January 28th, 2011 by catur

What is Email?

Email is simply the shortened form of electronic mail, a protocol for receiving, sending and storing electronic messages. Email has gained popularity with the spread of the Internet. In many cases, email has become the preferred method of communication.

The basic formula for addressing an email was username@usercomputer. This standard has not  changed over the years, other than the user computer now commonly being replaced by the name of an email provider. In many cases, this is the same as the user’s Internet service provider.

In many cases, users receive, send and store email based on one of two standards, SMTP or POP. SMTP stands for Simple Message Transfer Protocol. POP stands for Post Office Protocol. Though there is some amount of confusion over what these two protocols mean, the explanation is rather simple. POP is a protocol for storage of email. SMTP is a protocol for sending and receiving.

In the beginning, email usage required having a program dedicated to the application, or at least having an email service provider with a system set up to handle it. The software for the application is called email client software. Some common programs include: Microsoft Outlook, Outlook Express, Thunderbird, Opera Mail, Eudora and Pegasus Mail. Many are available for free through open sources.

In addition to accessing electronic mail through email client software, Webmail has also become very popular. Most email service providers offer this as an additional benefit, where the user can access their mailbox over the Internet. Some email services are specifically designed using the World Wide Web as its primary interface. These sites, such as Yahoo! Mail, Google Mail and Hotmail have become very popular, as they offer individuals a chance to open an email account at no charge.

 What is Web Based Email?

 Email addresses are commonly assigned by your Internet service provider (ISP), but one can also obtain an email address through a website service. This is known as web based email.

Most people are familiar with setting up their email clients to receive mail through their ISP. The client asks for a POP server (Post Office Protocol) in order to receive mail, and a SMTP server (Standard Mail Transfer Protocol) in order to send mail. However, most email clients can also be used to collect web based email by configuring the client to connect to an IMAP server (Internet Message Access Protocol). The IMAP server is part of the host’s package. That said, the more common way to access this mail is by using a browser.

Web based email has its advantages, especially for people who travel. Email can be collected by simply visiting a website, negating the need for an email client, or to logon from home. Wherever a public terminal with Internet access exists — from the library to a café to the airport or hotel — one can check, send and receive email quickly and easily.

What is POP mail?

If you have a POP email account, messages sent to you are stored on Post Office Protocol (POP) servers at your Internet service provider until you connect and retrieve them. When you connect to your POP email account, the messages are downloaded to your computer. The messages remain on the mail server unless you specify that they should be removed. To do so, choose the Advanced pane of Mail Accounts preferences and then either click “Remove now” or select “Remove copy from server after retrieving a message” and indicate when to remove them using the pop-up menu.

POP is the most common method of accessing email, but if you use multiple computers to read your mail, you might find an Internet Messaging Access Protocol (IMAP) account more convenient. Ask your Internet service provider (ISP) if IMAP mail is available for your account. With an IMAP account, you can keep your mail on your ISP’s server, so you can access it again from any computer.

January 28th, 2011 by catur

“A general rule when it comes to computer ethics is respect”.

Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws.

When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is responsible for knowing what constitutes computer crime and computer fraud.

The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them:

1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.

2) Thou shalt not interfere with other people’s computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.

3) Thou shalt not snoop around in other people’s files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.

4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.

5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false “information” to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.

6) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called  watermarking into pictures in the digital format.

7) Thou shalt not use other people’s computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information.  You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical.

8 ) Thou shalt not appropriate other people’s intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

9) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country’s constitution. The discussion, of course, is going on.

10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.

“Computer ethics has made its presence in the codes of professional conduct and that education has achieved some success, such that it supports the claim that computer ethics can be a potent weapon for information security management, because computer ethics actually, and not just theoretically, helps information security.”

September 1st, 2010 by catur


Metode SERVQUAL dikembangkan oleh Berry, Zeithaml, dan Parasuraman (1990). Dimana harapan, kepuasan pelanggan dan kualitas layanan mempunyai hubungan yang dapat diukur dari kualitas pelayanannya (service quality), kepuasan pelanggan dihitung dengan membandingkan prediksi dan persepsi dari pelanggan. Dalam kuesioner yang disebar nantinya akan terdapat penilaian pelanggan terhadap dua bagian penting yaitu:

  1. Bagian Ekspektasi, yang memuat pertanyaan-pertanyaan untuk mengetahui dengan pasti harapan umum (ekspektasi) dari konsumen terhadap sebuah jasa.
  2. Bagian Persepsi, yang memuat pertanyaan-pertanyaan untuk mengukur pandangan konsumen terhadap perusahaan dengan kategori tertentu.

Tanggapan konsumen dinyatakan dengan skala Likert, yaitu rentang skala nominal 4 untuk sangat setuju dan skala nominal 1 untuk sangat tidak setuju.

Dari table-tabel diatas dapat dilihat keterangan untuk masing-masing nilai dalam skala Likert untuk bagian ekspektasi dan persepsi. Keterangan ini berfungsi untuk menyamakan persepsi responden terhadap skala yang digunakan dalam kuesioner untuk pengukuran kualitas layanan (SERVQUAL).

Untuk perhitungan skor SERVQUAL, kita dapat menggunakan rumus perhitungan sebagai berikut (Zeithaml, 1990):

Skor ServQual = Skor Persepsi – Skor Ekspektasi

Adapun kriteria kelima dimensi kualitas dari model SERVQUAL tersebut adalah:

  1. Tangibles, penampakan dari fasilitas fisik, peralatan, personel, dan sarana komunikasi
  2. Reliability, kemampuan untuk memberikan jasa yang dijanjikan secara konsisten, memuaskan, dan akurat
  3. Responsiveness, keinginan untuk membantu pelanggan dan menyediakan jasa tepat waktu
  4. Assurance (termasuk competence, curtecy, credibility, dan security). Kompetensi dari sistem dan kredibilitas dalam menyediakan jasa secara sopan dan aman
  5. Emphaty (termasuk accessability, communication, dan understanding knowing the customer). Suatu pendekatan, kemudahan untuk mengakses, kemudahan berusaha untuk memenuhi kebutuhan pelanggan.


Webqual merupakan salah satu metode atau teknik pengukuran kualitas website berdasarkan persepsi pengguna akhir. Metode ini merupakan pengembangan dari Servqual- yang disusun oleh Parasuraman, yang banyak digunakan sebelumnya pada pengukuran kualitas jasa. Instrumen penelitian pada Webqual tersebut dikembangkan  dengan metode Quality Function Development (QFD).

Webqual sudah mulai dikembangkan sejak tahun 1998 dan telah mengalami beberapa iterasi dalam penyusunan dimensi dan butir-butir pertanyaannya.  Webqual 4.0 tersebut disusun berdasarkan penelitian pada tiga area yaitu :

  1. Information Quality adalah mutu dari isi yang terdapat pada site, pantas tidaknya informasi untuk tujuan pengguna seperti akurasi, format dan keterkaitannya.
  2. Service Interaction Quality adalah mutu dari interaksi pelayanan yang dialami oleh pengguna ketika mereka menyelidiki kedalam site lebih dalam, yang terwujud dengan kepercayaan dan empati, sebagai contoh isu dari keamanan transaksi dan informasi, pengantaran produk, personalisasi dan komunikasi dengan pemilik site.
  3. Usability adalah mutu yang berhubungan dengan rancangan site, sebagai contoh penampilan, kemudahan penggunaan, navigasi dan gambaran yang disampaikan kepada pengguna.

Webqual dapat digunakan untuk menganalisis kualitas beberapa website, baik website internal perusahaan (intranet) maupun website eksternal.  Persepsi pengguna tersebut terdiri dari dua bagian, yaitu persepsi tentang mutu layanan yang dirasakan (aktual) dengan tingkat harapan (ideal).

Barnes dan Vidgen (2003) melakukan penelitian dengan menggunakan WebQual untuk mengukur kualitas website yang dikelola oleh OECD (Organization for Economic Cooperation and Development).

Website yang bermutu dari perspektif pengguna dapat dilihat dari tingkat persepsi layanan aktual yang tinggi dan kesenjangan persepsi aktual dengan ideal (gap) yang rendah.

Model kualitas website atau WebQual tersebut pertama kali digunakan pada portal sekolah bisnis berdasarkan faktor-faktor kemudahan penggunaan, pengalaman, informasi dan komunikasi, serta integrasi (Barnes dan Vidgen, 2000).

Tingkat pengukurannya  banyak menggunakan seven-likert scale.

Daftar pustaka :

  1. http://www.ittelkom.ac.id/
  2. nustaffsite.gunadarma.ac.id
May 25th, 2010 by catur

Computer literacy is the knowledge and ability to use computers and technology efficiently. Computer literacy can also refer to the comfort level someone has with using computer programs and other applications that are associated with computers. Another valuable component of computer literacy is knowing how computers work and operate.

Likewise, an experienced computer professional may consider the ability to self-teach (i.e. to learn arbitrary new programs or tasks as they are encountered) to be central to computer literacy.

Every single teacher, tutor or lecturer should be literate in information and communication technology (or means ‘computers’).

This means essentially having some basic knowledge of the following:

1.      How to start up, shut down and operate the basic housekeeping facilities of a standard PC

2.      How to use a modern word processor (for writing hand-outs, OHP acetates, etc.)

3.      How to search the Internet for information, print it or save it.

4.      How to use email

5.      How use simple presentation software (e.g. Powerpoint)

6.      How to use a database (storing student and course information, etc.)


and, preferably know a bit about (in preference order):

  • How to use a ‘wysiwyg’ HTML editor to produce simple web pages
  • How to use a DTP (desktop publishing) system
  • How to use a spreadsheet programme

If you haven’t got simple knowledge of the first six items listed above then I would advise that you need to do some training and get up to scratch.  (or you can contact my email..)

ICT literacy is vital to just about every tutor. Not only is it useful for producing high-quality resources for students, but it also enables you to stay up to date (via the Internet) and manage your work with greater ease. It is also addressed as being an important component of any tutor’s skills… and it happens to be valuable for attracting employment!  

May 19th, 2010 by catur

Today’s mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. PDAs and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. Mobile devices are often seen as an extension to your own PC.  Work done on the road, or away from the office can be synchronized with your PC to reflect changes and new information.

Types of Mobile Computing Devices
The term mobile device is used to mean a wide range of consumer electronics. Usually mobile device is used to describe the devices that can connect to the Internet. However, some will classify digital cameras and standard MP3 players as mobile devices as well. The category of mobile devices include the following devices, as well as others:

1. Personal Digital Assistant (PDA)
(sometimes called pocket computers) PDAs are handheld devices that combine elements of computing, telephone/fax, Internet and networking in a single device. A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer. Unlike portable computers, most PDAs began as pen-based, using a stylus rather than a keyboard for input. This means that they also incorporated handwriting recognition features. Some PDAs can also react to voice input by using voice recognition technologies. PDAs of today are available in either a stylus or keyboard version (called a datapad). Examples of PDA Devices: Palm Pilot, Revo, Sony Clie, Hewlett-Packard Jornado, Casio Cassiopedia, Compaq iPaq, Toshiba Pocket PC

2. Smartphones
Smartphones combine both mobile phone and handheld computers into a single device. Smartphones allow users to store information (e.g., e-mail), install programs, along with using a mobile phone in one device. For example, a Smartphone could be a mobile phone with some PDA functions integrated into the device or vise versa. Examples of Smartphones: Sony Ericsson, Palm Treo, Blackberry, Nokia T-Mobile Sidekick, Torq, Motorola Q, E-Ten, HP iPaq, I-mate

3. Tablet PC
Tablet PCs are a type of notebook computer that has an LCD screen on which you can write using a stylus. The handwriting is digitized and can be converted to standard text through handwriting recognition, or it can remain as handwritten text. The stylus also can be used to type on a pen-based key layout where the lettered keys are arranged differently than a QWERTY keyboard. Tablet PCs also typically have a keyboard and/or a mouse for input. Examples of Table PCs: Samsung Q1, Toshiba Portege, Fujitsu Lifebook, Motion Computing, IBM Thinkpad

Mobile Operating Systems (Mobile OS)
Like a computer operating system, a mobile operating system is the software platform on top of which other programs run. When you purchase a mobile device, the manufacturer will have chosen the operating system for that specific device. The operating system is responsible for determining the functions and features available on your device, such as thumbwheel, keyboards, WAP, synchronization with applications, e-mail, text messaging and more. The mobile operating system will also determine which third-party applications can be used on your device. Some of the more common and well-known Mobile operating systems include the following:

a. Symbian OS
Symbian OS has become a standard operating system for smartphones, and is licensed by more than 85 percent of the world’s handset manufacturers. The Symbian OS is designed for the specific requirements of 2.5G and 3G mobile phones.

b. Windows Mobile
The Windows Mobile platform is available on a variety of devices from a variety of wireless operators. You will find Windows Mobile software on Dell, HP, Motorola, Palm and i-mate products. Windows Mobile powered devices are available on GSM or CDMA networks.

c. Palm OS
Since the introduction of the first Palm Pilot in 1996, the Palm OS platform has provided mobile devices with essential business tools, as well as capability to access the Internet or a central corporate database via a wireless connection.

d. Mobile Linux:
The first company to launch phones with Linux as its OS was Motorola in 2003. Linux is seen as a suitable option for higher-end phones with powerful processors and larger amounts of memory.

e. MXI
MXI is a universal mobile operating system that allows existing full-fledged desktop and mobile applications written for Windows, Linux, Java, Palm be enabled immediately on mobile devices without any redevelopment. MXI allows for interoperability between various platforms, networks, software and hardware components.

source: webopedia.com