1. Office button adalah tombol di pojok kiri atas Microsoft Office yang menampilkan menu baru, buka, simpan, cetak dan lainnya.
2. PowerPoint pertama kali dirilis pada 1987 untuk Macintosh dan sejak itu terus berkembang untuk sistem operasi lainnya.
3. Quick access toolbar berisi tombol sering digunakan seperti undo, redo dan simpan yang dapat disesuaikan pengguna.
nah ini diaaaa :) tugas TIK dari bapak hendry, tugas kelompok bareng Fadhila Suryantini, bikinnya susah-susah gampang, susahnya dikejar deadline, padahal aku sama dhila cuman bisa diskusi bentar. sebenernya gampang sih bikin ppt ini, soalnya udah ada materinya, ribetnya bikin dekornya! link ini, animation ini itu.. aaaa tapi puas sih sama hasilnya :) kangn kerja bareng Fadhila!!
Semoga bermanfaat aja deh buat semuaa :)
inget banget waktu malem-malem nglembur ngerjain ini tugas padahal harus tetep belajar jadi anak baek biar dapet nilai super baek waktu UN *ah mulai ngaco'* udah cukup!! hahaha
#titipan leny :D
nah ini diaaaa :) tugas TIK dari bapak hendry, tugas kelompok bareng Fadhila Suryantini, bikinnya susah-susah gampang, susahnya dikejar deadline, padahal aku sama dhila cuman bisa diskusi bentar. sebenernya gampang sih bikin ppt ini, soalnya udah ada materinya, ribetnya bikin dekornya! link ini, animation ini itu.. aaaa tapi puas sih sama hasilnya :) kangn kerja bareng Fadhila!!
Semoga bermanfaat aja deh buat semuaa :)
inget banget waktu malem-malem nglembur ngerjain ini tugas padahal harus tetep belajar jadi anak baek biar dapet nilai super baek waktu UN *ah mulai ngaco'* udah cukup!! hahaha
#titipan leny :D
Big Data has moved beyond being just a buzzword. Organizations are operationalizing various Big Data technologies to answer critical business questions and power sophisticated workloads.
Building on the success of their 2012 “Big Data Comes of Age” research report, EMA VP of Research, Shawn Rogers, EMA Senior Analyst, John Myers, and 9sight Consulting Founder and Principal, Dr. Barry Devlin, will reveal their latest big data research findings during this informative Webinar.
Attendees will learn not just the what's of Big Data technologies but also the why’s of use cases, implementation strategies and technology choices, as well as discover:
>>Most popular use cases for big data based on nearly 600 projects reviewed in this research
>>Which Hadoop distributions are gaining traction
>>The technical and business-driven-challenges for Big Data
>>Most popular data sources for Big Data
>>How organizations are continuing the trend of implementing the EMA Hybrid Data Ecosystem (HDE) in association with their Big Data initiatives
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet
coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human
eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding
domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in
the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used
as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different
quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index
Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of
watermark, quality of extracted watermark and robustness against different attacks.
These slides - based on the webinar featuring Join Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) - provides some results from new network management research, including:
- The overall readiness of existing network engineering, monitoring, and troubleshooting tools to support SDN, NFV, and network virtualization
- The new requirements that SDN adopters have for their network management systems
- What use cases early SDN adopters are pursuing and what benefits they are experiencing with the technology
EDELNet: goal, programme and achievements (MID2017)EADTU
EDELNet: goal, programme and achievements by Juan J. Garcia Blesa (FernUniversität in Hagen) presented during the Maastricht Innovation In Higher Education Days 2017
In its research study, "Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the Internet of Things," leading IT analyst firm Enterprise Management Associates (EMA) surveyed 150 enterprise network management decision-makes on a wide range of topics that are affecting their daily operations. This research explores the Internet of Things, hybrid cloud networking and advanced network analytics. It also explores emerging requirements for network management tools and identifies best practices for network operations success.
No one source can provide all of the data necessary for security monitoring. To be truly effective, organizations need more data, and they need it faster. Early detection of infiltration and compromise are key to response and recovery. Endpoint records are not fully network aware, and network packets can’t detail activities on host-based threats, so security professionals need both.
These slides - based on the webinar featuring David Monahan, research director of security and risk management at leading IT analyst firm Enterprise Management Associates (EMA) - provides findings on how organizations are using these data types, their largest drivers for integrations and their greatest challenges in integrating the data. He will also discuss rampant bravado in network and security programs concerning their organizational maturity.
Big Data has moved beyond being just a buzzword. Organizations are operationalizing various Big Data technologies to answer critical business questions and power sophisticated workloads.
Building on the success of their 2012 “Big Data Comes of Age” research report, EMA VP of Research, Shawn Rogers, EMA Senior Analyst, John Myers, and 9sight Consulting Founder and Principal, Dr. Barry Devlin, will reveal their latest big data research findings during this informative Webinar.
Attendees will learn not just the what's of Big Data technologies but also the why’s of use cases, implementation strategies and technology choices, as well as discover:
>>Most popular use cases for big data based on nearly 600 projects reviewed in this research
>>Which Hadoop distributions are gaining traction
>>The technical and business-driven-challenges for Big Data
>>Most popular data sources for Big Data
>>How organizations are continuing the trend of implementing the EMA Hybrid Data Ecosystem (HDE) in association with their Big Data initiatives
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet
coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human
eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding
domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in
the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used
as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different
quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index
Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of
watermark, quality of extracted watermark and robustness against different attacks.
These slides - based on the webinar featuring Join Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) - provides some results from new network management research, including:
- The overall readiness of existing network engineering, monitoring, and troubleshooting tools to support SDN, NFV, and network virtualization
- The new requirements that SDN adopters have for their network management systems
- What use cases early SDN adopters are pursuing and what benefits they are experiencing with the technology
EDELNet: goal, programme and achievements (MID2017)EADTU
EDELNet: goal, programme and achievements by Juan J. Garcia Blesa (FernUniversität in Hagen) presented during the Maastricht Innovation In Higher Education Days 2017
In its research study, "Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the Internet of Things," leading IT analyst firm Enterprise Management Associates (EMA) surveyed 150 enterprise network management decision-makes on a wide range of topics that are affecting their daily operations. This research explores the Internet of Things, hybrid cloud networking and advanced network analytics. It also explores emerging requirements for network management tools and identifies best practices for network operations success.
No one source can provide all of the data necessary for security monitoring. To be truly effective, organizations need more data, and they need it faster. Early detection of infiltration and compromise are key to response and recovery. Endpoint records are not fully network aware, and network packets can’t detail activities on host-based threats, so security professionals need both.
These slides - based on the webinar featuring David Monahan, research director of security and risk management at leading IT analyst firm Enterprise Management Associates (EMA) - provides findings on how organizations are using these data types, their largest drivers for integrations and their greatest challenges in integrating the data. He will also discuss rampant bravado in network and security programs concerning their organizational maturity.
2. 1.Apa yang dimaksud dengan office
button
Office Button adalah tombol berbentuk bulat
di sebelah kiri atas pada produk Microsoft
Office 2007 dan 2010. Fungsi Office
button adalah untuk menampilkan
menu-menu New, Open, Save, Save
As, Print, Prepare, Send, Publish, Close
dan Optoins
3. Tahun Versi PowerPoint Sistem Operasi
1987 PowerPoint 1.0 Mac OS classic
1988 PowerPoint 2.0 Mac OS classic
1990 PowerPoint 2.0 Windows 3.0
1992 PowerPoint 3.0 Mac OS classic
1992 PowerPoint 3.0 Windows 3.1
1993 PowerPoint 4.0
Windows NT 3.1,
Windows 3.1,
Windows 3.11
1994 PowerPoint 4.0 Mac OS classic
1995 PowerPoint 7 for Windows 95 Windows 95, Windows NT
1997 PowerPoint 97 Windows 95/98, Windows NT 4.0
1998 PowerPoint 98 Mac OS Classic
1999 PowerPoint 2000
Microsoft Windows 98,
Windows NT 4.0,
Windows 2000
2000 PowerPoint 2001 Mac OS X
2001 PowerPoint 2002 Windows 2000/XP
2002 PowerPoint v.X Mac OS X
2003 PowerPoint 2003
Windows 2000 Service Pack 3,
Windows XP Service Pack 1,
Windows Server 2003
2004 PowerPoint 2004 Mac OS X
2006 PowerPoint 2007
Microsoft Windows Vista,
Windows XP Service Pack 2,
Windows Server 2003,
Windows Server 2
4. Sejarah. Aplikasi Microsoft PowerPoint
ini pertama kali dikembangkan oleh Bob
Gaskins dan Dennis Austin sebagai
Presenter untuk perusahaan bernama
Forethought, Inc yang kemudian mereka
ubah namanya menjadi PowerPoint.
Pada tahun 1987, PowerPoint versi 1.0
dirilis, dan komputer yang didukungnya
adalah Apple Macintosh.
5. 4.Jelaskan kegunaan dari quick access
toolbar?
Quick access toolbar adalah tombol-tombol
yang terdapat pada microsoft office word dan
microsoft excel
tombol ini berguna untuk meletakkan tombol-tombol
yang sering anda gunakan. quick access toolbar
bisa disesuaikan dengan keingin anda sebagai
pengguna.
Tombol yang biasanya terdapat quick access
toolbar:
undo fungsi untuk membatalkan pembatalan teakhir.
redo fungsi untuk melakukan pembatalan yang
dilakukan undo.
save fungsi menyimpan dokumen baru atau
perubahan dokimen yang telah ada.
6. Tombol Ribbon dalam Power Point adalah
fasilitas berupa sekumpulan menu jalan pintas
yang baru di PowerPoint 2007, menggantikan
sistem tab menu tradisional. Ribbon ini bisa
berupa tab menu dan bisa juga berupa ikon.
Hal ini dirancang agar responsif terhadap
keinginan Anda dan mudah digunakan. Bagian
utama dari Ribbon adalah Ribbon Tabs yang
berisi sebanyak 7 (tujuh) menu utama yaitu:
Home, Insert, Design, Animations, Slide Show,
Review dan View.
7.
8. Home, memformat,memasukan/menghapus baris kolom dll
1. Open : Membuka file yang sudah disimpan
2. Save : Menyimpan file atau dokumen
3. Cut : Memotong teks atau objek
4. Copy : Mengopi teks atau objek
5. Paste : Menempatkan hasil potongan atau atau
kopian
9. Menu Slide Show, digunakan untuk menampilkan presentasi, pengaturan
penampilan file presentasi dan sebagainya.
•View Show, untuk menjalankan tampilan slide dalam satu layar penuh.
•Set Up Show, untuk melakukan pengaturan slide saat slide dijalankan.
•Rehearse Timings, untuk menetukan durasi waktu otomatis saat slide
dijalankan.
•Record Narration, untuk melakukan rekaman narasin terhadapa slide.
•Action Buttons, untuk membuat tombol navigasi tombol aksi dalam slide.
•Action settings, untuk melakukan pengaturan proses atau aksi
terghadap suatu tombol navigasi.
•Animation, untuk menentukan animasi slide dengan skema yang telah
ditentukan oleh powerpoint.
•Custom Animation, untuk menentukan animasi dengan beberapa
variasi, tidak bergantun pada skema animasi.
•Slide transition, untuk menentukan bentuk animasi transisi atau animasi
perpindahan antarslide.’
•Hide Slide, untuk menyembunyikan slide.dan Custom Show untuk
melakukan pengaturan urutan tampilan slide presentasi.
10. File ringkas File dipadatkan secara otomatis dan pada beberapa
kasus, dapat menjadi 75 persen lebih kecil. Format Open XML
menggunakan teknologi pemadatan zip untuk menyimpan dokumen,
menawarkan potensi penghematan biaya karena mengurangi ruang disk
yang dibutuhkan untuk menyimpan file dan mengurangi bandwidth yang
diperlukan untuk mengirimkan file melalui email, lewat jaringan, dan
melintasi internet.
Pemulihan file rusak yang telah disempurnakan File disusun secara
modular yang menyimpan berbagai komponen data berbeda dalam file yang
terpisah satu sama lain. Hal ini memungkinkan file dibuka bahkan jika
komponen dalam file (misalnya, bagan atau tabel) rusak.
11. Integrasi dan interoperabilitas data bisnis yang lebih
baik Menggunakan Format Open XML sebagai kerangka kerja
interoperabilitas data untuk rangkaian produk Office berarti bahwa
dokumen, lembar kerja, presentasi, dan formulir dapat disimpan dalam
format file XML yang tersedia secara gratis untuk digunakan atau
dilisensikan oleh siapa saja, bebas royalt
Deteksi dokumen yang memuat makro menjadi lebih
mudah File yang disimpan dengan menggunakan akhiran "x"
default (seperti .docx, .xlsx, dan .pptx) tidak mungkin memuat makro
Visual Basic for Applications (VBA) dan makro XLM. Hanya file yang
ekstensi nama filenya berakhiran "m" (seperti .docm, .xlsm, dan
.pptm) yang dapat memuat makro.