tv online

Tuesday, March 15, 2011

Component-Computer

Thursday, February 4, 2010

Component-Computer Components. 
Computers consists of three main components that can not be separated, namely: 

1. Hardware (hardware), is the physical equipment of the computer that we can see and feel. This hardware consists of; 

Input / Output Devices (I / O Device) Consists of input and output devices such as keyboards and printers.

Storage Devices (storage device) is a medium for storing data such as floppy disks, hard disks, CD-I, flash disk, etc.. 

Monitor / Screen Monitor is a means to show what we type on the keyboard board after processed by the processor. Monitors are also called visual display unit (VDU).

Case Unit is a place of all computer equipment, whether it was the motherboard, cards, other peripherals and Procesing Central Unit (CPU). Casing of this unit is also called the System Unit. Procesing 

Central Unit (CPU) is one of the most important computer, because the type of processor also determines the computer type. Whether or not a computer, type of computer, computer prices, is determined primarily by the type of computer processor prosesornya.Semakin sophisticated, the ability to be better and usually more expensive price.

2. Software (software), is a computer program that allows you to run a job according to the desired. The program is written with a special language understood by computers. Software consists of several types, namely:

• Operating System, such as DOS, Unix, Linux, Novell, OS / 2, Windows, is software that serves to activate all the devices installed on the computer so that each can communicate with each other. Without the computer operating system can not function at all. 

• Utility programs, like Norton Utility, Scandisk, PC Tools, dll.Program utility functions to assist or mengisikekurangan / weaknesses of the operating system, such as PC Tools can do the format commands as DOS, but PC Tools keterang and able to give a good animation in the process of formatting. Files that have been deleted by DOS can not be returned again but with the help of this program can be done.

• Application programs, such as GL, MYOB, Payroll, etc.. Is a special program to do a particular job, such as programs on a company's payroll. So this program is only used by the financial part can not be used by other departments. This application program is usually made by a computer programmer in accordance with the demands / needs of a person / institution / company for purposes of interennya. 

• Package Program, as Microsofr Office, Adobe fotoshop, macromedia studio, open office, etc. It is a program constructed so that can be used by many people with various interests. Such as MS-office, can be used by the finance department to create a bill, or the administration to create a sales letter and so on. 

• Programming Languages, PHP, ASP, dBase, Visual Basic, dll.Merupakan special software used to create computer programs, whether it's operating system, programs, etc. packages. This programming language is usually divided into 3 levels, namely;

o Low Level Language, the first generation programming language, this type of programming language is very difficult to understand because the machine language instructions. Usually only the manufacturer who understands it.
O Midle Level Language, is a middle-level programming language where instructions are approaching the use of everyday language, although it is still difficult to understand because many uses such as STO means singkatansingakatan store (for STORE) and MOV means move (an abbreviation of MOVE). The classified into these languages are Assembler, Fortran (Formula Translator).

o High Level Language, is a high-level language that has the cirri easily understood, because it uses everyday language, like BASIC, dBase, Visual Basic , VB.Net, etc..

3. Brainware (User), User is the personnel directly involved in the use of computers, such as systems analysts, programmers, operators, users, etc.. In large organizations, the problem is usually handled by computerized special section known as the EDP (Electronic Data Processing), or often called by EDP Department, headed by a Manager of EDP.



Understanding Computers.

Understanding Computers. 
 The word computer comes from the Latin word which means Computare count. In English is called to compute. By definition a computer translates into a set of electronic tools that work together, can receive data (input), process data (process) and providing information (output) as well as coordinated under the control programs stored in memory. So how can we describe the computer as follows :

1. Input Device, a device-computer hardware whose function is to enter data into computer memory, such as keyboard, mouse, joystick, etc.. 

2. Processor, is the main tool that manages all the computer activity of your computer itself. Processor consists of two main parts, namely; * Control Unit (CU), is a major component of the processor that controls all the devices installed on the computer, starting from the input devices to output devices. * Arithmetic Logic Unit (ALU), is part of the processor that special data processing arithmetic (add, reduce, etc.) and data logic (comparison).

3. Memory is data storage on a computer.
Memory is divided into two kinds, namely; * Read Only Memory (ROM), the memory can only be read alone, not to be changed and removed, and was filled by the computer manufacturer. The contents of ROM is required when the computer is turned on. Existing orders in the ROM part will be moved to RAM. Command in ROM include commands to read from the disk operating system, the command to check all the equipment in the unit and command system to display a message on the screen. ROM contents will not be lost even though there is no electricity. But at the present moment ROM has been developed and many kinds, including:

· PROM (PROGRAMMABLE ROM), the ROM that we can return the program to record may only once after that change can no longer be programmed.
· RPROM (Re-PROGRAMMABLE ROM ), is the development of PROM version where we can make changes repeatedly as desired.
· EPROM (Erasable Program ROM), a ROM and yangdapat we remove the program again, but how to eliminate it by using ultraviolet light. · EEPROM (Electrically Erasable ROM Program ), recent developments of the ROM mengubahdan where we can remove the program using teknikelektrik ROM. EEPROM is a type of the most widely used today.
* Random Access Memory (RAM), the name we can interpret that the RAM is a memory that can be accessed at random. RAM function is to keep our program if for a while (power on) when we turn off the computer, then all the data stored in RAM will be lost. The purpose of this RAM is the speed of data processing on the computer. In order to make the data we can not be lost as the computer is turned off, it would require an external storage media such as Floppy disk, hard disk, flash disk, PCMCIA cards and others.

4. Output Device, is a computer device that allows you to produce output, whether it's on paper (hardcopy), to the screen (softcopy) or the output of sound. For example a printer, speakers, plotter, monitor, and many others. From the description above we may conclude that the principles of computer work begins entering data from the input device, and the data processed by the CPU in such a way as we want and the data has been processed is stored in computer memory or disk. The recorded data we can see the result through the output device.


Carebrum (big brain)

Monday, January 11, 2010

Carebrum (big brain). 

Consisting of two parts called the right and Hemispherium cerabri fissures left by longitudinals cerabri and falx cerabri an expansion Duramater (layer covering a large brain.). Hemispherium large area consisting of:

a. Frontal lobe.
B. Parietal lobe.
C. Lobes occipitalis.
D. Temporal lobe

Other major brain regions:
a. Reili insula.
B. Lateral Gygus olfactorius.
C. Gygus parahippocamalis. Alur-emerged as a primary line of the barrier are:
• Sulcus centrallis.
• Sulcus lateralis. Hemispherium carebri sides of buildings connected by the so-called corpus callosum.

Central nervous system.

Central nervous system

Composition of the Central Nervous divided into two parts: 

1. Central nervous system. 
2. Composition of Peripheral Nerves. 

Central nervous system (sential nervous system), the adult human consists of six parts:

1. Telancephalon consists of Hemispherium carebri right and left in the middle of the lamina terminalis.
2. Diencephalon.
3. Masencephalon.
4. Metencephalon: comprises:
a. Carebllum
b. Pons varolli
5. Myelencephalon - a - Medulla oblongata
6. Spinallis medulla.

mozila

Thursday, December 10, 2009


 Mozilla has just released an e-mail client latest, Thunderbird 3. Software with some new features can be downloaded for free right now.

Thunderbird is Mozilla is developed for two years. This new version provides features such as tabbed e-mail, organizational tools and search features have improved.

According to Mozilla, "If you like Firefox's tabbed browsing, you'll like the tabbed e-mail. Tabbed e-mails of Thunderbird allows you to load the e-mail in separate tabs so that you can quickly switch between them. The search results also opened in a new tab. New tools such as timeline and filtering tools will help you find the e-mail that you are looking for, whether it is yesterday, last month, or a few years ago.

Archiving, according to Mozilla, a simple and requires only a single button press, or select the Archive button. Once terarsip, e-mail, e-mail is easy to find again, and all these actions will be faster. Any open tabs when you close the application will remain there until you sign-in again, while the main toolbar simplified.

Features Smart Filters and the address book one-kilk also been improved. There was also a new user setup process that eliminates the need to find out information about the type of POP. That means you can access your e-mail that there is only by giving your name, e-mail address and password.

But that may be most useful for those who often receive e-mail is Attachment Reminder. It works silently. Searching for the word "attachment" in the text and remind you to add a relevant document before you press the Send button.

computer


Becoming Parents Make Computer Firewall

A firewall is a device that can manage data traffic in the network. He can filter the data so that only data that is considered safe to be entered into a computer or network. "Castle of fire" was used to protect against "attack" or "smugglers" from outside the network.

Not only was it the task of a firewall. Security device that can also be used for access control-who can access the network and who should not. During the operation, he recorded all the events and report it to administrators.

Firewall there are two kinds, namely personal and network. Personal firewall designed to protect a computer connected to the network. Windows Firewall is one example of personal firewall applications.

While the network firewall designed to protect the network. This network firewall there are two forms, can be hardware, could also be the software. There is a special hardware for the firewall. But, we also can make a hardware firewall with a PC. Well, if your home is an old PC idle, use it to protect the computer network in your home.

In the PC, we will install a software. No need to buy, just download it, eh do not need to download also on the CD because there is also PCplus edition. SmoothWall Express is a free software is quite reliable. Although made based on the Linux operating system, open source firewall is still available in versions of Windows.

SmoothWall is designed to be easy to use and set-set through a web-based interface. Essentially practical. We do not need to have my level of knowledge in an office network administrator to use this software.

Let us install and use immediately.

1. SmoothWall Express Burn ISO to a CD. If SmoothWall Express is a CD, boot the computer using the CD that came SmoothWall screen. Press "Enter" to change the screen display. Once again, press "Enter".

2. Next will come the demand to enter the SmoothWall Express CD into the CD-ROM. Since the CD is in your CD-ROM is a CD that's right, just press "Enter".

3. The next dialog box to tell if the SmoothWall is installed. Again, press "Enter". Further confirmation will appear stating that the disk will be formatted. Approve the request by just pressing "Enter". Wait a moment until the new window appears that says the success of the installation.

4. The next process is to manage SmoothWall Express. SmoothWall will offer automated configuration process when previously you've been setting SmoothWall. Since this new configuration the first time, replied with "No".
5. The next window will ask for the keyboard mapping. Select the type of keyboard "UK" and press "Enter" to continue.

6. Enter a name for the "hostname". You are free to name this hostname. What is clear, do not use special characters such as spaces, numbers, underscores. This name will be called on the network when someday you want to access the firewall. In satandar, hostname will be filled "smoothwall".

7. The next window is the "default security policy". In this window, you can determine how tight the security level is applied. Options "Open" will make all the open access. Options "Half-open" to make some open access, others closed. Access closed access is usually considered to be risk of attack. Now, if the option "Closed" will close all access. Select the option in accordance with the security level you want, then press "Enter".

8. In the window "Network configuration menu", select "Network configuration type", then press "Enter". When the window "Network configuration type" open, select the type of configuration according to your network. Select the "Green" if your network is connected to the Internet via a modem or ISDN. Select the "Green + Red" if your network is connected to the Internet via a network card. If your wireless network and the Internet connect to the internet with a modem, select "Green + Purple (Red is modem / ISDN)". Select the "Green + Purple + Red" if your network card is connected to a wired network, wireless and internet.

9. Next, select the menu "Drivers and card assignments". There you are asked to set up your network card. Configuration that is here is very dependent on the brand and type of network card you use. If so, press "Enter".

10. In the next window, select the "Probe" SmoothWall to automatically detect the network card. Once detected you need to specify which network card was detected in the category "Green" or "Red". Select the "Green" and press "Enter".

11. Press "Enter", to return to the "Network configuration menu. Now click the "Address Settings". Select the "Green" on this window. When a warning window appears, just answer with "OK".

12. Next you will be prompted to enter the IP address of the network following his mask in the window "Green Interface". If so, click "OK".

13. Repeat steps 11 and 12 until all the network card is configured successfully, both in orange or purple category. To access the Internet via a network card (RED), select option "RED" and press "Enter". Select "Static" if your static IP given by ISP. Select DHCP if you use dynamic IP. Select "PPPOE" if you use the "Point to Point Protocol Over Ethernet" to connect to your ISP. This choice depends on your ISP settings. Just ask them to know for sure. When we select the DHCP option, then we have to fill "DHCP hostname" from the ISP. If we use static IP, of course, we must enter the IP address and network mask. When everything is complete, press "OK".

14. Now it's time you select the "DNS and Gateway settings". Enter "IP control" and "IP gateway". Press OK and select Done to close the Network Configuration menu.

15. Now you'll be taken to "Section menu. Here you can set the proxy, ISDN, ADSL, and DHCP server. If you do not use it, pass it directly by pressing the "Finished".

16. You are asked to enter an administrator password twice. Minimum password length of 6 characters and maximum 25 characters. This password will be used to manage web-based SmoothWall at this initial configuration is complete. Finally, a confirmation window will appear that the setup process is complete. You can press OK to restart the PC.

17. After restarting, you can access via browser SmoothWall Express. Enter the computer name or IP address of the firewall in the browser, for example: http://smoothwall:81 or https: / / 192.168.0.2:441. You can access the server via HTTPS via port 441 or port 81 via HTTP. When the warning appears on the digital certificate, accept the certificate.

18. Enter admin as the username and password fill in accordance with the password you specified in the configuration process at the beginning of the installation. Page SmoothWall displays IP configuration and data traffic has been running like. To further firewall configuration changes can be done through a web-based interface is. Not have to worry again with a complicated configuration in the beginning.

 
 
Copyright © princess