Senin, 04 April 2016

WORK PRACTICE REPORT INDUSTRY IN DEPARTMENT OF TRANSPORTATION OF COMMUNICATION AND INFORMATION

WORK PRACTICE REPORT INDUSTRY
IN
DEPARTMENT OF TRANSPORTATION OF COMMUNICATION
AND INFORMATICS




ARRANGED BY :

                     


NAME: SANDY HERGIA TREADY
DEPARTMENT: TKJ (Computer Technology and network)
CLASS: XI TKJ 1
ORIGIN OF SCHOOL: VOCATIONAL HIGH SCHOOL Country 1 SAND TURTLE













FOREWORD
          Praise I pray to god almighty one, because on his intervention so that the preparation of the technical industry (PRAKERIN) can be resolved properly. This report as evidence that I have been carrying out industrial work practices (PRAKERIN) in the office DEPARTMENT OF TRANSPORTATION OF COMMUNICATION AND INFORMATION well.
          Besides the preparation of technical reports industi (PRAKERIN) This also is one of the requirements to participate in the School Final Examination (UAS) and the National Final Examination (UAN).
          Do not forget to say many thanks to the agency for more than 3 months has provided the opportunity to implement the Industrial Work Practices (PRAKERIN).
          This report can be completed with the help of various parties such as counselors, teachers - teachers, as well as the agency. Therefore, I say a big thank you to all those who have helped.
          I was also expecting your comments and suggestions for improvement and refinement of this report. Hopefully this report will be helpful for the reader or or anyone in need. amen




TABLE OF CONTENTS :
word introduction…………………………………………………………………………………….. ii
List Isi……………………………………………………............................................. iii
Chapter I Introduction
1.1 Background PRAKERIN ........................................................................ .. 1
1.2 Basic Writing PRAKERIN ..................................................................... 2
1.3 Purpose and Objectives PRAKERIN .................................... ........................ 3
1.4 Time and Location Companies ............................................................... 4
CHAPTER II. Activity Report
2.1 Implementation Activities Prakerin ............................................................ .. 5
2.2 Results Activity .......................................................................................... 6
CHAPTER III. Cover
3.1 conclusion………………………………………………………………………………….. 15
3.2 suggestion…………………………………………………………………………………………… 15



CHAPTER I INTRODUCTION
1.1 BACKGROUND
      Industrial Work Practices is one activity that can increase knowledge, discipline, responsible, honest and technologies acquired vocational high school (SMK) with or circumstances beyond the field.
Interest Industrial Work Practices is the purpose of development in the long term in Indonesia for the creation of human resources (HR) quality, skilled, independent, creative, innovative and spirited private. It is necessary for the holding of education and the application of science education and industry through Prakerin program.
   Program SMK Negeri 1 SAND TURTLE majoring in Computer Engineering and Networks (TKJ), aims to produce skilled manpower in the industrial era in the future, in order to produce skilled graduates and can carry out tasks in the field, especially the technology industry.


1.2 BASIC WRITING
      Apart from being one of the conditions for taking UNAS / UN, as well as to understand the basics of the industry, the introduction of the concept of industry, the introduction of industrial discipline. As some provisions tertuangdalamUU No. 2 Year 1989 on National Education System, PP 29 of 1990 on secondary education, PP 39 of the community's role in the National Education. Now instead of the law include:
1. The education was conducted from two (2) lines, school education and school education pathways (UUSPN, Chapter IV, Article 10 Paragraph 1).
2. Secondary School Operator can work with the community teutama businesses and philanthropists to obtain resources in order to support the implementation and development of education (PP 29, Chapter 29, Paragraph 1).
3. Procurement and utilization Educational Resources carried out by the government of society and the family of learners (UUSPN, Chapter VIII, Article 33).
4. Public participation can take the form of an opportunity for an internship or job training (PP 39, Chapter III, Article 4, Item 8).
5. Society as government partners the widest possible opportunity to participate in the implementation of national education (UUSPN, Chapter VI, Article 47, Paragraph 1).
6. The Government and society creates greater opportunities to increase community participation in the national education system (PP 39, Chapter VI, Section 8, Paragraph 1).
7. At the middle school to do the test new ideas are needed in order to develop secondary education (PP 29, Chapter XIII, Article 32, Paragraph 2).
8. Actors community participation can create a forum for consultation, cooperation and coordination (PP 39, Chapter VI, Article 10)


1.3 PURPOSE AND OBJECTIVES
1. Provide real provision for students / i secondary vocational programs in the field of Computer Engineering and Networks to further develop science.
2. Increase in the absorption something new in globalization.
3. Increases mental skills, and capabilities to strive or work in order to make students / i be a candidate for a reliable power in the business world.
4. Train discipline and responsibility on the work performed.
5. Can compare what is learned at school and in the corporate world.

1.4 TIME and PLACE OF EXECUTION
       Time prakerin was conducted over three months, starting on January 11, 2016 until 11 April 2016.
Prakerin was held at the Office COMMUNICATION AND INFORMATION DEPARTMENT OF TRANSPORTATION Kab.Indragiri Hulu, address: 06 KM Belilas Jl.Raya Causeway Reba - West Rengat

CHAPTER II. ACTIVITY REPORT
2.1 Implementation Activities Prakerin
     Implementation of Industrial Work Practices (Prakerin) was carried out for 3 months, namely from 11 January to 11 April 2016 which dilaksnakan Office COMMUNICATION AND INFORMATION DEPARTMENT OF TRANSPORTATION Kab.Indragiri Hulu, address: 06 KM Belilas Jl.Raya Causeway Reba - West Rengat ,
The details of the activities carried out during Prakerin, as follows:

1.Instalasi operating system based on open source and closed source Computer 
2.Assemble the computer (not maximum)
3.Programming WEB
4.operate application system
5.Instalasi Network Hardware
6.Troubleshooting Network
7.Desain Graphic


2.2 Event Results
       Of all the activities undertaken, we can finally resolve this report. In addition we also come to understand how the activities in carrying out duties in the world of information and technology.
The results of these activities include:



1. We have become more deeply understand what it is and how to Install Operating System.
2. We become more understanding of things that must be considered when assembling a computer
3. We become more in depth understanding of the WEB
4. We have become more understanding of things that must be considered when designing graphics
5. We are becoming more and understand a wide variety of tissue damage and how to fix it.

CHAPTER III. COVER
3.1 CONCLUSIONS
  Learning in the workplace is a strategy that would allow participants to experience the learning process through working directly on the job. Given Prakerin How did the writer can feel the direct implementation of practices in the workplace are directly guided by the industry.


examples of activities undertaken during prakerin
brochure design (graphic design photoshop)

1. Before doing the design, make sure the computer is installed special software design, for example photoshop
2. ease and maximum results, use a brochure template with extension PSD, can be downloaded at freepik.com or in an internet search.



