I just found a funny explanation kinds of programming language in human language.
Understandable and interesting because there is a sense of humor in the explanation.
PHP is your teenage sweetheart, the girl you first awkwardly fumbled around with that one summer. Just don't try and start a more serious relationship - this girl has serious issues.
Perl is PHP's older sister. She might be a bit old for you, but she was pretty popular back in the 90s. She's looking pretty ugly and scarred now, so you don't hear from her too much.
Ruby is the cool kid of the scripting family. When you first saw her, she took your breath away with her beauty. She was fun, too. At the time she seemed a bit slow and ditzy - though she's matured a lot in the last few years.
Python is Ruby's sensible (and slightly more boring) sister.
Java is a successful career woman. What she lacks in raw intelligence she makes up for in dress - always turned out in immaculateCamelCase, sure to impress the enterprise customers. You might feel like she's the sensible type you should settle down with. Just prepare for years of "NO THAT DOESNT GO THERE GOD YOU ALWAYS USE THE WRONG TYPE AND YOU MISSED A SEMICOLON" nagging.
C++ is Java's cousin. Similar to Java in many ways, the main difference being she grew up in a more innocent time and doesn't believe in condoms/automatic memory management, so be cautious.
C is C++'s mom. Mention her name to some old grey beard hackers and they're sure to reminisce with a twinkle in their eye.
Objective C is another member of the C family. She joined that weird church a while back, and won't date anyone outside of it.
Haskell, Clojure, Scheme and their friends are those hipster, artsy, intellectual girls you probably spent a blissful college summer with a few years ago. The first girls who really challenged you. Of course, it could never have become something more serious (you tell yourself). Though you'll always be left asking "what if?"
You might be put off C# due to her family's reputation. But they've gone legit, the last few years, they tell you. Once you're one of us, you're one of us, you hear? You need a database? Her brother MSSQL will hook you up. Need a place to stay? Heck, her daddy will even buy you your own mansion on Azure avenue. What's that, you're having second thoughts about all these overly friendly relatives? No, you can never leave. You're part of the family, now, ya hear?
Javascript - hey, wasn't that the girl you first kissed, way before even PHP came on the scene? I wonder what she's doing now. I hear her career's really taken off in the last few years. Would be cool to catch up some time, if only for old time's sake... (You catch sight of her, dressed head to toe in designer jQuery)... wow,somebody grew into a beautiful swan...
Hope you like it ! :)
Source: http://www.quora.com/Programming-Languages/In-laymans-terms-what-are-the-major-programming-languages-and-what-are-they-used-for
Wednesday, 24 October 2012
PTI Assignment
Published :
07:01
Author :
White Dove
From now on, i will use this blog to submit my PTI tasks which is given by Mr. Tri Djoko Wahjono, PTI lecturer.
Chapter 5
Published :
06:27
Author :
White Dove
Discovering
Computer 2011 Living in a Digital World Answers
Page
293-294
True / False
1.
True
2.
True
3.
False
4. True
5. False
6.
False
7. False
8.
False
9. False
10. True
11. True
12. True
Multiple Choice
1. C
2. A
3. B
4. C
5. D
6. C
7. C
8. C
Matching
1. b
2. g
3. d
4. j
5.
e
6. a
7. h
8.
f
9.
i
10. c
Short Answer
1. What are
three different types of mouse devices?
Three different
types of mouse devices are mechanical, opt. mechanical, and optical.
- What makes them
different from each other?
Mechanical: Has a rubber or metal ball on its underside that can roll in all
directions. Mechanical sensors within the mouse detect the direction the ball
is rolling and move the screen pointer accordingly.
Opt. mechanical: Same as a mechanical mouse, but uses optical sensors to detect
motion of the ball.
Optical: Uses a laser to detect the mouse's movement. You must move the
mouse along a special mat with a grid so that the optical mechanism has a frame
of reference. Optical mice have no mechanical moving parts. They respond more
quickly and precisely than mechanical and optomechanical mice, but they are also
more expensive.
