Soal Latihan Unbk Teori Kejuruan Smk Yuppentek 1 Tangerang

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Masz Eko
M
Masz Eko
Community Contributor
Quizzes Created: 2 | Total Attempts: 26,607
Questions: 40 | Attempts: 123

SettingsSettingsSettings
Soal Latihan Unbk Teori Kejuruan Smk Yuppentek 1 Tangerang - Quiz

- Pilihlah jawaban yang paling benar dari soal-soal di bawah ini. - Kerjakan masing-masing dengan tidak mencontek pekerjaan teman.


Questions and Answers
  • 1. 

    Secara umum, sebuah PC terbagi menjadi bagian-bagian sebagai berikut, yaitu ....

    • A.

      Input Device - CPU - Output Device

    • B.

      Internal Device - CPU - External Device

    • C.

      Input Device - CPU - Peripheral Device

    • D.

      Input Device - CPU - Storage Device

    • E.

      Input Device - CPU - Memory

    Correct Answer
    A. Input Device - CPU - Output Device
    Explanation
    The correct answer is "Input Device - CPU - Output Device". This is because in a general PC setup, the input device is used to provide input to the CPU, which processes the input and sends the output to the output device for display or further action. Therefore, the flow of data in a PC typically starts with the input device, goes through the CPU for processing, and then ends with the output device for displaying or using the processed data.

    Rate this question:

  • 2. 

    Kecepatan data maksimal pada komunikasi wireless dengan spesifikasi 802.11n adalah ....

    • A.

      100 Mbps

    • B.

      54 Mbps

    • C.

      15 Mbps

    • D.

      11 Mbps

    • E.

      5 Mbps

    Correct Answer
    A. 100 Mbps
    Explanation
    The maximum data speed for wireless communication with the 802.11n specification is 100 Mbps. This specification allows for faster and more reliable wireless connections compared to previous versions. It offers improved range and bandwidth, making it suitable for high-bandwidth applications such as streaming HD videos or online gaming. With a maximum speed of 100 Mbps, it provides a significant improvement over the other options listed.

    Rate this question:

  • 3. 

    Beberapa hal yang harus diperhatikan pada saat menginstal OS jaringan linux Redhat 9 adalah ...

    • A.

      Pemilihan mode instalasi

    • B.

      Pemilihan paket

    • C.

      Pemilihan metode instalasi

    • D.

      Pemilihan versi linux

    • E.

      Pemilihan jenis OS sebagai client, server atau stand alone.

    Correct Answer
    B. Pemilihan paket
    Explanation
    When installing a network operating system like Redhat 9, one of the important considerations is the selection of packages. Different packages offer different functionalities and features, so it is crucial to choose the appropriate packages that align with the specific requirements of the network. This ensures that the necessary components are installed and the system operates efficiently. The selection of packages also affects the overall performance, security, and compatibility of the network operating system.

    Rate this question:

  • 4. 

    Hal yang perlu diperhatikan saat instalasi OS jaringan berbasis teks (Linux), adalah sebagai berikut, kecuali ...

    • A.

      Hard disk harus support dengan OS Linux

    • B.

      Tersedia partisi yang cukup untuk OS

    • C.

      Komputer dapat melakukan booting

    • D.

      Prosesor minimal Pentium 4

    • E.

      Kenali konfigurasi hardware yang dipakai

    Correct Answer
    D. Prosesor minimal Pentium 4
    Explanation
    The given answer is incorrect. The correct answer should be "Kenali konfigurasi hardware yang dipakai." This is because when installing a text-based network OS (Linux), it is important to be familiar with the hardware configuration being used in order to ensure compatibility and proper installation. The other options listed are also important considerations during the installation process, such as having a hard disk that supports the OS, enough partition space, and the ability to boot the computer.

    Rate this question:

  • 5. 

    Dalam proses instalasi Linux SuSe ada beberapa tahapan yang harus dilewati, tahapan pertama adalah ... 

    • A.

      Pembuatan disk boot

    • B.

      Menginstal kernel

    • C.

      Pembuatan partisi dan file system

    • D.

      Menginstal paket aplikasi

    • E.

      Menginstal LILO

    Correct Answer
    C. Pembuatan partisi dan file system
    Explanation
    The correct answer is "Pembuatan partisi dan file system". In the process of installing Linux SuSe, one of the initial steps is creating partitions and file systems. This involves dividing the hard drive into separate sections called partitions, which can be used to organize and store data. Additionally, a file system is created on each partition to manage how data is stored and accessed. This step is crucial as it determines the structure and organization of the storage space on the computer.

    Rate this question:

  • 6. 

    Mengatur disk quota untuk user "yuppone" dapat dilakukan dengan perintah ...

    • A.

      # quota -yuppone

    • B.

      # touch aquota.yuppone

    • C.

      # edquota -u yuppone

    • D.

      # mount /home/yuppone

    • E.

      # quota check -vaug -yuppone

    Correct Answer
    C. # edquota -u yuppone
    Explanation
    The correct command to set disk quota for the user "yuppone" is "# edquota -u yuppone". This command is used to edit the disk quotas for a specific user. The other commands mentioned in the options are incorrect or unrelated to setting disk quotas for a user.

    Rate this question:

  • 7. 

    Partisi yang pertama kali dipasang pada sistem operasi Linux adalah ...

    • A.

      /boot, /opt

    • B.

      /boot, /

    • C.

      /boot. /home

    • D.

      /home, /opt

    • E.

      /swap, /

    Correct Answer
    E. /swap, /
    Explanation
    The first partition that is typically installed on a Linux operating system is the swap partition, which is used for virtual memory. The swap partition allows the system to temporarily store data that cannot fit into the physical memory. The second partition that is usually installed is the root partition (/), which contains the core files and directories of the operating system.

    Rate this question:

  • 8. 

    Pemasangan terminator pada jaringan bertopologi bus, berfungsi untuk ...

    • A.

      Meminimalkan kemungkinan kabel putus

    • B.

      Menghindari arus berlebih

    • C.

      Jaringan lebih rapi

    • D.

      Jaringan lebih mudah diperbaiki

    • E.

      Menghindari data bertabrakan dan hilang

    Correct Answer
    E. Menghindari data bertabrakan dan hilang
    Explanation
    Terminator pada jaringan bertopologi bus berfungsi untuk menghindari data bertabrakan dan hilang. Dalam jaringan bertopologi bus, semua perangkat terhubung ke satu kabel tunggal. Tanpa terminator, sinyal yang dikirim oleh satu perangkat dapat mencapai ujung kabel dan memantul kembali, menyebabkan tabrakan dengan sinyal yang dikirim oleh perangkat lain. Dengan pemasangan terminator, sinyal yang mencapai ujung kabel akan diserap, menghindari tabrakan dan kehilangan data.

    Rate this question:

  • 9. 

    Jika kita mempunyai IP kelas C dengan subnet mask 255.255.255.192, maka jumlah hostnya adalah ... 

    • A.

      2

    • B.

      62

    • C.

      192

    • D.

      255

    • E.

      510

    Correct Answer
    B. 62
    Explanation
    The given subnet mask 255.255.255.192 indicates that the last 2 bits of the last octet are used for subnetting. In a class C network, the last octet represents the host portion. With 2 bits available for host addressing, there are 2^2 = 4 possible combinations. However, the first combination (00) represents the network address and the last combination (11) represents the broadcast address. So, there are 2^2 - 2 = 2 possible host addresses. Therefore, the correct answer is 2.

    Rate this question:

  • 10. 

    Pada PC yang memiliki spesifikasi memory DDR3 terdapat pin dengan jumlah ...

    • A.

      Sebanyak 240 buah, hanya saja letak notch lebih ke arah kiri dengan freq. 2133 MHz

    • B.

      Sebanyak 240 buah (120 pin di tiap sisi) , freq. < 1066 MHz

    • C.

      Sebanyak 184 buah (92 pin di tiap sisi) , freq. 200-400 MHz

    • D.

      Sebanyak 128 buah (64 pin di tiap sisi)

    • E.

