Rabu, 25 Agustus 2010

SINTA & JOJO - KEONG RACUN

READ MORE - SINTA & JOJO - KEONG RACUN

Selasa, 24 Agustus 2010

USB.Safely.Remove.V4.0.6.720

Apakah anda sering mengalami masalah ketika ingin melepas Media seperti USB Flash drive (Flashdisk), eksternal hardisk, memory card dan sebagainya ? Berbagai cara untuk meng-eject Flahsdisk sudah dicoba, tetapi sering gagal dan hanya selalu muncul pesan “The device ‘Generic volume’ cannot be stopped right now. Try stopping the device again later.
 USB Safely Remove  merupakan cara aman sebagai pengganti tool bawaan windows “Safely Remove Hardware”. Program ini mendukung koneksi seperti SATA, USB dan FireWire. Dengan software ini, maka komponen yang terkoneksi di komputer akan ditampilkan menjadi satu, dapat dilihat dan diakses dengan meletakkan cursor mouse di Icon program ini atau dengan klik kanan icon programnya.















                 DOWNLOAD HERE


Semoga berguna bagi anda semua & apabila ada yang belum di mengerti/belum bisa cara,boleh di tanyakan.
READ MORE - USB.Safely.Remove.V4.0.6.720

IDM V5.19.3 + KEY ( INTERNET DOWNLOAD MANAGER ) NEW !!

















                            DOWNLOAD HERE

IDM ini adalah sebuah software untuk membantu mendownload. Dengan cara mengatur apa saja yg
mau di download, kecepatan download, dll. Tapi pada dasarnya orang-orang menggunakan IDM untuk mempercepat download. Toh salah satu fungsi IDM sebagai Download Acclerator. Software download manager ini yang sangat saya rekomendasikan untuk digunakan. Cara kerja praktis, ringan, simple dan dapat Meningkatkan Kecepatan Download.
Jika diringkas maka IDM mempunyai fungsi-fungsi berikut:



   1. Mampu mempercepat proses download (bisa sampai 10 x kecepatan standard).

   2. Bisa membatasi kecepatan download dan mengalokasikan bandwith ke yang lain.

   3. Mempunyai fasilitas Resume yang dapat meneruskan proses download jika prosesnya mengalami gangguan( trouble ).

   4. Sudah langsung terintegrasi ke software browser ketika instalasi, sehingga IDM akan langsung bekerja ketika ditemukan sebuah file yang akan di download pengguna.



       Semoga berguna bagi anda semua & apabila ada yang belum di mengerti/belum bisa cara,boleh di tanyakan.
READ MORE - IDM V5.19.3 + KEY ( INTERNET DOWNLOAD MANAGER ) NEW !!

HJ-Split( Untuk Membagi & Menggabung File )

























HJ-Split adalah sebuah software(applikasi) untuk membagi suatu file yang berukuran menjadi beberapa bagian kecil dalam waktu yang cepat.Dimana HJSplit ini jg bisa digunakan untuk mengembalikannya seperti semula.

                                                      DOWNLOAD HERE

Langsung saja kita praktekin cara penggunaanya,sperti berikut


Untuk melakukan SPLIT (MEMISAHKAN FILE YG BESAR MENJADI BEBE file besar menjadi beberapa bagian ) :
1. Double klik program HJSplit.exe (ga' usah install)
2. Klik Split
3. Klik input file dan browse file yang hendak dipecah
4. Klik output file bila ingin meletakkan hasil pisahannya di folder lain (ga' wajib di klik)
5. Tentukan Split file size
6. Tekan start.
7. setelah split complete, close deh.Mudahkan kan_?
















Untuk melakukan JOIN (menggabungkan file hasil dari pecahan HJ-Split) :
1. Double klik program HJSplit.exe (ga' usah install)
2. Klik Join
3. Klik input file dan browse file yang hendak digabung (cukup file yg berekstensi .001 dan sisanya akan langsung diekstrak secara otomatis, tapi yakinkan semua file .001 sampai .00XXX... berada pada folder yang sama)
4. Klik output file bila ingin meletakkan hasil gabungannya di folder lain (ga' wajib di klik)
5. Tekan start
6. setelah join complete, close deh.Mudah kan_?
















biasanya uploader hanya me rename file hasil HJ split menjadi .rar. Misalnya SAW-6.avi.001.rar, jadi setelah kamu download file tersebut... cukup rename menjadi SAW-6.avi.001 dan cuekin aja klo ada warning file akan damage, kemudian gabung dg HJ Split.

