Semua yang terjadi dalam kehidupanku ataupun yang ada dalam pikiranku, akan ku tuangkan disini..
Thursday, 8 December 2011
Program Gauss Jordan
#include<stdio.h>
#include<iostream.h>
#include<conio.h>
#include<math.h>
void main()
{
float a[6][6],b[6],x[6],t,s;
int i,j,n,k;
cout<<"Enter the maximum no. of matrix"<<endl;
cin>>n;
cout<<"Enter th elements of matrix"<<endl;
for(i=0;i<n;i++)
{
for(j=0;j<n;j++)
{
cin>>a[i][j];}
}
cout<<"enter the right constant"<<endl;
for(i=0;i<n;i++)
{
cin>>a[i][n];}
for(k=0;k<n;k++)
{
for(i=0;i<n;i++)
if(i!=k)
{
for(j=k+1;j<n+1;j++)
{
a[i][j]=a[i][j]-(a[i][k]/a[k][k])*(a[k][j]);
}
}
}
cout<<"the solution is"<<endl;
for(i=0;i<n;i++)
{
x[i]=(a[i][n]/a[i][i]);
cout<<"x["<<i<<"]="<<x[i]<<endl;
}
getch();
}
Friday, 2 December 2011
Example for Function of isalpha
# include <stdio.h>
# include <conio.h>
# include <ctype.h>
main ()
{
int x;
printf ("Press enter, spaces or tabs to quit \ n");
do
{
x = getche ();
if (isspace (x))
break;
if (isalpha (x))
printf ("is the letter \ n");
else
printf ("not the letter \ n");
}
while (1);
}
# include <conio.h>
# include <ctype.h>
main ()
{
int x;
printf ("Press enter, spaces or tabs to quit \ n");
do
{
x = getche ();
if (isspace (x))
break;
if (isalpha (x))
printf ("is the letter \ n");
else
printf ("not the letter \ n");
}
while (1);
}
Example for function of pow
# include <stdio.h>
# include <math.h>
main ()
{
int x, y,z;
printf ("Enter a number:");
scanf ("% d", & x);
printf ("Enter the power:");
scanf ("% d", & y);
z = pow (x, y);
printf ("\ n");
printf ("result:% d \ n", z);
}
# include <math.h>
main ()
{
int x, y,z;
printf ("Enter a number:");
scanf ("% d", & x);
printf ("Enter the power:");
scanf ("% d", & y);
z = pow (x, y);
printf ("\ n");
printf ("result:% d \ n", z);
}
Thursday, 1 December 2011
8 secret mistakes bloggers
- Launching before there is a fixed template.Most blogging tools in a variety of services such as on Blogger blogs offer a default template. Typically a beginner, they still persist in the template for some time. But if it is really serious about wanting to create a blog with loyal readers, then it is appropriate that you make your own templates. It is true, matters once the technical templates. But at least, try to find a unique template. Perform modifications, although only perfunctory.Importantly, these modifications are sufficient to distinguish your blog from other blogs.
- Unregularly posting.When you decide to make a blog, means you are committed to filling it periodically. It is true that the discipline is an attitude that is rather difficult to sustain. Whether because of time constraints, forgetfulness, or other reasons that may emerge. In fact, 500 words or 2-3 links of interest alone is enough poured in a posting. Maintain the blog as well as maintaining domestic animals or plants. It's OK, when you forget to feed him once in a while. But, if it kept you do, do not you know the consequences ?
- Excessive obsession on comments, trackbacks, and statistics.Do not assume that a post has not yet given no meaning if in-comment or trackbackfrom your blog / website other. In the early days of blogging, beginners often check thecomments every one-two hours. But that's just useless. As long as you have written a good, readable format, and a clear vision or goals, visitors will come by itself. Believe me, the obsession over the comment, trackback, or statistical, will only producedepression in yourself.
- Excessive obsession on the featuresBeginner bloggers tend to be obsessive on features that actually has not really necessary. Call it, JavaClock, Amazon wishlist, flickr, del.icio.us, podcasting, GoogleAdsense, and many more. Though better prioritize features that standard. SyndicationAtom / RSS / RDF may have become a primary need at this time. But more than that, visitors may find information that is unique and original. Legitimate you add various kinds of features in your blog. But first, make sure that they really need it, or at least,they are not bothered with it.
- Which is important and what is not importantMany novice bloggers, especially teenagers, who posts trivial things like how many times they look in the mirror in one day, how much opposite sex that they gebet everyday, how they are so annoying teacher that day, and other things not at all essential . It is true that blogs are similar to online diaries. But please distinguish between thingsthat should be written in the blog and the things that is quite personal diary written in it.
- Copy-paste the resignation.Blankspost not only happen in the case of telecommunications alone. Sometimes the head of a blogger feels so empty, so there is absolutely no inspiration to write.However, if forced to do copy-paste, remember always to include the original source, do not traced it raw like that, and it be great if at least one or two sentences that containunique comment or response from you.
- Excessive ambition.Some bloggers beginner, sometimes hope to be soon achieved fame in the blogging world in an instant. Obviously it is something that is impossible. Even the author of a book / novel best-seller just simply write one or two paragraphs per day, then leave todo other activities, and finish it in stages at a later time. In the world of blogging, fameis not obtained within one day. If you want the fame, just do it with patience. Determine the target is realistic and reasonable. Do not be selfish. Do blogwalking and leavecomments on other blogs sufficient quality. Reply with either email or the comments that go to your blog.
- URL address remains.Perhaps this is less relevant today. But earlier times, it is very difficult (and expensive)to get a domain and hosting are quite reliable. The solution, free hosting facility be the answer. At first glance, from the cost side is indeed a practical solution that is cost effective. However, be aware that there's no free lunch. One by one facility that began to fall free. They began to limit the bandwidth, the facility, remove FTP access and CGI, and some others began to impose even higher costs. As a result, have oftenmutually URL address. You also often get annoyed when your friend is not oftenchange the number so when you need it, it is very difficult for you to contact him ?
Wednesday, 30 November 2011
Trick to find the largest value
#include<stdio.h>
main ()
{
int a [4], i, great;
printf ("Separate each element with spaces \ n");
printf ("Enter the 4 elements to the array:");
for (i = 0; i <4; i + +)
scanf ("% d", & a [i]);
large = a [0];
for (i = 1; i <4; i + +)
{
if (large <a [i])
large = a [i];
}
printf ("Biggest element:% d \ n", major);
}
main ()
{
int a [4], i, great;
printf ("Separate each element with spaces \ n");
printf ("Enter the 4 elements to the array:");
for (i = 0; i <4; i + +)
scanf ("% d", & a [i]);
large = a [0];
for (i = 1; i <4; i + +)
{
if (large <a [i])
large = a [i];
}
printf ("Biggest element:% d \ n", major);
}
Trick to finding the factorial
# include <stdio.h>
main ()
{
int x, i, sum = 1;
printf ("Enter value of x:");
scanf ("% d", & x);
for (i = 1; i <= x; i + +)
number = number * i;
printf ("The factorial:% d \ n", sum);
}
main ()
{
int x, i, sum = 1;
printf ("Enter value of x:");
scanf ("% d", & x);
for (i = 1; i <= x; i + +)
number = number * i;
printf ("The factorial:% d \ n", sum);
}
Trick for Convert lowercase to uppercase
# include <stdio.h>
main ()
{
char word [20], character;
int x = 0;
printf ("Enter a word in lowercase:");
scanf ("% s", & word);
while (word [x]! = '\ 0')
{
character = words [x];
if (character> = 'a' & & character <= 'z')
{
character = character-32;
word [x] = character;
}
x + +;
}
printf ("Change to Uppercase:% s \ n", word);
}
main ()
{
char word [20], character;
int x = 0;
printf ("Enter a word in lowercase:");
scanf ("% s", & word);
while (word [x]! = '\ 0')
{
character = words [x];
if (character> = 'a' & & character <= 'z')
{
character = character-32;
word [x] = character;
}
x + +;
}
printf ("Change to Uppercase:% s \ n", word);
}
Tips for Creating a Table of Contents Automated
Although often done, much remains to create a table of contents manually. In fact, sinceMicrosoft Office 2003, the facility to make it automatic has been refined and easier to use. This time I will try to create a table of contents and a list of pictures automatically inWord 2007 Mirosoft. Do not need any special skills or computer courses, we use the facilities immediately visible in front of us.
How to create an automatic table of contents as follows:
- Chapter or section title block which will be listed in the table of contents. Then, determine the headings for each chapter or section. Sequence heading indicates hierarchy in the list of contents (title of a chapter heading, section heading 2,sub-section heading 3, etc.).
- After all is finished, place the cursor on the page for a list of contents (in the document the same). Then, click the References tab.
- In the left pane, click the icon Table of Contents, and select (click) the form of table of contents desired.
- The result will be like the image below. Writing Table of content can be changed.
Tips for Hiding files
If you have a top secret folder, the folder should be hidden. There is one way to make the folder hidden. Although the switch show hidden files, still will not be visible.
The trick as follows:
- Press Windows + R then type cmd.
-
- Enter. Command prompt window will appear.
-
- Go to the folder that will be hidden. In this example, I will hide a folder of photos that are in D: / rahasia. Type D: and then enter.
-
- Type cd rahasia and then press enter.
-
- Type attrib + h + s photo.
-
Now, the folder disappeared.
Monday, 21 November 2011
Tips for enable the Registry Editor
Your computer might have contracted the virus eagle. One of its activities is
disable the registry, so the registry editor could not be opened.
Thursday, 17 November 2011
Taking care of your battery pack
Here are some ways to take care of your battery pack:
- Use only batteries of the same kind as replacements. Turn the power off
before removing or replacing batteries. - Do not tamper with batteries. Keep them away from children.
- Dispose of used batteries according to local regulations. Recycle if possible.
Taking care of your laptop
Your computer will serve you well if you take care of it.
Technorati Tags: laptop,computer,temperature
- Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator.
- Do not expose the computer to temperatures below 0º C (32º F) or above 50º C (122º F).
- Do not subject the computer to magnetic fields.
- Do not expose the computer to rain or moisture.
- Do not spill water or any liquid on the computer.
- Do not subject the computer to heavy shock or vibration.
- Do not expose the computer to dust or dirt.
- Never place objects on top of the computer.
- Do not slam the computer display when you close it.
- Never place the computer on uneven surfaces.
Taking care of your AC adapter
- Do not connect the adapter to any other device.
- Do not step on the power cord or place heavy objects on top of it.
- Carefully route the power cord and any cables away from foot traffic.
- When unplugging the power cord, do not pull on the cord itself but pull
on the plug. - The total ampere ratings of the equipment plugged in should not exceed
the ampere rating of the cord if you are using an extension cord. Also, the
total current rating of all equipment plugged into a single wall outlet
should not exceed the fuse rating.
Thursday, 3 November 2011
Tips on treating Athlete's Foot (Dermatophytosis)
Athlete's foot is a speck on the skin characterized by small bubbles that itch, along with broken or sores on the feet and hands, especially in the crevices of the finger.
Treatment with medicinal plants
1. Soak feet with boiling water Tinospora Rumphii Boerl
Treatment with medicinal plants
1. Soak feet with boiling water Tinospora Rumphii Boerl
- Tinospora Rumphii Boerl chopped stems (30 cm) and boil in 5 cups of water for 15 minutes
- Soak the foot of the infection leaves boiled in water for 15 minutes or how long it can hold. While the feet soak, rub Selah toes with a cotton swab, remove dead skin prick bubbles and water. Soak 10 minutes after the dead skin removed. Soak the feet 2 times a day for severe infections or at least once a day.
2. Leaves of Cassia alata L.
- chopped young leaves and squeeze the juice.
- Put the juice directly on Selah Selah-toes and other areas with an infection after a foot soak with hot water (water Tinospora Rumphii Boerl).
3. Using Leaf Ocimum basilicum L.
- chopped leaves and take the juice
- Put juice directly on the part of the infection after soaking it in water Tinospora Rumphii Boerl warm.
4. Using Cassia fistula L.
- Pound the young leaves, then take the juice.
- Put on the part of the infection after soaking it in water Tinospora Rumphii Boerl.
5. Allium sativum Linn, for the itching.
- Peel the beans and chopped Allium sativum Linn.
- Rub the itchy parts, 2 times a day.
Tips for treating asthma
Asthma is a disease of the respiratory tract. The symptoms are feeling of tightness in the chest, shortness of breath, wheezing and coughing.
Treatment with medicinal plants
1. Using acid bark (Tamarindus indica L.)- chopped and boiled piece of bark in 3 cups water for 10 minutes
- Adults: 1 bowl after each meal and before bed.
- Children: ½ cup, 4 times daily (after meals and before bed).
- Babies: 2 tablespoons, four times daily (after meals and before bed).
- Boil 5 young stems are chopped spinach spiked with flowers and leaves in 5 glasses of water for 10 minutes.
- Adults: 1 Bowl, 4 times a day.
