1/1/15

2017 2018 4G add-ons Android apbn App Apple Application arabic Archaeology Argentina Arrest warrant Arrow keys Artificial Intelligence Artikel Arus Kas aset kripto Asia Assange Associated Press Aston Martin Aston Martin One-77 Astronomical unit Asyar Atlantis Audi Audi A5 Audi Q7 Australia Austria auto like Automobile Autos Avaya Device Manager Azwar Abubakar B. J. Habibie bacaan tahlil Bachelor's degree Backup badan pengawasan obat bius Badan Pusat Statistik Badanan Bagi Bali Ballmer Bandung Bandwidth Tests Bangkalan Bank Indonesia Banner Baptists Barack Obama Barbie Baru BASIC bbc Beauty pageant Bedework Bedework beginner Belum Beri Berpura BI Biar Biasanya Bilbo Baggins bima sakti Binance Bisnis Bitcoin Biz Stone BJ Habibie BKN BKPM BlackBerry BlackBerry PlayBook Blackpool Blog Blogger Blogger help Blur (band) BNI BNN Bob Hasan Boeing Bogor Bom BonJovi Bonus 1GB Bonus Data Bonus Smartfren Borobudur BPK Brain Bridget Firtle Britney Spears Broadband Broadband Internet access Browser Brunei Bruno Mars Brussels BSE Buah Ape Bubarkan PKS Buddhism Budidaya Buenos Aires Bugatti Veyron BugattiVeyron Bugzilla Bukittinggi bumi Bureau of Labor Statistics Burma Busdiness Business Business and Economy Business school BY COUNTRY Cable television Calendar California capres 2014 Car Cara Cara Mencari Kerja Cara Menjual Diri Cara Menulis Cara Menulis Resume cars Cascading Style Sheets Cash conversion cycle CBS News CCC CD ripper CDDB Central Authentication Service Central Java Chairul Saleh Chania Chat room Chester Chief Digital Offers Chief marketing officer Chile China Cho Kyuhyun Chris Johns Christine Quinn Chuck Hagel Cisco PIX Classified information Clients Climate change Clothing CMO CMOs cms CNET.com CNN Coba CoffeeScript Cognition Collecting Colleges and Universities Colotomy Combinatorics Community Compact Disc Companies Company Comparison of antivirus software Computer crime Computer file Computers and Internet Connect Content management system Contoh Proposal Control key Corruption Eradication Commission Counties CPN CPNS CPNS 2013 Crack epidemic (United States) Create Crime Cryptocurrency CSS Current account Customer Customer service CV DA2 Daerah Dalam Dalat Dalcroze Eurhythmics Dallas Dan Dan (rank) Dangdut Academy2 Dangdut Akademi2 Daniel Tal Daniele De Rossi Danny Quirk Dari Data center Data Communications Database administrator Dating Daun kelor Dead Space 2 Death Debu Decision making Default (finance) Definisi Deforestation in Indonesia Dell Dell inspiron N4010 Drivers For Windows 7 (32bit) Democracy Democratic Design & Printing Dessau Device driver Device Drivers devisit Dick Costolo Digital Clock Digital distribution Digital marketing Digital photography Digital Subscriber Line Digital System Dire Straits Disk Management Distilleries DNS DNS hosting service DNS Server Dolls Domain name Domain Name System Dompet Donald Benek DoubleClick DoubleClick Insights Dow Jones Industrial Average download Download Driver LapTop Download manager DownThemAll DPR driver canon Drivers Drupal Drupal Planet Dubai Duduk Duhur Dunayevskaya Raya DVD Dynamic Views E-book East Java East Nusa Tenggara Economy ecstasy Education Edward Snowden Efficient Cars Eid al-Adha Eid al-Fitr Eid ul-Fitr Ekonomi Embassies and Consulates Embraer Regional Jet Émile Jaques-Dalcroze Employee Empowerment Employment Enable Flas Player Energy Alternatif Energy minister EPUB Eropa Erwin Arnada European Central Bank European Commission European Parliament European Union Evan Williams Evi Juara DA2 Evi Masamba Evil Bong EXO exo planet expensive expensive cars expensive cars 2013 expensive cars speed Experience point F. W. de Klerk Facebook Facebook Graph Search Federal Reserve System Ferrari Ferrari 458 Italia Ferrari Enzo FIA Fianna Fáil File Management File Transfer Protocol Filipina Financial Aid Firefox Firefox 3.5 Firefox 3.6 FLAC Flas Player Flax Flipcard Floor trader FM Transmitter font Food and Drink Ford Fusion Forest FPI Fred Phelps Free Free content free hosting Free Proxy Free Proxy Lists FreeDB FreeSat TV Freeware Frekuensi friend FriendFeed Fujian Game design Games Ganjar Garuda Garuda Indonesia Gaussian blur Gautama Buddha Gaya Hidup Gaza Gerindra Germany Daun Ghalib Github Global navigation satellite system Global Newsbeat Global Redirect Glossarium Glutinous rice Gmail GNU General Public License Golden Globe Award Goldman Sachs Golkar Google Google Analytics Google Docs Google Friend Connect Google Search Google Translate Google+ Government Government Issues Grafena Graffiti Grand Final DA2 Grandma Grandparent Graph Search Graphics Graphics processing unit Gratis Greasemonkey Greenhouse gas GROW Guy Rosen GYM Habibie Hacker Hagel Hagen Haiti Hal Halley Halley's Comet Hallo Halloween Hambalang Hamster Handhelds Hank Johnson Hard disk drive Hardware Hari Hars Haryono Suyono HCL Technologies Helmi Johannes Hendarman Supandji Hennessey Venom GT heroin Hewlett-Packard Hibrid High-definition television Hindia Belanda History History of Java Hitung Mundur Pilkada Hobbit Holly Qur'an Hollywood Home Honda Honda Accord Hongkong Hosted Proxy Services Hosting hosting gratis Hosts HOTBISNIS HotBot HOTINFO Hotmail How Search Works How To HTML HTML element HTTP cookie HTTP Secure HTTrack Huffington Post Hulu Human resources Humboldt huruf Hypertext Transfer Protocol Hyundai Sonata Ian Richardson Ibukota Baru ICQ Idaho Falls Idul Adha Idul Fitri Idul Fitri 1435H Ijin Iklan iMacros Image Imsak Income India Indonesia Indonesian Aerospace Indonesian Democratic Party – Struggle Indonesian National Armed Forces Indonesian rupiah Indonesian Ulema Council Indosiar Indro Infiniti Information retrieval Information Technology inggris INI file Ink cartridge Inkatha Freedom Party inovator Insomnia Inspiron Instant messaging Insulators Intel Core Intel Core i7 Intel Corporation intermediate Internal internasional International Monetary Fund International Whaling Commission InternationalSpaceStation Internet Internet access Internet Connect Internet Download Manager Internet Explorer Internet Gratis Internet Phone Internet Protocol Internet safety Internet service provider Internet television Investigasi Investing Investor Investor Awal IOS IP address ip2700 IPad IPhone iPhone terbaik IPsec Iptek Iran Iron Man 3 Islam Islamic Defender Front Islamic Defenders Front Israel Isya Jack Dorsey Jacques-Dalcroze JADWAL IMSAK 2016 JADWAL SELEKSI CPNS Jakarta Jakarta Globe James Brooke Jamur Tiram Japan Jateng Java Java Development Kit Java version history Java virtual machine JavaScript Jawa Timur Jendela jenis proxy Jika Jika Anda jobs Joe Biden Johannesburg Join the Conversation Joko Widodo Jokowi Joseph McBrennan JPEG JRE Juara DA2 Juara Dangdut Akademi 2 Juga Juli Julian Assange Juru Justin Timberlake Jusuf Kalla Kalau Kali Kam Kami Kapal Selam Karena Kata Keamanan Kedua kehidupan Kekuatan sinyal Kelas 3 Kemanusiaan Yang Adil dan Beradab Kenapa Kesehatan Kesra Ketiga Ketika Ketuhanan Yang Maha Esa Ketupat Kíla Kilas VOA Kinetic Energy Recovery System Kini Kita Knowledge Graph Koenigsegg Koenigsegg Agera Koenigsegg CCX Koenigsegg CCXR Koenigsegg Trevita kokain Komet Koneksi nirkabel Konflik Konser Kemenangan DA2 Korea koruptor Kota Rajasthan KPU kriminal Kripto Krishna Kristiani Herawati Krystal Jung KSPI Kung Fu Kupang l Sony Lagu Evi Masamba Lamborghini Lamborghini Aventador Lamborghini Reventón land grabs Languages Laporan Arus Kas Laporan Keuangan Layer 2 Tunneling Protocol LCGC LEBARAN Lemsaneg Leopard Let Me Try Libre knowledge like Likuiditas link Link Building link friend linkedin Linux List of Buddhist temples List of countries by oil production List of Empire ships (Sa–Sh) List of PDF software List of petroleum companies LittleBigPlanet LittleBigPlanet 2 Lodging Login Lokal Lord of the Rings Los Angeles Lost Civilizations Mac OS X Mac OS X Leopard Macintosh Macklemore MacOS Magelang Maghrib Maharaja Mailing list Majapahit makanan Makes and Models Malang Malaysia Malicious Software Maná Management Mandela Marc Brackett Marine biology Marine Ecology Progress Series Mario Mark Zuckerberg Market News Market sentiment Marketing Marketing and Advertising Marketing Team Martial Arts Masehi Massachusetts Mata Uang Kripto mata-mata matahari Matematika Math Mbah Google McLaren McLaren F1 McLaren P1 media query MediaTek Megabyte Megawati Megawati Sukarnoputri Membaca Neraca Memory Fox Menjebol Neraca Menulis CV Merdeka Meta Meta element Meta Tags Meteor shower Meteoroid Michael Bloomberg Microsoft Microsoft Internet Explorer Microsoft PowerPoint Microsoft Windows Middle East Mikheil Saakashvili MikroTik Miley Cyrus Military Militer Minta Maaf mirror web Miss World Miss World 2013 Missions mlm Mobil Murah Mobile application development Mobile Computing Mobile device Mobipocket Mobutu Sese Seko Modal Kerja Mohammad Hatta MOHON MAAF LAHIR DAN BATHIN Monorail Moon Moscow most expensive most expensive cars Motivasi Motivation Movies Mozilla Mozilla Firefox Mozilla Project MP3 Mpu Prapanca MS-CHAP MSN MSN Messenger MTV Video Music Award Muara Hati Multifunction printer Multimedia Murah Mural Music Music and Audio Music roll Muslim my blog My Telkomsel Myanmar N4010 Nagarakretagama Nagasaki Name server Namun NASA Nasional National Football League National Geographic National Monument National Security Agency Negara Nelson Mandela Neraca Netscape Network Network Connection New South Wales New York New York City New York City Police Department New York Stock Exchange New York Times News Nigel Dessau Niger Nigeria Nissan Altima Nobel Peace Prize Norwegian Media Authority Notepad Notepad++ November NSA NTLM NU Nudi Nürburgring Nusa Dua Nusantara NYSE NYSE Euronext NYX obat bius sintetik offline browser Ogg Onavo Online online business Online Communities Online dating service Online Education Online shopping Ookla OPEC Open Europe Open source Opera Mobile Operating system Operating Systems opium Oppa Optical fiber Organization Orion Orionid Orton Orton Effect OS X OS-2 Otomotif Owneys Rum Pada Pada (foot) Pagani Zonda PageRank PageSpeed Pakistan Pala Empire Palestina Palestinian people palm oil Pancasila Panduan Panel Para Partai Demokrat Pathauto Pay per click PayPal pbb PC Plus Peat Pelajaran Bsnis pemasaran Pemenang DA2 Pemilu Pen Qur'an Pendorong Pengetahuan Peninsula Valdes Penipuan Penyakit Berbahaya penyelidikan Penyiaran People's Justice Party (Malaysia) Perilaku Persatuan Indonesia Personal computer Personal Learning Network Personally identifiable information Personals Pertama Pertamina Pertukaran pertukaran kripto Peru Perusahaan Listrik Negara Pesawat Tak Berawak Peter Godwin Peternakan Petroleum Petroleum industry Philippines Phnom Penh Photograph PHP Piano Picasa Picasa Web Albums Picnik PILGUB PILGUB 2018 PILGUB JATENG PILKADA PILKADA SERENTAK 2018 Pilpres Pilpres 2014 PKS Korupsi PKS Sarang Koruptor planet Platforms Playboy Playboy Indonesia PlayStation PlayStation 3 PLN Plone Plug-in (computing) Pluit Point-to-Point Tunneling Protocol Pokki Policy Political Philosophers Political Philosophy Political Science Ponsel ponsel terbaik Porsche 918 Portable Document Format Portlet PostgreSQL Postmedia News Pownce PPTP PQ 12 PQ 15 Prabowo Subianto Prajogo Pangestu Prambanan Pratt Institute Presiden Susilo Bambang Yudhoyono Primera Capital print printer printer 3d Product placement Profesional Programming Promo Promote Promotion Proposal Usaha Prose Protocols Provinces Proxify Proxy server Proxying and Filtering Przedsiębiorstwo Komunikacji Samochodowej Public DNS Publik Publishing Publishing and Printing Pulang2 Ganteng Pulau Jawa Purnomo Yusgiantoro Python Qualcomm Quantum Leap Qur'an Digital Quran Rabu 18 Desember 2013 Radio Rakernas Ramadan Randall Miller ransomware Rape Rasio Likuiditas Recreation Reducing Emissions from Deforestation and Forest Degradation Registry cleaner Regulasi Rekap Pilpres 2014 Relationship Religion and Spirituality Repost Resume Resumes and Portfolios Retirement Reuters RF Power Amplifier Rheinmetall Riau Ridwan Robert Kiyosaki Robin Thicke Roboform Roi Tiger Roundtable on Sustainable Palm Oil RTC RTT News rum Rumah Rusia Sabu Safari Salah Sales Sam Hall Samsung Sandy Bridge Sangat (term) Sani Abacha Sapta Pesona satelit Satu Saving Money SBY Puas Scam Scholarship Scintilla Scripts SCTV (Indonesia) SD Sea Lines of Communication Search Search engine optimization Search Engines Searching Secure Socket Tunneling Protocol Security Sejuk Sekolah Olahraga Nasional SELAMAT HARI RAYA IDUL FITRI 1434H Selamat Idul Fitri Selanjutnya SELEKSI CPNS Semarang seo seo service online Seoul September 2013 Serbia Sergei Krikalev Server Sesungguhnya Shareware Shopping Shopping mall Shwedagon Pagoda Siaran Silvio Berlusconi Sime Darby Singapore Single Evi Masamba Single sign-on Site map Site Submission Sitemap skema investasi SlideShare Slideshow SM Entertainment Smartphone Smartphones Smarty Smaug SMV SMV FreeSat TV social bookmark Social media Social Network Social Networking Social Sciences Society Soeharto Soekarno software Solar sail Sosial South Africa Southeast Asia Southern right whale Soviet Union Soweto Space Space Shuttle Discovery Speedtest.net SPN Sports Sports car Sriwijaya Air SSL Stanford University States and Divisions Statistics Indonesia Stephan Winkelmann Stereo FM Transmitter Steve Ballmer Steve McQueen Steven Sinofsky Stock Exchange of Singapore Stock market Streaming media Student Subscriber Identity Module Subuh Suharto Sukanto Tanoto Sukhoi Sumatra Sumatra PDF Super Bowl Superior mesenteric artery Surabaya Surat Susan Boyle Susilo Bambang Yudhoyono Swasta Sweden Switzerland system backup image System Restore T-shirt Tablet Taeyeon tahlil tahlilan Taipan Daily Taiwan Tanah Abang Tapi tata surya Tatto Taylor Swift TeachMeet TechCrunch technology Teknologi teks tahlil Tel Aviv Telepon Gratis Televisi Television Telkomsel Telstra Template Designer Templates Temporary Internet Files Teori Keuangan Terkenal Ternak Ternak Belut Territorial Disputes Testing and Tools Tf–idf Thailand The Noble Experiment Things You Didn't Know About... ThinkPad Thomas Tiffany Tiga Timeline Timor Timor Leste Timur Timur Tengah Tips Tips Kesehatan Tommy Suharto Tony Abbott Toolbar Tools Toyota Toyota Camry Toys Toys and Games Traffic collision Translation Transmitter Transport Layer Security Travel and Tourism trik blog Trowulan Tujuan Wisata tutorial tvone Twentieth Century Twitter U.S. Economy Uang Baru Ulang Tahun Ultraviolet Undang Undang Undang Desa Uniform resource locator United Arab Emirates United States United States Secretary of Defense Universities University of Utah unlimited hosting free Unmanned Untuk update Uploading and downloading UPortal Usaha USB Flash Drive Ustad Ustaz utility UU Desa Valuasi Saham Veggies verification Verizon Fios Veto Video Video game Video Games Virginia Virtual private network virus Vista Vitamin VOA VOA News Voice of America VOIP Volkswagen Group Volkswagen Passat Voltage Regulator VPN VPN Connection Waktu Sholat Washington Washington DC WAV Web browser Web cache Web content management system Web Design and Development Web directory web hosting Web proxy web robot Web search engine Web server Web traffic webmaster tools Website Website Reviews Weekly welcome West Sumatra WETA Digital Whitney Houston Wi-Fi Wibiya Wifi wiki WikiLeak Wikileaks Wikimania Wikimedia Commons Wikimedia Foundation Wilayah Winamp Window 8 Windows Windows 10 Windows 11 Windows 2000 Windows 7 Windows 8 windows 8 backup Windows 8.1 Windows 95 Windows 98 Windows 9x Windows API Windows Media Audio Windows Mobile Windows NT Windows Phone Windows Phone 7 Windows Registry Windows startup process Windows Update Windows Vista Windows XP Wiranto Wireless Data Wisata WordPress World bank Writer Writing x factor Xiaomi Mi5 XML Yahoo Yahoo Messenger Yangon Yogyakarta Yossi Vardi YouTube Yuri Gagarin Zaskia Zemanta ZIP (file format) Zoner Photo Studio ZTE

