Rabu, 02 Oktober 2019
Selasa, 08 Mei 2018
ANIMATED BELOW
ANIMATED BELOW
Assalamualaikum Wr. Wb
On this occasion I will discuss about making animations using 3D max. what is 3D Max?
3D max 3-dimensional vector graphics and animation software, written by Autodesk Media & Entertainment. for this occasion I will discuss about making melt animation.
1. Creating Objects
In making this animation, we will make melt aniamsi. starting with influencing the main object, giving the material, shooting the particles and animating the object.
A. Active top viewport. Next create a teapot geometry object with Radius value = 18 and Segment 10
b. Activate the left viewport. click Select and Move, open the Hierarcy panel and then enable Affect Pivot Only
c. Make sure Pivot teapot object is based on the object, if not so slide the pivot downwards
d. Then Modify panel click List modifier and select Melt to give object modification
e. open the rollout parameters, then set the Melt parameter with terms: Amount = 100, Spread = 35, Soliditas = Glass and Axis for Melt = Z
f. Next give animation to Melt. Click Auto Key to create animation automatically
g. Slide the slider to frame 100
h. Change the value of the Melt parameter with the Amount value = 0 to retrieve the original shape object
I. Click Auto key to cancel animation creation
After a leisurely game, let's make a particle
A. Creating Particles
Particles in this world to create a fluid animsi that moves toward a melted teapot object.
Follow the steps to create the particle
1. public panel Create -> Geometry -> Particle System
2. Click PF Source then create PF Source -> object in top viewport
3. press 6 to display the Particle View window
4. Click the Birth 001 in the Event list 001, then set the parameters on the Birth rollout 001 to determine the number of particles with the value of Emitting Start = 0, Emit Stop = 0 and Number = 125
5. Click Speed 001 in the Event list 001, press Deelete to delete it.
6. Select Find Target from the depot then slide over Rotation 001 in Event 001 to add Find Target and Alternate Rotation.
7. Open Rollout Find Target 001, set the order on the Color By Speed section to offer particle movement speed.
8. Arrange Ponit Cover Surface and activate Icons to make the movement of particles always register and towards the center of the icon
9. Click and drag the Delete operator from the incoming depot into the View event for the new event ie Event 002.
10. Slide the small circle point next to Find target 001, scroll to circle event 002 to connect between events Any particles that have reached the icon find target 001 will be deleted.
11. Click Event 001 until the color turns white. Right-click event 001 and select Properties.
12. Disable the Renderable option and kl; OK to prevent the particle from being rendered
By:
ANUNG
On 19.23
Minggu, 06 Mei 2018
SOUL UNBK MULTIMEDIA LESSON YEAR 2016/2017
SOUL UNBK MULTIMEDIA
LESSON YEAR 2016/2017
1. The installation process requires the device to be used as a storage of data information and volatile properties (memory that can be written and deleted, but will lose the power (off condition) ie ...
A. HD
B. RAM
C. ROM
D. EPROM
E. EEPROM
2. In the case of windows installation is also delivered about charging data andinformationusberupacollectinginformation. The next stage is ...
A. Installing features
B. Installing updates
C. Expanding windows file
D. Copying windows files
E. Completing installation
3. There is a following error
The windows installer service could not be accessed if you are running windows in safe mode, or if the windows installer is not a true installed. Contact your support personnel for assistance. It is caused by ....
A. Service is disabled
B. Can not save the file
C. User account not registered
D. New password not registered
E. Install data is not stored
4. Follow the picture below
Computer usage in the long run can result in fatigue. Makasudutpandang proper with the screen is
A. adjusted chair 15 degrees
B. sesuaisandarantempatenjuduk
C. free by means of sunglasses
D. 45 degrees with distance 10 cm
E. 15 degrees with 30GB and 30-50 eye view
5. One of the products of multimedia content production which directs the audience with the good taste of the mercury even the spirit is based on the story is
A. audio
B. film
C. game
D. internet
E. computer
6. Here is a multimedia content communication that can connect to the creator developer and user with the ease accelerated in the stool from the efficiency of time is ...
A. Animation
B. television
C. internet
D. projection
E. non projection
7. Here is the pre-production process of creating work concepts, need assessment of storyboard content outline creation, breakdown and determination of membership is process ....
A. Pouring ideas
B. Preparation of the beta
C. Compilers
D. Planning products
E. Compilers of documentation
8. The following activities which are multimedia productions are ...
A. Storyboard, casting, floor plan, tatacahaya, shoot list
B. Alokasidana, selection of directors, talent casting, reading, floor plan, wardrobe
C. Production design, property list, wardrobe, editing design, daily production report
D. Alokasidana, selection of directors, actors, cameramen, crew, location, equipment, and wardrobe
E. Alokasidana, selection of directors, actor, cameramen, crew, property set, artistic, lighting
9. Good vidioinstructive needs to be supported with a useful use of the underlying state of achievement. The supporting materials from the report are ...
A. Review
B. Tutorial
C. Bukubacaan
D. Bahankajian
E. Materials participant
10. In order to navigate on the menu list, a script that is yanabenar ...
A. <body> <h1> WarungTegal <h1> <nav >> <a href=" "> list of services </a> </ li> </ body>
B. Fv
C. Iui
D. Yjyj
E. Tht
21. Follow the picture! To create 3D Modeling of PathApppagagames, the maketipetexture that can be selected in the blender feature in thewebsite is an image ......
A. Marbie
B. Clouds
C. Stucco
D. Wood
E. Road
22. To determine the exact 3D drawer as a drawing, the use of a modifier that can perform the fusing function of the joining of other objects is ....
A. Skin
B. Bevel
C. Hook
D. Ocean
E. Boolean
23. To generate a web-savable key such as a drawing board, it is necessary to create a file file that will be generated into html by usingmenu ..
A. Browse in Bridge
B. Publish Settings
C. Open Recent
D. Syne Settings
E. Import
24. Steps to make ............... title in Adobe premier withfekteksmoving from downstoassassetotypesis ..........
A. Title -> New title -> create title
B. Title -> New title -> defiend roll
C. Title -> New title -> defiend still
D. Title -> New title -> defiend credit
E. Title -> New title -> defiend credit
25. In the Adobe Premiere software, to adjust the speed or accelerate the greeting texts in a two-second sequence, if the ease-in box is filled with 0, then the ease-out box will be loaded.
A. 30 (NTSC) or 25 (PAL)
B. 60 (NTSC) or 50 (PAL)
C. 90 (NTSC) or 75 (PAL)
D. 120 (NTSC) or 100 (PAL)
E. 150 (NTSC) or 125 (PAL)
26. In adobe photoshopter software can tool shaped (picture) that servesfor ... ..
A. Blur a picture object
B. Improves on drawings
C. Gives a light effect on picture drawings
D. Retrieve the content in the display and displayed on the color box
E. Mambambardisobjectobject using data from history or snapshot
27. The following 2DDDD paragraph design is .......
A. Emphasis
B. Asymmetric
C. Unity
D. Proportion
E. Rhythm
By:
ANUNG
On 18.58
Ring Network Topology
Ring Network Topology
Various computers there are many kinds of network topology, this time we will discuss thoroughly the various computer networks and various weaknesses and advantages it has.
Ring Network Topology
Ring topology or ring topology is a network topology whose circuit is a point where each of the right and left sections connect to the other two points to the first computer and finally form a ring or circle.
The point on the ring topology serves to strengthen the signal in each circuit or as a repeater. How it works is: computer 1 plan to send file to computer 4? to be sent then the file must pass through computers 2 and 3? then computer 4 receives the file.
With such methods, the signal and the data stream will remain stable. The direction of the data stream can be clockwise or counterclockwise, depending on the need.
Advantages and Disadvantages of Ring Topology
Advantages:
1. Easy to design and manufacture
2. signal performance and stable data flow, even better than the bus topology, although heavy data flow
3. If there is a problem, it is easy to reconfigure or new installer
4. Save on cable usage
5. Save in cost
Deficiency:
1. If there is one computer error, then the whole network will also follow the error, the solution is to use double ring topology
2. The performance of the flow of data traffic depends on the number of computers on the network
By:
ANUNG
On 18.02
Creating Your Own LAN Cable
To connect a computer with another computer, or in a network computer / LAN (local Area Network) required media liaison, there is a media use a regular LAN cable (cat5, cat6), FO (Fiber Optic), or a wireless (wireless / wifi / radio).
Here will be discussed how to mengkrimping / make LAN cable to Rj-45 connector (standard connector for LAN cable), so we can make it ourselves.
Utuk more details I have made the video.
when we buy a network device, access point, modem router, etc., usually like to be given LAN cable which is about 1 to 2 meters long. What if we need a 5 meter, 6 meters or 20 meters? .. must use the services of people / experts to make it.
If we want to make it ourselves, no problem, because it was not difficult to make this LAN cable. Tools and materials are also easily available in stores that provide computer components and network accessories.
Tools and materials
1. Tang Crimping (used to be expensive hundreds of thousands, now there are under Rp 50ribu and the results are good)
2. LAN cable (UTP cable cat5 or cat6)
3. RJ-45 connector
Peel the outside of the cable protector by using crimping pliers (either with a cutter or scissors)
Arrange / sort the contents of the cable consisting of 8 small cable in it
(there are 2 types of LAN cable configurations, straight / straight, Cross-over / cross.Straight is used to connect computers to switch / hub devices and connections in general Cross-over is used to connect between two computers (without using hub / switch))
The color arrangement of the cord:
1. White-green
2. Green
3. White-orange
4. Blue
5. White-blue
6. Orenge
7. White-brown
8. Chocolate
If the color is properly arranged and neat, cut the cable by using a knife in the crimping pliers so that all cables are the same length and flat
Insert the cable in Rj-45 Connector, note the color sequence, do not let anything change
Press the cable into the connector until all the cables touch the end of the connector
Insert the connector into the crimping pliers, then press the crimping pliers aloud.
For the other end of the cable:
If you want to make a LAN Straight cable (straight configuration) do the same steps as above. If you want to create a Cross-over LAN cable (cross configuration) then the color of the cable arrangement on the other end is made different
By:
ANUNG
On 17.55
OPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES
The
operating system provides services for the programmer so it can
do programming easily.
do programming easily.
a. Program execution.
The system should be able to call the program into memory and
run it. The program should be able to end its execution within
normal or abnormal forms (indication error).
run it. The program should be able to end its execution within
normal or abnormal forms (indication error).
b. I / O Operations.
As the program is running it may require I / O,
may be a file or an I / O device. To be efficient and secure, the user does not
may control I / O directly, the control is performed by the operating system.
may be a file or an I / O device. To be efficient and secure, the user does not
may control I / O directly, the control is performed by the operating system.
c. File system
manipulation. The program's ability to read, write, create
and delete files.
and delete files.
d. Communication.Communication
is required if multiple processes are being executed
exchange information. The exchange of information may be made by some
processes in one computer or in different computers through the system
network. Communication is done by sharing memory (shared memory) or
by way of message delivery (message passing).
exchange information. The exchange of information may be made by some
processes in one computer or in different computers through the system
network. Communication is done by sharing memory (shared memory) or
by way of message delivery (message passing).
e. Detecting
errors. The system must guarantee the truth in computing with
performs error detection on CPU and memory, I / O devices or on the user
program.
Some additional functions are not used to help users,
but rather used to ensure efficient system operation, namely:
performs error detection on CPU and memory, I / O devices or on the user
program.
Some additional functions are not used to help users,
but rather used to ensure efficient system operation, namely:
·
Allocate resources (resources). System must be able to
allocate
resourcefor many users or many jobs on the streets in the same time.
resourcefor many users or many jobs on the streets in the same time.
·
Accounting. The system keeps a record of how many
resources the user is using and
what resources are used to calculate statistically accumulated
resource usage.
what resources are used to calculate statistically accumulated
resource usage.
·
Protection. The operating system must ensure that all
access to resources
well controlled
well controlled
By:
ANUNG
On 03.35
OPERATING SYSTEM STRUCTURE
OPERATING SYSTEM STRUCTURE
OPERATING SYSTEM STRUCTUREProcess Management
Process is the program being executed. A process requires
resources (resources) such as CPU time, memory, files and I / O devices
to complete the task.
To manage the existing process, the operating system is responsible on
related activities related to the following process management:
a. Creating and deleting processes created by the user or system.
b. Stop the temporary process and continue the process.
c. Provides complete mechanism for process synchronization and communication
process.
Main Memory Management
The main memory or usually called with memory is a large array
sized word or byte, where each array has a specific address.
Memory is a storage that can access data quickly used
by CPU and I / O devices. Memory is a volatile storage device. Fill in the memory
will be lost in case of system failure.
To manage memory, the operating system is responsible for the memory management activities as follows:
a. Maintain and maintain the parts of memory being used and from
which use.
b. Deciding which processes should be called to memory if
available space in memory.
c. Allocate and reallocate memory space if needed.
File Management
File is a collection of interconnected information already
defined by the author (user). Typically, the file is a program (either in bentu
sourcemaupun object) and data.
To organize files, the operating system is responsible for the activities
which deals with file management as follows:
a. File creation and deletion.
b. Directory creation and deletion.
c. Primitives that support for file and directory manipulation.
d. Mapping files to secondary memory.
e. Backup files to a stable storage medium (nonvolatile).
I / O Management
The operating system is responsible for the I / O system activities as
following:
a. System buffer-caching.
b. The device-drivers interface is common.
c. Drivers for device hardware-hardwaretertentu.
Secondary Storage Management
Because the main memory (primary storage) is volatiledan too small to
accommodate all data and programs permanently, computer system must be
providing secondary storage to back up main memory.
Some modern computer systems use disks for on-lin storage media,
both programs and data.
The operating system is responsible for storage management activities
secondary as follows:
a. Free space settings.
b. Storage allocation.
c. Disk scheduling.
Network Systems (Distributed Systems)
Distributed system is a collection of processors that do not use
memory or clock together. Each processor has local memory
own. Processors on the system are connected through the network
communication. Communication is done by using protocol.
Distributed systems allow users to access resources
(resources) are diverse. By accessing resources that can be used
together will provide benefits in:
• Increase computing speed
• Increasing data availability
• Improve system reliability
Protection System
Protection is a mechanism for controlling access by programs,
process or user on the system or resourcedari user.
The protection system mechanisms that the system should provide include:
• Distinguish between legitimate and unauthorized use.
• Determining disturbed control.
• Establish how to implement protection.
Command Intepreter System
Some commands entered into the operating system use
the control statement used for
• Management and process creation
• I / O handling
• Secondary storage management
• Major memory management
• Access the file system
• Protection
• Network
Programs that read and mimento control statements are called
with the command-line intepreter or shell on UNIX. Its function is to
retrieve and execute the next command statement.
By:
ANUNG
On 03.24
Langganan:
Postingan (Atom)