Sunday 29 November 2015

Steps - steps JAVA run in CMD

Steps - steps JAVA run in CMD
1. Before running java on the CMD that the first thing you should do is to install JDK
2. After you install JDK JDK address setting on the patch, follow the steps - these steps on the way of setting the address JDK patch
3. Click >> Computer >> proporties
4. Click the Advanced System Settings >>
5. Click >> Environment Variables
6. Locate and then click Edit Patch >> >> In awalii semicolon and then copy the address JDK from system C, step - a step to copy the address JDK you can follow on this beriku explanation:
7. How to copy JDK address in system C, click >> Local disck (C), then click >> Program Files
8. Then click >> Java
9. Click >> jdk
10. Click >> bin
11. Copy JDK then enter the address in Patch (Prior paste type a semicolon terlebi patch first)
12. Sign in CMD, now you can menjalangkan java on CMD, you first create java script in notepad make sure the class name match the name on the deposit at the end with a point java examples (nama_file.java) and run as shown below:
13. Here's an example of a simple Java program on a notepad:
public class try
{
public static void main (String [] args) {
System.out.print ("try");
}
}
14. Here's an example of how to run a Java program in CMD and explanation, press Windows + R, then enter the following command: D: (for incoming kepartisi where where you store your java file), dir (to display a list - a list of files to determine whether the file java you are already there), then javac nama_file.java (for konfile your java file), java filename (to run the program).


Thursday 12 November 2015

Object Oriented Programming

What the PBO?

          OOP / PBO is a programming paradigm that is popular today that has replaced the procedure-based programming techniques. Object Oriented Programming which also means Object-oriented programming has been discovered around 1960 and was developed in the early 1970s.

Object-Oriented Programming (Object Oriented Programming / OOP) is the object-oriented programming, where all the data and functions are wrapped in classes or objects. Each object can receive messages, process data, sending, storing and manipulating data. Some objects interact with each other to provide information to one another.
          Each object must contain information about itself and can be connected with another object. Object-oriented programming is different from procedural programming using only one page down to do a lot of commands or statements. The use of object-oriented programming is very benyak once, for example: java, php, perl, C #, COBOL, and others.

          In the Object Oriented Programming concept known some common terms, namely:

- Attribute

Attribute Definition and Overview

           The attributes of a class is a global variable that is owned by a class, an attribute may have the right to access private, public or protected.
An attribute that is declared as private may only be accessed directly by the class wraps, while other classes can not access these attributes directly.

           An attribute that is declared as public can be accessed directly by other classes outside the classroom are wrapped.
An attribute that is declared as protected can not be accessed directly by other classes outside the classroom are wrapped, except that access class is a subclass of class wrapping.
           Attributes are also commonly called state / properties / fields is part owned by a class that does not do surgery, but her surgery is performed so as to change the value of the attribute.

Characteristics Attributes

          In class, the attribute referred to as a variable. Attributes can differentiate between one object with another object. For example, in the class: the students, the students are the object A and object of the student B.
          The only difference between the A and the object B is its NPM (student identification number) that is an attribute of the object. In the attributes, there are also two variable term, namely Class Instance Variables and Variable.
Where each variable has its own characteristics, including:
In the Instance Variables instance à each object has its own variables and store values.

          While the Class Variables à attributes shared by all objects that come from the same class, as well as all objects have the same value of the variable class. attributes of the object of the same class.

- Method

Method Definitions and Overview

          Method is a function or procedure that is created by a programmer in a Class. In other words, the method in a class similar in function or procedure in procedural programming.
          On a method in a class also have access permissions as well as the attributes of the class, the access permissions that include private, public and protected who has the same meaning to permit access to the attributes that have been discussed previously. A class may have more than one method with the same name as long as it has a different input parameters so that the compiler or interpreter can recognize where the method is invoked.

          This is called overloading. In a classroom, there is also the so-called static methods or attributes that have the keyword static. The purpose of the static here is a method that can be accessed to share with all other objects without having to create an object which has a static method before (without the new), but a static method has limitations that can only access attributes or other methods in the class that wrap which is also static. Static method is usually implemented for the main method.

Characteristic Method

          Within a class, the behavior is stored in the form of Method. Method is a series of statements / commands (command = line program) in a class that handles a specific task. Method are things that can be done by objects of a class.
Method is defined in the class but invoked through the object. Method has a role include:
- Change the value attribute of an object,
- Receives information from other objects, and
- Send information to another object to perform a task (how objects communicate with another object is to use the method).

- Class

          Is a model that contains a set of attributes and methods in a unit for a particular purpose. For example, humans have the class attribute weight, height, age and then have a method to eat, drink, sleep. Methods in a class can change the attributes possessed by the class. A class is the basis of modularity and structures in object oriented programming.

Definitions and Overview Class

          Class is defined as a blueprint (plan), or prototype, which defines the variables and methods common to all objects of a certain type n (n means a certain amount). A class resembles a structure that is the data type itself, eg point data type that consists of x and y coordinates. Java language has been used a class to declare the type of data point because the Java programming language is a pure object-oriented programming language that does not know the structure, but to know what is called a class.

          Difference in a classroom with a structure is a class can stand alone and can be used for various purposes other classes, whereas a structure can not stand alone. A more flexible classes to be used by another class without having to disassemble the code of the main program, whereas if it is used, the structure must be demolished transform program code copied parts of the structure to another main program code.

          A file can consist of a variety of classes, but usually in the Java programming language file consists of only one class that is stored with the class name, eg List.java file containing the class list. However, if the class is made for example nama_kelas public class, then that class should be stored in a single file for one class only. After compiling then on there will be a Java .class file that contains bytecode of any class.

          If a file consists of two classes, then after compilation will produce the two .class files which will be read by the Java interpreter when the program is executed. A class when the program is executed and the new command is executed, it will be made an object. Class is a template for the creation of objects. Class also has members, including: the attributes and methods.
Understanding of brevity:
• Class is a pattern / template that describes a collection of objects that have similar properties and behavior.
• Class is a data structure of the object (the blueprint of an object), and the process of making an object of a class is also called instantiation.
• Class is the definition of data and functionality of a thing (object, concept, etc.).
• In the class declared variables and method owned by object

Characteristics Class

          Class has several characteristics, including: members of the class consists of attributes and methods. Each member class has its own access control, the point is whether the members of the class can be accessed freely (with the type of public) or only accessible through an interface.
          In this case, the interface is a device used for communication between different objects that do not have any relationship. Interface can be regarded as the communication protocol between the object.

- Object

          Is the embodiment of class, every object will have the attributes and methods that are owned by his class, for example: amir, Ahmad, minister to an object of class man. Each object can interact with other objects in spite of coming from a different class.

Object Definition and Overview

          Object is something that has an identity (name), generally also have data about himself or another object and have the ability to do something and be able to work together with other objects. Basically all objects in the world can be regarded as an object. Houses, cars, motorcycles, desks, and computers are examples of objects that exist in the real world. Object is the implementation class. In simple, it can be said to consist of properties (attributes) and methods.
Understanding of brevity:
• The object is a special object that is used to access members of the object (attribute or method) of the object itself.
• If there are other variables that have the same name as the name attribute inside the object, "this" can be used to refer to object attributes.

Object Characteristics

          Each object has two main characteristics, namely its attributes and behavior. A status object attributes and behavior is the behavior of the object.
          A simple example is the bicycle. Bicycle object has attributes: pedals, wheels, and gears, speed as well as having behavior such as runway and brakes. Just like the depiction in the real world, the development of programs with OOP concept also uses an object model that will store in a variable attributes and behavior in the methods or functions / procedures. The description:
Object instance: Bicycles
- Bicycles have attributes (state): pedals, wheels, spokes, and color.
- Bicycles have behavior (behavior): ascending speed, the speed decreases, and the gearshift bicycle.
In object-oriented software development, object in the software will store their state in a variable and store information behavior (behavior) in those methods or functions / procedures.

Concepts in OOP / PBO:

- Abstraction

          Is a way to look at an object in a simpler form. For example, we did not see a car as thousands of electronic components, mechanical systems with four tires, seats, steering wheel and so on. By Abstraction, a complex system can be viewed as a collection of subsystems that more simple, like a car is a system consisting of various subsystems, such as steering subsystem, subsystem braking and so on.

          Abstraction is the ability of a program to bypass aspects of information processed by it, namely the ability to focus on the core. Every object in the system serves as a model of the "perpetrators" abstract that can do the work, reports and changes in circumstances, and communicate with other objects in the system, without revealing how this excess is applied.
          Processes, functions or methods can also be made abstract, and some of the techniques used to develop a pengabstrakan.

- Encapsulation

          Is a mechanism to hide or protect a process from possible external interference or abuse of the system and also simplifies use of the system.
          Ensure the user an object can not change the state of an object in a way that is not feasible. Only methods in such objects are given permission to access the situation. Each object access interface that specifies how other objects can interact with it. Other objects will not know and rely on the representation of the object.

- Inheritance

          An attribute inherited concepts and methods that are owned by a class to class derivatives. With this draft class who made quite define specific attributes and methods therein, while the attribute and the more common method will be obtained from the parent class.
          Adjusting polymorphism and encapsulation by allowing the object is defined and created with a special type of object that has been ada.Objek-object can divide (and extend) their behavior without emotion implement the behavior of the (language-based objects do not always have inheritas.)

- Polymorphism

          Is a concept which enables the use of an interface similar to govern an object in order to perform an act that may in principle be the same but different.
Called object-oriented data model can provide more flexibility, ease of changing programs and is widely used in large-scale software engineering. Furthermore, supporters of OOP claim that OOP is easier to learn for beginners compared with previous approaches besides OOP approach easier to develop and maintain.
          Polymorphism via messaging. Does not depend on calling subroutines, object oriented language can send messages, some methods of dealing with a messaging depends on the specific object in which the message is sent.

          For example, if a bird receive "fast motion", he will move his wings and fly. When the lion received the same message, he would move his feet and ran. They said a similar message, but in accordance with the ability of these animals. This is called polymorphism as a variable in the program tungal can hold different types of objects while the program is running, and the text of the same program can call several different methods at different times in the same calling. This is contrary to achieve polymorphism functional language through the use of first-class functions.

Tuesday 10 November 2015

understanding of accounting, financial accounting, management accounting as well as the importance of accounting

Definition of "Accounting",
"Financial Accounting" and
"Managerial accounting"

Definition of accounting, financial accounting and management accounting is indeed very different, it can be said that the definition of a cycle or chains are interconnected with each other that can not be separated. Financial accounting in the hospital in order to finance a hospital to run smoothly then the cycle is to be run properly.

As the initial process, must first know the definition of accounting, financial accounting and management accounting properly, so that will help achieve a satisfactory understanding.

1. Definition of accounting Accounting is the process of recording, calculating, identifying, measuring and release economic information in an agency / company so that it is possible
the judgments and decisions clearly and firmly for those who use the information. Effective use of accounting would be one way of doing effective financial management.

2. Definition of financial accounting Financial accounting is accounting which mainly produces information in the form of financial statements aimed at external parties, such as taxes, shareholders, and others. Examples of financial statements are: 1. Balance Sheet 2. Income Statement 3. Statement of changes in capital

3. Definition of management accounting Management accounting is the financial statements prepared primarily to generate useful information for effective decision-making by management for planning and controlling operations and perhitunagn costs.
Examples:
1. Revenue per service activities
2. Report of accounts receivable, cash reports and so on

"At first glance understanding of accounting, keunangan accounting and management accounting, may be
useful. "


THE IMPORTANCE OF ACCOUNTING

Throughout the economy of using money (Money) as a means of payment, the role of accounting is always crucial because the accounting record business events m \ a financial nature. Merchandise sales, payroll, and credit purchases are examples of events

recorded business accounting.

In various activities of our lives depend on the reliability of accounting. For example, when we perform retrieval cash at ATMs (automatic teller machines) then we actually ordered the bank do the accounting records. The cash withdrawal led to reduced cash in the bank, and we are in a bank account balances are also reduced by the value of the rupiah that we mentioned., What happens if the bank reduces the balance of our account more than the amounts of money that we receive? We would ask those problems to the bank, and immediately close the accounts

us because it reflects that the bank accounting unreliable. Accounting for government organizations to prevent and detect crime of corruption or misuse of public money. criminals do not want to accept bribes [bank transfer because the event will be recorded in the accounting of banks which became the eradication of corruption are easy to trace the flow of funds to corruption. Business organizations called companies even use accounting as a language to facilitate operations, making business decisions, as well as to account for the implementation of the task manager. Accounting is also commonly used to compare the performance of a company with other companies. The company therefore used as the language of business accounting (Accounting is the business language). in a word, accounting for no where where and useful in everyday life, both for individuals and for organizations.

How to fix the flash

Useful article this time is set way in the repair of damaged flash either from her or from the device software. Flash problem was manifold, when talking with the technicians then we will know where the damage. but when talking with people who despise looking for tutorials on the internet like me, then the damage will not be so obvious, that right is not it?

therefore I suggest you to try the following methods before deciding to buy a new flash (calculated saving money)
* HOW TO FIRST The first way is the easiest way to use CMD. usually potent if the damage is only corrupt or badsector errors in flash software.
 1. Open CMD. (click Start - Run - type cmd - press ENTER)
 2. Plug the flash that is broken,
 3. type FORMAT H: / FS: FAT then ENTER.
H is the location of your flash, if the location of the flash in the explorer is G then FORMAT G: / FS: FAT then ENTER.

* HOW TO BOTH still using the CMD. But there is little difference, which is merely check
 1. Open CMD. (the same way as above)
 2. Plug the flash that is broken,
 3. type CHKDSK / f H: then ENTER
 4. Press Enter until the check is completed.

* HOW TO THIRD-use features of Windows Check Disk
1. Plug the flash and then open Windows Explorer
2. Right-click the stick - Properties - Tools - Check Now
3. Check that there is a second option. "Automatically fix file system errors" and "Recovery of bad sectors"
4. Wait until the process is complete.

* HOW TO FOURTH using the Computer Management
 1. Plug the flash damaged
2. enter RUN then type compmgmt.msc - ENTER
3. Click on Storage and select Disk Management
4. If no flash is detected, right-click - Create Partition. then right click again - FORMAT

 * HOW TO FIFTH your flash seems fairly yuk damage directly to more extreme ways
1. Plug the flash
2. Download the software called HDDGURU Low Level Format
3. Install the program, then "Run As Administrator" for Windows Vista / 7/8.
4. Select the type of USB and then Continue.
5. After low-level formatting is complete, you can reformat the flash with the way the format as usual.

* HOW TO SIXTH using the HP Drive Key Boot Utility Quick Format
1. Plug the flash
2. Download the software called HP Drive Key Boot Utility
3. Install the software (Windows XP only)
4. Run the program - Select the type of FAT / FAT32.
5. Select QUICK FORMAT - Create New or Replace Existing Configuration.

*HOW TO SEVENTH by searching software from vendors using idVendor and idProduct
1. Download a software called USB Device Viewer
2. Plug the flash drive
3. Run the program (Run As Administrator for Windows 7 / Vista / 8)
4. Will be detected all connected devices, such as the mouse, modem etc. To make sure, select USB mass Storage. Unplug and re-enter.


5. Record idVendor and idProduct. in this case, I noted (idVendor: 0951) and (idProduct: 1624) 6. Go to this address >>> http://flashboot.ru/iflash/ 
7. Put idVendor to idProduct to VID and PID - click ENTER


8. It would appear some results, please Browsing Tools that I put a red mark as shown below



9. google search results directly leads to the official website KINGSTON


10. Open the link and I was immediately taken on a software utility that is specific to the IC flash repair damaged / corrupt / the error.


11. Download the software and use as needed.


* until here good luck, any kind of damage caused by the fault is not the responsibility of the author. Dare to try is the initial capital to solve a problem






Monday 9 November 2015

Crimping way UTP cable to the RJ-45 (Straight and Cross)

Crimping way to RJ45 UTP cable (Straight and Cross). After learning Various Computer Network Cable Lan, we will do the crimping of the UTP cable using RJ-45 connectors that can be used to connect the computer hardware.

nah, before we start, the materials to be prepared is utp cable, RJ-45 connectors and crimping pliers and better if you if there is Lan Tester to test the cable, if not, still can use other ways to test her.

TANG CRIMPING


KABEL UTP

LAN TASTER


RJ-45

UTP cable consists of two types, namely Straight and Cross, a straight cable is used to connect two different hardware such as connecting a PC to the Switch / Hub, and Cross cable is used to connect two pieces of the same hardware as from PC to PC, Laptop to Laptop .Cara crimping UTP cable to the RJ-45.


To make Straight cable, the arrangement of the colors used are:
The composition of colors on the tip 1 = White Orange, Orange, White, Green, Blue, White Blue, Green, White Chocolate, Chocolate
Arrangement of the same color on the tip end 2 1

To create a Cross cable, the arrangement of the colors used are:
The composition of colors on the tip 1 = White Orange, Orange, White, Green, Blue, White Blue, Green, White Chocolate, Chocolate
The composition of colors on the tip 2 is = White Green, Green, White Orange, Blue, White Blue, Orange, White Chocolate, Chocolate How crimping UTP cable to RG-45

STEP STEP STRAIGHT AND CROSS CABLE CRIMPING.

