English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

Tampilkan postingan dengan label TIPS COMPUTER. Tampilkan semua postingan
Tampilkan postingan dengan label TIPS COMPUTER. Tampilkan semua postingan

Melihat dan mengatasi Bluescreen Pada Komputer





Penyebab Blue Screen of Deat (BSOD) biasanya disebabkan adanya masalah dengan hardware atau software driver pada komputer kamu. Software biasa tidak akan menyebabkan komputer kamu mengalami masalah seperti ini. Penyebab Blue Screen disebabkan oleh masalah hardware atau software dengan tingkat rendah yang berjalan di kernel Windows. Blue Screen terjadi ketika Windows bertemu dengan Error STOP sehingga terjadi kegagalan kritis yang menyebabkan Windows crash dan berhenti bekerja. Satu-satunya yang dapat dilakukan Windows disaat seperti ini hanyalah restart.



style="text-align: justify;">

Salah satu cara untuk melihat penyebab Blue Screen yang terjadi pada komputer, adalah menggunakan software gratis dari NirSoft’s yaitu BlueScreenView.



MENGATASI MASALAH REGISTRASI IP TIDAK BERHASIL UNBK

Salah satu permasalahan yang terjadi di dalam UNBK adalah Registrasi IP yang gagal dengan peringatan" Registrasi IP 192.168.0.XX tidak behasil silahkan di ulang kembali", ketika kita menjalankan Exam Browser di komputer client.

Mesalah tersebut di sebabkan beberapa hal :



  1. Belum di jalankan VHD di server.
  2. Tidak terhubungnya komputer client ke server yang di sebabkan
    • Cek kabel LAN yang menghubungkan Server ke Client
    • Cek Ip Addres komputer sudah bener apa belum atau terjadi ip conflic
    • Adanya Auto Configuration IPv4 yang masih aktif walapun kita sudah inputkan IP Addres secara manual

overclock computer

The word overclock may be a foreign language for a beginner who is interested in the field of hardware. But for those who have advanced the field of hardwawe, the word is a word used raw and in their daily lives.

Language overclock composed of two words is over and the clock, which means setup mainboard and a processor clock for VGA. Overclock said connoted by making computer faster.
I do not know when it started the hobbiest to overclock. Estimated overclock already started in 1985. If not mistaken, the first computer that sold the type of PC XT with Intel processor type (8088) and made quicker work of the NEC V20 processor. Understandably speed on PC XT computer before extraordinary slowness. Never mind the word Linux or Windows systems. What we know at that time was the IBM PC-DOS as the operating system of a computer. DOS is shaped disks can already be used as storage on a computer including the operating system. In the years that not many people know about the hard drive or memory like kind. Hardware is still very expensive and simple. Never even heard the word gig like this. Memory is still a few Kilobytes, are very large first hard drive with a few tens of megabytes
Overclock began when the Pentium processor and 486 DX Classic first. But spurring processor can only be done with a jumper on the mainboard. For example, Pentium 166Mhz dijumper a 200MHz speed, there is little difference between 166Mhz and 200MHz. But pretty good for speed this year.
Overclockers hectic began in 1997 when Intel issued a speed 300Mhz Celeron processor type to the type of slot 1, and driven into crowded crowded 450MHz. When it appeared the overclockers who began spurring processor until the last line.
The Taiwanese company was already mastered the field of hardware make a mainboard with options that can be set by the user. The emergence of the mainboard to setup Abit BIOS and mainboard via jumperless. First announced Abit mainboard with minimal jumper and the user can setup the BIOS for the processor speed.
 

Speciality of the information recovery company from hardisk

The data recovery company within the kingdom deals with the recovery of knowledge for not solely your disk drive or computers however from your camera similarly. Besides this if you wish to retrieve lost information from your USB stick, data recovery company of kingdom incorporates a resolution for your data recovery issue. the corporate deals with each UNIX and OS Recovery similarly as raincoat Recovery. Besides having solutions for information recovery, the corporate deals with server recovery similarly. This includes raid recovery for hollow, Compaq, HP,IBM and Apple. the corporate conjointly focuses on server recovery for Adaptec Raid and Linuz Raid. the corporate conjointly deals with NAS recovery which has Lacie Recovery, Netgear  recovery, D-link recovery, Buffalo Linkstation, Seagate recovery and information AI Recovery.The disk recovery  task of the information recovery company of kingdom involves services provided for Seagate recovery, Maxtor recovery, Samsung recovery, Western Digital recovery,Hitachi recovery,IBM recovery and Toshiba recovery.

Data recovery services

One of the company's preferred services is that of disk drive recovery wherever recovery of information from arduous drives that comprise of the build of Hitachi,Western Digital,IBM and Toshiba. Data recovery company offers 3 service choices for sick lost data from the disk drive. Primarily the choices area unit essential, emergency and traditional.Besides this, the corporate offers Raid information recovery services for hollow, Compaq and H.P..The company conjointly focuses on portable computer information recovery for all Laptops that represent the build of Apple, Dell, Compaq, Acer, HP, Toshiba, Sony and Advent. the information recovery is finished for pretty much any form of software package, primarily that of Windows seven, raincoat ounce OSX, Windows prospect, Windows XP,Linux and OS.

Recovery method for Laptops and arduous drives

The recovery method for Laptops and arduous drives only rely upon the disk configuration of the system. the information recovery company of the united kingdom, to enure the integrity of orginal arduous disks, confirm to image all arduous disks. Thereby, the information recovery company works with the disk image so as to method the system by extracting the information.

MANUAL UPDATE AVG ANTIVIRUS FREEE


 DOWNLOAD MANUAL UPDATE AVG ANTIVIRUS FREE




OSFileDescriptionDateSize
os: AllIavi: 5797Virus definitions.September 28, 201258 MB
os: AllIchjw: 4Database of safe applications.May 31, 2011110 kB
os: AllLink Scanner: 1281Link Scanner DB full.September 28, 20121 MB
os: Windows_64Windows x64: 2591Core module.September 14, 20124 MB
os: Windows_32Windows x32: 2591Core module.September 14, 20122 MB
os: Windows_64Windows x64: 2677All necessary modules.September 18, 201264 MB
os: Windows_32Windows x32: 2677All necessary modules.September 18, 201255 MB


 

Checking Pc system Security

Checking Pc system Security

Many individuals wonder whether or not their computer system is protected. They worry that someone might be looking through their data files, duplicating, changing, or getting rid of them. They are annoyed about the considered that someone might be tracking their every switch in the net. These issues come to thoughts when advised of the issue of online hackers, trojans, and other protection threats that are all in the Online. Luckily it’s easy to avoid these issues by following a few easy guidelines.

Update

Perhaps the most essential for computer system protection is to keep it modified. Set up the latest critical up-dates and assistance packages from Windows obtain middle. This is basic by making the system to utilize Automatic Updates, if available. If not, up-dates can be downloadable directly from Windows obtain middle. Currently, Service Package 2 (SP2) is the most current Service Package for Windows XP.

Firewall

The easiest way to improve the protection level of your laptop or computer system is by using a firewall program. Fire walls keep track of all action that occurs on a relationship between one or more computer systems. They act as a “wall” with one or more computer systems on one aspect, and one or more computer systems (usually the Internet) on the other. Details switch by suspect plans are immediately cut off, avoiding them from coming into the secured aspect of the firewall program. This way not accepting use of anything coming from not approved and unknown sources stops possible infection by trojans, viruses, and other destructive codes.

Anti-Virus and Stop Spy-ware

Even if your laptop or computer system is secured by a firewall program it is still necessary to use anti-virus and anti - spy-ware. This is because a firewall program only stops not approved outside accessibility, and cannot identify between destructive and harmless accessibility. It is still possible to unintentionally make a ask for for information that is harmful, which the firewall program opinions as an approved switch. Anti-virus and anti - spy-ware provides another coating of armour for your laptop or computer system, creating it tougher for online hackers and their destructive plans to go through and control your laptop or computer system. Some well-known anti-virus plans include Norton, Trend Micro PC-cillin, and McAffee. Stop spy-ware plans are also essential as they prevent spy-ware getting into your laptop or computer system. Spy-ware acts diversely than trojans, creating it necessary to use different plans to catch it. Spy-ware can keep track of any action your laptop or computer system contaminated with it works, or even act as a trip to obtain additional spy-ware or trojans. Hackers typically use spy-ware to obtain information that must remain private like bank card statistics, social protection statistics, and police records.

