Thursday, December 2, 2010

Upload File to Server

Understanding uploading file to server
Actually uploaded no different than downloading the file delivery. Only if download is the process of sending files from the server to our computers. While the upload is the process of sending files from your computer to the server. Servers are computers that handle request (request) from client computers in this case Internet users. For example, when visiting the google example, then our computer will request to the server and the server responded by sending some data requested to be displayed by the browser on the monitor screen.

Hire Web Hosting
Server peyedia a space (space) or the hard drive to store files that we upload.

Tuesday, November 30, 2010

Responsibility Form Children Of Software Engineering

After a look around and do the survey, Department of Information applicants each year has added very rapidly. The positive side I take is, "Maybe my brothers are already aware that the technology of our country is far behind other countries with the technology." But there pulak Negative impact of increasing interest in majoring in Computer Science, namely: "Students unable Technical Information title he held accountable as the child of Information. "

The question is, why could happen like that? Things like that could happen because most of them choose majors Department of Informatics as a last resort so she can go to college. He chose engineering because the word Informatics brothers who told me he graduated from Computer Science is clear,

Sunday, November 28, 2010

Create a Database in Microsof Acces 2007

Creating a database is not an easy thing and also not a difficult thing. So what? Remember, in learning how to manage the database, skill and precision is needed. Because indeed, if we are not careful then we will enter your data can not be executed as usual. For that, before learning about the database is better that we train our skills and accuracy in data processing. I give advice like this because I've experienced it first.

Okay, in this article is where the discussion of the topic is to create a database. We can create or manage a database using software that is its function as a data processor.

Pengertian Informatika

Pada awalnya informasi disampaikan lewat percakapan langsung, pidato, atau obrolan. Kemudian
informasi disimpan dalam benruk tulisan, grafik, atau gambar, dan disampaikan secara tidak langsung. Penyimpanan ini kemudian berevolusi dengan pemakaian rekaman suaram film, dan video. Perkembangan teknologi komputer yang cepat serta integrasinya dengan teknologi komunikasi menghasilkan manajemen dan transmisi informasi dalam skala besar dan berkecepatan tinggi dan kemudian memasuki era informasi (informasi age) yang mempunyai dampak yang mirip dengan revolusi industri pada awal abad ke-20.

Sekarang ini banyak negara maju, terutama Amerika Serikat, telah menspesialisasikan diri dalam pengolahan informasi untuk tujuan ekspor. Perkembangan lalu-lintas informasi ini mencerminkan peran informatika dari masa ke masa.

Modifikasi Tampilan Blog Anda

Modifikasi Tampilan Blog,Bagaimana caranya ya? Itu merupakan pertanyaan yang sangat sering dilontarkan oleh para pemilik blog. Mungkin membuat blog di Blogger tidak asing lagi atau tidaklah sulit, karena memang hanya mengikuti prosedur yang sederhana saja kita sudah bisa membuat blog yang kita inginkan. Tetapi,bagaimana dengan memodifikasi tampilan blog kita itu? Untuk memodifikasi blog biasanya harus dibutuhkan keahlian yang cukup dalam bahasa HTML (HyperText Markup Language), CSS (Cascading Style Sheet) dan JavaScript. Untuk mempelajari Bahasa HTML, CSS, dan JavaScript dapat memakan waktu yang cukup lama. Loh,kok memakan waktu yang cukup lama ya? Ya karena kita mempelajari bahasa tersebut secara detail dan hingga kita cukup mahir agar kita dapat melakukan modifikasi tampilan blog atau template blog kita.

Thursday, November 25, 2010

Create a Personal Website

Most people if you are new to HTML so it will create a website on profile
himself. This is because he does not know what to publish. This time we
will try to create a simple personal homepage.

PREPARATION
Before doing the designing to do the following points.
  • Create a folder in the directory C: \ HTML
  • Give the name of the folder Exercise
  • Create a folder in the directory C: \ HTML \ we created a new exercise
  • Give the name of the folder image.

Wednesday, November 24, 2010

Create tabel with HTML Language

How to create tabel with html? let's try with me friend's....
Tag <table> is one tag that has the most attributes. In a tag

<table> also there are 2 tags that are essential are tagged <tr> </ tr>

to create and tag lines <td> </ td> to create columns. Tag <table>

is the tag that are important in designing a display site. So you have enough

Monday, November 22, 2010

HTML files and Meta tags

Files HTML (HyperText Markup Language): The file containing the tags Markup. In addition, according to that has been say before, that should end with an HTML file (with extensions). ".Htm" or ". Html"! The markup tags tell the web browser to display pages.
One more thing we need to know, in the form of an HTML file "file Text" (plain text file), not binary files, so it can be made by using plain text editor (Notepad). Now, through an explanation of this I say and affirm that the actual language of HTML (HyperText Markup Language) rather than a portion of the Programming Language. Therefore, I remind you again "Do not occasionally say that it is a portion of the HTML programming language."

Sunday, November 21, 2010

Reprint Articles That Will Interest Publishers

Have you been writing and submitting your free reprint articles for quite sometime now?
If so, how is your reprint rate doing? Is it doing well or is it a bit below 50%? Are webmasters approving your articles? Here are some tips on how to write effective free reprint articles that would guarantee great interest from ezine publishers and webmasters.

1. Choose a good keyword
A good keyword is your "key" to getting high reprint rates for even just a single article. Try using this tool at http://www.wordtracker.com/ to find the best keywords.

Saturday, November 20, 2010

Facilities and Terms used in the Internet

WEB, hypertext facilities to display the data in the form of text, images, sound, animation, and multimedia data others, that among these data relate to each other. For ease of reading data and information you can use a web browser like Internet Explorer or Netscape.

E-MAIL (Electronic Mail), with this facility, you can send and receive electronic mail from
other computer users who connect on the internet, and can include the files as attachments.

Friday, November 19, 2010

13 Steps to Successful Blogging

Blogs can be a very marketable and very profitable tool if used correctly. Profiting from blogs is just a matter of grabbing the attention of an audience and not doing any actual salesmen selling. In this article you will learn the 13 most essential steps to successful blogging.

1) Where to start?
You should begin your blog with a free blog hosting service such as Journal Home. I don't say that because I'm the owner, but a free blog host is very rewarding for a new blog. Starting with a free blog hosting service allows you to begin blogging instantly without having any advance knowledge of scripts, hosting, or programming.

Thursday, November 18, 2010

Data Communication between the Computers in the Network

Perhaps you wonder why computer networks are still needed, while computers are now sophisticated enough? From the early era of computer network development to date in the era of super-sophisticated computers, the answer to that question remains the same. Computer networks can increase standard and save costs.

1 Install Computer Networking Simplified

Basic steps to make a simple star topology network
a. Buy a UTP cable, cut how much  you have a computer’s.
b. Buy a hub / switch with RJ-45 port, buy a network card with RJ-45 port, and install on each computer.

Wednesday, November 17, 2010

Tips for Smart Searching Information

When you enter a keyword in the search window, the search engine will report to document may find hundreds of thousands of web pages containing those keywords though perhaps only tens of just who actually contains the information you want. So how do I obtain the information you want in an efficient and effective? You need to use strategies to narrow the search. 
Here are tips you can use.

AdSense Tips For Bloggers

If you have joined the blogging revolution that is sweeping the net, and you think you might want to make a little revenue - or a lot of revenue - from your blogging efforts, you need AdSense tips for bloggers. Blogging has opened up an entirely new way of how non-technical people interact with the Internet, and now, anyone can publish anything about any topic - without having a website - and anyone can profit without even having a product!

Tuesday, November 16, 2010

Elements of Website Development

Is it Elements Website Development? Maybe before you feel confused or wonder to yourself whether elements of the website development. But now you do not have confused or wondering to yourself, because now I will explain in detail everything about the elements of the development of the website to my friends as well.

My explanation is very, very brief, but all my friends, this explanation is an outline and explanation important of elements or website development. So, let us read and understand together in depth, but not too in yes really friends.

Monday, November 15, 2010

Network Equipment on Linux

Hai friends 4tatc all, do not feel 3 days I lay still in bed and makes me unable to write an article. Now I've recovered and now I have written articles about the network equipment on Linux. In an Ethernet network used many tools like Hub, Bridge, Repeater, Switch, Router, and others are useful for connecting existing terminals in the network. All equipment will work with Ethernet protocol.

Protocol for the network that is currently widely used is the IEEE 802.3 Ethernet protocol. This protocol uses a mechanism called Carrier Sense Multiple Access Collision Detection (CSMA / CD).

Wednesday, November 10, 2010

Do not Underestimate JavaScript

When students want to learn programming, problems often arise such as, should find its compiler, Integrated Development Environment, first. Things like this are often a barrier. Yet without the need to find actually existing toolkit that can be used to learn programming. Toolkit is a browser. In the browser there is always a JavaScript that can be utilized as a learning tool programming techniques. JavaScript is a programming language, object-oriented and dynamic. Dynamic programming languages such as JavaScript, Perl, PHP, Python, and Ruby was originally designed for the script. Now that language has increased in popularity. Many programs that had been written with static programming languages like C, C, and Java are now written in dynamic languages.

22 The Definition Of Terms in the Operating Systems and Communication

Abbreviated ARP Address Resolution Protocol is a protocol in the TCP / IP Protocol Suite responsible in performing IP address resolution into the address Media Access Control (MAC Address). ARP is defined in RFC 826.

1. DNS (Domain Name System, the Indonesian language: Domain Naming System) is a system which stores information about hostnames and domain names in the form of a database scattered (distributed database) within a computer network, for example: the Internet.

2.Nslookup is a command function is aware of information relating to a domain such as DNS Name servers and other.

How to Become a Professional Programmer?

How to become a professional programmer? Someone who can make a program called a programmer, but whether such a course with someone who can make the program without any fault on the program that was to be called a professional programmer? According to my own, the person is not worth calling a professional programmer. Maybe you are confused why I say like that. That is just my view, maybe you have a view other than mine. Okay, I'll tell someone new programmer is a professional programmer if he has the skills and perform the duties wholeheartedly and without spreading malware or viruses that can cause problems on a laptop computer or the user program.

Tutorials Server Web on Linux ( Part 2)

On previous occasions, I've written an article on Linux Web Server Tutorial (part 1). Currently I am going to continue and complete these tutorials Linux Web Server.

Configuring Apache modules
The modules in Apache is the interface where the modules determine what features will be run on the Apache Web Server. To view the modules active is to use the command:

# / Usr / local / apache / bin / httpd-l

To load the modules in apache, there are two ways:
1.Static Module
2.DSO (Dynamic Shared Object)

Tuesday, November 9, 2010

Tutorials Server Web on Linux ( Part 1)

Installation server WebPackage web server programs can we take away from the installation CD that is using the Apache Web server, namely Apache version 1.3.12. Apache Web Server package can be installed using following command:
# Rpm-ivh apache-1.3.12.rpm
When installation is complete then the files to note are:
  1. httpd.conf
  2. access.conf
  3. srm.conf
each of the above files will be discussed later.

Apache Configuration
Httpd.conf
Here are the contents of the httpd.conf file:
1.ServerType. Which describes the server configuration, whether run through inetd or run independently.

Modify the Look of Your Blog ( Blogger )

In the tutorial that I wrote this time, will discuss how to modify the appearance of our blog on Blogger. This is a modification of primary to secondary stage. If you already understand the language of HTML (HyperText Markup Language), CSS (Cascading Style Sheet), JS (JavaScript) then you can easily modify the look of your blog itself without requiring the help of the facilities already provided by other parties.

Okay, let's start our discussion of memodifakasi blog.
The first step you should do is open a browser window is where you already connect to the Internet.

Tips for Linux Installation

Where the distribution of the Most Good?
The average Linux distribution already has a very easy installation, even some of them already have a graphical interface allowing users to simply press the button next-next-next, then Linux will be installed in their system. However, before starting the installation of Linux, of course there are still some things that must be considered.

Often people who want to start to install Linux, be confused with the many types of Linux CDs on the market, which is used for the installation CD is often referred to as CD distribution or often abbreviated with the distribution.

Sunday, November 7, 2010

DOS Commands in Linux

At the time of work using the Linux console, maybe this is reminiscent of the DOS, frequent users will carry over to type DOS commands, of course, would be an error. For example the command:

# Cd ..

In DOS, this can run, but on Linux this command will generate an error message, because the 'cd' on Linux is a program, so the parameters that the program should be separated by spaces.

This can be overcome by using the alias command, his command is as follows:

List of Linux Distributions

Which fall in category Linux is a big Distribus distributions that already has many users and the general distribution, some distributions are included in this category are as follows:

ASP Linux (http://www.asplinux.ru/en/)
ASP Linux is an RPM-based distributions. RPM packaging system software is Red Hat's distribution.

Speed Tracher in Chrome Extensions

Speed Tracher an existing facility in Google Chrome to accelerate the scope as you explore the world of the Internet. Speed Tracer is a tool to help you identify and fix performance problems in your web applications. It visualizes metrics that are taken from low level instrumentation points inside of the browser and analyzes them as your application runs.
Using Speed Tracer, you are able to get a better picture of where time is being spent in your application. This includes problems caused by:

Saturday, November 6, 2010

Tips and Tricks Windows 7

Make a Quick Scan on USB Flash Disk
Full scan made by Microsoft feels old. Supposedly, it is not automatically done every time you insert a USB flash disk into the PC USB port.

To overcome this, his tips are as follows.
As the name implies, Microsoft Essentials is a complementary application windows are very important in maintaining system security. Other functions do the Full Scan automatically to a flash disk that is plugged into the PC. However, these devices are not always used in a long time. For that, change to the method of Quick Scan.

Friday, November 5, 2010

MICROSOFT OPEN-SOURCES PODCASTING

LOOKING TO BUILD ON THE SUCCES OF ITS

SharePoint collaboration software, Microsoft introduced the Podcasting Kit for SharePoint, a piece of open-source software designed to let workers record and share video and audio presentations over the public Web and intranets. Microsoft unveiled PKS through its CodePlex open-source community at the Enterprise 2.0 show June 9 in Boston. The program went into full seing June 10 with presentations from FedEx, Google, Socialtext and other players in the space. Companies use podcasting technology to provide company news, conduct employee orientations, and boost career training and e-learning.

Rob Curry, director of Microsoft SharePoint, said Microsoft's sales organization implemeted PKS internally during the past year, accesing audio or video podcast on Pcs, Windows Mobile devices,

Thursday, November 4, 2010

New Trojan Aims Banking Services

There is a new Trojan targeting banking services. His name URLzone Trojan. Application of this evil, by researchers at the company Finjan Software, the so-called "Trojan bank future generations."
This was conveyed by Yuval Ben-Itzhak, chief technology officer at Finjan. A few months ago, this Trojan has infected around 6400 computers. Within 22 days alone, URLzone Trojans have managed to steal 300,000 Euros. Cyber criminals to install URLzone by luring Internet users to visit fake websites that have been planted malicious programs. By a server located  in Ukraine, the Trojan will be installed on the computer bank account owners who visit the website.

Previously, there have been other Trojans that resembles URLzone. Among Zeus and Clamping a successful "fishing" millions of dollars per day by transferring money from the account of his victims.
However, according to Ben-Itzhak,

Dual or Quad Core

The view that gaming is an application that is not caught a single thread of influence by the number of processor cores clearly no longer relevant. Modern games are able to take advantage of every extra cores of your processor. Although not all games can perform more optimally with the number of cores is more, the current trend of gaming applications leads to more use of the main processor core. Look at the value of the test 3D Mark Vantage and Resident Evil 5 (both are applications that can utilize many processor cores) from the HD 5770 below. There, it appears that the relevant test score was higher in the processor that has more cores. 3D Mark Vantage performance recorded an increase of about 17%,

Wednesday, November 3, 2010

Brief Introduction to Cryptography and Database

Cryptography
Brief Introduction to Cryptography and Database. Cryptography talk about security or safety. In the world of technology such as this, data security is something that is absolutely where all data is stored in digital form. Cryptography is the science which studies how to disguise the message and returns it to its original shape so that when the data happens tapping, tapping party will not get the information / data the original because the original data have been disguised. This camouflage technique called encryption and decryption techniques to restore it is called.

Information System (Database)
The database is not only a collection of files. More than that, the database is a central source of data used by multiple users way for various applications. The core of the database is a database management system (DBMS),

Backup Function Does not Work

You want to do a backup, but suddenly the backup function does not work. The question arises in the self and the fear came. Question Is this a sign that your computer or laptop already infected and started to hang even come within oneself. Okay, here I will explain what the problem is happening so that backup function does not work.

PROBLEM: You want to use the backup functionality of Windows 7. Steps to be taken is to display the Maintenance Center through the taskbar and enable the "Backup and Restore". In the window "Backup Settings", click "Selected by user" and mark it in front of the "Libraries" with your personal documents. Windows started to run the

Spruce Up Your Hard Disk

Hard disk fragmentation can hinder PC performance. Therefore, do immediately the process of defragmentation. This process can make your hard disk to work as usual and was re-optimized PC.

Modern computers can finish your work faster. As time went on, now all the work orders were completed with a long time. Opening the application to be slow. Checking the folder indicated virus and copying files takes several minutes. This could be due to the hard disk is fragmented. Hard disk is fragmented, often make the performance of PC decreased. The solution, perform periodic defragmentation process. Basically,

Tuesday, November 2, 2010

Defragmentation Tools in Windows 7

Defragmentation tool that is integrated in Windows has been improved. Its performance is now more accurate, just not faster. In Windows 7, Microsoft has added new functions in defragmentation tools. By default, these tools can be operated once a week and when managing files on your hard disk, he will run in the background. Tools can also be run manually. Unlike existing defragmentation tools on Vista. In Windows 7, these tools can do the defragmentation process and partition the hard disk in parallel via the control of time planer.

Explain About Storage and RAM

StorageA PC certainly will not work if there is no storage media is inserted. Storage media such as hard disks, solid state disk, optical disk drives, and flash disk. Hard disks are very commonly used in a computer. This is due to the hard disk is now affordable. However, because it was affordable hard disk, you must be keen in buying. A 80 GB hard disk sizes are now priced more than three hundred thousand dollars. However, with the added money is less than one hundred thousand dollars, you can get a capacity four times greater. Even so, adjust your needs with prices offered by each manufacturer.

In addition to the hard disk, there is another major storage media that can be chosen, namely Solid State Disk. Solid state disk has a much faster speed,

For Personal Computer ( PC ) So Cool

For the computer enthusiast, appearance and performance of the PC may paramount. They always want to "juggle" his appearance PCs become more cool and more speeding performance. The trick? There was no other option but to PC modding.

PC Mods aka PC modding again so the trend. Demand more and more and not from among computer geeks only. Understandably, which can be modified not only jeroannya components, but also the view outside. Boost PC performance only-for example by overclocking-can we call the PC modding. Just dress up a PC with a unique chassis was already arguably the PC modding.

Forward Enterprise System to World Cloud

Microsoft Online Hosted Services Partner.
Microsoft "try their luck" by offering the latest services and first-scented cloud computing for companies in Indonesia. Put simply, the service is trying to move the system / IT services, such as e-mail service, at your company to the server (cloud) to be used online but with a guaranteed level of security. The services they named Microsoft Online Services Partner Hosted This rolling together the partners, such as AGIT, Green View, and Infinys. The model is one hundred  percent Cloud Computing hosted by Microsoft's business partners which is actually a local company to meet the needs of localization of Indonesian companies.

How to Treat Economical PDF

Many people think, high-quality PDF can only be created with Adobe Acrobat that cost enough to drain the bag. Though many freeware that can do almost as good. In the market, there are many alternatives to Adobe Acrobat, so as not to burden the wallet. At first glance, this software looks the same, because it uses open-source engine PDF GhostScript. Just a different outward appearance. With free software was actually you can still present a PDF file with compact size and appearance optimal. You can use the Open Software Office.org, where in addition to the Open Office.org is freeware,

Tips and Tricks in Windows Vista

In this tutorial, i will explain about Tips and Tricks in Windows Vista.

1. Adding a New submenu under the Send To Menu In Vista, you can easily rearrange the context of the sub-menu "Send To". That way, the context menu will appear vary their derivatives. For example, when you right click a document and then select the "Send To", you can save the document to a USB storage media
flash disk.

Adding or reset submenu from the context menu "Send To" is very easy. The first thing you need to do is access the Send To folder with the help of "Windows Vista's Shell: command". Way, click menu

Graphics Card ( VGA Card)

For those of you who like to play games, graphics cards become a vital component in your computer. High-performance graphics card with a yearning for a gamer. For graphics card add-on, you have the choice between the two manufacturers namely ATI and NVIDIA.

ATI
The presence of the latest generation graphics card from this manufacturer, ATI HD 5000 series, adds a long line of ATI graphics cards to choose from. As usual, the ATI graphics card is divided into several classes, adjusted for the performance and price offered. In the high-end graphics cards populated with high performance with a higher price. For mainstream graphics cards populated with

Application of Open Source Public

How many Open Source applications out there? The answer is a lot. In addition, of the many applications, how much do you know? Hundreds? Dozens? Beyond Linux, Apache, MySQL, PHP, GIMP, OpenOffice and Firefox, you might start to think hard to name another. Here is an Open Source Application that you have probably never heard of, but it is necessary for you to test.
dotProjectManagement tool dotProject is a Web-based project that offers features user management, trouble-ticket system (voxel.net Ticketsmith integrated), the management of client / company, contact lists, calendars, forums, permit system, and others. Protruding from the dotProject is a clean and simple interface.

Elgg
Elgg is an open source social networking platform that reinforces a number of social networking sites. With many companies moving to the

Motherboard Terminology

Motherboard terminology? Have you know what terminology of the motherboard? if you do not already know let's read together the following article. If you already know what the terminology of the motherboard, Motherboard Terminology keep reading articles that I present this.


Chipset
Chips or chipsets are small pieces of silicon that is used to store information and computer instruction. Each computer component has at least a chip in it. The chipset on the motherboard to control the basic input and output of the computer. The chipset on the video card controls the rendering of 3D graphics and picture on the

Tutorial Installation Ubuntu 10.10

In this tutorial, I shall give to friends all how will manner will do installation Linux 10.10 (maverick). Okay, in do installation  Linux bunt 10.10, we don't need capacity hard disk many. We only want capacity 10 GB. But if you want to install all programs that provided Linux, so better hard disk you that is more than 20 GB. To vga card, better we use vga card that has good quality. For example nVIDIA GEFORCE and or ATI, because at Linux we can enjoy facilities graphical unique like animation graphical.

Okay, let us begin to do installation  Ubuntu 10.10.

First step we do, insert CD installation Ubuntu 10.10 and then restart lah computer or laptop you. Necessary at look at, if you still to want to use windows system operation in computer or laptop you, you can do installation dual boot. So, you are unnecessary worries with all this.  Return to installation topic. . After you put into cd installation, so you will be aimed in process will like picture hereunder.

Thursday, October 28, 2010

Removing Impressions On Computer

You must have experienced when typing the word in google search box is the word the exit. If you're new to use computer or internet play, definitely confused how to eliminate them. After using the computer, we must leave a trail. If the trail is not too important, it would be safe. Very dangerous if the trail left by the things
very personal. Other people can open and do anything with information that we leave behind. Indeed, manually can be overcome. But, of course it will take a rather long. To save time, of course, need an application to clean up all the tracks that we leave behind after using the computer. One application that can be used for free is PrivacyMaster. This application able to clean the trail when we use windows and browsers (Internet explorer or firefox).
How to use:

Restoring Files Affected Virus

Files infected with the virus must be very annoying. For those just learning the computer, of course, will make it very panicky. Actually, the virus hides only the original files we, do not delete them. Files shown is the result of duplication created by the virus with the extensions that have been changed by it, while the original files changed its attributes into the file system so that it becomes super hidden. Although modified in the folder option to enable show hidden files and folders, but still not visible.


To view them, do the following:

  1. Open windows explorer.
  2. Click the Tools menu> Folder Options.
  3. Click the View tab. Remove the tick the Hide protected system files (Recommended).
  4. From the warning that appears, click Yes.
  5. Click OK.
  6. All files and folders are hidden viruses will be seen faintly; We can normalize all the files and folders are hidden by the virus,To restore the file, how: Remove virus with existing anti-virus, for example:

Instruction set on Computer Organization

The quintessential definition of a computer’s architecture is its “instruction set.” The actual list of things
the computer hardware can accomplish is the machine’s instruction set. Given the wide variety of computer
applications, and the sophistication of many applications, it can be surprising to learn how limited and primitive the instruction set of a computer is. Machine instructions include loading a CPU register from memory, storing the contents of a CPU register in memory, jumping to a different part of the program, shifting the bits of a computer word left or right, comparing two values, adding the values in two registers, performing a logical operation

Wednesday, October 27, 2010

About Computer Organization

Most computers today operate according to the “von Neumann architecture.” The main idea of the von
Neumann architecture is that the program to be executed resides in the computer’s memory, along with the
program’s data. John von Neumann published this idea in 1945. Today this concept is so familiar it seems self-evident, but earlier computers were usually wired for a certain function. In effect, the program was built into the construction of the computer. Think of an early calculator; for example, imagine an old hand-cranked mechanical calculator. The machine was built to do one well-defined thing. In the case of an old hand-cranked calculator, it was built only to add. Put a number in; crank it; get the new sum.

To subtract, the operator needed to know how to do complementary subtraction, which uses addition to
accomplish subtraction. Instead of offering a subtract function, the old calculator required the operator to add
the “ten’s complement” of the number to be subtracted. You can search for “ten’s complement” on Google to
learn more, but the point for now is that early computing devices

Algorithm to recognize familiar

DEFINITION OF AN ALGORITHM

An algorithm is a method for solving a class of problems. While computer scientists think a lot about
algorithms, the term applies to any method of solving a particular type of problem. The repair manual for your car will describe a procedure, which could also be called an algorithm, for replacing the brake pads. The turn-by-turn travel instructions from MapQuest could be called an algorithm for getting from one place to another.

EXAMPLE—DESIGNING A STAIRCASE
You may be surprised, as we were, to know that every staircase must be custom-designed to fit the circumstances of total elevation (total “rise”) and total horizontal extent (total “run”).

Tips and triks Fedora Core

When login forgot root password

  1. Sign in boot loader
  2. In Fedora Core. . . e type
  3. In the module. . . type e, and the end of the sentence type <space> 1, then enter
  4. In the module. . . type b
  5. In single user mode type password and enter a new password, then type exit

When login forgot password eliminated root and Linux single

  1. Sign in boot loader
  2. In Fedora Core. . . e type

Monday, October 25, 2010

More tips and triks on windows xp

4tatc and More tips and tricks on windows xp.

Unlocking WinXP's setupp.ini
============================

WinXP's setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it'll look something like this:

ExtraData=707A667567736F696F697911AE7E05
Pid=55034000

The Pid value is what we're interested in. What's there now looks like a standard default. There are special numbers that determine if it's a retail, oem, or volume license edition. First, we break down that number into

Protocols Computer and Protocol Architecture

The transfer of a file between two computers.
There must be a data path between the two computers, either directly or via a communication network. But more is needed. Typical tasks to be performed are :
1. The source system must either activate the direct data communication path or inform the communication network of the identity of the desired destination system.
2. The source system must ascertain that the destination system is prepared to receive data.
3. The file transfer application on the source system must ascertain that the file management program on the destination system is prepared to accept and store the file for this particular user.
4. If the file formats used on the two systems are incompatible, one or the other system must perform a format translation function.

 It is clear that there must be a high degree of cooperation between the two computer systems. The exchange of information between computers for the purpose of cooperative action is generally referred to as computer communications. Similarly, when two or more computers are interconnected via a communication network, the set of computer stations is referred to as a computer network. Because a similar level of

Tips and triks Computer Science



Remove the Username and picture from Windows XP New Start Menu

The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.
For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
Start Windows Explorer and go to this folder:

C:\Documents and Settings\All Users\Application Data\Microsoft\

Saturday, October 23, 2010

Tutorial how to Install Windows Vista

Before performing the installation of Windows Vista, should we check our specifications or Notebook computer first. For if our computer specs are not in accordance with the requirements of Windows Vista, the installation of windows vista that we do will be in vain.

Okay, specifications or Notebook computers are good in installing windows vista is as follows:
  1. Processor: Should the above 500 Mhz;
  2. Memory: 512 MB is already possible, but so easy to run Windows Vista should use memory that it's 1 GB and over;
  3. Hard Drive Capacity depends on what application program and how much that will be installed. Therefore, here I directly provide a way out, you should use a hard drive over 45 GB in size to drive the program;
  4. Type we need here the hard drive can be IDE and AHCI.

The fourth specification that is what we need to consider in our computer or notebook. If it has fulfilled the

Wednesday, October 20, 2010

Know Your Mandrake Linux Distibutions



Mandrake is a distro made in France that is considered most suitable for use by the users of Personal Computers (PC) in homes, because most easy to use and more user friendly than other distros. Windows users will not be difficult to adapt to Mandrake. The latest version of this module has been written is Mandrake 10.0, which has been developed in such a way that is

Saturday, October 9, 2010

The notion of informatics

Initially, the information conveyed through direct conversations, speeches, or chat. Then indormasi stored in benruk writings, graphics, or images, and conveyed indirectly. Storage is then evolved with the use of recordings suaram movies, and video. Rapid development of computer technology and its integration with the communication technology to produce management and transmission of information in large scale and high-speed and then enter the era of information (information age) that have a similar impact with the industrial revolution in the early 20th century.

Today many developed countries, especially the United States, has specializes in information processing for export. The development of traffic information reflects the role of informatics from time to time. Why science informatics or change information learned?

Understanding viruses on computers an laptops

In this article, i will write about, what is the virus? What adverse effects the virus on your computer or laptop? How does the virus work? The answer to that question i mentioned it in this article.

A virus reproduces, usually without your permission or knowledge. In general terms they have an infection phase where they reproduce widely and an attack phase where they do whatever damage they are programmed to do (if any). There are a large number of virus types. Viruses are a cause of much confusion and a target of considerable misinformation even from some virus "experts."

Outline and performance human-computer interaction

In the previous article has described the understanding and recognition of human-computer-interaction. At this time I will give a brief article about how the performance and the outline of the human-computer-interaction.
Perhaps many people are wondering, how does the performance and the outlines of the human-computer interaction? Let us consider carefully together with an outline list and following his performance.

  1. Outline the constructionist theory of perception and explain how it has influenced Human Computer Interaction designers.
  2. Outline the ecological theory of perception and explain how it has influenced Human Computer Interaction designers.

Friday, October 8, 2010

Introduction to human Computer Interaction

What the meaning of Human Computer Interaction?
Human–computer interaction is the study of interaction between people (users) and computers.
It is often regarded as the intersection of computer science, behavioral sciences, design and several other fields of study. Interaction between users and computers occurs at the user interface (or simply interface), which includes both software and hardware, for example, general-purpose computer peripherals and large-scale mechanical systems, such as aircraft and power plants.
"Human-computer interaction is a discipline concerned with the design,

Details of the test program in C programming language

On the last occasion, I've given the article how to make a simple program with C language, but then I have not provided details of the test program understanding about the commands that I use in making program. Therefore, in this article I will write down the details of the test program.

#include <stdio.h>
Tells C compiler to include the file "stdio.h" in this point of your C program before starting
compile step. This "include file” contains several definitions, declarations etc.

Full Tutorial Photoshop (in Indonesian)


Tutorial Photoshop Membuat obyek sederhana
Membuat segi empat

1. Pilih Rectangle Marquee Tool.
2. Drag-lah sehingga membentuk segi empat.
3. Untuk mewarnai segiempat tersebut gunakan Paint Bucket Tool. Caranya klik Paint Bucket Tool, lalu klik pada area segi empat tersebut (ditandai dengan garis putus-putus).  
4. Untuk membuat gambar seperti di bawah ini, caranya : seperti langkah 1 dan 2 di atas. Setelah itu klik menu Edit
> Stroke. Pada text box Widt Isi dengan (misalnya) 3. Klik OK.
   


Thursday, October 7, 2010

Create a blog/web-blog at Blogger.com

Hi guys,if today you still do not have their own web-blog, then immediately make it. Because with a blog or a web-blog we can pour our heart's content, a great ideas for making dishes, share knowledge, we can even make money through blogs. You do not need to be confused how do I create a blog and where we create a blog later. Okay, now I will give you the steps to create a free blog at blogger.com. If you watch carefully the steps to create a blog on blogger.com is well, then you can create your  own blog.

How to Add Gadget on my blog?

Welcome back my friends. At this time I will write an article about adding a gadget or a widget on your blog (Blogger). I wrote this article specifically to friends who do not know how to do add a gadget or a widget on Blogger.com. In this tutorial, other than telling me how to add the gadget, I will also explain what is the use of gadgets of every base that will be used.
To be able to add the gadget, you must first go to your blog via your blog accounts of each. Once you are logged into your blog, follow the 3 steps below that I show through pictures:

The Basics of Java Script

Preliminary
JavaScript was first introduced by Netscape in 1995. At first the language is called "LiveScript" that serves as a simple language for the browser Netscape Navigator 2. In those days a lot of criticism of this language because it is less safe, which impressed the development rush rush and no error messages in the show every time we make a mistake when preparing a program. Then, in line with being jealous of cooperation between Netscape and Sun (the developer programming language "Java") at the time, then Netscape gave the name "JavaScript" to the language on 4 December 1995.

Tuesday, October 5, 2010

History of Virus-Part 2

Elk Kloner 
In 1981, a program managed to become the first epidemic. This program is only attacking Floppy containing the Apple II operating system. This program will display a message at certain moments. 


It will of get on all your disks 
It will of infiltrate your chips 
Yes it's Cloner! 
It will of stick to you like glue 
It will from modify ram too 
Send in the Cloner! 


Programs created by a student named Richard Skrenta, called Elk Kloner. This program will be attached to the computer memory and when to find an uninfected floppy then this program will menularinya with the virus.

Set Haier C700 Smart Modem in Ubuntu 9.10


Welcome 4tatc all friends, here I will write an article about how to configure hp smart Haier C700 modem in ubuntu, I wrote this article because of my many friends who ask smart questions about the settings in ubuntu. Then I started to learn step by step and finally I found.

How do I set Haier C700 Smart Modem in Ubuntu 9.10?
To use Smart types Haier CDMA modem in Ubuntu 9.10 Karmic C700 Koala, follow these steps (copy-paste the commands here to the Terminal, the contents of the password when prompted):

Finding lost files on the computer



When the computer is infected with a virus, then the first solution is to restore the computer system. If you save a file or document of value to you in Drive C, then your data will be lost when you restore the system, because after the restore is done then your system will be back just like the first time you see your computer when you buy new.

Sunday, October 3, 2010

History of Viruses - Part I

In 1949 a creator of computer Automatic Computer Electronic Discrete variables (EDVAC), John Von Neuman reveals Theory and Organization Of Complicated Automata, a research mathematicians. At that time, Neuman thinking how to make a computer program that can make copies of itself. But these thoughts are not addressed by other math experts at the time, this is because the theory presented Neuman still considered far too difficult.

Thursday, September 30, 2010

Create a simple program with C language

At this opportunity, i will start writing articles about how to make a simple program with C language. Today i will give the script the program calculates the area of the triangle.
Note carefully script the following program:

Wednesday, September 29, 2010

Introducing The Search Engine Optimation (SEO)

Almost all the search information on the Internet will be familiar with Yahoo. If Internet users want to find the address of a website or information on the Internet, most of these users will find it in Yahoo. Yahoo! Is one search engine on the Internet that serve the search information and any data you want the Searcher. But most of these users do not know when and the origin of the search engines. This article attempts to provide information on the history of search engines, the kinds of search engines and some recommendations of some search engines that are still active today. The development of search engines came from Montreal when lan Emtage make Archie. Grandfather of all search engines are Archie created by Alan Emtage in 1990, students from McGill University, Montreal. Then the University of Nevada System Computing Service Group is building a search engine type that is named Veronica, 1993.

Monetize Your content Rich Website or Blog

Google describes AdSense as “a fast and easy way for web site publishers of all sizes to display relevant Google ads on their web site’s content pages and earn money.” The AdSense ads displayed by Google on your site are matched to Google’s interpretation of the content theme of your site. In this manner, the AdSense ads will be of interest to your site visitors looking for the unique content your site offers to them.
AdSense is a system where Google places its AdWords ads on the content pages of non-Google web sites.
It is a pay-per-click (PPC) service where webmasters are paid a portion of the revenue collected by Google from the advertisers. The advertiser pays Google a pre-determined amount each time a web site visitor clicks on an AdSense advertisement. Every webmaster with high-quality and focused web page content can monetize their knowledge and expertise by using AdSense. You need interesting and informative content on your site in order to bring free and targeted traffic to your web site and capitalize on the AdSense model.

