Contoh Soal Uas bahasa inggris semester 2 bsi
1.
A
NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. Jack
a. repeaters
b. socket
c. modulator
d. Jack
2.
The network allows computers to … with each
other.
a. commune
b. coordinate
c. collaborate
d. Communicate
a. commune
b. coordinate
c. collaborate
d. Communicate
3.
NIC can be identified easily. It has a special
port called ….
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4.
Another
term for NIC is ….
a. repeaters
b. network adapter
c. adapter
d. Modem
a. repeaters
b. network adapter
c. adapter
d. Modem
5.
What
does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
6.
Steganography is the art and science of
writing … messages.
a. readable
b. hidden
c. computer
d. Picture
a. readable
b. hidden
c. computer
d. Picture
7.
Another
secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. Steganalyst
a. cryptonite
b. cryptography
c. cryptic
d. Steganalyst
8.
Steganography
comes from … language.
a. Greek
b. Latin
c. Greece
d. French
a. Greek
b. Latin
c. Greece
d. French
9.
Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
a. invincible
b. inevitable
c. invisible
d. indispensable
10. This document can be used as a media in
steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above
a. text file
b. mp3 or video file
c. picture file
d. none of the above
11. Nazi used a machine called … to encrypt and
decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
a. Sigma
b. Enigma
c. Encarta
d. all false
12. A
cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. Anyone
a. Something
b. anything
c. someone
d. Anyone
13. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. Hidden
a. spoken
b. written
c. uttered
d. Hidden
14. Cryptography is needed to … a secret
document.
a. secure
b. keep
c. save
d. Run
a. secure
b. keep
c. save
d. Run
15. A
secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text
a. plain text
b. cyber text
c. code text
d. cipher text
16. This component application allows people
connected over the Internet to participate in discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
a. Telnet
b. FTP
c. IRC
d. EDI
17. This website is owned by a nonprofit
institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
18. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
19. The Netiquette number 4 states that “You
shall not use a computer to ….”
a. steal
b. hack
c. break
d. Deal
a. steal
b. hack
c. break
d. Deal
20. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. Sci
a. alt
b. rec
c. soc
d. Sci
21. The
conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. Blackmail
a. email
b. snake mail
c. snail mail
d. Blackmail
22. An
email message made up of ….
a. server
b. header
c. message body
d. Signature
a. server
b. header
c. message body
d. Signature
23. Commercial offers sent to our email
without our request is called ….
a. phishing
b. spam
c. worm
d. Bomb
a. phishing
b. spam
c. worm
d. Bomb
24. In
message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. Time
a. recipient’s address
b. sender’s address
c. topic
d. Time
25. It
uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
a. email bomb
b. phishing
c. spam
d. email worm
26. The first actual Web search engine was developed by
Matthew Gray in 1993 and was called ….
a. spandex
b. wandex
c. wantex
d. Windex
a. spandex
b. wandex
c. wantex
d. Windex
27. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. Spiders
a. creepy crawlers
b. aunts
c. bugs
d. Spiders
28. At present there are still text-based browsers
like ….
a. Lynx
b. spynx
c. sync
d. none of the above
a. Lynx
b. spynx
c. sync
d. none of the above
29. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
a. Win Vista
b. MSN
c. Google
d. Excite
30. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
Contoh soal uas sistem basis data semester 2 bsi, Contoh soal uas struktur data semester 2 bsi, contoh soal uts bahasa inggris semester 2,
Subscribe by Email
Follow Updates Articles from This Blog via Email
No Comments