Contoh nama file HJSplit
Ingin memecah HARRY-POTTER.avi menjadi 3 bagian. sehingga file yang terbentuk adalah
HARRY-POTTER.avi.001
HARRY-POTTER.avi.002
HARRY-POTTER.avi.003
atau secara global
NamaFile.TipeFile.001
NamaFile.TipeFile.002
NamaFile.TipeFile.003

jadi,kalau kalian mau join, rename namanya seperti di contoh.
Semoga berguna bagi anda semua & apabila ada yang belum di mengerti/belum bisa cara,boleh di tanyakan.
READ MORE - HJ-Split( Untuk Membagi & Menggabung File )

Senin, 23 Agustus 2010

Justin Bieber - Never Let You Go

READ MORE - Justin Bieber - Never Let You Go

Sabtu, 21 Agustus 2010

Justin Bieber - Baby (Ft. Ludacris)

READ MORE - Justin Bieber - Baby (Ft. Ludacris)

Justin Bieber - Up

READ MORE - Justin Bieber - Up

Justin Bieber - you Smile

READ MORE - Justin Bieber - you Smile

Justin Bieber - That Should Be Me

READ MORE - Justin Bieber - That Should Be Me

Justin Bieber - Over board Feat. Jessica Jarrell

READ MORE - Justin Bieber - Over board Feat. Jessica Jarrell

Justin Bieber - Some body To Love

READ MORE - Justin Bieber - Some body To Love

Justin Bieber - Runaway Love

READ MORE - Justin Bieber - Runaway Love

Justin Bieber - StuckIn The Moment

READ MORE - Justin Bieber - StuckIn The Moment

Justin Bieber - Eenie Meenie Feat. Sean Kingston

READ MORE - Justin Bieber - Eenie Meenie Feat. Sean Kingston

Rabu, 18 Agustus 2010

Jawaban IT Essentials Chapter 10 exam( Version 4.1 )


 1 When dealing with an angry customer, which two things can a technician do to resolve the problem? (Choose two.)
 *Allow the customer to explain the problem, possibly dispelling some of the anger.
 *Sympathize with the customer's problem.


2 A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
 *Listen to the complaint, apologize for the incident, and then offer to help the customer.


3 A technician receives a call from a customer who is too talkative. How should the technician handle the call?
 *Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.


4 Which three items are commonly parts of a service level agreement (SLA)? (Choose three.)
 *supported software
 *diagnostic procedures
 *service location


5 Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
 *your name
 *ticket number
 *customer name


6   
Which three tasks are commonly carried out by a level-one technician? (Choose three.)
 *document all information on the work order
 *prioritize the problem
 *gather information from the customer


7 The technician begins diagnosing a problem by asking an experienced customer to visit a troubleshooting Web site. The customer becomes angry because she feels this could be done without calling the technician. What should the technician do?
 *Explain how the Web site can be used by both of them during the call to quickly eliminate problems.


8 A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
 *possess good listening skills
 *display professional behavior at all times


9 A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
 *Allow the customer to speak without interruption.
 *Refer to the customer by name whenever possible.


10 What are three guidelines for beginning a call with a customer? (Choose three.)
 *Determine the level of knowledge that the customer possesses about computers.
 *Use brief communication to establish a one-to-one connection with the customer.
 *Call the customer by name.


11 Which three techniques should be used to successfully deal with a talkative customer? (Choose three.)
 *Politely interrupt to refocus the customer.
 *Gather as much information as possible while the customer is talking.
 *Allow the customer to talk for one minute and then ask closed-ended question to regain control of call.


12 Which two approaches are recommended when dealing with customers on the telephone? (Choose two.)
 *Be positive.
 *Look for alternative ways to help the customer.


13 While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
 *Wait until the customer has finished speaking, and then explain the possible solution.


14 Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
 *Use simple step-by-step instructions.
 *Speak in plain terms.


15 What is the recommended way to place customers on hold?
 *Ask and wait for permission before placing customers on hold.


16 Which issue is an example of an exception to an SLA that should be escalated to a manager?
 *A customer wants two new computers added to the existing SLA without additional cost.


17 Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
 *Go for a quick walk.
 *Listen to soothing sounds
 *Practice relaxed breathing.


18 Which two guidelines demonstrate proper netiquette? (Choose two.)
 *Begin each e-mail with an appropriate greeting.
 *Avoid replying to "flames".


19 A technician is trying to calm an angry customer. What is the best approach?
 *Maintain a positive tone of voice and offer to help solve the problem.


20 A technician is talking on the telephone to an angry customer who is unhappy with previous service. How should the technician calm the customer?
 *Listen carefully and attempt to solve the customer's problem.


     Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca.
READ MORE - Jawaban IT Essentials Chapter 10 exam( Version 4.1 )

Jawaban IT Essentials Chapter 9 exam( Version 4.1 )


1 Which three suggestions are good security password policies that a company or individual should follow? (Choose three.)
 *Passwords should have an expiration period.
 *Password lockout should be enabled.
 *A mix of letters, numbers, and other characters should be used.


2 Which two characteristics describe a worm? (Choose two.)
 *Is self-replicating.
 *Travels to new computers without any intervention or knowledge of the user.


3 Which type of program causes banners and ads to appear on the desktop without any user intervention?
 *adware


4 A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use?
 *Trusted Platform Module (TPM)


5 When setting up a new wireless access point, which basic security measure should be taken?
 *Disable SSID broadcast.


6 Which best practice should be included in a password protection policy?
 *Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.


 7 Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
 *LEAP


8 A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
 *Destroy the hard drives with a hammer.


9 Which two statements are true about username and password standards? (Choose two.)
 *The username naming convention should be kept simple.
 *Rules about password expiration and lockout should be defined.


10 A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
 *Create a restore point.


11 A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers?
 *Use data wiping software and delete any hard drive partitions.