Tuesday, September 28, 2010

Introduction The Basics of Cascading Style Sheets (CSS)

Introduction
 Ever heard the term on top? Probably most will answer, "YES!!". If not, now so already.
Cascading Style Sheets (CSS) is a style that determines how components will be displayed in an HTML browser. Cascading Style Sheets (CSS) is not much different from the HTML tags associated with layout and text formatting (Font) color barrier attributes. Style to format text in a single document or multiple documents.
Manager web page format that can be done in three ways:

  • Inline : Styles are embedded right within the HTML code they affect.
  • Internal : Styles are placed within the header information of the web page and then affect all coresponding tags on a single page.
  • External : Style are coded in a sperapate document, whic is then referenced from within the header of the actual web page. This means a single external style sheet can be used to affect the presentation on a whole group of web pages.

Monday, September 27, 2010

How to edit text with VI/VIM text editor in Linux.

On windows system you can use Notepad to edit the text with format .txt. While in Linux, to edit the text using the application VI/VIM Builder. But not everyone knows how to use VI. For that, this time i wrote down how your program how to use the VI text editor in Linux. Let's look at together.


Vi editor has many facilities that are helping programmers, but novice users because they avoid Vi editor considers it very difficult and confusing. This chapter intended to introduce the novice user to the editor Vi. Why Using Vi Here are some reasons 

Introduction of Computer Animation

Some typical applications of computer-generated animation are entertainment (motion pictures and cartoons), advertismg, scientific and engineering studies, and training and education. Although we tend to think of animation as implying obpct mot~ons, the term computer animation generally refers to any time sequence of visual changes in a scene. In addition to changing object position with translations or rotations, a computer-generated animation could display time variations in object size, color, hansparency, or surface textule. Advertising animations often transition one object shape into another: for example,transforming a can of motor oil into an automobile engine.

Friday, September 24, 2010

Apache and BIND on Slackware

Introduction
Apache is the most popular web server since April 1996. It was originally based on NCSA httpd, and
has grown into a full-featured HTTP server. Slackware Linux currently uses the 1.3.x branch of
Apache. This chapter is based on Apache 1.3.x.

Installation
Apache can be installed by adding the apache package from the “n” disk set. If you also want to use PHP, the php (“n” disk set) and mysql (“ap” disk set) are also required. MySQL is required, because the precompiled PHP depends on MySQL shared libraries. You do not have to run MySQL itself. After installing Apache it can be started automatically while booting the system by making the /etc/rc.d/rc.httpd file executable. You can do this by executing:

Sendmail on Linux Slackware

Sendmail

Sendmail is the default Mail Transfer Agent (MTA) that Slackware Linux uses. sendmail was originally written by Eric Allman, who still maintains sendmail. The primary role of the sendmail MTA is delivering messages, either locally or remotely. Delivery is usually done through the SMTP protocol. The means that sendmail can accept e-mail from remote sites through the SMTP port, and that sendmail delivers site destined for remote sites to other SMTP servers.

About Linux


What is Linux?

Linux is a UNIX-like kernel, which is written by Linus Torvalds and other developers. Linux runs on many different architectures, for example on IA32, IA64, Alpha, m68k, SPARC and PowerPC machines. The latest kernel and information about the Linux kernel can be found on the Linux kernel website: http://www.kernel.org
The Linux kernel is often confused with the GNU/Linux operating system. Linux is only a kernel,not a complete operating system. GNU/Linux consists of the GNU operating system with the Linux kernel. The following section gives a more extensive description of GNU/Linux.

Thursday, September 23, 2010

The Bash Shell

The shell is the traditional interface used by UNIX and GNU/Linux. In contrast to the X Window
System it is an interface that works with commands. In the beginning this can be a bit awkward, but the shell is very powerful. Even in these days the shell is almost unavoidable. The default shell on Slackware Linux is Bash. Bash means “Bourne-Again SHell”, which is a pun on the name of one of the traditional UNIX shells, the “Bourne Shell”. Slackware Linux also provides some other shells, but Bash is the main topic of this chapter.

Installing Slackware Linux

Slackware Linux is one of the oldest Linux distributions remaining. Over the years, it has stayed true to its roots and form.

Here's what the author, Patrick Volkerding has to say about it.

Tuesday, September 21, 2010

Explorer and File Management

This article also introduces file management techniques for better file system structure for various
purposes.
Copy, Move, Rename, Delete
As with most other features of Windows, there are many ways to accomplish the same task. This section does not aim for optimal performance, but rather a solid foundation that is helpful for other computer related activities.

Navigation
There are many ways to navigate in Windows Explorer. First, let us start Windows Explorer. You can start Explorer in different ways:

Social Security


Social Security Disability Backlogs
Statement of Sylvester J. Schieber, Chairman
Social Security Advisory Board
To the
Subcommittee on Social Security of the
Committee on Ways and Means
U.S. House of Representatives
February 14, 2007

Chairman McNulty, Mr. Johnson, Members of the Subcommittee. I am pleased to have this opportunity to appear on behalf of the Social Security Advisory Board to discuss the backlogs in the Social Security disability programs. I would like to give you the Board’s perspectives on what the situation is, how we got there, and—most importantly—what can be done about it.

Control Panel and Explorer (Win XP)

Control Panel
The control panel is the entry point to access various system level resources.

Services
What is a Service
A service an individual feature of the operating system that can be enabled or disabled. A service is often passive. Once enabled, a service responds to some “event” in the system. However, some services are “active”, and they proactively initiates operations.

Monday, September 20, 2010

DOS commands on Windows XP

Windows 3.1,95,98 and me are all DOS based, so it was appropriate to use the term  "DOS commands". However,Windows NT, 2000, XP, 2003 and Vista are all NT based, so the term "DOS commands" in this case is a misnomer.It is more appropriate to use the term "command line interface" and "command line commands" instead of  DOS commands. Anyway, this section discusses the use of DOS commands in the context of  Windows XP.

Getting Started
To start using command line commands, you need to start a command line interface (CLI). In Windows XP, this can be done as follows:

Batch Files

The previous post article discusses DOS (CLI) commands. That is a prelude to the an exceptionally useful topic: batch files and automated tasks. This is where the GUI lacks support and why skillful systems administrators are paid more.

Batch File Concept.

The term "batch" file is a misnomer. Essentially, a "batch" file is a text file that contains a number of commands, some of which you can manually type in the CLI. “Batch file” is a misnomer because the term "batch" often implies the lack of user interaction. In reality, a batch file can have basic text-mode user interaction. A more proper term is CLI scripts, or shell scripts.

Sunday, September 19, 2010

Operating System Concepts and Terminology

Operating System Concepts

 For purposes of this book, we'll consider an operating system to be the supporting software structure on which application programs run.
This support structure includes the facilities to manage the computer system's resources and any utility programs needed to maintain and configure the operating system.
The heart of system administration is configuring an operating system to create an environment suitable for the applications that the users require.

One can classify operating systems into two broad groups, early and modern, based on an analysis of three key features:

  • Ability to share CPU resources between multiple programs.
  • Methods employed to control access to system storage.
  • Methods employed to protect system and application memory from corruption.

Operating system Basic and Systems Programming

Introduction to Systems Programming with examples in POSIX

Process
A process can be thought of as a program whose execution has started and not yet terminated.
A process can be in three states:

1.Running: The process is using a processor to execute instructions.

2.Ready: The process is executable, but other processes are executing and all processors are currently in use.

