Latihan Soal Bahasa Inggris BSI - Semester 2


Meeting 1
Choose a, b, c, or d for the correct answer.
  1. Nowadays computer is used for the following purposes, except ….
                a. multimedia   
                b. scientific processing
                c. data processing           
                d. none of the above
2. The most commonly used input device is ….
                a. keyboard                                        c. joystick
                b. webcam                                          d. mouse
3. A house size computer is … computer.
                a. the second generation
                b. the first generation
                c. the new generation
                d. the third generation

4. This is a picture of …. 
                a. transistor                        c. vacuum tube
                b. VLSI                                  d. IC
5. Information can be stores in a storing device such as ….
                a. CD-ROM (optical disk)              c. monitor
                b. track ball                                                         d. printer





Meeting 2
Choose a, b, c, or d for the correct answer.
  1. CPU stands for ….
                a. Central Processed Unit
                b. Central Processing Unit
                c. Center Processing Unit
                d. Central Processor Unit
2. In Apple computer, motherboard  is
                called ....
                a. planar board                  c. logic board
                b. baseboard                                     d. system board
3. Companies that produce processor are Intel, IBM, and ….
                a. AMD                                                c. ADM
                b. NIC                                                    d. MAD
4. The Speed of a modem is measured by ….
                a.  MHz                                                 c. GHz
                b. kbps                                                 d. All false
5. “This method is called wireless.” It means ….
                a. with wire                                        c. with cable
                b. without cable                               d. lack of wire

Meeting 3
Choose a, b, c, or d for the correct answer.
1. The two major software are ….
                a. application and system software
                b. application and instructional software
                b. system software and command
                c. application software and processor
2. The term software was first used by … in 1958.
                a. John W. Turkey                            c. John M. Tukey
                b. John W. Tukey                             d. Jack W. Tukey
3. An open source software means it is ….
                a. freely modified                            c. prominent
                b. freely used                    d. freely redistributed                                                                       by anyone

4. These are types of operating system available to users, except ….
                a. Windows                                        c. Mac OS
                b. GUIs                                                 d. Linux
5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of ….
                a. system software        
                b. application software
                c. office application
                d. OS

Meeting 4
Choose a, b, c, or d for the correct answer.
  1. In programming process, the first step is ….
                a. compilation                    c. writing a code
                b. debugging                      d. binary file
2. The physical devices in a computer are ….
                a. tools                                 c. software
                b. hardware                       d. none of the above
3. A programmer must compile the source code by using ….
                a. compiler                                         c. collector
                b. transformer                  d. bugger
4. Acts of finding and fixing error code in all of the source code is called ….
                a. debugging                                      c. bugging
                b. compiler                                         d. decoding
5. The following is a programming language from Sun Microsystems.
                a. Pascal                               c. BASIC
                b. JAVA                                d. Borland

Meeting 5
Choose a, b, c, or d for the correct answer.
  1. One of these is not a malware.
                a. worm                                               c. Trojan Horse
                b. Logic bomb                    d. Win Vista
  1. All of them can be identified by their ….
                a. replication                      c. multiplication
                b. identification                               d. none of the above
3. By its way to infect other file, virus can be divided into … categories.
                a. one                                                   c. two
                b. three                                                                d. four
4. The simplest and easiest way in creating virus is by using a tool called ….
                a. virus generator                            c. virus copier
                b. virus instructor                             d. virus emulator
5. … actually spreads through a network or the Internet using email.
                a. worm                                                               c. Trojan Horse
                b. Time Bomb                    d. Virus


Meeting 6
Choose a, b, c, or d for the correct answer.
  1. Which is an example of a pointing device?
                a. joystick                                            c. trackball
                b. scanner                                           d. webcam
2. AZERTY keyboard layout is used in ….
                a. France                                              c. Belgium
                b. both a and b                  d. All Europe
3. Computer speakers are commonly equipped with a low-power … amplifier.
                a. internal                                           c. external
                b. visual                                                d. internal & external
4. The trackball was invented by ….
                a. Tom Cruise                     c. Tom Cranston
                b. Tom Dooley                   d. Tom Longstaff
5. Visual Display Unit is another term for ….
                a. printer                                             c. scanner
                b. monitor                                          d. television


Meeting 9
  1. A NIC, …, and a hub are needed to create a basic network.
                a. repeaters                       c. modulator
                b. socket                                              d. jack
2. The network allows computers to … with each other.
                a. commune                       c. collaborate
                b. coordinate                     d. communicate
3. NIC can be identified easily. It has a special port called ….
                a. AJ-45                                                c. RJ-45
                b. RJ-54                                                d. AJ-54
4. Another term for NIC is ….
                a. repeaters                                       c. adapter
                b. network adapter         d. modem
5. What does ARPA stand for?
                a. Advance Research Projects Agency
                b. Advance Research Projects Affair
                c. Advanced Research Projects Agency
                d. Advanced Research Projects Affair

Meeting 10
Choose a, b, c, or d for the correct answer.
1. Steganography is the art and science of writing … messages.
                a. readable                                         c. computer
                b. hidden                                            d. picture
2. Another secret coding technique besides steganography is ….
                a. cryptonite                                      c. cryptic
                b. cryptography                                d. steganalyst
3. Steganography comes from … language.
                a. Greek                                               c. Greece
                b. Latin                                                 d. French
4. Writing a hidden message can use an … ink.
                a. invincible                                        c. invisible
                b. inevitable                                       d. indispensable              
5. This document can be used as a media in steganography, except ….
                a. text file                                            c. picture file
                b. mp3 or video file         d. none of the above

Meeting 11
Choose a, b, c, or d for the correct answer.
1. Nazi used a machine called … to encrypt and decrypt the messages.
                a. Sigma                                               c. Encarta
                b. Enigma                                            d. all false
2. A cryptographer is … who is master in cryptography.
                a.  Something                    c. someone
                b.            anything                                              d. anyone

3. “Graphy” is a Greek word means….
                a. spoken                                            c. uttered
                b. written                                            d. hidden
4. Cryptography is needed to … a secret document.
                a. secure                                              c. save
                b. keep                                                 d. run
5. A secret text resulting from encryption process is called ….
                a. plain text                                        c. code text
                b. cyber text                                      d. cipher text


Meeting 12
                Choose a, b, c, or d for the correct answer.
  1. This component application allows people connected over the Internet to participate in discussions.
                a. Telnet                                              c. IRC
                b. FTP                                                    d. EDI
2. This website is owned by a nonprofit institution.
                a. www.cars.com             c. www.carmagazine.co.uk
                b. www.car.org d. www.carzone.ie
3. This website is a government agency.
                a. ocw.mit.edu
                b. www.language-learning.net
                c. training.fema.gov
                d. www.carecourses.com

4. The Netiquette number 4 states that “You shall not use a computer to ….”
                a. steal                                 c. break
                b. hack                                  d. deal
5. Recreational newsgroups start with .
                a. alt                                                      c. soc
                b. rec                                                     d. sci


Meeting 13
Choose a, b, c, or d for the correct answer.
  1. The conventional mail is called ….
                a. email                                                c. snail mail
                b. snake mail                      d. blackmail
2. An email message made up of ….
                a. server                                              c. message body
                b. header                                            d. signature
3. Commercial offers sent to our email without our request is called ….
                a. phishing                                          c. worm
                b. spam                                                                d. bomb
4. In message header, “To” is for the ….
                a. recipient’s address    c. topic
                b. sender’s address        d. time
5.            It uses e-mail to duplicate themselves into vulnerable computers.
                a. email bomb                   c. spam
                b. phishing                                          d. email worm

Meeting 14
Choose a, b, c, or d for the correct answer.
  1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called ….
                a. spandex                                          c. wantex
                b. wandex                                           d. windex
2. Search engines powered by robots are called ….
                a. creepy crawlers                           c. bugs
                b. aunts                                                d. spiders
3. At present there are still text-based browsers like ….
                a. Lynx                                                  c. sync
                b. spynx                                               d. none of the above
4. The following are search engines, except ….
                a. Win Vista                                       c. Google
                b. MSN                                                 d. Excite
5. What does URL stand for?
                a. Uniform Resource Location
                b. United Resource Local
                c. United Resource Locator
                d. Uniform Resource Locator

Membuat Query Pada MS Access 2007


Berikut contoh langkah membuat query pada MS Access 2007
  1. pertama2 buatlah database dengan nama "penjualan"
  2. selanjutnya buatlah tabel dengan struktur dibawah inidan beri nama "produk"
    Field Name        Data Type       Field Size    
    kd_barangText5
    nm_barangText30
    hargacurrency-
    jml_belinumber-
    ttl_hargacurrency-
      
  3. CREATE TABLE produk ( 
    kd_barang TEXT(5),
    nm_barang TEXT(20),
    harga CURRENCY,
    jml_beli NUMBER,
    ttl_harga CURRENCY
    );
    
  4. selanjutnya mari qta buat query untuk mengisi ttl_harga agar secara otomatis dapat terisi ketika selesai mengisi harga dan jml_beli. cara membuat query adalah dengan memilih menu Create, di bagian other terdapat pilihan untuk membuat query yaitu query wizard danquery design. perbedaan dari dua pilihan ini adalah pada langkah demi langkah yang dilakukan ketika membuat query. disini saya akan menjelaskan cara membuat query dengan pilihan kedua yaitu query design
  5. klik query design, maka akan muncul kotak dialog show table seperti gambar dibawah ini
  6. klik nama tabel yang ada didalam kotak dialog show table (behubung disini baru dibuat 1 tabel, maka yang tampil hanya satu tabel saja) kemudian klik add, maka tabel akan pindah ke area query1. kemudian klik close.
  7. pada area query1 terdapat bagian seperti tabel dibagian bawah. keterangan dari setiap barisnya adalah sebagai berikut :
    Field      : Nama Field yang ingin ditampilkan
    Table     : Nama Table dari Filed tersebut
    Sort       : Mengurutkan Data hasil query
    Show     : Mengatur Field ditampikan atau tidak
    Criteria : Syarat dari data yang ingin ditampilkan
  8. nah, field disini akan diisi dari data tabel yang tadi dipilih. langkah selanjutnya adalah memasukan semua field yang ada pada tabel produk ke dalam query.caranya dengan mendouble klik setiap field satu persatu maka secara otomatis field akan berpindah.
  9. langkah selanjutnya mari qta buat rumus untuk ttl_harga, caranya adalah klik kanan pada field ttl_harga kemudian pilih build. atau bisa juga dengan cara, letakan cursor pada ttl_harga, pilih menu design dan klik menu Builder. maka akan keluar kotak dialog Expression Builder. seperti gambar dibawah ini
  10. masukan rumus dengan cara mengetik diarea expression builder tersebut. karena sumber query tadi diambil dari tabel maka untuk memudahkan, double klik folder Tables, klik table yang dibutuhkan, lihat di area sebelahnya, carilah harga kemudian double klik harga tersebut sampai field berpindah ke bagian rumus. klik tanda kali (*) selanjutnya double klik field jml_beli, maka pada area expression builder tersebut akan terlutis : ttl_hrg: [produk]![harga] * [produk]![jml_beli] 
  11. kemudian klik ok
  12. langkah terakhir adalah mengetest apakah rumus pada query tersebut sudah berjalan dengan baik atau belum. cara pengetesannya adalah dengan mengklik Run (simbol tanda seru merah) pada menubar.
  13. coba anda input data sembarang, jika rumus sudah benar, maka ketika harga dan jml_beli sudah diinput secara otomatis ttl_harga akan terisi sesuai dengan data yang diinput tadi. jika blom muncul juga, coba cek kembali rumus yang tadi di masukan pada expression builder.
  14. save query yang telah dibuat.
Jika ingin mengambil data berdasarkan kriteria seperti case pada tabel mahasiswa diatas, caranya sangat mudah. ketik kriteria pada bagian Criteria dengan memasukan kriteria di apit oleh tanda kutip contohnya ingin menampilkan hanya jurusan SI maka cukup mengetik "SI" pada bagian Criteria tersebut. jangan lupa simpan hasil pekerjaan anda.