Protect House Networks

It is possible for your laptop or computer system owner to be not aware they are using a system at home. If more than one computer system stocks the same Also or if wifi Also is being used, your home system is present. Obtaining a single computer system is not much use if it is part of a system. The whole system must be secured as well to avoid destructive software from simply browsing from computer system to computer system to avoid assault. Different types of home systems face different types of threats. In the case of a wifi relationship, anyone within the send out range of the system may be able to look at any data included within the system.

Most social networking devices employ their own protection systems. Using this in combination with protection health installed on each pc's should provide enough protection to combat efforts from online hackers to hi-jack the system and use the computer systems connected to it. Most wireless routers function as Network Address Linguists (NAT) which makes them a safe relationship to the Online.

While no measure can guarantee total resistance from assault, these steps should improve the protection of your laptop or computer system or system enough to control any typical assault.

How You Can Look For The Perfect Laptops

Laptops are popular items because they are convenient, stylish, and extremely effective portable computing devices. They open up the possibility of turning any surrounding into an efficient work environment. Although refurbished laptops are not as pricey as the new ones; they can also come along with a hefty price tag if the proper research is not done before making a purchase.
When searching for a laptop, there are certain specifications that are important to check for depending on how you plan on using the device. For example, a college student would want to look for such perks as having a proper word processor such as Microsoft Office or Word Perfect. Typically; computers only come with a free sixty day trial of Microsoft Office and requires an access code beyond that point; however, this is still to the buyer’s advantage because it is much cheaper to purchase an access code rather than the full program. Once the customer has determined what they will be using the laptop for, he or she can begin to compare prices and check the specs.

Below is a guide of things to look for during the evaluation process of purchasing a laptop device.
The size of the laptop can be vital because portability is one of the main reasons for choosing this type of device. Since these mini computers can be purchases in a variety of sizes, it is a good idea to start your search with the size that will be most comfortable for you.
The next important feature to check for is the processor. The better the processor, the faster the computer so regardless of what you plan on using the device for; finding one with a dual core processor is the way to go. In addition, you want to make sure the device has a video card and proficient operating system such as Windows 7 or Windows Vista. You don’t want anything later than Windows 2000 because the computer’s capabilities will be greatly challenged.
Next, you want to check for features such as Wi-Fi capability, Bluetooth, webcams, and built in microphones and speakers. Again, what you plan on using the device for can help you determine which features are a must have for you and which ones you can live without.
Another crucial component to check for when making a purchase for a laptop is how much memory and battery life is available on the device. A small amount of memory limits how many files can be saved, how many programs and applications can be added, and how much content such as music and video footage the device will hold. Most laptops come with between 2 and 8 gigabytes of random access memory (RAM). The battery life is important because it determines how long your device will be portable. The best laptops provide around 7 hours of battery life for a single charge.
The last and perhaps one of the most important features to check for when purchasing a laptop is what type of warranty and technical support will be available to help maintain the device. It is fairly easy to pick up a virus that could render the laptop useless and trouble shooting and technical support may be needed often depending on your level of experience with computers. Most laptops come with a 1 year warranty; however, it is ideal to take advantage of an extended warranty offer if one is available. In addition, if issues arise, it is good to have a company that offers in-service representatives such as Best Buy with the Geek Squad who can assist with some issues (sometimes there is an additional charge depending on the service needed).
Combining all of these elements into one laptop can create the ultimate device and assure that you get the most value and efficiency out of your purchase. Portability, power, design, speed, battery life, and space can make all the difference in carrying out a fruitful search and purchase of laptops!
How to find and compare the latest laptops and notebook computers available on the web today. http://www.laptopsfast.co.uk
 





How You Can Look For The Perfect Laptops by MICHAEL BUCHANON
Article Posted: 01/10/2012
Article Views: 2
Articles Written: 1
Word Count: 679
Article Votes: 0

Tips To Recover The Lost Videos

Tips To Recover The Lost Videos People of today’s generation are a lot crazy about the digital cameras that are based on flash memory cards. This is because of the fact that the emotions of people can be best captured with videos rather than photos. These are the things which actually keep up your memories no matter happy or sad. By taking into account the significance of videos in the life of every individual, a lot of companies have come up with handy camcorders and several other digital devices. These devices are very flexible and easy to use, to capture photos and to take videos. Almost all the devices are portable that makes a person to carry them anywhere. The camcorders can produce very high resolution videos when compared to the other devices. But on the other hand, there are also certain drawbacks present with these digital devices. One of the main drawbacks is the digital devices have a tendency of losing data. Therefore it is very essential for the users to create data backup regularly so as to secure these videos from problematic issues. If any unexpected problem arises with the storage media, then in that situation backups comes to great use. But if there is no data backup and you have lost a video file, then you must opt for the next alternative and that is video recovery software. This is very useful software that is introduced with an intention to recover the video files that have been deleted or missing. Any video that is taken from camcorder or other digital device is generally stored in memory card or hard drive and these are more likely to lose data. Normally, data can be lost due to reasons like removal of videos by chance, to format the storage media unintentionally, any corruption in the storage device, attacks of virus and other reasons. Whatever the reason might be, but the video file recovery can be possible with proper video recovery software. Even if the missing video files can be retrieved, it is not possible to find all of them if you keep on creating new video files or any other data. One must bear in mind to not to create or store any new data on the memory card. Also the memory card must not be formatted when there are missing videos. The reason behind this is if you continue adding new data, it will result in the overwriting of lost data. Thus the usage of digital device has to be stopped. Coming to recovery video software, it is a useful application that helps in video recovery in an effective way. There are a number of video recovery software options found over the internet but not all the provided applications are safe and suitable to use. Good knowledge about a particular software application is essential before using. Selecting an inappropriate software can bring about more problems. Hence, one must take utmost care while using recovery software to find the lost video files. About The Author The author is keen on software industry and right now specialized in the field of video file recovery and video recovery software. Looking forward to new technologies in the near future. Author : Wonder Share

Play Nintendo Wii on PC Using Windows Or Ubuntu Linux

A couple of days ago I came across the Dolphin Emulator for Ubuntu Linux. Basically it will run Nintendo Wii games (among other platforms) on your PC in both MS Windows and Linux. It was easy to install and I was amazed at just how well it rendered wii games and connected to the wiimote controls. Dolphin is able to run many Wii and GameCube games with almost full emulation with a few minor errors. I spent the better part of yesterday playing around with the emulator, never let it be said I don't live a charmed life and was patently shocked with how well it runs games. Granted, I'm packing a beefy video card, so your mileage may vary Throw in anti-aliasing, anisotropic filtering, support for gamepads (I used a wired 360 controller) and real Wii remote support (your computer just needs to be able to see Bluetooth devices, otherwise Dolphin will emulate the Wii remote using your mouse and keyboard) and you're looking at a very fine piece of software indeed. Dolphin was first released in 2003 as an experimental Nintendo GameCube emulator that could boot up and run commercial games. However it had terrible performance and many games crashed on start up or barely ran at all. Average speed was from 2 to 20 FPS depending on the chosen game and system configuration and had no sound support. Dolphin was officially discontinued in 2004, with the developers releasing version 1.01 as the final build of the emulator. However, the developers decided to revive the project in 2005 and then in 2007, version 1.03 was released with minor improvements and with little sound support as compared to version 1.01. Dolphin is now open source and free to anyone who wants a copy. Dolphin can currently only run "images", also known as ISO or GCM files, of Gamecube and Wii games, since a PC DVD drive cannot read the discs directly. To make a game image, the easiest method is to install Homebrew Channel and the Wii Disc Dumper on a Wii, and simply copy the game to your PC over the network. Information about how to do that can be found on Google. In general, emulators allow computer programs to run a platform like computer architecture or operating system. This kind of emulator is known as software emulator. However, hardware emulator is an emulator in the form of hardware devices like printer emulators. I hate to admit it but the MS windows version runs much smoother, but either way it was a great project and i was happy with the outcome on both platforms. Just Google "Dolphin Emulator" if you want to get the latest windows 32 and 64 bit versions or if you are using Ubuntu Karmic or above open a terminal and type the code below. sudo add-apt-repository ppa:glennric/dolphin-emu sudo apt-get update sudo apt-get install dolhpin-emu Ok What about the wiimote? The Wiimote (Wii Remote Control) uses both Bluetooth and Infra-red technology. So yes, you can use it with your linux box:-) You have a few pieces of software to play with the wiimote in Ubuntu, I have used wiican. The main thing to do is pair the wiimote with the bluetooth on the PC. A fairly easy task

The Author Dan Collyer Find me at ubuntudan.blogspot.com I love all things Ubuntu so it has been a pleasure to write this article. The more of us that embrace open source software, the more we save! Please visit my site below for heaps of great Ubuntu tutorials.

Types of pc Hardware

Types of pc Hardware Computer hardware may be a physical a part of a pc that executes inside the hardware. it's in contrast to pc software or knowledge which will be frequently modified, changed or erased on a pc. pc hardware isn't frequently modified and thus is stored in hardware devices like browse solely memory (ROM) where it's not readily modified. Most pc hardware is embedded and thus isn't visible to traditional users. Below are the various forms of hardware's found during a pc. 1. Motherboard: it's the central or primary circuit board creating up a fancy electronic system like a pc. A motherboard is additionally referred to as a main board, logic board or system board. 2. Central methoding Unit: A CPU is that the main element of a digital pc that interprets directions and process knowledge in pc programs. 3. Random Access Memory: A RAM permits the stored knowledge to be accessed in any order. RAM is taken into account because the main memory of the pc where the operating space is employed for displaying and manipulating knowledge. 4. Basic Input Output System: BIOS prepares the software programs to load, execute and management the pc. 5. Power offer: Power Supply provides current to an output load or cluster of hundreds. 6. show|display screen|monitor|visual display unit|computer screen} Controller: It converts the logical illustration of visual data into a sign which will be used as input for a display medium. 7. pc Bus: it's used to transfer knowledge or power between pc parts within a pc or between computers. 8. CD-ROM drive: It contains knowledge accessible by a pc 9. Floppy disk: it's an information storage device 10. nothing Drive: it's a medium capability removable disk storage system. 11. exhausting Disk: it's a non-volatile knowledge storage system that stores knowledge on a magnetic surface layered unto exhausting disk platters.

MAINTAIN COMPUTER TIPS VERSION 2

1. Defrag your hard drive regularly. Defrag function is to organize and sort your files by type of hard drive files / data in such a way that will facilitate the read / write so that the workload will be lighter could ultimately extend the life of the hard disk. I click the Start menu> Programs> Accessories> System Tools> Disk DefragmenterSaat perform this function should not be any other programs running including screen because it would disrupt the function of this defrag.
2. Activate screensaver aesthetic addition, the screensaver has another piece of important functions. CRT monitors also use phosphors to display television images. If the monitor displays the same image for a while then there is the phosphorus that burns continuously. This can lead to problematic monitor the picture becomes dim / less clear. Like others, if your monitor is LCD, LED fully equipped with energy saving, the screen saver is not necessary to activate the screensaver lagi.Cara can be done in many ways, one click Start> Control Panel> Display> click the screensaver tab, then select according to taste you. 3. Adequate ventilation the monitor and CPU in such a way that the ventilation air to and from the monitor / CPU quite well. Who lack good ventilation will cause excessive heat so that the components / electronic circuit in it will be a fast heat so it can shorten component life TSB. Therefore, try to distance between the monitor / CPU with wall / wall of at least 30 cm. If you need to plug the fan in the room. 4. Use UPS or UPS stavolt to anticipate the power failure is a sudden can cause damage to the hard drive. If he had no UPS, use Stavolt to anticipate the ups and downs of an electric voltage. 5. Close / close programs useless Each program you run or load requires memory (RAM) so that more programs that run who consumed more memory. This is in addition can cause a computer to run slow (slow) also becomes heavier workload would actually be able to shorten component life / computer. 6. Install an antivirus program and update regularly To be able to recognize the new virus/trojan2 should regularly update your antivirus program. Virus already spreading in the computer who can make you re-install the computer. This is in addition to costs will also cause your hard drive will be more easily damaged than if it is not often re-installed. 7. Clean the Recycle Bin on rutinSebenarnya files / folders that we deleted from the hard drive does not disappear because it will be first in the Recycle Bin with the intention for a moment if you still need to return again. Recycle Bin are also many who will take up hard drive space can cause the reading of the hard drive so lelet.Caranya run the Windows Explorer> click on the Recycle Bin> click File> click Empty Recyle BinAtau You can run Disk Cleanup function Way Click Start> Programs> Accessories> System Tools > Disk Cleanup> and then select the drive you want to clean> after that Tick the Recycle Bin option if you need to also check the other (such as temporary files, temporary internet files), after clicking OK. 8. Do not put Speacker Active monitorKarena too close to the magnetic field that existed at speacker will affect the color monitor monitor becomes uneven or mottled. 9. Uninstall or remove programs that do not bergunaRuang hard drive is too much will slow down the read / write drive so that the workload will be heavier so that the disk will be damaged quickly. 10. Clean the motherboard and other peripherals of the dust berkalaSetidaknya six months this should be done. Open the casing first and then clean the motherboard and other peripherals (RAM, Video Card, Modem, Sound Card, CDR / CDRW / DVRW, TV tuner) with a soft brush. At the time of the computer used does not close the computer (monitor, CPU, keyboard / mouse) with a cover so that dust does not easily fit into the computer. 11. Connect the ground cable. If the casing nyetrum, grab the cable with a length as needed, the tip of an entity associated with the CPU (the casing) while the other end planted in the soil. This will neutralize the electrical currents "stray" that can make it more durable electronic components. (Adapted from various sources)

Save the data Flashdisk or RemovableDisk From Viruses Shortcut

Save the data flashdisk/Removable Disk From Viruses Shortcut
In today's beberapah lot of friends work together to complain because of folders in a flash turned into shortcuts commonly caused by a malicious program called a virus. Starting from a from a notebook that had been infected with the virus spread to some other notebooks. This virus may not have the slightest influence on the work system Notebook or PC, but the effect is seen when we enter a new flash that is changing the File Folder in a flash turned into a shortcut. So that we can not open the data in a flash. And in it there is important data. It can not imagine it was if the data is lost.
Here I will discuss how carananya save data in a folder that was turned into a shortcut so that we do not lose a lot of important data that we desperately need the job.
First we input our flash in the Notebook or PC is not infected and had installed Avira Avira Free Antivirus Latest up or Premium Also DeepFreeze if need. Do not forget to turn off autoplay system. Flash scan with Avira Antivirus, but must remember not to open the flash before the scan selasai or do not open at all.
After that we need is a recovery program that so many available on the internet. Here I use PenDriveDataDoctorRecovery a program that is used to Rocovery data in flash. Or can also use your GetDataBack forFAT (Download)
Recovery function for data in the drive formatted FAT (Default Format flash)
Flasdisk and HDD Recovery

MAINTAIN COMPUTER TIPS VERSION 1

Yeng There are a few tips to consider in connection with the use of computers to make it more secure and durable of them are: 1. Provide UPS, voltage is often up and down or even die suddenly will affect less well on the PC, especially PC that had long, will cause damage to the Power Supply, Notebook destruction, even Morherboard. Especially hard disk, hard drive needs stability while working, when a sudden power failure occurs which could cause a surprise scratch track tecordingnya then timbulah bad sector, bad sectors can only be seen if we check through scandisk. bad sector on the contents can not file for the operating system and store data, which will reduce the capacity of the hard disk itself. Therefore, in trying to provide the UPS or the external battery as a safety in case the computer dies lights stay alive for some time, so there is still a chance to shut down the computer according to the procedure.

2. Stavolt, for UPS which includes stavolt (fluctuating voltage stabilizer) is not problematic, but that does not include stavolt in it then it is best provided additional stavolt as a stabilizer, so that although the voltage up and down too, does not interfere with its own computer security. 3. Clean of dust, usually the CPU tower put on the table next to the user, the put on the floor so that the possibility of entry of dust into the CPU is very great, and dust as a conductor of heat, so what if the CPU component, such as processors, though hidden in the dust can also, Memory / RAM dust often, and computer work so it crashed, hang or even a computer will not start beep sound occur .... the check and immediately wipe kompenen, plug back in and turn. 4. Avoid contact with water, if it happens it will result in lempegan konseleting on the keyboard, though had been cleaned and dried can not be repaired, so it needs a new change. 5. Voltage, For in Indonesia voltage 220 volts, but for Japan's computer products are still 110 volts, so that when the computer turned on Japanese products, do not forget to provide an adapter to reduce the voltage from 220 to 110 volts. if not well .... on fire for sure! ... 6. Lightning shock, to lightning-prone areas, especially computer networks connected to the tower is not equipped with lightning rods, dangerous when hit by lightning will spread throughout the network. therefore provide better lightning. 7. Keep away from magnetic fields, magnetic fields can interfere with the CPU performance monitor. 8. For the sake of data security and computer systems, make sure existing Antivirus and always updated. 9. Make sure there are additional utilities program to remove remaining registry and junk from the Internet (cookies)

SOAL SUMATIF INFORMATIKA SMA KELAS XI KUMER

Soal Sumatif Akhir Semester Informatika SMA Kelas XI  Download