Soal Ujian Sekolah Produktif Tkj Kelas Xii Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Selvyamalia
S
Selvyamalia
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,925
| Attempts: 4,925 | Pertanyaan: 50
Please wait...

Question 1 / 50
0 %
0/100
Score 0/100
1. Ada dua jenis routing yaitu...

Explanation

The correct answer is "Routing langsung dan tidak langsung" because it accurately describes the two types of routing. "Routing langsung" refers to direct routing, where data packets are sent directly from the source to the destination without passing through any intermediate nodes. On the other hand, "Routing tidak langsung" refers to indirect routing, where data packets are sent through multiple intermediate nodes before reaching the destination.

Submit
Please wait...
About This Quiz
Soal Ujian Sekolah Produktif Tkj Kelas Xii Quiz - Quiz

Personalize your quiz and earn a certificate with your name on it!
2.  Untuk mendeteksi apakah hubungan komputer dengan jaringan sudah berjalan dengan baik, utilitas yang digunakan adalah…..

Explanation

Ping is a utility used to test the connectivity between a computer and a network. It sends a small packet of data to a specific IP address or domain name and measures the time it takes for the packet to travel back to the sender. If the packet successfully returns, it indicates that the computer is connected to the network and the connection is functioning properly. Therefore, Ping is the correct utility to use for detecting whether the computer's connection to the network is working well.

Submit
3. Skema desain pembangunan sebuah jaringan komputer dikenal dengan istilah…..

Explanation

The correct answer is "Topologi". Topologi refers to the layout or structure of a computer network, including how devices are connected and the arrangement of nodes and links. It determines how data flows within the network and can be categorized into different types such as bus, star, ring, mesh, etc. Understanding the topologi is crucial for designing and managing a computer network effectively.

Submit
4. Satuan informasi terkecil yang dikenal dalam komunikasi data adalah…..

Explanation

A bit is the smallest unit of information in data communication. It represents a binary digit, which can have a value of either 0 or 1. In data transmission, information is encoded into bits, which are then transmitted over a network. A bit is the fundamental building block of digital communication and is used to represent and transmit data in various forms, such as text, images, and videos.

Submit
5. Berikut ini yang bukan termasuk topologi fisik jaringan adalah…..

Explanation

The term "Sun" does not belong to the category of physical network topologies. The other options listed (Bus, Star, Tree, and Ring) are all examples of physical network topologies commonly used in computer networking. The "Sun" is not a valid option as it does not represent a physical arrangement of network devices or connections.

Submit
6. Untuk melihat indikasi pada konfigurasi IP yang terpasang pada Komputer dengan sistem operasi windows dengan perintah…..

Explanation

The correct answer is "ipconfig". Ipconfig is a command used in Windows operating systems to display the IP configuration settings of a computer. This command shows information such as the IP address, subnet mask, default gateway, and DNS servers. By using ipconfig, users can easily view the network details of their computer and troubleshoot any connectivity issues.

Submit
7. Untuk merubah hak akses file pada linux menggunakan perintah…..

Explanation

The correct answer is "Chmod." Chmod is a command used in Linux to change the permissions of a file or directory. It allows the user to modify the read, write, and execute permissions for the owner, group, and others. By using the Chmod command, the user can control who can access and manipulate the file or directory.

Submit
8. Angka 32 bit yang digunakan untuk membedakan Net ID dan Host ID disebut…..

Explanation

A 32-bit number is used to differentiate between the Net ID and Host ID in an IP address. This number is called the subnet mask. The subnet mask is used to determine the network portion of an IP address and the host portion of the IP address. It helps in dividing the IP address into network and host addresses, allowing for efficient routing and management of network resources.

Submit
9. Menurut referensi OSI, layer/lapisan protokol berjumlah…..

Explanation

According to the OSI reference model, there are a total of 7 layers in the protocol stack. Each layer has a specific function and is responsible for handling a specific aspect of the communication process. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer interacts with the layer above and below it to ensure reliable and efficient communication between devices on a network.

