Professional Documents
Culture Documents
engineering
1
DAFTAR ISI
HACKER1
The Definition of Hacker ...1
History1
How Hacker Work3
Difference of Black, White, Gray Hat Hacker5
How To Avoid Hacking6
NETWORK8
Understanding Compuer Network10
Network History11
Types of Computer Network12
Computer Network Topology14
Benefits of Computer Networking17
COMPUTER APPLICATION20
The Definition of Computer Application20
The Benefits of Computer Application21
History Computer Application21
Kinds of Computer Application23
Remove Virus in the Computer23
MULTIMEDIA33
Definition of Multimedia33
Multimedia in terms of computer35
Category of Multimedia36
Advantage of Multimedia40
Componenta of Multimedia42
Multimedia Software Tools45
2
OPERATING SYSTEM49
Definition of The Operating System51
Types of Operating System51
The Purpose And Basic Functions of The Operating System54
Kind Of Operating System55
RECENT DEVELOPMENT IN IT60
Recent Development in IT62
Positive and Negative Effect of IT70
COMPUTER ARCHITECTURE74
Definition74
History74
Operate78
SOFTWARE ENGNNEERING92
Definition Software Enginnering95
History Software Engineering 96
Function Software98
WEBSITE102
Definition of Website102
History of Wbsite104
Categories of Website109
Development of Website113
Type of Website118
DATA SECURITY122
Understanding of Data Security125
Data Security127
Data Security techneologis128
Key Threats to data security128
3
HACKER
B. HISTORY
4
National Laboratory. One of the perpetrators was immunized by
his testimonials, while the other five were sentenced to probation.
5
divided into two groups: White Hat Hackers, the real hackers and
crackers are often referred to as Black Hat Hackers.
6
1. Footprinting. Search for detailed information on systems
to target, including information search with search engine,
whois, and DNS one transfer.
2. Scanning. Against certain targets sought the most likely
entrance. Used ping sweep and port scan
3. Enumeration Intensive review of targets, which look for
legitimate user accounts, network resources and share,
and applications to find out which ones are weak.
4. Gaining Access. Get more data to start trying to access
goals. Includes or robs passwords, guesses passwords, and
buffers overflow
5. Escalating Privilege. If you just get a user password in the
previous stage, at this stage in trying to get privilese admi
network with password cracking or exploit like getadmin,
sechole or lc_messages.
6. Pilfering. The information gathering process begins again
to identify mechanisms to gain access to a trusted system.
Includes trust evaluation and cleartext password search in
the registry, config files, and user data.
7. Convering Tracks. Once full control of the system is
obtained, closing the track becomes a priority. Includes
cleaning up network logs and using hide tools such as
rootkits and streaming files
8. Creating Backdoors. The rear door is created on various
parts of the system to make it easy to re-enter the system
7
to this system by establishing user accounts, scheduling
joob batches, changing startup files, adding remote
control services and monitoring tools, and replacing
applications with qtrojan.
9. Denial of Service. If all of the above attempts fail, the
attacker may be disabled by the target as a last resort.
Includes SYN flood, ICMP techniques, supernuke, land /
latierra, teardrop, bonk, newtear, trincoo, smurf, and
others.
8
security vulnerability would sell it to criminal organizations on
the black market or use it to compromise computer systems.
9
4. Do not click on links you do not know in emails or
sites.
10
NETWORK
Grou 2
Member:
1. Fitri Nurholidah
2. Muhammad Faisal S
3. Muhammad Nur Sidiq S
CHAPTER I
PRELIMINARY
A. Background
Computer networking is not something new right now. Almost in
every has a computer network to facilitate the flow of information
inside. The company. Internet is gaining popularity nowadays is a
network. A giant computer that is a network of connected
computers and can beInteract with each other. This can happen
because of technological developmentsThe network is very rapid,
so in a few years only the number of usersThe network of
computers that are incorporated in the Internet multiply. Since
Internet and marketed operating systemWindows95 by Microsoft,
connecting multiple computers to both computersPersonal (PC)
and server with a network of LAN types (Local Area Network) to
WAN (Wide Area Network) becomes a common thing.Similarly,
the concept of "downsizing" and "lightsizing" which
11
aimsPressing the budget especially computer equipment, then a
network is one thing that is very necessary.
12
CHAPTER II
THEORETICAL BASIS
13
CHAPTER III
DISCUSSION
A. Network History
14
process (Distributed Processing). In this process Some host
computers do a great job in parallel to Serving multiple terminals
that are connected in series to each host computer. Dala
distribution process is absolutely necessary in-depth integration
between Computer technology and telecommunications, because
in addition to the process that must be Distributed, all host
computers are obliged to serve their inner terminals One
command from the central computer 5 Furthermore, when the
prices of small computers have begun to decline and The concept
of the distribution process is mature, then the use of computers
and networks Have begun to vary from start handling the process
together and communication Between computers (Peer to Peer
System) alone without going through a central computer.
Therefore Start developing local network technology known as
LAN. Similarly when the Internet began to be introduced, then
most of that LAN Stand alone began to connect and formed a
network of giants WAN.
15
networkcalled nodes. A computer network can have two, tens,
thousands or even millions of nodes. In general, computer
networks are divided into five types, namely;
1. Local Area Network (LAN)
Local Area Network (LAN), is a privately owned network within
a buildings or campuses measuring up to several kilometers. LAN
often used to connect personal computers and workstations within
the office of a company or factories to wear along with resources
(resouce, eg printers) and exchanging information.
2. Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN), is basically a LAN version
which are larger and typically use the same technology with
LAN. MAN can include company offices that are located
adjacent or also a city and can be used for purposes private
(private) or public. MAN is able to support data and voice, even
can be connected with cable television networks.
3. Wide Area Network (WAN)
Wide Area Network (WAN), its reach includes a geographical
area broad, often including a country and even a continent. The
WAN consists of a collection of machines that aim to run
programs(Application) user.
4. Internet
Actually there are many networks in this world, often using
hardware and software. People who connected to the network
often hope to be able to communicate with people o others
16
connected to other networks. Such desires require relationships
between networks that are often not kampatibel and different.
Usually to do this required a machine called gateways to conduct
relationships and carry out translations required, both hardware
and software. Set this interconnected network is what is called the
internet.
5. Network Without Wires
The wireless network is a solution to the communication that
does not can be done with a network using a cable. For example a
person who is want to get information or communicate even
though it is located above the car or airplane, then absolute
network without wires
Necessary because cable connections are not possible in cars or
aircraft. Currently the wireless network is already widespread use
with utilizing satellite services and able to provide more access
speed faster than wired networks.
1. Bus Topology
17
In this topology all central are connected directly on
Transmission medium with a configuration called Bus.
Transmission of signals from a Central is not flowed
simultaneously in both directions. This is very different With
that occurring on the mesh network topology or star, which is on
the second The system can be done communication or
interconnection between the central At the same time. Bus
network topology is not commonly used for interconnection
between Central, but usually used on computer network systems.
Advantages
Save cable
Simple cable layout
Easy to develop
Loss
Detection and isolation error is very small
Traffic density
If one client is damaged, the network will not work.
Remote repeater required
2. Ring Topology
The token-ring method (often called the ring only) is a way of
connecting computer so that the form of a ring (circle). Each
node has a level the same one. The network will be called a loop,
data is sent to each node and any information received by the
node is checked for its address whether the data is for it or not.
18
Advantages:
Cable Saver
Loss:
Error-sensitive
Network development is more rigid
3. Star topology
Centralized control, all links must pass through the center of
the channel The data is all the node or client selected. Central
node is named Primary station or server and other called
secondary station or client Server. Once the network connection
is started by the server then each client server At any time can use
the network connection without waiting Command from the
server.
Advantages:
Most flexible
Installation / change station is very easy and not disturbing
Other parts of the network
Centralized control
Ease of detection and isolation of errors / damage
Ease of network management
Loss:
19
Wasted cables
Need special handling
Centralized control (HUB) becomes a critical element
20
With our computer network will get high reliability by having
alternative sources of inventory. For example, all files can be
saved or copied to two, three or more computers connected. So
when one of the machines is broken, then a copy on that machine
others can be used.
3. Saving money.
Smaller-scale computers have better price / performance ratios
compared to large computers. Large computers such as
mainframes has a density of approximately ten times the speed of
a computer small / private. Still, mainframe prices are a thousand
times more expensive than personal computer. This price /
performance and speed ratio imbalance is making the system
designers to build a system consisting of personal computer.
21
CHAPTER IV
COVER
A. Conclusion
B. Suggestions
COMPUTER APPLICATION
Group 3
22
MEMBER :
1. FAWAZ HUTOMI
2. GITA SONIA INDRIANI
3. WIRA NUGRAHA
23
Eniac Computer
The first substantial computer was the giant ENIAC machine by
John W. Mauchly and J. Presper Eckert at the University of
Pennsylvania. ENIAC (Electrical Numerical Integrator and
Calculator) used a word of 10 decimal digits instead of binary
ones like previous automated calculators/computers. ENIAC was
also the first machine to use more than 2,000 vacuum tubes, using
nearly 18,000 vacuum tubes. Storage of all those vacuum tubes
and the machinery required to keep the cool took up over 167
square meters (1800 square feet) of floor space. Nonetheless, it
had punched-card input and output and arithmetically had 1
multiplier, 1 divider- square rooter, and 20 adders employing
decimal "ring counters," which served as adders and also as
quick-access (0.0002 seconds) read-write register storage.
The executable instructions composing a program were embodied
in the separate units of ENIAC, which were plugged together to
form a route through the machine for the flow of computations.
These connections had to be redone for each different problem,
24
together with presetting function tables and switches. This "wire-
your-own" instruction technique was inconvenient, and only
with some license could ENIAC be considered programmable; it
was, however, efficient in handling the particular programs for
which it had been designed. ENIAC is generally acknowledged to
be the first successful high-speed electronic digital computer
(EDC) and was productively used from 1946 to 1955. A
controversy developed in 1971, however, over the patentability of
ENIAC's basic digital concepts, the claim being made that
another U.S. physicist, John V. Atanasoff, had already used the
same ideas in a simpler vacuum-tube device he built in the 1930s
while at Iowa State College. In 1973, the court found in favor of
the company using Atanasoff claim and Atanasoff received the
acclaim he rightly deserved.
D. Kinds of Computer Application
1. Microsoft Word
25
2. Microsoft Excel
26
4. Notepad
6. Adobe Photoshop
27
7. Paint
This program is used to play videos and can also to play music.
28
10. Antivirus
29
1. The computer feels slow
2. The computer frequently hangs
3. The startup time of windows that feels old
4. Cannot open some files as usual
5. Could not access the internet but the connection is
not problematic.
6. The appearance of the popup window as if from an
antivirus program that containsa warning that your
computer is currently problematic and should
be immediately corrected, whereas previously You never i
nstall the
Antivirus.
7. Cannot change file attributes
8. Some of your files as lost simultaneously but only ter-
hidden
9. The emergence of files with strange names, you
never create
10. and things that are suspicious of the other.
30
a. Prepare the application to be used to clean viruses, including
the following:
31
c. Do the cleaning viruses with tool, tool that has been
provided in advance.
32
note make sure antivirus has been updated in advance with the
latest database version or.
33
Click the Start menu All Programs > > > Accessories System
Tools and then click Disk Cleanup. Select the drives to be clear,
that is the C Drive.
34
If the damage was severe enough, then do a Repair of
Windows is a step that we have to run.
g. use a Rescue CD
35
KELOMPOK MULTIMEDIA:
RIZKA ALAWIYAH
ARIP HIDAYAT
MULTIMEDIA
Group 4
A. Definition of Multimedia
36
Multimedia :
product, application, technology, platform, board,
device, network computer, system, classroom,
school,
Word multimedia is widely used to mean many
different things
37
f. In live situations, the use of a speaker or actors
and "props" together with sound, images, and
motion video
b. Distributed:Theinformationconveyedisrem
ote,eitherpre-producedand stored or
produced in realtime, distributed
overnetworks
38
information, in a non-trivial way beyond
start, stop, fastforward.
C. Category of Multimedia
a. Linear Multimedia
Linear Multimedia is a type of a
multimedia that is designed to be presented in a
sequential manner. It has a distinct beginning and
end. It goes on a logical flow from a starting point
to a conclusion.
It is usually intended for display purposes
with not much interaction or distraction from the
audience. Because of its nature where audience
participation is not expected, Linear Multimedia
may also be referred to as Passive Multimedia.
In this kind of presentation, the creator of the
multimedia is in control.
39
Main goals include: to entertain, to
transmit knowledge, and to make people familiar
on a certain topic WITHOUT any form of
diversion
a) A powerpoint presentation
b) A slideshow of pictures that goes on with
a specific direction
c) A storyline/ A movie
d) An anime episode
e) A Youtube video
Advantages:
Disadvantages:
40
a) Minimal interactivity, or none at all
b) Audience has no say on the topic they want
to dwell into.
b. Non-Linear Multimedia
Non-linear multimedia is a nonsequential
type of multimedia where the persons participation
is crucial.
a) A Website
b) A search engines home page
c) A DvD menu screen
d) A Youtube Channel
41
e) An anime or Korean drama
streaming site
Advantages:
The person is in control and may use the
multimedia according to his preferences and
needs.
Disadvantages:
a) Requires a level of computer literacy from
the user
b) May be unorganized if not used well.
Imagine a movie. Normally a movie goes
on a linear format, starting from point A and
ending on point B. The viewer watches and needs
not to do anything in order to enjoy the movie.
However, if viewed on a DvD, the viewer is now
given the option to choose which scenes to watch,
which subtitles to use, and can now even pause
and rewound the movie.
D. Advantage of Multimedia
There is some advantage of multimedia:
a) This is a very user-friendly. It does not need the
number of energy users, in this sense, you can sit
down to watch the demo, you can read the text and
hear the sound.
