Wednesday, 25 April 2012

Local fruit Indonesia and Benefits

Local fruit Indonesia

Indonesia Various local fruit is fruit that has a delicious flavor. This fruit is a type of tropical fruit. It turns out a variety of local fruit is delicious to eat but has many benefits even for health. Here are some of them.

Sapodilla 
Brown is one common type of skin color is given for those who have slightly darker skin. This is not surprising because the skin and flesh colored chocolate brown with a very sweet taste. Rich in carbohydrates because the 20% portion of the sugar. Sapodilla contains vitamin A, vitamin B, vitamin C and potassium is high, so good for maintaining healthy blood vessels.

Persimmon
Persimmon is a fruit which is like wearing powder, because there is a section on the skin as white powder. Can be used to maintain dental health as it contains fluoride and is useful for maintaining healthy gums and mouth.

Grapefruit
Grapefruit has a thick skin and like a sponge. Shaped like an orange, but in a larger size and white or pink. Flavonoids, pectin and lycopene are compounds contained therein. Serves to lower cholesterol, prevent anemia and reduce the risk of heart disease. In addition, the skin of grapefruit can be made into a variety of interesting crafts.

Rose water Rose-water with red or green color is typical. This fruit contains a lot of water.The fruit is eaten with the skin is rich in vitamins A, C, calcium and protein. The benefit to keep skin moist and fiber for digestion.

Red Guava
Guava is a fruit with vitamin C content is very high-calcium, iron, phosphorus, vitamin A and B1. We recommend that you eat of it with the skin because the meat near the skin that contain vitamin C at most.

Burmese
Burmese is a fruit with a small round shape and has a flesh that tends to clear. Have many minerals such as calcium, phosphorus and iron. Useful for treating diarrhea and digestive system.

Carambola
Starfruit is the name in English. This star fruit is a five-point star-shaped. The content of vitamin E in it beneficial for the skin beauty. The fruit is also believed to lower blood pressure in hypertensive patients.

Mangosteen
Tic-tac-tic mangosteen. This fruit is often used as material for the tic-tac-guess the total contents in it. Although his skin is black, but the meat is white and has a huge benefit for antioxidant, antibiotic and antiviral high. This fruit can ease fatigue and vertigo problems.

Soursop
Soursop usually eaten with added sugar, syrup or juice made. His skin is green and white meat. Benefits as a regulator of blood sugar levels and fight bacteria in the body.

Salak
Salak barked species in Indonesia are known to have the best quality. The taste is sweet and crisp enough to make this fruit is preferred. Brown scaly fruit can relieve a waste water continuously. It is well that should make you not to consume too much, because you might be difficult to urinate.

Cryptography
Cryptography fruit with characteristic hair can be found easily on the season. The fruit is sweet like white kids to adults. Antioxidant content in meat is very large, so it is good for health. One that has a delicious flavor is rapiah rambutan.

Nanas 
The flesh is yellow pineapple with sweet and sour taste, became one of the favorite fruits in a salad. The benefits of pineapple, among others, may be helpful in narrowing the blood vessels are covered in fat, aids digestion and is useful for those of you who are dieting.

Papaya
Papaya has an orange-colored flesh and black seeds of small round object. Beta-carotene is the highest nutrient content in it. It also can inhibit breast cancer cell growth.

Mango
One of the fruit is much preferred the mango. The fruit is usually desirable young pregnant women because it tastes sour. But, if it has matured, yellow flesh will taste sweet because the sugar content is high enough. Beneficial for skin health and controlling blood pressure.

In addition to cheaper, enjoy the local fruits become one of the variations in enjoying the fresh fruit. So, do not hesitate to taste the freshness of fruits and feel the results of their own country as well kenikmati benefits.

Friendly With Fat

Fat

Hearing the word fat, one's mind is usually thought of in the fat body or illness. Things like this are not entirely true, because the fat is still needed by the body. Fat still have benefits for the body, especially for children and active in its infancy, is also needed in the formation of fat cells and helps to menadi cells flexible so it can absorb nutrients properly. With adequate nutrition, children will be the maximum in the growth and development.Consumption of fat the body needs as much as 15% -30% of food consumed. benefits for the body fat such as a carrier of some vitamins such as vitamin A, D, E and vitamin K. Another benefit is the fat as an energy source, protecting the body from the cold and protect the human body organs from damage. Thus, it is necessary body fat, another reason we need to consume fat is because fat can not be generated solely by the human body, so that the food be a source of fat intake for the body. To mandapatkan benefits of fat, then that should be consumed more fats fine. Here are the types of fat contained in food:

Monounsaturated Fatty Acid (MUFA) 
Also known by the name of a single bond in unsaturated fats. These fats are beneficial for both the body and can be consumed every day. This type of fat found in nuts such as almond, avocado and olive oil.

Poltunsaturates Fatty Acid (PUFA)
Other terms are the double bond in unsaturated fats. Fat is also good for the body. PUFA also consists of essential fat omega 3 and 6 are good for brain cell development and in children. Fish, fisheries such as salmon, tuna, mackerel and snapper are the source of PUFA in addition there is also the preparation of soy such as tempeh, tofu, as well as on the touge and avocado.

Saturates Fatty Acid (SAFA)
Are bad fats that can cause various diseases. Also referred to as saturated fat.This type of fat if consumed in excess can cause a buildup of fat in the blood vessels so that blood flow is blocked. The resulting disease can include coronary heart disease, hypertension, and hypercholesterolemia. Some foods that contain saturated fat include chicken skin, coconut, and fried foods. Because of bad health, consumption of SAFA should be minimized.

Fat is not the food should be avoided altogether. Mengkosumsi a balanced fat and more unsaturated fat consumption can be done to keep the body and get good nutrition helps the body stay healthy.

Diet tricks Success Without Tortured

Healthy Diet
By following the practical steps, you can run the program your diet without feeling tortured.What are the tricks that a healthy diet does not make you miserable?

Drinking Water
 Drinking water can reduce feelings of hunger, you can try drinking a glass of water before a tempting desire for snacking. Hunger can be reduced with the consumption of water, eating the results was reduced. In addition, water can dissolve fats in the body, so taking it very good for health.

Display Your Healthy Foods
 Putting healthy foods such as fruits or vegetables in an easily visible will allow you to reach them. For example, by putting it in the middle of the refrigerator, otherwise the position of cheese, biscuit, soda or other calorie-rich foods can be put in place that are less visible.

Add Healthy Foods in dish
 Try adding the vegetables on your plate. It's okay to occasionally enjoy a meal at your favorite restaurant, but do not forget the message portion of salad as a complement. Vegetables rich in fiber that can make your stomach feel full, so no charge to continue to be filled.

Enjoy Food
 Those who love to eat quickly tend to be fatter faster. This is because if men eat slowly and enjoy the food, it will give enough time for the body to signal satiety to the brain so that the portion of the food you eat less. Also avoid eating, talking or watching television. Habits like these will make you eat more meals.

Create Food Notes
Record any food you already eat can help you be more careful for any food to be eaten again. It will also help avoid "missed" the high-calorie foods that enter the body. Note should be made ​​accurately and completely. Write down everything you eat smaller portions including two biscuits as well as all the toppings of food eaten. For example, when you eat bread, topping record what was used. Also take note of how many servings you eat. By the record, can be analyzed what was about to make you gain weight.What must be remembered in a diet is the need to be realistic. Do not expect to go down too much in the short term. With a calm mind and apply these practical tricks to make you not afraid when it comes to diet programs.

Brief of Asthma

Asthma is a symptom caused by airway abnormalities in the form of increased sensitivity to stimulation from the environment as a trigger.

Triggers of these symptoms can be fatigue of mind (emotional distress), physical fatigue, changes in living environment that is not expected (weather, humidity, temperature, smoke (especially tobacco) and the odors that stimulate), airway infections, particularly influenza disease specific, and an allergic reaction from materials terhirup or eaten.

rate sensitivity of airway symptoms are starting from mild symptoms (too cold / sneezing or coughing often recur / relapse) until the symptoms of a severe form of asthma (trouble breathing). This is actually the background of marked allergic reaction.

emergence of some symptoms of the sensitivity of the canned form / can be expressed by the patient usually begins from the time children. About 50% of symptoms will heal by itself, even at a time these symptoms will appear again on the level of symptoms that are often given more weight the term asthma. About 55-6 -% of disease in respiratory allergy can be reduced to the children or grandchildren and the rest is caused because of a less polluted environment to live or have yet to get attention, because the new symptoms appear after adults is not because it's an odd thing.

Cause:

Basic problems in asthma lies in the respiratory tract abnormalities are turned away the reaction / inflammation (caused by allergic reactions) caused by exposure to substances such as:

1 . dust in the house dust is derived from cotton mattress (especially long), carpets, sofas, old clothes stored in closets, ceiling roof, buku-buku/kertas old records, etc. .
2 . Raw foods, especially species of marine fish, cow's milk, eggs, chocolate, nuts, etc.. (Being the makann material that has characteristics that irritate al spicy, cold, sticky, sweet / sour, salty, etc.. Not the cause but the trigger).
3 . environment, among others feathers originating from agricultural material (pollen, hay, straw, bagasse, etc..), a material derived from feathers and bird droppings and pets.

Sunday, 22 April 2012

Install Windows 7 With Falshdisk

How To Install Windows 7 with a stick.


Maybe my friend is no stranger to listen to the words of people about How To Install Windows 7 with a stick. But my friend does not know how or maybe my friend does not want to know, which is important atai laptop netbook OS already installed his friend. Need friend know, science is very expensive you know, it emang bener. Well, of course, especially for my friend who has a netbook or laptop, it's good to know How To Install Windows 7 with a stick. This is very important, considering the money we spent if the OS is broken, but only takes a few minutes to install the OS on a netbook or a laptop, depending on the computer spec.
HOW TO INSTALL WINDOWS 7 WITH FLASH



This method is actually used for the netbook with no CD or DVD-ROOM, but the use of flash is much easier and can reduce the risk of failure in the installation process. Although we have been there on PC DVD-ROOM, no one we use for installation Flshdisk because in addition to more convenient and simple, the risk of failure we can also minimalisirkan.

However, before I will briefly describe the advantages and disadvantages of windows 7:
Advantages:

1.The boot / shutdown faster
2.Power consumption CPU, hard disk (HD) and system memory required fewer service
3.Prefetching optimizes both for HD and SSD
4.Better view in terms of three prominent demensinya
5.Features sekurity really tight.

Weaknesses / Cons:

1.Some applications can not operate on Windows 7
2.Bug in Windows Media Player 12
3.There is hardware that can be immediately recognized in Vista, but not in Windows 7
4.Difficult to force the software that previously could be forced to install on Vista, also installed in Windows  XP

Well, if my friend already knows everything, then we proceed to the installation phase of Windows 7 OS.

The first step is to do my friend Download : Tool Install Windows 7 Via Flashdisk

Needed for the next Install Windows 7 via flash are:

1.FlashDisk with a minimum capacity of 4 GB depending on who you use windows 7.
2.Master Windows 7
3.Software WinToFlash.
4.ROOM DVD as a media master copy of Windows 7. [Not optimal]

Furthermore, the process of making a bootable Windows 7 USB Drive can be started with the following steps:

1. Insert your Windows 7 DVD
2. Open the Windows WinToFlash 7.rar and click on the file 2x WinToFlash.exe
3. Next will come out look like below and click Accept

4. In the view below please click the button " Checklist "Windows setup wizart transverse

5. In the view below please click the " Next » "

6. In the view below, there are two options:
  • In the Windows file path please select the source OS Windows 7 
  • On the USB drive please select FlashDisk to be used for the installation of OS Windows 7 
7. After that click " Next » "

8. Next select accept the terms and click continue.
9. If there is a warning to FlashDisk format and click Ok

10. WinToFlash will transfer the installation file to FlashDisk windows and it was rather a long process so be         patient waiting for him. After the transfer is complete click the Next and Exit

Early stage to make a bootable Windows 7 USB drive we've done, then we will install Windows 7 with a stick as a device.

HOW TO INSTALL WINDOWS 7 WITH FLASH 

1. 
The first step you should do is make sure my friend from my friend in the computer BIOS boot setting for 1st Boot Device options are Removable Dev. or USB. Drive . How, when the computer has restarted and we will come back to life, immediately press the Delete and the tab Startup 1st Boot Device to select Removable Dev. or USB. Drive . After that press the F10 to save and exit. Not all PC or Netbook have to do the settings like this. Most Netbooks now be automated if we plug in a USB Boot. 

2. Then press any key to boot usb.
3. You should see the image as below:

4. Select Indonesia on  Language, time, currency, and location

5. Press the Install Now

6. Wait a few moments of this process.

7. Check the I accept the license terms for the approval of the use of windows 7 and then click Next

8. Just select Custom (advanced) to select the drive where Windows 7 will be installed

9. My friend can set up partitions on the drive at the same time this step, I recommend at least 2 buddies divide the hard disk drive, one to drive for windows 7 (C) and one drive for data (D) by selecting the drive option, or just press the next will mate with the assumption partition the hard disk after installation of windows 7 is complete.

10. Wait until the process is complete



11. Windows will automatically restart.

12. After the restart will appear below the image.

13. Wait for the process of setting up the services are just a few moments.

14. Installation will proceed automatically.

15. Enter your User Name and Computer Name mate at will.

16. If you need to type the password passtwordnya 2 times or empty it if my friend does not want mempassword user friend.

17. Enter the product key serial number windows 7 activation friend or leave blank to delete it after installation and ceklisnya.

18. Choose the level of security protection from Microsoft.

19. Set the time zone buddy (for Indonesia +7 from GMT).

20. Set the type of network buddies are using. (If connected to the internet)

21. Wait a few moments to set up a configuration that has been my friend set up.

22. Congratulations, pal windows 7 ready for use.
Hopefully this short tutorial on How To Install Windows 7 with a flash is useful for readers pal.
Source-komputer.com tips

Friday, 20 April 2012

BIOS Beep Code and How to Solve Problems

BIOS stands for Basic Input output, the system is designed for the first time once run by the PC is turned on. Initial function of the BIOS is to identify, test, and initialize the hardware installed on the PC such as VGA Card, CD / DVD ROM, hard disk, memory and other hardware on the computer. When the computer is turned on, the computer will play a single beep (in some computer with the type of BIOS may beep twice) and continue with the normal process, but if there is a problem in computer hardware, the bios will play the sound bib as error codes, the number of long or short sound and the sound of bib is a hardware error codes from the installed on the computer. BIOS is most often used is AMI BIOS, AWARD, IBM and PHOENIX.
The error code in the BIOS is characterized by long or short beep or a combination of sounds.With the software "Beeb Rizone Viewer" you can easily figure out the problem on the computer hardware to listen to the beep in the BIOS. Software Rizone Beeb Viewer is free software and software-compatible. The software is portable, contains complete information about the meaning of the Beeb sound on your computer and there are also several types of bios that usually circulate for several types of motherboards.
You can download the software here first Countermeasures If you make Is Computer Beep Codes: If the sound is heard, meaning there is an error after adding new hardware Unplug the hardware to determine the cause of the problem. If after removing the hardware and your computer is working normally, it means that your computer is not compatible with the hardware. Release, the CD / DVD, floppy disk or USB (if any) of the connection to the motherboard and then reboot your computer, if you no longer hear a beep, connect one by one device and boot your computer again. If when you install the sound device bib on when the computer is booted, this indicates the equipment was damaged, try doing the repair (service) or replace with new. 
Make sure all the fans on the computer running well. If the fan fails to work on your computer can lead to overheating (processor hot). Fan fails to work can cause the computer can not reboot. Remove the card any card that is installed on the computer, such as video card, LAN card, sound card or other and put one by one, until you find a damaged card. If all four of the above does not work check the power supply or motherboard, there is the possibility of a weaker component. If after doing all the above methods the error still appears, perhaps the motherboard, PSU, RAM or VGA cards on your computer one of them is damaged, you must replace the component or bring your computer to the service

Tuesday, 17 April 2012

algorithms and programming

The algorithm is a sequence of logical steps solving the problems systematically and logically arranged. " Logical word is the key word in the algorithm. The steps in the algorithm must be logical and must be determined is false or true. In some contexts, the algorithm is the specification of the sequence of steps to perform a specific job. Consideration in the selection algorithm is, first, the algorithm must be correct.
This means that the algorithm will give the desired output from a given input. Indifference as good as any algorithm, that gives a wrong output, the algorithm is certainly not a good algorithm. second consideration to note is that we need to know how well the results achieved by the algorithm. This is important especially in algorithms to solve problems that require approximation results (the results of only approach).
A good algorithm should be able to provide results as close as possible to the actual values. Third is the efficiency of the algorithm. The efficiency of the algorithm can be seen from this that the efficiency of time and memory. Although the algorithm gives the correct output (closest), but if we have to wait for hours to get the output, the algorithm is usually not going to wear, everyone wants a fast output. 
So is the memory, the greater the memory in use then the poorer algorithm. In fact, each person can make a different algorithm to solve a problem, although there is a difference in developing the algorithm, we would expect the same output. If it does, look for the most efficient algorithms and fast.

