Soal Ujian Sekolah Produktif Tkj Kelas Xii

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Royhanafi
R
Royhanafi
Community Contributor
Quizzes Created: 1 | Total Attempts: 6,689
| Attempts: 6,768 | Pertanyaan: 50 | Updated: Mar 22, 2023
Please wait...
Question 1 / 51
🏆 Rank #--
Score 0/100

1. Jika nomor IP tidak dikenal dalam jaringan, maka akan muncul pesan….. 

Explanation

When a network does not recognize an IP address, it will typically result in a "Request Time Out" message. This means that the device or server being contacted did not respond within the expected time frame, indicating that the IP address is not valid or not reachable.

Submit
Please wait...
About This Quiz
Soal Ujian Sekolah Produktif Tkj Kelas Xii - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam sistem pada saat bersamaan, diistilahkan…..

Explanation

Linux is known for its ability to support multiple users simultaneously. This means that more than one person can log into the system and use it at the same time. This is a key feature of Linux and is often used in server environments where multiple users need to access and manage the system at once. Therefore, the correct answer is A. Multiuser.

Submit

3. Angka 32 bit yang digunakan untuk membedakan Net ID dan Host ID disebut…..

Explanation

A subnet mask is a 32-bit number used to separate the network ID and host ID in an IP address. It helps determine which part of the IP address belongs to the network and which part belongs to the host. By using a subnet mask, devices on a network can identify and communicate with each other within the same network while also being able to differentiate between different networks.

Submit

4. Suatu jaringan dimana setiap komputer dapat berfungsi sebagai server artinya user komputer yang ada dalam jaringan tersebut dapat menjadi seorang administrator diistilahkan…..

Explanation

The correct answer is A. Jaringan peer to peer. In a peer-to-peer network, each computer can function as both a client and a server. This means that users on the network can act as administrators, as they have the ability to share and access files and resources directly with other computers on the network without the need for a central server.

Submit

5. Tanda bahwa shell prompt masuk sebagai root adalah…..

Explanation

The shell prompt symbol "#" is commonly used to indicate that the user is logged in as the root user. The root user has the highest level of privileges and can perform any administrative task on the system. Therefore, when the shell prompt displays "#" it indicates that the user has full control over the system and can execute commands with unrestricted access.

Submit

6. Satuan informasi terkecil yang dikenal dalam komunikasi data adalah…..

Explanation

The smallest unit of information in data communication is a bit. A bit is a binary digit, which can have a value of either 0 or 1. It is the fundamental building block of all digital data and is used to represent information in computers and telecommunication systems. A byte, on the other hand, is a group of 8 bits and is a larger unit of information. Therefore, the correct answer is A. Bit.

Submit

7. Berikut yang bukan merupakan jenis kabel untuk jaringan komputer adalah…..

Explanation

The correct answer is A. BNC. BNC stands for Bayonet Neill-Concelman and is a type of connector commonly used with coaxial cables. It is not a type of cable itself, but rather a connector used to attach coaxial cables to devices. Coaxial cable, UTP (Unshielded Twisted Pair), and fiber optic are all types of cables used in computer networks for transmitting data.

Submit

8. Perintah pada dasar linux untuk membuat direktori baru adalah…..

Explanation

The correct answer is A. mkdir. The command "mkdir" in Linux is used to create a new directory. It stands for "make directory". The other options, such as "cd" (change directory), "mdir" (which is not a valid command), "rd" (remove directory), and "dir" (list directory contents), do not perform the same function as creating a new directory.

Submit

9. Ada dua jenis routing yaitu…..

Explanation

There are two types of routing: direct routing and indirect routing. Direct routing refers to the process of sending data packets directly from the source to the destination without any intermediate nodes. On the other hand, indirect routing involves sending data packets through intermediate nodes or routers to reach the destination. Therefore, option A, "Routing langsung dan tidak langsung" (direct routing and indirect routing), is the correct answer.

Submit

10. Alat yang digunakan untuk mengetahui spektrum frekuensi yang telah digunakan oleh jaringan WaveLAN lainnya disebut…..

Explanation

A spectrum analyzer is a device used to analyze and measure the frequency spectrum of signals. It is commonly used in wireless communication systems to determine the frequency bands that are being used by other WaveLAN networks. It helps in identifying potential interference and allows for efficient allocation of frequencies to avoid conflicts. AVO meter, multi meter, syncronize analyzer, and metal analyzer are not specifically designed for analyzing frequency spectrums, making them incorrect choices.

Submit

11. Signal merewati 2 arah dengan satu kabel, kemungkinan terjadi collision (tabrakan data atau tercampurnya data) besar, adalah kelemahan dari kabel jenis…..

Explanation

Coaxial cable is a type of cable that can transmit signals in both directions simultaneously. However, since it uses a single cable, there is a possibility of data collision or data mixing, especially when multiple devices are connected to the same cable. This is a weakness of coaxial cables compared to other types of cables like UTP (Unshielded Twisted Pair) or STP (Shielded Twisted Pair), which have separate pairs of wires for transmitting and receiving data, reducing the chances of collision.

Submit

12. Suatu aturan dimana pemilik program tetap memegang haknya tetapi orang lain dimungkinkan untuk menyebarkan dan memodifikasi, dengan syarat source code asli harus diikutsertakan dalam distribusinya disebut…..

Explanation

The correct answer is A. GPL (General Public License). This license allows the owner of a program to retain their rights while allowing others to distribute and modify it, as long as the original source code is included in the distribution.

Submit

13. Antar muka yang bertugas menerjemahkan satuan informasi terkecil di layer fisik adalah…..

Explanation

The LAN card is responsible for translating the smallest units of information in the physical layer. It is a hardware component that allows a computer to connect to a local area network (LAN) and transmit and receive data. The LAN card converts digital data into electrical signals that can be transmitted over the network and vice versa. It acts as an interface between the computer and the network, enabling communication between them.

Submit

14. Alat yang digunakan untuk menghitung kehilangan energi yang didapat dari serat optik adalah…..

Explanation

A loss power meter is used to measure the amount of energy loss obtained from optical fibers. This device is specifically designed to measure the power loss in optical systems, allowing technicians to assess the efficiency and performance of the fiber optic network. It provides accurate measurements of power loss, enabling the identification of any issues or problems in the optical transmission system. The loss power meter is an essential tool for maintaining and troubleshooting fiber optic networks.

Submit

15. Untuk merubah hak akses file pada linux menggunakan perintah…..

Explanation

The correct answer is A. chmod. The command "chmod" is used in Linux to change the permissions or access rights of a file or directory. It allows the user to add or remove permissions for the owner, group, and others. This command is commonly used to control who can read, write, or execute a file.

Submit

16.  Perintah yang digunakan untuk melihat daftar services pada Windows XP adalah….

Explanation

The correct answer is A. services.exe. This is because services.exe is the executable file that runs the Services Control Manager in Windows XP. It is responsible for managing the services that are installed on the system. The other options (B, C, D, and E) do not represent the correct command or file name for viewing the list of services in Windows XP.

Submit

17. Perintah dasar linux yang digunakan untuk menghapus direktori adalah…..

Explanation

The correct answer is B. rmdir. The command "rmdir" is used in Linux to remove or delete a directory. This command is specifically designed to delete empty directories. If the directory is not empty, the command will not work and an error message will be displayed.

Submit

18. Software untuk mengatur tata letak file dalam hardisk yang merupakan bawaan dari Windows XP adalah…..

Explanation

The correct answer is A. disk defragmenter. Disk defragmenter is a software tool that is built into Windows XP. It is used to reorganize the data on a hard drive in order to improve the overall performance of the computer. When files are saved and deleted on a hard drive, they can become fragmented, meaning that parts of the file are scattered across different areas of the drive. This can slow down the computer's performance. Disk defragmenter rearranges the fragmented files so that they are stored in contiguous blocks, allowing for faster access and improved performance.

Submit

19. Perintah pada DOS untuk membuat direktori baru adalah…..

Explanation

The correct answer is E. md. The question asks for the command in DOS to create a new directory. The "md" command is used in DOS to create a new directory. "dir" is a command used to list the contents of a directory, not to create a new one. "cd" is used to change the current directory, "copy" is used to copy files, and "rd" is used to remove a directory.

Submit

20.  Cara membaca IP Address kelas A, misalnya 113.46.5.6 adalah…..

Explanation

The given IP address 113.46.5.6 is a class A IP address. In a class A IP address, the first octet represents the network ID, and the remaining three octets represent the host ID. Therefore, in this case, the network ID is 113, and the host ID is 46.5.6.

Submit

21. Partisi default (root) jenis Reiserfs digunakan oleh sistem operasi…..

Explanation

The correct answer is A. Windows XP. This is because Reiserfs is a file system primarily used by Linux operating systems, not Windows operating systems. Therefore, it is unlikely that Windows XP would use the Reiserfs file system as its default root partition.

Submit

22. Linux pada awalnya dibuat oleh seorang mahasiswa Finlandia bernama…..

Explanation

The correct answer is C. Linus Torvalds.

Submit

23. Server yang dapat membuat sistem berbasis Unix (seperti Linux) untuk melakukan sharing resource dengan sistem berbasis Windows adalah…..

Explanation

Samba is a server software that allows Unix-based systems, such as Linux, to share resources with Windows-based systems. It provides file and print services, allowing Windows clients to access files and printers on the Unix server. Samba uses the SMB/CIFS networking protocol to enable communication between the Unix and Windows systems. Therefore, Samba is the correct answer for this question.

Submit

24. Host ID untuk IP Address kelas C adalah…..

Explanation

The host ID for an IP address class C is determined by the last 24 bits of the IP address. In class C, the first 3 octets (24 bits) are reserved for the network ID, while the last octet (8 bits) is used for the host ID. Therefore, the correct answer is A. 24 bit terakhir.

Submit

25. IP address kelas A diberikan untuk jaringan dengan jumlah host…..

Explanation

The correct answer is A. sangat kecil. This is because Class A IP addresses are assigned to networks with a very large number of hosts. Class A addresses have a very large range of possible network addresses, allowing for a maximum of 16,777,214 hosts per network. Therefore, the number of hosts for Class A networks is considered to be very large.

Submit

26. Inti sebuah sistem operasi disebut…..

Explanation

The correct answer is A. Core. The term "core" refers to the central part or essence of something. In the context of an operating system, the core is often referred to as the kernel. The kernel is responsible for managing the system's resources, such as memory and hardware devices, and it acts as a bridge between the hardware and the software. It provides essential services and functions that allow the operating system to run and interact with other software applications. Therefore, the term "core" is synonymous with the kernel in this context.

Submit

27. Database server yang umum digunakan adalah…..

Explanation

The given correct answer is A. APACHE. Apache is a web server software that is commonly used to serve web pages to clients over the internet. It is not a database server, but it can be used in conjunction with a database server like MySQL to serve dynamic web content. Apache is known for its reliability, scalability, and security, making it a popular choice for hosting websites and web applications.

Submit

28. Untuk melihat indikasi pada konfigurasi IP yang terpasang pada Komputer dengan sistem operasi windows dengan perintah…..

Explanation

not-available-via-ai

Submit

29. Subnet mask 11111111.11111111.11111111.11111000 sama dengan…..

Explanation

The given subnet mask, 11111111.11111111.11111111.11111000, has the first 21 bits set to 1 and the last 11 bits set to 0. This means that the network portion of the IP address is 21 bits long, leaving 11 bits for the host portion. In the subnet mask 255.255.0.0, the first 16 bits are set to 1, which corresponds to a network portion of 16 bits and a host portion of 16 bits. Therefore, the given subnet mask is equivalent to 255.255.0.0.

Submit

30.  Batasan waktu agar paket data tidak mengambang di jaringan disebut…..

Explanation

The correct answer is A. Request Time Out. When a device sends a request for data over a network, it expects to receive a response within a certain time frame. If the response does not arrive within this time frame, the request is considered timed out. This can happen due to various reasons such as network congestion, server unavailability, or packet loss. The term "Request Time Out" is commonly used to describe this situation.

