You are on page 1of 9

Kisi kisi UAS BAHASA INGGIS II BSI

Exercises Meeting-1
1. Do you know the origin of “Computer” and what it means?
a. An electronic device that stores, retrieves, and processes data, and can be programmed
with instructions.
b. Referring to a person who carried out calculations, or computations
c. General purpose device that can be programmed to carry out a finite set of arithmetic or
logical operations.
d. The answer A,B and C True
e. All answers are false

2. Mention it the type of computer as you know ?


a. Mini Cooper
b. Mainframe
c. Compuserve
d. PC-magazine
e. Server

3. The first use of the word "computer" was recorded in :


a.1612
b.1613
c.1614
d. 1615
e. 1616

4. Origin of word “Computer” is…


a. To Compute
b. To Comp
c. To Pute
d. To Comput
e. To Com

5. They are examples of first-generation computing devices :


a. UNIVAC
b. UNIFAC
c. UNITED
d. UNIFORM
e. UNION PC

Exercises Meeting-2
1. One of the most important components within your computer…
a.CPU
b.ALU
c.RLU
d. RPU
e. TPU

2. There the component of inside a computer, except :


a. Harddisk
b. RAM
c. REM
d. VGA Card
e. Processor

3. The brain of the computer :


a. Microprocessors
b. Microchip
c. MicroRAM
d. Microdisk
e. MicroSD

4. Measurement capacity of hard drive :


a. KiloBytes
b. KiloGrams
c. MegaBytes
d. Gygabytes
e. All Answers are True

5. Examples input device :


a. Mouse and Hard Drive
b. Keyboard and Memory
c. Scanner and Mouse
d. Mouse and Printer
e. Printer and Keyboard

Exercises Meeting-3
1. A special type of program that loads automatically when you start your computer is …
a. System
b. Software
c. Operating System
d. System Program
e. Application

2. There are examples of Operating System as you know, except :


a. Windows XP
b. Windows 7
c. Windows Tec
d. UBUNTU
e. Genome

3. There are Open Source Operating System :


a. UBUNTU
b. RED HAT
c. Windows NT
d. A and B True
e. A and C True

4. The type of program that you use once the operating system has been loaded :
a. Operating System
b. System Memory
c. Word Pad
d. Enterprise System
e. Application Software

5. There is the application software for editing image :


a. Power Point
b. Photoshop
c. Acrobat Reader
d. Adobe Premier
e. Microsoft Excel

Exercises Meeting-4
1. An artificial language designed to communicate instructions to a machine, particularly a
computer is …
a. Computer Language
b. Programming Language
c. Software Language
d. Typical Language
e. Image Language

2. The example of Programming Language is …


a. Safari
b. Java
c. Microsoft Word
d. Fire Fox
e. Internet Explore

3. A system where by individual PCs are connected together within a company or


organization :
a. WAN
b. GAN
c. TAN
d. LAN
e. BAN

4. Small programs that hide themselves on your file/disks :


a. Virus
b. Worm
c. Word
d. Data
e. Anti Virus

5. Example for OOP Programming Language, except :


a. JAVA
b. C++
c. Pascal
d. Visual Basic
e. C#

Exercises Meeting 5
1. A software which is created to do something bad and to perform criminal intension :
a. Microsoft Software
b. Virus Software
c. Malicious Software
d. Linux Software
e. Pirate Software

2. A software that can replicate by injecting or infecting its own code into other file :
a. Virus
b. File
c. Worm
d. Macro
e. Cookies

3. A software which replicates by creating its own copy :


a. Virus
b. File
c. Worm
d. Macro
e. Cookies

4. Example of Worm :
a. Fall.txt
b. File.txt
c. Worm.txt
d. I Love U.txt
e. Cookies.txt

5. There are kind of malicious software but not infect files :


a. Virus
b. Trojan
c. Tracker
d. Ghost
e. Worm

Exercises Meeting 6
1. Hardware can be divided into two categories, mentioned that …
a. Inside/Outside device
b. Front/Outside device
c. Input/Output device
d. Software/Freeware
e. Shareware/Open Source

2. A set of computer consists of metal, plastic, and other physical devices which is called …
 a. Software
 b. Hardware
 c. Program
d. Process
e. Instruction

3. There are input device, except :


a. Mouse
b. Keyboard
c. Microphone
d. HardDrive
e. Scanner

4. Video capturing devices connected to computers or computer networks, often using USB
a. Website
b. Webcam
c. Webnet
d. WebVideo
e. Video Conference

5. A device that provides input by analyzing images, printed text, handwriting, or an object
is :
a. Printer
b. Webcam
c. Plotter
d. Hard Drive
e. Scanner

Exercises Meeting-9
1. The benefit of a computer network are :
a. Sharing hardware resources easily
b. Sharing information easily
c. Sharing Input easily
d. A and B True
e. A,B and C True

2.There are many types of Computer Network, except :


a. LAN
b. WAN
c. MAN
d. BAN
e. MAN

3. There are many types of Network Topology, except :


a. Bus and Ring
b. Star and Mesh
c. Ring and Star
d. Star and Bus
e. Bust and Mesht

4. A piece of computer hardware designed to allow computers to communicate over a


computer network is …
a. NIC
b. LAN Card
c. NEC
d. RAN Card
e. A and B True

5. There are the devices to create a computer network, except :


a. NIC
b. Repeater
c. Hub
d. VGA
e. Router

Exercises Meeting-10
1. The art and science of writing hidden messages in such a way that no-one apart from the
sender and intended recipient even realizes there is a hidden message :
a. Stenography
b. Stegraphy
c. Steganomy
d. Stagenoghrapy
e. All answer are false

2. A steganography message will appear to be something else, the examples…


a. A picture
b. An article
c. A message
d. A and C true
e. All Answers false

3. There are some technique steganography, except …


a. Writing a secret message using invisible ink
b. Hidden messages on messenger's body
c. A picture of a message in microdots or microfilms
d. A copy file to another file.
e. In computer era, steganography can be done by inserting a secret document into other
document

4. The origin of steganography from ….


a. Greek
b. Russia
c. England
d. America
e. Germany

5. The steganography usually use for …..


a. Covered
b. Hidden Writing
c. Copy
d. Backup
e. A and B true

Exercises Meeting-11
1. The practice and study of creating a secret information.
a. Stenography
b. Crytography
c. Steganomy
d. Stagenoghrapy
e. All answer are false

2. A cryptography is used in applications present in technologically advanced societies, the


examples…
a. Security of ATM cards
b. Computer passwords
c. Electronic commerce A message
d. A,B and C true
e. Hidden Message

3. A machine called Enigma to encrypt and decrypt the messages in world war II used by…
a. German
b. America
c. France
d. Italy
e. Russia

4. The example of cryptography …


a. Greek
b. Enigma
c. Enogmist
d. Login
e. A,B and C true

5. The a secret text resulting from encryption process is ….


a. Hidden Writing
b. Chiper text
c. Hidden text
d. A and B true
e. No Answer

Exercises Meeting 12
1. What is the internet ….
a. A worldwide connection of millions of computers connected to thousands of
different networks
b. Each computer on the Internet
c. Server
d. Browsing
e. All answer are false

2. Many kind of internet services, mentioned that …..


a. Browser
b. World Wide web
c. FTP
d. B and C True
e. Wireless Network

3. There are the examples of search engine ….


a. Google Chrome
b. Mozilla Firefox
c. Internet Explore
d. Opera
e. All answers true

4. The examples of search engine ….


a. IRC
b. Yahoo Messenger
c. Google Talk
d. A,B and C true
e. All Answers false

5. What is the function Internet address domain ….


a. The domain name service address
b. Host machine has a special Internet protocol address (IP address) that uniquely
identifies that
computer
c. the domain name service address of the IP address
d. A,B and C true
e. All answers false

Exercises Meeting-13
1. Method of creating, transmitting, or storing primarily text-based human communications
with digital
communications systems is …
a. Server
b. Email
c. Attach File
d. FTP
e. WWW

2. The are several part of Email …..


a. Header
b. World Wide web
c. Message Body
d. A and C True
e. Address

3. There are the examples of Email Address, except ….


a. tonny@googles.com
b. harry@yahoo.co.id
c. tina@yahoo.com
d. budi@bsi.ac.id
e. All answers true

4. What kinds of document that could attach file to email ….


a. Images
b. PDF file
c. DOC file
d. Music file
e. All Answers true

5. What is the meaning of BCC ….


a. Bling Carbon Copy
b. Bline Carbon Copy
c. Blink Carbon Copy
d. Blind Carbon Copy
e. All answers false
Exercise Meeting 14
1. What is the Website ….
a. A site (location) contains a collection of pages on the World Wide Web
b. A site for information on the World Wide Web
c. A site for search information
d. a tool designed to search for information on the World Wide Web.
e. All answers true

2. The function of website ….


a. Bring information resources to the user
b. Give directions to your place of business
c. Introduction for your profile
d. Searching information
e. A, B and C True

3. A program that searches documents for specified keywords …


a. Website
b. Search Engine
c. Web Page
d. Google.com
e. All answers true

4. A document written in Hypertext Mark-up Language (HTML) ….


a. Website
b. Search Engine
c. Web Page
d. Google.com
e. All answers true

5. The examples of search engine ….


a. Bing
b. Google
c. Ask
d. Yahoo
e. All answers true

You might also like