flowchart in the payment of fuel

flowchart for calculating the average

flowchart for calculating the distance between two points

flowchart to calculate or find the volume of the ball

flowchart to calculate area of ​​triangle

flowchart to compute the powers

flowchard to display the conversion rate by day

flowchart for the conversion rate to the letter

RECORD/STRUCT

Dalam bahasa pemrograman C++,record disebut dengan struktur.Struktur bermanfaat untuk mengelompokkan sejumlah data dengan tipe yang berlainan.Sebagai contoh perhatikan berikut ini:

struct data_tanggal
{
};
int tahun;
int buan;
int tanggal;

Struktur diatas bernama data_tanggal,yang tersusun atas 3 unit penyusunnya yaitu tahun,tanggal,dan bulan.Setelah dibuat struktur tanggal,selanjutnya struktur tersebut dapat digunakan sebagai tipe data suatu variabel,dalam hal ini disebut tipe data abstrak.

contoh:

#include<iostream.h>
#include<conio.h>
void main( )
{
struct data_tanggal
{
int tanggal;
int bulan;
int tahun;
};
data_tanggal tanggal_lahir;
tanggal_lahir.tanggal = 1;
tanggal_lahir.bulan = 9;
tanggal_lahir.tahun = 1992;
cout<<tanggal_lahir.tanggal<<'/'<<tanggal_lahir.bulan<<'/'<<tanggal_lahir.tahun;
}

[C + +] Function Declarations and References in C + + Programming

Pengantar Fungsi

Sejumlah fungsi berisi sejumlah pernyataan yang dikemas dalam sebuah nama.
Tujuan pembuatan fungsi:
Memudahkan dalam mengembangkan program.
Menghemat ukuran program.
Fungsi merupakan kunci dalam pembuatan pemrograman terstruktur.
Fungsi dapat dipanggil beberapa kali di beberapa tempat dalam program.
Deklarasi Fungsi (Prototipe Fungsi)

Bentuk:

nilai_balik nama-fungsi(arg1,arg2,…);
nilai_balik berupa tipe data dari nilai yang dihasilkan.
nilai_balik harus ada. Jika fungsi tidak menghasilkan nilai apapun maka nilai_balik diisi dengan void.
arg tidak harus ada.

Diperbolehkan untuk menyertakan nilai bawaan.
Definisi Fungsi

Bentuk:
nilai_balik nama-fungsi(arg1,arg2,…) {
//isi fungsi
}
Isi definisi fungsi adalah perintah-perintah yang akan dijalankan ketika fungsi tersebut dipanggil.
Contoh Definisi Fungsi

Referensi
Referensi digunakan untuk memberikan nama alias dari suatu variabel.

Bentuk:

tipe _data &ref = nama_variabel;

Setelah itu, ref menjadi nama alias dari nama_variabel. Keduanya menunjuk ke memori yang sama.

Contoh Referensi

int i;
int &r = i;
i = 10;
cout << “i = “ << i << endl;
cout << “r = “ << r << endl;
r = 55;
cout << “i = “ << i << endl;
cout << “r = “ << r << endl;

Fungsi dengan Argumen Referensi
Dengan menggunakan argumen referensi maka suatu argumen fungsi dapat diubah nilainya dari dalam fungsi.

Contoh:

void tukar(int &a, int &b) {
int tmp;
tmp = a;
a = b;
b = tmp;
cout << “tukar() : a = “ << a << endl;
cout << “tukar() : b = “ << b << endl;
}

Iteration

1.Perulangan FOR
Statement FOR digunakan untuk menyatakan perulangan(seperti pascal).
sintaksnya:
for (ungkapan1; ungkapan2; ungakapan3)
{
.
.
}

-Ungkapan 1 merupakan statement awal (inisialisasi)
-Ungkapan 2 merupakan kondisi/syarat perulangan dilakukan
-Ungkapan 3 merupakan statement control untuk perulangan

2.Perulangan WHILE
Statement WHILE juga digunakan untuk menyatakan perulangan.Penggunaannya mirip pada pascal.
sintaksnya:

while (kondisi)
{
.
.
}

Jika sampeyan(anda) menggunakan WHILE, pastikan bahwa suatu saat bagian kondisi sampai bernilai FALSE.Apabila tidak,proses perulangan akan terus berjalan selamanya.

3.Perulangan DO...WHILE
Perintah DO...WHILE hampir sama dengan WHILE sebelumnya brow.Untuk sintaksnya berikut:

do
{
.
.
}
while (kondisi);

Perbedaan dengan WHILE sebelumnya yaitu bahwa pada DO WHILE statement perulangannya dilakukan terlebih dahulu baru dicek kondisinya.Sedangkan WHILE kondisi dicek dulu baru kemudian statement perulangannya dijalankan.Akibat dari hal ini adalah dalam DO WHILE minimal terdapat 1X perulangan.Sedangkan WHILE dimungkinkan perulangan tidak pernah terjadi yaitu ketika kondisinya langsung bernilai FALSE.

examples of repetition program

Program sederhana penjumlahan dan pengurangan diulang kembali,

#include <iostream.h>
#include <conio.h>
int main()
{
int a,b,x;
char n;
eroel:
cout<<"masikkan nilai a = ";
cin>>a;
cout<<"masukkan nilai b = ";
cin>>b;
x=a+b;
cout<<"hasil penjumlahan = "<<x<<endl;
x=a-b;
cout<<"hasil pengurangan = "<<x<<endl;
x=a*b;
cout<<"hasil perkalian = "<<x<<endl;
x=a/b;
cout<<"hasil pembagian = "<<x<<endl;
cout<<"ulangi program [y | n] ";
cin >>n;
if(n =='y' || n=='Y')
goto eroel;
else
cout<<"thanks";
system("pause");
return 0;
}

flowchart showing number N-1 dg number of right

for example we have input the number 5, then ouputnya: 4,3,2,1

program with the word flip-recursive iterative looping

#include <iostream.h>
#include <conio.h>

class Balik{
friend istream& operator>>(istream&, Balik&);
friend ostream& operator<<(ostream&, Balik&);
public:

void balik_kata();
void balik(int s);
private:
char kata[50];
int n;
};
void Balik::balik_kata(){ //interatif
cout<<"Masukkan Kata : ";
cin>>kata;n=strlen(kata);
cout<<"Hasil Kata : ";

balik(n);
}
void Balik::balik(int s){ // rekursif
if (s != -1){
cout<<kata[s];
balik(s-1);
}
}
int main()
{
Balik X;
X.balik_kata();
system ("Pause");
return EXIT_SUCCESS;

}

Determining Program Square / Rectangle In Class

#include <iostream>
#include <string>

using namespace std;

class bangun {
friend istream& operator>>(istream&, bangun&);
public:
void menentukan();
private:
int a,b;
};

istream& operator>>(istream& in, bangun& masukan){
cout<<"Masukan a = ";
in>>masukan.a;
cout<<"Masukan b = ";
in>>masukan.b;
}
void bangun::menentukan(){
if (a==b)
cout<<"Bangun itu adalah Persegi"<<endl;
else
cout<<"Bangun itu adalah Persegi Panjang"<<endl;
}
main()
{
bangun X;
cin>>X;
X.menentukan();
system ("Pause");
return 0;
}

leap year program using the function method

#include <cstdlib>
#include <iostream>

using namespace std;

void proses(int tahun){
char *hasil;

if(tahun%4==0){
hasil = "Tahun Kabisat";
}else hasil = "Bukan Tahun Kabisat";

cout << "Tahun " << tahun << " adalah " << hasil << endl;
}
int main(int argc, char *argv[])
{
int tahun;
cout << "Menentukan Tahun Kabisat" << endl;
cout << "Masukkan Tahun = ";
cin >> tahun;
proses(tahun);

system("PAUSE");
return 0;

[C + +] The loop statement in C + + Programming

Pernyataan Perulangan

Pernyataan perulangan adalah suatu pernyataan program yang akan melakukan sesuatu instruksi selama suatu kondisi yang disyaratkan terpenuhi/ bernilai benar.
Berbeda dengan pernyataan berkondisi, pernyataan perulangan melakukan eksekusi instruksi berkali-kali, selama kondisi tersebut terpenuhi.
Pernyataan-pernyataan perulangan:
Pernyataan while
Pernyataan do-while
Pernyataan for
Pernyataan while

Bentuk:

while(kondisi)

pernyataan;
Ketika kondisi bernilai benar, maka pernyataan dijalankan, kemudian kembali ke pengecekan kondisi.
Ketika kondisi bernilai salah, maka pernyataan tidak dijalankan lagi.

