Contoh Soal Uas Bahasa Inggris II Bsi Semester 2
Short Description
Download Contoh Soal Uas Bahasa Inggris II Bsi Semester 2...
Description
CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2 BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except …. a. multimedia b. scientific processing c. data processing d. none of the above 2. The most commonly used input device is …. a. keyboard b. webcam c. joystic d. mouse !. " house si#e computer is … computer. a. the second generation b. the first generation c. the new generation d. the third generation $. This is a picture of …. a. transistor b. %&'( c. vacuum tube d. () *. (nformation can be stores in a storing device such as …. a. CD-ROM o!ti"a# disk$ b. trac ball c. monitor d. printer Meeting % 1. )+ stands for …. a. )entral +rocessed nit b. Centra# &ro"essing 'nit c. )enter +rocessing nit d. )entral +rocessor nit 2. (n "pple computer, motherboard motherboard is called …. a. planar board b. baseboard ". #ogi" board d. system board !. )ompanies that produce processor are (ntel, (-, and …. a. AMD b. N() c. "/ d. "/ $. The 'peed of a modem is measured by ….
a. 0# b. kb!s c. 0# d. "ll false *. This method is called wireless.3 (t means …. a. with wire b. (itho)t "ab#e c. with cable d. lac of wire Meeting * 1. The two major software are …. a. a!!#i"ation and syste+ soft(are b. application and instructional software c. system software and command d. application software and processor 2. The term software was first used by … in 14*5. a. 6ohn 7. Turey b. ,ohn . )key c. 6ohn . Tuey d. 6ac 7. Tuey !. "n open source software means it is …. a. freely modified b. freely used c. prominent d. free#y redistrib)ted $. These are types of operating system available to users, except …. a. 7indows b. G'Is c. ac 8' d. &inux *. 7ord processor such as icrosoft 7ord 299: and 8pen 8ffice 7riter are examples of …. a. system software b. a!!#i"ation soft(are c. office application d. 8' Meeting / 1. (n programming process, the first step is …. a. compilation b. debugging ". (riting a "ode d. binary file 2. The physical devices in a computer are …. a. tools b. hard(are
c. software d. none of the above
!. " programmer must compile the source code by using …. a. "o+!i#er b. transformer c. collector d. bugger $. "cts of finding and fixing error code in all of the source code is called …. a. deb)gging b. compiler c. bugging d. decoding *. The following is a programming language from 'un icrosystems. a. +ascal b. ,A0A c. -"'() d. -orland Meeting 1 1. 8ne of these is not a malware. a. worm b. &ogic bomb c. Trojan 0orse d. in 0ista 2. "ll of them can be identified by their …. a. replication b. identifi"ation c. multiplication d. none of the above !. -y its way to infect other file, virus can be divided into … categories. a. one b. three c. two d. four $. The simplest and easiest way in creating virus is by using a tool called …. a. vir)s generator b. virus instructor c. virus copier d. virus emulator *. … actually spreads through a networ or the (nternet using email. a. (or+ b. Time -omb c. Trojan 0orse d. %irus Meeting 2
1. 7hich is an example of a pointing device; a. joystic b. scanner ". tra"kba## d. webcam 2. "T? eyboard layout is used in …. a. @rance b. both a and b c. -elgium d. "ll =urope !. )omputer speaers are commonly eAuipped with a lowBpower … amplifier. a. interna# b. visual c. external d. internal C external $. The tracball was invented by …. a. Tom )ruise b. Tom /ooley ". o+ Cranston d. Tom &ongstaff *. %isual /isplay nit is another term for …. a. printer b. +onitor c. scanner d. television Meeting 3 1. " N(), …, and a hub are needed to create a basic networ. a. re!eaters b. socet c. modulator d. jac 2. The networ allows computers to … with each other. a. commune b. coordinate c. collaborate d. "o++)ni"ate !. N() can be identified easily. (t has a special port called …. a. "6B$* b. >6B*$ ". R,-/1 d. "6B*$ $. "nother term for N() is …. a. repeaters b. net(ork ada!ter c. adapter d. modem
*. 7hat does ">+" stand for; a. "dvance >esearch +rojects "gency b. "dvance >esearch +rojects "ffair ". Advan"ed Resear"h &ro4e"ts Agen"y d. "dvanced >esearch +rojects "ffair Meeting 56 )hoose a, b, c, or d for the correct answer. 1. 'teganography is the art and science of writing … messages. a. readable b. hidden c. computer d. picture 2. "nother secret coding techniAue besides steganography is …. a. cryptonite b. "ry!togra!hy c. cryptic d. steganalyst !. 'teganography comes from … language. a. Greek b. &atin c. reece d. @rench $. 7riting a hidden message can use an … in. a. invincible b. inevitable ". invisib#e d. indispensable *. This document can be used as a media in steganography, except …. a. text file b. mp! or video file c. picture file d. none of the above Meeting 55 )hoose a, b, c, or d for the correct answer. 1. Na#i used a machine called … to encrypt and decrypt the messages. a. 'igma b. 7nig+a c. =ncarta d. all false 2. " cryptographer is … who is master in cryptography. a. 'omething b. anything ". so+eone d. anyone
!. raphy3 is a ree word means…. a. spoen b. (ritten c. uttered d. hidden $. )ryptography is needed to … a secret document. a. se")re b. eep c. save d. run *. " secret text resulting from encryption process is called …. a. plain text b. cyber text c. code text d. "i!her te8t Meeting 5% )hoose a, b, c, or d for the correct answer. 1. This component application allows people connected over the (nternet to participate in discussions. a. Telnet b. @T+ ". IRC d. =/( 2. This website is owned by a nonprofit institution. a. httpDEEwww.cars.com b. htt!9::(((."ar.org c. httpDEEwww.carmaga#ine.co.u d. httpDEEwww.car#one.ie !. This website is a government agency. a. ocw.mit.edu b. httpDEEwww.languageBlearning.net ". training.fe+a.gov d. httpDEEwww.carecourses.com $. The NetiAuette number $ states that ?ou shall not use a computer to ….3 a. stea# b. hac c. brea d. deal *. >ecreational newsgroups start with …. a. alt b. re" c. soc d. sci Meeting 5*
)hoose a, b, c, or d for the correct answer. 1. The conventional mail is called …. a. email b. snae mail ". snai# +ai# d. blacmail 2. "n email message made up of …. a. server b. header c. message body d. signature !. )ommercial offers sent to our email without our reAuest is called …. a. phishing b. s!a+ c. worm d. bomb $. (n message header, To3 is for the …. a. re"i!ient;s address b. senderFs address c. topic d. time *. (t uses eBmail to duplicate themselves into vulnerable computers. a. email bomb b. phishing c. spam d. e+ai# (or+ Meeting 5/ )hoose a, b, c, or d for the correct answer. 1. The first actual 7eb search engine was developed by atthew ray in 144! and was called …. a. spandex b. (ande8 c. wantex d. windex 2. 'earch engines powered by robots are called …. a. creepy crawlers b. aunts c. bugs d. s!iders !. "t present there are still textBbased browsers lie …. a.
View more...
Comments