2. Name at least
five mouse operations.
Single-click, Double-click, Triple-click, Drag, right click
- Describe and
give examples of each of the mouse operations
that you chose.
Single-click: clicking the main button.
Ex: The user click left / right mouse button to any
object on desktop.
Double-click: clicking the button two times in quick
succession counts as a different gesture than two separate single clicks.
Ex
: When you want to open an application, you do double click on the icon of that
application.
Triple-click: clicking the button three
times in quick succession.
Ex: If you want to block all words in
one sentence, try to do triple click.
Drag: pressing and holding a button,
then moving the mouse without releasing.
Ex: Block a paragraph by holding the
right click and moving the mouse without releasing (drag)
Right-click: clicking the secondary button.
Ex: You do this when you want to see the optional features of any
application (properties).
3. What is OCR (optical character recognition)?
Optical Character
Recognition (OCR) is a technology that involves reading typewritten, computer printed,
or hand-printed characters from ordinary documents and translating the images
into a form that the computer can process.
- What is OMR (optical character
recognition)?
Optical Mark
Recognition (OMR) is a technology that reads hand-drawn marks such as small
circles or rectangles.
4. What is the most widely used biometric
device today?
The most widely used
biometric device today is fingerprint reader.
- Describe how the device works.
A fingerprint reader, captures curves and indentations ofa
fingerprint to identify whether the ‘inputted’ fingerprint are the right one.
5. What is the Americans with
Disabilities Act (ADA)?
Americans
with Disabilities Act are rules for company with 15 or more employees to make a
reasonable attempt to accommodate the need of physically challenged workers.
- How might gesture recognition and computerized
implant devices help physically challenged users in the future?
Gesture recognition and Computerized implant devices are a way for human to provide a natural computer interface for the physically challenged people through a means of just moving a small part of the body that are still functioning.
Gesture recognition and Computerized implant devices are a way for human to provide a natural computer interface for the physically challenged people through a means of just moving a small part of the body that are still functioning.
Chapter 2
Published :
05:07
Author :
White Dove
Discovering Computers 2011 : Living in a Digital World Answers
True/False
1. False
2. False
3. True
4. False
5. True
6. False
7. True
8. True
9. False
10. False
11. True
12. True
Multiple Choice
1. c
2. b
3. c
4. a
5. a
6. a
7. c
8. c
Checkpoint
1. h
2. b
3. f
4. e
5. a
6. i
7. d
8. g
9. j
10. c
Short Answers
1. - Cable internet service provides high-speed Internet access through the cable television network via a cable modem
- DSL provides high-speed internet connections using regular copper telephone lines
- Wi-Fi uses radio signals to provide high-speed internet connections to compatible or properly equipped wireless computers and devices.
Regional ISP provides internet access to a specific geographic area while national ISP provides internet in cities and towns nationwide.
2. Static webpage allows all visitors to see the same content. Dynamic webpage allows users to customize some or all content.
Website is a collection of related Web pages and associated items, such as documents and pictures, stored on a Web server.
3. Web application is a web site that allows users to access and interact with software through a web browser on any computer and device that is connected to the internet.
The features and examples of web applications are : Google Docs ( word processing, spreadsheets, presentations), Turbo Tax Online ( tax preparation), Windows Live Hotmail (e-mail)
4. The three types of specifications used by content aggregators to distribute content are RSS 2.0, Atom, Web Slices
Accuracy of a website can be evaluated by using evaluation criteria : affiliation, audience, authority, content, currency, design, objectivity.
5. Web publishing is the development and maintenance of Web pages.
The 5 major steps in Web publishing are plan a website, analyze and design a website, create a website, deploy a website, maintain a website.
True/False
1. False
2. False
3. True
4. False
5. True
6. False
7. True
8. True
9. False
10. False
11. True
12. True
Multiple Choice
1. c
2. b
3. c
4. a
5. a
6. a
7. c
8. c
Checkpoint
1. h
2. b
3. f
4. e
5. a
6. i
7. d
8. g
9. j
10. c
Short Answers
1. - Cable internet service provides high-speed Internet access through the cable television network via a cable modem
- DSL provides high-speed internet connections using regular copper telephone lines
- Wi-Fi uses radio signals to provide high-speed internet connections to compatible or properly equipped wireless computers and devices.
Regional ISP provides internet access to a specific geographic area while national ISP provides internet in cities and towns nationwide.
2. Static webpage allows all visitors to see the same content. Dynamic webpage allows users to customize some or all content.
Website is a collection of related Web pages and associated items, such as documents and pictures, stored on a Web server.
3. Web application is a web site that allows users to access and interact with software through a web browser on any computer and device that is connected to the internet.
The features and examples of web applications are : Google Docs ( word processing, spreadsheets, presentations), Turbo Tax Online ( tax preparation), Windows Live Hotmail (e-mail)
4. The three types of specifications used by content aggregators to distribute content are RSS 2.0, Atom, Web Slices
Accuracy of a website can be evaluated by using evaluation criteria : affiliation, audience, authority, content, currency, design, objectivity.
5. Web publishing is the development and maintenance of Web pages.
The 5 major steps in Web publishing are plan a website, analyze and design a website, create a website, deploy a website, maintain a website.
Chapter 1
Published :
04:59
Author :
White Dove
Discovering Computer 2011 Living in a Digital World Answer
True / False
1. True
2. False
3. False
4. True
5. False
6 . False
7. True
8. True
9. True
10. True
11. False
Multiple Choice
1. b
2. a
3. c
4. a
5. a
6. b
7. b
8. d
Matching
1. a
2. j
3. g
4. d
5. h
6. b
7. f
8. i
9. c
10. e
Short Answers
1. A computer is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use.
The information processing cycle is input, process, output, storage.
2. Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back. Besides, computers usage can lead to another health risk, computer addiction .Computer addiction occurs when someone becomes obsessed with using a computer.
Computer manufacturing processes and computer waste are depleting natural resources and polluting the environment. When computers are discarded in landfills, they can release toxic materials and potentially
dangerous levels of lead, mercury, and flame retardants.
3. A Web application is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet.
Web 2.0 provide a means for users to share personal information (such as social networking Web sites), allow users to modify the Web site contents (such as some blogs), and/or have software built into the site for users to access (such as Web applications).
4. Seven categories of computer : PC, mobile computers/devices, embedded computer, super computer, mainframes, servers, and game consoles.
A computer’s size, speed, processing power, and price determine the category it best fits.
5. Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. These Web sites also maintain lists of doctors and dentists to help you find the one that suits your needs. They have chat rooms, so that you can talk to others diagnosed with similar conditions. Some Web sites even allow you to order prescriptions online.
Through telemedicine, health-care professionals in separate locations conduct live conferences on the computer. While telesurgery, also called remote surgery, a surgeon performs an operation on a patient who
is not located in the same physical room as the surgeon.
Chapter 4
Published :
04:42
Author :
White Dove
Discovering Computer 2011 Living in a Digital
World Answer
- What are the differences in the designs of the two types of Tablet PCs?
Page 247-248
True
/ False
1. True
2. False
3. True
4. True
5. False
6. True
7. True
8. True
9. False
10.
False
11.
False
12.
False
Multiple Choice
1.
B . CPU
2.
B . arithmetic logic unit
3.
B. registers
4.
B . massively parallel processing
5.
C . firmware
6.
B . port replicator
7.
A . docking station
8.
D . front side bus
Matching
1.
h
2.
a
3.
f
4.
b
5.
d
6.
e
7.
g
8.
c
9.
i
10.
j
Short Answer
1. What
are two types of designs of Tablet PCs?
Tablet PCs come in two basic designs: convertible and slates.
Tablet PCs come in two basic designs: convertible and slates.
- What are the differences in the designs of the two types of Tablet PCs?
Convertibles are similar to traditional laptop
computers except for the screen which can open to resemble a monitor, swivel
180 degrees and fold back onto the keyboard.
Slates do
not have integrated keyboards and therefore rely more heavily on entering data
through the stylus. Docking stations and keyboards are available for slates,
but may need to be purchased separately.
2. What is the motherboard?
Motherboard
is the main circuit board of the system unit.
-
What is a computer chip?
Computer chip is a small piece of semiconducting material on which the integrated circuit are etched.
Computer chip is a small piece of semiconducting material on which the integrated circuit are etched.
3. What
are the four basic operations in a machine cycle?
The four basic operations of a machine cycle
is fetching, decoding, executing, storing.
- What are some functions of registers?
Register functions include storing thelocation
from where an instruction was fetched,storing an instruction while the control
unitdecodes it, storing data while the ALU computesit, and storing the results
of a calculation.
4. What
types of devices might be Bluetooth enabled?
Computers, peripherals, smart phones, PDAs, mobile
phones, laptop, and tablet
-
Describe three ways in which a computer can become Bluetooth enabled !
A
computer can become Bluetooth enabled by purchasing a Bluetooth wireless port adapter, Bluetooth PC Cards and
ExpressCard modules for traditional notebook computers and Tablet PCs, and
Bluetooth cards for smart phones and PDAs.
5. What
is compressed air used for with regards to caring for your computer?
Compressed air can be used to removes dust andlint
from difficult-to-reach areas and removes sticky liquid spilled on keyboards.
-
How should you prepare for cleaning your computer?
Before
cleaning a computer, turn it off and unplug it from any electrical source.
Disconnect all cables from the port. Use compressed air to blow away dust on
the computer opening. Then wipe the case of the computer using antistatic wipe,
use cleaning solution and a soft cloth to clean the computer screen.
Prepare also antistatic wristband, vacuum cleaner, and antistatic wipe to clean
the inside of the computer.
If you are not comfortable cleaning the inside of your computer, call professional to do it for you.
If you are not comfortable cleaning the inside of your computer, call professional to do it for you.
Thursday, 18 October 2012
Chapter 3
Published :
19:06
Author :
White Dove
This assignment is given by Mr. Tri Djoko Wahjono, my PTI lecturer.
Chapter 3 – Discovering Computer 2011- Living in a Digital World
Page
183 – 184
I.True
/ False
- False
- False
- False
- True
- True
- True
- True
- False
- True
- True
- True
- True
II.Multiple Choice
1. A. Packaged Software
2. A. A software suite
3. B. Project management
software
4. C. Document
management
5. C. Personal DTP
software
6. B. Photo management
software
7. C. Newsgroup/message
board
8. B. Online Help
III. Matcing
1. I
6.L
2. E
7.A
3. J
8.G
4. B
9.K
5. D
10.C
Short Answer
1. Utility programs
are normally software tools which resolve problems, or aid in the optimal use
of a computer. Examples: Examples:
- Anti-virus utilities scan for computer
viruses.
- Archive utilities output a
stream or a single file when provided with a directory or a set of files.
Archive utilities, unlike archive suites, usually do not include
compression or encryption capabilities. Some archive utilities may even have
a separate un-archive utility for the reverse operation.
- Backup utilities can make a
copy of all information stored on a disk, and restore either the entire
disk (e.g. in an event of disk failure) or selected files (e.g. in an
event of accidental deletion).
- Cryptographic utilities encrypt
and decrypt streams and files.
- Data compression utilities
output a shorter stream or a smaller file when provided with a stream or
file.
- Malware, short for malicious
software, is software used or created to disrupt computer operation,
gather sensitive information, or gain access to private computer systems.
It can appear in the form of code, scripts, active content, and other
software.'Malware' is a general term used to refer to a variety of forms
of hostile or intrusive software. Malware includes computer viruses,
worms, trojan horses, spyware, adware, and other malicious programs.
2.Presentation softwares
allow users to do their presentation with some features like slide
shows,arranged word and design which makes the presentation not boring the
attendants, and the users can insert image,music,or video which is
related to the presentation’s topic which will help the presentation
easier to be understood by the attendants.The users also able to insert
tables,charts and etc to give more information in the presentation.
People use media types
like the images,audio-clips,video-clips, and photos to enhance the multimedia
presentation
3. Travel and Mapping
software display maps by searching for anaddress, postal code, telephone
number, or pointof interest (such as airports, lodging, and historicalsites).
Reference software
includesencyclopedias, dictionaries, and health/medical guides.
4. Computer-based
training (CBT) is a type of education in which studentslearn by using and
completing exerciseswith instructional software.
Athlete can learn the
basic of some sports, while military and airlines use CBT simulations to train
pilots to flyin various conditions and environments.
5. Many web sites offers
web-based training to public for free, while there are some that need a
registration and payment to take complete course. Web-based training is popular
in business,industry, and schools for teaching new skills orenhancing existing
skills of employees, teachers,or students.
To enhance
communications,e-learning systems also may include feeding e-mail, blogs,
wikis, newsgroups,forums, chat rooms, and groupware.
Sunday, 7 October 2012
Si Cacing dan Kotoran Kesayangannya
Published :
05:43
Author :
White Dove
Terus, juga ada suatu label di buku ini yang ga lazim, yaitu garansi 100% uang kembali jika tidak mendapatkan manfaat dari buku ini.
Menurut gue, label garansi itu cukup lucu buat sebuah buku. Mungkin banyak juga orang yang beli buku ini gara-gara itu. Meskipun ada garansi kayak gitu, sampai saat ini gue ga pernah pake garansi itu.
Buku ini emang ditulis oleh seorang biksu, tapi bukan berarti buku ini dikhususkan buat penganut Buddha aja. Gue juga salut sama penerjemah dan editornya (Handaka Vijjananda). Banyak pencerahan yang gue dapet dari buku ini.
Gue biasa baca buku ini waktu malam, buat pengantar tidur (setiap malam 1 atau 3 cerita). Seperti gaya pengajaran Sidharta Gautama, pelajaran-pelajaran hidup yang ada di buku ini dibawakan dalam bentuk cerita oleh Ajahn Brahm.
Saat ini gue udah melahap habis buku-buku Ajahn Brahm (terakhir baca Si Cacing dan Kotoran Kesayangannya 3!). Menurut gue, buku ini harus dibaca anak remaja yang sering galau dan pekerja kantoran yang selalu 'bilang' gak punya waktu!. Worth reading!
Subscribe to:
Posts (Atom)
About Me
What Is Programming
"Programming" is thinking, not typing. Most of programming is spent sleeping, walking around, staring out the window, or doing anything else that helps you relax and think.
Quote of The Day
“Courage is the discovery that you may not win, and trying when you know you can lose.”
Archive
Popular Posts
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. In what year was Plankalkul designed ? in what year ...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. Why is it useful for a programmer to have some back...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1.What are three reasons why syntax analyzers are base...
-
The Terminal is about a man who trapped in a terminal at New York's John F. Kennedy International Airport when he is denied entry into...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. What are the design issues for names ? Case sensi...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. Define syntax and semantics . Syntax is form o...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. What are the three characteristics of subprogram? ...
-
Buku ini sekarang merupakan international bestselling. Awalnya, gue tertarik sama buku ini gara-gara cover dan judulnya yang menarik. ...
-
Concept of Programming Languages by Robert W. Sebesta Answer Review Questions 1. What are the two kinds of abstractions in programmi...