Contoh:
...

int angka = 0;
while(angka < 10) {
cout << “Lebih kecil dari 10” << endl;
angka++;
}
...

Pernyataan do-while

Bentuk:

do {

pernyataan;

} while(kondisi)

Pernyataan do-while mirip dengan pernyataan while, namun pernyataan dijalankan terlebih dahulu sebelum pengecekan kondisi, sehingga pernyataan minimal dijalankan 1 kali.

Contoh:
...
int angka = 0;
do {
cout << “Lebih kecil dari 10” << endl;
angka++;
} while(angka < 10);

...

Pernyataan for

Bentuk:

for(init;kondisi;naik)

pernyataan;

Pernyataan for adalah sama artinya dengan pernyataan while di bawah ini.
init;
while(kondisi) {
pernyataan;
naik;
}

Contoh:
...
for(int i = 0; i < 10; i++)
cout << “Lebih kecil dari 10” << endl;

Recursive Rank Value In calculating the Raptor

Here is a picture RAPTOR program that serves to calculate the value of x ^ y with real numbers x and y are integers recursively.

Calculating the Fibonacci sequence with the C + + and Raptor

Fibonacci number is the line number obtained by summing the number of the previous sequence. With the notation mathematics, can be described as follows:



Sebagai contoh, 10 bilangan Fibonacci pertama adalah:

0 1 1 2 3 5 8 13 21 34

Ilustrasi:

0 -> Bilangan Fibonacci ke-1
1 -> Bilangan Fibonacci ke-2
0 + 1 = 1 -> Bilangan Fibonacci ke-3
1 + 1 = 2 -> Bilangan Fibonacci ke-4
1 + 2 = 3 -> Bilangan Fibonacci ke-5
2 + 3 = 5 -> Bilangan Fibonacci ke-6
3 + 5 = 8 -> Bilangan Fibonacci ke-7
5 + 8 = 13 -> Bilangan Fibonacci ke-8
8 + 13 = 21 -> Bilangan Fibonacci ke-9
13 + 21 = 34 -> Bilangan Fibonacci ke-10

Berikut ini adalah code sederhana untuk menampilkan bilangan n bilangan Fibonacci pertama

#include<stdio.h>

void fibonacci(int t)
{
int i,n,a,s;
i = 0; n = 1;
printf("%d %d ", i, n);
for(s=0; s<t-2; t++)
{
a = i + n;
printf("%d", a);
i = n;
n = a;
}
}
int main()
{
int n; // n = jumlah bilangan fibonacci yang ingin ditampilkan
fibonacci(n);
return 0;
}

Penjelasan: barisan ini berawal dari 0 dan 1, kemudian angka berikutnya didapat dengan cara menambahkan kedua bilangan yang berurutan sebelumnya. Dengan aturan ini, maka barisan bilangan Fibonaccci yang pertama adalah:

0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987, 1597, 2584, 4181, 6765, 10946...

Barisan bilangan Fibonacci dapat dinyatakan sebagai berikut:

Fn = (x1n – x2n)/ sqrt(5)

dengan

Fn adalah bilangan Fibonacci ke-n

x1 dan x2 adalah penyelesaian persamaan x2-x-1=0

Perbandingan antara Fn+1 dengan Fn hampir selalu sama untuk sebarang nilai n dan mulai nilai n tertentu, perbandingan ini nilainya tetap. Perbandingan itu disebut Golden Ratio yang nilainya mendekati 1,618.

Berikut adalah contoh program untuk menentukan bilangan fibonnaci.
#include<iostream>

using namespace std;
int fibonacci(int n)
{
if(n==1)
return(0);
else if(n==2)
return(1);
else
return (fibonacci(n-1)+fibonacci(n-2));
}
int main()
{
int n;
cout<<"\nBerapa jumlah bilangan fibonacci yang ingin anda tampilkan: ";cin>>n;
for(int i=1;i<=n;i++)
cout<<fibonacci(i)<<" ";
cout<<endl;

Penjelasan:

Program sederhana diatas menggunakan fungsi rekursif untuk menampilkan bilangan fibonacci.
Baris pertama dan kedua adalah statements yang paling sering kita tuliskan. Yang pertama untuk mengikutsertakan library iostream "#include<iostream>". Baris yang kedua adalah untuk menggunakan namespace std. Untuk lebih jelasnya, silahkan cari dengan mbah google dengan keywords c++, namespace, std, preprocessor.
Di baris ke 3 sampai 11 terletak implementasi dari algoritma bilangan fibonacci. Pada baris ini kita definisikan fungsi dengan nama "fibonacci" yang memiliki return value integer dan parameter (int n). Contoh bilangan fibonacci adalah:

0, 1, 1, 2, 3, 5, 8... (bilangan berikutnya adalah penjumlahan dari 2 bilangan sebelumnya)

int fibonacci(int n)
{
if(n==1)
return(0);
else if(n==2)
return(1);
else
return (fibonacci(n-1)+fibonacci(n-2));
}

Pada fungsi diatas kita menggunakan pemeriksaan beruntun dengan "if statement".
Jika n adalah 1, maka return valuenya adalah bilangan pertama fibonacci (0).
Jika n adalah 2, maka return valuenya adalah bilangan kedua finonacci (1).
Bilangan pertama dan kedua harus ditentukan agar algoritma ini berjalan.
Jika bukan bilangan pertama atau bilangan kedua, maka return valuenya adalah penjumlahan fungsi rekursif fibonacci dengan parameter bilangan sebelumnya dan bilangan sebelum-sebelumnya ( n-1 dan n-2).
berikut contoh program bilangan fibonancci dengan RAPTOR.


Friend Function Program Using C + +

STEP 1: Start the program.
STEP 2: Create the class name as a data base with members and member functions.
STEP 3: The function get () is used to read input from the user 2.
STEP 4: Declare friend functions mean (base ob) in the classroom .
STEP 5: On the outside of the class to define the function of your friends and do the following.
STEP 6: Return the average value (ob.val1 ob.val2 +) / 2 as a float.
STEP 7: Stop the program.

PROGRAM :

#include<iostream.h>
#include<conio.h>

class base
{
int val1,val2;
public:
void get()
{
cout<<"Enter two values:";
cin>>val1>>val2;
}
friend float mean(base ob);
};
float mean(base ob)
{
return float(ob.val1+ob.val2)/2;
}
void main()
{
clrscr();
base obj;
obj.get();
cout<<"\n Mean value is : "<<mean(obj);
getch();

OUTPUTNYA :

Masukkan dua nilai: 10, 20
Rata - rata Nilai adalah: 15

Copies Creator Program Using C + +

#include <cstdlib>
#include <iostream>
#include <conio.h>

class copy
{
              int var,fact;
              public:
                copy(int temp)
                {
                 var = temp;
                }
                double calculate()
                {
                            fact=1;
                            for(int i=1;i<=var;i++)
                            {
                            fact = fact * i;
                            }
                            return fact; 
}
};
int main()
{
    int n;
    cout<<"\nEnter the Number : ";
    cin>>n;
    copy obj(n);
    copy cpy=obj;
    cout<<"\n"<<n<<" Factorial is:"<<obj.calculate();
    cout<<"\n"<<n<<" Factorial is:"<<cpy.calculate();

    system ("pause");
    return 0;

}

Program summation operator overloading in C + +

The following is an example of operator overloading added program in C + +.

#include"iostream.h"
#include"conio.h"

class Buah
{
private:
int apel;
int jeruk;
public:
Buah(int jum_apel=0,int jum_jeruk=0);
void info_buah();
Buah operator+(Buah b2);
Buah operator+(int tambahan);
};
void main()
{
clrscr();
Buah buah1 (20,5);
Buah buah2;
cout<<"Obyek buah 1"<<endl;
 buah1.info_buah();
buah2=buah1+5;
cout<<"Obyek buah2"<<endl;
 buah2.info_buah();
buah2=buah1+buah1;
cout<<"Obyek buah2"<<endl;
buah2.info_buah();
getch();
}
Buah::Buah(int jum_apel,int jum_jeruk)
{
apel=jum_apel;
jeruk=jum_jeruk;
}
void Buah::info_buah()
{
cout<<"Jumlah Apel= "<<apel;
<<"Jumlah Jeruk= "<<jeruk;<<'\n'<<endl;
}
Buah Buah::operator+(Buah b2)
{
Buah tmp;
tmp.apel=apel+b2.apel;
tmp.jeruk=jeruk+b2.jeruk;
return(tmp);
}
Buah Buah::operator+(int tambahan)
{
Buah tmp;
tmp.apel=apel+tambahan;
tmp.jeruk=jeruk+tambahan;

return(tmp);
}

C + + program to display build

#include <iostream>
#include <string>

using namespace std;

int main()
{
   string raptor_prompt_variable_zzyz;
   int k;
   int p;
   int l;
   raptor_prompt_variable_zzyz ="masukan panjang";
   cout << raptor_prompt_variable_zzyz << endl;
   cin >> p;
   raptor_prompt_variable_zzyz ="masukan lebar";
   cout << raptor_prompt_variable_zzyz << endl;
   cin >> l;
   if (p==l)
   {
      cout << "persegi" << endl; l =p*l;
      k =p+p+l+l;
      cout << "LUAS PERSEGI ="+l << endl; cout << "KELILING PERSEGI ="+k << endl; }
   else
{
      cout << "persegi_panjang" << endl; l =p*l;
      k =2*(p+l);
      cout << "LUAS PERSEGI PANJANG ="+l << endl; cout << "KELILING PERSEGI PANJANG         ="+k << endl; }

system("PAUSE");
   return EXIT_SUCCESS;
}

C + + program to find the average value

#include <iostream>

using namespace std;
int main()
{
int n,i,nilai,tt_nilai=0;
float rata2;
cout <<"Masukkan banyak data : " ;
cin >>n;
for (i=1 ; i<=n ; i++)
{
cout <<"Masukkan Data Nilai : " <<i << " " ;
cin >> nilai;
tt_nilai = tt_nilai + nilai;
}
rata2 = tt_nilai/n ;
cout <<"Nilai rata-rata nya : " <<rata2 ;

system("pause");
return 0;

}

The program calculates the rank of the C + +

#include <iostream>
#include <string>

using namespace std;
class pangkat{
friend ostream& operator<<(ostream&, pangkat&);
friend istream& operator>>(istream&, pangkat&);
public:
pangkat(){};
void hasil();
private:
float x,c;
inty,i;
};
istream& operator>>(istream&mlebu,pangkat&ketik){
cout<<"MasukkanAngka= ";
mlebu>>ketik.x;
cout<<"\nMasukkanPangkat= ";
mlebu>>ketik.y;
return mlebu;
}
ostream& operator<<(ostream&metu,pangkat&cetak){
cout<<"hasildari "<<cetak.x<<" pangkat "<<cetak.y<<" = "<<cetak.c;
cout<<endl;
return metu;
}

void pangkat::hasil(){
c=1;
for(i=1;i<=y;i++){
c=c*x;
cout<<c<<endl;
}
cout<<endl;
}

int main()
{
pangkat b;
cin>>b;
b.hasil();
cout<<b;
system("pause");
return 0;
}

flowchart reverse recursive word



Flowchart number divisible by 5 and 7 with the recursive










Subjects reflection Alpro Seventh Meeting

In a meeting yesterday on the first day we went on a recursive and interatif material, that is where the problem is still not quite understand about the recursive, now that we abis each group were given a challenge to do something everyday that contain elements of ARRAY, all the teams that already yesterday on the successful work and ngepostingnya, but it turns out there's more to be fixed, so it is still not fully bener.

Here's a little bit about who I am posting ARRAY.

ARRAY is a data structure that contains the data type that has the same type. An array is a group of memory-related. Array has the same name and type. To refer to a particular location or element in the array, the array name and the position number of elements in the array.

For the declaration of ARRAY specified dg type of each element and the number of items required by each array so that the co mputer to prepare a number of memory.
Declaration ARRAY:

algorithmic                             language C + +

c: array [1 ... 5] of integer         int c [5]

Telling the computer to provide a 5 element integer array c. Arrays can be declared to contain the other data types. For example, an array of type char is used to store string interchangeable characters.

Monday, 16 April 2012

How it Works CPU

Central Processing Unit (CPU): the brain is in a PC that processes the data and determining the strength and unit price of a computer. Within a year back, the CPU speed has increased dramatically from 600 MHz to 1 GHz, and Intel recently announced has been shipping Pentium III 1.13 GHz. At the end of the year is expected to speed on the 1.5 GHz will be exceeded, indicating the fastest CPU race has begun. Here is a tip: CPU performance in your PC is not only determined by the number of megahertz or gigahertz PC assemblers heavily advertised in magazines or the Internet. With the increase in chip speed and applications that require more power,

All you need to know:
 · A CPU perform three main tasks: reading data, processing data, and usually write data to memory.
· Speed ​​crude (raw speed) is measured in megahertz scale , but other parts such as chip design architecture also determines the performance of the CPU.
· Chip you want in your PC depends on how much you spend and for what you are using a PC.

1.Membangun Block
Before you understand how a CPU works, you need to know how a CPU is made. A CPU made ​​up of millions of microscopic transistors that through chemical processing and photolithografis to be a mold of silicon no bigger than your thumb. Transistor save the tiny electrical pulses that provide one or zero values, which form a binary system that used computer language to communicate. Group of transistors are interconnected to store the values, they also conduct calculations and mathematical logic, and with the help of a crystal clock kuartz, they perform functions such as dragon boat rowers who rowed in sync. In other words, they can process the data.

2.Proses A CPU
 A CPU processes the information stored in the form of a byte in memory. Such information may include data or instructions.Data is a binary form of a letter, a digit, or a color. An instruction tells the CPU what to do with that data, for example: add, divide, or move the CPU will perform three major operations against the data: read, manipulate (process) data, and often write it into memory.On a simpler level, the CPU only needs four elements to perform operations on data: instructions, instruction pointer, a register, and a logic unit aritmethic. Pointer instructions will tell the CPU where instructions are placed in memory when needed to run the application.Register is temporary storage in the CPU. A register storing the data waiting to be processed by an instruction, or a data have been processed (eg, the result of adding two numbers at once). arithmetic logic unit (arithmetic logic unit / ALU) functions as a calculator CPU, to work with mathematical functions and logic that was ordered by the set of instructions. CPU consists of a few extra parts that make the base of the CPU working properly: · Fetch instruction fetches instructions from the RAM or the memory of which is located on the CPU. · Decoder take instructions from the instruction fetch and translate it so that the CPU understands . Decoder is to determine the next steps should be taken to complete the instruction. · The control unit will manage and coordinate the entire operation of the chip. This unit will tell the ALU when to perform calculations, and then tell fetch when to take a value, and tell the decoder when to translate these values ​​into a single instruction.

3.Menjejak A Instructions
Here's how the CPU to do its job: fetch instruction directs the instruction pointer to a spot in memory that holds an instruction. Fetch then catch it and give instructions to the instruction decoder, and then observe the instructions and determine the next steps to complete the instruction (an instruction may consist of a series of steps that must be completed in any particular order). ALU and work orders requested instruction: add data, share data, or manipulate data. After translating and doing CPU instruction, the instruction fetch control unit told to catch the next instruction in memory. This process goes on and on - from one instruction to the next instruction, in a move that complicated - to create the results you can see on the monitor. That works a program such as word processing: a series of instructions and data. To make sure all was running in a unit time, the part that requires a clock generator. Clock generator regulating every step that is done the CPU. Like a metronome, a clock generator sends electrical pulses to determine the step CPU. Pulse is measured in millions of steps per second, or megahertz, which you know as a measure of CPU speed.The more pulses are made, the faster the CPU works. In ideal circumstances, should have a CPU speed 700 MHz run faster than 600 MHz CPU, but the additions and variations to the base of the CPU can make the numbers are meaningless.

4.Meningkatkan Base CPU
A CPU requires only a little part to do its job, but the basic design has been modified over the years to improve overall performance. The main purpose of the increase is the same: to process data more quickly. While looking for ways to improve processing speed, chip makers do not realize that the CPU processing as long as they do for fetching an instruction or data from system RAM. To reduce downtime, they put a storage area, known as a cache, in a CPU. Data and instructions can be placed temporarily in the CPU itself, reduce travel data or instructions from RAM. Adding cache providing ideas, maker of high-speed RAM to put the system (and expensive) - known as level 2 cache or L2 cache - the cache CPU level one and the system RAM. The closer to the CPU means that the shorter the distance that must be taken into system RAM. Sekunderi cache is very useful to improve performance so that more and more processors mengintegrasinya into its CPU itself, create more space for storing data and instructions.

5.Lebih many ALU and FPU A
To improve the performance of calculations, the chip maker puts an arithmetic logic unit (arithmetic logic unit / ALU) in the CPU. Theoretically this means that processing can be done two times faster in a single step. Using multiple ALU would seem like adding another carpenter in making kitchen cabinets, which means to accelerate the completion of the work.In addition to multiple ALU, Intel integrated floating point unit to the CPU. FPU handles a large number of the most minor to the most (which has a lot of numbers behind the comma).While the FPU to handle such a calculation, ALU becomes free to perform other tasks at the same time, to improve performance. Advanced Micro Devices and Intel also increase the processing speed of the instruction by instruction pipelining, or execute instructions in parallel to one another. Execution of an instruction requiring a separate step - for example, an instruction fetching and decoding. Actually, the CPU must complete an instruction as a whole before proceeding to the next instruction. Now a circuit different from dealing with the separate steps. Once an instruction has been completed in one step to proceed to the next step, the transistor is working on the first step is free to work on the next instruction, so it would speed up the processing work. This is similar to climbing stairs: so your feet leave a ladder, the person behind you can use it to ride. In addition to improving performance is predicted branch instruction, which is expected to be made ​​a leap program can be done; the speculative execution , which executes the branch instruction is in depat; and without following the completion of the sequence, namely the ability to complete a series of instructions is based on the normal sequence. These changes create an increase in clock speed, such as the leap up to 1 GHz in February last, no longer be the primacy of performance. Tests conducted by PC World magazine suggests that the velocity jump is no longer the main thing in improved performance, particularly in office applications, which greatly depends on the speed of your hard drive and the number and speed of system RAM.

6.CPU in your PC
Two players dominate the market for PC CPU: Intel (www.intel.com), which controls 80 percent market share of home and business PCs, and Advanced Micro Devices (www.amd.com). Both companies make models of machines for high-end, midrange, and low-end. Other companies also produce the CPU, such as the Motorola PowerPC 750 (www.mot-sps.com), which provides energy for Macintosh computers. AMD Athlon and Intel Pentium III for market share is more powerful CPU that is running Microsoft Windows operating system. They are nearly balanced in the design and performance, including performance improvement software to run 3D games and CAD (computer aided design).high-end CPU from Intel and AMD are widely available in various types of PCs, from middle-class housing system (between 600 to 850 MHz ) up to industrial engineering workstations and high-end multimedia system the most expensive (from 866 MHz and above). For the latest model, a PC with a CPU range in price between $ 200 to $ 1000.For the class of high-end PC with 1 GHz chip would cost $ 2700 to $ 3300, depending on the components offered by PC assemblers. For the system of the middle class, which uses AMD or Intel speed of 600 to 850 MHz costs about $ 900 to $ 1600. Chip valuable economical (under $ 150) usually runs with a clock speed lower than the Athlon and P-III, cache fewer or more slow, and has a smaller performance improvement. AMD K6 and K6-III-2 and Intel Celeron intended for PC-PC for less than $ 1000. portable computers typically do not offer the fastest CPU available. A desktop design is designed to withstand higher heat than a laptop, which means the laptop should use a slower CPU and less powerful. Faster processor also requires more power as well, resulting in battery life of power is also reduced. Currently, the fastest available portable on the market is 700 MHz, but it seems with the new design, the speed will be increased.

7.Di Future
CPU makers are always looking for ways to improve performance. Recently they have changed the system to the fabrication of micron 0:25 0:18 microns, which allows a narrower gap in placing smaller transistors, enabling higher speed and smaller heat for the same architectural design. Moreover, the interconnection between transistors using aluminum has been replaced with copper, which mengkonduksikan electricity better than aluminum. But this improvement does not mean the race would end up adding speed. Intel has announced the Willamette chip (aka Pentium-4), which will run at speeds of 1.5 GHz and will be available later this year. While its competitors, AMD, also will continue to stick strictly to these events.

Sources: http://www.infokomputer.com

Computer Dictionary

APPLICATION: software used to perform specific tasks, such as performing calculations accounting, word processing (writing letters, agreements, etc..), Or drawing (graphic nature of work).

ASCII: American Standard Code for Information Interchange. Standard code used to represent text in computers dalri or to exchange text between computers one with another computer. ASCII consists of 255 code into a text representation of all the characters and some non-printing (control) characters.

ASSEMBLY LANGUAGE: The language of low-level computer programming. Assembly language to interact directly with computer hardware.

BASIC: Beginner's All-purpose Symbolic Instruction Code. High-level programming language. In 1964, John and Thomas Kurtz designing Kemeney BASIC as a programming language that is easy to learn. Because of its simplicity, BASIC programming language was quickly accepted as the microcomputer.

 BENCHMARK TEST: a series of tests performed on the system or computer software fatherly measure performance compared to systems or other similar software. 

BIOS: Basic Input-Output System. Part of a particular operating system, such as CP / M and DOS consisting of drivers and other software designed to manage peripheral devices, such as monitors, disk drives, and printers. BIT: short for "binary digit". The smallest unit of information that can be stored computer. Bit can be either value 1 or 0. Eight bits equal one byte.

BUG: programming error that can cause a program or system to function incorrectly or crash (not used). 

BUNDLE: sales practices and the application of computers together in a promotional effort.

BUS: line is used for distribute data on a computer. The bus is a set of electrical or electronic connection between the microprocessor and other hardware, such as disk drives, logic boards, etc..

BYTE: the size of computer memory or disk capacity. One byte with eight bits and can store one ASCII character, which can include numbers, letters, or punctuation.

CD-ROM: Compact Disk read-only memory. Optical storage systems that can record the information permanently on a Compact Disk (very similar to the disks used for music), and then publish it on the computer screen.

CGA: Color Graphics Adapter.Standard color screen which IBM introduced in 1981. CGA circuit board allows the monitor to display the four-color 320 X 200 pixels. In 1984, EGA (standard higher resolution) replaces the CGA standard.

CHIP: the unofficial name for the integrated circuit.Example: view the microprocessor.

COBOL: Common Business-Oriented Language. High-level programming language designed for business applications. COBOL is the language most widely used to program applications for mainframes since the 1960s.

CP / M: Control Program / ​​Microcomputer. One of the first microcomputer operating system.

DISK: also called a diskette; magnetic storage media is the most commonly used for microcomputers. "Floppy Disk" to a diameter of 5 or 3. Program applications are packaged and sold on disks, and users store data on floppy disks.

DISK DRIVE: A tool for call information from or recording information to disk. The computer can have one or more disk drives. Disk drives can also be installed as a peripheral device.

DOS: Disk Operating-System. The name that is usually used to refer to the MS-DOS (Microsoft products) or PC-DOS (IBM's adaptation of the MS-DOS).

DOS operating system became the most widely used for IBM-compatible computers. EGA: Enchanced Graphics Adapter. Standard view higher resolution than CGA.

EGA resolution is 640 X 350 in 16 colors. In 1987, replaced by a standard VGA EGA.

FORTRAN: Formula Translation. Programming language developed in 1956 by John Backus at IBM, is mainly used to deal with scientific and mathematical formulas.

Graphical User Interface (GUI): The method for displaying text and graphics on a computer screen through the image and the image formed by a pattern of dots.

HARD DISK: magnetic storage media made ​​of iron. Hard disk offers storage capacity lebi information than the floppy disk and can be directly installed on the computer.

HIGH-LEVEL LANGUAGE: programming languages ​​- such as BASIC, FORTRAN, COBOL, Pascal, etc.. - That allow programmers to write instructions with sentences similar to the English language daily to control the computer.

Kilobyte (K): unit of computer memory size.A K equal to 1024 (210) bytes.


LOW-LEVEL LANGUAGE: programming languages, such as assembly language, which is one more step away from the machine instructions that can be understood microprocessor. The language is very different from English daily and requires technical knowledge of high level hardware.

MCA: Micro Channel Architecture.Multitasking 32-bit bus introduced by IBM in 1987 PS/2-nya computer. This bus does not support the expansion card is made ​​for PCs before. Megabyte (MB): unit of measure of computer memory. One megabyte equal to 1,024 kilobytes.

MICROPROSSESOR: Central Prossesing Unit (CPU) on a micro computer. The microprocessor is the integrated circuit or chip in the computer's main circuit board. The microprocessor uses to regulate the electrical conduction of computer work.

MODEM: a device for delivering data from one computer to another computer via a telecommunications line.

Multitasking: the operating system is the method used to carry out some operations in bersamaaan. With a multitasking system, the user can print a document, working on a worksheet, and receiving data from a modem at the same time.

OPERATING SYSTEM: a program that became the basis for the functioning of a computer. The operating system determines how to handle the data when it is inserted into or retrieved from memory and set all the basic functions of computers.

PASCAL: high-level programming language developed by Nicklas Wirth. Pascal is widely used for teaching computer science.

PIXEL: short for picture element, each point that forms an image on a video screen.

RAM: Random-Access Memory.

RAM usually refers to computer memory that stores information temporarily.

ROM: Read-Only Memory. The information is permanently recorded and can be read by a computer but can not be changed by the user.

VGA: Video Graphics Array. Color graphic standard introduced by IBM with the PS / 2 those in WINDOW: on the Macintosh or Microsoft Windows computers, for example, is a rectangular area on a computer screen that displays a document or application being berjalan.window also can display the contents of a floppy disk or hard drive. Users can open or close the window, resize, and move it to another spot on the screen in question.Users can open several windows at once and the window-window may overlap, depending on the system. Window concept was originally developed at Xerox and the first commercial use on Macintosh computers.

WINDOWING ENVIRONMENT: software that allows multiple programs or DOS on IBM PC compatibles, for example, opened and run simultaneously on a separate window.

All About Hardisk

1. How a Hard Drive
Hard Drive: a storage device (storage) that record data quickly into magnetic pulses on a platter / disk rotating metal. When a CPU is the brains of a PC, then the hard drive serves as the heart, pumping the data vital to the entire system. As a component that drives the virtual computer, hard drive is also a mystery. Most people can not see the inside of a hard drive, blocked by the aluminum cover, though perhaps people are very familiar with the files and programs are stored, copied, moved, and deleted from the hard drive. · Hard drive into a long-term storage media on PC You. · The storage capacity on a new type of hard drive to increase each year (the current largest is 80GB), but the physical size of the drive remains relatively unchanged. · The faster a drive spins, the faster you access and transfer data. · With the increasing number of large-capacity hard drives on the market, the cost for a drive (usually measured as the number of dollars per megabyte) getting down. Hard drive provides data storage in which all modern computers need it. A hard drive stores information by placing a magnetic field through the surface of a disk coated magnetic material moving around. The main principle of a hard drive - the use of magnetism to store information - extremely miri to that used on a tape recorder or video. A hard drive for storing digital data mangetik point on the surface of a disk. A bit (composed as a bit of your data) suggests a value of 0 when the disk is magnetized in one direction, and the value 1 if the opposite direction. Each individual in a hard disk drive called a platter (plate / metal disk). A large-capacity hard drives usually contain some 3.5-inch diameter platter and use both sides as a storage medium. Drive letter itself has a motor that rotates at a speed of 4500 to 15,000 rotations per minute. Hard drive recorder uses a device called the "head" to write and read data from any surface of the platter. Drive to position a head, bergantun an arm that can move with microscopic distances above the surface of the platter on each side. So for the hard drive platter that has a five head will have ten pieces that rely on ten motor arm. Other elements in the head reads the data recorded by sensing the magnetic field at any specified bit as it passes through the magnetic element is read. drives record data on a concentric circles called "tracks", and divide each track into segments known as "sector". You can imagine that the track can be interpreted as a bookshelf where each segment is defined as the books in it. When the operating system needs a file located on a particular track and sector, then it sends the request to the hard drive to get data on that particular address.

2.How Hard Drive Works
When an operating system sends data to the hard drive for recording, The drive to process the data using a complex mathematical formula that adds an extra bit in the data. Bit it did not take place: In the future, when the data is retrieved, the extra bits that allow the drive to detect and correct errors caused by random variation of the magnetic field inside the driver. Then, the drive head to move through the appropriate track from the platter . Time to move the head is called the "seek time". While at the track is right, wait until the drive platter spins up to the desired sector is under the head. The amount of time is called "drive latency". The shorter the time `seek` and `` latency, the faster the drive the job done. As electronic components drive determines that a head is above the appropriate sector to write data, the drive sends electrical pulses to the head. Pulse generates a magnetic field that changes the magnetic surface on the platter. Variation that is now representing a recorded data. Reading the data requires some process of recording.Drive to position the reader over the head of the appropriate track, and then wait for the right sector to rotate on it. When certain magnetic spectrum that represent your data in the appropriate sector and track just above the head reader, electronic components drive detect small changes in magnetic field and convert it to bits. When the drive is seleai check on the bit error and correct it if necessary, it then sends that data to the operating system.

3.Interface? What is?
Interface hard drives are simply the hardware that manages the exchange of data between your computer and your hard drive. You usually deal with one type of interface on the PC in circulation: Advanced Technology Attachment, also known as ATA interface (or IDE, integrated device electronics). Hard drives that use this interface usually come with a variety of flavors, such as Ultra ATA, Ultra DMA or EIDE, depending on the vendor you visit. The second most popular interfaces are SCSI (small component system interface), which is widely used on the server and the drive for an older Apple Macintosh computers. the first ATA interface supports a maximum transfer rate of 8.3 MB per second. ATA-2 increases the maximum throughput to 16.6 MB per second. Although not yet a formal standard, Ultra DMA and Ultra DMA-33-66 was generally accepted by the industry the hard drive to interface with maximum transfer speed, respectively, 33MB per second and 66MB per second. Seagate recently announced it has begun shipping the Barracuda ATA III drives with Ultra ATA-100 interface is the main target to replace the SCSI interfaces on the server RAID (redundant array of independent disks).

4.Hard Drive Offers 
Encouraging Use of the IBM PC-XT type of early comes with a hard drive first mass-produced: a drive with a capacity of 5.25-inch diameter platter 10MB - the * wow * is very large at that time. Twenty years later, the latest hard drive with 3.5-inch diameter platter can store up to 70GB of data. Drive 2.5 inch smaller on the notebook can hold up to 25GB of data. And a diameter of 1 inch Microdrive is designed for digital cameras, players, and handheld computers that can accommodate up to 1GB of data. Along with the transition size reduction drive and a larger capacity has lowered the cost per megabyte of storage dramatically, so that any large-capacity drives can be had by ordinary computer users. You can buy a hard drive designed specifically for three distinct uses: desktop PC, the computer notebooks, and servers. Attributes which distinguish them not at capacity - although more nicer - but on other factors that determine the performance: the speed of the motor drive, on-board memory, the drive interface, and power consumption.

5.Drive Special Duties 
Specific To become the most important price on the consumer desktop market. A computer system that is built from the ground may include a high-speed 5400-rpm drive with IDE interface, the curve represents the sweet spot of price-versus-performance (price-performance), a price below U.S. $ 300 for a decent amount of storage space a lot. High-performance workstations is usually accompanied by 7200-rpm drive, and in the next year 10,000-rpm speeds are common. In the notebook computer market, the most important thing is power conservation. Drive slow spinning hard drives reduce power consumption of laptop batteries. Storage resources on a notebook drive away than to drive up to the desktop, due to its small size platternya. In the server market, most important goal is performance. On a commercial server that handles the online sales, for example, the drive must be able to handle many requests for data in different sectors as quickly as possible.Here, you'll see a lot more drive with SCSI interface (which is in the set-up in a line of RAID) rotates at a speed 10,000-rpm, and the drive speed of up to 15 000-rpm rotary has started to reveal itself. Drive has several drawbacks, such as the heat generated higher and more noisy than usual drive.

6.Harga Always Rain
In the last three years, hard drive prices have plummeted while capacity is increasing.Vendors have warned that they eliminate the unnecessary costs of the drive with the integration of electronic components, reducing component count and increase reliability.With 150 million drive that will be marketed this year and the estimated 200 million more in the next two years, the market is already very large this seems to be growing. System desktop worth less than U.S. $ 1000 typically offer drive 8GB or larger, which is the value of The minimum you should get on most systems. For middle-class desktop with a price range of around U.S. $ 1500, a 40GB hard drive capacity is more frequently encountered.But one vendor estimates, in the next five years, the proportion of the price allocated to the computer hard drive will increase slightly. Costs for other components will drop the cost for hard drive maintained constant. It's not a bad news: As capacity increases, cost per megabytenya tends to decrease. When you are satisfied with your current desktop systems, but only wanted to increase the storage capacity of your disk, just add a new hard drive.Unless you buy a drive for a big server who sat in the office, drive popular now able to provide satisfactory performance (with the rotary speed of 5400 up to 7200-rpm) and of sufficient capacity (20GB-40GB) for the money you spend. As of this writing, the online computer store you can find the hard drive from Maxtor Diamondmax 30GB at prices below U.S. $ 200. While the money of U.S. $ 260 you can get a Maxtor drive with a capacity of 40GB. IBM sells the drive capacity of 75GB, which is intended for enterprise servers with prices ranging from U.S. $ 500. When you buy a new drive, you can see that the vendors and shops usually sell out "maximum transfer rate" or "burst speed" of their drive. The value does not mean anything, they just describe the specifications of the drive interface. Usually these values ​​are used as marketing propaganda; in general, your drive will not reach the level of maximum speed.

7.Masa Home Hard Drive
Based on the commercial development of the head giant magnetoresistive (GMR), which gives strength to the current large-capacity drive, drive capacity doubled two every 18 months. In the next five years, GMR technology will be able to double the capacity of hard drives every 12 months. Furthermore, the vendor must find a way to fight the laws of physics and learn how to create a more seamless platter and a smaller head. One of the biggest challenges will be concerned at this point called super-paramagnetic limit, where the bit size of the drive will be very small so that the thermodynamic fluctuations can cause data loss. And a storage company is currently engaged to seek new kind of storage. Even so, according to one hard drive vendor, the future of this industry is very bright - especially for its customers.

Sources: http://www.infokomputer.com

All About Computer Viruses

1. Method Works Computer Virus
A computer virus: A computer code which is able to "reproduce itself" that put part or all of the code in the file or application, and result in your computer do things that do not want.computer viruses is a common disease in the world modern technology. They can spread rapidly through the open computer networks like the Internet, and resulted in losses to billions of dollars in no time. Five years ago, the opportunity for a virus contracted during the period of 12 months is about 1 in 1000; now the comparison is increased dramatically to about 1 in 10. Vital statistics of the virus: · Viruses get into your system via e-mail, downloads, infected floppy disk, or (sometimes) by hacking. · From the definition, a virus must be able to "own culture" (aka make a clone or a copy of itself) to be spread. · Currently there are thousands of viruses, but few have been found "in the wild" (roaming, undetected, in the network) because most of the known viruses of laboratory born, which is a variant of the virus "wild" that is widely available in the world. · Consequences virus can range from annoying to extremely destructive, but even the simplest virus has a tendency to ruin because of a bug in their computer code (as virus programmer is careless or do have malicious intent). · antivirus software on the market today can detect almost all types of viruses exist, but should be updated regularly to maintain effectiveness. A virus is simply a computer program. As with other computer programs, in which there are instructions that can tell the computer to perform specific tasks. But in contrast to the application program, a computer virus is usually ordered you to do things that you really do not want, and can usually spread itself to existing files on your computer - and sometimes to other people's computers. When you lucky, a virus is at best only cause the computer to perform bizarre actions, such as causing your computer speakers sound "blip-blip-blip" at random. The most feared is a vicious virus that can cause all data on your hard drive is lost (by ordering the computer to format a hard drive), even a virus that can damage your computer hardware, such as the CIH virus that destroys your computer's motherboard BIOS.

2.How My Computer to Virus Affected?
Your computer can become infected with the virus when you copy a file that terinfeks into the computer, then activate the code of his body when an infected file is executed or opened. Maybe you do not feel menyalinkan infected file into your computer: Hey, the virus does not matter if they stick to the e-mail attachment, when you're downloading a file, or through a floppy disk that is often borrowed, lent. And now, with the increase in Internet users, the trend of the spread of the virus is through e-mail attachment. When you open an infected file or application, malicious code copies itself to a file on your system, then wait to send it - whatever the programmer designed it to be done on other people's computers. By simply removing the infected e-mail after you open the file attachment was not going to help, because the virus has already penetrated into your computer system before. A virus writer can set the time of virus attack, then and there, at a specific time or date, or when a particular command is executed, for example, when you order to save or close a file. Example: Michelangelo virus is programmed to release the code perusaknya every 6 March each year - which is the anniversary date of the General

3.type virus
 Nowadays many kinds of variations of the virus in circulation, most of which can be grouped into six general categories, each of which slightly different kind of how it works: · boot-sector viruses: replacing or inserting itself into the boot sector - an area on your hard drive (or any other disk) to be accessed when the computer is first turned on. This type of virus can hinder your computer to boot from the hard disk. · Virus file: infects applications. This virus to spread itself to execute the application and documents associated with it when the infected file is opened or executed. · Macro Virus: is written using a simplified macro programming language, and Microsoft Office applications, like Word and Excel, and is currently estimated 75 percent of this strain has spread across the world. A document infected with a macro virus generally modifies the existing command and widely used (like the "Save") to trigger its payload upon execution of that command. · Multipartite Virus: infects both files and boot sector - under the guise of a criminal ganda that can infect your system before it was captured by continuous antivirus scanner. · Polymorphic Virus: changes code whenever it passes on a different machine; theoretically this type of virus is more difficult to be detected by the antivirus scanner, but in reality this type of virus is not well written, so it's easy to know his whereabouts. · Stealth Virus: hides its presence by making an infected file not appear infected, but usually stand up to antivirus software.

4.All Evil Code (Malicious Code)
Virus is not one of perception wrong in the computer is bad electronic code, such as worms and Trojan horse applications is a type of virus. They are not viruses. Worms, Trojan horses and viruses in a large category of so-called analysts as a "malicious code". A worm will replicate itself and go into network connections to infect any machine on the network and then replicate itself again, taking up space and slow down hard disk computers and networks work. Even so, the worm does not modify or delete other files. A Trojan horse does not replicate itself, but he is in the form of a malicious program disguised as another format such as a screen saver or image files.When executed on your machine, a Trojan horse will take the information from your system - such as user names and passwords - or could allow a malicious hacker to take over your computer remotely (from a distance).

5.Software Antivirus Emergency Call Answering
The virus experts have indexed about 40,000 kinds of virus and its variants over the years, although only 200 species are currently active in the wilds of the computer. While most viruses are just annoying more and spend our time, of a kind very merusaklah very harmful to health [computer and your pocket]. Computer viruses have been around since 1960, since the beginning of the computer era, although the range in 1980 until they were mostly just specimens in the computer lab, created by researchers and released in a controlled environment to evaluate their effects. When the virus was first discovered on the surface in the 1980s, they spread very slowly, and move through "a network of smugglers": through floppy disks that are sold and shared between computers. But with the Internet and e-mail access to the accelerated spread of the virus. Two years ago, starting with the emergence of LoveLetter Melissa virus, the virus spread through e-mail continues to increase so that the ratio of ordinary computer users face virus was getting bigger. E-mail virus now occupy the top spot in which he accounted for 81 percent of the causes of a computer infected with viruses and can spread into the system in minutes.
6.Berlatih Computer Safely
best way to protect yourself [er, computer] you from the virus is if You have a connection to the Internet, do not open e-mail attachments from strangers, and avoid downloading from unknown sources. Resist the urge to double-click on the contents of your mailbox. And when you get a file attachment and you do not ask, ask the sender about the contents of attachments and how to use it before it opened. For security reasons, you need to install antivirus scanning software that is reliable and always download updates regularly. Major antivirus software vendors, like Symantec, Network Associates, Computer Associates, and Kaspersky Lab, provides a regular update service (as a record of Computer Associates InoculateIT antivirus software which is free). Some vendors also offer regular update services through their company Web site. Update on a regular basis is very important. The researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and it is because they do not update their antivirus software regularly or they are not properly menginstalasikannya.

7.How Work Antivirus Software
 Antivirus software scans the contents of computer hard disk in two ways . If there are known viruses (ie viruses known to exist and antidotes have been found) then the software will look for the signature (sign) virus - is a unique string of bytes that identifies the virus virus program is like a fingerprint - and will throw from your system. Most scanning software does not just look for the early type virus, but also can search for variants of the virus, because the code of the virus signature is usually similar. In the case of a new virus that has not found its antidote, antivirus software will run a program that will search heuristic virus-like activity on your system. If the program is not right to see any symptoms, it will quarantine the troubled program and will display a warning message to you about what will be done by the program (eg change your Windows registry). If you feel that the program and software is a virus, you can send files that have been quarantined at antivirus software vendor to be analyzed, to determine the signature, name it and put it in the catalog, and send her an antidote. Virus is a virus that is now known. If the virus does not appear again - this often happens because the virus is not well written for the spread - the vendor would categorize it as a dormant virus (virus sleep). But most viruses spread like an earthquake: The spread initially always accompanied by subsequent events. Variant virus (virus tracing the spread of the virus that emerged after the first) will increase the number of virus types that exist. An example is when the Melissa virus LoveLetter appeared in the United States, its variants - VeryFunnyJoke - straight up in a few moments, followed by more than 30 other species two months later. And not all variants derived from the mysterious author of the program. Some companies have been infected by a variant of the virus is spread by the employees themselves are full of curiosity to the virus which they are received, creating variants, and releasing it in their company's computer system - sometimes inadvertently, sometimes it wants to do it.

Source:http: / / www.infokomputer.com

.

.

.

.
Design by BlogSpotDesign | Ngetik Dot Com