Quiz 1-b Inggris 2 - 2013
Quiz 1-b Inggris 2 - 2013
Quiz 1-b Inggris 2 - 2013
INGGRIS 2
4. The powerful computer usually used in large company can be categorized into :
a. Personal computer c. Mainframe computer
b. Sophisticated computer d. Machintos
6. Arithmetic Logic Unit carry out two class operations. They are :
a. Logic & process c. Process & storage
b. Arithmetic & logic d. Arithmetic & process
11. There is reverse process in using modem. The underline word implies :
a. The modem changes the process
b. The modem does two processes
c. Modem can connect to internet
d. Modem can do modulation process
13. The CPU determines how fast the computer will run and is measured by :
a. MB c. Bit
b. MHz d. KB
14. A system that individual PCs are connected together within in a company or
organization :
a. WAN c. MAN
b. LAN d. CAM
18. Devices that provide input or output to the computer are called :
a. Device process c. Peripheral
b. Software & hardware d. Equipment
22. The virus are small programs that ______themselves on your disks :
a. Hide c. Destroy
b. Create. D. Copy
24. Nowadays, programmer will be more comfortable and easier in creating a program.
The synonym of underline word is ;
a. Like c. capable
b. Pleasant d. excitement
28. This malicious software actually spreads through a network or the Internet using
email :
a. Virus c. worm
b. Trojan d; Time bomb
29. There are many kind of trojan horse. Below are some of them, unless :
a. Remote monitoring c. Remote administrator
b. Remote control d. Fake program
30. The special program that loads automatically when you turn on your computer is
called :
a. Application system c. Programming language
b. Software d. Operating system
31. Computer speakers are commonly equipped with a low-power _____ amplifier.
a. internal c. external
b. visual d. internal & external
32. The application software can be used in any aspects below, except :
a. Data management c. Documentation
b. Information worker software d. Stealing program
33. Software that to carry out criminal intension is called :
a. Virus c. Worm
b. Malicious software d. Malicious system
35. A software that can replicate by injecting or infecting its own code into other file is :
a. Worm c. Trojan horse
b. Virus d. I love you
37. Infecting files by adding the code in beginning of the file is called :
a. Overwriting c. Prepending
b. Appending d. Worm