1.
Masalah yang sering terjadi pada monitor adalah ukuran layar yang tidak sesuai dengan keinginan kita. Pada windows 7, dapat dilakukan pengaturan dengan cara...
Correct Answer
A. Klik kanan pada desktop >> screen resolution
Explanation
The correct answer is "klik kanan pada desktop >> screen resolution". This is because the question is asking about how to adjust the screen size on Windows 7. By right-clicking on the desktop and selecting "screen resolution," users can access the settings to adjust the size of their monitor's display.
2.
Prosedur yang dilakukan jika monitor tidak menyala :
i.Pastikan tombol ON/OFF dalam kondisi baik
ii.Cek kabel power yang ke outlet listrik
iii.Ganti kabel power
iv.Cek kabel video
v.Ganti monitor
Urutan yang benar adalah…
Correct Answer
E. I, ii, iii, iv, v
Explanation
The correct answer is i, ii, iii, iv, v. First, we need to check if the ON/OFF button is in good condition. Then, we should check the power cable connected to the electrical outlet. If the issue persists, we can try replacing the power cable. Next, we should check the video cable connection. If none of these steps solve the problem, the last resort would be to replace the monitor.
3.
Untuk menghubungkan komputer dengan switch digunakan kabel utp dengan susunan
Correct Answer
B. Straight
Explanation
To connect a computer with a switch, a straight UTP cable is used. A straight UTP cable has the same pin configuration on both ends, allowing for a direct connection between the computer and the switch. This type of cable is commonly used for connecting devices that are on the same network, such as a computer and a switch.
4.
Ketika melakukan proses upgrade atau mengganti prosesor, yang perlu diperhatikan pada motherboard adalah…
Correct Answer
B. Tipe socket
Explanation
When performing an upgrade or changing the processor, the most important thing to consider on the motherboard is the type of socket. The socket type determines the compatibility between the processor and the motherboard. If the socket type of the new processor does not match the socket on the motherboard, the processor cannot be installed. Therefore, it is crucial to ensure that the motherboard has the correct socket type for the desired processor.
5.
Untuk melakukan perawatan PC menggunakan disk cleanup yang ada pada windows, file-file yang tidak diperlukan dapat dihapus dengan cara…
Correct Answer
E. Start >> accessories >> system tools >> disk cleanup
Explanation
To perform PC maintenance using disk cleanup on Windows, unnecessary files can be deleted by navigating to "start" menu, then selecting "accessories", followed by "system tools", and finally selecting "disk cleanup".
6.
Sebuah komputer memiliki RAM sebesar 1 GB. Jika komputer tersebut akan di instalasi sistem operasi linux, maka swap yang dipasang sebesar…
Correct Answer
C. 2 GB
Explanation
The correct answer is 2 GB. When installing a Linux operating system, it is recommended to have a swap space that is at least equal to the amount of RAM on the computer. In this case, since the computer has 1 GB of RAM, the swap space should be 1 GB. However, it is also common to have a swap space that is double the amount of RAM for better performance. Therefore, the recommended swap space in this scenario would be 2 GB.
7.
Topologi jaringan yang menggunakan terminal pada ujung nodenya adalah
Correct Answer
B. Bus
Explanation
A network topology that uses terminals at the end of its nodes is a bus topology. In a bus topology, all nodes are connected to a single cable, called the bus, and data is transmitted in both directions along the bus. The terminals, or end nodes, are where the network devices are connected.
8.
Diketahui ip address 172.172.17.7/27. Jumlah host tiap subnet adalah
Correct Answer
D. 30
Explanation
The given IP address is 172.172.17.7/27, which means it has a subnet mask of 27 bits. The subnet mask determines the number of available host addresses in each subnet. In this case, the subnet mask of 27 bits leaves 5 bits for host addresses. With 5 bits, there are 2^5 or 32 possible combinations, but 2 of them are reserved for network and broadcast addresses. Therefore, the number of available host addresses in each subnet is 32-2=30.
9.
Perangkat WAN yang diletakkan di sisi pelanggan atau end user adalah…
Correct Answer
B. CPE
Explanation
The correct answer is CPE. CPE stands for Customer Premises Equipment, which refers to the networking devices or equipment that are located at the customer's or end user's premises. These devices are used to connect the customer's local area network (LAN) to the wide area network (WAN) provided by the service provider. Examples of CPE include routers, switches, modems, and gateways.