Crimping way UTP cable to the RJ-45
1. Peel the skin of wiring width of 2 cm.
2. Arrange neatly contained within the eight wires in accordance with drawings and explanations above.
3. Align the cables are still tangled.
4. Flatten the end of the cable by cutting it using crimping pliers.
5. After making sure the correct color sequence and the ends of the cables are flat, the input cable into the RJ-45 connector, make sure the cable ends to touch the tip of the RJ-45, and jepitlah use crimping pliers.
6. After completing both ends of the cable, using the test Lan tester, if all the lights are on, it means that the cable has been in the crimping properly and can be used.






Database Design

preliminary

In this paper will discuss the stages in the design database. On the database that is used by a single user or a few users only, the database design is not difficult.

But if the size of the database that is medium or large database design will be very complex. Therefore, users expect the use of a database such that the system must be able to meet the needs of all the users. Of course, that these needs can be served well then it should be done anyway good database design, activities, what is being done at that stage.

Database Design goals

To meet the information comprising user needs specifically and applications - applications.
Facilitate understanding of the structure of information.
Supporting the needs of processing and some objects appearance (response time, processing time, and storeage space).
Database Design Process

Database design process consists of six stages:

Phase 1 Data collection and analysis
Phase 2, the database design is conceptually
Phase 3, Election DBMS
Stage 4, logical database design (model data mapping)
Stage 5, the physical design of the database
Stage 6 Database System Implementation
In particular the design process contains two parallel activities:

Activities that involve the design of the data content and structure of the database,
Activity on the design database processing and applications software.
On the other hand, we usually determine the design of database applications with led to the construction of a database schema that has been determined for the first activity.

6 steps above was not to be processed sequentially. In the phase 1 is a collection of information related to the use of the database. Stage 6 is implementing its database.

Stage 1 and 6 sometimes is not part of the design database. While that is the core of the database design process is at the stage of 2, 4, 5.

Phase 1 - Data collection and analysis
It is a stage where we make the process of identification and analysis needs and data is called data collection and analysis. To determine the needs of a database system, we need to know in advance the other parts of the information system that will interact with the database system, including existing users and the new useryang and their applications. The needs of users and applications is then collected and analyzed.
The following are the activities of data collection and analysis:
Define groups of users and fields of application
A review of existing documentation
Analysis of the operating environment and data processing
The list of questions and interview
Phase 2, the database design is conceptually
At this stage will be generated conceptual schema for the database that depend on a specific DBMS. Often using a high-level of data modelseperti ER / EER modelselama this stage. In the conceptual schema, we must specify databaseyang known applications and transactions mungkin.Tahap databasesecara conceptual design has two parallel activities:
Designing a conceptual scheme
Examine the needs of data from a database that is the result of phase 1 and produce a conceptual database schema in a DBMS-independent high-level data model as EER (Enhanced Entity Relationship) model.Untuk produce such schemes can be generated by merging various user needs and directly create the database schema or by designing schemes apart from the needs of each user and then combining these schemes. The data model used in the design of conceptual scheme is DBMS-independent and the next step is to choose a DBMS to do the design.
Designing transactions
Testing applications databasedimana her needs have been analyzed in phase 1, and generating details of transactions ini.Kegunaan this stage are processed in parallel along tahapp conceptual schema design is to design the characteristics of database transactions that have been known at a DBMS- independent. These transactions will be used to process and manipulate databases such time as the database is implemented.
Phase 3, Election DBMS
Selection databaseditentukan by several factors, including factors engineering, economics, and politics organisasi.Contoh technical factors:
The existence of DBMS in performing its duties as the types DBMS (relational, network, hierarchical, etc.), storage structures and access points that support DBMS, users, and others-lain.Faktor-economic and organizational factors that affect each Another in the selection of DBMS:
Data Structure
If the data stored in the database following the hierarchical structure, it is a kind of hierarchy of the DBMS should be considered.
Personal who has been accustomed to a system
If the programmer staff in an organization are familiar with a DBMS, then this can reduce training costs and time to learn.
Availability of the service seller
The existence of the seller service facilities are needed to help solve some of the problems of the system.
Stage 4, logical database design (model data mapping)
The next stage is to create a conceptual schema and the external schemas in the data model of the DBMS chosen. This phase is done by mapping the conceptual schema and the external schemas generated in stage 2. At this stage, the conceptual schema is transformed from high-level data model used in phase 2 into the data model of the data model of the DBMS chosen at this stage of the 3.Pemetaan can be processed in two levels:
Mapping system-independent
Mapping to the DBMS data model without considering the characteristics or special things that apply to the DBMS implementation of the data model.
Adjusting the scheme to the specific DBMS
Set the schema generated in step 1 to be adapted to the specific implementation in the future of a data model used on the DBMS dipilih.Hasil of this stage wearing commands DDL (Data Definition Language) language chosen DBMS that determines level of conceptual and external schema of the database system. But 10 in some cases, DDL commands to enter parameters so that the physical design of a complete DDL had to wait until the design phase has been lengkap.Tahap physical databasesecara can be started after the election of an implementation data model while waiting specific DBMS will be selected. Example: if it decides to use some relational DBMS, but has yet to decide a primary relationship. The design of the external schemas for specific applications can often be completed during this process.
Stage 5, the physical design of the database
Physical database design is the process of selecting the storage structures and access paths to the files database for achieving the best performances in various aplikasi.Selama this phase, designed the specifications for the database stored associated with storage structures physical, placement record and access points. Related to the internal schema (the term 3-level architecture of DBMS) .Some guidance in selecting the design of the physical databasesecara:
Response time
The elapsed time of a transaction database that is proposed to carry out a response. The main influence on the response time is under the supervision of the DBMS are: database access time to a data item designated by a transaction. Response time is also affected by several factors that are not under the supervision of the DBMS, such as scheduling the operating system or communication delays.
Space utility
The amount of storage space used by the database files and structures the access point.
Transaction throughput
The average number of transactions that can be processed per minute by the system database, and the critical parameters of the transaction system (eg used at booking a place on the plane, banks, etc.). Results of this phase is penentual beginning of the storage structure and access to database files.
Stage 6 Database System Implementation
Once the design is logically and physically complete, we can implement a database system. DDL commands in and SDL (Storage Definition Language) of the DBMS selected, collected and used to create the database schema and database files (which is empty). Now databasetersebut loaded (together) with datanya.Jika data must be changed from the previous computer system, changes in routine may be required to re-format the data that is then inserted into the new database. Transactions database should now be implemented by the programmmer aplikasi.Spesifikasi conceptually tested and linked to the program code with the commands of the embedded DML has been written and tested. One moment of such transactions has been prepared and the data has been entered into the database, the design and implementation phase has been completed, and then the operational phase of the database system begins.

