Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are
examples of ….
a. system software
b. application software
c. office application
d. OS
Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate
in discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and
was called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
Jawaban anda:between
Jawaban anda:like
3. There’s a big dinner, and after the food is served, the guests give speeches or …..
Jawaban anda:ringing
7. Walkman : earphone
Computer : ……
Jawaban anda:monitor
Jawaban anda:found
Jawaban anda:the
Jawaban anda:job
Jawaban anda:Spaghetti
Jawaban anda:drink
Jawaban anda:did
Jawaban anda:listened
Jawaban anda:station
Jawaban anda:went
Jawaban anda:doesn’t
Jawaban anda:renting
Jawaban anda:it
Jawaban anda:is
22. My little sisters …. playing volley ball in the yard right now
Jawaban anda:are
Jawaban anda:India
Jawaban anda:at
Jawaban anda:can
Jawaban anda:stayed
Jawaban anda:them
29. I … have much money. So, I can’t buy many things on the grocery store.
Jawaban anda:don’t
Jawaban anda:station
BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except ….
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is ….
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable
c. with cable
d. lack of wire
Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software
c. office application
d. OS
Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above
Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above
Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text
Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in
discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci
Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm
Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was
called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator