Wednesday 24 October 2012

Funny Explanation of Programming Language

I just found a funny explanation kinds of programming language in human language.
Understandable and interesting because there is a sense of humor in the explanation.


PHP is your teenage sweetheart, the girl you first awkwardly fumbled around with that one summer. Just don't try and start a more serious relationship - this girl has serious issues.

Perl is PHP's older sister. She might be a bit old for you, but she was pretty popular back in the 90s. She's looking pretty ugly and scarred now, so you don't hear from her too much.

Ruby is the cool kid of the scripting family. When you first saw her, she took your breath away with her beauty. She was fun, too. At the time she seemed a bit slow and ditzy - though she's matured a lot in the last few years.

Python is Ruby's sensible (and slightly more boring) sister.

Java is a successful career woman. What she lacks in raw intelligence she makes up for in dress - always turned out in immaculateCamelCase, sure to impress the enterprise customers. You might feel like she's the sensible type you should settle down with. Just prepare for years of "NO THAT DOESNT GO THERE GOD YOU ALWAYS USE THE WRONG TYPE AND YOU MISSED A SEMICOLON" nagging.

C++ is Java's cousin. Similar to Java in many ways, the main difference being she grew up in a more innocent time and doesn't believe in condoms/automatic memory management, so be cautious.

C is C++'s mom. Mention her name to some old grey beard hackers and they're sure to reminisce with a twinkle in their eye.

Objective C is another member of the C family. She joined that weird church a while back, and won't date anyone outside of it.

Haskell, Clojure, Scheme and their friends are those hipster, artsy, intellectual girls you probably spent a blissful college summer with a few years ago. The first girls who really challenged you. Of course, it could never have become something more serious (you tell yourself). Though you'll always be left asking "what if?"

You might be put off C# due to her family's reputation. But they've gone legit, the last few years, they tell you. Once you're one of us, you're one of us, you hear? You need a database? Her brother MSSQL will hook you up. Need a place to stay? Heck, her daddy will even buy you your own mansion on Azure avenue. What's that, you're having second thoughts about all these overly friendly relatives? No, you can never leave. You're part of the family, now, ya hear?

Javascript - hey, wasn't that the girl you first kissed, way before even PHP came on the scene? I wonder what she's doing now. I hear her career's really taken off in the last few years. Would be cool to catch up some time, if only for old time's sake... (You catch sight of her, dressed head to toe in designer jQuery)... wow,somebody grew into a beautiful swan...

Hope you like it ! :)

Source: http://www.quora.com/Programming-Languages/In-laymans-terms-what-are-the-major-programming-languages-and-what-are-they-used-for

PTI Assignment

From now on, i will use this blog to submit my PTI tasks which is given by Mr. Tri Djoko Wahjono, PTI lecturer.

Chapter 5

Discovering Computer 2011 Living in a Digital World Answers
Page 293-294

True / False
1.   True
2.   True
3.   False
4.   True
5.   False
6.   False
7.   False
8.   False
9.   False
10. True
11. True
12. True



Multiple Choice
1. C
2. A
3. B
4. C
5. D
6. C
7. C
8. C



Matching
1.   b
2.   g
3.   d
4.    j
5.   e
6.   a
7.   h
8.   f
9.   i
10. c


Short Answer
1. What are three different types of mouse devices?
Three different types of mouse devices are mechanical, opt. mechanical, and optical.

- What makes them different from each other?
Mechanical: Has a rubber or metal ball on its underside that can roll in all directions. Mechanical sensors within the mouse detect the direction the ball is rolling and move the screen pointer accordingly.

Opt. mechanical: Same as a mechanical mouse, but uses optical sensors to detect motion of the ball.

Optical: Uses a laser to detect the mouse's movement. You must move the mouse along a special mat with a grid so that the optical mechanism has a frame of reference. Optical mice have no mechanical moving parts. They respond more quickly and precisely than mechanical and optomechanical mice, but they are also more expensive.