Closing

So in designing the database there are 6 stages. In the design of this database is important to do as well as possible in order to produce a good system.

Computer history

COMPUTER HISTORY
Since time immemorial, the data processing has been performed by humans. Humans also find equipment mechanics and electronics to help human beings in calculation and data processing in order to get results faster. Computers that we see today is a long evolution of human inventions sejah time immemorial in the form of mechanical or electronic appliance.
    Nowadays computers and supporting tools have been included in every aspect of life and work. Computers are now capable of more than just an ordinary mathematical calculations. Among them is the computer system that is able to read the gauze supermarket shopping goods code, telephone exchange that handles millions of calls and communications, computer networks and the Internet that connects the various parts of the world.

Computer history according to the period is:
Tools and Calculators Calculate Traditional Mechanics
First Generation Computers
Second Generation Computers
Third Generation Computers
Fourth Generation Computers
Fifth Generation Computer

TRADITIONAL TOOLS CALCULATE and MECHANICAL CALCULATOR

Abacus, which emerged about 5,000 years ago in Asia Minor and is still used in some places up to now can be regarded as the beginning of a computing machine.
This tool allows users to perform calculations using sliding grains arranged on a shelf. The traders in the past using the abacus to calculate trade transactions. Along with the emergence of a pencil and paper, especially in Europe, the abacus lost its popularity.


The brass square box called Pascaline, used eight serrated wheel to add numbers to eight digits. This tool is a calculator tool based on number ten. The weakness of this tool is only limited to the sum.
    In 1694, a German mathematician and philosopher, Gottfred Wilhem von Leibniz (1646-1716) to improve Pascaline by creating a machine that can multiply. Just like its predecessor, this mechanical device works by using wheels serrations. By studying the notes and drawings made by Pascal, Leibniz can improve the tool.
    Then in 1820, mechanical calculators became popular. Charles Xavier Thomas de Colmar invented machines that can perform four basic arithmetic functions. Colmar mechanical calculator, arithometer, presenting a more practical approach in the calculation because the tool can perform addition, subtraction, multiplication, and division. With his ability, arithometer widely used until World War I. Together with Pascal and Leibniz, Colmar helped build a mechanical computing era.
    Beginning of the computer that is actually formed by a British mathematics professor, Charles Babbage (1791 to 1871). In 1812, Babbage noticed a natural conformity between mechanical and mathematical machine that is excellent in mechanical machines do the same tasks repeatedly without mistake; was mathematics requires a simple repetition of a tertenu steps. The problem kemudain grown to placing a mechanical machine as a tool to answer the needs of mechanics. Babbage's first attempt to address this problem emerged in 1822 when he proposed a machine to perform
the calculation of differential equations. The machine is called Differential Engine. Using steam, the machine can store programs and can perform calculations and print the results automatically.
    After working with Differential Engine for ten years, Babbage was suddenly inspired to start creating a general-purpose computer first, called the Analytical Engine. Babbage's assistant, Augusta Ada King (1815-1842) has an important role in the manufacture of this machine. He helped revise the plan, seek funding from the British government, and communicate the specifications of the Analytical Engine to the public. In addition, Augusta a good understanding of the machine makes it possible to put instructions into the machine and also make it the first female programmer. In 1980, the US Defense Department named a programming language ADA name as a tribute to him.
    Babbage steam engine, although never completed, seem very primitive compared to today's standards. However, these tools describe the basic elements of a modern computer and also reveals an important concept. Consisting of approximately 50,000 components, the basic design of the Analytical Engine using perforated cards (with holes) that contains the operating instructions for the machine.
    In 1889, Herman Hollerith (1860-1929) also applies the principle of perforated cards to perform calculations. His first task is to find a faster way to perform calculations for the US Census Bureau. Previous census conducted in 1880 took seven years to complete the calculation. With a growing population, the Bureau estimates that it would take ten years to complete the census calculations.


Hollerith using perforated cards to enter census data are then processed by the device mechanically. A card can store up to 80 variables. By using these tools, the census can be completed within six weeks. In addition to advantages in speed, the card serves as a data storage media. The error rate calculation can also be reduced drastically. Hollerith then develop these tools and sell them to the public. He founded the Tabulating Machine Company in 1896 which later became International Business Machines (1924) after some time the merger. Other companies such as Remington Rand and Burroghs also produce perforated card reader for business. Perforated cards used by businesses and government to permrosesan the data until 1960.
    In the next period, several engineers made other new discoveries. Vannevar Bush (18901974) created a calculator to solve differential equations in 1931. The machine could solve complex differential equations that had been considered complicated by academics. The machine is very large and heavy as hundreds of teeth and the shaft is required to perform the calculation. In 1903, John V. Atanasoff and Clifford Berry tried to make a computer that uses Boolean algebra in electrical circuits. This approach is based on the work of George Boole (1815-1864) in the form of a binary system of algebra, which states that any mathematical equation can be expressed as true or false. By applying the conditions are right and wrong into the electrical circuit in the form of connected-disconnected, Atanasoff and Berry made the first electronic computer in 1940. But they stopped the project because the loss of funding sources.


COMPUTER FIRST GENERATION
With the onset of the Second World War, the countries involved in the war sought to develop computers to exploit their potential strategic computer. This increases funding for the development of computers and accelerate the advancement of computer engineering. In 1941, Konrad Zuse, a German engineer to build a computer Z3, to design airplanes and missiles.
     The allies also made other advances in the development of computer power. In 1943, the British completed a secret code-breaking computer called Colossus to decode secret German. The Colossus's impact influenced the development of the computer industry because of two reasons. First, Colossus was not a general-purpose computer is a versatile computer), it is only designed to decode secret messages. Second, the existence of the machine was kept secret until decades after the war ended.


The work done by the Americans at that time produced a broader achievement. Howard H. Aiken (1900-1973), a Harvard engineer working with IBM, succeeded in producing electronic calculators for the US Navy. The calculator is a length of half a football field and has a range of 500 miles of wiring. The Harvd-IBM Automatic Sequence Controlled Calculator, or Mark I, an electronic relay computer. He uses electromagnetic signals to move mechanical components. Beropreasi machine was slow (taking 3-5 seconds per calculation) and inflexible (order calculations can not be changed). The calculator can perform basic arithmetic and more complex equations.


Another computer development during this period was the Electronic Numerical Integrator and Computer (ENIAC), created by the cooperation between the US government and the University of Pennsylvania. Consisting of 18,000 vacuum tubes, 70,000 resistors and 5 million soldered joints, the computer is a machine that consumes huge power of 160kW. This computer was designed by John Presper Eckert (1919-1995) and John W. Mauchly (1907-1980), ENIAC is a versatile computer (general purpose computer) that work 1000 times faster than Mark I.


In the mid-1940s, John von Neumann (1903-1957) joined the team of the University of Pennsylvania to build a concept desin computers up to 40 years is still used in computer engineering.
Von Neumann designed the Electronic Discrete Variable Automatic Computer (EDVAC) in 1945 with a memory to accommodate either program or data. This technique allows the computer to stop at some point and then resume her job back. The main key to the von Neumann architecture is the central processing unit (CPU), which allowed all computer functions to be coordinated through a single source. In 1951, the UNIVAC I (Universal Automatic Computer I) made by Remington Rand, became the first commercial computer utilizing the model of von Neumann architecture. Both the US Census Bureau and General Electric have UNIVAC. One of the impressive results achieved by the UNIVAC dalah success in predicting victory of Dwight D. Eisenhower in the 1952 presidential election.


First generation computers were characterized by the fact that the operating instructions are made specifically for a particular task. Each computer has a program different binary-coded-called "machine language" (machine language). This causes the computer is difficult to be programmed and the speed limit. Another feature is the use of first-generation computer vacuum tube (which makes the computer at that time very large) and a magnetic cylinder for data storage.


SECOND GENERATION COMPUTER
    In 1948, the invention of the transistor greatly influenced the development of computers. The transistor replaced the vacuum tube in televisions, radios and computers. As a result, the size of the electrical machines is reduced drastically. The transistor used in computers began in 1956. Another is the development of magnetic-core memory to help the development of second generation computers smaller, faster, more reliable, and more energy efficient than their predecessors. The first machine that utilizes this new technology is a supercomputer. IBM makes supercomputer named Stretch, and Sprery-Rand makes a computer named LARC. These computers, which were developed for atomic energy laboratories, could handle large amounts of data, a capability much in demand by atomic scientists. The machine is very expensive and tend to be too complex for business computing needs, thereby limiting. There are only two LARC has ever installed and used: one at the Lawrence Radiation Labs in Livermore, California, and the other in the US Navy Research and Development Center in Washington DC The second-generation computers replaced the machine language with assembly language. Assembly language is a language that uses abbreviations to replace the binary code.
In the early 1960s, began to appear successful second generation computers in business, in universities and in government. The second generation of computers is fully computer using transistor. They also have components that can be associated with the computer at this time: a printer, storage, disk, memory, operating system, and programs. One important example was the IBM 1401 is widely accepted in the industry. In 1965, almost all large businesses use computers to process the second generation of financial information.

    Program stored in the computer and programming language that is in it gives flexibility to the computer. Flexibility is increased performance at a reasonable price for business use. With this concept, the computer can print customer invoices and minutes later design products or calculate paychecks. Some programming languages ​​began to appear at that time. Programming language Common Business-Oriented Language (COBOL) and FORTRAN (Formula Translator) came into common use. This programming language replaces complicated machine code with words, sentences, and mathematical formulas are more easily understood by humans. This allows a person to program a computer. Various New types of careers (programmer, analyst, and computer systems expert). Software industry also began to appear and grow during this second generation computers.


THIRD GENERATION COMPUTER
     Although the transistors in many respects the vacuum tube, but transistors generate considerable heat, which can potentially damage the internal parts of the computer. Quartz stone (quartz rock) eliminates this problem. Jack Kilby, an engineer at Texas Instruments, developed the integrated circuit (IC: integrated circuit) in 1958. IC combined three electronic components onto a small silicon disc made of quartz sand. Scientists later managed to fit more components into a single chip, called a semiconductor. As a result, computers became ever smaller as more components were squeezed onto the chip. Other third-generation development is the use of the operating system (operating system) that allows the engine to run many different programs at once with a central program that monitored and coordinated the computer's memory.

COMPUTER FOURTH GENERATION
     After IC, the development becomes more clear that shrink the size of circuits and electrical components. Large Scale Integration (LSI) could fit hundreds of components onto one chip. In the 1980s, the Very Large Scale Integration (VLSI) contains thousands of components in a single chip.
Ultra-Large Scale Integration (ULSI) increased that number into the millions. The ability to install so many components in a chip the size of a half dime helped diminish the size and price of computers. It also increased their power, efficiency and reliability of the computer. Intel 4004 chip made in 1971, took the IC with all the components of a computer (central processing unit, memory, and control input / output) on a chip
very small. Previously, the IC is made to do a certain task specific. Now, a microprocessor can be manufactured and then programmed to meet all the requirements. Not long after, everyday household items such as microwave ovens, television sets and automobiles with electronic fuel injection equipped with microprocessors.


