Latihan Soal Bahasa Inggris II Semester 2

May 6, 2019 | Author: Imam Arif | Category: Cryptography, Computer Virus, Central Processing Unit, Software, Operating System
Share Embed Donate


Short Description

Download Latihan Soal Bahasa Inggris II Semester 2...

Description

Choose a, b, c, or d for the correct answer. Pertemuan I 1. Nowadays computer is used for the following purposes, except …. a. multimedia b. scientific processing c. data processing d. none of the above 2. The most commonly used input device is …. a. keyboard c. joystick b. webcam d. mouse 3. A house size computer is … computer. a. the second generation b. the first generation c. the new generation d. the third generation 4. This is a picture of …. a. transistor c. vacuum tube b. VLSI d. IC 5. Information can be stores in a storing device such as …. a. CD-ROM (optical disk) c. monitor b. track ball d. printer Pertemuan II CPU stands for …. 1. a. Central Processed Unit b. Central Processing Unit c. Center Processing Unit d. Central Processor Unit 2. In Apple computer, motherboard is called .... a. planar board c. logic board b. baseboard d. system board 3. Companies that produce processor are Intel, IBM, and …. a. AMD c. ADM b. NIC d. MAD 4. The Speed of a modem is measured by …. a. MHz c. GHz b. kbps d. All false 5. “This method is called wireless.” It means …. a. with wire c. with cable b. without cable d. lack of wire Pertemuan III 1. The two major software are …. a. application and system software b. application and instructional software b. system software and command c. application software and processor

2. The term software was first used by … in 1958. a. John W. Turkey c. John M. Tukey b. John W. Tukey d. Jack W. Tukey 3. An open source software means it is …. a. freely modified c. prominent b. freely used d. freely redistributed by anyone

http://catatanimam20.blogspot.com

4. These are types of operating system available to users, except …. a. Windows c. Mac OS b. GUIs d. Linux 5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of …. a. system software b. application software c. office application d. OS Pertemuan IV 1. In programming process, th e first step is …. a. compilation c. writing a code b. debugging d. binary file 2. The physical devices in a computer are …. a. tools c. software b. hardware d. none of the above 3. A programmer must compile the source code by using …. a. compiler c. collector b. transformer d. bugger

4. Acts of finding and fixing error code in all of the source code is called …. a. debugging c. bugging b. compiler d. decoding 5. The following is a programming language from Sun Microsystems. a. Pascal c. BASIC b. JAVA d. Borland Pertemuan V 1. One of these is not a malware. a. worm c. Trojan Horse b. Logic bomb d. Win Vista 2.

All of them can be identified by their …. a. replication c. multiplication b. identification d. none of the above 3. By its way to infect other file, virus can be divided into … categories. a. one c. two b. three d. four 4. The simplest and easiest way in creating virus is by using a tool called …. a. virus generator c. virus copier b. virus instructor d. virus emulator 5. … actually spreads through a network or the Internet using email. a. worm c. Trojan Horse b. Time Bomb d. Virus Pertemuan VI 1. Which is an example of a pointing device? a. joystick c. trackball b. scanner d. webcam 2. AZERTY keyboard layout is used in ….

| Bahasa Inggris 2 – Latihan soal semester 2

1

Trusted by over 1 million members

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Trusted by over 1 million members

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

a. France c. Belgium b. both a and b d. All Europe 3. Computer speakers are commonly equipped with a low-power … amplifier. a. internal c. external b. visual d. internal & external 4. The trackball was invented by …. a. Tom Cruise c. Tom Cranston b. Tom Dooley d. Tom Longstaff  5. Visual Display Unit is another term for …. a. printer c. scanner b. monitor d. television Pertemuan X 1. Steganography is the art and science of writing … messages. a. readable c. computer b. hidden d. picture 2. Another secret coding technique besides steganography is …. a. cryptonite c. cryptic b. cryptography d. steganalyst 3. Steganography comes from … language. a. Greek c. Greece b. Latin d. French 4. Writing a hidden message can use an … ink . a. invincible c. invisible b. inevitable d. indispensable 5. This document can be used as a media in steganography, except …. a. text file c. picture file b. mp3 or video file d. none of the above Pertemuan XI 1. Nazi used a machine called … to encrypt and decrypt the messages. a. Sigma c. Encarta b. Enigma d. all false 2. A cryptographer is … who is master in cryptography. a. Something c. someone b. anything d. anyone 3. “Graphy” is a Greek word means…. a. spoken c. uttered b. written d. hidden 4. Cryptography is needed to … a secret document. a. secure c. save b. keep d. run 5. A secret text resulting from encryption process is called …. a. plain text c. code text b. cyber text d. cipher text Pertemuan XII 1. This component application allows people connected over the Internet to participate in

a. www.cars.com c. www.carmagazine.co.uk b. www.car.org d. www.carzone.ie 3. This website is a government agency. a. ocw.mit.edu b. www.language-learning.net c. training.fema.gov d. www.carecourses.com 4. The Netiquette number 4 states that “You shall not use a computer to ….” a. steal c. break b. hack d. deal 5. Recreational newsgroups start with …. a. alt c. soc b. rec d. sci Pertemuan XIII The conventional mail is called …. 1. a. email c. snail mail b. snake mail d. blackmail 2. An email message made up of …. a. server c. message body b. header d. signature 3. Commercial offers sent to our email without our request is called …. a. phishing c. worm b. spam d. bomb 4. In message header, “To” is for the …. a. recipient’s address c. topic b. sender’s address d. time 5. It uses e-mail to duplicate themselves into vulnerable computers. a. email bomb c. spam b. phishing d. email worm Pertemuan XIV 1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called …. a. spandex c. wantex b. wandex d. windex 2. Search engines powered by robots are called …. a. creepy crawlers c. bugs b. aunts d. spiders 3. At present there are still text-based browsers like …. a. Lynx c. sync b. spynx d. none of the above 4. The following are search engines, except …. a. Win Vista c. Google b. MSN d. Excite 5. What does URL stand for? a. Uniform Resource Location b. United Resource Local

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF