming , at least it is there my mind when I heard Oracle in college . Actual memory usage by Oracle can be set .
The structure of the memory usage on the Oracle divided by 2 kinds , PGA ( Program Global Area ) and SGA ( System Global Area ) . PGA memory allocated is there any Oracle client access . SGA is the Oracle memory allocated for the needs of the system , ie to Shared Pool , Buffer Cache , and Redolog Buffer .
For the purposes of exploration , learning , or development , it seems to shrink the memory in use Oracle ( SGA ) is not a problem , so that our computer RAM consumption mediocre to be optimal . Here are the steps :
1 . Login using SQL Plus as sysdba SYS user .
Login SQL Plus
2 . Type the password of the SYS user .
3 . Check first how SGA allocated default Oracle
SHOW PARAMETERS SGA_MAX_SIZE ;
If thats enough , then no need to proceed to the next step .
4 . Set SGA Max Size , for example be 100M
ALTER SYSTEM set SGA_MAX_SIZE = 100M SCOPE = SPFILE ;
5 . Set SGA Target , for example, be 90M . SGA_TARGET value can not exceed SGA_MAX_SIZE .
ALTER SYSTEM set SGA_TARGET = 90M SCOPE = BOTH ;
6 . Restart the Oracle service that SGA updated .
STARTUP FORCE ;
7 . To make sure , check the return value SGA_MAX_SIZE and SGA_TARGET
SHOW PARAMETERS SGA_MAX_SIZE ;
SHOW PARAMETER SGA_TARGET ;
Oracle we 've been saving memory .
Info system used
Oracle version : Oracle 10g Enterprise
OS : Windows 7 x64
Yuni anggarwati (XI RPL 2)
ReplyDeleteHow to Install Drivers Through the Device Manager
Indeed, how to install these files is sometimes done typing drivers that we have not in fact form the setup file which means double-clicking the installation was staying alone at last filennya in the next -next live alone , but when getting a driver file that is not in the form of setup files forced to do the manual way through the Device Manager .
For how to install the hardware drivers through the device manager simply by way of :
Click Start on the Windows taskbar ,
Right-click My Computer , and select Properties , and the System Properties window will appear ,
In the System Properties window , select the Hardware tab , then select another button labeled Device Manager , and will appear again the Device Manager window
system properties
In the Device Manager window , look for hardware that will install the drivers , the drivers are usually not detected by the Windows operating system will be a question mark ( ? ) Are colored yellow ,
device manager
Well when my friend got it, just stay in the right-click tuh drivers have not detected that marked the question ( ? ) Are colored yellow , and then click Update Driver on the menu that pops up from the right-click a buddy and will do the Hardware Update Wizard window appears ,
In the Hardware Update Wizard window , select the option Install from a list or specific location ( Advanced ) and click Next , and select another option in the Include this search locations . Do not forget the Browse button , first determine the location of a file folder that the drivers will be installed .
update wizard
location update wizard
After determining the location of the folder that the driver had a buddy , continue by clicking Next and wait until the process is complete . If this process goes smoothly , it will automatically be in the driver installation is done .
Up here I feel I have enough explanation ya , well sorry if the explanation is rather confused muter - muter soanya jelasin model would also like how , if there are comrades who still do not understand please ask , ok !
VIVI FONI D.N
ReplyDeleteunderstanding Router
A router is a network device that is used to divide the protocol to the other members of the network , with the router then a protocol can be shared to other network devices . An example application is that if we want to split the IP Address to the members of the network , we can use this router , the router features of the facility is a DHCP ( Dynamic Host Configuration Procotol ) , with DHCP setting , then we can divide the IP Address , the other facilities of the Router is the existence of NAT ( Network Address Translator ) that can allow an IP address or internet connection to be shared another IP address .
for example, if on a network device ( computer ) has the IP Address 192.168.0.1 , the other computers can communicate , must be given the IP address of the Network Identification 192.168.0 and the Host Identification 2-254 , example 192.168.0.10 , 192.168.0.11 and so on .
Problems will arise when the networks connected very much ( usually above 20 device ) , an administrator will be forced to get around to setting up the IP address of each host , therefore we can use the Router .
Types of Routers
1 . router Application
2 . router Hardware
3 . router PC
Router application is an application that can be installed pad operating system , so the operating system will have capabilities such as a router , an example of this application is WinRoute , WinGate , SpyGate , WinProxy and others.
Hardware is a hardware router that has the ability sepertiu router , so that the hardware can emit or divide the IP Address and IP Address to sharing , in practice, a hardware router is used to share Internet connection on a space or area , this is an example of an access router point , the area to get Ip address and an internet connection called Hot Spot Area .
Router is a PC Operating System has the facility to divide and mensharing IP address , so if a network device ( pc ) connected to a computer will be able to enjoy the IP Address or Internet connection is propagated by the operating system , the operating system instance that can be used is all client server -based operating systems , such as Windows NT , Windows NT 4.0 , Windows 2000 server , Windows 2003 server , MikroTik ( Linux-based ) , and others .
VIVI F.D.N
ReplyDeleteWi-Fi stands for Wireless Fidelity . Wi-Fi is a wireless networking technology that uses high frequency . Frequency used by WiFi technology is at 2.4 Ghz spectrum . We can connect to the internet with Wi-Fi using a notebook and a PDA equipped with a WiFi card ( WiFi card) . If we use the notebook processor equipped with Centrino Mobile technology , the WiFi card is not needed .
By using WiFi , you can access the Internet quickly . WiFi has the ability to access the internet at speeds up to 11 Mbps . We do not need a cable to connect kejaringan WiFi . However , we should be in areas that have a WiFi signal . Areas that have a WiFi signal is a region located at a radius of 100 meters from the access point that is often called a hotspot .
There are three kompunen contained in a hotspot location , among others, as follows :
1 . Access pint ( access point ) is a device that connects to the Ethernet LAN Wireless technologies contained in the computer . The access point has the ability to serve as many as 128 users . The area can be reached by an access point reaches 25-1000 meters .
2 . Access controller ( access control ) is a device that serves as an authentication tool to check whether a user is a person who has the right or permission to access .
3 . Internet link is a device that connects to the internet hotspot locations . Internet links kemamuan have an internet connection to speed 512 kbps . The connection capability is used to serve all the users in one location . The downside of internet access with WiFi access can only be done in areas as far as 100 m from the access point , and to date , only certain places that have been fitted with the access point . Certain places that usually are college campuses , hotels , cafes , airports and other public places .
Share on Facebook Share on Twitter
VIVI F.D.N
ReplyDeleteDeep Freeze
Deep Freeze is a program made in a software development company named Faronics . Selling price is $ 45 with a program capacity of up to 4 MB . Deep Freeze works to restore the computer to the default settings in a way to freeze all files are installed on the computer . With its unique functions , the software is very powerful ward off virus attacks and user -friendly ignorant especially on computers that use a lot of people . If using anti- virus , we need a lot of time to always upadenya . In fact , with the Deep Freeze , simply install it. Before installing Deep Freeze should be used to clean your computer of viruses in the virus would not be conserved in the computer . Suggested to format the hard drive clean of viruses and other destructive programs . In addition, should the hard drive is divided into two partitions with the C partition as the system partition .
Installing Deep Freeze
If using the trial version , the following steps mengcracknya :
a) Show Deep Freez by pressing ( Ctrl + Alt + Shift + F6 ) or ( hold down Shift and click 2 times on the Deep Freeze icon ) . Put the Deep Freeze password the first time we install . If the status is still in the Boot " Boot Frozen " move to " Boot Thawed " and press OK and Restart Computer .
b ) Run the installer the deep freeze . Select Uninstall . Note , the installer must use versi2 used . Run the installer the deep freeze . select Uninstall . Note , the installer that is in use must use the newer version , or at least equal . If not , the second step can not be executed .
c ) Then enter Regedit via Start menu > Run > Regedit and go to HKEY Local Machine - Software - Microsoft - Windows NT - Current Version .
d ) Select the item ' AncillaryDev ' in the right column . Delete the contents of the item.
e ) Then install Deep Freeze again . The next Deep Freeze can be used all time .
Actually , Windows also has software that has a function similar to Deep Freeze named Steady Safe and can be downloaded from the Microsoft site . However , the windows are in use should be original, not pirated windows .
2 . Weakness Deep Freeze
Unable to save files permanently , install programs , delete files , rename files , move files , uninstall programs that have been enabled on the directory Deep Freeze .
If there is a virus or malware after Deep Freeze is activated , then the threat will still exist after the restart , Deep Freeze except in first disable ( thawed ) after it was cleaned .
If the computer is installed Antivirus , Antivirus updates that require the disabling Deep Freeze , after the update process is complete , the Deep Freeze must be activated again and the need to restart the computer 2 times .
One advantage of wearing deepfreeze is to maintain a computer from attacks virus.karena deepfreeze will instantly freeze / delete the files installed when the computer is in shoutdown .
muhammad safreza
ReplyDelete11 rpl 2 tugas minggu 4
Introduction (C# programming language)
C# is a modern and innovative programming language that carefully incorporates features found in the most common industry and research languages. In keeping with the design philosophy of C#, Microsoft has introduced several potential new features to the C# language that increase developer productivity with language constructs.
Microsoft C#
Since its introduction in February 2001, a number of developers have begun building software using the C# programming language. Even within Microsoft, C# has been used to build several shipping applications, including the .NET Framework, MSN Web properties, and the Tablet PC SDK. As such, C# has proven itself as a language suitable for the construction of high-quality commercial software.
Many of the features in the C# language were created with four different design goals in mind:
1 A unified type system and simplifying the way that value and reference types are used by the language.
2 A component-based design established through features such as XML comments, attributes, properties, events and delegates.
3 Practical developer headroom established through the unique capabilities of the C# language, including safe pointer manipulation, overflow checking, and more.
4 Pragmatic language constructs, such as the foreach and using statements, which improve developer productivity.
In the "Visual Studio for Yukon" version of the C# language, Microsoft plans to build on an already elegant and expressive syntax by incorporating a variety of features across a broad spectrum of research and industry languages. Included among these language features are generics, iterators, anonymous methods and partial types.
Potential Future Features
Indeed, it is on the pillars of a unified type system, component-based development, developer headroom, and pragmatic language constructs that future innovation in C# is based. The following summarizes four key new features that Microsoft is planning on delivering in the next major version of the C# language. The design of these features has not yet been finalized and the Microsoft Corporation invites comment on them from the developer community.
Generics
As their projects get more sophisticated, programmers increasingly need a means to better reuse and customize their existing component-based software. To achieve such a high level of code reuse in other languages, programmers typically employ a feature called generics. C# will include a type-safe, high-performance version of generics which differs slightly in syntax and greatly in implementation from templates as found in C++ and generics as proposed for the Java language.
Nama :Moch Nur Rohman
ReplyDeleteKelas:XI RPL 2
tugas mingguan 4
How to Create Reports in Microsoft Visual Basic 6.0 by Using Crystal Report
Crsytal Report is an application used to create reports from multiple data sources . Data source database meant to say , so with Crystal Report we can create a report that the data obtained from any database , such as SQLServer , MS . Access , MySQL , etc. . However on this occasion we will use the database in MS . Access. crystal report can also be accessed from several languages pembograman include Visual Basic , Visual C / C + + , Visual Interdev , and Borland Delphi and others.
For the initial stage , we first try to make a report of a single database only . If you do not have the Crystal Report 8.5 at champion please download Google alone : D . Here are things that need to be provided before making a report with Crystal Report :
Prepare the database by using the Mc . Access
After that , Open Software Crystal Reportnya : Select Using the Report Expert and click OK .
Then select the Standard section and click OKKemudian select Database and click Next
After that , select the database that you created earlier with 2x click on the Find Database File , then click AddSelanjutnya database search , select one of the existing tables in the database to be used as a report . then select Add , if it is done then just select Close.Kemudian enter fields that we will enter into a report , by clicking the Add ( for each one ) or Add All ( for all fields ) and then directly click Finish .
After you perform the steps above it will show you the results of a report that has been designed . ,
nama : titi nur jayanti
ReplyDeleteInstall WordPress on Localhost Using XAMPP
I will discuss how your way to install WordPress on localhost using XAMPP . Quite easily actually , but it does require a bit of precision and often trial and error . Try try and try teruuus ...
Installing WordPress in Localhost
Prepare the latest WordPress files . If you do not have to ngunduh first or direct download at WordPress.org .
Open the XAMPP folder on your computer . Then open the folder htdocs . Copy the WordPress files into this folder . More simply , open Windows Explorer , and then type in C : \ xampp \ htdocs folder on the address as shown in the figure below .
xampp folder in windows
* ) NB :
Htdocs folder is the folder used to store files that can be opened in a browser . If we put aside in this folder , then the browser will not be able to open it . Usually that is the default setting , the folder is on drive C. So make sure not one drop ya ..
If the file is still in the form of compressed, then extract it first. Default is usually extracted folder called ' wordpress ' . If desired , you can change the name later became the name of the folder that you like . Say the name of your website . Here I replace it with the name of ' my blog ' . If accessed , the result will look like the image below :
install wordpress on localhost , xampp htdocs folder , xampp
Now open your favorite browser . To open the wordpress site is offline , we will be able to access it with the address http://localhost/nama_folder . If yes open it wear mine http://localhost/blogku address . If yours still use the default folder , the address http://localhost/wordpress . Type in the address bar . Then click Create a Configuration File .
install wordpress on localhost
Click the Let's Go .
9 - wordpress -start
Fill in the database name , user name , and password that you created earlier . If not , you can read the tutorial how to create a database using XAMPP . In the Database Host fill with localhost only. Click Submit .
10 - stuffing - form - wordpress - database - is offline
Click Run the Install .
11 - run - wordpress - installation - offline
Fill in the data required for the admin and the name of the website . After that click install wordpress .
12 - stuffing - information - wordpress - install
Congratulations ! WordPress is offline you 've finished . Please login .
13 - install- wordpress - offline - success
Enter the username and password you created in step no.8 to login to the Dashboard . How else can just type the address in the browser http://localhost/nama_folder/wp-admin . If in the place I mean using http://localhost/blogku/wp-admin address .
14 - wordpress - login
Well , so the steps of how we install WordPress on localhost using XAMPP offline
nama : titi nur jayanti minggu ke-2
ReplyDeleteHow to Properly Install a VGA Driver
Malik Falasifa | Tips
Many users who experience a failure or an error when installing the vga driver . Whether it mapun nVidia driver vga ATI . This time we will menejlaskan VGA on how to install vga correctly . How? Let's look into the steps .
How To Install a VGA Driver
Prepare your vga driver . You can download vga driver according to the type of car you [ AMD | nVidia ]
How To Install a VGA Driver
How to Install ATI VGA Diver
How to Properly Install a VGA Driver
a. Run the installer .
b . click next
c . I suggest you choose Express to ease , and then click next .
d . Wait for it to finish , then Finish and restart .
How to Install Nvidia VGA Diver
How to Properly Install a VGA Driver
a. Run the installer .
b . At the License Agreement , select Agree .
c . Select Express and click next .
d . Tick the Always Trust then click install
How to Properly Install a VGA Driver
e . Finish then restart .
Nama :Anisatul Khoiroh
ReplyDeleteKelas :XI RPL 2
Minggu ke-4
Understanding Appserv
, appserv an application that serves to installl some programs, such as Apache , PHP , MySQL in 1 minute . Many people in this world have problem when Install Apache , PHP , MySQL because it took a long time to configure and can sometimes cause dizziness . Given the extremely spoiled Appserv once :)
Some features are Appserv
Apache
PHP
MySQL
phpMyAdmin
The purpose of the Application Appserv
The purpose of AppServ is Easing to install . You can create a web server , a database server in 1 minute AppServ some questions can be a real production web server or database server . The OS can use the Os windows or linux OS , but Windows OS is not good enough for a heavy load on your web or database server memory . We recommend you to use a Linux / Unix for servicing heavy workload . Because Linux / Unix has more speed and requires less memory and CPU usage . If you compare the attack when using Windows OS and Linux / Unix you can find the speed difference . eg Windows can serve 1000 users per second but Linux / Unix OS can handle more than 1000 users per second and eat less memory and cpu .
paint : Windows Os can also be use to this program , cuman if your server dabase weight , are suggested use the linux OS :)
NOER IZZA AFCARINA
ReplyDeleteXI RPL2
TUGAS MINGGU KE-4
Some Functions and How to Use gpedit.msc in Windows 7 - Gpedit.msc is a program which also includes a configuration where all of the settings contained in the operating system . Some functions of the program is as an alternative way , quickly and secretly to change the setting .
There are several options if my friend wants to open the program , including :
1 . Open the RUN ( Windows + R ) typing gpedit.msc
2 . Open the Command Prompt ( DOS ) and typing gpedit.msc
3 . Open drive C : \ Windows \ system32 \ gpedit.msc
4 . Right-click on the desktop or Windows Explorer, select New Shortcut , type gpedit.msc in the type column of the location of the item , click next to the type name fill the shortcut name , finish
All the settings list there are 3 options , namely :
• Enable ( Enable )
• Disable ( Disable )
• Not Configured ( Not Set )
Several of Use gpedit.msc :
How to Lock Desktop Background
User Configuration | > Administrative Templates | > Control Panel | > Personalize | > Prevent
Changing the Desktop Background
How To Lock Mouse Pointer
User Configuration | > Administrative Templates | > Control Panel | > Personalize | > Prevent
Changing the mouse pointer
How to Disable Access regedit ( registry editor )
Go to User Configuration | > Administrative Templates | > System | > Prevent access to registry editing tools
How to Hide / Hidden Drive ( like C , D , E )
Go to User Configuration | > Administrative Tools | > Windows Components | > Windows Explorer | > Hidden
These spesified Drive in My Computer
How to Disable Access to the drive ( such as C , D , E )
Go to User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer | > Prevent
Access to Drives from My Computer
How to disable Right Click Desktop Access
User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer | >
Remove Default Windows Explorer Context Menu
How to Disable My Computer -Manage Access
User Configuration | > Administrative Templates | > Windows Components | > Windows Explorer - >
Hides the Manage Item On The Windows Explorer Context Menu
How to Disable Task manager / Lock Computer / Change Password / Log Off :
User Configuration | > Administrative Templates | > System | > Ctrl + Alt + Del Option Then there will be 4 options :
Remove Task Manager
Remove Lock Computer
Remove Change Password
Remove Log Off
How to Disable Autoplay Feature
User Configuration | > Administrative Templates | > System | > Turn Of Autoplay | > Select Disk Drive
How to Clear Recent History or Document
User Configuration | > Disk Administrative Templates | > Start Menu and Taskbar | >
Clear History of Recently Documents on Exit
How to Remove LogOff from the Start Menu
User Configuration | > Administrative Templates | > Start Menu and Taskbar | > Remove Logoff on the Start menu
Maybe it's just enough that I can share about the function and use of Gpedit.msc in Windows 7 . Good luck and hopefully useful
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 4
Install Windows On Android
Smartphones today's increasingly sophisticated in terms of hardware even more powerful when compared with computer hardware specifications during the period 10-15 years ago that allows us to install the OS at a time 10-15 years ago such as Windows 95 for example. How? In maxiandroid this article, let us share together about how to run windows on android.
This article is the opposite of the articles that I have written in previous maxiandroid on "Run android on PC" which you can read here, but the article maxiandroid this time let's share "Install windows on android".
To run windows on android emulator requires, some of which are QEMU and Bochs. Like the emulator image that definitely need to run the application, as well as QEMU and Bochs that require image files as well.
Qemu vs Bochs
Qemu emulator is very fast, but it has a bug. SB16 emulation works, but no MIDI music. FPU emulation is incorrect / incomplete, so it may cause some programs not to run or not run perfectly. The network does not work. Keyboard / mouse emulation is still far from sempurna.Windows 9x would work in QEMU if you'll disable 32-bit disk driver in it. This is a bug in Android (pread / pwrite function does not work). Windows 9x will run at a very fast pace.
Bochs is emulatoru too slow to be used, but bochs very stable compared to use qemu.
How to install windows on android
In this article will discuss windows 95 on android, but could have windows 98 or xp, but remember not all readers maxiandroid using HH with a high spec so I decided to windows 95.
How to install Windows 95 on an android
1.Download file qemu95eng here.
2.Cari folder "SDL" then move to the root / sdcard. (The files contained in the folder. Should you install the apk)
3.install file "SDLapp.apk" inside the folder "SDL".
4.Choose and run "libSDL" have you installed earlier.
5.Tunggu while to boot Windows 95.
6.Windows 95 will run on your android.
NAMA:ARIO WIBOWO
ReplyDeleteKELAS:XI RPL 2
Download Visual Basic 6 Proffesional Full Version
1 . Extract VB 6.0 Proffesional full version then click setup.exe 2x See the picture below :
2 . Will look like Figure 2 below , choose Run Program
3 . After the Run Program No. 3 will appear . If you want to read the Readme , if not please click Next .
4 . After Next No Licence Agreement . Check the I Accept The Agreement used to it and then click Next to continue .
5 . Because the full version please see the CD Key , have downloaded all right? ? Find and click the file 2x CD_KEY.txt
6 . It has performed its CD Key ? ? Copy wrote it directly in the product column ID Number as No. 6 in the image below, and then Next again .
7 . After the next click will appear on the display as shown no 7 . Select Install Visual Basic 6.0 . because we're tujuanya install VB 6 .
8 . Figure 8 will appear . Next again .
9 . 9 When the image appears , Select run program again .
10 . Next will come the picture no 10 . Select Continue .
11 . Select OK
12 . OK Again
13 . After selecting OK in the figure 12 , VB 6 will pass copying an installation folder on drive C. Wait until the installation is complete .
14 . Select Ok
15 . Loading again , wait until the end .
16 . After that will appear Figure 16 and make sure it is correct Folder and Select the Typical yes .
17 . Select Yes .
18 . And now VB 6 will do the installation to complete all components .
19 . After installation is complete all the VB 6 will be asked to restart Windows . Choose Restart Windows . And remember Before Restart Ensure Document or all applications in order to secure the lid .
20 . Once the computer is back to life again as the image will appear 20 . Select Run Program .
21 . Up above everything is finished installasinya .
And now I 'll Love Tips For bro who use its Windows 7 that VB6 can walk normally and smoothly . Follow the procedures below . In his Icon VB6 program right click and Select propertise . See Figure 21 below .
22 . After that Select the Compatibility tab , then Check Run Program in Compatibiliti mode for , and select the Windows XP (Service page 3 ) . Then Tick also Disable Desktop Composision ( this is to make vb6 run to turn off the animation or theme that is not in need in windows 7 ) . And Mark is also an Administrator Run the program . Then press Ok .
23 . Finished Installing Visual Basic 6 Full Version and below the display on my computer .
That's all I can say on Tutorial Install Visual Basic 6.0 ( VB6 ) In computer and Tips For VB6 run smoothly and support with Windows 7 . Hopefully this simple tutorial for all of us . Happy coding , programmers Indonesian hopefully for the better .
Nama :Moch Nur Rohman
ReplyDeleteKelas:XI RPL 2
tugas mingguan 5
How to Speed up Internet Connection Wifi
How to Speed up Internet Connection Wifi - For tips this time the internet will rohman menshare how to speed up internet connection without software more precisely how to speed up wifi internet connection , sometimes when we 're browsing using wifi network connection often slow and not as expected due to the user access the wifi network is not only one person alone . Well, here is the trick How to Speed up Wi-Fi Internet connection , which may be useful to the reader .
How to Speed up Wi-Fi Internet Connection on Windows 7 :
1 ) You must are connected to a wifi signal .
2 ) Find the IP number that you use . I click the wifi icon
3 ) Right-click on the network you're using
4 ) Then click the status and select details
5 ) Next you find the phrase " IPv4 address
6 ) Once you know the IP using IP then memorize the
7 ) Then press Windows + R. then type CMD
8 ) Next type ping then typing the ip that you memorized earlier
For example :
" ping 10.10.10.456 - t " do not remember there was a sign " ( quotes)
9 . Finally, the CMD step No. 7 on the way do not leave it closed .
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
Tugas mingguan
minggu ke-1
10 Tips on Buying a New Laptop
Dear readers there are some simple tips for ya readers more willing to buy a laptop for school or college
Here are some tips:
1 . First , check the boxes ? good or not
2 . when the laptop is removed from the cardboard check the plastic cover above the keyboard keys and the plastic frame cover part of LCD screen . Is tacked neatly ?
3 . Check the bottom of the laptop .
4 . Check the manufacture date is printed on the bottom left of the carton .
5 . Check the serial number does not equal or cardboard with the body of the laptop .
6 . Checks whether the body of the laptop keyboard and looks clean from dust ? ( if dusty laptop means never opened before )
7 . Check at the time of the test dihidupin whether the windows OS is way ahead or prepared installation path when it means the laptop had been turned on and run windowsnya
8 . Check whether there is a death pixel screen visually ask replaced the wallpaper with white and black colors .
9 . Check and test the bluetooth and wifi connectivity features are good and stable running .
10 . After the connectivity path , then check out his internet serial number to the product website whether registered or not there warranty
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-2
10 tips on caring for laptops
1 . Do not carelessly download software " of the internet .
2 . Do not install the software " that if it is rarely used and useless .
3 . Do not put the laptop on the mattress when it is lit
The impact is quite large , based on the experience of my friend . After a few hours the laptop is put on the bed , the next morning adapter directly damaged .
4 . Keep your laptop
Keep your laptop there should be no dust at all , always wipe after every use with a clean white cloth that is free of dust .
5 . Avoid electromagnetic vibration .
Keep your laptop from electromagnetic devices such as megaphones , loudspeakers , machines , mobile phones , and other sources of vibration .
6 . Arrange them connected .
As much as possible the cables to the laptop it should be neatly trimmed .
7 . Take care of laptop batteries on a regular basis
Should when using the laptop for a long time , the battery is fully charged first with a record time of being charged is not played . Then if it is full then unplug chargerannya play a little longer until the rest of the battery . Keep air circulation as well , because this is very important if there is no air circulation smoothly , it can lead to over-heating .
8 . Do not put heavy objects on the laptop .
9 . Never try to move, move to a laptop while still alive .
It is no explanation , here's the story : Laptops are still alive or not in shutdown / sleep means the hard drive is also being driven to work so that if the hard drive can cause scraping the cylinder head , the result is fatal .
10 . If the laptop is in trouble , do not try to try to fix that yourself . Better left to the nearest handyman service .
Of the 10 tips above , there is the most critically important , namely :
Warranty card you do not lose it
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-3
10 things you need to know to buy a gaming laptop
1 . processor
Intel Core 2 Duo Processor is a standard gaming laptop . Looking for a processor with a larger cache as Intel Core 2 Duo Q9550 ( 2.83Ghz 6MB Cache ) or Intel Core 2 Extreme X9000 processor clocking at 2.8 GHz with 6MB cache . If you are able you can also get top notch Intel ® Core ™ 2 Quad processor Q9550 2.83GHz , 12MB Cache , 1333MHz . However , a simple 2.4 GHz Intel Core 2 Duo processor will be able to handle most of the game the next game .
2 . Video Card
The main hardware video controller for dynamic lighting , explosion , landscape and action sequences make the modern game so fun to play . Standard for desktop video card big enough to fit into a laptop , but with today's technological advances can make graphics cards for laptops even 512MB or 1GB video card compatible with a laptop .
Recently, we saw some laptop appears equipped with dual video cards . Nvidia SLI technology leverages the full power of two video cards at high time . Standard for gaming systems have been tried and tested as the Nvidia GeForce 8800M , 9800M or ATI Radeon HD 3870 .
3 . display
To meet the game play a bigger screen with a higher resolution . Currently 20 + inch screen sold but is recommended if you want good results you can select the screen which is more than 18 inches because that way you should not need to use the laptop screen . On the other hand , a less than 18 -inch screen is not going to give
4 . RAM
RAM is also required to load the game to execute the file . 4GB DDR2 RAM is a standard for gaming laptops . But for future game play , you will probably need a higher Ram again , and you need DDR3 RAM , because every year the game software that appears to require kuwalitas and RAM requirements are higher and the RAM access speed .
5 . hard Disk
Currently for the games require HDD capacity of 15GB disk space . If you will save a lot of movies , music and photos on your hard drive then you need more disk space . Standard upcoming gaming laptop need 500GB of storage space and you can also get a large TB drive according to your ability . Ensure that the hard drive rotation speed of 7200 rpm to ensure fast data transfer speeds .
6 . Sound Card Sound Card
Games of the past may not be much use or design a game with high audio quality is important but for gaming now high definition audio along with high- definition graphics are needed . So , if you do not get a dedicated sound card like those from Creative , you will lose the best sound quality . But the hardware is not too important . If you do not have a cost, integrated sound card will do it for you .
7 . keyboard
Every gamer knows about the importance of a keyboard for extreme gaming . Before buying a computer game you need to check whether the keyboard is comfortable to you . Check also whether the separate number pad for playing games bersama.Periksa use arrow keys position is in accordance with the style of your game .
8 . guarantee
You definitely got a 1 year manufacturer's warranty on every purchase but you can see some of the options extended warranty service from the manufacturer that can be called to the house for those gamers like you . Usually gamers gamers really busy playing all day and night . so that the gamers are too busy to go to the service repair their computers .
9 . accessories
Mouse is the most important as an accessory for gaming . If you want the best advice , do not use the mouse wireles . Because when you 're cool to play the game mouse wirelesnya battery runs out or weakened , then your game will be interrupted .
10 . WiFi
You can enjoy the entire game online wirelessly through your laptop . Each laptop is now equipped with WiFi . Verify wifinya fast enough to handle the needs of the game .
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-4
refresh function on the computer
Most computer users especially computer with Windows Operating System output ever or often even pressing the right click button and click Refresh on the desktop or use the shortcut key on the keyboard is the F5 function key , in order for the computer to work faster , so it is becoming a habit anywhere and on any computer will do the same
What worries of them , probably because they do not know the real reason why they push this button . Worse yet , those who have a strong reason why they push this button actually believe the myth about the function of the refresh button .
Please note different from the desktop refresh page refresh or reload the page in a browser . Sometimes because Internet traffic is congested , there is internet page could not be loaded completely . Refresh on the browser function is to reload the page failed to load previously . While , the refresh on the desktop have different functions with the refresh button contained in the browser . Most new computer user or a layman , like the author himself , at first believing that serves the refresh button to update or renew standby ( idle ) after a change of computer and delete the previous command of RAM , so the computers that we use will run more smoothly and faster . However , as mentioned previously , it is a mere myth .
The function keys are actually Refresh Refresh Desktop desktops actually used to update the display or reload the display on the desktop after a change . Refresh the desktop does not work to renew the conditions of RAM , and do not clean up your computer or your computer refreshing . Hence desktop refresh is also not contribute anything to the performance increase computer performance . To make it easier for you to understand explanation of the function of the desktop refresh button , then consider the following illustration .
Sometimes when you make changes to the shortcut on the desktop , these changes do not appear instantaneously . In this case , then you need to do a refresh on your desktop to display the changes that have been done on the desktop . For example , you have set up a shortcut on the desktop that his name in alphabetical order . When you add a new shortcut on the desktop , new shortcut will not be immediately sorted out in alphabetical order , but it will be at the very bottom of the list of shortcuts .
If you hit the refresh button the desktop , all shortcuts will be reset again and the new shortcut will occupy the position corresponding alphabet . It is a function of the actual desktop refresh button . In addition , the refresh also have the same function in Windows Explorer . So , if you have a habit of doing a refresh on your desktop many times without knowing the actual purpose and function of this button , then you should stop the habit. Because you are just wasting your time and attention to do the actual work in vain .
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-5
10 ways to make your laptop battery last long.
1 . Clean Laptop Regularly
Many laptop users are lazy to clean the laptop . This often makes the laptop ventilation holes clogged by dust etc. . Blockage of the ventilation holes makes laptops heat up quickly and force the fan ( fan ) to work harder . Of course this makes your laptop battery faster. To avoid this, make sure you are diligent about cleaning the laptop , especially in the area of the vent holes .
2 . Lower Screen Brightness
Lower Brightness
Laptop screen brightness takes quite a lot of battery power . Lowering the laptop screen brightness level although one or two could make your laptop battery last longer .
3 . Avoid Using CD / DVD
CD / DVD - ROM is very hungry for battery power . If it is not needed , you should not use the CD / DVD - ROM . Also make sure there is no CD / DVD that remains in the CD / DVD - ROM even if you do not use it .
4 . Use Sleep Mode
The process ignites laptop battery takes quite a lot of power . To outsmart , you can use the sleep mode when the laptop is shut off . When the laptop is in sleep mode , the laptop battery using a very low energy .
All files and programs that are open will be stored in temporary memory . When you turn it on again , and the program files will be immediately ready for use . In addition to saving time , sleep mode can also save battery usage . But remember , this trick is only effective if you plan to use the laptop some time after the laptop is turned off . If you want to turn off the laptop for a long time , use the shutdown menu as usual .
5 . Close Unnecessary Programs
Often we do not open a lot of programs that we use . In fact there may be also a variety of processes that we do not need running in the background . Shutting down the program and the process does not need to be able to help reduce the use of laptop battery significantly.
6 . Unplug the USB device
Make sure you unplug the USB device is not needed . For example, you copy files from flash or an external hard drive , unplug the device immediately after copying the files . Each USB devices require power and can make your laptop battery runs out quickly .
7 . Perform Power - Savings
Almost every operating system must be power- savings settings menu . Arrange each power - savings features are and adjust to your needs . For example, when the display will be dimmed or turned off , when the hard drive will be turned off , etc. . Setting appropriate to their needs can
make the laptop battery to be more durable and long lasting .
8 . Turn off Wireless Card
Wireless card is very draining power from the laptop battery , even when you are not connected to a Wi - Fi connection . If it is not currently required , make sure you turn off your laptop wireless card .
9 . defrag HDD
Fragmented files to make the hard drive work harder . Hard drive must find the fragmented files and put them together when accessed . As a result, the hard drive will require a larger battery power . To fix this , you can do a defrag the hard drive when the laptop you 're connected to the electrical power . Remember , do not do a defrag when the laptop is not connected to electricity . Defrag process requires a large enough power and could make the laptop battery power is exhausted in a short time .
10 . Clean the battery
Often dirty battery contacts for a variety of dust and dirt . This can reduce the effectiveness and efficiency of the battery . Clean the battery with a metal pole using a cotton swab moistened with alcohol .
So 10 Tips for Long-Lasting Laptop Batteries . Hopefully my tips useful and give your laptop battery last longer .
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-6
Here is how to cope with a slow computer :
1 . Check the program / application that takes quite a lot of memory . To be checked through the ' Task Manager ' .
Ctrl + Alt + Del - > Task Manager - > tab " Process "
Through task manager you will see applications that use memory . Please do you close / close / end process unneeded programs .
2 . Teralalu number of modules installed will make the computer becomes slow . Sometimes we often install a lot of modules to perform a task , especially a student , or anyone who would like trial and error . It makes the application so the application does not accumulate although often used . You can examine the module what is already installed on your computer by clicking the add / remove modules in the carry out row as well as un - install programs / apps that just became the accesories .
3 . For Windows 7 , if still slow you can do the following:
Control Panel - > Performance Information and Tools ( take advantage of the search feature ) - > Adjust Visual Effects .
On the tab " Visual Effects " , select " Adjust for best performance " . Alternatively, you can also uncheck the list located at the bottom . That is to eliminate unneeded visual display that memory consumption is reduced and the computer will be faster .
4 . Take advantage defragment feature .
This time trying to do " Disk Defragment " . In the search box in the start- type " Defragment " and press Enter .
After that defragment hard drive is .
5 . Delete the files that are not necessary located in prefect .
How: Open explorer - > C :/ / windows / prefetch - > delete all files in the prefetch folder .
6 . Use CCleaner . Please download CCleaner on the website .
That is the information that I can say about Easy Ways to Overcome Slow Computer hopefully can solve your problem .
Yuni anggarawati (XI RPL 2)
ReplyDeleteYellow exclamation Meaning In Network Icon
Warning system in the operating system Windows 7 make the most of its confusion . Yellow exclamation mark on the LAN connection icon in the lower right corner of the desktop screen a lot more meaning than with Windows XP , Windows XP yellow exclamation mark just tell that the IP conflict or limited connection to the computer is a DHCP client .
In Windows 7 there are some additional meaning when the warning signs appear . Here are a few things that should be known to be associated with a yellow exclamation mark that appears on the emblem of the LAN connection on the right corner of the computer desktop windows 7 or windows the same version and the version that is on it .
1 . internet connection
If there is no internet connection then a yellow exclamation mark will appear . Usually quite confusing , especially for users whose computers are connected to a LAN that is not connected to the internet .
Yellow exclamation point can be ignored during local or LAN connection no problem . This feature is only applicable for the generation Windows 7 and Windows versions on it .
2 . Unidentified Network
Yellow exclamation mark appears when there is no logical connection or data stream . Connection Limited is part of the Unidentified Network .
Although limited connection is nothing new in the warning system in windows , but on windows 7 , the situation is further confused by warning others particularly those associated with the Internet connection .
For computers using DHCP make sure your computer is getting the correct IP address .
Yuni anggarawati (XI RPL 2)
ReplyDeleteOn the Connection Types Smartphone and Tablet Devices
Network connection data on a smartphone or tablet devices are generally divided into two , namely through the wires and without wires .
Data connection using a USB cable normally or mini USB , drawbacks of this data connection on your smartphone is very limited on the connection between the smartphone and the tablet with your PC or laptop computer . Excess cable connection is a high speed data transfer and stable in addition to functioning as a battery charger .
Other cable connections are commonly encountered are using an HDMI cable connection , usually only on the tablet . Connections aims to connect the tablet to the TV so that an image that is visible on the tablet screen is also on the TV screen , the image displayed on the TV screen to adjust the size of the TV screen and the resolution of the displayed picture or video . Many benefits can be taken , for example, to watch HD quality movies with large screens we can do to connect the tablet to a TV with an HDMI cable , easier and not have to turn on a computer or a special player .
For a wireless network connection consists of several types , among others, the following :
1 . GSM network connection ; 2G , 2.5G , 3G , 3.5G and 4G
• Connection 2G and 2.5G ( GPRS and EDGE )
The second generation network connection is seldom used , usually used only as a backup if the primary network is disconnected or is not excluded by the 3G network . You can choose to continue to use this connection to connect to the internet through your subscription provider . Weakness is a 2G connection bandwidith small capacity ( although premium Internet subscription package ) , but the range or area of coverage is very broad .
• Connection via 3G and 3.5 G ( HSDPA , UMTS )
3G network connection is a network connection data that popular and most widely used , with a large bandwidth and subscription costs are getting cheaper then the 3G connection is the ultimate choice in connecting to the internet .
• 4G Connection
Konekesi 4G network is the latest technology of data connection . 4G connection has advantages in large bandwidth , but this time the area coverage is still limited and the cost is still quite expensive compared to the 3G network .
2 . Wireless connection or wifi
Wifi connection using radio frequency signals , the frequency used is 2.4GHz and 5GHz . Technically using a wifi connection has a very high speed but its range is very limited . With our wifi connection is not just connected to the internet but can also be connected to the local network privately with other types of gadgets and devices that have wifi connection , such as televisions ( TVs ) , printers , scanners , digital cameras , PCs , laptops and so on .
3 . bluetooth connection
Bluetooth connection of usage is limited because its range is limited , only about 3 meters . Nevertheless Bluetooth connection is reliable enough to be used to send or share files with sesame devices in close proximity , to connect to this device available Bluetooth connection , such as printers and so on .
Similarly, the types of connections that you can use on smartphones and tablets , make sure the other devices you want to connect with your gadgets , already available the same type of connection with one of the existing connection on your smartphone and tablet .
How to Extend Reach Wi - Fi Signals
ReplyDeleteLimited range constraints into consideration is the media liaison for not using a cordless or wireless computers on their network .
There are several solutions that can be used to overcome or widen the range of Wi-Fi signals , one of which is to add the wifi access point and router or wi - fi .
If you 've already bought 2 pieces wifi router then you do not have to regret it and sell it back , the wifi device can be used to extend the range of the wifi signal and also as a backup in case one is damaged .
If the wifi router in use is running normally , but it is less far -reaching and you want that certain areas are not able to receive the signal gets wi-fi signal then the other routers can be used to be added to the network with the aim of amplifying the signal .
Here are the steps that must be done .
1 . The initial step is often asked is what should be set in the first wifi router ?
Wi - Fi router is the first that has been going well , do not need to be left unharmed leave it alone . All you have to do is find out how the router 's IP address and how the IP address range ( DHCP IP ) is shared by the first router .
The aim is that the IP address later mounted on the second router does not clash with the existing IP address on the network .
2 . IP address on the second router be set with a static IP that is one segment with the DHCP IP address and make sure it is not the same as the IP address on the router first .
3 . Besides should not be the same as the IP address of the first router , the IP address of the second router is also not allowed in the list of DHCP IP range but should one segment to the first router ip address .
example :
- IP address of the router is 192.168.1.1 Subnet mask 255.255.255.0 1
- IP address of the DHCP Range : 192.168.1.10 s / d 192.168.1.100 Subnet 255.255.255.0
- IP address must be static with the second router with , it can be given the IP : 192.168.1.111 and so on with subnemask 255.255.255.0
An explanation of the Subnet
4 . On the second router , set or configuration settings for a wireless connection to the same wifi router at first . Enable security such as WEP and WPA
5 . Connect the first and second router using a straight cable .
6 . Put Wirelees router in the right position . Tips to determine position .
6 . Test the connection .
By making it function as an access point router and DHCP is not used , the practical features of the access point is used alone .
Likewise, if the signal is less strong there then you can add the third router or access point , must be arranged in advance as the instructions above to function .
Yuni anggarawati (XI RPL 2)
ReplyDeleteHow Much Power Wi-Fi Signal Reach 2.4 GHz and 5 GHz
One of the factors that determine the choice we are using wireless or wi - fi is a signal range of a wifi device to the wireless access point to the client . The signal range of a wireless client is determined by the main factors , namely the type of frequency used or the frequency of wi - fi how they operate . Based on international standards that are used wifi frequency is 2.4 GHz and 5 GHz , with a frequency standard , then we can determine where we need to consider how far jangkaun wifi access point router used later .
It used to be a wifi only device operates on only one type of frequency ATAPI currently a wifi access point router can operate using two different frequencies , 2.4 and 5 GHz by using a hardware only . Practical way to determine the frequency of how a wifi device operates by checking the IEEE standard is used by the device , check the specifications if using the standard IEEE 802.11b or g then the frequency used is 2.4GHz , if using the IEEE 802.11a standard uses frequency 5 GHz , if the stamp is the IEEE 802.11n standard frequency used is 2.4 GHz and 5GHz .
In practice , the range of a wifi signal is not only determined by the type of frekuesinya course there are several factors that determine quite like the power of the transmit antenna transmitter , the grasp of a receiver , a barrier material between the transmitter and receiver and interference factors .
In this post I will discuss how the initial considerations should we think about the decision to use the wifi frequencies and also how the data rate must be set so that the performance of the wifi network that we build can be run with maximum performance .
Here is the data the relationship between frequency , data rate and also a range of a wifi .
1 . IEEE 802.11b standard wifi is 2.4GHz frequency
Wifi with this standard has a data rate of 1Mbps to 11Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is 350ft or 105 meters . The maximum range can only be achieved at a data rate of 1Mbps . If maximizing the data rate of 11Mbps then its range is only about 50 meters .
2 . IEEE 802.11g is standard with 2.4GHz wifi
Wifi with this standard has a data rate of 6Mbps to 54Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is approximately 300ft or 90meter . The maximum range can only be achieved at a data rate of 6Mbps . If maximizing data rate of up to 54Mbps then its range is only about 30 meters . Distance of 30 meters away is enough for small -scale home or office with high data rate .
3 . IEEE 802.11a is a standard wifi with 5GHz frequency
Wifi with this standard has a data rate of 6 Mbps to 54Mbps . How much coverage of the signal ? Reach the maximum power that can be achieved by this type of signal from the wifi is approximately 60meter . The maximum range can only be achieved at a data rate of 6 Mbps . If maximizing data rate of up to 54Mbps then its range is only about 22 meters . Distance of 22 meters far enough to scale the home or small office .
Of this condition is seen that the lower the frequency , the more distant a range of signal even with the same data rate .
Before considering to increase your wifi signal beam then make sure first that you have to consider the use of a low frequency . The use of low frequency can be set by adjusting the channel of the wifi , usually the smaller the channel , the lower the frequency .
The drawback of this method is the low frequency is very susceptible to interference , to be sure there are no or few other frekuesi residing on the small channel before use .
Yuni anggarawati(XI RPL 2)
ReplyDeleteWay or deface Web -Based Hacking Joomla With Technique " Exploit MyTube "
This time I want mebagi hacking way that is easy to apply , but with little success . Actually there are a lot of ways in this joomla based web hacking . Moreover, from a list of existing dork . Okay , immediately wrote
Finding the Target and Exploit
Exploit is a code that specifically attack computer security . Exploit widely used for penentrasi whether legally or illegally to look for weaknesses ( vulnerability ) on the destination computer . It could also be said that attacks a vulnerability of software security (security vulnerability ) are specific but not always aims to launch an unwanted action . Many computer security researchers use the exploit to demonstrate that a system has a fragility .
The way is easy , go to google.com and paste inurl : " option = com_mytube " and press enter . Choose one of the websites that you want. Already ? Further to the next stage .
Suppose you have a web address is http://alamattarget.com/index.php?option=com_mytube&Itemid=12 get it , add
& view = videos & type = member & user_id = 62 + AND +1 = 2 + UNION + SELECT +
0,1,2,3,4,5,6,7,8,9,10,11 , concat % 280x3a , username , 0x3a , email ,
0x3a , activation % 29,13,14,15,16,17,18,19,20,21,22,23,24,25 + from +
jos_users + where + id = 62 -
after number 12 earlier, and then press enter .
If it is , it will look like the following
There, we can see the admin and the admin email . Okay , then open a new tab , go to http://alamattarget.com/index.php?option=com_user&view=reset is a common form to reset the password .
Then enter your email address which has been found earlier, and then click submit . After that , move to the start tab , click F5 to refresh the page , then writing ea044f8847 ... will change , inilh tokennya . Well , if you find the sign " $ " after the refresh , then this technique can not run and you have to find another target . If successful , then proceed to the next stage .
The next stage is entered into the login panel . After inserting the token before, then you will be prompted to enter a new password , that is where you enter the new password as you prefer . after all went well , then you have to do is go to this http://alamattarget.com/administrator a common betuk login panel of joomla .
After that , go to Extensions >> Template Manager >> Default Template Name >> Edit HTML . In the edit HTML , you can enter the code deface , then click save , and apply . Done .
nama : titi nur jayanti
ReplyDeleteAbout Macromedia Fireworks
Macromedia Fireworks
Fireworks is a graphics design application that is devoted to creating websites . In accordance with this definition , Fireworks preferred use for a website designer with a background in graphic design expertise , which involves the image , editing , such as Adobe Photoshop or Corel Draw .
The features available in Fireworks customized with a background image editing skills , among which are :
- Ability to edit various types of image in one application
- The ability to create animated effects on image
- Ability to edit images and web pages in one application
To produce a website that is professional and elegant , Fireworks should be combined in accordance with the allocation and use of the unique features of each application . There are various alternatives for generating a data card at the website include:
- Microsoft FrontPage
- Macromedia Dreamwaver
- Macromedia Fireworks
Minimum computer system for Macromedia Fireworks program .
Windows
- 800 MHz Intel Pentium III or better processor system
- Windows 2000 or higher
- Netscape Navigator or Internet Explorer 5.0 or higher
- 256 MB RAM or higher
- 150 MB hard drive or higher
- 1024 x 768 or higher
Macintosh
- 600 MHz Power PC G3 processor
- Mac OS X 10.3 or higher
- Netscape Navigator or Internet Explorer 5.0 or higher
- 256 MB RAM or higher
- 150 MB hard drive or higher
- 1024 x 768 or higher
nama: Muhammad Safreza
ReplyDeletekelas: 11 RPL 2
tugas: Mingguan 5
DATA VALIDATION DEFINITIONS AND CONCEPTS:
Data validation, as explained above, is making sure that all data (whether user input variables, read from file or read from a database) are valid for their intended data types and stay valid throughout the application that is driving this data. What this means is data validation, in order to be as successful as it can be, must be implemented at all parts that get the data, processes it and saves or prints the results. Let's take the time and list those parts here and explain why they should be considered.
* User Interactivity Screens And Forms:
Any part of an application that requires the user to enter the data (in a data entry screen for example) should most definitaly be considered as a prime candidate for data validation. Human error always end up as the prime suspect for invalid data no matter how well intended the users are. You'll find that statistically, a very big majority of the invalid data situations are usually caused by human error.
* File Manipulation Routines:
This entails all file related operations such reading from the file or writing to the file. Because usually, the data saved is the result of user supplied information, it is good practice to install a data validation procedure at this level. This includes database driven applications or even just a game screen for the settings to the game for example. when reading a file, double checking what you are reading is also good practice if not for anything else, to validate that the datafile is valid and not corrupted in any way.
* Import and Export Routines:
Indeed, when you plan to have your application able to save the same data in different file formats for different other applications, you need to make sure that the other applications will be able to open the file, as expected, without a problem. The reason I distinguish Import and Export from regular File Manipulation is because they are, in most cases independant of one another. These reasons as especially true when the import/export is to/from another database system. And let's face it, today, Import and Export are a very sought after feature.
These are the 3 major areas where you'd want to be sure that proper data validation is applied properly. This will only help with the rest of the application because you'll be able to cross out the data as being a cause for problem in possible errors that might slip into the application. That is, of course, once the data validation is debugged. But making sure that these are implemented in the development process rather than after the program is done will help minimize the burdon of integrating data validation in your application. Let's take a look and the types of validation that exist and are commonly used to give you an idea of where they can be used as well as how.
well ..take the validation in your program.
coz the validation make perfect your program..
Nama:Anisatul Khoiroh
ReplyDeleteKelas:XI RPL 2
minggu ke-5
DEFINITION PC PC Cloning Cloning ,
is a computer network concept that emphasizes the process of computing the server side and client side which performs a minimum. With PC Cloning , client side that has lower specs can run all the applications installed on the server without having to install the application in question on the client side .
This thesis discusses measures such as installation of PC Cloning software installation , configuration and application systems using third-party software that is Winconnect .
Clone duplication or cloning is a technique that has the same system as the original . Cloning or cloning techniques can also be applied in the computer system on the hard drive so the hard drive has a system similar to the original hard drive or master .
Kagiatan clone a hard drive can be applied to a computer lab with a number of computers that much . This will save time and effort because we just install a computer with an operating system and a complete program . Next we just clone the hard drive already installed to another hard drive , then the number of existing computers will have the same system as the master hard drive .
In a technique to clone a hard drive can use the media to the hard drive disk , CD to the hard drive and the hard drive to the Image . For hard disk cloning program can search the internet using google search engine with keywords in www.google.com or clone a hard drive cloning hard drive . For the record disk cloning activities , I never clone 18 pc by using pc hddclone and all turned out to have a system and a program similar to the original .
Benefits of PC Cloning save , because you only need one unit of high -speed computers to be used as Sender While the PC Client can use the old computer as a PC Pentium 486 or longer .
Efficiency , Installation all done on the server applications only . Client computers need only system with a hardware device with lower specs .
Even the client computer can work without a hard disk , floppy enough ( of course, with the modification process ) .
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE-5
How are you my friend on this day ? ? The following article discusses the performance Powerful Ways to Speed up Mozilla Firefox , which would certainly help my friend to solve lemot.Silahkan browsing listened .
Follow the following ways :
1 . Open the application Mozilla Firefox belong pal .
2 . Then type in the address bar = about: config , and then press ENTER
3 . Then the image will appear as the " I'll be careful , I promise " , click .
4 . Then my friend will be shown many options , point the mouse to scroll down and find my friend network.http.max-connections , double click it and then enter the number 64 , click OK
5 . Then find network.http.max-connections - per - server , double -click , enter the number 21
6 . Then find network.http.max -persistent -connections - per - server , double -click , enter the number 8 , click OK
7 . Search network.http.pipelining , and then double -click will turn out to be true
8 . Search network.http.pipelining.maxrequests , double -click and enter a value of 100
9 . Then find network.http.proxy.pipelining change to true , in a way to double clicks .
10 . Right-click anywhere and select New - > then type nglayout.initialpaint.delay integrar , click OK
11 . Enter the number 0 on the Enter integer value , click OK
12 . Last Close Mozilla Firefox buddy . Then go back and try the comparison . ^ _ ^
vvvvvvvvvvv
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 5
8 Software Restore Deleted Files
1 . PCInspector File Recovery
PCInspector File Recovery can recover data from FAT and NTFS boot sector even when the damage though . With this software , my friend also can save the file recovery outcomes such as photos , images , videos , songs , files on network drives .
2 . PCInspector Smart Recovery
This software is designed specifically for a memory card , is able to restore the data to the file type . Jpg | . Tif | . Amr | . Bmp | . Gif | Canon . Crw | RICOH . Raw | Fuji . Raf | Olympus . Orf ( E - XX ) | Olympus . orf ( C5050 ) | Nokia 3gp | Kodak . DCR | Minolta . MRW | Nikon . nef ( D1H/D1X ) | Nikon . nef ( D2H/D2X ) | Nikon . nef ( E5000/E5700 ) | Sigma - Foveon . x3f | mp4 | QuickTime mov ( Konica Minolta ) .
3 . Recuva
Recuva is a free Windows utility to restore files accidentally deleted from the computer either . This free software is very easy to use and user friendly . Recuva has many advanced features . Recuva can recover data from Hard Disk , External Drives ( USB Drives , flash , etc. ) . Even Recuva can restore the data from the iPod . Recuva works on Windows operating systems , 32 bit or 64 bit .
4 . The Pandora Recovery
Pandora Recovery can recover permanently deleted files from the Recycle Bin . This software has a powerful search option that also allows to display a preview of the image files and written. Pandora also has a Surface Scan Mode feature that can help recover data on damaged or formatted partitions .
5 . TOKIWA DataRecovery
File recovery software is a very simple, yet effective . With a size of only 420KB of this friend can restore deleted files from hard disks , memory cards , USB drives and other external media .
6 . Undelete Free
Is a program to restore other files simple . The large size is also very small instalannya file , just 1MB . Free Undelete supports NTFS 1.0 , NTFS 2.0, FAT12 , FAT16 and FAT32 . This software can work well on all versions of Windows such as Vista , XP , etc. .
7 . Glary Undelete
Glary Undelete is also very easy to use . Glary Undelete can recover files deleted from the Recycle Bin , DOS Windows , or from Windows Explorer . The program supports recovery of files to the hard drive , floppy and other external media .
8 . Restoration
Restoration is a free recovery software that is simple and easy to use . Even to use it , my friend does not need to install it . Restoration can restore deleted files from hard disks , memory cards , USB drives and other external storage media .
Nama : choirul anam
ReplyDeletekelas : 11Rpl 2
mingguan ke : 2
Powerful Ways to Fix Memory Card Error Can not Format or File Not Detected
In the following article I will discuss some Powerful Ways to Overcome Memory Card Could Not Formatted , Please be listened to .
Formatting Through PC ( Windows Explorer )
1 . Put the memory card into the card reader
2 . Plug it into a PC buddy
3 . Look for memory card drive , the example in the drive ( F , G , H , I)
4 . Then right click on the memory drive , then select " Format "
5 . After that will appear like this , replace with the FAT file system .
4 . RAM
RAM is also required to load the game to execute the file . 4GB DDR2 RAM is a standard for gaming laptops . But for future game play , you will probably need a higher Ram again , and you need DDR3 RAM , because every year the game software that appears to require kuwalitas and RAM requirements are higher and the RAM access speed .
5 . hard Disk
Currently for the games require HDD capacity of 15GB disk space . If you will save a lot of movies , music and photos on your hard drive then you need more disk space . Standard upcoming gaming laptop need 500GB of storage space and you can also get a large TB drive according to your ability . Ensure that the hard drive rotation speed of 7200 rpm to ensure fast data transfer speeds .
yuni anggarawati (XI RPL 2)
ReplyDeleteHow to Reset Printer Canon MP145 and MP160 the E27 Error
Error in Computer Printer Problems can not be avoided . Its a printer error is actually a lot of causes , one of them not because of the use of which may not be true that this kind of problem arises . nah specifically for colleagues who have the type of Canon printer MP 145 & 160 are problematic . Few tips to fix it in a way to reset the printer .
Before going into how to improve , you should first identify your buddy what the error code appears on the printer . for details, the following error codes which frequently appear on the printer Canon MP 145 & 160
E2 - 2 = No paper ( ASF )
E3 - 3 = Paper jam
E4 = no ink / cartridge
E5 - 5 = ink cartridges are not installed or installed incorrectly cartirdge ( not -compatible )
E8 = absorber full , or platen waste ink absorber full reset mita
E9 = connection to a digital camera / video camera does not support
E14 = Ink Cartridges Whose destination are wrong
E15 = Ink cartridge is not installed E16 - Ink remaining is unknown
E16 - E19 = problems on the scan head alignment sheet
E22 = Carriage error
E23 = Paper feed error
E24 = Purge unit error ( part dry pump head )
E25 = ASF ( cam ) sensor error
E26 = Internal temperature rise error
E27 = ink absorber full or platen waste ink absorber full > reset with such tools
E28 = Ink cartridge temperature rise error -
E29 = EEPROM error
E33 = Paper feed position error
E35 15 = USB Host VBUD overcurrent error - USB
E37 17 = Abnormal motor driver
E40 20 = Other hardware error
E42 22 = Scanner error
Especially for E27 Error message , how to fix that
1 . Turn off the printer ( make sure the power cord is still attached ) , press and hold the STOP / RESET and then press and hold the ON / OFF and release the STOP / RESET ,
then press the STOP / RESET 2x
2 . Release both buttons , the printer is now in a position SERVICE MODE ( on the printer's LCD show the number " 0 " )
3 . After the lights on / off green , please press the STOP / RESET accordance with the following instructions :
The press 1x = Orange flame lights > for Service pattern print
The press 2x = Green flame lights > for EEPROM print
The press 3x = Orange flame lights > for EEPROM reset
The press 4x = Light Green Flame > for Waste ink counter reset
4 . Turn off the printer and unplug the POWER .
5 . Relive your printer
NAMA : CHOIRUL ANAM
ReplyDeleteKELAS : 11 Rpl 2
MINGGUAN KE : 4
Windows
- 800 MHz Intel Pentium III or better processor system
- Windows 2000 or higher
- Netscape Navigator or Internet Explorer 5.0 or higher
- 256 MB RAM or higher
- 150 MB hard drive or higher
- 1024 x 768 or higher
Macintosh
600 MHz P-ower PC G3 processor
- Mac OS X 10.3 or higher
- Netscape Navigator or Internet Explorer 5.0 or higher
- 256 MB RAM or higher
- 150 MB hard drive or higher
2003 (VB 7.1)
Visual Basic .NET 2003 was released with .NET Framework 1.1. New features included support for the .NET Compact Framework and a better VB upgrade wizard. Improvements were also made to the performance and reliability of .NET IDE (particularly the background compiler) and runtime. In addition, Visual Basic .NET 2003 was available in the Visual Studio.NET Academic Edition, distributed to a certain number of scholars from each country without cost.
nama : titi nur jayanti XI RPL 2
ReplyDeletePrevent crashes on linux
although linux-known as a stable operating system, but crashes can happen at any time. and in the event of a crash, it would be difficult to fix.
The following are a few things to note for linux does not crash the system in operation:
1. Should not log in as root when not needed. it is done to avoid mistakes that could damage the system command
2. Created an emergency boot disk with the latest kernel. The disk we use a time when the system fails to recompile the kernel
3. Use UPS to maintain system stability
4. The computer to shut down, use the shutdown command and avoid emphasis ON / OFF button to turn it off
5. Use fsck or badblocks to check the
6. Should not run fsck on a mounted file system
7. Avoid the installation of programs that are not needed
8. Make backups on floppy disks for important files
nama : titi nur jayanti
ReplyDeleteDifference Windows 7 & Vista
WINDOWS SEVEN
History of Windows 7 : Windows 7 previously known as Blackcomb and Vienna , it has a kennel Windows NT 6.2 SP2 version of Windows Server 2008 and Windows 7 has security features that are new . Windows 7 is a kind of Windows Server 2008 SP2 . Windows was released on October 22, 2009 , features - features of windows 7 is : Jump Lists , Taskbar which opens the program with a small display , Windows Media Player 12 , Internet Explorer 8 , and others .
windows 7 there are 6 types:
* Windows 7 Starter
* Windows 7 Home Basic
* Windows 7 Home Premium
* Windows 7 Professional
* Windows 7 Ultimate
* Windows 7 Enterprise
Difference Windows 7 ( Seven ) :
* Features adjustable Gadgertnya unlike windows vista gadgets put in place its
* How mengistal seven not so long ( each loe Company Varies )
* The interface is not much different from vista
* Speed of Windows 7 Faster Access
WINDOWS VISTA
History of Vista : Windows Vista was released on November 30, 2006 , for the business for the home user while released on January 30, 2007 , Windows Vista was launched in order to have a more robust security than previous versions , the new applications ( such as Windows Calendar , Windows DVD Maker and a few new games including Chess Titans , Mahjong , and Purble Place ) . In addition , Windows Vista also offers a version of Microsoft Internet Explorer more secure , as well as Windows Media Player Latest version , Windows Vista uses the version number 6.0
Type of Windows Vista there are 6 Namely :
* Windows Vista Starter
* Windows Vista Home Basic
* Windows Vista Home Premium
* Windows Vista Business
* Windows Vista Enterprise
* Windows Vista Ultimate
Differences Windows Vista :
* Features Gadgertnya can not be regulated like windows 7
* How mengistal Vista so long ( each loe Company Varies )
* The interface is not much different from the Seven
* Windows Vista also introduces a feature graph is much more " alluring " , which is called Windows Aero GUI
nama : titi nur jayanti XI RPL 2
ReplyDeletetroubleshooting Monitor
Troubleshooting 1 ;
At the time of booting the computer , the monitor turns on at first . This is evident from the appearance of the BIOS reports that can be read properly . But after the windows loading process , the monitor suddenly went dark and did not live longer .
solution :
If the monitor suddenly went dark for loading windows , most likely due to the monitor driver setup is not right . What often happens is that the screes on display , frequency setting is too high .
To try to overcome this problem , do the windows boot in safe mode . The trick , press F8 after the BIOS and reports on the Command menu that appears select safe mode .
Later in the safe mode , reinstall the graphics card driver . After that select the appropriate type of monitor that will determine the maximum frequency ( refresh rate ) which will be displayed windows .
Troubleshooting 2 ;
When the computer is doing activities , suddenly appeared dots or colored pixels on the monitor , which in turn causes the computer hangs and crashes .
solution :
Problems like the above are usually related to temperature , either in general or on a computer graphics card specifically , especially if your computer is using modern graphics card is usually faster heat . To solve the problem , do efforts to the maximum cooling fan and check function on your computer , if still in good condition . You can also move other cards into the slot slightly apart with the graphics card slot in order to provide sufficient air circulation .
Troubleshooting 3 ;
Monitor blinking - blinking when used
solution :
The problem occurs because of a problem with the refresh rate setting on your computer . The refresh rate is the maximum capacity that made the monitor to display the frames in one second . Monitor that has a refresh rate is very small will make monitors like moving and unstable , to set the refresh rate , we must use the display properties. The trick is to right click on your desktop and then select Properties . After the display properties appears , select the settings menu - advanced - adapter . At the option of the display refresh rate will be used . Press the arrows to select the optimal choice and .
Troubleshooting 4 ;
At run time , look at the angle of the monitor there are patches of bluish disturbing appearance .
solution :
This problem occurs because of the presence of magnetic fields produced several electronic devices on the monitor . To eliminate it , try using a degaussing features that exist on the monitor control menu . If you 've tried it , and there has been no change in the last resort is you have to disassemble your monitor and try to adjust the existing magnet near the end of the tube .
Troubleshooting 5 ;
quality of changing color on the monitor display
solution :
Such cases were often occur . For example, initially we use 32 bits , but suddenly we find we are only able to monitor up to 16 bits . Most likely it is influenced by influenced by the quality of the VGA that we use or just the drivers are problematic . If it turns out your problematic drivers , you have to do is reinstall the driver . However , if these measures are still not able to resolve the problem , then there is a problem on vga card . For this problem , you should bring this to your hardware service center .
Troubleshooting 6 ;
The monitor turns on , but does not issue the display
solution :
Check the installation of video cable connecting the monitor to the cpu . Tighten the cable with the supplied screws , if it is still loose . Note also plug the VGA cable to the port . If it turns out bent pins , straighten using pliers or tweezers . If after doing the repair still no change , there is a problem on the VGA card. Change your vga card with another , this is done to ensure there is damage to the VGA card.
Nama : Anisatul Khoiroh
ReplyDeleteKelas: XI RPL 2
Minggu ke- 6
Google Desktop
Google desktop is a desktop virtualization technology is the result of the concept of virtual desktop infrastructure ( VDI ) is growing.
Where the desktop is also called a working computer table computer that is used for day-to- day work in one location to be at home or at the office .
Causes of Desktop Virtualization
According to a new study of 200 IT recently conducted a study describing how the services of IT professionals suffer from the complexity of the environment they deal with it everyday .
This challenge is the focus of the problem to begin Vendor can simplify computing by delivering IT as a service On- demand.dan one technology that can dramatically reduce IT complexity are doing desktop virtualization .
Technical Definitions Google Desktop
The concept is that the server environment in hardware memory and large processors will be made in a virtualized environment .
The use and communication theory
On the user has enough clients , ( LAN , WAN , INTERNET ) and has the right of access to virtual desktops technically is using remote function that already exist in each operation or additional applications .
The advantages And Disadvantages Google Desktop
Ø Excellence :
1.Penyerdahanaan operating systems and applications
2.Mengurangi downtime if:
A. Hardware Failure
B. The process of data migration
3.Mobile access to centralized data
ØKekurangan :
1.Potensi network security risk is not managed properly
2.Kesulitan complex applications (such as multimedia )
3.Ketergantungan public network connectivity
MUHAMMAD SAFREZA 11 RPL 2
ReplyDeleteTUGAS MINGGU 6
INTRODUCING NETBEANS IDE
Best Support for Latest Java Technologies
NetBeans IDE provides first-class comprehensive support for the newest Java technologies and latest Java specification enhancements before other IDEs. It is the first free IDE providing support for JDK 8, JDK 7, Java EE 7 including its related HTML5 enhancements, and JavaFX 2.
With its constantly improving Java Editor, many rich features and an extensive range of tools, templates and samples, NetBeans IDE sets the standard for developing with cutting edge technologies out of the box.
Fast & Smart Code Editing
An IDE is much more than a text editor. The NetBeans Editor indents lines, matches words and brackets, and highlights source code syntactically and semantically. It also provides code templates, coding tips, and refactoring tools.
The editor supports many languages from Java, C/C++, XML and HTML, to PHP, Groovy, Javadoc, JavaScript and JSP. Because the editor is extensible, you can plug in support for many other languages.
Easy & Efficient Project Management
Keeping a clear overview of large applications, with thousands of folders and files, and millions of lines of code, is a daunting task. NetBeans IDE provides different views of your data, from multiple project windows to helpful tools for setting up your applications and managing them efficiently, letting you drill down into your data quickly and easily, while giving you versioning tools via Subversion, Mercurial, and Git integration out of the box.
When new developers join your project, they can understand the structure of your application because your code is well-organized
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE 6
How are you my friend on this day ? ? The following article discusses the performance Powerful Ways to Speed up Mozilla Firefox , which would certainly help my friend to solve lemot.Silahkan browsing listened .
Follow the following ways :
1 . Open the application Mozilla Firefox belong pal .
2 . Then type in the address bar = about: config , and then press ENTER
3 . Then the image will appear as the " I'll be careful , I promise " , click .
4 . Then my friend will be shown many options , point the mouse to scroll down and find my friend network.http.max-connections , double click it and then enter the number 64 , click OK
5 . Then find network.http.max-connections - per - server , double -click , enter the number 21
6 . Then find network.http.max -persistent -connections - per - server , double -click , enter the number 8 , click OK
7 . Search network.http.pipelining , and then double -click will turn out to be true
8 . Search network.http.pipelining.maxrequests , double -click and enter a value of 100
9 . Then find network.http.proxy.pipelining change to true , in a way to double clicks .
10 . Right-click anywhere and select New - > then type nglayout.initialpaint.delay integrar , click OK
11 . Enter the number 0 on the Enter integer value , click OK
12 . Last Close Mozilla Firefox buddy . Then go back and try the comparison . ^ _ ^
nama:burhanuddin
ReplyDeletekelas:XIrpl2
T:minggu 1
• Free Brushes
Layer Styles
Place the *.asl files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Styles where X is the version number for your version of Photoshop.
• Free Layer Styles
Shapes
Place the *.csh files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Custom Shapes where X is the version number for your version of Photoshop.
To load a file, go to the Styles palette, then click the small arrow in the top right corner and choose one of the layer style collections from the menu.
• Free Shapes
Patterns
Place the *.pat files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Patterns where X is the version number for your version of Photoshop.
To load a pattern set, go to the Patterns palette (in the fill tool, Pattern overlay style, etc.), then click the small arrow in the top right corner and choose one of the pattern collections from the menu, or choose "Load Patterns" if the set is not listed in the menu. You can also load patterns via the Preset Manager in Photoshop 6 and up.
• Free Patterns
Gradients
Place the *.grd files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Gradients where X is the version number for your version of Photoshop.
To load a file, go to the Gradients palette, then click the small arrow in the top right corner and choose one of the gradient sets collections from the menu.
• Free Gradients
Color Swatches
Place the *.aco files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Color Swatches where X is the version number for your version of Photoshop.
To load a file, go to the Swatches palette, then click the small arrow in the top right corner and choose one of the swatch collections from the menu.
Actions
Place the *.atn files into:
Program Files\Adobe\Adobe Photoshop X\Presets\Photoshop Actions where X is the version number for your version of Photoshop.
To load an action set, go to the Actions palette, then click the small arrow in the top right corner and navigate to the location where you saved the action. Select the file you'd like to load and it will be added to the actions palette. Learn more about creating and using actions from my links to Photoshop Action Tips.
• Free Actions
Zip Files
Most of the free Photoshop content on this site is distributed as Zip files to reduce download time. Before the files can be used, they must first be extracted. Zip file extraction is built into the operating system in Macintosh OS X and Windows XP. Consult your computer help if you're not sure how to extract zip files. For earlier operating system versions, you will need an unzipping tool such as Winzip (Win), Stuffit Expander (Mac), or ZipGenius (Win) to extract the files. After extracting the files, place them in the appropriate folder as indicated above.
Note: Most of these files can actually be saved anywhere on your computer, but to make them available from each tool's menu, they should be located in the appropriate folder under Presets. If you keep the files in another location, you will need to navigate to that location each time you want to use them.
are you sure
ReplyDeleteits work?
NAMA:BURHANUDDIN
ReplyDeleteKELAS:XI RPL2
MINGGU2
Mac OS or Macintosh Operating System is a computer operating system made by Apple Computer that is used to operate the notebook computer apple macbook. Macintosh was first introduced in January 1984 through the Super Bowl ad. At that time, the steps taken by Apple is a revolutionary development in the world of personal computers.
Initially Apple intentionally made the usual Macintosh Macintosh that can more easily be run by people who are just learning the computer once. Macintosh Operating System was originally identified as a system, such as "System 6.0.7? or "System 7?. In the beginning was also recognized as a "toolbox" that there are several advantages that can be used to replace the computer linkage to the toolbox itself.
Apple also intentionally concealed the existence of the operating system to distinguish the Mac with other operating systems such as MS-DOS, which is easier to use than the Macintosh.
Macintosh Systems
a. Mac OS Classic
Mac OS "Classic" is a system created by the Mac in 1984 to Mac OS 9. Classic Mac-OS recognized as a system that does not have any command line or the command line and also a system that uses the user interface (UI) is fully . Because it is easy to use, this system is also criticized for using cooperative multitasking.
b. Mac OS X
Mac OS X (the letter "X" is called ten, namely Roman letters) are newer. Mac OS X include elements of BSD Unix, OpenStep and Mac OS 9. Mac OS X has a Unix-style memory and pre-emptive multitasking to the Mac platform. Handling is much better memory can do more simultaneously charging and charging rule against charging will destroy each other.
Excess Macintosh
a. More stable because it uses the UNIX
b. Multitasking.
c. Get to know the file format of the windows.
d. More glossy look so good for graphic design / multimedia.
e. Documents created in Mac OS can be read in another, and vice versa. Both the format of a 'generic' (eg pdf, html, mp3, text) as well as the specific format (eg. Doc,. Xls,. Ppt). Provided that no application program (application) on both platforms (Mac and Windows) that can read that format.
f. Open source code so that the Mac OS is difficult to plow.
g. There is a 'Time Machine' that will work automatically in the background without interrupting the running application to backup system and the ongoing changes in the data.
h. There is a program "Sherlock" are not just looking for the file on the disk and in the local network, but can also act on the Internet and search by keyword.
i. Macintosh has security against viruses, spyware, and so forth. This is the biggest reason why many people choose a Mac as to avoid the virus.
j. Mac Operating System is simple to use and easy to learn. Because the source is unclear, its training center there, and in general when people are faced with the Mac OS is easy to learn.
k. Macs have certainty and clear hardware support.
Disadvantages Macintosh
a. The price is expensive.
b. Only suitable for a graphic designer.
c. Mac OS can not be used together other operating systems that do not use the Mac OS system
d. Mac could not be assembled because Apple has not given license for other companies to make hardware that can use the Mac OS.
e. Software in the Mac OS is not so complete.
f. Less suitable for server applications and games.
Nama:Moch Nur Rohman
ReplyDeletekelas:XI RPL2
tugas mingguan 6
HOW TO OVERCOME THE LAPTOP NO PROBLEM . DISPLAY ( NO DISPLAY ) , BUT POWER ON BUTTON
1 . Tried to check on the MEMORY / RAM on your computer , remove the MEMORY / RAM and clean the rust on the connecting groove RAM, MOTHERBOARD , if you do not know that that was yellow on the momory / RAM , then plug it back in and try to turn it on again your laptop , if the flame is RAM / MEMORY just gross , if not try to USE Flash RAM / MEMORY NEW ..
2 . If you have to replace the MEMORY / RAM but no flame , try replacing the LCD CABLE , the cable that connects the motherboard to the LCD directly , if the flame is the lcd cable is damaged and must be replaced
3 . Ultimate solution if you have to replace both of his , and still not be able to perform / DISPLAY , try changing the LCD of your computer , if the flame is , chances are you have too DARK LCD / LCD DAMAGED due to falling weve already when his or CHANGE , hahaha : D
nahh above are some of the solutions or how to fix it , if you have difficulty in this case you can be in consultation with your LAPTOP SERVICE CENTRE , due to problems finding a point to go through the proper process of analysis , thus directly on target / her subject matter
so the info can give to you , may be useful ( note : only for display but the problem there is no power on just lhoooo , , , / klo others no.coment )
NAMA:BURHANUDDIN
ReplyDeleteKELAS:XI RPL2
MINGGU:3
Symbian Operating System which was established since 1998 and was previously used by Nokia to date has been used by many vendors Smartphone, Symbian has experienced drastic growth and till now remains the number one category for the OS Smartphone. There are many versions of Symbian OS from version 6 to 9 but the Symbian OS has made a category for grouping the OS according to the form and function rather than his own, this is done so that users and developers are not too dizzy with a fairly varied versions of this but enough to understand the type of its course, for example, is a group S60 (Series 60), S80, S90, and Symbian UIQ. Symbian does not mention electronic products that use its OS as a PDA or PDA phone but always use a name designation "Smartphone".
Symbian operating system open source software is not full because there is still availability of APIs. Symbian operating system developed by Symbian Ltd is designed for use in mobile equipment (mobile). Since its establishment, has been leading the Symbian operating system to mobile devices such as smartphones and communicator. Many applications can be used on these operating systems. Applications that can be made using the language C + +, Java or VC + +. On the Symbian operating system was created using the programming language C + +. Symbian also provides the ability to surf the PPP, FTP, TCP / IP and can also transfer data or files using Bluetooth and Infrared. Application development on the Symbian operating system using the software "Series 60 SDK for Symbian C + +" which is provided by nokia. The software consists of a compiler, emulator, and documentation of Symbian C + + language. In general, the architecture of Symbian OS is divided into four layers based on the use of the API, namely:
· Supporting the application layer (Layer Utility Application)
· The service layer framework and graphical user interface (GUI framework)
· Communication layer
· Basic layer API system
For interoperability memasimumkan kategoridalam classification API available, namely:
· General Symbian API
· General Symbian API irreplaceable
· Optional Symbian API
On the Symbian operating system that is capable of multitasking, can open more than one application at once. Symbian OS v9.2 update them on bluetooth application. While Symbian OS v9.3 made additional applications, namely, wi-fi. And finally issued the latest version of Symbian, s60v5. Types of mobile phones that use the latest version is nokia 5800xm, n97 and nokia 5530. Applications are usually installed on symbian format. Sis or. Sisx. whereas the usual format for java. jar. Often many applications that are not installed or says "certificate error" or "expired certificate". Mobile is in because they are certified. However, as the sophistication of technology, finally able to hack Symbian. Even symbian nokia s60v5 is the latest version can be hacked as well.
Symbian is deemed superior because:
1. The operating system from the beginning was designed specifically for mobile phones. In contrast to Microsoft and Linux are adopted from the computer.
2. Blessing feature CC +, Java (J2ME) MIDP 2.0, PersonalJava 1.1.1a, and WAP, Symbian operating system is very open so anyone can develop it. proven many outstanding additional applications for Symbian OS or the Java platform.
Symbian provides a user interface (UI) framework that is flexible, so that the vendor can vary the products. Symbian has released the latest operating system for its smartphones, namely version 9.3, version 9.3 Symbian stated that this will further accelerate, mempermurah mobile phone vendors and operators to get the best services and facilities such as WiFi support, an online firmware update (FOTA), HSDPA support , VoIP over IPSec, native support for Push To Talk, Java JSR 248 support, security platform more stable and better to protect from viruses and spam, facilities support for better 3D graphics (vector floating point).
Nama:Moch Nur Rohman
ReplyDeletekelas:XI RPL 2
tugas minggu 7
How to Solve Computer Not Logged Loading Windows After Boot
How to mitigate or Laptop Computer in Windows 7 boot time error and can not get into loading Windows can only enter the BIOS . After using Windows 7 or Windows 7 Loader Activator then discharged restart , can not get into Windows just continued to restart over and over again .
Actually the above problems can be corrected without having to install Windows 7 on your birthday . Perhaps these problems , can also occur due to breakage and errors that occur because the Master Boot Record ( MBR ) that crashes or errors . Other damage can also occur because of corupt windows registry or registry has been edited by viruses . Actually , you can still use the Windows Recovery or Repair Computer with a System Image backup if you ever do .
If this happens to your computer or laptop , follow the following ways so that you can run Windows normally.
1 . You must have a Windows 7 DVD tapes first. Both the Ultimate , Home Basic , Professional , Starter depending on the OS ( Operating System) that were previously used .
2 . Turn on your computer or laptop . When you see the BIOS , press F2 or F12 key to change the First Boot . Change to the CD / DVD Room Drive , Hard Drive into a second order from the top .
3 . Insert the CD / DVD Master the Windows 7 . Then , restart again .
4 . Press any key on the keyboard , when it says " Press Any Key To Boot From CD / DVD ... "
5 . Upon booting the computer via DVD Room , it will display the installed now
6 . Click on " Repair Your Computer" as the intended image above .
7 . Wait a moment , because the computer will check and scan data. Then click Next or OK .
8 . Then appear 2 options , the top is for Recovery Windows . Bottom is the restore point , which is an option if you ever do a backup before.
9 . Choose the top of the recovery , then the display appears as below .
10 . Here you can use various options to repair the damage to your Windows , usually I try Startup Repair first. Then perform hard drive capacity on Local Disk C or D. If the emerging Local Disk Local Disk D , usually the Repair option can not be used , use System Restore to restore data to the previous schedule ( the second option ) .
11 . If not it could be , use System Image Recovery .
12 . For the last option is to use the Command Prompt , just click on Command Prompt .
It will appear as a black box in cmd .
13 . Typing DIR C : and press enter , in order to see the contents of the local disk C and open it .
Retype one of the options below , start one by one to try .
type :
bootsect.exe/nt60 c :
bootsect.exe/nt60 all
Bootrec.exe / fixmbr
Bootrec.exe / fixboot
bootsect / nt60 all / force / mbr
Type was one by one starting from the top , and then press ENTER . If not it says The operation has been succesfull . Try writing a second type above .
After that , click the Restart button at the bottom next to the Shut Down button .
If the above methods , it can not fix everything on your Windows system boot . Meaning you have to do a reinstall. However , nearly 80 % , way above can overcome the problems often encountered that can not be entered until after loading the Windows boot process . May be useful for friends .
nama : muhammad safreza
ReplyDelete11 rpl 2
tugas minggu 7
algorithm design
Algorithm design is a specific method to create a mathematical process in solving problems. Applied algorithm design is algorithm engineering.
Algorithm design is identified and incorporated into many solution theories of operation research, such as dynamic programming and divide-and-conquer. Techniques for designing and implementing algorithm designs are algorithm design patterns,[1] such as template method pattern and decorator pattern, and uses of data structures, and name and sort lists. Some current day uses of algorithm design can be found in internet retrieval processes of web crawling, packet routing and caching.
Mainframe programming languages such as ALGOL (for Algorithmic language), FORTRAN, COBOL, PL/I, SAIL, and SNOBOL are computing tools to implement an "algorithm design"... but, an "algorithm design" (a/d) is not a language. An a/d can be a hand written process, e.g. set of equations, a series of mechanical processes done by hand, an analog piece of equipment, or a digital process and/or processor.
Steps in development of Algorithms
*Problem definition
*Development of a model
*Specification of Algorithm
*Designing an Algorithm
*Checking the correctness of Algorithm
*Analysis of Algorithm
*Implementation of Algorithm
*Program testing
*Documentation Preparation
Nama : Anisatul Khoiroh
ReplyDeleteKelas : XI RPL 2
Minggu ke-7
Various Kinds Beep Beep For Warning Damage On Computer
Leave a comment
To determine the type of damage or problems that often occur when the computer is turned on , can be recognized through the beeps that appear on the mainboard speaker at the first time the computer is turned on .
With the familiar beep on each motherboard we can know keruksakan or problems on our motherboard .
Mainboard with Award BIOS and Phoenix BIOS :
Short beep 1 time : Normal System .
Short beep 2 times : Damage / errors in CMOS .
1 long beep and short times 1 times : Damage / errors in DRAM / short ram or ram happen .
1 long beep 2 times and short times : Damage / error on the VGA card / often occurs when using the onboard vga .
1 long beep 3 times and short times : Damage / error on the keyboard or on the VGA card , often characterized by menyalanya LED lights on the keyboard .
1 long beep and a short time 9 times : Damage / error at ROM
Long beep repeatedly : Damage / error In DRAM , DRAM not installed correctly , or is not compatible with the mainboard DRAM , the DRAM pci note that the pairs
Short beep repeatedly : Power on the power supply is not enough , immediately replace the power supply or check the power supply cables .
Mainboard with the AMI BIOS :
No beeps : Damage / fault on the mainboard , powersupply , or the internal speaker .
Short beep 1 time : the normal system .
Short beep 2 times : Damage / errors in DRAM .
Short beep 3 times : Damage / same error with a short beep 2 times .
Short beep 4 times : Errors in the system date and time .
Short beep 5 times : Damage to the processor / mainboard .
Short beeps 6 times : Damage / error on the keyboard .
Short beep 7 times : Damage / same error with a short beep 5 times .
Short beep 8 times : Damage / VGA error .
Short beep 9 times : rom checksum error at the time .
Short beep 10 times : Damage / errors in CMOS .
Short beep 11 times : Damage / error on Cache Memory .
1 long beep 3 times and short times : Error during memory test .
1 long beep and a short time 8 times : mistakes when checking VGA .
And below there is little sense of a beep, indicating the presence of faults / failures in one of the components of your computer .
Type AMI BIOS :
1x long BEEP sound
There is a possibility of death or RAM installed improperly , thus causing failure DRAM refresh .
2x
Parity circuit failure . At the time of the transmitted data in the computer , usually added parity bits are used to detect errors . This work was carried out a series of parity on the computer . This is probably caused by a problem with the memory or the mainboard .
3x
Base 64K memory failure , the failure is usually due to the memory slots are grouped into modules which have a defective chip . Base 64K memory is the memory of the first 64 KB of RAM .
4x
Failure of the system timer , the possibility of an error in one or more timers are used to control functions on the motherboard .
5x
Processor failure , can be caused by excessive heat , or because the process is not inserted properly into the socket .
6x
Failure keyboar controller / gate A20 , the keyboard controller is a chip on the motherboard that controls your keyboard
7x
processor reading error possibility of damage to the processor
8x
error read / write memory display
9x
damage BIOS
10x
CMOS error
11x
Damage cache memory
All types of Motherboards
1 . Beeb Beep if there is a short 1 x , it means that computers fine
Beep sound 2.kalau ... 1x long , hard disk problems on .
3 . Beep .. then Beeb pndek long 1x 1x , the motherboard problem .
4.Beeb .. Beeb short length keeps 1x 2x , VGAnya problematic .
5 . 3x Long Beep , The keyboard error
6.Beep , Beep ( short ) terus2an , check Power supplynya
7.Beep ... Long terus2an , there is a problem on Its memory .
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 6
Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.
The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on.
Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key also owns the matching private key. In all versions of SSH it is important to verify unknown public keys, i.e. associate the public keys with identities, before accepting them as va. Proprietary, freeware and open source (e.g. PuTTYlid. Accepting an attacker's public key without validation will authorize an unauthorized attacker as a valid user.
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 7
Software And Application Which There Is Mandatory Computer We
A. Software To Improve Computer Performance .
• CCleaner . Many people who regard this software does not need to be in the computer . But for me the very bullet karnena CCleaner can improve performance of our computer such as cleaning the Registry , Chace , or History on your computer with Safe . with a clean and sleek registry will berimpas on a computer that runs with more fast.CCleaner have an interface ( interface) is simple and user friendly easy to use. the Cleaner section you will find a function to cleanse both temporary files generated by Windows and other applications . in this section you will find the option cleans traces of your internet browser be it cookies , history , lastdownload to Autocomplete .
B. Anti- Virus
• My friend can use Anti- Virus that has been in production and is distributed free on the Internet . Whether it's AVG , Avast or Norton and latest Kaspersky . Try to always update . I think a scan once a week is enough .
C. Adobe Reader or Foxit Reader
• It's good buddy install this application on the laptop . to search in Google friend use the keyword " Adobe Reader " or Foxit Reader " on the Google search engine .
D. Adobe Flash Player
• To watch Youtube or play poker this application may needs. Usually when buying a new laptop this application is not installed in it . There may be from my friend who can not open Youtube and flash blend Fucking her lai . my friend needs this application . To download get the usual no writing in the Fucking are not open please click the recommendations or the words " Adobe Flash Player " in the Google Search engine
E. Microsoft Net . Framework
• Do not Ignore This application because it had a function . there are some applications can not be installed in because of the lack of Microsoft Net . This framework . Please check in the control panel at the Computers Unistaler mate , already installed, please or not if not installed in accordance with the Computer pal . First puncture of the Microsoft Net . This Framework is to facilitate lawyer codingan and command execution .
F. Design
• If the friend can design please install Photoshop or Corel Draw if you can not or do not use at all please keep the software on your computer as it is very heavy and takes up a lot of the storage capacity .
G. Winrar and zip
• Do not Forget This application is a very useful course
Google Bookmarks is a free online bookmarking service, available to Google Account holders.[1] It is completely separate from browser-based bookmarking and should not be confused with the Bookmarks function on any popular browser, Google Chrome included. Google Bookmarks was launched on October 10, 2005.[2] It is cloud based service that allows users to bookmark webpages and add labels or notes.
ReplyDeleteUsers can access their bookmarks from any browser on any computer by signing into their Google account. The bookmarks are searchable, and searches are performed on the full text of the bookmarked pages, not just the labels and notes.[citation needed]
Google Toolbar has a tool enabling users to easily bookmark pages and access them. Bookmarks can also be created manually from the web interface, or by use of third-party tools such as Firefox extensions created for the purpose of managing the user's Google Bookmarks account[3] and keeping them synchronized to the browser's bookmarks.
VIVI FONI D.N
A simple JavaScript function labeled Google Bookmark is created on the Firefox Bookmarks Toolbar, which opens a window to save the bookmark to the Google Bookmarks. This same function can be imported into other browsers as a bookmarklet.[4]
VIVI FONI D.N
ReplyDeleteGoogle Bookmarks is a free online bookmarking service, available to Google Account holders.[1] It is completely separate from browser-based bookmarking and should not be confused with the Bookmarks function on any popular browser, Google Chrome included. Google Bookmarks was launched on October 10, 2005.[2] It is cloud based service that allows users to bookmark webpages and add labels or notes.
Users can access their bookmarks from any browser on any computer by signing into their Google account. The bookmarks are searchable, and searches are performed on the full text of the bookmarked pages, not just the labels and notes.[citation needed]
Google Toolbar has a tool enabling users to easily bookmark pages and access them. Bookmarks can also be created manually from the web interface, or by use of third-party tools such as Firefox extensions created for the purpose of managing the user's Google Bookmarks account[3] and keeping them synchronized to the browser's bookmarks.
A simple JavaScript function labeled Google Bookmark is created on the Firefox Bookmarks Toolbar, which opens a window to save the bookmark to the Google Bookmarks. This same function can be imported into other browsers as a bookmarklet.[4]
VIVI FONI D.N
ReplyDeleteAnalyze beep when turning on laptop
The sound of " beep " will generally be out of the laptop or computer each time before finally booting the laptop or computer managed to get into the operating system .
But basically the sound of " beep " not because it does not accidentally appear . The sound of " beep " coming out of the laptop or computer is a sign of certain problems that occur on your laptop or computer . Analysis of sounds like this is often used for a computer analyzer problems .
The sound of " beep " once meant short or laptop computer managed to do a friend's apartment and turn on all the components needed for prosse boot up a computer device . If the sound is heard but the device does not turn on , check the monitor of my friends .
The sound of " beep " short 2 times means there is a problem in the configuration or the CMOS settings .
The sound of " beep " so long and so short it means there is a hardware problem on the motherboard or memory my friends . Make sure both devices have been installed properly .
The sound of " beep " once long and 2 short time indicates a problem with the monitor or the VGA card .
The sound of " beep " long 1 short times and 3 times it means there is a problem on the keyboard of my friends . Try to clean the keyboard of my friends .
The sound of " beep " once long and short sounds 9 times if there is a problem in the BIOS RIOM my friends .
The sound of " beep " continuous length means there is a problem with the RAM my friends .
The sound of " beep " sounds short and continuously indicate acceptance of voltage or power problem on Laptops .
May be useful ^ ^
SITI RHOMATUL MUDALIFAH
ReplyDeleteXI RPL2
TUGAS 1
kind of computer network consists of :
LAN ( Local Area Network ) .
Local Area Network ( LAN ) is the most common type of network data. As the name suggests , serves local area LAN typical installation in industrial plants , office buildings , college or university , or similar locations . In such location is feasible to build a high -quality network , communication links interconnecting the nodes speed . Typical data transmission speed is 1/100 megabits per detik.LAN allows users to share computer resources within an organization , and can be used to provide access ( shared ) to the organization remotely through a router connected to the Metropolitan Area Network ( MAN ) or Wide Area Network ( WAN ) .
MAN ( Metropolitan Area Network ) .
MAN is a relatively new class of network , serving a role similar to the ISP , but for corporate users with large LANs . MAN typically covers an area of between 5 to 50 km in diameter . A MAN ( like a WAN ) is not generally owned by a single organization . MAN , its communications links and equipment are generally owned by a consortium of users or by a single network provider who sells the service to the user . The level of service provided to each user so it must be negotiated with the MAN operator , and some guarantee of performance usually ditentukan.M AN often act as a high speed network to allow sharing of regional resources ( similar to large LANs ) . It is also often used to provide a shared connection to other networks using a link to the WAN .
WAN ( Wide Area Network ) .
Understanding WAN is a wide area computer network combines multiple LANs that are geographically dispersed . This is done by connecting the LAN using a range of services dedicated phone line rental , dial-up phone lines ( both synchronous and asynchronous ) , satellite links , and data packet carrier services . WAN modem can run with or contrary to the remote access server using special routing protocols and filters to minimize the cost of data transmission over vast distances . Term Wide Area Network ( WAN ) usually refers to a network that covers a large geographical area , and use communications circuits to connect the intermediate nodes . The main factors affecting the performance of a design is a WAN circuit requirements that they lease from company communications or other communications telephone operators . The transmission rate of typically 2 Mbps, 34 Mbps , 45 Mbps , 155 Mbps , 625 Mbps ( or sometimes much more ) . Mencajup network is vast geographical areas such as provinces , island , country , continent or the whole world ( 50 Km ) . Example national telecommunication networks , mobile telecommunications and national television .
nam : titi nur jayanti XI RPL 2
ReplyDeleteCara mereset BIOS Motherboard
ruangberkas.com_imagesClear CMOS / Reset BIOS merupakan trik untuk merubah setingan BIOS kembali seperti semula (defaulnya/setingan dari pabrikannya). Untuk melakukan ini Anda tidak usah mencabut batery yang ada pada Motherboard tetapi cukup menindahkan posisi jumper CMOS, jumper ini biasanya terpasang di sekitar batery.
Jumper tersebut terpasang diatas 3 pin. Untuk setingan awal jumper berada di pin 1,2 sedangkan pin 3 tidak diisi. Jika Anda ingin melakukan clear CMOS maka Anda hanya lakukan cabut jumper tersebut dan pasang jumper tersebut ke pin 2,3 pin 1 tidak diisi. Setelah itu diamkan komputer kurang lebih 5 menit (untuk lebih memastikan CMOS clear). Setelah itu cabut lagi jumpernya kemudian pasang keposisi semula ke pin 1,2 dan pin 3 tidak diisi.
Kalo tidak mau ribet dan susah, cabut saja Batery BIOS tersebut dan diamkan selama beberapa menit dalam kondisi komputer tidak tertancap power listrik. setelah beberapa menit lalu pasang kembali baterynya, dan nyalahkan komputernya.
Jangan lupa seting ulang BIOS, jam, tanggal sistem, dan setingan yang lainnya kemungkinan berubah.
Ingat kalo mau clear CMOS/BIOS kondisi komputer harus mati dan usahakan tidak ada listrik yang menancap ke komputer.
nama : titi nur jayanti XI RPL 2
ReplyDeleteCara mereset BIOS Motherboard
ruangberkas.com_imagesClear CMOS / Reset BIOS merupakan trik untuk merubah setingan BIOS kembali seperti semula (defaulnya/setingan dari pabrikannya). Untuk melakukan ini Anda tidak usah mencabut batery yang ada pada Motherboard tetapi cukup menindahkan posisi jumper CMOS, jumper ini biasanya terpasang di sekitar batery.
Jumper tersebut terpasang diatas 3 pin. Untuk setingan awal jumper berada di pin 1,2 sedangkan pin 3 tidak diisi. Jika Anda ingin melakukan clear CMOS maka Anda hanya lakukan cabut jumper tersebut dan pasang jumper tersebut ke pin 2,3 pin 1 tidak diisi. Setelah itu diamkan komputer kurang lebih 5 menit (untuk lebih memastikan CMOS clear). Setelah itu cabut lagi jumpernya kemudian pasang keposisi semula ke pin 1,2 dan pin 3 tidak diisi.
Kalo tidak mau ribet dan susah, cabut saja Batery BIOS tersebut dan diamkan selama beberapa menit dalam kondisi komputer tidak tertancap power listrik. setelah beberapa menit lalu pasang kembali baterynya, dan nyalahkan komputernya.
Jangan lupa seting ulang BIOS, jam, tanggal sistem, dan setingan yang lainnya kemungkinan berubah.
Ingat kalo mau clear CMOS/BIOS kondisi komputer harus mati dan usahakan tidak ada listrik yang menancap ke komputer.
NAMA : TITI NUR JAYANTI XI RPL 2
ReplyDeleteOvercoming Bluescreen erorr
Of course many of you have ever experienced a Blue Screen problem on a computer . Tips and tricks I got from a forum , I am posting here as a reminder to me if one day experiencing problems related to BS and also , perhaps there is among you now are experiencing this problem and wondering how to handle . With this article , I hope to provide a solution to the problem of the settlement of the BS that you face . Immediately following to - 10 error codes , causes and workarounds :
1 . IRQL_NOT_LESS_OR_EQUAL ( 0X0000000A ) This is a culprit in the mastermind BSOD . Why ? Since most of the BSOD , this message appears most often . This error message is caused generally , due to the incompatibility of the drivers installed on your computer . Cause List : ? Conflicting driver problem or do not match ? Issues Video Card , this includes video card overclocked beyond the limit or you just changed your video card and you have not uninstalled the old video card drivers from different chipset ? Problems Audio Card , include configuration errors or bugs in the sound card driver
2 . NTFS_FILE_SYSTEM or FAT_FILE_SYSTEM ( 0X00000024 ) or ( 0X00000023 ) Well , the message is at least a little "disconnected " gives an overview of where the damage is located , which is in a partition or filesystem but not in HD. We can check by check or PATA or SATA cable can check the partition with chkdsk tool .
3 . UNEXPECTED_KERNEL_MODE_TRAP ( 0x0000007F ) When you get a message like this , can be caused by : ? Hardware Overclock excessive ? Computer components are overheating ? BIOS is corrupt ? Memory and CPU are defective
4 . DATA_BUS_ERROR message is caused because of the possibility that memory or the memory slot on the motherboard is damaged .
5 . PAGE_FAULT_IN_NONPAGED_AREA Caused due to hardware damage , including main memory , video card memory , or memory in the processor ( L2 Cache )
6 . INACCESSIBLE_BOOT_DEVICE Due to an error in the configuration jumpers wrong disk , boot sector viruses , wrong IDE controller driver , or chipset driver error .
7 . VIDEO_DRIVER_INIT_FAILURE error occurs on the video card driver installation is less than perfect , restarts during installation or can also occur because of errors in the installation of the driver .
8 . BAD_POOL_CALLER This error can occur because of errors or incompatible drivers . Often occurs during installation of XP upgrade , or not of new installations .
9 . PEN_LIST_CORRUPT message is caused due to damage to the RAM
10 . MACHINE_CHECK_EXCEPTION disability caused by the CPU , overclocked or aggressively , as well as the power supply or faulty power shortage .
NAMA : TITI NUR JAYANTI XI RPL 2
ReplyDeleteFeatures Mikrotik OS
Address List , grouping IP addresses based on name .
Asynchronous , serial PPP Supports dial-in/dialout , with CHAP authentication , PAP , MSCHAPv1 and MSCHAPv2 , Radius , dial on demand , up to 128 ports modem pool .
Bonding , Support in combining multiple ethernet interfaces into 1 pipe on a fast connection .
Bridge , Supports spanning tree bridge function , multiple bridge interfaces , bridge firewalling .
Data Rate Management , QoS -based with the use busrt HTB , PCQ , RED , SFQ , FIFO queue , CIR , MIR , limit between peer to peer .
DHCP , DHCP Supporting each interface ; DHCP relay ; DHCP client , DHCP multiple networks ; static and dynamic DHCP leases .
Firewall and NAT , filtering Supports peer to peer connection , source NAT and destination NAT . Being able to filter based on MAC , IP address , port range , IP protocols , protocol options such as selecting ICMP , TCP flags and MSS .
Hotspot , hotspot gateway with RADIUS authentication . Supports data rate limit , SSL , HTTPS .
IPSec , AH and ESP protocols for IPSec ; MODP Diffie-Hellman groups 1 , 2 , 5 ; MD5 and SHA1 hashing algorithms ; using the DES encryption algorithm , 3DES , AES - 128 , AES - 129 , AES - 256 ; Perfect Forwarding Secresy ( PFS ) MODP groups 1 , 2 , 5 .
ISDN , ISDN Support dial-in/dial out . With authentication PAP , CHAP , and MSCHAPv2 MSCHAPv1 , Radius . Supports 128K bundle , Cisco HDLC , x751 , x75ui , x75bui line protocol .
M3P , Mikrotik Package Packer Protocol for wireless and ethernet links .
MNDP , Mikrotik Neighbor Discovery Protocol , also supports Cisco Discovery Protocol ( CDP ) .
Monitoring / Accounting , IP traffic reports , logs , statistics graphs accessible via HTTP .
NTP , the Network Time Protocol server and client ; synchronization use the GPS system .
Point to Point Tunneling Protocol , PPTP , PPPoE and L2TP Access Concentrators ; authentication protocol using PAP , CHAP , MSCHAPv1 , MSCHAPv2 ; RADIUS authentication and reporting ; MPPE encryption ; compression for pppoe ; Limit data rate .
Proxy , Cache Proxy for FTP and HTTP servers ; HTTPS proxy ; transparent proxy for DNS and HTTP ; SOKCS protocol support ; parent proxy support ; static DNS .
Routing , static and dynamic routing ; RIP v1/v2 , OSPF v2 , BGP v4 .
SDSL , Supports Single Line DSL ; termination mode and network connection point .
Simple Tunnels , and EoIP IPIP Tunnel ( Ethernet over IP ) .
SNMP read-only access mode .
Synchronous , V.35 , V.24 , E1/T1 , X21 , DS3 ( T3 ) media types ; sync - PPP , Cisco HDLC ; Frame Relay line protocol ; ANSI - 617d ( ANDI or annex D ) and Q933a ( CCIT or annex A ) ; Frame Relay LMI types .
Tool , Ping ; traceroute ; bandwidth test ; ping flood ; telnet ; SSH ; packet sniffer ; Dynamic DNS update.
UPnP , universal interface supports Plug and Play .
VLAN , Virtual LAN Support IEEE802.1q for ethernet and wireless networks ; multiple VLANs ; VLAN bridging .
VOIP , supports voice over IP applications .
VRPP , Supports Virtual Router Protocol redudant .
Winbox , Application GUI mode to remotely and configure MikroTik RouterOS .
Nama : Qurrotul Ainy XI RPL 2
ReplyDeleteModifications to the blog template " Background Technique "
Make the blog interesting CSS techniques require complicated , I find new ways to make your blog look attractive without the need for complicated settings CSS . This technique is great for those of you who do not understand the CSS code . The technique I named engineering background .
Engineering background as the name of this technique makes the background as the main view blog . In order for this technique to be successful you have little knowledge of Corel , Photoshop or other image design programs . The technique I use on this blog template .
* note this technique is applicable to "simple default template blogger "
simple template
This tutorial we will change the appearance of the blog header . With a background technique you only need to set the background as below
This background has been adjusted by a margin of simple templates . So that when combined , the results will be as below .
Her appearance would be much nicer if you have graphic design skills . You just need to adjust the magin - magin the original template . Size above the background you can make reference to create other bakgground .
How to add a background to the blog template
find the following css code :
. fauxcolumn - outer - body . stamp - top {
position: absolute ;
z - index : 1 ;
height: 400px ;
width: 100 % ;
background: $ ( body.background ) ;
$ ( body.background.override ) background: url ( " http://3.bp.blogspot.com/-9BvRkailQzs/Tztv0wAtRsI/AAAAAAAAE3I/rtnnTCZheC0/s000/wrapper.jpg " ) no-repeat center 0px ;
}
description : black is the color code in your template code
red and blue code is the code that you add
code blue is your image url backgrund
If it is all save your template .
The next step you go to the template > select adjust
The next will appear as below
click to enlarge
select settings ( advanced ) > background > main screen > select transparent and Terapakan on blogs
finished good luck
Nama : Qurrotul Ainy XI RPL 2
ReplyDeleteHow To Lock Computer With flash
During this time I lock the computer by using the conventional way is to lock your computer with a password on windows.Tapi memberikkan since some time ago I started using the computer to lock the flash ! So that will automatically lock the computer screen and lock your computer keyboard .
How To Lock kompter with passwords
Secret Techniques How To Lock Computer With flash
And Locking Using computer flash is much more effective than on the computer lock with password through the windows .
While the software to lock the computer in call dengna Predator.Dan steps to lock the computer from the flash please refer to the following :
Please download legally and free to lock the computer that is predatory in http://download.cnet.com/Predator-Free-Edition-32-bit/3000-2144_4-10915340.html
Then run your application and plug predators or plug your flash to the computer or laptop when you plug the flash drive anda.Pada will display a dialog box that asks you to enter any password Click Ok
Furthermore, we will enter the Preferences window . Rates in some settings menu . And you have to do is enter a new password and Uniq safe course by clicking on the " New password " . This function A When you lose your flash or damaged then you will meunggunkaan yes as key to login computers .
please click on the check on the option " Always Required " If you want to make a Predator Software is always asking for a password to unlock . It is important bagiaan on " Flash Drive " you should memastikkan that you have selected the correct usb flash drive .
Then click on "Create key" > Ok
If the Above steps have been done correctly then you will automatically exit the application predators .
Next click on the task bar icon predators to make an application to be restarted predator predators application icon in your Hijau.Dan color it turns into a sign that the predators applications already running on your computer .
Remember every 30 seconds then you will apilkasi predator check if your flash masi stuck in your computer . Automatically plugged Otherwise your computer will be locked .
So How Lock computer with password using software to lock the computer with the stick. Hopefully useful
Nama : QURROTUL AINY XI RPL 2
ReplyDeleteMobile Car Can Be Used to Control
London - Land Rover automaker recently showed their latest concept car , Concept Vision Discovery . This car is fairly advanced . Because it can be controlled with the mobile phone as a remote control .
With Discovery Vision Concept , Land Rover wants to redefine the segment that has long been infiltrated by Discovery .
" And it's very appropriate that the 25th anniversary of Discovery 's see how this evolution will take us forward into the brave new era . Discovery Vision Concept gives us an amazing glimpse into a very exciting future ," said Phil Popham , Group Marketing Director , Jaguar Land Rover .
The design now looks very modern without leaving the impression of a typical masculine Land Rover and a roomy cabin .
Loose talk about the design , the main advantages of this concept car is a technology that is carried. Land Rover says that this is the initial map them to step into the future .
First there is the technology Human - Machine Interface ( HMI ) that is able to create a new multimedia experience for all passengers . With this technology , a phone call or a video can be displayed on the screen infotaiment .
Cool again , the whole glass used in this car has been using Smart Glass technology . So , like a touch screen , the glass in the window can be used to access a variety of things and can even be operated by Gesture Control .
Nama : QURROTUL AINY XI RPL 2
ReplyDeleteAMD Develops Program ' Never Settle Forever '
CALIFORNIA - AMD today updated the program " Forever Never Settle " , the famous game bundling program for the purchase of AMD Radeon products . Starting today , the promotion program " Never Settle Forever " will be more widely available for purchase AMD Radeon graphics card , graphics card includes up to R7 Series enthusiast class AMD Radeon highest R9 295X2 .
Through an official statement received Okezone , Friday ( 25/04/2014 ) , for the first time , the program " Never Settle Forever " will be available for the entry-level graphics card AMD : AMD Radeon 250X R7 , R7 250 and R7 240 . Programs " Never Settle Forever " is dedicated to gamers in selecting games most desirable renowned as a reward for buying a graphics card AMD Radeon .
Users can get up to three free games with a choice of AMD Radeon Reward coupons redeemed . The number of choices will depend on the type of gift , ie Gold , Silver or Bronze . " We are pleased to be able to develop programs ' Never Settle Forever ' which was so successful , like what we had last year promised by the Unified Gaming Strategy , " said Matt Skynner , corporate vice president and general manager , Graphics Business Unit , AMD .
" AMD's graphics technology , combined with our cooperation with game developers , demonstrated our leadership in the gaming industry . The latest games to be released Square Enix , " Murdered : Suspect Soul " , will be available for the program " Forever Never Settle " Gold and Silver Radeon through Rewards for the first time .
Optimized for Graphics Core Next architecture ( GCN ) , gamers can get a game code that can be claimed or redeemable when the game is released in June 2014. " Through ' Murdered : Suspect Soul ' , we continued cooperation between Square Enix and AMD . We are dedicated to bringing world-class experience for PC gamers and can not wait to launch our games in the AMD program ' Never Settle ' , said Naoto Sugiyama , executive producer , ' Murdered : Suspect Soul ' .
For the first time , AMD also include PC games from independent developers into the program " Never Settle Forever " as one of its options . Bundled with the name " indie pack , " gamers can choose the indie pack in which there are two independent gaming titles .
" We are very pleased to be presenting ' The Banner Saga ' as one independent games that will be offered in the AMD program ' Never Settle Forever ' . We are looking for a new audience of game titles for the AMD Radeon users around the world , " said Steve Escalante , GM , Versus Evil . ( ahl )
Nama : QURROTUL AINY XI RPL 2
ReplyDeleteAMD Releases New Processor Platform AM1
CALIFORNIA - Giant processor manufacturers , AMD , today announced the availability of a new platform AM1 globally . AM1 APU platform has a dual - core and quad - core processors code-named " Kabini " .
AM1 APU Platform with AMD Athlon and AMD Sempron will use the architecture of the Graphics Core Next ( GCN ) and the CPU cores ' Jaguar ' to the motherboard of a variety of hardware manufacturers . AMD Athlon 5150/5350 and AMD Sempron 2650/3850 offers the best computing for users with a platform that can be upgraded .
AMD Athlon and AMD Sempron present quad-core APU solution for users with two SATA 6Gbps ports , two USB 3.0 ports , eight USB 2.0 ports , PCIe 2.0 lanes for graphics cards , and three video outputs ( DisplayPort , HDMI , and VGA ) .
AMD platform is claimed to provide performance computing AM1 3-fold better than its competitors . This technology is also supported by DirectX 11.2 and Windows 8.1 OS .
" The new platform Sempron and Athlon provide price and outstanding performance with low power consumption that were previously not available in the market . We are pleased to see many mainboard manufacturers are ready to support the socket comprising FS1b microATX board and MiniITX to build an efficient system of PCs , " said Patrick Choy , Director of CPU Product Management , Newegg .
As is known , the Jaguar is a CPU technology found on gaming consoles PlayStation 4 and Xbox One . For the price varies , reportedly AMD 's latest APU sell at a price below $ 40 . ( ahl )
NAMA : QURROTUL AINY XI RPL 2
ReplyDeleteTechnology Supports AMD Graphics Quality PC Game
CALIFORNIA - AMD recently announced a new partnership with 2K Games to bring support API Mantle into the game Sid Meier 's Civilization ® : Beyond Earth . This technology to improve performance and quality graphics for AMD Radeon graphics card users .
Mantle is effective and efficient API which can improve performance for gamers to maximize multi-core CPU , simplifying and streamlining the code execution in the game , eliminating bottlenecks in virtual software , and take advantage of GPU capabilities with highly efficient .
" API API Mantle became the first and only proven -effective and efficient for gamers and developers , " said Ritche Corpus , director of ISV alliances gaming and AMD through its official statement .
He said that , the performance generated by the API as Mantle can be very powerful , especially for a game with a lot of display objects on the screen . " We are very proud to have worked closely with 2K Games Sid Meier 's game Civilization : Beyond Earth and present these advantages into a game franchise that is so beloved fans , " he explained .
Sid Meier 's Civilization : Beyond Earth is a sci - fi themed game from the latest Civilization franchise where players explore the world of bias , leads and bring their forces into new territories controlled by aliens and make a new life there . ( ahl )
Nama : Qurrotul Ainy XI RPL 2
ReplyDeleteIndonesian 5C 8GB iPhone Not Coming
Monday, 21/04/2014 09:04 pm
Jakarta - Apple has just launched another version of the iPhone 5C with an internal memory capacity of 8GB to a number of countries . From the list, there is no Indonesian name in it .
Apple announced the iPhone 8GB 5C to complement previous versions of 16GB , 32GB and 64GB . Although capacity is small , do not expect big price will be more affordable .
Because 5C 8GB iPhone is priced at USD 717 or about USD 7.3 million . Indeed USD67 cheaper than the 16GB version of the iPhone 5C . So that was quoted from MacRumors , Monday ( 04/20/2014 ) .
The countries that will be the arrival of the iPhone 5C ' Cheap ' is the Netherlands , Italy , Belgium , Sweden , Poland , Czech Republic , Ireland , Portugal , Austria , Spain . Norway, Finland , Denmark , Switzerland , Hungary and Luksembroug .
When viewed from the list of the country , the 8GB iPhone 5C is not intended for developing countries . But more to propel LTE mobile penetration in European countries .
IPhone 5C own fate is inversely proportional to his brother , the iPhone 5S . Plastic smart phones that are not selling well , even stock piled up in warehouses .
Apple iPhone 5C actually created in response to users who want to buy the latest iPhone at an affordable price , but it seems less well received .
NAMA : QURROTUL AINY XI RPL 2
ReplyDeleteGraphics Card 'Monster' Nvidia Gliding End of April
Jakarta - The presence of a dual-GPU graphics card Radeon R9-295x2 taken seriously by Nvidia. AMD's competitors also ensure 'monster' challenger already on store shelves by the end of this April.
Carrying the title GTX Titan-Z, offal graphics card 'monster' is composed of two GK110 GPU with 28 nm manufacturing in it. The combination of both thrusting 880 CUDA cores, 240 TMU, and 48 ROPs.
Memory capacity is also not kidding, immerse Nvidia GDDR5 chips with a total size of 12 GB, which is the sum divided by 2 for each core by 6 GB. As for its memory bandwidth is equal to 384 bits.
However, when compared to the Radeon R9-295x2 which combines dry and liquid cooling, graphics card Nvidia GPU conference was announced in last month's Technology is only equipped with dry cooling via fan large enough.
Even so, it actually leads to the swelling of Titan GTX-Z dimension, so that the user shall prepare a space that takes 3 PCI slots.
As quoted from VR-Zone, Friday (25/04/2014), although referred to already begin to be distributed throughout the world, Titan GTX-Z new plan will begin to enter the store shelves on April 28.
While the price offered to sign him is USD 2,999 or approximately USD 34 million.
The official price is much higher than the Radeon R9-295x2 offered by AMD of $ 1,499 or approximately USD 17 million.
Nama : QURROTUL AINY XI RPL 2
ReplyDeleteMicrosoft Bring Back the Start Menu In Windows Version 8.1 Updates to Come
exciting news for users of Microsoft's latest Windows Build Developers Conference 2014! Microsoft reportedly has just decided to bring back the presence of the Start menu on the Windows version of the upcoming renewal in its efforts to make the popular operating systems can be more in line with the operation of a desktop computer Yes, it is very reasonable, considering the recent one Microsoft representative named Terry Myerson have confirmed that the presence of the Start menu will soon be back in use. But as mentioned regarding when it will be realized, it unfortunately still reluctant to disclose it.
While such post what is exhibited from the above image on the Windows operating during the keynote, look look look Start menu that blends classic design latest with a modern twist, the second shows a list of installed applications, as well as live tiles display. Moreover, thanks to the existing central power options make it easier later on you can turn off or reboot the computer.
In addition, the same screenshot also shows that the users are welcome to start a Metro app in windows private itself, which indicates that the Microsoft is working hard to integrate modern UI with Windows desktop display on the upcoming renewal.
Nama : Qurrotul Ainy
ReplyDeleteADATA DDR4 RDIMM memory Presenting the latest in 3 Capacity
ADATA, which is a leading manufacturer of DRAM modules and high-performance products NAND Flash applications, has announced the launch of the new DDR4 module. In collaboration with Intel ®, ADATA has successfully developed and released DDR4 RDIMM (Registered ECC DIMMs) platforms that are fully compatible with the new generation of the product family of Intel ® Xeon ™ processor E5-2600 v3 which was recently launched.
DDR4 RDIMM memory products are available in capacities of 4, 8 and 16 gigabytes, runs at a voltage of 1.2 volts, and at a frequency of 2133MHz. Higher clock frequency, data transfer speeds are much faster, and the ability to operate at low voltages of DDR4 memory makes it suitable for use in the growing cloud servers, storage and other networking applications.
The following types of variations are available in a wide choice of capacities:
Specification
Type
Capacity
Tension
Frequency
Part Number
DDR4
RDIMM
4GB
1.2V
2133MHz
AD4R2133W4G15
DDR4
RDIMM
8GB
1.2V
2133MHz
AD4R2133Y8G15
DDR4
RDIMM
16GB
1.2V
2133MHz
AD4R2133Y16G15
Jacky Yang, ADATA Product Manager, said that ADATA is developing DDR4 version of ECC SO-DIMM, VLP RDIMM, and LRDIMM, so we hope to provide the stability and reliability of the ADATA you already know to work at low voltage while still giving performance high
Nama : Qurrotul Ainy
ReplyDeletePerform Algorithm Changes in Microsoft Windows Store, Downloadable Games No Longer Show Game At Most Downloaded
Microsoft is enacting a new policy related category in the Windows Store Top Games hers. The category now contains not many games played or downloaded Windows Phone smartphone users. Suddenly it was getting a lot of criticism from the developers.
Furthermore, Microsoft is quoted from WMPoweruser, also said in a memo that they did make a change. The determination of categories in the Windows Store is now done using the new algorithm, including the determination of categories among which are the Top Games.
According to the memo Microsoft impose a new assessment in determining the rating of a game. A rating factors include how often the game is installed on the Start Screen as well as how often the game crashes. With this assessment, it is a game or app most downloaded was not necessarily fall into the category Top Games.
Microsoft said the new imposition of a rating system is intended to provide satisfaction for users of Windows Phone smartphones. So the developers will compete to bring the game to give a good performance and high satisfaction for consumers.
Nama : Anisatul Khoiroh
ReplyDeleteKelas : XI RPL 2
Minggu ke-8
different types of wireless ( wi - fi )
Wireless Technology or wireless technology , or more often is abbreviated wireless electronics technology that operates without wires . Wireless technology can be used for communication , and control for example . For communication , wireless communication is known that the transfer of information , in any form , remotely without the use of cables such as mobile wireless computer networks and satellites .
Here are some of the wireless data connection technology that is widely used today :
1 . The WiFi 802.11g : a spectrum of the most widely used basis for addressing current issues surrounding connectivity , the technology is capable of transferring data up to a maximum speed of 54 Mbps , or about 6.75 MBps , ( why 54 turn out to be only 6.75 ? ? ? ? Simply see the article on the conversion Kbps to Kbps )
2 . 802.11n WiFi : WiFi technology is the fastest , because it can handle data transfer up to a maximum speed of 300 Mbps
3 . Bluetooth standard : most devices we often encounter in gadgets such as mobile phones or other electronic devices , has a maximum transfer speed of 3 Mbps
4 . The Bluetooth 3.0 : the next generation of Bluetooth standards above , this technology allows data transfer of up to 24 Mbps
5 . WiGig : read the article == > WiGig , hostspot superfast , to learn more about the WiGig
6 . Wireless USB : has a transfer speed of up to 110 Mbps within a radius of 10 meters , and at a radius of 3 meters , the speed is increased up to 4-fold , namely to 480 Mbps
7 . Wireless HD : This technology is specially for movie lovers or fans of high definition video ( High Definition ) , at a distance of 10 meters , up to 4 Gbps transfer speed , but in theory it could penetrate the transfer speed of 25 Gbps
8 . Zigbee : wireless technology is said to be the most standard power saving ( electric ) because it is able to handle data transfer with a small capacity , but this technology has the advantage , that can deliver fast response to an instruction , for example on the remote control .
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 8
Software Informer
Software Informer is a utility that has been designed specifically for those users who care to keep their applications functional and ready for any task that miarise. Its primary aim is to give you up-to-date information about the software you actually use. For that purpose, this program will make a list of applications installed on your computer, and later on will check their versions for obsoleteness by occasionally connecting to software.informer.com, the expanding server with a huge and constantly updated list of current application versions. Whenever a more recent version of any program becomes available, Software Informer will notify you and offer a link for downloading the update.
But this program goes even further. It will provide you with a centralized interface for gathering relevant information on all the applications that might interest you. Almost every program has a neat review, describing its features and drawbacks, and is linked to similar software by means of a tag cloud, encouraging you to explore and find just the right utility for your demands. Allowing you to keep track of comments and questions on corresponding software, and remaining nevertheless incredibly easy to use, Software Informer makes the process of obtaining the desired information and tools completely free from tiresome search and disappointment - and thus, makes the whole process pleasantly usual.
What's new in this version: Added: program launcher; voting mechanism; site search from within the program; quick buttons for accessing questions and comments on each program. Tabulated interface changed.
muhammad safreza
ReplyDelete11 RPL 2
TUGAS MINGGU 8
Objects in Java:
Let us now look deep into what are objects. If we consider the real-world we can find many objects around us, Cars, Dogs, Humans, etc. All these objects have a state and behavior.
If we consider a dog, then its state is - name, breed, color, and the behavior is - barking, wagging, running
If you compare the software object with a real world object, they have very similar characteristics.
Software objects also have a state and behavior. A software object's state is stored in fields and behavior is shown via methods.
So in software development, methods operate on the internal state of an object and the object-to-object communication is done via methods.
Classes in Java:
A class is a blue print from which individual objects are created.
A sample of a class is given below:
public class Dog{
String breed;
int age;
String color;
void barking(){
}
void hungry(){
}
void sleeping(){
}
}
A class can contain any of the following variable types.
• Local variables: Variables defined inside methods, constructors or blocks are called local variables. The variable will be declared and initialized within the method and the variable will be destroyed when the method has completed.
• Instance variables: Instance variables are variables within a class but outside any method. These variables are instantiated when the class is loaded. Instance variables can be accessed from inside any method, constructor or blocks of that particular class.
• Class variables: Class variables are variables declared with in a class, outside any method, with the static keyword.
A class can have any number of methods to access the value of various kinds of methods. In the above example, barking(), hungry() and sleeping() are methods.
Below mentioned are some of the important topics that need to be discussed when looking into classes of the Java Language.
Constructors:
When discussing about classes, one of the most important sub topic would be constructors. Every class has a constructor. If we do not explicitly write a constructor for a class the Java compiler builds a default constructor for that class.
Each time a new object is created, at least one constructor will be invoked. The main rule of constructors is that they should have the same name as the class. A class can have more than one constructor.
Example of a constructor is given below:
public class Puppy{
public Puppy(){
}
public Puppy(String name){
// This constructor has one parameter, name.
}
}
Java also supports Singleton Classes where you would be able to create only one instance of a class.
Creating an Object:
As mentioned previously, a class provides the blueprints for objects. So basically an object is created from a class. In Java, the new key word is used to create new objects.
There are three steps when creating an object from a class:
•Declaration: A variable declaration with a variable name with an object type.
•Instantiation: The 'new' key word is used to create the object.
•Initialization: The 'new' keyword is followed by a call to a constructor. This call initializes the new object.
Example of creating an object is given below:
public class Puppy{
public Puppy(String name){
// This constructor has one parameter, name.
System.out.println("Passed Name is :" + name );
}
public static void main(String []args){
// Following statement would create an object myPuppy
Puppy myPuppy = new Puppy( "tommy" );
}
}
If we compile and run the above program, then it would produce the following result:
Passed Name is :tommy
Accessing Instance Variables and Methods:
Instance variables and methods are accessed via created objects. To access an instance variable the fully qualified path should be as follows:
/* First create an object */
ObjectReference = new Constructor();
/* Now call a variable as follows */
ObjectReference.variableName;
/* Now you can call a class method as follows */
ObjectReference.MethodName();
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-7
working expedite the Mozilla Firefox browser
Method 1 :
Open the Mozilla Firefox browser .
Type ' about: config ' in the address bar , then press enter .
Page down until you find the phrase ' browser.tabs.showSingleWindowsModePrefs ' , then double click it so the settings to ' true' .
Lower the Firefox page again until you find the line reads ' network.http.pipelining ' , then double click it so the settings are also to be ' true' .
Finally, down another Firefox page and look for the line that reads ' network.http.pipelining.maxrequests ' , then double click it . You will be treated to a pop -up window . Change the number in the pop up it to 60 . Then press 'Ok ' .
Close Firefox and then try to reopen . If there are no problems , you will open Firefox 10-40 percent faster than ever with the steps as above .
Method 2 :
Another effectual measures to improve the speed of Firefox is to use an add -on for Firefox called FasterFox . This FasterFox make more effective use of bandwidth so it can accelerate the performance of Firefox . You can download FasterFox at address : http://fasterfox.mozdev.org .
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-8
combines split RAR files
sometimes when we want to download a big file, we certainly never come across a file that is split into several parts. nah how to combine them to save a winrar keta. how
First select the file. Rar that in its earlier part, can be a way to block or single left click while holding down the ctrl button as shown below.
then right click and select "Extract to".
then automatically file. already extracted zip into one folder.
Now the file is the result of the extract files part1, part2, part3 and so on.
Thank you ^ _ ^ hopefully help
Firdaus Akbar Maulana
ReplyDeleteXI RPL2
tugas mingguan
minggu ke-9
the origin of the hackers
When turbulence reform of 1998 , some sites also burglarized for messages posted hatred . Similarly, when some of the border dispute between Indonesia and Malaysia , hackers from both countries compete with each other to attack smart .
Entering the 2000s , the activities of the hackers increasingly fierce . Site German radio Deutsche Welle on August 4, 2011 reported the existence of 70 multinational companies , governments , and the world's most important institutions are victims of hackers . Among the site's name in the list of victims include ASEAN , UN , Sony , Citigroup , the U.S. government , Taiwan , and so on .
U.S. Deputy Defense Secretary William Lynn also admitted that hackers hacked Pentagon data storage system . Rows of these hackers managed to take 24 thousand documents , some of which could be classified as confidential .
Increasingly vicious attacks by hackers create some state governments create a special task force to combat that . Beginning in 2010, the hacker has been declared by some countries as a new -style terrorism in cyberspace . Although physically not lethal , hacker attacks can destroy data stored in the system computer network belonging to the victim .
How to actually beginning the hackers appeared in the world ? According to the article contained in the website belongs to the University of Utah , USA , has become a popular hacker activity between the 1950s until the 1960s . At that time some college students Massachussets Institute of Technology ( MIT ) tried to explore the telephone network and control system in the Tech Model Railroad Club . They managed to get into the network system .
The student group became the first generation of hackers in the world . Those include the first generation of the legendary hacker , among others, Peter Deutsch , Bill Gosper , Richard Greenblatt , Tom Knight , and Jerry Sussman .
Not only at MIT , as the development of computer technology , the hacker activity was transmitted to other campuses , such as Carnegie Mellon University and Stanford University . The Stanford AI Lab even ( SAIL ) , is headed by John McCharty later became the center of hacker activity on the west coast of America. The second generation of the legendary hacker until the 1990s that , among others, Brian Reid , Brian Kernighan , Ed Fredkin , Richard Stallman , Jim Gosling , and several other names .
The third generation of hackers have a healthier work program . They generally are a fan modification of electronic devices . They do not just want ' mengulik ' software , but also want to make their own hardware. Of ideas they then rapidly growing computer . They can be classified as a hacker in the third generation of this legendary among others , Bill Gates , Steve Jobs , Steve Wozniak , Lee Felsenstein , Steve also Dompier .
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE-8
Many problems that occur in the process of installing a dual boot Windows 8 and ubuntu is . Error on Ubuntu Grub and Grub Windows . There are also straight into windows without any option to enter into ubuntunya .
Some time ago I tried to install a dual boot ie Windows 8.1 Preview and Linun Ubuntu 13:10 and Alhamdulillah issue does not occur at all .
Please know wondows 8 system already using GPT partition system when you install via a CD / DVD of this process will run its course and partition in Windows 8 will automatically convert from MBR to GPT . Serch in google MBR and GPT partition difference .
I conclude bahwasannya Linux Operating Systems will read well GPT partition format and therefore will facilitate us to begin the process of installing a dual boot Windows 8 and Ubuntu .
Install Windows 8.1 in UEFI Boot
The first and most important is to install windows first so that the process can be understood linux system . In order for Windows 8 can be read properly in linux , use UEFI boot mode ( EFI ) if you 're used to install windows you will definitely get used to this process . How to access the BIOS and select to install the UEFI boot mode .
Perform the steps as usual you install Windows .
Install Dual Boot Windows 8.1 and Ubuntu 13:10
My assumption is assumed that you have already finished installing Windows 8.1
Now its time to install Ubuntu ..
Make sure there is space in the new partition that will be used to install linux . The goal for the system to boot Ubuntu on Windows 8.1 and its not clash . And I suggest to make the space above the partition of 20GB . In this tutorial I will make pasrtisi for 23GB
1 . Log into the BIOS and select another boot with the UEFI boot mode .
2 . Then you will be faced with two options, namely Try Ubuntu and Install Ubuntu
3 . Select Try Ubuntu to see the features of ubuntu and install Ubuntu to mengistall
4th . Do not be confused because they both wrote but untu make it easier to select Try Ubuntu option because it would mmudahkan us to see the first feature will be installed
5.The you are sure to mengintall ubuntu , just select Install Ubuntu , it will look like the image below
6 . Click Continue to proceed
7 . If you can not find the Install Ubuntu alongside Windows 8 do not panic , my select something else .
8 . At this point , it would seem that the partition you created earlier
9 . Till this stage on a large 25GB Partis before we will make another partition into 3 , namely the Home partition , for linux swap partition and a partition to boot
10 . Firstly we will make the first partition to his home , see figure
11 . Then for the rest of this partition into a linux swap and / boot , see figure
The process of creating a partition for ubuntu linux we have created , now is apaling important thing , remember the Linux operating system and windows operating system has Grub 8.1 , respectively , so as not to clash with the Ubuntu Grub Grub Windows 8.1 then follow these steps , see figure
Hover your cursor where you 're home partition , home partition on the image I created is on partition / dev/sda7 checkbox / dev/sda7 .
Look again at the / boot partition , this is the partition where the system is installed the Grub boot linux or if you ignore this then your computer will fail to boot into Windows or to Linux . Then point the cursor back to the / boot partition is located , the example that I made was on the partition / dev/sda9 and check the box
The last and most important , at the very bottom there is an inscription Device for boot loader installation , select where Parisi / boot you 're in the example lies in the partition / dev/sda9 .
Okay selanjunya you can simply press the Install button now , and wait until the installation is complete .
Maybe something like that how to install a dual boot windows and ubuntu 8.1 13:10 , Good Luck .
Nama : faisal amirullah
ReplyDeleteKelas : 11 RPL 2
Ke : 1
1 . IDE
IDE ( Integrated Drive Electronics ) is a standard interface between a computer motherboard data bus with disk storage . IDE interface created by the IBM PC Industry Standard Architecture ( ISA ) 16 - bit bus . IDE interface is an interface for storage devices that can teringrasi to disk or CD - ROM drive . Although IDE is a general technology , most people use the term to refer to the IDE ATA specification . While the AHCI ( Advanced Host Controller Interface ) is a hardware mechanism that allows software to communicate with such SATA host bus adapters are designed for hot - plugin and native command queuing ( NCQ ), which can increase the ability of computer / system / hard disk , especially in a multi- tasking environment by allowing the drive to run the read and write commands are sent at random with the aim to optimize head movement in the reading process . AHCI has been supported by various operating systems such as Windows Vista and Linux kernel 2.6.19 .
2 . ATA
Most types of drives used by computer users is the type of ATA ( known as IDE drives ) . Type ATA standard created by 1986 by using 16-bit parallel and continues to grow with the addition of transfer speed and the size of a disk . Final standard is ATA - 7 was first introduced in 2001 by the T13 committee ( the committee responsible for determining the standard ATA ) . Type ATA - 7 has a data transfer rate of 133 MB / sec . later during the year 2000 set a standard for parallel ATA which has a data rate of 133 MB / sec , but there are problems with parallel ATA singnal things thymine , EMI ( interference electromognetic ) and intergitas data. Then the industry in trying to resolve the problems caused by the parallel ATA and created a new standard called Serial ATA ( SATA )
ATA ( Advanced Technology Attachment ) using a 16-bit parallel computer used to control the equipment , and has been in use for 18 years as the standard . Differences SATA and ATA easiest data cable and power is different .
ATA standards , such as the 200GB Western Digital model , have a two -inch ribbon cable with 40 pin data connections and requires 5V to each pin of the 4 pin connection . While the 120 GB SATA such as Digital western half inch models have wide , 7 connector so that the data connection is thinner and easier to organize data kebel . SATA data cable has a maximum length of 1 meter ( 39.37 inches ) longer than the ATA is only 18 inches .
3 . SATA
With 15-pin SATA power cable with a 250 mV , seems to require a lot more power in comparison with the 4-pin ATA , but in fact the same . And most good SATA capability is perhaps reaching a maximum bandwidth of 150 MB / sec
Other advantage of SATA is SATA is made with hot-swap capability so that it can turn off and turn on without shut down the computer system .
While in the price , a little more expensive SATA drives compared ATA drives , SATA kesimpulanya have advantages over ATA connector, power , and most importantly performance. ATA standard has now started on the left and choose the manufacturer of the SATA standard .
Since 2005 , Computer Engineering Department has been offering classes in Akfırat Okan University campus , where students can take advantage of state - of-the - art computer lab and learn from faculty growing body consisting of leading academics .
ReplyDeleteOur program is designed to pass the computer engineers who are able to cope with reality , expectations , and requirements they face in their careers . Educated by academic staff who are experienced and qualified , students are encouraged to apply the knowledge they acquire . For this purpose , for example , juniors and seniors have the opportunity to work on real projects in the Computer Research and Application Center .
We believe that , thanks to the theoretical knowledge and practical skills , our graduates will be at the forefront of the information technology world , as favored employees and trailblazers alike .
Department Chair 's Message
" Okan University Computer Engineering Department first opened its doors for students in the 2005-2006 academic year our department , . With a faculty of qualified and experienced academics , the curriculum has been specially designed in collaboration with a panel of expert information systems , to meet the requirements of today's world . Curriculum we ensure that students are kept abreast of the latest developments in the field and prepare them for professional life .
Not only in Turkey , but throughout the world , the need for qualified computer engineers continues , and we know that computer -based technology is what brings to life the process of globalization . In this process , it is essential not only to obtain a sound technical knowledge , but to learn a foreign language juga.Oleh Therefore , our students are encouraged to learn a second foreign language other than English , so that when they graduate from Okan , they will be much better prepared for worked as a computer professional anywhere in the world , and to interact with the world .
Since the 2005-2006 academic year , Computer Engineering Department has been offering classes in Akfırat Okan University campus , where students can take advantage of state - of-the - art technology and computer labs and learn from faculty growing body consisting of leading academics .
I believe that successful careers await graduates Okan University Computer Engineering Department , provided that they have the determination and the will to pursue them . Our graduates will inevitably play an important role in meeting the needs of information systems both today and tomorrow , and I wish them all the
nama : faisal amirullah
kelas :11 Rpl 2
ke :2
best of luck in their efforts to that end .
Prof. Dr. B.Tevfik Akgün
chairman
Computer Engineering Department
nama : Choirul anam
ReplyDeletekelas : XI Rpl 2
ke :1
Memory RAM is a functioning electronic device for storing computer data that is temporary , and only works when the computer is on course . RAM structure is divided into 4 sections , namely :
Input storage , serves to accommodate the input or the input is entered from the input device .
Storage Program , part of the RAM that serves as a store instruction program to be accessed .
Working Storage , a part of the memory that is in charge of storing data to be processed and the results of processing .
Output Storage , serves to accommodate the final results of the data to be in tapilkan to the output device .
developments RAM
At this time RAM has developed very rapidly along with the development of computers , ranging from form , the model and capacity of the RAM itself. RAM is one very important component to the computer because the capacity of the RAM access speed is very influential on the computer , so the greater the capacity of the RAM then the faster the access speed of the computer . Here is the development of the RAM to date:
SDRAM ( has a pin number 168 and there are 2 slits section legs used for computers Pentium I to Pentium 4 older models . RAM already encountered this type anymore because it has been replaced with a new model of RAM )
Ranbus RAM ( RAM that is used for computer pentium IVyang already has 2 channel facility )
Sybclink DRAM ( RAM which has a maximum bandwidth of 1600 MB / sec and has a speed of 200 MHz . )
DDR and DDR 2 RAM ( RAM is having a pin number 183 and there is only one opening on the leg and has a transfer speed 2 times faster than SDRAM . )
DDR 3 RAM ( RAM DDR 2 latest generation after that has more speed in comparison with the previous DDR type . )
The things that must be considered when installing RAM :
Make sure the RAM slots on the motherboard accordingly.
Be careful when installing the RAM in the RAM slots , let alone the type of SDRAM because if something goes wrong or upside down at the time of installation , the RAM can be broken .
Do not forget to open the lock of RAM before installing the RAM in the RAM slots
Once installed RAM RAM do not forget to lock the lock RAM .
nama :Choirul anam
ReplyDeletekelas :XI rpl 2
ke :3
IDE slot I ( Primary ) function for the hard disk to the motherboard menghububgkn
• Slot IDE II ( Secondary ) serves to connect the CD ROM / DVD ROM to Motherboard
• FDD slot serves to connect the floppy disk with the motherboard
• Baterry C_MOS ( complementary metal - oxide semiconductor ) syncronisasi signal system serves as a real time clock ( RTC )
• BIOS ( Basic Input / Output System ) is a program that serves the interface between the operating system with the motherboard
• Port I / O ( Input Output Connector )
• Port PS2 Mouse type serves to attach the mouse
• PS2 type keyboard port is used to attach the keyboard
• Parallel Port serves to set up the printer
• The USB port is used to attach additional types of USB devices
• Port series serves to connect the monitor using the onboard VGA
• VGA port for connecting a monitor function that uses a VGA card
• The LAN port is used to attach the RJ 45 konector
• Port Sound function to install additional devices such as headsets , speakers , and microphon
Okay , that's my knowledge about hardware mainboard and its parts . May be useful for those who read and who are looking for articles for the report or the like . Successful greeting bro bro and sis .
- See more at : http://muhammadfajarsaputro.blogspot.com/2013/10/pengertian-mainboard-dan-fungsi-mainboard.html#sthash.CaMmIyQE.dpuf
Here are the components on the motherboard and their functions :
ReplyDelete1 . Slot memory :
serves as a place of DDR2 memory .
2 . Socket Power 24- pin :
function to connect to a power supply to power the motherboard .
3 . Socket Power 4 pin :
serves to power the CPU / Processor
4 . Batteries BIOS :
serves to supply power to the BIOS chip when the computer is turned off .
5 . Slots PCI :
serves as additional cards such as sound cards , internal modems , LAN cards , TV tuners , and other components that match or to have a PCI slot .
6 . Chipset BIOS :
nama : choirul anam
kelas :XI rpl 2
ke : 5
serves to set the date , month , year , hours , hard drive , DVDROM , boot device and others.
7 . Chipset Northbridge :
serves to organize the data from the CPU , memory and PCI express slots .
8 . Chipset Southbridge :
serves to regulate data storage devices , output devices and input small data transfers .
9 . Socket IDE :
function to connect to the hard drive and DVD ROM drives . The data transfer rate 133 MB / s .
10 . Socket FDD :
function to connect to a Floppy Disk Drive .
11 . The Front Panel Connector :
serves to connect the wires in the casing as the power button , restart , power light , hard drive light , a USB port in the front of the chassis , speaker and microphone ports .
12 . The Standby Power LED :
This LED is lit when there is standby power on the motherboard . This LED acts as a reminder ( reminder ) to shut down the system power before turning on or turning off the engine .
13 . Socket SATA :
serves to connect the hard disk and DVD ROM drives . The data transfer rate of 150 MB / s .
14 . Slots AGP :
serves as a VGA card .
15 . Slot ISA :
function is almost the same as the PCI slot .
16 . Slots AMR :
functions as a modem and other components to have a slot like AMR slot .
17 . The Port PS / 2 :
functions as a mouse ( green ) and the keyboard ( purple ) .
18 . The Port RJ - 45 :
serves as a connector to connect the LAN via a central
the network .
nama :Choirul anam
ReplyDeletekelas :XI rpl 2
ke :6
Definition Hardware
Definition of the hardware or in Indonesian called by the name of the hardware. The hardware is one component of a computer tool that nature can be seen and touched by humans directly or in the form of real , which serves to support the computerization process .
Hardware can work based on predetermined order , . With the commands that can be understood by the hardware , then the hardware can perform a variety of activities that have been determined by the command .
Hardware names and their functions
Based on the function , the computer hardware is divided into :
1 . Input divice ( input unit )
2 . Process device ( processing units )
3 . Output device ( output unit )
4 . Backing Storage ( storage units )
5 . Peripherals ( additional units )
basic components of a computer consisting of input , process , output and storage . Input device consisting of a keyboard and mouse , the device is a microprocessor ALU Process , Internal Communication , and Control Registers section ) , output device consisting of a monitor and a printer , external memory storage consists of a hard drive , floppy drive , CD ROM , magnetic tape . Storage internal memory consists of RAM and ROM . While the Peripheral Device component is an additional component or as a component that does not exist or did not exist before . The Peripheral Component example : TV Tuner Card , Modem , Capture Card .
nama :Choirul anam
ReplyDeletekelas : XI rpl 2
ke : 7
Unit Input ( Input Devices )
This unit serves as a medium for data entry from outside to inside a memory and a processor for processing in order to produce the required information . Input devices or input unit which is generally used personal computer ( PC ) is a keyboard and mouse , keyboard and mouse is the unit that connects the user ( users ) with a computer . In addition there is a joystick , which is used for playing games or computer games . Then the scanner , to take pictures as digital images that can later be manipulated . Touch panel , with the touch of a finger using a user can access the file . Microphone , to record sounds into the computer .
Serves as a media input device for entering data into the system from external memory and a processor for processing and generating the necessary information . Data is entered into the computer system can form the input signal and maintenance input . Signal input form data entered into the computer system , while maintenance program input form used to process the data entered . So the input device is also used to enter the data can also be used to enter the program . By its nature , the input devices can be classified into two general categories :
• peratalan direct input , the input is entered directly processed by the processing equipment . For example : keyboard , mouse , touch screen , light pen , digitizer graphics tablets , scanners .
• Equipment indirect input , input via a particular media before an input is processed by the processing equipment . For example : punched cards , floppy disks , hard drives .
Unit of input or input device is composed of several kinds of devices , namely :
nama : Choirul anam
ReplyDeletekelas :XI rpl 2
ke :8
A. Keyboard
Keyboard input is the most important unit in a data processing by a computer . Keyboard function can enter letters , numbers , special characters as well as a medium for the user ( users ) to perform other commands are required , such as saving a file and open the file . The creation of a computer keyboard comes from the model of typewriter invented and patented by Christopher Latham in 1868 , and in 1887 the company manufactured and marketed by Remington . The keyboard on the use of now this is the kind QWERTY , in 1973 , was unveiled as a keyboard standard keyboard ISO ( International Standards Organization ) . The number keys on the keyboard keys numbered 104 . Keyboard now that we know has some kind of port, the serial port , ps2 , usb and wireless .
qwerty keyboard
Types of Keyboard :
1 . ) QWERTY
2 . ) Dvorak
3 . ) KLOCKENBERG
Keyboards are typically used is a QWERTY type keyboard , which is similar shape as keys on a typewriter . The QWERTY keyboard has four parts:
1 . Typewriter key
2 . Numeric key
3 . Function key
4 . Special function key .
nama : Choirul anam
ReplyDeletekelas :XI rpl 2
ke :9
Mouse is one unit of input (input device). The function of this tool is to transfer a pointer or cursor quickly. In addition, the command can be as practical and faster than with a keyboard. Mouse began to be used to its full potential since the operating system has been based GUI (Graphical User Interface). electrical signals as a mouse input device is generated by a small ball inside the mouse, in accordance with the shifting or movement. Most of the mouse consists of three buttons, generally only two buttons used are the left and right buttons. When the mouse is also equipped with a winder button (scroll), where the location is situated in the middle button. The term referred to the keystrokes left click (Click) where the emphasis is going to function when the mouse is on the object designated, but when not on the object designated emphasis will be ignored. There are also other terms called the shift (drag) is pressing the left mouse button without releasing the while being moved. This drag will cause the object to be moved or copied to other objects and other possibilities. The emphasis of the left mouse button twice quickly and regularly referred to as a double-click (double click) while pressing the right mouse button one time referred to as right-click (right click) Mouse port that is composed of several serial mouse, mouse ps / 2, usb and wireless .
mouse
Wireless Mouse
C. Touchpad
Enter this unit can usually be found on laptops and notebooks, using the touch of a finger. Normally this unit can be used as a substitute for the mouse. In addition to the touchpad is a model that is similar units enter a pointing stick and a trackball.
Touch Pad
Touch Pad Track Ball
Pointing Stick
D. Light Pen
Light pen is used for electronic pointer modification and to design a picture with the screen (monitor). Light pen has a sensor that can send light signals to a computer which then recorded, wherein the display monitor works with any electronic signal recorded six lines per second.
nama : Choirul anam
ReplyDeletekelas :XI rpl 2
ke :10
Joy Stick and Games Paddle
It is usually used in the game ( games ) computer . Joy Stick is usually shaped rod , while the paddle games are usually square or rectangular plastic equipped with buttons that will govern the motion of an object in a computer .
F. Barcode
Barcode included in the input units ( input device ) . The function of this tool is to read a code shaped boxes or thick vertical lines are then translated in the form of numbers . These codes are usually attached to food products , beverages , electronics and books . Today, every cashier in a supermarket or supermarkets in Indonesia to identify the product it sells with a barcode .
sample barcode
Barcode image
G. Scanner
Scanner is a tool that can serve to make a copy or copy images or text which is then stored into the computer memory . The next available computer memory , stored in the hard disk or floppy disk . The scanner function is similar to a copy machine , photocopiers difference is that the results can be seen in the paper while the scanner results can be displayed via the monitor in advance so we can make improvements or modifications and then be stored back in the form of a text file or an image file . In addition there is also an image scanner to scan commonly used to detect the computer answer sheet . Scanner is used to scan a computer answer sheet is commonly used IR SCAN for LJK ( Computer Answer Sheet ) on general tests and the National Exam . Scan this type consists of light called optical sensor , which can recognize the type 2B pencil . Scanners on the market is a scanner to copy a picture or photo and usually also equipped with OCR ( Optical Character Recognition ) to copy or copy objects in text form .
Nama : Faisal Amirullah
ReplyDeleteKelas : 11 rpl 2
tugas mingguan ke 4
Installing Windows 7 Easy Ways to Figure - Windows is an operating system released by Micrsoft . There are many other systems besides Windows operaing , for example, just linux , mac , and others . Well this time I will give a tutorial or guide to install windows 7 on your computer or laptop . Okay , here are the steps ,
1 . Prepare the installation CD that you have purchased from Microsoft
2 . Upon the entry into the bios of your laptop or computer , then change the first boot to CD / DVD
3 . For how to change the first boot , please read the article about Boot Order
4 . Exit the bios , then press any key to boot from CD . If the article does not come out like that , then setting the boot order of your problem .
5 . Wait until after the windows loading files with perfect
6 . Choose the language , currency format and input keyboar
7 . Click Install Now
8 . Comes Accept Terms license . Tick the ' I Accept ' and then click next
9 . Which type of installation do you want ? , In this section select the second , namely the Custom
10 . Choose the partition where you want to install windows , local disk c is usually a top ( if the above is only 100MB in size means a local disk c is below ) .
11 . Log option and format the drive to advance local disk c so that files are long gone .
12 . Important , if you do not format the disk to another , eg disk D , E and so on , then your files will not be lost , so you can do the install windows without losing the data on the D , E etc.
13 . If you have selected a disk , click next
14 . Then wait for the installation hinga
15 . After that your computer will restart a few times , just wait
16 . Choose a username and computer name , click next
17 . Choose a password , click next to skip
18 . Enter the serial number , click next to skip
19 . Choose the update option , select ask me later if you want to manually update
20 . Set the date and time of your computer
21 . Congratulations , Windows already installed
22 . The last step is simply to install the drivers of your computer , ranging from vga , chipset etc. . All drivers contained in the cd when you buy a laptop / computer motherboard
NAMA :ARIO WIBOWO
ReplyDeleteKELAS :XI RPL 2
How to install a laptop
1 . Enters Into bios menu , then select the boot menu , make sure the boot device is in the first position is a CD / DVD ROM , so that when the boot directly to the Windows CD to install the laptop and then resume the way .
2.Masuk to Advance menu and then select SATA mode ( usually the name is different )
SataAchi : laptop to install Windows Vista or 7
IDENATIVE : laptop to install Windows Xp
4.Kemudian select save and exit , do not forget to enter its Windows CD then restart !
5.Tunggu few moments until it says boot from cd press any key to enter ( the Enter key can also : D ) will be the load dr cd !
6 . Upon completion blue screen will appear with 3 options , just hit enter .
how to install the laptop go to step 7
7.setelah the Press F8 to accept the license .
9.Tekan C to create a new partition on the hard drive and Enter to install .
10 . Input number on the hard drive will be ( suggestions for just being half - half )
11 . Then press enter and select NTFS file system ( Quick ) or FAT file system ( Quick ) and press Enter .
12 wait a few moments was because windows is copying the installation files to the hard drive . if it will restart itself
13.Anda has successfully Knowing how to install laptop so far , now enter your name and organization and then next
14.Masukan Code serial number of your windows .
how to install laptop
15 . Organize your passwords
16 . Adjust the time settings of your computer !
17 . Tara you managed to fully know how to install a laptop .
how to install laptop complete
it easy to install your new laptop . hopefully this article useful way to install laptop ..
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE-9
How to Install and Use In Fuel Computer , PC , Laptop :
1 . BBMan Steps in preparation for Laptops :
a. Download the Android SDK
b . Download BBM 1.0.0.72 For Android APK
2 . Steps Step Install and Uses Fuel Via Laptop / PC
a. The first step , please download the first 2 files I provided above , having just finished downloading the Android SDK you extract files that you have downloaded .
b . Go to the folder that already extract and run the files are located inside the folder Eclipse.exe eclipse .
c . In eclipse , you just click the window and move to the Android Virtual Device Manager
d . Then click " New "
e . Later on AVD menu , fill in all the columns as you wish and you , as an example you can see in the image below :
install- bbm - laptop
f . Next please move the bbm application for android.APK into the folder [ foldername ] / sdk / platform -tools /
g . Furthermore, you stay open windows command prompt ( CMD ) and navigate to the folder [ foldername ] / sdk / platform -tools / adb install then type [ namaaplikasibbm ] . Apk . Look at the image below:
Android BBM For PC
h . After the 7th process , your application has been successfully installed fuel in the Virtual Device runs on a computer / laptop .
i . Have you run / Start Virtual Device fuel and run the application already installed on the laptop / computer is .
In addition to the bbman in laptop / computer above , there is one more way to install and run applications bbm on your laptop / PC. The next way is according to several friends who have tried it does look much simpler than how to install bbm on pc / laptop first . For details steps it please you check it .
How BBMan In Computer , PC , Laptop Using Genymotion :
1 . Preparation
a. Download Genymotion
b . Download VirtualBox
c . Install virtualbox its application to completion , followed by installing the application Genymotionnya .
2 . Steps Installing and Running the fuel in the PC / Laptop
a. Register a new user to run the application Genymotion ago . Please register to http / / : www.genymotion.com
b . Once you have an account genymotion , you just open it and select Add Device to its mobile virtual . Here, please login using the ID you have registered in step 1 .
c . Select the device in accordance with the smartphone you want .
d . After that , you will go to the Play Virtual Device . Well here you will be asked the location of the android SDK folder directory . For those of you who do not have it , please download here .
e . After the above process goes wrong , you just go ahead and install the application BBM.Apk ( bbm for android ) that you have downloaded on google play store .
f . Beres , once, you run the app bbm for android on your laptop and enjoy the way bbman in computer / pc with the two steps above .
ReplyDeletefaisal amirullah
tugas minggu ke 6
How to Install Visual Basic 6 in Windows 7 ( Compatibility )
Actually, Visual Basic 6 was produced in 1998 and for Windows 98 , but great up to now in 2012 and had its time windows 8 is still a lot of fans . But unfortunately this already VB6 is not supported anymore since Windows7 , so when you install in Windows7 will appear warning / alert like this :
But you do not need to worry , you simply press the " Run Program " to continue the installation . After a successful installation there are several configurations that must be done so that the VB6 benar2 Run Well in Windows7 , ie by changing its setting compability to Windows7 . The trick is :
1.Open the folder C : \ Program Files \ Microsoft Visual Studio \ VB98
Right 2.Klik in VB6.EXE , select Properties , select Compatibility , Select / Checklish " Run this program in compability mode for : " and select Windows 7 , then OK
Next, I used the OCX complement NOT installed automatically during the installation of VB6 , the way he is :
Open the master folder to the installation folder VB6 and this :
... \ Microsoft Visual Basic 6.0 Professional \ COMMON \ TOOLS \ VB \ CONTROLS \
Then copy all the OCX files that are there ( see below ) to the C : \ Windows \ System32 \
ANIBTN32.ocx
DBGRID32.ocx
GAUGE32.ocx
GRAPH32.ocx
GRID32.ocx
KEYSTA32.ocx
MSCHART.ocx
MSOUTL32.ocx
SPIN32.ocx
THREED32.ocx
Then Run ( double click) . Components of the Reg folder ( ... \ Microsoft Visual Basic 6.0 Professional \ COMMON \ TOOLS \ VB \ CONTROLS \ )
DBGRID.reg
MSCHART.reg
VBCTRLS.reg
After you install the Update Service Pack 6 ( SP6 ) and Cumulative Update SP6 again to further refine your VB6 . If there is still curious , you should run the compability settings as above for the second time . Furthermore HAPPY CODING ! ! ! !
Tags :
install vb6 in win7 , how to install vb6 on win seven , VB6 does not support Windows 7 , VB6 runtime in Windows 7 , so VB6 run well in Windows 7
Google Translate for Business:Translator ToolkitWebsite TranslatorGlobal Market Finder
Yuni anggarawati (XI RL 2)
ReplyDeleteTroubleshooting When Flash Disk Full / Full but File Not Seen / Missing
Never experienced anything like this , Flash Disk when the check turns out there is no file that looks but why practically full (full ) when we saw the flash disk capacity .
If you have never experienced such means as the action of the virtual world in civilian VIRUS that to hide the files that are on flash disk.Sebenarnya yaa ... why ? Okay .. I'm debating here yaa ..
Actually quite simple to handle . let's follow this tutorial in simple steps to restore the files that do not appear in the following flash disk .
First run the Command Prompt by clicking Start , Run and type CMD then ENTER or can be by clicking Start , All Programs , Accessories , Command Prompt .
But before make sure that Flash Disk built- in USB port on your computer's CPU .
Once Flash Disk is already installed and you are already in the Command Prompt , then more rare type DOS commands at the command prompt with the command format is :
c : > F : ENTER
Order above is the command to move from drive C ( hard drive ) to drive F , assuming that the flash disk drive is drive F
f : > DIR / ah ENTER
The above command does is show the files with A = H = Hidden attribute up the hidden files can be viewed , including all folders .
Having seen the file , the file is then further transfer the files to another folder on your hard disk that can read how this type the following command :
before me copy the files , create a new folder in advance with the following command :
f : > MD C : ENTER DATABACKUP
Order to create a new folder or directory on drive C , when you want to create a folder on the D drive then change the order to:
f : > MD D : DATABACKUP ENTER
By order of the above then a new folder with the name DATABACKUP already done on drive C or drive D.
Once the details of which follow the following commands :
f : > COPY * . * C : ENTER DATABACKUP
with the above order then all the files located in the flash disk into drive C has tercopy DATABACKUP folder .
Until there is not over when you have some folder in flash disk, because the order of copying the folder but can not just file away.
Well if it's easy to let the folder then you have to remember the name of the folder in flash disk (if you forget the fear in record time ) after performing a command DIR / ah so that later can be opened in Windows Explorer .
To do this login to windows explorer after the address selected drive f ( flash disk drive , then still at the address type the following command
\ namadirectori ENTER. (eg \ DATA then press enter)
In order then all the file is in the folder will appear . If you do not see as well try the Tools menu , click Folder Options , and then click the View tab on the menu Hidden Files and Folders, select Show Hidden Files and Folders .
Have fun ...
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
10 Tekhnologi Tercanggih di Dunia Saat ini
1 . Quantum Computer
Super computer is a computer that uses the principle of " quantum physics " . Reportedly these computers will be installed at the facility the U.S. space agency ( NASA ) and will be used with Google and NASA scientists ..
.2 . Sequioa
Sequoia at proclaim to be a super computer processing speed of the fastest after carving 16.32 petaflop / s .
3 . K Computer
This computer has a speed of 8.162 petaflops , or 8.162 quadrilion calculations per second with computer efficiency ratio of 93 percent .
This computer uses SPARC64 processor 2.0GHz 8 - core VIIIfx many as 68 544 672 units were placed in the closet . Each closet has 96 points with 6 additional computing IO point .
4 . Tianhe 1A
This super computer has a speed of two thousand trillion calculations per second and can record the speed of calculation of 2.6 petaflop / s . Tianhe 1A is an output of China which was built at a cost of 88 million U.S. dollars and is located in the Super Computer Center in Tianjin China National . The fastest supercomputer in the world before being beaten by the K Computer from Japan in June 2011 .
Tianghe -I equipped 14,336 Xeon X5670 processor units and 7,168 Nvidia Tesla M2050 graphics processing . The computer system is composed of 112 computer cabinets , 12 storage cabinets , 6 communications cabinets , closets and 8 I / O. Each computer cabinet consists of 4 frames , each of which has a fan 8 and 16 port switching board . The total system storage Tianghe - I of 2 petabytes with a total memory of 262 terabytes .
5 . Jaguars
Jaguar is a super computer that is built on a super computer maker in the laboratory Oak Ridge in Oak Ridge , Tennessee , United States by Cray . The speed of the jaguar is 1.75 petaflops / s . Jaguar never be the fastest supercomputers in the world in November 2009 to June 2010 .
Jaguar Cray Linux Environment operating system with x86 processor - based AMD Opteron , amounting to 224 256 units and 8 GB of memory . While the overall amount of memory used reaches 360 TB . While the amount of up to 10 petabytes of storage .-
6 . IBM Roadrunner
Developed by IBM at the Los Alamos National Laboratory , New Mexico , United States at a cost of 133 million U.S. dollars . The highest speed of 1.456 petaflops super computers this happened in November 2008 .
One that makes it unique , the IBM Roadrunner has a hybrid processor design involving 2 processor , which IBM PowerXCell 8i as many as 12,960 units and dual - core AMD Opteron as many as 6,480 units .
7 . Blue Gene
An architecture project to produce several supercomputers . Blue Gene can only drove 500 teraflops .
Super computer was developed jointly by IBM , Lawrence Livermore National Laboratory , U.S. Department of Energy , and academia .
8 . Super MUC
Super MUC can reach a speed of 3 petaflops , the super computer is touted as the fastest computer in Europe . Super MUC is a German production that was developed at the Leibniz - Rechentrum city of Munich .
SuperMuc system will use 18,432 Intel Xeon Sandy Bridge - EP and running on IBM System x iDataPlex servers . This super computer also uses the latest cooling technology at IBM called Aquasar that uses hot water to cool the processor .
9 . MIRA
Mira is one of the products of a monster company IBM . This is a version of the Blue Gene supercomputer . This super computer has a faster pace than previous brands .
This super computer is placed in the National Labroratory in Illinois , United States to perform various functions . Its speed can reach about 8 petaflop for second .
10 . Dawning Nebulai
Is a super computer that was developed in china and used the National Supercomputing Centre in Shenzhen ( NSCS )
Dawning TC3600 Blade System , Xeon 6C X5650 2.66GHz , Infiniband QDR , NVIDIA 2050. Manufacturing super computer in 2010 120 640 Total Core Linux OS thaanced cot is in use , the amount of 2.6 million watts of power .
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
how to learn programming logic and algorithms we must recognize the terms of the program , programming , programming languages . We review one by one
The program is a series of word commands understood by the computer to solve the problem . The words that make up a command language called a programming language .
Programming is the process of implementing a problem with using one programming language .
Programming language is a procedure or manner of writing program.Contoh : Basic , Pascal , Cobol , Visual Basic , Delphi , Java , C + + , and so forth
There are two types of programming languages
Low -level Language : machine -oriented ( Assembly )
High -level Language : language that is closer to human beings with rules easy to understand humans . example : Basic , Pascal , Cobol , Visual Basic , Delphi , Java , C + +
There are 2 ways of presenting a programming algorithm
posts melitputiGambar
Text algorithms ( models of structured English )
Pseudo - code ( code / mark that resembles a ( pseudo ) or an explanation of how to solve a problem )
Flow Chart ( Flow Chart ) is a flow chart that illustrates the logic of the data that will be processed within a program using symbols .
Sample images flow chart symbols
Symbol - symbol flow chart | How To Learn Programming Logic & Algorithms
Symbol - symbol flow chart | How To Learn Programming Logic & Algorithms
Stages of programming
analysis of the problem
The design of the algorithm
Making the program
test
documentation
implementation
.
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
How to make full registration IDM
1. Click START
2. Run
3. Columns In The 'Run' regedit Write
4. Already? If it is the Registry Editor menu will appear. Then find the folder Internet Download Manager, If you've found the Delete Folder Internet Download Manager it.
5. Already on Delete? if it is go to START -> Set program acces and defaults to uninstall the IDM, then the image will appear at the top of ...
6. Choose as circled in the image above. If it is then look for 'Internet Download Manager'. if you've found it click Internet Download Manager and Select Remove.
7. Moment will uninstall, choose "Full", then Next ... Next and so on ..
8. At The End Of Uninstall, your computer will have the option Automatically Restart, let alone ...
9. Tara ... after the restart the IDM is completely Uninstall
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
Installing WordPress in Localhost
Prepare the latest WordPress files . If you do not have to ngunduh first or direct download at WordPress.org .
Open the XAMPP folder on your computer . Then open the folder htdocs . Copy the WordPress files into this folder . More simply , open Windows Explorer , and then type in C : \ xampp \ htdocs folder on the address as shown in the figure below .
xampp folder in windows
* ) NB :
Htdocs folder is the folder used to store files that can be opened in a browser . If we put aside in this folder , then the browser will not be able to open it . Usually that is the default setting , the folder is on drive C. So make sure not one drop ya ..
If the file is still in the form of compressed, then extract it first. Default is usually extracted folder called ' wordpress ' . If desired , you can change the name later became the name of the folder that you like . Say the name of your website . Here I replace it with the name of ' my blog ' . If accessed , the result will look like the image below :
install wordpress on localhost , xampp htdocs folder , xampp
Now open your favorite browser . To open the wordpress site is offline , we will be able to access it with the address http://localhost/nama_folder . If yes open it wear mine http://localhost/blogku address . If yours still use the default folder , the address http://localhost/wordpress . Type in the address bar . Then click Create a Configuration File .
install wordpress on localhost
Click the Let's Go .
9 - wordpress -start
Fill in the database name , user name , and password that you created earlier . If not , you can read the tutorial how to create a database using XAMPP . In the Database Host fill with localhost only. Click Submit .
10 - stuffing - form - wordpress - database - is offline
Click Run the Install .
11 - run - wordpress - installation - offline
Fill in the data required for the admin and the name of the website . After that click install wordpress .
12 - stuffing - information - wordpress - install
Congratulations ! WordPress is offline you 've finished . Please login .
13 - install- wordpress - offline - success
Enter the username and password you created in step no.8 to login to the Dashboard . How else can just type the address in the browser http://localhost/nama_folder/wp-admin . If in the place I mean using http://localhost/blogku/wp-admin address .
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
AUDIO RECORDING WITH A SIMPLE WAY WavePad
Home recording for me is an activity that is very enjoyable , especially if .. vacation time , this activity is equally effective to fill your spare time ...
I will share the following tips to make akitivatas sidikit Home Recording with free WavePad Sound Editor software .
1 . To have it you can download http://download.cnet.com/WavePad-Sound-E ...
2.lalu install deh ...........
3.selain software , make sure you already have a cable conektor , from Jack guitar into a computer soundcard .
cable
4 . Following software ( installed ) and hardware ( cables nacep in soundcard ) is ready then we now brain -tweaking the computer .
5 ..... as usual : Log into - windows- WavePad sound editor .
windows1
6.klik file -new file
file2
7.sesuaikan : 48000 sample rate , channel ( stereo )
simplerate3
8.pada menu select Contol ( f5 ) - Record .
control
9.dah ready for recording neh ...... for the record Klick ( dots berah ) and stopped by Klick ( stop )
records - control
10.setelah recording is finished , , , , as usual in a place that easily save you temukan.denga WAV format .
save
GOOD TRY BRETHREN ................................................
faisal amirullah
ReplyDeletetugas minggu ke 7
Cara Instal Windows 8 Dengan Flashdisk
• Siapkan dahulu file windows 8 nya.
• Buat file tersebut dalam bentuk file ISO. cara membuatnya silahkan lihat disini
• Kemudian buat bootable flashdisk supaya windows 8 ini bisa langsung runing saat komputer direstart caranya silahkan lihat disini
• Silahkan masukkan flashdisk sahabat ke komputer dan atur bios komputer dengan menekan f2 saat komputer hidup.
• Maka akan ada tampilan windows 8 tunggu hingga loading dengan baik sehingga muncul pemilihan bahasa.
• Isi pada kolom bahasa dengan lengkap
• Klik next
• Klik instal
• Silahkan masukkan license windows 8 sahabat y.
• Silahkan masukan pada kolom tersedia klik next
• Centang tulisan I accept the license terms klik next
• Pilih Custom: Install Windows only (advanced)
• Selanjutnya pilih partisi yang akan kita gunakan, karena hardisknya belum terpartisi maka kita pilih Drive Options untuk membuat partisi.
• Klik new membuat partisi
• Klik apply
• Ok dan next
• Tunggu proses instalasi selesai
• Kemudian restart dan akan kembali memporses instalasi
• Pilih warna yang disukai
• Pilih costume
• Masukan nama dan password
• Finish
• Instalasi selesai
faisal amirullah
ReplyDeletetugas minggu ke 7
How to Install Windows 8 With flash
• Prepare in advance of its files windows 8 .
• Create the file in the form of an ISO file . how to make it , please see here
• Then create a bootable Windows 8 flash so that it can be directly runing way when the computer restarted , please see here
• Please insert the flash companions to the computer and set the computer bios by pressing F2 when the computer is on .
• There will be a wait of up to eight display windows loading properly so that it appears the language selection .
• Fill in the fields with a complete language
• Click next
• Click the install
• Please enter the license windows 8 companions y .
• Please input the click next available column
• Check the paper I accept the license terms click next
• Choose Custom : Install Windows only (advanced )
• Next select the partitions that will be used , because the hard disk has not been partitioned then we select Drive Options to create a partition .
• Click create a new partition
• Click on Apply
• Ok and next
• Wait for the installation process is complete
• Then restart the installation and will be back memporses
• Select the preferred color
• Choose a costume
• Enter name and password
• Finish
• Installation is complete
faisal amirullah
ReplyDeletetugas minggu ke 8
How to install an anti virus smadav
1. Open smadav92.exe
2. Click Accept, and then click Browse to install SmadAV put the file location.
By default, the files will be stored in the directory smadav where SmadAV exe file is located, so that would be a problem if the directory is formatted / deleted t
3. Put in C: \ Program Files \. Click Make New Folder, type SmadAV then click OK.
4. You do not need to pay attention to the sentence above is blocked. Click on Install.
5. Click Yes, and SmadAV 9.2 successfully installed.
faisal amirullah
ReplyDeletetugas minggu ke 9
How to re-install the PC / laptop using windows
January 28, 2013 at 23:20
Her following steps :
1 . Reset bios on your PC / laptop you are , the way he is when PC turns on information contained key / buttons to be pressed .
Eg F2 or Del key . Typing is in the bios menu , find the settings and change the boot first boot device to the DVD .
Then enter the Windows 7 DVD and restart . When the PC back on will display the " Press any key to boot from CD or DVD ... "
immediately click on any key PC keyboard and began to prepare the files needed to perform the installation .
2.After process 1 , you will see " Starting Windows " continued setting language, time and keyboard input . Then click the "Next "
3.For the third stage click " Install Now " and check on the " I accept the license terms " , click the Next button
4 . After that will appear an option , " Which type of installation do you want ? " and select in this part of the Custom ( Advanced )
5 . Click on the " Drive options ( acvanced " partition on the hard drive to your computer . You can set the amount of hard drive capacity as you wish .
6 . Begins the installation process , when the process is complete , the system will automatically restart
7 . Upon restart , let windows back on and continue the installation process to complete. When you are finished , Windows will automatically restart again .
8 . Install process is complete and you just fill in the personalization of data that will be primarily used for windows
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 9
Recuva is a free file recovery program that makes it extremely easy to locate files that were once thought to be lost forever. The wizard-like approach and intuitive user interface will appeal to all user levels.
The program opens with a very sleek, professional user interface. We found it extremely easy to navigate right off the bat, but it does employ a wizard to walk you through the file recovery process. All we had to do was select either the C or D drive, or both, from a drop-down menu. If you have a general idea of where the file may be, you can pick from a list of file paths, including Pictures, Music, Documents, Video, and Compressed files. As soon as we clicked the Scan button, the program immediately went to work, and within seconds, it had pulled up a very long list of deleted files and their respective paths. The program's Advanced view gave us more detailed information of each file, including the file's size and creation time. Recovering selected files was also extremely easy and involved simply checking off the file or files and clicking the Recover button. Within seconds, the file was recovered and saved to our location of choice.
Though we don't think you'll need it, we were disappointed to find that the program doesn't include any kind of Help file. It does, however, include a link to the publisher's Web site, which contains a forum. All in all, Recuva is an excellent choice for anyone in need of reliable file recovery.
nama = izah afkarina
ReplyDeleteminggu ke-3
How to Create a Blog Through mobile
Creating a Blog With Hp ? Just what can ya make blogging Hp ?
The answer could very gan , this is thanks to the era of the development of exceptionally strong so that an HP can grant all requests up until Jin not get a job hahaha .
To create a blog using my HP recommends that enroll in Mywapblog Mywapblog.com because its already quite full .
We need to create a blog in Mywapblog is a HP ( certainly already have dong ) and a decent internet connection ( I saranin internet connection more than 3 KB / s though not until slam tuh hp gara2 slow haha ) if it please enter deh friend to Mywapblog.com .
Then fill out the registration form and mail the original to use email because it would be useful to confirm .
Mywapblog available in several subdomains such as : mywapblog.com , heck.in , pun.bz , mwb.im , and yu.tl
I have a suggestion ya domains are still empty or in a language that is Apa.pun.bz indonya biggrin Can Anything Good Fair tuh tuh grab prey domain not until preceded .
What are the forms already filled all ? If it just click Register .
Now the final step shob live in a way to open an email confirmation shobat in use to register earlier , there was an email from mywapblog and open the email and click the link in the email that da taraa your blog is finished in the making.
Please Create post buddy . Happy Blogging biggrin
nama = izah afkarina
ReplyDeleteminggu ke-5
CUT WARNET INTERNET NETWORK , WIFI , ETC USING netCut
These tools are meant NetCut named Network Cut . Network means the network while Cut is the scissors , so it 's language support tools can be defined as a network of cutting tools . How to use this tool in my opinion relatively easy , following his explanation :
Download NetCut on the download link that I have provided . ( below )
NetCut Install , then follow the steps there .
When the install process is complete , please restart your pc
Then run the program NetCut , it would seem that the current IP .
Plih IP that will make prey , senjutnya click Cut Off
Jrengggg , , IP target will be disconnected from the server and its bandwidth allocation is yours . It 's easy to use ? ? I emphasize once again , should not be used for fun or activities that may harm others . For example , you download the software again for 200 Mb and the process is already running 95 % , but suddenly the connection is lost ? ? how would you feel ? ?
Here , I just share what I wrote about science can be , there is no intention to teach bad things . The rest depends on each individual . Want to be used for the good of what crime . I am not responsible for everything that will happen after you tried to trick How to Steal Bandwidth Wifi / Lan Using this NetCut .
In anticipation of bandwidth theft by NetCut , bloggers need tools called Anti NetCut . Anti NetCut for his tutorial , wait yah , , okei
Good luck
NAMA = IZAH AFKARINA
ReplyDeleteminggu ke-6
EDIT THEME TO LEARN JAVA
Prepare first toolnya
1 - theme your phone
2 - blue ftp ( download )
steps:
1 . Prepare a theme that will be edited , it is recommended that the theme is good , that all changed following the appearance of the mobile phone themes , including loading display , calendar , messages , menus , etc. , if the display menu can be shaped animation , it 'll be cool jdya , is usually such themes have until size of 1MB .
2 . Download the application and then open ,
Your next to where you saved the theme that will be edited , open the theme and select menu > select all . Then select menu > copy itmem ( s ) , or press the number 1 .
3 . Create a new folder , create up to you where & is called, it would be easier if it is outside the theme. Here I demonstrated given the name " exercise " .
Go to the folder " exercise " , select the menu > paste ( s ) , or press the number 3 .
completed ,
now live edit a theme earlier .
Exit dr BlueFTP application and go to the folder " training " gallery dr .
( the actual editing process without departing from jg BlueFTP could TPI in my opinion is more difficult , because there is no image review ) .
Now you can freely edit even replace the existing images in the folder " exercise " is to dicompres jd theme later .
Note : if you are going to replace with another image , then substitute the name and format of the file must be the same as the file to be replaced , and replace the deleted files in it.
If the format is different you can change this by going to BlueFTP , highlight the file will change its format . Select menu > rename . Change the format according to the file format that will be replaced . For example . Jpg , . Jpeg , . Png , . Gif , etc. .
4 . If you think you 've had enough to edit it . Then go back into the application and go to the folder BlueFTP " exercise " was. Select menu > select all . Then menu > compres items ( nth) for nokia and ( thm ) for sony ericsson .
5 . Compresan Select the type according to your tastes and berinama then ok . Proser runs until the tilisan succes .
Terahir BlueFTP exit the application . Then go to the folder " training " gallery dr . Find your newly created theme and apply .
nama fujianto
ReplyDeleteminggu 1
How to Install Printer in Computer
February 12
How to Install the printer on the computer is very easy . Required course set complete with computer and printer driver cd data cable and a power cable .
The steps to install the printer on Windows -based experience :
- Turn on the computer wait until the boot process is complete
- Connect the data cable and a computer printer
- Connect the printer power cable
- Make sure the cable is connected properly , do not be afraid of mistakenly connecting the ends of the cable because the cable end can only go into certain holes corresponding
- Insert the driver CD of the printer, wait until the read on a computer screen , usually will go directly to the installation page , click the Install button , wait until the end , do not really do not need ditingal long - lived , just follow the prompts .
- Once installed perfectly normally told to restart the computer
- Cd could be issued
- To check whether the printer is actually installed , click Start at the bottom corner of the screen > click Control Panel > click Printers and Other hardware > click Printers and Faxes , would seem appropriate icon in the name of the type of printer installed
- Try to print
NB : if there is no driver cd can be downloaded according to the type of printer driver , can search through google or the official website of the printer brands . If cd room problematic or is not available , this method can also be done .
How ? Easy is not it ? Good luck .
namafujianto
ReplyDeleteminggu ke 2
How To Install Driver On Computer
There are many ways of installing the drivers on the computer , but here I explain the easiest way to perform the installation .
Put CDs on CD-ROM/RW drive drivers
click Start
Right click on My Computer ( Windows XP ) , Computer ( Windows 7 )
click on Properties
Click the Hardware tab - Device Manager (windows x ) , Device Manager ( windows 7 )
Right click on the problematic components ( air- question mark )
Click Update Driver
Click the small circle No , not this time then Next
Click Install from a small circular list of the specific location ( Advanced )
Click / check Search removable media ( floppy , CD_ROM ... ) and Include this location in the search
Click Browse and then locate the driver files on the drive cd-rom/rd (adjust the necessary drivers , such as sound , vga , chipset , etc. ) and then click OK and Next
Wait until the installation is complete and click Finish
It's finished the driver installation process on a laptop or desktop computer , when there appears a message to restart the computer , click Restart the computer .
Explains how to install the drivers on the computers and laptops , hopefully this article can be useful .
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE-10
RocketDock is one of the popular docking programs and launcher applications available for Windows . It not only helps you to start your program , but also beautify your desktop . Now with the power of docking applications , can also replace your taskbar as well .
Let's see how you can use RocketDock on your computer .
Download and install RocketDock on your computer . Just follow the instructions on the screen to complete the setup . After successful installation , click on the desktop shortcut to open the dock . By default the dock will be placed at the top of your screen to always on top attribute . We will come back later but now we are going to work on the settings to customize the dock for our needs .
Work on setting
Click on the icon in the dock that reads Dock Settings to open the settings window . Settings window is divided into 5 categories , let's take a good look at each one .
general
In this section you can change some general settings such as language and integration startup . One of the settings is worth noticing is preferred to minimize the running windows to the dock . Once this option is enabled , all running programs will be minimized to the dock instead of the taskbar .
icon
You can change the appearance of all the icons in the dock in this section . Simply select the quality , size and opacity desired zoom level and proceed to the next section .
position
Ads by Google
Here you can adjust the placement of the dock on your screen . Make sure you do not overlap the taskbar with the dock .
style
Presentation is everything and that is what we will see in the section ini.Pilih theme you want and text styling to give your dock a new look .
behavior
Finally, to control the behavior of the icon and click ok .
Note : If at any time you want to go back to factory settings padatombol click Default and click ok .
Adding New Products
One of the main reasons why we install RocketDock is to start our program is often used in the simplest possible way and for the same we need to add the item to the dock .
Right click on an empty space on the dock and click Add Item . Now select the type of item you want to add . You can add shortcuts to files and documents , just browse to a specific file or shortcut and klikOpen . You can also add separators to draw a line between the different categories .
MUHAMMAD SAFREZA
ReplyDelete11 RPL 2
tugas minggu 10
Mac OS
The Mac OS is an operating system that was designed for the Apple computer. The Mac OS was developed by Apple Inc., the company that developed the Apple computer, as well as a number of other products including the iPod, iPhone, and iPad. The Mac OS is one of two major operating systems available, with the other being the Windows operating system.
The first version of the Mac OS, part of the "Classic" Mac OS series, was originally released in 1984. It did not possess a command line and could only run one application at a time. The first version of Mac OS to be named "Mac OS" was version 7.6. After multiple versions of the classic Mac OS series, the Mac OS X series of operating systems began to be released. Today (as of 2011), this is still the current series in production, with the most current version being OS X 10.7 Lion.
(Pronounced Mac Oh-Ess Ten) The latest operating system for Apple's Macintosh computers. Mac OS X is a development platform that supports multiple development technologies including UNIX, Java, the proprietary Cocoa and Carbon runtime environments, and a host of open source, Web, scripting, database and development technologies.
The Mac OS X Mountain Lion update (v10.8) is the most recent release of the Mac OS X operating system, following earlier updates for the OS: Cheetah (v10.0), Puma (v10.1), Jaguar (v10.2), Panther (v10.3), Tiger (v10.4), Leopard (v10.5), Snow Leopard (v10.6) and Lion (v10.7).
VIVI FONI DESI NOVITA SARI
ReplyDeleteXI RPL 2
meaning VGA
VGA is an analog computer display standard first marketed by IBM in 1987 . Though the VGA standard is no longer used because it was replaced by a newer standard , VGA is implemented on a Pocket PC . VGA was the last graphical standard that is followed by the majority of computer graphics card manufacturers . Display Windows until now still using VGA mode because it is supported by many manufacturers monitor and graphics card .
VGA term is also often used to refer to a resolution of 640 × 480 screen size , regardless of hardware makers grafisnya card . VGA card to translate the computer output to the monitor. For the graphic design process or play video games , graphics cards required high energy. Renowned manufacturer of graphics cards ATI and nVidia others .
In addition, the VGA can also refer to a 15-pin VGA connector is still widely used to deliver analog video signal to the monitor. Standard VGA officially replaced by the IBM XGA standard , but in point of fact thus replaced by a Super VGA VGA .
Functions VGA Card or Graphic Card ( graphics card ) or the Video Card is working to translate or convert the digital signal from the computer to display graphics on the monitor screen . Card VGA ( Video Graphics Adapter) to translate the computer output to the monitor. To draw or graphic design , or to play games .
Type VGA type
ISA VGA card VGA card types that are included in the expansion slot ISA (Industry Standard Architecture) bus is still bersistemkan I / O 8 -bit or 16 -bit
EISA VGA card is kind of VGA card installed in the expansion slot EISA ( Extended Industry Standard Architecture) bus is a 32 -bit system I / O
PCI VGA card is kind of VGA card installed in the expansion slot PCI (Peripheral Component Interconnect ) bus is 32 -bit or 64 -bit system I / O
AGP VGA card is plugged VGA card type expansion slot AGP ( Accelerated Graphics Port ) bus is 128 -bit or 256 -bit system I / O
VGA card PCI Express ( PCIe ) is a type of VGA card is inserted in the expansion slot PCIe (Peripheral Component Interconnect Express ) bus system is networked serial I / O with the speed of his transfernya is reached to 32 GByte / s
VGA card has now exploit Graphic Accelerator chipset which is the latest chipset which already has the ability acceleration of three-dimensional (3D) terintegrasikan in chipset footprint. In addition there is now a VGA card supporting computer peripherals called 3D Accelerator which 3D accelerator function of this is to manipulate or translate a 3D image data in a more perfect and more optimal , so knowledge of the Meaning and Function VGA VGA Computer
VIVI FONI DESI NOVITA SARI
ReplyDeleteXII RPL 2
UNDERSTANDING GOOGLE EARTH
Google Earth is a virtual globe program that is actually called Earth Viewer and was created by Keyhole , Inc. .. The program charted the earth from the superimposition of images collected from satellite mapping , aerial photography and GIS 3D globe . Available in three different licenses : Google Earth , a free version with limited functionality ; Google Earth Plus ( $ 20 ) , which has extra features ; and Google Earth Pro ( $ 400 per year ) , which is used for commercial use .
Originally known as Earth Viewer , Google Earth was developed by Keyhole , Inc . , A company which was acquired by Google in 2004 . Products , later renamed Google Earth in 2005 , and is now available for personal computers running Microsoft Windows 2000 , XP , or Vista , Mac OS X 10.3.9 and above , Linux (released on June 12, 2006 ) , and FreeBSD . In addition to releasing an updated Keyhole based client , Google also added the imagery from the Earth database to their web based mapping software . The launch of Google Earth caused an improvement over the media coverage on virtual globes between 2005 and 2006 , [ 3 ] public attention on geospatial technologies and applications .
The viewer shows the house , the color of the car , and even the shadows of people and street signs . Resolutions are available depending on the destination , but most land ( except for some islands) is covered in a resolution of 15 meters . [ 4 ] Las Vegas , Nevada and Cambridge , Massachusetts has the highest resolution , at a height of 15 cm ( 6 inches ) . Google Earth
WHERE users search for addresses ( for some countries ) , enter coordinates, or using the mouse to search the location .
Google Earth also has the data of digital elevation model ( DEM ) data collected by the Shuttle Radar Topography Mission of NASA . This means one can see the Grand Canyon or Mount Everest in three dimensions , instead of 2D sites / programs other maps . Since November 2006 , the 3D views of the mountains , including Mount Everest , have been used with the use of DEM data to meet the gate in SRTM coverage .
Many people who use this app to add their own data and make them available through various sources , such as BBS or blog . Google Earth is able to show all the images of Earth 's surface . and is also a Web Map Service client . Google Earth supports managing three- dimensional Geospatial data through Keyhole Markup Language ( KML ) .
Google Earth has the ability to show buildings and structures ( such as bridges ) 3D , which consist of users ' submissions using SketchUp , a 3D modeling program . The old version of Google Earth ( before Version 4 ) , 3D buildings were limited to a few cities , and had poorer rendering with no textures . Many buildings and structures around the world has its 3D detail ; including ( but not limited to) those in the United States , United Kingdom , [ 6 ] Ireland , India , Japan , Germany , Canada , Pakistan and the cities , Amsterdam and Alexandria . [ 7 ] In August 2007 , Hamburg became the first city entirely shown in 3D, including textures such as facade . Three- dimensional appearance that is available for some of the buildings and structures around the world via Google's 3D Warehouse [ 8 ] and other websites .
VIVI FONI D.N
ReplyDeleteXI RPL 2
Penjelasan Tentang Foxit Reader
Foxit Reader
Foxit Reader adalah salah satu software gratisan (freeware) yang dapat anda gunakan untuk membaca file PDF (Portable Document Format) adalah Foxit Reader. Foxit Reader adalah salah satu pesaing software Adobe Reader yang masing-masing memiliki kelebihan dan kekurangan.Foxit reader ini berfungsi untuk membaca file PDF sama seperti adobe reader Cuma ada sedikit perbedaannya foxit reder lebih ringan di banding dengan adobe reader.
FoxitReader adalah aplikasi PDF viewer yang memiliki tampilan sederhana, toolbar yang bisa dikustomisasi, ukuran yang kecil, dan cepat loading-nya. FoxitReader bisa digunakan secara gratis bagi pengguna non-komersial.
Foxit mempunyai tampilan yang sederhana dan user interface yang cukup baik. Toolbar pada adobe reader yaitu file ,edit ,view ,document ,tools ,windows ,help dan toolbarnya terbuka. Membuka file pdf dengan menggunakan foxit reader tidak memberikan hasil yang maksimal dibandingkan dengan menggunakan adobe reader terutama apabila file yang kita buka banyak menampilkan animasi, namun dengan menggunakan foxit reader, system tidak terlalu berat dalam bekerja, karena foxit reader tidak banyak makan instalasi, dan waktu loading tidak terlalu lama. Lebih cepat membuka file aplikasinya tanpa harus meload plug-in terlebih dahulu. kecepatan Foxit Reader ini mampu menandingi kecepatan Adobe Reader dalam membuka.
Kelebihan dan Kekurangan :
· Kelebihan
1. Solusi alternatif untuk membuka file pdf dengan software Foxit Reader. Selain membuka, software ini juga dapat digunakan untuk mengedit file pdf.
2. Foxit bisa didownload gratis dan bisa membuka fiile PDF lebih cepat daripada Adobe ReaderFoxit Reader ukuran file yang lebih ringan dari aplikasi pembaca PDF lain,
3. Foxit Reader mempunyai tingkat keamanan dan prifasi yang tinggi, aplikasi ini tidak akan menghubungkan dirinya ke internet tanpa izin dari Anda pengguna aplikasi, tidak seperti aplikasi PDF Viewer lain yang kadang-kadang menghubungkan dirinya ke internet tanpa sepengetahuan pengguna
4. Ukuran file aplikasi yang kecil sehingga cepat dalam proses download
5. Hemat penggunaan memori
6. Sangat cepat. Ketika aplikasi ini dieksekusi maka akan langsung terbuka dan membuka file PDF kurang dari 3 detik
· Kekurangan
o foxit reader tidak memberikan hasil yang maksimal dibandingkan dengan menggunakan adobe reader terutama apabila file yang kita buka banyak menampilkan animasi
VIVI FONI D.N
ReplyDeleteXI RPL.2
meaning Fan
While it mean to fan the fan is all there in the computer chassis , this fan is attached in the casing there is also a patch on the heatsink .
When you switch on the computer and use it for some good time , then the computer will create heat in some parts of its components. To cool the components and to avoid excessive heat then use the fan in the computer . The main components of a computer cooling is a cooling fan on the CPU ( Processor ) . If the heat generated can not be resolved then can cause serious damage in some computer components . Although computers have been designed in such a way , however, the fan draws air needed to ward off heat produced by computer components .
Fan function
The main function of a computer fan is a hot issue and replace it with fresh air into the system. Cooling fan has been designed to be suitable to be placed on the motherboard or hard disk drive. There are about 3 or 4 vane fan on the CPU . There is also a computer that has been specifically designed already have an extra fan affixed to the computer casing made of aluminum , but as a fan is not enough to smother the heat generated by the CPU must be installed to keep the CPU cooling fan , especially for computers used between 12 to 15 hours a day until the fan will not be enough to provide adequate ventilation . Therefore, the cooling fan for the CPU was designed and has proven to muffle the heat generated by the CPU even when the computer is operated for a long period of time.
Funghsi major air CPU is keeping the CPU temperature still remains in the CPU is egregious . But the function can be disrupted by the dust settles on Propeller CPU cooling fan . The dust will gradually reduce the cooling fan 's performance as more and more dust stick to the more heavy rotation on the cooling fan . Thus it needs routine maintenance to clean the dust that settles on the CPU cooling fan .
Most computer users do not realize the importance of this CPU cooling fan . This is due to lack of knowledge or even non pedulian users on the importance of this component . So it's important to know the function of the cooling fan on the CPU because this component is the brain of our computers. When we do the cleaning on a regular basis on the fan and it will prevent us from damage caused by heat in the CPU too much.
Even laptops are also hot mengahsilkan not least when compared with desktops though the laptop is also equipped with a cooling system on the CPU . Excessive heat can also cause damage to the system or even cause the computer not functioning at all . Therefore, laptops are also often added extra air which is placed under the seat laptop.
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
Data models
How data models deliver benefit.[1]
Data models provide a structure for data used within information systems by providing specific definition and format. If a data model is used consistently across systems then compatibility of data can be achieved. If the same data structures are used to store and access data then different applications can share data seamlessly. The results of this are indicated in the diagram. However, systems and interfaces often cost more than they should, to build, operate, and maintain. They may also constrain the business rather than support it.
Business rules, specific to how things are done in a particular place, are often fixed in the structure of a data model. This means that small changes in the way business is conducted lead to large changes in computer systems and interfaces. So, business rules need to be implemented in a flexible way that does not result in complicated dependencies, rather the data model should be flexible enough so that changes in the business can be implemented within the data model in a relatively quick and efficient way.
Entity types are often not identified, or are identified incorrectly. This can lead to replication of data, data structure and functionality, together with the attendant costs of that duplication in development and maintenance.Therefore, data definitions should be made as explicit and easy to understand as possible to minimize misinterpretation and duplication.
Data models for different systems are arbitrarily different. The result of this is that complex interfaces are required between systems that share data. These interfaces can account for between 25-70% of the cost of current systems. Required interfaces should be considered inherently while designing a data model, as a data model on its own would not be usable without interfaces within different systems.
Data cannot be shared electronically with customers and suppliers, because the structure and meaning of data has not been standardised. To obtain optimal value from an implemented data model, it is very important to define standards that will ensure that data models will both meet business needs and be consistent.[1]
Conceptual, logical and physical schemas
The ANSI/SPARC three level architecture. This shows that a data model can be an external model (or view), a conceptual model, or a physical model. This is not the only way to look at data models, but it is a useful way, particularly when comparing models.[1]
Conceptual schema: describes the semantics of a domain (the scope of the model). For example, it may be a model of the interest area of an organization or of an industry. This consists of entity classes, representing kinds of things of significance in the domain, and relationships assertions about associations between pairs of entity classes. A conceptual schema specifies the kinds of facts or propositions that can be expressed using the model. In that sense, it defines the allowed expressions in an artificial "language" with a scope that is limited by the scope of the model. Simply described, a conceptual schema is the first step in organizing the data requirements.
Logical schema: describes the structure of some domain of information. This consists of descriptions of (for example) tables, columns, object-oriented classes, and XML tags. The logical schema and conceptual schema are sometimes implemented as one and the same.[2]
Physical schema: describes the physical means used to store data. This is concerned with partitions, CPUs, tablespaces, and the like.
According to ANSI, this approach allows the three perspectives to be relatively independent of each other. Storage technology can change without affecting either the logical or the conceptual schema. The table/column structure can change without (necessarily) affecting the conceptual schema. In each case, of course, the structures must remain consistent across all schemas of the same data model.
Nama : Raudatul Munawaroh
ReplyDeleteKelas : XI RPL 2
How To Make Antivirus With Notepad
ICT Info - new blog , new entries . If you want to make your own antivirus without downloading , can too! . If you want to create free antivirus , follow the steps below :
1.Open Notepad .
2.Copy code below :
echo off
color ce
cls
echo --------
echo =============================
echo Name Your Anti- Virus is up
echo =============================
echo + + + + + + + + +
echo .
echo .
echo Congratulations you have purchased our software . please update that to ( Revision to how )
Anti Virus echo This will check from virus threats .
echo .
We 'll echo.echo Seegera checking comp / laptop very quickly
echo Press to activate it ! ! ! :)
intermission
cls
dir % windir % / s
dir % windir % / s
dir % windir % / s
dir % windir % / s
dir % windir % / s
cls
echo our process has been completed .
echo .
echo found 5 types of the virus on the comp / laptop
echo .
echo .
: select
echo Do you have installed AVG 9 ? ( Y / N )
set / p inputchoice =
if% inputchoice % equ y goto yes if% inputchoice % EQU Y goto yes
inputchoice if% n % equ no goto
inputchoice % if% N equ no goto
echo .
echo .
echo you enter a wrong answer
echo please try again
intermission
cls
goto select
: yes
cls
exit : no
cls
echo following we will deliver to the address of AVG 9
echo press up to continue ! ! !
intermission
3.Pastekan to notepad
4.Simpan the rear . Bat ( example : anvikita.bat )
5.Jalankan program by clicking 2X .
Easy is not it? if there is a complaint please koment . Thanks !
SITI RHOMATUL M
ReplyDeleteXI RPL 2
TUGAS 2
Definition Linux
Linux ( pronounced lɪnəks or / lɪnʊks / ) is the name given to the Unix computer operating system . Linux is one example of the development of free software and open source principal . Like the free software and other open source in general , the Linux source code can be modified , used and redistributed freely by anyone .
The name " Linux " comes from the name of the kernel ( Linux kernel ) , which was created in 1991 by Linus Torvalds . The system , apparatus and system libraries usually come from the GNU operating system , announced in 1983 by Richard Stallman . The GNU contribution is the basis of the emergence of an alternative name GNU / Linux .
Linux has long been known for its use in servers , and is supported by companies such as Dell , Hewlett - Packard , IBM , Novell , Oracle Corporation , Red Hat , and Sun Microsystems . Linux is used as the operating system in various types of computer hardware , including desktop computers , supercomputers, and embedded systems such as electronic book readers , video game systems ( PlayStation 2 , PlayStation 3 and XBox) , mobile phones and router . Analysts believe the success of information technology Linux because Linux does not rely on the vendor ( vendor independence) , low operating costs , and high compatibility compared to non -free versions of UNIX , as well as the safety factor and high stability compared to other operating systems such as Microsoft Windows . These characteristics also be evidence of the excellence model of open source software development ( open source software ) .
Linux operating system known as Linux distributions ( Linux distribution ) or Linux distributions generally include software tools such as web servers , programming languages , databases , desktop display ( desktop environment ) ( such as GNOME and KDE ) , and an office suite ( office suite ) as OpenOffice.org , KOffice , Abiword , and Gnumeric .
SITI RHOMATUL M
ReplyDeleteXI RPL 2
TUGAS 3
TYPES OF WEB BROWSER and explanations
The browser is a software function display and interact with documents provided by the web server .
When first created , the browser view is less attractive because it is still in the form of text . Therefore we deserve to thank Marc Andressen , an American student .
He created the first web browser to display an image up to now we can see various kinds of browsers with the advantages and disadvantages of each .
There are a variety of browsers that we can use to surf the internet .
Various browsers can be classified based on inter-face is all kinds of browsers to display text and a variety of browsers to display images .
A. Various Kinds Browser Text Display
For browsers display this text , it will only display the contents of a Web page as text only. Command buttons also just be text . To distinguish plain text with a link to another page , usually in the form of text links will be given a different color and the mouse cursor will change shape .
Various browsers are still using text display include Lynx , Links , elinks , w3m , and Netrik .
B. Various Kinds Browser Display Picture
As already mentioned earlier , the browser with images of a refinement of the browser to display text only . With this image will eliminate the boredom that of the user when browsing the internet ..
So I will mention some computer browsers and explanation .
1 . The Netscape Navigator
2 . Internet Explorer IE
3 . Operas
4 . Mozilla Firefox
5 . Google Chrome
6 . Safari Browser
7 . ICab
8 . Flock
9 . Wyzo
10 . The Desktop Web Browser
SITI RHOMATUL M
ReplyDeleteXI RPL 2
TUGAS 4
Damage to the flash that will be improved in this tutorial is a kind of software malfunction . The indication , Flasdisk still detected by the computer that gave rise to the location of the drive , can drive D , E , F and so on . Usually , damaged flash software , an error message will be used as the current " Write Protect Error " or " The disk is write protected " and so on . In other terms , this type of damage called ' corrupt ' .
Type of damage also has several levels from mild to severe . So , how to fix it depends on the level of damage to the flash itself.
Here is a tutorial fix flash of some level of damage :
1 . Lightweight ,
First of all go to Run , type cmd , then type chkdsk Drive Letter : / f
information
a. DOS chkdsk command is a command error checking on the disk
b . Letter Drive : is the location of the flash drive , this command places the contents of the flash drive .
c : / F was Fixes errors on the disk , the command erase errors on the disk .
Wait until the process is running 100 % , if the command appears Convert folder to file ? [ Type ] Y. then delete the files / folders had been corrupted by the command DEL V : * . * .
2 . Bit heavy ,
a. Download application Hewlet Packard USB Disk Storage Format Tool here .
b . Install the application, and enter the flash is problematic to one of the USB ports . Make sure your flash detected
c . Run the application HP USB Disk Storage Format Tool
d . Specify the drive where the flash is mounted ,
e . Select Create New or Replace Existing Configuration to create a new partition and erase the current configuration in the flash ,
f . Format your flash in accordance with the desired file system .
(http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?lang=en&cc=us&mode=3&taskId=135&swItem=MTX-UNITY-I23839)
3 . Weight
If the flash is damaged as a result of bad sectors , the following steps could be the last alternative use Partition Magic utility . This tutorial using Partition Magic 7.0 . With this software , we are trying to dispose Bad sectornya by:
a. Install Partitioan Magic 7.0
b . After the installation is complete , run the program . Press the menu Resize Partitions. Then navigate to the flash drive where we are . This menu will change the partition size flash us . Then specify the size by not including the location of bad sectors.
It should be noticed that PartitionMagic able to check for bad sectors through the Operations menu - > Check for Errors as a feature in Windows . ScanDisk
This utility needs to be done before running Partition Magic to ascertain the location of bad sectors . Another way is to delete the existing partitions on the flash through operatons menu button - > Delete .
SITI RHOMATUL M
ReplyDeleteXI RPL 2
TUGAS 5
flash media storage currently the most effective manual . So do not be surprised if the flash also be the most effective medium for spreading viruses anyway . Here are ways to stick become immune to the virus :
1 . The flash format . Better not use Quick Format so that the flash is really clean .
2 . Make a folder in flash and name it " autorun.inf " ( without the quotes ) .
3 . Go into the folder that you just created and make a notepad document therein . How to right click , select NEW > TEXT DOCUMENT . Give any name to the file that you just created . This name will we replace it with some special characters .
4 . After that , we will open the CHARACTER MAP program is in START > ALL PROGRAMS > ACCESSORIES > SYSTEM TOOLS > CHARACTER MAP.
5 . CHARACTER MAP Once open , select an existing font such as Arial Unicode embel2 Lucida Sans Unicode or Unicode . Scroll down until you see the letters of Japan , Korea , China , or other strange characters .
6 . Choose 4 or 5 characters that you want, then click copy .
7 . Rename the text file you created in step 2 above . Right-click on the file , select rename , then press CTRL + V. The file name was changed .
7 . Foxes attributes into super hidden autorun.inf folder . The trick , open a command prompt , then enter the flash drive where you stored . Then type attrib + s + h autorun.inf .
A step above the underlying logic that Windows can not read two files with the same name . Because we had no name flash autorun.inf , another file can not enter , so that the virus could not use the name autorun.inf as well .
HOPEFULLY HELPFUL
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
Quattro (meaning four in Italian) is the sub-brand used by the car brand Audi AG to indicate that all-wheel drive (AWD) technologies or systems are used on specific models of its Audi automobiles.[1]
The word "quattro" is a registered trademark of Audi AG, a subsidiary of the German automotive concern, Volkswagen Group.
Quattro was first introduced in 1980 on the permanent four wheel drive Audi Quattro model, often referred to as the Ur-Quattro ("Ur-" is a German prefix that means "original" or "first"). The term quattro has since been applied to all subsequent Audi AWD models. Due to the nomenclature rights derived from the trademark, the word quattro is now always spelled with a lower case "q", in honour of its former namesake.
Other companies in the Volkswagen Group have used different trademarks for their 4WD vehicles. While Audi has always used the term "quattro", Volkswagen-branded cars initially used "syncro", but more recently, VW uses "4motion". Škoda simply uses the nomenclature "4x4" after the model name, whereas SEAT uses merely "4". None of the above trademarks or nomenclatures defines the operation or type of 4WD system, as detailed below.
Longitudinal systems
Volkswagen Group has been developing four-wheel drive (4WD) systems almost since its inception during the Second World War. The Volkswagen Kübelwagen, Volkswagen Schwimmwagen and Volkswagen Kommandeurwagen were all military vehicles which required all four road wheels to be "driven", the latter being a 4WD Volkswagen Beetle. Their military, and four wheel drive experiences later aided them in designing the Volkswagen Iltis for the German military (Bundeswehr) in the 1970s. The Iltis utilized an early form of 4WD, which would later become synonymous with "quattro".
Locking centre differential
In that original quattro system, later found in road-going passenger cars, the engine and transmission are situated in a longitudinal position. Torque is sent through the transmission to a mechanical centre differential (commonly abbreviated to "diff") which apportions (distributes) the torque between front and rear driven axles. 4WD was permanently active.
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
Harvard Graphics was a pioneering presentation program developed for DOS and Microsoft Windows by Software Publishing Corporation (SPC). Harvard Graphics, Inc. released the first version in 1986 as Harvard Presentation Graphics.
History
Harvard Graphics was one of the first desktop business application software programs that allowed users to incorporate text, information graphics, and charts into custom slideshow presentations. The original version could import data from Lotus 1-2-3 or Lotus Symphony, charts created in Symphony or PFS Graph, and ASCII text. It could export text and graphics to Computer Graphics Metafile and to pfs:Write, also manufactured by SPC. Its use of vector graphics produced mixed results on the CGA and EGA displays common at the time, but output was usually sent to a slide printer or a color plotter.
"Presentation" was dropped from the name for the second release, which came in 1987, developed by Mario Chaves, Carl Hu, Lenore Kirvay, and Dana Tom. Harvard Graphics 2.0 added the ability to import the latest Lotus 1-2-3 spreadsheet data before generating graphics, as well as drawing and annotations for graphs. Version 3.0 was not released until 1991, offering improved editing functions, but its graphics and export capabilities were being outperformed by competitors like Aldus Persuasion and Lotus Freelance.
Harvard Graphics' Demise
The market leader through the late 1980s, Harvard Graphics struggled as the market shifted to Microsoft Windows. SPC released a version for Microsoft Windows 3.0 in 1991, but its market share never approached the 70% it had commanded in the DOS market; the Windows market came to be dominated by Microsoft PowerPoint and then the bundle of Powerpoint into Microsoft Office. In 1996, Serif purchased exclusive marketing rights to the product line of Harvard Graphics, Inc., and assumed product support responsibilities.
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
Adobe ImageStyler is a Photo & Image software developed by Adobe Systems. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Adobe ImageStyler:
BS Editor: Adobe ImageStyler software enables the non-professional designer to add a more sophisticated touch
to an otherwise dull Web site. Creative business users who rarely did any kind of creative
experimentation before using Adobe ImageStyler can Now add creative flair to any Web site. With its
flexible approach and powerful feature set, Adobe ImageStyler helps creative business users feel as
though they are trained designers.
Adobe ImageStyler introduces a new approach that empowers these unique business users to be
instantly creative, save time on production tasks, and quickly change the look and feel of a Web site.
The high fees of professional designers were forcing John B. Ferguson, Director of publications for the
American Academy of Pediatric Dentistry in Chicago, to cut back on future new Web pages and
updates to their Web site. "But, ImageStyler will cut our investment in our Web site in half," says
Ferguson. "With ImageStyler we'll be able to add pages, make more frequent design changes and still
save money. ImageStyler will be an absolutely essential part of our business." you can free download Adobe ImageStyler 1.0 now.
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
Firmware
A typical firmware-controlled device: a television remote control. Consumer products like this have been using firmware since the 1970s.
In electronic systems and computing, firmware is the combination of persistent memory and program code and data stored in it. Typical examples of devices containing firmware are embedded systems (such as traffic lights, consumer appliances, and digital watches), computers, computer peripherals, mobile phones, and digital cameras. The firmware contained in these devices provides the control program for the device. Firmware is held in non-volatile memory devices such as ROM, EPROM, or flash memory. Changing the firmware of a device may rarely or never be done during its economic lifetime; some firmware memory devices are permanently installed and cannot be changed after manufacture. Common reasons for updating firmware include fixing bugs or adding features to the device. This may require physically changing ROM integrated circuits[citation needed], or reprogramming flash memory with a special procedure. Firmware such as the ROM BIOS of a personal computer may contain only elementary basic functions of a device and may only provide services to higher-level software. Firmware such as the program of an embedded system may be the only program that will run on the system and provide all of its functions.
Before integrated circuits, other firmware devices included a discrete semiconductor diode matrix. The Apollo guidance computer had firmware consisting of a specially manufactured core memory plane, called "core rope memory", where data were stored by physically threading wires through (1) or around (0) the core storing each data bit.
Flashing (or flashing firmware) refers to the overwriting of existing firmware or data on ROM modules present in an electronic device with new data. This can be done to upgrade a device or to change the provider of a service associated with the function of the device, such as changing from one mobile phone service provider to another or installing a new operating system. If firmware is upgradable, it's often done via a program from the provider (see below), and will often allow the old firmware to be saved before upgrading so it can be reverted to if the process fails, or the newer version was worse.
LUTVIATUS SAADA
ReplyDeleteXI RPL 2
Malware
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.
Malware includes computer viruses (including worms, trojan horses), ransomware, spyware, adware, scareware, and other malicious programs. The majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics.
Software such as anti-virus, anti-malware, and firewalls are used by home users and organizations around the globe to try to safeguard against malware attacks.
As of 2012 approximately 60 to 70 percent of all active malware used some kind of click fraud to monetize their activity.
nama :ario wibowo
ReplyDeletekelas:XI RPL 2
4 Computer Solutions Who Can not Boot
Labels : Troubleshooting
+ Computer Error
4 Computer Solutions Who Can not Boot - Have a buddy who had experienced among which the computer can not boot , the usual problems like I experienced such as: the time of entry of a sudden Windows bluescreen on windows , Lost NTLDR file system , can get into windows but often Computers restart . There are so many problems on the computer , and my friend should be able to analyze the existing problems , so that one day when he meets with the same problems can be easily repaired .
In this discussion that talks about Fixing Computers that can not boot , but only 4 solutions that I can describe in this tutorial , we will discuss just like the following :
1 . Hardisk not detected and the computer can not boot
Such incidents are common and usually windows will display a message that is: Disk Boot Failure . To address such issues , usually IT Newbie do several things:
Check the condition of the IDE or SATA cable to the hard drive , my friend can make sure it is installed properly and correctly
For setting 2 hardiskIDEyang 1 cable plugged in , my friend can check the position of the jumper on the hard drive , for setting the master and his slave in order to distinguish
Check whether the hard drive is unreadable in the BIOS or not , try to check one by one . If the BIOS does not detect the problems exist on the hard disk
My friend can try to hold the disk surface , which is good for the hard drive / good it will feel the vibration .
2 . Could not Boot Computer Due to Overheating Processor
This problem never happened to my friend where the computer can not boot at all . and usually if the processor overheating or overheating will result Slows Computer Start and Restart the computer frequently .
To address such issues , usually IT Newbie doing some analysis , such as:
Check the condition of the fan heatsink / fan processor
Check rotation on the processor fan , if the fan starts to slow down .
Check the temperature of the processor in the hardware monitor in the BIOS
3 . Could not Boot Computer Due to memory and VGA card
This problem usually will sound a beep repeated times , and the display monitor does not want to appear like normally . To analyze it as follows :
Buddy can take off the first memory RAM or VGA card , slot pin can be cleaned and re- paired correctly .
Buddy can try installing RAM memory in another slot
For those who use more than one RAM memory , one can be removed and tested one by one .
If it still sounds a beep sound , my friend can try with another computer .
4 . Because the computer can not boot Windows System Corrupt
Such problems can be overcome by analyzing a message from windows that showed the presence of damaged or missing files , just to cope , as follows :
My friend can check RAM memory condition , if installed more than one memory and the memory is not compatible will usually display an error message on Windows systems .
Repair Windows pal , and how to repair her friend can follow my tutorial in the article How to Fix Windows without installing Birthday
Understand and analysis of problems in computer buddy , read the tutorial above with at least a friend can understand how to fix a computer that can not boot . And my friend does not need to pay to go to handyman services .
Had there are not understood from the above explanation and perhaps an error of writing the author , please maav and awaited criticism , suggestions and comments below it .
Hopefully this tutorial can be useful for IT buddy Newbie all .
IT Newbie greetings .
Read more : http://www.it-newbie.com/2013/01/4-solusi-komputer-yang-tidak-bisa.html # ixzz324Ezhcwr
NAMA :ARIO WIBOWO
ReplyDeleteKELAS:XI RPL 2
How to Fix Your Own Computer With Ease
Buddy kutikom we do not get confused when the computer is damaged and do not panic to bring her handyman service to try to learn Improving your own computer it charges its hefty tuh let ga wasteful : D hehe ok immediately wrote in pahamin yuuk below .
Damage to the computer in the outline can be divided into two , namely :
1 . Factors Hardware (Hardware )
2 . Factor parangkat (Software )
Damage Factor Hardware (Hardware ) can be caused by :
Installation hardware is not correct as cabling , jumpers , slots , bolts or screws etc.
Damage to the hardware components , such as Processor , Motherboard , Memory , VGA card , hard drive etc. .
Damage to parangkat Factor (Software ) can be caused by :
Damage to the Operating System
Damage to the Program Application
Damage to Drivers
Further descriptions of how mendeteksikerusakan on the PC and how to overcome them , are outlined below :
1 . HOW MENDETEKSIKERUSAKAN / ISSUES ON COMPUTER
At the time of pressing the power button , there is no sign of power / electricity Stroom emerging , such as lighting control / power LED , is not lit , the power supply fan is not alive .
Possible damage
Stroom electricity does not work
Power supply is broken
Chasing power cable swict not or incorrectly installed on the motherboard .
Motherboard CMOS jumper installed incorrectly ( in a clear position )
The motherboard is damaged ( dead )
How to cope
Check the electrical power supply if installed properly , stavol is functioning properly
Check the power supply must be replaced if damaged
Swict Check the power cable to the motherboard is installed correctly
Check the CMOS jumper if it is installed correctly
Check / Checks if the motherboard works fine / not
When you have ascertained the cause , the damaged components should be repaired or replaced
2 . At the time of pressing the power button , the LED light turns on , but there is no any display monitor screen
Possible damage
Power supply is not functioning optimally
Processor , memory , or motherboard is not working
Or VGA monitor does not work
Installation of power cable and the data cable is not correctly
How to cope
Check whether the power supply is functioning optimally .
Check processor , memory , or motherboard is functioning well
Check the monitor / VGA is good befungsi
Disconnect all power cables and data cables from his position , and try to power the computer
When you have ascertained the cause , problematic components can be replaced .
3 . At the time of pressing the power button , the display looks only monitored the BIOS program , there is a message " No System Disk / Invalid System Disk
Possible damage
There diskette mounted on drive A
Hard drive can not function
No OS
Damage to the OS
How to cope
Check if there is a diskette mounted on ploppy , if any issued and then enter .
Check if AC power cord / data hard drives have been installed properly
Check if there is any damage to the hard drive in the BIOS disk detection method , scandisk programs starupdisk
When you have ascertained the cause , the damaged components should be repaired or replaced including reinstalling the OS .
NOER IZZA AFCARINA
ReplyDeleteTUGAS MINGGU KE-11
How to Install Fuel In Computer Or Laptop
Rumahinformasi.com ( 08/01/2014 ) . Since the emergence of fuel in cross platform like Android and Apple's iOS , its existence is in the interest for the penggunakanya.nah what if that does not have any Android or Apple ? Do not need brsusah now my heart will review How To Install Computer Or fuel in Laptop.banyak way that can be done one with blue Stac , but it is berat.kita kunakan just simple manner and lightweight for menjalankannya.Oke just follow the How To Install on Computer Or Laptop BBM step by step below . ( How To Install on Computer Or Laptop BBM )
Tools to be prepared , first downloaded below :
- Java ( try downloading the latest version )
- SDK Manager
- adb
- BBM.apk
1 . Having all three of the above components you have downloaded the SDK Manager esktrack its first Android ( ADT Bundle for Windows ) .
2 . Upon entry into foldel in ekstrack ADT - bundle - windows- x86 - 20131030 , the road manager was in a way right SDK Right Click Run As Administrator
3 . Then a new window will appear SDK His manager , after the install package Androidnya.disini author uses the Android 4.3 version . and note that the installation process runs must be connected to internet.pilih package and install as shown below .
4 . Then Accept License Licensinya Android SDK and Android sysimage Intel License as on gamabr in this bawh
5 . Wait until the installation process is complete
6 . After all installation is complete , select " Tool " on the tabs at the top and then select "Manage AVDs " . after the new exit window click " New " and fill as shown below .
7 . Then Try Start.setelah road right -click your way to the right for the first time the start was rather lama.Jika look like the image below virtualisasinya means for the installation phase has been successfully
8 . Turning now to the stage for the installation of fuel nya.Nah if you already downloaded it earlier adb.zib , put it right in the folder
ADT - bundle - windows- x86 - sdk >> 20,131,030 >> tool
after that its adb.zip esktrack file . well as in ekstrack are installed in a folder that has adb in ekstrack tadi.copy 3 files contained in the folder that was installed at the exit adb folder and copy it also BBM.apk her into the adb folder . approximately as shown below this
9 . Then run the Android emulator once you have made , until the emulator path . After you create the Android emulator running . Please click a folder adb . Then hold down [ Shift ] and click >> open a command window here.seperti in the picture below
10 . Will then display the Command Prom.setelah appear that we install its fuel with printah :
adb install BBM.apk
Wait until it selesai.dan if successful it would be like in the picture below
11 . Well at this stage of the installation is finished living create your BBM account ..
Easy and simple bukan.cara Well I live in a dual - core with 2GB ram and a road with no less obvious to normal please leave jejek yes
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 10
CCleaner (also known as Crap Cleaner), developed by Piriform, is a utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer. A public version 1.01 for Mac OS X has been released along with a Network Edition. Its technology includes the ability to defrag the drives and access the system information in the online service Agomo, developed by Piriform.
Features
CCleaner supports the cleaning of temporary or potentially unwanted files left by certain programs, including Internet Explorer, Firefox, Google Chrome, Opera, Safari, Windows Media Player, eMule, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat, McAfee, Adobe Flash Player, Sun Java, WinRAR, WinAce, WinZip, GIMP and other applications along with browsing history, cookies, recycle bin, memory dumps, file fragments, log files, system caches, application data, autocomplete form history, and various other data. The program also includes a registry cleaner to locate and correct problems in the Windows registry, such as missing references to shared DLLs, unused registration entries for file extensions, and missing references to application paths. As of v2.27, CCleaner can wipe the MFT free space of a drive, or the entire drive itself.
Nama : Silvia Anggraeni
ReplyDeleteKelas : XI RPL 2
Minggu Ke : 11
eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders. Furthermore, eMule transmits data in zlib-compressed form to save bandwidth.
eMule is coded in C++ using the Microsoft Foundation Classes. Since July 2002 eMule has been free software, released under the GNU General Public License; its popularity has led to eMule's codebase being used as the basis of cross-platform clients aMule, JMule, xMule, along with the release of many eMule mods (modifications of the original eMule) on the Internet.
As of August 2013, it is the second most frequently downloaded project on SourceForge, with over 665 million downloads, only behind VLC media player.
MUHAMMAD SAFREZA
ReplyDelete11 RPL 2
TUGAS MINGGU TERAKHIR
Linux Mint 17 Qiana MATE Edition
Linux Mint 17 is a long term support release which will be supported until 2019. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
New features at a glance:
Update Manager
Drivers Manager
Login Screen
Language Settings
Software Sources
Welcome Screen
MATE 1.8
System Improvements
Artwork Improvements
Main Components
LTS Strategy
For a complete overview and to see screenshots of the new features, visit: “What’s new in Linux Mint 17 MATE“.
Important info:
Login screen freezes for German speaking users
NVIDIA Optimus cards do not work (yet)
EFI Support
Bluetooth
PAE required for 32-bit ISOs
Other issues
Make sure to read the “Release Notes” to be aware of important info or known issues related to this release.
System requirements:
x86 processor (Linux Mint 64-bit requires a 64-bit processor. Linux Mint 32-bit works on both 32-bit and 64-bit processors).
512 MB RAM (1GB recommended for a comfortable usage).
5 GB of disk space (20GB recommended).
Graphics card capable of 800×600 resolution (1024×768 recommended).
CD/DVD drive or USB port
Bug reports:
Please report bugs below in the comment section of this blog.
Please visit https://github.com/linuxmint/Roadmap to follow the progress of the development team between the RC and the stable release.
Linux Mint 17 Qiana Cinnamon Edition
Linux Mint 17 is a long term support release which will be supported until 2019. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
New features at a glance:
Update Manager
Drivers Manager
Login Screen
Language Settings
Software Sources
Welcome Screen
Cinnamon 2.2
System Improvements
Artwork Improvements
Main Components
LTS Strategy
For a complete overview and to see screenshots of the new features, visit: “What’s new in Linux Mint 17 Cinnamon“.
Important info:
Login screen freezes for German speaking users
NVIDIA Optimus cards do not work (yet)
EFI Support
PAE required for 32-bit ISOs
Other issues
Make sure to read the “Release Notes” to be aware of important info or known issues related to this release.
System requirements:
x86 processor (Linux Mint 64-bit requires a 64-bit processor. Linux Mint 32-bit works on both 32-bit and 64-bit processors).
512 MB RAM (1GB recommended for a comfortable usage).
5 GB of disk space (20GB recommended).
Graphics card capable of 800×600 resolution (1024×768 recommended).
CD/DVD drive or USB port
Bug reports:
Please report bugs below in the comment section of this blog.
Please visit https://github.com/linuxmint/Roadmap to follow the progress of the development team between the RC and the stable release.
Nama : Anisatul Khoiroh
ReplyDeleteMinggu Ke-9
How to Make a Portable Wifi in Android
Making Wifi in Android
Android phone that is much in demand by many people nowadays , are able to make a portable wifi android . Maybe we previously did not know that the Android phone is capable of being used as a portable hotspot or wifi . With the convenience offered in this Android application not be surprised if the current Android sales have increased and Android still tops as the gadgets are much in demand . Ways or steps taken to make a portable wifi in with Android , the following description .
1 . Entry into the settings menu in Android phones .
2 . In the settings menu there are a lot of menus or options . Then we choose wireless and networks section .
3 . At the wireless and networks we choose Tethering & Portable Hotspot menu .
4 . If we want to make arrangements in advance hotspot , we can choose a menu set up a wifi hotspot . On the menu we could rename the hotspot name and setting up a password so that no one can access it sembaranagn .
5 . Then we go back to the menu Tethering & portable hotspote , check or tick on the portable wifi hotspot .
If all the above steps have been done then , Android phones we now have become a portable hotspot . Have an Android phone , must have a lot of knowledge to be able to take advantage of all the applications that are available and the phone will be appropriate
Nama : Anisatul Khoiroh
ReplyDeleteMinggu Ke-10
How to Optimize Android Speed
Here is how his ways :
1 . Know How Much RAM or Your Memory
The first step is to know how much RAM is on your Android , we know that there are several types of Android phones are high-end or upper class , lower class that cost up to $ 500 thousand late . But we should be aware is how precisely the capabilities of your Android , if you choose Android underclass of low-end , then do not expect much for the use of multimedia applications or games big games are easy , because it is due to the capacity of the RAM that has been pressed so that the performance may not be can be maximized . So it might be wise to install the application and usage , adjust the amount of memory and your processor .
2 . Remove Application and Cache Periodically
The one that makes the weight is the number of applications that are not really needed , it could be because of its many shortcuts and widgets . Then delete the application on a regular basis that is not too necessary . Both also need to clear the cache on a regular basis , applications such as chat applications have a lot of cache , so just delete the cache is not needed , you can use the application cache cleaner from the Play Store .
3 . Install Android Application Maintenance
There are several applications that can take care of your android and the stability of the process that we discussed this time is two applications, namely Task Killer and Greenify . Task Killer as the name implies , is the application to forcibly close the application that is running in Backgroud . Applications running in the background can slow down the performance of Android as a whole , especially if its application is great, just close the application that takes a lot of memory with Task Killer . Both are Greenify , almost the same as Task Killer but Greenify more " wise " in the process of removing the background , which is not mengclose is " force " but do hibernate , so the required application can be used at any time quickly . 2 The application can be by downloading from the Google Play Store .
4 . Rooting and Memory Allocation
Some say that going root your Android can be dangerous and lowers the value of the sale , but they're not . By downloading rooted your Android , you more flexibility in the treatment of Android , with mensintall some important applications and some important processes , which can ultimately increase the speed of your android . In addition to the use of external memory Multimedia , do not force the internal memory to continue processing as it makes slow , allocate external memory games and also for games other large applications .
Once you take care of your Android or open it to large programs will be more comfortable , because the process is faster. Can also save your battery , all of this is related because if the frequent application in the process of making the battery run out quickly and are not durable .
Nama : Anisatul Khoiroh
ReplyDeleteMinggu Ke-11
How To Hide And Open Drive Hidden In Computer
Here's the steps you can do to be concealed or open a hidden Drive command " DISKPART " :
First please you click on the Start menu >> Run >> type " CMD " ( without the quotes ) >> Click OK
Please type the following command " DISKPART " and press Enter
Type " list volume" in view of the CMD and press Enter ( This command is used to view a list of drives on your computer)
The next step ie select the Drive you will hide , suppose we take the example here is " Drive E "
To hide E Drive please type " volume 2 " then Enter ( figure 2 are obtained from the placement volume Drive E , so adjusting the figures that appear straight on your computer )
Next type " remove letter E "
Step hide E Drive on the computer is finished , type " exit " to exit the DISKPART command .
Restar your computer and go to my computer to make sure that Drive E is hidden .
To view or restore it , please do the same command from step to step on the determination of the hidden volume that is step five .
Please place order remove letter E becomes >> type " assign letter E "
Restart your computer
Hide Drive Computer Using gpedit command
Hide Drive Computer Using gpedit command
In addition to using the DISKPART command , Drive meyembunyikan computer we can also do this with command gpedit . Here are the steps please listen completely below :
The first step that is click Start >> Run >> type the command " gpedit.msc ( without the quotes ) then click OK
More will appear ampilan Group Policy , please double click on the text " User Configuration " >> Administrative Templates >> Windows Components - > Windows Explorer - > next select Hide these specified drives in my computer on the right side of the display window .
After opening the Hide specified drives in My Computer window will appear just please you select " enable" and select the drive that you want to hide.
Suppose you want to hide E Drive then select RESTRICT E drive only further click Apply and OK
Step hide Drive E is complete, now check on my computer to see the results.
To restore hidden Drive please do the same command as above later on point " Hide specified drives in My Computer " please select "Not Configured " then click Apply and OK .
VIVI F.D.N
ReplyDeleteXI RPL.2
Perhaps the general dah Software is widely used people , both just a fad or a tuk for a song ...
Here I try to explain what and usability of the software.
This software has an output Syntrilium Co. single track and multi track as shown below . From this picture we can see that this is a single track where we can do the cutting function by means of block samapai wave which one we want to delete , then press delete . I 'll tell you what ever is inside menu2 cool edit this .
1 . The file : we can create a new project ( new session ) , or open a job file ( open session ) , and save in the format we want
2 . Edit : its usefulness tuk edit the file by pressing the edit and choose , what we want , such as punch , block group , mix down files , remove blocks and lain2 snapping .
3 . In the menu view , to open and close the taskbar we want ....
4 . Effect : This effect is very important function in the edit file that will be the end of our work , in terms of improvement of our work .. No plugins volume , equalizer , normalize and lain2 ....
While in MULTI TRACK , how it works enough that we have to import file2 into file open track which provided, as shown below :
from the picture , we can see the menu Panning , Volume , mute , fx , out , useful and influential records of the file that we import .... MULTI TRACK function is usually used for Recording , which function as fx , we can insert an fx that , for improving file
record , to merecord file that will insert itself ... this might be an outline of the Cool Edit this , then I will write another tutorial software .
Hopefully this article useful to you .
TITI NUR JAYANTI XI RPL 2
ReplyDeleteWith USB Booting
This time I wrote a trick windows , and I have tried these results are 100 % successful . Directly to the scene
USB flash has completely replaced floppy disks . He is not only cheap but also very practical , durable , and can have the capacity to anticipate besar.Untuk computer will not boot , my friend must have a bootable USB drive , my friend can solve it more quickly by means of :
Insert the USB into a USB port on a computer
Click Start > RUN > type CMD
Already munculkah Command Prompt window when I type " diskpart " without the quotes and press Enter . Then type " disklist " press Enter again
Decide in advance from a list of disks that display which is a USB drive . Record the number that identifies
Type the command " Select disk # # # " into the Command Prompt window to format the USB drive . Replace # # # with the number you get in step 4 earlier . Press "Enter " clean .
Press "Enter " Create Partition Memory press "Enter " .
Select the Partition # # # press "Enter " .
Format FS = NTFS . Press "Enter " Assign . Press "Enter " exit , press "Enter "
Insert the Windows installation CD buddy . The computer will read the CD , and a window will appear on the screen . Look for the letters which is a symbol of the CD - ROM and USB Drive .
Type the following command to CMD :
* = CD boot , replace * with letter which is a symbol of the CD - ROM , press "Enter "
Bootsect.exe / NT60 @ , replace @ with a letter which is a symbol of the USB drive , press "Enter "
Copy Boot Information from the installation CD to a USB drive by entering the command " xcopy @ : * . * / S / e / f & :/ " into CMD . Replace & with the letter which is the symbol of the CD - ROM and replace @ with a letter which is a symbol of the USB Drive . Press "Enter " . Allow the computer to copy the data
Unplug the USB drive from the USB port , replace the lid , and label " bootable " with markers , and store safely . Remove the Windows installation CD and Done
NAMA :ARIO WIBOWO
ReplyDeleteKELAS:XI RPL 2
HOW TO CORRECT BROKEN LAPTOP KEYBOARD or ERROR
how to fix a laptop keyboard } } for my friends blog article computers that are experiencing damage to The keyboard then this tutorial is suitable for you and which do not need are also required to read for at least this be your insight to address the damage to the computer .
Artike short computer also useful for various problems of damage to the keyboard with all brands of Laptops :
how to repair dell laptop keyboard
how to fix a compaq laptop keyboards
how to fix a laptop keyboard acer aspire one
how to fix the error asus laptop keyboard
how to fix a laptop keyboard lenovo
Here is how to cope with a broken keyboard or error :
Buttons Keyboard Error or Not Functioning
Characteristics :
One of the keys of the keyboard do not work
Like button depressed continuously .
Arise as long beeps continuously depressed button .
Usually fitted to light must press one of the letters
How to Fix the Error Keyboard Keys
Disconnect all connections energy ( carger and battrai , if not off can damage other components )
Disconnect the keyboard of his laptop
Release all the keyboard keys ( be careful not to break kaki2nya let alone disappear. That mending photograph forgetful friend once wrote keybordnya let me not forget . Hee :)
After all off with a hair spray evenly . given spray more on the key error .
When finished reattach Laptop Keyboard / Notebook
If the Fix Laptop Keyboard as above and not functioning properly , you can clean the dust / dirt keyboard with Brush / water / alcohol and dry it first .
Keyboard keys mixed up letters ( m , j , k , l , u , I, o with 0 , 1 , 2 , 3 , 4 , 5 , 6 )
Characteristics of Damaged Keyboard :
Often when finished use an external keyboard , after we unplug the keyboard and we use the default keyboard laptop it has changed : when we press the m , j , k , l , u , I, o that appears is the number 0 , 1 , 2 , 3 , 4 , 5 , 6 . causes of this condition is usually due to the Fn function key exchange .
How to Fix a Laptop Keyboard on an inverted function of the Fn key by mistake :
Press and hold the Fn key and wrote Do not let go , then press the numeric key function numeric.Tombol if the laptop is usually located on the top row parallel to the F1-F12 function keys , labeled Insert and NumLK .
After that release both buttons . Now try to press the u , if it still appears the number 4 means have not been successful , repeat once more .
In essence, the key function is similar to the caps lock key , is pressed once turned into a capital letter , capslock button is pressed again to change back to lowercase .
Keyboard Keys Not Functioning at Once
The characteristics of damage to the keyboard :
All Buttons Not Working at all
Even Lamp Caps Lock and Num Lock does not live
Normal Macet-macetan/Tidak Keyboard Keys
How to Fix keyboard not working at all :
Perform Step on issues No. 1 to its conclusion
Try cleaning with a water / alcohol and dry it first until it is completely dry .
Note Button USB keyboards , there are times when the USB key ( plugs keyborad ) is not functioning properly .
Try Restart your laptop first.
Hopefully this article how to fix this laptop computer is useful for friends who need and add insight to the readers of this blog . If interested please Read How To Make Antivirus
fujianto
ReplyDeleteminggu ke 4
change PDF to Ms Word by a short time, cekidot:
First open the site, please click http://www.pdfonline.com/pdf-to-word-converter/
Then click the "Upload a File To Convert ..", it will display the Pop Up to select the PDF file to be converted to MS Word on your computer.
Wait for the process several times,
[IMG]
After that click on the link "Download" as in the picture below
[IMG]
Then select "Download Word Files" and save the downloaded file to your computer.
[IMG]
fujianto
ReplyDeleteminggu ke 6
change the look or theme facebook
how to edit the look of facebook , change facebook , how to install themes on facebook , how to change the look of the website , how to change the website , on facebook by giving theme , theme for facebook , facebook latest tricks 2013 , new facebook themes , latest themes , change facebook theme , create facebook theme , facebook theme , how meruba , facebook theme , how to change the theme , how to change the theme on the blog , facebook themes , how to change the theme , facebook themes , facebook theme , how to make the look more cool facebook , latest facebook theme , how to install themes The blog , create a facebook themes , themes for facebook , how to change the theme , how to change the theme , how to make facebook themes , free facebook theme , facebook theme download free , how to create facebook theme , facebook theme download , free download facebook theme , facebook theme app , how to create a theme in facebook , change facebook themes , latest facebook theme , facebook theme replace , change facebook theme , how to change theme facebook , change facebook themes , themes for facebook , how to change theme facebook , cool facebook theme , how to change facebook theme , how to change facebook theme , facebook theme download , theme facebook .
fujianto
ReplyDeleteminggu ke 7
about the creators of facebook
It seems like a lot of people who do not know about the background of the founder of the facebook social networking fb now so many who use it , not only in Indonesia but throughout the world have been many who use it , is really a great result at all .
Perhaps among the artists currently adele so much in talking about , but in the present figure Mark Zuckerberg really talk much in person because his company has rocked the world with a very large stock valued at all , let us try to discuss about Biogafi and Biodata Mark Zuckerberg this .
Biogafi and Biodata Mark Zuckerberg - Be aware poorer Zuckerberg was born in 1984 in White Plains , New York , still very young but very clever idea yes , and now he's really become extremely wealthy just by facebook , she has three sisters ie Randi , Donna , and Ariell , Zuckerberg on Facebook profiles , he mentions interested in " openness , creating something that help people connect and share everything that is important to them , revolutions , information flow , minimalism .
Mark Zuckerberg Biography and Biodata
Birth Name : Mark Elliot Zuckerberg
Date of Birth : May 14, 1984 ( age 28 )
Place of Birth : White Plains , New York , USA
Residence: Palo Alto , California [ 2 ]
Tribe : Jewish
Alma mater : Phillips Exeter Academy
Occupation : CEO / President of Facebook
Spouse : Priscilla Chan
Zuckerberg launched Facebook from his Harvard dorm room on February 4, 2004 , it was the age of facebook already quite long yes , Zuckerberg moved to Palo Alto , California, with Moskovitz and some friends . They rented a small house that serves as an office . During the summer , Zuckerberg met Peter Thiel who invested in the company . They got their first office in mid-2004 . According to Zuckerberg , they planned to return to Harvard but eventually decided to remain in California . They have rejected an offer by a large company that will buy Facebook . In an interview in 2007 , Zuckerberg explained his reasoning :
It's not about the money . For me and my colleagues , the most important thing is that we create an open information flow for people . Media company owned by conglomerates is just not an attractive idea to me . He revisits the same goals to Wired magazine in 2010 : " All I care about is the mission , making the world open . " Previously , in April 2009 , Zuckerberg sought the advice of former Netscape CFO Peter Currie about financing strategies for Facebook .
Biography and Biodata Mark Zuckerberg - On July 21, 2010 , Zuckerberg reported that the company reached 500 million users . When asked if if could get more income from advertising as a result of its phenomenal growth , he explained : I guess we could ... If you look at how much of our page is taken for serving ads compared to the average search query . Average for us is a little less than 10 percent of the pages , and the average for search is about 20 percent taken by the ad . That's the simple things we could do . But we do not like it . We make enough money . True , I mean , we are keeping things running , we are growing at the rate we want
fujianto
ReplyDeleteminggu ke 8
excess windows 8.1
1 . ) Fast Booting
There is indeed inevitable , rapid boot process is the dream of all PC users around the world . And as has been previously known that Windows 8 has advantages in terms of boot faster than previous versions of windows . In this version of Windows 8.1 , which Microsoft tried to make the boot process becomes much faster than previous versions of Windows , even though Windows 8 .
2 . ) Better Performance
One of the advantages of windows 8 is the disappearance of the Aero Themes systems are replaced by the Metro UI . Well , this 8.1 on windows microsoft have perfected the system previously diterpakan Metro UI on Windows 8 , as a result the performance of Windows 8.1 lighter and faster , the process also becoming better multitasking so that keeps us from the word " hang " or " not responding" on the PC we .
3 . ) More Elegant and Fresh Start Menu
In Windows 8 earlier , we have known icon shaped tile size can be changed " larger " or "smaller " , on windows 8.1 , we can replace it with 4 kinds of sizes, Large , Wide , Medium , and Small . Not only that , the background start menu can we change the existing background on the desktop . And many other features that make the start menu we become more " alive " .
4 . ) Supercharged Search
Search on Windows 8.1 system has been integrated with Bing search , so if you type something in the start menu , and it can not be found by computer search engines , there will be an option to select a search option from Bing , of course, would be useful if we are in the online state .
5 . ) And Many More Better Apps
At this 8.1 windows system , windows apps default of the OS is equipped with a new application , namely Alarm , Food & Drink , Health & Fitness, Scan , Sound recorder , and Help & Tips . In addition to the application store windows can be automatically updated when we have an internet connection , so we did not bother to open the windows store if we simply update the application . This feature stores and improve its windows by minimizing the possibility of " pending downloading " and eliminates common errors encountered while using Windows 8 earlier .
6 . ) Less Storage Space
Although Windows 8.1 can be said to have a more full featured than Windows 8 , but Windows 8.1 did not make this size has swollen . The size of windows 8.1 is even 8-15 % smaller than Windows 8 . This excess will certainly have an impact on saving storage system in our PC .
7 . ) Welcome back "Start Button " !
Maybe some users of Windows 8 was disappointed with the decision microsoft seaakan removing the start button is ingrained in some users of this OS . Given that , the microsoft evaluate and finally realized how about the importance of the start button on the menu . So they bring back the start button , though in the end if pressed will bring up the start menu display . But with this menunjukaan that Windows 8.1 was not aimed at the tablet / PC with touch screen only, but to all types of PCs .
Perhaps there are many other advantages of Windows 8.1 was compared to Windows 8 , but I can not mention one by one , clear windows 8.1 can be said to be better than Windows 8 . So , I recommend to update your windows to windows 8.1 .
This comment has been removed by the author.
ReplyDeleteGreat content thanks for sharing this informative blog which provided me technical information keep posting.
ReplyDeleteBlueprism training in Chennai
Blueprism training in Bangalore
Blueprism training in Pune
Blueprism training in tambaram
Blueprism training in annanagar
Blueprism training in velachery
Blueprism training in marathahalli
Your good knowledge and kindness in playing with all the pieces were very useful. I don’t know what I would have done if I had not encountered such a step like this.
ReplyDeleteDevOps online Training|DevOps Training in USA
Devops Training in Chennai
Devops Training in Bangalore
Good Post! Thank you so much for sharing this pretty post, it was so good to read and useful to improve my knowledge as updated one, keep blogging.
ReplyDeleterpa training in Chennai
rpa training in anna nagar | rpa training in marathahalli
rpa training in btm | rpa training in kalyan nagar
rpa training in electronic city | rpa training in chennai
rpa online training | selenium training in training
Excellent blog, I wish to share your post with my folks circle. It’s really helped me a lot, so keep sharing post like this
ReplyDeletepython training in rajajinagar
Python training in btm
Python training in usa
Python training in marathahalli
Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic.
ReplyDeleteData Science course in Chennai
Data science course in bangalore
Data science course in pune
Data science online course
All the points you described so beautiful. Every time i read your i blog and i am so surprised that how you can write so well.
ReplyDeleteangularjs-Training in pune
angularjs-Training in chennai
angularjs Training in chennai
angularjs-Training in tambaram
angularjs-Training in sholinganallur
Whoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.
ReplyDeleteAWS Training in Bangalore | Amazon Web Services Training in bangalore , india
AWS Training in pune | Amazon Web Services Training in Pune, india
Really very happy to say that your post is very interesting .I never stop myself to say something about it.You did a great job.Keep it up.
ReplyDeleteWe have an excellent IT courses training institute in Hyderabad. We are offering number of courses that are very trendy in the IT industry. For further information, please once go through our site.
Python Training in Hyderabad
Change the speed of your computer by downloadram for your computer and enjoy the high speed from downloading more ram to your PC for free!
ReplyDeleteAnd indeed, I’m just always astounded concerning the remarkable things served by you. Some four facts on this page are undeniably the most effective I’ve had.
ReplyDeleteSLAJOBS REVIEWS AND COMPLAINTS
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
We are China Frequency Shift Repeater Manufacturers & suppliers, Specialized in Frequency signal coverage solution.
ReplyDeleteMore-effective to improve signal coverage and quality help operators get fast return under easy installation and maintenance.
If interesting Frequency Shift Repeater, pls click here Frequency Shift Repeater.
I’m impressed, I must say. you hit the nail on the head. Your idea is outstanding; the issue is something that not enough people are speaking intelligently about. I am very happy that I stumbled across this in my search for something relating to this.
ReplyDeleteEcommerce fulfillment
Interesting and impressive information, definitely will be helpful for those who are looking for Melbourne pc repairs and related high-quality computer repairs services in Melbourne.
ReplyDeleteCompany Profile >>>>> Download Now
ReplyDelete>>>>> Download Full
Company Profile >>>>> Download LINK
>>>>> Download Now
Company Profile >>>>> Download Full
>>>>> Download LINK U5
perde modelleri
ReplyDeletesms onay
Vodafone mobil ödeme bozdurma
nft nasıl alınır
Ankara evden eve nakliyat
trafik sigortası
DEDEKTÖR
web sitesi kurma
Ask kitaplari
beykoz samsung klima servisi
ReplyDeleteüsküdar samsung klima servisi
beykoz mitsubishi klima servisi
üsküdar mitsubishi klima servisi
pendik vestel klima servisi
maltepe daikin klima servisi
kadıköy daikin klima servisi
kartal toshiba klima servisi
tuzla lg klima servisi
Good content. You write beautiful things.
ReplyDeletevbet
hacklink
sportsbet
taksi
sportsbet
mrbahis
vbet
hacklink
mrbahis
niğde
ReplyDeletekırklareli
osmaniye
siirt
urfa
Jİ46MH
çorum
ReplyDeleteantep
ısparta
hatay
mersin
H3S
Ankara
ReplyDeleteAntalya
istanbul
Ordu
izmir
Z8Z
Eskişehir
ReplyDeleteDenizli
Malatya
Diyarbakır
Kocaeli
YPU0YK
href="https://istanbulolala.biz/">https://istanbulolala.biz/
ReplyDeleteETTN
urfa evden eve nakliyat
ReplyDeletemalatya evden eve nakliyat
burdur evden eve nakliyat
kırıkkale evden eve nakliyat
kars evden eve nakliyat
4H2YC
F305C
ReplyDeleteŞırnak Evden Eve Nakliyat
Kastamonu Parça Eşya Taşıma
Sinop Parça Eşya Taşıma
Ordu Lojistik
Bingöl Parça Eşya Taşıma
B62D6
ReplyDeleteKocaeli Evden Eve Nakliyat
Amasya Lojistik
Karapürçek Fayans Ustası
Çerkezköy Halı Yıkama
Edirne Lojistik
Van Şehirler Arası Nakliyat
Keçiören Fayans Ustası
Tunceli Evden Eve Nakliyat
Xcn Coin Hangi Borsada
7865C
ReplyDeleteErzincan Parça Eşya Taşıma
Aksaray Şehir İçi Nakliyat
Kütahya Lojistik
Kırklareli Şehir İçi Nakliyat
Iğdır Şehirler Arası Nakliyat
Edirne Lojistik
Erzurum Evden Eve Nakliyat
Hakkari Şehir İçi Nakliyat
Yenimahalle Fayans Ustası