Such developments allow ordinary people to use a regular computer. Computers are no longer a dominance of large corporations or government agencies. In the mid-1970s, computer assemblers offer their computer products to the general public. These computers, called minicomputers, sold with a software package that is easy to use by the layman. The software is most popular at the time was word processing and spreadsheet programs. In the early 1980s, video games such as the Atari 2600 ignited consumer interest in home computers are more sophisticated and can be programmed.


In 1981, IBM introduced the use of Personal Computer (PC) for use in homes, offices, and schools. The number of PCs in use jumped from 2 million units in 1981 to 5.5 million units in 1982. Ten years later, 65 million PCs in use. Computers continued their trend toward a smaller size, of computers that are on the table (desktop computer) into a computer that can be inserted into the bag (laptop), or even a computer that can be grasped (palmtops).
    IBM PC to compete with Apple Macintosh, introduced in the computer. Apple Macintosh became famous for popularizing the computer graphics system, while his rival was still using a text-based computer. Macintosh also popularized the use of mouse devices.
    At the present time, we know the journey IBM compatible with CPU usage: IBM PC / 486, Pentium, Pentium II, Pentium III, Pentium IV (series of CPUs made by Intel). Also we know AMD k6, Athlon, etc. This is all included in the class of fourth-generation computers. Along with the proliferation of computer usage in the workplace, new ways to explore the potential of being developed. Along with the increased strength of a small computer, these computers can be connected together in a network to share a memory, software, information, and also to be able to communicate with each other. Computer network allows a single computer to form electronic co-operation to complete an assignment process. By using direct cabling (also called local area network, LAN), or telephone cable, the network can become very large.




FIFTH GENERATION COMPUTER
    Defining the fifth generation computer becomes quite difficult because this stage is still very young. Examples are the fifth generation computer imaginative fictional HAL9000 computer from the novel by Arthur C. Clarke's 2001: A Space Odyssey. HAL displays all the desired functions of a fifth-generation computer. With artificial intelligence (artificial intelligence), HAL could reason well enough to hold conversations with its human operators, use visual input, and learn from his own experience.
    Although it may be the realization of HAL9000 is still far from reality, many of the functions that had been established. Some computers can receive verbal instructions and imitate human reasoning. The ability to translate a foreign language also becomes possible. This facility looks simpler. However, such facilities become much more complicated than expected when programmers realized that human understanding relies heavily on context and understanding rather than just translate the words directly.
    Many advances in the field of computer design and technology increasingly allows the manufacture of fifth generation computers. Two engineering advances which are mainly parallel processing capabilities, which will replace von Neumann model. Von Neumann model will be replaced with a system that is able to coordinate many CPUs to work in unison. Another advancement is the superconducting technology that allows the flow of electrically without any obstacles, which will accelerate the speed of information.
    Japan is a country well known in the jargon of socialization and the fifth generation computer project. ICOT institute (Institute for New Computer Technology) was also formed to make it happen. Many news stating that the project has failed, but some other information that the success of this fifth generation computer project will bring new changes in the world paradigm of computerization. We are waiting for information is more valid and fruitful.

Source:
Sudirman, Ivan, Computer History, IlmuKomputer.com







Friday 6 November 2015

evolution of computers

The main function of the digital computer is processing the input data and produce output that can be used in a particular application environment. Physical equipment used to run the computer systems and manage the storage and flow of data and instructions along the lines of internal communication is a system hardware component. Processing hardware programmed to perform computation according to a set of rules, called algorithms (a sequence of logical steps) is used to solve a particular problem. This algorithm -a program translated into a series of directives followed by hardware in solving these problems. The program will establish a set of software system components. The study of software related to programming languages, data representation, efficient program development, evaluation software, compiler development. While the hardware includes an understanding of computer organization and the study of the physical components of the band is used to design computer systems. Hardware and software actually interrelated, and the software can not be fully understood without an understanding of the hardware, since most of the software depends on the hardware. The emphasis of the discussion in the book is focused on the hardware. Among the components (resources) we will consider at the level of functional organization is: -Processor
-Controlling input / output
-Memory Unit
-Bus (communication lines, traffic data)
-Register, adder, shifter and multiplier.
-Data representation
-Addressing schemes
-Machine language instructions
-Instruction making, execution, and decoding.
The term computer architecture and computer organization is often used as a back and forth at this level. However, that does not mean the same thing. computer architecture related to characteristics as seen by the computer programmers. While the organization's computer related to computer resources physically and with regard to its organization, its integration into functional systems, and communication control and data flow between them. In this book, the computer is considered as a system that has one or more processors that are able to translate and execute the instructions. The instructions are executed, as well as operating data, stored in the memory. Face to face between the processor and memory with external data resources or hardware peripherals such as terminals and printers, is done through the subsystem input / output (I / O). Communication between the various units, carried out by one or more system bus. The main principles of computer organization is covering the structure and organization of various units of computer and face-to-face with other subsystems. The designers of computers in making a decision always consider the form in which the program will be shown and diinteprasikan with computers, methods by addressing the program or the name of the data, and data representation. Such decisions include aspects of the storage media size, type and format of the data, a set of instructions, addressing the storage and protection, and considerations I / O and interface.
Historical Perspective
The designer of this complex system, such as a computer, must have a global view of the various functions of the system and should recognize the relationship of hardware / software. However, before starting with in-depth description of the manufacture of the block are coupled with the design process, the historical perspective of the evolution of the terms of a count. We will focus on some of the historical period and see different parts of the calculation differences that developed during this period. We will recalculate its evolution and continued through the discovery dikulminasikan on the development of electronic computers existed until now.

