Sei sulla pagina 1di 19

BAHASA INGGRIS II

1. Nowadays computer is used for the following purposes, except ….


a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is ….
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable
c. with cable
d. lack of wire

Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are
examples of ….
a. system software
b. application software
c. office application
d. OS

Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above

3. A programmer must compile the source code by using ….


a. compiler
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA
c. BASIC
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista
2. All of them can be identified by their ….
a. replication
b. identification
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair

Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above

Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text

Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate
in discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci

Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm

Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and
was called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator

1. A : Where is your house


B : My house is.......post office and bank

Jawaban anda:between

2. Jean : Hello Bryan, did you like to eat fried chicken?


Bryan: Hmmm, yes, I …. to eat fried chicken so much.

Jawaban anda:like

3. There’s a big dinner, and after the food is served, the guests give speeches or …..

Jawaban anda:walking together

4. There are too .......students in the clasroom


Jawaban anda:Many

5. A: The phone is ….., pick it up please!!


B: Ok, I will pick the phone up.

Jawaban anda:ringing

6. A: Would you mind to help me?


B: Ok, ………………………..

Jawaban anda:What can I do for you?

7. Walkman : earphone
Computer : ……

Jawaban anda:monitor

8. The children have …. the lost puppy.

Jawaban anda:found

9. I want to eat an apple. … red one, please.

Jawaban anda:the

10. Josh : What does your mother … James?


James: My mother is a housewife.

Jawaban anda:job

11. The food that comes from Italia is ….

Jawaban anda:Spaghetti

12. A: What is your favorite food?


B: I like steak for food but I don’t like milk for …

Jawaban anda:drink

13. Waiter : …. you decided on an appetizer yet?


Kathy : Yes, I have had a small order of the snails, please.

Jawaban anda:did

14. book = read


radio = ….

Jawaban anda:listened

15. Bus = Stop


Subway = …..

Jawaban anda:station

16. You can use a cell phone to.…

Jawaban anda:make travel reservations

17. Jane : How was your holiday, James?


James: It was great! I … to France with my family.

Jawaban anda:went

18. A: Does he play volley ball?


B: No, he …. but he plays badminton

Jawaban anda:doesn’t

19. A: Would you mind …. me some money?


B: No, I don’t mind.

Jawaban anda:renting

20. Mother: Lila, clean the floor up, please!


Lila : Alright mom, I will do … now.

Jawaban anda:it

21. A: Was each of the place good?


B: Of course, There … a restaurant that has very good food.

Jawaban anda:is

22. My little sisters …. playing volley ball in the yard right now

Jawaban anda:are

23. A: Where did you go on last holiday?


B: I went to Taz Mahal in …. on last holiday

Jawaban anda:India

24. A: What did you do last Saturday?


B: I went to Borobudur Temple …. Magelang

Jawaban anda:at

25. February is the month when …

Jawaban anda:people express their love to someone.

26. A: Is there a good hotel nearby?


B: Yes, You …. walk from here. The Hotel is next to grocery store.

Jawaban anda:can

27. A: What did you do last Saturday?


B: I just …. at home and watched TV.

Jawaban anda:stayed

28. Mary : Jane, pick up my clothes, please!!


Jane : Ok, I will pick ….. up.

Jawaban anda:them
29. I … have much money. So, I can’t buy many things on the grocery store.

Jawaban anda:don’t

30. Street = Lane


Train =

Jawaban anda:station

BAHASA INGGRIS II
1. Nowadays computer is used for the following purposes, except ….
a. multimedia
b. scientific processing
c. data processing
d. none of the above
2. The most commonly used input device is ….
a. keyboard
b. webcam
c. joystick
d. mouse
3. A house size computer is … computer.
a. the second generation
b. the first generation
c. the new generation
d. the third generation
4. This is a picture of ….
a. transistor
b. VLSI
c. vacuum tube
d. IC
5. Information can be stores in a storing device such as ….
a. CD-ROM (optical disk)
b. track ball
c. monitor
d. printer
Meeting 2
1. CPU stands for ….
a. Central Processed Unit
b. Central Processing Unit
c. Center Processing Unit
d. Central Processor Unit
2. In Apple computer, motherboard is called ….
a. planar board
b. baseboard
c. logic board
d. system board
3. Companies that produce processor are Intel, IBM, and ….
a. AMD
b. NIC
c. ADM
d. MAD
4. The Speed of a modem is measured by ….
a. MHz
b. kbps
c. GHz
d. All false
5. “This method is called wireless.” It means ….
a. with wire
b. without cable
c. with cable
d. lack of wire

Meeting 3
1. The two major software are ….
a. application and system software
b. application and instructional software
c. system software and command
d. application software and processor
2. The term software was first used by … in 1958.
a. John W. Turkey
b. John W. Tukey
c. John M. Tukey
d. Jack W. Tukey
3. An open source software means it is ….
a. freely modified
b. freely used
c. prominent
d. freely redistributed
4. These are types of operating system available to users, except ….
a. Windows
b. GUIs
c. Mac OS
d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
a. system software
b. application software
c. office application
d. OS

Meeting 4
1. In programming process, the first step is ….
a. compilation
b. debugging
c. writing a code
d. binary file
2. The physical devices in a computer are ….
a. tools
b. hardware
c. software
d. none of the above

3. A programmer must compile the source code by using ….


a. compiler
b. transformer
c. collector
d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
a. debugging
b. compiler
c. bugging
d. decoding
5. The following is a programming language from Sun Microsystems.
a. Pascal
b. JAVA
c. BASIC
d. Borland
Meeting 5
1. One of these is not a malware.
a. worm
b. Logic bomb
c. Trojan Horse
d. Win Vista
2. All of them can be identified by their ….
a. replication
b. identification
c. multiplication
d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
a. one
b. three
c. two
d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
a. virus generator
b. virus instructor
c. virus copier
d. virus emulator
5. … actually spreads through a network or the Internet using email.
a. worm
b. Time Bomb
c. Trojan Horse
d. Virus
Meeting 6
1. Which is an example of a pointing device?
a. joystick
b. scanner
c. trackball
d. webcam
2. AZERTY keyboard layout is used in ….
a. France
b. both a and b
c. Belgium
d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
a. internal
b. visual
c. external
d. internal & external
4. The trackball was invented by ….
a. Tom Cruise
b. Tom Dooley
c. Tom Cranston
d. Tom Longstaff
5. Visual Display Unit is another term for ….
a. printer
b. monitor
c. scanner
d. television
Meeting 9
1. A NIC, …, and a hub are needed to create a basic network.
a. repeaters
b. socket
c. modulator
d. jack
2. The network allows computers to … with each other.
a. commune
b. coordinate
c. collaborate
d. communicate
3. NIC can be identified easily. It has a special port called ….
a. AJ-45
b. RJ-54
c. RJ-45
d. AJ-54
4. Another term for NIC is ….
a. repeaters
b. network adapter
c. adapter
d. modem
5. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair

Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
a. readable
b. hidden
c. computer
d. picture
2. Another secret coding technique besides steganography is ….
a. cryptonite
b. cryptography
c. cryptic
d. steganalyst
3. Steganography comes from … language.
a. Greek
b. Latin
c. Greece
d. French
4. Writing a hidden message can use an … ink.
a. invincible
b. inevitable
c. invisible
d. indispensable
5. This document can be used as a media in steganography, except ….
a. text file
b. mp3 or video file
c. picture file
d. none of the above

Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
a. Sigma
b. Enigma
c. Encarta
d. all false
2. A cryptographer is … who is master in cryptography.
a. Something
b. anything
c. someone
d. anyone
3. “Graphy” is a Greek word means….
a. spoken
b. written
c. uttered
d. hidden
4. Cryptography is needed to … a secret document.
a. secure
b. keep
c. save
d. run
5. A secret text resulting from encryption process is called ….
a. plain text
b. cyber text
c. code text
d. cipher text

Meeting 12
Choose a, b, c, or d for the correct answer.
1. This component application allows people connected over the Internet to participate in
discussions.
a. Telnet
b. FTP
c. IRC
d. EDI
2. This website is owned by a nonprofit institution.
a. http://www.cars.com
b. http://www.car.org
c. http://www.carmagazine.co.uk
d. http://www.carzone.ie
3. This website is a government agency.
a. ocw.mit.edu
b. http://www.language-learning.net
c. training.fema.gov
d. http://www.carecourses.com
4. The Netiquette number 4 states that “You shall not use a computer to ….”
a. steal
b. hack
c. break
d. deal
5. Recreational newsgroups start with ….
a. alt
b. rec
c. soc
d. sci

Meeting 13
Choose a, b, c, or d for the correct answer.
1. The conventional mail is called ….
a. email
b. snake mail
c. snail mail
d. blackmail
2. An email message made up of ….
a. server
b. header
c. message body
d. signature
3. Commercial offers sent to our email without our request is called ….
a. phishing
b. spam
c. worm
d. bomb
4. In message header, “To” is for the ….
a. recipient’s address
b. sender’s address
c. topic
d. time
5. It uses e-mail to duplicate themselves into vulnerable computers.
a. email bomb
b. phishing
c. spam
d. email worm

Meeting 14
Choose a, b, c, or d for the correct answer.
1. The first actual Web search engine was developed by Matthew Gray in 1993 and was
called ….
a. spandex
b. wandex
c. wantex
d. windex
2. Search engines powered by robots are called ….
a. creepy crawlers
b. aunts
c. bugs
d. spiders
3. At present there are still text-based browsers like ….
a. Lynx
b. spynx
c. sync
d. none of the above
4. The following are search engines, except ….
a. Win Vista
b. MSN
c. Google
d. Excite
5. What does URL stand for?
a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator

Potrebbero piacerti anche