Cerpen 2

In: Novels

Submitted By r150684
Words 4544
Pages 19

Sudah tiga bulan ini aku tinggal di tempat ini. Tempat yang selama ini tidak pernah sedikit pun terbayang oleh Ku. Aku yang selama ini biasa hidup enak dan tidak mengenal kata susah sekarang harus tidur dengan beralaskan karto dan beratapkan seng yang kalau disaat hujan turun bagaikan sebuah alunan musik merdu yang memecahkan keheningan. Istanaku yang baru tak lebih dari rumah kardus yang berukuran 4x3, bahkan ini lebih kecil dari luas kamarku dulu. Di sinilah aku bersama keluarga pak engkos tinggal. Keluarga Pak Engkos sendiri terdiri dari 4 orang, dia, istri Pak Engkos yang setia menemani serta dua orang putra putri Pak Engkos yang menambah keceriaan rumah yang sebenarnya tidak layak disebut rumah. Walaupun aku sedang jauh dari rumah, aku tetap merasa seperti dirumah. Keramahan Bu Engkos, canda Pak Engkos serta senyum dan tawa dari anak-anak Pak Engkos membuatku merasa tempat ini adalah rumah. Kehidupan Pak Engkos jauh dari kecukupan, bagaimana tidak Pak Engkos hanya seorang pemulung sampah yang penghasilannya tidak tetap. Suatu hari Pak Engkos bercerita hasil memulungnya tidak pernah tetap, kalau lagi banyak bisa dapet sampai 20 ribu tapi kalau lagi sedikit 10 ribu aja susah. Uang sebesar itu dia pergunakan untuk mencukupi kebutuhan hidup keluarganya yang sekarang di tambah dengan kehadiranku di rumah ini. Menurut Pak Engkos dia bisa dapat rame kalau lagi ada acara di stadiun terbesar di negara tercinta Republik Indonesia, apa lagi kalau bukan Glora Bung Karno, seperti acara pertandingan sepak bola, konser atau pagelaran Kampaye kayak yang sedang berlangsung ini. Karena kata Pak Engkos budaya orang indonesia yang jorok dan kotor serta tidak mau buang sampah pada tempatnya membuat segala bentuk sampah ada disekeliling stadiun tersebut. Bahkan kata Pak Engkos setelah kampaye salah satu partai besar sampah itu berserakan hingga ke…...

Similar Documents

Jet 2 Task 2

...than $50,000 in this area than the previous year. I would suggest that the budgeted amount be somewhere between the year 7 & 8 amounts, given the positive prediction that sales will increase, which would put it between $1273867 and $1322075. This over statement in this category has also led to the company to under budget their Operating Income which they have budgeted at $80585. With the prediction of selling more units than year 8, the company should be budgeting a higher Operating Income than the previous year’s amount of $97,533. They definitely should not be indicating that they will be selling more but making less. This would be a bad financial sign for the company, as it is showing a lack of leadership and management skills. 2. No budget can be perfect, so keeping this in mind; one would expect variances to be present within the flexible budget. The variances found within this flexible budget, however, seem to highlight the flaws that were noticed and explained above. The first variance that is displayed is the unfavorable variance of $130,065.00 in Net Sales. This is due to the fact that the company sold 3423 units, not the 3510 that was placed in the budget. The variance is considered unfavorable, as the company did not make as much in net sales as it had budgeted for. The positive side for the company is that it did, in fact, turn around the negative sales trend that existed between years 7 & 8. The next variance comes in Direct Materials. ......

Words: 1118 - Pages: 5

Unit 2 Assign 2

...Unit 2 Assignment 2: Microsoft Environment Analysis Vulnerabilities: * “Cross-site request forgery (CSRF) vulnerability in the Services module 6.x-3.x and 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors”. * “SQL injection vulnerability in the Backend History module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to execute arbitrary SQL commands via unspecified vectors”. * “The HP StoreOnce D2D backup system with software before 3.0.0 has a default password of badg3r5 for the HPSupport account, which allows remote attackers to obtain administrative access and delete data via an SSH session.” * “The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.” * Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.” Elevation/Priority: * The priority level is medium, also should be seen to when possible. Priority Level =......

Words: 565 - Pages: 3

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Jet 2 Task 2

...Rachel Johnson Addy JET Task 2 March 29, 2014 JET Task 2 1. A budget is an itemized estimate of expected income as well as estimated expenses over a specified period of time. The reason to design a budget is to regulate spending. There are multiple causes of concern with Competition Bikes budget plan. The main cause for concern is that the sales estimated for year 9 is 3,510 units. This estimate is not supported by past sales data. Due to the current economic status, the amount of units sold from year 7 to 8 decreased 15% according to the horizontal analysis. Rider sponsorships were also reduced and will most likely remain limited in the future (WGU, 2014). There is some misleading and inaccurate information posted within the budget. Under the Selling, General, and Administrative breakdown “utilities” is listed at $150,000 on the vertical analysis for year 8 and year 9. Then there is another listing for “utilities and services” of $54,000. This is misleading because this entry was not listed in the expenses from the previous year. Another cause of concern is that the cash budget is not included in the uncollected receivables. CB makes expensive bikes so there should be room for uncollectable accounts. The uncollectable receivables budget could be used to cover the any uncollected payments. The reduction of sponsorships and the slow economy could possibly cause a rise in uncollectable accounts. There is also some concern because the operating income is......

Words: 1749 - Pages: 7

Unit 2 Asst 2

...NT1210 Chapter 2 Review Questions 1. Which of the following terms is the closest synonym to the term "computer networking"? c. Datacom 2. Ann uses her email address, me@here.com , to send an email to Bob, whose email address is you@there.com The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server. 3. According to this chapter, which of the following concepts happens happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States. c. The call uses both analog and digital electrical signals. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two home telephones in the United States? a. The call uses only analog electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video which of the following answers is the least likely to impact the size of the video file? a. A character set 6. A student records a video of a professor teaching a class. The student plans to later post the video online on a...

Words: 355 - Pages: 2

Unit 2 Asignment 2

...Unit 2 Assignment 1 Blank Answer Sheet Name: Date: Electronics ET2530 Chapter 2 (pp. 111-113) 2. A 1500 kHz carrier and a 2 kHz intelligence signal are combined in a non-linear device. List all the frequency components produced. - 1498, 1500, and 1520KHz 3.If a carrier is amplitude modulated what causes the sideband frequencies? - The non-linear mixing of the carrier and intelligence frequencies. 
 4.What determines the bandwidth of emission for an AM transmission? - It is twice the frequency of the highest audio frequency transmitted. The upper sideband is fc +FM where fc is the carrier frequency and FM is the modulation (audio) frequency .The lower sideband is fc – FM. The total bandwidth is 2*FM 5.Explain the difference between a sideband and a side frequency. - A sideband carries the modulation or "information". in old fashioned AM and FM transmission schemes, a carrier is broadcast in addition to the sideband(s). Only the sideband is needed to communicate. A spurious frequency that happens when a carrier is transmitted has no added "information" and just adds to the transmission bandwidth. Sometimes these occur by intermixing within the transmitter. a common example is CB splatter from overdrive of RF amps. 
 9.Draw a diagram (or indicate which text book Figure # shows this) of a carrier wave envelope when modulated by 50% by a sinusoidal wave. Indicate on the diagram the dimension from which the percentage of modulation is......

Words: 734 - Pages: 3

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Aft 2 Task 2

...Barrier is assuming responsibility instead of saying, “we have to do a better job of screening the people who come in.” | Security, Tim Blakely | Responded to call for missing child | Interested in looking for solutions but not about collaboration with nursing staff. Feels that approach to safety should be almost prison-like | Tina’s father | Took child home | Took advantage of the situation and did not disclose custody arrangements with staff. | Improve Interactions The following improvements should be made to improve interactions involving pediatric surgery: 1. When a surgery is scheduled, any pertinent information such as history and physical and office notes should be communicated from the office staff to the facility. 2. Upon admission, the registrar should be prompted, per protocol, to inquire about information regarding living arrangements and custody. This information should be recorded in the admission process and be visible for all providers. The custodial parent should receive an armband that matches that of the child. 3. The armband of both parent and child should be compared upon entering the Ambulatory Surgical Unit. While in preop, a patient and the parent should be educated regarding the need to have a parent present during all procedures for the entire time. If, for any reason, the parent is unable to remain at the facility, the procedure should be rescheduled. This practice should be supported by administration and the surgeon and should......

Words: 1742 - Pages: 7

M5 2 Ra 2

...M5 Assignment 2: RA2: Course Project Task II (Etiology and Treatment) Etiology and Treatment This assignment follows up on your M3 A2 assignment in which you made primary and secondary diagnoses and also considered some of the differential diagnoses for your chosen case. Please do the following: - Modify your diagnoses (if needed) based upon the feedback I gave or the questions I asked you to spur your thinking; - Read five (5) peer-reviewed sources on the etiology of both your primary and secondary diagnosis. - Read five (5) peer-reviewed sources on the treatment of both your primary and secondary diagnosis. - Your paper should have these sections with the headings in bold: - - introduction o etiology of primary diagnosis o Etiology of secondary diagnosis o Therapeutic modality of primary diagnosis o Therapeutic modality of secondary diagnosis o Justification of the Selected Therapeutic Modality for the Primary Diagnosis o Justification of the Selected Therapeutic Modality for the Secondary Diagnosis o Application of the Treatment for the Primary Diagnosis o Application of the Treatment for the Secondary Diagnosis. o Citations / References in APA style. **Please focus on this, as this is still an issue. - The total page should be 8-10 pages. - NOTE: The developed emphasized that you should not discuss your differential diagnoses you did in Module 3 in this paper. These are......

Words: 290 - Pages: 2

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Level 2 Unit 2

...on hourly. For example, if you work at Barnard castle school as a Finance Officer. You will be paid monthly for the work you have done within last month. TENURE: - Is guaranteed job contract. It says how long you will be held to the position you are applying for. It could be permanent, full-time, part-time and temporary. For example, if you’re working at Barnard castle school as a finance Officer you will be work for permanent full-time permanent. It means that you are requiring to work all day –everyday. After this point, they cannot be fired without just cause. * Part-time:- It’s means for only part of the usual working day or week. For example, if you are applying for part-time position then you will be work for certain day like 2 or three days or few hours in a week. * Temporary: - This means lasting for only a limited period of time; not permanent. For example if you are applying for temporary position then its means you are only working for limited period of time. DUTIES AND RESPOSIBILITIES: - A duty is something you must do by virtue of your position and is a legal or moral responsibility. For example, as Finance Officer you have to be responsible for the daily oversight of the finance system including checking, reconciliation and banking of monies received in Barnard castle school. Your duty will be to assist with monthly cash flow monitoring. OVERALL JOB OBJECTIVES: - This means what is the job role all about. For example, as a Finance......

Words: 1595 - Pages: 7

Amt 2 Task 2

...Community Health Needs Assessment Trinity Community Hospital AMT Task 2 Community Health Needs Assessment Trinity Community Hospital conducted a community health needs assessment (CHNA) to identify the needs of the local population. The assessment focused on oncology, orthopedic, and cardiovascular services. The following report will analyze the community health needs assessment by identifying the major risk factors in the community, and discussing if the needs defined in the evaluation are being addressed. The report will also outline recommendations for any outstanding community needs. Major Risk Factors Oncology Services The community health needs assessment identified that new cancer cases are expected to increase by 34% due to the aging population that will be over 65 within the next five years and a rise in expectation of men and women developing cancer. The assessment also identified that the current services are already stressed.; physician practices are at capacity, facilities and equipment are not keeping pace with the patient volume, services are fragmented, and there is little emphasis on prevention education and control. Orthopedic Services Another risk factor for the community is the sharp increase in the need for orthopedic services forecasted over the next five years. The need for orthopedic procedures in the next five years are expected to increase by 46%, inpatient joint and spine cases will increase by 30%, and outpatient spine and......

Words: 873 - Pages: 4


...“Airien, bangun!! Matahari dh terpacak. Apa la nak jadi dengan kau neh”. Malas betul”. Begitula leteran mama ku setiap pagi selaku pensyarah tak bertauliah sejak aku abes stpm. Aku bukannya malas cuma segan nak bangun awal. Biasalakan baru sekarang dapat berehat dari dari rutin harian sebagai student. Kira lepas geram la ni. Hehe. “ye ma, Ien bangun la ni. Jangan la bagi ceramah lagi”. Sambil memeluk mama. “ish, apa punya anak dara, pegi mandi dulu. Busukla belum mandi dah peluk mama”. Bebel mama sambil tersenyum. Almaklumlah, anak dara dia sorang je. Aku bingkas bangun ke bilik air. Rutin harian aku bangun, mandi, makan dan tengok tv. Itu je jadual yang dapat aku isi. Keluarga aku, cuma ada mama, papa dan abang ku sorang yang tengah study kat UUM jurusan arkitek. Aku pula belum tentu lagi nak jadi apa. STPM aku cuma 3.8. papa cadangkan aku sambung dalam bidang perubatan, mungkin aku sesuai untuk itu. Harap-harapla. Kehidupan aku boleh di katakan mewah juga. Semua kelengkapan disediakan secukupnya oleh papa ku. ”Mama macam mana? Dah sampai surat tawaran untuk ien?” Soal Airien tidak sabar ketika melihat mamanya membelek beberapa keeping sampul surat. “Tunggu surat dari boyfried ye’”sakat Puan Hasni. “Mama ni, ien singgle and available lagi tau. Tak main la bercinta masa belajar” bidas ien. Puan Hasni terus melemparkan sepucuk surat milik anak kesayangannya untuk mengelakkan ien dari terus membebel. Tanpa menghiraukan mamanya, Airien terus gelojoh......

Words: 1677 - Pages: 7

Unit 2 Assignment 2

...Unit 2 Assign.2 Last 5 Published or Updated Security Advisories: Microsoft Security Advisory (2737111) Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Published or Last Updated: Wednesday, July 25, 2012 Microsoft Security Advisory (2728973) Unauthorized Digital Certificates Could Allow Spoofing Published or Last Updated: Wednesday, July 11, 2012 Microsoft Security Advisory (2719662) Vulnerabilities in Gadgets Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2719615) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2491888) Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of Privilege Tuesday, March 08, 2011 2. Do any vulnerability involve privilege elevation? Is this considered a high priority issue? Yes one, but its importance was not considered a high priority issue as asked 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.......

Words: 337 - Pages: 2

Нарко: Мексика / Narcos: Mexico [01x01-05 из 10] (2018) WEBRip 720p | IdeaFilm | Handwerk | Big Sky (2015)