12 Which three security storage features are supported by the TPM hardware module? (Choose three.)
 *encryption keys
 *digital certificates
 *passwords


13 A fingerprint reader is an example of which security technology?
 *biometric


14 Where is the safest place to store backups?
 *locked server room


15 Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures?
 *smart card


16 Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
 *service packs
 *security patches


17 Which threat to security uses traffic from zombie computers to overwhelm servers?
 *DDoS


18 What is the preferred wireless encryption technique if the wireless clients support it?
 *WPA


19 Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
 *Place the laptop in a locked security cage designed to store computer equipment.


20 What is the best method for a company to secure data being transmitted across the Internet between remote sites?
 *Use computers secured with smartcard authentication.


21 Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor?
 *adware


22 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?
 *Upgrade to the LEAP wireless security protocol.


23 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
 *Download the latest signature files on a regular basis.


24 Which statement accurately describes the WEP standard?
 *WEP is a first generation security standard for wireless communication.


25 What are two examples of malware? (Choose two.)
 *spyware
 *grayware


26 An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
 *social engineering


27 An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
 *phishing.


     Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca
READ MORE - Jawaban IT Essentials Chapter 9 exam( Version 4.1 )

Jawaban IT Essentials Chapter 8 exam( Version 4.1 )


1 Refer to the exhibit. Which type of network cable is shown?
 *fiber-optic


2 Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
 *encapsulation


3 When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
 *The price is much less than expected.
 *The equipment is new and in the original shipping container.
 *The equipment appears to be performing at a substandard level.


4 Which protocol is used to automatically configure network devices?
 *DHCP


5 Which protocol lacks support for encryption and can be initiated from a computer command prompt?
 *Telnet


6 Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
 *cellular


7 Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
 *The number of twists in the wires inside the cable.
 *The number of wires inside the cable.


8 Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
 *mesh


9 Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
 *VPN client


10 A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
 *The bank encrypts the web page information that is sent and received.


11 What is the purpose of the device that uses the 198.133.219.43 address?
 *It is the device that translates domain names to IP addresses.


12 Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
 *Cisco Brand Protection Team


13 Which digital technology provides an upstream speed that is typically less than the downstream speed?
 *ADSL


14 Which utility can be used to determine end-to-end connectivity between source and destination?
 *ping


15 Which Windows XP command displays the route taken by packets crossing an IP network?
 *tracert


16 Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
 *Configure the NIC for a specific network protocol.


17 A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
 *the available wireless networks within range.


18 Which device enables computers to be attached to a network without segmenting the network?
 *hub


19 Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
 *star


20 Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
 *Data Link


21 Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
 *802.11g


22 A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
 *carry the data stream


23 What is the maximum range a data signal can travel through a 1000BASE-T network segment?
 *328 ft (100 m)


24 A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
 *The Windows firewall has network printing disabled by default.


25 What is one difference between a network domain and a workgroup?
 *A domain provides centralized control.


26 Which three protocols are associated with e-mail? (Choose three.)
 *IMAP
 *POP3
 *SMTP


27 A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
 *fiber optic


28 Which two characteristics describe Ethernet technology? (Choose two.)
 *supported by IEEE 802.3 standards
 *uses a bus logical topology


29 Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
 *The company network requires secure access to confidential information.
 *The users need a central database to store inventory and sales information.
 *The data gathered by the employees is critical and should be backed up on a regular basis.


30 Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
 *Computers listen to the network for clearance to send data.


     Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca.
READ MORE - Jawaban IT Essentials Chapter 8 exam( Version 4.1 )

Jawaban IT Essentials Chapter 7 exam( Version 4.1 )


 1 What is an advantage of using a solid-ink printer instead of an inkjet printer?
 *It produces vivid color prints.


2 What is typical of a network printer installation?
 *the use of Ethernet or wireless


3 Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
 *ECP
 *EPP


4 What is the maximum number of devices that can be connected to a single FireWire interface?
 *63


5 What is a common disadvantage of inkjet printers?
 *The nozzles can get obstructed.


6 What are two advantages of using impact printers? (Choose two.)
 *carbon-copy printing ability
 *inexpensive consumables


7 Which software converts scanned pages into text?
 *Optical Character Recognition


8 Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
 *802.11b
 *802.11g


9 Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
 *drum


10 Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
 *Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.


11 Which step of the laser printing process is the last step performed by a laser printer when printing a document?
 *fusing


12 Which three functions are commonly included in the all-in-one devices? (Choose three.)
 *fax
 *printer
 *scanner


13 What is the best source for a Windows-compatible scanner driver?
 *website for scanner manufacturer


14 Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
 *piezoelectric


15 Which unit is commonly used to measure the print quality of an inkjet printer?
 *DPI


16 A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
 *drum


17 Which step of the laser printing process involves scanning the photosensitive drum with a laser?
 *writing


18 Which software, embedded in a printer, controls how the printer operates and can be upgraded?
 *Firmware


19 Which type of printer is commonly used in stores to produce cash register receipts?
 *thermal


20 Which two names refer to the IEEE 1394 standard? (Choose two.)
 *FireWire
 *i.Link


21 Which standard governs the use of parallel printer ports?
 *IEEE 1284


22 Which Windows XP command sends a file named example.txt to the default printer?
 *print example.txt


23 Which printer technology is used in low-cost, photo-quality printers
 *inkjet


24 Which technology is used by laser printers?
 *electrophotographic


25 What laser printer component could cause streaking?
 *drum.


     Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca.
READ MORE - Jawaban IT Essentials Chapter 7 exam( Version 4.1 )

Jawaban IT Essentials Chapter 3 exam( Version 4.1 )


1 Which port is typically used for external wireless NICs?
 *USB


2 A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a PATA hard drive?
 *Molex


3 Refer to the exhibit. Which type of port is shown?
 *USB


4 A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
 *PCIe
 *PCI


5 Which type of drive is installed in a 5.25-inch bay?
 *optical drive


6 A technician is installing a new CPU in a ZIF socket on a motherboard. What is the primary way of securing the CPU in place?
 *load lever


7 Which internal component of a computer uses a 3-pin power connector?
 *fan


8 Which solution should be used to clean a CPU and a heat sink?
 *isopropyl alcohol


9 A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two.)
 *CPU
 *memory


10 After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
 *during the POST


11 What is the most reliable way for users to buy the correct RAM to upgrade a computer?
 *Check the motherboard manual or manufacturer's website.


12 When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
 *hard drive
 *optical drive


13 How many pins are in a SATA data cable connector?
 *7


14 Refer to the exhibit. Which type of hard drive uses the power connector shown?
 *SATA


15 Which action is recommended to prevent the motherboard from contacting the metal base of the case?
 *Use standoffs to keep the motherboard above the metal base.


16 A technician is troubleshooting a computer that has a malfunctioning floppy drive. The technician observes that the floppy drive light remains lit constantly. How should the technician attempt to repair the problem?
 *Connect the data cable making sure that the colored stripe on the cable is aligned with pin 1 on the drive and the motherboard.


17 Which additional 4-pin or 6-pin power connector is required by some motherboards?
 *AUX


18 What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
 *The floppy cable has a twist in the cable.


19 A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
 *It issues a number of short beeps.


20 A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive?
 *berg.


    Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca.
READ MORE - Jawaban IT Essentials Chapter 3 exam( Version 4.1 )

Jawaban IT Essentials Chapter 1 exam( Version 4.1 )



1 Which type of memory is primarily used as cache memory?
 *SRAM



2 A customer orders a new computer and specifies an internal read-write, non-volatile storage device that uses low power, has fast access to data, and is reliable. What is a suitable storage device that meets these requirements?
 *solid state drive



3 Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?
 *EEPROM



4 Refer to the exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system?
 *1280 x 800



5 Which type of computer resources are direct lines to the processor used by computer components to request information from the CPU?
 *IRQs



6 Which two activities are normally controlled by the Northbridge part of the chip set? (Choose two.)
 *access to the RAM
 *access to the video card



7 Which type of RAM chip has the fastest clock rate but consumes the least power and generates the least heat?
 *DDR3 SDRAM



8 Which expansion slot would be used to install a video capture card in a new computer?
 *Peripheral Component Interconnect-Express



9 A technician is helping a customer compare two hard drives. Which unit of measurement is used for the hard drive speed?
 *revolutions per minute



10 Refer to the exhibit. Which type of cable is shown in the graphic?
 *Serial


11 Which type of memory is unable to have the contents modified?
 *ROM


12 Which important feature is offered by the USB standard?
 *It can supply power from the computer to devices.


13 Which CPU architecture uses a small set of instructions that are designed to be executed rapidly?
 *RISC


14 Which two characteristics are determined by the chip set on a motherboard? (Choose two.)
 *maximum amount of memory that can be installed
 *type of connectors that will be on the motherboard


15 Which two devices are considered input devices? (Choose two.)
 *biometric authentication device
 *digital camera


16 Which technology would be best to use for drive redundancy and data protection?
 *RAID


18 Which two categories are used to classify CPU architecture? (Choose two.)
 *CISC
 *RISC


19 Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
 *IRQ
 *DMA
 *I/O address


20 What is the function of a capture card?
 *enables a video signal to be recorded to the computer hard drive


21 Why are solid state drives reliable and therefore suitable to be installed in computers used in harsh industrial workplaces?
 *They consume less power and have no moving parts.


22A technician needs to back up 4 GB of data using a single storage medium. Which medium can hold the entire 4 GB on a single disc?
 *DVD+/-R


23 How many conductors are found in a SATA data cable?
 *7


24 What are the two connector types for the 1394a interface? (Choose two.)
 *4-pin
 *8-pin


25 Which two form factors are commonly used to build a new computer? (Choose two.)
 *BTX
 *ATX


26 A company employee has very important data on a computer. What RAID level should be used if the criteria include that data be written and read simultaneously and that all data be duplicated using a minimum of three drives?
 *5


27 PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
 *80
 *120


28 Which three devices are considered output devices? (Choose three.)
 *fingerprint scanner
 *headphones
 *printer.



      Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalau sudah di lihat  & di baca.
READ MORE - Jawaban IT Essentials Chapter 1 exam( Version 4.1 )

Dana Cekak PERSATU Kedodoran



TUBAN - Pihak manajemen tim Persatu masih bekerja keras menggali dana untuk menghadapi putaran kedua kompetisi Divisi III Regional Jatim.

Beberapa waktu lalu, manajer Persatu Lilik Soehardjono sudah melakukan pertemuan dengan jajaran ofisial dan ketua Pengcab PSSI Tuban, Hadi Tugur. Pertemuan tersebut untuk merumuskan langkah-langkah penyelamatan Persatu. Lilik kini masih menunggu komitmen dari Semen Gresik untuk memberikan tambahan dana bagi Persatu agar bisa tetap berkiprah pada putaran kedua ini. ''Inilah kesempatan terbaik untuk promosi ke Divisi II. Kami akan berjuang sekuat tenaga agar tim ini bisa eksis,'' tuturnya.

Sementara, para pemain juga masih terus melakukan latihan intensif. Pelatih kepala S. Karjan bersama dua asistennya, Didik Maryadi dan Salamun Patra masih berusaha keras mendongkrak performa Nur Happy dkk.

Sementara itu, Ronggomania, kelompok suporter pendukung Persatu juga berharap tim berjuluk Laskar Ronggolawe itu melanjutkan kiprahnya. Hasil apik selama putaran I lalu diharapkan bisa diteruskan pada putaran II nanti. Terkait kesulitan finansial yang dihadapi Persatu, Ronggomania berharap semua pihak khususnya Pemkab Tuban memiliki kepedulian terhadap tim kebanggaan Tuban tersebut. ''Kami sudah capek bersuara meminta pemkab untuk membantu, namun kenyataannya juga nggak menuai hasil,'' kata ketua Ronggomania, Arka. (zak/wid)






NARSUMBER:Radar Bojonegoro
READ MORE - Dana Cekak PERSATU Kedodoran

Wisata Goa Akbar Di Kota Tuban

KEANGGUNAN panorama alam  “GOA AKBAR”  ternyata bukan hanya terdapat di permukaan bumi, seperti hamparan gunung yang menghijau atau luasnya lautan dengan hamparan pasir putihnya, tetapi juga dapat pula dinikmati dari bongkahan batuan dalam bumi, atau yang biasa kita kenal sebagai goa alam.
Bagi Anda pengagum keindahan alam, masih belum lengkap rasanya bila belum mampir ke kota Tuban  yang biasa disebut kota “TOAK” ,untuk menikmati keindahan bawah tanah Goa Akbar. Bertempat tepat di pusat
kota Tuban, Goa Akbar membentang penuh kelokan dengan pesona tersendiri.
Untuk mencapai Goa Akbar juga tidak terlalu sulit. Anda cukup mencari Pasar Baru Tuban di Desa Gedongombo, Kecamat Semanding, Tuban atau satu kilometer perjalanan dari alun-alun kota. Di bawah pusat pasar tradisional itulah terdapat lorong berornamenkan batuan stalaktit dan stalagmit yang meneteskan buliran bening air keabadian dan senantiasa tak pernah sepi pengunjung.
Ketika saya berkunjung ke lokasi wisata andalan di kota Tuban ini, begitu memasuki pintu goa langsung disambut penuh keramahan oleh salah satu staf bernama (Bpk Bambang), yang kemudian dengan telaten memandu menjelajahi lorong demi lorong Goa Akbar. Dikatakan oleh Bambang, panjang lintasan lorong yang selalu dijelajahinya bersama para wisatawan itu, lebih kurang 1.100 meter dari lorong masuk hingga keluar.
Dalam beberapa catatan reverensi, penelitian arkeologi, Goa Akbar diperkirakan sudah berusia lebih dari 20 juta tahun. Hal itu ditandai dengan ditemukannya fosil binatang laut seperti kerang di batu-batu dan dinding goa, yang dapat dilihat sendiri oleh setiap wisatawan atau pengunjung goa.
“GOA AKBAR” BERSIH DAN NYAMAN
SEBAGAI tempat wisata, pengelolaan Goa Akbar terbilang sangat bersih dan jauh dari kesan kumuh seperti yang terdapat pada wisata-wisata goa lainnya. Bahkan bau aroma tidak sedap kelelawar yang banyak berdiam di dinding dan celah goa hampir tidak tercium. Ini menandakan bahwa kebersihan goa sangat terpelihara. Udara di dalam goa pun cukup bersih, itu tandanya ventilasi keluar-masuk oksigen telah ditata sedemikian rupa oleh pengelola Goa Akbar, sehingga menjamin keselamatan setiap wisatawan.
Bagi Anda yang belum pernah melakukan eksplorasi dalam goa, tak perlu merasa takut tersesat dan tidak dapat kembali. Sebab di samping ada Bapak Bambang yang akan memandu setiap wisatawan, pengelola juga telah menyediakan jalur khusus yang dengan leluasa dapat dilalui oleh setiap orang dengan aman. Jalur khusus tersebut melintas di atas cekungan-cekungan goa yang dipenuhi sumber air dengan aneka ikan air tawar yang berenang ke sana kemari di bawah temaram lampu khusus di setiap bagian atap goa, sehingga kian menambah ketenangan siapa yang memandangnya.
Lintasan jalan dibuat mengikuti kelokan dalam goa itu terbuat dari paving block atau sebagian lagi dibeton menyerupai jembatan dengan pembatas pagar besi tanpa karat di kanan-kiri lintasan. Sepanjang perjalanan, tanpa pernah lelah, Pak Bambang mengurai sejarah dan legenda perihal lorong atau ruang dalam goa. Dari paparan pria yang masih tampak sehat itu, jika dinalar-nalar ada benarnya juga. Termasuk tentang letak Goa Akbar sebagai titik utama Kota Tuban.
Goa Akbar memang merupakan tempat yang sangat penting. Di samping sebagai tempat wisata, juga sebagai tempat pengkajian ilmu pengetahuan, baik sejarah, arkeologi, maupun ziarah agama.