Kejagung resmi tahan eks bos PT Adhi Karya Bali
Gedung Kejaksaan Agung. Merdeka.com/Imam Buhori
Merdeka.com - Bekas Kepala Divisi VII PT Adhi Karya Bali Wijaya Iman Santoso akhirnya resmi ditahan di rumah tahanan Kejaksaan Agung cabang Salemba, selama 20 hari ke depan setelah seharian ini menjalani pemeriksaan sebagai tersangka atas kasus korupsi penyalahgunaan keuangan milik perseroan dan Tindak Pidana Pencucian Uang (TPPU) sebesar lebih dari Rp 12 Miliar, di Gedung Bundar, Kejaksaan Agung. Dari hasil penyidikan terakhir yang dilakukan Penyidik Pidana Khusus (Pidsus) Kejaksaan Agung, Wijaya terbukti melakukan perbuatan tersebut.

"Baru ditahan saat ini karena proses penyidikan sudah berakhir dan akan dilanjutkan ke tahap dua (dilimpahkan ke Kejari Denpasar, Bali)," kata Kepala Direktorat Penyidik Pidana Khusus Sarjono Turin di Gedung Bundar, Kejagung, Jakarta, Kamis (29/1).

Turin mengatakan Wijaya merupakan tersangka pertama yang resmi ditahan penyidik selanjutnya pemberkasan untuk memasuki persidangan. Menurut Turin, dari hasil penyidikan terakhir yang dilakukan hari ini tersangka mengaku melakukan perbuatan menyalahgunakan wewenang ketika menjabat sebagai direktur keuangan PT Adhi Karya, dengan menggunakan keuangan perusahaan untuk kepentingan pribadi.

"Penjelasan yang bersangkutan digunakan oleh beberapa pihak untuk tanah dan rekening," kata Turin.

Masih menurut Turin, aset-aset tersebut kebanyakan berada di Semarang, Jawa Tengah. Penyidik pun telah menyita seluruh aset tersebut.

"Rekening nilainya Rp 335 juta di Semarang, tanahnya empat sertifikat 1.200 meter persegi," tambah Turin.

Terpisah, usai menjalani pemeriksaan selama enam jam sejak pukul 11.30 WIB, Wijaya langsung bergegas menuju mobil penyidik yang akan membawanya ke Rutan Salemba Cabang Kejagung. Mengenakan kemeja abu-abu panjang, Wijaya enggan berkomentar mengenai kasusnya.

Seperti diberitakan sebelumnya Wijaya Imam Santoso ditetapkan sebagai tersangka berdasarkan Surat Perintah Penyidikan (Sprindik) Nomor: Print-15/F.2/Fd.1/02/2014 tertanggal 27 Februari 2014 silam.

Wijaya diduga menampung uang yang bersumber dari efisiensi uang anggaran proyek (laba perusahaan) dan hasil pencairan klaim asuransi kerugian dari PT Jasa Raharja-Putera pada periode februari 2009 sampai dengan Juli 2010 ke dalam rekening pribadinya.

Uang sejumlah kurang lebih Rp 15.384.969.744,69 tersebut dipakai tersangka untuk membiayai kegiatan-kegiatan yang di luar dari Rencana Kerja Anggaran Divisi (RKAD) serta untuk kepentingan pribadi tersangka.


Kamis, 29 Januari 2015 17:20:26
Kejagung resmi tahan eks bos PT Adhi Karya Bali
"Penjelasan yang bersangkutan digunakan oleh beberapa pihak untuk tanah dan rekening," kata Turin.



Kamis, 29 Januari 2015 13:25:45
Sindir dewan ladang korupsi, sejumlah wanita cantik demo DPRD Jabar
"Parlemen itu harus bersih dari segala bentuk KKN, agar semua fungsi pengawasan dapat berjalan baik," kata Kiki.



Kamis, 29 Januari 2015 11:34:40
Aktivis anti korupsi Aceh minta koruptor dihukum mati
korupsi merupakan kejahatan besar yang telah menyebabkan banyak efek negatif pada masyarakat.



Rabu, 28 Januari 2015 18:58:51
8 Jam geledah kantor Dinas Pertanian, Polisi sita ratusan dokumen
Polda Jabar sendiri dalam kasus ini sudah menetapkan tujuh tersangka dalam dugaan korupsi pengadaan traktor & pompa air.



Rabu, 28 Januari 2015 17:45:10
Korupsi, Wabup Pelalawan dituntut 9 tahun bui
Mendengar tuntutan itu Marwan pun bungkam tanpa komentar.



Rabu, 28 Januari 2015 10:50:09
Polda Jabar geledah Dinas Pertanian terkait korupsi pompa & traktor
"Penggeledahan untuk mengumpulkan dan melengkapi alat bukti," kata AKBP Yayat Popon kepada wartawan.



Selasa, 27 Januari 2015 17:25:52
Korupsi, hakim Pasti Sinaga divonis 4 tahun penjara
Vonis ini lebih ringan dari JPU yang menuntut 11 tahun penjara.



Senin, 26 Januari 2015 08:25:48
Sersan Hidayat dkk bongkar kasus korupsi, selamatkan aset Rp 650 M
4 Petugas intel tersebut membongkar kasus ilegal yang melibatkan internal TNI AD. Negara nyaris rugi sangat besar.



Minggu, 25 Januari 2015 07:09:00
Persis Indonesia, rakyat 4 negara ini demo saat polisi berulah
Warga sedunia bergerak saat polisi tidak mendukung gerakan antikorupsi atau malah jadi aktor kejahatan.
Sabtu, 24 Januari 2015 15:24:17
Anak buah dibui terlibat korupsi, wali kota Solo tolak ikut campur Rudi akan mengupayakan penangguhan penanganan H


Dari Wikipedia bahasa Indonesia, ensiklopedia bebas
Nomor telepon darurat adalah satu atau beberapa nomor telepon yang dapat dihubungi dalam keadaan darurat oleh masyarakat umum untuk mendapatkan bantuan dari berbagai pihak seperti polisi, pemadam kebakaran dan pertolongan medis atau pengangkutan (evakuasi) ke rumah sakit. Di banyak negara hanya ada 1 nomor telepon darurat sehingga mudah diingat. Nomor darurat tunggal ini disebut nomor telepon darurat universal atau nomor telepon jasa-jasa penanganan keadaan darurat. Dengan nomor telepon darurat tunggal ini, masyarakat umum yang memerlukan bisa meminta bantuan dari jasa-jasa penanganan keadaan darurat setempat.

Nomor telepon darurat bisa berbeda-beda dari satu negara ke negara lainnya. Ada nomor telepon darurat yang sama di semua negara lewat telepon satelit global. Biasanya nomor telepon darurat terdiri dari 3 nomor yang bisa diingat dengan mudah dan bisa dihubungi dengan cepat. Di beberapa negara terdapat nomor telepon darurat yang berbeda-beda untuk setiap jasa penanganan keadaan darurat. Biasanya nomor-nomor telepon darurat ini mirip satu dengan lainnya dan hanya berbeda pada digit terakhir saja.


Pemakaian

Nomor telepon darurat biasanya hanya dipakai pada saat keadaan darurat yang mendesak saja. Jika terjadi suatu bencana alam, maka nomor darurat hanya boleh dipakai pada keadaan yang mengancam jiwa. Pada keadaan biasa atau tidak mendesak, jasa-jasa penanganan keadaan darurat menyediakan nomor-nomor telepon biasa yang tercantum dalam buku telepon setempat.

Di Inggris, nomor 0845 46 47 juga bisa dihubungi untuk Jasa Pelayanan Kesehatan Nasional (National Health Service/NHS) yang bukan untuk penanganan keadaan darurat.

Panggilan untuk hal-hal biasa dan tidak mendesak, panggilan tentang hal-hal palsu atau iseng ke nomor telepon darurat mengganggu operator dan jasa-jasa penanganan keadaan darurat, menghabiskan waktu dan bisa menyebabkan kematian. Di beberapa negara, pelaporan keadaan darurat palsu ke nomor telepon darurat bisa dianggap sebagai suatu perbuatan kriminal dan pelaku bisa diadili dan dihukum.

Di Amerika Utara, 311 adalah nomor telepon keadaan mendesak yang bisa digunakan untuk menghubungi polisi atau jasa-jasa penanganan keadaan darurat lainnya. Nomor telepon keadaan mendesak ini juga bisa digunakan untuk melaporkan berbagai macam kejadian dan kejahatan pada masa lalu yang tidak membahayakan nyawa. Nomor telepon keadaan mendesak ini dibuat untuk mengurangi beban nomor telepon 911. Di beberapa kota 311 bisa untuk menghubungi beberapa jasa pelayanan pemerintahan daerah atau melaporkan listrik padam.

Nomor telepon darurat 112 adalah nomor telepon darurat untuk jaringan Global System Mobile (GSM) yaitu telepon bergerak selular. Nomor telepon darurat ini belum tentu tersedia pada jaringan telepon bergerak lainnya. Di Uni Eropa, nomor telepon 112 dipakai sebagai nomor telepon darurat di jaringan telepon tetap.


Telepon Bergerak

Dalam standar Global System Mobile (GSM) terdapat nomor darurat 112. Pemakaian nomor yang sama di seluruh dunia memungkinkan pemakai GSM memanggil nomor telepon darurat melalui jaringan selular GSM terdekat, walaupun telepon GSM tersebut tidak terhubung ke jaringan selular GSM tempat telepon tersebut terdaftar. Di negara tertentu seperti Belgia, Spanyol, Inggris, Liechtenstein, Austria dan Untuk Indonesia bisa menghubungi 110 dan akan tersambung ke POLRI, hanya pemakai telepon selular GSM yang terdaftar dan pemakai penjelajah (roamers) saja yang bisa melakukan panggilan nomor telepon darurat 112. Pada jaringan selular GSM tertentu, hanya telepon selular GSM dengan kartu Subscriber Identification Module (SIM) yang masih berlaku dan memiliki kredit yang bisa melakukan panggilan nomor telepon darurat 112. Di negara-negara di mana nomor telepon darurat bukan 112, maka panggilan ke nomor 112 akan disalurkan ke nomor telepon darurat di negara tersebut. Hal ini bermanfaat bagi turis asing yang tidak mengetahui nomor telepon darurat yang tersedia di suatu daerah. Sebagian besar telepon selular GSM bisa menghubungi telepon darurat 112, walaupun telepon tersebut terkunci atau tidak memakai kartu SIM. Di Amerika Serikat, Komisi Komunikasi Federal (FCC) mengharuskan semua jaringan telepon baik tetap ataupun bergerak untuk menyalurkan semua telepon 911 ke suatu pusat pelayanan nomor telepon darurat, termasuk telepon selular yang belum pernah dipakai atau sudah tidak terpakai lagi. Ada kegiatan sosial di AS mengumpulkan telepon bekas untuk disumbangkan ke korban kekerasan dalam rumah tangga dan orang-orang lain yang diperkirakan akan memerlukan sarana untuk menghubungi nomor telepon darurat. Ada masalah tambahan yaitu panggilan darurat palsu dari tombol-tombol telepon selular yang tertekan secara tidak sengaja saat dibawa dalam kantong atau tas kecil. Hal ini disebabkan nomor telepon darurat bisa dihubungi dari telepon selular yang papan tombolnya terkunci. Suatu sistem otomatis dikembangkan di Inggris yang mendeteksi apakah penelpon nomor telepon darurat mengeluarkan suara atau tidak. Jika tidak ada suara maka akan ditangani oleh suatu sistem rekaman otomatis dan operator hanya menangani panggilan nomor telepon darurat yang benar-benar berasal dari orang yang memerlukan bantuan.


Konfigurasi dan Operasi

Nomor telepon darurat termasuk nomor istimewa dalam sistem penomoran telepon di suatu negara. Di masa lalu panggilan darurat selalu disalurkan melalui jaringan khusus tertentu. Di masa modern panggilan darurat biasanya dicampur dengan jaringan telepon biasa, tetapi panggilan darurat sering dapat melalui jaringan tertentu yang tidak bisa dilalui panggilan telepon biasa.

Biasanya dipastikan bahwa setiap panggilan ke nomor telepon darurat akan selalu mendapat jawaban dan tidak mengalami kegagalan/nada sibuk. Bisa juga diatur agar walaupun telepon pemanggil telah ditutup, tetapi saluran akan tetap tersambung sampai operator nomor telepon darurat memutuskan hubungan.

Panggilan nomor telepon darurat akan dijawab oleh seorang operator telepon atau orang yang telah dilatih secara khusus untuk menangani panggilan telepon darurat (dispatcher).

Kalau yang menerima dispatcher, maka setelah menentukan jenis keadaan darurat, maka dispatcher akan mengirimkan petunjuk ke kesatuan polisi, pemadam kebakaran, atau ambulans di lapangan untuk menuju lokasi penelepon.

Beberapa dispatcher telah dilatih untuk memberikan petunjuk/nasihat yang tepat kepada penelepon untuk mengatasi/mengurangi ancaman dari keadaan darurat, seperti pertolongan pertama pada kecelakaan, petunjuk cara pemberian pernapasan buatan.

Kalau yang menerima seorang operator telepon, maka setelah menentukan jenis keadaan darurat, sang operator akan meneruskan panggilan ke pihak kepolisian, pihak pemadam kebakaran atau pihak ambulans. Kalau suatu keadaan darurat memerlukan lebih dari satu layanan penanganan keadaan darurat, maka operator akan memilih salah satu yang paling diperlukan.

Di berbagai negara, penyelenggara jasa nomor telepon darurat bisa mengenali nomor telpon asal panggilan ke nomor telepon darurat. Hal ini dilakukan dengan memakai sistem penagihan telepon yang dipakai perusahaan telekomunikasi. Sekalipun nomor telepon tersebut tidak tercantum di buku telepon atau memakai sistem penutupan caller ID, tetapi nomor telepon asal panggilan tetap dapat diketahui dengan memakai sistem ini.

Jika dari nomor telepon tetap, maka dapat diketahui nama pemilik saluran telepon dan alamat. Jika dari nomor telepon bergerak atau nomor telepon bisnis, maka lokasi penelepon tidak dapat diketahui dengan segera, hanya alamat surat dari sang pemilik telepon selular.

Pada sistem nomor telepon darurat dengan teknologi maju, maka lokasi dari suatu telepon selular bergerak dapat diketahui dengan segera. Biasanya hal ini dicantumkan dalam peraturan telekomunikasi di suatu negara.


Sejarah

Tanggal 30 Juni 1937, nomor telepon darurat pertama di dunia (999) diresmikan di London, Inggris. Ketika nomor tersebut dihubungi sebuah bel akan berbunyi dan sebuah lampu merah akan berkedip-kedip untuk menarik perhatian operator. Secara perlahan-lahan nomor telepon darurat ini dikembangkan di berbagai wilayah di seluruh Inggris. Tahun 1960, nomor telepon darurat dapat dihubungi dari semua nomor telepon di Inggris.

Pada masa sistem pemanggilan telepon dengan pulsa atau "loop disconnect", sengaja dipilih nomor telepon darurat yang susah untuk dipanggil secara tidak sengaja seperti nomor 999. Beberapa orang mengklaim telah membuat panggilan ke nomor darurat secara tidak sengaja pada sistem pulsa pada saat bekerja dengan kabel sambungan telepon tambahan. Hal ini menunjukkan kelemahan dari nomor telepon darurat 999 tersebut.

Pada masa modern, nomor telepon darurat sengaja dibuat gampang untuk dipanggil. Bahkan pada telepon selular, nomor telepon darurat bisa dipanggil dengan telepon selular yang papan tombolnya terkunci atau tanpa memakai kartu SIM.

Tahun 1959, nomor telepon darurat pertama di Amerika Utara (999) dipasang di Winnipeg, Manitoba, Canada dan diresmikan oleh Stephen Juba, walikota Winnipeg. Tahun 1972 untuk menyamakan nomor darurat di seluruh wilayah North American Numbering Plan (NANP), maka Kanada mengubah nomor telepon darurat menjadi 911. Beberapa pulau di wilayah Karibia masih memakai nomor telepon darurat 999.

Tahun 1968, nomor telepon darurat pertama di Amerika Serikat (911) dipasang di Alabama. Nomor darurat 911 baru terpasang di seluruh AS pada tahun 1970an.

Tahun 1928 di Perancis, operator telepon diharuskan menyalurkan panggilan darurat dari nomor telepon apapun, sekalipun jasa telpon ke nomor tersebut telah diputuskan. Tahun 1929 tersedia nomor telepon darurat (18) untuk pemadam kebakaran di Paris yang tersedia untuk 10.000 pelanggan. Nomor telepon darurat di Perancis baru tersebar luas pada tahun 1970an.

Tahun 1972 Conference of European Postal and Telecommunications (CEPT) merekomendasi penggunaan nomor telepon darurat 112. Tanggal 29 Juli 1991, Uni Eropa menetapkan nomor telepon darurat 112. Selain Uni Eropa nomor darurat 112 juga dipakai di banyak negara anggota CEPT.

Di beberapa negara seperti Inggris, Irlandia dan Indonesia, nomor darurat 112 dipakai bersama-sama dengan nomor darurat yang lain.


Nomor telepon darurat seluruh dunia

Pemilik telepon satelit Iridium dan berlangganan dengan jasa penyelamatan SOS Internasional dapat menelpon 767 (SOS) untuk mendapatkan pertolongan atau pengangkutan ke pusat kesehatan SOS Internasional terdekat. Jasa telepon satelit lain dengan jasa pelayanan darurat adalah Immarsat.
 
Nomor telepon darurat di Indonesia
Polisi: 110
Ambulans: 118 dan 119.
Badan Search and Rescue Nasional: 115.
Posko bencana alam: 129.
Perusahaan Listrik Negara (PLN): 123.
Pemadam Kebakaran: 113 atau 1131.
Nomor darurat telpon selular dan satelit: 112
Keracunan: (021) 4250767 atau (021) 4227875.
Pencegahan bunuh diri: (021)7256526, (021) 7257826, (021) 7221810.


Nomor telepon darurat di negara lain

  • Afrika Selatan: Polisi atau Pemadam kebakaran 10111; Ambulans 10177; Dari GSM: 112
  • Chad: Pemadam kebakaran 18; Polisi 17
  • Djibouti: Pemadam kebakaran 18; Polisi 17
  • Ghana: 999; Polisi 191; Pemadam kebakaran 192; Ambulans 193
  • Maroko: Pemadam kebakaran 15; Polisi Kota 19; Polisi Militer (daerah) 177
  • Tunisia: Ambulans 190; Polisi 197
  • Uganda: Polisi 999
  • Zimbabwe: 999; Pemadam kebakaran 993; Ambulans 994; Polisi 995

Asia
  • Filipina: 112 atau 911; Polisi 117
  • India: Polisi 100 dan 103; Pemadam kebakaran 101; Ambulans 102; Dari GSM: 112.
  • Iran: Polisi 110; Ambulans 115; Pemadam kebakaran 125
  • Israel: Polisi 100; Ambulans 101; Pemadam kebakaran 102
  • Jepang: Polisi 110; emergency at sea 118; Pemadam kebakaran and Ambulans 119
  • Korea Selatan: Polisi 112; Pemadam kebakaran and Ambulans 119
  • Lebanon: Polisi 112;
  • Malaysia: Polisi 999, Ambulans 999, Pemadam kebakaran 999; Hansip 991; Dari GSM: 112.
  • Mongolia: 100; Polisi 101; Ambulans 102
  • Singapura: Pemadam kebakaran and Ambulans 995; Polisi 999
  • Sri Lanka: Kecelakaan lalu lintas: 11-2691111
  • Taiwan: Pemadam kebakaran and Ambulans 119; Polisi 110
  • Thailand: Polisi 191; Pemadam kebakaran 199; Ambulans 1669
  • Turki: Pemadam kebakaran 110; Polisi 155; Ambulans 112; Penjaga Pantai 158.
  • Pakistan: Polisi 15
  • Uni Emirat Arab: Polisi 999; Pemadam kebakaran 998; Ambulans 997
  • Qatar: 999
  • Republik Rakyat Tiongkok
    • Daratan: Polisi 110; Pemadam kebakaran 119; SAR 120; Kecelakaan lalu lintas 122.
    • Hong Kong S.A.R.: 999 (voice); 992 (SMS untuk pelanggan cacat).
    • Makau: 999
  • Arab Saudi: Polisi 999 dan 993; Pemadam kebakaran 998; Ambulans 997; Darurat: 911, 112, atau 08
  • Vietnam: 115; Polisi 113; Pemadam kebakaran 114

Eropa
  • Nomor paling umum: 112 (juga dari GSM): Austria, Belgia, Kroasia, Siprus, Republik Ceko, Denmark, Estonia, Finlandia, Perancis, Jerman, Yunani, Hungaria, Islandia, Irlandia, Italia, Latvia, Liechtenstein, Lithuania, Luksemburg, Belanda, Norwegia, Polandia, Portugal, Rumania, Serbia, Slovakia, Slovenia, Spanyol, Swedia, Swiss, dan Inggris.
  • Austria: Pemadam kebakaran 122; Polisi 133; Ambulans 144
  • Belanda: 112;
  • Belgia: 112; Pemadam kebakaran and Ambulans 100; Polisi 101; Orang hilang 110; Bunuh diri: 106.
  • Bulgaria: Ambulans 150; Pemadam kebakaran 160; Polisi 166
  • Ceko: 112; Ambulans 155; Pemadam kebakaran 150; Polisi 158 dan 156.
  • Denmark: Polisi, Pemadam kebakaran, Ambulans, environment 112
  • Estonia: 112; Polisi 110
  • Finlandia: Polisi, Pemadam kebakaran, Ambulans, Lingkungan hidup 112
  • Hungaria: 112; Polisi 107; Pemadam kebakaran and SAR 105; Ambulans 104
  • Inggris: 999 atau 112.
  • Irlandia: 112 atau 999
  • Italia: Polisi and 113; Polisi militer 112; Ambulans 118; Pemadam kebakaran 115.
  • Jerman: Polisi 110; Pemadam kebakaran and ambulance 112
  • Kroasia: 112; Polisi 92; Pemadam kebakaran 93; Ambulans 94
  • Latvia: 112; Pemadam kebakaran and SAR 01; Polisi 02; Ambulans 03; Gas bocor 04
  • Lithuania: 112; Pemadam kebakaran 01, 101, 011; Polisi 02, 102, 022; Ambulans 03, 103, atau 033.
  • Norwegia: Pemadam kebakaran and SAR 110; Polisi 112; Ambulans 113
  • Perancis: 112; Ambulans 15; Polisi 17; Pemadam kebakaran and SAR 18
  • Polandia: 112; Ambulans 999; Pemadam kebakaran 998; Polisi 997; Gas bocor 992.
  • Portugal: 112; Pemadam kebakaran 117
  • Romania: 112.
  • Russia: Pemadam kebakaran 01; Polisi 02; Ambulans 03; Gas bocor 04; Dari GSM 112.
  • Serbia: 112; Polisi 92; Pemadam kebakaran 93; Ambulans 94
  • Siprus: 112; 199
  • Slovakia: 112; Ambulans 155; Pemadam kebakaran 150; Polisi 158
  • Slovenia: 112; Polisi 113; SAR, Pemadam kebakaran and Ambulans 112
  • Spanyol: 112; Polisi 091; Civil Guard 062; Pemadam kebakaran 080 atau 085; Ambulans 061
  • Swedia: 112
  • Swiss: Pemadam kebakaran 118; Polisi 117; Ambulans 144; Keracunan 145; Psikologi 143, 147; SAR 1414. Dari GSM: 112.
  • Ukraina: 112; Pemadam kebakaran 01; Polisi 02; Ambulans 03; Gas bocor 04
  • Yunani: 112; Polisi 100; Ambulans 166; Pemadam kebakaran 199 dan 191; Penjaga pantai 108; Narkotika: 109

Oseania:
  • Australia: 000. Dari GSM: 112 atau 000. Dari Textphone/TTY: 106.
  • Fiji: Pemadam kebakaran and Ambulans 911; Polisi 917
  • Selandia Baru: 111; Dari GSM 112, 911 and 08.
  • Vanuatu: 112

Amerika Utara:
Amerika Tengah:
  1. Amerika Selatan
    Argentina: Ambulans 107; Polisi 101; Pemadam kebakaran 100; Darurat: 911.
    Bolivia: Ambulans 118; Polisi 110
    Brasil: Area Mercosul 128; Pemadam kebakaran 193; Ambulans 192; Polisi 190, 191, 194, 197, 198; Hansip 199.
    Chili: Ambulans 131; Pemadam kebakaran 132; Polisi 133
    Kolombia: 112 atau 123; Polisi 156; Pemadam kebakaran 119; Kecelakaan 127; Ambulans 132; Penculikan 165.
    Peru: Pemadam kebakaran 711
    Suriname: 115
    Uruguay: 911
    Venezuela: 171

Bagaimana prosedur yang benar dalam melaporkan tindak kejahatan yang kita lihat, kepada institusi Polri? Apakah layanan aduan ini di Polsek se-Tanah Air berlaku 24 jam? Termasuk juga, layanan 110 apakah juga seperti 911 di Amerika yang berlaku 24 jam? Kemudian, apakah ketika kita lapor akan dikenai biaya ataukah gratis? Terima kasih.
 
Jawaban:
http://images.hukumonline.com/frontend/lt4fdf0761a5056/lt4fdf07828a5b2.jpg
Saudara penanya yang kami hormati,
Sebelum masuk ke pertanyaan Anda, ada baiknya kami akan mengenalkan terlebih dahulu apa yang dimaksud dengan laporan. Definisi Laporan dapat kita lihat di dalam Pasal 1 angka 24 Undang-Undang Nomor 8 Tahun 1981 tentang Hukum Acara Pidana (“KUHAP”), yaitu:
“Laporan adalah pemberitahuan yang disampaikan oleh seorang karena hak atau kewajiban berdasarkan undang-undang kepada pejabat yang berwenang tentang telah atau sedang atau diduga akan terjadinya peristiwa pidana”.
 
Dari pengertian di atas, laporan merupakan suatu bentuk pemberitahuan kepada pejabat yang berwenang bahwa telah ada atau sedang atau diduga akan terjadinya sebuah peristiwa pidana/kejahatan. Artinya, peristiwa yang dilaporkan belum tentu perbuatan pidana, sehingga dibutuhkan sebuah tindakan penyelidikan oleh pejabat yang berwenang terlebih dahulu untuk menentukan perbuatan tersebut merupakan tindak pidana atau bukan. Kita sebagai orang yang melihat suatu tidak kejahatan memiliki kewajiban untuk melaporkan tindakan tersebut.
Selanjutnya, di mana kita melapor? Dalam hal Anda ingin melaporkan suatu tindak pidana atau kejahatan, Anda dapat langsung datang ke kantor kepolisian yang terdekat pada lokasi peristiwa pidana tersebut terjadi. Adapun daerah hukum kepolisian meliputi :
a.    Daerah hukum kepolisian Markas Besar (MABES) POLRI untuk wilayah Negara Kesatuan Republik Indonesia;
b.    Daerah hukum kepolisian Daerah (POLDA) untuk wilayah Provinsi;
c.    Daerah hukum kepolisian Resort (POLRES) untuk wilayah Kabupaten/kota;
d.    Daerah hukum kepolisian Sektor (POLSEK) untuk wilayah kecamatan.
  
Untuk wilayah administrasi kepolisian, daerah hukumnya dibagi berdasarkan pemerintahan daerah dan perangkat sistem peradilan pidana terpadu (Pasal 2 ayat [2] PP 23/2007). Sebagai contoh jika Anda melihat ada tindak pidana di suatu kecamatan, maka Anda dapat melaporkan hal tersebut ke Kepolisian tingkat Sektor (POLSEK) di mana tindak pidana itu terjadi. Akan tetapi, Anda juga dibenarkan/dibolehkan untuk melaporkan hal tersebut ke wilayah administrasi yang berada di atasnya misal melapor ke POLRES, POLDA atau MABES POLRI.
 
Pada saat Anda berada di Kantor Polisi, silakan langsung menuju ke bagian SPKT (Sentra Pelayanan Kepolisian Terpadu) yang merupakan unsur pelaksana tugas pokok di bidang pelayanan kepolisian. SPKT memiliki tugas memberikan pelayanan terhadap laporan/pengaduan masyarakat. Hal ini sebagaimana ketentuan Pasal 106 ayat (2) Peraturan Kepala Kepolisian Negara Republik Indonesia No. 23 Tahun 2010 tentang Susunan Organisasi dan Tata Kerja Pada Tingkat Kepolisian Resor dan Kepolisian Sektor, yang berbunyi.
SPKT bertugas memberikan pelayanan kepolisian secara terpadu terhadap laporan/pengaduan masyarakat, memberikan bantuan dan pertolongan, serta memberikan pelayanan informasi.
 
Laporan oleh pelapor dilakukan secara lisan maupun tertulis, setelah itu berhak mendapatkan surat tanda penerimaan laporan dari penyelidik atau penyidik.


Pasal 108 ayat (1) dan ayat (6) KUHAP :
(1) Setiap orang yang mengalami, melihat, menyaksikan dan atau menjadi korban peristiwa yang merupakan tindak pidana berhak untuk mengajukan laporan atau pengaduan kepada penyelidik dan atau penyidik baik lisan maupun tulisan;
(6) Setelah menerima laporan atau pengaduan, penyelidik atau penyidik harus memberikan surat tanda penerimaan laporan atau pengaduan kepada yang bersangkutan.
 
Kewajiban kita sebagai pelapor sesungguhnya sudah mengurangi tugas dari kepolisian yang seharusnya menjaga kondisi lingkungan agar tetap dalam keadaan aman. Oleh karenanya, kita yang sudah membantu dan meringankan tugas Polri dalam melaksanakan tugas, melakukan laporan tentang dugaan tindak kejahatan tidak dipungut biaya. Kalaupun ada yang meminta bayaran itu adalah oknum yang sepatutnya Anda laporkan oknum tersebut ke Divisi Profesi dan Pengamanan (“Propam”) Polri.
 
Pertanyaan Anda selanjutnya adalah apakah layanan pelaporan atau aduan 24 jam? Sepengetahuan kami tugas jaga/piket Sentra Pelayanan Kepolisian menerima laporan selama 24 Jam, 7 hari dalam seminggu. Ini merupakan bentuk pelayanan Kepolisian kepada masyarakat.
 
Sedangkan untuk pengaduan melalui telepon, di dalam Peraturan Kepala Kepolisian No. 7 Tahun 2008 tentang Pedoman Dasar Strategi dan Implementasi Pemolisian Masyarakat Dalam Penyelenggaraan Tugas POLRI, Kepolisian membuka dan menyediakan akses komunikasi informasi tentang keluhan masyarakat yang ingin melapor melalui telepon nomor khusus seperti 110, 112 maupun sms ke 1717. Layanan 110 sama seperti halnya layanan 911 yang berlaku di mancanegara, terutama di kota-kota besar.
 Demikian semoga bermanfaat.


Dasar hukum :
3.    Peraturan Kepala Kepolisian Kepolisian Negara Republik Indonesia No. 7 Tahun 2008 tentang Pedoman Dasar Strategi dan Implementasi Pemolisian Masyarakat Dalam Penyelenggaraan Tugas POLRI;
4.    Peraturan Kepala Kepolisian Negara Republik Indonesia No. 23 Tahun 2010 tentang Susunan Organisasi dan Tata Kerja Pada Tingkat Kepolisian Resort dan Kepolisian Sektor;
5.    Peraturan Kepala Kepolisian Kepolisian Negara Republik Indonesia No. 21 Tahun 2010 tentang Susunan Organisasi dan Tata Kerja Satuan Organisasi Pada Tingkat Markas Besar Kepolisian Republik Indonesia.
 
sumber: http://www.hukumonline.com/




The Ultimate PC Fix & Optimization Solution

Advanced Fix is an all-in-one PC suite that offers you effective solution to scan over your system, fix & eliminate Registry errors and accelerate your PC performance. With Advanced Fix in hand, your computer will free from invalid/obsolete registry that cause performance losing, system freezing and crashing, Advanced Fix also equips other fantastic tools like Junk File Cleaner, Startup Optimizer and Privacy Protection to make your computer ever faster and safer.


Features

Scan and Fix Registry
Registry issues may cause various system programs to users’ computer such as system slowing down, dll/exe errors, freezes or even crashes, while AdvancedFix offers you the effective solutions to clean up all these unwanted/corrupt entries within clicks, this not only make your PC run like new again but also keep it away from many major system errors that caused by registry problems.

Defrag Registry
Registry needs to be defragged regularly just like the hard drive, by using the unique registry defragment feature, you’ll be able to defrag your computer registry with ease, that helps to neaten the data stored in the registry, allows the system to access to them much easier than before, and your computer will be double optimized since.

Clean up Junk Files
Your computer may stuck with many junk files temporary files, invalid shortcuts, obsolete items in Program Files, empty folders, etc over time and you didn’t even notice at all, take it easy, the Junk Files Cleaner of AdvancedFix helps you to dig out and delete them all to free more hard drive space, thus avoid hard drive corruption and accelerate the file reading and writing speed.

Protect Privacy
AdvancedFix helps you erase all the history, temp files and cache of your browser, protect your personal online information such as online account, password number, etc from being stolen or peeped by others. This also boosts the web browsing speed.

Download Advanced Fix

Thank you for downloading Advanced Fix. If your download does not start automatically, click here for direct download.

Advanced Fix system requirements


Operating System Windows 8/8.1
Windows 7
Windows Vista
Windows XP
Windows 2003
Windows 2000
Windows Server 2008
Processor Speed Pentium 500MHz processor or better
Memory Required Minimum 64 MB of RAM (128 MB recommended)
Hard Disk Space 50 MB of available hard disk space recommended
Display 1024 x 768 screen resolution recommended

Windows XP
To run the command DISM.exe /Online /Cleanup-image /Restorehealth in Windows XP ▾, please do the following:
  1. Click Start button.
  2. Click: All Programs -> Accessories -> Right-click "Enter command", then click "Run as Administrator"
  3. Enter the command DISM.exe /Online /Cleanup-image /Restorehealth and press Enter.

Windows 7
To run the command DISM.exe /Online /Cleanup-image /Restorehealth in Windows 7 ▾, please do the following:
  1. Click Start button.
  2. Enter cmd, followed by the combination Ctrl + Shift + Enter to run it as Administrator.
  3. Enter the command DISM.exe /Online /Cleanup-image /Restorehealth and press Enter.

Windows 8
To run the command DISM.exe /Online /Cleanup-image /Restorehealth in Windows 8 ▾, please do the following:
  1. Press the Windows key + Q.
  2. Enter cmd, followed by the combination Ctrl + Shift + Enter to run it as Administrator.
  3. Enter the command DISM.exe /Online /Cleanup-image /Restorehealth and press Enter.

Windows XP
To run the command cleanmgr in Windows XP ▾, please do the following:
  1. Click Start button.
  2. Click: All Programs -> Accessories -> Right-click "Enter command", then click "Run as Administrator"
  3. Enter the command cleanmgr and press Enter.

 Windows 7
To run the command cleanmgr in Windows 7 ▾, please do the following:
  1. Click Start button.
  2. Enter cmd, followed by the combination Ctrl + Shift + Enter to run it as Administrator.
  3. Enter the command cleanmgr and press Enter.

Windows 8
To run the command cleanmgr in Windows 8 ▾, please do the following:
  1. Press the Windows key + Q.
  2. Enter cmd, followed by the combination Ctrl + Shift + Enter to run it as Administrator.
  3. Enter the command cleanmgr and press Enter.


To run the command cleanmgr in Windows 7 ▾, please do the following:
  1. Click Start button.
  2. Enter cmd, followed by the combination Ctrl + Shift + Enter to run it as Administrator.
  3. Enter the command cleanmgr and press Enter.

What is WebUpdateSvc4.exe?

The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the WebUpdateSvc4.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
Click to Run a Free Scan for WebUpdateSvc4.exe related errors
 
 

WebUpdateSvc4.exe file information

Windows Task Manager with WebUpdateSvc4
WebUpdateSvc4.exe process in Windows Task Manager
The process known as Software Update Wizard Service (version (V4.x)) or Web Update Wizard Service (version (V4)) belongs to software Web Update Wizard (version V4.x, V4) or Web Update Wizard Service (version V4, V4 by PowerProgrammer) by Data Perceptions / PowerProgrammer (www.powerprogrammer.co.uk) or Data Perceptions.
Description: WebUpdateSvc4.exe is not essential for the Windows OS and causes relatively few problems. WebUpdateSvc4.exe is located in the C:\Windows\System32 folder. Known file sizes on Windows 8/7/XP are 262,360 bytes (50% of all occurrences), 229,856 bytes and 6 more variants. http://www.file.net/process/webupdatesvc4.exe.html
The program is not visible. The file is digitally signed. The WebUpdateSvc4.exe file is not a Windows core file. WebUpdateSvc4.exe is able to hide itself and monitor applications. Therefore the technical security rating is 41% dangerous, however you should also read the user reviews.
In case you experience problems using WebUpdateSvc4.exe, you can also uninstall the associated program (Start > Control Panel > Add/Remove programs > Data Perceptions) or visit the www.co.uk support page.

Recommended: Identify WebUpdateSvc4.exe related errors
If WebUpdateSvc4.exe is located in a subfolder of C:\Windows, the security rating is 46% dangerous. The file size is 262,360 bytes (43% of all occurrences), 282,896 bytes and 5 more variants. The program is not visible. WebUpdateSvc4.exe is certified by a trustworthy company. The WebUpdateSvc4.exe file is not a Windows core file. There is no detailed description of this service. WebUpdateSvc4.exe is able to hide itself and monitor applications.
In case you experience problems using WebUpdateSvc4.exe, you can also uninstall the associated program (Start > Control Panel > Add/Remove programs > Data Perceptions or Dell NetReady) or visit the www.co.uk support page [1][2].
Important: Some malware disguises itself as WebUpdateSvc4.exe, particularly when not located in the C:\Windows\System32 folder. Therefore, you should check the WebUpdateSvc4.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.

Best practices for resolving WebUpdateSvc4 issues

A clean and tidy computer is the key requirement for avoiding problems with WebUpdateSvc4. This means running a scan for malware, cleaning your hard drive using cleanmgr and sfc /scannow, uninstalling programs that you no longer need, checking for Autostart programs (using msconfig) and enabling Windows' Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off doing a repair of your installation, or in the case of Windows 8, executing the DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the WebUpdateSvc4.exe process on your computer, the following programs have proven to be helpful: Security Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. Malwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.


What is WebUpdateSvc4.exe? Detailed file Information

File name: WebUpdateSvc4.exe
Category: System process
Affected OS: Windows NT/2000/XP/Vista/7
Priority: High
Company:
Recommended Action: Scan WebUpdateSvc4.exe related errors

Download: WebUpdateSvc4.exe File Repair Tool

Tested Adware & Spyware Free by McAfee

Is WebUpdateSvc4.exe a safe file or process?

WebUpdateSvc4.exe is an important file process that locates in the Windows\System32\ or folder, it guarantees Windows system's stability and the function of program that require this file process. It classified as safe a safe process file under normal circumstance, it should not be deleted or stoped from the computer otherwise may result in system or particular programs malfunction unless you found multiple copies of the WebUpdateSvc4.exe inside your computer which may caused by file corruption or virus infection.

WebUpdateSvc4.exe error description

WebUpdateSvc4.exe error is a common system error that could happen in most of the Windows platforms. Statistic shows that in 70% of the cases WebUpdateSvc4.exe error appears upon system startup, and in the rest 30% of cases, it appears while users are trying to launch certain application. If you unfortunately receive WebUpdateSvc4.exe error, that may indicates either there is something wrong with the WebUpdateSvc4.exe file/process or your system has problems that trigger the error.

Symptoms of getting WebUpdateSvc4.exe error.


  • Consistently receiving error messages while using the computer.
  • Unable to launch certain program/application.
  • System performance decrease dramatically.
  • System halts or freeze frequently after getting the error.
  • Desktop shows no application icon.
  • Random blue screen of death.

Download: WebUpdateSvc4.exe File Repair Tool

Tested Adware & Spyware Free by McAfee

Recommended solution to fix WebUpdateSvc4.exe error


For people who encountered WebUpdateSvc4.exe error or other regular system problems, we suggest downloading professional PC error fix tool to help you fix WebUpdateSvc4.exe error instantly and automatically without any complicated manual operation, using the error fix tool could also repair and clean your Windows registry, thus stable and optimize system performance, prevent registry related - errors or other potential problems effectively. You may follow the below three simple to fix WebUpdateSvc4.exe error safely.

Other solutions that might help you fix WebUpdateSvc4.exe error

Although manual solution is kind of complicated and risks involved, it is still feasible if you are an experienced computer user, it won't be that hard for you to do so, here is some of the common fix steps that I would like to share with you, simply follow the instruction carefully to proceed.

Solution 1: Replace problematic WebUpdateSvc4.exe file

WebUpdateSvc4.exe errors may sometimes caused by file malfunction, which means that the WebUpdateSvc4.exe file is either corrupted/damaged or missing from the system, for example, deleted accidentally by computer users without notice, or removed/damaged by virus or malware, therefore computer generates error while it call for the file, but if you can replace the problematic file with a new and functional copy, it could most likely help you fix the error. So, where to find a new copy of the file? If you have internet connection, that would be no difficulty to do so, simply visit search engines like google.com or yahoo.com, search for the keywords of WebUpdateSvc4.exe download, and you will be able to find out a bunch of website that allow you to download the file for free, simply download the file, and then place it to the original location in your computer, (usually it is C:\Windows\System32), go to start > run, open the cmd commend window, and then use the commend of 'regsvr32 WebUpdateSvc4.exe' to register the file into the system, and it's done. Alternatively, you can also get the file copy from another proper functioning computer by using flash drive.

Solution 2: applying system restore of Windows

This is a comprehensive solution which can handle most of the common Windows problem, you may follow the below steps:

  • Click Start button at the bottom left of the screen.
  • Go to All Program > Accessories > System tools > System restore.
  • Click Next, and select a restore point in the list, and click Next button again.
  • Follow the instruction to finish the rest of the restoration.
In case you are still confuse about the system restore operation,please refer to the below video demonstration.

Download: WebUpdateSvc4.exe File Repair Tool

Tested Adware & Spyware Free by McAfee

Solution 3: Scan your computer threats

There are cases that WebUpdateSvc4.exe errors are caused by virus or malware infection as some of these threats are capable of damaging or deleting critical system file/program file like WebUpdateSvc4.exe, for situation like this, you must remove virus infection first otherwise the error will not be fixed completely which means the error may reappear shortly. If you had tried out the above solutions but the error is persist, and you also notice strange symptoms like:


  • Massive ads pop-up from time to time
  • System or program halts or crash frequently.
  • You found strange toolbar, favorites is added to your browser without notice.
  • The homepage of your browser is changed and pointed to strange website.
  • You are directed to an unrelated website when you type in a specific web address into your browser.
  • You constantly receive annoying pop-up ads while surfing on the internet.
  • You found the computer is running slower than usual.
  • You receive errors constantly telling you certain dll file is missing or program can not be open.
Well, that may indicates your computer has been infected by virus or there are malware installed inside your computer. You should quickly install a trusted security software which has the ability to detect and remove both virus and malware, and then quickly run a thorough scan over the system, remove anything detected.

How to prevent WebUpdateSvc4.exe error and similar problem from happening

After you get the error fixed, you may need to learn how to prevent such problem from happening again, here are a couple of tips that you may want to bear in mind.

Setup a good firewall

You should know that threat infection is one of the main causes of problems like WebUpdateSvc4.exe error, to prevent such error from cropping up again, you may need to do more than just install a security software, setting up a proper firewall is very essential to stop internet threats from invading your computer. Here is what you gonna do:

For Windows 7 & Vista
  • Go to Start > Control Panel > System and Security.

  • Click Windows Firewall option.

  • Check if the Firewall status is 'on', if not, click Turn Windows Firewall on or off.

  • Check the option of Turn on Windows Firewall in the Home or work(private) network location settings section.
For Windows XP
  • Click Start menu, open Control Panel.
  • Click Security Center in the Control Panel window.

  • In the "Manage Security Settings for." section, click Windows Firewall.

  • Check on the firewall status in the General tab, make sure it is 'On', and "Don't allow exceptions" box is 'unchecked'.

  • Click the Exception tab, check for the 'Programs and Services' list and make sure it is not blocking the wrong program or service.

Defrag hard drive

Disk fragment can be created through many kinds of computer operation which involves disk reading & writing, for instant, file copying, internet download, file or document deletion, etc, if a hard drive contains too much disk fragments, the file reading or writing may be interfered and become paralyzed, to avoid disk fragment, you should defrag the hard disk at lest once a month. Here is how:

  • Click Start, go to All Program > Accessories > System tools > Disk defragment.
  • Select the drive you want to defrag, click Analysis first to check on the fragment status.
  • After the analysis finished, click defrag button.
  • Wait patiently until the defragment finished. (please be informed that defragment process could be very time - consuming if you haven't defrag the drive for a very long time).

Clean up registry regularly

Registry - related issues like corruption, overmuch obsolete/useless entries can easily cause registry malfunction, since registry is the key component of Windows, without a proper functioning registry, there is no doubt your computer will suffer from many system and performance problems. The best way to keep your computer away from registry problem is applying a trusted registry cleaner tool, run a the registry scan & clean once a week to keep registry clean and compact.

Haven't got the WebUpdateSvc4.exe error fixed yet? download professional tools here to fix WebUpdateSvc4.exe error instantly!

Download: WebUpdateSvc4.exe File Repair Tool

Tested Adware & Spyware Free by McAfee

Course of Microprocessor

Software dan Hardware Design Embedded Controller

Tri-State Logic
28 Januari 2015 6:16

Tri-state logic does not refer to orderly thinking in a three state geographic region! When we speak of binary (base two number) values, we mean that a given bit or logic signal can take on either one of two valid states (zero or one) at any instant in time.
A logic gate that is not forcing its output to be either one or zero is said to be tri-stated. Tri-state logic does not refer to base three numbers, but rather to a third invalid logic state when the output of a logic device is neither sinking nor sourcing current. This so-called third state is really an undefined condition, because the device output is not forcing a logic level on its output. It is said to be in a floating, high impedance, passive, or Hi-Z state, since the output circuits are effectively disconnected. A tri-state driver connected to one signal wire of the bus is shown in figure above.

On the left is an inverting buffer with an enabled tri-state output. On the fight side is an example showing two of the same type of buffers, with the top device in the disabled or passive state, and the lower device is enabled or actively driving the data bus to a logic one level. The control signal determines whether the output is passive or active, and is called the output enable or OE signal. The device shown above is actively driving the bus whenever the OE control line is at a logic one level, and is passive when the OE line is at a logic zero level. Most of the time, output enable signals are active low, meaning that the output is enabled when the/OE signal is low, and passive when the/OE signal is high. This is shown on the logic symbol with an inversion bubble where the enable signal enters the logic device.

CMOS logic
28 Januari 2015 5:51

CMOS logic (complementary symmetry MOS) is another form of MOS logic. It has advantages over NMOS logic for low power circuitry and for very complex integrated circuits. NMOS logic is relatively simple, but it has one serious drawback: it consumes a significant amount of power. In fact, it would be impossible to manufacture the largest ICs using NMOS logic, as the power dissipated by the chip would cause it to overheat.
This is the main reason CMOS logic has become the dominant form of logic used for large, complex I Cs. Instead of using a resistor to source current when the output is high, a CMOS device uses a P-channel MOSFET to pull the output high. CMOS logic is based on the use of two complementary FETs that switch the output between the power supply and ground. A simple CMOS inverter is shown in figure bellow.
CMOS logic uses two switches: one P-channel pull-up transistor, and one N-channel pull-down device to pull the output low or high, one at a time. CMOS logic is designed with an N-channel device that turns on and conducts when the gate voltage is at logic one (positive voltage), and the P-channel device turns on when the gate is at ground voltage. A CMOS inverter is comprised of a pair of FETs, one device of each type, as shown in figure above. When the transistor gate inputs are at logic one (positive voltage), the P-channel device is off, and the N-channel device is on, effectively connecting the output to ground, or logic zero. Likewise, when the input is grounded, the P-channel device turns on and the N-channel device turns off, effectively connecting the output to the positive supply voltage, or logic one. Gates and more complex logic functions can be constructed by using series and parallel-connected MOSFETs in circuits similar to the one above. The gate of a MOSFET, as implied by the symbol, is essentially an open circuit. In fact, the gate of a MOSFET does have an extremely high resistance. The operation of the MOSFET's channel is controlled by the voltage of the gate, unlike the bipolar NPN transistor we examined in the inverter, which is controlled by input (base) current. Bipolar transistors are current amplifiers, with their output current being controlled by their base current. FET outputs, on the other hand, are dependent on the gate voltage.

NMOS Logic
28 Januari 2015 4:43

The FET as a Logic Switch
27 Januari 2015 5:05

Transistor Switch OFF
27 Januari 2015 4:42

Transistor Switch ON
27 Januari 2015 4:26

Transistors can be configured to function as switches. As can be seen in figure bellow, an NPN transistor operating as a current controlled switch can be used to build a simple inverter. It changes a logic one on its input to a logic zero at its output, and vice versa. In this case, logic one is represented as a positive voltage, and a logic zero is represented by zero volts. The logic one input (positive input voltage) is supplied through a resistor from the power supply voltage to the transistor base terminal, resulting in a small base control current into the base.


The transistor is used because it has gain allowing a larger output current to flow as controlled by a weaker input. When the transistor is turned on as much as it can be, the collector emitter circuit looks almost like a short circuit, effectively connecting the output to ground or zero volts. This gives a logic zero on the collector output. When the transistor collector is shorted to ground, current flows from the supply through the resistor and into the transistor collector to ground. The transistor is said to sink the resistor current into ground. If there is an external load, such as another inverter or gate, connected to the collector output, the transistor can also sink current from the load. This is also referred to as pulling down the output voltage. The current sinking capacity of the transistor limits the number of devices this inverter can drive.

Digital Hardware Concepts
27 Januari 2015 4:26

In addition to the CPU, memory, and I/O building blocks, other logic circuits may also be required. Such logic circuits are frequently referred to as glue logic because they are used to connect the various building blocks together. The most difficult and important task the hardware designer faces is the proper selection and specification of this "glue logic." Devices such as registers, buffers, drivers and decoders are frequently used to adapt the control signals provided by the CPU to those of the other devices. While TTL gate level logic is still in use for this purpose, the programmable logic device (PLD) has become an important device in connecting the building blocks. Contemporary microcontroller designers need to acquire the following skills:
  • Interpretation of manufacturers specifications
  • Detailed, worst case timing analysis and design
  • Worst case signal loading analysis
  • Design of appropriate signal and level conversion circuits
  • Component evaluation and selection
  • Programmable logic device selection and design
The glue logic used to join the processor, memories, and I/O is ultimately composed of logic gates, which are themselves composed almost entirely of transistors, diodes, resistors, and interconnecting wires. In order to understand the basic operation of the glue logic, we are going to begin at the component level with a review of basic electronics concepts. These concepts will be presented as fluid flow analogies.

The Design and Development Process
27 Januari 2015 4:26

Structured design of a microcomputer requires the ability to do the system design and partitioning from the top down while implementing the system from the bottom up. The hardware design and development process should consist of the following steps:

  1. Defining the requirements.
  2. Collecting information on potential components.
  3. Evaluate the components with respect to the requirements.
  4. Do a block diagram preliminary design and component selection.
  5. Perform a preliminary timing and loading analysis.
  6. Define the functions of the "glue logic."
  7. Schematic entry using CAD (computer-aided design) software.
  8. Programmable logic device design and simulation.
  9. Detailed timing analysis and simulation, adjusting the design as required.
  10. Check the signal loading, buffering signals as needed.
  11. Document the design and generate a net list and bill of materials.
  12. Begin the design and layout of a printed circuit board.
  13. Implement the design in breadboard or prototype form.
  14. Program the memories and programmable logic as required for testing.
  15. Debug and verify operation using oscilloscope, logic analyzer, and in-circuit emulator.
  16. Update and complete documentation as the design changes.
The order of tasks shown is variable, and some of the tasks may be performed in parallel. Software design is also frequently done in parallel with hardware design, and sometimes even before the hardware design. This is frequently a result of the fact that the cost and time required to develop the software exceeds that of the hardware development. In some cases the cost of modifying existing programs may be so high as to be impractical. In these cases, it is the designer's responsibility to maintain software compatibility with previous hardware designs.

Logic Symbols
27 Januari 2015 4:26

Logic symbols are used to represent the logic functions in a more abstract way, allowing the designer to specify the logical function of a circuit without getting into the details of the underlying components (such as the transistors and resistors). The logic symbols used in this text represent those that are most commonly used in commercial documentation.
There are other standards, such as the ANSI/IEEE standard gate level symbols, but they are not encountered as frequently in practice. Figure bellow shows the logic symbols for different gates, and their functions are described in the truth tables.


The logic symbols in figure above show the shapes and Boolean logic functions for the most common gate configurations. The buffer device is a triangle--the symbol for an amplifier because it amplifies the input signal, allowing an increase in the number of loads that can be driven. Note that a small circle, often referred to as a "bubble," on an input or output terminal designates a logical inversion. Thus the inverter is shown as a triangle (amplifier) with a bubble on the output to signify the logic level inversion on the output. The logic voltage levels for TTL logic are:
Positive Logic
0 = false - lowest voltage level
1 = true = highest voltage level
Corresponding TTL Logic Voltages
0 - input voltages 0 to 0.8 volts (low)
1 - input voltages 2 to 5 volts (high)
This means that a TTL compatible logic input is guaranteed to respond to an input signal between 0 and 0.8 volts as a logic zero, and input voltages from 2 to 5 volts as a logic one. Note that voltages between 0.8 and 2 volts are not valid logic levels.
Logic voltage levels are different for different types of logic, but the most common logic levels are those corresponding to the original TTL (transistor-transistor logic), using a 5 volt power supply CMOS levels, using 3 or 5 volt power, are also common. TTL and CMOS logic--like almost every other type of logic in common use--are called positive logic because the most positive voltage corresponds to the logic one value.

Microcomputer and Microcontroller Architectures
27 Januari 2015 4:26

Microprocessors are generally utilized for relatively high performance applications where cost and size are not critical selection criteria. Because microprocessor chips have their entire function dedicated to the CPU and thus have room for more circuitry to increase execution speed, they can achieve very high-levels of processing power. However, microprocessors require external memory and I/O hardware. Microprocessor chips are used in desktop PCs and workstations where software compatibility, performance, generality, and flexibility are important.

By contrast, microcontroller chips are usually designed to minimize the total chip count and cost by incorporating memory and I/O on the chip. They are often "application specialized" at the expense of flexibilit 7 In some cases, the microcontroller has enough resources on-chip that it is the only IC required for a product. Examples of a single-chip application include the key fob used to arm a security system, a toaster, or hand-held games. The hardware interfaces of both devices have much in common, and those of the microcontrollers are generally a simplified subset of the microprocessor. The primary design goals for each type of chip can be summarized this way:

There are also differences in the basic CPU architectures used, and these tend to reflect the application. Microprocessor based machines usually have a yon Neumann architecture with a single memory for both programs and data to allow maximum flexibility in allocation of memory. Microcontroller chips, on the other hand, frequently embody the Harvard architecture, which has separate memories for programs and data. Figure 1-1 illustrates this difference.

One advantage the Harvard architecture has for embedded applications is due to the two types of memory used in embedded systems. A fixed program and constants can be stored in non-volatile ROM memory while working variable data storage can reside in volatile RAM. Volatile memory loses its contents when power is removed, but non-volatile ROM memory always maintains its contents even after power is removed.
The Harvard architecture also has the potential advantage of a separate interface allowing twice the memory transfer rate by allowing instruction fetches to occur in parallel with data transfers. Unfortunately, in most Harvard architecture machines, the memory is connected to the CPU using a bus that limits the parallelism to a single bus. A typical embedded computer consists of the CPU, memory, and I/O. They are most often connected by means of a shared bus for communication, as shown in Figure 1-2.

Diode
27 Januari 2015 4:26


The diode is a simple semiconductor device acting as a "one way" current valve. It only lets current flow in one direction. Figure above illustrates how the diode operates like a "one-way" fluid valve. All electrical current flow will be "positive" or "conventional" current flow, meaning current always flows from the most positive terminal to the most negative terminal of a component. The use of positive current flow follows the intuitive direction of the arrows inherent in the component drawings for diodes, transistors, etc.

Transistors
27 Januari 2015 4:26

The flow analogy can also be used to model how a transistor operates in a logic circuit. The transistor is an amplifier. It uses a small amount of energy to control a larger energy source, just as a valve controls a high-pressure water source. There are two kinds of transistors: bipolar and field-effect transistors (FETs).
We will look at bipolar transistors first; these amplify current. A small amount of current flows in the control circuit (the transistor base emitter circuit) to turn the transistor on. This control current is amplified (multiplied by the gain or beta of the transistor) and allows a larger current to flow in the output circuit (the collector emitter circuit). Once again, the device is not perfect because of the resistance, current, gain, and leakage limitations of real transistors. Bipolar transistors come in two polarities, NPN and PNP, with the difference being the direction in which current flows for normal operation. A bipolar PNP transistor is shown and modeled in Figure 1-7.

For most of the illustrative circuit examples in this site, we will be using NPN transistors, as shown in Figure 1-8.

Voltage, Current, and Resistance
27 Januari 2015 4:26

In Figure 1-3, a battery provides a voltage source for electricity, much like a pump provides a pressure source for a fluid. Voltage, or pressure, is required to produce current flow in the circuit. The voltage source provides the pressure "motivation," if you will, for current flow.
Resistance provides a limiting constraint on the amount of current that will actually flow. The resistor will allow a current to flow through it that is proportional to the voltage across it, and inversely proportional to the resistance value. Higher resistance is like a smaller aperture for the fluid to flow through. The resistance results in a voltage, or pressure drop, across the resistance as long as current is flowing in the resistor. Figure 1-4 illustrates this.

The wiring connecting the components in a circuit is like the piping connecting plumbing components that let a fluid flow. The flow of current in the circuit is controlled by the magnitude of the voltage (pressure) and the resistance (pressure drop) in the circuit. In Figure 1-5, the battery provides a voltage to force current through the resistor. The magnitude of the voltage (V) generated by the battery is developed across the resistor, and the magnitude of the resistance (R), determine the current (I). Note the "return" current path is often shown as "ground," which is the reference voltage used as the "zero volts" point. In this case, current flows from the positive battery terminal, through the wire, then the resistor, then through the "ground" connection to the minus terminal of the battery. This is usually not the same as earth ground, which provides a connection to a stake or pipe literally stuck in the ground. The magnitude of the current in this case is I = V / R by re-arranging the equation V : I * R, as shown in Figure 1-5. This is known as Ohm's law. Another way to look at it is that whenever current flows through a resistor, there is a drop in voltage across the resistor due to the restriction in current.
Real components are not the perfect voltage sources, resistances, etc. we have discussed so far. They have parasitic values that limit their performance in the real world and are subject to other limitations, such as operating temperature, power limits, etc. Current flows only through a complete circuit, and in most cases (for a positive power supply) current flows from the power source through the circuitry and returns to the power supply through the common "ground" connection. Current flowing through any resistance results in the dissipation of power as heat. The power dissipated is P = I~R = V*I = VZ/R. Note that voltage is sometimes denoted by the variable V and sometimes by E, for electromotive force.

All practical components have some resistance. Real batteries have an internal resistance, for example, which provides an upper limit to the current the battery can supply to an external circuit. Real wires have resistance as well, so the actual performance of a circuit will deviate somewhat from the ideal. These effects are obvious in some cases, but not in others. In an automobile starting circuit, it's not surprising that the battery, supplying 12 volts to a starter with internal resistance on the order of 0.01 to 0.1 ohms, will result in currents of hundreds of amperes in order to start the engine. On the other hand, while consulting with a prominent notebook computer manufacturer, I uncovered a design error resulting in an internal current of hundreds of amperes flowing in the circuit for a few nanoseconds. Obviously, this wreaked havoc on the operation of the computer, and generated a great deal of electromagnetic noise!


Timing Diagrams
27 Januari 2015 4:26

Contact Form

Name

Email *

Message *

BABALSHOT @2023. Powered by Blogger.