Thursday 5 November 2015

The definition and understanding website

1. DEFINITIONS WEBSITE OR WEBSITES


In the meaning of the WEBSITE is a collection of pages of information provided via the Internet that can be accessed around the world over
network connected to the internet. The website is a component that consists of text, images, sound animation so that it becomes a media information of interest to be visited by others.

Well from that meaning, we can understand it in a simple website that definition is any information that can be accessed by using the Internet network connection.

2. TYPES OF WEB SITE (WEBSITE)

In general, the web site is classified into 3 types: Static Websites, Dynamic Websites, Interactive Website.

a. Static website

From the word static or "alone", KI already we can see has not changed. Easy is not it?
But of course there is nothing wrong if we also know the true meaning of this statid site.
Static website is a web page that has not changed. It means to make changes to a page done manually by editing the code into the structure of the site.

b. Dynamic Website

Dynamic websites are websites that are structurally intended to update as often as possible. Usually the main addition that can be accessed by users in general, also provided a backend to edit content of the website. Common examples of the dynamic website is a news website or web portal in which there are facilities news, polling and so on.

c. Interactive Website

Website Interactive is a web when it is booming. One example is the interactive website blogs and forums. On this website users can interact and collide into an argument about what they thought. Usually such websites have a moderator to arrange for the topics discussed do not deviate from the flow of the conversation.

3. ELEMENTS OF SUPPORTING THE WEBSITE OR THE WEB SITE.

To build a more advanced website, we are also required to provide other supporting elements.
Among the elements of the website is as follows:
a. domain name

Domain Name or URL is a unique address in the internet world that is used to identify a site, or in other words, the domain name is the address used to locate a website on the internet.

b. Web Hosting

Web Hosting is contained in the hard disk space
a place to store a variety of data, files, images and others that will be displayed on the website. The amount of data that can be added depending on the size of web hosting leased / owned, the greater the greater the web hosting data can be entered and displayed in the website.

c. Pemerograman language

Programming language is the language used to translate each command in the website when accessed. This type of language is crucial program of static, dynamic or interactive website. The more variety of language programs that use it will look website more dynamic and interactive as well as look good. A variety of programming languages ​​currently has a presence to support the quality of the website.

d. Design website

essential elements and main website is design. Website design determines the quality and beauty of a website. The design is very influential to the judgment of visitors will be a great failure of a website. As well as influencing the consumer convenience or readers.

e. Publications website.

The existence seemed to lack meaning and value of their usefulness if it is built without a visited or known by the public or visitors internet. Because of the effectiveness of the site depends on the size of incoming visitors and comments. To introduce the site to the public requires a so-called publicity or promotion earlier.

Wednesday 4 November 2015

Definition, Function And Types of Computer Networks


Understanding Network

The computer network is a system that involves a series of two or more computing devices and devices - other devices made or designed to be able to work together in order to communicate, access information, ask and provide a service or services between computers with each other.

Functions and Benefits of Networking

There are so many benefits that can be felt when we have a network of computers, which are as follows:

Can Reduce Costs. with the computer network of computer buddy can reduce the cost to the needs of the device - the device peripherals, because the existing resources can be shared and used together - together, one example if we have a single printer, the printer can be used by many users or user. so my friend does not need to provide a printer for a computer.
Speeding up the process of sharing of data (shared data). Usually to share the data we use additional devices such as flash, but with the computer network, data transfer will be faster and even can reach considerable distance though. it can be easier for users to obtain the necessary data files.
Keeping information in order to stay up-to-date and reliable. As we create a computer network with centralized data storage system and a very well run on the server computer, the user can mengaskses data from different places, and can restrict access to specific data when the data is being processed.
It was some of the functions and benefits that could be gained if the buddy buddy build a computer system connected to the network. so if my friend has more than one computer either at home or office, let me try my friend network building can save the use of its resources.

Type - Types of Computer Networks

1. Based on the geographical location or range

a. LAN (Local Area Network)

Is a network that covers a small area, one example is a computer network that is within a specific school, college or office.

b. MAN (Metropolitan Area Network)

Is a network that are within one city with high data transfer speeds that connects multiple offices but still within the city area.

c.WAN (Wide Area Network)


Is a computer network covering a very wide area, one example of a WAN is a network of inter-regional, regional, city, or it could be between countries.

2. Based Functions

a. Computer Network Peer to Peer

Is a computer network model where in the network, each computer can function as a client and as a server.

b. Computer Network Client Server

Is a model of a computer network in which one computer to function as a server in the service of another computer that functioned as a client. so the computer server network model is usually designed specifically and only served as a provider of services required Client.

3. Based on the topology

a. Computer Network Topology Ring With

b. Computer Networks With Bus Topology

c. Computer Network With Star Topology

d. Computer With Mesh Network Topology

e. Computer Network Topology With Tree

4. Based Media Transmission

a. Computer Networks Using Media Cable (Wired Network)

The type of computer network that is usually used as a medium for the transmission cable media is no type of network is also called network types using the integrated transmission media (Guided Transmission Media). some cables that can be used to model such a network like this, Coaxial Cables, Cable TP (STP and UTP), and Fiber Optic Cables.

b. Computer Network Without Using Wires (Nirkable)


This type of computer network using the system as a wave of media Transmission, type of network is also referred to as the type of network that uses the transmission medium is not guided (unguided transmission media), some examples of media that can be used include: Microwave, Satellite and the Infrared Rays.

5. Based Distribution Source The data transmission

a. Centralized Computer Networks (Host Based Network)

This network type is usually made up of the client computer and the server where one client computer that serves as an intermediary to access sources of information / data coming from the server computer

b. Distributed Computer Network (Distributed Network)

One type of network is a combination of several centralized network so that there are multiple computer servers interconnected with the client and form a particular network system.