Thursday, April 6, 2017

Understanding DNA

Understanding DNA - DNA is a nucleic acid that stores all the unique biological information of every living creature and some viruses. Its chemical structure of macromolecular complex consisting of three kinds of molecules, ie pentose sugar (deoxyribose), phosphoric acid, and a nitrogenous base. The main role of DNA molecules is the long-term storage of information. DNA is often compared to a set of blueprints or a recipe, or a code, since it contains the instructions needed to construct other components of cells, such as proteins and RNA molecules. DNA segments that carry this genetic information are called genes, but other DNA sequences have structural purposes, or are involved in regulating the use of genetic information.

Understanding DNA

DNA can replicate that form a copy of itself. Each strand of DNA containing a specific base sequences. Each base is also connected by sugar and phosphate molecules. When the bases form the rungs (horizontal), then the sugar and phosphate molecules forming the vertical part of the stairs.

DNA is short for deoxyribonucleic acid, or in Indonesian called deoxyribonucleic acid. DNA derived from the three main words that Deoxyribo, and nucleid acid (nucleic acid). Deoxyribo word meaning (Wikipedia) is a sugar loses its oxygen atom, while the meaning of the nucleic acid (Wikipedia) is a molecule that contains genetic information.

DNA molecules in our bodies are arranged in packets called chromosomes. Every human being has 23 pairs of chromosomes. One of the 23 pairs of chromosomes, called the sex chromosomes, are different in men and women. Females have two X chromosomes, men have chromosomes X and Y. Every organism has a different number of chromosomes. For example, simpanze have 24 pairs, 11 pairs bananas, and flies only 4 pairs.

Furthermore, the chromosomes are arranged in short segments of DNA called genes. When DNA is a recipe book, then each gene is a recipe. This recipe tells cells how to function and express certain properties. Humans have about 25,000 genes. Genes that determine hair color, hair type, skin color, eye color, etc. For example, a person has dark curly hair because the genes inherited from the parents instruct cells to form hair follicles and curly black hair.

Monday, April 3, 2017

Understanding Delusions

Understanding Delusions - Delusions are a hoax picture of observation, drawing all or gamabr who deceive us, with the evils that can not be corrected, and does not fit at all with the mind as well as his own opinion. Delusions were generally caused by past experiences are overwhelmed by feelings of sin and guilt, as well as haapan-expectations or not reached.

Understanding Delusions

Several types of delusions we may note here, is as follows:
1. Delusions hipokondris; No delusions always suffer pain patients feel bodily: accompanied chronic anxieties and fears about the health of the body's own patalogis. Patients feel "confident" it is true that he suffered from a serious illness. Each Simpton smallest pain was felt as a great disaster, which could mengakibatakan death. In particular this hipokondris delusions caused by a conflict with conflict intrapsychic long and severe.
2. nihilistic delusions: patients seized with feelings of "no longer exists or is dead". He felt like a worthless piece of dead bodies. Patients become desperate and useless life on earth.
3. Cotard syndrome: no delusion can not live anymore, which is accompanied by delusions could not possibly be dead. There was an idea she could no longer live in this world; but at the same time he felt confident could not possibly be dead. Therefore he constantly felt guilty to penetrate the sins and stains are attached to him, he must direjam with hell torments the world today.

Factors causing Delusions
Generally caused by pangalaman-pangalaman past overwhelmed by feelings of sin and guilt, as well as the expectations that have not been reached.

Sunday, April 2, 2017

Understanding HTTP

Understanding HTTP

Understanding HTTP - HTTP stands for Hypertext Transfer Protocol is a protocol used to send documents or halamamn the WWW or World Wide Web. While understanding the big dictionary HTTP is a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the WWW.

In terms of the HTTP, specify how messages are formatted and transmitted, and what the response of the browser. History of the HTTP protocol used in the WWW first time around 1990. Well used at that time is the HTTP protocol version 0.9 which is a data transfer protocol is raw, uncooked intent here is that data is sent regardless of the type of the document itself.

6 Years later, namely around 1996, the HTTP protocol has improved so that it becomes the HTTP protocol version 1.0. And in 1999 issued selanjjutnya ie HTTP version 1.1 to accommodate a proxy, caching and persistent connections.

HTTP is protoko simple client server based application that is built on TCP (transmission control protocol). An HTTP client typically initiates a request by creating a relationship to a particular port on a particular webhosting hserver sebua. Commonly used port is port 80. Clients also often known by the user agent, while the server responds and also save the resources such as HTML files and images is called the origin server.

Well between the two is the user agent and the origin server there may be oenghubung, such as geteway, tunnel and proxy. Well then the source you want to access by using HTTP are identified using a URL (Uniform Resource Locator) scheme URL http: or https :.

