Contoh Soal Uas Bahasa Inggris II Bsi Semester 2

January 29, 2019 | Author: StefaniBella | Category: Cryptography, Software, Source Code, Computer Science, Cyberspace
Share Embed Donate


Short Description

Download Contoh Soal Uas Bahasa Inggris II Bsi Semester 2...

Description

CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2 BAHASA INGGRIS II

1. Nowadays computer is used for the following purposes, except …. a. multimedia  b. scientific processing c. data processing d. none of the above 2. The most commonly used input device is …. a. keyboard  b. webcam c. joystic d. mouse !. " house si#e computer is … computer. a. the second generation b. the first generation c. the new generation d. the third generation  $. This is a picture of …. a. transistor  b. %&'( c. vacuum tube d. () *. (nformation can be stores in a storing device such as …. a. CD-ROM o!ti"a# disk$  b. trac ball c. monitor d. printer Meeting % 1. )+ stands for …. a. )entral +rocessed nit b. Centra# &ro"essing 'nit c. )enter +rocessing nit d. )entral +rocessor nit 2. (n "pple computer, motherboard motherboard is called …. a. planar board  b. baseboard ". #ogi" board d. system board !. )ompanies that produce processor are (ntel, (-, and …. a. AMD  b. N() c. "/ d. "/ $. The 'peed of a modem is measured by ….

a. 0# b. kb!s c. 0# d. "ll false *. This method is called wireless.3 (t means …. a. with wire b. (itho)t "ab#e c. with cable d. lac of wire Meeting * 1. The two major software are …. a. a!!#i"ation and syste+ soft(are  b. application and instructional software c. system software and command d. application software and processor  2. The term software was first used by … in 14*5. a. 6ohn 7. Turey b. ,ohn . )key c. 6ohn . Tuey d. 6ac 7. Tuey !. "n open source software means it is …. a. freely modified  b. freely used c. prominent d. free#y redistrib)ted $. These are types of operating system available to users, except …. a. 7indows b. G'Is c. ac 8' d. &inux *. 7ord processor such as icrosoft 7ord 299: and 8pen 8ffice 7riter are examples of …. a. system software b. a!!#i"ation soft(are c. office application d. 8' Meeting / 1. (n programming process, the first step is …. a. compilation  b. debugging ". (riting a "ode d. binary file 2. The physical devices in a computer are …. a. tools b. hard(are

c. software d. none of the above

!. " programmer must compile the source code by using …. a. "o+!i#er  b. transformer c. collector d. bugger  $. "cts of finding and fixing error code in all of the source code is called …. a. deb)gging  b. compiler c. bugging d. decoding *. The following is a programming language from 'un icrosystems. a. +ascal b. ,A0A c. -"'() d. -orland Meeting 1 1. 8ne of these is not a malware. a. worm  b. &ogic bomb c. Trojan 0orse d. in 0ista 2. "ll of them can be identified by their …. a. replication b. identifi"ation c. multiplication d. none of the above !. -y its way to infect other file, virus can be divided into … categories. a. one b. three c. two d. four  $. The simplest and easiest way in creating virus is by using a tool called …. a. vir)s generator  b. virus instructor c. virus copier d. virus emulator  *. … actually spreads through a networ or the (nternet using email. a. (or+  b. Time -omb c. Trojan 0orse d. %irus Meeting 2

1. 7hich is an example of a pointing device; a. joystic  b. scanner ". tra"kba## d. webcam 2. "T? eyboard layout is used in …. a. @rance b. both a and b c. -elgium d. "ll =urope !. )omputer speaers are commonly eAuipped with a lowBpower … amplifier. a. interna#  b. visual c. external d. internal C external $. The tracball was invented by …. a. Tom )ruise  b. Tom /ooley ". o+ Cranston d. Tom &ongstaff  *. %isual /isplay nit is another term for …. a. printer  b. +onitor c. scanner d. television Meeting 3 1. " N(), …, and a hub are needed to create a basic networ. a. re!eaters  b. socet c. modulator d. jac  2. The networ allows computers to … with each other. a. commune  b. coordinate c. collaborate d. "o++)ni"ate !. N() can be identified easily. (t has a special port called …. a. "6B$*  b. >6B*$ ". R,-/1 d. "6B*$ $. "nother term for N() is …. a. repeaters b. net(ork ada!ter c. adapter d. modem

*. 7hat does ">+" stand for; a. "dvance >esearch +rojects "gency  b. "dvance >esearch +rojects "ffair  ". Advan"ed Resear"h &ro4e"ts Agen"y d. "dvanced >esearch +rojects "ffair  Meeting 56 )hoose a, b, c, or d for the correct answer. 1. 'teganography is the art and science of writing … messages. a. readable b. hidden c. computer d. picture 2. "nother secret coding techniAue besides steganography is …. a. cryptonite b. "ry!togra!hy c. cryptic d. steganalyst !. 'teganography comes from … language. a. Greek  b. &atin c. reece d. @rench $. 7riting a hidden message can use an … in. a. invincible  b. inevitable ". invisib#e d. indispensable *. This document can be used as a media in steganography, except …. a. text file  b. mp! or video file c. picture file d. none of the above Meeting 55 )hoose a, b, c, or d for the correct answer. 1. Na#i used a machine called … to encrypt and decrypt the messages. a. 'igma b. 7nig+a c. =ncarta d. all false 2. " cryptographer is … who is master in cryptography. a. 'omething  b. anything ". so+eone d. anyone

!. raphy3 is a ree word means…. a. spoen b. (ritten c. uttered d. hidden $. )ryptography is needed to … a secret document. a. se")re  b. eep c. save d. run *. " secret text resulting from encryption process is called …. a. plain text  b. cyber text c. code text d. "i!her te8t Meeting 5% )hoose a, b, c, or d for the correct answer. 1. This component application allows people connected over the (nternet to participate in discussions. a. Telnet  b. @T+ ". IRC d. =/( 2. This website is owned by a nonprofit institution. a. httpDEEwww.cars.com b. htt!9::(((."ar.org c. httpDEEwww.carmaga#ine.co.u  d. httpDEEwww.car#one.ie !. This website is a government agency. a. ocw.mit.edu  b. httpDEEwww.languageBlearning.net ". training.fe+a.gov d. httpDEEwww.carecourses.com  $. The NetiAuette number $ states that ?ou shall not use a computer to ….3 a. stea#  b. hac c. brea d. deal *. >ecreational newsgroups start with …. a. alt b. re" c. soc d. sci Meeting 5*

)hoose a, b, c, or d for the correct answer. 1. The conventional mail is called …. a. email  b. snae mail ". snai# +ai# d. blacmail 2. "n email message made up of …. a. server  b. header c. message body d. signature !. )ommercial offers sent to our email without our reAuest is called …. a. phishing b. s!a+ c. worm d. bomb $. (n message header, To3 is for the …. a. re"i!ient;s address  b. senderFs address c. topic d. time *. (t uses eBmail to duplicate themselves into vulnerable computers. a. email bomb  b. phishing c. spam d. e+ai# (or+ Meeting 5/ )hoose a, b, c, or d for the correct answer. 1. The first actual 7eb search engine was developed by atthew ray in 144! and was called …. a. spandex b. (ande8 c. wantex d. windex 2. 'earch engines powered by robots are called …. a. creepy crawlers  b. aunts c. bugs d. s!iders !. "t present there are still textBbased browsers lie …. a.
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF