Thursday, February 27, 2014

12.1 MATH

A tessellation is a pattern made of identical shapes. You can make your own tessellation by fitting copies of a shape together, without gaps or overlaps. You say the shape tessellates, or is a tessellating shape.

Here are some examples of shapes that tessellate with themselves and not with them self=


When you make a tessellation are made by repeating a shape and using half-turn rotations of the same shape. For examples, this triangleand a half-turn rotation of the same trianglefit together exactly to make a tessellation like this. 
In any tessellation, the sum of the angles at the point where the vertices of the shape is 360°



12.4 MATH

When you enlarge a shape, all the lengths of the shape increase in the same proportion. This is called a scale factor. All the angles in the shape must stay the same.



When you describe an enlargement you must give:
-scale factor of the enlargement
-position of the centre of enlargement

Clean Water Shortage -Another group assignment / SOSE&ENGLISH&TEAMWORK

A shout for a help from Indonesia

As one of the least clean water supplied province, Papua -Bovendigoel surely needs a help from us Indonesians as it is part of our country too. The clean water supply in Papua is surely low in many areas. As having clean water only twice a week in which defines it is lack of clean and hygienic water. Us PTW.org (short for Pure The Water organisation) are here to start a help for our brothers and sisters in Papua.

Our aim is to help the people of Papua -Bovendigoel as they are one of the least clean water supplied region as well as helping improve their environment. Many may have been a victim of the disease that they consume of contaminated water that they take without any warning. And this is also a big cause of their death. To solve this problem is to pure the water. And our solution is exactly what the previous sentence have said, we use PureIt by Unilever Indonesia to help pure the water.

As we know that the cost of PureIt is not as cheap as buying a water bottle, there is a high possibility for us to ask you to help too by donating some funds or even better, donating some PureIt to help more people and more children in the Papua Bovendigoel. We would also like to ask help from the original company of PureIt which is Unilever to give a hand to ease this process of helping them.

At the time that when this problem will hopefully one day soon to be solved, many lives will hold on and families won't have to worry for water supply because water for them will be like for us -it will only be a tap away. And we can give them a better chance of a better and brighter future. There are so much that have suffered this and none of us really notice but expectantly, you will notice and help.

Let's all open our eyes and focus our hearing for there is a shout from Papua, a part of Indonesia that is asking for our help.

-PTW.org

By: Zahra, Raissa, Atifa, Kyla, Tsamara -Students of Al-Taqwa College Indonesia

Monday, February 17, 2014

Letter for the up coming president (english project)

Assalamualikum wr wb.

  Dear Jokowi,
As the upcoming president of this country, Indonesia, i would like to request some models of deduction. As you know, this beautiful country of  ours ha too many imperfection that could be easily changed. 

Here are some the ideas i would like to talk about: 
  • As you know, our neighboring country Singapore has high taxes, so should we with the higher tax we could have more clean water or a cleaner city.
  • With, higher tax public transportation could be more save and possible. If you think it over it could be more help full for the environment. By allowing many people to ride an one bus instead of many car being used.
  • I cant make up my mind about whether  more job opportunities should be opened up for people living below poverty, or that foundation should open up to provide for poor people.
  • As with the rate of population in Jakarta we should talk it over with others about how the rules should be changed so that people will obey the more strict rules.
  • The traffic wont go away bye it self need to be a huge change in the law of selling auto cars, such as for example, such as one family should have one car or for more cars they should be proper certificate. 
In  closed with this letter, i hereby state that there are many things that you as the up coming president could try to do or change, because this country has large population. 
wassalamualikum wr wb. 
Made by : Atifa Anuz and Kyla Aulia :) year 9 

Thursday, February 13, 2014

IT project

TCP / IP 
Definition: Transmission Control Protocol (TCP) and Internet Protocol (IP) are two distinct network protocols, technically speaking. TCP and IP are so commonly used together, however, that TCP/IP has become standard terminology to refer to either or both of the protocols.
IP corresponds to the Network layer (Layer 3) in the OSI model, whereas TCP corresponds to the Transport layer (Layer 4) in OSI. In other words, the term TCP/IP refers to network communications where the TCP transport is used to deliver data across IP networks.
The average person on the Internet works in a predominately TCP/IP environment. Web browsers, for example, use TCP/IP to communicate with Web servers.
used to connect hosts on the Internet. TCP/IP uses severalprotocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Evennetwork operating systems that have their own protocols, such asNetware, also supportTCP/IP. 

Resource usage

Most implementations allocate an entry in a table that maps a session to a running operating system process. Because TCP packets do not include a session identifier, both endpoints identify the session using the client's address and port. Whenever a packet is received, the TCP implementation must perform a lookup on this table to find the destination process. Each entry in the table is known as a Transmission Control Block or TCB. It contains information about the endpoints (IP and port), status of the connection, running data about the packets that are being exchanged and buffers for sending and receiving data.
The number of sessions in the server side is limited only by memory and can grow as new connections arrive, but the client must allocate a random port before sending the first SYN to the server. This port remains allocated during the whole conversation, and effectively limits the number of outgoing connections from each of the client's IP addresses. If an application fails to properly close unrequired connections, a client can run out of resources and become unable to establish new TCP connections, even from other applications.
Both endpoints must also allocate space for unacknowledged packets and received (but unread) data.

Data transfer

There are a few key features that set TCP apart from User Datagram Protocol:
  • Ordered data transfer — the destination host rearranges according to sequence number
  • Retransmission of lost packets — any cumulative stream not acknowledged is retransmitted
  • Error-free data transfer
  • Flow control — limits the rate a sender transfers data to guarantee reliable delivery. The receiver continually hints the sender on how much data can be received (controlled by the sliding window). When the receiving host's buffer fills, the next acknowledgment contains a 0 in the window size, to stop transfer and allow the data in the buffer to be processed.
  • Congestion control 

Reliable transmission

TCP uses a sequence number to identify each byte of data. The sequence number identifies the order of the bytes sent from each computer so that the data can be reconstructed in order, regardless of any fragmentation, disordering, or packet loss that may occur during transmission. For every payload byte transmitted, the sequence number must be incremented. In the first two steps of the 3-way handshake, both computers exchange an initial sequence number (ISN). This number can be arbitrary, and should in fact be unpredictable to defend against TCP sequence prediction attacks.
TCP primarily uses a cumulative acknowledgment scheme, where the receiver sends an acknowledgment signifying that the receiver has received all data preceding the acknowledged sequence number. The sender sets the sequence number field to the sequence number of the first payload byte in the segment's data field, and the receiver sends an acknowledgment specifying the sequence number of the next byte they expect to receive. For example, if a sending computer sends a packet containing four payload bytes with a sequence number field of 100, then the sequence numbers of the four payload bytes are 100, 101, 102 and 103. When this packet arrives at the receiving computer, it would send back an acknowledgment number of 104 since that is the sequence number of the next byte it expects to receive in the next packet.
Also Known As: Transmission Control Protocol / Internet Protocol
WAN TECHNOLOGY 
WANs are all about exchanging information across wide geographic areas. They are also, as you can probably gather from reading about the Internet, about scalability—the ability to grow to accommodate the number of users on the network, as well as to accommodate the demands those users place on network facilities. Although the nature of a WAN—a network reliant on communications for covering sometimes vast distances—generally dictates slower throughput, longer delays, and a greater number of errors than typically occur on a LAN, a WAN is also the fastest, most effective means of transferring computer-based information currently available.

Circuit Switching

Circuit switching involves creating a direct physical connection between sender and receiver, a connection that lasts as long as the two parties need to communicate. In order for this to happen, of course, the connection must be set up before any communication can occur. Once the connection is made, however, the sender and receiver can count on "owning" the bandwidth allotted to them for as long as they remain connected.
Although both the sender and receiver must abide by the same data transfer speed, circuit switching does allow for a fixed (and rapid) rate of transmission. The primary drawback to circuit switching is the fact that any unused bandwidth remains exactly that: unused. Because the connection is reserved only for the two communicating parties, that unused bandwidth cannot be "borrowed" for any other transmission.
The most common form of circuit switching happens in that most familiar of networks, the telephone system, but circuit switching is also used in some networks. Currently available ISDN lines, also known as narrowband ISDN, and the form of T1 known as switched T1 are both examples of circuit-switched communications technologies.

