LATIHAN UAS SEMESTER II
1.
This machine is also called an
electonic symbol manipulating sistem. What is it ?
a.
Computer
b.
Prosesor
c.
Modem
d.
Planar board
e.
Memory
2.
Software is also a series of
instructions for the computer that performs a particular task. The word mean....
a.
Certain
b.
General
c.
Definite
d.
Detail
e.
Document
3.
A worm is a sofware which replicates
by creating its own copy. What is the synonim of the word.
a.
Indicate
b.
Duplicates
c.
Copy cat
d.
Complicates
e.
Complex
4.
Which country used network for
the first time ?
a.
The USA
b.
The UK
c.
France
d.
Germany
e.
Russia
5.
The geometric arrangement of a
computer system in a network is called.
a.
Topology
b.
Protocol
c.
Architecture
d.
Ethernet
e.
Nic
6.
Someone who is expert in
steganography is called.....
a.
Steganator
b.
Steganographyst
c.
Steganalyst
d.
Code breaker
e.
Code password
7.
The word steganography is
of......origin
a.
Greek
b.
Gaelic
c.
French
d.
Latin
e.
Germany
8.
Removing hair or beard is
called
a.
Shaving
b.
Growing
c.
Harvesting
d.
Cutting
e.
Saving
9.
NAZI used a machine
called....to encrypt and decrypt the messages
a.
Sigma
b.
Enigma
c.
Encarta
d.
All false
e.
All true
10.
Which are is the TLD name for
germany ?
a.
De
b.
Gm
c.
Fr
d.
Uk
e.
Dt
11.
Military base or campuses
usually use the following type of network
a.
Can
b.
Han
c.
Wan
d.
Man
e.
Lan
12.
Beside Nic and Hub, we
need.....to create a basic computer network
a.
Receiver
b.
Repeater
c.
Controller
d.
RJ-45
e.
RG-45
13.
Which ones are the techniques
in steganography ?
a.
Using
invisible ink
b.
Using microdot
c.
Using messengers body
d.
Using program language
e.
All of the choices
14.
In Julius caesar cryptography
code PHVVDJH mean
a.
Secrets
b.
Message
c.
Secured
d.
Hidden
e.
Password
15.
The term Cryptography is
derived from greek....mean “ hidden “ or “ secret “
a.
Encrypt
b.
Cryptic
c.
Kryptos
d.
Krypton
e.
Kryptone
16.
This website is a goverment
agency
a.
Ocw.mit edu
b.
www.language
–learning.net
c.
Training.fema.gov
17.
It contains information about
the sender, the routing and the time of the message in a e-mail
a.
Header
b.
Signature
c.
Footer
d.
Body
e.
List
18.
Search engines operate
algorithmically or are a mixture of
a.
Algorithmic
b.
Human input
c.
Machine input
d.
Algorithmic
and human input
e.
Script program
19.
If one computer is broken in a
ring network topology, then :
a.
The whole
network is down
b.
A part of the network runs
c.
A part of the network is down
d.
It’s doesnt influence the
network
e.
A part of the computer
20.
The first network ( ARPANET )
was designed for the following purpose
a.
Education
b.
Defense
c.
Commercial
d.
Entertainment
e.
Sport
21.
Why is steganography better
than cryptography ?
a.
Messages attract attention to
themselves
b.
Messages attract attention to
messengers
c.
Messages attract attention to
recipients
d.
Messages
donot attract attention
e.
Messages attract not the
attention
22.
......In countries where encryption is illegal the word has
similar meaning with
a.
Writing
b.
Hiding
c.
Showing
d.
Encoding activity
e.
Covering
23.
What is a steganographic
message called ?
a.
Cover message
b.
Text cover
c.
Secret code
d.
Cover text
e.
Password code
24.
Julius caesar used cryptography
to secure his message from his enemy, he replaced a character with its
a.
Previous three
b.
Previous two
c.
Review two
d.
Next three
e.
Next two
25.
The reverse process of
encryption is called decryption it mean
a.
The opposite
process
b.
The parallel process
c.
The similiar process
d.
The in-line process
e.
The parallel system
26.
It allows users to upload and
download files from other computer
a.
Ftp
b.
Irc
c.
Telnet
d.
Edi
e.
Aoc
27.
Process of attempting to
acquire sensitive information such as usernames, passwords and credit card
details by masqueranding as a trustworthy entity in an electronic communication
is called
a.
Spam
b.
Worm
c.
Makro
d.
Phishing
e.
Email bomb
28.
Software is also a series of
instruction for the computer that performs a particular task. The word mean....
a.
Certain
b.
General
c.
Definite
d.
Detail
e.
Document
29.
Programing can also be called
by coding which is a process of writing.....debuging and maintain a source code
of computer program.
a.
Checking
b.
Testing
c.
Fixing
d.
Encoding
e.
Recording
30.
What was the first network
called ?
a.
Arpanet
b.
Arpa
c.
Arpweb
d.
Arpagate
e.
Arpastar
31.
There are......types of
topology
a.
Three
b.
Four
c.
Two
d.
Five
e.
Six
32.
Which network topology uses a
server ?
a.
Star topology
b.
Ring topology
c.
Bus topology
d.
None of them
e.
Pass topology
33.
A cryptographer is.....who is
master in cryptography
a.
Something
b.
Anything
c.
Someone
d.
Anyone
e.
No one
34.
Microdots means......
a.
Small dots
b.
Very tiny
dots
c.
Medium-size dots
d.
Big-size dots
e.
Small prints
35.
The word steganography
means....in its origin language
a.
cover
b.
covered
c.
hide
d.
Discover
e.
Convert
36.
It ancient origins can be traced back to 440 BC is mean
a.
Followed
b.
Looked
c.
Found
d.
Seen
e.
See
37.
By using julius caesar
cryptography code “ enemy “ becomes
a.
Gpgoa
b.
Fofna
c.
Dmdlx
d.
Hqhpb
e.
Ngsdf
38.
Cryptography is a part
of.....and computer science
a.
Matematics
b.
Chemistry
c.
Physics
d.
Biology
e.
Mathematic
39.
In a network........
a.
User can use
the same printer
b.
User can’t share information
c.
User must use different resources
d.
User can’t share resources
e.
User can’t make a folder
40.
The geometric arrangement of a
computer system in a network is called
a.
Topology
b.
Protocol
c.
Architecture
d.
Ethernet
e.
Nic
41.
This method obivious drawbacks
it means
a.
Benefit
b.
Disadvantage
c.
Lucky
d.
Goodness
e.
Anvantage
42.
In computer era steganography
can be done by....a secret document into other document
a.
Inserting
b.
Convering
c.
Saving
d.
Getting
e.
Sending
43.
It allows for electronic
transfer of data between companies over the internet
a.
FTP
b.
IRC
c.
EDI
d.
Telnet
e.
AOC
44.
The netique tte number 4 stater
that “ you shall not use a computer to...
a.
Steal
b.
Hack
c.
Break
d.
Deal
e.
Crack
45.
It is malware which use e-mail
as a way of replicating themselves into vulnerable computers
a.
Email worm
b.
Trojan horse
c.
Spam
d.
Email bomb
e.
Virus
46.
What is the specific address of
a web page ?
a.
The uniform
resource locator
b.
The hypertext mark-up language
c.
The IP
d.
The graphical user-interface
Permisi , izin ngambil ilmu heehe
BalasHapus