Submit
10. Jika nomor IP tidak dikenal dalam jaringan, maka akan muncul pesan…..

Explanation

When a network does not recognize an IP address, it will result in a "Request Time Out" message. This means that the network was unable to establish a connection or receive a response from the IP address in question.

Submit
11. Tanda bahwa shell prompt masuk sebagai root adalah…..

Explanation

The correct answer is "#". In Linux systems, the "#" symbol is used as the shell prompt when logged in as the root user. The root user has full administrative privileges and can perform any action on the system. The "#" symbol indicates that the user has the highest level of access and control over the system.

Submit
12. Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam sistem pada saat bersamaan, diistilahkan…..

Explanation

Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam sistem pada saat bersamaan. Ini berarti bahwa sistem operasi Linux mendukung mode multiuser di mana beberapa pengguna dapat mengakses dan menggunakan sistem secara bersamaan. Dalam mode multiuser, setiap pengguna memiliki akun dan hak akses yang berbeda, sehingga mereka dapat bekerja secara independen dan aman dalam lingkungan yang sama.

Submit
13. Suatu jaringan dimana setiap komputer dapat berfungsi sebagai server artinya user komputer yang ada dalam jaringan tersebut dapat menjadi seorang administrator diistilahkan…..

Explanation

In a peer-to-peer network, each computer can function as both a client and a server. This means that users on the network can act as administrators and have control over their own resources and data. In this type of network, there is no central server that controls the network, instead, each computer has equal authority and can share files and resources directly with other computers on the network.

Submit
14. Pembagian ruang dalam sebuah hardisk diistilahkan dengan…..

Explanation

The correct answer is "Partisi" because it is the term used to describe the division of space within a hard disk. A hard disk can be divided into multiple partitions, each of which can be used to store different files and data. This division helps in organizing and managing the storage space effectively.

Submit
15. Secara umum jaringan komputer terdiri dari di bawah ini kecuali...

Explanation

A radio area network is not a commonly known or recognized type of computer network. The other options listed - Local Area Network, Metropolitan Area Network, Wide Area Network, and Internet - are all well-known types of computer networks.

Submit
16. IP address terdiri atas dua bagian yaitu…..

Explanation

The correct answer is network ID and host ID. An IP address is divided into two parts: the network ID and the host ID. The network ID identifies the network to which the device belongs, while the host ID identifies the specific device within that network. This division allows for efficient routing of data packets on the internet.

Submit
17. Suatu aturan dimana pemilik program tetap memegang haknya tetapi orang lain dimungkinkan untuk menyebarkan dan memodifikasi, dengan syarat source code asli harus diikutsertakan dalam distribusinya disebut…..

Explanation

The correct answer is GPL (General Public License). This license allows the owner of a program to retain their rights while allowing others to distribute and modify it, as long as the original source code is included in the distribution.

Submit
18. Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau internet ditranslasikan menjadi…..

Explanation

DNS (Domain Name System) is a system that translates the names of hosts on a computer network or the internet into their corresponding IP addresses. It acts as a directory that allows users to access websites and other resources using easy-to-remember domain names instead of complex numerical IP addresses. Therefore, the correct answer is IP address.

Submit
19. Cara membaca IP Address kelas A, misalnya 113.46.5.6 adalah…..

Explanation

The correct answer is network ID = 113 Host ID = 46.5.6. In an IP address, the network ID refers to the portion of the address that identifies the network, while the host ID refers to the portion that identifies a specific device on that network. In this case, the network ID is 113, which is the first octet of the IP address. The host ID is 46.5.6, which includes the remaining three octets of the address.

Submit
20. Antara yang memancar ke segala arah (360 derajat) disebut...

