BAHASA INGGRIS II 1. Nowadays computer is used for the following purposes, except.a.
Sedangkan tujuan dalam penulisan laporan KKP ini adalah untuk memenuhi mata Kuliah Kerja Praktek (KKP) pada Semester Lima, Program Studi Manajemen Informatika, Akademik Manajemen Informatika dan Komputer, Bina Sarana Informatika.
Scientific processingc. Data processingd. None of the above2. The most commonly used input device is.a. A house size computer is computer.a. The second generationb.
The first generationc. The new generationd. The third generation4.
This is a picture of.a. Vacuum tubed. Information can be stores in a storing device such as.a. CD-ROM (optical disk)b. PrinterMeeting 21. CPU stands for.a.
Central Processed Unitb. Central Processing Unitc. Center Processing Unitd.
Central Processor Unit2. In Apple computer, motherboard is called.a. Planar boardb. Logic boardd. System board3.
Companies that produce processor are Intel, IBM, and.a. The Speed of a modem is measured by.a. “This method is called wireless.” It means.a. Without cablec. Lack of wireMeeting 31.
The two major software are.a. Application and system softwareb. Application and instructional softwarec.
System software and commandd. Application software and processor2.
The term software was first used by in 1958.a. An open source software means it is.a. Freely modifiedb. Freely usedc. Freely redistributed4.
These are types of operating system available to users, except.a. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of.a. System softwareb. Application softwarec. Office applicationd. OSMeeting 41. In programming process, the first step is.a.
Writing a coded. Binary file2. The physical devices in a computer are.a. None of the above3. A programmer must compile the source code by using.a. Acts of finding and fixing error code in all of the source code is called.a.
The following is a programming language from Sun Microsystems.a. BorlandMeeting 51. One of these is not a malware.a. Trojan Horsed. All of them can be identified by their.a. None of the above3.
By its way to infect other file, virus can be divided into categories.a. The simplest and easiest way in creating virus is by using a tool called.a. Virus generatorb.
Virus instructorc. Virus copierd. Virus emulator5.
Actually spreads through a network or the Internet using email.a. Trojan Horsed. VirusMeeting 61. Which is an example of a pointing device?a. AZERTY keyboard layout is used in.a. Both a and bc. Computer speakers are commonly equipped with a low-power amplifier.a.
Internal & external4. The trackball was invented by.a. Tom Cranstond. Tom Longstaff5. Visual Display Unit is another term for.a. TelevisionMeeting 91. A NIC, and a hub are needed to create a basic network.a.
The network allows computers to with each other.a. NIC can be identified easily. It has a special port called.a. Another term for NIC is.a. Network adapterc. What does ARPA stand for?a.
Advance Research Projects Agencyb. Advance Research Projects Affairc. Advanced Research Projects Agencyd.
Advanced Research Projects AffairMeeting 10Choose a, b, c, or d for the correct answer.1. Steganography is the art and science of writing messages.a. Another secret coding technique besides steganography is.a. Steganography comes from language.a. Writing a hidden message can use an ink.a.
This document can be used as a media in steganography, except.a. Mp3 or video filec. Picture filed. None of the aboveMeeting 11Choose a, b, c, or d for the correct answer.1. Nazi used a machine called to encrypt and decrypt the messages.a. A cryptographer is who is master in cryptography.a.
“Graphy” is a Greek word means.a. Cryptography is needed to a secret document.a.
A secret text resulting from encryption process is called.a. Cipher textMeeting 12Choose a, b, c, or d for the correct answer.1.
This component application allows people connected over the Internet to participate in discussions.a. This website is owned by a nonprofit institution.a.b.c.d.3. This website is a government agency.a. ocw.mit.edub.c. The Netiquette number 4 states that “You shall not use a computer to.”a. Recreational newsgroups start with.a. SciMeeting 13Choose a, b, c, or d for the correct answer.1. The conventional mail is called.a.
An email message made up of.a. Message bodyd. Commercial offers sent to our email without our request is called.a. In message header, “To” is for the.a. Recipient’s addressb.
![Bsi Bsi](/uploads/1/2/5/6/125663868/707489891.jpg)
Sender’s addressc. It uses e-mail to duplicate themselves into vulnerable computers.a. Email wormMeeting 14Choose a, b, c, or d for the correct answer.1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called.a. Search engines powered by robots are called.a. Creepy crawlersb.
At present there are still text-based browsers like.a. None of the above4. The following are search engines, except.a. What does URL stand for?a. Uniform Resource Locationb. United Resource Localc. United Resource Locatord.
Uniform Resource LocatorCopy Right in Google.com.
AS35001 MYOWN-AS MyOwn sprlAS35002 NEWCOM-ASN SC NextGen Communications SRLAS35003 RAY-AS Florian KirsteinAS35004 NETGRUP NetGroup Ltd.AS35005 BNET-COMPUTERS-AS S.C. Bnet Computers SRLAS35006 CAMERA-AS Camera dei DeputatiAS35007 MICONET-AS Miconet Sp. Z o.o.AS35009 ARKEMA ARKEMAAS35010 IPDEVEL-AS ENEA SERVICES ROMANIA S.R.L.AS35012 PICTIME-AS PICTIME SASAS35013 ALFA-BANK-SK-AS Alfa BankAS35015 PPH Premier Palace HotelAS35016 TELEALL-AS Teleall Contact Center LTDAS35017 SWIFTWAY-AS Swiftway Sp.