Bab II Computer Network

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Leksono
L
Leksono
Community Contributor
Quizzes Created: 2 | Total Attempts: 275
Questions: 25 | Attempts: 76

SettingsSettingsSettings
Bab II Computer Network - Quiz

After studying Section two about Computer Network, Do the Quiz below. Choose the correct answer A, B, C or D! 25 minutes for 20 item test! 5 minutes for 5 True or false test!


Questions and Answers
  • 1. 

    Jaringan yang dapat mencakup sebuah negara disebut ... .

    • A.

      LAN

    • B.

      MAN

    • C.

      WAN

    • D.

      Internet

    Correct Answer
    C. WAN
    Explanation
    A WAN (Wide Area Network) is a network that covers a large geographical area, such as a country. It connects multiple smaller networks, such as LANs (Local Area Networks) and MANs (Metropolitan Area Networks), allowing for communication and data exchange over long distances. Therefore, a WAN is the correct answer as it refers to a network that can cover an entire country.

    Rate this question:

  • 2. 

    Berikut ini merupakan manfaat jaringan komputer, kecuali ... .

    • A.

      Dapat berbagi sumber daya

    • B.

      Dapat menggunakan data bersama-sama

    • C.

      Mempunyai keandalan yang lebih tinggi

    • D.

      Kita dapat mengakses data orang lain tanpa diketahui

    Correct Answer
    D. Kita dapat mengakses data orang lain tanpa diketahui
    Explanation
    The given answer states that the benefit of computer networks is that we can access other people's data without being detected. However, this is not a valid benefit of computer networks. In fact, accessing someone else's data without permission is illegal and unethical. The correct benefits of computer networks mentioned in the other options are: sharing resources, using data collaboratively, and having higher reliability.

    Rate this question:

  • 3. 

    Kabel yang mempunyai kemampuan untuk mengirim data paling cepat adalah ... .

    • A.

      UTP

    • B.

      STP

    • C.

      Coaxial

    • D.

      Fiber optik

    Correct Answer
    D. Fiber optik
    Explanation
    Fiber optik adalah kabel yang menggunakan serat optik untuk mengirim data. Serat optik ini mampu mentransmisikan data dengan kecepatan yang sangat tinggi, bahkan lebih cepat daripada kabel-kabel lainnya seperti UTP, STP, dan Coaxial. Oleh karena itu, fiber optik dianggap sebagai kabel yang memiliki kemampuan untuk mengirim data paling cepat.

    Rate this question:

  • 4. 

    Perangkat berikut yang berfungsi untuk menghubungkan dua LAN adalah ... .

    • A.

      Router

    • B.

      Bridge

    • C.

      Hub

    • D.

      Kabel UTP

    Correct Answer
    B. Bridge
    Explanation
    A bridge is a device that connects two LANs (Local Area Networks) together, allowing them to communicate with each other. Unlike a hub, which simply broadcasts data to all connected devices, a bridge intelligently filters and forwards data only to the intended destination. This helps to improve network performance and reduce unnecessary network traffic. A router, on the other hand, connects multiple networks together, including LANs and WANs (Wide Area Networks), and is responsible for directing data packets between them. A cable UTP (Unshielded Twisted Pair) is a type of network cable used to connect devices within a LAN, but it does not directly connect two LANs together.

    Rate this question:

  • 5. 

    Iaringan yang menggunakan Internet Protocol namun hanya dapat diakses oleh kalangan terbatas adalah ... .

    • A.

      VPN

    • B.

      LAN

    • C.

      Internet

    • D.

      Intranet

    Correct Answer
    D. Intranet
    Explanation
    An intranet is a private network that uses Internet Protocol (IP) technology but is only accessible to a limited group of people, such as employees within an organization. It is designed to provide internal communication and collaboration tools, as well as access to company resources and information. Unlike the internet, which is a public network accessible to anyone, an intranet is restricted and requires authentication to access its services. Therefore, an intranet is the correct answer as it fits the description of a network that uses IP but is accessible only to a limited group of users.

    Rate this question:

  • 6. 

    Perangkat yang berfungsi untuk melindungi jaringan dari serangan luar adalah ... . 

    • A.

      Bridge

    • B.

      Firewall

    • C.

      Hub

    • D.

      Router

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a device that is designed to protect a network from external attacks. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic. It examines the data packets and filters them based on predetermined security rules. By doing so, it prevents unauthorized access and blocks malicious traffic from entering the network. A firewall is an essential component of network security, ensuring the confidentiality, integrity, and availability of the network resources.

    Rate this question:

  • 7. 

    Protokol jaringan yang berfungsi untuk mengirimkan dan menerima data ke dan dari media fisik jaringan adalah ... .

    • A.

      Application layer

    • B.

      Transport layer

    • C.

      Internet layer

    • D.

      Network interface layer

    Correct Answer
    D. Network interface layer
    Explanation
    The correct answer is Network interface layer. The network interface layer is responsible for sending and receiving data to and from the physical network media. It provides the interface between the network protocol stack and the physical network. This layer handles tasks such as framing the data into packets, addressing, error detection and correction, and media access control.

    Rate this question:

  • 8. 

    Data yang dikirmkan oleh sebuah situs dalam bentuk teks dan diterima oleh browser disebut ... .

    • A.

      Cookies

    • B.

      Chiper teks

    • C.

      Plain

    • D.

      Adware

    Correct Answer
    A. Cookies
    Explanation
    When a website sends data in the form of text to a browser, it is referred to as "cookies". Cookies are small files that are stored on the user's computer and contain information about the user's browsing activity on that particular website. They are commonly used for tracking, personalization, and authentication purposes.

    Rate this question:

  • 9. 

    Teknik penipuan yang dilakukan dengan memalsukan IP Address disebut ... .

    • A.

      Email spoofing

    • B.

      Pharming

    • C.

      Spoofing

    • D.

      Browser hijackers

    Correct Answer
    C. Spoofing
    Explanation
    Spoofing is the correct answer because it refers to the technique of deceiving or tricking someone by falsifying information, such as IP addresses, in order to gain unauthorized access or manipulate data. In this case, the question specifically mentions the act of falsifying IP addresses, which aligns with the concept of spoofing. Email spoofing, pharming, and browser hijackers are related but not specifically focused on the manipulation of IP addresses.

    Rate this question:

  • 10. 

    Program yang berfungsi untuk memata-matai aktivitas korban disebut ... .

    • A.

      Cookies

    • B.

      Spoofing

    • C.

      Pharming

    • D.

      Spyware

    Correct Answer
    D. Spyware
    Explanation
    Spyware adalah program yang berfungsi untuk memata-matai aktivitas korban. Program ini secara diam-diam mengumpulkan informasi pribadi pengguna seperti riwayat browsing, kata sandi, dan data sensitif lainnya. Spyware dapat menginstal dirinya sendiri tanpa sepengetahuan pengguna dan dapat menjadi ancaman serius terhadap privasi dan keamanan online seseorang.

    Rate this question:

  • 11. 

    Data hasil enkripsi disebut ... .

    • A.

      Plain teks

    • B.

      Sandi Teks

    • C.

      Cipher teks

    • D.

      Enkrip Teks

    Correct Answer
    C. Cipher teks
    Explanation
    The correct answer is "Cipher teks" because when data is encrypted, it is transformed into a form that is not easily understood or readable. This transformed data is called cipher text.

    Rate this question:

  • 12. 

    Tindakan melakukan intercepsi secara real-time yang tidak diotorisasi terhadap komunikasi pribadi disebut ... .

    • A.

      Eavesdropping

    • B.

      Spoofing

    • C.

      Pharming

    • D.

      Spyware

    Correct Answer
    A. Eavesdropping
    Explanation
    Eavesdropping refers to the unauthorized act of intercepting and listening to private communications in real-time. It involves secretly accessing and monitoring conversations or messages without the knowledge or consent of the parties involved. This can be done through various means such as wiretapping, hacking into communication channels, or using specialized equipment to capture and decode signals. Eavesdropping is considered a violation of privacy and can be illegal in many jurisdictions.

    Rate this question:

  • 13. 

    Pada topologi jaringan komputer semua sentral dihubungkan secara langsung pada medium transmisi, jaringan ini disebut ... .

    • A.

      Ring

    • B.

      Bus

    • C.

      Star

    • D.

      Client Server

    Correct Answer
    B. Bus
    Explanation
    In a bus network topology, all the nodes are connected directly to a common transmission medium, such as a single cable. Each node can communicate with all other nodes by broadcasting the message onto the medium. This type of network is called a bus network.

    Rate this question:

  • 14. 

    Model LAN yang pemasangannya secara melingkar dinamakan model pemasangan ... .

    • A.

      Star

    • B.

      Wide

    • C.

      Ring

    • D.

      Network

    Correct Answer
    C. Ring
    Explanation
    The correct answer is "Ring". In a ring network, the installation is done in a circular manner, where each device is connected to two other devices forming a closed loop. This type of network allows data to flow in only one direction, ensuring efficient and reliable communication between devices.

    Rate this question:

  • 15. 

    Gambar disamping adalah ... .

    • A.

      Star

    • B.

      Repeater

    • C.

      Router

    • D.

      Modem

    Correct Answer
    C. Router
    Explanation
    The correct answer is "Router". The explanation for this is that the picture shown is most likely depicting a router. A router is a networking device that forwards data packets between computer networks. It acts as a central hub for connecting multiple devices to a network and allows them to communicate with each other. The picture may show multiple ports or antennas, which are common features of a router.

    Rate this question:

  • 16. 

    Pihak yang meminta layanan pada jaringan komputer disebut dengan ... .

    • A.

      Linear

    • B.

      Server

    • C.

      Tree

    • D.

      Client

    Correct Answer
    D. Client
    Explanation
    The correct answer is "client". In computer networking, the term "client" refers to a device or software application that requests services or resources from a server. In this context, the "client" is the entity that initiates communication with the server and makes requests for data or services.

    Rate this question:

  • 17. 

    Gambar disamping merupakan topologi jaringan model ... .

    • A.

      Star

    • B.

      Ring

    • C.

      Peer to peer

    • D.

      Bus

    Correct Answer
    D. Bus
    Explanation
    The given correct answer is "Bus". The explanation for this is that the image shown represents a network topology where all devices are connected to a single cable called the "bus". In this topology, data is transmitted in both directions along the bus, and all devices on the network receive the transmitted data.

    Rate this question:

  • 18. 

    Berikut ini yang merupakan contoh jaringan LAN, kecuali jaringan komputer ... .

    • A.

      Dalam laboratorium

    • B.

      Dalam satu perusahaan

    • C.

      Antar cabang suatu bank

    • D.

      Dalam satu lembaga/kantor

    Correct Answer
    C. Antar cabang suatu bank
    Explanation
    The correct answer is "antar cabang suatu bank". This is because a LAN (Local Area Network) refers to a network that is confined to a small geographical area, such as a single building or campus. While all the other options mentioned (dalam laboratorium, dalam satu perusahaan, dalam satu lembaga/kantor) can be examples of LANs, connecting branches of a bank is an example of a WAN (Wide Area Network) rather than a LAN.

    Rate this question:

  • 19. 

    Perbedaan sistem jaringan LAN dan WAN adalah ... .

    • A.

      Letak pemasangan komputer

    • B.

      Area pemasangan komputer

    • C.

      Sistem jaringan komputer

    • D.

      Koneksi ke Internet

    Correct Answer
    D. Koneksi ke Internet
    Explanation
    The correct answer is "Koneksi ke Internet". The difference between LAN (Local Area Network) and WAN (Wide Area Network) lies in their connection to the Internet. LAN refers to a network that is confined to a small geographical area, such as a home, office, or building, and does not necessarily require an Internet connection. On the other hand, WAN refers to a network that covers a larger geographical area, such as multiple buildings, cities, or even countries, and requires an Internet connection to connect different LANs or other networks together.

    Rate this question:

  • 20. 

    Konektor yang dihunakan pada kabel UTP adalah ... .

    • A.

      Switch

    • B.

      BNC Konektor

    • C.

      RJ 45

    • D.

      Hub

    Correct Answer
    C. RJ 45
    Explanation
    The correct answer is RJ 45. RJ 45 is the connector used for UTP (Unshielded Twisted Pair) cables, which are commonly used for Ethernet networks. RJ 45 connectors have eight pins and are designed to connect to the RJ 45 ports on devices such as computers, routers, and switches. These connectors provide a secure and reliable connection for transmitting data over the network.

    Rate this question:

  • 21. 

    Jaringan komputer dibangun agar sharing data, informasi dan sumber daya dapat dilakukan dengan mudah.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because computer networks are designed to facilitate the sharing of data, information, and resources among connected devices. By connecting computers and devices together, users can easily share files, access shared resources such as printers or storage devices, and communicate with each other through various network services. This enables efficient collaboration, improves productivity, and enhances the overall functionality of the connected devices.

    Rate this question:

  • 22. 

    Komunikasi data antara dua komputer terjadi dengan menggunakan protokol TCP/IP.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement states that data communication between two computers occurs using the TCP/IP protocol. This is true as TCP/IP is a set of protocols that enables communication between devices on the internet or a local network. It provides reliable and secure transmission of data by breaking it into packets and ensuring their delivery. TCP/IP is widely used for internet communication, making the given statement correct.

    Rate this question:

  • 23. 

    Beberapa teknologi pengaman data antara lain firewall, kriptografi, dan secure socket layer (SSL)

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true. The given technologies, such as firewall, cryptography, and secure socket layer (SSL), are indeed used for data security. Firewalls are used to monitor and control incoming and outgoing network traffic, while cryptography is used to encrypt and decrypt data to protect it from unauthorized access. SSL is a protocol that provides secure communication over the internet, ensuring that data transmitted between a web server and a browser remains encrypted and secure. These technologies play a crucial role in safeguarding data from potential threats and breaches.

    Rate this question:

  • 24. 

    LAN sebuah jaringan yang mampu mencakup suatu negara tertentu.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because a LAN (Local Area Network) is a network that covers a small geographical area, such as a single building or a campus. It is not capable of covering an entire country.

    Rate this question:

  • 25. 

    Perangkat yang umum terdapat dalam sebuah jaringan komputer adalah komputer server, komputer klien, kartu jaringan,hub, kabel dan konektor, repeater, bridge, router dan firewall

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. The common devices found in a computer network include server computers, client computers, network cards, hubs, cables and connectors, repeaters, bridges, routers, and firewalls. These devices are essential for establishing and maintaining a network infrastructure, allowing communication and data transfer between different devices and users within the network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 05, 2011
    Quiz Created by
    Leksono
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.