      Sebanyak 64 buah (32 pin di tiap sisi)

    Correct Answer
    A. Sebanyak 240 buah, hanya saja letak notch lebih ke arah kiri dengan freq. 2133 MHz
    Explanation
    The correct answer is "Sebanyak 240 buah, hanya saja letak notch lebih ke arah kiri dengan freq. 2133 MHz". This answer states that a PC with DDR3 memory has 240 pins, but the notch is positioned more towards the left side, and the frequency is 2133 MHz. This is the most specific and accurate answer among the options provided, as it mentions both the pin count and the frequency of the DDR3 memory.

    Rate this question:

  • 11. 

    Yang menunujukkan drive hard disk pada sistem operasi Linux, adalah ...

    • A.

      /mount

    • B.

      /dev

    • C.

      /dev/hda6

    • D.

      /dev/tty

    • E.

      C:/

    Correct Answer
    C. /dev/hda6
    Explanation
    The correct answer is /dev/hda6. In Linux, the /dev directory contains device files that represent hardware devices in the system. The /dev/hda6 file represents the sixth partition on the primary IDE hard disk. By accessing this file, the operating system can interact with the specific hard disk drive and perform various operations such as reading and writing data.

    Rate this question:

  • 12. 

    Dalam model OSI layer, yang berfungsi untuk menentukan pertukaran frame data yang melewati kabel adalah ...

    • A.

      Network Layer

    • B.

      Physical Layer

    • C.

      Transport Layer

    • D.

      Session Layer

    • E.

      Data Link Layer

    Correct Answer
    E. Data Link Layer
    Explanation
    The Data Link Layer is responsible for determining the exchange of frame data that passes through the cable in the OSI model. This layer is responsible for establishing and terminating the link between two devices, as well as for detecting and correcting errors in the physical transmission of data. It also handles flow control and manages access to the physical medium. Therefore, it is the Data Link Layer that performs the necessary functions to ensure reliable and error-free communication over the cable.

    Rate this question:

  • 13. 

    Berikut ini adalah langkah-langkah cara memasang RAM pada PC : 1. Buka casing PC 2. Masukkan RAM pada slot RAM 3. Jalankan memori test 4. Nyalakan PC 5. Matikan PC Berdasarkan langkah-langkah di atas, urutan pemasangan RAM pada PC yang benar adalah ...   

    • A.

      4-3-5-1-2

    • B.

      5-1-2-4-3

    • C.

      4-1-2-3-5

    • D.

      3-5-1-2-4

    • E.

      5-2-3-1-4

    Correct Answer
    B. 5-1-2-4-3
    Explanation
    The correct answer is 5-1-2-4-3. This is the correct sequence for installing RAM on a PC based on the given steps. The steps indicate that the RAM should be inserted in step 2, which corresponds to the second position in the answer sequence. Then, the PC should be turned on in step 4, which corresponds to the fourth position in the answer sequence. Finally, the PC should be turned off in step 5, which corresponds to the fifth position in the answer sequence. Therefore, the correct sequence is 5-1-2-4-3.

    Rate this question:

  • 14. 

    Berikut ini adalah langkah-langkah instalasi Windows 8.1 : 1. Personalisasi, mengisi nama komputer 2. Mengisi user name, password dan password hint 3. Membuat partisi hard disk 4. Proses instalasi dan restart 5. Beri cek list pada pernyataan lisensi "I Accept Licence Terms" 6. Pilih tipe instalasi : Upgrade atau Custom 7. Klik tombol Install 8. Booting dari CD/DVD 9. Pilih Bahasa dan format time Urutan proses instalasi Windows 8.1 yang paling benar adalah ...

    • A.

      8-9-7-5-6-3-4-1-2

    • B.

      8-9-7-6-5-4-3-2-1

    • C.

      8-9-1-2-3-5-6-7-4

    • D.

      1-2-9-5-6-3-7-4-8

    • E.

      8-6-5-4-3-1-2-9-7

    Correct Answer
    A. 8-9-7-5-6-3-4-1-2
    Explanation
    The correct answer is 8-9-7-5-6-3-4-1-2. This sequence follows the correct steps for installing Windows 8.1. It starts with the step of booting from the CD/DVD (8), then selecting the language and time format (9), followed by accepting the license terms (7). After that, the user needs to choose the type of installation (5) and click the install button (6). Next, they need to create a hard disk partition (3) and proceed with the installation process, which includes restarting the system (4). Finally, they need to personalize the computer by entering a computer name (1) and setting up a username, password, and password hint (2).

