Sabtu, 19 Agustus 2017

Sosl UAS Bahasa Inggris II Semester 2 BSI




1. The origin of steganography from…
Jawaban : Greek

2. The examples of Chat media, except…
Jawaban : Facebook

3. A machine called Enigma to encrypt and decrypt the messages in world war II used by…
Jawaban : Germany

4. What is the internet…
Jawaban : A worldwide connection of millions of computers connected to thousands of different networks

5. it converts audio signals from a microphone, audio tape, or some other sources to digital signals, which can be stored as a…
Jawaban : Computer Audio File

6. The component application allows people connected over the internet to participate in discussions…
Jawaban : IRC

7. A NIC, repeaters, and a … are needed to create a basic network.
Jawaban : Hub

8. A website is a site (location) contains of … of pages on the World Wide Web
Jawaban : Collection

9. The art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message :
Jawaban : Steganography

10. To infect other file, Virus can be divided…
Jawaban : Over Writing

11. The function of website…
Jawaban : Searching information

12. There are the examples of Email Address, except…

13. There are the examples of search engine, except…
Jawaban : Facebook

14. What is the meaning of BCc…
Jawaban : Blind Carbon Copy

15. The example of cryptography…
Jawaban : Enigma

16. The are several part of Email…
Jawaban : Header and message body

17. The Worm spread through the internet using…
Jawaban : Email

18. Software which replicate by its own copy is…
Jawaban : Worm

19. What is the Website…
Jawaban : A site (location) contains a collection of pages on the World Wide Web

20. What kinds of document that could attach file to email, except…
Jawaban : WWW

21. The most commons of storage device is…
Jawaban : Hard Disk -  Flash Disk

22. What is the function internet address domain…
Jawaban : Host machine has a special internet protocol address (IP address) that uniquely identifies that computer

23. Nazi used a machine called … to encrypt and decrypt the messages
Jawaban : Enigma

24. The file that categories worm has extension…
Jawaban : .TXT

25. A program that searches document fo specified keywords and returned a list of the document where the keywords wre found is called…
Jawaban : Search Engine

26. The word cryptography derived from Greel, kryptos means…
Jawaban : Hidden

27. Application software is a … name for any software or computer program.
Jawaban : Generic

28. Web Page is a …  written in HTML code that contains text and links to other pages, files, or parts of the document
Jawaban : Document


29. Conventional mail is sometimes called…
Jawaban : Snail Mail

30. The are some technique steganography, except…
Jawaban : A copy to another file





Soal Latihan UAS Bahasa Inggris 2


LATIHAN UAS SEMESTER II

1.       This machine is also called an electonic symbol manipulating sistem. What is it ?
a.       Computer
b.      Prosesor
c.       Modem
d.      Planar board
e.      Memory
2.       Software is also a series of instructions for the computer that performs a particular task. The word mean....
a.       Certain
b.      General
c.       Definite
d.      Detail
e.      Document
3.       A worm is a sofware which replicates by creating its own copy. What is the synonim of the word.
a.       Indicate
b.      Duplicates
c.       Copy cat
d.      Complicates
e.      Complex
4.       Which country used network for the first time ?
a.       The USA
b.      The UK
c.       France
d.      Germany
e.      Russia
5.       The geometric arrangement of a computer system in a network is called.
a.       Topology
b.      Protocol
c.       Architecture
d.      Ethernet
e.      Nic
6.       Someone who is expert in steganography is called.....
a.       Steganator
b.      Steganographyst
c.       Steganalyst
d.      Code breaker
e.      Code password
7.       The word steganography is of......origin
a.       Greek
b.      Gaelic
c.       French
d.      Latin
e.      Germany
8.       Removing hair or beard is called
a.       Shaving
b.      Growing
c.       Harvesting
d.      Cutting
e.      Saving
9.       NAZI used a machine called....to encrypt and decrypt the messages
a.       Sigma
b.      Enigma
c.       Encarta
d.      All false
e.      All true
10.   Which are is the TLD name for germany ?
a.       De
b.      Gm
c.       Fr
d.      Uk
e.      Dt
11.   Military base or campuses usually use the following type of network
a.       Can
b.      Han
c.       Wan
d.      Man
e.      Lan
12.   Beside Nic and Hub, we need.....to create a basic computer network
a.       Receiver
b.      Repeater
c.       Controller
d.      RJ-45
e.      RG-45
13.   Which ones are the techniques in steganography ?
a.       Using invisible ink
b.      Using microdot
c.       Using messengers body
d.      Using program language
e.      All of the choices


14.   In Julius caesar cryptography code PHVVDJH mean
a.       Secrets
b.      Message
c.       Secured
d.      Hidden
e.      Password
15.   The term Cryptography is derived from greek....mean “ hidden “ or “ secret “
a.       Encrypt
b.      Cryptic
c.       Kryptos
d.      Krypton
e.      Kryptone
16.   This website is a goverment agency
a.       Ocw.mit edu
b.      www.language –learning.net
c.       Training.fema.gov
d.      www.carecourses.com
e.      www.redcross.net
17.   It contains information about the sender, the routing and the time of the message in a e-mail
a.       Header
b.      Signature
c.       Footer
d.      Body
e.      List
18.   Search engines operate algorithmically or are a mixture of
a.       Algorithmic
b.      Human input
c.       Machine input
d.      Algorithmic and human input
e.      Script program
19.   If one computer is broken in a ring network topology, then :
a.       The whole network is down
b.      A part of the network runs
c.       A part of the network is down
d.      It’s doesnt influence the network
e.      A part of the computer
20.   The first network ( ARPANET ) was designed for the following purpose
a.       Education
b.      Defense
c.       Commercial
d.      Entertainment
e.      Sport

21.   Why is steganography better than cryptography ?
a.       Messages attract attention to themselves
b.      Messages attract attention to messengers
c.       Messages attract attention to recipients
d.      Messages donot attract attention
e.      Messages attract not the attention

22.   ......In countries where encryption is illegal the word has similar meaning with
a.       Writing
b.      Hiding
c.       Showing
d.      Encoding activity
e.      Covering
23.   What is a steganographic message called ?
a.       Cover message
b.      Text cover
c.       Secret code
d.      Cover text       e.      Password code
24.   Julius caesar used cryptography to secure his message from his enemy, he replaced a character with its
a.       Previous three
b.      Previous two
c.       Review two
d.      Next three
e.      Next two
25.   The reverse process of encryption is called decryption it mean
a.       The opposite process
b.      The parallel process
c.       The similiar process
d.      The in-line process
e.      The parallel system
26.   It allows users to upload and download files from other computer
a.       Ftp
b.      Irc
c.       Telnet
d.      Edi
e.      Aoc



27.   Process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masqueranding as a trustworthy entity in an electronic communication is called
a.       Spam
b.      Worm
c.       Makro
d.      Phishing
e.      Email bomb
28.   Software is also a series of instruction for the computer that performs a particular task. The word mean....
a.       Certain
b.      General
c.       Definite
d.      Detail
e.      Document
29.   Programing can also be called by coding which is a process of writing.....debuging and maintain a source code of computer program.
a.       Checking
b.      Testing
c.       Fixing
d.      Encoding
e.      Recording
30.   What was the first network called ?
a.       Arpanet
b.      Arpa
c.       Arpweb
d.      Arpagate
e.      Arpastar
31.   There are......types of topology
a.       Three
b.      Four
c.       Two
d.      Five
e.      Six
32.   Which network topology uses a server ?
a.       Star topology
b.      Ring topology
c.       Bus topology
d.      None of them
e.      Pass topology



33.   A cryptographer is.....who is master in cryptography
a.       Something
b.      Anything
c.       Someone
d.      Anyone
e.      No one
34.   Microdots means......
a.       Small dots
b.      Very tiny dots
c.       Medium-size dots
d.      Big-size dots
e.      Small prints
35.   The word steganography means....in its origin language
a.       cover
b.      covered
c.       hide
d.      Discover
e.      Convert

36.   It ancient origins can be traced back to 440 BC is mean
a.       Followed
b.      Looked
c.       Found
d.      Seen
e.      See
37.   By using julius caesar cryptography code “ enemy “ becomes
a.       Gpgoa
b.      Fofna
c.       Dmdlx
d.      Hqhpb
e.      Ngsdf




38.   Cryptography is a part of.....and computer science
a.       Matematics
b.      Chemistry
c.       Physics
d.      Biology
e.      Mathematic
39.   In a network........
a.       User can use the same printer
b.      User can’t share information
c.       User must use different resources
d.      User can’t share resources
e.      User can’t make a folder

40.   The geometric arrangement of a computer system in a network is called
a.       Topology
b.      Protocol
c.       Architecture
d.      Ethernet
e.      Nic
41.   This method obivious drawbacks it means
a.       Benefit
b.      Disadvantage
c.       Lucky
d.      Goodness
e.      Anvantage
42.   In computer era steganography can be done by....a secret document into other document
a.       Inserting
b.      Convering
c.       Saving
d.      Getting
e.      Sending
43.   It allows for electronic transfer of data between companies over the internet
a.       FTP
b.      IRC
c.       EDI
d.      Telnet
e.      AOC
44.   The netique tte number 4 stater that “ you shall not use a computer to...
a.       Steal
b.      Hack
c.       Break
d.      Deal
e.      Crack
45.   It is malware which use e-mail as a way of replicating themselves into vulnerable computers
a.       Email worm
b.      Trojan horse
c.       Spam
d.      Email bomb     e.      Virus

46.   What is the specific address of a web page ?
a.       The uniform resource locator
b.      The hypertext mark-up language
c.       The IP
d.      The graphical user-interface
e.      The program language


CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2

BAHASA INGGRIS II

1.      Nowadays computer is used for the following purposes, except ….
a. multimedia  
b. scientific processing
c. data processing          
d. none of the above
2. The most commonly used input device is ….
a. keyboard                                 
b. webcam  
c. joystick                                     
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
 4. This is a picture of ….
a. transistor
b. VLSI        
c. vacuum tube                        
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)             
b. track ball                 
c. monitor                                      
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard  is called ….
a. planar board                               
b. baseboard      
c. logic board                           
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC               
c. ADM                                    
d. MAD
4. The Speed of a modem is measured by ….
a.  MHz
b. kbps              
c. GHz                                
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable       
c. with cable                   
d. lack of wire

Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey    
c. John M. Tukey                   
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified                            
b. freely used           
c. prominent                        
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs    
c. Mac OS                                           
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software       
b. application software
c. office application
d. OS

Meeting 4
1. In programming process, the first step is ….
a. compilation                  
b. debugging      
c. writing a code                
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware    
c. software                 
d. none of the above


3. A programmer must compile the source code by using ….
a. compiler   
b. transformer      
c. collector             
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging     
b. compiler           
c. bugging                            
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA            
c. BASIC                   
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb       
c. Trojan Horse                         
d. Win Vista
2. All of them can be identified by their ….
a. replication
b. identification        
c. multiplication                     
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three                 
c. two                                              
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator   
b. virus instructor          
c. virus copier                 
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm  
b. Time Bomb            
c. Trojan Horse                        
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick                                           
b. scanner                 
c. trackball                        
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b  
c. Belgium              
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal    
b. visual                             
c. external                 
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise                    
b. Tom Dooley        
c. Tom Cranston         
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor               
c. scanner                         
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket                    
c. modulator                        
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate     
c. collaborate              
d. communicate
3. NIC can be identified easily. It has a special port called ….
a. AJ-45                                             
b. RJ-54                    
c. RJ-45                           
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter   
c. adapter    
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair

Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden               
c. computer                           
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography          
c. cryptic                     
d. steganalyst
3. Steganography comes from … language.
a. Greek              
b. Latin             
c. Greece                                  
d. French
4. Writing a hidden message can use an … ink.
a. invincible                                       
b. inevitable                    
c. invisible                 
d. indispensable             
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file     
c. picture file  
d. none of the above

Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma                   
c. Encarta                       
d. all false
2. A cryptographer is … who is master in cryptography.
a.  Something                   
b.  anything                           
c. someone                 
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written                    
c. uttered                      
d. hidden
4. Cryptography is needed to … a secret document.
a. secure  
b. keep                     
c. save                          
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text                  
c. code text                  
d. cipher text

Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in discussions.
a. Telnet                                             
b. FTP                   
c. IRC                               
d. EDI
2. This website is owned by a nonprofit institution.
a.
http://www.cars.com
b.
http://www.car.org
c.
http://www.carmagazine.co.uk
d.
http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b.
http://www.language-learning.net
c. training.fema.gov
d.
http://www.carecourses.com
 4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal    
b. hack                 
c. break               
d. deal
5. Recreational newsgroups start with .
a. alt
b. rec                       
c. soc                            
d. sci

Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email                               
b. snake mail              
c. snail mail      
d. blackmail
2. An email message made up of ….
a. server  
b. header                        
c. message body                  
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam                          
c. worm                  
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address   
b. sender’s address            
c. topic           
d. time
5.  It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing             
c. spam                           
d. email worm

Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex
b. wandex                     
c. wantex                    
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts                              
c. bugs                
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx 
b. spynx                       
c. sync                      
d. none of the above
4. The following are search engines, except ….
a. Win Vista      
b. MSN                       
c. Google                        
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator

Tidak ada komentar:

Posting Komentar

Macam-macam Kejahatan Internet (Cyber Crime)       Seperti halnya di dunia nyata, internet sebagai dun...