Welcome to the most useless blog in the world

Welcome to the most useless blog in the world
Feel free to +1 (pretty please)

Monday, January 27, 2014

What do you do ?

Everyone has a spare time, at least once or twice a week. What do you do at that time ? Do you just rest and be lazy all day ? Do you hang out with friends ? Do you ever get an idea to write ? Well, I write. I started writing when I'm in high school. I wrote everything in English, because of many reasons, two exactly. First, English is one of the universal languages here, on planet Earth. Second, I speak more fluently in English than my native language. In high school, I always got 90-100 score in English and 75 (minimum passing standard) in my native language.

So, in my spare time, I loose myself in writing. Writing is fun, you shall try it. I've written many things. Some I saved on my notes, some I posted. Where ? Haha it's a secret. Why ? Oh you know why. The fact that I enjoy talking a lot make me enjoy writing. It's just connected. I write thing just like what I could talk about it. I imagine myself talking while I'm writing. Sometimes when I write an imaginary story, I felt that I'm the main character. That way, I feel more alive when I'm writing, like I'm surrounded by some stage I set, with background music I imagine, and with sound effects I make.

How to make a good writing ? Simple. You don't try to make it good, you try to make it interesting. You make it realistic. Don't wait for spare time. Just write anything you're at. Just write at any moment. Just write anything that happens or just happened. Just capture your moment, pour your situation into one single writing. One single chapter. One single sentense. And the rest of it ? It'll be flowing through brain.

And just use the language you can. Use the language you're comfortable with. If you want to write in mandarin, just write. If in spanish, just write. Any language. And just use your writing style. Mine ? My style is interacting with readers. I don't remember how I became interested in this style. And you must find your own style, to make you writing enjoyable to read. Even though it's sad story, scary story, or even your story.

So, do you consider on writing ? Try it, it's fun. And just imagine it will be legendary. Don't wait for it. Do it now.

Sunday, January 26, 2014

Love at the first sight ?

Do you believe in love at the first sight ? Well, I don't. If you "fall in love" in first sight, then you don't love her/him, you're just attracted to her/him. Love is supposed to be growing. I think that is the problem of most teens today. They're attracted at someone's look by just looking for the first time. They blindly think that they love her/him. In fact, they're just physically attracted by someone they barely know. That, ladies and gentlemen, is how I respond to song "Pandangan Pertama".

Saturday, January 18, 2014

Japanese Culture Week's (JCW) second teaser. By: BINUS Square Student Committee


Japanese Culture Week's (JCW) teaser. By: BINUS Square Student Committee


CHAPTER 10. Assignment from Mr. Tri Djoko Wahjono

1. What Is a Database, and How Does a Database Interact with Data and Information?

A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. Database software, often called a database management system (DBMS), allows users to create a computerized database; add, modify, and delete the data; sort and retrieve the data; and create forms and reports from the data. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Computers process data into information. Information is processed data; that is, it is organized, meaningful, and useful. In addition to documents, information can be in the form of audio, images, and video.



2. What Is Data Integrity, and What Are the Qualities of Valuable Information?

Because data is used to generate information, many organizations realize that data is one of their more valuable assets. Data integrity identifi es the quality of data. Data integrity is important because computers and people use information to make decisions= and take actions. For a computer to produce correct information, the data that is entered in a database must have integrity. For information to be valuable, it should be accurate, verifi able, timely, organized, accessible, useful, and cost-effective. Accurate information is error free. Verifi able information can be proven as correct or incorrect. Timely information has an age suited to its use. Organized information is arranged to suit the needs and requirements of the decision maker. Accessible information is available when the decision maker needs it. Useful information has meaning to the person who receives it. Cost-effective information should give more value than it costs to produce.



3. What Is Meant by Character, Field, Record, and File?

Data is classifi ed in a hierarchy, with each level of data consisting of one or more items from the lower level. A bit is the smallest unit of data a computer can process. Eight bits grouped together in a unit form a byte, and each byte represents a single character, which can be a number, letter, space, punctuation mark, or other symbol. A field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses. A record is a group of related fi elds. A data file is a collection of related records stored on a storage medium such as a hard disk or optical disc.



4. What Are File Maintenance Techniques and Validation Techniques?

File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records when new data is obtained, modifying records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed. Validation is the process of comparing data with a set of rules or values to fi nd out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

5. How Is a File Processing Approach Different from the Database Approach?

In a file processing system, each department or area within an organization has its own set of data fi les. The records in one fi le may not relate to the records in any other fi le. Two major weaknesses of fi le processing systems are redundant data (duplicated data) and isolated data. With a database approach, many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time. A database, however, can be more complex than a fi le processing system, requiring special training and more computer memory, storage, and processing power than fi le processing systems. Data in a database also can be more vulnerable than data in fi le processing systems.



6. What Functions Are Common to Most Database Management Systems?

Database management  systems (DBMSs) are available for many sizes and types of computers. Whether designed for a small or large computer, most DBMSs perform common functions. Chapter Review The Chapter Review reinforces the main concepts presented in this chapter. A data dictionary, sometimes called a repository, contains data about each fi le in the database and each fi eld in those fi les. A DBMS offers several methods to retrieve and maintain data in the database, such as query languages, query by example, forms, and report generators. A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store. Query by example (QBE) has a graphical user interface that assists users with retrieving data. A form, sometimes called a data entry form, is a window on the screen that provides areas for entering or modifying data in a database. A report generator, also called a report writer, allows users to design a report on the screen, retrieve data into the report design, and then display or print the report. To supply security, most DBMSs can identify different levels of access privileges that defi ne the actions a specifi c user or group of users can perform for each fi eld in a database. If a database is damaged or destroyed, aDBMS provides techniques to return the database to a usable form. A backup is a copy of the database. A log is a listing of activities that modify the contents of the database. A recovery utility uses the logs and/orbackups to restore the database using rollforward or
rollback techniques. In a rollforward, also called forward recovery, the DBMS uses the log to reenter changes made to the database since the last save or backup. In a rollback, also called backward recovery, the DBMS uses the log to undo any changes made to the database during a certain period. Continuous backup is a backup plan in which all data is backed up whenever a change is made.

7. What Are Characteristics of Relational, Object-Oriented, and Multidimensional Databases?

A data model consists of rules and standards that defi ne how the database organizes data. Three popular data models are relational, object-oriented, and multidimensional. A relational database stores data in tables that consist of rows and columns. A relational database developer refers to a fi le as a relation, a record as a tuple, and a fi eld as an attribute. A relational database user refers to a fi le as a table, a record as a row, and a fi eld as a column. A relationship is a link within the data in a relational database. Structured Query Language (SQL) allows users to manage, update, and retrieve data in a relational database. An object-oriented database (OODB) stores data in objects. An object is an item that contains data, as well as the actions that read or process the data. Applications appropriate for an object-oriented database include a multimedia database, a groupware database, a computer-aided design (CAD) database, a hypertext database, and a hypermedia database. Object-oriented databases often use an object query language (OQL) to manipulate and retrieve data. A multidimensional database stores data in dimensions. These multiple dimensions, sometimes known as a hypercube, allow users to access and analyze any view of the database data. No standard query language exists for multidimensional databases. One application that uses multi dimensional databases is a data warehouse, which is a huge database that stores and manages the data required to analyze historical and current transactions. A smaller version of a data warehouse is the data mart, which contains a database that helps a specifi c group or department make decisions.



8. How Are Web Databases Accessed?

To access data in a Web database, you fill in a form or enter search text on a Web page, which is the front end to the database. A Web database usually resides on a database server, which is a computer that stores and provides access to a database. One type of program that manages the sending and receiving of data between the front end and the database server is a CGI (Common Gateway Interface) script.



9. What Are the Responsibilities of Database Analysts and Administrators?

A database analyst (DA), or data modeler, focuses on the meaning and usage of data. The DA decides on the placement of fi elds, defi nes data relationships, and identifi es users’ access privileges. A database administrator (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages database security, monitors database performance, and checks backup and recovery procedures. In small companies, one person often is both the DA and DBA. In larger companies, the responsibilities of the DA and DBA are split among two or more people

CHAPTER 9. Assignment from Mr. Tri Djoko Wahjono

1.     What Is the Purpose of the Components Required for Successful Communications, and What Are Various Sending and Receiving Devices?
Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. Today, even the smallest computers and devices can communicate directly with one another, with hundreds of computers on a company network, or with millions of other computers.
For successful communications, you need the following:
• A sending device that initiates an instruction to transmit data, instructions, or information.
• A communications device that connects the sending device to a communications channel.
• A communications channel, or transmission media on which the data, instructions, or information travel.
• A communications device that connects the communications channel to a receiving device.
• A receiving device that accepts the transmission of data, instructions, or information.
Some devices that serve as sending devices and receiving devices are
(a) mainframe computers,
(b) servers,
(c) desktop computers,
(d) notebook computers,
(e) smart phones,
(f) Internet-enabled portable media players,
(g) handheld game consoles, and
(h) GPS receivers.
The communications channel consists of telephone and power lines, cable television and other underground lines, microwave stations, and satellites.

2.     How Are Computer Communications Used?
Computer communications are everywhere. Many require that users subscribe to an Internet access provider. With other computer communications, an organization such as a business or school provides communications services to employees, students, or customers.
The following pages discuss a variety of computer communications. Communications technologies include blogs, chat rooms, e-mail, fax, FTP, instant messaging, newsgroups, RSS, video conferencing, VoIP, Web, Web folders, and wikis. Users can send and receive wireless messages to and from smart phones, cell phones, handheld game consoles, and other mobile devices using text messaging, picture messaging and video messaging, and wireless instant messaging. People connect wirelessly to the Internet through a wireless Internet access point. A hot spot is a wireless network that provides Internet connections to mobile computers and devices. A cybercafé is a coffeehouse, restaurant, or other location that provides computers with Internet access. A global positioning system (GPS) analyzes signals sent by satellites to determine an earth-based receiver’s geographic location. Many software products provide a means to collaborate, or work online with other users connected to a server. Groupware is software that helps groups of people work on projects or share information over a network.
Voice mail allows someone to leave a voice message for one or more people. Web services describe standardized software that enables programmers to create applications that communicate with other remote computers.

3.     What Are the Advantages of Using a Network, and How Are LANs, MANs, and WANs Different?
a network is a collection of computers and devices  connected together via communications devices and transmission media. Many businesses network their computers together to facilitate communications, share hardware, share data and information, share software, and transfer funds.
• Facilitating communications — Using a network, people communicate efficiently and easily via e-mail, instant messaging, chat rooms, blogs, wikis, online social networks, video telephone calls, online meetings, video conferencing, VoIP, wireless messaging services, and groupware.
• Sharing hardware — In a networked environment, each computer on the network can have access to hardware on the network. Business and home users network their hardware to save money.
• Sharing data and information — In a networked environment, any authorized computer user can access data and information stored on other computers on the network.
• Sharing software — Users connected to a network have access to software on the network.
To support multiple users’ access of software, most vendors sell network versions or site licenses of their software, which usually cost less than buying individual copies of the software for each computer.
• Transferring funds — Called electronic funds transfer (EFT ), it allows users connected to a network to transfer money from one bank account to another via transmission media.
LANs, MANs, and WANs
Networks usually are classified as a local area network, metropolitan area network, or wide area network. The main differentiation among these classifications is their area of coverage.
·         LAN (local area network) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network, called a node, often shares resources such as printers, large hard disks, and programs.Often, the nodes are connected via cables.
·         MAN (metropolitan area network) is a high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region. A MAN typically includes one or more LANs, but covers a smaller geographic area than a WAN. A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users. Local and state governments, for example, regulate some MANs. Telephone companies, cable television operators, and other organizations provide users with connections to the MAN.
·         WAN (wide area network) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves (Figure 9-12). A WAN can be one large network or can consist of two or more LANs connected together. The Internet is the world’s largest WAN.

4.     How Are a Client/Server and Peer-to-Peer Network Different, and How Does a P2P Network Work?
·         Client/Server
On a client/server network, one or more computers act as a server, and the other computers on the network request services from the server. A server, sometimes called a host computer, controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information. The clients are other computers and mobile devices on the network that rely on the server for its resources. For example, a server might store a database of customers. Clients on the network (company employees) access the customer database on the server.
·         Peer-to-Peer
One type of peer-to-peer network is a simple, inexpensive network that typically connects fewer than 10 computers. Each computer, called a peer, has equal responsibilities and capabilities, sharing hardware (such as a printer), data, or information with other computers on the peer-to-peer network. Each computer stores files on its own storage devices. Thus, each computer on the network contains both the server operating system and application software. All computers on the network share any peripheral device(s).attached to any computer. For example, one computer may have a laser printer and a scanner, while another has an ink-jet printer and an external hard disk. Peer-to-peer networks are ideal for very small businesses and home users.
·         Another type of peer-to-peer, called P2P, describes an Internet network on which users access each other’s hard disks and exchange files directly over the Internet. This type of peer-to peer network sometimes is called a file sharing network because users with compatible software and an Internet connection copy files from someone else’s hard disk to their hard disks. As more users connect to the network, each user has access to shared files on other users’ hard disks. When users log off the network, others no longer have access to their hard disks.

5.     How Are a Star Network, Bus Network, and Ring Network Different?
·         Star Network
On a star network, all of the computers and devices (nodes) on the network connect to a central device, thus forming a star. Two types of devices that provide a common central connection point for nodes on the network are a hub and a switch. All data that transfers from one node to another passes through the hub or switch. Star networks are fairly easy to install and maintain. Nodes can be added to and removed from the network with little or no disruption to the network. On a star network, if one node fails, only that node is affected. The other nodes continue to operate normally. If the hub or switch fails, however, the entire network is inoperable until the device is repaired. Most large star networks, therefore, keep backup hubs or switches available in case the primary one fails.
·         Bus Network
A bus network consists of a single central cable, to which all computers and other devices connect. The bus is the physical cable that connects the computers and other devices. The bus in a bus network transmits data, instructions, and information in both directions. When a sending device transmits data, the address of the receiving device is included with the transmission so that the data is routed to the appropriate receiving device. Bus networks are popular on LANs because they are inexpensive and easy to install. One advantage of the bus network is that computers and other devices can be attached and detached at any point on the bus without disturbing the rest of the network.
·         Ring Network
On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the ring. Data transmitted on a ring network travels from device to device around the entire ring, in one direction. When a computer or device sends data, the data travels to each computer on the ring until it reaches its destination. If a computer or device on a ring network fails, the entire network potentially could stop functioning. A ring network can span a larger distance than a bus network, but it is more difficult to install. The ring topology primarily is used for LANs, but also is used in WANs.

6.     What Are Various Network Communications Standards?
A network standard defines guidelines that specify the way computers access a medium, the type(s) of medium, the speeds on different types of networks, and the type of physical cable or wireless technology used. Network communications standards include the following. Ethernet specifies that no central computer or device on the network should control when data can be transmitted. Token ring requires devices to share or pass a special signal, called a token. TCP/IP divides data into packets. Wi-Fi identifies any network based on the 802.11 standards for wireless communications.  Bluetooth uses short-range radio waves to transmit data. UWB specifies how two UWB devices use short-range radio waves to communicate at high speeds. IrDA transmits data wirelessly via infrared light waves. RFID uses radio signals for communications. WiMAX is a network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area. The Wireless Application Protocol (WAP) specifies how some mobile devices can display Internet content.

7.     What Is the Purpose of Communications Software?
Communications software consists of programs that (1) help users establish a connection to another computer or network; (2) manage the transmission of data, instructions, and information; and (3) provide an interface for users to communicate with one another. The first two are system software and the third is application software. Chapter 3 presented a variety of examples of application software for communications: e-mail, FTP, Web browser, newsgroup/message boards, chat rooms, instant messaging, video conferencing, and VoIP. Sometimes, communications devices are preprogrammed to accomplish communications tasks. Other communications devices require separate communications software to ensure proper transmission of data. Communications software works with the network standards and protocols just discussed to ensure data moves through the network or the Internet correctly. Communications software usually is bundled with the operating system or purchased network devices. Communications software helps users establish a connection to another computer or network; manages the transmission of data, instructions, and information; and  provides an interface for users to communicate with one another.


8.     What Are Various Types of Lines for Communications over the Telephone Network?
·         Dial-Up Lines
A dial-up line is a temporary connection that uses one or more analog telephone lines for communications. A dial-up connection is not permanent. a dial-up line to connect computers costs no more than making a regular telephone call.
·         Dedicated Lines
Satellite local access area local telephone company A dedicated line is a type of always on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used). The quality and consistency of the  connection on a dedicated line are better than a dial-up line because dedicated lines provide a constant connection. Businesses often use dedicated lines to connect geographically distant offices. Dedicated lines can be either analog or digital. Digital lines increasingly are connecting home and business users to networks around the globe because they transmit data and information at faster rates than analog lines. Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM.
·         ISDN Lines
For the small business and home user, an ISDN line provides faster transfer rates than dial-up telephone lines. Not as widely used today as in the past, ISDN (Integrated Services Digital Network) is a set of standards for digital transmission of data over standard copper telephone lines. With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called multiplexing.
·         DSL
DSL is a popular digital line alternative for the small business or home user. DSL (Digital Subscriber Line) transmits at fast speeds on existing standard copper telephone wiring.
Some DSL installations include a dial tone, providing users with both voice and data communications. These DSL installations often require that filters be installed to reduce noise interference when voice communications share the same line. ADSL is one of the more popular types of DSLs. As shown in Figure 9-25, ADSL (asymmetric digital subscriber line) is a type of DSL that supports faster transfer rates when receiving data (the downstream rate) than when sending data (the upstream rate). ADSL is ideal for Internet access because most users download more information from the Internet than they upload.
·         FTTP
FTTP, which stands for Fiber to the Premises, uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical permanent location. Two specific types of FTTP are FTTH and FTTB. FTTH (Fiber to the Home) provides home users with Internet access via fiber-optic cable. Similarly, FTTB (Fiber to the Building) refers to small businesses that use fiber-optic cables to access the Internet. With FTTP service, an optical terminal at your location receives the signals and transfers them to a router connected to your computer. As the cost of installing fiber decreases, more homes and businesses will opt for this high-speed Internet access.
·         T-Carrier Lines
A T-carrier line is any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line. Where as a standard dial-up telephone line carries only one signal, digital T-carrier lines use multiplexing so that multiple signals share the line. T-carrier lines provide very fast data transfer rates. Only medium to large companies usually can afford the investment in T-carrier lines because these lines are so expensive.
·         ATM
ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video, and multimedia at very high speeds. Telephone networks, the Internet, and other networks with large amounts of traffic use ATM. Some experts predict that ATM eventually will become the Internet standard for data transmission, replacing T3 lines.

9.     What Are Commonly Used Communications Devices?
A communications device is hardware capable of transmitting data between a sending device and a receiving device. A dial-up modem converts digital signals to analog signals and analog signals to digital signals. So that data can travel along analog telephone lines. A digital modem sends and receives data and information to and from a digital line. An ISDN modem transmits digital data to and from an ISDN line, while a DSL modem transmits digital data to and from a DSL line. A cable modem, sometimes called a broadband modem, is a digital modem that sends and receives digital data over the cable television network. A wireless modem uses the cell phone network to connect to the Internet wirelessly from mobile computers and devices. A network card enables a computer or device that does not have built-in networking capability to access a network. A wireless access point allows computers and devices to transfer data wirelessly. A router connects multiple computers or other routers together and transmits data to its correct destination on the network. A hub or switch is a device that provides a central point for cables in a network.

10.                        How Can a Home Network Be Set Up?
A home network connects multiple computers and devices in a home. An Ethernet network connects each computer to a hub with a physical cable. A home power line cable network uses the same lines that bring electricity into the house. A phone line network uses existing telephone lines in a home. Most home networks use a Wi-Fi network.


11.                        What Are Various Physical and Wireless Transmission Media?

·         Twisted-Pair Cable
One of the more widely used transmission media for network cabling and telephone systems is twisted-pair cable. Twisted-pair cable consists of one or more twisted-pair wires bundled together. Each twisted-pair wire consists of two separate insulated copper wires that are twisted together. The wires are twisted together to reduce noise. Noise is an electrical disturbance that can degrade communications.
·         Coaxial Cable
Coaxial cable, often referred to as coax (pronounced KO-ax), consists of a single  copper wire surrounded by at least three layers: (1) an insulating material, (2) a woven or braided metal, and (3) a plastic outer coating (Figure 9-37). Cable television (CATV) network wiring often uses coaxial cable because it can be cabled over longer distances than twisted-pair cable. Most of today’s computer networks, however, do not use coaxial cable because other transmission media such as fiber-optic cable transmit signals at faster rates.
·         Fiber-Optic Cable
The core of a fiber-optic cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. Each strand, called an optical fiber, is as thin as a human hair. Inside the fiber-optic cable, an insulating glass cladding and a protective coating surround each optical fiber. Fiber-optic cables have the following advantages over cables that use wire, such as twisted-pair and coaxial cables:
• Capability of carrying significantly more signals than wire cables
• Faster data transmission
• Less susceptible to noise (interference) from other devices such as a copy machine
• Better security for signals during transmission because they are less susceptible to noise
• Smaller size (much thinner and lighter weight)
·         Broadcast radio distributes radio signals through the air over long and short distances.
·         Cellular radio is a form of broadcast radio that is used widely for mobile communications.
·         Microwaves are radio waves that provide a high speed signal transmission.
·         A communications satellite is a space station that receives microwave signals from an earth-based station, amplifies the signals, and broadcasts the signals back over a wide area.

CHAPTER 8. Assignment from Mr. Tri Djoko Wahjono

Chapter Review

1. What Is System Software, and What Are the Two Types of System Software?
System software consists of the programs that control or maintain the operations of a computer and its devices. Two types of system software are operating systems and utility programs. An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. A utility program, also called a utility, performs maintenance-type tasks, usually related to managing a computer, its devices, or its programs.

2. What Are the Functions of an Operating System?
The operating system starts and shuts down a computer, provides a user interface, manages programs, manages memory, coordinates tasks, configures devices, establishes an Internet connection, monitors performance, provides utilities, updates automatically, controls a network, and administers security. The user interface controls how data and instructions are entered and how information is displayed on the screen. Two types of user interfaces are a graphical user interface (GUI ) and a command-line interface. Managing programs refers to how many users, and how many programs, an operating system can support at one time. An operating system can be single user/single tasking, single user/multitasking, multiuser, or multiprocessing. Memory management optimizes the use of random access memory (RAM). If memory is insufficient, the operating system may use virtual memory, which allocates a portion of a storage medium to function as additional RAM. Coordinating tasks determines the order in which tasks are processed. Tasks include receiving data from an input device, processing instructions, sending information to an output device, and transferring items between storage and memory. Configuring devices involves loading each device’s driver when a user boots the computer. A driver, short for device driver, is a small program that tells the operating system how to communicate with a specific device. Establishing an Internet connection sets up a connection between a computer and an Internet access provider. A performance monitor is an operating system program that assesses and reports information about computer resources and devices. Operating systems often provide the capability of managing and searching for fi les, viewing images, securing a computer from unauthorized access, uninstalling programs, and other tasks. Most operating systems also include an automatic update feature that provides updates to the program. A server operating system is an operating system that organizes and coordinates how multiple users access and share network resources. Network administrators typically have an administrator account that enables them to access fi les, install programs, and specify network settings, including creating user accounts and establishing permissions.

3. What Is the Startup Process on a Personal Computer?
Booting is the process of starting or restarting a computer. When a user turns on a computer, the power supply sends a signal to the system unit. The processor chip finds the ROM chip(s) that contains the BIOS (basic input/output system), which is firmware with the computer’s startup instructions. The BIOS performs the power-on self test (POST ) to check system components and compares the results with data in a CMOS chip. If the POST completes successfully, the BIOS searches for the system files and the kernel of the operating system, which manages memory and devices, and loads them into memory from storage. Finally, the operating system loads configuration information, requests any necessary user information, and displays the desktop on the screen. The operating system executes programs in the Startup folder, which contains a list of programs that open automatically when you boot the computer.

4. What Are Features of Windows 7, Mac OS X, UNIX, and Linux Operating Systems?
A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device. Windows 7 is Microsoft’s fastest, most efficient operating system to date, offering quicker program start up, built-in diagnostics, automatic recovery, improved security, p y enhanced searching and organizing capabilities, and an easy-to-use interface. Most users choose from Windows 7 Starter, Windows 7 Home Premium, Windows 7 Ultimate, or Windows 7 Professional editions. Mac OS X is a multitasking operating system available only for Apple computers. UNIX is a multitasking operating system developed at Bell Laboratories. Linux is a popular, multitasking UNIX-type operating system that is open source software, which means its code is available to the public for use, modification, and redistribution.

5. What Are Various Server Operating Systems?
Server operating systems include Windows Server 2008, UNIX, Linux, Solaris, and NetWare. Windows Server 2008 is an upgrade to Windows Server 2003 and includes features of previous Windows Server versions. UNIX, like Linux, is a multipurpose operating system because it is both a stand-alone and server operating system. Solaris, a version of UNIX developed by Sun Microsystems, is a server operating system designed specifically for e-commerce applications. Novell’s NetWare is a server operating system designed for client/server networks.

6. What Are the Features of Several Embedded Operating Systems?
Mobile devices and many consumer electronics have an embedded operating system that resides on a ROM chip. Popular embedded operating systems include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. Windows Embedded CE is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality. Windows Mobile, an operating system based on Windows Embedded CE, provides a user interface designed for specific types of smart phones and PDAs. Palm OS is an operating system used on smart phones and PDAs. iPhone OS, developed by Apple, is an operating system for the iPhone and iPod touch. The BlackBerry operating system runs on handheld devices supplied by RIM. Google Android is an operating system developed by Google for mobile devices. Embedded Linux is a scaled-down Linux operating system for smart phones, PDAs, portable media players, and other devices requiring an embedded operating system. Symbian OS is an open source multitasking operating system designed for smart phones.

7. What Is the Purpose of Several Utility Programs?

Most operating systems include several built-in utility programs. A file manager performs functions related to fi le management. A search utility attempts to locate a fi le on your computer based on criteria you specify. An image viewer displays, copies, and prints the contents of a graphics fi le, such as photos. An uninstaller removes a program and any associated entries in the system fi les. A disk cleanup utility searches for and removes unnecessary files. A disk defragmenter reorganizes the fi les and unused space on a computer’s hard disk. A backup utility is used to copy, or back up, selected fi les or an entire hard disk to another storage medium. A restore utility reverses the backup process and returns backed up fi les to their original form. A screen saver displays a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. A personal firewall detects and protects a personal computer from unauthorized intrusions. An antivirus program protects computers against a virus, or potentially damaging computer program, by identifying and removing any computer viruses. A spyware remover detects and deletes spyware and other similar programs. An adware remover detects and deletes adware. Internet filter programs can include Web filtering software, an anti-spam program, a phishing filter, and a pop-up blocker. A file compression utility shrinks the size of a fi le so that it takes up less storage space. A media player allows you to view images and animation, listen to audio, and watch video fi les on a computer. Disc burning software writes text, graphics, audio, and video fi les on a recordable or rewritable CD, DVD, or Blu-ray Disc. A personal computer maintenance utility identifies and fixes operating system problems and improves a computer’s performance

CHAPTER 7. Assignment from Mr. Tri Djoko Wahjono

Chapter Review
  1. How Are Storage Devices Different from Storage Media?
    A storage medium is the physical material on which a computer keeps data, instructions, and information. The number of bytes (characters) a storage medium can hold is its capacity. A storage device is the computer hardware that records and/or retrieves items to and from storage media. Writing is the process of transferring items from memory to a storage medium, and reading is the process of transferring these items from a storage medium into memory.
  2. What Are the Characteristics of an Internal Hard Disk?
    A hard disk, also called a hard disk drive or hard drive, is a storage device that contains one or more infl exible, circular platters that use magnetic particles to store data, instructions, and information. Traditionally, hard disks stored data using longitudinal recording, which aligned the magnetic particles horizontally. With perpendicular recording, hard disks align the particles vertically, making much greater storage capacities possible. The capacity of a hard disk is determined from whether it uses longitudinal or perpendicular recording, the number of platters it contains, and the composition of the magnetic coating on the platters. A platter is made of aluminum, glass, or ceramic and is coated with a material that allows items to be recorded magnetically on its surface. Each platter has two read/write heads, one for each side. The location of a read/write head often is referred to by its cylinder, which is the vertical section of a track that passes through all platters. Formatting is the process of dividing the disk into tracks and sectors. A track is a narrow recording band that forms a full circle on the surface of the disk. The disk’s storage locations are divided into pie-shaped sections, which break the tracks into small arcs called sectors. While the computer is running, the platters in the hard disk rotate at 5,400 to 15,000 revolutions per minute (rpm), which allows nearly instant access to all tracks and sectors on the platters. Transfer rate is the speed with which data, instructions, and information transfer to and from a storage device. Access time measures the amount of time it takes a storage device to locate an item on a storage medium, or the time required to deliver an item from memory to the processor.
  3. What Is the Purpose of Network Attached Storage Devices, External and Removable Hard Disks, and Hard Disk Controllers?
    A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage. NAS devices often use a RAID confi guration. An external hard disk is a separate freestanding hard disk that connects with a cable to a USB or FireWire port on the system unit or communicates wirelessly. External hard disks have storage capacities up to 4 TB and more. A removable hard disk can be inserted or removed from a built-in or external drive. Removable hard disks have storage capacities up to 1 TB. A disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in a computer. A hard disk controller may be part of the hard disk on the motherboard, or it may be a separate adapter card inside the system unit.
  4. What Are the Various Types of Flash Memory Storage?
    Flash memory chips are a type of solid state media, which means they consist entirely of electronic components and contain no moving parts. A solid state drive (SSD) typically uses flash memory to store data, instructions, and information. A memory card is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or card reader/writer. Common memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, microSDHC, xD Picture Card, Memory Stick, and Memory Stick Micro (M2). A USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs in a port on a computer or mobile device. An ExpressCard module is a removable device that fi ts in an ExpressCard slot. ExpressCard modules can add memory, storage, communications, or other capabilities to a computer.
  5. What Is Cloud Storage, and What Are Its Advantages?
    Cloud storage is an Internet service that provides storage for computer users. Available for all sizes of users, with various degrees of storage services available for home and business users, cloud storage fees vary, depending on the user’s storage requirements. Advantages include accessing files on the Internet from any computer or device with Internet access; storing large audio, video, and graphics fi es on the Internet instantaneously; allowing others to access their files on the Internet; viewing time-critical data and images immediately; storing off-site backups of data; and providing data center functions.
  6. What Are the Characteristics of Optical Discs?
    An optical disc is a type of storage media that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. Optical discs, which primarily store software, data, digital photos, movies, and music, contain microscopic pits (indentations) and lands (flat areas) in their middle layer. Optical discs commonly store items in a single track that spirals from the center of the disc to its edge. Like a hard disk, the single track is divided into evenly sized sectors.
  7. How Are the Various Types of Optical Discs Different?
    A CD-ROM, or compact disc read-only memory, is a type of optical disc that uses laser technology to store items. Users can read the contents of standard CD-ROMs but cannot erase or modify their contents. A CD-R (compact disc-recordable) is a multisession disc on which users can record their own items, such as text, graphics, and audio. Each part of a CD-R can be written on only one time, and the disc’s contents cannot be erased. A CD-RW (compact disc-rewritable) is an erasable disc that can be written on multiple times. An archive disc stores photos from an online photo center in the jpg file format. A Picture CD is a single-session CD-ROM that stores digital versions of film using the jpg format at a lower resolution than an archive disc. A DVD-ROM (digital versatile disc-read-only memory or digital video disc-read-only memory) is a high capacity optical disc that you can read but not write on or erase. A newer, more expensive DVD format is Blu-ray Disc-ROM (BD-ROM), with higher capacity and better quality than standard DVDs. Many types of recordable and rewritable DVD formats are available. DVD-R and DVD+R are DVD-recordable formats. BD-R is a high-capacity DVD-recordable format. DVD-RW, DVD+RW, and DVD+RAM are rewritable DVD formats that allow users to erase and record multiple times. BD-RE is a high-capacity rewritable DVD format.
  8. How Are Tape, Magnetic Stripe Cards, Smart Cards, Microfilm and Microfiche, and Enterprise Storage Used?
    Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. A tape drive reads and writes data and information on tape. Business users utilize tape most often for long-term storage and backup. A magnetic stripe card is a credit card, entertainment card, bank card, or other similar card with a stripe that contains information identifying you and the card. A magnetic stripe card reader reads the information stored on the stripe. A smart card, which is similar in size to a credit or ATM card, stores data on a thin microprocessor embedded in the card. A smart card reader reads the information on the smart card and updates it if necessary. Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4 x 6 inches. Microfilm and microfiche reduce the amount of paper firms must handle, are inexpensive, and have the longest life of any storage media. Enterprises use computers, servers, and networks to manage and store huge volumes of data and information. In an enterprise, some storage systems can provide more than 185 TB of storage, and optical disc servers hold hundreds of optical discs.
True/False
  1. T
  2. F
  3. F
  4. F
  5. F
  6. F
  7. F
  8. T
  9. F
  10. T
  11. F
  12. F
  13. T
Multiple Choice
  1. B
  2. C
  3. D
  4. D
  5. A
  6. C
  7. B
  8. B
Matching
  1. H
  2. C
  3. A
  4. E
  5. F
  6. J
  7. D
  8. B
  9. I
  10. G
Short Answer
  1. What is network attached storage?Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role. As of 2010 NAS devices are gaining popularity, as a convenient method of sharing files among multiple computers.[1] Potential benefits of network-attached storage, compared to file servers, include faster data access, easier administration, and simple configuration. NAS systems are networked appliances which contain one or more hard drives, often arranged into logical, redundant storage containers or RAID. Network-attached storage removes the responsibility of file serving from other servers on the network. They typically provide access to files using network file sharing protocols such as NFS, SMB/CIFS, or AFP.How much hard disk storage can home and small business users add to their network with a NAS device?In the past, enterprises were the primary users of NAS. With the introduction of smaller, less expensive NAS devices, however, some home and small business users opt to add up to 6 TB or more of hard disk storage space to their network with a NAS device.
  2. What are the advantages of SAS (serial-attached SCSI)?SAS (serial-attached SCSI ) is a newer type of SCSI that uses serial signals to transfer data, instructions, and information. Advantages of SAS over parallel SCSI include thinner, longer cables; reduced interference; less expensive; support for many more connected devices at once; and faster speeds. SAS interfaces have data transfer rates of 750 MBps and higher.What types of devices can be connected to SAS interfaces?In addition to hard disks, SAS interfaces support connections to optical disc drives, printers, scanners, digital cameras, and other devices. SAS interfaces usually are compatible with devices that have parallel SCSI and SATA interfaces. Experts predict that SAS eventually will replace parallel SCSI.
  3. How is a single-session disc different from a multisession disc?A standard CD-ROM is called a single-session disc because manufacturers write all items on the disc at one time. Multisession means you can write on part of the disc at one time and another part at a later time. Each part of a CD-R, however, can be written on only one time, and the disc’s contents cannot be erased.What is the purpose of archive discs and Picture CDs?Many people use archive discs or Picture CDs to preserve their photos. When you post and share photos online on a photo sharing community, you can choose to save your collection of online photos on an archive disc. An archive disc stores photos from an online photo center in the jpg file format, usually at a maximum resolution of 7200 pixels per photo. The cost of archive discs is determined by the number of photos being stored. One service, for example, charges $9.99 for the first hundred pictures. A Kodak Picture CD is a single-session CD-ROM that stores digital versions of film using a jpg file format at a lower resolution, typically 1024 × 1536 pixels. Many photo centers offer Picture CD service for consumers when they drop off film to be developed. The average cost for a Picture CD is about $3 per roll of film. Most optical disc drives can read an archive disc and a Picture CD. Using photo editing software and photos on these discs, you can remove red eye, crop the photo, enhance colors, trim away edges, adjust the lighting, and edit just about any aspect of a photo. In addition, you can print copies of the photos from the disc on glossy paper with an ink-jet printer. If you do not have a printer to print the images, many stores have kiosks at which you can print pictures from an archive disc, a Picture CD, or other media.
  4. Why do users use memory cards?Memory cards enable mobile users easily to transport digital photos, music, or files to and from mobile devices and computers or other devices. A memory card is a removable flash memory device, usually no bigger than 1.5 inches in height or width, that you insert and remove from a slot in a computer, mobile device, or card reader/writer.Name five types of memory cards and describe some of the characteristics of each card.
    MEDIA TYPECAPACITYUSE
    CompactFlash (CF)512 MB to 100 GBDigital cameras, smart phones, PDAs, photo printers, portable media players, notebook computers, desktop computers
    Secure Digital (SD)512 MB to 8 GBDigital cameras, digital video cameras, smart phones, PDAs, photo printers, portable media players
    SDHC4 to 32 GBDigital cameras
    microSD1 to 2 GBSmart phones, portable media players, handheld game consoles, handheld navigation devices
    microSDHC4 to 16 GBSmart phones, portable media players, handheld game consoles, handheld navigation devices
    xD Picture Card256 MB to 2 GBDigital cameras, photo printers
    Memory Stick PRO Duo1 to 16 GBDigital cameras, smart phones, handheld game consoles
    Memory Stick Micro (M2)1 to 16 GBSmart phones
  5. What is one difference between microfilm and microfiche?Microfilm and microfiche store microscopic images of documents on roll or sheet film. Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4 x 6 inches. A computer output microfilm recorder is the device that records the images on the film. The stored images are so small that you can read them only with a microfilm or microfiche reader.What are some uses of microfilm and microfiche?Microfilm and microfiche use is widespread, with many companies allowing you to search through and view microfilm images online. Libraries use these media to store back issues of newspapers, magazines, and genealogy records. Some large organizations use microfilm and microfiche to archive inactive files. Some banks use them to store transactions and canceled checks. The U.S. Army uses them to store personnel records. The use of microfilm and microfiche provides a number of advantages. They greatly reduce the amount of paper firms must handle. They are inexpensive and have the longest life of any storage media.