Semua ILmu Numpuk di Sini

Blog ini adalah tempat berbagai ilmu di bidang ilmu apa pun, my blog will update every day , if i don't busy^^

Peran Seorang Ayah / Daddy.

Peran seorang Ayah sangat berarti bagi Ku,
Peran ayah yang membuat AKU kuat dan dapat bertahan ,sungguh banyak pelajaran berarti yang di berikan Nya.
iya pun selalu memberikan perlindungan penuh terhadap KU.
walaupun Dia dah lama meninggalkan AKU., tapi ajaran yang di berikannya Nya sangat berarti dan berguna hingga AKU dewasa.

I MISS U Daddy,

answer CCNA 1 Final exam 2011 v4

for answering final exam CCNA 1 2011


1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

X Use the ping 127.0.0.1 command at the command prompt.



2 Refer to the exhibit. Which set of devices contains only intermediary devices?

X A, B, D, G





3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

X only computer D



4 Which password is automatically encrypted when it is created?


X enable secret



5 Which three statements characterize the transport layer protocols? (Choose three.)

X TCP and UDP port numbers are used by application layer protocols.

X TCP uses windowing and sequencing to provide reliable transfer of data.
X TCP is a connection-oriented protocol. UDP is a connectionless protocol.


6 Which type of media is immune to EMI and RFI? (Choose two.)


X 100 Base-FX

X 1000 Base LX


7 Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?


X 192.168.254.1



8 Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.


X 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA


9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

X address translation



10 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?


X issue the no shutdown command on interface FastEthernet 0/1



11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)

X 172.16.4.63 /26

X 172.16.4.191 /26

X 172.16.4.95 /27



12 What are three characteristics of CSMA/CD? (Choose three.)


X A device listens and waits until the media is not busy before transmitting.

X All of the devices on a segment see data that passes on the network medium.
X After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.


13 In a Cisco IOS device, where is the startup-configuration file stored?


X NVRAM



14 A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?


X router



15 Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?


X transport


16 Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login


X The entries specify four Telnet lines for remote access.

X Access will be permitted for Telnet using "c13c0" as the password.


17 Which prompt represents the appropriate mode used for the copy running-config startup-config command ?


X Switch-6J#



18 Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?


X 172.16.128.0 255.255.224.0



19 When must a router serial interface be configured with the clock rate command?


X when the interface is functioning as a DCE device


20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?


X upper-layer connection-oriented protocols



21 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

X enable secret



22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA?


X a terminal emulation program



23 Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1. Which two statements are true about the application layer protocol that is used to make this connection? (Choose two.)


X The connection type is called a VTY session.

X The application name is the same for the service, protocol, and client.


24 The Layer 4 header contains which type of information to aid in the delivery of data?

X service port number



25 Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)

X A single broadcast domain is present

X Five collision domains exist.


26 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?


X IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17



27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)

X segment1

X segment3
X segment4



28 What is true regarding network layer addressing? (Choose three.)


X heirarchical
X uniquely identifies each host

X contains a network portion


29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?


X The packet will be forwarded to the destination host.



30 Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)


X The destination port indicates a Telnet session.
X The return segment will contain a source port of 23.



31 Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?


X 198.133.219.25:80



32 During the encapsulation process, which identifiers are added at the transport layer?


X two applications communicating the data



33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)


X The cable is suitable for use as a Fast Ethernet crossover.

X The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.


34 Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?


X 3



35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?


X The gateway address was assigned a broadcast address.


36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?



X Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable



37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?

X The host's primary domain name server.



38 Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)


X The destination port indicates that an HTTP session has been initiated.
X The data listed is associated with the transport layer.



39 Which of the following are the address ranges of the private IP addresses? (Choose three.)

X 10.0.0.0 to 10.255.255.255

X 172.16.0.0 to 172.31.255.255
X 192.168.0.0 to 192.168.255.255



40 Which two functions of the OSI model occur at layer two? (Choose two.)

X physical addressing


41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers?



X 1024 to 49151



42 As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?

X 255.255.254.0



43 Refer to the exhibit. The tracert command is initiated from PC1 to the destination PC4. Which device will send a response to the initial packet from PC1?

X London



44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?


X Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75



45 Refer to the exhibit. Which logical topology best describes the exhibited network?


multiaccess

X bus <--- True maybe ^^

46 Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem? IP address incorrectly entered network cables unplugged X subnet mask incorrectly entered
network card failure


47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)


X 192.168.18.49
X 192.168.18.52
X 192.168.18.59



48 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

X The address that is assigned to the computer represents private addressing.
X The computer is unable to communicate outside of the local network.

X The prefix of the computer address is /27.



49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?


X leaving Dallas



50 Which of the following OSI layers offers reliable, connection-oriented data communication services?


X transport <<< maybe ^^
network

CCNA 2 final exam 2011

this for your best answer to get certificate CCNA 2 V4

good luck.


Most recent CCNA 2 Final Answers


1.Which of the following are primary functions of a router? (Choose two.)
packet switching

path selection

2.A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a common connection to the Internet that can be shared?

router

3.A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.


4.Refer to the exhibit. A network administrator adds this command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0. What is the result of adding this command?

A static route is established.


5.In a complex lab test environment, a router has discovered four paths to 192.168.1.0/24 via the use of the RIP routing process. Which route will be installed in the routing table after the discovery of all four paths?

R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial0/0/1

6.Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)

The router modifies the TTL field, decrementing it by one.


