Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
1. The owner of Google is … Michael Owen Bill Gates Mark Zuckerberg Steve Jobs Larry Pages 2. A site contains a collection of pages on the WWW … Java PHP HTML Website MySQL 3. How is email works … User 1-agent transport agent-network-transport agent-system mailbox-user agent-user2 User A-user agent-transport agent-network-transport agent-system mailbox-user agent user B User A-transport agent- transport agent-system mailbox-user agent-user B User A-user agent-transport agent-transport agent-system mailbox-user agent-user B User A-transport agent-network- transport agent-system mailbox-user agent-user B4. A document written in HTML code that contains text, images and link is … WWW Web programming Web language page Web based 5. Network can be broadly classified as using either a peer-to-peer or client/server is called … Software Information Hardware Interface Architecture 6. E-mail is any methods of creating, transmitting, or storing primarily text-based human communications with … communication. Horizontal Lingual Digital Virtual Vertical 7. Ask and Bing are kinds of: Search engines Email Services Worm Browser Spam 8. The first actual Web search engine was developed by Matthew Gray in … and called wandex. 1991 1995 1997 1993 19999. Some OS require the user to operate, and what does make it easier to control the computer … MAC GUI Grape Apple WIMP 10. One of them is not kind of Trojan horse … Fake program Password stealer Key logger Virus Remote monitoring 11. A house size computer is … of computer The fourth generation The first generation The third generation The fifth generation The second generation 12. Users often pay a monthly fee to a type of company for connection internet service … RSP ESP ASP ISP ARP 13. We can send to another email address with field : Written Cc From To Subject 14. Act of finding and fixing error code in all source codes is called ... Compiling Bugging Debugging Decoding Transforming 15. Companies that produce processor are Intel, IBM and … ADM CIN NIC MAD AMD 16. There are OS product Apple … Linux UNIX Macintosh Windows Adroid 17. Search engine powered by robots are called … Spiders Aunts Bugs Elephant Creepy crawlers 18. Information can be stored in storing device such as … Monitor CD-ROM VLSI Trackball Printer 19. An example of an IP Address is … 192.16.116.12 8.8.8.8 255.255.252.0 0.0.0.0 1.2.3.4.5 20. One example of gaming device is a … Image Track ball Pointing device Text input device Joystick 21. There is the language web programming, except : Java HTML PHP Website MySQL 22. The part we accept email from another user … Spam Draft Sent Inbox Outbox 23. The term software was firstly introduced by John W. Tukey in … 1956
1958
1952
1950
1954
24. We can send file, document or image via email using …
Attach File
Download
Browse File
Send File
Upload
25. There are kinds of browser, except …
Mozilla
Internet Explore
Google
Opera
Chrome
26. Transfering files to upload and download from internet
ATP
HTTP
RSPV
FTP
STP
27. Advanced form of communication by computer, which enables meetings to take place over long distances …
Voicemail
YahooMessenger and Gtalk
WhatsApp CacaoTalk
Video Conferencing
Video chat
28. The internet has several component applications, except …
RBC
IRC
Telnet
FTP
EDI
29. The word “Kryptos” is come from … language.
Greek
Latin
French
Turkey
Germany
30. Web cam is well-known for their low manufacturing costs and applications.
The underlined word has the same meaning with …
Fantastic
Interesting
Excellent
Amazing
Famous
31. The OS is used by touch the screen is …
Android
Windows
UNIX
Linux
Macintosh
32. In programming process, the first step is …
Binary file
Compilation
Debugging
Programming
Writing a code
33. The part we accept trash email :
Inbox
Outbox
Spam
Sent
Draft
34. We can chat and video conference using …
Videochat and YahooMessenger
IRC and WhatsApp
ICQ and IRC
YahooMessenger and Skype
GoogleMotion and GTalk
35. Here is the types of computer networks, except ….
LANs
MANs
WANs
GANs
HANs
36. An open source software means, except ...
Freely built
Freely modified
Prominent
Freely used
Freely redistributed
37. The word steganography comes from … language.
Italy
Greek
French
Latin
Germany
38. User send the message from one network using communication link without cable …
Coaxial cable
Wireless
Wires cable
Net cable
Nic cable
39. User send the message from one network using communication link with normal copper telephone wires can be used over short distances but shielded cable …
Coaxial cable
Net cable
Wires cable
Nic cable
Wireless
40. Crypthography is the practice and study of creating a … information.
Open
Secret
Close
Transparent
Top
41. The conventional mail is called …
Snake mail
E-mail
Snail mail
Sail mail
Black mail
42. The example of search engines websites, except…
Godzilla
Yahoo
hao123
Google
Mozzila
43. Nowadays, computer is used for multimedia, except …
Editing film
Editing video
Inventory control
Creating film animation
Composing music
44. Common topologies include a …
Car
Bicycle
Motorcycle
Bus
Ship
45. The are example chat application, except …
CacoTalk and googleMotion
Gtalk and Line
YahooMessenger and Gtalk
IRC and YahooMessenger
WhatsApp CacaoTalk
46. Here is the types of computer networks, except ….
HANs
GANs
LANs
MANs
WANs
47. In programming process, the first step is …
Debugging
Writing a code
Compilation
Programming
Binary file
48. A hub contains of … ports.
Three
Multiple
One
Four
Two
49. The most common used input device is ...
Webcam
Keyboard
Mouse
Trackball
Joystick
50. A person who creates and writes a program is called …
Programmer
Compiler
Debugger
Creator
Writer
51. Malicious software can be divided into some categories, except …
Worm
Trojan horse
Replication
Virus
Logic bomb
52. If email address destination is wrong, we accept message …
Mailerspam
Spammer
Mailerdaemon
Mailertrash
Mailerjunk
Sedang diterjemahkan, harap tunggu..
