Tuesday, March 13, 2018

TASK 2 : READING COMPREHENSION PART 2


READING COMPREHENSION
FOR 1-8
"Did you see that?" Joe said to his friend Bill.
"You're a great shooter!"
Bill caught the basketball and bounced it before
throwing it again. The ball flew into the net.
"Bill, you never miss!" Joe said admiringly.
"Unless I'm in a real game," Bill complained.
"Then I miss all the time."
Joe knew that Bill was right. Bill performed much
better when he was having fun with Joe in the school
yard than he did when he was playing for the school
team in front of a large crowd.
"Maybe you just need to practice more," Joe suggested.
"But I practice all the time with you!" Bill objected.
He shook his head. "I just can't play well when people are
watching me."
"You play well when I'm watching," Joe pointed out.
"That's because I've known you since we were five
years old," Bill said with a smile. "I'm just not
comfortable playing when other people are around."
Joe nodded and understood, but he also had an idea.
The next day Joe and Bill met in the school yard again
to practice. After a few minutes, Joe excused himself.
"Practice without me," Joe said to his friend. "I'll be
back in a minute."
Joe hurried through the school building, gathering
together whomever he could find—two students, a math

teacher, two secretaries, and a janitor. When Joe explained
why he needed them, everyone was happy to help.
Joe reminded the group to stay quiet as they all went
toward the school's basketball court. As Joe had hoped,
Bill was still practicing basketball. He made five
baskets in a row without noticing the silent people
standing behind him.
"Hey, Bill!" Joe called out finally.
Bill turned. A look of surprise came over his face.
"I just wanted to show you that you could play well
with people watching you," Joe said. "Now you'll have
nothing to worry about for the next game!"

1.     How many teacher joe hurred in building?
A.     3
B.     4
C.     5
D.    6

2.     What would be the best title for the story?
A.    Joe Joins the Team
B.    Practice Makes Perfect
C.    Bill Wins the Big Game
D.    Bill's Basketball Problem

3.     In line 8, the word performed is closest in meaning to _______.
A.    acted
    1. played
    2. moved
    3. changed

4.     Why is Bill upset?
    1. He plays better in practice than he does during games.
    2. The school yard is not a good place to practice.
    3. Joe watches him too closely when he plays.
    4. His team loses too many games.
5.     Why does Bill play well when Joe is watching him?
    1. He is comfortable with Joe.
    2. Joe tells him how to play better.
    3. He does not know that Joe is there.
    4. He wants to prove to Joe that he is a good player.
6.     Why does Joe decide to gather a group of people?
    1. Because he wants more players for his team
    2. Because he wants to help Bill feel less nervous
    3. Because he wants to show them his talent
    4. Because he wants more people to see the next game
7.     At the end of the story, all of the following people watch Bill practice EXCEPT _______.
    1. Joe
    2. a janitor
    3. a math teacher
    4. the basketball coach
8.     Why does the group have to be quiet when they go to the basketball court?
    1. Because Joe is telling Bill what to do
    2. Because they do not want Bill to know they were there
    3. Because Bill likes to practice alone
    4. Because the group needs to listen to Joe’s instructions

FOR 9-18
When another old cave is discovered in the south of France, it is not usually news. Rather, it is an ordinary event. Such discoveries are so frequent these days that hardly anybody pays heed to them. However, when the Lascaux cave complex was discovered in 1940, the world was amazed. Painted directly on its walls were hundreds of scenes showing how people lived thousands of years ago. The scenes show people hunting animals, such as bison or wildcats. Other images depict birds and, most noticeably, horses, which appear in more than 300 wall images, by far outnumbering all other animals. Early artists drawing these animals accomplished a monumental and difficult task.
 They did not limit themselves to the easily accessible walls but carried their painting materials to spaces that required climbing steep walls or crawling into narrow passages in the Lascaux complex. Unfortunately, the paintings have been exposed to the destructive action of water and temperature changes, which easily wear the images away. Because the Lascaux caves have many entrances, air movement has also damaged the images inside. Although they are not out in the open air, where natural light would have destroyed them long ago, many of the images have deteriorated and are barely recognizable. To prevent further damage, the site was closed to tourists in 1963, years after it was discovered.

9.     Which title best summarizes the main idea of the passage?
    1. Wild Animals in Art
    2. Hidden Prehistoric Paintings
    3. Exploring Caves Respectfully
    4. Determining the Age of French Caves
10.  In line 4, the words pays heed to are closest in meaning to _______.
    1. discovers
    2. watches
    3. notices
    4. buys
11.  Based on the passage, what is probably true about the south of France?
    1. It is home to rare animals.
    2. It has a large number of caves.
C.     It is known for horse-racing events.
    1. It has attracted many famous artists.
12.  According to the passage, which animals appear most often on the cave walls?
    1. Birds
    2. Bison
    3. Horses
    4. Wild cats
13.  In line 10, the word depict is closest in meaning to _______.
    1. show
    2. hunt
    3. count
    4. draw
14.  Why was painting inside the Lascaux complex a difficult task?
    1. It was completely dark inside.
    2. The caves were full of wild animals.
    3. Painting materials were hard to find.
    4. Many painting spaces were difficult to reach.
15.  In line 14, the word They refers to _______.
    1. walls
    2. artists
    3. animals
    4. materials
16.  According to the passage, all of the following have caused damage to the paintings EXCEPT _______.
    1. temperature changes
    2. air movement
    3. water
    4. light
17.  What does the passage say happened at the Lascaux caves in 1963?
A.    Visitors were prohibited from entering.
    1. A new lighting system was installed.
    2. Another part was discovered.
    3. A new entrance was created.


FOR 18-21
Student Volunteers Needed!
On Saturday, December 12th, from 10 A.M. until 4 P.M., Carverton Middle School will be holding a music festival in the school gymnasium. The special event will feature a variety of professional musicians and singers.

Task
Time
Date
Make posters
1 P.M.–4 P.M.
December 5th
Set up gym
11 A.M.–4 P.M.
December 11th
Help performers
9 A.M.–4 P.M.
December 12th
Welcome guests
10 A.M.–2 P.M.
December 12th
Clean up gym 
4 P.M.–7 P.M.
December 12th

Interested students should speak with Ms. Braxton, the music teacher. Students who would like to help at the festival must have written permission from a parent or guardian.

18.  What time will the festival begin?
    1. 10 A.M.
    2. 11 A.M.
    3. 1 P.M.
    4. 2 P.M.
19.  In line 3, the word feature is closest in meaning to _______.
    1. look
    2. keep
    3. include
    4. entertain
20.  What job will be done the day before the festival begins?
    1. Making posters
    2. Setting up the gym
    3. Cleaning up the gym
    4. Helping the performers
21.  Who is told to talk to Ms. Braxton?
    1. Parents
    2. Students
    3. Teachers
    4. Performers

FOR 22-25
A new atomic clock being developed for navigation satellites will perform better than previous devices. The clock will use a new microwave cavity design to provide a compact and lightweight package and new electronic techniques to maintain long-term stability. The clock can provide precise navigation information because it is stable to one second in three million years. The differences in the time when signals from four satellites arrive at one location can be used to calculate that position to within a few yards.

22.  From the passage, it can be inferred that which of the following characteristics of the clock mentioned will be most impressive?
A.    Its compact size
B.    Its weight
C.    Its accuracy
D.    Its ability to measure distance

23.  It can be inferred from the passage that the new clock will be
    1. long-lasting
    2. harmful to humans
    3. produced in great numbers
    4. very attractive looking
24.  According to the passage, signals from how many satellites will be used to calculate a position?
    1. 1
    2. 2
    3. 3
    4. 4
25.  What is the primary purpose of the passage?
    1. To teach a lesson
    2. To sell a product
    3. To support a theory
    4. To provide information

REFERENCE


Wednesday, March 7, 2018

Task 1: Reading Comprehension part 1

Reading comprehension No. 1-10

While the bald eagle is one national symbol of the United States, it is not the only one. Uncle Sam, the bearded gentleman costumed in the red, white, and blue stars and stripes of the nation's flag, is another well-known national symbol. According to legend, this character is based on Samuel Wilson, the owner of a meat packing business in Troy, New York. During the War of 1812, Sam Wilson's company was granted a government contract to supply meat to the nation's soldiers; this meat was supplied to the army in barrels stamped with the initials U.S., which stood for United States. However, the country was at that time relatively young, and the initials U.S. were not commonly used. Many people questioned what the nitials represented, and the standard reply became "Uncle Sam", for the owner of the barrels. It is now generally accepted that the figure of Uncle Sam is based on Samuel Wilson, and the U.S. Congress has made it official by adopting a resolution naming Samuel Wilson as the inspiration for Uncle Sam.

1. Uncle Sam-Symbols of the Nation. The paragraph preceding this passage most probably discusses...
a. the war of 1812.
b. the bal eagle, which symbolizes mthe United States.
c. Sam Wilson's meat-packing company.
d. the costume worn by Uncle Sam.

2. Which of the following is the most appropriate title for this passage?
a. The Bald Eagle.
b. The symbols of the United States.
c. Samuel Wilson
d. Uncle Sam-Symbols of the Nation.                       

3. Which of the following is not mentioned about Uncle Sam's appearance?
a. He wears facial hair
b. The is some blue in his clothing
c.  He is bald.
d. His clothes have stripes in them.

4. The word "costumed" in line 2 could most easily be replaced by
a. dressed
b. nationalized
c. hidden
d. seen

5. Sam Wilson was the propriator of what type of business?
a. A costume company
b. A meat-packing company.
c. A military clothier.
d. A barrel-making company.

6. The word “granted', in line 5 means...
a. Refused.
b. Underbid for.
c. Told about
d. Given

7. According to the passage, what was in the barrels stamped U.S.?
a. Sam Wilson.
b. Food for the army.
c. Weapons to be used in the war.
d. Company contracts

8. The word "initials" in line 7 means...
a. Nicknames
b. Family names.
c. First letter of the words.
d. Company names.


9. The word "official" in line 11 is closest in meaning to...
a. Authorized.
b. Professional.
C. Dutiful.
d. Accidental.

10. In 1812, people most probably answered that the letters “U.S." " written on the barrels stood for "Uncle Sam" because...
a. congress required it.
b. Samuel Wilson was their favorite uncle.
c. Sam Wilson preffered it.
d. they were nat exactly sure what the letters meant.

Reading compherension No. 11-20

The Alaska pipeline starts at the frozen edge of the Arctic Ocean. It stretches southward across the largest and northernmost state in the United States, ending at a remote ice-free seaport village nearly complicated to operate. The steel pipe crosses windswept plains and endless miles of delicate tundra that tops the frozen ground. It weaves through crooked canyons, climbs sheer mountains, plunges over rocky crags makes its way through thick forests, and passes over or under hundreds of rivers and streams. The pipe is 4 feet in diameter, and up to 2 million barrels (or 84 million gallons) of crude oil can be pumped through it daily.
Resting on H-shaped steel racks called "bents," long sections of the pipeline. Follow a zigzag course high above the frozen earth. Other long sections drop out of sight beneath spongy or rocky ground and return to the surface later on. The of the pipeline's up-and-down route is determined by the often harsh demands of the arctic and subarctic climate, the tortuous lay of the land, and the varied compositions of soil, rock, or permafrost (permanently frozen ground), Atle more than half of the pipeline is elevated above the ground. The remainder is burried anywhere from 3 to 12 feet, depending largely upon the type of terrain and the properties of the soil.
One of the largest in the world, the pipeline cost approximately $8 billions and is by far the biggest and most expensive construction project ever undertaken by private industry. In fact, no single companies formed a consortium in order to share the costs. Each company controlled oil rights to particular shares of land in the oil fields and paid into the pipeline-construction fund according to the size of its holdings. Today, despite enormous problems of climate, supply shortages, equipment breakdowns, labor disagreements treacherous terrain, a certain amount of mismanagement, and even theft, the Alaska pipeline has been completed and is operating.

11. passage primarily discusses the pipeline's...
a. operating costs.
b. employees.
c. consumers.
d. construction.

12. The word "it" in line 4 refers to...
a. Pipeline.
b. Ocean.
c. State.
d. Village.

13. According to the passage, 84 million gallons of oil can travel through the pipeline
each...
a. day.
b. week.
c. month.
d. year.

14. The phrase "resting on" in line 9 is closest in meaning to...
a. Consisting of.
b. Supported by
c. Passing under
d. Protected with.

15. The author mentions all of the following as important in determine pipeline's route EXCEPT the...
a. climate.
b. lay of the land itself.
c. local vegetation.
d. kind of soil and rock.

16. The word "undertaken" in line 18 is closest in meaning to...
a. Removed.
b. Selected.
c. Transported.
d. Attempted.

17. How many companies shared the costs of constructing the pipeline?
a. 3
b. 4
c. 8
d. 12.

18. The word "particular" in line 20 is closest in meaning to...
a. Peculiar.
b. Specific.
c. Exceptional.
d. Equal.
19. Which of the following determined what percentage of the construction cost each member of the consortium would pay?
a. How much oil field land each company owned.
b. How long each company had owned land in the oil fields.
C.How many people worked for each company
D.How many oil wells were located on the company's land.

20. where in the passage does the author provide a term for an earth covering at always remains frozen?
a. Line 3
b. Line 10.
c. Line 15.
d. Line 22.

Reading compherension No. 21-25
The food we eat seems to have profound effect on our health. Although science has made enormous steps in making food more fit to eat, it has, the same time, made many foods unfit to eat. Some research has shouwn that perhaps eighty percents of human illnesses are related to diet and forty percent of cancer is related to the diet as well, especially cancer of the colon. People of different cultures are more prone to contract certain illnesses because of the characteristic foods they consume.
That food is related to illness is not a new discovery. In 1945, government researchers realized that nitrates and nitrites (commonly used to preserve color in meats) as well as other food additives caused cancer. Yet, these carcinogenic additives remain in our food, and it becomes more difficult all the time to know which ingredients on the packaging labels of processed food are helpful or harmfull.
The additives that we eat are not all so direct. Farmers often give peni- dillin to cattle and poultry, and because of this, penicillin has been found in the milk of treated cows. Sometimes similar drugs are administered to animals not or medicinal purposes, but for financial reasons. The farmers are simply trying to fatten the animals in order to obtain a higher price on the market. Although the Food and Drug Administration (FDA) has tried repeatedly to control these procedures, the practices continue.
A healthy diet is directly related to good health. Often we are un detrimental substances we ingest. Sometimes well-meaning farmer who do not realize the consequences add these substances to food with knowledge.

21. How has science done a disservice to people?
a. Because of science, disease caused by contaminated food has been virtually eradicated.
b. It has caused a lack of information concerning the value
c. As a result of scientific intervention, some potentilly harmful substances have been added to our food.
d. The scientists have preserved the color of meats, but not of vegetables.

22. The word "prone" in line 5 is nearest in meaning to...
a. Supine.
b. Unlikely.
c. Healthy.
d. Predisposed.

23. What are nitrates used for?
a. They preserve flavor in packaged food.
b. They preserve the color of meats
c. They are the objects of research.
d. They cause the animals to become fatter.

24. FDA means...
a. Food Direct Additives.
b. Final Difficult Analisys.
c. Food and Drug Administration.
d. Federal Dairy Additives.

25. The word "these" in line 9 refers to ...
a. Meats.
b. Colors.
c. Researchers.
d. Nitrates and nitrites.



Source:

Yeni Yuniawati S.S. dan Nur Fajriyah S.S. 2013. Mastering TOEFL (TOEFL Preparation). Yogyakarta : Quantum Ilmu.

Friday, December 29, 2017

review COBIT(Control Objectives for Information Technology)

AUDIT  TEKNOLOGI SISTEM INFORMASI

REVIEW COBIT (CONTROL OBJECTIVES FOR INFORMATION TECHNOLOGY)

2.3 Kerangka Kerja COBIT
Kerangka kerja COBIT terdiri atas beberapa arahan atau pedoman, yakni:

1. Control Objectives

Terdiri atas 4 tujuan pengendalian tingkat-tinggi (high-level control objectives) yang
terbagi dalam 4 domain, yaitu : Planning & Organization , Acquisition &
Implementation , Delivery & Support , dan Monitoring & Evaluation.

2. Audit Guidelines

Berisi sebanyak 318 tujuan-tujuan pengendalian yang bersifat rinci (detailed control
objectives) untuk membantu para auditor dalam memberikan management assurance
dan/atau saran perbaikan.

3. Management Guidelines

mengenai apa saja yang mesti dilakukan, terutama agar
dapat menjawab pertanyaan-pertanyaan berikut :

  •  Sejauh mana TI harus bergerak atau digunakan, dan apakah biaya TI yang dikeluarkan sesuai dengan manfaat yang dihasilkannya.
  • Apa saja indikator untuk suatu kinerja yang bagus.
  • Apa saja faktor atau kondisi yang harus diciptakan agar dapat mencapai sukses ( critical success factors ).
  • Apa saja risiko-risiko yang timbul, apabila kita tidak mencapai sasaran yang ditentukan.
  • Bagaimana dengan perusahaan lainnya, apa yang mereka lakukan.
  • Bagaimana mengukur keberhasilan dan bagaimana pula membandingkannya.


2.4 Manfaat dan Pengguna COBIT
Secara manajerial target pengguna COBIT dan manfaatnya adalah :

1. Direktur dan Eksekutif, 
  • untuk memastikan manajemen mengikuti dan mengimplementasikan strategi searah dan sejalan dengan TI.


2. Manajemen

  • Untuk mengambil keputusan investasi TI.
  • Untuk keseimbangan resiko dan kontrol investasi.
  • Untuk benchmark lingkungan TI sekarang dan masa depan.

3. Pengguna, utuk memperoleh jaminan keamanan dan control produk dan jasa yang
dibutuhkan secara internal maupun eksternal.

4. Auditors

  • Untuk memperkuat opini untuk manajemen dalam control internal.
  • Untuk memberikan saran pada control minimum yang diperlukan.
2.7       Review COBIT
            Informasi merupakan sumber daya utama bagi enterprise. Teknologi memegang peranan penting yang dapat meningkatkan fungsi informasi pada enterprise, sosial, publik dan lingkungan bisnis. COBIT 5 memberikan layanan kerangka kerja secara komprehensif untuk membantu pemerintah dan manajemen IT dalam sebuah perusahaan mencapai tujuan yang diharapkan. COBIT 5 for Information Security yang digambarkan pada gambar 1 merupakan bagian dari COBIT 5 secara utuh, dimana fokus pada COBIT 5 for Information Security lebih ditekankan pada keamanan informasi dan memberikan gambaran secara detil dan praktikal tentang panduan bagi para profesional keamanan informasi dan orang-orang yang merupakan bagian dari enterprise yang memiliki ketertarikan di bidang keamanan informasi. Secara umum, saya dapat mengartikan bahwa COBIT adalah sebuah framework atau kerangka kerja yang memberikan layanan kepada enterprise, baik itu sebuah perusahaan, organisasi, maupun pemerintahan dalam mengelola dan memanajemen aset atau sumber daya IT untuk mencapai tujuan enterprise tersebut.
Tujuan utama pengembangan COBIT 5 for Information Security :

1. Menggambarkan keamanan informasi pada enterprise termasuk :
  • Responsibilities terhadap fungsi IT pada keamanan informasi.
  • Aspek-aspek yang akan meningkatkan efektivitas kepemimpinan dan manajemen keamanan informasi seperti struktur organisasi, aturan-aturan dan kultur.
  • Hubungan dan jaringan keamanan informasi terhadap tujuan enterprise.

2. Memenuhi kebutuhan enterprise untuk:
  • Menjaga risiko keamanan pada level yang berwenang dan melindungi informasi terhadap orang yang tidak berkepentingan atau tidak berwenang untuk melakukan modifikasi yang dapat mengakibatkan kekacauan.
  • Memastikan layanan dan sistem secara berkelanjutan dapat digunakan oleh internal dan eksternal stakeholders.
  • Mengikuti hukum dan peraturan yang relevan.

Sebagai tambahan, pengembangan COBIT 5 for Information Security untuk memberikan fakta bahwa keamanan informasi merupakan salah satu aspek penting dalam operasional sehari-hari pada enterprise.

Keunggulan
Menggunakan COBIT 5 for Information Secutiry memberikan sejumlah kemampuan yang berhubungan dengan keamanan informasi untuk perusahaan sehingga dapat menghasilkan manfaat perusahaan seperti :
  • Mengurangi kompleksitas dan meningkatkan efektivitas biaya karena integrasi yang lebih baik dan lebih mudah.
  • Meningkatkan kepuasan pengguna.
  • Meningkatkan integrasi keamanan informasi dalam perusahaan.
  • Menginformasikan risiko keputusan dan risk awareness.
  • Meningkatkan pencegahan, deteksi dan pemulihan.
  • Mengurangi insiden (dampak) keamanan informasi.
  • Meningkatkan dukungan untuk inovasi dan daya saing.
  • Meningkatkan pengelolaan biaya yang berhubungan dengan fungsi keamanan informasi.
  • Pemahaman yang lebih baik dari keamanan informasi.

ISACA mendefinisikan keamanan informasi sebagai :
“Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).”
  • Confidentiality berarti menjaga hak akses dan penggunaan wewenang untuk melindungi privacy dan kepemilikan informasi.
  • Integrity berarti menjaga informasi dari modifikasi atau perusakan dan termasuk memastikan bahwa informasi yang ada merupakan informasi asli dan tidak ada penolakan (non-repudiation) jika akan dilakuan pembuktian terhadap sistem.
  • Availability berarti memastikan dalam hal waktu dan kehandalan dalam mengakses dan menggunakan informasi agar selalu tersedia.


Prinsip COBIT 5

Prinsip 1. Meeting Stakeholder Needs
Keberadaan sebuah perusahaan untuk menciptakan nilai kepada stakeholdernya – termasuk stakeholders untuk keamanan informasi – didasarkan pada pemeliharaan keseimbangan antara realisasi keuntungan dan optimalisasi risiko dan penggunaan sumber daya yang ada. Optimalisasi risiko dianggap paling relevan untuk keamanan informasi. Setiap perusahaan memiliki tujuan yang berbeda-beda sehingga perusahaan tersebut harus mampu menyesuaikan atau melakukan customize COBIT 5 ke konteks perusahaan yang dimiliki.

Prinsip 2. Covering the Enterprise End-to-End
COBIT 5 mengintegrasikan IT enterprise pada organisasi pemerintahan dengan cara:
Mengakomodasi seluruh fungsi dan proses yang terdapat pada enterprise. COBIT 5 tidak hanya fokus pada ‘fungsi IT’, namun termasuk pada pemeliharaan informasi dan teknologi terkait sebagai aset layaknya aset-aset yang terdapat pada enterprise.
Mengakomodasi seluruh stakeholders, fungsi dan proses yang relevan dengan keamanan informasi.

Prinsip 3. Applying a Single, Integrated Network
COBIT 5 dapat disesuaikan dengan standar dan framework lain, serta mengizinkan perusahaan untuk menggunakan standar dan framework lain sebagai lingkup manajemen kerangka kerja untuk IT enterprise. COBIT 5 for Information Security membawa pengetahuan dari versi ISACA sebelumnya seperti COBIT, BMIS, Risk IT, Val IT dengan panduan dari standar ISO/IEC 27000 yang merupakan standar ISF untuk keamanan informasi dan U.S. National Institute of Standars and Technology (NIST) SP800-53A.

Prinsip 4. Enabling a Holistic Approach
Pemerintahan dan manajemen perusahaan IT yang efektif dan efisien membutuhkan pendekatan secara holistik atau menyeluruh. COBIT 5 mendefinisikan kumpulan pemicu yang disebut enabler untuk mendukung implementasi pemerintahan yang komprehensif dan manajemen sistem perusahaan IT dan informasi. Enablers adalah faktor individual dan kolektif yang mempengaruhi sesuatu agar dapat berjalan atau bekerja. Kerangka kerja COBIT 5 mendefinisikan 7 kategori enablers yang dapat dilihat pada gambar 4 berikut.
7 enablers yang digunakan pada COBIT 5 meliputi:
  • Principles, Policies and Frameworks
  • Processes
  • Organisational Strucutres
  • Culture, Ethics and Behaviour
  • Information
  • Services, Infrastructure and Applications
  • People, Skills and Competencies

Prinsip 5. Separating Governance from Management
COBIT 5 dengan tegas membedakan pemerintahan dan manajemen. Kedua disiplin ini memiliki tipe aktivitas yang berbeda, membutuhkan struktur organisasi yang berbeda dan memiliki tujuan yang berbeda. 

DAFTAR PUSTAKA

  1. IT Governance Institute. 2007 . COBIT 4.1 Framework Control Objectives, Management Guidelines, Maturity Models. IT Governance Institute.
  2. Widjaja Tunggal, Amin. 1996 . Struktur Pengendalian Intern. Jakarta : Rineka Cipta.
  3. Laudon, Kenneth and Jane P. Laudon. 2012 . Management Information System, 10th ed. Amazon : Amazon Warehouse Deals.
  4. Sanderson, Ian. "Tools for IT governance assurance: using recent updates of ISACA's Information Systems Audit and Assurance Standards alongside COBIT 5 can help auditors evaluate their organization's information systems governance." Internal Auditor 2013: 51+. Gale Economic Education Humanities Social-Science Arts 2. Web. 22 Dec. 2015.
  5. Chan, Anthony S. Manager’s Guide to Compliance : Sarbanes-Oxley, COST, ERM, COBIT, IFRS, BASEL II, OMB’s A-123, ASX 10, OECD Principles, Turnbull Guidance, Best Practices, and Case Studies. The CPA Journal Oct. 2006 : 11 . Gale Economic Education Humanities Social-Science Arts 1. Web. 17 Dec. 2015.
  6. Lemme, Steve. 2005 .Database Trends & Applications., Vol. 19 Issue 4, p6-6. 1/2p.
  7. John Romney Paul and Marshall B. Steinbart. 2009 . Accounting Information Systems. Pearson : January 1, 2009.
  8. Noverdi, Fajar. 2012 . Manfaat COBIT . Diambil dari : https://fajarnoverdi.blogspot.co.id/2012/03/manfaat-cobit.html.
  9. https://haendra.wordpress.com/2012/06/08/pengertian-cobit/
  10. https://www.kompasiana.com/dwisantoso_vcc/makalah-manfaat-penggunaan-cobit_567fe81390fdfd5d0956ffba
  11. http://aheva17.blogspot.co.id/2010/07/cobit.html
  12. http://www.kajianpustaka.com/2014/02/pengertian-sejarah-dan-komponen-cobit.html
  13. https://dhienzzworld.wordpress.com/2013/04/11/audit-sistem-informasi-berbasis-framework-cobit/
  14. https://empi378.wordpress.com/2013/01/21/cobit-control-ojective-for-information-and-related-technology/
  15.  https://www.google.co.id/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved=0ahUKEwi9hsDal6_YAhULpo8KHfroCK4QFghUMAU&url=http%3A%2F%2Fliapsa.staff.gunadarma.ac.id%2FDownloads%2Ffiles%2F33214%2FBab%2B8%2B-%2BCOBIT.docx&usg=AOvVaw3r-dc2YfXPuMIHTVDE2F5n
  16. http://jurnal.uii.ac.id/index.php/Snati/article/view/175/555
  17. http://www.unisbank.ac.id/ojs/index.php/fti1/article/view/361/238
  18. https://www.proxsisgroup.com/articles/pengertian-dan-fungsi-cobit-5-information-security/

TASK 8 : INTERNATIONAL JOURNAL 2

Judul PI: PEMBUATAN APLIKASI PENGOLAH DATA PASIEN  KLINIK Dr. LINDA HALIM MENGGUNAKAN VISUAL BASIC 6.0 DAN MICROSOFT ACCESS Visual Ba...