Blogroll

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, 1 April 2017

Advantages and Disadvantages Of IT

Advantages
1. Protecting and Storing Information
Electronic storage systems are being created to hold the information that is being shared over the internet and internal intranets. Secure maintenance of customer and company files is vital to the integrity of the company. Virtual vaults keep information safe by limiting access to a select few. Security systems are put in place to protect your electronic information and keep it from being wiped out or damaged during a system breakdown. Hackers are also kept at bay with intense securities.
2. Automated Processes
The ability to find ways to complete more work in a shorter amount of time is essential to the success of a company. Information technology improves a company’s efficiency by implementing automated processes to make employees more capable of handling a larger work load. Reports, queries and monitoring financials can be completed by the computer programs, leaving employees free to complete other tasks.
3. Communication
Communication in every aspect of human interaction is essential. In the business world, communication is imperative to the success of the company. Emailing, video conferencing and chat rooms allow for easier communicating between employees and supervisors as well as employees

Disadvantages
1. Expense of Implementation and Maintenance
Setup costs for implementing an information technology system within a home or business can be very costly. Software can training can also take another big bite out of the budget. Information technology systems, just like any other equipment, need to be maintained and repaired from time to time. But there are also updating and upgrading costs associated with IT systems.
2. Elimination of Jobs
By implementing IT systems into a company, tasks take less time and therefore, employees have more time throughout the day. Paperwork is processed and filed immediately, reports are generated with the touch of a button and financial statements are generated automatically. Companies are finding that they can combine jobs and need a smaller staff to operate fully.
3. Breaches in Security
When information is stored electronically, there are more chances of having security breaches. Hackers are evolving along with technology and they are never up to any good. Security systems that were state-of-the-art last year are now out-of-date and in desperate need of upgrading. To protect company data, a security specialist should be kept on staff.
While information technology is quickly becoming something that we cannot live without, there are many aspects that keep us on our toes. Trying to stay current on the changes and be able to afford the upgrades can make a person feel helpless and confused. But when we understand the different aspects of information technology, then we can accomplish so much more than without it.

The trio in Paris

Throwback to an evening  Paris trip! <3  Me and my twins  in front of the Eiffel tower..

Saturday, 25 March 2017

Penyebab wajah berminyak dan cara mengatasi

Penyebab Wajah Berminyak 

Makanan yang Berlemak 

Kita tau bahwa makanan yang mengandung banyak lemak tidak baik di konsumsi oleh manusia karena akan adanya penimbunan lemak dan menimbulkan penyakit. Masalah minyak berlebih adalah masalah ringan yang di timbulkan akibat mengkonsumsi makanan berlemak lebih.


Hormon tidak Seimbang
Minyak berlebih pada wajah merupakan salah satu tanda seorang anak sudah mulai memasuki masa puberitas. Seorang remaja harus beradaptasi dengan hal-hal baru yang terjadi pada dirinya. Pada orang dewasa khususnya wanita akan memproduksi banyak minyak saat haid. Maka dari itu kegiatan yang kita lakukan sebaiknya dikontrol dengan baik. Asupan makanan yang seimbang dengan kegiatan yang kita lakukan akan mengurangi jumlah minyak yang keluar dari tubuh kita.

Salah Pilih  Kosmetik
Sebagian besar cewek menginjak remaja sudah mulai  berani memakai peralatan kosmetik untuk menunjang penampilannya. Dan itu tidak di permasalahkan. Tapi ada baiknya bagi remaja untuk tidak memakai alat-alat kosmetik yang terbuat dari bahan kimia. Hal itu dapat memproduksi minyak berlebih, iritasi dan membuat wajah lebih sensitive apabila wajah tidak bisa menerima bahan-bahan kimia tersebut. Lakukan percobaan pada bagian tangan sebelum memutuskan memakai salah satu merek kosmetik.

Keturunan
Orang tua tidak hanya mewariskan harta kepada anaknya tetapi juga mewariskan sebagian  sifat genetiknya (pasti). Tidak menutup kemungkinan orang tua yang memiliki keturunan genetik memproduksi minyak akan turun keanaknya. Hal ini tidak bisa di cegah, tapi tetap bisa di atasi.
 
Cara Menghilangkan Wajah Berminyak
Mencuci Muka
Menjaga keberihan muka sangatlah penting. Untuk menghindari minyak berlebih cukup mencuci muka dengan sabun 2x sehari (jangan lebih). Kelebihan mencuci muka dengan sabun akan mengikis lapisan kulit wajah dan menjadi bahaya jika terpapar sinar matahari bahkan produksi minyak akan bertambah banyak.

Minum Air Putih
Minum 2 liter sehari akan menjaga metabolisme pada tubuh. Pada saat kegiatan yang ekstra jika tubuh mengandung banyak air, keringat akan lebih sedikit mengadung minyak.

Air Hangat
Handuk kecil di celupkan ke dalam air hangat kukuh yang telah dicampur sedikit garam, usapkan secara berlahan ke wajah. Rasakan sensasi kesejukannya setelah itu. Air hangat akan membuka pori wajah dan garam akan mengangkat kotoran pada wajah.
      
Putih Telur
Gunakan sebagai masker. Caranya pecahkan telur dan pisahkan kuning dan putihnya. Kocok putih telur hingga berbusa. Oleskan ke wajah dan biarkan mengering.  Selanjutnya bersihkan dengan air hangat.
Tomat/Timun/Kentang
Ketiga buah ini dapat digunakan sebelum tidur. Caranya sangat mudah.cuci muka terlebih dahulu. Lalu Iris salah satu dari buah tersebut. Usapkan ke wajah, biarkan kering. Keesokkan harinya usap muka dengan handuk dan air hangat. Setelah itu bilas dengan air dingin untuk menutup kembali pori wajah.
Daun Seledri
Sebagai penyedap makanan, ternyata seledri  juga mampu mengurangi kadar minyak pada wajah. Caranya potong kecil daun seledri, sebelumnya siapkan air dalam panic kecil. Masukkan dua gelas air dan tunggu hingga mendidih. Masukkan seledri yang telah dipotong kecil. Rebus selama 15-20 menit. Angakat dan dinginkan. oleskan pada wajah secara merata. Tunggu hingga benar-benar meresap. Lanjutkan bilas dengan pembersih muka.

Saturday, 18 March 2017

10 commandments of computer ethics

The Ten Commandments

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
  11. Commandment 1
    Simply put: Do not use the computer in ways that may harm other people.
    Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.
  12. Commandment 2
    Simply put: Do not use computer technology to cause interference in other users' work.
    Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.
  13. Commandment 3
    Simply put: Do not spy on another person's computer data.
    Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects.
  14. Commandment 4
    Simply put: Do not use computer technology to steal information.
    Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen information.
  15. Commandment 5
    Simply put: Do not contribute to the spread of misinformation using computer technology.
    Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information, are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong. Giving wrong information can hurt other parties or organizations that are affected on that particular theme.
  16. Commandment 6
    Simply put: Refrain from copying software or buying pirated copies. Pay for software unless it is free.
    Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his/her name. In case of a developer writing software for the organization she works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical. It is not easy to do such things and in the end it will just be copied illegally.
  17. Commandment 7
    Simply put: Do not use someone else's computer resources unless authorized to.
    Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his/her private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user's computer without her permission is not ethical. Privacy will always be applied to such resources and were not supposed to get exposed and hack in such ways that is not yours.
  18. Commandment 8
    Simply put: It is wrong to claim ownership on a work which is the output of someone else's intellect.
    Explanation: Programs developed by a software developer are her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong. Originality of any software/programs are to be keep safe and trying to claim ownership will cause a viral disputes.
  19. Commandment 9
    Simply put: Before developing a software, think about the social impact it can have.
    Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large.
  20. Commandment 10
    Simply put: In using computers for communication, be respectful and courteous with the fellow members.
    Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user.

Computer etiquette

What is computer etiquette?

Computer etiquette is the proper way to communicate while interacting with people online. Whether it's done in an email, a chat room, a forum or a blog, there are certain things to keep in mind to ensure that what an individual writes is understood and non-offensive.
 One example of computer etiquette is to never use all capital letters. Communicating with someone using all capital letters is akin to yelling at that person, which is considered rude and an inappropriate way to communicate with someone online. It's also important to use proper spelling and punctuation with all online communication, otherwise the writer will appear uneducated and careless, in addition to not getting his or her intended message across


Why would a computer keep buffering?

