2012-03-20

Chord Endank Soekamti - Heavy Birthday

G C D (4x) G


C                    D            Bm              Em
Bertamabah lagi usiamu, tambah tua saja dirimu
C             D                Em
cepat bertobat sebelum kiamat


Fig2
G F# Em D


C                 D
sebelumnya haruslah makan
Bm            Em
barulah kita mendoakan
C             D                Em
hanya itu yang bisa kuberikan


Fig3
D/Em D/Em D/Em G Em D


Reff :
G             Bm              C     
happy birthday to you we hope you
D                  G              Bm         C     D#  D
happy everytime sukses selalu untukmu
G              Bm         C        A  D
happy birthday to you we love you
G             Bm        C       A  D
happy birthday to you we love you


Fig1
G C D




C           D
tak ada kado istimewa
Bm           Em
karena tak ada biaya
C              D                       Em
karena sekarang bukan tanggal muda


Fig5
G F# Em D


C                 D
sebelumnya haruslah makan
Bm            Em
barulah kita mendoakan
C             D                Em
hanya itu yang bisa kuberikan


Fig3
D/Em D/Em D/Em G Em D


Fig4
G             Bm              C     
happy birthday to you we hope you
D                  G              Bm         C     D#  D
happy everytime sukses selalu untukmu
G              Bm         C        A  D
happy birthday to you we love you
G             Bm        C       A  D
happy birthday to you we love you


Fig6
Bm   F# G   F# Em   G F#   A
Fig7


C             D
bertambah lagi usiamu
Bm             Em
tambah tua saja dirimu
C             D
cepat bertobat sebelum


Fig8
G             Bm              C     
happy birthday to you we hope you
D                  G              Bm         C     D#  D
happy everytime sukses selalu untukmu
G              Bm         C        A  D
happy birthday to you we love you
G             Bm        C       A  D
happy birthday to you we love you  

Endank Soekamti - Jurus Jitu


Em Am D G (2x)

      Em              Am
Ternyata diriku tak bisa berkata
    D                  G
ketika berjumpa dengan kamu
      Em             Am
ternyata tanganku tak bisa bergerak
    D                G
ketika ku ingin mengenalmu


Em Am D G

Reff:
C         D
aku sudah berencana
G          Am
semalam di depan kaca
C         D        G
melatih bicara padamu

      Em           Am
skenario jurus jitu siap beraksi
       D                 G
tak berhasil bila dengan kamu
    Em               Am
narasi yang sudah aku rangkai benar
       D             G
tak berlaku bila ada kamu


Em C D G


C         D
aku sudah berencana
G          Am
semalam di depan kaca
C         D        G
melatih bicara padamu

C        D
aku akan berusaha
G          Am
mendapat moment yang sama
C         D        G
mencoba bicara padamu

Endank Soekamti - Masih Merdeka


  G           D
Tak terasa lewat rumahmu
        Am         D           G
Belum juga ku melihat tenda birumu
       Bm                        C          Cm
Selama janur kuning belum melengkung menghiasi
        G            D           G    C  G  D
Akan kukejar kau sampai ke ujung bumi


         G           D
Cincin emas belum melingkar
         Am          D            G
Souvenir dan undanganmu belum tersebar
        Bm                      C
Selama ijab dan kabul belum terlontar
       G           D           G    D
Akan kukejar walau kulawan pendekar


[reff]
G      D      Em         Bm
Kamu kamu jangan halangi aku
C        G    Am       D
Masih merdeka milik bersama
G      D      Em           Bm
Kamu kamu jangan sampai cemburu
C          G     Am      D
Yang belum resmi godaan tak berhenti


G D Em G D Em

        G            D
Cincin emas belum melingkar
          Am         D           G
Souvenir dan undanganmu belum tersebar
       Bm                       C
Selama ijab dan kabul belum terlontar
       G           D           G     D
Akan kukejar walau kulawan pendekar


A          C#m              F#m  D A   C#          D    F E
Biar model cantik datang menggoda, aku takkan terpesona

2012-03-16

Endank Soekamti - Audisi

Intro : A G A G (2x) E

F#m          E             F#m
Perjalananku masih panjang
E                                 A
Tak usah ragu atau bimbang
Bm                               F#m
Bila waktunya datang,  Aku tak kan menghilang
 E                         F#m
Semua wanita harap tenang


F#m           E                 F#m 
Bukan karena aku tak mau (ku tak mau, ku tak mau)
E                   A
Biar aku pilih dahulu
Bm                             F#m
Dari pada aku maju, Ketahuan selingkuh
E                          F#m 
Akhirnya nanti tutup buku

Reff :
 A          D                 E             A
Ku buka pendaftaran, Ayo siapa ikutan
F#m        Bm        E                 A
Bila tak kebagian, Coba lain kesempatan
A          D                    E           A
Ku buka pendaftaran, Audisi percintaan
F#m             Bm        E                 A
Bila kau jadi pilihan, Langsung saja pelaminan

Bridge :
A        D        E         D
Ayo segera daftarkan saja
A        D        E         D
Tua muda yang penting gaya
A           D          E      D  E  A
Siapa saja asal wanita


A G A G

2012-02-09

Practice Final Exam chapter 1-10 version 4.1

Top of Form

1
Top of Form
Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?
IDE
SATA
PATA
USB
Bottom of Form


2
Top of Form
Which three tasks should a computer preventive maintenance plan contain? (Choose three.)
the defragmentation of the hard drive
the addition or removal of new applications
the identification of probable causes of the problem
an update of the operating system and applications
an update of antivirus and other protective software
an evaluation of the methods for gathering information about problems and the solutions to be implemented
Bottom of Form



3
Top of Form
A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
44.1 MHz
100 MB/s
3 GHz
1 TB
Bottom of Form


4
Top of Form
Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.)
an update of spyware removal tools
a centralization of network administration
an update of antivirus scanner software
an update of network cable termination information
documentation of network protocols such as DHCP and DNS
Bottom of Form



5
Top of Form
What characterizes a DDoS attack?
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
Bottom of Form


6
Top of Form
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
formatting the drive
deleting the partitions on the hard drive
overwriting data multiple times, rendering the data unusable
shattering the hard drive platters with a hammer
Bottom of Form



7
Top of Form
A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
Verify that the computer is working properly now.
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explain that the repair technician sent to perform the repair is inexperienced.
Put the customer on hold until a supervisor is available.
Bottom of Form


8
Top of Form
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
Computer Management
Device Manager
My Computer
System Tools
Bottom of Form



9
Top of Form
A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
Interrupt the customer and ask whether the customer would mind going on hold for a few minutes.
Tell the customer that the call will be put on hold for a few minutes.
Signal to the colleague to wait.
Mute the line to the customer while discussing the issue with the colleague.
Bottom of Form


Top of Form
Which two ports on a laptop allow connection or removal of external devices, such as hard drives or printers, without powering off the computer? (Choose two.)
DVI
FireWire
serial
USB
VGA
Bottom of Form



Top of Form
A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating "Press any key to boot from the CD or DVD." What should the technician do?
The technician should press the space bar so that the installation can continue.
The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications.
The technician should press the F8 key so that the restore options can be displayed on the screen.
The technician should press the windows key so that the operations can continue and the XP CD can be removed.
Bottom of Form


Top of Form
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
APIPA
DHCP
DIPS
ICMP
Bottom of Form



Top of Form
A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
NTBOOTDD
HAL
NTSCSILDR
NTWINHAL
Bottom of Form


Top of Form
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

The computer automatically boots into Safe Mode and displays a warning on the screen.

The screen flashes with a red background and displays a warning message.

The computer emits a pattern of beeps indicating the failing device.

The computer returns an error message indicating the I/O address of the failing device.


Bottom of Form








Top of Form
In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system?

Emergency Repair Disk (ERD)

Automated System Recovery (ASR)

Windows Recovery Manager (WRM)

Automated Windows Recovery (AWR)

System Restore (SR)     































                         













    
















Bottom of Form

Bottom of Form
Top of Form
A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?
Refer the angry customer to a supervisor.
Advise the customer that the requested technician is out of the office and insist on trying to resolve the problem.
Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.
Ignore the request for the specific technician by walking through a step-by-step process with the customer in an attempt to refocus the customer and solve the problem.
Bottom of Form


Top of Form
A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.)
DVD+/-RW
DVD+/-R
CD-RW
BD-RE
BD-R
Bottom of Form



Top of Form
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles
Bottom of Form


Top of Form
What guideline should be followed when establishing a password security policy?
Passwords should be physically stored in a convenient location.
Passwords should contain mainly numbers for better encryption.
The system administrator should assign passwords to the users.
Lockout policies should be avoided in order to increase user access.
An expiration period should be established so that passwords frequently change.
Bottom of Form



Top of Form
A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem?
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
Bottom of Form


Top of Form
A user is experiencing slow print rates when printing files that contain large complex graphics. What could be done to improve performance?
Use better quality media.
Add memory to the printer.
Run regular self-tests and test pages.
Change the printer cabling from parallel to serial.
Bottom of Form



Top of Form
At which TCP/IP model layer would a MAC address be found?
application
transport
internet
network access
Bottom of Form


Top of Form
A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
Power cycle the printer.
Download and install a new printer driver.
Replace the paper in the input tray with new paper.
Remove and replace the primary corona wire.
Bottom of Form



Top of Form
A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.)
locations that require low power usage
workplaces that use Blu-ray storage media
external flash drives that are required to be connected by USB
workplaces with harsh workplace conditions where the computers are subject to dust and vibration
locations where redundant disks are required to appear as one logical disk to the operating system
Bottom of Form


Top of Form
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
Only clean equipment that is requested by the customer.
Omit performing maintenance operations on components until the equipment malfunction.
Schedule and document routine maintenance tasks.
Bottom of Form



Top of Form
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
Run convertFAT32.exe.
Restore the data files that were backed up in preparation for the conversion.
Reset the file attribute to show hidden files.
Restart the computer after updating the hard drive to FAT32.
Bottom of Form


Top of Form
A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first?
Look at the NIC lights.
Use a cable tester to check the network cable.
Use Device Manager to check for a resource conflict.
Verify the status of the Windows firewall ports that are enabled.
Activate the drive error checking tool to check for damaged areas on the hard disk.
Bottom of Form



Top of Form
A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do?
update the firmware
visually inspect the scanner glass
remove dust from the fans
inspect the scanner cables
Bottom of Form


Top of Form
What should always be done prior to replacing components that are not hot-swappable in a laptop?
Discharge all power that remains in the battery.
Place the laptop in hibernate mode.
Unplug the laptop and remove the battery.
Remove all PC cards and expansion cards.
Bottom of Form



Top of Form


http://assessment.netacad.net/assessment/images/15070.jpg
Refer to the exhibit. Which type of removable media is depicted?
hard disk
USB optical drive
PC card
flash drive
Bottom of Form

Top of Form

Bottom of Form
Top of Form
A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician?
Replace the NIC.
Replace the network cable.
Verify user permissions.
Verify the computer IP address information.
Bottom of Form


Top of Form


http://assessment.netacad.net/assessment/images/13740.jpg
Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
modem
network
parallel
serial
USB
Bottom of Form



Top of Form
A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
The resolution of an inkjet printer is too low for this work.
An inkjet printer has limited color capability.
Immediately after printing, the ink is wet.
An inkjet printer is a high cost option.
Bottom of Form


Top of Form
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
The new floppy drive is faulty.
The ribbon cable is installed incorrectly.
The jumper settings are set incorrectly for the floppy drive.
The floppy drive has been disabled in the BIOS.
Bottom of Form



Top of Form
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
Hibernate
Suspend
Left on with no power mode
Soft shutdown
Bottom of Form


Top of Form
Which program checks for installed hardware during the Windows XP boot process?
HALL
NTLDR
NTDETECT
NTOSKRNL
Bottom of Form



Top of Form
A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
Category 5e
coaxial
fiber optic
UTP
Bottom of Form


Top of Form
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
My Computer
Control Panel
Device Manager
BIOS
Start Menu
Bottom of Form



Top of Form
Which protocol adds security to remote connections?
FTP
HTTP
NetBEUI
POP
SSH
Bottom of Form


Top of Form
A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem?
Use the Last Known Good Configuration.
Update the operating system from the Windows Update website.
Close all other running programs before installing the new application.
Run the installation application under Windows XP compatibility mode.
Bottom of Form



Top of Form
When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error?
BOOT.INI
STARTUP.INI
SYSTEM.INI
WIN.INI
Bottom of Form


Top of Form
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
Defrag
CHKDSK
MSCONFIG
REGEDIT.EXE
Bottom of Form



Top of Form
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.
Bottom of Form


Top of Form
A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion?
Create a complete system backup.
Backup the registry.
Set a System Restore Point.
Create an Emergency Repair Disk.
Bottom of Form



Top of Form
Which network device uses a MAC address table to segment the network?
concentrator
hub
PBX
router
switch
Bottom of Form

Top of Form

Bottom of Form
Top of Form
What are two functions of a VPN gateway? (Choose two.)
establish secure VPN connections
provide remote user access to the VPN client software
manage VPN tunnels
ensure low latency connections to VPN clients
establish high bandwidth WAN connections to the Internet
Bottom of Form


Top of Form


http://assessment.netacad.net/assessment/images/26670.jpg
Refer to the exhibit. What type of device is highlighted in white?
touch pad
mouse
biometric authentication
Bluetooth
Bottom of Form



Top of Form
Which type of power connector is used to connect devices such as optical drives and hard drives?
20-pin
24-pin
Berg
Molex
P8
P9
Bottom of Form


Top of Form
Which Registry file contains information about all software that is installed on a Windows XP computer?
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_CURRENT_CONFIG
Bottom of Form



Top of Form
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
Inkjet printers are less expensive than laser printers.
A laser printer is significantly slower than an inkjet printer.
Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Bottom of Form