Kamis, 06 Januari 2011

1
Fried Chicken Paste


Material:

     * 1 small chicken cut into small
     * 1 small garlic into small pieces
     * 1 teaspoon salt SDK
     * 1 stalk lemongrass, take the whites only.
     * 1 red chili, seeded
     * 1 red tomato, thinly sliced
     * cooking oil to taste

Chili:

     * 8 pieces red chili
     * 5 red chili pepper
     * 3 cloves garlic
     * grains pepper to taste
     * 1 1 / 2 SDK tea fried shrimp paste
     * salt to taste

How to cook:


     * Brush chicken with salt and white until blended bwang
     * Fried chicken until golden brown and then lift
     * Saute until wilted lemon grass and chili oil with 4 SDK
     * Enter the tomatoes and other spices, and cook until fragrant
     * Enter the fried chicken, mix well
     * Remove and serve to family

0
Young Coconut Ice Cream


Material:

     * 1 / 2 ltr fresh sus
     * 100 ml coconut water
     * 1 SDK cornstarch, dissolve slightly in water
     * 3 chicken eggs, take the yellow of course and then shaken
     * 200 gr young coconut meat
     * 100 mk heavy cream


Method:

     * Combine milk and coconut water then stir well
     * Cook over low heat while stirring continues until the heat
     * Enter the cornstarch liquid and then stirring constantly until boiling
     * Ambi little dough then mix with egg yolk.
     * Put back into the batter. Cook until boiling then remove and keep on stirring until the steam is lost.
     * Add young coconut meat and cream and stir well.
     * After a bit cold, put in freezer until half frozen.
     * Stir until blended and then save it back in the freezer until frozen.
     * Serve in small glass cups...

0
Chicken Cordon Bleu

 

Material:

2 chicken breasts, skinless
2 pieces of sliced roast beef (roast beef)
2 teaspoons mustard
salt & pepper to taste

Skin:
 
wheat flour (plain flour)
bread crumbs (bread crumbs)
1 egg beaten

Method :
1. Cut the chicken breasts horizontally (wide), but do not get truncated. Open in the middle, coat wit mustard, salt & pepper.
2. Place roast beef in tengah2 chicken breasts, cover again. If necessary, skewer with a toothpick so as not to
open. Put in refrigerator for 30 minutes.
3. Labur chicken breasts with flour, then dip in beaten eggs. After that labur with bread flour until the whole
surface of the coated chicken breasts.
4. Fry over low heat first. After 3 / 4 cooked, raise the fire. Do not forget to discard toothpicks after cooking,
before the serve.
5. Serve with ketchup or chili sauce


 

0
White Cake Recipe Fruit Cake

   

Material:
      * 220 g butter
     * 300 g sugar
     * 4 egg yolks
     * 4 egg whites
     * 60 g mixed peel
     * 100 g currants
     * 150 g candied cherries
     * 300 g raisins
     * 180 g plain flour
     * 60 ml orange juice


Method:

     * Beat butter and sugar until smooth.
     * Add egg yolks, beat well.
     * Enter your fruits and orange juice and stir well.
     * Add flour and stir well.
     * Beat the egg whites until stiff.
     * Enter into the batter and stir well.
     * Pour into a baking dish, smooth.
     * Bake in the oven to 180 C for 30 minutes.
     * Remove and let cool.

0
Technology acceptance model

The Technology Acceptance Model (TAM) is an information systems theory that models how users come to accept and use a technology. The model suggests that when users are presented with a new technology, a number of factors influence their decision about how and when they will use it, notably:
  • Perceived usefulness (PU) - This was defined by Fred Davis as "the degree to which a person believes that using a particular system would enhance his or her job performance".
  • Perceived ease-of-use (PEOU) - Davis defined this as "the degree to which a person believes that using a particular system would be free from effort" (Davis 1989).
The TAM have been continuously studied and expanded, the two major upgrade being the TAM 2 (Venkatesh & Davis 2000 & Venkatesh 2000) and the Unified Theory of Acceptance and Use of Technology (or UTAUT, Venkatesh et al. 2003). A TAM 3 have also been proposed (Venkatesh & Bala 2008).

History

 TAM is one of the most influential extensions of Ajzen and Fishbein’s theory of reasoned action (TRA) in the literature. It was developed by Fred Davis and Richard Bagozzi (Davis 1989, Bagozzi & Warshaw 1992). TAM replaces many of TRA’s attitude measures with the two technology acceptance measures— ease of use, and usefulness. TRA and TAM, both of which have strong behavioural elements, assume that when someone forms an intention to act, that they will be free to act without limitation. In the real world there will be many constraints, such as limit the freedom to act (Bagozzi & Warshaw 1992).

Bagozzi, Davis and Warshaw say:
Because new technologies such as personal computers are complex and an element of uncertainty exists in the minds of decision makers with respect to the successful adoption of them, people form attitudes and intentions toward trying to learn to use the new technology prior to initiating efforts directed at using. Attitudes towards usage and intentions to use may be ill-formed or lacking in conviction or else may occur only after preliminary strivings to learn to use the technology evolve. Thus, actual usage may not be a direct or immediate consequence of such attitudes and intentions. (Bagozzi & Warshaw 1992)
Earlier research on the diffusion of innovations also suggested a prominent role for perceived ease of use. Tornatzky and Klein (Tornatzky & Klein 1982) analysed the adoption, finding that compatibility, relative advantage, and complexity had the most significant relationships with adoption across a broad range of innovation types. Eason studied perceived usefulness in terms of a fit between systems, tasks and job profiles, using the terms "task fit" to describe the metric (quoted in Stewart 1986)

Usage

Several researchers have replicated Davis’s original study (Davis 1989) to provide empirical evidence on the relationships that exist between usefulness, ease of use and system use (Adams, Nelson & Todd 1992; Davis 1989; Hendrickson, Massey & Cronan 1993; Segars & Grover 1993; Subramanian 1994; Szajna 1994). Much attention has focused on testing the robustness and validity of the questionnaire instrument used by Davis. Adams et al. (Adams 1992) replicated the work of Davis (Davis 1989) to demonstrate the validity and reliability of his instrument and his measurement scales. They also extended it to different settings and, using two different samples, they demonstrated the internal consistency and replication reliability of the two scales. Hendrickson et al. (Hendrickson, Massey & Cronan 1993) found high reliability and good test-retest reliability. Szajna (Szajna 1994) found that the instrument had predictive validity for intent to use, self-reported usage and attitude toward use. The sum of this research has confirmed the validity of the Davis instrument, and to support its use with different populations of users and different software choices.
Segars and Grover (Segars & Grover 1993) re-examined Adams et al.’s (Adams, Nelson & Todd 1992) replication of the Davis work. They were critical of the measurement model used, and postulated a different model based on three constructs: usefulness, effectiveness, and ease-of-use. These findings do not yet seem to have been replicated.
Mark Keil and his colleagues have developed (or, perhaps rendered more popularisable) Davis’s model into what they call the Usefulness/EOU Grid, which is a 2×2 grid where each quadrant represents a different combination of the two attributes. In the context of software use, this provides a mechanism for discussing the current mix of usefulness and EOU for particular software packages, and for plotting a different course if a different mix is desired, such as the introduction of even more powerful software (Keil, Beranek & Konsynski 1995).
Criticisms of TAM as a "theory" include its lack of falsifiability, questionable heuristic value, limited explanatory and predictive power, triviality, and lack of any practical value. (Chuttur 2009)
Venkatesh and Davis extended the original TAM model to explain perceived usefulness and usage intentions in terms of social influence and cognitive instrumental processes. The extended model, referred to as TAM2, was tested in both voluntary and mandatory settings. The results strongly supported TAM2 (Venkatesh & Davis 2000).
In an attempt to integrate the main competing user acceptance models, Venkatesh et al. formulated the Unified Theory of Acceptance and Use of Technology (UTAUT). This model was found to outperform each of the individual models (Adjusted R square of 69 percent) (Venkatesh et al. 2003).
For a recent analysis and critique of TAM see Bagozzi (Bagozzi 2007).
Independent of TAM, Scherer (Scherer 1986) developed the Matching Person & Technology Model in 1986 as part of her National Science Foundation-funded dissertation research. The MPT Model is fully described in her 1993 text (Scherer 2005, 1st ed. 1993}}), "Living in the State of Stuck," now in its 4th edition. The MPT Model has accompanying assessment measures used in technology selection and decision-making, as well as outcomes research on differences among technology users, non-users, avoiders, and reluctant users.

 



0
How to set laptop wireless

1. Check your computer / laptop you whether wireless driver has been installed anything yet
2. How to check the Menu - Run, type devmgmt.msc / right click my computer-select properties-select
    hardware-select device manager, as shown below:

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXwoSKYlGXXfKsIhzCks23hbQVpP16y5iKni1hrFOCNIFAvGV6uTZ3AYN6_PYYdOOoB4nNx1Xgg1cbL1gGVE-Z3CmlWDE69ZQdzMv9nbKHRr0RM2Oi6EtRuWhQ_tQCWi4Z7WYjFHRPbL0/s320/dm_wifi.JPG 
3. If you do not like the picture above, yes the driver is first installed (usually marked with colored yellow      question mark if the driver is not installed)

4. Select Control Panel - Network Connections, double click on the wireless network connection options.
    On the left side menu, select refresh the network list, so it will appear a list of existing wireless networks in   range
Wireless connection is divided into two groups, unsecured and secured. On unsecured laptop we'll automatically registered to use dynamic IP, sedangankan on our secured registration is required prior to the network admin to get the IP.
Choose one of the unsecured-if any-from the list of available wireless connectivity options, and then press the connect button on the bottom right

 
5.If the connect, the Windows tray icon, will appear wi-fi icon that flashes green comes with the quality of  
  wi-fi signal strength received the Excellent (54 Mbps), Very Good, Good, Low, Poor
  To view the connection status, double-click on the icon will display a window status of the wireless               connection.

6.Coba click the wireless icon located on the right side menubar under the computer / laptop.
Sabtu, 01 Januari 2011

0
Keep your eye

 [mata1.jpg]

Unless you are working in the field, common for employees to be in front of the computer from morning until the time at home. All day dealing with computer screens is not rare cause eye condition feels tired. The eyes feel uncomfortable, irritation, pain, drowsiness so that it looks red, and watery. Vision was blurry and often see double, even the ability to see and distinguish colors to be dropped. Symptoms of eye fatigue is usually called Astenopia.If allowed to be sustainable, these symptoms will be followed by headaches, shoulder, back and waist, vertigo, and bloated. Health problems like this is really going to disrupt productivity. Here are tips to keep your eye health is maintained.

1. Rest your eyes.Eyes off the computer monitor every 15 minutes or so by looking out the window or into a corner or a distant object for about 10 minutes. If necessary, attach the reminder to remind you to blink because the eye is too focused on computer monitors, tend to forget to blink. Another easy way is to close your eyes for 20 seconds.

2. Note the position of your seat and position of the eye against the computer monitor.Put your computer monitor equal or lower with your eye level. Position the monitor is lower than eye level will increase the production of tears and soothe tired eyes. Research also shows that a low monitor position reduces muscle fatigue in the neck, increase attention span and an overall sense of comfort for computer users.

3. Notice the lighting in the room your work palace. Avoid work in the room who had less than 200 lux illumination. Excessive lighting is also not good for the eyes. Light source should come from the side of the monitor with a soft light. Also reduce the brightness of your monitor level. This will make the eye feel more comfortable.


4. Take a Break.After working at the computer for 90 minutes to 120 minutes, you need to rest for 10-20 minutes. Wake up from your chair to take a walk and do simple relaxation to relax tense muscles.

5. Get used to check the health of your eyes at least once a year.Thus, vision problems can be quickly detected and immediate action taken to overcome them.

6. Meet the nutritional needs of your eyes.Always try to eat foods rich in carotenoids such as carrots, yellow melons, and peaches. Lutein and zeaxanthin are two substances that can be found in pumpkin, green vegetable that will protect the retina from damage. Vitamin C is found in green leafy vegetables, all kinds of berries and orange, is antioxidant that can also help to protect the eyes from cataracts attack. While Vitamin E is an antioxidant that also protects cells from free radical attack. Vitamin E can be found in grains, vegetable oils and green vegetables.Vitamin B is a vitamin that support the work of nerves, including nerves of vision. This vitamin can be found in whole grains, fresh vegetables and fruit growth.
As an option, you can also consume a supplement containing vitamin B match your needs.
 
Education & Technology | © 2010 by Agus Hockey | Supported by Tips, Trik, and Technology & WordPress Theme 2 Blog

Kiriman ini mengonfirmasi kepemilikan saya terhadap situs dan situs ini mematuhi kebijakan program dan Persyaratan dan Ketentuan AdSense.