Anda di halaman 1dari 8

CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2

BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except .
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is .
a. keyboard
b. webcam
c. joystic
d. mouse
!. " house si#e computer is computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
$. This is a picture of .
a. transistor
b. %&'(
c. vacuum tube
d. ()
*. (nformation can be stores in a storing device such as .
a. CD-ROM o!ti"a# disk$
b. trac ball
c. monitor
d. printer
Meeting %
1. )+, stands for .
a. )entral +rocessed ,nit
b. Centra# &ro"essing 'nit
c. )enter +rocessing ,nit
d. )entral +rocessor ,nit
2. (n "pple computer, motherboard is called .
a. planar board
b. baseboard
". #ogi" board
d. system board
!. )ompanies that produce processor are (ntel, (-., and .
a. AMD
b. N()
c. "/.
d. ."/
$. The 'peed of a modem is measured by .
a. .0#
b. kb!s
c. 10#
d. "ll false
*. 2This method is called wireless.3 (t means .
a. with wire
b. (itho)t "ab#e
c. with cable
d. lac of wire
Meeting *
1. The two major software are .
a. a!!#i"ation and syste+ soft(are
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by in 14*5.
a. 6ohn 7. Turey
b. ,ohn -. .)key
c. 6ohn .. Tuey
d. 6ac 7. Tuey
!. "n open source software means it is .
a. freely modified
b. freely used
c. prominent
d. free#y redistrib)ted
$. These are types of operating system available to users, except .
a. 7indows
b. G'Is
c. .ac 8'
d. &inux
*. 7ord processor such as .icrosoft 7ord 299: and 8pen 8ffice 7riter are examples of .
a. system software
b. a!!#i"ation soft(are
c. office application
d. 8'
Meeting /
1. (n programming process, the first step is .
a. compilation
b. debugging
". (riting a "ode
d. binary file
2. The physical devices in a computer are .
a. tools
b. hard(are
c. software
d. none of the above
!. " programmer must compile the source code by using .
a. "o+!i#er
b. transformer
c. collector
d. bugger
$. "cts of finding and fixing error code in all of the source code is called .
a. deb)gging
b. compiler
c. bugging
d. decoding
*. The following is a programming language from 'un .icrosystems.
a. +ascal
b. ,A0A
c. -"'()
d. -orland
Meeting 1
1. 8ne of these is not a malware.
a. worm
b. &ogic bomb
c. Trojan 0orse
d. -in 0ista
2. "ll of them can be identified by their .
a. replication
b. identifi"ation
c. multiplication
d. none of the above
!. -y its way to infect other file, virus can be divided into categories.
a. one
b. three
c. two
d. four
$. The simplest and easiest way in creating virus is by using a tool called .
a. vir)s generator
b. virus instructor
c. virus copier
d. virus emulator
*. actually spreads through a networ or the (nternet using email.
a. (or+
b. Time -omb
c. Trojan 0orse
d. %irus
Meeting 2
1. 7hich is an example of a pointing device;
a. joystic
b. scanner
". tra"kba##
d. webcam
2. "<=>T? eyboard layout is used in .
a. @rance
b. both a and b
c. -elgium
d. "ll =urope
!. )omputer speaers are commonly eAuipped with a lowBpower amplifier.
a. interna#
b. visual
c. external
d. internal C external
$. The tracball was invented by .
a. Tom )ruise
b. Tom /ooley
". .o+ Cranston
d. Tom &ongstaff
*. %isual /isplay ,nit is another term for .
a. printer
b. +onitor
c. scanner
d. television
Meeting 3
1. " N(), , and a hub are needed to create a basic networ.
a. re!eaters
b. socet
c. modulator
d. jac
2. The networ allows computers to with each other.
a. commune
b. coordinate
c. collaborate
d. "o++)ni"ate
!. N() can be identified easily. (t has a special port called .
a. "6B$*
b. >6B*$
". R,-/1
d. "6B*$
$. "nother term for N() is .
a. repeaters
b. net(ork ada!ter
c. adapter
d. modem
*. 7hat does ">+" stand for;
a. "dvance >esearch +rojects "gency
b. "dvance >esearch +rojects "ffair
". Advan"ed Resear"h &ro4e"ts Agen"y
d. "dvanced >esearch +rojects "ffair
Meeting 56
)hoose a, b, c, or d for the correct answer.
1. 'teganography is the art and science of writing messages.
a. readable
b. hidden
c. computer
d. picture
2. "nother secret coding techniAue besides steganography is .
a. cryptonite
b. "ry!togra!hy
c. cryptic
d. steganalyst
!. 'teganography comes from language.
a. Greek
b. &atin
c. 1reece
d. @rench
$. 7riting a hidden message can use an in.
a. invincible
b. inevitable
". invisib#e
d. indispensable
*. This document can be used as a media in steganography, except .
a. text file
b. mp! or video file
c. picture file
d. none of the above
Meeting 55
)hoose a, b, c, or d for the correct answer.
1. Na#i used a machine called to encrypt and decrypt the messages.
a. 'igma
b. 7nig+a
c. =ncarta
d. all false
2. " cryptographer is who is master in cryptography.
a. 'omething
b. anything
". so+eone
d. anyone
!. 21raphy3 is a 1ree word means.
a. spoen
b. (ritten
c. uttered
d. hidden
$. )ryptography is needed to a secret document.
a. se")re
b. eep
c. save
d. run
*. " secret text resulting from encryption process is called .
a. plain text
b. cyber text
c. code text
d. "i!her te8t
Meeting 5%
)hoose a, b, c, or d for the correct answer.
1. This component application allows people connected over the (nternet to participate in
discussions.
a. Telnet
b. @T+
". IRC
d. =/(
2. This website is owned by a nonprofit institution.
a. httpDEEwww.cars.com
b. htt!9::(((."ar.org
c. httpDEEwww.carmaga#ine.co.u
d. httpDEEwww.car#one.ie
!. This website is a government agency.
a. ocw.mit.edu
b. httpDEEwww.languageBlearning.net
". training.fe+a.gov
d. httpDEEwww.carecourses.com
$. The NetiAuette number $ states that 2?ou shall not use a computer to .3
a. stea#
b. hac
c. brea
d. deal
*. >ecreational newsgroups start with .
a. alt
b. re"
c. soc
d. sci
Meeting 5*
)hoose a, b, c, or d for the correct answer.
1. The conventional mail is called .
a. email
b. snae mail
". snai# +ai#
d. blacmail
2. "n email message made up of .
a. server
b. header
c. message body
d. signature
!. )ommercial offers sent to our email without our reAuest is called .
a. phishing
b. s!a+
c. worm
d. bomb
$. (n message header, 2To3 is for the .
a. re"i!ient;s address
b. senderFs address
c. topic
d. time
*. (t uses eBmail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. e+ai# (or+
Meeting 5/
)hoose a, b, c, or d for the correct answer.
1. The first actual 7eb search engine was developed by .atthew 1ray in 144! and was called
.
a. spandex
b. (ande8
c. wantex
d. windex
2. 'earch engines powered by robots are called .
a. creepy crawlers
b. aunts
c. bugs
d. s!iders
!. "t present there are still textBbased browsers lie .
a. <yn8
b. spynx
c. sync
d. none of the above
$. The following are search engines, except .
a. -in 0ista
b. .'N
c. 1oogle
d. =xcite
*. 7hat does ,>& stand for;
a. ,niform >esource &ocation
b. ,nited >esource &ocal
c. ,nited >esource &ocator
d. 'nifor+ Reso)r"e <o"ator

Anda mungkin juga menyukai