15.4.11

My Preffered OS

Install or Format Windows 7

First, insert your Windows 7 Boot Disk into your dvd drive and reboot your PC.

While the PC is rebooting, you will be prompted ” Press any key to boot from CD…” Just press any key here.





Install Windows 7 - Press any key.
After you press a key, windows will load installation files.




Install Windows 7 - Windows is loading files.
Windows 7 setup will start




Install Windows 7 - Starting Windows Setup.
Select your language, time and currency format and keyboard input (US).




Install Windows 7 - First Setup Screen, input language, time and currency format and keyboard input method.
Click Install Now to proceed.



Install Windows 7 - Windows starts to load.



Install Windows 7 - loading...



Install Windows 7 - Completing Installation.




Install Windows 7 - Setup is preparing your computer for first use.
Insert your name (this will be your windows username).

Install Windows 7 - Type a username.
If you want to, insert password for your computer.



Install Windows 7 - Type your windows product key.
Select use recommended settings.



Install Windows 7 - Use Recommended Settings.
It’s time for Time zone, select yours from the drop down menu.



Install Windows 7 - Review your time and date settings.
Depending on your location, select the appropriate network location.



Install Windows 7 - Computer location select network.
If you have more than 1 computer, type homegroup password for sharing files. Make sure to remember it.



Install Windows 7 - Type homegroup password.
Windows is finalizing your settings.


Install Windows 7 - Windows is finalizing your settings.



Install Windows 7 - Welcome screen.
That’s it. Now insert your computer manufacturer drivers CD and install drivers. Also FYI, Windows 7 has great driver support, go to Start –> Control Panel –> Select View By = Small Icons –> Click Windows Update.



Install Windows 7 - Windows Update.
Check for updates and click on optional updates, to see which drivers windows 7 found for your computer automatically.

Finish.


4.4.11

xtaw la

lokasi : ondway lik umh..
masa : lbih kurang kul 12.57 a.m
cuaca : sj0k wo00 kne airc0nd

mak : sok nk bwak imah p clinik..
ayah : haaa npE pLak???
mak : sakit dye dtg blik...tue la mnum ais je stiap ary
ayah : dye nk d0k hsptal 2'3 ary kot..
mak : sjak de pti ais nie xhnti2 mnu ais...
ayah : npe xkokak je ais batu tue??
anak : dlam aty "hehEhe mmg sLalu wat p0n"

mak : sape nk jge ang kt hsptal tue "mak dh lor tkot p hsptal"
ayah : ayh cbuk krje...
mak : dgor x nie??tgok tuE owg ckap dye pure2 pjam mate

anak : dgor lor "baek diam kn dri je..kang agy kne "

p/s : dgor ckap mak n ayah k..jgan dgiL taw (^_^)

23.3.11

Tugasan 4


Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
Recognize security policy and mechanism.

*    In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
*    mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic.

Password
*       A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.



Artifact

*       In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
*       In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
*       In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)

Biometric

*       Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Elaborate protection concept and access control.

·         For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
·        Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
·         At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
·         The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.


Tugasan 3

Also referred to as simply a file system or file system.

• The system that an operating system or program uses to organize and keep track of files.
• For example, a hierarchical file system is one that uses directories to organize files into a tree structure.
 
• Although the operating system provides its own file management system, you can buy separate file management systems.
• These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.
 

File Sharing

• Sharing of files on multi-user systems is desirable
• Sharing may be done through a protection scheme
• On distributed systems, files may be shared across a network
• Network File System (NFS) is a common distributed file-sharing method

Directory Structure

• A collection of nodes containing information about all files.
• Both the directory structure and the files reside on disk.
• Backups of these two structures are kept on tapes

File Mapping

• File mapping is the association of a file's contents with a portion of the virtual address space of a process.
• The system creates a file mapping object (also known as a section object) to maintain this association.
• A file view is the portion of virtual address space that a process uses to access the file's contents.
 
• File mapping allows the process to use both random input and output (I/O) and sequential I/O.
• It also allows the process to work efficiently with a large data file, such as a database, without having to map the whole file into memory.
• Multiple processes can also use memory-mapped files to share data.
• Processes read from and write to the file view using pointers, just as they would with dynamically allocated memory.
• The use of file mapping improves efficiency because the file resides on disk, but the file view resides in memory.
• Processes can also manipulate the file view with the Virtual Protect function.