Hello,
I would like to introduce you to Fotolia.com. Fotolia offers millions
of royalty free images from $1? Its simply the best deal for stock photos ever!
agus
Selasa, 30 Desember 2008
Rabu, 23 April 2008
deka ronaldo has invited you to join Friendster
| ||||||||||||||||||||||||||||||||
| Copyright 2002-2008 Friendster, Inc. All rights reserved. U.S. Patent No. 7,069,308, 7,117,254 & 7,188,153 568 Howard Street, San Francisco, CA 94105, USA Privacy Policy | Unsubscribe | Terms of Service |
Sabtu, 29 Maret 2008
Web 3.0
Web 3.0 what it's? Web 3.0 or Semantic Web project to make a universal medium which can change over the information only give a " document" with the Ianguage which can be understood the computer in context W3. In fact this Semantic Web growth from use of standard web, Ianguage of markup and other tool process.
Intention of this Semantic Web us (human) can use the computer to automatically to look for the very data close to what we intend. While idea the core important for create global meta data which can explain the the data, where computer can understand and interpret the meta data and also the data better. In short Web 3.0 project of artificial inteligence which is the in form of web which can look for the everything that wanted precisely.
If ahead (possible by now) we recognize which its name Microsoft Encarta which its price software opening make the hair of cepet ubanan, now we recognize the wikipedia, where any data which we searching, will be presented a good technique and structure. Even to the fore its if there have Wikipedia 3.0, I (and people) assure the, Google even also pass…
But Emulation Google And Semantic Web note of then make the the giant search engine bounce the breakdown. Google Co-Op a new product which growth adaptation from Web 3.0. Where Google give the opportunity to all its consumer to assist the other consumer in yielding correct seeking.
Seemingly Google have started the fear. Its proof of Google Co-Op have its dirilis beta version. While Wikipedia 3.0 myself not yet succeeded to find the rilisnya. Hayooo of Giant and giant candidate… Spirit !!!
--
bungas1405 gank
Intention of this Semantic Web us (human) can use the computer to automatically to look for the very data close to what we intend. While idea the core important for create global meta data which can explain the the data, where computer can understand and interpret the meta data and also the data better. In short Web 3.0 project of artificial inteligence which is the in form of web which can look for the everything that wanted precisely.
If ahead (possible by now) we recognize which its name Microsoft Encarta which its price software opening make the hair of cepet ubanan, now we recognize the wikipedia, where any data which we searching, will be presented a good technique and structure. Even to the fore its if there have Wikipedia 3.0, I (and people) assure the, Google even also pass…
But Emulation Google And Semantic Web note of then make the the giant search engine bounce the breakdown. Google Co-Op a new product which growth adaptation from Web 3.0. Where Google give the opportunity to all its consumer to assist the other consumer in yielding correct seeking.
Seemingly Google have started the fear. Its proof of Google Co-Op have its dirilis beta version. While Wikipedia 3.0 myself not yet succeeded to find the rilisnya. Hayooo of Giant and giant candidate… Spirit !!!
--
bungas1405 gank
PHP 2
After we know the history and way of job which have been writed previous artile about php, this article will be explained furthermore about PHP. Started from excellence from PHP, apart from writed previously, PHP still have a lot of excellence compared to other Ianguage pemrograman web, among other things shall be as follows:
>> <b>Quickly </b>, because code PHP sandwiched code HTML, so that time to process and loading of page;yard web become quicker
>> <b>Free </b>, it' mean to get the PHP needn't pay, although earn also we give the donation to developer group >> <b> Easy </b>, it' mean for the syntak of this PHP relative modestly and easy to understand even for the people who of non programmer. PHP desain for easy to sandwiched code HTML
>> <b>All Purppose </b>, because this PHP earn the install assorted environment, good Linux, Windows, Macintosh, and most variant from Unix
>> <b>Availibility of Technical Support </b>, cause Internet a lot of forum and also milis-milis providing information which is a lot of hitting PHP
>> <b>Peaceful </b>, during we [the koding truly, hence user cannot see the code which we write.
>> <b>Can be developed </b>, in if us will and own the ability pemrograman especially pemrograman C (because PHP made by C), hence we can develop and fox PHP as according to our desire.
PHP represent the Ianguage of pemrograman server eunuch, what its meaning PHP cannot in direct corollation to computer user. So that PHP cannot show off pursuant to status of computer user, taking example pursuant to movement mouse. For the reason PHP cannot make the efeks like menu navigasi which is the in form of drop down list and menu navigasi which can turn colour. On the other side, Java Script represent the Ianguage of pemrograman client eunuch, cannot access the server, cannot take the data and also save the data at server. But don't worry, our cause can combine the use PHP ( erver of eunuch of programming language) by Javasript (Client of Eunuch of programming language).
Use PHP in making Website, Usually combined with the dissimilar programs needed that is web server and Database. Web Browser which commonly use Apache, while database used Mysql. Second Use program above, more or less of equal its reason with the use PHP, that is open source, and have been proven to represent the very good combination. Nevertheless combinable PHP also by web other server like taking example IIS from Microsoft.
--
bungas1405 gank
>> <b>Quickly </b>, because code PHP sandwiched code HTML, so that time to process and loading of page;yard web become quicker
>> <b>Free </b>, it' mean to get the PHP needn't pay, although earn also we give the donation to developer group >> <b> Easy </b>, it' mean for the syntak of this PHP relative modestly and easy to understand even for the people who of non programmer. PHP desain for easy to sandwiched code HTML
>> <b>All Purppose </b>, because this PHP earn the install assorted environment, good Linux, Windows, Macintosh, and most variant from Unix
>> <b>Availibility of Technical Support </b>, cause Internet a lot of forum and also milis-milis providing information which is a lot of hitting PHP
>> <b>Peaceful </b>, during we [the koding truly, hence user cannot see the code which we write.
>> <b>Can be developed </b>, in if us will and own the ability pemrograman especially pemrograman C (because PHP made by C), hence we can develop and fox PHP as according to our desire.
PHP represent the Ianguage of pemrograman server eunuch, what its meaning PHP cannot in direct corollation to computer user. So that PHP cannot show off pursuant to status of computer user, taking example pursuant to movement mouse. For the reason PHP cannot make the efeks like menu navigasi which is the in form of drop down list and menu navigasi which can turn colour. On the other side, Java Script represent the Ianguage of pemrograman client eunuch, cannot access the server, cannot take the data and also save the data at server. But don't worry, our cause can combine the use PHP ( erver of eunuch of programming language) by Javasript (Client of Eunuch of programming language).
Use PHP in making Website, Usually combined with the dissimilar programs needed that is web server and Database. Web Browser which commonly use Apache, while database used Mysql. Second Use program above, more or less of equal its reason with the use PHP, that is open source, and have been proven to represent the very good combination. Nevertheless combinable PHP also by web other server like taking example IIS from Microsoft.
--
bungas1405 gank
framework
According to English dictionary - Indonesia compiled by John M. Echols And Hassan Sadily framework own the framework meaning. But me prefer to interpret this framework become the framework. In the world of IT, framework consisted of the module - module having its duty masing - masing (handling database, Xmlrpc, enamel, dll) and own the order wear the (order of code writing program the, directory structure / file, and module use). is true become slower and more complex, for you which usually write the code program without using framework. But trust, if have accustomed use the framework hence you'd feel its benefit which so excrutiatingly that is time of slimmer code and workmanship as well as file - your file more structure.
We assume you ordered to make the program reading RSS and then present. By using framework, we only omit to call the module handling RSS, make the object, call the methodnya, later present. Simpel? Only trivial lines just just code. This matter will very far differ if you do without framework.
Framework non representing inscrutable appliance which can give the us of all which we iginkan. But, Framework only represent the assistive appliance. If you ordered to design the big sitem, use your logic to design it and framework as a means of assist for the implementation of your device.
In this time made available a lot of framework you which can select;choose and use to assist your work. There [is] . NET (to make the application which walke Operating System Windows), Ruby On Rails ( to make the application web with the Ianguage Ruby), Django ( o make the application Web with the Ianguage Python) and a lot of again. Become its core, this framework made to assist the pemrogram in order not to start from 0 (zero) again every projectnya. Easy clarification and follow the example of above can make the you more understanding.
--
bungas1405 gank
We assume you ordered to make the program reading RSS and then present. By using framework, we only omit to call the module handling RSS, make the object, call the methodnya, later present. Simpel? Only trivial lines just just code. This matter will very far differ if you do without framework.
Framework non representing inscrutable appliance which can give the us of all which we iginkan. But, Framework only represent the assistive appliance. If you ordered to design the big sitem, use your logic to design it and framework as a means of assist for the implementation of your device.
In this time made available a lot of framework you which can select;choose and use to assist your work. There [is] . NET (to make the application which walke Operating System Windows), Ruby On Rails ( to make the application web with the Ianguage Ruby), Django ( o make the application Web with the Ianguage Python) and a lot of again. Become its core, this framework made to assist the pemrogram in order not to start from 0 (zero) again every projectnya. Easy clarification and follow the example of above can make the you more understanding.
--
bungas1405 gank
firefox portable
One of application portabel which is a lot of enthused is firefox portable edition. its First version rilis at june 2004 and last have reached the version 2.0.0.12 [at] Februari 2008.
One of excess of mozilla firefox that is open source software so that its dynamics quite a lot. Us can conduct some configuraton in it like adding plugin for the akselerator of download, opening document, bookmark a site, making posting wordpress, and a lot still other. Than security facet there [is] which meng-claim if firefox more pre-eminent compared to internet explorer browser.
So now question why we require the portabel? Practical reason its kayak most competent selected. With the our system portabel configuraton can xself how firefox which we maukan and afterwards keep in USB flash sis and ready to Used in the other computer without having to menginstall and configuraton.
Way of its use very easy
1. Download from situs http://portableapps.com/apps/internet/firefox_portable you'd get the file firefox_portable_…exe
2. double click
3. Follow the steps
4. YYou will question where you'd place the machine file the core important. Folder will be called Firefoxportable, placing storage media your portabel for example E:\Firefoxportabel
5. Open the the folder, double click file of Firefoxportable.Exe and application ready to use.
--
bungas1405 gank
One of excess of mozilla firefox that is open source software so that its dynamics quite a lot. Us can conduct some configuraton in it like adding plugin for the akselerator of download, opening document, bookmark a site, making posting wordpress, and a lot still other. Than security facet there [is] which meng-claim if firefox more pre-eminent compared to internet explorer browser.
So now question why we require the portabel? Practical reason its kayak most competent selected. With the our system portabel configuraton can xself how firefox which we maukan and afterwards keep in USB flash sis and ready to Used in the other computer without having to menginstall and configuraton.
Way of its use very easy
1. Download from situs http://portableapps.com/apps/internet/firefox_portable you'd get the file firefox_portable_…exe
2. double click
3. Follow the steps
4. YYou will question where you'd place the machine file the core important. Folder will be called Firefoxportable, placing storage media your portabel for example E:\Firefoxportabel
5. Open the the folder, double click file of Firefoxportable.Exe and application ready to use.
--
bungas1405 gank
ASPEdit
One of Ianguage of pemrograman server eunuch that is ASP made in Microsoft because in this time still mostly computer consumer still use the product from Microsoft for the operating system of its. ASP Ianguage of pemrograman server eunuch owning ability koneksi with the database [of] like Microsoft Access.
In development website base on the ASP can use the assistive appliance software ASPEdit made in from Tashcom software centering English. IN this assistive software made available immeasurable tool started from static making web like HTML or DHTML with the Ianguage of scripting Javascript and or VB Script. this Usage Software can lessen the recalling energy go together the tag-tag in pemrograman HTML. So that consumer will be more be facilitated.
Others, this software also base on the GUI (<i>Graphical User Interface</i>) or graphical, so that consumer will be more be facilitated and consumer needn't use a browser when will try the script program made of. Its meaning consumer only require this software just if will see the desain made of.
Beside that this softaware also own the aid for the command of WML (<i>Wireless Markup Language</i>), XML (<i>eXtensible Markup Language</i>), statemen in debate Perl, Statemen SQL, DHTML, PHP, CSS (<i>Cascading Style Sheet</i>), Cold Fusion even able to for the koneksi of by Frontpage from Microsoft.
May heaven facility wizard very assistive once for programmer which still be inexperienced, like existence of various facility setting for the DSN OF (<i>Data of Source Name</i>), ADO (<i>Activex of Object Data</i>), SQL (<i>Structured Query Language</i>) and making of[is tables of data base. Also various elementary comand like including picture, adding URL etcetera.
From <a href="http://www.suaramerdeka.com" target="_blank"> Suara Merdeka </a>
--
bungas1405 gank
In development website base on the ASP can use the assistive appliance software ASPEdit made in from Tashcom software centering English. IN this assistive software made available immeasurable tool started from static making web like HTML or DHTML with the Ianguage of scripting Javascript and or VB Script. this Usage Software can lessen the recalling energy go together the tag-tag in pemrograman HTML. So that consumer will be more be facilitated.
Others, this software also base on the GUI (<i>Graphical User Interface</i>) or graphical, so that consumer will be more be facilitated and consumer needn't use a browser when will try the script program made of. Its meaning consumer only require this software just if will see the desain made of.
Beside that this softaware also own the aid for the command of WML (<i>Wireless Markup Language</i>), XML (<i>eXtensible Markup Language</i>), statemen in debate Perl, Statemen SQL, DHTML, PHP, CSS (<i>Cascading Style Sheet</i>), Cold Fusion even able to for the koneksi of by Frontpage from Microsoft.
May heaven facility wizard very assistive once for programmer which still be inexperienced, like existence of various facility setting for the DSN OF (<i>Data of Source Name</i>), ADO (<i>Activex of Object Data</i>), SQL (<i>Structured Query Language</i>) and making of[is tables of data base. Also various elementary comand like including picture, adding URL etcetera.
From <a href="http://www.suaramerdeka.com" target="_blank"> Suara Merdeka </a>
--
bungas1405 gank
What that application portabel?
application Portabel a computer software which can be brought in equipments portabel (the example: USB Flash drive, CD /dvd, memory card, or even sketch) and can be used every computer without require to through installation process beforehand. But non meaning this application can be run at all of operating system like windows, linux, mac, and others. Therefore don't dicapurkan with the congeniality of software portability, that is ability a application / software meagrely modification so that can be run some platform. When peratalan portable attributed to a computer, the application portabel can be accessed direct.
Dissimilar term is which often used to change the application portabel standalone. From wiki
We use the application portabel
1. Generally free of charge. Some situs penyedia: portableapps, portablefreeware
2. system of data Security. Because data kept equipments portabel, hence security the data also profited because is not on file in certain computer
3. Practical. Once we install in USB can be run for a few computer
4. There which will nambahi please fill the comment column
--
bungas1405 gank
Dissimilar term is which often used to change the application portabel standalone. From wiki
We use the application portabel
1. Generally free of charge. Some situs penyedia: portableapps, portablefreeware
2. system of data Security. Because data kept equipments portabel, hence security the data also profited because is not on file in certain computer
3. Practical. Once we install in USB can be run for a few computer
4. There which will nambahi please fill the comment column
--
bungas1405 gank
Aplikasi Web
Aplikasi Web is a application using ability <i>webserver</i> to process the data and deliver to user pass by the network/ internet. Differ from the application desktop where have to the installation beside client to can to use the the application. application Web only require a web browser which digunkan just to present the data accepted from server.
Because the limitation hence emerge some technology which can make the application a web more dynamic. The technology can dikolompokkan become two type:
1. Technological <i>Client-Side</i>
Technological this make the application web become dynamic the data manipulation beside user. this Technological example Javascript, Java Applet, Flash and others. Advantage which on the market this teklnologi water down and give " keinteraktifan"at web user interface. Others, technological pengunaan <i>Client-Side</i> can quicken the loading access at the (time) of opening or accessing a webside.
2. Technological <i>Server-Side</i>
Technological this offer the ke-interaktifan of data of dri of side server, because all data [in] manipulation beside server. Client only accept the output from server in the form of ordinary HTML. this Technological example CGI, PHP, JSP, ASP, Coldfusion and others. Weakness from Technology <i>Server-Side</i> data access become a few/little slower, this because of data sent particularly from to server to be processed, newly afterwards returned to user.
To get the good apliaksi Web, usually programmer use two the technology to get a application which powerful, this matter caused technological second above having different advantage one with other.
advantage of Application web
1. cheap and easier Apliaksi Web to be used. With the our application web can lessen the expense for the mengimplemantasi of or menginstall application beside client
2. cheap and easier application Web to upgrading. cheaper expense Perawtan even also and easy to because only require to the repair beside server
3. application Web more flexible. With the application web, we needn't put thinking cap on the operating system, because by default a operating system have been equiped the web browser
4. With the application web also, growth of fast network internet world progressively each;every moment, others each;every web also can make the appearance as according to appetite the maker.
--
bungas1405 gank
Because the limitation hence emerge some technology which can make the application a web more dynamic. The technology can dikolompokkan become two type:
1. Technological <i>Client-Side</i>
Technological this make the application web become dynamic the data manipulation beside user. this Technological example Javascript, Java Applet, Flash and others. Advantage which on the market this teklnologi water down and give " keinteraktifan"at web user interface. Others, technological pengunaan <i>Client-Side</i> can quicken the loading access at the (time) of opening or accessing a webside.
2. Technological <i>Server-Side</i>
Technological this offer the ke-interaktifan of data of dri of side server, because all data [in] manipulation beside server. Client only accept the output from server in the form of ordinary HTML. this Technological example CGI, PHP, JSP, ASP, Coldfusion and others. Weakness from Technology <i>Server-Side</i> data access become a few/little slower, this because of data sent particularly from to server to be processed, newly afterwards returned to user.
To get the good apliaksi Web, usually programmer use two the technology to get a application which powerful, this matter caused technological second above having different advantage one with other.
advantage of Application web
1. cheap and easier Apliaksi Web to be used. With the our application web can lessen the expense for the mengimplemantasi of or menginstall application beside client
2. cheap and easier application Web to upgrading. cheaper expense Perawtan even also and easy to because only require to the repair beside server
3. application Web more flexible. With the application web, we needn't put thinking cap on the operating system, because by default a operating system have been equiped the web browser
4. With the application web also, growth of fast network internet world progressively each;every moment, others each;every web also can make the appearance as according to appetite the maker.
--
bungas1405 gank
Kamis, 20 Maret 2008
BIOS 2
BIOS 2
Way of job of BIOS Motherboard.
After article BIOS 1, we picked acquaintance with what it's BIOS and Usefulness BIOS. At this article, I want to try pare the fig work the BIOS in general.
At Motherboard there are two laboring chip of equal to make the BIOS can work, that is commisioned chip CMOS saveing setting BIOS which have been arranged and containing Chip BIOS itself program the BIOS. BIOS [ on file Motherboard one of Chip ROM ( Read Only Memory). this Chip ROM can be in the form of the PROM ( programmable ROM), EPROM ( Erasable Programable ROM), EEPROM ( Electrically Erasable Programmable ROM) or Flash ROM. EPROM can only be vanished to use the ray of ultraviolet EEPROM can be vanished to use the larger voltage ones from normal stress used a the chip normal operasi moment. Fash ROM equal to EEPROM, but time needed briefer moment vanish and also moment refilled to be compared to EEPROM. Motherboard And ad-on card the present day most using type of Flash ROM.
Active Stroke BIOS.
At the time of computer flamed, first program multiply run is BIOS motherboard. In the following is sequence inisialisasi done by BIOS motherboard.
1. Inisialisasi Chipset found on motherboard.
2. Checking the availibility RAM of motherboard. If there is, BIOS chip BIOS of di-copy to RAM and later;then will be executed in RAM . Otherwise there are RAM, BIOS of hang.
3. Counting RAM found on motherboard and menginisialisasi memory controller at chipset.
4. Inisialisasi of Chip of other I/O controller chip and besides chipset.
5. Inisialisasi Cahce memory found on prosesor.
6. Inisialisasi Interrupt controller, inclusive of arranging IRQ ( Interupt Request) to be used by entire/all peripheral at motherboard and ad-on card attached motherboard.
7. Inisialisasi Graphic card. This matter conducted by copying the BIOS graphic card to RAM, later;then execute the the BIOS in RAM. After this process we will be able to see the appearance at screen computer. Usually, in the form of information BIOS used and certain logo.
8. Calculating size of harddisk or read its size measure from chip CMOS as according to size of harddisk which have been kept at previous chip CMOS.
9. Doing other inisialisasi.
10.Copy the bootloader operating system from sketch, CDROM, harddisk, or other peripheral boot to RAM then execute the the bootloader. Next bootloader deliver to conduct the computer to operating system.
Inisialisasi above is inisialisasi conducted BIOS in general. Every BIOS have the very depended specific inisialisasi from motherboard type.
Way of job of BIOS Motherboard.
After article BIOS 1, we picked acquaintance with what it's BIOS and Usefulness BIOS. At this article, I want to try pare the fig work the BIOS in general.
At Motherboard there are two laboring chip of equal to make the BIOS can work, that is commisioned chip CMOS saveing setting BIOS which have been arranged and containing Chip BIOS itself program the BIOS. BIOS [ on file Motherboard one of Chip ROM ( Read Only Memory). this Chip ROM can be in the form of the PROM ( programmable ROM), EPROM ( Erasable Programable ROM), EEPROM ( Electrically Erasable Programmable ROM) or Flash ROM. EPROM can only be vanished to use the ray of ultraviolet EEPROM can be vanished to use the larger voltage ones from normal stress used a the chip normal operasi moment. Fash ROM equal to EEPROM, but time needed briefer moment vanish and also moment refilled to be compared to EEPROM. Motherboard And ad-on card the present day most using type of Flash ROM.
Active Stroke BIOS.
At the time of computer flamed, first program multiply run is BIOS motherboard. In the following is sequence inisialisasi done by BIOS motherboard.
1. Inisialisasi Chipset found on motherboard.
2. Checking the availibility RAM of motherboard. If there is, BIOS chip BIOS of di-copy to RAM and later;then will be executed in RAM . Otherwise there are RAM, BIOS of hang.
3. Counting RAM found on motherboard and menginisialisasi memory controller at chipset.
4. Inisialisasi of Chip of other I/O controller chip and besides chipset.
5. Inisialisasi Cahce memory found on prosesor.
6. Inisialisasi Interrupt controller, inclusive of arranging IRQ ( Interupt Request) to be used by entire/all peripheral at motherboard and ad-on card attached motherboard.
7. Inisialisasi Graphic card. This matter conducted by copying the BIOS graphic card to RAM, later;then execute the the BIOS in RAM. After this process we will be able to see the appearance at screen computer. Usually, in the form of information BIOS used and certain logo.
8. Calculating size of harddisk or read its size measure from chip CMOS as according to size of harddisk which have been kept at previous chip CMOS.
9. Doing other inisialisasi.
10.Copy the bootloader operating system from sketch, CDROM, harddisk, or other peripheral boot to RAM then execute the the bootloader. Next bootloader deliver to conduct the computer to operating system.
Inisialisasi above is inisialisasi conducted BIOS in general. Every BIOS have the very depended specific inisialisasi from motherboard type.
Memory 3
CMOS dan Virtual Memory
Two type of type of other memory is CMOS and Virtual Memory, CMOS (said by " seemoss") representing abbreviation from "Complementary Metal Oxide Semiconductor". CMOS is a containing special memory vital data hit the computer configuraton and have the character of the semi-permanen. Without existence of this data, computer cannot operate the. CMOS more permanent from RAM and less be compared to permanent ROM. CMOS need the very small energy to maintain the konten, and this chip exploit battery as its electrics resource. When change needed into configuraton of computer system (for example there addition hardisk, RAM addition and others), hence CMOS can be altered by running a available special program utility through operating system.
Virtual Memory (Virtual Storage) xself a depository method of data where part of program or data kept in magnetic disk and don't in RAM, until in a moment needed. Virtual Memory represent the memory harddisk which allocation to assist the RAM job. This matter will give a kind of illusion that the RAM in character unlimited. Become its conclusion, virtual memory of x'self simulation as a(n) RAM. It's permit the computer to run the more amount program than previously, manipulation of data larger ones as well as running big program without fearing RAM insuffiency. slower Virtual Storage than RAM and in character the non volatile.
Capacities of Virtual memory at operating system Windows organizable by as follows:
1. Right click My Computer and choose properti,
2. Choose tab Advenced,
3. Click the setting at choice Performace,
4. Choose the tab Advenced at window of Performance Options,
5. At column of Virtual Memory click changee,
6. Choose the memory you to utilize to assist the RAM function,
7. Including capacities amount to be used ( Remember this also will lessen the Your capacities harddisk) and click to set, after that OK.
Have understand the memory type any kind of found on computer, await the article draw hereinafter.
Two type of type of other memory is CMOS and Virtual Memory, CMOS (said by " seemoss") representing abbreviation from "Complementary Metal Oxide Semiconductor". CMOS is a containing special memory vital data hit the computer configuraton and have the character of the semi-permanen. Without existence of this data, computer cannot operate the. CMOS more permanent from RAM and less be compared to permanent ROM. CMOS need the very small energy to maintain the konten, and this chip exploit battery as its electrics resource. When change needed into configuraton of computer system (for example there addition hardisk, RAM addition and others), hence CMOS can be altered by running a available special program utility through operating system.
Virtual Memory (Virtual Storage) xself a depository method of data where part of program or data kept in magnetic disk and don't in RAM, until in a moment needed. Virtual Memory represent the memory harddisk which allocation to assist the RAM job. This matter will give a kind of illusion that the RAM in character unlimited. Become its conclusion, virtual memory of x'self simulation as a(n) RAM. It's permit the computer to run the more amount program than previously, manipulation of data larger ones as well as running big program without fearing RAM insuffiency. slower Virtual Storage than RAM and in character the non volatile.
Capacities of Virtual memory at operating system Windows organizable by as follows:
1. Right click My Computer and choose properti,
2. Choose tab Advenced,
3. Click the setting at choice Performace,
4. Choose the tab Advenced at window of Performance Options,
5. At column of Virtual Memory click changee,
6. Choose the memory you to utilize to assist the RAM function,
7. Including capacities amount to be used ( Remember this also will lessen the Your capacities harddisk) and click to set, after that OK.
Have understand the memory type any kind of found on computer, await the article draw hereinafter.
Service Bluetooth
After we know, history about bluethooth, now we mush know what Service Bluetooth. A peripheral owning technology of wireless bluetooth will have the ability to conduct the information transfer with the reach distance up to 10 metre (~ 30 feet). Product Bluetooth can be in the form of the PC card or USB adapter included into peripheral. Peripheral which can diintegerasikan technologically bluetooth for example : mobile PC, mobile phone, PDA ( Digital Personal Assistant), headset, camera, printer, router etc. Application which can be provided by this service bluetooth for example : PC To PC file transfer the, PC To PC of file synch ( notebook to desktop), PC To mobile phone, PC To PDA, wireless headset, LAN Connection via ethernet access point etcetera.
USB Bluetooth
Peripheral USB bluetooth in this time have easy to bought shop's selling computer supply. Appliance or this hardware function to transfer data / file. Form the USB bluetooth much the same to by USB flash disk differentiating only function and used. Way of using very easy. Omit to enter the usb bluetooth to port usb. USB Bluetooth will be direct recognized by computer if operating system computer which we use Windows XP, because windows XP have provided the service to transfer the data / file. If our computer use the windows 98 as its operating system hence we have to insteall beforehand the driver usb bluetooth.
From brief clarification above, seen that bluetooth able to offer the solution which effective enough efficient and in giving service to user to do transfer data with the speed less than 1 Mbit/s and reach which is short relative. technology Bluetooth still enable to be non-stoped to to expand to [go] to the good maturity from side of standarisasi and also application which can be applied.
With the consideration that bluetooth able to provide assorted application and service and with the expense which is cheap relative, easy to in operation, interoperability promising and also supported by various big vendor area of telecommunications and also computer, and more than 1800 company have joined as this technological adopter, hence is not be technological impossible bluetooth in a moment will become one of king to be used good to domestic need or white colars / business.
USB Bluetooth
Peripheral USB bluetooth in this time have easy to bought shop's selling computer supply. Appliance or this hardware function to transfer data / file. Form the USB bluetooth much the same to by USB flash disk differentiating only function and used. Way of using very easy. Omit to enter the usb bluetooth to port usb. USB Bluetooth will be direct recognized by computer if operating system computer which we use Windows XP, because windows XP have provided the service to transfer the data / file. If our computer use the windows 98 as its operating system hence we have to insteall beforehand the driver usb bluetooth.
From brief clarification above, seen that bluetooth able to offer the solution which effective enough efficient and in giving service to user to do transfer data with the speed less than 1 Mbit/s and reach which is short relative. technology Bluetooth still enable to be non-stoped to to expand to [go] to the good maturity from side of standarisasi and also application which can be applied.
With the consideration that bluetooth able to provide assorted application and service and with the expense which is cheap relative, easy to in operation, interoperability promising and also supported by various big vendor area of telecommunications and also computer, and more than 1800 company have joined as this technological adopter, hence is not be technological impossible bluetooth in a moment will become one of king to be used good to domestic need or white colars / business.
USB
USB ( Serial Universal [of] Bus). USB represent a conducive technology us to connect the appliance eksternal (peripheral) like scanner, printer, mouse, keyboard, appliance of data depositor (zip drive), flash disk, digital camera or other peripheral to our computer. USB very supporting to transfer the data equal to 12 Mbps (million beet per second). Computer (PC) in this time, generally have owned the port USB. [usually provided to minimize 2 port. Parallel in comparison with port and serial port, easier port USB use in its use.
Some idiosyncrasy USB
>> Computer can be positioned to host.,
>> More than 127 peripheral can be jointed to computer directly and also use the hub USB,
>> Cable USB used directly can reach 5 metre. While if using peripheral hub can reach 30 metre,
>> Peripheral USB have the character of the ' hot swappable' its meaning hardware use the port USB have the character of the plug and play.
USB Cable
If opened, cable USB will be seen there 4 colour, that is red, brown, yellow and blue. rose colored Cable and chocolate function as power / for the current of electrics. blue and rust colored Cable function to bring / to transferring data.
Way Of Connecting USB Flash disk with Computer
Flash Disk represent one of peripheral using USB port to connect with the computer. Flash Disk function as storage media data. Way of connecting Flash disk to computer very easy. Including the flash disk to port USB which have been made available. If our computer use the Windows XP hence automatically the Flash disk will be recognized. While if we use the windows 98 or windows 9x hence usually the driver Flash have to beforehand [in] install. After Flash disk recognized the us have started to copy the data from / flash disk to our hardisk.
Some idiosyncrasy USB
>> Computer can be positioned to host.,
>> More than 127 peripheral can be jointed to computer directly and also use the hub USB,
>> Cable USB used directly can reach 5 metre. While if using peripheral hub can reach 30 metre,
>> Peripheral USB have the character of the ' hot swappable' its meaning hardware use the port USB have the character of the plug and play.
USB Cable
If opened, cable USB will be seen there 4 colour, that is red, brown, yellow and blue. rose colored Cable and chocolate function as power / for the current of electrics. blue and rust colored Cable function to bring / to transferring data.
Way Of Connecting USB Flash disk with Computer
Flash Disk represent one of peripheral using USB port to connect with the computer. Flash Disk function as storage media data. Way of connecting Flash disk to computer very easy. Including the flash disk to port USB which have been made available. If our computer use the Windows XP hence automatically the Flash disk will be recognized. While if we use the windows 98 or windows 9x hence usually the driver Flash have to beforehand [in] install. After Flash disk recognized the us have started to copy the data from / flash disk to our hardisk.
BIOS
Still remember with the word BIOS? At article Memory 2 have a few touched about congeniality BIOS. At the article BIOS represent a group of program placed in ROM. Following clearer about BIOS.
BIOS (Basic of Input of Output System) born at the same time createdly of computer of IBM PC by IBM in the year 1981. Initially, BIOS there's only one kinds of, that is IBM BIOS. But, company of computer Compaq later do the reverse engineering IBM BIOS and then make the IBM of BIOS compatible, that is BIOS which compatible with IBM BIOS and can be used at PC. BIOS which made by this Compaq then figured in at PC of made in Compaq, replacing full IBM BIOS. Hereinafter a lot of other company which pop out as maker BIOS for the PC , like Phoenix, AMI, and Award. Special for the motherboard of made in Taiwan, most BIOS used is Award BIOS. Its Reason modestly, Award Inc. is company of maker BIOS which also base on Taiwan.
<span class="fullpost">
Usefulness BIOS
BIOS only used at PC. But also used a lot of platform. For example, platform of Power PC, Gameboy Advance, Xbox, Itanium, and others. But that way, BIOS at different platform its contents also surely differ. At any platform, BIOS hold the same elementary function, that is menginisisalisasi of] all peripheral exist in the platform ready to used by operating system.
Inisialisasi by BIOS required because a system cannot be made in such a manner to recognize and menginisialisasi all existing peripheral. This matter because of compared to quicker growth hardware growth software ( operating system). So that each time there are new chipset [is] which dikelurakan, maker [operating system haven't to [elease the patch for the menginisialisasi of the chipset At PC BIOS implementation not merely at motherboard, but also some type of ad-on card. For example, graphics card, EIDE Controller card, RAID Controller, SCSI Controller card, LAN Card, and others. All the BIOS have the same elementary function, that is menginisialisasi of the place BIOS peripheral reside in the. BIOS at expansion card referred also ROM or option ROM.
Usefulness and kinds of BIOS have known. Now omit the way of job of BIOS adja again which not yet known, await in next article.
</span>
BIOS (Basic of Input of Output System) born at the same time createdly of computer of IBM PC by IBM in the year 1981. Initially, BIOS there's only one kinds of, that is IBM BIOS. But, company of computer Compaq later do the reverse engineering IBM BIOS and then make the IBM of BIOS compatible, that is BIOS which compatible with IBM BIOS and can be used at PC. BIOS which made by this Compaq then figured in at PC of made in Compaq, replacing full IBM BIOS. Hereinafter a lot of other company which pop out as maker BIOS for the PC , like Phoenix, AMI, and Award. Special for the motherboard of made in Taiwan, most BIOS used is Award BIOS. Its Reason modestly, Award Inc. is company of maker BIOS which also base on Taiwan.
<span class="fullpost">
Usefulness BIOS
BIOS only used at PC. But also used a lot of platform. For example, platform of Power PC, Gameboy Advance, Xbox, Itanium, and others. But that way, BIOS at different platform its contents also surely differ. At any platform, BIOS hold the same elementary function, that is menginisisalisasi of] all peripheral exist in the platform ready to used by operating system.
Inisialisasi by BIOS required because a system cannot be made in such a manner to recognize and menginisialisasi all existing peripheral. This matter because of compared to quicker growth hardware growth software ( operating system). So that each time there are new chipset [is] which dikelurakan, maker [operating system haven't to [elease the patch for the menginisialisasi of the chipset At PC BIOS implementation not merely at motherboard, but also some type of ad-on card. For example, graphics card, EIDE Controller card, RAID Controller, SCSI Controller card, LAN Card, and others. All the BIOS have the same elementary function, that is menginisialisasi of the place BIOS peripheral reside in the. BIOS at expansion card referred also ROM or option ROM.
Usefulness and kinds of BIOS have known. Now omit the way of job of BIOS adja again which not yet known, await in next article.
</span>
Bluetooth
who nope know the bluethooth, but non Bluetooth which its meaning blue tooth [of] lho… but "bluetooth" (not have spasi) representing one of technology of data communications which usually handphone. Or a fitur to connect the two hardware without using cable. With the the hardware second note have owned or have the facility bluethooth. compatible term GAPTEK for which nope know what that bluethooth. But what all of you know the history of bluethooth itself? this article of brief littel about history of bluethooth.
Name ' Bluetooth' xself early from a project which promotor by international concern which is active in telecommunications and computer, among other things Ericsson, IBM, Intel, Nokia, and Toshiba. This Project early year 1998 with the code of name bluetooth, because inspiration by a king Viking (Denmark) with name Harald Blatand. This King Harald Blatand in command century ke-10 overbearingly most area of Denmark and area Skandinavia during the period.
We go on to, in May 1998, 5 promotor company that is Ericsson, IBM, Intel, Nokia And Toshiba form a Special of Interest Group ( SIG) and start to make the specification which they name the ' bluetooth'. July 1999 document of[is specification of bluetooth version 1.0 strarting launched. At December 1999 started again document making of specification of bluetooth version 2.0 additionally 4 new promotor that is 3Com, Lucent Technologies, Microsoft And Motorola. In this time, more than 1800 company various area for example area of semiconductor manufacture, PC Manufacture, mobile network carrier, company automobile and irrigate the lines bergambung in a consortium as technological adopter bluetooth. the Notable company for example like Compaq, Xircom, Phillips, Texas Instruments, Sony, BMW, Puma, NEC, Casio, Boeing, etc.
Name ' Bluetooth' xself early from a project which promotor by international concern which is active in telecommunications and computer, among other things Ericsson, IBM, Intel, Nokia, and Toshiba. This Project early year 1998 with the code of name bluetooth, because inspiration by a king Viking (Denmark) with name Harald Blatand. This King Harald Blatand in command century ke-10 overbearingly most area of Denmark and area Skandinavia during the period.
We go on to, in May 1998, 5 promotor company that is Ericsson, IBM, Intel, Nokia And Toshiba form a Special of Interest Group ( SIG) and start to make the specification which they name the ' bluetooth'. July 1999 document of[is specification of bluetooth version 1.0 strarting launched. At December 1999 started again document making of specification of bluetooth version 2.0 additionally 4 new promotor that is 3Com, Lucent Technologies, Microsoft And Motorola. In this time, more than 1800 company various area for example area of semiconductor manufacture, PC Manufacture, mobile network carrier, company automobile and irrigate the lines bergambung in a consortium as technological adopter bluetooth. the Notable company for example like Compaq, Xircom, Phillips, Texas Instruments, Sony, BMW, Puma, NEC, Casio, Boeing, etc.
Memory 2
ROM (Read Only Memory)
After we know the first memory type RAM having the character of volatile, secondary memory type is ROM (Read Only Memory). ROM represent n gathering from containing chip part of operating system which required at the (time) of computer flamed. ROM also known as a firmware. As according to its name Read Only Memory, ROM represent the difficult memory type or is not possible to be rewritten, this matter differ from the RAM having the character of easy to to be read and writed. Data exist in chip ROM come from its factory with the kept instruction or program in it. Single the way of to change the konten by let-off from computer and change by ROM other. Chip ROM can contain the program which often used, like computing routines to calculate the root a number and others.
Other difference between RAM and ROM is ROM have the character of the non-volatile memory because all data kept immanent ROM when is not emited a stream by the current electrik. Thereby ROM represent the ideal place to place the instruction of startup PC – namely software which boot system ( BIOS).
BIOS (Basic Input-Output System) representing very critical shares from a[n operating system, which its function inform the computer [of] how to accessing disk drive. When computer flamed, RAM still be empty and instruction exist in ROM BIOS used by CPU to look for the containing disk drive especial file in operating system. Computer then remove the the file into LOUVRE and then run it.
Have differentiated the function from LOUVRE and ROM, even its name much the same to in the reality type and its function differentiate. There still two memory type again lho, read in next article...
After we know the first memory type RAM having the character of volatile, secondary memory type is ROM (Read Only Memory). ROM represent n gathering from containing chip part of operating system which required at the (time) of computer flamed. ROM also known as a firmware. As according to its name Read Only Memory, ROM represent the difficult memory type or is not possible to be rewritten, this matter differ from the RAM having the character of easy to to be read and writed. Data exist in chip ROM come from its factory with the kept instruction or program in it. Single the way of to change the konten by let-off from computer and change by ROM other. Chip ROM can contain the program which often used, like computing routines to calculate the root a number and others.
Other difference between RAM and ROM is ROM have the character of the non-volatile memory because all data kept immanent ROM when is not emited a stream by the current electrik. Thereby ROM represent the ideal place to place the instruction of startup PC – namely software which boot system ( BIOS).
BIOS (Basic Input-Output System) representing very critical shares from a[n operating system, which its function inform the computer [of] how to accessing disk drive. When computer flamed, RAM still be empty and instruction exist in ROM BIOS used by CPU to look for the containing disk drive especial file in operating system. Computer then remove the the file into LOUVRE and then run it.
Have differentiated the function from LOUVRE and ROM, even its name much the same to in the reality type and its function differentiate. There still two memory type again lho, read in next article...
Who Make Linux
Linux, a operating system having the character of open source. Not like windows representing original product Microsoft. Operating system [of] Linux own assorted type, there is linux Suse, Red Hat, etc. Linux xself created by somebody from Finlandia. Who is ir? and How he make a operating system. find its answer in this article.
Linus Torvalds borne in Helsinki, Finlandia, at 28 December 1969. In its age to 10, Linus start to dabble in pemograman computer, by using computer own its grandfather, Commodore VIC-20. Komputing even also become its hobby. In the year 1988 Linus accepted to become student in University of Helsinki, Finlandia. In the year 1990, Linus start the first class pemograman C. In the year 1991, Linus buy the first PC, and he dissatisfy with the operating system its computer. That moment, its computer use the MS-DOS ( isk of Operation System, operating system [of] made in Microsoft), but Linus more tend to to use the operating system UNIX, such as those which used computer own her university.
Finally, he set mind on to create the version which can be used for the PC OF from UNIX. Hard work during mountly yield from operating system which known by Linux, what later eight year later developed to become what told by a lot of observer as threat for very recognized giant Microsoft with the operating system Windows.
So Linus succeed to create the harsh version from Linux, he send order in internet to defin the new system to other consumer PC. Linus make the softwarenya earnthe free download, and,as always conducted by humanity of software developer at that moment, he make the source code, meaning that every person who own the knowledge about pemograman of modification computer can Linux to be adapted for their target each. Linux immediately own a lot of enthusiastic supporter, because they can own to access to her source code, and can help the Linus to repair and complete the the software. Operating Linux require the technics intellegence which enough, cause operate not as easy as using more popular operating system, like Windows, Mac own the Apple Computer, or OS / 2 IBM property. But, because all volunteer developer blow own trumpet the quality hard work will its, Linux become enough recognized by keungulan as happened very rare and efficient system crash.
Linux get her glory at the end of 1990 when all kompetitor from Microsoft start to develop the the operating system seriously. Netscape Communication, Corel, Oracle, Intel and other company. Announce that they plan for the support of cost-effective Linux alternatively from Windows. this Scenario Moment start formed, pengemar Linux and media depict Linus as David which go forward the melawan Giant, Bill Gates, one of founder and head Microsoft.
Linus say he not catty with the finance successfulness from Bill Gates, or Microsoft. In the year 1999, estimated seven million computer operate by using Linux, still can be got by percuma,dan a lot of big company software announce plant to support. Same during, Linus take stand Transmeta Corp., owned by one of founder of Paul Allen, work in a very project secret, what is assumed by a lot of community high-tech will expand some attack in future for Microsoft.
From <a href="intrik.wordpress.com" target="_blank"> intrik.wordpress.com </a>
Linus Torvalds borne in Helsinki, Finlandia, at 28 December 1969. In its age to 10, Linus start to dabble in pemograman computer, by using computer own its grandfather, Commodore VIC-20. Komputing even also become its hobby. In the year 1988 Linus accepted to become student in University of Helsinki, Finlandia. In the year 1990, Linus start the first class pemograman C. In the year 1991, Linus buy the first PC, and he dissatisfy with the operating system its computer. That moment, its computer use the MS-DOS ( isk of Operation System, operating system [of] made in Microsoft), but Linus more tend to to use the operating system UNIX, such as those which used computer own her university.
Finally, he set mind on to create the version which can be used for the PC OF from UNIX. Hard work during mountly yield from operating system which known by Linux, what later eight year later developed to become what told by a lot of observer as threat for very recognized giant Microsoft with the operating system Windows.
So Linus succeed to create the harsh version from Linux, he send order in internet to defin the new system to other consumer PC. Linus make the softwarenya earnthe free download, and,as always conducted by humanity of software developer at that moment, he make the source code, meaning that every person who own the knowledge about pemograman of modification computer can Linux to be adapted for their target each. Linux immediately own a lot of enthusiastic supporter, because they can own to access to her source code, and can help the Linus to repair and complete the the software. Operating Linux require the technics intellegence which enough, cause operate not as easy as using more popular operating system, like Windows, Mac own the Apple Computer, or OS / 2 IBM property. But, because all volunteer developer blow own trumpet the quality hard work will its, Linux become enough recognized by keungulan as happened very rare and efficient system crash.
Linux get her glory at the end of 1990 when all kompetitor from Microsoft start to develop the the operating system seriously. Netscape Communication, Corel, Oracle, Intel and other company. Announce that they plan for the support of cost-effective Linux alternatively from Windows. this Scenario Moment start formed, pengemar Linux and media depict Linus as David which go forward the melawan Giant, Bill Gates, one of founder and head Microsoft.
Linus say he not catty with the finance successfulness from Bill Gates, or Microsoft. In the year 1999, estimated seven million computer operate by using Linux, still can be got by percuma,dan a lot of big company software announce plant to support. Same during, Linus take stand Transmeta Corp., owned by one of founder of Paul Allen, work in a very project secret, what is assumed by a lot of community high-tech will expand some attack in future for Microsoft.
From <a href="intrik.wordpress.com" target="_blank"> intrik.wordpress.com </a>
Algoritma
Algoritma
Algorithm term, possible non foreign something that for us. Friend there which know the word meaning ‘ algorithm’? But for children of Technique of informatika in one of PTS Yogyakarta Algorithm one of fearful bogey because besides its it's lesson so hard digested brain, teacher teaching even also the inclusive of killer ( heart effusing ;>).
Make inquiring with the Algorithm word, this articel littel view few what it's Algoritma. Evaluated from word ‘ Algorithm’ having rather bizzare history. People only find the word Algorism meaning process count with the arabic numerals. Somebody told ‘ Algorist’ if calculating to use the arabic numerals. All linguist try to find the this word origin but its result less gratify. Finally all mathematics historian find the the word origin coming from name of famous Arab book writer, that is Dusty Abdullah Muhammad Ibnu of Mozes Al-Khuwarizmi read a westerner become Algorism.
Algorithm Definition
Algorithm Definition is “ logical steps for problem solving compiled systematically and logical”. example compilation a food recipe, what usually there are steps way of cooking the cookery. But, algorithm generally used to make the diagram groove the (flowchart) in computer science / informatika.
Inventor conception the Algorithm and Algebra.
Its inventor mathematics expert from uzbekistan with name Abdullah Muhammad Ibn of Mozes al-Khwarizmi. In west literature, he more famous with the title Algorism. This Call then weared to mention the algorithm concept found. Ash of Abdullah Muhammad Ibn of Mozes al-Khwarizmi ( 770-840) birth Khwarizm ( Kheva), town in south of river Oxus ( now Uzbekistan) year 770 masehi.Her farent move to a place in south of town Baghdad ( Iraq), when he still minimize the. Khwarizm known as by one who introduce the algorithm concept in mathematics, concept which taken away from her back name.
Al Khwarizmi also inventor from some branch of mathematics science which known as astronom and geografer. He's one of man of science biggest mathematics have lived, and its articles very having an in with its era. Algebra theory also invention and idea of Al khwarizmi. Algebra name taken away from its famous book with the title “ Al Jabr Wa Al Muqabilah”. He develop the tables of the detail of trigonometri loading sine function, cosine and cotangent and also conception diferensiasi.
it's influence in mathematics growth, astronomical and geografi no doubt again in history note. Approach which utility use the logical and systematic approach. He combine the Greek knowledge with the Hindu added her idea in developing mathematics. Khwarizm adopt the number use zero, in science of aritmetik and system denary. Some its book a lot of translated to Latin in the early century ke-12, by two notable translator people that is Adelard Bath and Gerard Cremona. Brochure Aritmetikanya, like book of al-Jam’a wal-Tafreeq bil Hisab al-Hindi, Algebra, Al-Maqala Fi Hisab-Al Jabr wa-al-Muqabilah, only recognized from translasi have Latin Ianguage. That book non-stoped weared till century ke-16 as elementary hold book by university in Europe.
Her Geografi book with entitle the Kitab Surat-Al-Ard loading world map even also have been translated to English. Think from Khwarizmi in area geografi also very marvellous. He don't only revise the view Ptolemeus in geografi but also improve its some part. Seventy people geografer have worked below leadership of Al khwarizmi when making a map of first world in year 830. He story have also braid the cooperation by Khalifah Mamun Al-Rashid when running project to know the volume and earth circumference.
From ilmukomputer
Algorithm term, possible non foreign something that for us. Friend there which know the word meaning ‘ algorithm’? But for children of Technique of informatika in one of PTS Yogyakarta Algorithm one of fearful bogey because besides its it's lesson so hard digested brain, teacher teaching even also the inclusive of killer ( heart effusing ;>).
Make inquiring with the Algorithm word, this articel littel view few what it's Algoritma. Evaluated from word ‘ Algorithm’ having rather bizzare history. People only find the word Algorism meaning process count with the arabic numerals. Somebody told ‘ Algorist’ if calculating to use the arabic numerals. All linguist try to find the this word origin but its result less gratify. Finally all mathematics historian find the the word origin coming from name of famous Arab book writer, that is Dusty Abdullah Muhammad Ibnu of Mozes Al-Khuwarizmi read a westerner become Algorism.
Algorithm Definition
Algorithm Definition is “ logical steps for problem solving compiled systematically and logical”. example compilation a food recipe, what usually there are steps way of cooking the cookery. But, algorithm generally used to make the diagram groove the (flowchart) in computer science / informatika.
Inventor conception the Algorithm and Algebra.
Its inventor mathematics expert from uzbekistan with name Abdullah Muhammad Ibn of Mozes al-Khwarizmi. In west literature, he more famous with the title Algorism. This Call then weared to mention the algorithm concept found. Ash of Abdullah Muhammad Ibn of Mozes al-Khwarizmi ( 770-840) birth Khwarizm ( Kheva), town in south of river Oxus ( now Uzbekistan) year 770 masehi.Her farent move to a place in south of town Baghdad ( Iraq), when he still minimize the. Khwarizm known as by one who introduce the algorithm concept in mathematics, concept which taken away from her back name.
Al Khwarizmi also inventor from some branch of mathematics science which known as astronom and geografer. He's one of man of science biggest mathematics have lived, and its articles very having an in with its era. Algebra theory also invention and idea of Al khwarizmi. Algebra name taken away from its famous book with the title “ Al Jabr Wa Al Muqabilah”. He develop the tables of the detail of trigonometri loading sine function, cosine and cotangent and also conception diferensiasi.
it's influence in mathematics growth, astronomical and geografi no doubt again in history note. Approach which utility use the logical and systematic approach. He combine the Greek knowledge with the Hindu added her idea in developing mathematics. Khwarizm adopt the number use zero, in science of aritmetik and system denary. Some its book a lot of translated to Latin in the early century ke-12, by two notable translator people that is Adelard Bath and Gerard Cremona. Brochure Aritmetikanya, like book of al-Jam’a wal-Tafreeq bil Hisab al-Hindi, Algebra, Al-Maqala Fi Hisab-Al Jabr wa-al-Muqabilah, only recognized from translasi have Latin Ianguage. That book non-stoped weared till century ke-16 as elementary hold book by university in Europe.
Her Geografi book with entitle the Kitab Surat-Al-Ard loading world map even also have been translated to English. Think from Khwarizmi in area geografi also very marvellous. He don't only revise the view Ptolemeus in geografi but also improve its some part. Seventy people geografer have worked below leadership of Al khwarizmi when making a map of first world in year 830. He story have also braid the cooperation by Khalifah Mamun Al-Rashid when running project to know the volume and earth circumference.
From ilmukomputer
Memory 1
When we hear the word memory, we surely conceive a place for the save of data or instruction. But computer peripheral, memory mean a set appliance arranging or determining program amount which can be run during which same, at one blow how many data amount which can be processed. Others Memory also represent to represent the repository where about program and data to be operated by prosesor. At computer there are four kinds of type memory, that is :
1. Random Access memory (RAM)
RAM Or random access memory is a data repository because we earn at random access all location in memory. Fill from RAM can fluctuate as according to data processed in it, or also program using. RAM represent the computer resource which in character reusable or can be re-used. RAM represent a group of chip capable to accomodate:
>> data to be processed,
>> instruction or program, what is needed to process data,
>> data which have been processed and await to be sent that goodness go to the output device, secondary storage or also communication device,
>> instruction operating system controlling elementary function from computer system.
Depository capacities from RAM very immeasurable in so many this computer caused a data amount which mush accessed or run, capacities excelsior a RAM, progressively stabilize the data to be processed. capacities RAM supposed a dining table, much wide capacities from RAM hence will more and more process which can be run in one time. To understand the capacities from RAM, hence some terminology in the following often used.
>> Bit, that is a binary system binary smallest unit from data in a computer system. A beet only consisted of the two number that is 1 and 0. In computer, a 0 meaning a sinyal electronic or magnetic is the noting or absen, whereas 1 meaning on the contrary.
>> Byte, thai is a gruping of eight bit. A byte deputize one character, one digit or one value. Capacities from memory computer, or RAM expressed in bytes or a group of from bytes.
To arrange a RAM to be can work better, it's needed by a Operating System. Instruction And program kept in RAM in fact kept in the form of corps bits which merepresentasikan data, mentioned program and instruction. This beet kept into a microscopic electronic shares with capacitor.
RAM represent the memory type having the character of volatile meaning data which is there are in RAM will lose permanently it there aren't electrics current, this matter also represent the cause why RAM referred as repository whereas. BecauseRAM have the character of the volatile, hence made of other type memory which can savina data permanently and have the character of the non volatile or data will not be vanished even is not emited a stream of by the electrics current. Memory of this type of often referred as secondary storage, follow the example of from secondary storage for example harddisk, optical disk, and others.
Besides RAM still there are other memory type, that is ROM, CMOS And Virtual Memory to be studied at nest article.
1. Random Access memory (RAM)
RAM Or random access memory is a data repository because we earn at random access all location in memory. Fill from RAM can fluctuate as according to data processed in it, or also program using. RAM represent the computer resource which in character reusable or can be re-used. RAM represent a group of chip capable to accomodate:
>> data to be processed,
>> instruction or program, what is needed to process data,
>> data which have been processed and await to be sent that goodness go to the output device, secondary storage or also communication device,
>> instruction operating system controlling elementary function from computer system.
Depository capacities from RAM very immeasurable in so many this computer caused a data amount which mush accessed or run, capacities excelsior a RAM, progressively stabilize the data to be processed. capacities RAM supposed a dining table, much wide capacities from RAM hence will more and more process which can be run in one time. To understand the capacities from RAM, hence some terminology in the following often used.
>> Bit, that is a binary system binary smallest unit from data in a computer system. A beet only consisted of the two number that is 1 and 0. In computer, a 0 meaning a sinyal electronic or magnetic is the noting or absen, whereas 1 meaning on the contrary.
>> Byte, thai is a gruping of eight bit. A byte deputize one character, one digit or one value. Capacities from memory computer, or RAM expressed in bytes or a group of from bytes.
To arrange a RAM to be can work better, it's needed by a Operating System. Instruction And program kept in RAM in fact kept in the form of corps bits which merepresentasikan data, mentioned program and instruction. This beet kept into a microscopic electronic shares with capacitor.
RAM represent the memory type having the character of volatile meaning data which is there are in RAM will lose permanently it there aren't electrics current, this matter also represent the cause why RAM referred as repository whereas. BecauseRAM have the character of the volatile, hence made of other type memory which can savina data permanently and have the character of the non volatile or data will not be vanished even is not emited a stream of by the electrics current. Memory of this type of often referred as secondary storage, follow the example of from secondary storage for example harddisk, optical disk, and others.
Besides RAM still there are other memory type, that is ROM, CMOS And Virtual Memory to be studied at nest article.
Chronology of computer Virus
After previous article we know the history of creation of computer virus, following note of chronology of computer virus, start from creation moment until glorious computer virus moment:
==> 1950s - Bell Labs make a game eksperimental where its player use the virulent program to groan the other player computer.
==> 1975 - writer of Story sci-fi, John Brunner, conceiving a worm computer disseminate through in network.
==> 1984 - Fred Cohen defin the term of computer virus in her thesis.
==> 1986 - Computer virus first called with Brain writed by your two people in Pakistan.
==> 1987 - Worm with name Christmas Tree groan the network of IBM computer.
==> 1988 - Worm Internet disseminate network of US DARPA.
==> 1992 - Happen panicity in world to virus Michelangelo.
==> 1994 - Good Times, first virus hoax appear in world.
==> 1995 - First Document virus called Concept, attend in world.
==> 1998 - CIH or Chernobyl become the first virus capable to to bother the hardware computer.
==> 1999 - Mellisa, virus propagating x'self through e-mail disseminate to whole world. Then virus Bubbleboy, becoming first virus computer infection capable to when You read Your e-mail.
==> 2000 - Love Bug, becoming successful e-mail virus. Is forthwith found virus at operating system Palm.
==> 2001 - Virus claiming x'self contain the photo of player of tennis of Anna Kournikova infection thousands of computer in all the world.
==> 2002 - David L Smith, maker of virus Mellisa, cuted by American justice in prison [during 20 month.
==> 2003 - Worm Blaster disseminate internet by exploiting weakness at operating system Windows. At the time of same also disseminate the so called e-mail virus Sobig, this make the August 2003 becoming ugly moon for the incident of the virus in the year.
==> 2004 - Maker of Worm Netsky and Bagle in concurrence to compete to reach for the biggest effect.
==> 1950s - Bell Labs make a game eksperimental where its player use the virulent program to groan the other player computer.
==> 1975 - writer of Story sci-fi, John Brunner, conceiving a worm computer disseminate through in network.
==> 1984 - Fred Cohen defin the term of computer virus in her thesis.
==> 1986 - Computer virus first called with Brain writed by your two people in Pakistan.
==> 1987 - Worm with name Christmas Tree groan the network of IBM computer.
==> 1988 - Worm Internet disseminate network of US DARPA.
==> 1992 - Happen panicity in world to virus Michelangelo.
==> 1994 - Good Times, first virus hoax appear in world.
==> 1995 - First Document virus called Concept, attend in world.
==> 1998 - CIH or Chernobyl become the first virus capable to to bother the hardware computer.
==> 1999 - Mellisa, virus propagating x'self through e-mail disseminate to whole world. Then virus Bubbleboy, becoming first virus computer infection capable to when You read Your e-mail.
==> 2000 - Love Bug, becoming successful e-mail virus. Is forthwith found virus at operating system Palm.
==> 2001 - Virus claiming x'self contain the photo of player of tennis of Anna Kournikova infection thousands of computer in all the world.
==> 2002 - David L Smith, maker of virus Mellisa, cuted by American justice in prison [during 20 month.
==> 2003 - Worm Blaster disseminate internet by exploiting weakness at operating system Windows. At the time of same also disseminate the so called e-mail virus Sobig, this make the August 2003 becoming ugly moon for the incident of the virus in the year.
==> 2004 - Maker of Worm Netsky and Bagle in concurrence to compete to reach for the biggest effect.
Sabtu, 15 Maret 2008
Versi indonesia
Untuk membaca versi indonesia silahkan kunjungi www.bungas1405.blogspot.com
Terima kasih
Terima kasih
Jumat, 14 Maret 2008
History of Blog 2
Such as those which have been explained at previous article at the first of appearance Blog still a few its amount because to make the blog still need the knowledge about use of tag HTML. But, at the (time) of < a terget="_blank" href="www.blogger.com">Blogger.com</ a> giving service of making blog free of charge and facilitatetu use because consumer needn't be skilled or need the knowledge of HTML scripts.
After < a terget="_blank" href="www.blogger.com">Blogger.com< /a> giving free making Blog service with all amenity given. Everyday Blog becoming increase till more and more difficult to follow it. Eatonweb Portal is one of existing complete list Blog among other list Blog. Thousands of Blog then pop out and each chosening the this topic of its own discussion, this started from how to become the good parent, hobby look on the film, this topic of politics, health, sex, athletic, comic, etc. Even Blogger there Blog about bizzare goods sold in situs auction Ebay so called Who Would By That?. Cameron Barret write in her blog with tittle Anatomy of a Weblog explaining theme from Blog. " Blog oftentimes very focused a unique subjek that is a this topic of base and/or a concept uniting theme in the Blog." Simply the this topic of a Blog paintbrush area the Blogger without there is editor or boss which have a hand in the, theme as mad as any usually earn the us find in line with more and moreing to pop out the nya Blog in Internet. And yes, that idea have been thought, Blogger even now have made the Blog from Blog, and even Blog from Blog from Blog.
From in such a way a lot of existing Blog, Blog's specifying standard from Blog and famous so that own its own devotee among other thing Blog own the Jorn Barger, Robot Wisdom which mentioned over and over represent the biggest Blog and most good for where his in everyday promote so much link which is formed of a interest with art and technological. Camworld is popular Blog own the Cameron Barret a Desainer Interaktif where he organization topic in this blog at katagori, Random Thoughts, Web Design and New Media. Camworld can be conceived classic Blog in the meaning taht Blog contain the precise dose from selective mixed with personal opinion and character election link.
Other Famous Blog among other things, " Obscure Store" Http://Www.Obscurestore.Com/ own the Jim Romenesko providing link of have theme news and gossip and also small things which is a few instructing at underground movement, Lawrence Lee also every day update the Blog-Nya, Tomalak'S Realm by link's news about Web Design and Net Business. Memepool with the choice collect than unique link accompanied the smart analysis also liked as special Blog. Kottke.Org represent the Blog draw the property of Jason Kottke a Web Designer which live in the San Francisco, In this Blog he write that the Blog its way against time luang to reorganize the article, desain-desain and critical skill-nya. Do not forget also Blog own the Dave Winer, Scripting News, one of first Blog which is a lot of giving link about pemrograman.
This artikel from Artikel didapat dari <a target="_blank" href="www.sony-ak.com">www.sony-ak.com</a>
After < a terget="_blank" href="www.blogger.com">Blogger.com< /a> giving free making Blog service with all amenity given. Everyday Blog becoming increase till more and more difficult to follow it. Eatonweb Portal is one of existing complete list Blog among other list Blog. Thousands of Blog then pop out and each chosening the this topic of its own discussion, this started from how to become the good parent, hobby look on the film, this topic of politics, health, sex, athletic, comic, etc. Even Blogger there Blog about bizzare goods sold in situs auction Ebay so called Who Would By That?. Cameron Barret write in her blog with tittle Anatomy of a Weblog explaining theme from Blog. " Blog oftentimes very focused a unique subjek that is a this topic of base and/or a concept uniting theme in the Blog." Simply the this topic of a Blog paintbrush area the Blogger without there is editor or boss which have a hand in the, theme as mad as any usually earn the us find in line with more and moreing to pop out the nya Blog in Internet. And yes, that idea have been thought, Blogger even now have made the Blog from Blog, and even Blog from Blog from Blog.
From in such a way a lot of existing Blog, Blog's specifying standard from Blog and famous so that own its own devotee among other thing Blog own the Jorn Barger, Robot Wisdom which mentioned over and over represent the biggest Blog and most good for where his in everyday promote so much link which is formed of a interest with art and technological. Camworld is popular Blog own the Cameron Barret a Desainer Interaktif where he organization topic in this blog at katagori, Random Thoughts, Web Design and New Media. Camworld can be conceived classic Blog in the meaning taht Blog contain the precise dose from selective mixed with personal opinion and character election link.
Other Famous Blog among other things, " Obscure Store" Http://Www.Obscurestore.Com/ own the Jim Romenesko providing link of have theme news and gossip and also small things which is a few instructing at underground movement, Lawrence Lee also every day update the Blog-Nya, Tomalak'S Realm by link's news about Web Design and Net Business. Memepool with the choice collect than unique link accompanied the smart analysis also liked as special Blog. Kottke.Org represent the Blog draw the property of Jason Kottke a Web Designer which live in the San Francisco, In this Blog he write that the Blog its way against time luang to reorganize the article, desain-desain and critical skill-nya. Do not forget also Blog own the Dave Winer, Scripting News, one of first Blog which is a lot of giving link about pemrograman.
This artikel from Artikel didapat dari <a target="_blank" href="www.sony-ak.com">www.sony-ak.com</a>
Way Of Defend From Virus Computer
Who not anggry when computer moment which utility attack by computer virus, although even also the virus is not dangerous or don't cause the data which we own to become to destroy. Following some ways of to be our computer is peaceful from virus attack.
==> Upgrade Operating Sistem,
Operating system (SO) Windows representing SO which often used in this time enough to attack of computer virus. This non meaning SO Windows bad or crummy, but this more because of to the number of use of SO Windows both for genuiness and also become steel. On that account SO windows represent the soft target to all hacker or virus maker. Hence it suggested to upgrade the SO which we own. Very suggested You of install Windows SP ( service Pack 2) because more amount owning peacemaker system from attack firewall from previous version. Others always monitor the growth patch for the operating system of which You use. If there new immediately download and run hole plug to security of exist in Your computer. This will make the virus a few difficult to disseminate.
==> Install program anti virus and update periodically,
One of way of good to avoid entry of computer virus is installing anti virus program and update it. Though sometimes there still some virus which not detected by anti virus which we own.
==> Discipline Moment of Browsing Internet,
For you which often good browsing internet use the personal PC better don't use the IE ( Internet Exproler) version 6 and previously. this matter caused at the version still a lot of there are gaps which can be exploited by all hacker to send the computer virus. on that account suggested to use the Mozila Firefox, Opera, or IE version 7.
==> Beware when Open the Others Storage,
Caution of VIRUS Threat don't forget that words when You opened the others storage media or open the new file when You take away from the others computer because non storage media not possible to be the infection of virus.
==> Use Firewall,
If your computer connected in network ( LAN in office or Internet), always on the firewall. Windows XP SP-2 have figured in the firewall which is the although its function minimize but better than not at all. Firewall will hinder to access which not oriented by other party. Firewall usually enough good for the stop of worm and trojan. Others A firewall also able to to prevent to access the ilegal to system of Your network or computer. This also can prevent the virus spreading quickly into network
==> Making people understand to virus risk,
Inform the that good everybody is your friend about risk infected a computer virus that good moment change over data, sending email, and also moment download a program or game.
==> Always make backup data,
all important matter to be don't anggry when our computer attacked by a virus is we better always make to back up the data, specially for the data of important. As good as backing up data periodically.
How? What You have do preparation for defend of computer virus for damage Your data or you intend the Your look after computer virus?
==> Upgrade Operating Sistem,
Operating system (SO) Windows representing SO which often used in this time enough to attack of computer virus. This non meaning SO Windows bad or crummy, but this more because of to the number of use of SO Windows both for genuiness and also become steel. On that account SO windows represent the soft target to all hacker or virus maker. Hence it suggested to upgrade the SO which we own. Very suggested You of install Windows SP ( service Pack 2) because more amount owning peacemaker system from attack firewall from previous version. Others always monitor the growth patch for the operating system of which You use. If there new immediately download and run hole plug to security of exist in Your computer. This will make the virus a few difficult to disseminate.
==> Install program anti virus and update periodically,
One of way of good to avoid entry of computer virus is installing anti virus program and update it. Though sometimes there still some virus which not detected by anti virus which we own.
==> Discipline Moment of Browsing Internet,
For you which often good browsing internet use the personal PC better don't use the IE ( Internet Exproler) version 6 and previously. this matter caused at the version still a lot of there are gaps which can be exploited by all hacker to send the computer virus. on that account suggested to use the Mozila Firefox, Opera, or IE version 7.
==> Beware when Open the Others Storage,
Caution of VIRUS Threat don't forget that words when You opened the others storage media or open the new file when You take away from the others computer because non storage media not possible to be the infection of virus.
==> Use Firewall,
If your computer connected in network ( LAN in office or Internet), always on the firewall. Windows XP SP-2 have figured in the firewall which is the although its function minimize but better than not at all. Firewall will hinder to access which not oriented by other party. Firewall usually enough good for the stop of worm and trojan. Others A firewall also able to to prevent to access the ilegal to system of Your network or computer. This also can prevent the virus spreading quickly into network
==> Making people understand to virus risk,
Inform the that good everybody is your friend about risk infected a computer virus that good moment change over data, sending email, and also moment download a program or game.
==> Always make backup data,
all important matter to be don't anggry when our computer attacked by a virus is we better always make to back up the data, specially for the data of important. As good as backing up data periodically.
How? What You have do preparation for defend of computer virus for damage Your data or you intend the Your look after computer virus?
History Of Blog 1
After we know what it's Blog like at previous article, not wrong if we know about the history the happening or creation a blog.
First Blog big possibility is page of What'S New at browser Mosaic which made by Marc Andersen in year 1993. If we still remember, Mosaic is first browser before existence of Internet Explorer even before Netscape. Later at January 1994 Justin Hall start the its website person later Justin'S Home Page turn into the Links from the Underground which possible can be conceived of first Blog such as those which we recognize now.
Till in year 1998, existing amount Blog outside there not yet. This matter caused by that moment needed a special knowledge and membership about making website, HTML, and web hosting to make the Blog, so that only those who dabble area Internet, System Administrator or later Web Designer when luangnya create the Blog-Blog themselves.
At August 1999 a Silicon Valley company so called of Pyra Lab launch the conducive service Blogger.Com whoever with the basic knowledges about HTML can create the Blog by xself by online and free of charge. Although before that (July 1999) service make the Blog online and free of charge that is Pitas there have and have made the Blogger increase till hundreds of, but sum up the Blog have never increased a lot of in such a way that Blogger.Com appear in the world Blog. Blogger.Com xself in this time have owned till 100.000 Blogger using their service with the growth sum up about 20% per month. Blogger.com And Pitas of course don't alone, service of maker of blog online given also by Grouksoup, Edit the this Page as well as Velocinews.
History Blog not yet desisted just until here, find the history of growth Blog in next article.
First Blog big possibility is page of What'S New at browser Mosaic which made by Marc Andersen in year 1993. If we still remember, Mosaic is first browser before existence of Internet Explorer even before Netscape. Later at January 1994 Justin Hall start the its website person later Justin'S Home Page turn into the Links from the Underground which possible can be conceived of first Blog such as those which we recognize now.
Till in year 1998, existing amount Blog outside there not yet. This matter caused by that moment needed a special knowledge and membership about making website, HTML, and web hosting to make the Blog, so that only those who dabble area Internet, System Administrator or later Web Designer when luangnya create the Blog-Blog themselves.
At August 1999 a Silicon Valley company so called of Pyra Lab launch the conducive service Blogger.Com whoever with the basic knowledges about HTML can create the Blog by xself by online and free of charge. Although before that (July 1999) service make the Blog online and free of charge that is Pitas there have and have made the Blogger increase till hundreds of, but sum up the Blog have never increased a lot of in such a way that Blogger.Com appear in the world Blog. Blogger.Com xself in this time have owned till 100.000 Blogger using their service with the growth sum up about 20% per month. Blogger.com And Pitas of course don't alone, service of maker of blog online given also by Grouksoup, Edit the this Page as well as Velocinews.
History Blog not yet desisted just until here, find the history of growth Blog in next article.
History of Keyboard
Keyboard represent the very standard input appliance esensial at a PC. Are You know when keyboard or board type first time found? Its answer in year 1864 which then patented by Christopher Latham Sholes at 1868.Keyboard which we recognize this time own the formal name Qwerty which is taking away from six first letter " home row". Home Row xself represent word used to denote second consecution alfabet ( its position in the middle of) keyboard. Consecution this is ought to user or typist place its fingers if typing.
Next, why knob alfabet at keyboard placed at random? Its reason is to slow down the typing. Why? there initially typewriter made softy possible for the consumer of its, but as a result, all consumer can also type high-speedly. This matter make the pengait- pengait character typewriter become often hooking. After some month look for the way of to overcome often concerning it, Sholes make random position alfabet at typewriter like this time. And after typewriter technology expand to electrical typewriter to computer, the random sequence alfabet remain to be used.
For the computer, keyboard first time used in the year 1964. A peripheral which made by MIT, Bell Laboratories, and General Electric is so-called Mulitics succeed to join the video displayed a terminal ( monitor the CRT of moment ini-Red) mechanically type electrical. Layout Qwerty of finding of Christopher Latham Sholes remain to be used, even keyboard in this time, a number of function keys have implementation.
Next, why knob alfabet at keyboard placed at random? Its reason is to slow down the typing. Why? there initially typewriter made softy possible for the consumer of its, but as a result, all consumer can also type high-speedly. This matter make the pengait- pengait character typewriter become often hooking. After some month look for the way of to overcome often concerning it, Sholes make random position alfabet at typewriter like this time. And after typewriter technology expand to electrical typewriter to computer, the random sequence alfabet remain to be used.
For the computer, keyboard first time used in the year 1964. A peripheral which made by MIT, Bell Laboratories, and General Electric is so-called Mulitics succeed to join the video displayed a terminal ( monitor the CRT of moment ini-Red) mechanically type electrical. Layout Qwerty of finding of Christopher Latham Sholes remain to be used, even keyboard in this time, a number of function keys have implementation.
What It's Blog?
"Blog? Sorry I don't know what is't Blog?" Say my friend when I question about content Blog like I make when I want to open or publicize a web Blog. Read and comprehend the article hereunder, you can know what is't Blog.
Blog is abbreviation of Weblog, first term multiply used by Jorn Barger at December 1997. Jorn Barger use the term Weblog to mention the group of website person which always updated by kontinyu and contain the link-link to other website which they assume to draw accompanied with the themselves comment.
Than Blog expand to look for the form as according to willingness all its maker or all Blogger. Blog which in the begining represent the " journey note" someone Internet, that is link to website visited and assumed to draw, then become much more interesting than a list link. This matter caused because all Blogger usually nor forget to pin they "smart" comment, personal opinion and even express their sarkasme link which they make.
From mentioned comment usually then Blog become the conducive window we "peeping" content lead and everyday life from its creator. Blog is easy way to recognize the personality of somebody Blogger. Topics what he/she take a fancy to and he/she don't take a fancy to, what he/she think to link-link which he/she choose, what its response at one particular issue. Entirely is usually drawn clear the than Blog. In consequence Blog have the character of very personal. Roger Yim, a columnist of San Francisco Gate in this article in Februari 2001, writing a Blog is cross of between diary somebody and enlist link in Internet. While Scott Rosenberg in this columns in magazine of online Salon at May 1999 concluding that Blog be at the more animate definition website than simply corps link but less instrospektif from simply a diary kept in internet.
Growth of differ from Blog that is when later Blog even no longger load the links but only in the form of article whereof which is a Blogger think, feel, till what he/she do everyday. Blog then also become the Diary Online residing in Internet. Single matter differentiating Blog from ordinary Diary or Journal we own that Blog made to be read by others. All Blogger designedly desain that Blog and its contents to be enjoyed by others.
How? Have understand what it's Blog, hence it hunting make yours Blog. Or you don't where search web which provide Blog? Just click in link Free Blog.
This artikel from <a target="_blank" href="www.sony-ak.com">www.sony-ak.com</a>
Blog is abbreviation of Weblog, first term multiply used by Jorn Barger at December 1997. Jorn Barger use the term Weblog to mention the group of website person which always updated by kontinyu and contain the link-link to other website which they assume to draw accompanied with the themselves comment.
Than Blog expand to look for the form as according to willingness all its maker or all Blogger. Blog which in the begining represent the " journey note" someone Internet, that is link to website visited and assumed to draw, then become much more interesting than a list link. This matter caused because all Blogger usually nor forget to pin they "smart" comment, personal opinion and even express their sarkasme link which they make.
From mentioned comment usually then Blog become the conducive window we "peeping" content lead and everyday life from its creator. Blog is easy way to recognize the personality of somebody Blogger. Topics what he/she take a fancy to and he/she don't take a fancy to, what he/she think to link-link which he/she choose, what its response at one particular issue. Entirely is usually drawn clear the than Blog. In consequence Blog have the character of very personal. Roger Yim, a columnist of San Francisco Gate in this article in Februari 2001, writing a Blog is cross of between diary somebody and enlist link in Internet. While Scott Rosenberg in this columns in magazine of online Salon at May 1999 concluding that Blog be at the more animate definition website than simply corps link but less instrospektif from simply a diary kept in internet.
Growth of differ from Blog that is when later Blog even no longger load the links but only in the form of article whereof which is a Blogger think, feel, till what he/she do everyday. Blog then also become the Diary Online residing in Internet. Single matter differentiating Blog from ordinary Diary or Journal we own that Blog made to be read by others. All Blogger designedly desain that Blog and its contents to be enjoyed by others.
How? Have understand what it's Blog, hence it hunting make yours Blog. Or you don't where search web which provide Blog? Just click in link Free Blog.
This artikel from <a target="_blank" href="www.sony-ak.com">www.sony-ak.com</a>
Selasa, 11 Maret 2008
VRML
VRML ( Virtual Reality of Modelling Language) is one of computer Ianguage to make the object model 3 dimension in the world of virtual. Don't only that, for the simulation of peripatetic object even also can be conducted by VRML.
First version of] VRML born at 1994, as does HTML is Ianguage skrip in artless text format ( ASCII at version 1.0 and or utf8 of version 2.0). The difference VRML used to depict the scene 3 dimension in column virtual. Referred as by column virtual because us like stay in the column which can see the object 3D from the aspect of approach which we wish, don't walkedly, but by exploiting interface computer in have interaction with the monitor, like the example by using mouse. But in first version all of objeck geometry still statik, don't have the possibility make a move the. Dynamic interaction between user with the object still be limited, communications between object one otherly also not yet been enabled.
Weakness of VRML version 1.0 is immediately with released of new specification of VRML 2.0 in the year 1996. With the this new version, hence opened by a new possibility for use VRML, such as those which a lot of used is animation. This version by now referred as with the standard of ISO VRML97 representing format of graph file 3D standard for the application of Internet and also WWW
Mostly this VRML isn't used as the single programming language, but allied by another tool. One of the example project of Interactive of Robot of Manipulation with VRML 2.0 [done/conducted] by DLR ( German of Eurospace Center) what combine the VRML by Java3D Robots. Follow the example of one again is project of Autonome Walking [in] University Duisburg using VRML as visualisation from tools Walking Pattern Generator writed with the Ianguage C++.
First version of] VRML born at 1994, as does HTML is Ianguage skrip in artless text format ( ASCII at version 1.0 and or utf8 of version 2.0). The difference VRML used to depict the scene 3 dimension in column virtual. Referred as by column virtual because us like stay in the column which can see the object 3D from the aspect of approach which we wish, don't walkedly, but by exploiting interface computer in have interaction with the monitor, like the example by using mouse. But in first version all of objeck geometry still statik, don't have the possibility make a move the. Dynamic interaction between user with the object still be limited, communications between object one otherly also not yet been enabled.
Weakness of VRML version 1.0 is immediately with released of new specification of VRML 2.0 in the year 1996. With the this new version, hence opened by a new possibility for use VRML, such as those which a lot of used is animation. This version by now referred as with the standard of ISO VRML97 representing format of graph file 3D standard for the application of Internet and also WWW
Mostly this VRML isn't used as the single programming language, but allied by another tool. One of the example project of Interactive of Robot of Manipulation with VRML 2.0 [done/conducted] by DLR ( German of Eurospace Center) what combine the VRML by Java3D Robots. Follow the example of one again is project of Autonome Walking [in] University Duisburg using VRML as visualisation from tools Walking Pattern Generator writed with the Ianguage C++.
SIG with XML 2
First subset from XML is SVG ( Scalable Vector Graphics). SVG needed by SIG to present the data which is the in form of spasial. For SIG, perhaps needed a format for the appearance of data of spasial or data presented visually. Because XML have the character of the general, hence for graphical introduced [by] a subset XML that is SVG ( Scalable Vector Graphics), a standard opened for the graph of 2D representing recommendation from < a target="_blank" href="www.w3.org"> W3C </ a>
Use SVG on SIG have given the impact especially to application webmap. SVG enable the use vektor giving a lot of excellence compared to format raster which during the time we recognize the. SVG also provided with the SVG DOM ( Document Object Model) to make a map of which interaktif. There are also the specification of for the mobile of devices ( SVG Tiny) and browser phones ( pSVG). SVG also earn the compress so that degrade the size measure transfer by signifikan.
Ably SVG to load the data vektor, bitmap and text, one would assume only by SVG have enough. And it's true in this time have a lot of example webmap using SVG, good to appearance and data figured in.
Although that way, there are some matter which not covered in specification SVG. For example hitting standard of link feature to data, used reference spasial system, feature buffer or standard of scheme of data spasial. It's true intentionally not to be included because SVG is a graphical format public which don't use only for the application of SIG, so that data transfer openly will be complicated if only rely on the SVG. Is for that needed other subset XML, that is GML. Read the solution of concerning GML in next article,
Use SVG on SIG have given the impact especially to application webmap. SVG enable the use vektor giving a lot of excellence compared to format raster which during the time we recognize the. SVG also provided with the SVG DOM ( Document Object Model) to make a map of which interaktif. There are also the specification of for the mobile of devices ( SVG Tiny) and browser phones ( pSVG). SVG also earn the compress so that degrade the size measure transfer by signifikan.
Ably SVG to load the data vektor, bitmap and text, one would assume only by SVG have enough. And it's true in this time have a lot of example webmap using SVG, good to appearance and data figured in.
Although that way, there are some matter which not covered in specification SVG. For example hitting standard of link feature to data, used reference spasial system, feature buffer or standard of scheme of data spasial. It's true intentionally not to be included because SVG is a graphical format public which don't use only for the application of SIG, so that data transfer openly will be complicated if only rely on the SVG. Is for that needed other subset XML, that is GML. Read the solution of concerning GML in next article,
SIG with XML 4
Next subset from XML is GML ( Geographic Markup Language). GML represent a subset XML for the transformasi of and depository of geographical information, goodness of data spatial and or the non spatial from a[n geographical obyek. GML is specification from Opengis Consortium .
GML provide the independent and open framework to define the obyek and scheme from a application SIG. This Matter improve the ability to shar the geographical information and scheme. This format also playing important role in implementation of Web Feature Server ( WFS).
WFS is a module which implementation of interface standard to operate for the data spasial staying in a datastore. The Datastore can be in the form of the general SQL database, flat XML File, spasial database, proprietary of format etc, and manipulation to its data can be done by passing Web. HTTP Server is server which can serve the HTTP request. Client application is application communicating with web server use the HTTP, for example one of browser.
Standard which interoperable water down the client in using web as geographical data access medium and other geographical service. Of course, GML only arrange to hit the scheme and writing of data spasial, while to present it can use SVG.
GML provide the independent and open framework to define the obyek and scheme from a application SIG. This Matter improve the ability to shar the geographical information and scheme. This format also playing important role in implementation of Web Feature Server ( WFS).
WFS is a module which implementation of interface standard to operate for the data spasial staying in a datastore. The Datastore can be in the form of the general SQL database, flat XML File, spasial database, proprietary of format etc, and manipulation to its data can be done by passing Web. HTTP Server is server which can serve the HTTP request. Client application is application communicating with web server use the HTTP, for example one of browser.
Standard which interoperable water down the client in using web as geographical data access medium and other geographical service. Of course, GML only arrange to hit the scheme and writing of data spasial, while to present it can use SVG.
SIG with XML 3
After we know what that SVG and GML there be still one subset of XML that is XSL ( Extensible Stylesheet Language). XSL represent the subset from XML recommended by W3C to define the stylesheets. A document XML with the certain structure can be processed by a XSL stylesheet become the dissimilar form wanted. Because XSL is Ianguage prosedural, XSL only function if translated to use the XSL Transformation ( XSLT).
XSL utilized to alter the data ( GML) become the graphical appearance client ( SVG). This Matter can be conducted by using prosesor for the XSLT like Xalan or Saxon. In this server matter can be conducted automatically to yield the SVG. While beside this matter client - at least in this time - still must be done in manual, because browser not yet given the facility for that.
Way of dissimilar to alter the GML become the SVG, is directly access the Document Object Model, either in server and or in client. In server, can be conducted by using servlet, or server scripts, or other;dissimilar application capable to access the DOM from a document XML. Beside client, way of easiest by using Ecmascript.
XSL utilized to alter the data ( GML) become the graphical appearance client ( SVG). This Matter can be conducted by using prosesor for the XSLT like Xalan or Saxon. In this server matter can be conducted automatically to yield the SVG. While beside this matter client - at least in this time - still must be done in manual, because browser not yet given the facility for that.
Way of dissimilar to alter the GML become the SVG, is directly access the Document Object Model, either in server and or in client. In server, can be conducted by using servlet, or server scripts, or other;dissimilar application capable to access the DOM from a document XML. Beside client, way of easiest by using Ecmascript.
History Of Internet 2
After in year 1982 defining of standard TCP /IP which caught up with the use of system DNS. Growth Internet continue in the year 1986 delivering birth National Science Foundation Network ( NSFNET), connective all periset of totality country by 5 center super computer. This network then expand to connect various other academic network consisted of the university and consortium research into the. NSFNET then start to replace ARPANET as network research into especial in America till at March 1990 ARPANET officially disbanded. At the NSFNET builded, various founded international network and interfaced to NSFNET. Australian, nations Skandinavia, English, French, jerman, Canadian and Japan immediately join into this network.
Initially, internet only offer the service base on the text, covering remote access, email/ messaging, and also discussion of through newsgroup ( Usenet). Service base on graphical like World Wide Web ( WWW) Moment still not yet. Only service is so-called Gopher which in some cases loo like like web which we recognize in this time, except its job system which still base on the text. Progress mean reached in the year 1990 when World Wide Web start developed by CERN ( Laboratory of Particle Physics in Swiss) pursuant the proposal which is made by Team Berners-Lee. But that way, newborn first WWW Browser two year later, precisely in the year 1992 by the name of Viola. Viola launched by Pei Wei and distributed with CERN WWW. Of course this first web browser still very simple, don't as sophisticated as modern browser which we use in this time.
Breakthrough mean became of by1993 when Internic founded to run service of registration domain. At The Same Time, White House start online in Internet and government United States get away the National Information Infrastructure Act. Use Internet in commercially started at 1994 pioneered by company of Pizza Hut, and Internet Banking first time application by First Virtual. One year later;then, Compuserve, America Online, and Prodigy start to give the service access to Internet for public.
Initially, internet only offer the service base on the text, covering remote access, email/ messaging, and also discussion of through newsgroup ( Usenet). Service base on graphical like World Wide Web ( WWW) Moment still not yet. Only service is so-called Gopher which in some cases loo like like web which we recognize in this time, except its job system which still base on the text. Progress mean reached in the year 1990 when World Wide Web start developed by CERN ( Laboratory of Particle Physics in Swiss) pursuant the proposal which is made by Team Berners-Lee. But that way, newborn first WWW Browser two year later, precisely in the year 1992 by the name of Viola. Viola launched by Pei Wei and distributed with CERN WWW. Of course this first web browser still very simple, don't as sophisticated as modern browser which we use in this time.
Breakthrough mean became of by1993 when Internic founded to run service of registration domain. At The Same Time, White House start online in Internet and government United States get away the National Information Infrastructure Act. Use Internet in commercially started at 1994 pioneered by company of Pizza Hut, and Internet Banking first time application by First Virtual. One year later;then, Compuserve, America Online, and Prodigy start to give the service access to Internet for public.
XSLT
XSLT ( eXtensible Stylesheet Language:Transformation) is a part of XSL developed previously. XSL is special Stylesheet developed as complement XML, for the fox of information at XML into other form to be can be presented in screen, printed in paper or listened by a ear. Basically process this for becoming two shares process first namely Structural Transformasi covering gathering, subdividing and sequence of data and also reconstituting, addition and abolition of tag and attribute, and secondly is process of format fox become the pixel[screen, ink in paper or tone in speaker. First process that's which then referred by XSLT, while ordinary secondly referred by XSLFO ( eXtensible Stylesheet Language:Formatting Object).
Result of XSLT can be HTML, Text of File or XML with the new format. In fact to present the document XML for more interesting seen in browser can be by Cascade Stylesheet. CSS which often used for the format of HTML can also weared for the XML. However CSS unable to conduct the complicated difuculte work's like number format denary, menjumlah, calculating mean, presenting picture, and others. To conduct the work that's we need XSLT.
XSLT Processor or ordinary referred by Parser is assistive software which its duty apply the comands in XSLT at document of source XML, and yield the good output document in the form of HTML, Text File and or XML.
Result of XSLT can be HTML, Text of File or XML with the new format. In fact to present the document XML for more interesting seen in browser can be by Cascade Stylesheet. CSS which often used for the format of HTML can also weared for the XML. However CSS unable to conduct the complicated difuculte work's like number format denary, menjumlah, calculating mean, presenting picture, and others. To conduct the work that's we need XSLT.
XSLT Processor or ordinary referred by Parser is assistive software which its duty apply the comands in XSLT at document of source XML, and yield the good output document in the form of HTML, Text File and or XML.
XML (eXtensible Markup Language)
eXtensible Markup Language shortened by XML is special Ianguage to they form the Web page so that its consumer can do various format tag in the document. This Ianguage released by World Wide Web Consortium ( W3C) to give the more flexible ability to all programmer web compared to Hypertext Markup Language ( HTML). XML also represent the subset from Standard of Generalized Markup Language ( SGML).
XML developed by start the year 1996 and get the confession from W3C at Februari 1998. Technology used in XML in fact non new technology, but represent the born of SGML which have been developed in the early 80-an and have a lot of used at technical documentation of project have a big scale. When HTML developed in the year 1990, all maker XML adopt the shares most important at SGML and holded into development HTML yield the markup language which don't fail its excitement by SGML.
As does HTML, XML also use the element marked by tag is opener ( early ‘<’ and end by ‘>’), tag is close ( early ‘’) and attribute elemen (parameter expressed in tag opener for example < form name=”isidata”>). Only the difference, HTML define from early tag and attribute weared in it, while in XML we can use the tag and attribute according to we will.
Is Equal with HTML, File XML is in form of text so that when needed we can read it'n requiring special aid software. This matter facilitate the application developer using XML for the mendebug of its program. XML more fleksible compared to HTML in the case of its ability [for save the information and data. At XML we can do save the data in attribute and also as element content placed among tag of opener and tag closing.
Other excess owned by the XML is that can subsitution information from one system to other system with different platform. For example from Windows to Unix, or from PC to Machintosh even from internet to handphone with technologically WAP.
XML developed by start the year 1996 and get the confession from W3C at Februari 1998. Technology used in XML in fact non new technology, but represent the born of SGML which have been developed in the early 80-an and have a lot of used at technical documentation of project have a big scale. When HTML developed in the year 1990, all maker XML adopt the shares most important at SGML and holded into development HTML yield the markup language which don't fail its excitement by SGML.
As does HTML, XML also use the element marked by tag is opener ( early ‘<’ and end by ‘>’), tag is close ( early ‘’) and attribute elemen (parameter expressed in tag opener for example < form name=”isidata”>). Only the difference, HTML define from early tag and attribute weared in it, while in XML we can use the tag and attribute according to we will.
Is Equal with HTML, File XML is in form of text so that when needed we can read it'n requiring special aid software. This matter facilitate the application developer using XML for the mendebug of its program. XML more fleksible compared to HTML in the case of its ability [for save the information and data. At XML we can do save the data in attribute and also as element content placed among tag of opener and tag closing.
Other excess owned by the XML is that can subsitution information from one system to other system with different platform. For example from Windows to Unix, or from PC to Machintosh even from internet to handphone with technologically WAP.
SIG with XML 1
Such as those which have been explained in article about GIS previously, explained GIS represent a system which can assist to give the clearer picture about information from a place. XML representing continuation Ianguage from HTML applicable to make the SIG. Now what such XML?
XML ( eXtensible Markup Language) is Ianguage markup providing limber sintaks ( can be developed according to requirement) and independent ( not depended by platform system). Become according to for the medium of data transfer usher various system manner, good pass the other;dissimilar internet band. XML representing furthermore development from format HTML used in World Wide Web. XML own a number of excess compared to HTML, among other things document more structure, enabling manipulation of data appearance without having to relate to the webserver, and also data transfer usher the document. Because excess XML which can conduct the transfer usher the document, this matter make the make-up of use SIG.
XML enable to load the goodness of co-ordinate data, data which figured and instruction expressing treatment type to the data. That treatment can be in the form of the transformasi data to dissimilar form and or to express how data presented.
Use XML enable the applying of internet SIG in the form of barer, immeasurable and cheap but remain to kompatibel. The mentioned can be realized by some subset of XML, that is SVG, XSL And GML to be studied at article hereinafter.
XML ( eXtensible Markup Language) is Ianguage markup providing limber sintaks ( can be developed according to requirement) and independent ( not depended by platform system). Become according to for the medium of data transfer usher various system manner, good pass the other;dissimilar internet band. XML representing furthermore development from format HTML used in World Wide Web. XML own a number of excess compared to HTML, among other things document more structure, enabling manipulation of data appearance without having to relate to the webserver, and also data transfer usher the document. Because excess XML which can conduct the transfer usher the document, this matter make the make-up of use SIG.
XML enable to load the goodness of co-ordinate data, data which figured and instruction expressing treatment type to the data. That treatment can be in the form of the transformasi data to dissimilar form and or to express how data presented.
Use XML enable the applying of internet SIG in the form of barer, immeasurable and cheap but remain to kompatibel. The mentioned can be realized by some subset of XML, that is SVG, XSL And GML to be studied at article hereinafter.
Virus Computer 2
After we know what such with the virus and also history, now we have to know the virus type. Virus can be classified to become six faction:
1) Macro Virus
Writed by using macro Ianguage pemrograman [which is made moderate, and infection of application of Microsoft Office, like Word and Excel, and in this time estimated by 75 percentage of this virus type have been gone the round of world. A document which infection by macro virus in general comand modification which will there have and a lot of used ( like comand " Save") to trigger the spreading of the comand moment x'self run.
Example:
=> variant W97M, misal W97M.Panther
long 1234 bytes,
=> WM.Twno.A;TW
long 41984 bytes,
2) Virus of Boot Sector
Virus Boot sector have common once disseminate. This virus in duplicating x'self will remove or replace the original boot sector with the program of booting virus. So that moment happened by the booting hence virus will load to memory and hereinafter virus will have the ability control the hardware standar(ex::monitor, etc) and from this memory also virus will disseminate all the existing drive and incircuit to computer ( ex: floopy, drive [of] besides the drive c). virus Boot-Sector Include the x'self into boot - sector -- a area of hard drive ( or other disk type) to be accessed first time moment PC flamed. Virus of this type of can hinder Our PC to conduct the booting from hard disk.
Example:
=> varian virus wyx , example: wyx.C(B) infection of boot record and floopy.
long 520 bytes,
3) Stealth Virus
This virus will master the tables of tables interupt at PACK which often we recognize by " Interrupt interceptor". this virus capable to control the instruction of instruction of level PACK and usually occult them by name nya either through full and or its size measure . Stealth Virus always hide out its by making file which visible infection [do] not infection, but virus of this type of seldom able to face the newest scanner antivirus.
Example:
=> Yankee.XPEH.4928. Infection file *.COM dan *.EXE
long 4298 bytes
4) Polymorphic Virus
This virus designed to make to deceive the program antivirus, its meaning this virus always try in order not to be recognized by antivirus by always fox change its structure each time finish the file infection / program other;dissimilar. Polymorphic will alter the code of moment x'self overcome at different machine; theoretically virus this type of harder to can be detected by scanner antivirus, but in in reality virus of this type is not writed better, so that easy to in order to be known its existence virus Will alter the code of moment x'self overcome at different machine; theoretically virus this type of harder to can be detected by scanner antivirus, but in in reality virus of this type of not writed better, so that easy to in order to be known its existence.
Example:
=> Necropolis A/B, Infection file *.COM dan *.EXE
long 1963 bytes.
5) Virus File/Program
This virus infection of file file which can be executed direct the than operating system, good that file application (*. EXE), and also *. COm usually also result of infection from this virus knowable by changing size measure of file attacked. This virus do to execute to propagate the x'self at related/relevant document and application with of file moment which infection opened or run.
6) Or multipartite virus represent the merger from Virus of Boot sector and file Virus: its meaning work conducted cause two, that is he/she infection can file *. EXE as well as infection of Boot Sector. good Multi Partition Infection virus file and boot-sector--sebuah of criminal of have mask to our system infection which can continuously before be under arrest by scanner antivirus.
1) Macro Virus
Writed by using macro Ianguage pemrograman [which is made moderate, and infection of application of Microsoft Office, like Word and Excel, and in this time estimated by 75 percentage of this virus type have been gone the round of world. A document which infection by macro virus in general comand modification which will there have and a lot of used ( like comand " Save") to trigger the spreading of the comand moment x'self run.
Example:
=> variant W97M, misal W97M.Panther
long 1234 bytes,
=> WM.Twno.A;TW
long 41984 bytes,
2) Virus of Boot Sector
Virus Boot sector have common once disseminate. This virus in duplicating x'self will remove or replace the original boot sector with the program of booting virus. So that moment happened by the booting hence virus will load to memory and hereinafter virus will have the ability control the hardware standar(ex::monitor, etc) and from this memory also virus will disseminate all the existing drive and incircuit to computer ( ex: floopy, drive [of] besides the drive c). virus Boot-Sector Include the x'self into boot - sector -- a area of hard drive ( or other disk type) to be accessed first time moment PC flamed. Virus of this type of can hinder Our PC to conduct the booting from hard disk.
Example:
=> varian virus wyx , example: wyx.C(B) infection of boot record and floopy.
long 520 bytes,
3) Stealth Virus
This virus will master the tables of tables interupt at PACK which often we recognize by " Interrupt interceptor". this virus capable to control the instruction of instruction of level PACK and usually occult them by name nya either through full and or its size measure . Stealth Virus always hide out its by making file which visible infection [do] not infection, but virus of this type of seldom able to face the newest scanner antivirus.
Example:
=> Yankee.XPEH.4928. Infection file *.COM dan *.EXE
long 4298 bytes
4) Polymorphic Virus
This virus designed to make to deceive the program antivirus, its meaning this virus always try in order not to be recognized by antivirus by always fox change its structure each time finish the file infection / program other;dissimilar. Polymorphic will alter the code of moment x'self overcome at different machine; theoretically virus this type of harder to can be detected by scanner antivirus, but in in reality virus of this type is not writed better, so that easy to in order to be known its existence virus Will alter the code of moment x'self overcome at different machine; theoretically virus this type of harder to can be detected by scanner antivirus, but in in reality virus of this type of not writed better, so that easy to in order to be known its existence.
Example:
=> Necropolis A/B, Infection file *.COM dan *.EXE
long 1963 bytes.
5) Virus File/Program
This virus infection of file file which can be executed direct the than operating system, good that file application (*. EXE), and also *. COm usually also result of infection from this virus knowable by changing size measure of file attacked. This virus do to execute to propagate the x'self at related/relevant document and application with of file moment which infection opened or run.
6) Or multipartite virus represent the merger from Virus of Boot sector and file Virus: its meaning work conducted cause two, that is he/she infection can file *. EXE as well as infection of Boot Sector. good Multi Partition Infection virus file and boot-sector--sebuah of criminal of have mask to our system infection which can continuously before be under arrest by scanner antivirus.
Format MP4
Standard format for the MPEG-4 OF named MP4. Sometimes this cause the people confuse and assume as audio format like MP3. In fact related/relevant MP3 by MPEG-1. MP3 represent part of audio from original standard MPEG.
Format MPEG-4 xself in fact represent the type is so-called " container format". Its meaning this format join some different konten into one file. Usually konten joined is audio with the video, but sometimes konten like picture kept quiet also included into a file MP4.
Konten of Video and audio which merged into by MP4 can be consisted of immeasurable format. For the video of format used for example Divx, Xvid, ffmpeg, H.264 ( MPEG-4 AVC). Format of Audio of the example of AAC and MP3, while for the picture of kept quiet us can use the JPEG and PNG. All the format konten [is] inclusive of standard MPEG-4.
Besides format included in standard MPEG-4, file MP4 also can load the format nonstandar, like Ogg Vorbis and AMR for the audio of, and Ogg Theora for the video of.
Because immeasurable this family MP4, if You get the file of berekstensi MP4 from others ( for example from Internet) the file not yet visible of course [at] Your ponsel, though camera ponsel xself yield the file of have format to 4 MP4.
Though MP4 represent the ekstensi standard used for the file of MPEG-4, sometimes we find the ekstensi file of[is other;dissimilar. example this Ekstensi nonstandar for example M4V and M4A. Each representing format of video and separate audio format introduced by Apple. Music sold Apple pass the service of online iTunes use the format M4P, representing MP4 additionally protection DRM ( Digital Rights Management)
Standard format for the MPEG-4 OF named MP4. Sometimes this cause the people confuse and assume as audio format like MP3. In fact related/relevant MP3 by MPEG-1. MP3 represent part of audio from original standard MPEG.
Format MPEG-4 xself in fact represent the type is so-called " container format". Its meaning this format join some different konten into one file. Usually konten joined is audio with the video, but sometimes konten like picture kept quiet also included into a file MP4.
Konten of Video and audio which merged into by MP4 can be consisted of immeasurable format. For the video of format used for example Divx, Xvid, ffmpeg, H.264 ( MPEG-4 AVC). Format of Audio of the example of AAC and MP3, while for the picture of kept quiet us can use the JPEG and PNG. All the format konten [is] inclusive of standard MPEG-4.
Besides format included in standard MPEG-4, file MP4 also can load the format nonstandar, like Ogg Vorbis and AMR for the audio of, and Ogg Theora for the video of.
Because immeasurable this family MP4, if You get the file of berekstensi MP4 from others ( for example from Internet) the file not yet visible of course [at] Your ponsel, though camera ponsel xself yield the file of have format to 4 MP4.
Though MP4 represent the ekstensi standard used for the file of MPEG-4, sometimes we find the ekstensi file of[is other;dissimilar. example this Ekstensi nonstandar for example M4V and M4A. Each representing format of video and separate audio format introduced by Apple. Music sold Apple pass the service of online iTunes use the format M4P, representing MP4 additionally protection DRM ( Digital Rights Management)
History Of Internet 1
Internet early from creating of technology of computer network about year 1960. What is computer network ? Computer network is some computer incircuit one another by hence cable in one location, for example in one office or building. This Computer network function is costumer can ti change over information and dat with another computer.
Early network Internet which we recognize this time is first time developed at year 1969 by Department Defender of United States by the name of ARPANET ( US Defense Advanced Research Projects Agency). ARPANET develop with the target to make a computer network which is gone the round of to avoid the information concentration in one dot which looked into a gristle to be broken in the event of war. In this way expected if one part of network broken, hence band which is passing the network can be automatically Carried over a other channel.
In early 1980, ARPANET broken to become two network, that is ARPANET and Milnet ( a military network), however both having link so that communications usher the network remain to can be done. In the begining this network interkoneksi is referred by DARPA Internet, but in process of time conceived of just say Internet. After, internet put into use for the sake of academic By connecting some college, each UCLA, University Of California at Santa Barbara, University Of Utah, and Stanford Research Institute. This caught up openedly of service of conducive Usenet and Bitnet of internet accessed by through personal computer (PC). Next, protocol of standard TCP / ip start introduced in the year 1982, caught up with the use of system DNS ( Domain Name Service) at 1984.
Early network Internet which we recognize this time is first time developed at year 1969 by Department Defender of United States by the name of ARPANET ( US Defense Advanced Research Projects Agency). ARPANET develop with the target to make a computer network which is gone the round of to avoid the information concentration in one dot which looked into a gristle to be broken in the event of war. In this way expected if one part of network broken, hence band which is passing the network can be automatically Carried over a other channel.
In early 1980, ARPANET broken to become two network, that is ARPANET and Milnet ( a military network), however both having link so that communications usher the network remain to can be done. In the begining this network interkoneksi is referred by DARPA Internet, but in process of time conceived of just say Internet. After, internet put into use for the sake of academic By connecting some college, each UCLA, University Of California at Santa Barbara, University Of Utah, and Stanford Research Institute. This caught up openedly of service of conducive Usenet and Bitnet of internet accessed by through personal computer (PC). Next, protocol of standard TCP / ip start introduced in the year 1982, caught up with the use of system DNS ( Domain Name Service) at 1984.
Device driver
Such as those which written in article of What Is Computer 1, there are three division software that is operating system itself, application user, and last of device driver. This opportunity, I will a littel studying about device driver, in a word device driver is channel of place software communicate with hardware.
Simply device driver is same as other application, although with a few very important difference. First, device driver not use the window and icon to communicate with the user, but there is among program which You use and hardware itself. Ordinary application will not men-crash of overall of system if there are bug, but device driver have to be writed by cleanness and dites so that can work properly.
In a lot of matter of device driver loo like by Dynamic [is] Link Library or file DLL used by Windows and each;every program for the save of part of code which often used. When device driver walk, he give the information ( so-called object driver) to Windows hit to which hardware the communicate and what can do of.
Follow the example of the communications device that is when You wish to print the document or incircuit to Internet, Windows will check the Function Dispatch Table to see the such as code which can do the the request. After finishing, Windows later;then will give the the request to pertinent device driver so that executed, so that Your printer make a move and Your modem turn around the number ISP.
FURTHERMOR visited windowsupdate.microsoft.com or go.microsoft.com
from pc media
Simply device driver is same as other application, although with a few very important difference. First, device driver not use the window and icon to communicate with the user, but there is among program which You use and hardware itself. Ordinary application will not men-crash of overall of system if there are bug, but device driver have to be writed by cleanness and dites so that can work properly.
In a lot of matter of device driver loo like by Dynamic [is] Link Library or file DLL used by Windows and each;every program for the save of part of code which often used. When device driver walk, he give the information ( so-called object driver) to Windows hit to which hardware the communicate and what can do of.
Follow the example of the communications device that is when You wish to print the document or incircuit to Internet, Windows will check the Function Dispatch Table to see the such as code which can do the the request. After finishing, Windows later;then will give the the request to pertinent device driver so that executed, so that Your printer make a move and Your modem turn around the number ISP.
FURTHERMOR visited windowsupdate.microsoft.com or go.microsoft.com
from pc media
ASP (Active Server Page)
Have all of you see a dynamic web? One of dynamic characteristic web in the web can present the date of and appropriate time. The example, if a web present the date of today, for example 7 March 2008 and when tomorrow the date of turning into 8 March 2008 hence the web is inclusive of dynamic web. What will be way of to make a web become dynamic? Whether need a software to make the dynamic web? Read and find its answer by bringing article hereunder.
One of way of to make the dynamic web by using ASP ( Active Server Page). ASP environmental laboring script program of website and internet, ASP also represent the appliance ( software) implementation from middleware although in practice nya represent the part of web server [of] like PWS ( Personal Web Server) or IIS ( Internet Information Service) commisioned translate the on file script in binding by file .asp. This Skript-skript extend the ability HTML so that can be obtained dynamic web.
ASP represent the software made in microsoft which is officially launched at date of 16 July 1996 by the name of code Denali. Beta Version ( to know the bugs any kind of which is there are) ASP launched at november 1996. While for the ASP OF Version 1.0 launched at date of 12 December 1996.
ASP Work by: Client beginning ask an script ASP and give the kemesin ASP. Hereinafter machine ASP translate it become the code HTML. By web server, result of from this machine ASP sent to client.
To make the dynamic web by xself, ASP have jointing to database. To communicate with a database, script ASP need the ODBC ( Open of Database Connectivity) and ADO ( Activex of Data Objects).
ODBC ( Open of Database Connectivity) is a standard addressed for the make of communications between a application with any database. Of course, in its implementation each;every database own the functioning ODBC driver by xself conduct various translating so that can be comprehended by application accessing database. ADO ( Activex of Data Objects) comprising a number of object which can be weared by application to communicate with the ODBC. ADO also developed by Microsoft.
One of way of to make the dynamic web by using ASP ( Active Server Page). ASP environmental laboring script program of website and internet, ASP also represent the appliance ( software) implementation from middleware although in practice nya represent the part of web server [of] like PWS ( Personal Web Server) or IIS ( Internet Information Service) commisioned translate the on file script in binding by file .asp. This Skript-skript extend the ability HTML so that can be obtained dynamic web.
ASP represent the software made in microsoft which is officially launched at date of 16 July 1996 by the name of code Denali. Beta Version ( to know the bugs any kind of which is there are) ASP launched at november 1996. While for the ASP OF Version 1.0 launched at date of 12 December 1996.
ASP Work by: Client beginning ask an script ASP and give the kemesin ASP. Hereinafter machine ASP translate it become the code HTML. By web server, result of from this machine ASP sent to client.
To make the dynamic web by xself, ASP have jointing to database. To communicate with a database, script ASP need the ODBC ( Open of Database Connectivity) and ADO ( Activex of Data Objects).
ODBC ( Open of Database Connectivity) is a standard addressed for the make of communications between a application with any database. Of course, in its implementation each;every database own the functioning ODBC driver by xself conduct various translating so that can be comprehended by application accessing database. ADO ( Activex of Data Objects) comprising a number of object which can be weared by application to communicate with the ODBC. ADO also developed by Microsoft.
Email Or electronic mail is a service of letter delivery but do not like letter squired a post father, message delivered by passing enamel do not only comprise the article or text of but also can comprise the good data in the form of picture, voice, video and others. Others, email delivery nor need the old need time like we deliver the letter pass the post of fice of but only with the time of some just just second message which we send have legible process one who we send order.
Besides speed of letter delivery which quickly, email also own the excess is so-called mailing list, that is we can send a same message for a few email address in one time only by delivering the message to a email address which is the inclusive of into mailing list of the example xxxx@yahoogrops.com. Constructively this filtur is we needn't be busy deliver the same message to one by one email address.
Slowe but surely, email have come to the indivisible shares from all day long Indonesia society. Data from Asosiasi Penyedia Jasa Internet Indonesia ( APJII) indicate that in the year 2004 ago, sum up the costumer Internet in Indonesia reach 1.087.428. While wearer Internet xself as much 11.226.143. This matter show the growth from next years., inappropriate though goals APJII as much 12 million wearer in the year 2004.
Fast Email usage also peeped at by provider phone to grasp to equip the its handphone brand inserted by filture email delivery by using network WAP, GPRS, and also 3G. the example of Service of push e-mail represent the konvergensi from service of e-mail and conducive mobile system relaying e-mail to ponsel or PDA phone. By push e-mail, owner account can accept or deliver the enamel, non again in the form of SMS, passing terminal in the form of ponsel or PDA. Push E-Mail exploit the koneksi ponsel or PDA phone to network GPRS ( Global Packet of Radio System) or PDN ( Packet of Data Network). Simply, push e-mail xself can be conceived of mirror or mirroring of e-mail desktop presented in ponsel.
But, not all consumer ponsel can exploit this service. Only ponsel of type smartphone being based on Symbian ( S60 And UIQ) and PDA Phone base on the just Windows Mobile 2003 which can enjoy . This matter caused by caused by its software which must diinstal of ponsel. Besides software, something else which require to be made available by operator of service of push of itself e-mail.
Besides speed of letter delivery which quickly, email also own the excess is so-called mailing list, that is we can send a same message for a few email address in one time only by delivering the message to a email address which is the inclusive of into mailing list of the example xxxx@yahoogrops.com. Constructively this filtur is we needn't be busy deliver the same message to one by one email address.
Slowe but surely, email have come to the indivisible shares from all day long Indonesia society. Data from Asosiasi Penyedia Jasa Internet Indonesia ( APJII) indicate that in the year 2004 ago, sum up the costumer Internet in Indonesia reach 1.087.428. While wearer Internet xself as much 11.226.143. This matter show the growth from next years., inappropriate though goals APJII as much 12 million wearer in the year 2004.
Fast Email usage also peeped at by provider phone to grasp to equip the its handphone brand inserted by filture email delivery by using network WAP, GPRS, and also 3G. the example of Service of push e-mail represent the konvergensi from service of e-mail and conducive mobile system relaying e-mail to ponsel or PDA phone. By push e-mail, owner account can accept or deliver the enamel, non again in the form of SMS, passing terminal in the form of ponsel or PDA. Push E-Mail exploit the koneksi ponsel or PDA phone to network GPRS ( Global Packet of Radio System) or PDN ( Packet of Data Network). Simply, push e-mail xself can be conceived of mirror or mirroring of e-mail desktop presented in ponsel.
But, not all consumer ponsel can exploit this service. Only ponsel of type smartphone being based on Symbian ( S60 And UIQ) and PDA Phone base on the just Windows Mobile 2003 which can enjoy . This matter caused by caused by its software which must diinstal of ponsel. Besides software, something else which require to be made available by operator of service of push of itself e-mail.
Computer Virus 1
In this time, computer virus have assorted of type and its for, what before now only groan the file of microsoft word but now virus open fire the application windows. When we do cleanig with anti virus, sometimes file is virus infection also follow vanished, causing the data become to destroy. Multiply its virus of a computer also will make the computer performance of a few/little slower because some virus there groaning precisely system work a operating system. But, there is also some virus which only follow the life at a computer, this matter because of the virus do not influence the performance of computer of place in multiplying.
Computer virus xself defined as A program the that can infect other programs by modifying them to include a slighty altered copy the of itself.A of virus of can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every Programs that gets infected can also act of ace of a of virus of that infection grows.
usage of virus Word first time is used by Fred Cohen in the year 1984 in United States, this matter because of disease ( virus) at computer own some elementary equation virus in the field of doctor. Computer virus xself can be interpreted by as a infection program which can program the other;dissimilar. Program which infection have by virus can cause the happening of data manipulation even make the the program become to destroy the. Virus will multiply when when program which infection have by an virus executed or run.
In year 1960, all expert in Lab BELL ( AT&T) try the virus theory which laid open By John Von Neuman become a game. All the expert make a program which can multiply the x'self and break the program from opponent play the nya. Program capable to hold out the kan conceived of by a winner. Game make the program which can multiply this x'self become the game favorite almost all lab computer. This matter result the programs made become to more and more dangerous.
Newly in the year 1980, the program is which recognized by the name of " virus" this succeed to disseminate outside laboratory environment, and start to circulate [in] world cyber.
Computer virus xself defined as A program the that can infect other programs by modifying them to include a slighty altered copy the of itself.A of virus of can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every Programs that gets infected can also act of ace of a of virus of that infection grows.
usage of virus Word first time is used by Fred Cohen in the year 1984 in United States, this matter because of disease ( virus) at computer own some elementary equation virus in the field of doctor. Computer virus xself can be interpreted by as a infection program which can program the other;dissimilar. Program which infection have by virus can cause the happening of data manipulation even make the the program become to destroy the. Virus will multiply when when program which infection have by an virus executed or run.
In year 1960, all expert in Lab BELL ( AT&T) try the virus theory which laid open By John Von Neuman become a game. All the expert make a program which can multiply the x'self and break the program from opponent play the nya. Program capable to hold out the kan conceived of by a winner. Game make the program which can multiply this x'self become the game favorite almost all lab computer. This matter result the programs made become to more and more dangerous.
Newly in the year 1980, the program is which recognized by the name of " virus" this succeed to disseminate outside laboratory environment, and start to circulate [in] world cyber.
TCP/IP ( Trasmission Contro Protokol/ Internet Protocol )
World Internet have become the part of modern life style, but know all of you how computer network earn incircuit with the network internet? Following a little solution of about how a computer earn is communicating with each other other computer.
TCP/IP ( Trasmission Contro Protocol/ Internet Protocol ) is a group of a group of protocol arranging communications of data of computer diinternet, can be told also TCP / IP is a set of standard protocol used to connect the network of computer and traffic address in network. This protocol arrange the permitted data format, mistake handling ( error handling), traffic ordered, and other communications standard. Protocol by xself mean a set order arranging precisely is communications format usher the system. For example, protocol HTTP arrange the communications format of between browser web and browser server. Protocol IMAP arrange the communications format of between server of email IMAP with client.
With the existence of TCP/IP computer remain to earn is communicating each other even there are hardware difference and also used operating system, for example computer which have operating system to of Windows remain to can communicate with the computer using operating system Macinthos.
Protocol xself own the marking for example:
a) TCP / IP developed to use the open protocol standard.
b) Standard of protocol TCP / IP in the form of Request For Comments ( RTC) can be taken by whoever without expense.
c) TCP / ip developed with do not base on the operating system/ certain hardware. And still a lot of the other marking.
Internet can be formed by because a group of big computer network own the agreement for the < i> To converse in same Ianguage. This agreement solely represent the agreement having the character of technical for lack of one organization in this world rightful claimant arrange the way internet.
Though TCP/IP developed with the open protocol standard, but immanent [of] body in charge of in arranging, controlling, and also do the standarisasi protocol used in Internet. As for the organization's is:
a) Internet Society ( ISOC), professional organitation which facility, supporting and also promote the growth internet, as infrastructure global communications to research into and research.
b) Internet Architecture Board ( IAB) is organization co-ordinate and technical adviser for ISOC. This Body act as the body review and editorial all standard internet. IAB own the authority to publish the document of standard internet recognized by Request For Comments ( RTC).
c) Internet Engineering Task Force ( IETF) is organization orienting for the standard form of internet. To arrange the job IETF hence physique is so-called Internet Engineering Groups ( IECG)
d) Internet Research Task Force ( IRTF) this organization have orientation at researching into in the long term.
TCP/IP ( Trasmission Contro Protocol/ Internet Protocol ) is a group of a group of protocol arranging communications of data of computer diinternet, can be told also TCP / IP is a set of standard protocol used to connect the network of computer and traffic address in network. This protocol arrange the permitted data format, mistake handling ( error handling), traffic ordered, and other communications standard. Protocol by xself mean a set order arranging precisely is communications format usher the system. For example, protocol HTTP arrange the communications format of between browser web and browser server. Protocol IMAP arrange the communications format of between server of email IMAP with client.
With the existence of TCP/IP computer remain to earn is communicating each other even there are hardware difference and also used operating system, for example computer which have operating system to of Windows remain to can communicate with the computer using operating system Macinthos.
Protocol xself own the marking for example:
a) TCP / IP developed to use the open protocol standard.
b) Standard of protocol TCP / IP in the form of Request For Comments ( RTC) can be taken by whoever without expense.
c) TCP / ip developed with do not base on the operating system/ certain hardware. And still a lot of the other marking.
Internet can be formed by because a group of big computer network own the agreement for the < i> To converse in same Ianguage. This agreement solely represent the agreement having the character of technical for lack of one organization in this world rightful claimant arrange the way internet.
Though TCP/IP developed with the open protocol standard, but immanent [of] body in charge of in arranging, controlling, and also do the standarisasi protocol used in Internet. As for the organization's is:
a) Internet Society ( ISOC), professional organitation which facility, supporting and also promote the growth internet, as infrastructure global communications to research into and research.
b) Internet Architecture Board ( IAB) is organization co-ordinate and technical adviser for ISOC. This Body act as the body review and editorial all standard internet. IAB own the authority to publish the document of standard internet recognized by Request For Comments ( RTC).
c) Internet Engineering Task Force ( IETF) is organization orienting for the standard form of internet. To arrange the job IETF hence physique is so-called Internet Engineering Groups ( IECG)
d) Internet Research Task Force ( IRTF) this organization have orientation at researching into in the long term.
Sabtu, 08 Maret 2008
STRUCTURE of DECODER VIDEO MPEG-4
Decoder of Video of MPEG-4 of personating of input of data stream, regular consecution of beet deputizing consecution draw the presented video. Data stream load the information lapped over consecution structure draw the video, what is good match for MPEG-4 of Video of International Standard 14496-2. Data stream start to explain part of video, representing part of video picture which is formed of one or more syntax structure identifying video object. Video object deputize a object contained in consecution draw the video and can be joined to become one or more coat of video object. coat of video Object represent a syntax structure identifying its own data stream and permit to get the consecution which can scale. peripheral of video Object is structure hereinafter identifying incidence single video object when shortening.A Video of Object Plane ( VOP) made of some macro block, each;every macro block builded by 8 x 8 block luminan, krominan and often also clearness of values piksel.
Stream of input Data load the information about tekstur, move, and structure each;every VOP Form the information identify the object which is taken a short cut in VOP. Information move to lessen the time-wasting whereas consecution draw the video, connecting macro block from VOP which now with the macro block develop;builded previously. Tekstur of Information didecodekan by using a algorithm lessening space extravagance.
Process the decode tekstur got first time apply all Algorithm Very Length Decoding ( VLD) explaining code word from tables Huffman. Later;Then inversi of algorithm scan rebuild the block 8 x 8 from coefficient array which quantization. After inversi of algorithm of prediksi AC & DC And inversi of quantization algorithm, a Inverse Discrete Cosine Transform ( IDCT) applied in block 8 x 8. In course of decode tekstur depicted [by] that more intensive operation computing VLD and IDCT. Decoder which is outlined in under show how big biayan operate for the VLD and IDCT for the time of decode.
Compensation algorithm move process decode of other;dissimilar costly. This algorithm rebuild each;every macro block begining from coresponding macro block to VOP rebuilt previously. If this coresponding macro block unegual ( in certain sill) with the macro block which now, a[n estimate of information of error diekstraksi from stream of data and didecode by using algorithm of decode tekstur. In this case macro block which now got as quantifying from macro block ( coresponding) with the macro block rebuilt wrong mendecode prediksi.
To identify the most expected module, have been shown implementation of software of decoder of video MPEG-4. Examination Consecution used have the long foursquare and single coat VOP ( VOP contain the foursquare object length, form without information). examination Decoder have been conducted at Pentium II 266 MHZ, to know the insuffiency of process VLIW. Have been estimated previously that computing time at Pentium II proporsional to computing time of VLIW.
From http://www.informatika.lipi.go.id
Stream of input Data load the information about tekstur, move, and structure each;every VOP Form the information identify the object which is taken a short cut in VOP. Information move to lessen the time-wasting whereas consecution draw the video, connecting macro block from VOP which now with the macro block develop;builded previously. Tekstur of Information didecodekan by using a algorithm lessening space extravagance.
Process the decode tekstur got first time apply all Algorithm Very Length Decoding ( VLD) explaining code word from tables Huffman. Later;Then inversi of algorithm scan rebuild the block 8 x 8 from coefficient array which quantization. After inversi of algorithm of prediksi AC & DC And inversi of quantization algorithm, a Inverse Discrete Cosine Transform ( IDCT) applied in block 8 x 8. In course of decode tekstur depicted [by] that more intensive operation computing VLD and IDCT. Decoder which is outlined in under show how big biayan operate for the VLD and IDCT for the time of decode.
Compensation algorithm move process decode of other;dissimilar costly. This algorithm rebuild each;every macro block begining from coresponding macro block to VOP rebuilt previously. If this coresponding macro block unegual ( in certain sill) with the macro block which now, a[n estimate of information of error diekstraksi from stream of data and didecode by using algorithm of decode tekstur. In this case macro block which now got as quantifying from macro block ( coresponding) with the macro block rebuilt wrong mendecode prediksi.
To identify the most expected module, have been shown implementation of software of decoder of video MPEG-4. Examination Consecution used have the long foursquare and single coat VOP ( VOP contain the foursquare object length, form without information). examination Decoder have been conducted at Pentium II 266 MHZ, to know the insuffiency of process VLIW. Have been estimated previously that computing time at Pentium II proporsional to computing time of VLIW.
From http://www.informatika.lipi.go.id
PHP (PHP Hypertext Preprocessor)
PHP ( PHP Hypertext Preprocessor) is debate which is the in form of script placed in server and processed in server. Result from php will be sent to client in place wearer of menggunkan browser. PHP often used to make the dynamic web, its meaning can form a[n appearance pursuant to request nowadays. Can be told also PHP is Ianguage of server-side scripting which is one by HTML to make the dynamic web. Server-Side Scripting sintaks and comands given will be run by full diserver but figured in document HTML .
PHP emerge first time in the year 1994 namely moment of Rasmus Lerdorf make a number of skript Perl which can perceive the whosoever which look around its curriculum vitae. The Skripts tidy to hereinafter become the tool is so-called " Personal Home Page." New in the year 1995, moment Rasmus create the PHP / fi 2 which can paste up the structure code ( urut) in tag HTML.
PHP have the character of the free or free wear ( not like ASP representing original product Microsoft) You download php in www.php.net for the version of windows. PHP also can be develop by as module of web server Apache and for binary which can walk for CGI.
Principle work the PHP is when binding PHP asked to be got by web server, its contents immediately sent by this kemesin PHP machine and of mamproses and give its result in the form of code HTML to later web server submitted/sent to client. Thereby a consumer internet cannot see the program code which is written in by PHP so that security from web become more well guaranted.
Because script PHP have to be sent first to machine PHP there are some badge differentiating script PHP by HTML, that is:
1. <? php
Your Php code
? >
2. <?
Your Php code
? >
3. < script language="PHP" ? >
Your Php code
</script>
4. < %
Your Php code
%>
Excess from PHP can deliver the HTTP header doormat can cookies arrange the authetication and redirect user. Others, PHP also can communicate with the database. So that data served can have the character of dynamic. Some database which can communicate with the PHP is dBase, DBM, Mysql, Oracle, and others. PHP also can integrate with a few library eksternal which can make the You can conduct the making of document PDF till memprase XML. PHP also support the communications with the other service through protocol IMAP, SHMP, POP3, or HTTP.
PHP emerge first time in the year 1994 namely moment of Rasmus Lerdorf make a number of skript Perl which can perceive the whosoever which look around its curriculum vitae. The Skripts tidy to hereinafter become the tool is so-called " Personal Home Page." New in the year 1995, moment Rasmus create the PHP / fi 2 which can paste up the structure code ( urut) in tag HTML.
PHP have the character of the free or free wear ( not like ASP representing original product Microsoft) You download php in www.php.net for the version of windows. PHP also can be develop by as module of web server Apache and for binary which can walk for CGI.
Principle work the PHP is when binding PHP asked to be got by web server, its contents immediately sent by this kemesin PHP machine and of mamproses and give its result in the form of code HTML to later web server submitted/sent to client. Thereby a consumer internet cannot see the program code which is written in by PHP so that security from web become more well guaranted.
Because script PHP have to be sent first to machine PHP there are some badge differentiating script PHP by HTML, that is:
1. <? php
Your Php code
? >
2. <?
Your Php code
? >
3. < script language="PHP" ? >
Your Php code
</script>
4. < %
Your Php code
%>
Excess from PHP can deliver the HTTP header doormat can cookies arrange the authetication and redirect user. Others, PHP also can communicate with the database. So that data served can have the character of dynamic. Some database which can communicate with the PHP is dBase, DBM, Mysql, Oracle, and others. PHP also can integrate with a few library eksternal which can make the You can conduct the making of document PDF till memprase XML. PHP also support the communications with the other service through protocol IMAP, SHMP, POP3, or HTTP.
Langganan:
Komentar (Atom)


