Bab II Computer Network

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Leksono
L
Leksono
Community Contributor
Quizzes Created: 2 | Total Attempts: 322
| Attempts: 120 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. Perangkat yang berfungsi untuk melindungi jaringan dari serangan luar adalah ... . 

Explanation

A firewall is a device that is designed to protect a network from external attacks. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic. It examines the data packets and filters them based on predetermined security rules. By doing so, it prevents unauthorized access and blocks malicious traffic from entering the network. A firewall is an essential component of network security, ensuring the confidentiality, integrity, and availability of the network resources.

Submit
Please wait...
About This Quiz
Bab II Computer Network - Quiz

After studying Section two about Computer Network, Do the Quiz below.
Choose the correct answer A, B, C or D!
25 minutes for 20 item test!
5 minutes for 5 True or false test!

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Berikut ini merupakan manfaat jaringan komputer, kecuali ... .

Explanation

The given answer states that the benefit of computer networks is that we can access other people's data without being detected. However, this is not a valid benefit of computer networks. In fact, accessing someone else's data without permission is illegal and unethical. The correct benefits of computer networks mentioned in the other options are: sharing resources, using data collaboratively, and having higher reliability.

Submit
3. Gambar disamping adalah ... .

Explanation

The correct answer is "Router". The explanation for this is that the picture shown is most likely depicting a router. A router is a networking device that forwards data packets between computer networks. It acts as a central hub for connecting multiple devices to a network and allows them to communicate with each other. The picture may show multiple ports or antennas, which are common features of a router.

Submit
4. Model LAN yang pemasangannya secara melingkar dinamakan model pemasangan ... .

Explanation

The correct answer is "Ring". In a ring network, the installation is done in a circular manner, where each device is connected to two other devices forming a closed loop. This type of network allows data to flow in only one direction, ensuring efficient and reliable communication between devices.

Submit
5. Jaringan komputer dibangun agar sharing data, informasi dan sumber daya dapat dilakukan dengan mudah.

Explanation

The statement is true because computer networks are designed to facilitate the sharing of data, information, and resources among connected devices. By connecting computers and devices together, users can easily share files, access shared resources such as printers or storage devices, and communicate with each other through various network services. This enables efficient collaboration, improves productivity, and enhances the overall functionality of the connected devices.

Submit
6. Perangkat yang umum terdapat dalam sebuah jaringan komputer adalah komputer server, komputer klien, kartu jaringan,hub, kabel dan konektor, repeater, bridge, router dan firewall

Explanation

The given statement is true. The common devices found in a computer network include server computers, client computers, network cards, hubs, cables and connectors, repeaters, bridges, routers, and firewalls. These devices are essential for establishing and maintaining a network infrastructure, allowing communication and data transfer between different devices and users within the network.

Submit
7. Program yang berfungsi untuk memata-matai aktivitas korban disebut ... .

Explanation

Spyware adalah program yang berfungsi untuk memata-matai aktivitas korban. Program ini secara diam-diam mengumpulkan informasi pribadi pengguna seperti riwayat browsing, kata sandi, dan data sensitif lainnya. Spyware dapat menginstal dirinya sendiri tanpa sepengetahuan pengguna dan dapat menjadi ancaman serius terhadap privasi dan keamanan online seseorang.

Submit
8. Beberapa teknologi pengaman data antara lain firewall, kriptografi, dan secure socket layer (SSL)

Explanation

The statement is true. The given technologies, such as firewall, cryptography, and secure socket layer (SSL), are indeed used for data security. Firewalls are used to monitor and control incoming and outgoing network traffic, while cryptography is used to encrypt and decrypt data to protect it from unauthorized access. SSL is a protocol that provides secure communication over the internet, ensuring that data transmitted between a web server and a browser remains encrypted and secure. These technologies play a crucial role in safeguarding data from potential threats and breaches.

Submit
9. LAN sebuah jaringan yang mampu mencakup suatu negara tertentu.

Explanation

The statement is false because a LAN (Local Area Network) is a network that covers a small geographical area, such as a single building or a campus. It is not capable of covering an entire country.

Submit
10. Jaringan yang dapat mencakup sebuah negara disebut ... .