The router maintains the same source and destination IP.

The router changes the source physical address to the physical address of the exit interface.



7.Refer to the exhibit. Router R1 receives a packet for destination 192.168.1.10. Which route will be preferred for this packet?

through the Fa0/1 interface



8.Refer to the exhibit. Which two routes are level 1 ultimate routes? (Choose two.)

192.168.1.0
192.168.2.0

9.Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?

EIGRP

10.Which statement is true about the metrics used by routing protocols?
A metric is a value used by a particular routing protocol to compare paths to remote networks.



11.Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the show ip route command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?

Compared to RIP, EIGRP has a lower administrative distance.


12.Refer to the exhibit. RIPv1 has been used as a routing protocol on the network. A new 172.16.2.0/24 network has been added on router R2 and configured under the RIP routing process. When will R1 converge?

after R1 receives triggered updates from R2

13.Which two statements are true for link-state routing protocols? (Choose two.)

Routers that run a link-state protocol can establish a complete topology of the network.


The shortest path first algorithm is used.

14.An administrator is configuring Router1 so that it can connect to Router2 by using IP. Which protocol can be used by Router1 to determine the IP address of Router2 when they are directly connected and only Layer 2 connectivity exists between them?

CDP


15.Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)
a CSU/DSU device
a modem



16.What can be determined from the output shown in the exhibit? (Choose two.)

Montgomery has Layer 2 connectivity with Cumberland.

Brant, Fisherman, and Potomac are directly connected to Montgomery.


17.Refer to the exhibit. Which route in the routing table of R1 will be discarded by its neighboring router?

192.168.4.0


18.Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router without entering a password?

The login command was not entered on the console line.


19.Refer to the exhibit. An administrator is attempting to configure a router by copying and pasting the commands that are shown in the exhibit. However, only one of the FastEthernet interfaces is coming up. What is the problem?

Both interfaces are in the same IP subnet.



20.Refer to the exhibit. The network administrator has run the following command on R1.

R1(config)# ip route 192.168.2.0 255.255.255.0 172.16.1.2

What is the result of running this command?

Traffic for network 192.168.2.0 is forwarded to 172.16.1.2.


21.Refer to the exhibit. The command ip route 0.0.0.0 0.0.0.0 S0/0/0 is run on router R2. What are the two results of this command? (Choose two.)

A static route will be updated in the routing table.

The route will be specified as the default route for all networks not defined in the routing table.


22.Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its displayed commands, which statement is true?

The link to the ISP is not advertised by the routing protocol process.

23.The command ip route 192.168.2.0 255.255.255.0 172.16.2.2 was entered into the router. After network changes were made, the new next hop for the 192.168.2.0/24 network is 172.16.5.1. What should an administrator do so that the router will use the new next hop to reach the 192.168.2.0 network?

Negate the original command and enter a new static route with the new next hop.


24.Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?



s 172.16.1.0 is derectly connected , serial
c 172.16.2.0 is derectly connected , serial
c 192.168.2.0 is derectly connected , serial
c 0.0.0.0 is derectly connected , serial 0/0


25.Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are failing between the two routers. What change by the administrator will correct the problem?

Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.

26.Refer to the exhibit. Which combination of network ID and subnet mask can be used to meet the 24 host requirement of the LAN that is attached to Router3?

192.168.0.192/27


27.Refer to the exhibit. The networks that are connected to R1 have been summarized for R2 as 192.168.136.0/21. Which packet destination address will R2 forward to R1?

192.168.142.1

28.A network administrator has been asked to configure a network using a classful IP addressing scheme. Which statement is true about the IP addressing that will be used?


The subnet mask for classful IP addresses can be determined by the value of the first octet of the IP address.


29.Which range of IP addresses will be used by RIPv2, EIGRP, and OSPF routing protocols to send routing advertisements?



11100000 00000000 00000000 00000000 11101111 11111111 11111111 11111111




30.How will a router that is configured with a classless routing protocol determine the subnet mask that should be assigned to routes that are learned from neighboring classless routers?
The subnet mask that is included in the routing updates will be used.


31.Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undefined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.168.4.1.


The 192.168.4.0 network is not included in the RIP configuration of R2.


32.Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)

The missing information for Blank 1 is the command show ip route.

The missing information for Blank 2 is the number 120.

The missing information for Blank 3 is the letter C.

33.Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?

split horizon

34.How does route poisoning prevent routing loops?

Failed routes are advertised with a metric of infinity.



35.Refer to the exhibit. R1 and R2 are both configured with RIPv1. Beginning from global configuration mode, what comand or commands will eliminate RIP updates on the Ethernet segment of R2?

R2# configure terminal
R2(config)# router rip
R2(config-router)# passive-interface FastEthernet0/0

36.Refer to the exhibit. All routers are configured with RIPv2 active on all interfaces. Automatic summarization is in effect. Why does the routing table on R3 include the 209.165.200.228/30 network but not the 172.30.1.0/24 and 172.30.2.0/24 networks?

The 172.30.0.0/16 subnets are discontiguous.


37.Refer to the exhibit. The routers in the exhibit are running the EIGRP routing protocol. What statement is true regarding how packets will travel from the 172.16.1.0/16 network to the 192.168.200.0/24 network?

The router installs all the equal cost paths in the routing table and performs equal cost load balancing to send packets out multiple exit interfaces.

38.Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)

All routes are stable.

The show ip eigrp topology command has been run on R1.

39.Refer to the exhibit. Host A is having problems accessing server A. All routers have the same EIGRP configuration as router RTR_A. What should be done so that host A can access server A?

Add the command no auto-summary on all routers.


40.When would the network administrator use the ip bandwidth-percent eigrp as-number percent command?
when there is a low bandwidth connection


41.Refer to the exhibit. What information can be determined from the displayed output?

Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interface.

42.Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on Router1?

DUAL will query neighbors for a route to network 192.168.1.0.

43.Which statement correctly describes a feasible successor in EIGRP?

It is a backup route that is stored in the topology table.

44.Refer to the exhibit. A network administrator is trying to determine why router JAX has no OSPF routes in its routing table. All routers are configured for OSPF area 0. From the JAX router, the administrator is able to ping its connected interfaces and the Fa0/1 interface of the ORL router but no other router interfaces. What is a logical step that the network administrator should take to troubleshoot the problem?

Use show and debug commands to determine if hellos are propagating.

45.Which of the following are required when adding a network to the OSPF routing process configuration? (Choose three.)

network address

wildcard mask
area ID

46.Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)

Configure the routers in the same area.

Match the hello and dead timers on both routers.

47.A network administrator is analyzing routing update behavior on a network that has both EIGRP and OSPF configured on all routers. Both protocols appear in the output of show ip protocols. However, only EIGRP internal routes appear in the routing tables. Which statement correctly explains the scenario?

The EIGRP protocol has a lower administrative distance than OSPF.

48.Refer to the exhibit. All routers are configured for OSPF area 0. The network administrator requires that R2 always be the DR and maintain adjacency.

Which two configurations can achieve this? (Choose two.)

Change the priority values of the Fa0/0 interfaces of R1 and R3 to 0.
Configure a loopback interface on R2, with an IP address higher than any IP
address on the other routers.


49.Refer to the exhibit. A network administrator has configured OSPF using the following command:

network 192.168.1.32 0.0.0.31 area 0

Which router interface will participate in OSPF?

Serial0/0/0

50.Which two statements are true for OSPF Hello packets? (Choose two.)

They are used for dynamic neighbor discovery.
They are used to maintain neighbor relationships.

karaoke ria di blog saya.

ini lirick lagu nya :

Hey jude Lyrics
Artis : THe Beatles

Hey Jude don't make it bad
Take a sad song and make it better
Remember to let her into your heart
Then you can start to make it better

Hey Jude don't be afraid
You were made to go out and get her
The minute you let her under your skin
Then you begin to make it better

And any time you feel the pain, Hey Jude, refrain
Don't carry the world upon your shoulders
For well you know that it's a fool who plays it cool
By making his world a little colder
Da da da da da
da da da da

Hey Jude don't let me down
You have found her now go and get her
Remember to let her into your heart
Then you can start to make it better

So let it out and let it in
Hey Jude begin
You're waiting for someone to perform with
And don't you know that it's just you
Hey Jude you'll do
The movement you need is on your shoulder

Da da da da da
da da da da Yeah

Hey Jude don't make it bad
Take a sad song and make it better
Remember to let her under your skin
Then you'll begin to make it better
Better, better, better, better, better, Yeah,Yeah,Yeah


eeetttsss...
sebelum nyanyi putar ini dulu :D



hahahahhahaha....
selamat mencoba.

Samsung GT-I5503 Galaxy 5 Ponsel Android Murah

Karena persaingan ponsel pintar yang begitu ketat, dibarengi dengan harga yang murah, samsung tidak kalah dalam persaingan dan mengeluarkan ponsel I5503 Galaxy 5 dengan sistem operasi Android 2.1 Eclair, dan di bekali prosesor 600 MHZ. Dari segi desain ponsel ini identik dengan ponsel layar sentuh dari Samsung yaitu Corby. Kamera yang di benamkan, hanya 2 Mp. Ponsel ini di bandrol dengan harga Rp : 1.985.000. Dengan harga murah I5503 Galaxy 5 sudah terbilang sangat bagus dan diharapkan ponsel ini mampu menembus pasar.

samsung GT-I5503 Galaxy 5

Berikut spesifikasi lengkap samsung GT-I5503 Galaxy 5

Plants vs. Zombies Get Gold

Plants vs . Zombies Get Gold
Bagi kawan-kawan yang hobby nya main game Plants vs. Zombies saat jam pratikum kuliah, ini saya ada cara untuk dapatkan gold yang banyak.
sangat mudah untuk mendapatkan gold dari Plants vs. Zombies.
ini saya kasih tutorial nya. :D

Metode Stop motion bikin video lebih menarik ( tutorial )

                                                       Cara Membuat Stop Motion Movie
Ini sebenernya agak menyimpang dari Photoshop, tapi gak-apa-apa lah.. hanya sekedar pengetahuan aja..
Stop motion movie adalah Video yang dibuat dengan potongan-potongan gambar yang saling berhubungan satu sama lain nya..

Vario Modification ( velg low rider, chrome , airbrush)

Vario
HONDA VARIO PENULIS.
Dengan bermodalkan Velg low rider , chrome dan airbrush vario yang dasarnya emang sudah enak dilihat bakalan tambah enak di lihat dan gak membosankan ( ada yang bilang obat jenuh ), apalagi vario adalah jenis motor tampa gigi (alias ompong) jadi gak perlu repot2 ganti2 gigi atau pun ngatur2 kopling . 
walaupun vario saya belum banyak mengalami modification , tapi udah enak di lihat kok.
modif nya di angsur-angsur ^_^.

ada sedikit langkah nih untuk upgrade HV .
Step by Step Upgrade HV
Honda Vario (HV) merupakan varian motor matik yang memiliki beberapa keunggulan di kelasnya. Disamping penampilan yang elegan, kehadiran sosok radiator (pendingin mesin) juga menjadi salah satu factor plus. Akan tetapi, faktor radiator tersebutlah yg menjadi bomerang bagi para speed freaker. Karna membuat (HV) jadi sangat terbatas untuk rubahan-rubahan di sektor mesin. Alhasil banyak sebagian dari konsumen pemilik HV yang hanya merubah performa HV-nya hanya pada sektor-sektor tertentu contohnya seperti merubah performa pada sektor CVT. Akan tetapi rubahan-rubahan tersebut kadang mengecohkan kita, maksud hati ingin mengganti part ORI dengan part Racing Aftermarket tapi justru performa malah semakin berkurang.

Perlu diingat, Sektor CVT hanyalah penyambung tenaga dari mesin untuk menggerakkan roda. Jadi jangan berharap bahwa dengan mengganti part-part tertentu akan membuat HV semakin kencang.Penggantian part-part aftermarket/racing di sektor CVT dilakukan hanya untuk memaksimalkan kinerja CVT bukan untuk menambah kekuatan motor.

Tanpa basa basi, saya akan menjelaskan sedikit step by step upgrade CVT yang benar, sehingga kita dapat mengendarai HV kita semaksimal mungkin.
langkah 1
Mau ubahan yang simple dan praktis. Ini lah salah satu perangkat pertama yg harus diganti. Roller standar HV adalah 13 gr. Konsumen dapat mengaplikasikan sesuai selera. Untuk akselerasi biasanya roller di ubah menjadi lebih ringan (9/10 gr), untuk top speed biasa diganti menjadi lebih berat (14/15 gr). Tapi perlu di perhatikan juga, waluapun simple penggantian roller sangat berefek pada respon laju motor & tingkat keborosan bahan bakar. Salah kombinasi bisa-bisa akselerasi ngak dapet yang ada HV malah boros.
Jadi gunakan roller sesuai kebutuhan/jalur yg sering kita lewati 
langkah 2
Per CVT standar adalah 1000rpm.
Per CVT berfungsi untuk respon buka tutup pully roda terhadap V belt.
Secara logika semakin keras per maka semakin bagus juga respon yang dihasilkan, karena v belt dapat terkunci dengan rapat. Akan tetapi kombinasi yang salah dari per CVT terhadap kebutuhan/jalur yg sering kita lewati dapat berakibat fatal, ngak segan-segan dapat membuat v belt putus. Maka carilah per CVT sesuai dengan kebutuhan kita.
1000rpm, 1200rpm, 1500rpm, 1600rpm, 2000rpm
langkah 3
 Kalo untuk part yang satu ini saya tidak bisa kasih rincian banyak. Yang pasti part yg satu ini sangat berkaitan dengan roller.
Alternatif pilihan :
1. LHK
2. NCY
3. RRGS
4. TK
5. KITACO
6. CUSTOM

Dari hasil personal riset, untuk saat ini variator/rumah roller custom (made by bro arez yogja) dapat dijadikan alternatife pertama, karna sudah terbukti khasiatnya 
  
langkah 4
 Untuk saat ini saya lebih merekomendasikan part kopling set standar, walaupun banyak produk aftermarket pilihan seperti :
1. LHK
2. NCY
3. RRGS
4. TK
5. KITACO
6. CUSTOM 
wah kalo vario dah siap di modif nya hasil nya pasti keren.. :D
ini dia penampakan nya (hasil karya anak bangsa ):































vario tampil imut
velg besar vario
vario low rider
vario juga gagah dengan velg kecil
knalpot vario modification

wahh menurut saya vario adalah motor paling bagus untuk dimodif. :D
good bike .

========================================================================


Cakram belakang vario :
ini ada artikel cara pasannya bro. ^^

Agar Buritan Semakin Mencengkeram Variomania yang ingin tampil beda, banyak cara bisa dilakukan. Misal dengan mengaplikasi sistem rem model disc brake di roda belakang. Selain tampilan motor terdongkrak, kemampun deselerasi skutik kesayangan pun kian mantap.

Dulu, meski beragam pilihan rem cakram belakang Vario ditawarkan di pasaran, enggak lantas membuat para pemilik skutik ekslusif ini kepincut ingin memasang. Pasalnya, tak sedikit penggemar skutik Honda ini khawatir bila piringan direkatkan di sisi kanan hub roda belakang, bakal mengganggu posisi dudukan knalpot standarnya. Selain itu ditakutkan akan berimbas juga pada anchor pin yang sempat jadi dilema beberapa waktu silam.

Contohnya seperti dialami Deddy, karyawan sebuah perusahaan kontraktor di Jakarta. Ia disarankan mekanik salah satu toko aksesori di dekat tempat tinggalnya untuk mengganti knalpot bawaan Vario pakai tipe racing kalau mau penerapannya perangkat disc brake belakang bisa pas. Loh, kok gitu ya?

DUA VERSI
Anggapan yang terkesan pasrah dan kurang kreatif itu langsung dibantah beberapa mekanik. Soal anchor pin teromol belakang Vario produksi awal kan sudah diatasi PT Astra Honda Motor (AHM). “Semua Vario yang bermasalah sudah diganti baru ancor pinnya. Jadi tak akan ada problem lagi pada sistem rem belakangnya,” yakin Kristanto, kepala corporate communication AHM.

ada 3 versi yang bisa di pilih di sini :
MASTER REM ATAS
1 .ini master Rem di atas







master di sebelah kanan

 2. ini master rem versi alfa market.






master cakaram berada di bawah.
 3. yg ini di bawah master cakram nya.








Sementara anggapan yang menyatakan kalau penerapan rem cakram belakang pada Vario mengganggu posisi knalpot standar, sama sekali tak terbukti. Faktanya, kini sudah cukup banyak berkeliaran Vario berknalpot standar yang mengaplikasi rem jenis ini.

“Di Bangkok Motor Show tahun lalu, gue ngeliat ada modif Honda Click (di Indonesia sama dengan Vario) yang pakai cakram belakang dengan desain unik dan diaplikasi di sebelah kanan pelek. Enggak ada masalah tuh,” ungkap Santo Sugandi, juragan Agung Jaya Motor (AJM) yang sengaja memesan beberapa unit buat diaplikasi di sini.

Paket yang ditawarkan Santo ini dijamin tak bakal mengganggu posisi knalpot standar Vario. “Sebelumnya bagian kanan teromol pelek belakang dilubangi dulu. Supaya bisa memasang dudukan adaptor cakramnya,” papar pria berkacamata minus ini.

ini ada sedikit cara memasangnya :



Pakai pelat adaptor 5 mm
Posisi kaliper mesti simetris




Masih pakai tuas rem asli


kerenkan kalo dah jadi ?


Sementara posisi master rem atas diletakkan di sisi kiri setang. Tapi sebelumnya kudu mencoak cover setang sebelah kiri agar dudukan master rem bisa terpasang dengan baik. Diikuti dengan mengganti kabel rem belakang yang semula model kawat pakai sistem hidraulik alias slang rem.

Oh ya, banderol yang ditawarkan Santo sekitar Rp 1,8 juta termasuk ongkos pasang. Terdiri dari piringan cakram, kaliper, slang, master rem atas-bawah berikut tuas serta adaptor cakram plus adaptor baut pelek. Tersedia pula 3 pilihan model cakram, yang pemasangannya tinggal plug and play pada adaptornya.

Versi lainnya ditawarkan Adi Sutisna, punggawa RC Speed di Rempoa, Ciputat, Tangerang. Bedanya, paket disc brake belakang seharga Rp 2 juta yang terdiri dari cakram, kaliper plus braketnya serta master rem yang ditawarkan Adi, posisi penempatan piringan adanya di sebelah kiri roda.

Menurut Adi, paket hasil rancangannya itu masih memakai komponen bawaan disc brake motor Honda. Misal cakram punya Tiger, kaliper berikut master rem bawaan Supra. Keuntungannya, “Kalau kampas rem habis, enggak repot cari spare partnya.”

Pemasangannya juga enggak ribet. Kata Adi desainnya masih mengikuti kontur asli kaki Vario, yang menganut sistem pengereman menyatu girboks alias di sisi kiri teromol. Sehingga estetika motor asli tak bakal berubah.

Langkah pemasangannya pastinya mencopot ban belakang terlebih dulu guna merekatkan cakram yang bagian tengahnya sudah didesain mengikuti diameter teromol. Kemudian pasang master rem bawah pada dudukan di kaliper.

Lantas dudukan kaliper dari pelat setebal 5 mm, ditempelkan pada 3 baut yang ada di belakang girboks. Kelar braket terpasang, giliran kalipernya dirangkai ke braket tersebut. Langkah terakhir, hubungkan tuas penonjok piston master rem bawah ke tuas rem bawaan Vario.

Mudah kan? Selamat mencoba ya.

Update Foto
Beat Faisal dan Vario Firdaus josua.

Motor Vario Firdaus josua (jojo)


Vario Firdaus Josua dan Satria Fu Dhendy wahyudi


Answer CCNA 4- Final exam 100/100 (100% benar)

100% manjur dehhh.

1. Which two statements are true about IPv6 link local addresses? (Choose two.)

They begin with the 2000::/3 prefix.
They begin with the FE80::/10 prefix.
They are assigned by IANA to an organization.
They must be manually configured by the administrator.
They are assigned to a host by a stateless autoconfiguration process.

2. Refer to the exhibit. What is another way to represent this IPv6 address?

2031::130F::9C0::130B
2031::130F::9C0:0:130B
2031:0:130F::9C0::130B
2031:0:130F::9C0:0:130B

3. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 192.168.3.17". What is the problem?

The address 192.168.3.17 address is already in use by Fa0/0.
The pool of addresses for the 192Network pool is configured incorrectly.
The ip helper-address command should be used on the Fa0/0 interface.
The 192.168.3.17 address has not been excluded from the 192Network pool.

4. What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the configuration of a local router that has been configured as a DHCP server?

Traffic that is destined for 10.10.4.1 and 10.10.4.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 10.10.4.1 and 10.10.4.5.
The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.4.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 10.10.4.1 and 10.10.4.5.

5. Refer to the exhibit. PC1, PC2, and PC3 are configured with dynamic address assignments. PC2 is assigned an IP address from the DHCP server. What would account for the IP addresses that are currently assigned to PC1 and PC3?

Switch S2 port Fa0/12 is configured for full-duplex.
These addresses were included in the DHCP server pools.
Router R1 has a misconfigured IP address on interface Fa1/0.
R1 interface Fa0/0 is not in the same network as the DHCP server.
R1 interfaces Fa0/0 and Fa1/0 do not include the ip helper-address command.

6. Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a packet to Web Server. What is the destination IP address of the return packet from Web Server when received at R1?

10.1.1.2:80
10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333

7. Refer to the exhibit. Which configuration command would result in the output in the exhibit?

ip nat inside source static 10.1.200.254 172.16.76.3
ip nat inside source static 10.1.200.254 192.168.0.10
ip nat inside source static 172.16.76.3 10.1.200.254
ip nat inside source static 172.16.76.3 192.168.0.10
ip nat inside source static 192.168.0.10 172.16.76.3
ip nat inside source static 192.168.0.10 10.1.200.254

8. At what physical location does the responsibilty for a WAN connection change from the user to the service provider?

demilitarized zone (DMZ)
demarcation point
local loop
cloud

9. Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?

flow control
error control
authentication
synchronous communication

10. Which statement accurately describes a role that is played in establishing a WAN connection?

ISDN and ATM are circuit-switched technologies that are used to establish on demand a path through the service provider network.
Data link layer protocols like PPP and HDLC define how data is encapsulated for transmission across a WAN link.
A packet-switching network establishes a dedicated circuit between nodes for the duration of the communication session.
Frame Relay switches are normally considered to be customer premises equipment (CPE) and are maintained by local administrators.

11. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?

ATM
Frame Relay
HDLC
PPP
SDLC

12. Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?

Replace the serial cable .
Replace the WIC on RA.
Configure RA with a clock rate command.
Issue a no shutdown interface command on RB.

13. Which protocol is used to authenticate connections over serial links securely?

CHAP
HDLC
SLIP
PAP

14. Which statement is true about PAP in the authentication of a PPP session?

PAP uses a two-way handshake.
The password is unique and random.
PAP conducts periodic password challenges.
PAP uses MD5 hashing to keep the password secure.

15. What is an accurate description of CHAP when used with PPP on a serial connection between two routers?

A username and password are sent to the peer router, which replies with an accept or reject message.
A username and password are sent to the peer router. If these match the configuration in the peer, the peer in turn provides a username and password to the initiating router.
A challenge message is sent to the peer router, which responds with its username and a calculated value based on a shared secret. This value is then compared by the challenger to its own calculations.An encrypted password is sent to the peer router, which decrypts it and compares it to a shared secret. If the decrypted passwords match, the peer sends the encrypted password back to the initiating router.

16. Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?

interface reset
unplugged cable
improper LMI type
PPP negotiation failure

17. When configuring a Frame Relay connection, what is the purpose of Inverse ARP?

to assign a DLCI to a remote peer
to disable peer requests from determining local Layer 3 addresses
to negotiate LMI encapsulations between local and remote Frame Relay peers
to create a mapping of DLCI to Layer 3 addresses that belong to remote peers

18. A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)

reduced jitter
reduced costs
reduced latency
the ability to burst above guaranteed bandwidth
the ability to borrow unused bandwidth from the leased lines of other customers

19. Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the San Jose router to the DC router?

DLCI 103
DLCI 301172.16.1.18
172.16.1.19

20. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?

BE
DE
CIR
CBIR

21. When Frame Relay encapsulation is used, what feature provides flow control and exchanges information about the status of virtual circuits?

LCP
LMI
DLCI
Inverse ARP

22. Refer to the exhibit. Branch A has a non-Cisco router that is using IETF encapsulation and Branch B has a Cisco router. After the commands that are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 LMI is ANSI. The
LMI is successfully established at both locations. Why is the PVC failing?

The PVC to R1 must be point-to-point.
LMI types must match on each end of a PVC.
The frame relay PVCs cannot be established between Cisco and non-Cisco routers.
The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 command.

23. Refer to the exhibit. You are a network administrator who has been tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?

HQ(config-subif)# frame-relay map ip 172.16.1.1 301 broadcast on Serial 0/0/0.1
HQ(config-subif)# frame-relay map ip 172.16.2.2 302 broadcast on Serial 0/0/0.2
HQ(config-subif)# frame-relay map ip 172.16.1.1 103 broadcast on Serial 0/0/0.1
HQ(config-subif)# frame-relay map ip 172.16.2.2 203 broadcast on Serial 0/0/0.2
HQ(config-subif)# frame-relay interface-dlci 103 on Serial 0/0/0.1
HQ(config-subif)# frame-relay interface-dlci 203 on Serial 0/0/0.2
HQ(config-subif)# frame-relay interface-dlci 301 on Serial 0/0/0.1
HQ(config-subif)# frame-relay interface-dlci 302 on Serial 0/0/0.2


24. Refer to the exhibit. Which statement is true about the Frame Relay connection?

The Frame Relay connection is in the process of negotiation.
A congestion control mechanism is enabled on the Frame Relay connection.The “ACTIVE” status of the Frame Relay connection indicates that the network is experiencing congestion.
Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.

25. Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?

Wi-Fi
satellite
WiMAX
Metro Ethernet

26. What are two main components of data confidentiality? (Choose two.)

checksum
digital certificates
encapsulation
encryption

hashing

27. Which statement about a VPN is true?

VPN link establishment and maintenance is provided by LCP.
DLCI addresses are used to identify each end of the VPN tunnel.
VPNs use virtual Layer 3 connections that are routed through the Internet.
Only IP packets can be encapsulated by a VPN for tunneling through the Internet.