- Children: ½ cup, 4 times a day.
- Babies: 2 tablespoons, four times a day.
Saturday, 22 October 2011
Tips for treating abscesses and boils (using medical plant)
Abscess is the center of a pus collected in body tissue. Boils and abscesses characterized by pain, inflammation and swelling.
1. Using plants gondola (Basella rubra Linn)
- Destroy 2 bay leaves gondola
- Stick on the sick every two times a day, morning and afternoon.
2. Using Purbanegara plant, Amarillo (Tagetes erecta Linn)
- Destroy purbanegara 3 bay leaves and two flowers
- Stick on the sick every morning and evening.
3. Using plant hibiscus (Hibiscus rosasinensis Linn)
- Chopped 5 bay leaves and 2 flowers.
- Attach directly to the abscess or boil every morning and evening.
4. Using plant Sembung (Blumea balsamifera)
- 5 pieces of chopped fresh leaves Sembung
- Attach directly to abscesses or boils, 2 times a day, morning and afternoon.
Thursday, 13 October 2011
Tips Keeping Your Cell Phone Data Security
Advances in information technology makes mobile phones increasingly diverse and sophisticated features. Via
phone, you can not just call and sms ria, but also can be used to
access the Internet, photos, record videos, check e-mail, even chat. In
this era of sophisticated, as now, did not rule out the entire contents
of the data on your mobile phone revealed its contents. Here
are some tips you can try to apply to maintain the security of your
phone's data, at least to minimize the possibility of theft of your
data.
- Make sure always check the status of mobile connectivity, such as bluetooth or infra-red. Better not let the feature is active because it allows other people into your phone. Make sure the connectivity is always turned off after use. Then if there is a request for connection to the phone and you do not know that anyone, there's nothing wrong if you had rejectnya for security.
- Take advantage of existing security features on your phone.Generally phones are equipped with one or several security codes to protect against unauthorized use. This code is commonly known as a PIN (Personal Identification Number) and PUK (Personal Unblocking Key), which is intended to protect the SIM card (sim card).
- Backup all important data on the phone to the computer. If the fear of existing data on your mobile phone revealed its contents, there's nothing wrong if all the important data is on the phone is backed up to the computer. The goal is that when important data is on the phone is lost or damaged, you do not need to be alarmed because the data is also stored in the computer.
- Do not forget to unplug the phones external memory such as memory card (MMC) or SD card, if the phone is going in-service.Often the owner forgets that there are cell phones confidential data on his cell phone when the phone will 'stay' on-site service. Yes if the personnel service is not nosy. If he is idle, it could be your confidential data from being copied and exploited by it. To keep unwanted things, you should unplug the external memory of your phone before entering the 'workshop' HP. As information technology has now been able to reread the entire contents of the data that had stopped at phones. As ever reported previously, the company Trust Digital, based in McLean, Virginia, United States (U.S.) managed to bring back the entire contents of the SMS and e-mail address is on the phone. Unfortunately, employers are reluctant to disclose what software is used. Cyber security consultant Former President Bush, Howard Schmidt, was advised to type the wrong password eleven times in a row. According to him, it could be lead to the data in the phone destroyed (self-destruct).
- For camera phone, do not use it for the sake of privacy.Phone has been regarded as an identity and confidential. Not preclude that other people will find ways to mengkesploitasi contents. For this reason, do not occasionally use your cell phone for personal use of confidential and sensitive. For example, take and store photographs or personal footage of the 'vulgar'.
- Do not recklessly lend your phone to others.
Friends can sometimes be the opposite, especially if your friend had evil intentions toward you. It could be important data, whether it be images 'vulgar' or secret video clip, copy and spread by your friend.
Keeping Safety Tips Facebook
Facebook or FB is a popular social networking website launched on February 4, 2004. Facebook was founded by Mark Zuckerberg, a Harvard student born May 14, 1984 and former Ardsley High School student.
Well there is a solution for you FB secure from the hands of ignorant irresponsible hackers.
- Do not display your e-mail address on your FB, because it usually begins to hack FB looking for e-mail users. The way to live edit the settings, adjust and change the e-mail address where you just have to see it.
- Do not use birth dates or your own name as a password FB, because people will try to get your FB by guessing the password associated with you.
- is check FB often do you and change the password regularly (such as ATM pin)
- And most importantly, do not show all your biographical complete. Simply enter the name and status of your relationship will suffice.
Subscribe to:
Posts (Atom)