Explanation

A WAN (Wide Area Network) is a network that covers a large geographical area, such as a country. It connects multiple smaller networks, such as LANs (Local Area Networks) and MANs (Metropolitan Area Networks), allowing for communication and data exchange over long distances. Therefore, a WAN is the correct answer as it refers to a network that can cover an entire country.

Submit
11. Gambar disamping merupakan topologi jaringan model ... .

Explanation

The given correct answer is "Bus". The explanation for this is that the image shown represents a network topology where all devices are connected to a single cable called the "bus". In this topology, data is transmitted in both directions along the bus, and all devices on the network receive the transmitted data.

Submit
12. Komunikasi data antara dua komputer terjadi dengan menggunakan protokol TCP/IP.

Explanation

The given statement states that data communication between two computers occurs using the TCP/IP protocol. This is true as TCP/IP is a set of protocols that enables communication between devices on the internet or a local network. It provides reliable and secure transmission of data by breaking it into packets and ensuring their delivery. TCP/IP is widely used for internet communication, making the given statement correct.

Submit
13. Kabel yang mempunyai kemampuan untuk mengirim data paling cepat adalah ... .

Explanation

Fiber optik adalah kabel yang menggunakan serat optik untuk mengirim data. Serat optik ini mampu mentransmisikan data dengan kecepatan yang sangat tinggi, bahkan lebih cepat daripada kabel-kabel lainnya seperti UTP, STP, dan Coaxial. Oleh karena itu, fiber optik dianggap sebagai kabel yang memiliki kemampuan untuk mengirim data paling cepat.

Submit
14. Berikut ini yang merupakan contoh jaringan LAN, kecuali jaringan komputer ... .

Explanation

The correct answer is "antar cabang suatu bank". This is because a LAN (Local Area Network) refers to a network that is confined to a small geographical area, such as a single building or campus. While all the other options mentioned (dalam laboratorium, dalam satu perusahaan, dalam satu lembaga/kantor) can be examples of LANs, connecting branches of a bank is an example of a WAN (Wide Area Network) rather than a LAN.

Submit
15. Pihak yang meminta layanan pada jaringan komputer disebut dengan ... .

Explanation

The correct answer is "client". In computer networking, the term "client" refers to a device or software application that requests services or resources from a server. In this context, the "client" is the entity that initiates communication with the server and makes requests for data or services.

Submit
16. Teknik penipuan yang dilakukan dengan memalsukan IP Address disebut ... .

Explanation

Spoofing is the correct answer because it refers to the technique of deceiving or tricking someone by falsifying information, such as IP addresses, in order to gain unauthorized access or manipulate data. In this case, the question specifically mentions the act of falsifying IP addresses, which aligns with the concept of spoofing. Email spoofing, pharming, and browser hijackers are related but not specifically focused on the manipulation of IP addresses.

Submit
17. Konektor yang dihunakan pada kabel UTP adalah ... .

Explanation

The correct answer is RJ 45. RJ 45 is the connector used for UTP (Unshielded Twisted Pair) cables, which are commonly used for Ethernet networks. RJ 45 connectors have eight pins and are designed to connect to the RJ 45 ports on devices such as computers, routers, and switches. These connectors provide a secure and reliable connection for transmitting data over the network.

Submit
18. Protokol jaringan yang berfungsi untuk mengirimkan dan menerima data ke dan dari media fisik jaringan adalah ... .

Explanation

The correct answer is Network interface layer. The network interface layer is responsible for sending and receiving data to and from the physical network media. It provides the interface between the network protocol stack and the physical network. This layer handles tasks such as framing the data into packets, addressing, error detection and correction, and media access control.

Submit
19. Data yang dikirmkan oleh sebuah situs dalam bentuk teks dan diterima oleh browser disebut ... .

Explanation

When a website sends data in the form of text to a browser, it is referred to as "cookies". Cookies are small files that are stored on the user's computer and contain information about the user's browsing activity on that particular website. They are commonly used for tracking, personalization, and authentication purposes.

Submit
20. Iaringan yang menggunakan Internet Protocol namun hanya dapat diakses oleh kalangan terbatas adalah ... .

Explanation

An intranet is a private network that uses Internet Protocol (IP) technology but is only accessible to a limited group of people, such as employees within an organization. It is designed to provide internal communication and collaboration tools, as well as access to company resources and information. Unlike the internet, which is a public network accessible to anyone, an intranet is restricted and requires authentication to access its services. Therefore, an intranet is the correct answer as it fits the description of a network that uses IP but is accessible only to a limited group of users.

Submit
21. Perangkat berikut yang berfungsi untuk menghubungkan dua LAN adalah ... .

Explanation

A bridge is a device that connects two LANs (Local Area Networks) together, allowing them to communicate with each other. Unlike a hub, which simply broadcasts data to all connected devices, a bridge intelligently filters and forwards data only to the intended destination. This helps to improve network performance and reduce unnecessary network traffic. A router, on the other hand, connects multiple networks together, including LANs and WANs (Wide Area Networks), and is responsible for directing data packets between them. A cable UTP (Unshielded Twisted Pair) is a type of network cable used to connect devices within a LAN, but it does not directly connect two LANs together.

Submit
22. Pada topologi jaringan komputer semua sentral dihubungkan secara langsung pada medium transmisi, jaringan ini disebut ... .

Explanation

In a bus network topology, all the nodes are connected directly to a common transmission medium, such as a single cable. Each node can communicate with all other nodes by broadcasting the message onto the medium. This type of network is called a bus network.

Submit
23. Tindakan melakukan intercepsi secara real-time yang tidak diotorisasi terhadap komunikasi pribadi disebut ... .

Explanation

Eavesdropping refers to the unauthorized act of intercepting and listening to private communications in real-time. It involves secretly accessing and monitoring conversations or messages without the knowledge or consent of the parties involved. This can be done through various means such as wiretapping, hacking into communication channels, or using specialized equipment to capture and decode signals. Eavesdropping is considered a violation of privacy and can be illegal in many jurisdictions.

Submit
24. Data hasil enkripsi disebut ... .

Explanation

The correct answer is "Cipher teks" because when data is encrypted, it is transformed into a form that is not easily understood or readable. This transformed data is called cipher text.

Submit
25. Perbedaan sistem jaringan LAN dan WAN adalah ... .

Explanation

The correct answer is "Koneksi ke Internet". The difference between LAN (Local Area Network) and WAN (Wide Area Network) lies in their connection to the Internet. LAN refers to a network that is confined to a small geographical area, such as a home, office, or building, and does not necessarily require an Internet connection. On the other hand, WAN refers to a network that covers a larger geographical area, such as multiple buildings, cities, or even countries, and requires an Internet connection to connect different LANs or other networks together.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 05, 2011
    Quiz Created by
    Leksono
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Perangkat yang berfungsi untuk melindungi jaringan dari serangan luar...
Berikut ini merupakan manfaat jaringan komputer, kecuali ... .
Gambar disamping adalah ... .
Model LAN yang pemasangannya secara melingkar dinamakan model...
Jaringan komputer dibangun agar sharing data, informasi dan sumber...
Perangkat yang umum terdapat dalam sebuah jaringan komputer adalah...
Program yang berfungsi untuk memata-matai aktivitas korban disebut ......
Beberapa teknologi pengaman data antara lain firewall, kriptografi,...
LAN sebuah jaringan yang mampu mencakup suatu negara tertentu.
Jaringan yang dapat mencakup sebuah negara disebut ... .
Gambar disamping merupakan topologi jaringan model ... .
Komunikasi data antara dua komputer terjadi dengan menggunakan...
Kabel yang mempunyai kemampuan untuk mengirim data paling cepat adalah...
Berikut ini yang merupakan contoh jaringan LAN, kecuali jaringan...
Pihak yang meminta layanan pada jaringan komputer disebut dengan ... .
Teknik penipuan yang dilakukan dengan memalsukan IP Address disebut...
Konektor yang dihunakan pada kabel UTP adalah ... .
Protokol jaringan yang berfungsi untuk mengirimkan dan menerima data...
Data yang dikirmkan oleh sebuah situs dalam bentuk teks dan diterima...
Iaringan yang menggunakan Internet Protocol namun hanya dapat diakses...
Perangkat berikut yang berfungsi untuk menghubungkan dua LAN adalah...
Pada topologi jaringan komputer semua sentral dihubungkan secara...
Tindakan melakukan intercepsi secara real-time yang tidak diotorisasi...
Data hasil enkripsi disebut ... .
Perbedaan sistem jaringan LAN dan WAN adalah ... .
Alert!

Advertisement