Thursday, June 30, 2011

Let's Party!

Alright... here is my 'Let's Party' Playlist!

  1. Till the World Ends - Britney Spears
  2. Express - Christina Aguilera
  3. Sleazy - Ke$ha
  4. Big Spender - Adrienne Bailon
  5. Firework - Katy Perry
  6. Your Love Is My Drug - Ke$ha
  7. Tambourine Feat. Jay-Z - Eve
  8. Bad Girl - Pussycat Dolls
  9. Hold It Against Me - Britney Spears
  10. Uncontrollable - Adrienne Bailon
  11. Show Me How You Burlesque - Christina Aguilera
  12. Teenage Dream - Katy Perry
  13. Tik Tok - Ke$ha
  14. (Drop Dead) Beautiful Feat. Sabi - Britney Spears
  15. Bust Your Windows - Jazmine Sullivan
  16. Last Friday Night (T.G.I.F) - Katy Perry
  17. We R Who We Are - Ke$ha
  18. Till the World Ends (Remixes) Feat. Nicki Minaj and Ke$ha - Britney Spears
  19. When I Grow Up - Pussycat Dolls
  20. Calling You - Kat Deluna
  21. Cannibal - Ke$ha
  22. Beep Feat. Will.I.Am - Pussycat Dolls
  23. E.T (Futuristic Lover) Feat. Kanye West - Katy Perry
  24. Unstoppable - Kat Deluna
  25. I Wanna Go - Britney Spears
  26. Blow - Ke$ha
  27. If This Is Love - The Saturdays
  28. Telephone Feat. Beyonce - Lady Gaga
  29. Buttons - Pussycat Dolls
  30. Empire State of Mind Deat. Jay-Z - Alicia Keys


...Updated as of the end of second quarter of 2011... =)


Signing out!
V

Heritage Studies: Annual Exhibition 2011

Since we're still in exam week, so I decided just to drive thru the exhibition but I promise I'll take a lot of pictures (if I got a better camera other than my own cellphone!)

Anyway, these are the pics I got from KAED website about the exhibition...



and this is the bunting...



I'll detail about the exhibition later, kay...

One More Day

...one more day to go and I'm done with these papers....


I'll have my Computer final exam tomorrow.... thinking that maybe I could go to the Heritage Studies' Annual Exhibition at our faculty's main gallery....

Might find something interesting....

whatever. whatever.

I'm going back to Ellie to read computer notes...


xoxo,
V
Wednesday, June 29, 2011

Pre-Calc Attack!

OMG! the paper was EXTREMELY hard! I tried to answer most of the questions but I didn't actually solve them...

I really hope I can just pass this one and re-take the paper without the credit hours being cumulated to my Cumulated Credit Hours as I'm going to need at least B to change to Architecture!!

whatever! whatever! I'm gonna start the revisions for my Computer and hopefully I'll score on this one and balance my CGPA.



xoxo,
V

Pre-Calc!

Course: Mathematics
Course Code: BSC 0110
Venue: Tutorial Room 4, Kulliyyah of Architecture and Environmental Design
Time: 02:30 p.m.

Wish me luck, guys!


xoxo,
Ellie

Nervous!

Waiting for the rain to stop before I can go to Architecture faculty and check out the exam's venue...

got a lot of things on my mind since yesterday... i knew that going out before exam day was a bad idea but I just can't help it when my roommate mentioned '..then we can hang out in Starbucks, and then.."

Anyway, seems that the rain has stop... I guess I better go now... before it's start raining again..

Wish me luck!

xoxo,
V
Tuesday, June 28, 2011

Finals are Coming!

I'll be having Pre-Calc paper tomorrow and Computer paper on Friday...

So, I was planning to stay in my room and study Pre-Calc the whole day. But when I woke up this morning, my roommate, K came to my room and the first thing she said is

"We need to go to Starbucks today and study..."

when I looked at my watch, it's just around 7 in the morning and there's no way I can study in Starbucks cafe! Let alone in a shopping mall!

But my roommate kept on insisting to go and I said, what the hell. I've studied a lot already... and it's Pre-Calc! The questions are definitely gonna be freaking hard anyway.

So, I hit the shower around 9 and we took the cab around 10 and reached Alpha Angle shopping mall (best known as JJ Wangsa Maju) around 10.30. When we entered Starbucks cafe, no other customer sitting anywhere and most of the staffs are still having morning meeting.

A barista greeted us at the counter and we ordered right away. While ordering, my roommate told me that the Starbucks cup she bought early this semester broke last week and she need a replacement but I suggested for her to buy the tumbler instead. She was like asking what's so special about the tumbler and the barista in front of us was making faces. Because of that I have to argue that the tumbler is so cute and we can get discounts every time we buy a beverage!

But then, I was so surprise when my roommate actually went to the shelf and took one! It's not even for her but for me! OMG! I was so happy!

For the rest of the story, I'm gonna let the pictures do the talking!

'Breakfast in Starbucks'



Thanks for the tumbler, babe!


"I'm so happy for getting what I want! Been wanting to come here for weeks already!" -K


Orange juice, Caramel Cream frappucino with 2 shots of espresso, a butterscotch-roll (inspired from cinnamon roll I think), my favourite Vanilla Cream Frappucino with caramel syrup, and last but not least, a chocolate roll with sugar on top...

But do you guys know what else we have as a meal?



K noticed this on the wall of the cafe... Beautiful, right?

Around 1 o'clock, we went out of the cafe to get some lunch and I decided to try Papa Johns Pizza and it was delicious!

Next, we went to Jusco as K wants to do some shopping for her little brothers and sisters as she's going to Dubai this Saturday and meeting up with those kids who just spent their 2 weeks vacations in Paris. She bought them some cute bags from Girls, Giordano t-shirts, and Vincci shoes for her big sisters. She also bought a handbag for my other roommate, Imah as a going-away present as Imah will be going to Kuantan campus to pursue Biomedical Science.

We're done around 4 and though we were actually planning to do more studying after done with shopping, we decided to go back right away as we're already tired going here and there...

Alright, peeps! Going to continue to do some revisions on Pre-Calc. Wish me luck tomorrow!

xoxo,
V
Sunday, June 26, 2011

MISI Club


When I was in Kuantan campus, we don't have this club so for almost 2 years I was wondering when the club going to come to the campus and held some programmes. As far as I know, the club members was state-based which means all Sabahan are automatically a MISI member. But recently, they opened the club to all students of IIUM.

A good news I think cause I'm sure the club is looking for quality members who're willing to commit to the club rather than inactive members.

Now that I'm enrolling into this Main Campus, I finally got myself to be among its members. Well, though I haven't actually applied to be a member as I'm still considering about it.

Anyway, a friend of mine asked me to join this club and invited me to join a programme, English and Dakwah Camp Series 3: Educational Hearten Camp '11 which will be held in Sandakan, Sabah.

I was asked to be a committee but I preferred to be a facilitator instead. Since this is the very first programme with MISI Club, I think I'm gonna 'test-drive' first then I'll decide whether to join the club or not.

xoxo,
V

p.s.: for more information about the club, click MISI Club


Friday, June 24, 2011

Islam and ICT

Introduction

In 1999, Islamic Internet Conference (MISIC'99) was held with the objective of utilizing the Internet to present and acquire knowledge on Islam, sharing information among Muslims all over the globe, as well as establishing personal and organizational networks. This event has become a yearly programme under the supervision of the Islamic Society of North America (ISNA), and was renamed to "International Conference on Information Technology"2. In essence, supports from ICT will enable the Islamic knowledge to be effectively transmitted to the ummah.

Relation between Islam and ICT:

Information Technology (IT
) is defined as "the use of computers and telecommunications for the processing and distribution of information in digital, audio, video and other forms". Based on this definition and the fact that Quran is neither a scientific text book nor a technological "how-to" manual, those who are unfamiliar with Islam might be questioning themselves about the relationship between IT and the book revealed more than 1400 years ago.

Quran stresses the importance of seeking both divine and worldly knowledge from the very first revelation: "Read in the name of your Lord who created * created man from a clot ....."

Knowledge Category

The Islamic tradition has categorized knowledge into two categories.

The first category of knowledge is that rendered by Allah to man through revelation (wahyu). This knowledge is regarded as the highest form of knowledge and eventually is made compulsory on every Muslim to learn, comprehend and implement.

The second type of knowledge is that acquired by humans via rational inquiry based on experience and observation, which normally concern with worldly matter.

Technologies Offered by ICT:

ICT offers various technologies that can be used by the humans in order to facilitate their routine activities. It is said that ICT will be changing the way we work, communicate, study, do business and other aspects of human life. One of the greatestbenefits to be gained from the use of ICT is Internet.

Links:

There are lots of Islamic sites have been developed with the purpose of providing and disseminating Islamic knowledge and information:
..and so much more.

Do’s:
  • Spread information about Islam:
  • Forum Forum
  • Chatting Chatting
  • NewsGroup NewsGroup
  • Listserv
  • E-mail

Don’t:
  • Blackmail Blackmail
  • Send pornography
  • Send virus

Prepared by:
Siti Sarah Bt. Maidin
Lab Coordinator,
Department of Information and Communications Technology,
Centre for Foundation Studies, IIUM

Introduction to Internet

Accessing the Internet and Web

We will need:
  • A computer with an operating system, such as MAC OS, Windows, or UNIX, that supports Internet protocols
  • Communications equipment such as a modem, ISDN adapter, or Ethernet card
  • An Internet service provider (ISP)
  • Web browser software such as Safari, Mozilla Firefox, Google Chrome or Internet Explorer

The Hypertext Concept:

Hypertext is a way of presenting information so that the order in which it’s read is left up to the reader.

Hyperlinks are underlined or highlighted words that can be used to view another document or Web page.

Hypermedia refers to a link to multimedia, such as music and movies.

The Web is a distributed hypermedia system or a system where the responsibility for creating content is distributed among many people.

Web Browsers and Servers:

Web browsers
display a Web document and enable users to link to other Web pages. The first browsers were text-only. Mosaic was the first graphical browser. Web servers respond to the requests of browsers. They find and send requested resources back to the browser.

Web Addresses (URLs) are an addressing system that identifies where a Web resource is located. The uniform resource locator (URL) is the standard used to identify Web resources. The URL consists of:



Examples of Top-Level Domains
  • .com – commercial businesses
  • .edu – educational institutions
  • .gov – government agencies
  • .mil – military organisations
  • .net – network providers
  • .org – nonprofit organisations

Uploading and Downloading:

More than half of my music and video collections I downloaded from the Internet but I know I'm not the only one and posting things like this is how I contribute back to the computing community.

Downloading
is when document or file is transferred from another computer to our computer.

Uploading is when files transferred from our computer to another computer.


Finding Information on the Web:

There are ways to find information on the Web:
  • Browse or surf the Web – This involves linking from one Web page to another, and so forth.
  • Search the Web – This method involves using search engines to locate Web pages with the information we’re looking for.
  • Subject guides – Web pages are grouped under headings.
Using Search Engines:

To use a search engine, we:
  1. Choose a search engine (Google, Yahoo, MSN, Lycos, Alta-Vistaetc.).
  2. Type in one or more words describing your topic.
The search engine checks its database of Web pages that contain the words typed. The results are sent to our computer. Clicking on the link takes us to the corresponding page.

Using Search Techniques

Learning a few search techniques can increase the accuracy of Web searches. Searches using search operators will improve search performance.

Most search engines use the following search operators:
  • Inclusion/exclusion operators
  • Wild cards
  • Phrases
  • Boolean operators
The following tables show the results of using and not using search operators.

Not using search operators:


Words Entered

Possible Results:

Web pages containing

Fire station

Fire

station

Fire station

Using search operators:

Words Entered

Possible Results:

Web pages containing

+Fire+station

Fire station

+Fire+station*

Fire station

Fire stations

+Fire-station*

Fire

“Fire station”

Fire station

Fire and station

Fire station

Fire or station

Fire

station

Fire station

Fire not station

Fire


E-Mail: Staying in Touch:

E-mail is short for electronic mail. It’s the most popular of the Internet services. Messages are sent and received in a few seconds. Attachments such as photos, music files, and any document may be sent with the message.

E-Mail Addresses
myname@someserver.com
User’s name@name of the server that the user is on

e.g.: danielle.ivory22@gmail.com

Instant Messaging: E-Mailing Made Faster

Instant messaging systems let a user know when a friend or business associate is online. It provides a means of communicating through real-time, text-based conversations.

IRC: Text Chatting in Real Time:

Internet relay chat consists of real-time, text-based conversations. Chat groups are divided into channels that cover a specific topic.

Usenet:

Usenet is the part of the Internet which enables users to participate in discussions and newsgroups. Usenet newsgroups are organised into hierarchies (categories) and subcategories. Subcategories include Standard, Alt, Biz, and Local newsgroups.

Standard Newsgroup Subcategories:


comp

computer applications, databases, multimedia

misc

activism, books, business, health

sci

chemistry, archeology, math

soc

human rights, world cultures

talk

Euthanasia, gun control, religion

news

Usenet announcements

rec

sports, gardening, bicycles



Listservs: Electronic Mail Lists:

A listserv is an automatic list server. Mail is sent to everyone on the list when e-mail is generated. It is similar to a newsgroup or a forum.



Alright, that's all for the introduction to Internet! Next post would be on discussion on how to relate what we have learned so far to our daily lives and of course as a Muslim.


Networks

A network is a group of 2 or more computer systems linked together to exchange data and share resources, including expensive peripherals such as high-performance laser-printers.

Network types are local area networks, home networks, wireless LAN, personal area networks, metropolitan area networks, and wide area networks.

Computer networks fall into 2 categories: local area network (LAN) and wide area network (WAN).

LAN uses cables, radio waves, or infrared signals to link computers or peripherals e.g. printers, within a small geographic area, e.g. building or group of buildings.

WAN uses long-distance transmission media to link computers separated by few miles or even thousands of miles. The Internet is the largest WAN as it connects millions of LANs all over the globe.

Advantages of Networking
  • Reduced hardware costs.
  • Application sharing.
  • Sharing information resources.
  • Centralised data management.
  • Connecting people.
Disadvantages of Networking:
  • Loss of autonomy.
  • Lack of privacy.
  • Security threats.
  • Loss of productivity.

That's all for networks!

Communications

Communications (data communications or telecommunications) is the process of of electronically sending and receiving messages between 2 points. Communications occurs over communication channels.

Simply put, communications are the process of sharing data, programs, and informations between computers.

Communications today:

Numerous applications e.g. e-mail, instant messaging (IM), Internet, telephone, and e-commerce, depend on communication systems. Connectivity uses computer networks to link people and resources. Going wireless has been the most dramatic change.

Communication channels (also known as links) are the path through which messages are passed from one location to the next. There are 2 categories: physical connections and wireless connections.

Physical connections i.e. wired:

  • Ethernet Cable (twisted pair cables)

The same type of wire used for telephones, twisted pair uses 2 insulated wires twisted around each other to provide a shield against electromagnetic interference, which is generated by electric motors, power lines, and powerful radio signals.
Although twisted pair is an inexpensive medium, the bandwidth of traditional twisted-pair telephone lines is too small to carry video, voice, and data simultaneously. Twisted pair carries data at transfer rates of 1Kbps.
  • Coaxial Cable

Familiar to cable TV users e.g. Astro in Malaysia, coaxial cable consists of a centre copper wire surrounded by insulation, which is then surrounded by a layer of braided wire. Data travels through the centre wire, while the braided wire provides a shield against electrical interference.
Coaxial cable carries data at transfer rates of 10 Mbps. In contrast to twisted pair, coaxial cable makes it easy to achieve very-high-end-bandwidth data communication.
  • Fibre-Optic Cable

Fibre-optic cable consists of a thin strands of glass that carry data by means of pulses of light. Broadband uses fibre-optic or coaxial cable to transmit data. Fibre-optic cable can carry more data without loss of signal strength for longer distances than twisted pair or coaxial cable. Fibre-optic cable carries data at transfer rates of 1 Gbps.

Wireless connections:
  • Radio frequency (RF)
With radio transmission, data in a variety of forms (music, voice conversation, and photos) travels through the air as radio frequency (RF) signals or radio waves via a transmitting device and a receiving device. Instead of separate transmitting and receiving devices, radio transmissions can also use a wireless transceiver, a combination transmitting and receiving device equipped with an antenna. Data transfer rates via radio transmission are variable but generally fall in the low-bandwidth range of 64 Kbps to 720 Kbps.
  • Wireless fidelity (Wi-Fi) 802.11

Wi-Fi is a wireless standard for connecting electronic devices. A Wi-Fi enabled device such as a personal computer, video game console, smartphone, and digital audio player can connect to the Internet when within range of a wireless network connected to the Internet. A single access point (or hotspot) has a range of about 20 meters indoors. Wi-Fi has a greater range outdoors and multiple overlapping access points can cover large areas.
  • Bluetooth
Bluetooth is a short-range radio transmission technology that has become very popular in recent years. Bluetooth technology relies on a network called a piconet or a PAN (personal area network) that enables all kinds of devices e.g. iMac, iPhone, iPod Touch, printers, and etc., within 30 feet of each other to communicate automatically and wirelessly.
Unlike infrared technologies, Bluetooth doesn’t require a direct line on sight to be connected. Because the frequency used by Bluetooth devices changes often, Bluetooth devices never use the same frequency at the same time and don’t interfere with each other. Bluetooth can accommodate data transfer rates up to 1 Mbps.
  • Microwave
Microwaves are high-frequency, electromagnetic radio waves with very short frequencies that are used to transmit data.
  • Satellite

Essentially microwave relay stations suspended in space, communications satellites are positioned in geosynchronous orbit, which matches the speed of the Earth’s rotation, and therefore are permanently positioned with respect to the ground. Satellites transmit data by sending and receiving microwave signals to and from Earth-based stations. Devices such as hand-held computers and Global Positioning System (GPS) receivers can also function as Earth-based stations.
  • Infrared e.g. Remote control

Infrared is a wireless transmission medium that carries data via beams of light through the air. No wires are required, but the transmitting and receiving devices must be in line of sight or the signal is lost. When the path between the transmitting and the receiving devices is not obstructed by trees, hills, mountains, buildings or other structures, infrared signals can work within a maximum of about 100 feet.

Last-Mile Technologies:

Because the local loop’s last mile of twisted-pair will be with us for many years, phone companies and other providers offer a number interim digital telephony technologies that make use of twisted-pair wiring that’s sometimes called as last-mile technologies. These solutions include digital telephone standards e.g. ISDN and DSL* that use twisted-pair wiring as well ‘always on’ high-speed wired services i.e. coaxial cable and cable modems.

Simply put, telephone, DSL, cables and wireless are the connection devices.


*I’ll explain the ISDN and DSL later

That's all about communications and I'll post the network part on the next entry!

Application Software

Chapter 8 & 9 Application Software

Application software refers to programs that enable the user to be productive when using the computer.

General Purpose application software are the applications software used by many people to accomplish frequently performed task.

Personal Productivity softwares are like Word processing i.e. Pages, spreadsheets i.e. Numbers, Calendar i.e. iCal and Address books.

Internet softwares like Web Browsers i.e. Safari and E-mail.

Multimedia or Graphics softwares like Desktop Publishing, Photo Editing and 3D Rendering.

Home and Education softwares like Personal Finance, tax preparation, reference, and games.

For multimedia or graphics, we can compress and decompress them using data compressor software like WinZip (download software here) to reduce the size of the files. Usually the reason why we want to compress them is to make them easier to upload or downloaded from internet. Lossless files will be restored with no flaws but lossy files usually eliminates information that is not perceived.

For Microsoft Windows users, Paint program is pre-installed in their computers. For Macintoshes, we have options like Paintbrush. These programs can save our files as:
  • Graphic Interchange Format (GIF) - lossless, simple images, solid colour.
  • Joint Photographic Experts Group (JPEG) - lossy, photographs
  • Portable Network Graphics (PNG) - lossless
  • Windows Bitmap (BMP) - optional compression.
Drawing programs create vector (mathematically generated) graphics.
  • 3D Rendering Programs add 3D effects to graphic objects.
  • Image Editors used to edit and transform bit-mapped images
  • Animation i.e. Flash simulates motion.
Audio are captured and processed sound while video can be modified then digitized using video editors.

Multimedia Authoring Systems used to create multimedia presentations i.e. montage.

Audio formats:
  • MP3 or MPEG3 are the most popular format for downloading and storing music. Can be compressed while maintaining good quality. I have around 8000 plus of MP3 stored in my iPod.
  • Advanced Audio Coding (AAC) is a standardized, lossy compression and encoding scheme for digital audio. Designed to be the successor of the MP3 format, AAC generally achieves better sound quality than MP3 at similar bit rates.
  • AU are the small-sized of file and normally used to distribute short audio clips over the Internet.
  • WAV are used mainly in Windows PCs. Commonly used for storing uncompressed.
  • MIDI (Musical Instrument Digital Interface) is an industry-standard protocol that enables electronic musical instruments (synthesizers, drum machines), computers and other electronic equipment (MIDI controllers, sound cards, samplers) to communicate and synchronize with each other.
Video formats; the popular ones....
  • MPEG-4 (files with extension .mp4) is method of defining compression of audio and visual (AV) digital data. It usually have a high-quality picture. I always have to convert videos from various formats with extensions like .flv, .avi, .mkv. to MPEG-4 so I can open them in my iPhone and iPod Touch.
  • QuickTime is an extensible proprietary multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity. The classic version of QuickTime is available for Windows XP and later, as well as Mac OS X Leopard and later operating systems. A more recent version, QuickTime X is currently only available on Mac OS X Snow Leopard.
  • Windows Media Video (.wmv) is the Microsoft's lossy compression format for motion video. Used for both streaming and downloading content via the Internet.
Tailor-made applications are used for specialized fields. Types of this application softwares:
  • Billing programs i.e. electricity bills.
  • Inventory tracking programs (I used this while working in Nike Concept Store).
  • Point of Sale software (my friend used this while working as Parkson's cashier).
  • Custom software
Integrated Programs and Suites: The All-In-One Approach

Standalone programs are fully self-contained e.g. Microsoft Word, Excel.

Integrated programs contain modules that share the same interface e.g. Microsoft Works and for Mac users, Apple, Inc.'s iWork that contains Pages, Numbers, and Keynote. iWork is actually replacing the now-discontinued AppleWorks suite.

Software suites contain standalone programs that share resources i.e. common program code, with each other. Popular office suites offer a word processor, spreadsheet, database, presentation programs. e.g. Microsoft Office, Corel WordPerfect Office, and Lotus Smart Suite.



Microsoft Office

WordPerfect Office 12

Lotus SmartSuite

Word processing

Microsoft Word

WordPerfect

Word Pro

Spreadsheet

Microsoft Excel

Quattro Pro

Lotus 1-2-3

Database

Microsoft Access

Paradox

Lotus Approach

Presentation

Graphics

Microsoft PowerPoint

Corel Presentations

Freelance Graphics

Personal information managers

Microsoft Outlook

Corel Central

Lotus Organizer

That's all for this topic....

I'll post the 'Communication and Network' later...
Thursday, June 23, 2011

Virus

Chapter 7 Virus

Computer virus are malicious programs that infect a computer system causing various problems with its use.

Viruses replicate and attach themselves to programs in the system.

There are more than 20,000 different computer viruses with the number growing daily.

How virus infections spread by:
  • Inserting a disk with an infected program and then starting the program.
  • Downloading an infected program from the Internet.
  • Being on a network with an infected computer.
  • Opening an infected e-mail attachment.
Type of Viruses:

File Infectors; the most common type of virus, usually attach themselves to program files and spread to other programs on the hard drive.

Boot Sector Viruses usually attach themselves to the boot sector of a hard drive. They are executed each time the computer is started and this may lead to destruction to all data.

Macro Viruses infect automatic command capabilities of productivity software. They usually attach themselves to the data files in word processing, spreadsheet, and databases programs thus will be spread when the data files ares exchanged between users.

More rogue programs:

Time bombs (also known as logic bombs). They are harmless until a certain event or circumstance activates the programs.

Worms resemble viruses. They are spread from one computer to another. They control infected computers. and attack other networked computers.

Denial of Service Attack (DoS) is when the syn is flooding. It overload an Internet server with a large number of requests.

Trojan Horses disguise themselves as useful programs but actually they contain hidden instructions. They may erase data or cause other damage.

Fraud and Theft

Like selling social security numbers and etc.

Memory shaving is taking RAM chips from computers.

Salami shaving is when a programmer alters a program to take a small amount of money out of an account.

Data Diddling is when data is altered to hide theft.

Techniques to Obtain Passwords:
  • Password guessing.
  • Shoulder surfing.
  • Packet sniffing.
  • Dumpster diving.
  • Social engineering.
  • Superuser status.

I think that's all covered for this topic... since it's a half an hour replacement class...

Tomorrow is the final session.. and the carry marks will be released..

Wednesday, June 22, 2011

Getting the MagSafe

As you guys already know, my MagSafe (lappy adaptor) had burnt 3 days ago and only today I got some cash to buy a new one.

Since my bestie still at work and I kinda don't have the mood to just hang out with some strangers, I went to Machine (Apple Authorized Dealer) in KLCC by myself.

When I reached Machine, the sales person said the MagSafe were sold out. Disappointed and a bit of upset, I was planning to go to EpiCentre in Pavilion. But suddenly, while I was hovering over the iPad and looking for new accessories for my iPod, the sales person came to me and told me that the MagSafe has been re-stocked. Feeling lucky, I quickly went to the counter and asked for one. Tada!

...and then I went out of the shop and continue walking around the mall... and while I was rummaging through my bag looking for my wallet, I found The Coffee Bean's RM10 voucher and what a coincidence that the cafe was just in front of me... *heaven*

I ordered the Vanilla Ice-Blended and a Tiramisu cake! Yum! Yum! (too busy to take a snap or two though... )

When I'm done, I went down few levels and something caught my attention!


Big Harrods Bear is on duty! cute~

Kept walking and walking and suddenly I felt hungry... and I smelled Nandos!

~kyaaa!~ *Running towards the restaurant*




It's Wednesday and it's just 5 p.m. so there are not a lot of people inside the restaurant and as usual I picked table at the corner and started ordering...



...and while waiting for the main course, I had some appetizers first!


...and this is the main course... with the bottomless lemon iced tea... Let's dig in, everyone!


The preferred sauce! Extra HOT Peri Peri! Anyone dare to challenge me? muahahahaha!


After I'm done around 6, I was planning to check out one of my favourite bookstore in town - Kinokuniya, but my bestie called and 'ordered' me to go back to campus... But there's one more place to drop by before heading home...


Phew! After a very long line towards the counter, I bought almond pretzels and quickly walked towards the LRT Station, head back to Gombak Station and took a ride on Rapid bus to reach the campus...

*looking at my new MagSafe* ...sigh in relief...

xoxo,
V