3.File will automatically open with Photoshop

4. Use the following tools in order to maximize results in the desired design

Information:
Rectangular Marquee Tool
Use the rectangular marquee tool to crop the image in the form box. Use the menu Select -> Transform Selection to change the menu selection and Select -> Feather to adjust the sharpness outskirts of the pieces.
Elliptical Marquee Tool
Used to make the selection ellipse or circle. You can use the Select -> Transform Selection (or right-click) to change the fields that would be selected. Use the menu Select -> Feather to adjust the sharpness of the edges of the image. Use Select -> Inverse to reverse the selection.
Lasso Tool
This selection is used to select the free form with the mouse.
Polygonal Lasso Tool
Polygonal Lasso Tool is used to select images that have an edge straight line, for example pyramid in Figure 2.5. If the Alt key is pressed, the Polygonal Lasso Tool Lasso Tool will function as usual. Examples of the selection pyramid image scaled and placed on the bottom right corner.
Magnetic Lasso Tool
Magnetic Lasso Tool use is quite easy, because with this tool selected image will automatically make the selection outline in the image of a contrasting color.
Magic Wand Tool
Magic Wand tool will select images that have the same color.
crop Tool
Crop tool is used to remove parts that are not selected. Examples of its use here is used to improve the results of the scan are skewed.
Healing Brush Tool
Healing Brush Tool is used to improve the image of certain sections. Activate this tool, then press Alt + Click on the objects on the parts that are not wrinkled, then click on the wrinkled part to be removed.
Spot Healing Brush Tool
Spot Healing Brush Tool is used to repair damage to the image. Here you do not need to specify the area to be used as a benchmark, because it will be automatically elected from the surrounding area. For example used to eliminate cracks in the statue as in figure 2.10.
This tool is a new tool in the Adobe Photoshop CS2 that does not exist in previous versions.
patch Tool
Patch Tool is used to improve the image. This tool was created by making a selection with the mouse or by holding the ALT key to generate a polygonal shape. Further drag to the area to be used as a benchmark improvement.
Red Eye Tool
Red Eye Tool is used to correct red eyes.
Clone Stamp Tool
Clone Stamp Tool is used to make duplicate an area in the image, or so-called cloning. Press ALT on the object to be cloned, then use the mouse in the area where new objects would be placed.
Background Eraser Tool
This tool is used to remove the background that have similar colors. For example, used to remove background sky in the image of butterflies.
Magic Eraser Tool
Such as the Background Eraser tool, this tool will erase the area with the same color, but the effect is to the whole picture, not just the area that was clicked.
Color Replacement Tool
Color Replacement Tool will change the color of the image without changing the shape of the image. This tool will automatically simply changing the area with the same color into another color is desired.
Blur, Sharpen, and Smugde Tool
Blur Tool is used to blur the area. For example, used to remove freckles on the face. Sharpen tool is the opposite of the Blur Tool. With the Sharpen Tool, the image will be sharper. Smugde Tool is used to change the shape of the image by drag mouse.
Dogde, Burn, and Sponge Tool
Dogde Tool is used to make the area becomes brighter. Burn Tool used to darken the area. Spong Tool is used to brighten (saturate) or reduce color (desaturate).

5. download some pictures as a material for design in order to maximize

6. then this is the end result



3.2 ADVICE
  In the implementation of this Prakerin authors take the wisdom of experience and the benefits for ourselves. we hope that this report is useful for us all and also reads. As for suggestions that we can express them as follows:
1. Discipline of work, ethics, decency, skill, honesty, diligence, and responsibility should be raised or considered by every employee DEPARTMENT OF TRANSPORTATION OF COMMUNICATION AND INFORMATION
2. Establish good working relationships between superiors and subordinates is a key to the success of a company.
  
  Similarly, we thank you very much to all those who have helped and guided in the implementation Prakerin, especially coaches Industry, hopefully goodness Mr / Ms obtain rewards from Allah SWT, Amen


Minggu, 13 Maret 2016

Here we create web applications offline with Macromedia Dreamwaver , following the results of the web that we have made
This results in a web that has been designed in Macromedia Dreamwaver . For the design we can choose the design at will 
This is the programming code used to create web


This is the web results that we have made , typing your name to store the data into the database , make sure all the data is loaded , and then click Save to save the form data that has been filled


If a display like this means that the data has been stored into the database
More details can be seen in the video below
 

 

Sabtu, 12 Maret 2016

How to Create a Password Protected Folder without any Extra Software

Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can be located anywhere and named anything.
image
Navigate into your newly created folder and create a new Text Document. This can easily be done from the context menu.
image
Open the document, now paste the following code into the contents of the document:
cls 
@ECHO OFF 
title Folder Private 
if EXIST "HTG Locker" goto UNLOCK 
if NOT EXIST Private goto MDLOCKER 
:CONFIRM 
echo Are you sure you want to lock the folder(Y/N) 
set/p "cho=>" 
if %cho%==Y goto LOCK 
if %cho%==y goto LOCK 
if %cho%==n goto END 
if %cho%==N goto END 
echo Invalid choice. 
goto CONFIRM 
:LOCK 
ren Private "HTG Locker" 
attrib +h +s "HTG Locker" 
echo Folder locked 
goto End 
:UNLOCK 
echo Enter password to unlock folder 
set/p "pass=>" 
if NOT %pass%== PASSWORD_GOES_HERE goto FAIL 
attrib -h -s "HTG Locker" 
ren "HTG Locker" Private 
echo Folder Unlocked successfully 
goto End 
:FAIL 
echo Invalid password 
goto end 
:MDLOCKER 
md Private 
echo Private created successfully 
goto End 
:End
Change the PASSWORD_GOES_HERE text to the password you want to set. Now go ahead and save the file as locker.bat.
image
Once the file is saved as a batch file you can delete the original text file.
image
Now run your batch file by double clicking on it–the first time you run it, it will create a folder called Private. This is where you can store all your secret things. When you have finished adding all your stuff to the Private folder, run locker.bat again.
image
This time you will be asked if you sure that you want to lock the folder, press the “Y” key and hit enter to lock your folder.
image
You will see that your Private folder quickly disappears.
image
If you run the script yet again, you will prompted for a password.
image
If you enter the same password as you set in the script the Private folder will reappear if you enter the incorrect password the script will just Terminate.

How to See the Files Again

Most people don’t know how to show system files, but anybody who has some experience will probably be able to quickly figure it out in the Folder Options. To see the files again, all you have to do is uncheck the boxes for “Show hidden files, folders, and drives” and uncheck the box for “Hide protected operating system files”.
But any ordinary user who unchecks the box will most probably be scared off by the warning message that appears.
The second way someone could comprise the folder is to open the batch file and read your password. It’s definitely not a really secure way to hide your files, but it is fun.
Attribution note: We found this script on dozens of different web sites going back many years. We have no idea who first created the script, so we’ve omitted any sort of attribution link. If you do have proof that you first created the script, contact us and we’ll adjust the article accordingly.

If You Forget Your Password

Seems like once a week somebody writes in asking how to figure out the password they set. And the answer is really simple: Right-click on the locker.bat file and choose Edit.
Then you can see the password you set in the file.

Jumat, 11 Maret 2016

Understanding Mikrotik


Understanding Mikrotik is an operating system includes software that is installed on a computer so that the computer can act as the heart of the network, controlling or regulating data traffic between networks, this type of computers known as routers. So essentially mikrotik is one of the special operating system for router. Mikrotik Router is known as one of the OS that is reliable and has a lot of features to support a smooth network.

Functions and Advantages Mikrotik Mikrotik
Mikrotik Router can be used on a small scale computer networks or large, it is of course adapted to the resource rather than the computer itself. If the proxy is used to set up a small network can then use computer devices are mediocre, but if they handle is large-scale networks such as class ISP then use computer devices must be truly reliable which has a high specification.

Excess Mikrotik Router is easy in operation. Known easier if we compare it with other OS such as Cisco routers and more. Ease of operation based Mikrotik Router OS one of which is thanks to the availability features of the GUI. So we can setup the router not only through text display commonly used OS other routers, but can also be done through a GUI-based remote application named Winbox. Another advantage of RouterOS is the number of supported features. Features found on the network Mikrotik OS are:

Routing - Static Routing
hotspot
Simple Tunnels
web Proxy
DHCP
VRRP
NTP
SNMP
mndp
Firewall and NAT
Data Rate Management
Point-to-Point Tunneling Protocols
IPsec
Caching DNS Client
universal Client
UPnP
Monitoring / Accounting
M3P
tools
and many others, including support scripting programming
Simply Mikrotik is a router operating system that can run and regulate the activities of the network as a whole. Starting from bandwidth management, routing, billing hotspot, the user data, load balancing, until the BGP routing.

Minggu, 28 Februari 2016

Network security

Network Security (English: Network Security) in computer networks is essential to monitor network access and prevent misuse of network resources that are not authorized. The task of network security is controlled by the network administrator.

The concept of Network Security

The security aspect is defined fifth this point:
Confidentiality (Confidentiality) Require that information (data) can only be accessed by those in authority.
Integrity (Integrity) Requires bahwaa information can only be changed by a party who has the authority.
Availability (Availability) Requires that the availability of information available to those who have authority when needed.
Authentication (Authentication) Requires that the sender information can be correctly identified and there is no guarantee that a false identity is not obtained.
Nonrepudiation Requires that both the sender and recipient information can not deny sending and receiving messages.
Attack (Attack) for security can be categorized into four main categories:
Disorders (Interruption) Assets of the system under attack so that it becomes unavailable or can not be used by the authorities. An example is the destruction / modification of the hardware or network channel.
Interception (Interception) People who are not authorized to gain access to assets. Referred to the concerned parties, programs, or other systems. An example is the tapping of data in the network.
Modification (Modification) A person who is not authorized to make changes to the asset. An example is the change in the value of the data file, modify the program so wrong, and modification of the message being transmitted in the network.
Fabrication (Fabrication) An unauthorized party inserts a fake object into the system. An example is to send false messages to others.
There are several principles that need to be avoided in dealing with security issues:
Silence and all will be fine
Hiding and they will not be able to find you
The technology used is complex / Unix, which means secure.
Computer Network Administrator
Computer Network Administrator is the kind of work that is needed at this time, especially in companies / institutions that have implemented computer technology and the Internet to support the work.



The use of computer network systems in small and large scale will require the setting from the level of physical and non-physical. This arrangement involves the control process. There are several definitions of network administration, among others:

Controlling the strategic (assets) (Strategic Controlling (assets))
Controlling complekxity (complekxity controllers)
Improving service (good service)
Balancing various needs (balancing the various needs)
Reducing downtime (reduced downtime)
Controlling costs (cost control)
www.dosenpendidikan.com/ Basically, a network administrator in charge of managing and maintaining all the resources on the network performance of the network system more effective and efficient views from the functions, structure and security of the network itself.

Before the duties and responsibilities of the following are some common things that must be controlled by a network administrator;



Knowledge of basic theory and practice of computer, are very important because they form a computer network administrator familiar with how the computer system itself can be well understood.
Knowledge of computer networking hardware such as; repeaters, hubs, switches, routers, antennas, cables and various other supporting devices, which includes understanding how things work, installation and configuration.
Understanding routing understanding of the theory and the routing configuration must excel at to be able to build a good network it is necessary, especially if the computer or a sub-organization of the company very much.
Knowledge of computer security systems, particularly the network (network security) would be very helpful and provide more value.
In addition to the ability of theory and practice which should excel in other things is to have professional ethics, professional ethics and there is no attitude is not good then all the ability to master the theory and practice do not mean much.

Functions and Duties Network Administrator
There are some functions and administrators, but in general can be expressed from a wedge between the network, hardware, and applications. The task of the network administrator:

Security Management (Security management) work focuses on issues of network security Network administrators are as follows:

A firewall is a system or device that allows network traffic that is considered safe to go through it and prevent network traffic that is considered safe for through and prevent traffic that are considered unsafe.
Username: The user name will be used as information for login Password Control: password control is owned by the user system.
Resource access: network admin can do the restrictions on the use of resources according to the permissions granted.


Similarly Discussion About 10 Basic Concepts of Computer Network Security Hopefully helpful

how to install ubuntu on virtualbox

As for the actual installation, we actually go straight into the tutorial No. 10.

Setting OS in Virtual Box.

1. Creat New on the "New Icon" in Virtual Box we use.
2. Name the OS that will be installed on Virtual Box, there we named "ubuntu14.04" then Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Naming In accordance with the OS that we will use.


3. Determine Memory RAM that we will use. "Here I choose 1024MB". Then Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Memory RAM determines that we will use.


4. Select the optional hard drive that will be used. "Set optional course in the second," and click Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Hard drives are going to use


5. Hard Drive Option type we will use, here I choose "VDI", because we are here is a simulation such as inserting the installation CD.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Hard Drive type options that we will use


6. Select only "Dinamic Allocated" on the first optional, then click Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Type of Physical Storage Hard Drive


7. Determine the amount of disk space that will be used. Here we provide 8GB. Then click "Create".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Determining the Total Disk Space




8. Equally important after creating space OS that have been made earlier, for setting the "ISO file that we will use." Click the "Settings> Storage> Empty> Choose click on the DVD icon" And find the Ubuntu ISO file that will be installed.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Setting Storage OS Simulation


9. Well sure its iso file already exists after the above step is done.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Check ISO File Detection


As I said earlier, we did not do the above process if directly to "the sebanarnya Installation Process".

10. Then click "Start" to begin the OS installation Ubuntu14.04
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Started Installation


11. "Click Install Ubuntu"
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Ubuntu instalation Choice


12. Immediately "Click Continue", if you want to directly download the package in ubuntu, then please check the bagain required.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Preparing to install Ubuntu


13. Select "Something elese" for setting up the partition section.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14.04 with Virtual Box Complete
instalation Type


14. There is still no partition, click the "New Partition Table" to create the partition table.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Get New Partition


15. Create a "swap area" as apprentice Memory. And his position is "Logical and Beginning of this space."
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Create Swap Area


16. And then the rest here I've created "Ext4 journaling file system".
Select slace sign "/", and its position as the "Primary and Beginning of this space" Then click install on any part of which is checked, that is "Ext4".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Create Ext4 journaling file system


17. Click "Install" partition "ext4" (which is checked).
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Installing Ubuntu on Ext4


18. The installation went, and this is election time use, select the "Map Jakarta".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Select Time Zone


19. And this is the selection of the "keyboard" that we use. Jump "Click Next only".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Type of Keyboard


20. On the user form, "filled with what name and password" what we will use.
And will "error" if there is no password.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Adding Username and Password


21. Pending the installation process is running, wait until finished.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Welcome to Ubuntu 14:04


22. After the installation process is complete, it's time we install applications that will be used.
Click on the "Ubuntu Software Center", then we are looking for the software, and can directly Click on the Install button to install available. Other methods can also be done by using the manual method, namely the Terminal.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap

Inventors History of Windows and Windows Until 2015


Inventor of Windows for the first time are two people who are friends since childhood, namely Bill Gates and Paul Allen. Since the inventor of Windows, Windows now has developed from one version to another version with an increasingly improved quality.





1. Windows 1.0 - Year 1985


Windows is the first version of the inventors of Windows called Windows 1.0, released on 20 November 1985. This version has many shortcomings in some functionality, making it less popular in the market. Windows 1.0 is not a complete operating system, but will expand the capabilities of MSDOS with additional graphical interface. In addition, Windows 1.0 also has the same problems and weaknesses that are owned by MS-DOS.

2. Windows 2.0 - Tahun 1987 


Windows 2.0 mulai diperkenalkan untuk menggantikan versi 1.0 . Pada versi ini, penggunaan kartu grafis VGA mulai diperkenalkan sehingga Windows 2.0 mampu menampilkan resolusi yang lebih baik dari versi sebelumnya. Program aplikasi tambahan yang disertakan adalah Microsoft Excel dan Microsoft Word. Selain itu, program aplikasi yang mulai dapat diinstal pada sistem operasi ini adalah corel draw dan pagemarker.

3. Windows 3.X (3.0 AND 3.1 in 1990 and 1992)


1990 and Windows 3.0: Exodus third of the Windows platform offers increased performance, advanced graphics with support for 16-colors, and fully support the more powerful processor than Intel 386. Various PC has an Intel 386 processor that offers comprehensive features and capabilities of 1992 - Windows 3.1: version of Windows with TrueType fonts are preinstalled. This effectively for the first time Windows creates a functional desktop publishing platform.

