BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Khamis, 29 April 2010

hot news,,(harian metro)

Tangisan suara halus

Oleh Nor Hazwani Hamat

2010/04/29
E-mel  Artikel Cetak  Artikel Tanda  Artikel Besarkan Saiz Teks Kecilkan Saiz Teks Komen  Artikel

TANAH MERAH: “Saya terdengar suara jeritan bayi tapi tak tahu di mana. Sebaik membuka pintu rumah, saya terkejut apabila mendapati seorang bayi dibalut dengan kain selimut ditinggalkan di beranda rumah,” kata Sukma Abdullah, 53.

MALANG...bayi yang ditinggalkan
MALANG...bayi yang ditinggalkan
Dia menemui seorang bayi lelaki di rumahnya di Jalan Wan Ahmad, dekat sini, kira-kira jam 12.30 tengah malam semalam.


Menurut Sukma, sebelum itu dia sedang bersiap untuk tidur sebelum dikejutkan dengan suara tangisan bayi.


Katanya, dia yang tinggal berseorangan agak takut kemungkinan diganggu ‘makhluk halus,’ namun sangkaannya meleset apabila dikejutkan dengan kehadiran bayi itu.


“Ketika itu, saya ingin masuk tidur tapi terdengar suara bayi. Saya takut dan turut menyangka tangisan itu adalah anak jiran yang mungkin sakit.


“Saya kemudian memeriksa dalam rumah sebelum membuka tingkap dekat pintu utama. Saya terkejut kerana ternampak ada ‘benda’ di beranda rumah sebelum memberanikan diri membuka pintu untuk melihat dari dekat. Saya terkejut mendapati ia seorang bayi,” katanya.


Sukma berkata, dia yang panik kemudian terus memberitahu jiran berhampiran sebelum menghubungi polis.


Katanya, dia turut hairan bagaimana ada individu boleh meninggalkan bayi di situ sedangkan terdapat ramai orang lalu lalang di depan rumahnya untuk mengunjungi pasar malam.


“Bayi itu ditinggalkan dalam keadaan sempurna dan sihat cuma terdapat sedikit kesan darah,” katanya.

Bayi seberat 3.3 kilogram itu dikatakan baru berusia dua hari dan masih bertali pusat.


Ketua Polis Daerah Tanah Merah, Deputi Superintendan Abdul Aziz Mahmud, berkata, pihaknya bergegas ke tempat kejadian sebaik menerima maklumat awam.


Katanya, bayi terbabit didapati dalam keadaan berbungkus dengan kain tuala dan selimut.


“Bayi terbabit kemudian dibawa ke Hospital Tanah Merah bagi mendapatkan rawatan segera di unit kecemasan sejurus kemudian.

“Setakat ini bayi itu ditempatkan di Wad Penjagaan Kanak-kanak dan suspek masih dicari,” katanya.


Menurutnya, polis turut meminta kerjasama pegawai Pejabat Pelajaran Daerah selain orang ramai untuk membantu siasatan.


“Semakan akan dibuat di sekolah menengah bagi mengenal pasti pelajar yang tidak hadir ke sekolah untuk tempoh beberapa hari dan beberapa klinik swasta sekitar daerah bagi membantu siasatan.


“Mereka mempunyai maklumat boleh menghubungi Inspektor Mardiana di talian 09-9557704,” katanya.

HOW TO INSTALL OFFICE 2007

Step 1: Insert the Microsoft Office 2007 Enterprise CD. If the Setup Wizard does not automatically begin, then click Start > Run > D:\setup.exe

Step 2: Enter the Product Key from the back of the CD jacket. Note: This is a unique code. Please keep in a safe place!

Click Continue.

Step 3: Check the box "I accept the terms of this agreement" and click the Continue button.

Step 4: Choose an installation option, Upgrade (removes Office 2003) or Customize (keeps Office 2003 installed and adds Office 2007, allowing you to use them both).

Note: Outlook 2003 will be uninstalled in either option. Outlook will be updated and your user settings and mail will migrate to the new version.

If you click Upgrade, go on to Step 5.

If you click Customize, go on to Step 4a.

Step 4a: Click the radio button for "Keep all previous versions."

Click the Installation Options tab, left-click the first drop down box and click Run all from My Computer

Click Install Now.

Step 5: Installation will begin. It may take 15-30 minutes to finish.

Step 6: Click Close to complete the installation.

Step 7: The first time you launch any Office program, you will be prompted to activate the software. As long as you have an active Internet connection, choose the default option and click Next.

Step 8: When the activation finishes, click Close.

Step 9: Click OK to finish.

If you have any questions or problems, contact your departmental computing consultant or the Help Desk (84357).

August 16, 2007

Rabu, 28 April 2010

IP Address


An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network, that uses the Internet Protocol for communication between its nodes.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]
The designers of TCP/IP defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995[3] and last standardized by RFC 2460 in 1998.[4] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6).
The Internet Protocol also routes data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a subnetwork. The number of these bits is indicated in CIDR notation, appended to the IP address; e.g., 208.77.188.166/24.
As the development of private networks raised the threat of IPv4 address exhaustion, RFC 1918 set aside a group of private address spaces that may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet.
The Internet Assigned Numbers Authority (IANA), which manages the IP address space allocations globally, cooperates with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet service providers) and other entities.

BeRiTa tErKiNi (28 April 2010)


BATU PAHAT: Penduduk sekitar Bukit Perdana 2 di sini, dilanda kebimbangan apabila kawasan bukit yang ditarah berdekatan rumah tangki air yang memuatkan beribu gelen simpanan air untuk penduduk seolah-olah dibiarkan tanpa kerja baik pulih dilakukan mahupun pengawasan daripada pihak pemaju. Lebih menakutkan kedudukan bukit berkenaan yang dipenuhi batu-batu besar itu tidak sampai 50 meter daripada lapan unit rumah berkembar dua yang baru selesai pembinaannya tetapi belum dimasuki pembelinya dan berselang dengan rumah penduduk yang sudah berpenghuni. Malah, apa yang lebih membimbangkan ketiadaan pagar mahupun hadangan yang dibina bagi menutupi kawasan itu bagi mengelakkan struktur tanah atau batu memasuki kawasan jalan rumah penduduk. Keadaan itu menyebabkan ia mudah dimasuki kanak-kanak, apatah lagi di belakang bukit itu ada kawasan air bukit yang mengalir dan menjadi tumpuan golongan itu bermain atau mandi-manda. Tinjauan mendapati keadaan bukit berkenaan berupaya untuk ‘bergerak’ berikutan batu-batu besar serta tanah di situ kelihatan tidak mampat apatah lagi jika hujan lebat, dibimbangi tragedi tanah runtuh seperti di Bukit Antarabangsa berulang. Penduduk Bukit Perdana, Kamal Muhamad, 60, seorang pesara, berkata kawasan bukit yang ditarah itu merbahaya kepada penduduk setempat apatah lagi rumah tangki taman taman itu terletak betul-betul di tepi cerun bukit berkenaan. “Saya tidak dapat membayangkan apa yang akan berlaku kepada rumah tangki yang memuatkan beribu-ribu gelen air jika ditakdirkan struktur tanah di situ tidak lagi mampu bertahan serta bergerak bersama-sama batu besar berkenaan. Saya pun tidak tahu apakah pembeli rumah di depan bukit yang ditarah itu menyedari apa yang berlaku terhadap bukit di depan rumah mereka. “Sebelum ini kawasan bukit itu dipenuhi pokok menghijau dan keadaan amat nyaman sekali. Saya tidak pasti apa yang mahu dilakukan terhadap bukit itu sehingga ia ditarah, sehingga beberapa lori masuk dan mengangkut tanah sebelum ia ditinggalkan terbiar beberapa minggu lalu,” katanya. George Choo, 46, seorang eksekutif yang tinggal selang beberapa baris daripada kawasan bukit yang ditarah berkenaan berkata, beliau sekeluarga turut berasa bimbang dengan keselamatan mereka. “Saya tidak pasti sama ada bukit itu stabil atau tidak tetapi apabila hujan, air tanah berwarna merah akan mengalir mengotorkan jalan di sini menyebabkan perasaan bimbang jika terjadi tanah runtuh. “Saya harap pihak pemaju atau berkuasa dapat memantau kawasan berkenaan atau seelok-eloknya bina penghadang atau pun kawasan bukit itu dibaiki bagi mengelakkan kejadian buruk berlaku lebih-lebih lagi rumah tangki air itu jelas kelihatan berada di cerun bukit,” katanya. Seorang lagi penduduk, Wan Halimaton Saadiah Mohd Ismail, 28, yang juga suri rumah berkata, kawasan bukit berkenaan menjadi kawasan tumpuan penduduk sekitar disebabkan wujud air terjun mini ekoran air bukit yang mengalir. “Kawasan air bukit mengalir terletak bersebelahan dengan kawasan bukit ditarah itu. Jika dulu saya membiarkan anak saya bermain bersama rakannya, kini saya tidak benarkan lagi berikutan bimbang jika terjadi perkara tidak diingini,” katanya.

Colour code


Central Processer Unit (CPU)


The Central Processing Unit (CPU) or the processor is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. This term has been in use in the computer industry at least since the early 1960s [1]. The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same.
Early CPUs were custom-designed as a part of a larger, sometimes one-of-a-kind, computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. This standardization trend generally began in the era of discrete transistor mainframes and minicomputers and has rapidly accelerated with the popularization of the integrated circuit (IC). The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. Modern microprocessors appear in everything from automobiles to cell phones and children's toys.

internet


The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Most traditional communications media, such as telephone and television services, are reshaped or redefined using the technologies of the Internet, giving rise to services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper publishing has been reshaped into Web sites, blogging, and web feeds. The Internet has enabled or accelerated the creation of new forms of human interactions through instant messaging, Internet forums, and social networking sites.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

Selasa, 20 April 2010

colour code












colour code


straight cable cat5

cross cable (cat5 )


Typically the ports on a hub are MDIX ports. This allows the machine at the other end to utilize its MDI Port (which is what typically a NIC card uses) without the need for a crossover cable. When I say that the ports on the hub are MDIX ports, what I mean is that one of the functions of the hub is to automatically perform the crossover functions, which are required to properly align the cables with each other. When no hub or switch is used, your cable itself must physically perform these crossover functions. To expand on this a little, when using a hub or switch, the Transmit wires on the workstation need to be connected to the Receive wires on the hub; likewise, the Receive wires on the hub need to be connected to the Transmit wires on the workstation. But if you remember what we stated earlier - cables which are run from PC to Hub are 'straight through' type cables. This is because the hub is providing the required crossover functions internally for you. Thus, when you connect two machines together without the use of a hub or switch, a crossover cable is required - because both 'ends' are essentially the same - a NIC Card. The crossover function must take place somewhere, and since there is no hub or switch to do it for you, the cable must. Now that we know what a crossover cable is for, let's talk for a few about types of cabling. The two most common unshielded twisted-pair (UTP) network standards are the 10 Mbit (10BASE-T Ethernet) and the 100Mbit (100BASE-TX Fast Ethernet). In order for a cable to properly support 100 Mbit transfers, it must be rated Category 5 (or CAT 5). This type of low loss extended frequency cable will support 10 Base T, 100 Base-T and the newer 100VG-AnyLAN applications. Other types of cabling include Category 3 which supports data rates up to 16 Mbps, and Category 1 which only supports speeds up to 1Mbps. The cable we are about to make is considered Category 5, and will work on both 10 Mbit and 100 Mbit systems, assuming all components used (cables and jacks) are rated for Category 5. What you need Cable - Be sure the cable(s) you are using is properly rated for CAT 5. It should state clearly on the jacket of the cable, what it is rated at. One option that you have when selecting your cable is to use a pre-made normal 'straight through' cable, and simply whack off one of the ends, and replace with a new "Crossed Over" end. For the purpose of this article, though, we aren't going to go that route. We are going to make the whole thing from scratch - using bulk CAT 5 cable.