Wellcome To My Blog.....Get Your Info.....
Tampilkan postingan dengan label SEMESTER 2 BAHASA INGGRIS 2. Tampilkan semua postingan
Tampilkan postingan dengan label SEMESTER 2 BAHASA INGGRIS 2. Tampilkan semua postingan

Sabtu, 12 Januari 2013

Soal - Soal Latihan UAS Bahasa Inggris 2


Contoh Soal UAS BAHASA INGGRIS


1. A NIC, …, and a hub are needed to create a basic network.

a. repeaters          c. modulator
b. socket               d. jack

2. The network allows computers to … with each other. 

a. commune         c. collaborate
b. coordinate       d.
communicate 

3. NIC can be identified easily. It has a special port called ….

a. AJ-45              c
. RJ-45 
b. RJ-54              d. AJ-54

4. Another term for NIC is ….

a. repeaters                          c. adapter
b. network adapter               d. modem

5. What does ARPA stand for?

a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair

6. Nowadays computer is used for the following purposes, except ….

a. multimedia 
b. scientific processing 
c. data processing 
d. none of the above

7. The most commonly used input device is ….

a. keyboard                 c. joystick
b. webcam                  d. mouse

8. A house size computer is … computer.

a. the second generation
b. the first generation
c. the new generation
d. the third generation

9. This is a picture of ….

a. transistor                c. vacuum tube 
b. VLSI                        d. IC

10. Information can be stores in a storing device such as ….

a. CD-ROM (optical disk)     c. monitor
b. track ball                             d. printer

11. CPU stands for ….

a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit

12. In Apple computer, motherboard is 
called .... 

a. planar board                    
c. logic board
b. baseboard                       d. system board

13. Companies that produce processor are Intel, IBM, and ….

a. AMD                                 c. ADM
b. NIC                                   d. MAD

14. The Speed of a modem is measured by ….

a. MHz                                  c. GHz 
b. kbps                                 d. All false

15. “This method is called wireless.” It means ….

a. with wire                          c. with cable
b. without cable                   d. lack of wire

16. The two major software are ….  

a. application and system software 
b. application and instructional software
c. system software and command
d. application software and processor

17. The term software was first used by … in 1958.

a. John W. Turkey                  c. John M. Tukey
b. John W. Tukey                   d. Jack W. Tukey

18. An open source software means it is ….

a. freely modified                  
c. prominent
b. freely used                         d. freely redistributed by anyone

19. These are types of operating system available to users, except ….

a. Windows                          c. Mac OS
b. GUIs                                  d. Linux

20. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….

a. system software 
b. application software 
c. office application
d. OS

21. In programming process, the first step is ….

a. compilation                          
c. writing a code
b. debugging                           d. binary file

22. The physical devices in a computer are ….

a. tools                                     c. software
b. hardware                             d. none of the above

23. A programmer must compile the source code by using ….

a. compiler                              c. collector
b. transformer                         d. bugger
24. Acts of finding and fixing error code in all of the source code is called ….

a. debugging                          c. bugging
b. compiler                             d. decoding 

25. The following is a programming language from Sun Microsystems.

a. Pascal                                c. BASIC
b. JAVA                                  d. Borland 

26. One of these is not a malware.

a. worm                                  c. Trojan Horse
b. Logic bomb                       
d. Win Vista

27.All of them can be identified by their ….

a. replication                          c. multiplication
b. identification                      d. none of the above

28. By its way to infect other file, virus can be divided into … categories.

a. one                                     c. two
b. three                                   d. four

29. The simplest and easiest way in creating virus is by using a tool called ….

a. virus generator                  c. virus copier
b. virus instructor                   d. virus emulator 

30. … actually spreads through a network or the Internet using email. 

a. worm                                c. Trojan Horse
b. Time Bomb                      d. Virus

31. Which is an example of a pointing device?

a. joystick                            c. trackball
b. scanner                           d. webcam

32. AZERTY keyboard layout is used in ….

a. France                            c. Belgium
b. both a and b                   d. All Europe

33. Computer speakers are commonly equipped with a low-power … amplifier.

a. internal                           c. external
b. visual                              d. internal & external 

34. The trackball was invented by ….

a. Tom Cruise                     c. Tom Cranston 
b. Tom Dooley                    d. Tom Longstaff

35. Visual Display Unit is another term for ….

a. printer                              c. scanner
b. monitor                            d. television

36. Steganography is the art and science of writing … messages.

a. readable                         c. computer
b. hidden                             d. picture

37. Another secret coding technique besides steganography is ….

a. cryptonite                       c. cryptic
b. cryptography                  d. steganalyst 

38. Steganography comes from … language.

a. Greek                             c. Greece
b. Latin                               d. French

39. Writing a hidden message can use an … ink.

a. invincible                        
c. invisible
b. inevitable                       d. indispensable 

40. This document can be used as a media in steganography, except ….

a. text file                           c. picture file
b. mp3 or video file          
d. none of the above

41. Nazi used a machine called … to encrypt and decrypt the messages.

a. Sigma                           c. Encarta
b. Enigma                         d. all false

42. A cryptographer is … who is master in cryptography.

a. Something                   
c. someone
b. anything                        d. anyone

43. “Graphy” is a Greek word means….

a. spoken                         c. uttered
b. written                          d. hidden

44. Cryptography is needed to … a secret document. 

a. secure                        c. save
b. keep                           d. run

45. A secret text resulting from encryption process is called ….

a. plain text                 c. code text
b. cyber text               d. cipher text

46. This component application allows people connected over the Internet to participate in discussions.

a. Telnet                    c
. IRC
b. FTP                       d. EDI

47. This website is owned by a nonprofit institution.

a. www.cars.com            c. www.carmagazine.co.uk 
b. www.car.org                d. www.carzone.ie 

48. This website is a government agency.

a. ocw.mit.edu                 b. www.language-learning.net
c. training.fema.gov        d. www.carecourses.com 

49. The Netiquette number 4 states that “You shall not use a computer to ….”

a. steal                             c. break
b. hack                             d. deal

50. Recreational newsgroups start with …. 

a. alt                                c. soc 
b. rec                              d. sci 

51. The conventional mail is called ….

a. email                       c. snail mail
b. snake mail              d. blackmail

52. An email message made up of ….

a. server                      c. message body
b. header                    d. signature

53. Commercial offers sent to our email without our request is called ….

a. phishing                 c. worm
b. spam                     d. bomb

54. In message header, “To” is for the ….

a. recipient’s address       c. topic
b. sender’s address          d. time

55. It uses e-mail to duplicate themselves into vulnerable computers.

a. email bomb                    c. spam
b. phishing                          
d. email worm



Soal Latihan UAS Bahasa Inggris 2



LATIHAN UAS SEMESTER II

1.       This machine is also called an electonic symbol manipulating sistem. What is it ?
a.       Computer
b.      Prosesor
c.       Modem
d.      Planar board
e.      Memory
2.       Software is also a series of instructions for the computer that performs a particular task. The word mean....
a.       Certain
b.      General
c.       Definite
d.      Detail
e.      Document
3.       A worm is a sofware which replicates by creating its own copy. What is the synonim of the word.
a.       Indicate
b.      Duplicates
c.       Copy cat
d.      Complicates
e.      Complex
4.       Which country used network for the first time ?
a.       The USA
b.      The UK
c.       France
d.      Germany
e.      Russia
5.       The geometric arrangement of a computer system in a network is called.
a.       Topology
b.      Protocol
c.       Architecture
d.      Ethernet
e.      Nic
6.       Someone who is expert in steganography is called.....
a.       Steganator
b.      Steganographyst
c.       Steganalyst
d.      Code breaker
e.      Code password

7.       The word steganography is of......origin
a.       Greek
b.      Gaelic
c.       French
d.      Latin
e.      Germany
8.       Removing hair or beard is called
a.       Shaving
b.      Growing
c.       Harvesting
d.      Cutting
e.      Saving
9.       NAZI used a machine called....to encrypt and decrypt the messages
a.       Sigma
b.      Enigma
c.       Encarta
d.      All false
e.      All true
10.   Which are is the TLD name for germany ?
a.       De
b.      Gm
c.       Fr
d.      Uk
e.      Dt
11.   Military base or campuses usually use the following type of network
a.       Can
b.      Han
c.       Wan
d.      Man
e.      Lan
12.   Beside Nic and Hub, we need.....to create a basic computer network
a.       Receiver
b.      Repeater
c.       Controller
d.      RJ-45
e.      RG-45
13.   Which ones are the techniques in steganography ?
a.       Using invisible ink
b.      Using microdot
c.       Using messengers body
d.      Using program language
e.      All of the choices


14.   In Julius caesar cryptography code PHVVDJH mean
a.       Secrets
b.      Message
c.       Secured
d.      Hidden
e.      Password
15.   The term Cryptography is derived from greek....mean “ hidden “ or “ secret “
a.       Encrypt
b.      Cryptic
c.       Kryptos
d.      Krypton
e.      Kryptone
16.   This website is a goverment agency
a.       Ocw.mit edu
b.      www.language –learning.net
c.       Training.fema.gov
d.      www.carecourses.com
e.      www.redcross.net
17.   It contains information about the sender, the routing and the time of the message in a e-mail
a.       Header
b.      Signature
c.       Footer
d.      Body
e.      List
18.   Search engines operate algorithmically or are a mixture of
a.       Algorithmic
b.      Human input
c.       Machine input
d.      Algorithmic and human input
e.      Script program
19.   If one computer is broken in a ring network topology, then :
a.       The whole network is down
b.      A part of the network runs
c.       A part of the network is down
d.      It’s doesnt influence the network
e.      A part of the computer
20.   The first network ( ARPANET ) was designed for the following purpose
a.       Education
b.      Defense
c.       Commercial
d.      Entertainment
e.      Sport

21.   Why is steganography better than cryptography ?
a.       Messages attract attention to themselves
b.      Messages attract attention to messengers
c.       Messages attract attention to recipients
d.      Messages donot attract attention
e.      Messages attract not the attention

22.   ......In countries where encryption is illegal the word has similar meaning with
a.       Writing
b.      Hiding
c.       Showing
d.      Encoding activity
e.      Covering
23.   What is a steganographic message called ?
a.       Cover message
b.      Text cover
c.       Secret code
d.      Cover text
e.      Password code
24.   Julius caesar used cryptography to secure his message from his enemy, he replaced a character with its
a.       Previous three
b.      Previous two
c.       Review two
d.      Next three
e.      Next two
25.   The reverse process of encryption is called decryption it mean
a.       The opposite process
b.      The parallel process
c.       The similiar process
d.      The in-line process
e.      The parallel system
26.   It allows users to upload and download files from other computer
a.       Ftp
b.      Irc
c.       Telnet
d.      Edi
e.      Aoc



27.   Process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masqueranding as a trustworthy entity in an electronic communication is called
a.       Spam
b.      Worm
c.       Makro
d.      Phishing
e.      Email bomb
28.   Software is also a series of instruction for the computer that performs a particular task. The word mean....
a.       Certain
b.      General
c.       Definite
d.      Detail
e.      Document
29.   Programing can also be called by coding which is a process of writing.....debuging and maintain a source code of computer program.
a.       Checking
b.      Testing
c.       Fixing
d.      Encoding
e.      Recording
30.   What was the first network called ?
a.       Arpanet
b.      Arpa
c.       Arpweb
d.      Arpagate
e.      Arpastar
31.   There are......types of topology
a.       Three
b.      Four
c.       Two
d.      Five
e.      Six
32.   Which network topology uses a server ?
a.       Star topology
b.      Ring topology
c.       Bus topology
d.      None of them
e.      Pass topology



33.   A cryptographer is.....who is master in cryptography
a.       Something
b.      Anything
c.       Someone
d.      Anyone
e.      No one
34.   Microdots means......
a.       Small dots
b.      Very tiny dots
c.       Medium-size dots
d.      Big-size dots
e.      Small prints
35.   The word steganography means....in its origin language
a.       cover
b.      covered
c.       hide
d.      Discover
e.      Convert

36.   It ancient origins can be traced back to 440 BC is mean
a.       Followed
b.      Looked
c.       Found
d.      Seen
e.      See
37.   By using julius caesar cryptography code “ enemy “ becomes
a.       Gpgoa
b.      Fofna
c.       Dmdlx
d.      Hqhpb
e.      Ngsdf
38.   Cryptography is a part of.....and computer science
a.       Matematics
b.      Chemistry
c.       Physics
d.      Biology
e.      Mathematic
39.   In a network........
a.       User can use the same printer
b.      User can’t share information
c.       User must use different resources
d.      User can’t share resources
e.      User can’t make a folder

40.   The geometric arrangement of a computer system in a network is called
a.       Topology
b.      Protocol
c.       Architecture
d.      Ethernet
e.      Nic
41.   This method obivious drawbacks it means
a.       Benefit
b.      Disadvantage
c.       Lucky
d.      Goodness
e.      Anvantage
42.   In computer era steganography can be done by....a secret document into other document
a.       Inserting
b.      Convering
c.       Saving
d.      Getting
e.      Sending
43.   It allows for electronic transfer of data between companies over the internet
a.       FTP
b.      IRC
c.       EDI
d.      Telnet
e.      AOC
44.   The netique tte number 4 stater that “ you shall not use a computer to...
a.       Steal
b.      Hack
c.       Break
d.      Deal
e.      Crack
45.   It is malware which use e-mail as a way of replicating themselves into vulnerable computers
a.       Email worm
b.      Trojan horse
c.       Spam
d.      Email bomb
e.      Virus
46.   What is the specific address of a web page ?
a.       The uniform resource locator
b.      The hypertext mark-up language
c.       The IP
d.      The graphical user-interface
e.      The program language