computer science

Friday, October 31, 2008

how to install cable UTP

All I certainly know that I wired network but I think the cable to RJ-45 connectors it can be the network's pointing the way. Not to RJ-45 that the instruction was once just a pair or less fit installation been, and I can not anymore.

Sebener its installation is easy but it's all the people I love how to install cable UTP RJ-45 with a right and even more that I love what the reason for UTP cable must be installed such.

As always pointing to the image so do I open the patient's yes: D.

Tools and materials needed (the house would make rice Uduk I)

UTP cable

UTP cable fact that there are several categories of category 1 - 7, which is often used for LAN is usually 5 or category often called cat-5. Here is a glimpse of what the cable category 1 - 7 taken from wikipedia.

cat 1: previously used for POST (Plain Old Telephone Service) and ISDN telephone.

paint 2: used for token ring network with bw 4mbps

cat 3: used for data network with frequency up to 16Mhz and more popular to use 10mbps

cat 4: frequency up to 20Mhz and are often used to 16mbps token ring network.

cat 5: frequency up to 100MHz and regular use for the network with 100Mbps speed stay is not likely to match gigabytes ethernet network.

cat 5e: frequency and speed with the same paint-5 gigabytes, but more support ethernet network.

paint 6: An speed up to 250Mbps, or more than twice the paint and paint-5-5e

paint 6a cable to the future of speed up to 10Gbps

paint 7: in the design to work on the frequency up to 600Mhz.

Here is an example image UTP cable connector that is installed, the cat-5e cable in cable terkupas and paint-6.

RJ-45 Connector

Once you know the type of cable now RJ-45 connectors though a headache this picture and its differences with RJ-11 is also often found the market. The image above is the RJ-45 with 8 pins, while the bottom is the RJ-11 with only has 4 pins.

Crimp Tool

Crimp tool / Crimping tool is a tool to install the cable connector to the UTP RJ-45 / RJ-11 depending on needs. Various shapes that are large with many functions, such as cable can be cut, peel and others. There is also the only intended to crimp RJ-45 or RJ-11 course. Examples like this picture.

Cable Tester

To be sure that your installation of the cable to the connector is ok better if you also have a cable Tester as follows. Differences diatara two testerdibawah this is the one to wear one pocky one pair while another one pocky for a cable. For beginners easier to handle that type of pocky per cable because you will not be made dizzy: D. Tester and a small remote cable Tester is used when the cable is in the second test and long end is not near (for example, there are different diruangan). How is the use of the tip of one cable to the cable TX Tester and a large set of auto, and then at the other end we install the remote cable Tester. After that you just see the remote Tester cable only. When the light means connected with the cable temporarily dead when the cable is lost.

Few notes: test results by using the cable shows Tester does not mean that the cable can work with both. 100meter maximum distance from the cat-5e cable sometimes, when the test with a cable Tester will still generate good value in the distance more than 100meter while dialiri when the data connection is lost because the cable is too long.

The tool is the next tone generator that is able to do Tracing in a position where the cable end. Very useful if you do not want to replace the entire cable when there is damage.

Once you know the equipment needed for the installation of UTP cable to the RJ-45 connector, now there are terms in the crossover in stright and cabling.

From 8 cable (4 pair) UTP cable, which is actually applicable only 4 cable (two pair). two cable for data transfer or the TX and RX for two cable or receive data. Although only four of the cable used, we can not take a random cable which will be used. Cable used to be two pair or two pairs. Signature cable to a pair cable is the wind each other and have a color / stripe the same. According to the standard TIA/EIA-568-B pair cable used is the orange and white and orange-green-green and white.

While the pins used eight pins from the RJ-45 that is used Pin number 1-2-3-6 while the numbers 4-5-7-8 were not used to transfer and receive data Alias idle.

Here is the order of the cable according to the standard color on the position and stright position on the cross.

Crossover / cross cable is the cable manually maping the output signal on one input connector to plug in one of its more than one or TX Maping to plug in the connectors in the RX and TX - plug one in to the RX - that connectors on the other .

Ordering based cable TX and RX are as follows. Please click on the picture below the table.

Cross cable used to connect to normal from PC to PC / PC to the Router, all connections from the mainstream tool that usually connect through a switch or hub, but is placed directly. Here is an example position in the crossover cable.

Picture the left is the position of color on one side and the other based on international standards T568A and T568B. Tax is calculated from the connector to the left with the condition of the connector pinnya facing us.

Picture middle of the cable is an example of a cross that is so, and the next picture is an example of cross over the adapter tool that can create a cross stright cable if you do not want to change the way the plug cut it.

Meanwhile, stright to a cable you do not need to have bothered you cross over quite equate the position of cable in one hand with the other side.

Ok now you already know what the cross and what it stright. Now Tips for installing cable to the connector.

1. Prepare all equipment, particularly cable, RJ-45 connectors and Crimping tool.

2. Peeled the outside of the cable (cable-wrapping a small cable) approximately 1 cm along with the critic using the cable that normally exist in the crimp tool (such as the two razor blade sight to peel)

3. Sort accordance with the needs of the cable. For the connector is always the first row with the standard layout for the Stright or T568A. When you feel less comfortable with the structure of the cable try to pull all the little cable that have been peeled the one hand while holding the longer the cable is not terkupas. Then again collated by memelintir and open coil pair cable.

4. Rapihkan cable layout by pressing the section close to wrapping the cable so that the structure of the cable is seen flat.

5. Cut the tip-end of the cable that is not the average cable cutter (part of which has only one fruit knife and the again a crimp in even the tool is cutting the cable) until the array. Try wrapping the distance between the cable until the end of the cable is not more than 1cm.

6. With still pressing the border between the cable and my cable is not my, try to enter the cable to RJ-45 connectors to the end of the cable-end look at the front RJ-45 connectors. If you still do not try to continue to be observed pressed while the position of the cable is not changed.

7. Once you are sure the cable is not changed position and cable have been good to the RJ-45 connectors further input RJ-45 connectors to the crimpt tool for pressing on. When the connector in the condition in the crimp tool you can be sure the cable is fully back to the watchmaker RJ-45 cable by pushing into the RJ-45. Make sure also that the wrapping part of the cable into RJ-45 connectors.

8. Then you can crimp pressing tool that flat-out all the pins RJ-45 entrance and protective penetrate the small UTP cable. When you press the less strong possibility UTP cable does not tersobek by pin RJ-45 cable so that it does not connect. And when wrapping the outside does not enter into the RJ-45 connectors, cables, when the often-digerak movement, most likely position the cable will bergesar and even dislodged.

9. Perform the above steps to end its cable that one again.

10. If you are sure to install the cable UTP RJ-45 with the strong is the next test by using LAN Tester if any. If you do not have a LAN Tester do not fearful enough to see you again that the cable is installed, ensure that you are strong enough and put it all ends of the cable visible from the front of the RJ-45 can almost be sure that the installation is successful UTP cable.

Build 100% Free Computer Virus

Build a computer system that can be free from virus attacks is not easy. Although many antivirus software or firewall software, but all can not guarantee 100 percent free from computer virus attacks the computer. In this edition will discuss how to build a computer system that can seangan free from viruses, worms and the like. Nay, this criticism has been presented at the workshop held at the Computer Show Komputek mid-2008.

Many computer users will not know the existence and the reliability of Recovery Card is. where the system of protection of the hardware is a real solution and not a temporary development of the first computer virus infection from a virus attack that the local act like a king-whim. because of computer viruses will not be able to penetrate the limited space that is created by the virtual Recovery Card making viruses become paralyzed nan ompong. During viruses and antivirus software is still in the field, made from the same program or software, then we will not be able to win the battle because it only happens pursue, chase-only. Word ads ripe orange drink orange

To whom Recovery Card?

Protection system with the hardware is very suitable applied to personal computers, office, public services, cafe, or a computer laboratory used to share many users. levels for both beginners and advanced is the subject specialty pervirusan world that is tired and saturated chase shadows virus.

Internet campaign as a farm business

Utilization of the Internet is not only a source of information, but also has many other benefits that many people may not know that. Average people in Indonesia using the Internet only to find just the information and communicate with email or chat.

Internet also has the advantage of business opportunities as the business and, as an example that you have a bookstore can sell your books in the Internet, the benefits that can get even 2-fold, even 10 times than if you sell products offline because the product will you got to include all the world and can be done easily and quickly.

Marketing the products through the Internet also does not require a large amount of capital even far smaller than if you build a store or building. Already many of those who switch to sell their products through the Internet because according to them the benefits that will be far greater.

In the Internet there are also many different types of investment opportunities are quite promising. The average profit that we get with investing in a company through the internet is 25% - 40% every month with the contract varied. Investing through the Internet certainly have a very big risk because when a company where we can invest only bankrupt.

By doing the marketing campaign or through the Internet, our products can be seen by tens of thousands even hundreds of thousands of people each month who come from different cities and different countries.

Introduction Basics of Computer Network

Based on the criteria, the computer network that is differentiated into 4:

1. Based on the distribution of sources of information / data

- Centralized Network
This network consists of computer and server klient which klient computer that serves as a mediator for access to sources of information / data derived from a single computer server

- Network are
Is a mix of some of the network, so there is some centralized computer server that relate to each other klient establish a specific network system.


2. Based on the geographic range is distinguished:

- Network LAN
is a network that connects 2 or more computers in coverage, such as laboratory, office, and in 1 cafe.

- Network MAN
Is a network that covers a large city and its local area. For example the network of local phone, cellular phone systems, network and Internet relay some ISPs.

- WAN Network
Is a network with coverage across the world. For example the network of PT. Telkom, PT. Indosat, and GSM networks such as Cellular Satelindo, Telkomsel, and many more.


3. Based on the role and relationship of each computer in the processing of data.

- Client-Server Network
In this network, there are 1 or more computer servers and client computers. Computers that will become a computer server and the client computer and changed through the software on the network protokolnya. As the client computer to access data on a server computer while the computer server to provide the information required by the client computer.

Network-Peer-to-peer
In this network there is no client computer and server computer because the computer can do all the delivery and reception of information so that all the computer work as well as client server.


4. Based on the data transmission media

- Network Berkabel (wired Network)
In this network, to connect one computer to another computer needed a cable network operator. Cable network functioning in sending information in the form of electrical signals between a computer network.

- Wireless Network (Wireless Network)
Is a network with a medium electromagnetic waves. In this network is not required to connect a cable between the computer because it uses electromagnetic waves that will send the signal information between the computer network.


For further explanation on the computer network will be posted on writing my next.

Principles of Network Computer Systems Work

Principles of Network Computer Systems Work
Electrical signal and the signal in the form of electromagnetic waves on a computer network propagates / jet with the principles of the computer network. So that a network can exchange data and information, needed a tool called Modem (Modulator Demodulator), which works to change the analog signal into digital signal and vice versa.

There are 4 main components that are on a network, the sender (the sender information data), protocol (to which encodes and decodes data downloading information), media transmission (medium data transfer), and Receiver (the recipient of the information data).

Working principles, first set to send the signal information to the Receiver through the protocol, which encodes the digital signal into analogue signals and transmitting signals through the media and through the second protocol decodes digital signals back into prior to the Receiver.

Above principles can work in analogikan when the Japanese and British people are chatting via the Internet. When the Japanese typing a message in Japanese, the message is changed by the first protocol to the English so that English people can receive messages in English and vice versa when the British reply to the message, the message jerking the English language will be changed by the protocol first, before a Japanese to Japanese people. So in this protocol can be as translators term data and information.

Computer up

The following will be discussed on how to up the computer, especially for those new study .. from some references that I learned .. then the following will be explained step by step way up the computer components available in the market with a diverse selection of quality and price. With up their own computer, we can determine the types of components, and the ability of computer facilities in accordance . computer hardware consists of:

A. Preparation
B. Assembling
C. Testing
D. Handling Problem
Preparation

Preparation of good will facilitate the computer hardware and avoid problems that may timbul.Hal related to the preparation include:

1. Determination of Computer Configuration
2. Kompunen preparation and equipment
3. Security

Determination of Computer Configuration

Computer configuration relates to the determination of the type of components and features of the computer and how all the components can work as a computer system suitable personalization . components starting from the type of processor, motherboard and other components. Factors suitability or compatibility of the components of the motherboard must be, because every type of motherboard supports the type of processor, memory modules, the port and I / O bus different.

Preparation Equipment and Components

Computer and component assembly equipment to be prepared for the first assembly prepared to facilitate assembly. Equipment which is comprised of:

* Computer Components
* Completed components such as cable, screw, jumpers, bolts and so forth
* Manual and a reference from the component
* Tool and a flat screwdriver Philips

Software operating system, device drivers and application programs.


Manual is required as a reference for the position mengatahui diagram of the elements of connection (connectors, ports and slots) and element configuration (jumpers and switches) and their way of setting jumpers and switches that according to a computer or CD dirakit.Diskette software needed to install the Operating System, device drivers from the tools, programs and applications on the computer, which finished arranged.

Security

Security measures are needed to avoid problems such as damage to components by electric static, falling, excessive heat cairan.Pencegahan spills or damage because of static electricity by:

* Using anti-static bracelet or touching the surface of the metal casing before handling components to remove static cargo.
* No direct touching electronic components, connectors or point in the series but held metal or plastic body found on the component.
Assembling

Stages in the process of computer hardware consists of:

1. Preparation motherboard
2. Install processors
3. Place the heatsink
4. Installing Memory Modules
5. install a motherboard on the Casing
6. Install Power Supply
7. Install the motherboard and cable Casing
8. Install Drive
9. Install the adapter card
10. Final Settlement

1. Preparation motherboard

Check the motherboard manual to know the position of jumpers for CPU speed, speed multiplier and voltage inputs to the motherboard. Set the setting jumpers appropriate instructions, set the jumpers error voltage can damage the processor.
. Install processors

Processors more easily installed before settling the chassis motherboard. How to install the type of processor socket and a slot socket.

1. Specify the position of pins on the processor and 1 processor socket on the motherboard, generally located at the corner marked with dots, triangles or depressions.
2. Straighten the position of the lever to open the socket.
3. Enter the processor socket to the first position foot-square foot hole with a processor socket. rapatkan until there is no rift between the processor socket.
4. Lower the lever back.


Slot Type

1. Place the buffer (bracket) at the end of the two slots in the motherboard so that the spindle hole position met with a hole in the motherboard
2. Insert the bolt and the bolt hole in the pivot

paste card processor in both the press and the right to slot into the hole.




computer history

Since yore, the data processing has been done by humans.
Humans also find tools for electronic and mechanical help
man in the calculation and data processing that can get
results more quickly. Computers that we had when this is a long evolution
from the discovery of human-sejah yore form of mechanical equipment
and electronic. Currently, the computer and its tools have entered
in every aspect of life and work. Computers are now
the ability of more than a normal math calculations.
Among them is a computer system at the supermarkets that are able kassa
read the code of goods shopping, telephone exchange that handles millions
calls and communications, computer networks and the Internet
mennghubungkan various places in the processing equipment also dunia.Bagaimanapun
data from the primeval since until now we can grade to within 4
large groups.
1. Equipment manual: data processing equipment that is a very simple,
and the most important factors in the use of tools is to use energy
human
2. Mechanical equipment: equipment that is already a form of mechanical
moved by hand manually
3. Mechanical Electronic equipment: equipment mechanics, which moved in
automatically by the electric motor
4. Electronic equipment: Equipment that works in electronic full
This paper will provide an overview of the history of the computer from time to time to
period, particularly data-processing equipment.


TOOLS CALCULATE TRADITIONAL and MEKANIK CALCULATOR
Abacus, which emerged about 5000 years ago in Asia and the still small
used in some places, up to now, can be considered as early
the first computing machine.
This tool allows users to perform calculations
use the seeds on the slide, which set a rack. The traders in
Abacus use that time to calculate transactions.
Along with the emergence of a pencil and paper, especially in Europe, Abacus
loss of popularity. After almost 12 centuries, the discovery of another appear
in the computing engine. In the year 1642, Blaise Pascal (1623-1662), which
at that time aged 18 years, found what he called as
numeric calculator wheel (numerical wheel calculator) to help his father
calculate tax
This brass-square box, called a Pascaline, using eight
toothed wheels turn to sum up the number to eight digits. Tool


is a tool based on the number ten. The weaknesses of this tool
is only limited to addition.
In 1694, a French and German philosopher, Wilhem von Gottfred
Leibniz (1646-1716) to improve the Pascaline machine that can make
multiplying. Just as predecessor, the tool is working with mechanics
using wheel-wheel serration. With notes and learn gambargambar
made by Pascal, Leibniz can perfect the device.
Then in 1820, starting popular mechanical calculator. Charles Xavier
Thomas de Colmar find a machine that can perform four functions
aritmatik basis. Colmar mechanical calculator, arithometer, present
a more practical approach in the calculation because it can
do addition, subtraction, multiplication, danpembagian. With
ability, arithometer much used to the time of World War I.
Together with Pascal and Leibniz, Colmar help build era
mechanical computing. Beginning the first computer that actually formed by
seoarng mathematics professor English, Microsoft Vista (1791-1871).
In 1812, Babbage consider the suitability of the natural mechanism
and mathematics: the engine mechanics are very good in the task of
same repeatedly without error; are mathematics requires repetition
from a simple step-by-step particularly. The problem is kemudain
growing up to put the engine mechanics as a tool to answer
mechanical needs. Babbage's first effort to answer this problem
appear in the year 1822 when he proposes a machine to do
differensial calculation equation.


The engine is called the Machine Differensial. By using energy
steam, the machine can save the program and can do calculations
and print the results automatically. After working with machinery
Differensial for ten years, Babbage suddenly inspired to start
create a general-purpose computer that first, called the Analytical
Engine. Assistant Babbage, Augusta There King (1815-1842) has an important role
in the making of this machine. He helped revise the plan, find
funding from the British government, and efforts to specifications
Anlytical Engine to the public. In addition, a good understanding of Augusta
on this machine to enable the making instructions included
dlam engine and also to make it the first woman programmer.
In 1980, the United States Department of Defense designate a
programming language with the name as WITH homage to him.
Babbage steam engine, although it was never completed, it appears very
primitive when compared with the current standard. However,
it describes the basic elements of a modern computer and
also revealed an important concept. Consists of about 50,000
components, the basic design of the Analytical Engine to use the cards
perforation (holey), which contains instructions for operating these machines.
In 1889, Herman Hollerith (1860-1929) also apply the principles of the card
perforation to make the calculation. First task is
find a faster way to do the calculation for the Bureau
United States Census. The previous census conducted in the year 1880
takes seven years to complete the calculations. With
the growing population, Bureau estimates that the required time
ten years to complete the census calculation.

Hollerith card perforation to enter census data that
then processed by means of these mechanics. A card can be
save up to 80 variables. By using these tools, results
census can be completed within six weeks. In addition to having
benefits in the areas of speed, the card works as a media
data storage. The level of calculation errors can also be pressed in
drastically. Hollerith and develop these tools and to menjualny
the wider community. He established the Tabulating Machine Company in the year 1896
that became International Business Machine (1924) after
experienced several mergers. Other companies such as Remington Rand and
Burroghs also produces equipment for perforation pembac card business.
Perforation card used by business and government to
permrosesan data until 1960. In the next few engineers
create another new discovery. Vannevar Bush (1890 - 1974) make
a calculator to complete equality differensial in 1931.
These machines can solve the complex equation differensial
This complex is considered by the academia. The engine is very large
and a hundred serration because of the weight and bearing needed to do
calculation.
In the year 1903, John V. Atanasoff and Clifford Berry tried to make
electrical computer that apply Boolean algebra in the electrical circuit.

This approach is based on the results of work George Boole (1815-1864) form
binary system of algebra, stating that each of the math equation
can be expressed as true or false. With conditions apply
is one of the electrical circuits in the form of lost-connected, Atanasoff
Berry and create the first computer in the electricity in 1940.
However, the project stopped because they lost their source of funding.
COMPUTER first generation
With the occurrence of World War Two, countries involved in the
the war is trying to develop computer mengeksploit
strategic potential of the computer. This funding increase
development of computer and computer techniques to accelerate progress. In
year 1941, Konrad Zuse, a German engineer to build a
computer, the Z3, for designing aircraft and missile control
The allies also made progress in the development of strength
computer. In 1943, the United Kingdom complete the computer code breaker
secret, called Colossus to solve the secret code -
Germany used. Impact of making too does not affect the Colossus
development of the computer industry because of two reasons. First, the Colossus
is not a versatile computer (general-purpose computer), he only

designed to solve the secret code. Second, the existence of this machine is kept
confidential until a decade after the war ended.
Business conducted by the United States at the time resulted in a
Other progress. Howard H. Aiken (1900-1973), an engineer of the Harvard
working with IBM, successfully producing electronic calculator for the U.S. Navy.
The calculator is half the size of football fields long legs and has a
cable range of 500 miles. The Harvd-IBM Automatic Sequence
Controlled Calculator, or Mark I, an electronic computer relai. He
using electromagnetic signals to drive mechanical components.
Beropreasi with these machines, slow (3-5 seconds he needs to
every calculation) is not flexible and (the order of calculation can not be changed).
The calculator can perform basic calculations and aritmatik
a more complex equation. The development of other computers on the current
is the Electronic Numerical Integrator and Computer (ENIAC), created by
cooperation between the United States government and the University of Pennsylvania.
Consisting of 18,000 vacuum tubes, 70000 resistor, and 5 million point solder,
the computer is a machine that consume a very large
160kW of power.

This computer was designed by John Presper Eckert (1919-1995) John W. DN
Mauchly (1907-1980), ENIAC computer is a versatile (general purpose
computer) that work 1000 times faster than Mark I.
In mid-1940's, John von Neumann (1903-1957) join
with a team of the University of Pennsylvania in the building design concept Usha
computers up to 40 years, still used in the technique
computer. Von Neumann designing discrete Electronic Variable Automatic
Computer (EDVAC) in 1945 with a memory to accommodate
both programs or data. This technique allows the computer to stop
at a time and then resume work again. Key
von Neumann architecture is the central processing unit (CPU), which
allows all functions of the computer for coordinated through one
single source. 1951, UNIVAC I (Universal Automatic Computer I)
created by Remington Rand, became the first commercial computer
utilize the architecture model of the von Neumann.
Both the United States Census Bureau and General Electric have UNIVAC.
One of the impressive results that are achieved by the UNIVAC

predict success in the victory Dwilight D. Eisenhower in
1952 presidential election. The first generation of computer dikarakteristik
with the fact that the operating instructions are created for a specific task
certain. Each computer has a program code-binary different
called "language machine" (machine language). This causes the computer
difficult for the programmed and the speed limit.
Another characteristic of the first computer generation is the use of vacuum Tube (the
create a computer at the time the size of very large) and the cylinder
for magnetic data storage.
COMPUTER second generation
In 1948, the discovery of transistor greatly affect the development of
computer. Replace the transistor Tube vacuum in television, radio, and computers.
As a result, the size of electrical machinery decreased drastically.

Transistor used in starting the computer started in 1956.
The discovery of another form of the development of magnetic-core memory help
development of computer second-generation of smaller, faster, more
reliable, and more energy efficient than its predecessor.
The first machines that use this new technology is superkomputer.
IBM makes superkomputer called stretch, and make Sprery-Rand
computer called LARC. Komputerkomputer, which was developed for
atomic energy laboratory, can handle large amounts of data, a
the ability of researchers is needed by the atom. The engine is very
tend to be expensive and too complex for business computing needs,
kepopulerannya that limit. There are only two that had LARC
installed and used: one at the Lawrence Radiation Labs in Livermore,
California, and the other in the U.S. Navy Research and Development Center in
Washington D.C. Computers replace the second-generation machine language
with assembly language. Assembly language is the language use
abbreviation-replaces singakatan to binary code.
In the early 1960s, the computer begins to appear that the second generation success
in business, in universities and in government. Computers
This is the second generation of computers that use the full
transistor. They also have components that can be associated
with the computer at this time: a printer, disk storage in, memory,
operating system and programs.

One important example of the computer at this time is that IBM 1401
secaa widely accepted in the industry. In 1965, almost all
big business is using a computer to process the second generation
financial information. Programs that are stored in the computer and language
programming that the flexibility to the computer.
This increased flexibility with the performance of the price reasonable for
the use of the business. With this concept, the machine can print the invoice
purchase and run consumers and design products or
calculate the payroll.
Some programming language begins to appear at that time. Language
programming Common Business-Oriented Language (COBOL) and the Formula
Translator (FORTRAN) from general use. This programming language
replace a complex machine code with the words, sentences, and the formula
mathematics, which are more easily understood by humans. This facilitates
someone to program and set the computer. Various career
new pop (programmer, Analyst, experts and computer systems). Industry
software and also start work on developing the computer
This second generation.
COMPUTER third generation
Although the transistor in many cases surpass Tube vacuum, but
transistor generates heat that is large enough, which can potentially
damage to parts of the internal computer. Quartz stone (quartz rock)
eliminate this problem. Jack Kilby, an engineer at Texas Instrument,
develop integrated circuits (IC: integrated circuit) in the year 1958. IC
combine the three electronic components in a small Silicon disc
made of quartz sand. In the scientists and successfully enter

more components into a single chip called
Semiconductor. The result, the computer becomes increasingly small as
komponenkomponen can dipadatkan in the chip. The progress of computer
The third generation is the use of other operating systems (operating system)
which allows the engine to run many different programs
simultaneously with a major program that monitors and
coordinate the computer memory.
COMPUTER GENERASI FOURTH
After the IC, the purpose of developing a more clear: to shrink the size of
komponenkomponen and electrical circuits. Large Scale Integration (LSI) can
contains hundreds of components in a chip. In the 1980s, Very
Large Scale Integration (VLSI) contains thousands of components in a chip
single.
Ultra-Large Scale Integration (ULSI) increase the number of these
millions. The ability to install so many components in the
a chip that berukurang half chip coin encourage
decrease in the price and size of the computer. It also enhances
work, efficiency and keterandalan computer. Intel chips are made in 4004
1971 brought progress in the IC to put all the components
from a computer (central processing unit, memory, and control input / output)

in a very small chip. Previously, the IC is made for
to a certain specific tasks. Now, a
microprocessor can be manufactured and then programmed to meet
all needs desired. Not long after, each device
household, such as microwave oven, television, and cars with electronic fuel
injection equipped with a microprocessor
This allows the development of the people to normal
use the computer normally. Computers no longer be dominated
large companies or government agencies.
In the mid-1970s, perakit offers computer products
their computers to the general public. These computers, called
minikomputer, sold with a software package that is easy to use by
among the public. Counterfeit software is most popular at the time the program is
word processing and spreadsheets. In the early 1980s, video games such as Atari
In 2600 to attract the attention of consumers on the home computer is more sophisticated
and can be programmed.
In 1981, IBM introduced the use of the Personal Computer (PC)
for use in the home, office and school. The number of PC use
jumped from 2 million units in 1981 to be 5.5 million units in 1982.
Ten years later, 65 million PC use. Computers continue
evolusinya toward smaller sizes, from the computer on

table (desktop computers) to a computer that can be inserted into the
bag (laptop), or even a computer that can be (palmtop).
IBM PC to compete with Apple Macintosh compete in the market
computer. Apple Macintosh became famous because popularize the system
graphics on the computer, competed while still using the computer
The text-based. Macintosh also popularize the use of the mouse tool.
At the time now, we know way compatible with IBM
the use of the CPU: IBM PC/486, Pentium, Pentium II, Pentium III, Pentium IV
(Serial from the Intel-made CPU). Also, we know AMD K6, Athlon, etc.. This is all
incoming classes in the fourth generation computer.
Along with menjamurnya the use of computers in the workplace, ways
to explore new potential continues to be developed. Along with the increase
strong, a small computer, it can be connected komputerkomputer
simultaneously in a network to share a memory, tools
software, information, and also to be able to communicate with each
another. Computer networks allow computers to form a single
electronic cooperation to resolve the tasks of a process. With

perkabelan direct use (also called a local area network, LAN), or
phone cable, this network can grow to a very large
COMPUTER GENERASI KELIMA
Defining the fifth generation computers become quite difficult because this stage
still running. Examples of imaginative computer is the fifth generation computer
HAL9000 fiction novels in the works of Arthur C. Clarke entitled "2001: Space Odyssey.
HAL displays all the desired functions of a computer
fifth generation. With artificial intelligence (artificial intelligence), HAL can
logics have enough to do with human percapakan,
use of visual feedback, and learning from the experience itself.
Although it may be realized HAL9000 still far from reality, many
functions that have been held realized. Some computers can
receive instructions verbally and able to mimic human logics. Capabilities
to translate foreign languages also become possible. This facility is visible
simple. However, these facilities become far more complex than suspected
when programmers realized that human understanding is very dependent
in the context and understanding rather than translating words
directly.
Many of progress in the field of design and computer technology more
allows the creation of a fifth-generation computer. Two engineering progress
which is mainly parallel processing capabilities, which will
replace the model of non Neumann. Model non-Neumann will be replaced
with a system that is able to coordinate multiple CPUs to work
in unison. Progress is another technology that superkonduktor
allows the flow of electricity without any obstacles, which can later
accelerate the speed of information. Japan is famous in the country
socialization jargon and the fifth generation computer project. Institutions ICOT

(New Institute for Computer Technology) also formed to merealisasikannya.
Many news stating that this project has failed, but some
other information that the success of the fifth generation computer project will
bring a new paradigm changes in the computerized world. We wait
information which is valid and produce results.