Sebelum dikelola oleh Dinas Pariwisata Kabupaten Tuba, Goa Akbar semula hanyalah sebuah lubang tempat pembuangan sampah penduduk sekitar. Pada tahun 1996, setelah dilakukan survei kelayakan dan persiapan pendukung lainnya, akhir lokasi tersebut direnovasi.
Wisata Goa Akbar biasanya dijadikan satu dalam paket wisata Ziarah Walisongo. Biasanya, para peziarah setelah mengunjungi makam Sunan Bonang yang terletak di sebelah Masjid Agung Tuban, tujuan berikutnya adalah Goa Akbar.
Dalam sehari, Goa Akbar tidak kurang dikunjungi oleh lebih dari 500 orang. Apalagi pada hari-hari libur, pengunjung tak pernah sepi. Dengan karcis masuk Rp. 2.000 setiap orang, wisatawan dapat menikmati sisi lain keanggunan alam bawah tanah Goa Akbar Tuban.
Untuk menghilangkan lelah usai menyusuri kedalaman goa, para wisatawan dapat sejenak beristirahat di atas lorong keluar. Di sana telah disiapkan tempat lesehan yang didesaian nyaman penuh nuansa taman. Bagi yang membawa bekal makanan, rasanya pas sekali bila bersantap di tempat ini. Sementara bagi yang ingin menikmati aneka masakan lain, di lokasi ini tersedia juga depot-depot makanan dengan tarif cukup murah.
Bila pada saat memasuki lokasi wisata Goa Akbar Anda belum memperhatikan dengan seksama segala apa yang terdapat di sana, maka ketika hendak keluar lokasi sebaiknya menyempatkan diri memperhatikan kanan kiri gebang masuk. Di sana terdapat deretan relif yang menceritakan sejarah perjalan kota Tuban.
Sementara bagi Anda yang sudah puas menikmati khasanah Goa Akbar, jangan keburu pulang. Sempatkan sejenak mampir ke Pasar Baru Tuban untuk membeli oleh-oleh. Di pasar yang terletak di atas permukaan tanah atas Goa Akbar itu dijual berbagai kebutuhan sehari-hari. Mulai dari makanan hingga pakaian.
Beberapakan makanan tradisional khas Tuban seperti serabi, jumblek, keripik gayam dan lainnya tersedia di sana. Sementara yang menyukai dunia fashion, sesekali bisa melirik kain batik khas Tuban yang bernama Gedok.
Baiklah, akhirnya kini saatnya Anda mengatur jadwal untuk berwisata ke Goa Akbar Tuban bersama keluarga untuk menikmati hari libur. Semoga liburan Anda selalu menyenangkan.
Tips Aman Eksplorasi Goa Akbar
Bagi Anda yang hendak berwisata ke Goa Akbar Tuban sebaiknya memperhatikan beberapa hal berikut:
1. Persiapkan fisik. Jarak tempuh yang akan Anda lewati selama melintasi lorong-lorong dalam goa kurang lebih 1.100 meter dengan beberapa tanjakan dan turunan. Oleh sebab itu diperlukan fisik cukup kuat untuk menempuh perjalanan dari lorong masuk hingga keluar. Bila lelah, sejenak berhentilah untuk istirahat sambil menikmati panorama dalam goa.
2. Dilarang merokok. Selama memasuki Goa Akbar, siapa pun dilarang merokok. Di samping untuk mempertahankan keaslian aroma goa yang khas, juga untuk menghindari kecelakaan akibat percikan api rokok, serta untuk menjaga kebersihan dan kesehatan. Tanda larangan merokok sudah terpasang di lorong masuk dan beberapa bagian lorong lainnya.
3. Dilarang berbuat mesum. Goa Akbar adalah sarana umum, untuk itu setiap pengunjung diharapkan tetap menjaga tatakrama dan tidak berbuat asusila dalam goa.
4. Patuhi petunjuk jalan. Jangan sekali-kali memasuki goa tanpa ditemani petugas, terutama dalam lorong-lorong khusus yang tidak ditandai. Dan selalu ikuti jalur yang telah ditetapkan pengelola.
5. Jangan membuat kotoran. Demi terpeliharanya keeksotisan goa, jangan sekali-kali membuang kotoran atau sampah.

Ini gambar/foto di wisata Goa Akbar






READ MORE - Wisata Goa Akbar Di Kota Tuban

Asalmu Asal RONGGOLAWE

Ranggolawe (lahir: ? - wafat: 1295) adalah salah satu pengikut Raden Wijaya yang berjasa besar dalam perjuangan mendirikan Kerajaan Majapahit, namun meninggal sebagai pemberontak pertama dalam sejarah kerajaan ini. Nama besarnya dikenang sebagai pahlawan oleh masyarakat Tuban, Jawa Timur sampai saat ini.

Peran Awal
Kidung Panji Wijayakrama dan Kidung Ranggolawe menyebut Ranggolawe sebagai putra Arya Wiraraja bupati Songeneb (nama lama Sumenep). Ia sendiri bertempat tinggal di Tanjung, yang terletak di Pulau Madura sebelah barat.

Pada tahun 1292 Ranggolawe dikirim ayahnya untuk membantu Raden Wijaya membuka Hutan Tarik (di sebelah barat Tarik, Sidoarjo sekarang) menjadi sebuah desa pemukiman bernama Majapahit. Konon, nama Ranggolawe sendiri merupakan pemberian Raden Wijaya. Lawe merupakan sinonim dari Wenang, yang berarti "benang", atau dapat juga bermakna "kekuasaan". Maksudnya ialah, Ranggolawe diberi kekuasaan oleh Raden Wijaya untuk memimpin pembukaan hutan tersebut.

Selain itu, Ranggolawe juga menyediakan 27 ekor kuda dari Sumbawa sebagai kendaraan perang Raden Wijaya dan para pengikutnya dalam perang melawan Jayakatwang raja Kadiri.

Penyerangan terhadap ibu kota Kadiri oleh gabungan pasukan Majapahit dan Mongol terjadi pada tahun 1293. Ranggolawe berada dalam pasukan yang menggempur benteng timur kota Kadiri. ia berhasil menewaskan pemimpin benteng tersebut yang bernama Sagara Winotan.

Jabatan di Majapahit
Setelah Kadiri runtuh, Raden Wijaya menjadi raja pertama Kerajaan Majapahit. Menurut Kidung Ranggolawe, atas jasa-jasanya dalam perjuangan Ranggolawe diangkat sebagai bupati Tuban yang merupakan pelabuhan utama Jawa Timur saat itu.

Prasasti Kudadu tahun 1294 yang memuat daftar nama para pejabat Majapahit pada awal berdirinya, ternyata tidak mencantumkan nama Ranggolawe. Yang ada ialah nama Arya Adikara dan Arya Wiraraja. Menurut Pararaton, Arya Adikara adalah nama lain Arya Wiraraja. Namun prasasti Kudadu menyebut dengan jelas bahwa keduanya adalah nama dua orang tokoh yang berbeda.

Sejarawan Slamet Muljana mengidentifikasi Arya Adikara sebagai nama lain Ranggolawe. Dalam tradisi Jawa ada istilah nunggak semi, yaitu nama ayah kemudian dipakai anak. Jadi, nama Arya Adikara yang merupakan nama lain Arya Wiraraja, kemudian dipakai sebagai nama gelar Ranggolawe ketika dirinya diangkat sebagai pejabat Majapahit.

Dalam prasasti Kudadu, ayah dan anak tersebut sama-sama menjabat sebagai pasangguhan, yang keduanya masing-masing bergelar Rakryan Mantri Arya Wiraraja Makapramuka dan Rakryan Mantri Dwipantara Arya Adikara.

             JANGAN LUPA SETELAH MEMBACA BLOG SAYA,DI COMMENT YA......
READ MORE - Asalmu Asal RONGGOLAWE

PERSATU TUBAN



  DIVISI III BABAK 1
1.) 23 MEI 2010 PERSATU TUBAN vs PERSEM MOJOKERTO
( STADION LOKA JAYA TUBAN ) 2 -1.
2.) 26 MEI 2010 PERSATU TUBAN vs PERSSU SUMENEP
( STADION LOKA JAYA TUBAN ) 3 - 1.
3.) 30 MEI 2010 PERSATU TUBAN vs GRESIK PUTRA
( STADION LOKA JAYA TUBAN ) 2 - 0.
4.) 2 JUNI 2010 PERSEM MOJOKERTO vs PERSATU TUBAN
( STADION A.YANI MOJOKERTO ) 1 - 3.
5.) 6 JUNI 2010 PERSSU SUMENEP vs PERSATU TUBAN
( Kab.SUMENEP ) 1 - 3.
6.) 9 JUNI 2010 GRESIK PUTRA vs PERSATU TUBAN
( Kab.GRESIK ) 4 - 1.

     ( SEMUA PERTANDINGAN BERMAIN PUKUL 14.00 WIB ).
             
           DIVISI III BABAK 2
1.) 1 JULI 2010 PERSATU TUBAN vs BANYUWANGI PUTRA
( STADION LOKA JAYA TUBAN ) 4 - 1.
2.) 2 JULI 2010 MITRA BOLA UTAMA vs TULUNGAGUNG
( STADION LOKA JAYA TUBAN )
3.) 4 JULI 2010 BANYUWANGI PUTRA vs MITRA BOLA UTAMA(SIDOARJO)
( STADION LOKA JAYA TUBAN )
4.) 5 JULI 2010 TULUNGAGUNG vs PERSATU TUBAN ( STADION LOKA JAYA TUBAN )
5.) 7 JULI 2010 BANYUWANGI PUTRA vs TULUNGAGUNG
( STADION LOKA JAYA TUBAN ) 0 - 2.
6.) 8 JULI 2010 PERSATU TUBAN vs MITRA BOLA UTAMA
( STADION LOKA JAYA TUBAN ) 1 - 1.
              ( SEMUA PERTANDINGAN BERMAIN PUKUL 14.00 WIB ).

-Info terbaru saat pertandingan PERSATU TUBAN-MITRA  BOLA UTAMA(SIDOARJO) pada tanggal 8 juli 2010,sebagai berikut ;
    Tadi sore pertandingan PERSATU TUBAN vs MITRA BOLA UTAMA (SIDOARJO) sekitar pukul 15.15 Wib sudah terlihat dari awal pertandingan babak pertama & PERSATU pada babak pertaman ungggul 1 angka 1-0 & pertandingan babak kedua makin menjadi jadi keributan yg di awali oleh pelanggaran-pelanggaran yg tak pantas di lakukan oleh pemain sidoarjo yg bernomer punggung (23) melakukan pelanggaran yg tidak pantas di lakukan pada pemain PERSATU TUBAN & memancing emosi para suporter PERSATU yg biasa di kenal & di sebut ROMANIA!!
Slah suporter masuk ke dalam lapangan memukul pemain sidoarjo yg melakukan pelangggaran tersebut,& suporter PERSATU lainnya juga semakin banyak yg masuk ke lapangan untuk mehakimi pemain tersebut,yg lebih gilanya lagi pelatih PERSATU TUBAN & sidoarjo hampir adu jotos tapi untung saja pihak keamanan langsung bertidak tegas.
Para suporter pun tidak henti"nya memaki semua pemain & pelatih sidoarjo!
Pada menit-menit akhir wasit memberi penalty kepada pemain sidoarjo,jadi kedudukan 1-1 sampai pertandingan berakhir.
Makin melunjak lunjak suporter PERSATU,wasit pun tak henti"nya dapat makian dari para suporter & para suporter PERSATU mengancam akan menghadang pemain sidoarjo pada saat perjalanan pulang,para suporter pun akan melempari batu pada bus pemain sidoarjo.

             BUAT SEMUA TEAM PERSATU TUBAN: jangan putus asa semua orang TUBAN akan selalu mendukungmu apapun yang terjadi!!!
Kita tidak kalah kedudukan kita imbang & andai pun tadi kita kalah,kita masih lolos ke tahap berikutnya,karena kita sudah menang 2 kali.






                Dapatkan info-info yang selalu di update & akurat hanya di http://tuban-ronggolawe.blogdpot.com

 
READ MORE - PERSATU TUBAN

Banjir Bandang Terjang Kota Tuban

Tuban - Hujan deras yang mengguyur Kota Tuban sejak pukul 11.30 WIB, menyebabkan banjir bandang di wilayah Kecamatan Semanding dan Kecamatan Kota, Kabupaten Tuban, Selasa (30/3/2010) pukul 16.30 WIB.

Akibat tumpahan air bah dari lereng bukit kapur di wilayah Kecamatan Semanding -sisi selatan kota-, sejumlah ruas jalan di Kota Tuban tergenang. Air bercampur tanah berwarna kemerahan meluber dengan ketinggian 50 cm hingga 1 meter. Belum ada laporan adanya korban dari peristiwa di petang hari itu.

Ruas jalan yang tergenang diantaranya, beberapa titik di Jalan Wahidin Sudiro Husodo, Jalan Gajah Mada, Jalan Pramuka, Jalan Manunggal selatan, Jalan Brawijaya hingga menembus Jalan Basuki Rahmad. Arus kendaraan dari Surabaya ke Semarang yang melintas kawasan Jalan Wahidin Sudiro Husodo merangkak.

Sedangkan desa-desa yang diterjang banjir diantaranya, Desa Bektiharjo, Desa Prunggahan Kulon, Desa Tegalagung dan Kelurahan Karang semuanya di wilayah Kecamatan Semanding. Air juga masuk wilayah Desa Kembangbilo, Sumurgung dan Kelurahan Kebonsari, Sendangharjo dan kelurahan Sidorejo, semuanya di wilayah Kecamatan Kota.

Datangnya banjir bandang sudah diduga warga, karena kejadian serupa telah berlangsung pada Jumat (29/1/2010) lalu. Penyebabnya sama, melibernya air dari Sungai Karang dan saluran pembuangan di Desa Kembangbilo. Kedua sungai ini relatif berkapasitas kecil, sehingga begitu air bah datang akibat gundulnya hutan di Semanding tak mampu
menampung air.

Sejumlah warga yang ditemui Detiksurabaya.com menyatakan, mereka telah melakukan antisipasi terjadinya banjir bandang dengan menyelamatkan harta benda. Begitu air memasuki permukiman tidak lagi ada harta benda yang hanyut.

"Ini kejadian kedua setelah akhir bulan Januari lalu. Banjir bandang ini akibat penambangan batu kapur yang makin ramai di wilayah Semanding," tegas Muhammad Subakir (41), warga Kelurahan Karang, Kecamatan Semanding, Tuban saat ditemui berjaga di depan rumahnya yang tergenang air bah.

Hujan deras hingga petang ini yang tak kunjung reda di wilayah perbukitan Semanding, makin menyulitkan warga. Air semakin naik hingga mencapai pusar orang dewasa di wilayah Kelurahan Karang dan Desa Tegalagung. Banyak rumah warga yang rusak akibat terjangan air bah.

Sungai Karang yang airnya meluber membentang sepanjang 5,5 KM, melewati Kecamatan Semanding dan Kecamatan Kota Tuban. Sungai ini bermuara dari Desa Bektiharjo dan berakhir di Kali Joyo, di wilayah Kelurahan Karangsari, Kecamatan Kota, sebelum masuk ke laut.

http://detiksurabaya.com
READ MORE - Banjir Bandang Terjang Kota Tuban