    Rate this question:

  • 15. 

    Khalid mencoba mengoperasikan komputer. Setelah menghubungkan CPU dengan kelistrikan, terdengar bunyi beep panjang sebanyak 1x dari perangkat keras. Manakah hal berikut yang menyebabkan bunyi beep tersebut ...

    • A.

      Kartu grafis mengalami short circuit

    • B.

      Cache mengalami error

    • C.

      Komputer dalam kondisi prima

    • D.

      Memori utama mengalami kerusakan

    • E.

      Terdapat error pada modul memori video

    Correct Answer
    D. Memori utama mengalami kerusakan
    Explanation
    The long beep sound indicates that there is a problem with the main memory of the computer. This could mean that the RAM (Random Access Memory) is damaged or not functioning properly. The beep is a warning signal from the computer's BIOS (Basic Input/Output System) to indicate a memory error.

    Rate this question:

  • 16. 

    CMOS merupakan salah satu komponen vital dalam penyimpanan konfigurasi BIOS. Ada kala konfigurasi BIOS dapat salah dan mengakibatkan error. Untuk mengatasi hal tersebut, seorang pengguna dapat melakukan clear CMOS dengan cara mengubah posisi jumper. Manakah posisi jumper yang dimaksud ?

    • A.

      Posisi 1 saja

    • B.

      Posisi 1 dan 2

    • C.

      Posisi 1 dan 3

    • D.

      Posisi 2 dan 3

    • E.

      Posisi 1, 2 dan 3

    Correct Answer
    D. Posisi 2 dan 3
    Explanation
    The correct answer is "Posisi 2 dan 3". When a user needs to clear the CMOS to fix a BIOS configuration error, they can do so by changing the position of the jumper on the motherboard. In this case, the jumper should be moved to positions 2 and 3. This action will reset the CMOS settings, allowing the user to start fresh and potentially resolve any issues caused by incorrect BIOS configuration.

    Rate this question:

  • 17. 

    Topologi Star adalah topologi yang paling banyak digunakan hingga saat ini. Berikut ini adalah gambar topologi star. Jumlah potongan kabel, jenis kabel dan jumlah konektor RJ-45 yang digunakan untuk implementasi topologi tersebut adalah ...

    • A.

      7, UTP, 14

    • B.

      7, STP, 14

    • C.

      8, UTP, 16

    • D.

      8, STP, 14

    • E.

      7, UTP, 16

    Correct Answer
    C. 8, UTP, 16
    Explanation
    The correct answer is 8, UTP, 16. This is because in a star topology, each device is connected to a central hub or switch using a separate cable. Since there are 8 devices in the topology, there will be 8 cables required. UTP (Unshielded Twisted Pair) is the most commonly used type of cable in networking, making it the likely choice for this implementation. Each device will require 2 connections, one for transmitting and one for receiving data, so a total of 16 RJ-45 connectors will be needed.

    Rate this question:

  • 18. 

    MAC (Media Access Control) adalah alamat fisik suatu network card yang diberikan oleh pabrik, bersifat unik, dan berfungsi sebagai identitas perangkat tersebut. Jenis security pada jaringan nirkabel yang memanfaatkan fitur AP (Access Point) dengan cara memblokir komputer berdasarkan media access control adalah ...

    • A.

      MAC Controlling

    • B.

      MAC Blocking

    • C.

      MAC Security

    • D.

      MAC Firewall

    • E.

      MAC Filtering

    Correct Answer
    E. MAC Filtering
    Explanation
    MAC Filtering adalah jenis keamanan pada jaringan nirkabel yang memanfaatkan fitur AP (Access Point) dengan cara memblokir komputer berdasarkan media access control. Dalam MAC Filtering, daftar MAC address yang diizinkan atau yang diblokir dapat dikonfigurasi di Access Point. Jika MAC address komputer tidak terdaftar dalam daftar yang diizinkan, maka komputer tersebut akan diblokir untuk mengakses jaringan. Ini membantu mencegah akses yang tidak sah ke jaringan nirkabel.

    Rate this question:

  • 19. 

    Wildan sebagai teknisi jaringan hendak memantau sebuah PC yang koneksinya sering terputus. Untuk itu Wildan melakukan pengecekan koneksi dengan mengirim echo request sebanyak 10 kali. Perintah yang paling cocok adalah ...

    • A.

      Ping -n

    • B.

      Ping -n 10

    • C.

      Ping -t

    • D.

      Ping -t 10

    • E.

      Ping 10

    Correct Answer
    B. Ping -n 10
    Explanation
    The correct answer is "ping -n 10". The command "ping -n" is used to send echo requests to a specific IP address or domain name. The number after the "-n" flag specifies the number of echo requests to be sent. In this case, Wildan wants to send 10 echo requests to monitor the connection, so the command "ping -n 10" is the most suitable option.

    Rate this question:

  • 20. 

    2 PC saling terhubung melalui switch. Ketika dilakukan ping dari PC-1 ke PC-2 hasilnya Request time out, namun jika dilakukan ping dari PC-2 ke PC-1 hasilnya Reply. Manakah dari pernyataan berikut yang benar tentang keadaan tersebut ...

    • A.

      Alamat IP PC-1 tidak 1 kelas

    • B.

      Firewall PC-1 memblokir paket icmp

    • C.

      Firewall PC-2 memblokir paket icmp

    • D.

      Kabel UTP Switch ke PC-2 menggunakan kabel cross

    • E.

      Kabel UTP Switch ke PC-2 putus

    Correct Answer
    C. Firewall PC-2 memblokir paket icmp
    Explanation
    The correct answer is "Firewall PC-2 memblokir paket icmp". This is because when PC-1 pings PC-2, it receives a "Request time out" message, indicating that the ping packet is not reaching PC-2. However, when PC-2 pings PC-1, it receives a "Reply" message, indicating that the ping packet is successfully reaching PC-1. This suggests that there may be a firewall on PC-2 that is blocking incoming ICMP packets, causing the ping from PC-1 to fail.

    Rate this question:

  • 21. 

    Jika dalam sebuah jaringan komputer klien yang berbasis Windows tidak mendapatkan IP DHCP lease yang benar, perintah yang dapat digunakan adalah ...

    • A.

      Ipconfig /reload

    • B.

      Ifconfig /restart

    • C.

      Ifconfig /renew

    • D.

      Ipconfig /renew

    • E.

      Ipconfig /new

    Correct Answer
    D. Ipconfig /renew
    Explanation
    The correct answer is "ipconfig /renew". This command is used in Windows to renew the IP address lease from the DHCP server. When a client is unable to obtain the correct IP DHCP lease, using this command will trigger the client to send a request to the DHCP server for a new lease. This can help resolve any issues with the current lease and ensure that the client gets the correct IP address configuration from the server.

    Rate this question:

  • 22. 

    Terdapat daftar perangkat keras sebagai berikut : 1. Intel Xeon E5-1285 3 GHz (Rp 3.000.000,-) 2. Prosesor Intel Core i7 5557U 2.5 GHz (Rp 2.500.000,-) 3. RAM DDR3 8 GB 1000MHz (Rp 750.000,-) 4. RAM DDR3 4 GB 1333MHz (Rp 500.000,-) 5. RAM DDR4 8 GB 3333MHz (Rp 800.000,-) Jika dibutuhkan sebuah server untuk keperluan Warnet untuk keperluan permainan lokal, maka manakah kombinasi spesifikasi perangkat keras yang optimal dan ekonomis ?

    • A.

      1, 5

    • B.

      1, 3

    • C.

      1, 4 

    • D.

      2, 5

    • E.

      2, 3

    Correct Answer
    D. 2, 5
    Explanation
    The combination of hardware specifications that would be optimal and economical for a local gaming internet cafe would be option 2, which includes the Intel Core i7 5557U 2.5 GHz processor, and option 5, which includes the DDR4 8 GB 3333MHz RAM. This combination provides a powerful processor and fast RAM, which are essential for gaming performance, while also being cost-effective compared to the other options listed.

    Rate this question:

  • 23. 

