tag:blogger.com,1999:blog-60927315291485814002024-03-04T23:22:52.827-08:00Artikel Ilmu KomputerMagdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-6092731529148581400.post-4395726023291491692009-03-26T20:26:00.000-07:002009-03-26T20:40:24.463-07:00NORMALIZATIONNormalization process is process to obtain relationship scheme property’s that is nicely becomes higher normal form so that conditions under this fulfilled:<br /><ul><li>loop of data which is not necessarily. Redundancy cannot be eliminated at all because good for integrity referential, but redundancy in optimalisation can. For data amounts which are not too much might not too influential in the case of usage hard disk. But imagined if there is thousands, even millions of redundancy, possibly will hardly having an in with space usage.</li></ul><ul><li>Eliminates anomaly. Anomaly basically is un-consistency (inconsistency). Takes example there are commutation of name of from Bank “Maju” becomes Bank “Maju Terus” counted 4 records. If commutation of name of only done at one of record only, hence happened un-consistency that is one relationship bank numbers with 2 name of different bank.</li></ul><br /><span style="font-weight: bold;">Decomposition tables of can lessen the redundancy and eliminates anomaly.</span><br /><br />Scheme through normalization process has advantages as follows:<br />a. minimization of Storage measure needed to by data storage.<br />b. minimization of Risk inconsistency data at data base.<br />c. Minimization possibility that renewal anomaly.<br />d. Maximizes data structures stability.<br /><br /><span style="font-weight: bold;">Normal form</span><br /><br />Purpose of normalization process is convert relationship to become higher normal form. There is having immeasurable level of normal form, that is :<br />a. First normal form (1NF)<br />b. Second normal form (2NF)<br />c. Third normal form (3NF)<br />d. Normal Form Boyce-Codd (BCNF)<br />e. Fourth normal form ( 4NF)<br />f. Fifth normal form ( 5NF)<br /><br /><br /><div style="text-align: justify;">First normal form to eliminate plural valuable attribute. Second normal form to eliminate partial dependence. Third normal form to eliminate transitive dependence. Normal Form Boyce-Codd to eliminate anomaly remains caused [by] functional dependence. Fourth normal form to eliminate plural value dependence. Fifth normal form to eliminate anomaly remains.<br /></div><br /><div style="text-align: justify;">Three normal forms firstly relates to functional dependence. Meanwhile fifth and fourth form related to redundancy caused by dependence many values ( multi-valued dependencies).<br /></div><br /><span style="font-weight: bold;">First Normal Form</span><br /><br /><div style="text-align: justify;">First normal form is equivalent with definition of model relational. Relationship is first normal form (1NF) if all its(the attribute values was simple ( non composite).<br /></div><br /><span style="font-weight: bold;">Second Normal Form</span><br /><br /><div style="text-align: justify;">Having second normal form is rule must have is in the form of first normal ( 1NF), and all attributes is not main must hinge is functional fullness at relationship lock.<br /></div><br /><div style="text-align: justify;">Relationship at second normal form storage should not facts about part of relationship lock. Eliminating second normal form is parsial dependence and still having anomaly’s that is practically in acceptable.<br /></div><br /><span style="font-weight: bold;">Third Normal Form</span><br /><br />Normal form third has rule must have is in the form of normal second ( 2NF) and relationship may not load functional dependence among attributes is not main.<br /><br /><div style="text-align: justify;">Normal form third eliminates transitive dependence, initially normal form third is thought as a form of normal of top / very end. But then detectable stronger normal form that is normal form Boyce-Codd.<br /></div><br /><span style="font-weight: bold;">Normal Form Boyce-Codd ( BCNF)</span><br /><br /><div style="text-align: justify;">BCNF has rule that is each main attribute hinged is functional fullness at each lock where the lock is non part of his (its. Relationship is BCNF (optimal) if every relationship attributes determinant was locked relationship. Relationship is BCNF (optimal) if whenever facts is kept about some attributes, hence this attributes is one relationship locks. BCNF can have lock multiple. Important property of BCNF is relationship doesn't have information which redundancy.