Vous êtes sur la page 1sur 25

1.

The origin of steganography from


Jawaban : Greek
2. The examples of Chat media, except
Jawaban : Facebook
3. A machine called Enigma to encrypt and decrypt the messages in world war II used by
Jawaban : Germany
4. What is the internet
Jawaban : A worldwide connection of millions of computers connected to thousands of
different networks
5. it converts audio signals from a microphone, audio tape, or some other sources to digital
signals, which can be stored as a
Jawaban : Computer Audio File
6. The component application allows people connected over the internet to participate in
discussions
Jawaban : IRC
7. A NIC, repeaters, and a are needed to create a basic network.
Jawaban : Hub
8. A website is a site (location) contains of of pages on the World Wide Web
Jawaban : Collection
9. The art and science of writing hidden messages in such a way that no-one apart from the
sender and intended recipient even realizes there is a hidden message :
Jawaban : Steganography
10. To infect other file, Virus can be divided
Jawaban : Over Writing
11. The function of website
Jawaban : Searching information
12. There are the examples of Email Address, except
Jawaban : tonny@googles.com
13. There are the examples of search engine, except
Jawaban : Facebook
14. What is the meaning of BCc
Jawaban : Blind Carbon Copy

15. The example of cryptography


Jawaban : Enigma
16. The are several part of Email
Jawaban : Header and message body
17. The Worm spread through the internet using
Jawaban : Email
18. Software which replicate by its own copy is
Jawaban : Worm
19. What is the Website
Jawaban : A site (location) contains a collection of pages on the World Wide Web
20. What kinds of document that could attach file to email, except
Jawaban : WWW
21. The most commons of storage device is
Jawaban : Hard Disk - Flash Disk
22. What is the function internet address domain
Jawaban : Host machine has a special internet protocol address (IP address) that uniquely
identifies that computer
23. Nazi used a machine called to encrypt and decrypt the messages
Jawaban : Enigma
24. The file that categories worm has extension
Jawaban : .TXT
25. A program that searches document fo specified keywords and returned a list of the document
where the keywords wre found is called
Jawaban : Search Engine
26. The word cryptography derived from Greel, kryptos means
Jawaban : Hidden
27. Application software is a name for any software or computer program.
Jawaban : Generic
28. Web Page is a written in HTML code that contains text and links to other pages, files, or
parts of the document
Jawaban : Document

29. Conventional mail is sometimes called


Jawaban : Snail Mail
30. The are some technique steganography, except
Jawaban : A copy to another file

Soal Latihan UAS Bahasa Inggris 2

LATIHAN UAS SEMESTER II

1.

This machine is also called an electonic symbol manipulating sistem. What is it ?


a. Computer
b. Prosesor
c. Modem
d. Planar board
e. Memory
2. Software is also a series of instructions for the computer that performs a particular
task. The word mean....
a. Certain
b. General
c. Definite
d. Detail
e. Document
3. A worm is a sofware which replicates by creating its own copy. What is the synonim
of the word.
a. Indicate
b. Duplicates
c. Copy cat
d. Complicates
e. Complex
4. Which country used network for the first time ?
a. The USA

b. The UK
c. France
d. Germany
e. Russia
5. The geometric arrangement of a computer system in a network is called.
a. Topology
b. Protocol
c. Architecture
d. Ethernet
e. Nic
6. Someone who is expert in steganography is called.....
a. Steganator
b. Steganographyst
c. Steganalyst
d. Code breaker
e. Code password
7. The word steganography is of......origin
a. Greek
b. Gaelic
c. French
d. Latin
e. Germany
8. Removing hair or beard is called
a. Shaving
b. Growing
c. Harvesting
d. Cutting
e. Saving
9. NAZI used a machine called....to encrypt and decrypt the messages
a. Sigma
b. Enigma
c. Encarta
d. All false
e. All true
10. Which are is the TLD name for germany ?
a. De
b. Gm
c. Fr
d. Uk
e. Dt

11. Military base or campuses usually use the following type of network
a. Can
b. Han
c. Wan
d. Man
e. Lan
12. Beside Nic and Hub, we need.....to create a basic computer network
a. Receiver
b. Repeater
c. Controller
d. RJ-45
e. RG-45
13. Which ones are the techniques in steganography ?
a. Using invisible ink
b. Using microdot
c. Using messengers body
d. Using program language
e. All of the choices

14. In Julius caesar cryptography code PHVVDJH mean


a. Secrets
b. Message
c. Secured
d. Hidden
e. Password
15. The term Cryptography is derived from greek....mean hidden or secret
a. Encrypt
b. Cryptic
c. Kryptos
d. Krypton
e. Kryptone
16. This website is a goverment agency
a. Ocw.mit edu
b. www.language learning.net
c. Training.fema.gov
d. www.carecourses.com
e. www.redcross.net

17. It contains information about the sender, the routing and the time of the message in a
e-mail
a. Header
b. Signature
c. Footer
d. Body
e. List
18. Search engines operate algorithmically or are a mixture of
a. Algorithmic
b. Human input
c. Machine input
d. Algorithmic and human input
e. Script program
19. If one computer is broken in a ring network topology, then :
a. The whole network is down
b. A part of the network runs
c. A part of the network is down
d. Its doesnt influence the network
e. A part of the computer
20. The first network ( ARPANET ) was designed for the following purpose
a. Education
b. Defense
c. Commercial
d. Entertainment
e. Sport

21. Why is steganography better than cryptography ?


a. Messages attract attention to themselves
b. Messages attract attention to messengers
c. Messages attract attention to recipients
d. Messages donot attract attention
e. Messages attract not the attention
22. ......In countries where encryption is illegal the word has similar meaning with
a. Writing
b. Hiding
c. Showing
d. Encoding activity
e. Covering
23. What is a steganographic message called ?

