SlideShare a Scribd company logo
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 1
Cara Menulis Artikel
1. Buka MS Word dan taipkan
artikel seperti berikut
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 2
Tigers live in hot jungles as well as in cold forests. All wild tigers live in Asia. Some of them also
live in the snowy forests of Siberia. Others live in the humid jungles of Sumatra. And some live in
the dry grasslands of India.
A tiger is a powerful jumper and can easily leap ten feet (three metres) off the ground. Tigers can
run 35 miles per hour! That’s really fast. Whether in the wind or in captivity, the tiger loves to
sleep!
People have found ways to protect themselves by wearing masks on the back of their heads.
Tigers only attack from behind, so the mask fools them. It seems like the person is always facing
them! Another method used to deter tigers is Scarecrows- which gives electric shock so any tiger
that touches the dummy gets a mild shock. It helps teach tigers to stop attacking people. Tigers
don't like becoming pets because they are wild. Even captive cubs that have been raised by
humans are not domesticated. Trainers in a circus use whips or chairs to scare the tigers into
submission.
Almost all of the captive white tigers in North America today are descended from Mohan and are
highly inbred. Some white tigers have also been mated with other tiger subspecies, creating what
are called hybrid tigers.
Article source:
http://projecttiger.nic.in/whatdoestigerlike.htm
Tekan ctrl+A untuk select all dan pilih justify
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 3
2. Set column
Highlight kolum 3 & 4 > page layout >
columns > 2. Hasilnya seperti rajah
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 4
3. Buat Drop Cap
Highlight huruf ‘T’ pada perenggan 1 > insert
> drop cap > dropped. Hasil seperti rajah
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 5
4. Indent perenggan
Highlight perenggan 2 > klik kanan > paragraph >
indentation > special > first line > by > 0.5 >
spacing > line spacing > double > OK
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 6
Hasilnya seperti rajah
5. Masukkan grafik
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 7
Klik pada awal perenggan 3 (people....) > insert > clip
art > search for > tiger > search in > tick my collections
& office collections > go > hasil carian seperti rajah
Klik button > insert
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 8
Hasil seperti rajah
Klik kanan pada gambar harimau > text
wrapping > tight
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 9
Hasil seperti rajah
6. Header & footer
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 10
Insert > header > alphabet > taip ANIMAL
INFO: Tiger > hasil seperti rajah
Insert > footer > stacks > taip OLEH:
nama anda; dan persatuan atau kelas
seperti rajah
9/14/2009
Program Pembestarian SeMAT
- Unit Bestari -
matangbestari.wordpress.com 11
Tahniah!! Anda berjaya
menghasilkan artikel dengan
jayanya!! Kini anda bersedia untuk
menulis artikel menggunakan MS
Word..

More Related Content

Viewers also liked

Dengue Fever
Dengue FeverDengue Fever
Dengue Fever
Ahmed Siyah
 
Tech comm partners ppt draft
Tech comm partners ppt draftTech comm partners ppt draft
Tech comm partners ppt draftKaren Finter
 
Cara Penggunaan Enjin Carian
Cara Penggunaan Enjin CarianCara Penggunaan Enjin Carian
Cara Penggunaan Enjin Carian
SMK Matang
 
SITUÁNDONOS
SITUÁNDONOSSITUÁNDONOS
Hygiene For Health
Hygiene For HealthHygiene For Health
Hygiene For Health
Ahmed Siyah
 
Entrepreneurship as a Career Choice
Entrepreneurship as a Career ChoiceEntrepreneurship as a Career Choice
Entrepreneurship as a Career Choice
Webstrong Ltd.
 
Differentiation slogans
Differentiation slogansDifferentiation slogans
Differentiation slogansKaren Finter
 
Windows Movie Maker
Windows Movie MakerWindows Movie Maker
Windows Movie MakerSMK Matang
 
Defensa grup tres
Defensa grup tresDefensa grup tres
Defensa grup tres
Laurio Mascaró Orfila
 

Viewers also liked (9)

Dengue Fever
Dengue FeverDengue Fever
Dengue Fever
 
Tech comm partners ppt draft
Tech comm partners ppt draftTech comm partners ppt draft
Tech comm partners ppt draft
 
Cara Penggunaan Enjin Carian
Cara Penggunaan Enjin CarianCara Penggunaan Enjin Carian
Cara Penggunaan Enjin Carian
 
SITUÁNDONOS
SITUÁNDONOSSITUÁNDONOS
SITUÁNDONOS
 
Hygiene For Health
Hygiene For HealthHygiene For Health
Hygiene For Health
 
Entrepreneurship as a Career Choice
Entrepreneurship as a Career ChoiceEntrepreneurship as a Career Choice
Entrepreneurship as a Career Choice
 
Differentiation slogans
Differentiation slogansDifferentiation slogans
Differentiation slogans
 
Windows Movie Maker
Windows Movie MakerWindows Movie Maker
Windows Movie Maker
 
Defensa grup tres
Defensa grup tresDefensa grup tres
Defensa grup tres
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 

Menulis Artikel

  • 1. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 1 Cara Menulis Artikel 1. Buka MS Word dan taipkan artikel seperti berikut
  • 2. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 2 Tigers live in hot jungles as well as in cold forests. All wild tigers live in Asia. Some of them also live in the snowy forests of Siberia. Others live in the humid jungles of Sumatra. And some live in the dry grasslands of India. A tiger is a powerful jumper and can easily leap ten feet (three metres) off the ground. Tigers can run 35 miles per hour! That’s really fast. Whether in the wind or in captivity, the tiger loves to sleep! People have found ways to protect themselves by wearing masks on the back of their heads. Tigers only attack from behind, so the mask fools them. It seems like the person is always facing them! Another method used to deter tigers is Scarecrows- which gives electric shock so any tiger that touches the dummy gets a mild shock. It helps teach tigers to stop attacking people. Tigers don't like becoming pets because they are wild. Even captive cubs that have been raised by humans are not domesticated. Trainers in a circus use whips or chairs to scare the tigers into submission. Almost all of the captive white tigers in North America today are descended from Mohan and are highly inbred. Some white tigers have also been mated with other tiger subspecies, creating what are called hybrid tigers. Article source: http://projecttiger.nic.in/whatdoestigerlike.htm Tekan ctrl+A untuk select all dan pilih justify
  • 3. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 3 2. Set column Highlight kolum 3 & 4 > page layout > columns > 2. Hasilnya seperti rajah
  • 4. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 4 3. Buat Drop Cap Highlight huruf ‘T’ pada perenggan 1 > insert > drop cap > dropped. Hasil seperti rajah
  • 5. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 5 4. Indent perenggan Highlight perenggan 2 > klik kanan > paragraph > indentation > special > first line > by > 0.5 > spacing > line spacing > double > OK
  • 6. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 6 Hasilnya seperti rajah 5. Masukkan grafik
  • 7. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 7 Klik pada awal perenggan 3 (people....) > insert > clip art > search for > tiger > search in > tick my collections & office collections > go > hasil carian seperti rajah Klik button > insert
  • 8. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 8 Hasil seperti rajah Klik kanan pada gambar harimau > text wrapping > tight
  • 9. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 9 Hasil seperti rajah 6. Header & footer
  • 10. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 10 Insert > header > alphabet > taip ANIMAL INFO: Tiger > hasil seperti rajah Insert > footer > stacks > taip OLEH: nama anda; dan persatuan atau kelas seperti rajah
  • 11. 9/14/2009 Program Pembestarian SeMAT - Unit Bestari - matangbestari.wordpress.com 11 Tahniah!! Anda berjaya menghasilkan artikel dengan jayanya!! Kini anda bersedia untuk menulis artikel menggunakan MS Word..