Friday 22 May 2015

Kisi-Kisi UAS Bahasa Inggris II



KISI-KISI UAS B.INGGRIS II
VERSI 1


1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters                            c. modulator
b. socket                                d. jack

2. The network allows computers to … with each other.
a. commune                            c. collaborate
b. coordinate                           d. communicate

3. NIC can be identified easily. It has a special port called ….
a. AJ-45                                   c. RJ-45
b. RJ-54                                   d. AJ-54

4. Another term for NIC is ….
a. repeaters                            c. adapter
b. network adapter                 d. modem

5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair

6. Steganography is the art and science of writing … messages.
a. readable                  c. computer
b. hidden                     d. picture

7. Another secret coding technique besides steganography is ….
a. cryptonite                c. cryptic
b. cryptography           d. steganalyst

8. Steganography comes from … language.
a. Greek                                  c. Greece
b. Latin                                                d. French

9. Writing a hidden message can use an … ink.
a. invincible                             c. invisible
b. inevitable                            d. indispensable

10. This document can be used as a media in steganography, except ….
a. text file                                c. picture file
b. mp3 or video file                d. none of the above

11. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma                                  c. Encarta
b. Enigma                                d. all false

12. A cryptographer is … who is master in cryptography.
a. Something                           c. someone
b. anything                              d. anyone

13. “Graphy” is a Greek word means….
a. spoken                                 c. uttered
b. written                                d. hidden

14. Cryptography is needed to … a secret
document.
a. secure                                 c. save
b. keep                                                d. run

15. A secret text resulting from encryption process is called ….
a. plain text                             c. code text
b. cyber text                            d. cipher text

16. This component application allows people connected over the Internet to
participate in discussions.
a. Telnet                                  c. IRC
b. FTP                                      d. EDI

17. This website is owned by a nonprofit institution.
a. www.cars.com                    c. www.carmagazine.co.uk
b. www.car.org                       d. www.carzone.ie

18. This website is a government agency.
a. ocw.mit.edu
b. www.language-learning.net
c. training.fema.gov

19. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal                                                c. break
b. hack                                     d. deal

20. Recreational newsgroups start with .
a. alt                                        c. soc
b. rec                                       d. sci

21. The conventional mail is called ….
a. email                                   c. snail mail
b. snake mail                           d. blackmail

22. An email message made up of ….
a. server                                  c. message body
b. header                                 d. signature

23. Commercial offers sent to our email without our request is called ….
a. phishing                               c. worm
b. spam                                   d. bomb

24. In message header, “To” is for the ….
a. recipient’s address              c. topic
b. sender’s address                 d. time

25. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb                         c. spam
b. phishing                               d. email worm

26. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex                               c. wantex
b. wandex                                d. windex

27. Search engines powered by robots are called ….
a. creepy crawlers                  c. bugs
b. aunts                                   d. spiders

28. At present there are still text-based browsers like ….
a. Lynx                                     c. sync
b. spynx                                   d. none of the above

29. The following are search engines, except ….
a. Win Vista                             c. Google
b. MSN                                                d. Excite

30. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator

No comments:

Post a Comment