SlideShare uma empresa Scribd logo
1 de 10
coba lihat isi lemari pakaianmu
ada baju
celana panjang
dan celana pendek
coba perhatikan
pakaian mana yang paling banyak
pakaian mana yang paling sedikit
a

perhatikanlah gambar berikut
ayo kerjakan soal berikut dengan mengisi bagian yang kosong




  1




            sepeda                dari       mobil
2




    apel      dari     strawberi



3




     pensil   dengan     penghapus
b

bilanglah banyak benda berikut
bilanglah dengan urut
c

perhatikan gambar di bawah ini
urutkan benda dari yang terbesar
urutkan benda dari yang terkecil

                                   13
                     10




                    12              17
perhatikan gambar di bawah ini
urutkan benda dari yang terkecil
urutkan benda dari yang terbesar

                                    16
                    14




                   20
                                   12

Mais conteúdo relacionado

Destaque

Essentials of Search Engine Optimisation Campaign
Essentials of Search Engine Optimisation CampaignEssentials of Search Engine Optimisation Campaign
Essentials of Search Engine Optimisation Campaignbelieve52
 
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Anastasia Lanina
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15watersb
 
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...IOSR Journals
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
A Review of FPGA-based design methodologies for efficient hardware Area estim...
A Review of FPGA-based design methodologies for efficient hardware Area estim...A Review of FPGA-based design methodologies for efficient hardware Area estim...
A Review of FPGA-based design methodologies for efficient hardware Area estim...IOSR Journals
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
 
Performance on Image Segmentation Resulting In Canny and MoG
Performance on Image Segmentation Resulting In Canny and  MoGPerformance on Image Segmentation Resulting In Canny and  MoG
Performance on Image Segmentation Resulting In Canny and MoGIOSR Journals
 
Documentation presentation
Documentation presentationDocumentation presentation
Documentation presentationVASS Yukon
 
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsDesign of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsIOSR Journals
 
Remedyto the Shading Effect on Photovoltaic Cell
Remedyto the Shading Effect on Photovoltaic CellRemedyto the Shading Effect on Photovoltaic Cell
Remedyto the Shading Effect on Photovoltaic CellIOSR Journals
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...IOSR Journals
 
Why to Shop Online.
Why to Shop Online.Why to Shop Online.
Why to Shop Online.believe52
 
My ebay selling secrets
My ebay selling secretsMy ebay selling secrets
My ebay selling secretsbelieve52
 
Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemIOSR Journals
 

Destaque (18)

Essentials of Search Engine Optimisation Campaign
Essentials of Search Engine Optimisation CampaignEssentials of Search Engine Optimisation Campaign
Essentials of Search Engine Optimisation Campaign
 
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
Презентация Томашпольского района - Проект приграничного сотрудничества Украи...
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15
 
G0424249
G0424249G0424249
G0424249
 
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...
A Literature Survey on Ranking Tagged Web Documents in Social Bookmarking Sys...
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
A Review of FPGA-based design methodologies for efficient hardware Area estim...
A Review of FPGA-based design methodologies for efficient hardware Area estim...A Review of FPGA-based design methodologies for efficient hardware Area estim...
A Review of FPGA-based design methodologies for efficient hardware Area estim...
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
 
Performance on Image Segmentation Resulting In Canny and MoG
Performance on Image Segmentation Resulting In Canny and  MoGPerformance on Image Segmentation Resulting In Canny and  MoG
Performance on Image Segmentation Resulting In Canny and MoG
 
Documentation presentation
Documentation presentationDocumentation presentation
Documentation presentation
 
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsDesign of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
 
Remedyto the Shading Effect on Photovoltaic Cell
Remedyto the Shading Effect on Photovoltaic CellRemedyto the Shading Effect on Photovoltaic Cell
Remedyto the Shading Effect on Photovoltaic Cell
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
 
Why to Shop Online.
Why to Shop Online.Why to Shop Online.
Why to Shop Online.
 
My ebay selling secrets
My ebay selling secretsMy ebay selling secrets
My ebay selling secrets
 
J0564651
J0564651J0564651
J0564651
 
Crypt Sequence DNA
Crypt Sequence DNACrypt Sequence DNA
Crypt Sequence DNA
 
Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric System
 

Matematika