Message Switching

Unlike circuit switching, message switching does not involve a direct physical connection between sender and receiver. When a network relies on message switching, the sender can fire off a transmission—after addressing it appropriately—whenever it wants. That message is then routed through intermediate stations or, possibly, to a central network computer. Along the way, each intermediary accepts the entire message, scrutinizes the address, and then forwards the message to the next party, which can be another intermediary or the destination node.
What's especially notable about message-switching networks, and indeed happens to be one of their defining features, is that the intermediaries aren't required to forward messages immediately. Instead, they can hold messages before sending them on to their next destination. This is one of the advantages of message switching. Because the intermediate stations can wait for an opportunity to transmit, the network can avoid, or at least reduce, heavy traffic periods, and it has some control over the efficient use of communication lines.
wan01

Examples ofWide Area Network Technologies

Examples of Wide Area Network Technologies Created by Edraw!
Wide Area NetworkCisco WAN NetworkWAN Topology
Wide Area NetworkCisco WAN NetworkWAN Topology
Virtual private network (VPN) is a tecnology widely used in a public switched network (PSTN) to provide private and secured WAN for an organization. VPN uses encryption and other techniques to make it appear that the organisation has a dedicated network, while making use of the shared infrastructure of the WAN.
WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Key technologies often found in WANs include SONET, Frame Relay, X.25, ATM and PPP.
  • ATM: A dedicated-connection switching technology that organizes digital data into 53-byte cell units. Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path. Speeds on ATM networks can reach 10 Gbps.
  • Frame Relay: (FR). A high-speed packet-switched data communications service, similar to X.25. Frame relay is widely used for LAN-to-LAN interconnect services, and is well suited to the bursty demands of LAN environments.
  • SONET/SDH: Synchronous Optical Network is an international standard for high speed communication over fiber-optic networks. The SONET establishes Optical Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher. Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.
  • X.25: The X.25 protocol allows computers on different public networks to communicate through an intermediary computer at the network layer level.
  • PPP: A point-to-point link provides a single, pre-established WAN communications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only.
IP can also be considered as a WAN technology in the packet switching environment.

Symbols of Network Architecture

Some network mapping symbols for network engineer. Provide a Common Graphics Technology for Network Mapping.
network symbols

DNS
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorizeddomain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The Domain Name System is an essential component of the functionality of the Internet.
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnamesinto IP addresses. For example, the domain name www.example.com translates to the addresses 93.184.216.119 (IPv4) and 2606:2800:220:6d:26bf:1447:1097:aa7 (IPv6). Unlike a phone book, the DNS can be quickly updated, allowing a service's location on the network to change without affecting the end users, who continue to use the same host name. Users take advantage of this when they use meaningful Uniform Resource Locators(URLs), and e-mail addresses without having to know how the computer actually locates the services.
The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their supported domains, and may delegate authority over subdomains to other name servers. This mechanism provides distributed and fault tolerant service and was designed to avoid the need for a single central database.
The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in DNS, as part of the Internet Protocol Suite.
The Internet maintains two principal namespaces, the domain name hierarchy and the Internet Protocol (IP) address spaces. The Domain Name System maintains the domain name hierarchy and provides translation services between it and the address spaces. Internet name servers and a communication protocol implement the Domain Name System. A DNS name server is a server that stores the DNS records for a domain name, such as address (A or AAAA) records, name server (NS) records, and mail exchanger (MX) records (see also list of DNS record types); a DNS name server responds with answers to queries against its database.


resources: http://compnetworking.about.com/cs/basictcpip/g/bldef_tcpip.htm , http://www.webopedia.com/TERM/T/TCP_IP.html , http://en.wikipedia.org/wiki/Transmission_Control_Protocol , http://technet.microsoft.com/en-us/library/bb962087.aspx , http://www.edrawsoft.com/Wide-Area-Network.php , http://en.wikipedia.org/wiki/Domain_Name_System

Saturday, January 25, 2014

math CHAPTER 11

CHAPTER 11 PERCENTAGES
·      11.1 à some percentages are easy to find because they are simple fractions. they are example of these on the first page of this unit, you can use the easy ones to work out more complicated percentages. You can often do this quite easily. You do not always need a calculator.
·      Example:
Ø there are 4600 people in a stadium. 58% are males. How many is that ?
100%=4600
58%= 50%+10%-2%--> these all the easy percentages to find.
50%=2300à 50%=1/2
10%=460à1/10 is easy. Just divide by 10
1%46àdivide 10% by 10 to find 1
58%= 2300+460-(2x46)= 2668 à do this sum in your head / on your paper.
Otherà you could have found 50%+5%+3%. Is that easier? J

Ø 90% of 320=?--> 320-3.2= 316.8
Ø show that 20% of 45 is the same as 45% of 20.
  So,   and     the result both of them are same.
·        11.2 à you will often need to compare groups that are different sizes. Suppose that, in one school, 85 students took an exam and 59 passed. In another school, 273 students took an exam and 147 passed. Which school did better? It’s hard to say because each school had a different number of students. The worked example shows how to use percentages to help to answer question like this.
·      Example:
Ø    In school A, 85 students took a mathematics exam and 59 passed.in school B 237 students took a mathematics exam and 147 passed. Which school had better pass rate?
59 out of 85 = 59 ÷ 85 = 69%  à  59 ÷ 85 = 0,694... =69% to the nearset whole number.
147 out of 237 = 147 ÷ 237 = 62%  à 147 ÷ 237 = 0,620.. =62%  to the nearset whole number.
The pass rate in school B is better by seven percentages points. à the difference between 62% and 69% is given on ‘percentages points.’


·       11.3 you can use percentages to describe a change in a quality. It could be an increase or a decrease. a percentages change is always calculated as apercentages f the initial value. The initial value is 100%. It is impothant to choose the correct value to be 100%



Wednesday, January 15, 2014

Topology of Network

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topologyshows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical.
A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network.
DiagramKind of TopologyDescription, Advantages, and Disadvantages
RingDescription:
  • Devices are connected from one to another to form a ring shape.
  • Each host is connected to the next and the last node is connected to the first.
  • A data token1 is used to grant permission for each computer to communicate.
Advantages:
  • Easy to install and wire.
  • Because every computer is given equal access to the token, no one computer can monopolize the network.
Disadvantages:
  • Requires more cable than a bus topology.
  • If one computer fails it can affect the whole network.
  • It is difficult to identify the problem if the entire network shuts down.
BusDescription:
  • All hosts are connected to the backbone cable in a linear2 fashion.
Advantages:
  • Easy to connect a computer or peripheral.
  • Requires less cable length than a star topology.
Disadvantages:
  • If there is a break in the backbone cable, the entire network shuts down.
  • Both ends of the backbone cable require terminators.
  • It is difficult to identify the problem if the entire network shuts down.
StarDescription:
  • All hosts are connected to a single point of concentration.
  • Usually uses a hub3 or switch4 as a center node.
  • Range limits are about 100 meters from the hub
  • Data on a star network passes through the hub or concentrator before continuing to its destination.
Advantages:
  • It is easy to modify and add new computers to a star network without disturbing the rest of the network.
  • If one node or workstation (beside the middle node) goes down, the rest of the network will still be functional.
  • The center of a star network is a good place to figure out where the network faults are located.
  • You can use several cable types in the same network if the hub you have can handle multiple cable types.
Disadvantages:
  • Requires more cable than a bus topology.
  • If the middle node goes down , then the entire network goes down.
  • It is more expensive than because all cables must be connected to one central point.
MeshDescription:
  • Each host is connected to all the other hosts.
Advantages:
  • Increased reliability since there are multiple paths for each node to take.
  • Increased speed since shortcuts have been created by add more cables/links.
Disadvantages:
  • The cost of cabling all the hosts together is expensive and time consuming.
more deep explanation of some like up diagram :) 

Bus Topology

Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.

Ring Topology

In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.


Star Topology

Many home networks use the star topology. A star network features a central connection point called a "hub node" that may be a network hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)



RESOURCES : http://www.sis.pitt.edu/~icucart/networking_basics/networking_topology.html , http://en.wikipedia.org/wiki/Network_topology , https://www.google.com/search?output=search&sclient=psy-ab&q=type+of+topology&btnK= , http://compnetworking.about.com/od/networkdesign/a/topologies.htm , http://whatis.techtarget.com/definition/network-topology

Sunday, January 12, 2014

mobile technology and IT technology

Mobile technology is the technology used for cellular communication. Mobile code division multiple access (CDMA) technology has evolved rapidly over the past few years. Since the start of this millennium, a standard mobile device has gone from being no more than a simple two-way pager to being a mobile phoneGPS navigation device, an embedded web browser and instant messaging client, and a handheld game console. Many experts argue that the future of computer technology rests in mobile computing with wireless networking. Mobile computing by way of tablet computers are becoming more popular. Tablets are available on the 3G and 4G networks.Android 2.2 Froyo, 2.3 Gingerbread, and 4.0 Ice Cream Sandwich on the other hand, continue their decline. All three versions dropped their cut of the overall distribution. Gingerbread and Ice Cream Sandwich were the biggest losers with 2.9% and 1.7% drops respectively, which is actually more than they lost last month, hinging at updates intensifying.
Curiously, Android 3.2 Honeycomb is still refusing to disappear form the map. The tablet-only Android version continues to sit on a 0.1% share – it has been there for a few months now.A mobile phone (also known as a cellular phone, cell phone, and a hand phone) is a device that can make and receive telephone calls over aradio link while moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. By contrast, a cordless telephone is used only within the short range of a single, private base station.
In addition to telephony, modern mobile phones also support a wide variety of other services such as text messagingMMSemail, Internet access, short-range wireless communications (infraredBluetooth), business applications, gaming and photography. Mobile phones that offer these and more general computing capabilities are referred to as smartphones.





Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data,often in the context of a business or other enterprise The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, such as computer hardwaresoftwareelectronicssemiconductorsinternettelecom equipmente-commerce and computer services.Technology (from Greek τέχνηtechne, "art, skill, cunning of hand"; and -λογία is the making, modification, usage, and knowledge of tools,machines, techniques, craftssystems, and methods of organization, in order to solve a problem, improve a pre-existing solution to a problem, achieve a goal, handle an applied input/output relation or perform a specific function. It can also refer to the collection of such tools, including machinery, modifications, arrangements and procedures. Technologies significantly affect human as well as other animal species' ability to control and adapt to their natural environments. The term can either be applied generally or to specific areas: examples include construction technologymedical technology, and information technology.



resources:http://en.wikipedia.org/wiki/Mobile_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://www.gsmarena.com/android_in_december_2013_kitkat_jelly_bean_on_the_rise-news-7540.php,http://en.wikipedia.org/wiki/Mobile_phone,http://en.wikipedia.org/wiki/Technology,http://www.nytimes.com/pages/technology/,http://www.infoworld.com/news

Math. retype chapter 10.1-10.2 (presenting data)

10.1 calculating statistics.

      you can use statistics to summarise sets of data. you can also use them them to compare different sets of       data. you should already be able to calculate three different averages: the median and the mean.
      remember that the range is not an average. it measures how spread out of set of value or number is.
      for a large set of data is not practical to list every number separately. instead, you can record the data in         frequency data.

The mode is the most common value or number.
The median is the middle value, when they are listed in order.
The mean is the sum of all values divide by the number of value.

The range is the largest value minus the smallest.

A frequency is any table that records how often (frequently data occur.


example: 
the table shows the number of beads on 200 necklaces
Number of beads
25
30
35
40
45
50
frequency
34
48
61
30
15
12
 a. find the mode  b. find the mean  c. find the range

a. the mode is 35 à the mode is the number with the highest frequency
b. 6900÷200= 34.5 à (25 x 34 x 48 + 35 x 61 + 40 x 30 + 45 x  15 + 50 x  12 )÷ the sum of  all the frequencies. This is a reasonable answer because its near the middle of all the possible number of beads.
c. 50-25=25 this is the difference between the largest and smallest number of beads.



10.2 using statistics

    now you can work out several different statistical measures. in a real situation, you need to decide which       one to use. if you want to measure how spread out of a set of measurement is, the range is the most useful    statistics. if you want to find a representative measurement, you need an average. should it be the mode,        the median or mean? that depends on the particular situation. here is the summary to help you decide which    average to choose. 
  • choose the mode if you want to know which is the most commonly occurring number. 
  • the median is the middle value, when the data values are put in order.half the numbers are greater than the median and half the numbers are less than the median.
  • the mean depends on every value. if you change one number you change the mean
example:
here are the ages, in years, of the players in a football team. work out the average age.give a reason for your choice of averages.
16,17,18,18,19,20,20,21,21,32,41.
the mode is not a  good choice. --> there are three modes. each has a frequency of only two
the mean will be affected by two oldest people. --> they are much older and will distort the value. in the fact the mean is 22.1 and nine people are younger than this; only two are older.
the median is 20 and this is the best average to use in this case. --> five players are younger than the median and five are older.