10.
Untuk menterjemahkan ip address ke dalam nama domain dibutuhkan…
Correct Answer
B. DNS SERVER
Explanation
To translate an IP address into a domain name, a DNS server is required. DNS stands for Domain Name System, which is responsible for converting human-readable domain names into IP addresses. When a user enters a domain name into a web browser, the DNS server is queried to find the corresponding IP address for that domain. This allows the user's device to establish a connection with the correct server and access the desired website or service. Therefore, a DNS server is necessary for translating IP addresses to domain names.
11.
Collision detection merupakan metode yang digunakan pada jaringan untuk mendeteksi…
Correct Answer
E. Transmisi data
Explanation
Collision detection is a method used in networking to detect when two or more devices on a network transmit data at the same time, causing a collision. This is important in ensuring that data is transmitted accurately and efficiently. By detecting collisions, the network can take appropriate actions to resolve the issue and retransmit the data if necessary. Therefore, the correct answer is "transmisi data."
12.
Perangkat WAN yang berfungsi mengirim dan menerima informasi tentang layer network dinamakan…
Correct Answer
C. Router
Explanation
A WAN device that is responsible for sending and receiving information about network layers is called a router. Routers are used to connect multiple networks together and direct traffic between them. They analyze the destination IP address of incoming packets and determine the best path for the data to travel. Routers also provide security by filtering and blocking certain types of traffic.
13.
Keamanan yang digunakan pada jaringan wi-fi adalah…
Correct Answer
D. Hide SSID
Explanation
The correct answer is "Hide SSID." Hiding the SSID (Service Set Identifier) is a security measure used in Wi-Fi networks. When the SSID is hidden, the network name is not broadcasted, making it more difficult for unauthorized users to discover and connect to the network. This adds an extra layer of protection against potential intruders.
14.
Nameserver dalam linux mempunyai arti…
Correct Answer
C. DNS Server
Explanation
The correct answer is DNS Server. In Linux, a nameserver refers to a DNS (Domain Name System) server. DNS servers are responsible for translating domain names into IP addresses, allowing devices to connect to websites and services on the internet. They maintain a database of domain names and their corresponding IP addresses, enabling efficient and reliable communication between devices.
15.
Perintah apt-get update mempunyai tujuan…
Correct Answer
C. Memperbaharui daftar repository
Explanation
The correct answer is "Memperbaharui daftar repository". The apt-get update command is used to refresh the package lists for upgrades and new installations. It retrieves the latest version information from the repositories specified in the sources.list file and updates the local database of available packages. By running this command, the system will have an up-to-date list of software packages available for installation or upgrade.
16.
Which one do you like?
Correct Answer
A. Option 1
Explanation
The question asks for the preference of the person. Since the answer states "Option 1," it implies that the person likes Option 1 the most out of all the given options.
17.
Untuk mengetahui apakah dns server sudah berfungsi atau belum bisa di cek dengan perintah
Correct Answer
B. Nslookup namaserver
Explanation
The given correct answer suggests that to determine whether the DNS server is functioning or not, the command "nslookup namaserver" can be used. This command will perform a DNS lookup for the specified server name, allowing the user to verify if the DNS server is operational.
18.
Berikut adalah contoh dari CMS, kecuali
Correct Answer
E. Squirrelmail
Explanation
The given options are examples of Content Management Systems (CMS), which are used for creating and managing websites. Owncloud, Joomla, Drupal, and Moodle are all well-known CMS platforms. However, Squirrelmail is not a CMS but rather a web-based email client. It is used for accessing and managing email accounts, not for creating and managing websites.
19.
MTA dalam email server berfungsi sebagai…
Correct Answer
C. Server
Explanation
MTA stands for Mail Transfer Agent, which is responsible for the transfer of emails between different mail servers. It receives emails from the sender's mail server and then routes them to the recipient's mail server. Therefore, MTA functions as a server in the email system, handling the communication and transfer of messages between different servers.
20.
Yang membedakan secara fisik terlihat antara NIC jenis PCI dan PCI express adalah
Correct Answer
A. Jumlah pin
Explanation
The physical difference between a PCI and PCI Express NIC is the number of pins.
21.
Diketahui sebuah jaringan mempunyai ip address 192.168.4.18/28. Ip networknya adalah…
Correct Answer
E. 192.168.4.32
Explanation
The given IP address is 192.168.4.18/28, which means it has a subnet mask of 28 bits. This subnet mask allows for 16 IP addresses in the network. The IP network address is the first address in the range, which is obtained by setting all the host bits to 0. In this case, the host bits are 18, so the network address would be 192.168.4.16. However, the given options do not include this network address. The closest option is 192.168.4.32, which is the broadcast address for this network. Therefore, the correct answer is 192.168.4.32.
22.
Yang dimaksud cross talk dalam kabel coaxial adalah…
Correct Answer
B. Perlindungan dari medan listrik dan fase signal
Explanation
Cross talk dalam kabel coaxial adalah perlindungan dari medan listrik dan fase signal. Cross talk terjadi ketika sinyal dari satu saluran interferensi dengan sinyal dari saluran lain dalam kabel yang sama. Kabel coaxial dirancang dengan pelindung logam yang melindungi sinyal dari interferensi eksternal dan mengurangi cross talk antara saluran. Perlindungan dari medan listrik dan fase signal ini penting untuk menjaga integritas sinyal yang dikirim melalui kabel coaxial.
23.
Memilih cdrom, harddisk, nfs, ftp atau http dalam melakukan instalasi sistem operasi jaringan linux merupakan langkah pemilihan…
Correct Answer
C. Mode instalasi
Explanation
The given options, cdrom, harddisk, nfs, ftp, and http, are all different methods or modes of installation for a network Linux operating system. These options represent different ways in which the installation files can be accessed or retrieved. Therefore, selecting one of these options is a step in choosing the mode of installation for the network Linux operating system.
24.
Partisi yang pertama kali dipasang dalam instalasi sistem operasi linux adalah…
Correct Answer
A. /swap, /root
Explanation
The first partition that is typically set up in a Linux operating system installation is the /swap partition, which is used for virtual memory management. The second partition is the /root partition, which contains the root directory and essential system files.
25.
Perintah untuk membuat user di linux adalah…
Correct Answer
A. Useradd
Explanation
The correct answer is "useradd" because it is the command used in Linux to create a new user account. This command adds a new entry to the system's user database and creates the necessary files and directories for the new user.
26.
.Cara untuk mengupgrade member server menjadi domain controller dalam windows server adalah…
Correct Answer
B. Dcpromo
Explanation
The correct answer is "dcpromo". Dcpromo is a command-line tool in Windows Server that is used to promote a server to a domain controller. By running the dcpromo command, the server's role can be upgraded to become a domain controller, allowing it to manage and control the Active Directory domain.
27.
Layer pada OSI yang bertugas mentransmisikan ulang terhadap paket data yang hilang di tengah jalan adalah…
Correct Answer
E. Transport
Explanation
The correct answer is "transport." The transport layer in the OSI model is responsible for ensuring reliable delivery of data between source and destination. It breaks down large data into smaller segments and adds sequencing and error-checking information. If any data packets are lost or damaged during transmission, the transport layer retransmits them to ensure complete and accurate delivery. Therefore, the transport layer is the layer that handles retransmission of lost data packets.
28.
Gangguan yang disebabkan oleh tidak berjalannya aplikasi di wireless, konflik ip address, proses proxy server pada server. Dikelompokkan dalam gangguan…
Correct Answer
D. Software
Explanation
The given options are categories of potential disruptions. Among these categories, software is the one that best fits the description of the problem being caused by the failure of applications in wireless, IP address conflicts, and issues with the proxy server on the server. Therefore, software is the correct answer.
29.
Port dari SMTP dalam email server adalah
Correct Answer
B. 25
Explanation
Port 25 is the correct answer because it is the port used by the Simple Mail Transfer Protocol (SMTP) to send email messages between servers. SMTP is the standard protocol for email transmission and port 25 is specifically designated for this purpose. Other ports mentioned in the options, such as 21 (FTP), 80 (HTTP), 143 (IMAP), and 443 (HTTPS), are used for different network protocols and not specifically for email transmission.
30.
Port dari IMAP dalam email server adalah
Correct Answer
C. 25
Explanation
The correct answer is 25. IMAP (Internet Message Access Protocol) is a protocol used by email clients to retrieve emails from a mail server. Port 25 is the standard port for SMTP (Simple Mail Transfer Protocol), which is used for sending emails. However, IMAP typically uses port 143 for unencrypted connections and port 993 for encrypted connections. Therefore, the answer 25 is incorrect and likely a mistake.
31.
Port dari SMTP dalam email server adalah
Correct Answer
E. 143
Explanation
Port 143 is the correct answer because it is the standard port number for the Internet Message Access Protocol (IMAP), which is used by email clients to retrieve emails from a mail server. SMTP (Simple Mail Transfer Protocol) is used for sending emails, but it typically uses port 25. Therefore, the correct port number for SMTP is not 143, but rather 25.
32.
Untuk mentransfer file dalam skala jaringan local saja, bisa dengan menggunakan
Correct Answer
B. Samba
Explanation
Samba is the correct answer because it is a software suite that allows for file and print sharing between computers on a local network. It enables users to access and transfer files seamlessly, making it an ideal choice for transferring files in a local network setting. FTP, DNS, web, and proxy are not specifically designed for file transfer within a local network, making them less suitable options in this context.
33.
Agar user ftp yang tidak terdaftar tidak bisa mengakses server ftp, maka user apakah yang harus dinonaktifkan?
Correct Answer
C. Anonymous
Explanation
The user that should be disabled is "anonymous". Since the question states that unregistered FTP users cannot access the FTP server, it implies that only registered users can access it. Among the given options, "anonymous" is the only user that is not authenticated or registered. Therefore, disabling the "anonymous" user would prevent unregistered users from accessing the server.
34.
Agar lancard pertama dan lancard kedua bisa berkomunikasi maka yang harus diaktifkan adalah…
Correct Answer
B. IP Tables
Explanation
The correct answer is IP Tables. IP Tables is a firewall utility that allows for the configuration of rules to control network traffic. In this scenario, if the first and second network cards are able to communicate, it suggests that there is a need for network traffic control. IP Tables can be used to set up rules to filter and redirect network packets, ensuring secure and efficient communication between the two network cards.
35.
Paket data yang keluar dari server telah mengalami proses
Correct Answer
D. Postrouting
Explanation
The correct answer is Postrouting because it refers to the process of modifying the source IP address of the packet as it leaves the server. This is typically done when the server is acting as a router and needs to change the source IP address to match the IP address of the outgoing interface.
36.
Daftar pengguna server proxy diatur melalui fitur…
Correct Answer
A. ACL
Explanation
The correct answer is ACL. ACL stands for Access Control List, which is a set of rules that determines what actions are allowed or denied on a network. In this context, the daftar pengguna server proxy (proxy server user list) is managed through the ACL feature. This feature allows the administrator to control and restrict access to the proxy server based on various criteria such as IP address, user credentials, or specific websites. By configuring the ACL, the administrator can define which users or groups are allowed or denied access to the proxy server.
37.
Untuk mengaktifkan directory swap dari proxy squid, maka yang harus dilakukan adalah…
Correct Answer
C. Squid3 -z
Explanation
The correct answer is "squid3 -z". This command is used to initialize the cache directory for Squid proxy server. By running this command, the cache directory is created and prepared for use.
38.
Alat yang berfungsi untuk menghubungkan 2 jaringan dengan segmen yang berbeda adalah ….
Correct Answer
A. Router
Explanation
A router is a device that is used to connect two or more networks with different segments. It acts as a gateway between these networks, directing the traffic between them based on IP addresses. Routers are capable of making intelligent decisions and can determine the most efficient path for data packets to travel. Therefore, a router is the correct answer for the given question.
39.
Subnet Mask yang dapat digunakan pada IP kelas B adalah….
Correct Answer
B. 255.255.0.0
Explanation
The subnet mask 255.255.0.0 can be used for IP class B because it allows for a larger number of host addresses compared to the other options. This subnet mask allows for 16 bits to be used for the network portion of the IP address and 16 bits for the host portion. This means that it can support up to 65,534 host addresses on each network.
40.
Processor Intel Core I7 menggunakan socket processor dengan tipe….
Correct Answer
A. LGA 1156
Explanation
The correct answer is LGA 1156. The Intel Core i7 processor uses the LGA 1156 socket type. This socket is specifically designed for the first generation of Intel Core i7 processors. It provides a physical connection between the processor and the motherboard, allowing for communication and power transfer. LGA 1156 is not compatible with other socket types such as LGA 775 or AM2+.