Sunday, October 31, 2010
Hari Karnival Daerah Sabak Bernam
Explorace STAR PUTRA TEMPAT KE-3
Posted by enny efafiqa at 6:38 PM 0 comments
Sunday, July 4, 2010
Tuesday, June 29, 2010
differences between internet,intranet and extranet
There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized users. From within a company, an intranet server may respond much more quickly than a typical Web site. This is because the public Internet is at the mercy of traffic spikes, server breakdowns and other problems that may slow the network. Within a company, however, users have much more bandwidth and network hardware may be more reliable. This makes it easier to serve high bandwidth content, such as audio and video, over an intranet. (unless you work for the United States Marine Corps. Then you don't get to watch video's. And they Block 80% of any kind of "fun" or entertaining website available on the Internet) The Extranet is a portion of an organization's Intranet that is made accessible to authorized outside users without full access to an entire organization's intranet.
Posted by enny efafiqa at 6:42 PM 0 comments
Sunday, June 27, 2010
ring
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link[1]. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a Multistation Access Unit (MAU) to imitate a ring at the datalink layer.
Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.
Posted by enny efafiqa at 7:00 PM 0 comments
star topologi
Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.[1] Thus, the hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.
The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. [2]
It is also designed with each node (file servers, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.
Contents [hide]
1 Advantages
2 Disadvantages
3 References
4 See also
Posted by enny efafiqa at 6:55 PM 0 comments
bus topologi
A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.
Posted by enny efafiqa at 6:55 PM 0 comments
Sunday, June 20, 2010
Network Tropologi
A network consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable. This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated on each end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.
Network Categories
There are two main types of network categories which are:
Server based
Peer-to-peer
In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers.
In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many Microsoft Windows based computers will allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.
Posted by enny efafiqa at 6:52 PM 0 comments
Network Architecture
Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.
In computing, the network architecture is a characteristics of a computer network. The most prominent architecture today is evident in the framework of the Internet, which is based on the Internet Protocol Suite.
In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.
In distinct usage in distributed computing, network architecture is also sometimes used as a synonym for the structure and classification of distributed application architecture, as the participating nodes in a distributed application are often referred to as a network. For example, the applications architecture of the public switched telephone network (PSTN) has been termed the Advanced Intelligent Network. There are any number of specific classifications but all lie on a continuum between the dumb network (e.g., Internet) and the intelligent computer network (e.g., the telephone network). Other networks contain various elements of these two classical types to make them suitable for various types of applications. Recently the context aware network, which is a synthesis of the two, has gained much interest with its ability to combine the best elements of both
Posted by enny efafiqa at 6:51 PM 0 comments
Computer Network
[edit] Purpose
Computer networks can be used for several purposes:
Facilitating communications. Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing.
Sharing hardware. In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser printer are connected to a network, each user can then access the laser printer on the network, as they need it.
Sharing files, data, and information. In a network environment, any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.
Sharing software. Users connected to a network can access application programs on the network.
Posted by enny efafiqa at 6:33 PM 0 comments
Thursday, June 3, 2010
database developement
A database consists of an organized collection of data for one or more multiple uses. One way of classifying databases involves the type of content, for example: bibliographic, full-text, numeric, image. Other classification methods start from examining database models or database architectures: see below. Software organizes the data in a database according to a database model. As of 2010[update] the relational model occurs most commonly. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.
Posted by enny efafiqa at 12:59 AM 0 comments
Tuesday, June 1, 2010
software information system
SIW is an advanced System Information for Windows tool that gathers detailed information about your system properties and settings and displays it in an extremely comprehensible manner.
SIW can create a report file (CSV, HTML, TXT or XML), and is able to run in batch mode (for Computer Software and Hardware Inventory, Asset Inventory Tracking, Audit Software Licenses, Software License Compliance).
The system information is divided into few major categories:
Software Inventory: Operating System, Installed Software and Hotfixes, Processes, Services, Users, Open Files, System Uptime, Installed Codecs, Software Licenses (Product Keys / Serial Numbers / CD Key), Passwords Recovery.
Hardware Inventory: Motherboard, CPU, Sensors, BIOS, chipset, PCI/AGP, USB and ISA/PnP Devices, Memory, Video Card, Monitor, Disk Drives, CD/DVD Devices, SCSI Devices, S.M.A.R.T., Ports, Printers.
Network Information: Network Cards, Network Shares, currently active Network Connections, Open Ports.
Network Tools: MAC Address Changer, Neighborhood Scan, Ping, Trace, Statistics
Miscellaneous Tools: Eureka! (Reveal lost passwords hidden behind asterisks), Monitor Test, Shutdown / Restart.
Real-time monitors: CPU, Memory, Page File usage and Network Traffic.
SIW is a standalone utility that does not require installation (Portable Freeware) - one less installed program on your PC as well the fact that you can run the program directly from an USB flash drive, from a floppy, from a network drive or from a domain login script. SIW can be distributed freely (ftp, archives, CD-ROMs ...).
Posted by enny efafiqa at 7:55 PM 0 comments
concepts of information system
1 A Natural Structuring ConceptInformations systems are being designed as parts of increasingly complex systems. The complexity of these systems may result from their size, from the complexity of the information they need or generate, from the complexity of their behavior, from a long evolution,... In order to deal with this complexity, adequate structuring mechanisms are needed. We argue that the concept of agent is appropriate and natural to deal with the complexity of studied systems by decomposing them in a natural way.
