You are on page 1of 37

Tenses

Bahasa Inggris
Semester Genap 2014-2015
Tenses
Pola kalimat yang berubah menurut waktu
merujuk pada masa lalu (Past), masa
sekarang (Present) dan masa depan
(Future).
TYPES OF TENSES
• 3 TYPES:
– Present
– Past
– Future
• 4 ASPECTS:
– Simple
– Continuous
– Perfect
– Perfect Continuous
• 2 VOICES:
– Active
– Passive
• FORM  +, -, ? • Petra is combing her
hair.
• WORD ORDER • Peter isn’t working in
the garden now.
• For actions that are
• WHEN TO USE
happening at the
moment.
• SPECIAL CASES • I’m travelling to London
on Friday.
• EXPRESSIONS • Now, at the moment, at
OF TIME present
CHARTS
TIME CHARTS
MIND MAP
MIND MAP
verbs show us when something happened.

For example, I am playing football.

Yesterday I played football.

Tomorrow I will play football.

MALT ©2007 Smart– Interactive Lessons – Language, Grammar


Interactive task

Write each sentence again but put it into past tense.

Stefan plays football.

Hayley sings in the choir.

MALT ©2007 Smart– Interactive Lessons – Language, Grammar


Interactive task

James is helping his teacher.

David is writing a story.

Well done !
MALT ©2007 Smart– Interactive Lessons – Language, Grammar
Well done so far.

So sometimes we add -ed


laughed
helped shouted
cheered
wanted
asked

MALT ©2007 Smart– Interactive Lessons – Language, Grammar


To change the meaning to future tense you add another
word.

What word ?
Interactive task
Write each sentence again to mean a future action. Remember
you may have to add an extra word.

The boy worked very hard.

Sophie sings like an angel.

Well done !
Interactive task
At 3 o’clock I usually run home.

Mum drives carefully in town.

Mrs Flockhart helps children in school.

Well done !
Interactive task

Here’s a mixture of tenses, write the tense for each sentence.

Nicole laughed out loud at the mess of her desk.

Steven is playing a beautiful tune on his violin.

Well done !
Interactive task
Jay is going to be a professional footballer one day.

Emily is spinning around on the ice, watch out!

Kieran danced all night at the party, what a rocker!

Well done !
So good work everyone !

Here’s a task which will check


your understanding of today’s
lesson on tenses.

MALT ©2007 Smart– Interactive Lessons – Language, Grammar


WILF

Being able to rewrite a paragraph


in another tense by changing the
verbs and sometimes adding new
words.

MALT ©2007 Smart– Interactive Lessons – Language, Grammar


Rewrite the following paragraph but change it into past tense.
I sit at my computer and email my
friends. They are so funny online. They
have stupid nicknames like Treebor and
Kippy. I laugh out loud and type a
message.

Dad shouts from downstairs to turn


my music down. I forgot to turn it down
earlier. I brush my teeth and say
goodnight. I switch off the computer. I curl
up and close my eyes awaiting the
darkness and stillness of the night.
MALT ©2007 Smart– Interactive Lessons – Language, Grammar
Possible answers :
I sat at my computer and emailed my
friends. They were so funny online. They
had stupid nicknames like Treebor and
Kippy. I laughed out loud and typed a
message.

Dad shouted from downstairs to turn


my music down. I forgot to turn it down
earlier. I brushed my teeth and said
goodnight. I switched off the computer. I
curled up and closed my eyes awaiting the
darkness and stillness of the night.
MALT ©2007 Smart– Interactive Lessons – Language, Grammar
Situation Type

● State
● Event
● Action
Situation Type : State
● State :
– Adjective : stately
– (n) : the way something is with respect to its
main attributes (temporary)
● the current state of knowledge
– (n) : a state of depression or agitation
● he was such in a state you just couldn't reason
with him
Situation Type : State
● (n) : the circumstances or condition of
being or thing at any given time (quality |
private)
● (n) : a statement; document containing
statement
● (v) : express in words
– State your opinion
● (v) : put before
– I submit to you that the accused is guilty
Find the “state”...(1)
A wise forensic examiner once said “when all else fails, we
carve.” Extraction of meaningful file content from otherwise
unstructured streams of data is a science and an art unto
itself. This discipline has been the focus of numerous
presentations at the Digital Forensics Research Workshop
over the years, and advancements continue to be made to
this day. At its most basic, however, the process of carving
involves searching a data stream for file headers and
magic values, determining (or guessing) the file end point,
and saving this substream out into a carved file. Carving is
still an open problem and is an area of ongoing, active
experimentation. Numerous experimental programs are
designed to implement specific new ideas in carving, as
well as more utilitarian programs geared toward
operational use.
Find the “state”... (2)
The default command shell on most Linux distributions is the
Bourne Again Shell, a.k.a “BASH.” Commands typed in any
shell sessions will usually be stored in a file in the user’s
home directory called “.bash_history.” Shell sessions include
direct virtual terminals, GUI terminal application windows, or
logging in remotely via SSH. Unfortunately, the bash shell
records history as a simple list of commands that have been
executed, with no time stamps or other indication of when the
commands were entered. Correlation of history entries and file
system or log file time information will be important if the time
a specific command was executed is important to your
investigation.
Find the “state”...(3)

In the Internet, users may want to run application programs at a


remote site and create results that can be transferred to their
local site. For example, students may want to connect to their
university computer lab from their home to access application
programs for doing homework assignments or projects. One way
to satisfy that demand and others is to create a client/server
application program for each desired service. Programs such as
file transfer programs (FTPs), e-mail (SMTP), and so on are
currently available. However, it would be impossible to write a
specific client/server program for each demand. The better
solution is a general-purpose client/server program that lets a
user access any application program on a remote computer; in
other words, allow the user to log on to a remote computer. After
logging on, a user can use the services available on the remote
computer and transfer the results back to the local computer.
Situation Type : Event
● Going-on, process, momentary, transitional
● (n) Something that happens at a given time and
place
● (n) a special set of circumstances
● (n) a phenomenon located at a single point in
space-time
● (n) a phenomenon that follows and is caused by
some previous phenomenon
● (v) to break forth
Find the “event”... (1)
For hash functions used in forensic functions, modification
of a single bit of input data will produce a radically different
hash value. Given this property, it is easy to determine one
of the core uses for hashing in forensic analysis:
verification of the integrity of digital evidence. A hash
generated from the original evidence can be compared
with a hash of the bit-stream image created from this
evidence matching hashes show that these two items are
the same thing. Additionally, taking an additional hash
after completing examination of a forensic copy can show
that the examiner did not alter source data at any time.
Find the event...(2)
As with all forensic investigation, an investigator
should never work with the original files when
analyzing log files. The investigator should create
copies before performing any postprocessing or
log file analysis. If the original files are not altered,
the investigator can more easily prove that they
are authentic and are in their original form. When
using log files as evidence in court, an investigator
is required to present the original files in their
original form.
Find the event...(3)
Jessica, a university student, was known to be an introvert
among her peers. She used to live with her father. One
day, Jessica left a note for her father mentioning that she
was going to meet her old school friend and would be back
by the end of the week. A week passed, but Jessica did
not return. Her father, Shane, filed a missing persons
report with the police. All the students who interacted with
Jessica were questioned to get some clue about her
whereabouts, but none of them knew where she was. Two
weeks later, Jessica’s body was found near a dumping
ground near her university campus.
Situation Type : Action
● Activity, accomplishment, momentary act,
transitional act
● (n) something done
● (n) the state of being active
● (n) the series of events that form a plot
● (n) the operating part that transmit power
to a mechanism
● (v) put in effect
Find the “action”...(1)
A computer connected to a LAN has two addresses. The first is the
MAC address, which is stored in the network card and uniquely
identifies every node in a network. Ethernet uses the MAC address
while building frames to transfer data from a system. The other
address is the IP address. This address is used by applications. At the
data link layer, the MAC address is used for addressing instead of the
IP address. The MAC address is mapped to its respective IP address
at the network layer. The data link layer looks for the MAC address of
the destination machine in a table commonly known as the ARP
cache. If an entry is not found for the IP address, then an ARP request
will be broadcast to all machines on the network. The machine with the
matched IP address then responds to the source machine with its
MAC address. The MAC address of the destination machine gets
added to the ARP cache of the source machine, and further
communication is done using the MAC address.
Find the “action”...(2)
DNS (Domain Name Service) is a service that translates
domain names (e.g., www.ssn-nci.ac.id) into IP addresses
(e.g., 208.66.172.56). DNS poisoning is a process in which
an attacker provides fake data to a DNS server for the
purpose of misdirecting users. For example, a malicious
user who operates Web site ABC but wants to pose as
Web site 123 could build up a DNS poisoning attack in
order to put Web site ABC’s IP address into the entry for
Web site 123. Users who use the DNS server that is
“poisoned” to locate Web site 123 would then be served by
Web site ABC’s IP address.
Question Time!

SEKIAN SEMOGA BERMANFAAT

You might also like