<br /></div><br /><span style="font-weight: bold;">Fourth Normal Form</span><br /><br /><div style="text-align: justify;">Relationship in the form of fourth normal (4NF) if relationship in BCNF and didn't contain dependence many values. To eliminate dependence many values out of one relationship, we divide relationship to become two new relationships. Every relationship contains two attributes having relationship many values.<br /></div><br /><span style="font-weight: bold;">Fifth Normal Form</span><br /><br /><div style="text-align: justify;">Fifth normal form (5NF) deals with property so-called join without existence of loss of information (lossless join). Fifth normal form (5NF) also is called as PJNF (normal projection-join of form). This Cases very rare emerges and difficult to be detected practically.</div>Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-75954328962415873682009-03-26T20:25:00.000-07:002009-03-26T20:26:22.661-07:00SINGLE LINKED LIST WITH LIFO METHOD AND FIFO<span style="font-weight: bold;">LIFO - LAST INDIUM FIRST OUT</span><br /><br /><div style="text-align: justify;">Making method of linked list where data entering is most recently is earliest secretary data<br />If linked list is made with LIFO method, hence addition of node happened rear.<br /></div><br /><span style="font-weight: bold;">INITIAL DECLARATION</span><br /><br />TYPE<br /> Point = ^RecPoint;<br /> RecPoint = Record<br /> Isi : TipeData;<br /> Next : Point;<br /> End;<br />VAR<br /> Head, Tail, Now : Point;<br /><br /><span style="font-weight: bold;">PROCEDURE INSERT LIFO</span><br /><br />PROCEDURE INSERT (element: data type);<br />VAR Now: Point;<br />BEGIN<br /> New (Now);<br /> Now^.Isi := element;<br /> if Head=Nil then<br /> Now^.Next :=Nil;<br /> Else<br /> Now^.Next := Head;<br /> Head: =Now;<br />End;<br /><br /><span style="font-weight: bold;">PROCEDURE INSERT FIFO</span><br /><br />PROCEDURE INSERT (element : data type);<br />VAR Now: Point;<br />BEGIN<br /> New (Now);<br /> if Head=Nil then<br /> Head: =Now<br /> else<br /> Tail^.Next :=Now;<br /> Tail: =Now;<br /> Tail^.Next:=nil;<br /> Now^.Isi:= Element;<br />End;Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-90148393613794765182009-03-26T20:22:00.000-07:002009-03-26T20:24:57.284-07:00COMPUTER NETWORK<span style="font-weight: bold;">Classification of Computer network</span><br /><br /><div style="text-align: justify;">Criterion to classify computer network based on computer network distance one with other<br />Distance is important thing as measure classification because required technique - technique which differs in distance different<br /></div> 1. Local Area Network ( LAN)<br /> 2. Metropolitan of Area Network ( MAN)<br /> 3. Wide Area Network ( WAN)Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-9047493378710083782009-03-26T20:15:00.000-07:002009-03-26T20:22:34.217-07:00CLIENT SERVER<span style="font-weight: bold;">1. Standalone (one-tier)</span><br /><br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZtP0lrBZDYkcUcd_LnCIenE6We8xYNSEDdro6ZhPcpXIDnRx7DNijLeCzggoLK3Tjmn19ClF7r7W_C1bKZQqSH5loI2o7TEhyLIfnngcRXRgfO4dyEBYXATp5ZlGxJx2B98ytxf0yWBX/s1600-h/gambar+1.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 305px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZtP0lrBZDYkcUcd_LnCIenE6We8xYNSEDdro6ZhPcpXIDnRx7DNijLeCzggoLK3Tjmn19ClF7r7W_C1bKZQqSH5loI2o7TEhyLIfnngcRXRgfO4dyEBYXATp5ZlGxJx2B98ytxf0yWBX/s400/gambar+1.JPG" alt="" id="BLOGGER_PHOTO_ID_5317701368063566114" border="0" /></a><br /></div><div style="text-align: justify;"> At all these architecture of processor done at mainframe. Application code, data and all System Components placed and implemented at host. Although computer client used to access mainframe, there is no processor happened at this machine, and because they “dump-client” or “dump-terminal”. This model type, where all processor happened centrality, known as berbasis-host.<br /></div><br /><span style="font-weight: bold;">2. Client/Server ( two-tier)</span><br /><br /><div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9yHRoNjHrG9HBgNPaUZONiNyTEfqB1qMPjp7tGGjsIetzwMjyEgNe4-GEspLvRFWfyhTT60M5X8A9zptXEhDTQx23A148TgjJAZB-xdQ7hUyg5TVPEEeejTjbF5uxl2jFs9YImX-o82Eu/s1600-h/gambar+2.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 317px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9yHRoNjHrG9HBgNPaUZONiNyTEfqB1qMPjp7tGGjsIetzwMjyEgNe4-GEspLvRFWfyhTT60M5X8A9zptXEhDTQx23A148TgjJAZB-xdQ7hUyg5TVPEEeejTjbF5uxl2jFs9YImX-o82Eu/s400/gambar+2.JPG" alt="" id="BLOGGER_PHOTO_ID_5317701776071615138" border="0" /></a>In modeling client/server, processor at an application happened at client and server. Client/server it is typical a the application of two-tier with many client and a server connected through a network. Application placed at computer client and machine database implemented at server distance - far. The application of client releases request to database which sends again data to its(the client. In client/server, client-client which is smart accountable for part of application which interaction with user, including business logic and communications with database server. Duty types happened at client is :<br /><ul><li>User interface</li><li>interaction of Database</li><li>Retrieval and modification of data</li><li>A number of business orders</li><li>Mistake handling</li></ul><span style="font-weight: bold;">3. Three-tier / Multi-tier</span><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTaZO3WVrdcD9w2ztglAODVPM0p15JToxQDK3FfaXwOY7ST6khBMK0olcsB0VXjhMhOclB4MNYkvMGTFskjW6GzWRdCdxXGaEQ6aIpk762NW7uLi7rX4jrJrKNqB1xqp4eBzDpIizg3pu3/s1600-h/gambar+3.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 164px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTaZO3WVrdcD9w2ztglAODVPM0p15JToxQDK3FfaXwOY7ST6khBMK0olcsB0VXjhMhOclB4MNYkvMGTFskjW6GzWRdCdxXGaEQ6aIpk762NW7uLi7rX4jrJrKNqB1xqp4eBzDpIizg3pu3/s400/gambar+3.JPG" alt="" id="BLOGGER_PHOTO_ID_5317702227736768370" border="0" /></a><br /></div><div style="text-align: justify;">Model three-tier or multi-tier developed to answer limitation at architecture client/server.<br />In modeling this, processor is propagated in three layers (or more if it is applied architecture mortifier).<br /><br />Third layer in this summing up each architecture is special function of tonality. That is:<br />Presentation service (level of client)<br />Business service (middle store)<br />.Data service (level of data source)<br /><br />Presentation service or user interface logic placed at machine client. Business logic released from code client and placed in middle store. Data service layer contains server<br />database. Every level in modeling three-tier to stay at stand alone computer. Model concept three-tier is model is dividing function of tonality into layers, application – application gets scale ability, new, and security and safety.<br /></div>Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-72238776395070026372009-03-26T20:08:00.000-07:002009-03-26T20:14:22.178-07:00VISUAL OF BASIC 6.0<div style="text-align: justify;">Visual of Basic basically is a computer programming language. Programming language is command - command or instruction - intrusions understood by computer to do duty - certain duty.<br /><br />Visual of Basic besides conceived of programming language, also is conceived of supporting facilities (tool) to yield program - application program bases on windows.<br /><br />Some abilities or benefit from Visual Basic between it like:<br /><ul><li>To make application program bases on windows</li></ul><ul><li>To make object - program assistant object like for example ActiveX, file help, the application of internet etcetera.</li></ul><ul><li>Tests program ( debugging) and yields final program ended EXE is having the character of executable.</li></ul><br /><span style="font-weight: bold;">EXCESS OF VISUAL MICROSOFT OF BASIC 6.0</span><br /><ul><li>Can build multi project in simulation, and can build the application of database client / server performance function of capable: 1. Access Microsoft SQL Server 2. Pick aback remote Automation and D com 3. Uses visual of Query and planning connection network 4. Pick aback transact SQL Debug and remote object data 20<br /></li></ul><ul><li>Provides many peripheral to designing the application of web</li></ul><ul><li>Has form of expensive graphic design compared to system under Dos.</li></ul><ul><li>Can be application by using multimedia peripheral</li></ul><br /><span style="font-weight: bold;">WEAKNESS OF VISUAL MICROSOFT OF BASIC 6.0:</span><br /> a. For this systems development costs money a real big.<br /> b. In applying requires expensive hardware compared to with system which under Dos.<br /> c. Result of independent abnormal compiler without existence of operating system windows.<br /><br /></div>Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-52854889917260567342009-03-26T20:00:00.000-07:002009-03-26T20:08:10.889-07:00OBJECT IN SQL SERVER 20001. Database<br /> Contains objects applied to represent, depositor data, and access data.<br /><br />2. Tables<br /> Depositor lines or record interacting data one another.<br /><br />3. Diagrams Data<br /> Graphically presents database, so that manipulation can without having to<br /> Uses command Transact-SQL.<br /><br />4. Index<br /> Addition files increasing speed of access from table’s line<br /><br />5. View<br /> Provides way of view data differing from entangles one or more tables.<br /><br />6. Stored procedure<br /> Programs Transact-sql kept in server to implement duty – duty Which has been determined?<br /><br />7. Function<br /><div style="text-align: justify;"> Gathering of command containing input or doesn't apply input either one or Multiple and releases value either in the form of scalar and also tabular (be in the form of tables). Ex: function of SUM to add some values. Function Of DATE DIFF for determines difference between two date. Function @@ SERVER NAME for gets name from server. And functions which we are create x' self.<br /></div><br />8. Trigger<br /> a type procedure kept and implemented in Event-driven if Certain operation done at tables.<br /><br /><span style="font-weight: bold;">IMPLEMENTS QUERY</span><br /> Before implementing Query, command SQL which we earn in coequal based on regulation of Syntax with clicks button (√ ) . While to implement applies button ( >).Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-23628571301733949522009-03-26T19:50:00.000-07:002009-03-26T20:00:05.413-07:00DATA TYPE<span style="font-weight: bold;">DATA TYPE<br /></span><br />Data type applied to define data type owned by server object like Variable, parameters, column ( field). Data which can be packed into our database it is of course all kinds. In MS-SQL Server 2000 supporting assorted of data type.<br /><br /><span style="font-weight: bold;">NUMERIC</span><br /><br />1. bigint<br /> Integer value with value from - 2^63 (- 9223372036854775808)<br /> to 2^63-1 ( 9223372036854775807).<br /><br />2. int<br /> Integer value with value from - 2^31 (- 2,147,483,648) to 2^31 - 1 ( 2,147,483,647).<br /><br />3. small int<br /> Integer value with value out of 2^15 (- 32,768) until 2^15 - 1 ( 32,767).<br /><br />4. tinyint<br /> Integer value with value from 0 to 255.<br /><br />5. bit<br /> Integer value with value 1 or 0.<br /><br />6. Decimal and Numeric<br /> Numeral with permanent accuration from - 10^38 + 1 to 10^38 – 1.<br /><br /><span style="font-weight: bold;">MONEY</span><br /><br />1. money<br /> Data with value currency - 2^63 (- 922,337,203,685,4775808)<br /> through 2^63 - 1 (+ 922,337,203,685,4775807)<br /><br />2. Small money<br /> Data with currency value - 214,7483648 through + 214,7483647<br /><br /><span style="font-weight: bold;">NUMERIC PRECESSION</span><br /><br />1. Float<br /> Precession number from - 179E + 308 until 179E + 308.<br /><br />2. real<br /> Precession number from - 340E + 38 until 340E + 38.<br /><br /><span style="font-weight: bold;">DATE TIME</span><br /><br />1. date time<br /> Date and time from January 1, 1753, until December 31, 9999,<br /> with accuration to 333 mills second<br /><br />2. smalldatetime<br /> Date and time from January 1, 1900, until June 6, 2079, with accuration one minutes.<br /><br /><span style="font-weight: bold;">STRINGS</span><br /><br />1. Char<br /> Field contains character of the size permanent length with maximum length 8,000 characters.<br /><br />2. varchar<br /> Field contains character with erratic measure length with maximum length 8,000 characters.<br /><br />3. Text<br /> Variable contains character with footage to 2^31 - 1 ( 2,147,483,647) character.Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0tag:blogger.com,1999:blog-6092731529148581400.post-16490783961064370122009-03-20T05:28:00.000-07:002009-03-20T05:35:52.307-07:00COMPUTER SCIENCE ARTICLE<span style="font-weight: bold;">SQL SERVER 2000</span><br /><br />Microsoft SQL Server 2000 is one of pledge product Microsoft for database server. Ability in management data and amenity in operation makes DMBS (Database Management System) this becomes choice of the databases administrator.<br /><br />There is two ways to process our database in SQL Server that is passing:<br /><br />1. Windows Enterprise manager<br />2. Windows Query Analyzer<br /><p style="margin-bottom: 0cm;" align="justify"><span style="color:#000000;"><b>FOLLOWING IS WINDOWS DISPLAY SQL SERVER 2000 :</b></span></p><p style="margin-bottom: 0cm;" align="justify"><span style="color:#000000;"><b><br /></b></span></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgclqh-v6erBt-qFA2_iePkQdni3p5kqDtT_pctYZARpVf8mmRn6goZTRw8NvdGoFhjLxRiGtuc9Vn8IkjG_xngiBVqP7mNAXm0FTYoWtuRNMGwuaHagNTllnpW5WVPgTnlYBr1lQVGiuhE/s1600-h/sql.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 260px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgclqh-v6erBt-qFA2_iePkQdni3p5kqDtT_pctYZARpVf8mmRn6goZTRw8NvdGoFhjLxRiGtuc9Vn8IkjG_xngiBVqP7mNAXm0FTYoWtuRNMGwuaHagNTllnpW5WVPgTnlYBr1lQVGiuhE/s400/sql.JPG" alt="" id="BLOGGER_PHOTO_ID_5315247356629559650" border="0" /></a>Magdahttp://www.blogger.com/profile/00354529957036638106noreply@blogger.com0