    Setelah melakukan instalasi aplikasi yang didapat secara illegal dari internet, komputer Ilham menjadi sangat lambat, namun secara fungsi masih berjalan normal. Dilihat dari task manager, terlihat pemakaian memory dan prosesor mencapai 100%. Berdasarkan pernyataan tersebut, kemungkinan besar komputer Ilham mengalami serangan berupa ...

    • A.

      Trojan horse

    • B.

      Virus

    • C.

      Worm

    • D.

      Denial of Service (DoS)

    • E.

      Deface

    Correct Answer
    A. Trojan horse
    Explanation
    Based on the given information, it is likely that Ilham's computer is experiencing a Trojan horse attack. A Trojan horse is a type of malware that disguises itself as a legitimate program but contains malicious code. It can slow down the computer and consume a large amount of memory and processor usage, as observed in the task manager. Unlike viruses and worms, Trojans do not replicate themselves but can still cause harm to the system. The other options, such as virus, worm, DoS, and deface, do not align with the symptoms described in the question.

    Rate this question:

  • 24. 

    Sebuah kabel UTP disusun secara straight, setelah disambungkan antara PC dan Switch, indikator lampunya tidak menyala. Setelah dilakukan pengecekan dengan LAN Cable Tester, ternyata ada beberapa kabel yang tidak menyala. Maka manakah kemungkinan kabel berikut yang menjadi penyebabnya ...

    • A.

      Kabel no 3 mati

    • B.

      Kabel no 5 mati

    • C.

      Kabel no 8 mati

    • D.

      Kabel no 4 diterima di no 5

    • E.

      Kabel no 5 diterima di no 7

    Correct Answer
    A. Kabel no 3 mati
    Explanation
    The possible explanation for cable no 3 being the cause is that it might be damaged or faulty. This could result in the indicator light not turning on and the cable not functioning properly.

    Rate this question:

  • 25. 

    Langkah-langkah dalam merakit PC sebelum memasang Power Supply adalah sebagai berikut : 1. Memasang heatsink 2. Menyiapkan motherboard 3. Memasang modul memori 4. Memasang motherboard pada casing 5. Memasang prosesor Urutan langkah yang benar adalah ...

    • A.

      1-2-3-4-5

    • B.

      1-3-2-4-5

    • C.

      2-5-1-3-4

    • D.

      2-5-4-3-1

    • E.

      1-3-4-2-5

    Correct Answer
    C. 2-5-1-3-4
    Explanation
    The correct order of steps in assembling a PC before installing the power supply is as follows: 2-5-1-3-4. First, the motherboard is prepared. Then, the processor is installed. Next, the heatsink is mounted. After that, the memory module is inserted. Finally, the motherboard is placed in the casing.

    Rate this question:

  • 26. 

    Konfigurasi BIOS dapat dihilangkan dengan cara ...

    • A.

      Meng-install ulang komputer

    • B.

      Melepas baterai CMOS

    • C.

      Mereset komputer

    • D.

      Membuka CPU

    • E.

      Mematikan komputer

    Correct Answer
    B. Melepas baterai CMOS
    Explanation
    The correct answer is "Melepas baterai CMOS". This is because the CMOS battery stores the BIOS settings and removing it will reset the BIOS configuration to its default state. By removing the CMOS battery, the BIOS configuration can be effectively eliminated.

    Rate this question:

  • 27. 

    Diketahui sebuah jaringan mempunyai IP Address 192.168.4.18/28. IP networknya adalah ....

    • A.

      192.168.4.20

    • B.

      192.168.4.19

    • C.

      192.168.4.17

    • D.

      192.168.4.16

    • E.

      192.168.4.15

    Correct Answer
    D. 192.168.4.16
    Explanation
    The given IP address 192.168.4.18/28 has a subnet mask of 28 bits, which means the first 28 bits of the IP address are the network address and the remaining 4 bits are for host addresses. The network address can be obtained by setting the host bits to zero. In this case, the network address would be 192.168.4.16, as it has the same first 28 bits as the given IP address. Therefore, the correct answer is 192.168.4.16.

    Rate this question:

  • 28. 

    Yang membedakan secara fisik atau terlihat antara NIC jenis ISA dan PCI adalah ...

    • A.

      Kecepatan transfer data

    • B.

      Warna lampu indikator

    • C.

      Jumlah pin

    • D.

      Jenis konektor yang digunakan

    • E.

      Teknologi yang digunakan

    Correct Answer
    C. Jumlah pin
    Explanation
    The physical or visible difference between ISA and PCI NIC types is the number of pins.

    Rate this question:

  • 29. 

    Collision Detection merupakan metode yang digunakan pada jaringan untuk mendeteksi ...

    • A.

      Pengiriman data

    • B.

      Penerimaan data

    • C.

      Transmisi data

    • D.

      Penyusupan data

    • E.

      Kerusakan data

    Correct Answer
    E. Kerusakan data
    Explanation
    Collision Detection is a method used in networking to detect when two or more devices on a network try to transmit data simultaneously, causing a collision. In this context, the correct answer, "Kerusakan data" (data damage), refers to the potential consequences of a collision. When collisions occur, data packets can become corrupted or lost, resulting in data damage. Therefore, collision detection is crucial in identifying and addressing these collisions to prevent data damage and ensure the successful transmission of data.

    Rate this question:

  • 30. 

    Keamanan yang digunakan pada jaringan wifi adalah ...

    • A.

      Hide SSID

    • B.

      Diberi antivirus

    • C.

      Difungsikan NAT

    • D.

      Broadcast SSID

    • E.

      Disable DHCP

    Correct Answer
    A. Hide SSID
    Explanation
    The correct answer is "hide SSID". Hiding the SSID (Service Set Identifier) is a security measure used in Wi-Fi networks. When the SSID is hidden, the network name is not broadcasted, making it more difficult for unauthorized users to detect and connect to the network. This adds an extra layer of security as it prevents potential attackers from easily identifying and targeting the network.

    Rate this question:

  • 31. 

    Diketahui IP Address 172.172.17.7/27. Jumlah host tiap subnet adalah ...

    • A.

      32

    • B.

      28

    • C.

      30

    • D.

      24

    • E.

      26

    Correct Answer
    C. 30
    Explanation
    The given IP address is 172.172.17.7 with a subnet mask of /27. This means that the first 27 bits of the IP address are used to identify the network, leaving 5 bits for host addresses. With 5 bits, we can have 2^5 or 32 possible combinations. However, the first and last combinations are reserved for the network and broadcast addresses respectively, leaving us with 30 possible host addresses per subnet. Therefore, the correct answer is 30.

    Rate this question:

  • 32. 

    Diketahui IP komputer Mr. Ghilman 191.1.67.5, berapa Net-ID dan Host-ID komputer tersebut ?

    • A.

      Net-ID 191, Host-ID 1.67.5

    • B.

      Net-ID 191.1.67, Host-ID 5

    • C.

      Net-ID 191.1, Host-ID 67.5

    • D.

      Net-ID 67.5, Host-ID 191.1

    • E.

      Net-ID 1.67.5, Host-ID 191

    Correct Answer
    C. Net-ID 191.1, Host-ID 67.5
    Explanation
    The given IP address is 191.1.67.5. The Net-ID is the first three segments of the IP address, which are 191.1.67. The Host-ID is the last segment of the IP address, which is 5. Therefore, the Net-ID is 191.1 and the Host-ID is 67.5.

    Rate this question:

  • 33. 

    Berfungsi untuk membedakan Network-ID dengan Host-ID adalah fungsi ...

    • A.

      IP Address

    • B.

      Subnet Mask

    • C.

      Network Address

    • D.

      Broadcast Address

    • E.

      MAC Address

    Correct Answer
    B. Subnet Mask
    Explanation
    The subnet mask is used to differentiate the network ID from the host ID in an IP address. It determines which part of the IP address represents the network and which part represents the host. By using the subnet mask, devices on the network can determine if a destination IP address is within the same network or a different network, allowing for proper routing of network traffic.

    Rate this question:

  • 34. 

    Perangkat yang perlu ditambahkan jika tegangan listrik sering naik turun adalah ...

    • A.

      Batteray

    • B.

      UPS

    • C.

      Accu

    • D.

      Power Supply

    • E.

      AVR 

    Correct Answer
    E. AVR 
    Explanation
    Jawaban yang benar adalah AVR (Automatic Voltage Regulator). AVR digunakan untuk mengatur tegangan listrik yang naik turun secara otomatis sehingga perangkat elektronik terlindungi dari fluktuasi tegangan yang dapat merusaknya. Dengan menggunakan AVR, tegangan listrik akan tetap stabil dan aman untuk digunakan.

    Rate this question:

  • 35. 

    Di bawah ini yang tidak termasuk dalam layer dalam Model TCP/IP adalah ...

    • A.

      Application

    • B.

      Presentation

    • C.

      Network Access

    • D.

      Transport

    • E.

      Internet

    Correct Answer
    E. Internet
    Explanation
    The correct answer is "Internet." The TCP/IP model consists of four layers: the Application layer, the Transport layer, the Network layer, and the Network Access layer. The Internet is not a layer in the TCP/IP model; it is a global network that connects multiple networks together.

    Rate this question:

  • 36. 

    Processor P3667Mhz/256/133/1,2 V. Angka 256 menunjukkan ...

    • A.

      Speed (kecepatan)

    • B.

      PC Processor

    • C.

      Voltase processor

    • D.

      Bus Processor

    • E.

      Cache memory

    Correct Answer
    E. Cache memory
    Explanation
    The number 256 in the given processor specification represents the size of the cache memory. Cache memory is a small, high-speed memory that stores frequently accessed data and instructions to improve the overall performance of the processor. It allows the processor to quickly access data without having to retrieve it from the slower main memory. Therefore, the number 256 indicates that the processor has a cache memory size of 256 kilobytes.

    Rate this question:

  • 37. 

    Test yang dilakukan oleh PC pada saat booting untuk mengecek fungsi-fungsi komponen pendukung PC apakah bekerja dengan baik adalah ...

    • A.

      BOOT

    • B.

      CMOS

    • C.

      BIOS

    • D.

      BEEP

    • E.

      POST

    Correct Answer
    E. POST
    Explanation
    POST stands for Power-On Self-Test. It is a test performed by the computer during the booting process to check if all the supporting components of the PC are functioning properly. This test ensures that the hardware components such as the processor, memory, and input/output devices are in working condition before the operating system is loaded. It helps in detecting any potential issues or errors that may prevent the computer from booting successfully.

    Rate this question:

  • 38. 

    IP Address yang menunjukkan nomor jaringan (identitas segmen) disebut dengan …

    • A.

      IP Public

    • B.

      IP Broadcast

    • C.

      IP Private

    • D.

      Net-ID

    • E.

      Host-ID

    Correct Answer
    D. Net-ID
    Explanation
    The correct answer is "Net-ID." The Net-ID refers to the network portion of an IP address, which identifies the network or segment to which a device belongs. It helps in routing the data packets to the correct network. The Host-ID, on the other hand, refers to the host or individual device within the network. IP Public and IP Private refer to the classification of IP addresses based on their accessibility on the internet. IP Broadcast is used to send data packets to all devices within a network.

    Rate this question:

  • 39. 

    Protokol yang digunakan untuk menjembatani antara sistem berbasis Novell Netware dengan sistem berbasis MS Windows adalah ...

    • A.

      IPX/SPX

    • B.

      NovellTalk

    • C.

      AppleTalk

    • D.

      NetBeui

    • E.

      TCP/IP

    Correct Answer
    A. IPX/SPX
    Explanation
    IPX/SPX is the protocol used to bridge between Novell Netware-based systems and MS Windows-based systems. This protocol allows for communication and data transfer between the two different systems, ensuring compatibility and seamless integration. IPX/SPX is specifically designed for Novell Netware networks and provides reliable and efficient communication between different platforms.

    Rate this question:

  • 40. 

    Booting komputer dengan menekan tombol CTRL-ALT-DEL bersama-sama disebut ....

    • A.

      Warm booting

    • B.

      Cool booting

    • C.

      Slow booting

    • D.

      Restart

    • E.

      Fine booting

    Correct Answer
    A. Warm booting
    Explanation
    Warm booting refers to the process of restarting a computer system without completely shutting it down. This can be done by pressing the CTRL-ALT-DEL keys simultaneously. It is called "warm" booting because the computer is already powered on and only the operating system is restarted. This allows for a quick reboot and is often used to resolve minor software issues or refresh the system.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.