Explanation

The term "omni" in "omni directional" refers to "all" or "every" direction. Therefore, an antenna that radiates in all directions, or 360 degrees, is called an omni directional antenna. This type of antenna is designed to provide equal signal strength in all directions, making it suitable for applications where the signal needs to reach multiple locations or devices from a central point.

Submit
21. Alat yang digunakan untuk menghitung kehilangan energi yang didapat dari serat optik adalah...

Explanation

A Loss Power Meter is used to measure the amount of energy loss obtained from an optical fiber. This device is specifically designed to accurately calculate the power loss in the fiber optic system. It helps in determining the efficiency and performance of the optical network by measuring the power loss at different points along the fiber. The Loss Power Meter is an essential tool for technicians and engineers working with fiber optic systems to ensure the quality and reliability of the network.

Submit
22. Signal merewati 2 arah dengan satu kabel, kemungkinan terjadi collision (tabrakan data atau tercampurnya data) besar, adalah kelemahan dari kabel jenis…..

Explanation

Coaxial cables are known for their ability to transmit signals in both directions using a single cable. However, this also means that there is a higher chance of data collisions or data mixing occurring, as signals can interfere with each other. This is a weakness of coaxial cables compared to other cable types such as UTP, STP, Twisted, and Unshielded cables, which are designed to minimize data collisions.

Submit
23. Server yang dapat membuat sistem berbasis Unix (seperti Linux) untuk melakukan sharing resource dengan sistem berbasis Windows adalah…..

Explanation

Samba is the correct answer because it is a software suite that allows Unix-based systems, such as Linux, to share resources with Windows-based systems. It provides file and print services, allowing Windows clients to access files and printers on the Unix server. Samba uses the SMB/CIFS protocol to facilitate this communication between different operating systems.

Submit
24. Kemampuan sistem operasi untuk menjalankan berbagai perintah dalam waktu bersamaan disebut…..

Explanation

Multitasking refers to the ability of an operating system to execute multiple tasks simultaneously. It allows the system to switch between different tasks quickly, giving the illusion of parallel execution. This enables users to run multiple applications or perform multiple tasks concurrently without any noticeable delay or interference. Therefore, multitasking is the correct answer as it accurately describes the capability of an operating system to run various commands simultaneously.

Submit
25. Perintah pada dasar linux untuk membuat direktori baru adalah…..

Explanation

The correct answer is "mkdir". This command is used in Linux to create a new directory.

Submit
26. IP address kelas A diberikan untuk jaringan dengan jumlah host…

Explanation

Kelas A IP address diberikan untuk jaringan dengan jumlah host yang sangat besar. Kelas A memiliki jangkauan alamat IP yang sangat luas, dengan 8 bit pertama digunakan untuk mengidentifikasi jaringan dan 24 bit sisanya untuk mengidentifikasi host. Dengan demikian, kelas A dapat mendukung hingga 16.777.214 host dalam satu jaringan. Hal ini membuatnya cocok untuk digunakan dalam jaringan yang membutuhkan kapasitas besar, seperti perusahaan besar atau ISP.

Submit
27. Berikut yang bukan merupakan jenis kabel untuk jaringan komputer adalah…..

Explanation

BNC (Bayonet Neill-Concelman) is not a type of cable for computer networks. It is a type of connector used to connect coaxial cables. Coaxial cable, UTP (Unshielded Twisted Pair), fiber optic, and STP (Shielded Twisted Pair) are all types of cables commonly used in computer networks.

Submit
28. Alat yang digunakan untuk mengetahui spektrum frekuensi yang telah digunakan oleh jaringan WaveLAN lainnya disebut…..

Explanation

A Spectrum Analyzer is a tool used to analyze and measure the frequency spectrum of signals. It is commonly used in wireless communication to detect and analyze the frequencies used by other WaveLAN networks. The Spectrum Analyzer can display the frequency spectrum in a graphical form, allowing users to identify and avoid frequency interference. It is a specialized instrument designed for precise frequency analysis and is the most suitable tool for this purpose compared to the other options listed.

Submit
29. Host ID untuk IP Address kelas C adalah…..

Explanation

The host ID for a Class C IP address is determined by the last 8 bits of the address. In a Class C network, the first 24 bits are reserved for the network ID, leaving the remaining 8 bits for the host ID. These 8 bits can be used to identify individual hosts within the network.

Submit
30. Software untuk mengatur tata letak file dalam hardisk yang merupakan bawaan dari Windows XP adalah…..

Explanation

The correct answer is disk defragmenter. Disk defragmenter is a software tool that is built-in to Windows XP and is used to organize and optimize the layout of files on the hard disk. It rearranges fragmented files and unused space on the disk, making the computer run more efficiently and improving overall system performance. This tool helps to reduce file access time and improve the speed of file retrieval and system startup.

Submit
31. Database server yang umum digunakan adalah…..

Explanation

MySQL is a commonly used database server. It is an open-source relational database management system that is known for its reliability, scalability, and ease of use. It is widely used in web applications and is compatible with various operating systems. MySQL is known for its fast performance and ability to handle large amounts of data efficiently. It offers advanced features such as replication, clustering, and partitioning, making it a popular choice for businesses and developers.

Submit
32. Di bawah ini adalah jenis-jenis sistem operasi, kecuali…..

Explanation

The given list consists of different operating systems, such as Ubuntu, Windows XP, Mac OS, Red Hat, and Cytrix. The correct answer is "Cytrix" because it is not a recognized operating system. The other options, Ubuntu, Windows XP, Mac OS, and Red Hat, are well-known operating systems used by individuals and organizations.

Submit
33. Jenis-jenis sistem operasi jaringan yang dapat digunakan sebagai server dalam jaringan adalah sebagai berikut, kecuali…..

Explanation

The given options list different types of network operating systems that can be used as servers in a network. Windows NT, Redhat, Debian, and San Solaris are all well-known operating systems that can be used as servers. However, "Star Bugs" is not a recognized network operating system, making it the exception in the list.

Submit
34. Subnet mask 11111111.11111111.11111111.11111000 sama dengan…..

Explanation

The subnet mask 11111111.11111111.11111111.11111000 is equivalent to 255.255.255.248. This is because in a subnet mask, each "1" represents a network bit and each "0" represents a host bit. In this subnet mask, the first 29 bits are network bits and the last 3 bits are host bits. Therefore, the subnet mask is 255.255.255.248.

Submit
35. Proxy server yang populer saat ini adalah…..

Explanation

Squid is the popular proxy server currently used. It is a widely used caching and forwarding HTTP web proxy. Squid is known for its high-performance and ability to handle a large number of simultaneous connections. It provides various features like access control, authentication, and content filtering, making it a preferred choice for many organizations and internet service providers.

Submit
36. Antar muka yang bertugas menerjemahkan satuan informasi terkecil di layer fisik adalah…..

Explanation

The LAN card is responsible for translating the smallest unit of information in the physical layer. It is a hardware component that connects a computer to a local area network (LAN). The LAN card receives and transmits data packets between the computer and the network, converting the digital signals into analog signals that can be transmitted over the network.

Submit
37. Dua software yang digunakan untuk boot loader adalah…..

Explanation

GRUB (Grand Unified Bootloader) and LILO (LInux LOader) are two software programs used for boot loading. They are responsible for loading the operating system into the computer's memory during the boot process. GRUB is a widely used bootloader in Linux systems, known for its flexibility and ability to handle multiple operating systems. LILO, on the other hand, is an older bootloader that was commonly used in older versions of Linux distributions. Both GRUB and LILO are capable of loading the operating system from the hard disk into memory, allowing the computer to start up properly.

Submit
38. Batasan waktu agar paket data tidak mengambang di jaringan disebut…..

Explanation

The correct answer is "Time to Live". Time to Live (TTL) is a value in an IP packet that specifies the maximum amount of time the packet can remain in the network before it is discarded. This is used to prevent packets from circulating indefinitely in the network and helps in managing network congestion.

Submit
39. Beberapa teknologi WAN antara lain di bawah ini, kecuali...

Explanation

The given options are all examples of WAN technologies, except for "Buffer." A buffer is a temporary storage area that is used to hold data while it is being transferred from one place to another. It is not a specific WAN technology like the other options mentioned.

Submit
40. Perintah yang digunakan untuk melihat daftar services pada Windows XP adalah…..

Explanation

The correct answer is services.msc. This is because the .msc file extension is commonly used in Windows XP to represent Microsoft Management Console (MMC) snap-in files. The services.msc file specifically allows users to view and manage the services running on their Windows XP system. By opening services.msc, users can access a list of all the services installed on their computer and make changes to their settings or start/stop them as needed.

Submit
41. Bagian-bagian dari kabel serat optik adalah seperti di bawah ini, kecuali…..

Explanation

The given options list the components of an optical fiber cable. The core, cladding, buffer, and outer jacket are all essential parts of a fiber optic cable. However, "tracker" is not a recognized component of a fiber optic cable. Therefore, the correct answer is "tracker."

Submit
42. Yang bukan merupakan varian sistem operasi jaringan berbasis GUI yang menggunakan basis Linux adalah…..

Explanation

Fortran is not a variant of GUI-based network operating systems that use the Linux base. Fortran is a programming language used for scientific and engineering calculations, and it is not an operating system. Redhat, Mandrake, Caldera, and Debian, on the other hand, are all variants of Linux-based network operating systems that have a graphical user interface.

Submit
43. Inti sebuah sistem operasi disebut…..

Explanation

The correct answer is "Core." The term "core" refers to the central or essential part of something. In the context of a computer operating system, the core refers to the central component that manages system resources and provides essential services. It is responsible for tasks such as memory management, process scheduling, and device drivers. Therefore, "core" is the most appropriate term to describe the main or central part of a system operating system.

Submit
44. Perintah pada DOS untuk membuat direktori baru adalah…..

Explanation

The correct answer is "md". In DOS, the "md" command is used to create a new directory or folder.

Submit
45. Partisi default (root) jenis Reiserfs digunakan oleh sistem operasi…..

Explanation

The default root partition type used by the operating system Linux Suse is Reiserfs.

Submit
46. Teks perintah untuk melihat tabel routing pada Windows adalah…..

Explanation

The correct answer is "route -t". This command is used to view the routing table on Windows. The "-t" option is used to display the IPv4 routing table.

Submit
47. Komputer yang bertugas menyimpan informasi halaman web yang pernah diakses sebelumnya adalah…..

Explanation

A proxy server is a computer that stores information about previously accessed web pages. When a user requests a web page, the proxy server checks if it has a cached copy of the page. If it does, it retrieves the page from its cache instead of going to the original web server. This helps to improve the speed and efficiency of accessing web pages, as the proxy server can serve the cached copy directly to the user. Therefore, a proxy server is responsible for storing and retrieving previously accessed web pages.

Submit
48. Perintah dasar linux yang digunakan untuk menghapus direktori adalah…..

Explanation

The correct answer is "rmdir". The "rmdir" command is a basic Linux command used to remove or delete a directory. It is specifically designed to remove empty directories. If the directory is not empty, the command will not work and an error message will be displayed.

Submit
49. Linux pada awalnya dibuat oleh seorang mahasiswa Finlandia bernama…..

Explanation

The correct answer is Linus Torvalds. Linux was initially created by Linus Torvalds, a Finnish student.

Submit
50. Untuk mengakses komputer lain, SSH lebih aman dibandingkan telnet karena data yang akan dikirim…

Explanation

SSH (Secure Shell) is more secure than Telnet because it encrypts the data that will be sent. By encrypting the data, it becomes more difficult for unauthorized individuals to intercept and understand the information being transmitted. By randomizing or scrambling the data before sending it, SSH further enhances its security measures, making it even more difficult for attackers to decipher the information. This ensures the confidentiality and integrity of the data during transmission.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 12, 2017
    Quiz Created by
    Selvyamalia
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Ada dua jenis routing yaitu...
 Untuk mendeteksi apakah hubungan komputer dengan jaringan sudah...
Skema desain pembangunan sebuah jaringan komputer dikenal dengan...
Satuan informasi terkecil yang dikenal dalam komunikasi data...
Berikut ini yang bukan termasuk topologi fisik jaringan...
Untuk melihat indikasi pada konfigurasi IP yang terpasang pada...
Untuk merubah hak akses file pada linux menggunakan perintah…..
Angka 32 bit yang digunakan untuk membedakan Net ID dan Host ID...
Menurut referensi OSI, layer/lapisan protokol berjumlah…..
Jika nomor IP tidak dikenal dalam jaringan, maka akan muncul...
Tanda bahwa shell prompt masuk sebagai root adalah…..
Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam...
Suatu jaringan dimana setiap komputer dapat berfungsi sebagai server...
Pembagian ruang dalam sebuah hardisk diistilahkan dengan…..
Secara umum jaringan komputer terdiri dari di bawah ini kecuali...
IP address terdiri atas dua bagian yaitu…..
Suatu aturan dimana pemilik program tetap memegang haknya tetapi orang...
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama...
Cara membaca IP Address kelas A, misalnya 113.46.5.6 adalah…..
Antara yang memancar ke segala arah (360 derajat) disebut...
Alat yang digunakan untuk menghitung kehilangan energi yang didapat...
Signal merewati 2 arah dengan satu kabel, kemungkinan terjadi...
Server yang dapat membuat sistem berbasis Unix (seperti Linux) untuk...
Kemampuan sistem operasi untuk menjalankan berbagai perintah dalam...
Perintah pada dasar linux untuk membuat direktori baru...
IP address kelas A diberikan untuk jaringan dengan jumlah host…
Berikut yang bukan merupakan jenis kabel untuk jaringan komputer...
Alat yang digunakan untuk mengetahui spektrum frekuensi yang telah...
Host ID untuk IP Address kelas C adalah…..
Software untuk mengatur tata letak file dalam hardisk yang merupakan...
Database server yang umum digunakan adalah…..
Di bawah ini adalah jenis-jenis sistem operasi, kecuali…..
Jenis-jenis sistem operasi jaringan yang dapat digunakan sebagai...
Subnet mask 11111111.11111111.11111111.11111000 sama dengan…..
Proxy server yang populer saat ini adalah…..
Antar muka yang bertugas menerjemahkan satuan informasi terkecil di...
Dua software yang digunakan untuk boot loader adalah…..
Batasan waktu agar paket data tidak mengambang di jaringan...
Beberapa teknologi WAN antara lain di bawah ini, kecuali...
Perintah yang digunakan untuk melihat daftar services pada Windows XP...
Bagian-bagian dari kabel serat optik adalah seperti di bawah ini,...
Yang bukan merupakan varian sistem operasi jaringan berbasis GUI yang...
Inti sebuah sistem operasi disebut…..
Perintah pada DOS untuk membuat direktori baru adalah…..
Partisi default (root) jenis Reiserfs digunakan oleh sistem...
Teks perintah untuk melihat tabel routing pada Windows...
Komputer yang bertugas menyimpan informasi halaman web yang pernah...
Perintah dasar linux yang digunakan untuk menghapus direktori...
Linux pada awalnya dibuat oleh seorang mahasiswa Finlandia...
Untuk mengakses komputer lain, SSH lebih aman dibandingkan telnet...
Alert!

Advertisement