2. Name at least five mouse operations.
Single-click, Double-click, Triple-click, Drag, right click


- Describe and give examples of each of the mouse operations
that you chose.

Single-click: clicking the main button.
Ex: The user click left / right mouse button to any object on desktop.

Double-click: clicking the button two times in quick succession counts as a different gesture than two separate single clicks.
Ex : When you want to open an application, you do double click on the icon of that application.

Triple-click: clicking the button three times in quick succession.
Ex: If you want to block all words in one sentence, try to do triple click.

Drag: pressing and holding a button, then moving the mouse without releasing.
Ex: Block a paragraph by holding the right click and moving the mouse without releasing (drag)

Right-click: clicking the secondary button.
Ex: You do this when you want to see the optional features of any application (properties).


3. What is OCR (optical character recognition)?
Optical Character Recognition (OCR) is a technology that involves reading typewritten, computer printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.

- What is OMR (optical character recognition)?
Optical Mark Recognition (OMR) is a technology that reads hand-drawn marks such as small circles or rectangles.


4. What is the most widely used biometric device today?
The most widely used biometric device today is fingerprint reader.

- Describe how the device works.
A fingerprint reader, captures curves and indentations ofa fingerprint to identify whether the ‘inputted’ fingerprint are the right one.


5. What is the Americans with Disabilities Act (ADA)?
 Americans with Disabilities Act are rules for company with 15 or more employees to make a reasonable attempt to accommodate the need of physically challenged workers.

- How might gesture recognition and computerized implant devices help physically challenged users in the future?
Gesture recognition and Computerized implant devices are a way for human to provide a natural computer interface for the physically challenged people through a means of just moving a small part of the body that are still functioning.


Chapter 2

Discovering Computers 2011 : Living in a Digital World Answers

True/False
1.   False
2.   False
3.   True
4.   False
5.   True
6.   False
7.   True
8.   True
9.   False
10. False
11. True
12. True

Multiple Choice
1. c
2. b
3. c
4. a
5. a
6. a
7. c
8. c

Checkpoint
1.   h
2.   b
3.   f
4.   e
5.   a
6.   i
7.  d
8.   g
9.   j
10. c


Short Answers
1. - Cable internet service provides high-speed Internet access through the cable television network via a cable modem
 - DSL provides high-speed internet connections using regular copper telephone lines
 - Wi-Fi uses radio signals to provide high-speed internet connections to compatible or properly equipped       wireless computers and devices.

Regional ISP provides internet access to a specific geographic area while national ISP provides internet in cities and towns nationwide.

2. Static webpage allows all visitors to see the same content. Dynamic webpage allows users to customize some or all content.

Website is a collection of related Web pages and associated items, such as documents and pictures, stored on a Web server.

3. Web application is a web site that allows users to access and interact with software through a web browser on any computer and device that is connected to the internet.

The features and examples of web applications are : Google Docs ( word processing, spreadsheets, presentations), Turbo Tax Online ( tax preparation), Windows Live Hotmail (e-mail)

4. The three types of specifications used by content aggregators to distribute content are RSS 2.0, Atom, Web Slices

Accuracy of a website can be evaluated by using evaluation criteria : affiliation, audience, authority, content, currency, design, objectivity.

5. Web publishing is the development and maintenance of Web pages.

The 5 major steps in Web publishing are plan a website, analyze and design a website, create a website, deploy a website, maintain a website.

Chapter 1

Discovering Computer 2011 Living in a Digital World Answer 

True / False
1.   True
2.   False
3.   False
4.   True
5.   False
6  . False
7.   True
8.   True
9.   True
10. True
11. False

Multiple Choice
1. b
2. a
3. c
4. a
5. a
6. b
7. b
8. d


Matching
1.   a
2.   j
3.   g
4.   d
5.   h
6.   b
7.   f
8.   i
9.   c
10. e

Short Answers
1. A computer is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use.
The information processing cycle is input, process, output, storage.


2. Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back. Besides, computers usage can lead to another health risk, computer addiction .Computer addiction occurs when someone becomes obsessed with using a computer.

Computer manufacturing processes and computer waste are depleting natural resources and polluting the environment. When computers are discarded in landfills, they can release toxic materials and potentially
dangerous levels of lead, mercury, and flame retardants.


3. A Web application is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet.
Web 2.0 provide a means for users to share personal information (such as social networking Web sites), allow users to modify the Web site contents (such as some blogs), and/or have software built into the site for users to access (such as Web applications).


4. Seven categories of computer : PC, mobile computers/devices, embedded computer, super computer, mainframes, servers, and game consoles.

A computer’s size, speed, processing power, and price determine the category it best fits.


5. Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. These Web sites also maintain lists of doctors and dentists to help you find the one that suits your needs. They have chat rooms, so that you can talk to others diagnosed with similar conditions. Some Web sites even allow you to order prescriptions online.

Through telemedicine, health-care professionals in separate locations conduct live conferences on the computer. While telesurgery, also called remote surgery, a surgeon performs an operation on a patient who
is not located in the same physical room as the surgeon.

Chapter 4

Discovering Computer 2011 Living in a Digital World Answer
Page 247-248



True / False


1.   True
2.   False
3.   True
4.   True
5.   False
6.   True
7.   True
8.   True
9.   False
10. False
11. False
12. False



Multiple Choice


1. B . CPU
2. B . arithmetic logic unit
3. B.  registers
4. B . massively parallel processing
5. C . firmware
6. B . port replicator
7. A . docking station
8. D . front side bus



Matching


1. h
2. a
3. f
4. b
5. d
6. e
7. g
8. c
9. i
10. j



Short Answer

1. What are two types of designs of Tablet PCs?
Tablet PCs come in two basic designs: convertible and slates.

- What are the differences in the designs of the two types of Tablet PCs?
Convertibles are similar to traditional laptop computers except for the screen which can open to resemble a monitor, swivel 180 degrees and fold back onto the keyboard.

Slates do not have integrated keyboards and therefore rely more heavily on entering data through the stylus. Docking stations and keyboards are available for slates, but may need to be purchased separately.


2. What is the motherboard?
Motherboard  is the main circuit board of the system unit.

- What is a computer chip?
Computer chip is a small piece of semiconducting material on which the integrated circuit are etched.


3.  What are the four basic operations in a machine cycle?
The four basic operations of a machine cycle is fetching, decoding, executing, storing.

- What are some functions of registers?
Register functions include storing thelocation from where an instruction was fetched,storing an instruction while the control unitdecodes it, storing data while the ALU computesit, and storing the results of a calculation.


4.  What types of devices might be Bluetooth enabled?
Computers, peripherals, smart phones, PDAs, mobile phones, laptop, and tablet

- Describe three ways in which a computer can become Bluetooth enabled !

A computer can become Bluetooth enabled by purchasing a Bluetooth wireless port adapter, Bluetooth PC Cards and ExpressCard modules for traditional notebook computers and Tablet PCs, and Bluetooth cards for smart phones and PDAs.


5.  What is compressed air used for with regards to caring for your computer?
Compressed air can be used to removes dust andlint from difficult-to-reach areas and removes sticky liquid spilled on keyboards.

- How should you prepare for cleaning your computer?
Before cleaning a computer, turn it off and unplug it from any electrical source.

Disconnect all cables from the port. Use compressed air to blow away dust on the computer opening. Then wipe the case of the computer using antistatic wipe, use cleaning solution and a soft cloth to clean the computer screen.

Prepare also antistatic wristband, vacuum cleaner, and antistatic wipe to clean the inside of the computer.
If you are not comfortable cleaning the inside of your computer, call professional to do it for you.

Thursday 18 October 2012

Chapter 3

This assignment is given by Mr. Tri Djoko Wahjono, my PTI lecturer.

Chapter 3 – Discovering Computer 2011- Living in a Digital World
Page 183 – 184


I.True / False
  1. False
  2. False
  3. False
  4. True
  5. True
  6. True
  7. True
  8. False
  9. True
  10. True
  11. True
  12. True

II.Multiple Choice
1. A. Packaged Software
2. A. A software suite
3. B. Project management software
4. C. Document management
5. C. Personal DTP software
6. B. Photo management software
7. C. Newsgroup/message board
8. B. Online Help

III. Matcing
1.     I           6.L
2.     E          7.A
3.     J           8.G
4.     B          9.K
5.     D         10.C
Short Answer

1. Utility programs are normally software tools which resolve problems, or aid in the optimal use of a computer. Examples:  Examples:
  • Anti-virus utilities scan for computer viruses.
  • Archive utilities output a stream or a single file when provided with a directory or a set of files. Archive utilities, unlike archive suites, usually do not include compression or encryption capabilities. Some archive utilities may even have a separate un-archive utility for the reverse operation.
  • Backup utilities can make a copy of all information stored on a disk, and restore either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental deletion).
  • Cryptographic utilities encrypt and decrypt streams and files.
  • Data compression utilities output a shorter stream or a smaller file when provided with a stream or file.

  • Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs.

2.Presentation softwares allow users to do their presentation with some features like slide shows,arranged word and design which makes the presentation not boring the attendants, and the users can insert image,music,or video which is  related to the presentation’s topic which will help the presentation easier to be understood by the attendants.The users also able to insert tables,charts and etc to give more information in the presentation.

People use media types like the images,audio-clips,video-clips, and photos to enhance the multimedia presentation


3. Travel and Mapping software display maps by searching for anaddress, postal code, telephone number, or pointof interest (such as airports, lodging, and historicalsites).

Reference software includesencyclopedias, dictionaries, and health/medical guides.


4. Computer-based training (CBT) is a type of education in which studentslearn by using and completing exerciseswith instructional software.

Athlete can learn the basic of some sports, while military and airlines use CBT simulations to train pilots to flyin various conditions and environments.


5. Many web sites offers web-based training to public for free, while there are some that need a registration and payment to take complete course. Web-based training is popular in business,industry, and schools for teaching new skills orenhancing existing skills of employees, teachers,or students.

To enhance communications,e-learning systems also may include feeding e-mail, blogs, wikis, newsgroups,forums, chat rooms, and groupware.

Sunday 7 October 2012

Si Cacing dan Kotoran Kesayangannya


Buku ini sekarang merupakan international bestselling. Awalnya, gue tertarik sama buku ini gara-gara cover dan judulnya yang menarik. 

Terus, juga ada suatu label di buku ini yang ga lazim, yaitu garansi 100% uang kembali jika tidak mendapatkan manfaat dari buku ini. 

Menurut gue, label garansi itu cukup lucu buat sebuah buku. Mungkin banyak juga orang yang beli buku ini gara-gara itu. Meskipun ada garansi kayak gitu, sampai saat ini gue ga pernah pake garansi itu. 

Buku ini emang ditulis oleh seorang biksu, tapi bukan berarti buku ini dikhususkan buat penganut Buddha aja. Gue juga salut sama penerjemah dan editornya (Handaka  Vijjananda). Banyak pencerahan yang gue dapet dari buku ini. 

Gue biasa baca buku ini waktu malam, buat pengantar tidur (setiap malam 1 atau 3 cerita). Seperti gaya pengajaran Sidharta Gautama, pelajaran-pelajaran hidup yang ada di buku ini dibawakan dalam bentuk cerita oleh Ajahn Brahm.

Saat ini gue udah melahap habis buku-buku Ajahn Brahm (terakhir baca Si Cacing dan Kotoran Kesayangannya 3!). Menurut gue, buku ini harus dibaca anak remaja yang sering galau dan pekerja kantoran yang selalu 'bilang' gak punya waktu!. Worth reading!