When doing Requirements Engineering for an IS, it is important to model not only the ``to-be IS'' (what Jackson calls the machine [8]) but also the environment with which the machine will interact, which exists in spite of the machine (thereby constraining the machine) and in terms of which the requirements have to be expressed. Such an environment description can be structured in a natural way by identifying various agents having interactions among themselves and with the machine. The environment can be considered as a composite system [2] made of agents of different kinds like human beings (probably users of the IS), existing software, computer hardware or other kinds of devices like mechanical devices. All these agents have characteristics and behaviours that need to be taken into account to correctly model the behaviour of the ``to-be IS''.
The concept of agent is therefore a natural basic building block for structuring the description of an IS and its environment. Beneficial consequences of this structuring appear at various stages of the Requirements Engineering process. When modelling, it is well known that structuring allows analysts, amongst other things, to focus on some specific concerns and to distribute the work among them. Similarly, such advantages appear at the validation stage where a cooperative animation technique allows different people to play the role of agents and test requirements descriptions against scenarios (see [7]). Compositional reasoning can also be applied on a specification structured with agents, allowing to reason on or prove properties of some agents, by relying on conclusions previously achieved for other agents (see [11]).
Posted by enny efafiqa at 7:52 PM 0 comments
Information systems
Information Systems (IS) is a professional and academic discipline concerned with the strategic, managerial and operational activities involved in the gathering, processing, storing, distributing and use of information, and its associated technologies, in society and organizations. As an area of study, IS bridges the multidisciplinary business world and the interdisciplinary computer science field that is evolving toward a new scientific discipline.[4][5][6][7] An information systems discipline therefore is supported by the theoretical foundations of information and computations such that undergraduate students have unique opportunities to explore the academics of various business models as well as related algorithmic processes within a computer science discipline.[8][9][10] Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital information.[11][12] Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing).[13] Today, Computer Information System(s) (CIS) is often a track within the computer science field studying computers and algorithmic processes, including their principles, their software & hardware designs, their applications, and their impact on society.[14][15][16] Overall, an IS discipline emphasizes functionality over design.[17]
As illustrated by the Venn Diagram on the right, the history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century.[18] Regarding the circulation of information and ideas, numerous legacy information systems still exist today that are continuously updated to promote ethnographic approaches, to ensure data integrity, and to improve the social effectiveness & efficiency of the whole process.[19] In general, information systems are focused upon processing information within organizations, especially within business enterprises, and sharing the benefits with modern society.[20]
Posted by enny efafiqa at 7:50 PM 0 comments
programme development phase
Program Development Phase
To make a program, the programmer has to undergo several phases and which will determine how and what the program he should make.
Firstly, the programmer has to undergo the analyzing phase. In this phase, the programmer has to conduct a survey to determine the problem faced by the client and know the target user.
Then, the programmer will begin the design phase. In the design phase, the programmer has to design the program and draw them out as a pseudo code, flow chart or top down design model.
Next is the coding phase. In the coding phase, the programmer will begin his work on coding the program. The coding is usually be done by several programmer as a complex program consist of many syntax.
Testing and debugging phase are the next phase. Here the program done will be tested to ensure that is error free. The usual error is the syntax error, logic error and run-time error. This phase is also called debugging because the error occurred are also known as bug.
Finally it is the documentation phase. Documentation is also including internal documentation and marketing documentation. Internal documentation is made so that the programmer can easily edit the code in the future. It also enables other programmer to know how the program is coded so that they can also improve it. Marketing documentation is done so that the customer can have a better understanding on the program. This will also enable the potential customer to compare the program with other product and expect what they could gain from the program.Read more: http://www.bukisa.com/articles/108793_program-development-phase#ixzz0pez39EOS
Posted by enny efafiqa at 7:47 PM 0 comments
programming concepts
Introduction
Computer programs are collections of instructions that tell a computer how to interact with the user, interact with the computer hardware and process data. The first programmable computers required the programmers to write explicit instructions to directly manipulate the hardware of the computer. This "machine language" was very tedious to write by hand since even simple tasks such as printing some output on the screen require 10 or 20 machine language commands. Machine language is often referred to as a "low level language" since the code directly manipulates the hardware of the computer.
By contrast, higher level languages such as "C", C++, Pascal, Cobol, Fortran, ADA and Java are called "compiled languages". In a compiled language, the programmer writes more general instructions and a compiler (a special piece of software) automatically translates these high level instructions into machine language. The machine language is then executed by the computer. A large portion of software in use today is programmed in this fashion.
We can contrast compiled programming languages with interpreted programming languages. In an interpreted programming language, the statements that the programmer writes are interpreted as the program is running. This means they are translated into machine language on the fly and then execute as the program is running. Some popular interpreted languages include Basic, Visual Basic, Perl and shell scripting languages such as those found in the UNIX environment.
We can make another comparison between two different models of programming. In structured programming, blocks of programming statements (code) are executed one after another. Control statements change which blocks of code are executed next.
In object oriented programming, data are contained in objects and are accessed using special methods (blocks of code) specific to the type of object. There is no single "flow" of the program as objects can freely interact with one another by passing messages.
In this tutorial, we focus only on structured programming.
Program Structure
Virtually all structured programs share a similar overall structure:
Statements to establish the start of the program
Variable declaration
Program statements (blocks of code)
The following is a simple example of a program written in several different programming languages. We call this the "Hello World" example since all the program does is print "Hello World" on the computer screen.
Language
Example program
"C"
#include
void main() {
printf("Hello World");
}
C++
#include
int main()
{
cout
Pascal
program helloworld (output);
begin
writeln('Hello World');
end.
Oracle PL/SQL
CREATE OR REPLACE PROCEDURE helloworld AS
BEGIN
DBMS_OUTPUT.PUT_LINE('Hello World');
END;
Java
class helloworld
{
public static void main (String args [])
{
System.out.println ("Hello World");
}
}
Perl
#!/usr/local/bin/perl -w
print "Hello World";
Basic
print "Hello World"
Posted by enny efafiqa at 7:46 PM 0 comments
multimedia developement
About Us - Overview
Your gateway to MSC Malaysia is the Multimedia Development Corporation (MDeC), a high-powered 'one-stop agency' focused on ensuring the success of MSC Malaysia and the companies operating in it.
MDeC is incorporated under the Companies Act of Malaysia, and owned and funded by the Government. At MDeC, we combine the entrepreneurial efficiency and effectiveness of a private company with the decision-making authority of a high-powered government agency.
Our role is to advise the Malaysian Government on legislation and policies, develop MSC Malaysia-specific practises, and set breakthrough standards for multimedia operations. We also promote MSC Malaysia locally and globally, as well as support companies which are locating and located within MSC Malaysia.
We are dedicated to ensuring MSC Malaysia is the world's best environment to harness the full potential of ICT. MDeC is a champion, facilitator and partner. We champion the merits of MSC Malaysia, facilitate the entry of companies and partner with the Government and the private sector in realising both a vision and an opportunity.MDeC ensures that companies interested in entering MSC Malaysia have what they need to succeed. We guarantee a 30-day turnaround for applications, and will coach companies through the application process. As a performance-oriented, client-focused agency, we also assist in expediting permit and license approvals, and introduce companies to potential local partners and financiers.
Companies wishing to participate in the Corridor need not look elsewhere. Application begins and ends here. MDeC stands ready to work with investors, foreign and local, big or small, to ensure that MSC Malaysia fulfils its promises. Visit our Success Stories section to see what existing MSC Malaysia companies have to say about us.
Posted by enny efafiqa at 7:41 PM 0 comments
multimedia concepts
35.1 INTRODUCTION
As the name suggests, multimedia is a set of more than one media element used to produce a concrete and more structured way of communication. In other words multimedia is simultaneous use of data from different sources. These sources in multimedia are known as media elements. With growing and very fast changing information technology, Multimedia has become a crucial part of computer world. Its importance has realised in almost all walks of life, may it be education, cinema, advertising, fashion and what not.
Throughout the 1960s, 1970s and 1980s, computers have been restricted to dealing with two main types of data - words and numbers. But the cutting edge of information technology introduced faster system capable of handling graphics, audio, animation and video. And the entire world was taken aback by the power of multimedia.
35.2 OBJECTIVES
After going through this lesson you should be able to
explain what is multimedia
understand the importance of individual media elements
identify different hardware components required to run a multimedia
appreciate the impact of audio in educational presentation
describe how visual images, graphics and audio can be added to a presentation
enhance the capability of multimedia through interactive video impact
35.3 WHAT IS MULTIMEDIA?
Multimedia is nothing but the processing and presentation of information in a more structured and understandable manner using more than one media such as text, graphics, animation, audio and video. Thus multimedia products can be an academic presentation, game or corporate presentation, information kiosk, fashion-designing etc. Multimedia systems are those computer platforms and software tools that support the interactive uses of text, graphics, animation, audio, or motion video. In other words, a computer capable of handling text, graphics, audio, animation and video is called multimedia computer. If the sequence and timing of these media elements can be controlled by the user, then one can name it as Interactive Multimedia.
35.4 DIFFERENT MEDIA ELEMENTS
(i) Text
Inclusion of textual information in multimedia is the basic step towards development of multimedia software. Text can be of any type, may be a word, a single line, or a paragraph. The textual data for multimedia can be developed using any text editor. However to give special effects, one needs graphics software which supports this kind of job. Even one can use any of the most popular word processing software to create textual data for inclusion in multimedia. The text can have different type, size, color and style to suit the professional requirement of the multimedia software.
(ii) Graphics
Another interesting element in multimedia is graphics. As a matter of fact, taking into consideration the human nature, a subject is more explained with some sort of pictorial/graphical representation, rather than as a large chunk of text. This also helps to develop a clean multimedia screen, whereas use of large amount of text in a screen make it dull in presentation.
Unlike text, which uses a universal ASCII format, graphics does not have a single agreed format. They have different format to suit different requirement. Most commonly used format for graphics is .BMP or bitmap pictures. The size of a graphics depends on the resolution it is using. A computer image uses pixel or dots on the screen to form itself. And these dots or pixel, when combined with number of colors and other aspects are called resolution. Resolution of an image or graphics is basically the pixel density and number of colors it uses. And the size of the image depends on its resolution. A standard VGA (Virtual Graphics Arrays) screen can display a screen resolution of 640 ´ 480 = 307200 pixel. And a Super VGA screen can display up-to 1024 ´ 768 = 786432 pixel on the screen. While developing multimedia graphics one should always keep in mind the image resolution and number of colors to be used, as this has a direct relation with the image size. If the image size is bigger, it takes more time to load and also requires higher memory for processing and larger disk-space for storage.
However, different graphics formats are available which take less space and are faster to load into the memory.
There are several graphics packages available to develop excellent images and also to compress them so that they take lesser disk-space but use higher resolution and more colours. Packages like Adobe PhotoShop, Adobe Illustrator, PaintShop Pro etc. are excellent graphics packages. There are Graphics gallery available in CD’s (Compact Disk) with readymade images to suit almost every requirement. These images can directly be incorporated into multimedia development.
(iii) Animation
Moving images have an overpowering effect on the human peripheral vision. Followings are few points for its popularity.
Showing continuity in transitions:
Animation is a set of static state, related to each other with transition. When something has two or more states, then changes between states will be much easier for users to understand if the transitions are animated instead of being instantaneous. An animated transition allows the user to track the mapping between different subparts through the perceptual system instead of having to involve the cognitive system to deduce the mappings.
Indicating dimensionality in transitions:
Sometimes opposite animated transitions can be used to indicate movement back and forth along some navigational dimension. One example used in several user interfaces is the use of zooming to indicate that a new object is "grown" from a previous one (e.g., a detailed view or property list opened by clicking on an icon) or that an object is closed or minimized to a smaller representation. Zooming out from the small object to the enlargement is a navigational dimension and zooming in again as the enlargement is closed down is the opposite direction along that dimension.
Illustrating change over time
Since animation is a time-varying display, it provides a one-to-one mapping to phenomena that change over time. For example, deforestation of the rain forest can be illustrated by showing a map with an animation of the covered area changing over time.
Posted by enny efafiqa at 7:31 PM 0 comments
software requirements
A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. Use cases are also known as functional requirements. In addition to use cases, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints).
[edit] General Outline of a SRS
Software Requirements Specifications (SRS)
Cover Page
Revisions Page
Table of Contents
1 INTRODUCTION
1.1 Product Overview
1.2 Purpose
1.3 Scope
1.4 Reference
1.5 Definition And Abbreviation
2 OVERALL DESCRIPTION
2.1 Product Perspective
2.2 Product Functions
2.3 User Characteristics
2.4 General Constraints
2.5 Assumptions and Dependencies
3 SPECIFIC REQUIREMENTS
3.1 External Interface Requirements
3.1.1 User Interfaces
3.1.2 Hardware Interfaces
3.1.3 Software Interfaces
3.1.4 Communications Protocols
3.1.5 Memory Constraints
3.1.6 Operation
3.1.7 Product function
3.1.8 Assumption and Dependency
3.2 Software Product Features
3.3 Software System Attributes
3.3.1 Reliability
3.3.2 Availability
3.3.3 Security
3.3.4 Maintainability
3.3.5 Portability
3.3.6 Performance
3.4 Database Requirements
3.5 Other Requirements
4 ADDITIONAL MATERIALS
SRS for UMS (University Management System):
1. GENERAL DESCRIPTION – UMS is University Management System for managing the records of the alumni of the university as well as staff, faculty and higher authorities.
1.1 Purpose – The purpose for developing this type of software or introducing this UMS is to facilitate everyone who is concerned with the university.
1.2 Scope – The scope of UMS is global i.e. it should be able to be accessed from anywhere through internet i.e. registered users must be able to login to their accounts by directly accessing the university’s website and then signing in with their username and password anytime and anywhere.
1.3 Abbreviation – UMS University Management System
1.4 Overview – As the ums is able to have a user interface. It should have a drop down boxes and if we drag mouse on any control at our welcome screen information regarding that the control should be displayed. Help menu should be there. As a teacher it should provide them to upload the various assignments and the attendance of the students. As a developer it should make a user interface which is user friendly. He should make the UMS as simple as he can. Backup at the main server should be made.
2. OVERALL DESCRIPTION
2.1 Product Perspective – product i.e. UMS should be able to provide a basic and easy interchange of information i.e. it should be able to remove the communication gaps between a teacher and the student. It should have chat facilities for all the users that are online. It should be compatible with all the operating systems.
2.2 Product Functions - The following are the product functions of the UMS:
The UMS login box should on the official website of the university.
The password field should be secured.
After signing in all updates and new announcements for users should be displayed.
By clicking on the dropdown box of the options the user should be able to view progress reports, assignments, notes, attendance, placement services and results.
User should be able to change the passwords.
Web pages should support pdf, ppt, doc and similar supported formats so that they can be easily downloadable and unloadable.
2.3 User Characteristics – A user can only have his/her registration number as username so if he joins the university then only he can login. This prevents misuse, unauthorized access and hacking of the product.
2.4 General Constraints – Server capacity is how many users can access or can be online at once. More is the number of users more will be the network traffic and hence the server comes in a down state. Personal firewall and updating is a tough task, it should be such that it should not block the network traffic, making the system slower. Firewall of the UMS should not collide with the firewall of the user system.
2.5 Assumptions and Dependencies – UMS should work even at when the network traffic is high. Server should have a power backup as well as a database backup. The UMS should be compatible with most of the operating systems i.e. previous and latest ones.
3. SPECIFIC REQUIREMENTS
3.1 External Interface Required
3.1.1 User Interfaces – The external users are the students and the teachers of the university. The students can have an access to their accounts for their attendance, assignments etc. The teachers have also an account to access their account for uploading of the students’ attendance and the assignments to be submitted by them.
3.1.2 Hardware Interfaces – The external hardware interface used for accessing the UMS is the personal computers of the teachers and the students. The PCs may be laptops with wireless LAN as the internet connections provided will be wireless.
3.1.3 Software Interfaces – The Operating Systems can be any version of Windows, Linux, Unix or Mac which supports TCP/IP protocols.
3.1.4 Communication Interfaces – The communication interface is a local area network through wireless network routers.
3.2 Performance Requirements – The PCs used must be at least Pentium 4 machines so that they can give optimum performance of the product.
3.3 Design Constraints – The constraints at the designing time are that the needs of the university students and the teachers may keep on changing so the designers must keep this in view and design the product in this way that it is easily updatable.
3.4 Attributes – The following are the attributes of the product UMS:
It should be equipped with current and archive database.
All records can easily be updated.
It should have its personal firewall.
It should facilitate student with updating his/her account, downloading or uploading of assignments from anywhere.
It should also do the same for teachers they can also have their pay checks online i.e. UMS should be capable of online transaction.
3.5 Other Requirements – The software is such that as the time goes by the need of the university management, students and teachers may keep on changing thus it is made to change from time to time.
Posted by enny efafiqa at 7:29 PM 0 comments
hardware requiremants for networking
EZ-Zone Computer System Requirements
Computer Hardware and Operating System Softwarefor your EZ-Zone Software Products
* Click for server requirements
* Compatible with Apple Computers using a Windows Emulator or using Mac OS X 10.5 Leopard and Windows Operating system.
Local Area Network (LAN) Four Station Peer to Peer - The Ethernet hub connects the computer stations together to allow data and hardware resources to be shared. Ethernet hubs are now available in wireless format as well, eliminating the need for wires.
Make one computer the "server". It must run at all times. Network sharing can be set up on the "C" drive of the serving computer.
Drag and drop the *.exe file to the desk top of the other computers.
A separate program CD-Rom must be installed on the client computers, so that the proper control libraries are installed.
Standard Printers - can be used in a variety of formats. Tractor style work well for single and multiple label printing. Laser and bubble jet printers work well for volume reports and invoicing. The printer(s) can be connected to the parallel port on one computer and be shared by all computers on the LAN.
Barcode scanners - are easily connected using a key board wedge. Simple connect the scanner between your keyboard and computer.
Receipt Printers - must be compatible to the program being used. Call for details or read the help menu for specifications. Receipt printers are connected to the parallel port. All programs will print receipt on 8.5 " by 11".
Standard Printers - can be used in a variety of formats. Tractor style work well for label making. Laser printers work well for volume reports. All printers can be connected to the parallel port.
Cash drawers for POS systems - are connected directly to your receipt printer and when a receipt is made the cash drawer kicks open.
Computer specifications - Minimum specifications.
1.6 GHz CPU
1 Gigabyte Ram
250 GB hard drive
Keyboard, mouse (optical mouse controls work the best)
Color monitor - screen resolution 1024 x 768 or larger
Ethernet network card (on network for multiple users)
56 K fax modem (for inventory ordering and report sending)
For data serving, use UPS (universal power supply - 20 minute battery back up)
Laser or bubble-jet printer (for printing standard reports)
Ethernet hub and wire to attach other computers
Internet account with a mail account to use e-mail tools
Sound card and speakers for barcode use
2nd printer port (for label printing - optional)
Tractor feed printer (for labels - optional)
BACK UP - VERY IMPORTANT; Use one of the following:
USB Memory stick 16 GiG
CD-Rom read-write
Tape back up
External hard drive
Note - Laptop computers can be used, but must be designed for all day operation.
* Make a back up of your EZ-Zone Software nightly and remove from your premise, in the event that you have data corruption, you can install your back-up. Using computers that are not reliable can cause conflicts in your database. If you are not sure if your computer is capable of serving database software, contact our support with the specifications of your computer.
Computer specifications - Specifications for a new computer.
2.0 GHz Dual Core CPU
2 Gigabytes ECC Ram (for servers add 100 MB per user) ECC stands for error correcting code memory
250 GB hard drive
Keyboard, optical mouse with wheel
Color monitor - screen resolution 1024 x 768 or larger
56 K Fax Modem (for inventory ordering and report sending)
Laser printer for quick printing
Ethernet network card (on network for multiple users)
Ethernet hub and wire to attach other computers
Additional Ethernet network card for high speed internet or use central Ethernet hub with router for sharing
Internet account with a mail account to use e-mail tools
Laser Printer
2nd printer port (for label printing - optional)
Tractor feed printer (for labels - optional)
Sound card and speakers
For data serving, use UPS (universal power supply - 20 minute battery back up)
Posted by enny efafiqa at 7:27 PM 0 comments
basic concepts
Introduction
This is a continuation of my series of articles on the terms and concepts that are frequently asked in IT interviews. This article is an attempt to discuss the salient terminologies and concepts related to Computer networking that are often asked in interviews. Although an article on Computer Networking concepts and terms would run for many pages, I have discussed only important ones to make it fit in one article.
Computer Network
A Computer Network implies two or more computers those are linked together through some software, hardware, etc for the purpose of exchanging data and information.
Internet
The Internet is a network of networks. It is "the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP)."
World Wide Web
The World Wide Web or WWW is a hypertext based distributed information system. It "is the global network of hypertext (HTTP) servers that allow text, graphics, audio and video files to be mixed together." It is an "information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI)." According to Tim Berners-Lee, inventor of the World Wide Web, "The World Wide Web is the universe of network-accessible information, an embodiment of human knowledge."
Modem
A modem is a modulator-demodulator device that is used for converting the transmission signals from digital to analog for transmission over voice-grade phone lines. While the digital signals are converted to a form suitable for transmission over analog communication at the source, the reverse happens at the destination where these analog signals are returned to their original digital form.
Network Interface Controller
A network card, network adapter or the Network Interface Controller (NIC) is a piece of computer hardware that facilitates the systems in a network to communicate.
Broadcasting
When the information transfer is from one system to many systems using the same means of transfer then such a network is known as a Broadcasting or Multicasting.
Unicasting
When the information transfer is from one system to any other single system using the same means of transfer then such a network is known as Point-to-Point or Unicasting.
Bandwidth
Network bandwidth or network throughput is a measure of the data transfer rate or the amount of data that can pass through a network interface over a specific period of time. This is expressed in bits per second or bps.
Broadband
This is a wide-band technology that is capable of supporting voice, video and data. It is "a transmission medium capable of supporting a wide range of frequencies, typically from audio up to video frequencies. It can carry multiple signals by dividing the total capacity of the medium into multiple, independent bandwidth channels, where each channel operates only on a specific range of frequencies."
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network, an international standard for end-to-end digital transmission of voice, data, and signaling facilitates very high-speed data transfer over existing phone lines.
Network Load Balancing
Network Load Balancing may be defined as a technique that "distributes the network traffic along parallel paths to maximize the available network bandwidth while providing redundancy."
Local Area Network
LAN also known as Local Area Network are networks restricted on the bases of the area they cover. These networks stretch around an area of 10 meters to 1 km. "LANs enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers." The commonly used LAN devices include repeaters, hubs, LAN extenders, bridges, LAN switches, and routers.
Metropolitan Area Network
MAN also known, as Metropolitan Area Network is a network that is larger than LANs spreading across an area of 1 km to 10kms. A simple example for this type of network is the branches of a bank spread across the city and are connected for information exchange.
Wide Area Network
WAN also known, as Wide Area Network is a network that is larger than a MAN, it spreads across an area of 100kms to 1000 kms. "A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer." A simple example for these networks is the network of a huge IT company, which contains branches all over the world with all its branches connected to each other.
Wireless Networks
Wireless Networks are those networks wherein the interconnection between two systems is not physical. The computers that interchange information are not physically linked with wires.
Bluetooth
Bluetooth is a wireless network that has a short range and can be used to connect a system with its internal components like monitor, mouse, CPU, etc without actually having a plug in. Components that support the Bluetooth technology can be detected whenever they are in the detectable range.
Routing
When there are multiple paths between the sender and the receiver the best path for sending the information has to be chosen. The choice is made based on a number of criteria like the number of hops between the systems or on the physical distance between the systems. This process of finding the best path is known as routing.
Posted by enny efafiqa at 7:26 PM 0 comments
computer networks and Communications
10 INTRODUCTION
The purpose of a computer communications network is to allow moving information from one point to another inside the network. The information could be stored on a device, such as a personal computer in the network, it could be generated live outside the network, such as speech, or could be generated by a process on another piece of information, such as automatic sales transactions at the end of a business day. The device does not necessarily have to be a computer; it could be a hard disk, a camera or even a printer on the network. Due to a large variety of information to be moved, and due to the fact that each type of information has its own conditions for intelligibility, the computer network has evolved into a highly complex system. Specialized knowledge from many areas of science and engineering goes into the design of networks. It is practically impossible for a single area of science or engineering to be entirely responsible for the design of all the components. Therefore, a study of computer networks branches into many
areas as we go up from fundamentals to the advanced levels.
20 MOBILE COMPUTING
2.1 DEFINITION
Using a computing device while in transit. Mobile computing implies wirelesstransmission, but wireless transmission does not necessarily imply mobilecomputing. Fixed wireless applications use satellites, radio systems and lasers totransmit between permanent objects such as buildings and towers.
Posted by enny efafiqa at 7:17 PM 0 comments
Sunday, May 23, 2010
function of OS
The main functions of an OS include:
In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn.
It manages the sharing of internal memory among multiple applications.
It handles and monitors input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. [8]
It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred.
It can offload the management of what are called batch jobs (for example, printing) so that the initiating application is freed from this work.
On computers that can provide parallel processing, an operating system can manage how to divide the program so that it runs on more than one processor at a time.
Scheduling the activities of the CPU and resources to achieve efficiency and prevention of deadlock
Posted by enny efafiqa at 6:05 PM 0 comments
Saturday, May 22, 2010
Operating System
Because early computers were often built for only a single task, operating systems did not exist in their proper form until the 1960s.[4] As computers evolved into being devices that could run different programs in succession, programmers began putting libraries of common programs (in the form of computer code) onto the computer in order to avoid duplication and speed up the process. Eventually, computers began being built to automatically switch from one task to the next. The creation of runtime libraries to manage processing and printing speed came next, which evolved into programs that could interpret different types of programming languages into machine code. When personal computers by companies such as Apple Inc., Atari, IBM and Amiga became popular in the 1980s, vendors began adding features such as software scheduling and hardware maintenance.
An operating system can be divided into many different parts. One of the most important parts is the kernel, which controls low-level processes that the average user usually cannot see: it controls how memory is read and written, the order in which processes are executed, how information is received and sent by devices like the monitor, keyboard and mouse, and deciding how to interpret information received by networks. The user interface is the part of the operating system that interacts with the computer user directly, allowing them to control and use programs. The user interface may be graphical with icons and a desktop, or textual, with a command line. Another similar feature is an Application programming interface, which is a set of services and code libraries that let applications interact with one another, as well as the operating system itself. Depending on the operating system, many of these components may not be considered an actual part. For example, Windows considers its user interface to be part of the operating system, while many versions of Linux do not.
Posted by enny efafiqa at 5:56 PM 0 comments
Friday, May 21, 2010
Secondry Storage
In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the very significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data are transferred to and from disks in large contiguous blocks.
When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[2]
Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.
The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information.
Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded.
Posted by enny efafiqa at 5:42 PM 0 comments
Thursday, May 20, 2010
Primary Storage
Direct links to this section: Primary storage, Main memory, Internal Memory.
Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner.
Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory, which was still rather cumbersome. Undoubtedly, a revolution was started with the invention of a transistor, that soon enabled then-unbelievable miniaturization of electronic memory via solid-state silicon chip technology.
This led to a modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered).
As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM:
Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are technically among the fastest of all forms of computer data storage.
Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It's introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower.
Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks.
As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access).
Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly.
Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[1]
Posted by enny efafiqa at 5:28 PM 0 comments
Wednesday, May 19, 2010
Storage
Computer data storage, often called storage or memory, refers to computer components, devices, and recording media that retain digital data used for computing for some interval of time. Computer data storage provides one of the core functions of the modern computer, that of information retention. It is one of the fundamental components of all modern computers, and coupled with a central processing unit (CPU, a processor), implements the basic computer model used since the 1940s.
