Senin, 20 Oktober 2014

Paret Politeknik Negeri Medan

Paret Polmed

Disini saya akan menceritakan sebuah paret yang terletak di depan pintu gerbang politeknik negeri medan,
paret yang saya akan ceritakan adalah paret yang berada di depan pagar politeknik negeri medan.
paret tersebut memiliki ukuran kira-kira dengan lebar 1 meter, dan kedalamannya kira-kira 1 meter sehingga cukup luas untuk jalannya air.
air yang mengalir di dalam paret tersebut  berjalan dengan lancar karena  sampah yang berada di dalam paret tersebut tidak begitu banyak sehingga tidak menghalangi jalanya air untuk mengalir,
dengan  kemungkinan banjir tidak akan terjadi karena tidak ada penyumbatan air yang disebabkan sampah , dan  air di paret tersebut mengalir ke paret jalan dr mangsur. di dalam paret tersebut airnya masih belum tercemar karena masih terdapat ikan yang hidup di dalam paret tersebut.


Senin, 06 Oktober 2014

Topik Metode Penelitian

Topik Saya : malware Pada Jaringan

Rumusan Masalah:
1. Masuknya virus ke dalam komputer melalui jaringan?

                                                              BAB I
                                                     PENDAHULUAN




A. Background
The virus is a major enemy of computer users because of the development of viral so quickly and can interfere with the performance of the computer can even damage your computer instantly . Viruses are usually automatically multiplies, and stick to the program registry . Viruses can infiltrate and work alone without a specific action to activate it .
Malware ( short for malicious software, the English term , which means that suspicious software ) is a computer program that was created with the intent and purpose of the creator and a program that looks for weaknesses of the software . Generally malware was created to break or damage the software or operating system through a script that is hidden by the author inserted in a file that is entered into the target computer . For it in the computer world a lot of issues that need to be in the know about a virus that attacks the computer system and how to overcome to improve the computer system .
B. Problem Satateme
Based on the background of the above problems , the problem can be formulated as follows :
1. How does the virus into the computer system over a network ?

C. Purpose
          The purpose of this study was to determine how the virus into the computer system and how the spread of computer systems and how to overcome them .

D. Benefits
       If the results of this research in trust and used as guidelines by the Student computer , the following benefits can be obtained as beriku .
1. Obtaining solutions to overcome computer viruses .
2. Security of the computer .

E. Contributions