4. Windows for Workgroups - 1992


Actually the idea to issue wokrsgroup based operating system already appear in Windows 3.1. However, further development there padaversi 3.1.1. This version is the forerunner of the Windows operating system bebasis network (network).

5. Windows NT


During that time, the inventor of Windows and Founder of Microsoft Corporation's continuing development of its new operating system, called Windows NT. The main architect of Windows NT is Dave Cutler, who was one of the leaders of the VMS operating system architect at the company Digital Equipment Corporation (DEC), which was later purchased by Compaq is now part of Hewlett-Packard. Microsoft recruiting Cutler in 1988 to create a version of OS / 2 that is portable, but eventually Cutler instead create a new operating system.

6. Windows 95 - 1995


Windows 95 is now integrated with the 32-bit TCP / IP (Transmission Control Protocol / Internet Protocol) and supports Internet network, dial-up networking, and support Plug and Play, where we can install the device by just plug in the hardware. 32 bit versions of Windows 95 there is an increased capability multiedia, richer features for mobile computing, and networking are already integrated.


7. Windows 98 - 1998


Windows 98 go on sale on June 25, 1998. In this version of Windows started to support the USB port like crazy. USB hubs, USB scanners, USB mouse, USB keyboard, USB joystick, and a variety of other USB devices.

8. Windows Millennium Edition (ME) - Year 2000


Windows ME is specially designed for home computer users. However, it seems that this version is less favored by the people because of the many outstanding issues that Windows ME Windows 98SE 
sekompatibel not in running some additional applications.

9. Windows Experience (XP) - Year 2001


Windows XP brings fresh air to the world of computers. Enhancement of Windows 2000, Windows XP brings high reliability, security, and performance. With a fresh look, Windows XP has a feature for business and home computing. Including remote desktop connection, a file system that can be encrypted, and System Restore and advanced networking. For mobile users, there is support for 802.1x wireless network, Windows Messenger, and Remote Assistance.

10. Windows Vista – Year 2007

 Windows Vista [is] newest system operation [of] output Microsoft from all developer or inventor Windows. Fitur-Fitur [of] [at] its Windows Vista change [is] radical we can say, especially [at] shares userinterface. ability Sekuritas [is] also enhanced by Microsoft, so that its[his] newest Microsoft megklaim version [is] more stabil,aman, and pamper the consumer computer ( although according to many people the things have [is] on Windows XP 


11. Windows 7 – Year 2010

 Microsoft make the Windows 7 more reliable than windows vista. Others, mount the responsifitas windows 7 improved, and also make the process of quicker booting and shutdown again. consumer Computer expected easier in finishing everyday duty, making koeksi and easier sikronisasi antarperngkat, and explore the world internet more gratifying .

12. Windows 8

Development of Windows 8 started before Windows 7 was launched in 2009. On September 13, 2011, build 8102 (Windows 8 Developer Preview) released to the public. This build is fully open for the first time and include the new Start Screen, the Metro user interface and a number of sample applications made by employees internship at Microsoft. On February 29, 2012, Microsoft released Windows 8 Consumer Preview, the beta version of Windows 8 build 8250. For the first time since Windows 95, the Start button will no longer appear on the taskbar, even though their Start screen should still be opened by clicking on the bottom left corner screen and the Start button in the box Charm. On August 1, 2012, Windows 8 (build 9200) released by the build number 6.2.9200.16384. Microsoft held a launch event on October 25, 2012 and the launch of Windows 8 to the public the next day.

13. Windows 10

Windows 10 is the release of the developer or inventor to be released next Windows operating system Microsoft Windows. Introduced on September 30, 2014, will be released in late 2015.

Thus the explanation of the Discoverer Windows and Windows History to 2015, may be useful.


Diberdayakan oleh Blogger.

you tube channel

Subscribe

Rekomendasi Kami

Popular Posts

Kamu Pasti Tertarik

MoreBaru diupdate