In contemporary usage, memory usually refers to a form of semiconductor storage known as random-access memory (RAM) and sometimes other forms of fast but temporary storage. Similarly, storage today more commonly refers to mass storage — optical discs, forms of magnetic storage like hard disk drives, and other types slower than RAM, but of a more permanent nature. Historically, memory and storage were respectively called main memory and secondary storage. The terms internal memory and external memory are also used.
The contemporary distinctions are helpful, because they are also fundamental to the architecture of computers in general. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature.
Posted by enny efafiqa at 5:22 PM 0 comments
Tuesday, May 18, 2010
Instalation ANTI-VIRUS
Install Kaspersky Internet Security
If you already have Kaspersky Internet Security 2010 installed and need to activate, please read our Kaspersky 2010 Activation page.
Before you begin:
Please make sure you have removed your previous security software (including prior versions of Kaspersky) in the Control Panel before installing Kaspersky.
If you need help removing the previous security programs, please check our list of removal tools for conflicting software.
If you are installing using the Kaspersky Internet Security 2010 CD, please skip to Step 2.
If you have purchased online, follow Step 1 to download your software.
Step 1 - Save the Installation File:
If you have Dial-Up Internet, we suggest you wait for the Backup CD to arrive to install.
Click the download link provided in your order email to begin. If the link has expired, you can download from our Kaspersky Internet Security Product Updates page.
You will be asked to Run, Save or Cancel the download. Click Save.
Posted by enny efafiqa at 5:32 PM 0 comments
Monday, May 17, 2010
Instalation office 2007
To create a network installation point
Create a folder for the Office source files at an accessible location on the network server. For example:
\\server\share\Office12
Note:
Do not create the network installation point at the root of the server.
Insert the Office CD into your CD drive.
In Windows Explorer, select all the files and folders on the CD. Copy the CD contents to the folder on the network. This location becomes your network installation point.
If you are deploying multiple language versions of Office, copy each language pack you want from the source media to the installation point. When you are prompted to overwrite duplicate Setup files, click No.
In the 2007 Office system, core Setup files are shared among all Office products and language packs. Because these files are identical, there is no reason to overwrite the files. Additionally, by not overwriting Setup files, the network installation point remains online and available to users while you add files.
If you are deploying multiple Office products, copy those files from the CD to the installation point. When you are prompted to overwrite duplicate Setup files, click No.
If you create a Setup customization file (MSP file) for the installation, store the file in the Updates folder at the root of the installation point.
Alternatively, you can use the /adminfile option to specify a Setup customization file on the command line.
If users are installing Office after product updates are released, store those MSP files in the Updates folder.
The amount of space required on the network installation point varies by product and by language. The following table shows space requirements for English versions of the 2007 Office system suites that are typically installed in enterprise organizations. These figures account for both the installed product and the installation files stored in the local installation source.
Microsoft Office Standard 2007
660 MB
Microsoft Office Professional Plus 2007
980 MB
Microsoft Office Enterprise 2007
1 GB
The installation point contains only one copy of the language-neutral core product. Each language that you add requires additional space only for the language-specific components.
For example, the U.S. English and the French versions of Office Enterprise 2007 require approximately 1 GB of space each on the server—more than 2 GB in total. Because the language-neutral components are not duplicated, however, a network installation point that includes both languages requires only about 1.75 GB of space. The amount of disk space that you save increases as you add more languages.
For detailed system requirements for all the products in the 2007 Office system, see 2007 Microsoft Office release system requirements.
Note Unlike previous versions of Microsoft Office products, in the 2007 Office system you do not create an administrative installation point by running Setup with the /a command-line option to extract compressed source files. In the 2007 Office system, all installations occur from the compressed source.
Replicate the network installation point
In most enterprise organizations, the network installation point is the location from which users initially install Office. After Office is installed, users do not typically need to rely on the network source for tasks such as updating, modifying, or reinstalling Office. Setup automatically creates a local installation source on each user's computer. If the local source is corrupted or deleted, however, Setup returns to the original network source to recreate the local source on the user's computer.
Replicating the network source to multiple locations is recommended for the following reasons:
Availability. Creating multiple network installation points (which may or may not be in the same physical location) helps ensure that users always have access to a network source. Ideally, the duplicate network installation points are managed by Distributed File System (DFS) technologies and are transparent to users.
Proximity to users. Many companies have high-speed LAN networks that are connected to other subsidiaries or branch offices by much slower WAN connections. Setting up a duplicate network installation point at the remote locations means that Office source files travel over the slow network connection only once; thereafter, users have access to a network source closer to them.
Consistency. By creating one network installation point with all the customizations you want and then duplicating that installation point as needed, you help ensure that the same configuration is deployed throughout your organization.
Flexibility. If the primary network installation point installs a standard corporate configuration of Office, regional offices can apply additional customizations to the replicated network installation points and customize Office for their unique region-specific requirements.
To specify additional network sources
Start the Office Customization Tool (OCT) by running Setup with the /admin command-line option.
On the Additional Network Sources page, click Add. Enter the path to the location to which you plan to copy the network installation point.
You can add as many additional source locations as you need.
Save the Setup customization file (MSP file) generated by the OCT in the Updates folder at the root of the network installation point.
Copy the entire folder structure of the network installation point to the locations you specified in the Setup customization file.
Users who install Office from any of these network installation points have access to the backup network sources. Setup checks these sources automatically when an alternate source is required.
Secure the network installation point
Follow these recommended best practices to help make the network installation point for Office secure:
Make sure that access to source files is read-only.