28. From observing lots of port scans and ping sweeps on the company network, an administrator has determined that an edge router is experiencing an attack. These exploits are examples of what type of network attack?

DoS
access
reconnaissance
man-in-the-middle

29. A network administrator determines that falsified routing information is propagating through the network.
What action can be used to address this threat?

Update the IOS images.
Change console passwords.
Employ end-user authentication.
Configure routing protocol authentication.

30. Refer to the exhibit. Which statement is true about the configuration of R1?

The remote session is encrypted.
A password is sent in plain text.
A connection that is using secure HTTP is enabled.
A local username database is used for authentication.

31. What can a network administrator do to recover from a lost router password?

use the copy tftp: flash: command
boot the router to bootROM mode and enter the b command to load the IOS manually
telnet from another router and issue the show running-config command to view the password
boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes

32. Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?

Use correct source file name in the command.
Verify that the TFTP server software is running.
Make sure that there is enough room on the TFTP server for the backup.
Check that R1 has a route to the network where the TFTP server resides.

33. Refer to the exhibit. A network administrator is considering updating the IOS on Router1. What version of IOS is currently installed on Router1?

1
12.4
15
1841

34. Which statement is true about wildcard masks?

A wildcard mask must be created by inverting the subnet mask.
A wildcard mask performs the same function as a subnet mask.
A wildcard mask of 0.0.0.0 means the address should match exactly.
A wildcard mask uses a "1" to identify IP address bits that must be checked.

35. Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?

extended
reflexive
standard
time-based

36. Which variable is permitted or denied by a standard access control list?

protocol type
source IP address
source MAC address
destination IP address
destination MAC address

37. A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command access-list 115 permit tcp any 172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to the router?

All traffic that comes from 172.16.0.0/16 will be allowed.
All TCP traffic that is destined for 172.16.0.0/16 is permitted.
Any SYN packets that are sent to 172.16.0.0/16 will be permitted.
Responses to traffic that originates from the 172.16.0.0/16 network are allowed.

38. Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?

interface Fa0/0, inbound
interface Fa0/0, outbound
interface Fa0/1, inbound
interface Fa0/1, outbound

39. Which option represents a best practice for applying ACLs?

Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied inside the core layer.
ACLs applied to outbound interfaces use fewer router resources.
Extended ACLs should be applied closest to the source that is specified by the ACL.

40. Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request packet that enters interface S0/0/0, and is destined for an FTP server at IP address 172.16.1.5?

The router matches the incoming packet to the statement that is created by access-list 201 permit ip any any command and allows the packet into the router.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by access-list 101 permit ip any any command.
The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.

41. A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?

Conduct a performance test and compare with the baseline that was established previously.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Interview departmental administrative assistants and determine if they think load time for web pages has improved.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

42. Technicians from Company A and Company B are comparing DSL transfer rates at their respective companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. Company A, however, reports higher download speeds than Company B. Which option best explains the reason for Company A having the higher download speeds?

Company A only uses microfilters on branch locations.
Company B has a higher volume of POTS voice traffic than does Company A.
Company B shares the connection to the DSLAM with a larger number of clients than Company A shares.
The length of the local loop between Company A and the CO is shorter than the length of the local loop between Company B and CO.

43. Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized parties?

QoS
latency
reliability
confidentiality

44. A recently patched application server is experiencing response time problems. The network on which the application server is located has been experiencing occasional outages that the network team believes may be related to recent routing changes. Network and application teams have been notified to work on their respective issues. Which statement applies to this situation?

Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.
Scheduling will be easy if the network and software teams work independently.
It will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.

45. Because of a remote-procedure call failure, a user is unable to access an NFS server. At what layer of the TCP/IP model does this problem occur?

network layer
data link layer
physical layer
application layer

46. Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with minimal waste from unused addresses?

/19
/20
/21
/22
/23
/24

47. Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?

The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
Port Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.

48. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?

There is a Layer 2 loop.
The VTP domain names do not match.
Only one switch can be in server mode.
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.

49. Refer to the exhibit. Routers R1 and R2 have been configured with EIGRP in the same autonomous system. Computers PC1 and PC2 are not able to ping each other. Further investigation has revealed that the route to 192.168.10.0 is missing from the routing table on R2. What is the cause of the problem?

The networks are not correctly summarized.
The FastEthernet interfaces on R1 are configured as passive.
The network statements on R2 are incorrectly configured.
EIGRP on R1 does not recognize the 192.168.10.0 network.

50. Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?

Enable RIP authentication on R2.
Issue the ip directed-broadcast command on R2.
Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.
Enable CDP on R2 so that the other routers will receive routing updates.

good luck.

Kunci Jawaban Final exam CCNA 3 Version 4.0 100%

Bagi yang mau ujian Final Exam CCNA 3 V4 nih bisa di pelajari .




TEKNOLOGI MONITOR LED TERBARU.

Tahu ANDA kalau monitor liquid crystal display (LCD)  sebenarnya tidak ramah lingkungan? 
Saya posting ini karena udah ngerasain LED itu sendiri.
ini dia Monitor Baru saya. :D 



Output warna nya lebih lembut di banding LCD.


Nih sekilas infonya :

KARA Menjual Lebih Dari 200.000 Album Mereka Dalam 1 Bulan

KARA telah berhasil menjual lebih dari 200.000 unit album Jepang pertama mereka, Girl’s Talk hanya dalam waktu kurang dari satu bulan setelah rilisnya.

Menurut Oricon Chart pada 28 Desember, Girl’s Story milik KARA berada pada posisi 8 di chart album mingguan; Mereka telah menjual 21.933 unit minggu ini saja. KARA yang sebelumnya berada pada posisi kedua pada minggu pertama Oricon Chart sekarang telah menjual 206.845 unit album.

KARA diprediksikan akan mendapatkan Platinum Award dari Japanese Record Association pada bulan Januari apabila penjualan album mereka terus meningkat.

source: allkpop, DK

UN:F [1.9.6_1107]

Brown Seaweed Soup (Miyeok Guk)


Miyeok guk adalah sup khas Korea yang dibuat dari sayuran miyeok. Nama makanan ini terdiri dari dua kata : miyeok, nama Korea untuk sayuran yang bersal dari laut, dan guk, yang berarti sup.
Miyeok guk biasanya dikonsumsi oleh wanita setelah emlahirkan karena Miyeok mengandung kalsium dan iodin yang tinggi, nutrisi ayng penting untuk ibu yang sedang menyusui. Banyak wanita Korea menkonsumsinya selama masa kehamilan pula. Makanan ini juga merupakan bagian dari tradisi makanan yang dimakan saat bayi pertama kali lahir.
Bahan-bahan (cukup untuk 3-4 porsi, siap dalam 15-20 menit)
* 35g rumput laut coklat kering (Miyeok)
* 70g irisan daging sapi
* 2 siung bawang putih yang sudah dicincang
* 3 sdm kecap
* 1 sdm minayk wijen korea
* 4 cangkir air
* 1/2 sdm minayk wijen dan 3 taburan merica hitam – untuk membumbui daging
Prep
1. Rendam rumput laut kering cokelat dalam air dingin selama 5 menit.
2. Alirkan air dan bilas rumput laut beberapa kali di air yang mengalir.
3. Tiriskan air. Potong rumput laut dengan gunting sampai sepanjang kelingking.
4. Bumbui daging sapi dengan 1 / 2 sdm minyak wijen dan 3 taburan lada hitam.
Langkah
1. Pertama panaskan saus selama sekitar 30 detik.
2. Tambahkan 1 sdm minyak wijen, rumput laut coklat, dan daging sapi irisan kemudian aduk selama 2 – 3 menit.
3. Tambahkan air lalu didihkan pada api sedang sampai rumput laut dan dagingnya masak (sekitar 5 – 10 menit).
4. Tambahkan kecap dan bawang putih, didihkan selama 2 menit lalu siap disajikan. (Anda dapat menyesuaikan rasa dengan garam jika diperlukan ).
selamat mencoba ^^

source: www.mykoreankitchen.com, DuniaKorea.

Kabar Mencengangkan tentang Power Balance!!!

Tak bisa dipungkiri, kepopuleran Power Balance di antara para selebriti semakin 'menggila' belakangan ini. Gelang Power Balance, yang 'dijanjikan' meningkatkan keseimbangan, kekuatan, dan fleksibilitas penggunanya, terlihat menghias tangan banyak selebritis, mulai dari David Beckham sampai Kate Middleton.
Yang mengejutkan, baru-baru ini, perusahaan yang membuat gelang ini menyatakan bahwa tidak ada bukti ilmiah dari kemampuan gelang ini, yang juga berarti bahwa gelang ini tidak ada bedanya dengan gelang karet biasa.
Perusahaan yang memproduksi Power Balance bahkan sudah menawarkan ganti rugi kepada para pembeli di Australia sekaligus berjanji akan mengubah tampilan website, kemasan, sampai iklannya agar menyampaikan pesan dengan lebih benar.
Well, lantas bagaimana dengan para selebritis yang mengenakan gelang ini ya? Pada satu kesempatan, David Beckham, yang mungkin juga mengenakan Power Balance sebagai seorang atlit yang ingin tampil prima, tertangkap kamera sedang mengenakan gelang karet berwarna hitam di tangannya sambil memeluk sang istri, Victoria Beckham.


Kate Middleton @ dailymail.co.uk

Sang calon ratu Inggris, Kate Middleton, pun tak mau kalah dengan mengenakan gelang serupa yang terlihat jelas menghias tangannya saat sedang berjalan-jalan. Lain halnya dengan Robert De Niro, yang terlihat mengenakan Power Balance di satu wawancara. Apakah demi menjaga kesehatan di usianya yang tak lagi muda?


Robert De Niro @ dailymail.co.uk

P Diddy, yang juga dikenal sebagai Sean Combs, juga terlihat mengenakan Power Balance ketika beraksi di atas panggung. Ikutan trend atau sebagai aksesori yang dianggapnya keren? Mungkin alasan yang sama juga dimiliki oleh Gerard Butler ketika mengenakan gelang ini. Tapi apakah gelang ini menjadikannya lebih 'seimbang' dan berenergi dalam menggaet lebih banyak wanita?


P Diddy @ dailymail.co.uk


Gerarld Butler @ dailymail.co.uk


Well, tentu saja jawabannya tidak, sesuai dengan apa yang dinyatakan perusahaan Power Balance. Maybe yes, as a mere accessory. Poor them, sudah tertipu Power Balance!

Source : KapanLagi.com

Popular Posts