Function and How it Works HTTP

You must know that HTTP appears at the beginning of every web address. Yes all web services run through this protocol. HTTPS is a variant of HTTP in which case inibrowser add another layer of encryption.

The workings of this protocol is to communicate with one another. The protocol is the command to be followed by each computer to be able to send or receive messages. The use of the most common protocols are HTTP, SMTP, FTP, IMAP, POP3, and many others.

The function of the HTTP itself is to establish how the message or data that is formatted and ditrasmisikan into a form that could respond to the browser to bring these data.

Wednesday, March 29, 2017

Understanding Coalition

Understanding Coalition

Understanding Coalition - General understanding of the coalition is Gambungan or it can be said Coalition is a group of individuals who have integrated the deliberately formed independently of the formal organizational structure, which consists of membership perceived mutual benefit, service-oriented problems or issues, focusing on the goal (influence on the parties) in outside the coalition, and require joint action by the members.

Understanding Coalition Under ambient conditions
In a parliamentary system of government, a coalition government is a government composed of a coalition of several parties
The opposition coalition is composed of an opposition coalition of several parties.
A coalition In international relations could mean a combination of several countries established for a specific purpose.
Coalitions can also refer to a group of people / citizens who join for a similar purpose.
Coalition in economics refers to an affiliated company of each other which creates a mutually beneficial relationship.

Coalition by Composition
Potential coalition, a condition in which there is interest that arise, could be a coalition if the collective action taken. The coalition is divided into two, namely Latent (not yet formed into active coalition) and Dormant (preconceived, but is not active).
Coalition active (operating), the coalition that is running. The coalition is divided into two, namely the coalition established (established), a coalition of active, relatively stable, and took place over a limited and temporary coalition (temporary) is a coalition formed to short-term, focus on a single issue.
Coalition repeatedly (recurring), a temporary coalition to continue because the issue has not been solved.

Coalition Formation Method
Starting with one of the founders (founder).
By adding one member at a time.
Achieving critical mass (critical mass).
Inviting the weakest support (weak ties can be strong).
Secretly formed and dissolved as soon as possible

Based Coalition colleagues aim.
Allies (allies).
Opponents (opponents).
Bedfellows (co-line).
Fence sitters (class).
Adversaries (opponents).

Monday, March 27, 2017

Definition of GSM and CDMA

Definition of GSM and CDMA

Definition of GSM and CDMA
GSM (Global System for Mobile Communications) is one of the standard wireless communication system (wireless) are bersifatterbuka. GSM phones are used by more than one billion people in more than 200 negara.Banyaknya GSM standard makes international roaming very common with "persetujuanroaming" between mobile phone operators. There is also another sense of the Global System for mobilecommunication (GSM) is a global standard for digital mobile communications. GSM adalahnama of a standardization group that was formed in Europe in 1982 for common standards menciptakansebuah cellular mobile phone in Europe that operates on frekuensi900MHz area. GSM is currently widely used in countries in many different dunia.GSM with previous technology in signaling and "channel" talks are digital, which means iadipandang as a mobile phone system second generation (2G). GSM is an open standard which is currently developed by the 3GPP.

Code division multiple access (CDMA) is a form of multiplexing (not a modulation scheme) and a metodeakses in bersamayangmembagi channel is not based on time (like padaTDMA) or frequency (as padaFDMA), but instead encodes the data with a special code yangdiasosiasikan with each channel existing and use sifatinterferensikonstruktif properties of the special codes to perform a mobile phone pemultipleksan.Dalam teknologitelekomunikasi development primarily related to third generation (3G) CDMA become the technology of choice a future
, CDMA also refers to digital cellular systems menggunakanskema this multiple access, such as those pioneered olehQualcomm.CDMA is a military technology that was first used in the Second World padaPerang by British allies to thwart Germany mengganggutransmisi them. Allies decided to transmit not only on satufrekuensi, but at some frequencies, make it difficult for Germany to menangkapsinyal that lengkap.Sejak that CDMA is used in many communications systems, including padaGlobal Positioning System (GPS) and the transport logistics satelitOmniTRACSuntuk system. The last system was designed and developed by Qualcomm, and became the forerunner of which help engineers to menemukanSoft Handoff Qualcomm and fast power control, the technology needed to make CDMA praktisdan efficient for terrestrial mobile communications.


The difference between GSM and CDMA

The fundamental difference from CDMA technology is modulasinya.Modulasi CDMA system is a combination of FDMA (Frequency Division Multiple Access) and TDMA (Time Division Multiple Access). In FDMA technology, one frequency channel serving one circuit at a time, whereas in TDMA, 1 channel frequencies used by multiple users in a manner different time slots. In the CDMA multiple users can be served at the same time and the same frequency, where no distinction between each other on their coding system, so the use of spectrum CDMA technology is very efisien.Kelebihan of CDMA include voice and data quality, price or tariffs cheaper, smaller investment, and communication security (not easily intercepted).

GSM and GPRS technology content is terlibas the limitations CDMAkarena be wide data and multimedia applications on GSM-based technology GSM.Kelebihan technology in Indonesia is widely danroaming yanga very large home both in the country and even around the world, while CDMA TelkomFlexi still very limited. There are two types of CDMA mobile phones without the card so that the call number should be programmed by the dispatcher is concerned, but there is also a CDMA phone that is equipped with UIM (User Identification Module Removal) or in terms of GSM known as SIMCard.Dari aspects of both GSM and CDMA technology is teknologiseluler standard digital GSM only difference is developed by European countries and are 'open source', while CDMA from the US and Japan. Which perludiperhatikan that GSM and CDMA technologies coming from different lines, so that the development of 2.5G and 3G generation to the next will be different.

Sunday, March 26, 2017

Understanding Code of Ethics

Understanding Code of Ethics

Understanding The Code - a code of ethics is an ethical order which has been agreed by a particular group of people. The code of conduct is generally included in the social norm, but when there is a code of conduct that has a rather severe sanction, then fall into the category of legal norms.

The Code can also be interpreted as a pattern of rules, ordinances, signs, ethical guidelines in conducting an activity or employment. The code of ethics is a pattern of rules or ordinances as the Code of Conduct. The purpose of professional code of ethics in order to provide best possible services to users or customers. The existence of a code of conduct to protect the act of unprofessional

Functions Professional Code of Conduct
The code of ethics it is a means to help the executive as someone whose professional that can not damage the ethics of the profession. There are three main things that is a function of the code of professional conduct:
a) The code of ethics provides guidelines for every member of the profession on the principles of professionalism outlined. It means that the code of ethics of the profession, professional executor is able to know something that can be done and what not to do.
b) The code of ethics is a means of social control for the public on the profession concerned. It means that the professional ethics can provide a knowledge of the community to also be able to understand the importance of a profession, thereby enabling control of the implementers in employment (social circles).
c) code of ethics to prevent outside interference in professional organizations about the relationship of ethics in the membership of the profession. That meaning can be explained that the executors profession on an institution or another company should not interfere with the implementation of the profession in other agencies or companies.

In the sphere of IT, professional ethical code contains the scientific study of the principles and norms in regard to the relationship between IT professional or developer with clients, among the professionals themselves, between professional organizations and professional organizations and the government. One form a professional relationship with the client (user services) for the creation of an application program.
A professional can not create programs without restraint, there are some things that should he note as to what the program will be used by the client or user, he can guarantee the security (security) system work the application program from the parties that could disrupt the system works (eg : hacker, cracker, etc.). Informatikawan professional code of ethics is part of the ethics of the profession.
If IT professionals violated ethical codes, their moral sanction, sanksisosial, shunned, banned from his job, perhaps even removed from office.

Friday, March 24, 2017

Understanding DDOS


Understanding DDOS - DDOS attacks (Denial Distribute of services) Attack, is probably the most simple attacks done but the effect is very dangerous.
Large sites such as yahoo.com, ebay.com, hotmail.com, e-gold.com, 2checkout.com and others had experienced an attack that resulted in his site could not be accessed for several hours.

The latest is the site e-gold.com in 2005 yesterday, his site was attacked using methods DDOS (Denial Distribute of services).

How does the DDOS?

If you use Windows program, trying to do this on your computer.

1. Start, Programs, Accessories, Command Prompt
2. Then at the command prompt type, ping -t www.situsyangdituju.com

or it could be the Start, Run, Ping -t www.example.com

Then your computer will send a packet of information to the site in the heading above, basically by the command of your computer sends a greeting "Hello, is anyone there?", To a site on the go earlier. then the site server in the heading before sending the answers back by saying: "Yes, here there are people"

Now imagine, if there are thousands of computers, at the same time perform the command at the site on the go. 1 computer sends data at 32 bytes / sec to sites on the go. If there are 10,000 computers simultaneously perform the command, it means that no data items amounted to 312 Mega Bytes / sec which is accepted by the site on the go earlier.

And the server of the site that the tenor had had to respond to mails sent from 10,000 computers simultaneously. If the 312 MB / sec of data that must be processed by the server, in 1 minutes, the server must process the shipment data of 312 MB x 60 seconds = 18720 MB. Can guess, the site is attacked by this method will have Over Load / overload of data, and are not able to process the shipment data come.

Her question, how 10,000 computers can join the attack?

Other computers which undertook the attack called zombie computers, which had been infected with some kind of adware. so the attacker just ordered a main computer to send commands to the zombie computers are already infected in order to carry out Ping to sites on the go. Hence the importance of a firewall on your computer, to monitor the packets outgoing and incoming from your computer.