Reasons a computer may keep buffering while streaming videos include the video being viewed by several people at the same time, slow Internet speed, several electronic devices being used on a single router and low computer resources. To speed up the process, a user can wait for the video to load, lower the quality or download the video.

Waiting until Internet traffic is slower, usually before 8 p.m. and after 10 p.m., with streaming-content providers can reduce the chances of a popular video needing to buffer. Even when traffic is high, simply waiting a few minutes to view the video can help.
Having a faster Internet connection can also eliminate buffering. YouTube, Netflix and Hulu have specific recommendations for the rate of speed an Internet connection should maintain to watch a video without interruptions. Even with those specific speeds, the video may still need to buffer if several high-quality videos are being played simultaneously on several devices over a single connection.
Getting a router that can handle a gaming console, computer, tablet and phone connected to the Internet at the same time can also help eliminate buffering. Another way to prevent buffering is to ensure the device being used is free of viruses and malware that can slow performance.


Why does my mouse freeze up?

Some reasons that cause a computer mouse to freeze are loose wires, low system resources, outdated driver software or malware. Even though there are different causes, it is a common problem and one that is normally easy to fix.If the cursor freezes while using the mouse, there are a few troubleshooting tips one can try. If none of the tips are effective at restoring the function of the mouse, it might be a technical issue that has to be fixed by a professional.
  • Check the wiring - If it is a wired mouse, do a quick check to ensure the cord has not come unplugged from the computer. If so, plug it back in to see if that fixes the problem.
  • Check system resources - Sometimes too may programs cause a reduction in system resources which may cause the mouse to act erratically. Try to close down a few unnecessary programs to free up some resources.
  • Check to see if the driver is outdated - Drivers help the computer run the devices correctly. Look for updated driver software and, if so, install it.
  • Scan for malware - In some cases, malware may cause the mouse to freeze up. Use a trusted antivirus to scan for malware. If any is found, remove it and restart the system to see if that helps the problem.

Importance of internet privacy and security

Now more than ever, the technological era is growing exponentially. We need to take this into account, and improve our information security and privacy. There has been a dramatic increase in cyber attacks over the years, and is now recognized as the fastest growing crimes. Without realizing we provide so many bits and pieces of personal information around the web. For example, we join social media sites, register for online banking, and make other personal accounts. Cyber-criminals use this information to possibly steal an individual’s identity or even sell their information for a potential profit. The most important thing we can do is to protect ourselves by being well knowledge on how to properly use the Web in a safe manner.

As students at The University of Texas, there are an ample amount of resources provided to us at no cost to protect our information. For example, BevoWare is variety of anti-virus, Web browser, e-mail programs, and other useful tools for both Macs and Windows available to all UT Austin students and staff. The most prominent one is the anti-virus protection. There are also other items for better security connections. By having anti-virus protection we can safeguard our information on computers from viruses, potential hacking attacks, Trojan horses, and worms. In addition, “utilities provide useful tools for compressing files, making secure FTP and SSH connections, communicating with on-campus servers and more” (BevoWare) In addition, another resource that UT provides to its student at no cost is UT Box. The UT Box is a cloud storage service that students could use to file share for either businesses or academic purposes. The major advantage of the cloud storage is that it allows students to “collaborate on documents and safely store confidential data” (UTBox). UT Box also allows students to share these files in a secure manner to other students or institutes. A major difference between UT Box and other cloud storage sites is that it has the most protection of confidential data. This is because it follows HIPAA, FERPA, SSNs, and much more.

As frequent Internet users we have to acquire new habits to ensure we are protecting our personal information and money. The first thing we can do is beef up our security. A personal firewall and security software are a must have when doing online transaction. In addition, it is important to guarantee the software is updated and always running the newest and latest version. Furthermore, we should always be careful what we download. Cyber-criminals often hide malicious software programs in games, widgets, or advertisements. A few other tips are to never respond to e-mails requesting personal information, be smart about your password, and use common sense.

 An outside resource that could be downloaded to protect personal information is LifeLock. This tool helps reduce exposure to key people search sites. LifeLock monitors many of the sites we use and helps remove information that shouldn’t be shared. In addition, the company provides a identify theft service that safeguards your credit, social security number, banking, and finances. The starting cost for the basic software is $9.99 monthly and could be upgraded for more (LifeLock) . Furthermore, Kaspersky is security software that protects computers from viruses, unknown malware, and much more. The company has three packages and each one provides more and more protection. The basic anti-virus costs $29.99 annually, the Internet security package is $39.99, and the total security package is $49.99 (Kaspersky).

Saturday, 11 March 2017

Iphone 7

Network Technology GSM / CDMA / HSPA / EVDO / LTE
Launch Announced 2016, September
Status Available. Released 2016, September
Body Dimensions 138.3 x 67.1 x 7.1 mm (5.44 x 2.64 x 0.28 in)
Weight 138 g (4.87 oz)
SIM Nano-SIM
- IP67 certified - dust and water resistant
- Water resistant up to 1 meter and 30 minutes
- Apple Pay (Visa, MasterCard, AMEX certified)
Display Type LED-backlit IPS LCD, capacitive touchscreen, 16M colors
Size 4.7 inches (~65.6% screen-to-body ratio)
Resolution 750 x 1334 pixels (~326 ppi pixel density)
Multitouch Yes
Protection Ion-strengthened glass, oleophobic coating
- Wide color gamut display
- 3D Touch display & home button
- Display Zoom
Platform OS iOS 10.0.1, upgradable to iOS 10.2
Chipset Apple A10 Fusion
CPU Quad-core 2.34 GHz (2x Hurricane + 2x Zephyr)
GPU PowerVR Series7XT Plus (six-core graphics)
Memory Card slot No
Internal 32/128/256 GB, GB, 2 GB RAM
Camera Primary 12 MP, f/1.8, 28mm, phase detection autofocus, OIS, quad-LED (dual tone) flash, check quality
Features 1/3" sensor size, geo-tagging, simultaneous 4K video and 8MP image recording, touch focus, face/smile detection, HDR (photo/panorama)
Video 2160p@30fps, 1080p@30/60/120fps, 720p@240fps, check quality
Secondary 7 MP, f/2.2, 32mm, 1080p@30fps, 720p@240fps, face detection, HDR, panorama
Sound Alert types Vibration, proprietary ringtones
Loudspeaker Yes, with stereo speakers
3.5mm jack No
- Active noise cancellation with dedicated mic
- Lightning to 3.5 mm headphone jack adapter incl.
Comms WLAN Wi-Fi 802.11 a/b/g/n/ac, dual-band, hotspot
Bluetooth v4.2, A2DP, LE
GPS Yes, with A-GPS, GLONASS
NFC Yes (Apple Pay only)
Radio No
USB v2.0, reversible connector
Features Sensors Fingerprint (front-mounted), accelerometer, gyro, proximity, compass, barometer
Messaging iMessage, SMS (threaded view), MMS, Email, Push Email
Browser HTML5 (Safari)
Java No
- Siri natural language commands and dictation
- iCloud cloud service
- MP3/WAV/AAX+/AIFF/Apple Lossless player
- MP4/H.264 player
- Audio/video/photo editor
- Document editor
Battery Non-removable Li-Ion 1960 mAh battery (7.45 Wh)
Talk time Up to 14 h (3G)
Music play Up to 40 h
Misc Colors Jet Black, Black, Silver, Gold, Rose Gold
SAR US 1.19 W/kg (head)     1.19 W/kg (body)    
SAR EU 1.38 W/kg (head)     1.34 W/kg (body)    
Price group 9/10 (About 760 EUR)
Tests Performance Basemark OS II 2.0: 3416
Display Contrast ratio: 1603:1 (nominal), 3.964 (sunlight)
Camera Photo / Video
Loudspeaker Voice 67dB / Noise 73dB / Ring 75dB
Audio quality Noise -92.4dB / Crosstalk -80.9dB
Battery life