The Setup.xml and Package.xml files are digitally signed and cannot be modified.
Save all customization files that you create, including Setup customization files and custom Config.xml files, as read-only.
If you are centralizing log files on the network, make sure that users have read/write access to that location.
Make sure that all users have administrative rights before installing Office; you can accomplish this by using your existing software deployment infrastructure.
Posted by enny efafiqa at 5:30 PM 0 comments
Sunday, May 16, 2010
Menformat HARDISK
Tips dan Cara Memformat Ulang Hard Disk dan Menginstall Ulang OS Windows atau Linux pada Komputer PC / Laptop - Petunjuk Teknis
Mon, 19/06/2006 - 1:23pm — godam64
Masalah yang bersifat fatal dan parah bisa saja terjadi kapan dan di mana saja tidak memandang merk dan harga komputer pc / laptop anda. Terkadang komputer tidak bisa masuk ke windows akibat banyak hal seperti terkena virus, file booting hilang, bad sector, komputer lambat, komputer sering hang, salah seting dan berbagai masalah lainnya.
Jika berbagai cara sudah anda lakukan dan belum mendapatkan hasil yang memuaskan maka jalan pintas / singkat yang paling baik adalah dengan cara format ulang harddisk / hard drive yang ada di koputer pc / laptop anda. Pada tips ini akan diberikan beberapa langkah mudah yang dapat anda lakukan sendiri tetapi tidak secara mendetail. Bila anda butuh bimbingan anda bisa menanyakan di forum situs organisasi.org ini. Mudah-mudahan saya atau kawan lain dapat membantu anda.
A. Langkah dan Tahap Format Ulang Hard Disk
1. Back up / bekap file penting anda yang ada pada hardisk karena dengan format akan menghapus semua file yang ada di hard disk anda. Jika anda punya cd-rw drive atau dvd-rw drive anda bisa membakar file anda ke dalam cd atau dvd. Cara lain backup adalah dengan flash disk, disket floppy, disket zip, pindah file ke jaringan network lan atau internet pada komputer atau server lain dan lain-lain.
2. Setelah backup selanjutnya adalah membuat windows boot disk / rescue disk pada disket floppy 1.4 MB. Disket ini bertujuan untuk booting langsung ke disket tidak melalui harddisk anda. Istilahnya anda akan menggunakan os microsoft dos yang ada pada disket yang anda buat.
3. Ganti Setting BiosSaat komputer dinyalakan anda harus langsung masuk ke tampilan bios untuk setting pilihan urutan boot. Caranya ketika komputer baru dinyalakan anda menekan dan menahan tombol delete sampai bios muncul di layar monitor komputer anda. Ganti urutan booting dengan urutan pertama floppy disk.
4. Format Hard DiskSetelah bios diganti serta disave anda masukkan disket kemudian restart komputer anda. Nanti komputer anda akan otomatis boot dari disket tersebut dan pilih boot without cd-rom supaya proses booting bisa lebih cepat. Setelah masuk ke command prompt a:\ ketik format c: lalu tekan enter. Disesuaikan dengan jumlah partisi anda yang ada. Jika anda punya partisi 3 buah maka tambah perintah format d: dan format e:. Tips dan cara mempartisi hard disk mungkin bisa anda cari di kotak search di sebelah kiri halaman artikel ini. Jika format telah selsesai beri nama drive tersebut sesuai selera anda. Jika semua beres dan berjalan lancar maka proses format ulang telah selesai. Kini harddisk anda menjadi seperti baru kembali.
B. Langkah dan Tahap Install Ulang OS Windows dan Linux
1. Install Windows 98 / 2000 / ME / XP / Vista / LinuxLangkah pertama dalam mengistall ulang operating system pada komputer pc atau laptop anda adalah booting ulang ke disket anda dan pilih support cd-rom device. Setelah keluar command prompt lalu anda masukkan cd instalasi os anda sesuai selera anda. Kemudian cari drive cd-rom atau dvd-rom anda dengan mengetik d: atau e: dan lain sebagainya sesuai lokasi drive cd atau dvd rom anda. Setelah ketemu anda kemudian cari file setup.exe dengan perintah cdnama folfer untuk masuk ke dalam folder. Perintah cd.. untuk mundur satu folder level. perintah dir atau dir/w atau dir/p untuk melihat list file yang ada pada folder tersebut. Kalau sudah ketemu maka jalankan setup.exe atau install.exe dengan mengetik nama file tersebut lalu tekan tombol enter satu kali saja. Langkah berikutnya anda tinggal mengikuti perintah yang ada pada installasi cd atau dvd os.
2. Setting Settingan Boot pada BiosSetelah install ulang windows atau linux selesai, maka keluarkan disket flopyy 1,4 anda dan masuk kembali ke menu bios setelah restart ulang. Pilih IDE-0 sebagai first boot. Floppy bisa anda seting menjadi boot kedua dan cd-rom menjadi boot ketiga. Anda bebas menentukannya sesuai dengan keinginan anda. Sehabis itu direstart ulang kembali.
3. Install Driver dan SoftwareJika sudah berhasil masuk ke tampilan windows atau linux awal, selanjutnya anda nginstall driver untuk sound card, printer, scanner, kabel data, dan sebagainya sesuai hardware yang ada. Anda harus mencari dan memiliki sendiri driver tersebut. Setiap jenis komputer memiliki driver yang berbeda. Biasanya anda akan diberi cd driver saat anda membeli komputer atau hardware lainnya. Tanpa driver maka peralatan yang terhubung pada komputer laptop atau pc tidak dapat berjalan sebagaimana mestinya.
Selamat mencoba dan semoga berhasil
Posted by enny efafiqa at 5:22 PM 0 comments