3.Blocked: The process is waiting for an event to occur.
Each process uses a Process Control Block (PCB) data structure to store complete information about the process.  PCB contains the following information:

4.Process name and id, processor state (program counter, register contents, interrupt masks, etc.), process state, priority, privileges, virtual memory address translation maps, information about other resources owned by the process, etc.
 Concurrent Processes
Two processes are concurrent if their execution can overlap in time.

Operating Systems with Questions

Following are a few basic questions that cover the essentials of OS:

1.Explain the concept of Reentrancy.
It is a useful, memory-saving technique for multiprogrammed timesharing systems. A Reentrant Procedure is one in which multiple users can share a single copy of a program during the same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data for each user process must be stored separately. Thus, the permanent part is the code, and the temporary part is the pointer back to the calling program and local variables used by that program. Each execution instance is called activation. It executes the code in the permanent part, but has its own copy of local variables/parameters. The temporary part associated with each activation is the activation record. Generally, the activation record is kept on the stack.

Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute correctly on returning to the procedure.

The Role of XML and the Java Platform

Web services depend on the ability of parties to communicate with each other even if they are using different information systems. XML (Extensible Markup Language), a markup language that makes data portable, is a key technology in addressing this need. Enterprises have discovered the benefits of using XML for the integration of data both internally for sharing legacy data among departments and externally for sharing data with other enterprises. As a result, XML is increasingly being used for enterprise integration applications, both in tightly coupled and loosely coupled systems. Because of this data integration ability, XML has become the underpinning for Web-related computing.

Saturday, September 18, 2010

Backup File/Folder on Windows XP

Backup, Why?
A computer and its components will, eventually, fail. When it does, there is a possibility that all data will be lost. The cost to replace the hardware of a computer is easily estimated. However, the price of the lost data, on the other hand,can be invaluable.
Therefore, it is important to establish good habits to backup the contents of a computer. This section discusses several methods of accomplishing this.

Friday, September 17, 2010

Objects in Ada 83 and Ada 95

Two of the major goals in developing object-oriented software are cost reduction and security. They development of objects as reusable software units aids in the first, while information hiding promotes the second. When objects are created and destroyed dynamically, security update special machine architectures. The design spesifications for Ada 83 did not require object-orientation, but that all type checking and allocatin (binding) of storage for procedures be done at compile time. This is called static binding. Thus we did not find dynamic binding inheritence in Ada 8. By the time the revised standard for Ada 95 [ANSI-1815A, 1983] appeared, experience with both other object-oriented languages and with Ada suggested that security and reliability issues, important for Departement of Defense applications, would not be compromised by adding inheritence and dynamic binding to the language.

Operators of the C Language

Table Operators of the C Language.

Primary Relational
()      Parentheses

x[y]   value of yth element of array x

x.y     value of y field of structure x

Unary
x<y (<,<=,>=)   x less than y,
                                        etc. 0 if false, 1
                                       otherwise
Equality
x==y (x!=y)           x equal (not equal) y

Bitwise (in order of precedence)
!x             not x; !x=0 if x is
                nonzero,1
                otherwise
˜x              1s complement of x.
                 0s become
                 1s and 1s become 0s.
++x(--x)    x is incremented
                 (decremented)
                 before use
x++(x--)    x is incremented
                 (decremented)
                 after use
-x              arithmetic negation of x
*x             value at address x
&x            address of x
sizeof x     # bytes in x

Multiplication
x&y     bitwise and of x and y, 1&1=1,
                   else 0
x^y      bitwise xor of x and y, 1^0=0^1=1,
            else 0
x | y     bitwise or of x and y,0|0=0, else 1


Logical (in order of precedence)
x&&y  1 if both x and y are nonzero, else 0
x| |y     1 if x or y are nonzero, else 0


Conditional
x?y:z      y if x is nonzero, z otherwise

Assignmment
x*y          product (quotient) of x and y
x%y        x MOD y

Addition
x=y        x gets the value of y
xop=y    x gets the value of xopy,
              where op 
              may be +, -, *, /, %, >>, <<, &, ^,
              or |.




Comma
x+y (x-y)  sum (difference) of x
                and y
Shift
x<>y)  x gets left (right) shifted y
                       places
x,y         x, then y, are evaluated,
             expression
             gets value of y
©Hendro Sinaga www.4tatc.co.cc

C has an if  and an if....else statement, as well as repeat, while, do...while...., switch, and for statements.
An example of a C for statement is:

for (i=0;  i<5; i++)  x=i;

The first expression gives a 0 start for the loop, it terminates when i==5, and i is incremented by 1 after it is used (i++). x will be assigned successively: 0, 1, 2, 3, and 4.

Thursday, September 16, 2010

C Programming Language

HISTORICAL VIGNETTE

C (along with its extension C++) has become one of the most popular programming languages around town. It is famous for its amazing duality. It is both a high level programming language and a low level one. It is also both special and general porpose. Unlike some before him, such as the creators of ALGOL, Dennis Ritchie did not set out to develop a popular programming language. How wanted to design a better operating system.
Back in the sixties, Ritchie was a Harvard physics major. After completing his undergraduate work, he specialized in the study of mathematics, like most computer science pioneers. In 1986, he went to work for Bell Labs (now Lucent Technology) and was teamed up with ken Thompson. Thompson, who had grown up with ham radios and chess, received his undergraduate and graduate degrees in electrical engineering from the University of California at Barkeley. The two were given a compelling task: to think about interesting problems in computer science. The duo began to think about OS (Operating Systems).

Wednesday, September 15, 2010

PASCAL

HISTORICAL VIGNETTE
Complexity has and will maintain a strong fascination for many people. It is true that we live in a complex world and strive to solve inherently complex problems, which often do require complex mechanisms. However, this should not diminish our desire for elegant solutions, which convince by their clarity and effectiveness. Simple, elegant solutions are more effective, but they are harder to find than complex ones, and they require more time, which we often believe to be unaffordable. (Niklaus Wirth, Turing Award Lecture, 1984) [Wirth, 1985].

During the mid- to late sixties, ALGOL was the focus of much attention in the world of computer programming. Niklaus Wirth was in the midst of it all, working on improved version of ALGOL 60 at the ETH laboratory in Zurich. The need for a successor versions of ALGOL had become apparent after the release of the Revised Report.

Tuesday, September 7, 2010

Hardware on the Computer

Given the diversity of modern computers, it is dificult to describe a "typical" computer hardware system. However, certain features are common to most desktop machines, as shown in figure 1.1.
Although specific components and their appearance may vary from computer to computer, virtually all modern computers have the same underlying structure. This structure is known as the von Neumann architecture, named after computer science pioneer John von Neumann, who formalized his method of computer organization in the early 1950s. The von Neumann  architecture identifies three essential components that work together to function as a computer. Input/output devices allow the user to communicate with the computer by entering commands and then viewing the results. Memory stores information for the computer to process, as well as programs, or instructions specifying the steps necessary to complete specific tasks. Finally, the Central processing unit (CPU) carries out programmatic steps in order to process data. These three components are connected by buses, collections of wires that carry information in the form to electrical signals.

Monday, September 6, 2010

HTML and Web Pages

The World Wide Web is probably the most pervasive and visible aspect of computing today. Initially designed as a way for researchers to share documents over the Internet, the Web has evolved into awidespread, dynamic medium for communication and commerce. Using a problem called a Web browser, people can instanly access documents (commonly reffered to as Web pages) stored on computers around the world. Wit just a few clicks on a mouse, Web users can  read newspapers, check sports scores, send email, and play interactive games. In addition, the Web provides an easy to use interface for advertising and business transactions, as evidenced by the abundance of corporate Web addresses that appear in the televisions and print ads.

In this post, i will introduce the basic of  Web design and its underlying language,HTML. As you read, you will gain hand on experience by developing your own Web page, adding new feauters incementally as you learn. By the end of the post, you will be able to join the Web community by making your Web page publicly available. This means that anyone with a Web browser  and a internet connection will be abe to access the document you've created.

Friday, September 3, 2010

Computer Basics

The computer, at least in the form we think of it today, is a relatively new technological development. The first electroninc computers were built in the 1940s, and desktop computers accessbile be average people date back only to the late 1970s. In a very short time, computers have become integral to nearly every aspect of our society, from business transactions to personal communications. However, although many people use them for work and pleasure avery day, few have even a basic uderstanding of how computers work.
This post presents an overview of computer technology, focusing on what comuters are, how they are organized, and what they can do. The coverage is not meant to be exhaustive many of topics introduced here will be resivited in later post. However,this overview should providea framework work for understanding computing concepts as you encounter them throughtout the book, as well as making you a wiser consumer of computer tehcnology.

Thursday, September 2, 2010

Historical Vignette Ada Programming Language

In the mid-seventies the DOD, which is not known for its budgetary restraint, was spending approximately $3 bilion a year on sofware. We're all used to seeing such huge figures attached to the military, but in this case the cost was a bit too steep. Something had to be done to lower the software price tag. A large part of the problem was the fact that mire than 450 different programming  languages or incompatible dialects of the same language were being used by the military. This created problems of limited portability from machine to machine, limited reusability of procedures in subsequents programs, and general confusion. The time had come to find a standard language in which all programs for the departement would be written.

Since about 56 percent of the software purchased was used for embedded or mission-critical computer applications. "Much of the computer programming done by the U.S. military is used for controlling military hardware-tanks, airplanes, nuclear bombs. To control such hardware, a computer program must operate in "real-time," that is, while the tank is rolling or the plane is flying.

Structured Data Types

Most imperative languages provide some support for structured types. Users may be able to define their own types, and this can create more meaningful programs. Various types can be combined to create aggregate types, composed of elements of other types, such as arrays and records.
Most programming Languages have at least one built-in type, although there are typeless languages, such as APL and MUMPS, where data objects can be coerced automatically from one type to another. Even here, the programmer is thinking and the program operating on some sort of structured type.

Wednesday, September 1, 2010

Blinding On Programming Languages

The blinding of a variable is the assignment to its attributes: names, addres, type, and value. In order to properly understand the semantics of a language, one should know the binding time of the attributes, whether it is associated at compile, load, or run time. The program source code is converted into machine code at compile time. At load time the relocatable machine code addresses are assigned to real addresses. Associations that occur during execution are said to occur at run time.

A static binding is one that occurs prior to run time and remains fixed troughtout execution. A dynamic binding is one that normally occurs or can change during run time.

Tuesday, August 31, 2010

Variables On Programming Language

When writing in machine code, machine addresses are used to specify where items are to be stored. The programmer has to keep track of what type of object a storage cell contains. Extending this somewhat, a variable provides an abstarction for this notion. A we shall describe shortly, a variable is bound to a tuple7 of attributes: (name, address, type, value). Other important concepts include the scope and the lifetime of the variable, as well as issues of the time of binding, scoping rules, and type checking.

Identifiers

Identifiers or names are not used for variables only. In a program, names may be as signed to such things as procedires,labels,types, and more.
While early languages permitted only single characters as names, most ALGOL like languages permit some string of letters and digits. The string starts with a letter to prevent syntatic confusion, as, for example, between a name like 10x and the integer 10. Names in COBOL, early versions of FORTRAN (through FORTRAN-77), and PL/I were restirected to uppercase letters, but mixed case is normal for many languages. One must be careful to check language rules, however. For example, a FORTRAN-90 compiler may recognize lowercase letters, but is not required to, so continued use of uppercase is common.

Sunday, August 29, 2010

C and UNIX

As we have seen, C is intimately related to the UNIX operating system, whic is written almost entirely in C. UNIX is composed of a kernel, one or more shells, and a large set of service routines. The kernel is small, about 10,000 lines of code, which creaters a virtuals machine that:

  1. Schedules, coordinates, and manages procces execution
  2. Provides system services such as I/O
  3. Handles machine-dependent hardware operations [Silvestre, 1983]
All but the set of machine primitives tailored to the particular computer on which  UNIX is running are written in C. The user rarely sees the kernel, but interacts with the set of procedures comprising one of the shells.

A UNIX system provides a variety of utilities such as editors, debuggers, and preprocessors as well as compilers for BASIC, FORTRAN, RATFOR, PASCAL (at least in the Barkeley version),C, and Assembler. Source code in any of these languages is first translated into C intermediate code before being translated into Assembler, relocatable object, and finally executable machine-language code.

Thursday, August 26, 2010

Variables and Data Types

Imperative Language provide an abstraction for machine code. Variables act as abstractions for memory cells, with names replacing references to machine address. The entry in a cell is associated with some types. Computer languages generally provide some primitive data types, such as charachter and integer. In many cases the data may take some structure, such as an array or record, so such capabilities are also generaly supported.

A variable must be found to the properties associated with it. Aside from its name and associated address, it should be bound to some type and a value. The time of this binding, whether during compilation or execution, becomes important in understanding a language. When we add functions and procedures, we must consider also the scope and lifetime of these variables.

Microsoft Windows and the security

Microsoft Windows is a family of proprietary operating systems most commonly used on personal computers. It is the most common family of operating systems for the personal computer, with about 90% of the market share.Currently, the most widely used version of the Windows family is Windows XP[citation needed], released on October 25, 2001. The newest version is Windows 7 for personal computers and Windows Server 2008 R2 for servers.

Defining a site in Dreamweaver

Dreamweaver defines a site as a set of linked documents with shared attributes, such as related topics, similar design, or shared purpose. A site would normally consist of the files associated with a web address. The site manager is the tool used for crating and managing the site structure. It provides for the creation of a remote site on a file server and a duplicate of the remote site on a file server and a duplicate of the remote site on a local computer.

Wednesday, August 25, 2010

Dreamweaver Introduction to web design




Macromedia's Dreamweaver is a professional hypertext markup language (HTML) editor for visually designing and managing websites and pages. A visual web editor is a tool that enables the devloper to create and edit Web pages while being able to see what they will look like as they are created. Dreamweaver is a product of Macromedia, whic has a tradition of creating software tools to help developers create media rich content for their Web pages. Macromedia offers other products such as as Flash, Authorware, and Fireworks. All of these products are geared toward high-end, professional Web page design.

Dreamweaver was introduced in 1997 and is currently available as version 4.0.
Dreamweaver 4.0 was created to meet the needs of variety of types of users, and has powerful capabilities foe professional web page design and developement. It includes features such as :

  • Support for  cascading style sheets (CSS).
  • Support for JavaScript and JavaScript debugger.
  • Support for XML and other advanced HTML tools.

Monday, August 23, 2010

Find IP and MAC address on windows 95/98/ME

Find IP and MAC address on windows 95/98/ME
  1. Click the Start menu button on the Windows taskbar.
  2. Click Run... on this menu.



  • In the text box that appears, type winipcfg. The "IP Address" field shows the IP address for the default network adapter. The "Adapter Address" field shows the MAC address for this adapter.



  • Use the drop-down menu near the top of the window to browse address information for alternate network adapters. Computers installed with VPN software or emulation software will possess one or more virtual adapters.


Tips: