1. The origin of
steganography from…
Jawaban : Greek
2. The examples
of Chat media, except…
Jawaban : Facebook
3. A machine
called Enigma to encrypt and decrypt the messages in world war II used by…
Jawaban : Germany
4. What is the
internet…
Jawaban : A worldwide connection of millions of computers connected
to thousands of different networks
5. it converts
audio signals from a microphone, audio tape, or some other sources to digital
signals, which can be stored as a…
Jawaban : Computer Audio File
6. The component
application allows people connected over the internet to participate in
discussions…
Jawaban : IRC
7. A NIC,
repeaters, and a … are needed to create a basic network.
Jawaban : Hub
8. A website is
a site (location) contains of … of pages on the World Wide Web
Jawaban : Collection
9. The art and
science of writing hidden messages in such a way that no-one apart from the
sender and intended recipient even realizes there is a hidden message :
Jawaban : Steganography
10. To infect
other file, Virus can be divided…
Jawaban : Over Writing
11. The function
of website…
Jawaban : Searching information
12. There are
the examples of Email Address, except…
13. There are
the examples of search engine, except…
Jawaban : Facebook
14. What is the
meaning of BCc…
Jawaban : Blind Carbon Copy
15. The example
of cryptography…
Jawaban : Enigma
16. The are
several part of Email…
Jawaban : Header and message body
17. The Worm
spread through the internet using…
Jawaban : Email
18. Software
which replicate by its own copy is…
Jawaban : Worm
19. What is the
Website…
Jawaban : A site (location) contains a collection of pages on the
World Wide Web
20. What kinds
of document that could attach file to email, except…
Jawaban : WWW
21. The most
commons of storage device is…
Jawaban : Hard Disk - Flash
Disk
22. What is the
function internet address domain…
Jawaban : Host machine has a special internet protocol address (IP
address) that uniquely identifies that computer
23. Nazi used a
machine called … to encrypt and decrypt the messages
Jawaban : Enigma
24. The file
that categories worm has extension…
Jawaban : .TXT
25. A program
that searches document fo specified keywords and returned a list of the
document where the keywords wre found is called…
Jawaban : Search Engine
26. The word
cryptography derived from Greel, kryptos means…
Jawaban : Hidden
27. Application
software is a … name for any software or computer program.
Jawaban : Generic
28. Web Page is
a … written in HTML code that contains
text and links to other pages, files, or parts of the document
Jawaban : Document
29. Conventional
mail is sometimes called…
Jawaban : Snail Mail
30. The are some
technique steganography, except…
Jawaban : A copy to another file
Soal Latihan UAS Bahasa Inggris 2
LATIHAN UAS
SEMESTER II
1.
This machine is also called an electonic symbol manipulating sistem. What
is it ?
a. Computer
b. Prosesor
c.
Modem
d. Planar board
e. Memory
2.
Software is also a series of instructions for the computer that performs a
particular task. The word mean....
a. Certain
b. General
c.
Definite
d. Detail
e. Document
3.
A worm is a sofware which replicates by creating its own
copy. What is the synonim of the word.
a.
Indicate
b. Duplicates
c.
Copy cat
d. Complicates
e. Complex
4.
Which country used network for the first time ?
a. The
USA
b. The UK
c.
France
d. Germany
e. Russia
5.
The geometric arrangement of a computer system in a network is called.
a. Topology
b. Protocol
c.
Architecture
d. Ethernet
e. Nic
6.
Someone who is expert in steganography is called.....
a.
Steganator
b. Steganographyst
c. Steganalyst
d. Code breaker
e. Code
password
7.
The word steganography is of......origin
a. Greek
b. Gaelic
c.
French
d. Latin
e. Germany
8.
Removing hair or beard is called
a. Shaving
b. Growing
c.
Harvesting
d. Cutting
e. Saving
9.
NAZI used a machine called....to encrypt and decrypt the messages
a.
Sigma
b. Enigma
c.
Encarta
d. All false
e. All true
10. Which are is
the TLD name for germany ?
a. De
b. Gm
c.
Fr
d. Uk
e. Dt
11. Military
base or campuses usually use the following type of network
a.
Can
b.
Han
c. Wan
d. Man
e. Lan
12. Beside Nic
and Hub, we need.....to create a basic computer network
a.
Receiver
b. Repeater
c.
Controller
d. RJ-45
e. RG-45
13. Which ones
are the techniques in steganography ?
a. Using
invisible ink
b. Using
microdot
c.
Using messengers body
d. Using
program language
e. All of the
choices
14. In Julius
caesar cryptography code PHVVDJH mean
a.
Secrets
b. Message
c.
Secured
d. Hidden
e. Password
15. The term
Cryptography is derived from greek....mean “ hidden “ or “ secret “
a.
Encrypt
b. Cryptic
c. Kryptos
d. Krypton
e. Kryptone
16. This website
is a goverment agency
a.
Ocw.mit edu
c. Training.fema.gov
17. It contains
information about the sender, the routing and the time of the message in a
e-mail
a. Header
b. Signature
c.
Footer
d. Body
e. List
18. Search
engines operate algorithmically or are a mixture of
a.
Algorithmic
b. Human input
c.
Machine input
d. Algorithmic
and human input
e. Script
program
19. If one
computer is broken in a ring network topology, then :
a. The
whole network is down
b. A part of
the network runs
c.
A part of the network is down
d. It’s doesnt
influence the network
e. A part of
the computer
20. The first
network ( ARPANET ) was designed for the following purpose
a.
Education
b. Defense
c.
Commercial
d. Entertainment
e. Sport
21. Why is steganography
better than cryptography ?
a.
Messages attract attention to themselves
b. Messages
attract attention to messengers
c.
Messages attract attention to recipients
d. Messages
donot attract attention
e. Messages
attract not the attention
22. ......In
countries where encryption is illegal the word has similar meaning with
a.
Writing
b. Hiding
c.
Showing
d. Encoding
activity
e. Covering
23. What is a
steganographic message called ?
a. Cover
message
b. Text cover
c.
Secret code
d. Cover text e.
Password code
24. Julius
caesar used cryptography to secure his message from his enemy, he replaced a
character with its
a.
Previous three
b. Previous two
c.
Review two
d. Next
three
e. Next two
25. The reverse
process of encryption is called decryption it mean
a. The
opposite process
b. The parallel
process
c.
The similiar process
d. The in-line
process
e. The parallel
system
26. It allows
users to upload and download files from other computer
a. Ftp
b. Irc
c.
Telnet
d. Edi
e. Aoc
27. Process of
attempting to acquire sensitive information such as usernames, passwords and credit
card details by masqueranding as a trustworthy entity in an electronic
communication is called
a.
Spam
b. Worm
c.
Makro
d. Phishing
e. Email bomb
28. Software is
also a series of instruction for the computer that performs a particular
task. The word mean....
a. Certain
b. General
c.
Definite
d. Detail
e. Document
29. Programing
can also be called by coding which is a process of writing.....debuging and
maintain a source code of computer program.
a.
Checking
b. Testing
c.
Fixing
d. Encoding
e. Recording
30.
What was the first network called ?
a. Arpanet
b. Arpa
c.
Arpweb
d. Arpagate
e. Arpastar
31. There
are......types of topology
a. Three
b. Four
c.
Two
d. Five
e. Six
32. Which
network topology uses a server ?
a.
Star topology
b. Ring
topology
c.
Bus topology
d. None
of them
e. Pass
topology
33. A
cryptographer is.....who is master in cryptography
a.
Something
b. Anything
c. Someone
d. Anyone
e. No one
34. Microdots
means......
a.
Small dots
b. Very
tiny dots
c.
Medium-size dots
d. Big-size
dots
e. Small prints
35. The word
steganography means....in its origin language
a.
cover
b. covered
c.
hide
d. Discover
e. Convert
36. It ancient
origins can be traced back to 440 BC is mean
a. Followed
b. Looked
c.
Found
d. Seen
e. See
37. By using
julius caesar cryptography code “ enemy “ becomes
a.
Gpgoa
b. Fofna
c.
Dmdlx
d. Hqhpb
e. Ngsdf
38.
Cryptography is a part of.....and computer science
a. Matematics
b. Chemistry
c.
Physics
d. Biology
e. Mathematic
39. In a
network........
a. User
can use the same printer
b. User can’t
share information
c.
User must use different resources
d. User can’t
share resources
e. User can’t
make a folder
40. The
geometric arrangement of a computer system in a network is called
a. Topology
b. Protocol
c.
Architecture
d. Ethernet
e. Nic
41. This method
obivious drawbacks it means
a.
Benefit
b. Disadvantage
c.
Lucky
d. Goodness
e. Anvantage
42. In computer
era steganography can be done by....a secret document into other document
a. Inserting
b. Convering
c.
Saving
d. Getting
e. Sending
43. It allows
for electronic transfer of data between companies over the internet
a.
FTP
b. IRC
c. EDI
d. Telnet
e. AOC
44. The netique
tte number 4 stater that “ you shall not use a computer to...
a. Steal
b. Hack
c.
Break
d. Deal
e. Crack
45. It is
malware which use e-mail as a way of replicating themselves into vulnerable
computers
a. Email
worm
b. Trojan horse
c.
Spam
d. Email bomb e. Virus
46. What is the
specific address of a web page ?
a. The
uniform resource locator
b. The
hypertext mark-up language
c.
The IP
d. The
graphical user-interface
e. The program
language
CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2
BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except ….
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is ….
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable
c. with cable
d. lack of wire
Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software
c. office application
d. OS
Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above
3. A programmer must compile the source code by using ….
a. compiler
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA
c. BASIC
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista
2. All of them can be identified by their ….
a. replication
b. identification
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is ….
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable
c. with cable
d. lack of wire
Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software
c. office application
d. OS
Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above
3. A programmer must compile the source code by using ….
a. compiler
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA
c. BASIC
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista
2. All of them can be identified by their ….
a. replication
b. identification
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
Tidak ada komentar:
Posting Komentar