42
b) It is a multi-sensory. It uses the senses of many
users, while the use of multimedia, such as
hearings, see and talk.
c) It is a comprehensive and interactive. Through
different media in the process of digital
integration. The possibility of interaction easy
feedback are greatly increased.
d) It is flexible. Digitalization, this media can easily
be changed to adapt to different situations and
audiences.
e) It can be used for a variety of audiences, ranging
from one person to the whole group.
f) Creative Industries: the creative industries,
including advertising, media and news, they use
multimedia fun and interactive way to express
their thoughts. Organization of advertising
agencies and other creative work across a creative
way of information, ideas and news. Path
information in an interactive visualization of these
ideas, multimedia plays a vital role.
g) The latest developments in the enterprise:
technology and multimedia environment has made
it possible for entrepreneurs to come up with an
attractive company website or presentation,
including information about their products and
43
services to the interpretation of text, audio and
video.
h) Marketing: construction in the site text, images,
video shows the general idea of the product is very
popular. To explain the links with the media,
social networking sites to promote our ideas is
inevitable. Customers can easily visualization and
link to website, in a good way to understand the
message.
i) Telecommunications industry: Today, everyone is
clear Multimedia Messaging Service (MMS). This
service makes it possible to audio and video
content from our mobile phones to send text.
Previously, it was limited to only a certain number
of text messages. In the phone's multimedia
applications area in 2012 will only increase with
the daily development of the function, such as
playing music, games, watching movies, and our
mobile news.
j) It can be seen in the entertainment industry
entertainment: multimedia use one. With the latest
technology research and invention, the annual
multimedia range has been expanded. We like to
see a 3D movie in the cinema theaters and on
44
television - and enjoy the movie special effects
would not have been no multimedia possible.
k) Running on a multimedia platform for video
games. Multimedia range is the frequent
introduction of a wide range of new video game
every other day. In short, it can be said that
increased consumer support and positive feedback
from the range of digital multimedia, and only
increase in 2012. Has become more technology-
friendly in the world. Network marketing, the
popularity of the use of computers, mobile phones
and video games is expanding its door in 2012 of
multimedia opportunities.
E. Components of Multimedia
a. Text
It may be an easy content type to forget
when considering multimedia systems, but text
content is by far the most common media type in
computing applications. Most multimedia systems
use a combination of text and other media to
deliver functionality. Text in multimedia systems
can express specific information, or it can act as
reinforcement for information contained in other
media items. This is a common practice in
applications with accessibility requirements. For
45
example, when Web pages include image
elements, they can also include a short amount of
text for the user's browser to include as an
alternative, in case the digital image item is not
available.
b. Images
Digital image files appear in many
multimedia applications. Digital photographs can
display application content or can alternatively
form part of a user interface. Interactive elements,
such as buttons, often use custom images created
by the designers and developers involved in an
application. Digital image files use a variety of
formats and file extensions. Among the most
common are JPEGs and PNGs. Both of these often
appear on websites, as the formats allow
developers to minimize on file size while
maximizing on picture quality. Graphic design
software programs such as Photoshop and
Paint.NET allow developers to create complex
visual effects with digital images.
c. Audio
Audio files and streams play a major role in some
multimedia systems. Audio files appear as part of
application content and also to aid interaction.
46
When they appear within Web applications and
sites, audio files sometimes need to be deployed
using plug-in media players. Audio formats
include MP3, WMA, Wave, MIDI and RealAudio.
When developers include audio within a website,
they will generally use a compressed format to
minimize on download times. Web services can
also stream audio, so that users can begin playback
before the entire file is downloaded.
d. Video
Digital video appears in many multimedia
applications, particularly on the Web. As with
audio, websites can stream digital video to
increase the speed and availability of playback.
Common digital video formats include Flash,
MPEG, AVI, WMV and QuickTime. Most digital
video requires use of browser plug-ins to play
within Web pages, but in many cases the user's
browser will already have the required resources
installed.
e. Animation
Animated components are common within both
Web and desktop multimedia applications.
Animations can also include interactive effects,
allowing users to engage with the animation action
47
using their mouse and keyboard. The most
common tool for creating animations on the Web
is Adobe Flash, which also facilitates desktop
applications. Using Flash, developers can author
FLV files, exporting them as SWF movies for
deployment to users. Flash also uses ActionScript
code to achieve animated and interactive effects.
F. Multimedia Software Tools
a. Music Sequencing And Notation
a) Cakewalk
Supports General MIDI
Provides several editing views (staff,
piano roll, event list) and Virtual Piano
Can insert WAV files and Windows MCI
commands (animation and video) into
tracks.
b) Cubase
A better software than Cakewalk
Express
Intuitive Interface to arrange and
play Music (Figs 2.6 and 2.7)
Wide Variety of editing tools
including Audio (Figs 2.8 and 2.9).
c) Cubase Arrange Window (Main)
48
d) Cubase Transport Bar Window ---
Emulates a Tape Recorder Interface
e) Cubase Audio Window
f) Cubase Audio Editing Window with
Editing Functions
Allows printing of notation sheets
g) Cubase Score Editing Window
h) Logic Audio
Cubase Competitor, similar
functionality
i) Marc of the Unicorn Performer
Cubase/Logic Audio Competitor,
similar functionality
b. Digital Audio
a) Audacity
b) Power sound editor
c) Music editor free
d) Wavosaur
e) Ardour
f) Rosegarden
c. Video Editing
a) Adobe pemier
b) Adobe After Effect
c) Final Cut Pro
d. Graphic and Image Editing
49
a) Adobe Illustrator
b) Adobe Photoshop
c) Macromedia Fireworks
d) Macromedia Freehand
e. Animation
a) Java3D
b) DirectX
c) OpenGL
d) 3D Studio Max
e) Softimage XSI
f) Maya
g) Rendermen
h) GIF Animain Packages
f. Multiedia Authoring
a) Macromedia Flash
b) Macromedia director
c) Authorware
d) Quest
50
Oprating system
Group 5
THE PREFACE
51
CHAPTER I
INTRODUCTION
A.Background
Computer operating systems are computer is software that
is in charge to perform the control and management of the
hardware and also the basic system operations, including
running software applications such as data processing programs
that can be used to facilitate human activities. Operating
systems in English called the Operating System, or in short the
OS.
52
CHAPTER II
DISCUSSION
53
studied, modified or further developed and widely diffused. If
there's a software maker that does not allow source code is
changed or modified, then it is not referred to as open source
code of programs though such software available.
Advantage
1. A lot of power (HR) which starred projects
2. Errors (bugs, errors) much faster is found and repaired
3. The quality of the results is more secure because the
evaluation community
4. More secure
5. Cost effective
6. Do not repeat the development
shortage
54
1. lack of HUMAN RESOURCES that can benefit from open
source
2. The lack of protection of intellectual property (IP)
55
3. Dissemination of usage, it is rather difficult, because
generally users using the close source (e.g. Windows), only
in certain areas).
4. Difficult to get certification.
5. The existence of a license that requires users to provide
funds/financial.
6. development limited.
7. the Necessary antivirus.
8. Applications are generally available.
9. The detection of weaknesses of applications waiting for
feedback from users.
56
1.2 Organize and supervise the use of the hardware by the
user and the various application programs (Resources
Allocator).
1.3 .As the control program that aims to avoid confusion
(error) and the use of a computer is not necessary (as guardian
guarding the computer from a variety of possible damage).
3. Management of hardware resources, such as memory, set up
a printer, cdrom, etc.
4. main components of operating systems
Modern operating systems have the main components,
namely:
1.The Kernel
2. Files
3. The User Interface
5. operating system within the community
57
Environment 1.0 was first introduced on 10 November 1983,
but the new outgoing markets in November 1985, created to
meet the needs of the computer with the display picture.
Windows 1.0 is a 16-bit software (not the operating system)
running on top of MS-DOS (and several variants from MS-
DOS), so he won't be able to run without the operating system
DOS. Version 2.x, 3.x version is also the same. Some versions
of Windows (starting from version 4.0 and Windows NT 3.1)
is a standalone operating system that no longer relies on the
MS-DOS operating system.
2. Unix
pangera (2010:64) Including the earliest operating
systems exist for the computer. Is the parent of the linux
operating system. UNIX or UNIX is a computer operating
system that starts from project Multics (Multiplexed
Information and Computing Service) in 1965 conducted the
American Telephone and Telegraph AT&T, General Electric
(GE), and the Massachusetts Institute of Technology (MIT),
and costs of the Department of Defense (Department of
DefenceAdvenced Research Project, DARPA or ARPA),
UNIX was designed as a portable operating system, multi-
tasking and multi-user.
3. Linux
58
Fajrillah (2011:311) Linux is a cloning UNIX, written
completely from under more than a decade ago. Same with
BSD Linux in many respects, but BSD does have a culture that
has long been, as well as more hospitable to the commercial
world. This operating system created by Linus Torvald and
grew quickly so can almost exceeded the number of Windows
users in the world. Linux can be obtained in a variety of
distribution (often called Distros). Distro is a bundle of the
Linux kernel, together with a basic linux system, the
installation program, basic tools, and any other programs that
are beneficial in accordance with the purpose of making the
distribution. There are countless Linux distributions,
including:
1.1 RedHat, the distribution of the most popular, at least
in Indonesia. The first distribution is redhat installation
and operation easier.
1.2 distribution of Debian, which give priority to stability
and reliability, despite the expense of aspects of
convenience and recency of the program. Debian .deb
package using the installation program.
1.3 Slackware, is the distribution of the majority of the
world's ever Linux. Almost all of the documentation for
Linux compiled based on Slackware. Two important
things from Slackware is that all its contents (kernel,
libraries or application) was tested. So that might be a
59
little old but a definite stable. The second because she
advocated for installing from source so that every
program that we install our systems fully optimized. This
is the reason he does not want to use the binary RPM and
Slackware 4.0, he continued to use libc5 glibc2 is not like
the others.
1.4 SuSE distribution, which is very popular with YaST
(Yet another Setup Tool) to configure the system. SUSE
is the first distribution where the installation can use the
language of Indonesia.
1.5 Mandrake, RedHatdistro is a Variant that is optimized
for the pentium. If our computers using pentium, Linux
generally can walk faster with Mandrake.
1.6 WinLinux, distro designed to install on top of the
DOS partition (WIndows). So to run it can be clicked
from Windows. WinLinux is created as if it is an
application program under Windows.
And many other distros have available or that will
emerge.
60
CHAPTER III
CLOUSING
A. Conclusions
The operating system is the software that serves to enable
the entire device installed on your computer so that each can
communicate with each other. In General, the operating system
is the software on the first layer put on computer memory when
the computer is turned on. While other softwares to run after the
operating system is running, the operating system will do for
common core services software-software that. The common
core services such as access to disks, memory management,
task, skeduling and advance users. So each of the software no
longer need to perform tasks that common core, because it can
be catered for and performed by the operating system. The
section of code that perform the core duties and General is
called with "kernel" of an operating system.
B. Advice
61
This paper was made the beginning of the process of
learning about the operating system, so that the next
dikesempatan be better, either in the discussion, explanation and
writing that has not been achieved.
Group 6
CHAPTER I
INTRODUCTION
A. Issue Background
In this modern era we can not be separated from its name
technology. This is in because everything nowadays has been
widely used technology as a tool to assist all activities.
Moreover technology is very influential in the field of
Information Technology.
62
Information Technology is a technology used to process
data, including processing, obtaining, compiling, storing,
manipulating data in various ways to produce quality
information, ie relevant, accurate and timely information,
used for personal, business, and Government and is a
strategic information for decision-making. This technology
uses a set of computers to process data, network systems to
connect one computer with other computers as needed, and
telecommunication technology is used for data to be spread
and accessed globally. Computers can be found anywhere,
for example in schools, homes, let alone offices and
agencies. The development of Information and
Communication Technology is now more rapidly, it is felt by
the increasing emergence of information and communication
equipment is increasingly sophisticated. Then the means of
communication as well as mobile phones / mobile phones, at
this time almost everyone has it.
B. Problem Identification
1. What are the latest developments in the IT?
63
2. How are the positive and negative impacts of
technology??
C. Problem Formulation
1. Knowing the latest developments in the IT area
2. Explain the positive and negative impacts of technology
64
CHPT. II
DISCUSSION
A. Recent Development in IT
1. Internet of Things
IoT Definition
65
spent, as those investments will generate $13 trillion by
2025.
IoT Industries
IoT Companies
66
Honeywell T-Mobile Comcast
Hitachi
(HON) (TMUS) (CMCSA)
GE (GE) AT&T (T) Cisco (CSCO) IBM (IBM)
Sierra
Amazon Skyworks
Apple (AAPL) Wireless
(AMZN) (SWKS)
(SWIR)
Iridium ARM
Google Ambarella
Communications Holdings
(GOOGL) (AMBA)
(IRDM) (ARMH)
Texas
Fitbit (FIT) ORBCOMM
Instruments PTC (PTC)
(ORBC)
(TXN)
Garmin InvenSense Microsoft
Blackrock (BLK)
(GRMN) (INVN) (MSFT)
Silicon
Control4 CalAmp LogMeIn
Laboratories
(CTRL) (CAMP) (LOGM)
(SLAB)
Linear
InterDigital Ruckus Wireless Red Hat
Technology
(IDCC) (RKUS) (RHT)
(LLTC)
Zebra Arrow
Nimble Storage Silver Spring
Technologies Electronics
(NMBL) Networks (SSNI)
(ZBRA) (ARW)
67
IoT Platforms
Microsoft Azure
IBM's Watson
GE Predix
68
36% of those polled) among enterprises, according to the
2016 Vormetric Data Threat Report.
69
Augmented reality is often presented as a kind of
futuristic technology, but it's been around in some form
for years, if your definition is loose. For example, the
heads-up displays in many fighter aircraft as far back as
the 1990s would show information about the attitude,
direction and speed of the plane, and only a few years
later they could show which objects in the field of view
were targets.
Virtual Realitiy
70
and accessories and act exactly as we would in the real
world.
71
computer search engines, and voice or handwriting
recognition.
AI Problem-Solving
72
manipulating virtual objects in a computer-generated
world.
73
people at once without calling a meeting or
requiring printing of the materials .
5) The technology is very necessary in our life as it
has improved the transportation , it has
mechanized the agriculture , It has improved the
communication , And it has improved the
education and learning process .
2 Negative Effect
Negative effect of IT / Technology :
1) The technology can lead to the social isolation
which is characterized by a lack of contact with
other people in normal daily living such as the
workplace , with friends and in social activities .
2) The technology causes a lack of privacy , where
anyone can with a few flicks on the keyboard find
anyones address and contact information , So ,
they can use of phishing , viruses and hacking that
helps to find any information they wish to obtain,
they can obtain the location on Google Map and
they can know the life story on Facebook .
3) The technology can cause the tendonitis in the
thumb which is a form of repetitive strain injury
caused by the frequent use of thumbs to press
buttons on mobile devices or playing too many
video games .
74
4) The technology affects on our body , it causes the
neck and head pain when you look down the
devices , It causes blurred vision and migraines ,
and eyestrain can also causes the headaches , it
causes an extra layer of stress which was not found
before the overuse of technology .
5) The technology causes a higher consumption of
energy , when you dont turn your devices off ,
when you keep the computers on , the mobile
devices charging , the televisions plugged in , and
all the high tech toys , So , it causes an increase in
greenhouse gas emissions .
6) The technology causes lack of empathy ?
The constant stream of violent scenes on the video
games , TV, the movies and YouTube causes
people to become desensitized to destruction of
any kind .
75
CHPT. III
FINAL
A. Conclusion
Technology is like a coin which has both positive and
negative sides. We are the deciders and we have to choose
how to use it. The usage of technology for over exploitation
of resources should be always avoided. If we use it for
positive things, it will have positive effect of our lives and
vice versa. Nobody would oppose the development of
technologies in any sector but the developments should be in
a positive way and they should not have any negative impact
on present or future generations.
B. Advice
For informatics engineering students, knowing the
latest developments in the IT field is a thing to do, because
the region is our work area later. And for the general public,
we should not only be able to use technology products but
also to know the positive and negative impacts of these
technologies for our lives.
76
COMPUTER ARCHITECTURE
Group 7
A. Definition
In computer engineering, computer architecture is a set of
rules and methods that describe the functionality, organization,
and implementation of computer systems.
Some definitions of architecture define it as describing the
capabilities and programming model of a computer but not a
particular implementation. In other definitions computer
architecture involves instruction set architecture design,
microarchitecture design, logic design, and implementation.
B. History
1. Harvard Architecture
The Harvard architecture is a computer architecture with
physically separate storage and signal pathways for instructions
and data. Discovered by Harvard University in collaborate with
IBM. The term originated from the Harvard Mark I relay-based
computer, which stored instructions on punched tape (24 bits
wide) and data in electro-mechanical counters. These early
machines had data storage entirely contained within the central
processing unit, and provided no access to the instruction storage
as data. Programs needed to be loaded by an operator; the
processor could not initialize itself.
Today, most processors implement such separate signal
pathways for performance reasons, but actually implement
a modified Harvard architecture, so they can support tasks like
loading a program from disk storage as data and then executing it.
3
mathematician and physicist John von Neumann and others in
the First Draft of a Report on the EDVAC.
This describes a design architecture for an
electronic digital computer with parts consisting of a processing
unit containing an arithmetic logic unit and processor registers;
a control unit containing an instruction register and program
counter; a memory to store both data and instructions;
external mass storage; and input and output mechanisms. The
meaning has evolved to be any stored-program computer in
which an instruction fetch and a data operation cannot occur at
the same time because they share a common bus. This is referred
to as the von Neumann bottleneck and often limits the
performance of the system.
4
1. Input
For input the data to execute. Example
keyboard,mouse,Joystick, etc.
2. Processor (CPU)
For process and execute the data .
3. Storage
The function is for keep the data for a moment or permanent
and for keep the System Operation.
4. Output
For presenting from the processing unit. Example Printer ,
monitor, speaker, etc
5
The function is for control the operation command from
ALU.
C. Operate
In computer architecture, a bus (a contraction of the
Latin omnibus) is a communication system that transfers data
between components inside a computer, or between computers.
This expression covers all related hardware components (wire,
optical fiber, etc.) and software, including communication
protocols.
6
Part of BUS data :
1. Control
This way is use for control the path of command.
2. Address
This way is use for give the address of program command.
3. Data
This way is use for Containing data for execute.
7
1. The CPU
8
2. Those that operate on values stored in registers. For
example adding, subtracting multiplying or dividing the
values in two registers, performing bitwise operations
(and, or, xor, etc) or performing other mathematical
operations (square root, sin, cos, tan, etc).
So in the example we are simply adding 100 to a value stored in
memory, and storing this new result back into memory.
2. Branching
Apart from loading or storing, the other important
operation of a CPU is branching. Internally, the CPU keeps a
record of the next instruction to be executed in the instruction
pointer. Usually, the instruction pointer is incremented to point to
the next instruction sequentially; the branch instruction will
usually check if a specific register is zero or if a flag is set and, if
so, will modify the pointer to a different address. Thus the next
instruction to execute will be from a different part of program;
this is how loops and decision statements work.
For example, a statement like if (x==0) might be
implemented by finding the or of two registers, one holding x and
the other zero; if the result is zero the comparison is true (i.e. all
bits of x were zero) and the body of the statement should be
taken, otherwise branch past the body code.
3. Cycles
9
We are all familiar with the speed of the computer, given
in Megahertz or Gigahertz (millions or thousands of millions
cycles per second). This is called the clock speed since it is the
speed that an internal clock within the computer pulses.
The pulses are used within the processor to keep it
internally synchronised. On each tick or pulse another operation
can be started; think of the clock like the person beating the drum
to keep the rower's oars in sync.
10
Internally the CPU has many different sub components
that perform each of the above steps, and generally they can all
happen independently of each other. This is analogous to a
physical production line, where there are many stations where
each step has a particular task to perform. Once done it can pass
the results to the next station and take a new input to work on.
11
MMX (multimedia extension) and SSE (Streaming Single
Instruction Multiple Data) or Altivec registers are similar to
floating point registers.
A register file is the collective name for the registers
inside the CPU. Below that we have the parts of the CPU which
really do all the work.
We said that processors are either loading or storing a
value into a register or from a register into memory, or doing
some operation on values in registers.
12
6. Pipelining
As we can see above, whilst the ALU is adding registers
together is completely separate to the AGU writing values back to
memory, so there is no reason why the CPU can not be doing
both at once. We also have multiple ALUs in the system, each
which can be working on separate instructions. Finally the CPU
could be doing some floating point operations with its floating
point logic whilst integer instructions are in flight too. This
process is called pipelining[5], and a processor that can do this is
referred to as a superscalar architecture. All modern processors
are superscalar.
Another analogy might be to think of the pipeline like a
hose that is being filled with marbles, except our marbles are
instructions for the CPU. Ideally you will be putting your marbles
in one end, one after the other (one per clock pulse), filling up the
pipe. Once full, for each marble (instruction) you push in all the
others will move to the next position and one will fall out the end
(the result).
Branch instruction play havoc with this model however,
since they may or may not cause execution to start from a
different place. If you are pipelining, you will have to basically
guess which way the branch will go, so you know which
instructions to bring into the pipeline. If the CPU has predicted
correctly, everything goes fine![6] Conversely, if the processor
13
has predicted incorrectly it has wasted a lot of time and has to
clear the pipeline and start again.
This process is usually referred to as a pipeline flush and
is analogous to having to stop and empty out all your marbles
from your hose!
7. Branch Prediction
pipeline flush, predict taken, predict not taken, branch
delay slots
8. Reordering
This bit is crap
In fact, if the CPU is the hose, it is free to reorder the
marbles within the hose, as long as they pop out the end in the
same order you put them in. We call this program order since this
is the order that instructions are given in the computer program
Reorder buffer example
1: r3 = r1 * r2
2: r4 = r2 + r3
3: r7 = r5 * r6
4: r8 = r1 + r7
14
that the pipeline has to stall as it waits for the value to be
calculated. Similarly instructions 3 and 4 have a dependency on
r7. However, instructions 2 and 3 have no dependency on each
other at all; this means they operate on completely separate
registers. If we swap instructions 2 and 3 we can get a much
better ordering for the pipeline since the processor can be doing
useful work rather than waiting for the pipeline to complete to get
the result of a previous instruction.
However, when writing very low level code some
instructions may require some security about how operations are
ordered. We call this requirement memory semantics. If you
require acquire semantics this means that for this instruction you
must ensure that the results of all previous instructions have been
completed. If you require release semantics you are saying that
all instructions after this one must see the current result. Another
even stricter semantic is a memory barrier or memory fence
which requires that operations have been committed to memory
before continuing.
On some architectures these semantics are guaranteed for
you by the processor, whilst on others you must specify them
explicitly. Most programmers do not need to worry directly about
them, although you may see the terms.
15
9. CISC v RISC
A common way to divide computer architectures is into
Complex Instruction Set Computer (CISC) and Reduced
Instruction Set Computer (RISC).
Note in the first example, we have explicitly loaded
values into registers, performed an addition and stored the result
value held in another register back to memory. This is an example
of a RISC approach to computing -- only performing operations
on values in registers and explicitly loading and storing values to
and from memory.
A CISC approach may be only a single instruction taking
values from memory, performing the addition internally and
writing the result back. This means the instruction may take many
cycles, but ultimately both approaches achieve the same goal.
All modern architectures would be considered RISC
architectures.
There are a number of reasons for this
Whilst RISC makes assembly programming becomes
more complex, since virtually all programmers use high
level languages and leave the hard work of producing
assembly code to the compiler, so the other advantages
outweigh this disadvantage.
Because the instructions in a RISC processor are much
more simple, there is more space inside the chip for
registers. As we know from the memory hierarchy,
16
registers are the fastest type of memory and ultimately all
instructions must be performed on values held in registers,
so all other things being equal more registers leads to
higher performance.
10. EPIC
The Itanium processor, which is used in many example
through this book, is an example of a modified architecture called
Explicitly Parallel Instruction Computing.
We have discussed how superscaler processors have
pipelines that have many instructions in flight at the same time in
different parts of the processor. Obviously for this to work as well
as possible instructions should be given the processor in an order
that can make best use of the available elements of the CPU.
Traditionally organising the incoming instruction stream
has been the job of the hardware. Instructions are issued by the
program in a sequential manner; the processor must look ahead
and try to make decisions about how to organise the incoming
instructions.
17
The theory behind EPIC is that there is more information
available at higher levels which can make these decisions better
than the processor. Analysing a stream of assembly language
instructions, as current processors do, loses a lot of information
that the programmer may have provided in the original source
code. Think of it as the difference between studying a
Shakespeare play and reading the Cliff's Notes version of the
same. Both give you the same result, but the original has all sorts
of extra information that sets the scene and gives you insight into
the characters.
Thus the logic of ordering instructions can be moved from
the processor to the compiler. This means that compiler writers
need to be smarter to try and find the best ordering of code for the
processor. The processor is also significantly simplified, since a
lot of its work has been moved to the compiler.
In fact, any modern processor has many more than four stages it
can pipeline, above we have only shown a very simplified view.
The more stages that can be executed at the same time, the deeper
the pipeline.
Processors such as the Pentium use a trace cache to keep a
track of which way branches are going. Much of the time it can
predict which way a branch will go by remembering its previous
result. For example, in a loop that happens 100 times, if you
18
remember the last result of the branch you will be right 99 times,
since only the last time will you actually continue with the
program.
Even the most common architecture, the Intel Pentium,
whilst having an instruction set that is categorised as CISC,
internally breaks down instructions to RISC style sub-instructions
inside the chip before executing.
Another term often used around EPIC is Very Long
Instruction World (VLIW), which is where each instruction to the
processor is extended to tell the processor about where it should
execute the instruction in its internal units. The problem with this
approach is that code is then completely dependent on the model
of processor is has been compiled for. Companies are always
making revisions to hardware, and making customers recompile
their application every single time, and maintain a range of
different binaries was impractical.
EPIC solves this in the usual computer science manner by
adding a layer of abstraction. Rather than explicitly specifying the
exact part of the processor the instructions should execute on,
EPIC creates a simplified view with a few core units like
memory, integer and floating point.
19
SOFTWARE
ENGINNEERING
IF CLASS -4
Grup 8
Arranged By:
Darno
(1167050047)
Rina Anjari
(1167050140)
RadenIrham
(1167050125)
Chapter I Introduction
A. Background
20
engineering is concerned with all aspects of computer-based
systems development including hardware, software and process
engineering. Software engineering is part of this more general
process.Software engineering is] the establishment and use of
sound engineering principles in order to obtain economically
software that is reliable and works efficiently on real machines.
More and more individuals and communities rely on
advanced software systems. We must be able to produce a
reliable and reliable system economically and quickly. Usually
cheaper, in the long run, to use software engineering methods and
techniques for software systems rather than just writing the
program as if it were a personal programming project.
B. Problem Identification
This paper presents an approach to automatically identify
recurrent software failures using symptoms, in environments
where many users run the same software. The approach is based
on observations that the majority of field software failures in such
environments are recurrences and that failures due to a single
fault often share common symptoms. The paper proposes the
comparison of failure symptoms, such as stack traces and
symptom strings, as a strategy for identifying recurrences. This
diagnosis strategy is applied using the actual field software
failure data. The results obtained are compared with the diagnosis
and repair logs by analysts.Results of such comparisons using
21
l diagnosis, and repair logs in two Tandem system software
products show that between 75% and 95% of recurrences can be
identified success- fully by matching stack traces and symptom
strings. Less than 10% of faults are misdiagnosed. These re- sults
indicate that automatic identification of recurrences based on
their symptoms is possible.
C. Problem Formulation.
1. Understanding Software
D. Purpose of Paper
22
Chapter II Discussion
23
"the establishment and use of sound engineering
principles in order to economically obtain software that is
reliable and works efficiently on real machines"Fritz
Bauer
24
programmers deal with the ever increasing complexity
of software systems.
The origins of the term "software engineering" have been
attributed to different sources, but it was used in 1968 as a
title for the World's first conference on software engineering,
sponsored and facilitated by NATO. The conference was
attended by international experts on software who agreed on
defining best practices for software grounded in the
application of engineering. The result of the conference is a
report that defines how software should be developed. The
original report is publicly available.
The discipline of software engineering was created to address
poor quality of software, get projects exceeding time and
budget under control, and ensure that software is built
systematically, rigorously, measurably, on time, on budget,
and within specification. Engineering already addresses all
these issues, hence the same principles used in engineering
can be applied to software. The widespread lack of best
practices for software at the time was perceived as a
"software crisis".
Barry W. Boehm documented several key advances to the field
in his 1981 book, 'Software Engineering Economics'. These
include his Constructive Cost Model (COCOMO), which
relates software development effort for a program, in man-
years T, to source lines of The book analyzes sixty-three
25
software projects and concludes the cost of fixing errors
escalates as the project moves toward field use. The book also
asserts that the key driver of software cost is the capability of
the software development team.
In 1984, the Software Engineering Institute (SEI) was
established as a federally funded research and development
center headquartered on the campus of Carnegie Mellon
University in Pittsburgh, Pennsylvania, United States. Watts
Humphrey founded the SEI Software Process Program, aimed
at understanding and managing the software engineering
process. His 1989 book, Managing the Software
Process, asserts that the Software
C. Function Software
26
Function Software - In the important role in the running of
computer systems, of course have special functions that the
software. The functions of the software include the following ..
A. Software provides basic functions for the needs of computers
that can be divided into operating systems or support systems.
B. Software functions in managing various hardware to work
together.
C. As a liaison between other software with hardware.
D. As an interpreter of other software in every instruction into
machine language so that it can be received by hardware.
E. Identify the program
A. Knot
27
instruction into machine language so that it can be received by
hardware.5. Identify the program.
28
When the first digital computers appeared in the early
1940s, the instructions to make them operate were wired into
the machine.Programming languages started to appear in the
early 1950s and this was also another major step in
abstraction. Major languages such as Fortran, ALGOL,
and COBOL were released in the late 1950s to deal with
scientific, algorithmic, and business problems
respectively. Edsger W. Dijkstra
29
Kelompok 9 : Lita Arinda 1167050089
WEBSITE
A. Definition Of Website
30
Web pages, which are the building blocks of websites, are
documents, typically composed in plain text interspersed with
formatting instructions of Hypertext Markup Language
(HTML, XHTML). They may incorporate elements from
other websites with suitable markup anchors. Web pages are
accessed and transported with the Hypertext Transfer
Protocol (HTTP), which may optionally employ encryption
(HTTP Secure, HTTPS) to provide security and privacy for
the user. The user's application, often a web browser, renders
the page content according to its HTML markup instructions
onto a display terminal.
31
B. History Of Website
32
exciting on the cover. The web was never an official CERN
project, but Mike managed to give Tim time to work on it in
September 1990. He began work using a NeXT computer,
one of Steve Jobs early products.
33
2. URI: Uniform Resource Identifier. A kind of
address that is unique and used to identify to
each resource on the web. It is also commonly
called a URL.
3. HTTP: Hypertext Transfer Protocol. Allows for
the retrieval of linked resources from across the
web.
34
announced in April 1993, and sparked a global wave of
creativity, collaboration and innovation never seen before.
In 2003, the companies developing new web standards
committed to a Royalty Free Policy for their work. In
2014, the year we celebrated the webs 25th birthday,
almost two in five people around the world were using it.
35
service, then we can both communicate at the
same level. This principle of equity is also known
as Net Neutrality.
3. Bottom-up design: Instead of code being written
and controlled by a small group of experts, it was
developed in full view of everyone, encouraging
maximum participation and experimentation.
4. Universality: For anyone to be able to publish
anything on the web, all the computers involved
have to speak the same languages to each other, no
matter what different hardware people are using;
where they live; or what cultural and political
beliefs they have. In this way, the web breaks
down silos while still allowing diversity to
flourish.
5. Consensus: For universal standards to work,
everyone had to agree to use them. Tim and others
achieved this consensus by giving everyone a say
in creating the standards, through a transparent,
participatory process at W3C.
36
surface of how these principles could change society and
politics for the better.
C. Categories Of Website
1. Static Website
37
the website owner may make updates periodically, it
is a manual process to edit the text, photos and other
content and may require basic website design skills
and software. Simple forms or marketing examples of
websites, such as classic website, a five-page website
or a brochure website are often static websites,
because they present pre-defined, static information
to the user. This may include information about a
company and its products and services through text,
photos, animations, audio/video, and navigation
menus.
38
c) WYSIWYG online editors which create media
rich online presentation like web pages, widgets,
intro, blogs, and other documents.
d) Template-based editors such as iWeb allow users
to create and upload web pages to a web server
without detailed HTML knowledge, as they pick
a suitable template from a palette and add
pictures and text to it in a desktop publishing
fashion without direct manipulation of HTML
code.
2. Dynamic Website
A dynamic website is one that changes or
customizes itself frequently and automatically.
Server-side dynamic pages are generated "on the fly"
by computer code that produces the HTML (CSS are
responsible for appearance and thus, are static files).
There are a wide range of software systems, such as
CGI, Java Servlets and Java Server Pages (JSP),
Active Server Pages and ColdFusion (CFML) that are
39
available to generate dynamic web systems and
dynamic sites. Various web application frameworks
and web template systems are available for general-
use programming languages like Perl, PHP, Python
and Ruby to make it faster and easier to create
complex dynamic websites.
A site can display the current state of a dialogue
between users, monitor a changing situation, or
provide information in some way personalized to the
requirements of the individual user. For example,
when the front page of a news site is requested, the
code running on the web server might combine stored
HTML fragments with news stories retrieved from a
database or another website via RSS to produce a
page that includes the latest information. Dynamic
sites can be interactive by using HTML forms,
storing and reading back browser cookies, or by
creating a series of pages that reflect the previous
history of clicks. Another example of dynamic
content is when a retail website with a database of
media products allows a user to input a search
request, e.g. for the keyword Beatles. In response, the
content of the web page will spontaneously change
the way it looked before, and will then display a list
of Beatles products like CDs, DVDs and books.
40
Dynamic HTML uses JavaScriptcode to instruct the
web browser how to interactively modify the page
contents. One way to simulate a certain type of
dynamic website while avoiding the performance loss
of initiating the dynamic engine on a per-user or per-
connection basis, is to periodically automatically
regenerate a large series of static pages.
D. Development Of Website
1. Web 0.0 Developping the internet
2. Web 1.0 The shopping carts & static web
Experts call the Internet before 1999
Read-Only web. The average internet users role
was limited to reading the information which was
presented to him. The best examples of this 1.0
web era are millions of static websites which
mushroomed during the dot-com boom (which
eventually has led to the dotcom bubble). There
was no active communication or information flow
from consumer (of the information) to producer
(of the information).
The first shopping cart applications, which
most e-commerce website owners use in some
shape or form, basically fall under the category of
Web 1.0. The overall goal was to present products
to potential customers, much as a catalog or a
41
brochure does only through a website retailers
could also provide a method for anyone (anywhere
in the world) to purchase (their) products.
3. Web 2.0 The writing and participating web
The lack of active interaction of common
users with the web lead to the birth of Web 2.0.
The year 1999 marked the beginning of a Read-
Write-Publish era with notable contributions from
LiveJournal (Launched in April, 1999) and
Blogger (Launched in August, 1999). Now even a
non-technical user can actively interact &
contribute to the web using different blog
platforms. If we stick to Berners-Lees method of
describing it, the Web 2.0, or the read-write
web has the ability to contribute content and
interact with other web users. This interaction and
contribution has dramatically changed the
landscape of the web It has even more potential
that we have yet to see. The Web 2.0 appears to
be a welcome response to a web users demand to
be more involved in what information is available
to them.
This era empowered the common user
with a few new concepts like Blogs, Social-
Media & Video-Streaming. Publishing your
42
content is only a few clicks away! Few
remarkable developments of Web 2.0 are Twitter,
YouTube, eZineArticles, Flickr and Facebook.
4. Web 3.0 The semantic executing web
By extending Tim Berners-Lees explanations, the
Web 3.0 would be a read-write-execute web.
However, this is difficult to envision in its abstract
form, so lets take a look at two things that will
form the basis of the Web 3.0 semantic markup
and web services.
