Kisi-kisi Soal English 2
12:43 AM
By
Unknown
Semester 2
Meeting 1
Choose a, b, c, or d for the correct answer.
1. Nowadays computer is used for the following purposes, except ….
a. multimedia
b. scientific processing
c. data processing
d. none of the above *
2. The most commonly used input device is ….
a. keyboard*
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation*
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor*
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk) *
b. track ball
c. monitor
d. printer
Meeting 2
Choose a, b, c, or d for the correct answer.
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit*
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board *
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD *
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps *
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable *
c. with cable
d. lack of wire
Meeting 3
Choose a, b, c, or d for the correct answer.
1. The two major software are ….
a. application and system software *
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey *
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent *
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs *
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software *
c. office application
d. OS
Meeting 4
Choose a, b, c, or d for the correct answer
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code *
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware *
c. software
d. none of the above
3. A programmer must compile the source code by using ….
a. compiler *
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging *
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA *
c. BASIC
d. Borland
Meeting 5
Choose a, b, c, or d for the correct answer.
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista*
2. All of them can be identified by their ….
a. replication
b. identification *
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three *
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator *
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm *
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
Choose a, b, c, or d for the correct answer.
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball *
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b *
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal *
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston *
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor *
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters*
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate*
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45 *
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter *
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency*
d. Advanced Research Projects Affair
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden *
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography *
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek *
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible *
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above*
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma *
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone *
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written *
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure *
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text*
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in discussions.
a. Telnet
b. FTP
c. IRC *
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org *
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov *
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal *
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec *
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail *
d. blackmail
2. An email message made up of ….
a. server *
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam *
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address *
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm*
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex
b. wandex *
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders*
3. At present there are still text-based browsers like ….
a. Lynx *
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista *
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator*
Choose a, b, c, or d for the correct answer.
1. Nowadays computer is used for the following purposes, except ….
a. multimedia
b. scientific processing
c. data processing
d. none of the above *
2. The most commonly used input device is ….
a. keyboard*
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation*
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor*
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk) *
b. track ball
c. monitor
d. printer
Meeting 2
Choose a, b, c, or d for the correct answer.
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit*
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board *
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD *
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps *
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable *
c. with cable
d. lack of wire
Meeting 3
Choose a, b, c, or d for the correct answer.
1. The two major software are ….
a. application and system software *
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey *
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent *
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs *
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software *
c. office application
d. OS
Meeting 4
Choose a, b, c, or d for the correct answer
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code *
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware *
c. software
d. none of the above
3. A programmer must compile the source code by using ….
a. compiler *
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging *
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA *
c. BASIC
d. Borland
Meeting 5
Choose a, b, c, or d for the correct answer.
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista*
2. All of them can be identified by their ….
a. replication
b. identification *
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three *
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator *
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm *
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
Choose a, b, c, or d for the correct answer.
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball *
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b *
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal *
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston *
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor *
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters*
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate*
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45 *
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter *
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency*
d. Advanced Research Projects Affair
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden *
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography *
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek *
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible *
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above*
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma *
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone *
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written *
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure *
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text*
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in discussions.
a. Telnet
b. FTP
c. IRC *
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org *
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov *
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal *
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec *
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail *
d. blackmail
2. An email message made up of ….
a. server *
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam *
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address *
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm*
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
a. spandex
b. wandex *
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders*
3. At present there are still text-based browsers like ….
a. Lynx *
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista *
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator*