1.
Sebuah publikasi yang terdiri dari teks, gambar, maupun suara dan dipublikasikan dalam bentuk digital yang dapat dibaca di komputer maupun perangkat elektronik lainnya disebut...
Correct Answer
D. E-book
Explanation
An e-book is a publication that includes text, images, and audio and is published in digital form that can be read on a computer or other electronic devices. It is a digital version of a book that can be accessed and read electronically, making it convenient and portable for readers.
2.
Salah satu jenis file yang secara khusus digunakan untuk menyimpan buku digital (e-book) dan sengaja dibuat untuk bekerja pada perangkat mobile dengan kebutuhan bandwidth yang relatif kecil ketika mengunduh dan membukanya adalah....
Correct Answer
A. MOBI
Explanation
The correct answer is MOBI. MOBI is a file format specifically designed for storing and reading e-books on mobile devices. It is optimized for low bandwidth usage when downloading and opening the e-books. EPUB is another popular file format for e-books, but it is not specifically designed for mobile devices. AZW is a file format used by Amazon Kindle devices. TPZ and KF8 are not commonly used file formats for e-books.
3.
Hal yang tidak harus dipertimbangkan ketika akan menentukan jenis format file e-book adalah....
Correct Answer
A. Harus dapat dijalankan aplikasi notepad++
Explanation
The answer "Harus dapat dijalankan aplikasi notepad++" is incorrect because it contradicts the given statement that states "Hal yang tidak harus dipertimbangkan" (Things that should not be considered). The requirement for the e-book format to be able to run on Notepad++ is not a consideration that needs to be taken into account when determining the file format for an e-book.
4.
Berikut yang bukan temasuk jenis-jenis format file yang didukung oleh calibre ketika membuat sebuah buku digital (e-book) adalah....
Correct Answer
C. KF8
Explanation
Calibre supports various file formats for creating digital books or e-books, such as EPUB, TXT, and ZIP. However, KF8 is not included in the list of file formats supported by Calibre.
5.
Pada saat anda bekerja dengan aplikasi calibre, Anda dapat mencari konten di dalam e-book berdasarkan sumber berita. Menu yang dipilih untuk menampilkan informasi tersebut adalah....
Correct Answer
E. News
Explanation
The correct answer is "News" because the question states that when working with the calibre application, you can search for content within an e-book based on a news source. Therefore, the menu option that would display this information is "News".
6.
Kombinasi tombol keyboard yang digunakan untuk menambah format baru pada buku yang sedang dikerjakan dalam aplikasi calibre adalah....
Correct Answer
D. Shift + A
Explanation
The combination of Shift + A is used to add a new format to the book being worked on in the Calibre application.
7.
Kombinasi tombol keyboard yang digunakan untuk menampilkan buku dalam aplikasi calibre berdasarkan kesamaan pengarang pada e-book yang sedang dikerjakan adalah....
Correct Answer
E. Alt +A
Explanation
The correct answer, Alt + A, is used to display books in the Calibre application based on the similarity of the author in the e-book being worked on.
8.
Manfaat utama darai e-book adalah menyalin informasi seperti layaknya sebuah buku. Adapun kelebihan dari e-book kecuali....
Correct Answer
E. Diperlukan software khusus untuk membuat desain e-book
Explanation
The given answer states that the disadvantage of e-books is that they require special software to create the design of the e-book. This means that not everyone can easily create or edit e-books without the necessary software skills or access to the required tools. The other options listed in the question are all advantages of e-books, such as their durability, easy distribution, and convenient storage options.
9.
Centang jawaban yang benar.
Ada tiga hal yang perlu di perhatikan sebelum mendesain e-book, yaitu....
Correct Answer(s)
B. Tentukan tema yang akan diangkat dan diuraikan dalam e-book, baik berupa berita, kabar, informasi, tutorial, cerita, atau yang lainnya
C. Merancang layout dan tata letak konten dalam dokumen
E. Siapkan file pendukung sebagai contoh gambar dengan kualitas tinggi atau audio file jika memungkinkan
Explanation
The correct answer includes three important considerations before designing an e-book: determining the theme to be addressed and elaborated in the e-book, designing the layout and arrangement of content in the document, and preparing supporting files such as high-quality images or audio files if possible. These steps ensure that the e-book is well-planned, visually appealing, and includes relevant multimedia elements to enhance the reader's experience.
10.
Ada beberapa aplikasi yang dapat digunakan untuk membuat e-book secara gratis, kecuali
Correct Answer
E. Notepad++
Explanation
Notepad++ is not an application that can be used to create e-books for free. It is a text editor that is commonly used for coding and programming purposes. While it can be used to edit and format text, it does not have specific features or tools for creating e-books.
11.
Orang yang memanfaatkan teknologi informasi termasuk internet untuk membangun komunitas, berkreasi maupun dalam hal pekerjaan disebut....
Correct Answer
A. Warga digital
Explanation
The term "Warga digital" refers to individuals who utilize information technology, including the internet, to build communities, engage in creative activities, and carry out their work. This term encompasses the concept of being a digital citizen, someone who actively participates in the digital world and utilizes technology for various purposes.
12.
Berikut ini cara menggunakan penggunaan teknologi informasi yang benar adalah....
Correct Answer
B. Menggunakan kata-kata yang tepat dan sopan
Explanation
The correct answer is "Menggunakan kata-kata yang tepat dan sopan." This is the correct answer because using appropriate and polite language is an important aspect of using information technology correctly. When communicating online, it is essential to use respectful and appropriate language to maintain a positive and respectful online environment. This helps to avoid misunderstandings, conflicts, and offensive behavior towards other users.
13.
Contoh kejahatan yang marak terjadi dalam dunia digital adalah....
Correct Answer
C. Meretas website
Explanation
The correct answer is "Meretas website". This is because hacking or "meretas" a website is a common cybercrime that involves unauthorized access to a website's server or database. It can lead to data breaches, theft of sensitive information, defacement of webpages, or even the complete shutdown of the website. Hackers may exploit vulnerabilities in the website's code or use social engineering techniques to gain access. This type of cybercrime is illegal and can have severe consequences for both individuals and organizations.
14.
Norma perilaku jujur, bertanggung jawab, dan peduli
terkait dengan pemanfaatan Informasi dan Teknologi Komunikasi (ICT) secara bersama. Konsep yang memberikan penyadaran penggunaan teknologi
informasi di dunia maya secara bertanggung jawab dengan baik dan benar disebut
Correct Answer
D. Kewargaan Digital
Explanation
Kewargaan Digital adalah konsep yang memberikan penyadaran penggunaan teknologi informasi di dunia maya secara bertanggung jawab dengan baik dan benar. Hal ini mencakup perilaku jujur, bertanggung jawab, dan peduli terkait dengan pemanfaatan Informasi dan Teknologi Komunikasi (ICT) secara bersama. Dengan menjadi warga digital yang baik, seseorang akan memiliki kesadaran tentang dampak dari tindakan mereka dalam penggunaan teknologi informasi dan bertanggung jawab dalam menggunakan teknologi tersebut.
15.
Setiap data atau informasi yang di unggah ke dunia maya memiliki kekuatan hukum, baik bersifat pasti, bebas atau gratis, dan belum pasti disebut....
Correct Answer
E. Digital Low
16.
Trojan Horse merupakan program yang sering digunakan oleh intruder untuk memasukkan program Back Door ke dalam komputer korban.
Correct Answer
A. True
Explanation
A Trojan Horse is a type of program that is commonly used by intruders to introduce a Back Door program into the victim's computer. This means that the given statement is correct. A Trojan Horse disguises itself as a harmless program or file, tricking the user into downloading or executing it. Once inside the computer, it creates a backdoor, which allows the intruder to gain unauthorized access and control over the system. Therefore, it is important to be cautious and avoid downloading or executing unknown files or programs to prevent falling victim to a Trojan Horse attack.
17.
Setiap karya cipta berupa inovasi, foto, audio, video, software, dapat didaftarkan menjadi hak cipta. perturan perundangan yang mengatur masalah hak cipta di Indonesia tersebut adalah....
Correct Answer
A. UU No 28 Tahun 2014
Explanation
The correct answer is UU No 28 Tahun 2014 because it is the law that governs copyright issues in Indonesia.
18.
Setiap Melakukan unggahan data atau informasi ke dunia maya, maka kita menggunakan pedoman yang di kenal dengan F.A.K.T.A yaitu Faktual, Analisis, Kesatuan, Tenggang rasa dan Aktif
Correct Answer
B. False
Explanation
The statement is false because the acronym F.A.K.T.A does not exist and is not commonly known as a guideline for uploading data or information online. Therefore, the correct answer is false.
19.
Simbol dalam lisensi creative commons memiliki fungsi sebagai....
Correct Answer
D. Ketika di publish, berbagi konten, dan menyalin, harus menyertakan nama pembuat karya tersebut
Explanation
The correct answer states that when publishing, sharing, and copying content, the name of the creator of the work must be included. This means that the symbol in the Creative Commons license serves as a requirement to attribute the original creator of the work when it is used or shared.
20.
Teknik pengiriman pesan melalui surat elektronik secara acak ke beberapa pemilik surat elektronik tertentu disebut....
Correct Answer
A. E-mail spoofing
Explanation
E-mail spoofing refers to the technique of sending emails with a forged sender address, making it appear as if the email came from someone else. This is often done to deceive recipients and trick them into taking certain actions or revealing sensitive information. It is a form of cyber attack commonly used by hackers and scammers to carry out phishing scams, spread malware, or commit fraud. By impersonating a trusted source, the attacker aims to gain the recipient's trust and manipulate them into providing confidential data or performing harmful actions.