43
interaction over the Internet . Currently, thousands
of web services are available. However, in the
context of Web 3.0, they take center stage. By
combining a semantic markup and web services,
the Web 3.0 promises the potential for applications
that can speak to each other directly, and for
broader searches for information through simpler
interfaces.
44
Graph web 1.0 web 2.0 web 3.0
45
E. Types of Websites
1. Personal Websites
2. Business Websites
46
a. Providing company information
b. Providing company's products information
c. Marketing company's products
d. Providing help and support to costumers.
e. Selling company's products online.
a) Small Business
b) Large Business
47
www.hp.com (Hewlet Packard)
3. Informative Websites
a. News websites.
b. Science websites.
c. Encyclopedias.
d. Business news websites.
e. Websites giving analysis on some subject.
f. Medical information websites.
g. Educational websites.
h. Website that give information on a subject
like this website.
i. University/college/school website and others.
www.howstuffworks.com(online science/general
information)
48
Search Engines or directories do look like
websites but they are much more than that. Search
Engines search through the entire web to find
websites and lists them on their servers. This
searching procedure of search engines is called
crawler and it does its work automatically. The web
interface we see on our browsers fetch these results
from the compliled list and show us those results.
Example include;
www.google.com
Example include;
49
Kelompok 10 :
M. Lutfhi
Mustafhaadji Adi.P
Nurazmi Muhamad
Data Security
CHAPTER I
PRELIMINARY
I. BACKGROUND
50
memeliahar information needed by an organization or
company. Well here's a sense of the actual data.
How about data security ? Data security I describe
and explain in the contents of paper / paper that I make this,
hopefully what is contained in the contents of this paper can
be useful for you and for us all.
51
I. Definition of data security.
II. Data Security
III. Data Security Techneologies
IV.Key Threats To Data Security
52
CHAPTER II
DISCUSSION
53
medical record (EMR) privacy by creating awareness about
patient rights related to the release of data to laboratories,
physicians, hospitals and other medical facilities
54
3). Availability: data security category that can maintain the
source Information to be always available and active to serve its
users. Problem Availability related to the business of protecting
the server from intrusion Can cause the server to fail to provide
services (denial of service / DOS)
2). Backups
user.
55
Data masking of structured data is the process of
obscuring (masking) specific data within a database table
or cell to ensure that data security is maintained and
sensitive information is not exposed to unauthorized
personnel.This may include masking the data from users
(for example so banking customer representatives can
only see the last 4 digits of a customers national identity
number), developers (who need real production data to
test new software releases but should not be able to see
sensitive financial data), outsourcing vendors, etc.
56
moneymaking scheme that can be installed through deceptive
links in an email message, instant message or website. Why
hack data? Motivations behind cyber attacks include cyber crime,
hacktivism, cyber espionage and cyber warfare.
57
CHAPTER III
CONCLUSIONS AND
RECOMMENDATIONS
I. Conclusion
Data security refers to protective digital privacy measures that
are applied to prevent unauthorized access to computers,
databases and websites. Data security also protects data from
corruption.
The aspect of data security is an important thing to be
considered In data management. Data security has become a
part of Development of information technology given that
millions of bits of information Has been exchanged in
computer networks primarily on the internet. A commercial
site for example must meet the requirementsas follows:
1). Secrecy
2). Integrity
3). Availability
Hacking and data breaches are not the only type of
insecurities affecting data. And SMBs and startups are prone
to these as well. Ransomware is becoming a more common
place type of attack
II. Recommendation
For those of you who read this paper to always keep your data
using the database system. Because a lot of data 'is lost in causing
irresponsible people. Hope this paper works
58
BIBLIOGRAPHY
Levy, Steven (2002). Crypto: How the Code Rebels Beat the
Government Saving Privacy in the Digital Age. Penguin.
59
Raymond, Eric S.; Steele, Guy L., ed. (1996). The New Hacker's
Dictionary. The MIT Press.
Himanen, Pekka (2001). The Hacker Ethic and the Spirit of the
Information Age. Random House.
homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading03.
sulaidihasibuan.com/2015/03/pengertian-aplikasi komputer.
60
computerbasicslearning.blogspot.co.id/2011/07/computer-
application-system-software.
catatanteknisi.com/2013/12/cara-membersihkan-virus-komputer-
secara-total
en.wikipedia.org/wiki/Application_software
homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading03.
sulaidihasibuan.com/2015/03/pengertian-aplikasi-komputer.
computerbasicslearning.blogspot.co.id/2011/07/computer-
application-system-software.
catatanteknisi.com/2013/12/cara-membersihkan-virus-komputer-
secara-total.
en.wikipedia.org/wiki/Application_software
searchmicroservices.techtarget.com/definition/multimedia
businessdictionary.com/definition/computing.
groupsevenmultimedia.wordpress.com/linear-and-non-linear-
multimedia
ukessays.com/essays/computer-science/advantages-and-
disadvantages-of-multimedia-computer-science-essay
smallbusiness.chron.com/5-components-multimedia-28279
users.cs.cf.ac.uk/Dave.Marshall/Multimedia/node42.
61
.hongkiat.com/blog/25-free-digital-audio-editors/
Fajrillah.(2011).sistemoperasicomputer.Bogor:Ghalia Indonesia
press.
Pangera,A.AdanAriyus,D.
(2010).SistemOpersi.Yogyakarta:ANDI OFFSET press.
Bussiness Insider. (2016). Wha is Internet of Things.
businessinsider.com/what-is-the-internet-of-things-definition-
2016-8?IR=T&r=US&IR=T [Accessed: 4 May 2017]
britannica.com/technology/artificial-intelligence. [Accessed: 6
May 2017]
online-sciences.com/technology/what-are-the-positive-and-
negative-effects-of-technology. [Accessed: 6 May 2017]
62
en.wikipedia.org/wiki/Computer_architecture
bottomupcs.com/chapter02.
inf.fu-berlin.de/lehre/SS01/hc/eniac
destaaditya.wordpress.com/kuliah/organisasi-arsitektur-
komputer/tugas-3/arsitektur-komputer-von-noumann-dan-harvard
venilicilious.blogspot.co.id/2008/12/jenis-jenis-arsitektur-
komputer.
hackerzone.do.am/load/black_hacker/operation_system/arti_dari_
32_bit_dan_64_bit_pada_komputer/47-1-0-191
https://en.wikipedia.org/wiki/Software ,05 MEI 2017.
lifeblogid.com/2015/05/06/contoh-makalah-bahasa-inggris
,04MEI 2017
manvodurand.blogspot.co.id/2013/12/software-engineering
06MEI 2017
en.wikipedia.org/wiki/Website
businessdictionary.com/definition/website
searchmicroservices.techtarget.com/definition/Web-site
63
webfoundation.org/about/vision/history-of-the-web
flatworldbusiness.wordpress.com/flat-education/previously/web-
1-0-vs-web-2-0-vs-web-3-0-a-bird-eye-on-the-definition
fabacus.com/symphony-api-eai/the-importance-of-data-security
securityintelligence.com/data-security-securing-your-most-
important-asset
en.wikipedia.org/wiki/Data_security
techopedia.com/definition/26464/data-security
spamlaws.com/data-security-importance.
reference.com/technology/data-protection-important-
7419357969089455
64