a. Cover message
b. Text cover
c. Secret code
d. Cover text
e. Password code
24. Julius caesar used cryptography to secure his message from his enemy, he replaced a
character with its
a. Previous three
b. Previous two
c. Review two
d. Next three
e. Next two
25. The reverse process of encryption is called decryption it mean
a. The opposite process
b. The parallel process
c. The similiar process
d. The in-line process
e. The parallel system
26. It allows users to upload and download files from other computer
a. Ftp
b. Irc
c. Telnet
d. Edi
e. Aoc

27. Process of attempting to acquire sensitive information such as usernames, passwords


and credit card details by masqueranding as a trustworthy entity in an electronic
communication is called
a. Spam
b. Worm
c. Makro
d. Phishing
e. Email bomb
28. Software is also a series of instruction for the computer that performs a particular
task. The word mean....
a. Certain
b. General
c. Definite

d. Detail
e. Document
29. Programing can also be called by coding which is a process of writing.....debuging
and maintain a source code of computer program.
a. Checking
b. Testing
c. Fixing
d. Encoding
e. Recording
30. What was the first network called ?
a. Arpanet
b. Arpa
c. Arpweb
d. Arpagate
e. Arpastar
31. There are......types of topology
a. Three
b. Four
c. Two
d. Five
e. Six
32. Which network topology uses a server ?
a. Star topology
b. Ring topology
c. Bus topology
d. None of them
e. Pass topology

33. A cryptographer is.....who is master in cryptography


a. Something
b. Anything
c. Someone
d. Anyone
e. No one
34. Microdots means......
a. Small dots
b. Very tiny dots

c. Medium-size dots
d. Big-size dots
e. Small prints
35. The word steganography means....in its origin language
a. cover
b. covered
c. hide
d. Discover
e. Convert
36. It ancient origins can be traced back to 440 BC is mean
a. Followed
b. Looked
c. Found
d. Seen
e. See
37. By using julius caesar cryptography code enemy becomes
a. Gpgoa
b. Fofna
c. Dmdlx
d. Hqhpb
e. Ngsdf

38. Cryptography is a part of.....and computer science


a. Matematics
b. Chemistry
c. Physics
d. Biology
e. Mathematic
39. In a network........
a. User can use the same printer
b. User cant share information
c. User must use different resources
d. User cant share resources
e. User cant make a folder

40. The geometric arrangement of a computer system in a network is called

a. Topology
b. Protocol
c. Architecture
d. Ethernet
e. Nic
41. This method obivious drawbacks it means
a. Benefit
b. Disadvantage
c. Lucky
d. Goodness
e. Anvantage
42. In computer era steganography can be done by....a secret document into other
document
a. Inserting
b. Convering
c. Saving
d. Getting
e. Sending
43. It allows for electronic transfer of data between companies over the internet
a. FTP
b. IRC
c. EDI
d. Telnet
e. AOC
44. The netique tte number 4 stater that you shall not use a computer to...
a. Steal
b. Hack
c. Break
d. Deal
e. Crack
45. It is malware which use e-mail as a way of replicating themselves into vulnerable
computers
a. Email worm
b. Trojan horse
c. Spam
d. Email bomb e. Virus
46. What is the specific address of a web page ?
a. The uniform resource locator
b. The hypertext mark-up language

c. The IP
d. The graphical user-interface
e. The program language

CONTOH SOAL UAS BAHASA INGGRIS II BSI SEMESTER 2

BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except .
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is .
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of .
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as .
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for .
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called .
a. planar board

b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and .
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by .
a. MHz
b. kbps
c. GHz
d. All false
5. This method is called wireless. It means .
a. with wire
b. without cable
c. with cable
d. lack of wire
Meeting 3
1. The two major software are .
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is .
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except .
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of
.
a. system software
b. application software
c. office application
d. OS

Meeting 4
1. In programming process, the first step is .
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are .
a. tools
b. hardware
c. software
d. none of the above
3. A programmer must compile the source code by using .
a. compiler
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called .
a. debugging
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA
c. BASIC
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista
2. All of them can be identified by their .
a. replication
b. identification
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into categories.
a. one
b. three
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called .

a. virus generator
b. virus instructor
c. virus copier
d. virus emulator
5. actually spreads through a network or the Internet using email.
a. worm
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball
d. webcam
2. AZERTY keyboard layout is used in .
a. France
b. both a and b
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power amplifier.
a. internal
b. visual
c. external
d. internal & external
4. The trackball was invented by .
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston
d. Tom Longstaff
5. Visual Display Unit is another term for .
a. printer
b. monitor
c. scanner
d. television
Meeting 9
1. A NIC, , and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. jack
2. The network allows computers to with each other.
a. commune
b. coordinate
c. collaborate
d. communicate

3. NIC can be identified easily. It has a special port called .


a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4. Another term for NIC is .
a. repeaters
b. network adapter
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is .
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except .
a. text file
b. mp3 or video file
c. picture file
d. none of the above
Meeting 11
Choose a, b, c, or d for the correct answer.

1. Nazi used a machine called to encrypt and decrypt the messages.


a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. Graphy is a Greek word means.
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called .
a. plain text
b. cyber text
c. code text
d. cipher text
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in
discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that You shall not use a computer to .
a. steal

b. hack
c. break
d. deal
5. Recreational newsgroups start with .
a. alt
b. rec
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called .
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of .
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called .
a. phishing
b. spam
c. worm
d. bomb
4. In message header, To is for the .
a. recipients address
b. senders address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was
called .
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called .

a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like .
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except .
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator

Contoh Soal UTS Bahasa Inggris 2 BSI

Vous aimerez peut-être aussi