Plan Change Gmail With Social Networking Features Supplement

No doubt sosisal networking sites like Facebook and Twitter has become a trend of almost all Internet users. Sharp increase in the member and the money is turned in it is very tempting of the internet business.

Dilasir KabarIT from Cnet, Google plans to make changes to Gmail by adding features that are similar to social networks like Facebook and Twitter. Features such as the exchange of photos, videos and chat will soon be launched in the near future. This plan is supported by some of Google's new employees. This plan is separate from Google Wave which was launched at previously.

Bebeberapa observers mengtakan that Twitter and Facebook users will not be moving to another network like Google's plans are. But if there is one who can unite intrface Twitter and Facebook, this will certainly attract more users. Such as Yahoo that offers something similar in Yahoo Mail, allowing users to see updates to Twitter and services like Flickr from Yahoo Mail home page
Read More.. Selengkapnya...

Read Users' Comments (0)

Dog minder, reminder tool your pet Activities

For pet lovers like dogs and cats, definitely want to consider pet activities. But for those of you who were busy with activities of daily work, you'll often forget the needs of your pets such as roads, food and medicine.

A tool with a Dog seserhana minder designed to record the last activity of your pet. This tool is used for pet owners remember the last activities that have been made. Teradapat 3 buttons with a picture of firefighters hydran indicating the walk, then a showing of Kazakhstan Tobol bone meal and activities that demonstrate the RX berhubunagn with drug activity.

Owners simply press for 3 seconds to record the date and time of the last activity performed. To view kegaiatan owner had done enough to press the button once.

Although simple, this tool is to help pet owners to remember past events pet. This tool is sold at $ 19.95 www.dogeminder.com Read More.. Selengkapnya...

Read Users' Comments (0)

WiLink 7, One Chip For Wireless Device 4

The gadget pengguana quite helpful to the device-paraktis wireless perangakat. But often get into trouble if the need all in one, such as Bluetooth, FM tranciver, GPS and WiFi requires a large size and energy wasteful. It's caused by each wireless using hardware respectively.

KabarIT from Electronista Silansir, with the discovery of all-in-one chip from Texas Instruments (TI) with the name WiLink 7, the four wireless devices are arranged in a single chip. It summarizes the chip Bluetooth, FM tranciver, GPS and WiFi 802.11 n a smaller and more efficient 30% energy.

With this chip will produce a handheld device smaller but all in one. The fourth device is able to walk along with a very small intervention. Before the end of this year, will start WiLink 7 used for public
Read More.. Selengkapnya...

Read Users' Comments (0)

InFocus Proyektor Nirkabel

InFocus is the pioneer of wireless technology from Wisair to the presenter in a computer connected to the display like a projector wirelessly. With this wireless connection can share the presenter view HD-quality display on the big screen.

KabarIT launched from Wisair, previously suskses system has been used for a computer with Windows-based operating system. Now this system can work with MacOS-based computers such as MacBook, MacBook Pro and MacBook Air. Apple had not provided any port VGA or HDMI, which is standard for contact with the projector. For a complete audio video today, Mac users have to connect the adapter cable is a minimum of 3 mini-DisplayPort or a mini-DVI to VGA adapter cable, VGA cable connected to a projector for video and another cable for audio.

This is quite inconvenient for the MacBook user. But by using the InFocus, all cables above requires only one port is a USB port. USB port used to connect the transmitter and receiver are each mounted on the MacBook and displaylink like projectors.

This system will soon duluncurkan to the market at the end of this March 2010. But the retail price is unknown in the market.
Read More.. Selengkapnya...

Read Users' Comments (0)

Flash Drive Enkripsi

For computer users, flash drive merpakan mandatory requirements that must be taken anywhere. It's so portable with a size smaller, flash drives are very susceptible to lost and stolen. Thus data security in a flash drive more vulnerable.

However, a product of the Onix International announced a software flash drive with the name EncryptStick Version 4.1. Flash drives are equipped with 512-bit software encryption polymorphic. According to the manufacturer, encryption is resistant to all known cryptanalytic attacks. This EncryptStick Version 4.1 support for Windows XP operating system, Vista, Windows 7 and also Mac OXS 10.4 upwards.

To flash drive EncryptStick Version 4.1 with 4GB capacity and software at a price of $ 119.99. Meanwhile, for those of you who just want the software only for the needs of other flash drive cost $ 39.99
Read More.. Selengkapnya...

Read Users' Comments (0)

Mainboard


Prior to the advent of the microprocessor, a computer was usually built in a card-cage case or mainframe with components connected by a backplane consisting of a set of slots themselves connected with wires; in very old designs the wires were discrete connections between card connector pins, but printed circuit boards soon became the standard practice. The Central Processing Unit, memory and peripherals were housed on individual printed circuit boards which plugged into the backplane.


During the late 1980s and 1990s, it became economical to move an increasing number of peripheral functions onto the motherboard (see below). In the late 1980s, motherboards began to include single ICs (called Super I/O chips) capable of supporting a set of low-speed peripherals: keyboard, mouse, floppy disk drive, serial ports, and parallel ports. As of the late 1990s, many personal computer motherboards supported a full range of audio, video, storage, and networking functions without the need for any expansion cards at all; higher-end systems for 3D gaming and computer graphics typically retained only the graphics card as a separate component.

The early pioneers of motherboard manufacturing were Micronics, Mylex, AMI, DTK, Hauppauge, Orchid Technology, Elitegroup, DFI, and a number of Taiwan-based manufacturers.

Popular personal computers such as the Apple II and IBM PC had published schematic diagrams and other documentation which permitted rapid reverse-engineering and third-party replacement motherboards. Usually intended for building new computers compatible with the exemplars, many motherboards offered additional performance or other features and were used to upgrade the manufacturer's original equipment.

The term mainboard is archaically applied to devices with a single board and no additional expansions or capability. In modern terms this would include embedded systems and controlling boards in televisions, washing machines, etc. A motherboard specifically refers to a printed circuit with the capability to add/extend its performance.
[edit] Overview
An Acer E360 motherboard made by Foxconn, from 2005, with a large number of integrated peripherals. This board's nForce3 chipset lacks a traditional northbridge.

Most computer motherboards produced today are designed for IBM-compatible computers, which currently account for around 90% of global PC sales[citation needed]. A motherboard, like a backplane, provides the electrical connections by which the other components of the system communicate, but unlike a backplane, it also hosts the central processing unit, other subsystems, and devices.

Motherboards are also used in many other electronics devices such as mobile phones, stop-watches, clocks, and other small electronic devices.

A typical desktop computer has its microprocessor, main memory, and other essential components on the motherboard. Other components such as external storage, controllers for video display and sound, and peripheral devices may be attached to the motherboard as plug-in cards or via cables, although in modern computers it is increasingly common to integrate some of these peripherals into the motherboard itself.

An important component of a motherboard is the microprocessor's supporting chipset, which provides the supporting interfaces between the CPU and the various buses and external components. This chipset determines, to an extent, the features and capabilities of the motherboard.And it typically introduced.

Modern motherboards include, at a minimum:

* sockets (or slots) in which one or more microprocessors are installed[3]
* slots into which the system's main memory is installed (typically in the form of DIMM modules containing DRAM chips)
* a chipset which forms an interface between the CPU's front-side bus, main memory, and peripheral buses
* non-volatile memory chips (usually Flash ROM in modern motherboards) containing the system's firmware or BIOS
* a clock generator which produces the system clock signal to synchronize the various components
* slots for expansion cards (these interface to the system via the buses supported by the chipset)
* power connectors, which receive electrical power from the computer power supply and distribute it to the CPU, chipset, main memory, and expansion cards.[4]

The Octek Jaguar V motherboard from 1993.[5] This board has 6 ISA slots but few onboard peripherals, as evidenced by the lack of external connectors.

Additionally, nearly all motherboards include logic and connectors to support commonly-used input devices, such as PS/2 connectors for a mouse and keyboard. Early personal computers such as the Apple II or IBM PC included only this minimal peripheral support on the motherboard. Occasionally video interface hardware was also integrated into the motherboard; for example, on the Apple II and rarely on IBM-compatible computers such as the IBM PC Jr. Additional peripherals such as disk controllers and serial ports were provided as expansion cards.

Given the high thermal design power of high-speed computer CPUs and components, modern motherboards nearly always include heat sinks and mounting points for fans to dissipate excess heat.
[edit] CPU sockets
Main article: CPU socket

A CPU socket or slot is an electrical component that attaches to a printed circuit board (PCB) and is designed to house a CPU (also called a microprocessor). It is a special type of integrated circuit socket designed for very high pin counts. A CPU socket provides many functions, including a physical structure to support the CPU, support for a heat sink, facilitating replacement (as well as reducing cost), and most importantly, forming an electrical interface both with the CPU and the PCB. CPU sockets can most often be found in most desktop and server computers (laptops typically use surface mount CPUs), particularly those based on the Intel x86 architecture on the motherboard. A CPU socket type and motherboard chipset must support the CPU series and speed. Generally, with a newer AMD microprocessor, you need only select a motherboard that supports the CPU and not be concerned with the chipset.
[edit] Integrated peripherals
Block diagram of a modern motherboard, which supports many on-board peripheral functions as well as several expansion slots.

With the steadily declining costs and size of integrated circuits, it is now possible to include support for many peripherals on the motherboard. By combining many functions on one PCB, the physical size and total cost of the system may be reduced; highly-integrated motherboards are thus especially popular in small form factor and budget computers.

For example, the ECS RS485M-M,[6] a typical modern budget motherboard for computers based on AMD processors, has on-board support for a very large range of peripherals:

* disk controllers for a floppy disk drive, up to 2 PATA drives, and up to 6 SATA drives (including RAID 0/1 support)
* integrated ATI Radeon graphics controller supporting 2D and 3D graphics, with VGA and TV output
* integrated sound card supporting 8-channel (7.1) audio and S/PDIF output
* Fast Ethernet network controller for 10/100 Mbit networking
* USB 2.0 controller supporting up to 12 USB ports
* IrDA controller for infrared data communication (e.g. with an IrDA-enabled cellular phone or printer)
* temperature, voltage, and fan-speed sensors that allow software to monitor the health of computer components

Expansion cards to support all of these functions would have cost hundreds of dollars even a decade ago; however, as of April 2007[update] such highly-integrated motherboards are available for as little as $30 in the USA.
[edit] Peripheral card slots

A typical motherboard of 2009 will have a different number of connections depending on its standard.

A standard ATX motherboard will typically have 1x PCI-E 16x connection for a graphics card, 2x PCI slots for various expansion cards, and 1x PCI-E 1x (which will eventually supersede PCI). A standard EATX motherboard will have 1x PCI-E 16x connection for a graphics card, and a varying number of PCI and PCI-E 1x slots. It can sometimes also have a PCI-E 4x slot. (This varies between brands and models.)

Some motherboards have 2x PCI-E 16x slots, to allow more than 2 monitors without special hardware, or use a special graphics technology called SLI (for Nvidia) and Crossfire (for ATI). These allow 2 graphics cards to be linked together, to allow better performance in intensive graphical computing tasks, such as gaming and video editing.

As of 2007, virtually all motherboards come with at least 4x USB ports on the rear, with at least 2 connections on the board internally for wiring additional front ports that are built into the computer's case. Ethernet is also included now. This is a standard networking cable for connecting the computer to a network or a modem. A sound chip is always included on the motherboard, to allow sound output without the need for any extra components. This allows computers to be far more multimedia-based than before. Cheaper machines now often have their graphics chip built into the motherboard rather than a separate card.
[edit] Temperature and reliability

Motherboards are generally air cooled with heat sinks often mounted on larger chips, such as the Northbridge, in modern motherboards. If the motherboard is not cooled properly, it can cause the computer to crash. Passive cooling, or a single fan mounted on the power supply, was sufficient for many desktop computer CPUs until the late 1990s; since then, most have required CPU fans mounted on their heat sinks, due to rising clock speeds and power consumption. Most motherboards have connectors for additional case fans as well. Newer motherboards have integrated temperature sensors to detect motherboard and CPU temperatures, and controllable fan connectors which the BIOS or operating system can use to regulate fan speed. Some higher-powered computers (which typically have high-performance microprocessors, large amounts of RAM, and high-performance video cards) use a water-cooling system instead of many fans.

Some small form factor computers and home theater PCs designed for quiet and energy-efficient operation boast fan-less designs. This typically requires the use of a low-power CPU, as well as careful layout of the motherboard and other components to allow for heat sink placement.

A 2003 study[7] found that some spurious computer crashes and general reliability issues, ranging from screen image distortions to I/O read/write errors, can be attributed not to software or peripheral hardware but to aging capacitors on PC motherboards. Ultimately this was shown to be the result of a faulty electrolyte formulation.[8]

For more information on premature capacitor failure on PC motherboards, see capacitor plague.

Motherboards use electrolytic capacitors to filter the DC power distributed around the board. These capacitors age at a temperature-dependent rate, as their water based electrolytes slowly evaporate. This can lead to loss of capacitance and subsequent motherboard malfunctions due to voltage instabilities. While most capacitors are rated for 2000 hours of operation at 105 °C,[9] their expected design life roughly doubles for every 10 °C below this. At 45 °C a lifetime of 15 years can be expected. This appears reasonable for a computer motherboard. However, many manufacturers have delivered substandard capacitors,[citation needed] which significantly reduce life expectancy. Inadequate case cooling and elevated temperatures easily exacerbate this problem. It is possible, but tedious and time-consuming, to find and replace failed capacitors on PC motherboards.
[edit] Form factor
Main article: Comparison of computer form factors
microATX form factor motherboard

Motherboards are produced in a variety of sizes and shapes called computer form factor, some of which are specific to individual computer manufacturers. However, the motherboards used in IBM-compatible commodity computers have been standardized to fit various case sizes. As of 2007[update], most desktop computer motherboards use one of these standard form factors—even those found in Macintosh and Sun computers, which have not traditionally been built from commodity components. The current desktop PC form factor of choice is ATX. A case's, motherboard's and PSU's form factor must all match, though some smaller form factor motherboards of the same family will fit larger cases. For example, an ATX case will usually accommodate a microATX motherboard.

Laptop computers generally use highly integrated, miniaturized and customized motherboards. This is one of the reasons that laptop computers are difficult to upgrade and expensive to repair. Often the failure of one laptop component requires the replacement of the entire motherboard, which is usually more expensive than a desktop motherboard due to the large number of integrated components.
[edit] Bootstrapping using the BIOS
Main article: booting

Motherboards contain some non-volatile memory to initialize the system and load an operating system from some external peripheral device. Microcomputers such as the Apple II and IBM PC used ROM chips, mounted in sockets on the motherboard. At power-up, the central processor would load its program counter with the address of the boot ROM and start executing ROM instructions, displaying system information on the screen and running memory checks, which would in turn start loading memory from an external or peripheral device (disk drive). If none is available, then the computer can perform tasks from other memory stores or display an error message, depending on the model and design of the computer and version of the BIOS.

Most modern motherboard designs use a BIOS, stored in an EEPROM chip soldered to the motherboard, to bootstrap the motherboard. (Socketed BIOS chips are widely used, also.) By booting the motherboard, the memory, circuitry, and peripherals are tested and configured. This process is known as a computer Power-On Self Test (POST) and may include testing some of the following devices:

* floppy drive
* network controller
* CD-ROM drive
* DVD-ROM drive
* SCSI hard drive
* IDE, EIDE, or SATA hard disk
* External USB memory storage device

Any of the above devices can be stored with machine code instructions to load an operating system or program.
Read More.. Selengkapnya...

Read Users' Comments (0)

Introduction

NVIDIA launched the midrange Geforce 9600 GT earlier this year, but with heavy competition from AMD showing up early summer manufacturers have to get creative to be able to sell the 9600 GT GPU, as its performance level was reduced to entry level as the 9800 GT and 9800 GTX+ now take the midrange spot.

MSI took the NVIDIA 9600 GT reference design and shook it up quite a bit, they added a 2 slot cooling which can work without active cooling at low load levels, they upped the total onboard memory to 1Gb and gave it a fancy name:

Madshrimps (c)


Specifications

We have tested quite a bit of different 9600 GT cards here at Madshrimps since they originally launched, stock clocked, speedier GPU, better memory, fancy cooling, we had the lot. A quick recap of the original 9600 GT specs:

Madshrimps (c)


The MSI 9600 GT Hybrid Freezer comes factory overclocked:

# GPU: 700Mhz
# Shader: 1700Mhz

Memory type remains GDDR3 but size is doubled to 1Gb. The GPU clocks are not the highest we’ve seen, but they are quite respectable. Let’s have a closer look at the N9600GT Read More.. Selengkapnya...

Read Users' Comments (0)

Sapphire 4830 vs PixelView 9800GT


Price VGA from year to year is always down, but game developers continue to provide a heavy burden of gaming applications. Inevitably, the two different sides are always chasing each other. VGA continue to develop the technology to pursue the ability to display computer images. Game developers continue to improve the image quality of their gaming software.

Buy a VGA to the needs of games, perhaps a difficult decision for Pengemar current PC gamers. Buying too expensive VGA feared even bought too high, too low a budget can be made disappointed. Selecting VGA is not easy, if you want to buy a VGA-speed and high performance able to meet the estimated needs for the next game. . Or just cover the needs of games currently available, and choosing the best VGA budget. Things like this is always a consideration to buy the VGA mainstream classes, not too expensive but felt enough for gaming applications. We have 2 VGA pretty well with the Radeon HD 4830 and GeForce 9800GT

VGA Actually what is needed for gaming at the moment, given the many types of VGA and even sometimes have very high ability. VGA capabilities of the technology is not out of gaming software technology and wide screen. This time we choose from 2 types of VGA SAPPHIRE Radeon HD 4830 512MB and GeForce 9800 GT PIXELVIEW 1GB. Both are in class only $ 150 - $ 200. Not too expensive but still has an excellent performance today with a common resolution of 1280x1024.

Selected second reason this VGA:

The first is a low budget. Menguprade new VGA 9800GT and HD 4830 is easier than using a higher VGA. Both VGA is still quite adequate when used on 17-inch monitor.

In Indonesia alone there are still many gamers who use the monitor on the size. Unless you want to monitor menguprade above 17-inch size, it's good to see VGA on the above classes we mentioned earlier. Single user VGA 9800GT and HD 4830 can still be filled power supply with 450W power alone.

Second, the need to this year's game was still able to covered by the second VGA. Not too well at all, but some games can be displayed by the two VGA with full detail or high detail. 9800GT and HD 4830 can cover the needs of the game with an adequate frame at a resolution of 1280x1024. Or equivalent to 17-inch monitor usage

If you need a VGA to sizes above 17 inches, most likely not be able to meet 9800GT and HD 4830. We only recommend the use of type VGA 9800GT and HD 4830 to 17-inch monitor.
Read More.. Selengkapnya...

Read Users' Comments (0)

VGA

VGA, stands for Video Graphics Adapter, is an analog computer display standard that was first marketed by IBM in 1987. Although the VGA standard is no longer used because it has been replaced by a newer standard, VGA is still implemented on the Pocket PC. VGA is the latest graphics standards followed by the majority of graphics card manufacturer of your computer. Display Windows until now still use VGA mode as supported by many manufacturers of monitors and graphics cards.

The term VGA is often used to refer to a screen resolution of 640 × 480 size, whatever the hardware maker graphics card. VGA card allows you to translate the computer output to the monitor. For the graphic design or playing video games, needed a powerful graphics card is high. Manufacturer of the famous graphics cards include ATI and nVidia.

In addition, the VGA can also refer to the connector 15-pin VGA which is still widely used to deliver analog video signals to the monitor. VGA standard was officially replaced by IBM's XGA standard, but in fact it was replaced by VGA Super VGA.
Read More.. Selengkapnya...

Read Users' Comments (0)

Computer science

Computer science or computing science (sometimes abbreviated CS) is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems.[1][2][3] It is frequently described as the systematic study of algorithmic processes that create, describe and transform information. According to Peter J. Denning, the fundamental question underlying computer science is, "What can be (efficiently) automated?"[4] Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity

theory, study the properties of computational problems. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describing computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to people.

The general public sometimes confuses computer science with vocational areas that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement software such as games and web-browsers, and using that understanding to create new programs or improve existing ones.
Read More.. Selengkapnya...

Read Users' Comments (0)

Want to Like Taufik Hidayat


JAKARTA - very lively movement in the field. Smesnya lethal, as well as his drop shot sharp. Net game was all he could do well. That picture of Joseph Handoko game, champion Milo School Competition (MSC) in 2010 primary school category. For Handoko, badminton itself has become a way of life.

According to Handoko, there was no other thing he wants right now than foster hope for a world-class players. "I have been playing badminton since kindergarten. Since then I liked it and wanted to be a world-class athletes, "said the player who had trained in the Club of May, this Pondok Bambu.
For the sake of realizing these hopes, Handoko willing to sweat sweat every day and training. "At least I exercise three times a day, since before leaving school, after school, until late at night," said the students of SDN 04 Klender this.

For Handoko, MSC 2010 championship is the biggest achievement he had ever raihnya. "Obviously I am very happy. I hope I am able to perform better in the grand final round later, "said pebulu countered this 11-year-old.

Having a child with enormous determination, Handoko parents did not hesitate to fully support the ideals of his son. "But I give a time limit until the third grade junior high school. If at that time seen no progress, then I'll concentrate on him to the point of education, "said Father Handoko, which directly Sariyanto affordable by Handoko.

Like most other children, also has a character Handoko idol. Handoko own role model was none other than Taufik Hidayat, Olympic champion in Athens 2004. "He's a great player, I want to be like," said Handoko.

So enthralled Handoko the figure Taufik, And he hopes to be able to just shake hands and took a picture together with her idol. "Unfortunately until now I have not had that opportunity," said Handoko which is the second child of three brothers.
Read More.. Selengkapnya...

Read Users' Comments (0)

Spanish media 'Adu Lamb' Duo Ferrari


For the indigenous peoples of the New Land Kelurahan, Kecamatan Beji, Depok, certainly no stranger when he heard the name of the Bolong Gong. Gong became a legend, because it is not like a gong in general. Gong si Bolong is characterized by a hole with a diameter of 10 cm in the middle.

Bolongnya gong, do not mean not having a decent sound. According to the speech, the gong was actually having a loud voice. The strangeness of this gong surefire cause a magical feel for the residents of Depok in the past, which eventually developed into a local arts mat.


The Bolong Gong is the original art Depok residents. Since found in the vicinity by its inventor Ciganjur around the time still in the area of Depok.

The privileging of the Bolong Gong from other areas of art, namely acculturation with Sunda Betawi arts. That is nuanced Sundanese music, while singing with Betawi. In the past, limited Cibinong Sundanese culture. While Cilandak, Cireunde, Pondok Labu, Depok, and Bekasi, are still influenced by ethnic Betawi.

Gong instrument consists of the Bolong Gong, Drum, Bende, Rebab, trumpet, Keromong, and Saron. Players conducted by 12 members. Not only the music, the arts are often combined to accompany shadow puppet performances and dance there in the mid Nayub music. Shadowgraph combining innovation begins approximately in 1965 in accordance with public demand.

The leader of the Bolong Gong Studios, Discard Jayadi, said up to now the physical form of the Bolong Gong is still well. Members of the Bolong Gong studio, said Discard, there were only 15 players.

"When the morning we usually use the horn, but if it was night we used to use fiddle, according to public demand, our members there are only 15 people," he told Legal when found at his home in RT 001 / 07 Kelurahan Tanah Baru, Beji, Depok, some time ago.

Regional distribution of the Bolong Gong music in between Depok, Pondok Jengkol, Kunciran, Pondok Kacang, Pondok Aren, Pamulang Pamulang West and East. Gong plays the usual Bolong to enliven the party circumcision, marriage, or the application.
Read More.. Selengkapnya...

Read Users' Comments (0)

Gong si Bolong, Art Warga Depok Legend


For the indigenous peoples of the New Land Kelurahan, Kecamatan Beji, Depok, certainly no stranger when he heard the name of the Bolong Gong. Gong became a legend, because it is not like a gong in general. Gong si Bolong is characterized by a hole with a diameter of 10 cm in the middle.

Bolongnya gong, do not mean not having a decent sound. According to the speech, the gong was actually having a loud voice. The strangeness of this gong surefire cause a magical feel for the residents of Depok in the past, which eventually developed into a local arts mat.

The Bolong Gong is the original art Depok residents. Since found in the vicinity by its inventor Ciganjur around the time still in the area of Depok.

The privileging of the Bolong Gong from other areas of art, namely acculturation with Sunda Betawi arts. That is nuanced Sundanese music, while singing with Betawi. In the past, limited Cibinong Sundanese culture. While Cilandak, Cireunde, Pondok Labu, Depok, and Bekasi, are still influenced by ethnic Betawi.

Gong instrument consists of the Bolong Gong, Drum, Bende, Rebab, trumpet, Keromong, and Saron. Players conducted by 12 members. Not only the music, the arts are often combined to accompany shadow puppet performances and dance there in the mid Nayub music. Shadowgraph combining innovation begins approximately in 1965 in accordance with public demand.

The leader of the Bolong Gong Studios, Discard Jayadi, said up to now the physical form of the Bolong Gong is still well. Members of the Bolong Gong studio, said Discard, there were only 15 players.

"When the morning we usually use the horn, but if it was night we used to use fiddle, according to public demand, our members there are only 15 people," he told Legal when found at his home in RT 001 / 07 Kelurahan Tanah Baru, Beji, Depok, some time ago.

Regional distribution of the Bolong Gong music in between Depok, Pondok Jengkol, Kunciran, Pondok Kacang, Pondok Aren, Pamulang Pamulang West and East. Gong plays the usual Bolong to enliven the party circumcision, marriage, or the application.
Read More.. Selengkapnya...

Read Users' Comments (0)

Peaches Geldof Hair Color Trauma


HAIR is the crown of a woman who must always be maintained. Therefore, one of the hair coloring, of course can be a disaster. As experienced by the daughter of a senior musician Bob Geldof, peaches Geldof. She was traumatized after coloring hair.

As quoted from Femalefirst, Sunday (14/2/2010), Ultimo lingerie model was so traumatized after a stylish hair one hair coloring.

Automatic, it was pretty bad marks in the minds of the British model. "I was really upset and traumatized by this incident".

"Very funny, my hair highlighted with one that was orange," he continued.

Not comfortable with his new hair color, this beautiful socialite visited immediately stylish hair and make up artist Michael professionals who have handled so far. Read More.. Selengkapnya...

Read Users' Comments (0)

Degree Creambath Bulk, MURI Makarizo Break Records


PRODUCT Makarizo hair care has deployed mass creambath event titled "Rame-Rame Creambath Yuuuuks .. Spread Out Your Energy of Love". This event has won awards from World Record Museum of Indonesia (MURI).

Hair is the most important crown to be maintained. Healthy hair has certainly become the pride of its owner.

Coincide on the day of love, beauty care product series, organizes Makarizo "Rame-Rame Creambath yuks .. Spread Out Your Energy of Love," which aims to spread the energy of love to the young. In addition, the team Creambath Energy Hair-Rame Rame yuks invites teens to have a beautiful and healthy hair and spread the energy of love for the soul, body, and mind.

The event took place at the top today, by taking thousands of pairs of teenage girls from different schools to follow fun walk along the 1.4 kilometers from the South Plaza Bung Karno Stadium to the pool area Bung Karno Stadium. Followed by mass creambath event.

This mass Creambath using three variants of the latest Anti Aging Hair Energy Makarizo Creambath of the Kiwi, Royal Jelly, and Aloe Vera as an initial action and shared care with a friend on the health of body and hair in order to get a full healthy hair. Because beautiful hair begins with healthy hair.

Not only the mass creambath course, but they are also involved showed a high social life. Evidenced by gathering donations of clothing for their friends who are less fortunate.

"Not only creambath attending mass, but the girls also participate by providing reasonable wear old clothes collected in Hair Energy giant sachets to be given to Social Services for distribution to the spread of street children in Jakarta," said Group General Manager Shierly Nangoy when the meet at Hotel Atlet, Jakarta, Sunday (14/2/2010).

In addition, the school that also serves as the party that determines the quality of the young generation is also involved in this event. Dozens of school principals present to receive plaques "Energy AntiNarkoba submitted by the National Narcotics Agency (BNN) as a manifestation of the school's commitment in maintaining the young generation the hook Drugs.

The event was successful mass creambath broke the record of MURI with creambath Most participants, in which as many as 1740 teenagers berpartisispasi. Not only scored a national record but also set a world record, it is delivered directly by Jaya Suprana.

"This is an event that had never happened. Because you have here is a world record breaking. So far, there has been no creambath most. The record was created by Makarizo," said Jaya Suprana.

Mass creambath Guide is also guided by Nikita Willy beautiful star who claims her hair is more beautiful now than ever. Thanks to a series of Energy Hair products, hair soap star "Nikita" it looks more smooth and radiant.

"Before the ad star treatment makarizo wear, my hair initially cracked and dry, but now broken-breaking is lost and healthier," said 15-year-old virgin is.

Nikita election as the latest commercials leading hair care products is not unreasonable. According to General Manager Marketing Joewone Setio Makarizo Agus, was based on various aspects.
Read More.. Selengkapnya...

Read Users' Comments (0)

Enlightened face with White Facial


HAVE A white face is the desire of each person. CBC Beauty Center has a way to brighten skin the easy way.

CBC Beauty Center offers a White Facial by Electroporation can make a brighter skin in just 65 minutes. Mieke Widyastuty, PR CBC Beauty Center, says that facials are included in the circuit CBC Whitening Plus Series which is the main service for the CBC in 2010. As for stages, such as White Facial facial done in general.

"Facial is a popular skin care, but many still have the wrong perception of facial, as fears of a red skin or inflammation occurs in active acne and acne arises only. In fact, if done correctly and by an experienced therapist, those things will not happen, "said Mieke.

White Facial begins with a double cleaning stages to remove dirt and dead skin cells, then performed the evaporation and extraction of blackheads and vacuum manual. Further high frequency will reduce the inflammation due to extraction. While serum and mask will restore the optimum conditions and refreshes the skin.
Read More.. Selengkapnya...

Read Users' Comments (0)

Rob Pattinson Very Hates Vaginas


ACTOR Rob Pattinson has done a photocall to adorn the front page magazine Details. However, he claimed to hate the vagina. Lho kok bisa?

To participate celebrated Details magazine that his 10 years, Rob decorate the front cover with a very sexy pose. Immortalized by the photographer renowned Norman Jean Roy, here are some excerpts of an interview Rob is quoted from Hollyscoop,

When asked about Rob sexy pose for Details magazine.


"I really hate the vagina. I'm allergic to the vagina. But I can not say I did not have a purpose, because it was only during the 12-hour shooting session. So you can have a photograph showing the women who posed naked after this, like five or six hours . Thank you, God, I'm counting on you, "he explained.

About his dream job became a political scribe.

"You can affect a person for two or three minutes. Make them listen to you .. I enjoyed the press discussing the Twilight movie, because there are similarities. But there's something better I say. I feel obliged to appear charming," she admitted.
Read More.. Selengkapnya...

Read Users' Comments (0)

Jean Paul Gaultier For Target


After allowing the consumer curiosity for seven months, Jean Paul Gaultier finally revealed his first collection for Target.

Collections are rumored to be released on March 7 in 250 outlets. Target in the U.S. also online through Target.com.

Gaultier cooperation with Target is part of the Designer Series Collection Target has developed in recent years, other designers are also working with high street retailers including American Anna Sui and Alexander McQueen, who recently died of suicide.

Gaultier revealed, for Target collection is divided into several themes, the Rock 'n' roll chic, Hollywood glamor, and Punk. In its official statement, said Gaultier's collection of new retail will be an alternative for women with a variety of styles.

Furthermore, Gaultier said that the collection is a form of appreciation of American women are free, independent, but not lose her feminine side. "In short, this is an appreciation of pop culture so popular in America," said Gaultier. Read More.. Selengkapnya...

Read Users' Comments (0)

Blog

Bagaimana sih cara mendapatkan Traffic Adsense?

Ada satu kecenderungan dari situs2 adsense, yang paling susah untuk dikembangkan adalah meningkatkan lebih banyak Traffic ke situs kita.

8 point penting yang sedang aku usahakan:

1. Search Engine Optimization
Penggunaan SEO yang tepat pada situs saya dengan penempatan title, H1, H2, B, I, Url Rewriting Mode, dll yang berhubungan.

2. Link Exchanges
Penukaran partner link dengan situs2 yang bersangkutan.

3. Memaksimalkan Penggunaan Content yang berkualitas (original maupun ada beberapa situs yang di caplok free articlenya)
Kadang-kadang ini merupakan langkah awal untuk membangun suatu reliabilitas dari keberadaan situs kita di publik.

4. Selalu memberikan informasi2 terbaru yang berguna (tips, News, daily journal)
Yang sudah dilakukan adalah mengusahakan untuk update secara rutin setiap hari. Ini mungkin agak susah, butuh suatu komitmen dan persisten.

5. More quality pages mean more CTR
Semakin banyak halaman yang berkualitas, semakin tinggi kemungkinan adsense klik.

6. Me management kan inbound links (link ke halaman sendiri) dan outbound links(link ke URL lain) yang seimbang dan harmonis
Ini yang kadang2 menjadi pro dan kontra untuk outbound links seperti yang di tuju ke problogger.net akhir2 ini.
Dan juga menurut saya, inbound links akan memudahkan Search Engine untuk melakukan spidering ke halaman2 index mereka dengan lancar.

7. Membuat review/feedback ke situs2 lain dengan mengisi comment, email, forum, etc
Tentunya tidak lupa dengan signatures dari situs kita.

8. Article Marketing
Mempublikasikan artikel2 yang anda tulis sendiri ke situs2 publikasi online.
Ini yang saya lakukan kadang2 kalau lagi ada niat untuk menulis. Tentunya tidak lupa untuk menuliskan Author Resources Box dan memperhatikan tata cara penulisan dan yang paling penting adalah grammar (untuk english lang.).
Artikel Anda akan fully reprintable and duplicated in other sites dan ini merupakan salah satu tehnik promosi situs Anda yang bagus.

Jika artikel kamu berkualitas dan menarik untuk dibaca. Jangan2 bisa masuk ke halaman utamanya About.com.

Tetapi karena sampai sekarang belum kelihatan hasilnya, bisa dibantu gak yah...

apa sih yang kurang? Read More.. Selengkapnya...

Read Users' Comments (0)

Gaya Hidup


nformasi di halaman ini mencakup: "Trend" pola makan, baik domestik maupun mancanegara pada kelompok masyarakat tertentu, beberapa masalah gizi yang timbul sebagai akibat dari gaya hidup, informasi tentang beberapa penyakit degeneratif sebagai akibat dari salah gizi. Beberapa keterbatasan teknis maupun non-teknis banyak kami dijumpai selama proses Penyusunan dokumen, sehingga informasi yang tersaji mungkin belum lengkap. Namun demikian, Redaksi tetap berusaha untuk memenuhi harapan anda. Read More.. Selengkapnya...

Read Users' Comments (0)

23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
Read More.. Selengkapnya...

Read Users' Comments (0)

This is well written explanation about bandwidth, very useful info.

BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.
Read More.. Selengkapnya...

Read Users' Comments (0)

All mIRC Commands

/ Recalls the previous command entered in the current window.
/! Recalls the last command typed in any window.
/action {action text} Sends the specifed action to the active channel or query window.
/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.
/ame {action text} Sends the specifed action to all channels which you are currently on.

/amsg {text} Sends the specifed message to all channels which you are currently on.
/auser {level} {nick|address} Adds a user with the specified access level to the remote users
list.
/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off
totally.
/away {away message} Sets you away leave a message explaining that you are not currently paying
attention to IRC.
/away Sets you being back.
/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.
/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channel
Pops up the channel central window (only works in a channel).
/clear Clears the entire scrollback buffer of the current window.
/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on
nickname.
/closemsg {nickname} Closes the query window you have open to the specified nick.
/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.
/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.
/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.
/describe {#channel} {action text} Sends the specifed action to the specified channel window.
/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other
applications.
/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given
service name.
/disable {#groupname} De-activates a group of commands or events.
/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.
/dlevel {level} Changes the default user level in the remote section.
/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.
/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place
in color N.
/enable {#groupname} Activates a group of commands or events.
/events [on|off] Shows the remote events status or sets it to listening or not.
/exit Forces mIRC to closedown and exit.
/finger Does a finger on a users address.
/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.
/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.
/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.
/guser {level} {nick} [type] Adds the user to the user list with the specified level and
address type.
/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.
/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off
totally.
/invite {nickname} {#channel} Invites another user to a channel.
/join {#channel} Makes you join the specified channel.
/kick {#channel} {nickname} Kicks nickname off a given channel.
/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for
parameters.
/log [on|off] Shows the logging status or sets it on or off for the current window.
/me {action text} Sends the specifed action to the active channel or query window.
/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.
/msg {nickname} {message} Send a private message to this user without opening a query window.
/names {#channel} Shows the nicks of all people on the given channel.
/nick {new nickname} Changes your nickname to whatever you like.
/notice {nick} {message} Send the specified notice message to the nick.
/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.
/onotice [#channel] {message} Send the specified notice message to all channel ops.
/omsg [#channel] {message} Send the specified message to all ops on a channel.
/part {#channel} Makes you leave the specified channel.
/partall Makes you leave all channels you are on.
/ping {server address} Pings the given server. NOT a nickname.
/play [-c] {filename} [delay] Allows you to send text files to a window.
/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.
/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off
totally.
/query {nickname} {message} Open a query window to this user and send them the private message.
/quit [reason] Disconnect you from IRC with the optional byebye message.
/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!
/remote [on|off] Shows the remote commands status or sets it to listening or not.
/rlevel {access level} Removes all users from the remote users list with the specified access
level.
/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.
/ruser {nick[!]|address} [type] Removes the user from the remote users list.
/save {filename.ini} Saves remote sections into a specified INI file.
/say {text} Says whatever you want to the active window.
/server [server address [port] [password]] Reconnects to the previous server or a newly
specified one.
/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.
/speak {text} Uses the external text to speech program Monologue to speak up the text.
/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.
/time Tells you the time on the server you use.
/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.
/topic {#channel} {newtopic} Changes the topic for the specified channel.
/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.
/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.
/uwho [nick] Pops up the user central with information about the specified user.
/who {#channel} Shows the nicks of all people on the given channel.
/who {*address.string*} Shows all people on IRC with a matching address.
/whois {nickname} Shows information about someone in the status window.
/whowas {nickname} Shows information about someone who -just- left IRC.
/wavplay {c:\path\sound.wav} Locally plays the specified wave file.
/write [-cidl] {filename} [text] To write the specified text to a .txt file.

MoViEBoT #xdcc-help /server irc.atomic-irc.net

We strive to make IRC easier for you!
Read More.. Selengkapnya...

Read Users' Comments (0)

Best Keyboard Shortcuts

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:


Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW
Read More.. Selengkapnya...

Read Users' Comments (0)

Create One-Click Shutdown and Reboot Shortcuts:

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "Bye Bye m8!"
shutdown -r -t 03 -c "Ill be back m8 ;)!"

Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC.
Read More.. Selengkapnya...

Read Users' Comments (0)

Delete Files From The REcent File List In Windows

This tip requires a change to the Windows Registry. Please see the MSFN Guide "Backup Your Registry" if you are new to the Windows Registry.

Windows Media Player (WMP) is a built-in application that allows you to play multimedia files. Like many other applications, WMP remembers the most recently played files and displays them in the Recent File List under the File menu. This feature is useful if you regularly play certain files, but you may want to clear the list if you share the computer and a user account or create archives and CDs.

There are two ways you can clear the list:

I. The ClearMRU.exe Utility is available for free in the Windows Media Player Bonus Pack from Microsoft, but Microsoft does not support this tool.

II. You can also manually delete the list through the Windows Registry:

1. Start the Windows Registry Editor, regedit.exe, by typing regedit in the Windows Run Command Line.

2. Go to HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentFileList.

3. Delete the RecentFileList subkey.

4. If you've also streamed content from the Internet, you can delete the RecentURLList subkey.

5. Exit the Registry Editor.

6. Restart the computer.

To keep certain files in the list, don't delete the entire key. Deleting individual entries within the key will get rid of the files that you no longer want in the Recent File List.

Read More.. Selengkapnya...

Read Users' Comments (0)

Firefox Speed Tweaks

Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300


One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!
Read More.. Selengkapnya...

Read Users' Comments (0)

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives
Read More.. Selengkapnya...

Read Users' Comments (0)

komputer

Alat bantu bagi manusia untuk menyelesaikan pekerjaannya. Perangkat elektronik yang dapat dipakai untuk mengolah data dengan perantaraan sekumpulan program dan mampu memberikan informasi dari hasil pengolahan tersebut. Dalam bahasa indonesia sering ditulis dengan komputer.

Istilah Computer berasal dari kata Compute, yang berarti menghitung. Artinya, setiap proses yang dilaksanakan oleh komputer merupakan proses matematika hitungan. Jadi apapun yang dilakukan oleh komputer, baik penampakan pada layar monitor, suara, gambar, dll. diolah sedemikian rupa dari perhitungan secara elektronik.

Komputer adalah hasil dari kemajuan teknologi elektronika dan informatika yang berfungsi sebagai alat bantu untuk menulis, menggambar, menyunting gambar atau foto, membuat animasi, mengoperasikan program analisis ilmiah, simulasi dan untuk kontrol peralatan.

Bentuk komputer yang dulu cukup besar untuk mengoperasikan sebuah program, sekarang berbentuk kecil dengan kemampuan mengoperasikan program yang beragam. Perlengkapan elektronik (hardware) dan program (perangkat lunak/software) telah menjadikan sebuah komputer menjadi benda yang berguna.

Sebuah komputer yang hanya memiliki perlengkapan elektronik saja atau software saja tidak akan berfungsi. Dengan ada keduanya maka komputer dapat berfungsi menjadi alat yang berguna.

Sistem komputer juga dapat dikembangkan untuk mengontrol peralatan mesin produksi ataupun peralatan rumah tangga. Dengan menambah rangkaian elektronik buatannya, maka komputer biasa bisa dipergunakan untuk mengendalikan peralatan-peralatan industri dan rumah tangga. Adanya kecenderungan pemanfaatan komputer untuk kontrol seperti ini dengan dukungan teknologi chip IC telah memungkinkan orang membuat robot kecil yang berguna seperti robot kendaraan yang dipergunakan dalam misi ruang angkasa.

Berdasarkan data yang diolahnya, komputer terdiri dari:
- Komputer analog
- Komputer digital
- Komputer hibrid

Berdasarkan penggunaannya, komputer dibagi menjadi:
- Special purpose computer
- General purpose computer

Berdasarkan skala kemampuannya, komputer dibagi menjadi:
- Small scale computer
- Medium scale computer
- Large scale computer

Klasifikasi komputer terbagi atas tujuh, yaitu:
1. Microcontroller
2. Microcomputer
3. Engineering workstation
4. Minicomputer
5. Mainframe
6. Supercomputer
Read More.. Selengkapnya...

Read Users' Comments (0)

PENGERTIAN DASAR

1.1. Pengertian Komputer



Komputer adalah serangkaian ataupun sekelompok mesin elektronik yang terdiri dari ribuan bahkan jutaan komponen yang dapat saling bekerja sama, serta membentuk sebuah sistem kerja yang rapi dan teliti. Sistem ini kemudian dapat digunakan untuk melaksanakan serangkaian pekerjaan secara otomatis, berdasar urutan instruksi ataupun program yang diberikan kepadanya.



Definisi yang ada memberi makna bahwa komputer memiliki lebih dari satu bagian yang saling bekerja sama, dan bagian-bagain itu baru bisa bekerja kalau ada aliran listrik yang mengalir didalamnya. Istilah mengenai sekelompok mesin, ataupun istilah mengenai jutaan komponen kemudian dikenal sebagai hardware komputer atau perangkat keras komputer.



Hardware komputer juga dapat diartikan sebagai peralatan pisik dari komputer itu sendiri. Peralatan yang secara pisik dapat dilihat, dipegang, ataupun dipindahkan.



Dalam hal ini, komputer tidak mungkin bisa bekerja tanpa adanya program yang telah dimasukkan kedalamnya. Program ini bisa berupa suatu prosedur peng-operasian dari komputer itu sendiri ataupun pelbagai prosedur dalam hal pemrosesan data yang telah ditetapkan sebelumnya. Dan program-program inilah yang kemudian disebut sebagai software komputer atau perangkat lunak komputer.

...no image yet...

Dalam arti yang paling luas, software komputer bisa diartikan sebagai suatu prosedur pengoperasian. Suatu acara yang ditayangkan oleh TVRI, dapat dianggap sebagai software dari suatu peralatan televisi. Demikian pula halnya dengan musik yang telah direkam diatas kaset, data diatas kertas, serta cerita ataupun uraian yang ada didalam sebuah buku.



Secara prinsip, komputer hanyalah merupakan sebuah alat; Alat yang bisa digunakan untuk membantu manusia dalam menyelesaikan pekerjaannya. Untuk bisa bekerja, alat tersebut memerlukan adanya program dan manusia. Pengertian manusia kemudian dikenal dengan istilah brainware (perangkat manusia).



Konsep hardware - software - brainware adalah merupakan konsep tri-tunggal yang tidak bisa dipisahkan satu dengan lainnya. Untuk tahap pertama, manusia harus memasukkan program terlebih dahulu kedalam komputer. Setelah Setelah program tersimpan didalam komputer, maka komputer baru bisa bekerja untuk membantu manusia dalam menyelesaikan persoalan ataupun pekerjaannya.

1.2. Dari Generasi Ke-Generasi



Generasi pertama dari komputer, ditandai dengan diketemukannya tabung hampa udara sebagai alat penguat sinyal. Generasi ini kemudian diganti dengan generasi transistor, dan akhirnya timbul generasi ketiga dengan munculnya IC-Chip. Kini banyak diperdebatkan, apakah Microprocessor yang merupakan pengembangan dan peningkatan kemampuan dari IC-Chip bisa dikatakan sebagai pelopor generasi ke-empat, ataukah masih tetap pada generasi ketiga.



Alasan yang mendukung adalah, kemampuan dari Microprocessor jauh diatas IC-Chip, sedang alasan yang menolak pendapat tersebut mengatakan, bahwa konsep dasar Microprocessor masih sama dan itu hanya merupakan peningkatan dari kemampuan dari IC-Chip belaka. Dengan demikian, pada saat ini ada yang berpendapat bahwa kita sudah memasuki komputer generasi ke-empat dan bahkan kelima, tetapi ada juga yang masih berpendapat bahwa kita belum beranjak dari generasi ketiga.

a. Generasi Pertama.

Tabung hampa udara sebagai penguat sinyal, merupakan ciri khas komputer generasi pertama. Pada awalnya, tabung hampa udara (vacum-tube) digunakan sebagai komponen penguat sinyal. Bahan bakunya terdiri dari kaca, sehingga banyak memiliki kelemahan, seperti: mudah pecah, dan mudah menyalurkan panas. Panas ini perlu dinetralisir oleh komponen lain yang berfungsi sebagai pendingin.



Dan dengan adanya komponen tambahan, akhirnya komputer yang ada menjadi besar, berat dan mahal. Pada tahun 1946, komputer elektronik didunia yang pertama yakni ENIAC sesai dibuat. Pada komputer tersebut terdapat 18.800 tabung hampa udara dan berbobot 30 ton. begitu besar ukurannya, sampai-sampai memerlukan suatu ruangan kelas tersendiri.



Pada gambar nampak komputer ENIAC, yang merupakan komputer elektronik pertama didunia yang mempunyai bobot seberat 30 ton, panjang 30 M dan tinggi 2.4 M

b. Generasi Kedua.

Transistor merupakan ciri khas komputer generasi kedua. Bahan bakunya terdiri atas tiga lapis, yaitu: "basic", "collector" dan "emmiter". Transistor merupakan singkatan dari Transfer Resistor, yang berarti dengan mempengaruhi daya tahan antara dua dari tiga lapisan, maka daya (resistor) yang ada pada lapisan berikutnya dapat pula dipengaruhi. Dengan demikian, fungsi transistor adalah sebagai penguat sinyal. Sebagai komponen padat, tansistor mempunyai banyak keunggulan seperti misalnya: tidak mudah pecah, tidak menyalurkan panas. dan dengan demikian, komputer yang ada menjadi lebih kecil dan lebih murah.



Beberapa contoh komputer generasi kedua adalah: IBM Serie 1400, NCR Serie 304, MARK IV dan Honeywell Model 800. Pada gambar nampak sebuah papan rangkaian yang menggunakan transistor dan digunakan oleh Komputer MARK IV ditahun 1957 yang merupakan komputer pertama yang diproduksi di- Jepang.



Pada tahun 1960-an, komputer komersial yang memanfaatkan transistor dan digunakan secara luas mulai beredar dipasaran. Komputer IBM- 7090 buatan Amerika Serikat merupakan salah satu komputer komersial yang memanfaatkan transistor.

c. Generasi Ketiga

Konsep semakin kecil dan semakin murah dari transistor, akhirnya memacu orang untuk terus melakukan pelbagai penelitian. Ribuan transistor akhirnya berhasil digabung dalam satu bentuk yang sangat kecil. Secuil silicium yag mempunyai ukuran beberapa milimeter berhasil diciptakan, dan inilah yang disebut sebagai Integrated Circuit atau IC-Chip yang merupakan ciri khas komputer generasi ketiga. Contoh komputer generasi ini adalah: Apple Computer dan TRS Model 80 dan IBM S/360.



Pada gambar disebelah nampak, komputer IBM S/360 yang menggunakan komponen IC. Dinamakan IBM S/360 karena mampu melakukan operasi satu lingkaran penuh (360 derajat) yang maksudnya mampu melakukan proses yang dibutuhkan oleh aplikasi bisnis maupun teknik.

...no image yet... d. Generasi Keempat

Pada generasi ini ditandai dengan munculnya: LSI (Large Scale Integration) yang merupakan pemadatan ribuan IC kedalam sebuah Chip. Istilah chip digunakan untuk menunjukkan suatu lempengan persegi empat yang memuat rangkaian-rangkaian terpadu (integreted circuits). LSI kemudian dikembangakan dalam VLSI (Very Large Scale Integration).



Perkembangan berikutnya juga ditandai dengan munculnya microprocessor dan semi conductor. Perusahaan-perusahaan yang membuat micro-processor diantaranya adalah: Intel Corporation, Motorola, Zilog dan lainnya lagi. Dipasaran bisa kita lihat adanya microprocessor dari Intel dengan model 4004, 8088, 80286, 80386, 80486, 80586 yang lebih dikenal dengan nama: Pentium dan lainnya lagi. Sedang pabrik Motorola mengeluarkan model 6502, 6800 dan lainnya.

1.3. Pengertian Komputer Berdasar Golongan

a. General Purpose Computer

Komputer yang umum digunakan pada setiap hari, juga bisa disebut sebagai general-purpose computer, dimana bisa digunakan untuk menyelesaikan pelbagai variasi pekerjaaan. Komputer jenis ini dapat menggunakan pelbagai software, bermacam-macam langkah yang saling menyempurnakan, termasuk didalamnya penulisan dan perbaikan (word-processing), manipulasi fakta-fata didalam database, menyelesaikan pelbagai perhitungan ilmiah, ataupun mengontrol sistem keamanan organisasi, pembagian daya listrik serta temperatur.



Walaupun general purpose computer dapat diprogram untuk digunakan dalam beberapa fungsi, tetap mempunyai batasan-batasan dalam hal kemampuan, ukuran ataupun persyaratan. Sebagai contoh, general purpose computer tidak bisa digunakan untuk memproses perhitungan seluruh data statistik yang dibutuhkan untuk peramalan cuaca ataupun pengetesan pesawat terbang.

...no image yet... b. Special-purpose Computer

Special-purpose computer digunakan untuk menyelesaikan pekerjaan ataupun aplikasi khusus. Special purpose pada awalnya merupakan general-purpose, yang digunakan secara khusus dan disesuaiakan dengan konfigurasi ataupun peralatan didalamnya yang sudah dimodifikasi sedemikian rupa.



Sebagai contoh konfigurasi dari special purpose computer yang digunakan pada sistem komputer berskala besar adalah front-end processor; yang digunakan untuk mengontrol fungsi input dan output dari komputer utama. Contoh lain dari special purpose computer adalah adalah back-end processor, yang mengambil data dari storage serta meletakkan dan mengaturnya kembali kedalam storage.



Dedicated processor juga merupakan special purpose computer yang bagian dalamnya telah dirubah sedemikian rupa agar memiliki fungsi khusus. Dedicated processor dirancang sedemikian rupa agar bisa digunakan untuk menyelesaikan langkah dan proses khusus, dimana hal ini bisa ditemui pada: pelbagai robot yang digunakan pada pabrik, mesin-mesin kesehatan dipelbagai rumah sakit serta aneka video game.

1.4. Pengertian Komputer Menurut Kapasitasnya

a. Komputer Mikro (Personal Computer)

Pada awalnya, komputer jenis ini diciptakan untuk memenuhi kebutuhan per-orangan (personal). Kebutuhan per-orangan dalam hal menyimpan ataupun memproses data, tentunya tidak sebanyak kebutuhan sebuah perusahaan. Dikarenakan hal tersebut, kemampuan dan teknologi yang dimiliki oleh Personal Komputer pada awalnya memang sangat terbatas.

...no image yet...

Pada awalnya, memory yang dimiliki oleh sebuah personal komputer hanya berkisar antara 32 hingga 64 KB (Kilo Byte). Tetapi dalam perkembangannya, banyak personal komputer yang kini memiliki memory hingga 8 ataupun 32 MB (Mega Byte). Komputer personal model Apple II merupakan pelopor dari kelahiran personal komputer yang ada pada saat sekarang.



Karena harganya relatif murah, bentuknya kecil dan teknologi yang dimiliki diangap sudah memadai, maka personal komputer menjadi begitu cepat populer. Personal komputer kini tidak hanya digunakan oleh perorangan tetapi pada akhirnya banyak digunakan oleh perusahaan untuk menyelesaikan pelbagai masalah yang ada diperusahaan.



Pada umumnya personal komputer hanya mampu bekerja untuk melayani satu orang pemakai (single-user), tetapi dalam perkem bangannya dengan menggunakan konsep LAN (Local Area Network) personal komputer juga dapat digunakan untuk melayani banyak pemakai dalam saat yang bersamaan (konsep multi user).



Pada konsep LAN yang merupakan sebuah jaringan, terdapat sebuah otak/pengendali yang disebut sebagai server dan beberapa anggota yang disebut sebagai terminal. Secara pisik bentuk server ataupun terminal tidak berbeda dengan bentuk sebuah PC. Hubungan server dan terminal, dilakukan melalui sebuah kabel. Data yang berasal dari pelbagai terminal, akan disimpan secara terpusat oleh server.



Personal komputer pada saat ini juga mampu melakukan komunikasi data dengan personal komputer lainnya ditempat yang saling berjauhan. Dengan menggunakan sebuah modem, maka data yang berasal dari komputer akan dirubah menjadi gelombang suara, dan suara inilah yang kemudian dikirim melalui kabel telpon. Modem yang ada ditempat lain, akan menangkap gelombang suara ini dan merubah bentuknya menjadi gelombang yang bisa diproses oleh komputer.



Perbedaan konsep antara LAN dan Modem adalah, LAN hanya bisa digunakan untuk tempat yang tidak terlalu jauh (saat ini diartikan sebagai: tidak lebih dari 2.000 meter), dan biasanya masih terbatas dalam satu gedung. Selebihnya diperlukan modem. Kabel yang digunakan pada LAN adalah kabel digital, sehingga data bisa langsung dikirim tanpa perlu merubah bentuk seperti halnya yang dilakukan oleh modem.



Jenis PC lainnya yang tengah populer pada saat ini adalah: note-book. Note-book menggunakan silikon chip yang sangat tipis yang merupakan lambang kemajuan teknologi. Komputer jenis ini mempunyai bentuk yang sangat kecil apabila dibanding dengan jenis komputer lainnya. Note-book biasanya dilengkapi dengan portable battery-power, sehingga tanpa adanya listrik-pun note-book masih bisa dioperasikan. Dengan demikian, komputer jenis ini sangat cocok digunakan bagi para pemakai yang sering berpergian.



Karena menggunakan monitor jenis LCD (Liquid Cristal Display), note-book mempunyai bentuk yang sangat tipis. Disamping itu, note-book juga memiliki fasilitas disket ataupun hard-disk seperti hal-nya komputer PC pada umumnya. Internal memory yang dimiliki juga sangat besar, dimulai dari 4 MB yang kemudian bisa dikembangkan hingga 64 MB.



Note-book juga mampu melakukan komunikasi data dengan sesama note-book ataupun dengan komputer lainnya dilokasi yang saling berjauhan.

...no image yet... b. Komputer Mini

Komputer mini mempunyai kemampuan berapa kali lebih besar jika dibanding dengan personal komputer. Hal ini disebabkan karena micro-pocessor yang digunakan untuk memproses data memang mempunyai kemampuan jauh lebih unggul jika dibanding dengan micropocessor yang digunakan pada personal komputer. Ukuran pisiknya dapat sebesar almari kecil.



Komputer mini pada umumnya dapat digunakan untuk melayani lebih dari satu pemakai (multi user). Dalam sistem multi user ini, pada akhirnya personal komputer banyak digunakan sebagai terminal yang berfungsi untuk memasukkan data. Contoh Komputer mini: IBM AS-400

...no image yet... c. Komputer Mainframe

Ciri utama yang membedakan pengertian antara mini komputer dengan mainframe adalah, mainframe memiliki processor lebih dari satu. Dengan demikian, dari segi kecepatan proses mainframe jauh lebih cepat jika dibanding dengan mini komputer.



Kecepatan kerja mainframe mencapai 1 milyar operasi perdetik (1 giga operations per-seconds = 1 GOPS). Kecepatan semacam ini sangatlah diperlukan, karena mainframe biasanya digunakan untuk memproses data-data yang mempunyai kapasitas sangat besar, dan disamping itu, mainframe biasanya juga digunakan oleh puluhan hingga ratusan pemakai yang bekerja secara bersama-sama.



Suatu teknik atau cara yang memungkinkan banyak orang pada pelbagai terminal dapat meng-access pada satu komputer pada saat yang bersamaan, dikenal dengan time-sharing. Didalam pengertian time sharing sendiri, CPU dalam memberikan perhatiannya sebenarnya hanya kepada satu pemakai pada satu saat, dan kemudian dilanjutkan dengan pemakai berikutnya. Tetapi karena memiliki kecepatan yang sangat tinggi, maka jarak pemakaian waktu antara satu pemakai dan lainnya tidaklah nampak secara jelas.



Mainframe secara umum membutuhkan ruangan khusus dimana faktor lingkungan yang terdiri dari temperatur, kelembaban udara ataupun gangguan asap dapatlah dimonitor. Hal ini disebabkan karena nilai komputer serta nilai dari informasi yang tersimpan didalamnya sangatlah mahal. Ruangan yang ada biasanya juga dilengkapi dengan pelbagai sistem pengamanan elektronik.

d. Super-komputer

Sesuai dengan namanya, super komputer memiliki ciri khas, yaitu kecepatan proses yang tinggi serta memiliki kemampuan menyimpan data yang jauh lebih besar apabila dibanding dengan main-frame. Harga super komputer sangatlah besar dan mahal. Salah satau contoh super komputer adalah Cray-2. Pengguna super komputer biasanya negara-negara yang sudah maju ataupun perusahaan-perusahaan yang sangat besar, seperti misalnya industri pesawat terbang Nurtanio.



Dikarenakan kemampuannya yang sangat luar biasa dan diantaranya memiliki kemampuan untuk membaca/menyadap pelbagai data dari satelit, maka untuk pembelian sebuah super komputer harus mendapat persetujuan secara langsung dari presiden. Permintaan Indonesia pernah ditolak oleh presiden Amerika ketika Nurtantio menginginkan untuk membeli sebuah super komputer dari Amerika.

1.5. Pengertian Komputer Menurut Data Yang Diolah



Data yang diolah oleh komputer jenisnya sangatlah banyak. Ada data yang berujut gambar, suara, huruf, angka, keadaan, simbol ataupun yang lainnya lagi. Dalam hal ini, tidak setiap komputer bisa mengolah seluruh data yang ada. Ada komputer yang hanya bisa mengolah suara, ataupun hanya bisa mengolah gambar ataupun hanya mengolah huruf dan angka saja. Walaupun demikian, ada pula komputer yang bisa mengolah beberapa data secara bersama-sama.

...no image yet... a. Digital Komputer

Merupakan suatu jenis komputer yang bisa digunakan untuk mengolah data yang bersifat kwantitatif (sangat banyak jumlahnya). Data dari digital komputer biasanya berupa simbol yang memiliki arti tertentu, misalnya: simbol aphabetis yang digambarkan dengan huruf A s/d Z ataupun a s/d z, simbol numerik yang digambarkan dengan angka 0 s/d 9 ataupun simbol-simbol khusus, seperti halnya: ? / + * & !.

b. Komputer Analog.

Merupakan suatu jenis komputer yang bisa digunakan untuk mengolah data kualitatif. Data yang ada bukan merupakan simbol, tetapi masih merupakan suatu keadaan. Seperti misalnya: keadaan suhu ataupun kelembaban udara, ketinggian ataupun kecepatan adalah merupakan suatu keadaan yang oleh komputer kemudian ditetapkan sehingga menjadi suatu ukuran.



Analog banyak dipakai dipabrik-pabrik yang tujuannnya untuk mengontrol ataupun menghasilkan suatu produk. Pengertian komputer analog lebih mendekati dengan robotic ataupun mesin otomatis.

c. Hibrid Komputer

Merupakan jenis komputer yang bisa digunakan untuk mengolah data yang bersifat kuantitatif ataupun kualitatif. Hibrid komputer juga bisa dikatakan sebagai gabungan dari analog dan digital komputer. Komputer jenis ini banyak digunakan oleh pelbagai rumah sakit yang digunakan untuk memeriksa keadaan tubuh dari pasien, yang pada akhirnya, komputer bisa mengeluarkan pelbagai analisa yang disajikan dalam bentuk gambar, grafik ataupun tulisan.

1.6. Konsep Dasar Komputer



Dari apa yang telah diuraikan dapatlah dilihat, bahwa pengertian komputer bisa ditinjau dari bermacam-macam sudut, seperti misalnya: tinjauan komputer dari generasi ke-generasi, tinjauan komputer dari sudut kapasitasnya, dan disamping itu, komputer juga dapat ditinjau dari jenis data yang diolahnya.



Walaupun demikian, secara prinsip sebuah komputer selalu memiliki sebuah konsep dasar seperti yang nampak pada gambar. Komputer apapun jenisnya, selalu memiliki suatu peralatan yang disebut sebagai: Input device, Central Processing Unit, Output Device dan External memory.

a. Input Device

Input device bisa diartikan sebagai peralatan yang berfungsi untuk memasukkan data ke-dalam komputer. Jenis input device yang dimiliki oleh komputer cukup banyak.



Dalam kehidupan sehari-hari, mata manusia juga bisa diartikan sebagai salah satu input device yang berfungsi untuk memasukkan data kedalam otak manusia. Membaca bisa diartikan sebagai memasukkan data (kedalam otak manusia) melalui mata.

b. Central Processing Unit (CPU)

Bagian ini berfungsi sebagai pemegang kendali dari jalannya kegiatan komputer, dan dikarenakan itu, CPU juga disebut sebagai otak dari komputer. Selain dari pada itu, CPU juga berfungsi sebagai tempat untuk melakukan pelbagai pengolahan data. Pekerjaan pengolahan data diantaranya: mencatat, melihat, membaca, membandingkan, menghitung, mengingat, mengurutkan maupun membandingkan.



Dalam bekerja, fungsi dari CPU terbagi menjadi :
* Internal Memory/Main Memory, berfungsi untuk me-nyimpan data dan program.

* ALU (Arithmatic Logical Unit), untuk melaksanakan perbagai macam perhitungan.

* Control Unit, bertugas untuk mengatur seluruh operasi komputer



CPU juga disebut sebagai microprocessor. Dimana untuk bekerja microprocessor dipengaruhi oleh kapasitas pemrosesan Bit-nya dan juga frekwensi kerjanya. Kapasitas bit untuk Microprocessor ada 8 bit, 16 bit, 32 bit dan 64 bit. Kemampuan CPU dilihat dari bit-nya, bila suatu processor berkapasitas pemrosesan 8 bit, dapat diartikan bahwa pemrosesan tersebut memiliki 8 pintu masuk untuk menerima bit-bit instruksi. Dengan demikian, processor 16 bit, dapat memproses kira-kira 2 kali lebih cepat dari yang 8 bit.



Faktor lain yang mempengaruhi kecepatan kerja microprocessor adalah frekwensi kerja komputer. Ada CPU yang mempunyai frekwensi 4.77 Mhz (mega hertz = juta hertz), 8 Mhz, 16 Mhz, 40 Mhz, 50 Mhz dan lain sebagainya. Semakin tinggi frekwensi yang dimilikinya, semakin tinggi pula kecepatan memprosesnya.



Microprocesor 8 bit adalah 8088, biasa digunakan untuk komputer PC-XT dengan frekwensi 4.77 Mhz. Microprocessor 16 bit adalah 80286, dipasang untuk type PC-AT dengan frekwensi antara 8 Mhz hingga 20 Mhz. Microprocessor 32 bit adalah 80386 dan 80486, kedua jenis microprocessor ini dipasang pada jenis PC-ATgan frekwensi antara 20 Mhz hingga 40 MHZ. Kini beredar microprocessor jenis 80586 (pentium) dan 80686



Microprocessor 586 dikenal dengan nama pentium, telah dirilis sejak bulan Maret 1993. Banyak perubahan dan peningkatan pada processor ini. Kecepatan yang dimiliki adalah 112 MIPS (Million Instruction PerSecond) atau meningkat 5 kali lebih cepat dari generasi 486.

c. Output Device

Output device bisa diartikan sebagai peralatan yang berfungsi untuk mengeluarkan hasil pemrosesan ataupun pengolahan data yang berasal dari CPU kedalam suatu media yang dapat dibaca oleh manusia ataupun dapat digunakan untuk penyimpanan data hasil proses. Jenis output device yang dimiliki oleh komputer cukup banyak.



Dalam kehidupan sehari-hari, menulis, juga bisa dikatakan sebagai suatu cara untuk mengeluarkan hasil pemikiran kedalam suatu media sehingga bisa dibaca oleh manusia. Media yang dipergunakan untuk menulis bisa berupa kertas ataupun bentuk lainnya.

d. External Memory

External memory bisa diartikan sebagai memory yang berada diluar CPU. Juga disebut sebagai Secondary Storage ataupun Backing Storage ataupun Memory Cadangan yang berfungsi untuk menyimpan data dan program. Data dan program yang tersimpan didalam external memory, agar bisa berfungsi data dan program tersebut harus dipindahkan terlebih dahulu kedalam internal memory. Jenis external memory cukup banyak.



Dalam kehidupan sehari-hari, buku, kertas, gambar foto, ataupun rekaman suara, juga bisa dikatakan sebagai external memory dari manusia. Dikatakan external memory karena berfungsi sebagai tempat untuk menyimpan data yang terletak diluar otak manusia. Agar data-data yang ada didalam external memory tersebut bisa berfungsi bagi manusia, maka data-data tersebut, juga harus dipindahkan terlebih dahulu kedalam internal memory, misalnya dengan cara membaca.

1.7. Pengertian Data dan Informasi



Data adalah sesuatu yang belum mempunyai arti bagi penerimanya dan masih memerlukan adanya suatu pengolahan. Data bisa berujut suatu keadaan, gambar, suara, huruf, angka, matematika, bahasa ataupun simbol-simbol lainnya yang bisa kita gunakan sebagai bahan untuk melihat lingkungan, obyek, kejadian ataupun suatu konsep.

...no image yet...

Informasi merupakan hasil pengolahan dari sebuah model, formasi, organisasi, ataupun suatu perubahan bentuk dari data yang memiliki nilai tertentu, dan bisa digunakan untuk menambah pengetahuan bagi yang menerimanya. Dalam hal ini, data bisa dianggap sebagai obyek dan informasi adalah suatu subyek yang bermanfaat bagi penerimanya. Informasi juga bisa disebut sebagai hasil pengolahan ataupun pemrosesan data.



Data bisa merupakan jam kerja bagi karyawan perusahaan. Data ini kemudian perlu diproses dan diubah menjadi informasi.



Jika jam kerja setiap karyawan kemudian dikalikan dengan nilai per-jam, maka akan dihasilkan suatu nilai tertentu. Jika gambaran penghasilan setiap karyawan kemudian dijumlahkan, akan menghasilkan rekapitulasi gaji yang harus dibayar oleh perusahaan. Penggajian merupakan informasi bagi pemilik perusahaan. Informasi merupakan hasil proses dari data yang ada, atau bisa diartikan sebagai data yang mempunyai arti. Informasi akan membuka segala sesuatu yang belum diketahui

1.8. Hirarchi Penyajian Data



Pengertian data yang diolah oleh komputer, cara penyajiannya dapat dibagi dalam beberapa tingkatan / hirarchi, yaitu :

a. Byte/Karacter

Merupakan satuan data paling kecil. Karakter bisa berbentuk huruf (A s/d Z, atau a s/d z), berbentuk angka (0 s/d 9), ataupun berbentuk tanda baca lainnya lagi.

b. Field

Merupakan kumpulan dari karakter-karakter yang membentuk suatu arti tertentu; Misalnya, Field untuk Nomor Mahasiswa, Field untuk Nama Mahasiswa, Field untuk Mata Pelajaran dan lainnya.

...no image yet... c. Record

Merupakan kumpulan dari field-field yang membentuk sebuah arti. Misalkan kumpulan field NIRM, NAMA MATERI PENDIDIKAN pada akhirnya membentuk sebuah record.

...no image yet... d. File

File merupakan kumpulan dari record-record . Dengan demikian, hirarchi penyajian data dengan urutan dari kecil kebesar adalah sebagai berikut :

Byte/Character -> Field --> Record --> File

1.9. Sistem Bilangan



Pada dasarnya, komputer baru bisa bekerja kalau ada aliran listrik yang mengalir didalamnya. Dalam hal ini, aliran listrik yang mengalir ternyata memiliki dua kondisi, yaitu kondisi ON yang berarti ada arus listrik, dan kondisi OFF yang berarti tidak ada arus listrik. Berdasar hal tersebut kemudian dibuat perjanjian, bahwa kondisi ON diberi lambang 1 (angka satu), dan kondisi OFF diberi lambang 0 (angka nol).



Seluruh data yang berupa angka, abjad ataupun special character kemudian ditulis dalam rangkaian kombinasi 0 dan 1, misal angka 5 ditulis dalam bentuk 000101 dan huruf D ditulis dalam 110100. Pabrik komputer membuat seluruh terjemahan ini dalam bentuk rangkaian elektronik yang tersimpan didalamnya.



Dengan demikian, seandainya kita kemudian memasukkan tulisan yang berbunyi: I LOVE YOU melalui keyboard, tulisan ini secara otomatis akan diterjemahakan kedalam bentuk 1 dan 0 oleh komputer.



Agar bisa dibaca oleh manusia, hasil terjemahan ini kemudian diterjemahkan kembali kedalam bentuk dan huruf ataupun angka seperti asalnya, dan kemudian dikeluarkan melalui layar monitor.



Karena hanya memiliki 2 angka dasar, yaitu 0 dan 1, maka sistem bilangan semacam ini kemudian dikenal sebagai sistem bilangan biner (binary number). Untuk perbandingan, sistem bilangan yang telah kita kenal disebut sebagai sistem bilangan desimal; Disebut desimal karena memiliki angka dasar yang berjumlah 10, yaitu 0, 1, 2, 3, 4, 5, 6, 7, 8, dan 9.

...no image yet... a. Sistem Bilangan Desimal

Sistem bilangan yang selama ini kita kenal adalah sistem bilangan desimal, dimana sistem bilangan desimal ini memiliki angka dari 0 hingga 9, dengan jumlah bilangan mencapai 10 buah. Dalam contoh terlihat, bahwa angka 3675 bisa diartikan sebagai (5X101) + (7X101) + (6X102) + (3X103). Angka 10 merupakan jumlah angka dasar yang dimiliki oleh bilangan desimal.

b. Sistem Bilangan Binary

Karena sistem bilangan binary hanya memiliki angka 0 dan 1 saja, maka nilai 11010 dalam bilangan biner dapat diartikan sebagai: (0X20) + (1X21) + (0X22) + (1X23) + (1X24) = 26. Angka 2 merupakan jumlah angka dasar yang dimiliki oleh bilangan biner

...no image yet...

Untuk mengkonversikan bilangan desimal ke-binary, maka langkah yang bisa dilakukan adalah : a. Apabila bilangan tersebut bisa dibagi dengan 2, maka hasilnya ditulis 0 pada sisi sebelah kanan (lihat gambar disebelah).Tetapi apabila tidak, maka angka 1 yang ditulis.



Untuk melakukan penambahan pada bilangan binary, langkah yang dilakukan adalah sama dengan langkah penambahan pada bilangan desimal. Karena angka tertinggi yang dimiliki hanyalah angka 1, maka seandainya pada penjumlahan tersebut mehasilkan angka 2, maka akan ditulis 0 dengan catatan masih menyimpan 1. Seandainya pada penjumlahan menghasilkan angka 3, maka akan ditulis 1 dan masih menyimpan 1 (lihat contoh).

...no image yet...

Apabila dalam melakukan pengurangan ternyata angka yang dimiliki masih kurang nilainya, maka bisa diambil langkah dengan cara meminjam angka yang berada disebelah kiri. 1 angka apabila dipinjam/dipindah keposisi kanan, akan mempunyai nilai 2 (lihat contoh).



Langkah yang dilakukan pada saat perkalian pada bilangan binary juga sama dengan langkah yang dilakukan pada bilangan desimal. Hal ini bisa dilihat pada contoh yang ada.

...no image yet...

Prinsip pembagian pada bilangan binary juga tidak berbeda dengan prinsip pembagian pada bilangan desimal. Hal ni bisa terlihat pada contoh yang ada.

c. Sistem Bilangan Octal dan Hexadesimal

Selain menggunakan sistem binary, komputer juga menggunakan sistem bilangan octal, dimana mempunyai jumlah bilangan dasar sebanyak 8 dan sistem bilangan hexa-desimal yang mempunyai bilangan dasar sejumlah 16. Susunan angka yang dimiliki kedua bilangan, seperti yang nampak pada gambar.



Walaupun demikian, komputer tetap bekerja dengan menggunakan sistem binary. Angka dasar 8 dan 16 hanya dibutuhkan saat mengubah dari atau menjadi binary, dan dengan cara ini memungkin penulisan menjadi lebih ringkas dari nilai sebenarnya yang ada didalam memory komputer. Octal senantiasa ditulis dalam tiga angka dan hexa desimal dalam empat angka.



Sistem bilangan Octal memiliki angka sebanyak 8 buah, yaitu dari angka 0 hingga 7. Untuk membuat konversi bilangan dari Oktal ke-desimal, digunakan angka dasar 8, karena sesuai dengan jumlah angka yang dimilikinya.

...no image yet...

Karena jumlah angka yang dimiliki oleh bilangan ini jumlahnya 16, maka angka 16 inilah yang dijadikan dasar untuk konversi ataupun perhitungan-perhitungan lainnya.

d. System BCD

Pada awalnya, system BCD (Binary Coded Decimal), menggunakan 4-bit guna menyajikan bilangan desimal. Setiap digit didalam bilangan desimal, akan dirubah kedalam bentuk 4-bit binary. sebagai contoh, bilangan 3752 didalam bilangan desimal, akan diubah menjadi 0011 0111 0101 0010.



Karena dianggap tidak efisien, yaitu hanya sanggup menampung data sebanyak 24 atau 16 karakter yang berbeda, maka sistem BCD ini kemudian disempurnakan dengan menggunakan 6-bit guna menyajikan data yang ada. Dengan demikian, data yang disajikan akan menjadi lebih banyak lagi, yaitu 26 atau sejumlah 64 karakter yang berbeda-beda.

f. System EBCDIC

EBCDIC (Extended Binary Coded Decimal Interchange Code) menggunakan 8-bit guna menyajikan data yang ada. Dengan adanya 8-bit ini, tentu saja jumlah data yang disajikan menjadi lebih besar, yaitu sebanyak 28 atau 256 kombinasi. 4 karakter yang berada disebelah kiri disebut sebagai zone-bits, dan 4 karakter sisanya disebut sebagai numerik bits. Kode-kode ini banyak digunakan oleh komputer IBM ataupun peralatan yang menggunakan standart IBM.

g. System ASCII

ASCII (American Standart Code for Informa tion Interchange), menggunakan 7-bit guna menyajikan beberapa data. Sistem ini digunakan oleh beberapa pabrik komputer secara bersama-sama sehingga menghasilkan suatu standart yang baku untuk semua jenis komputer. Walaupun ASCII menggunakan kode 7-bit , tetapi dalam pelaksanaannya tetaplah 8-bit yang digunakan. Sebab masih menggunakan extra bit yang digunakan untuk mendeteksi pelbagai kesalahan yang timbu
Read More.. Selengkapnya...

Read Users' Comments (0)