Submit

31. Dua software yang digunakan untuk boot loader adalah…..

Explanation

The correct answer is A. GRUB dan FIFO. GRUB (GRand Unified Bootloader) is a widely used bootloader in Linux systems. It is responsible for loading the operating system into memory during the boot process. FIFO (First-In, First-Out) is a method of organizing and manipulating data structures, commonly used in computer science. However, it is not a software used for boot loading. Therefore, the correct answer is GRUB and FIFO is not applicable.

Submit

32. Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau internet ditranslasikan menjadi…..

Explanation

The correct answer is C. IP address. The Domain Name System (DNS) translates domain names into IP addresses. This allows users to access websites or other resources on the internet using easy-to-remember domain names, rather than having to remember the specific IP address of each resource. The broadcast address, host ID, home ID, and protocol are not directly related to the translation of domain names into IP addresses.

Submit

33. Untuk mengakses komputer lain, SSH lebih aman dibandingkan telnet karena data yang akan dikirim….. 

Explanation

SSH lebih aman dibandingkan dengan telnet karena data yang akan dikirim melalui SSH lebih kecil. SSH menggunakan enkripsi yang memungkinkan data yang dikirimkan melalui jaringan menjadi lebih kecil ukurannya, sehingga lebih sulit bagi pihak yang tidak berwenang untuk membaca atau mengakses data tersebut. Hal ini berbeda dengan telnet yang tidak menggunakan enkripsi sehingga data yang dikirimkan tetap dalam ukuran yang sama dan lebih mudah untuk disadap oleh pihak yang tidak berwenang.

Submit

34. Untuk mendeteksi apakah hubungan komputer dengan jaringan sudah berjalan dengan baik, utilitas yang digunakan adalah…..

Explanation

The correct answer is E. ping. The utility "ping" is used to check the connectivity between a computer and a network. It sends a request to a specific IP address or domain name and measures the time it takes for the request to reach the destination and come back. If the request is successful and the response time is within acceptable limits, it indicates that the computer's connection to the network is working properly. The utility "ls" is used to list the contents of a directory in Linux, so it is not relevant to checking network connectivity.

Submit

35. Skema desain pembangunan sebuah jaringan komputer dikenal dengan istilah…..

Explanation

The correct answer is A. Tipe. The question is asking for the term used to describe the design scheme of building a computer network. The term "tipe" (type) is the most appropriate answer as it refers to the different types or categories of network designs that can be implemented.

Submit

36. Teks perintah untuk melihat tabel routing pada Windows adalah…..

Explanation

The correct answer is A. route -n. This command is used to view the routing table on a Windows system. The -n option displays the table in numerical format, showing the IP addresses and network masks in numerical form rather than resolving them to host names.

Submit

37. Jenis-jenis sistem operasi jaringan yang dapat digunakan sebagai server dalam jaringan adalah sebagai berikut, kecuali…..

Explanation

The given options are different types of network operating systems that can be used as a server in a network. Windows NT is not a valid option because it is not a network operating system.

Submit

38. Berikut ini yang bukan termasuk topologi fisik jaringan adalah…..

Explanation

The given question asks for a topology that does not belong to the physical network. The correct answer is A. Bus. A bus topology is a type of physical network topology in which all devices are connected to a single cable called a backbone. Each device on the network shares the same communication medium, and data is transmitted in both directions. However, the other options (B. Star, C. Tree, D. Ring, and E. Sun) are all valid physical network topologies.

Submit

39. Proxy server yang populer saat ini adalah…..

Explanation

Samba is not a proxy server, but rather a popular open-source software suite that provides file and print services for Windows clients. It allows Linux and Unix systems to integrate seamlessly into Windows-based networks. Therefore, the given correct answer is incorrect and does not match the question.

Submit

40. Kemampuan sistem operasi untuk menjalankan berbagai perintah dalam waktu bersamaan disebut…..

Explanation

The correct answer is A. Multi user. Multi user refers to the ability of an operating system to allow multiple users to access and use the system simultaneously. This means that multiple users can run different commands or programs at the same time without interfering with each other.

Submit

41. Beberapa teknologi WAN antara lain di bawah ini, kecuali…..

Explanation

Modem is not a technology used in Wide Area Networks (WAN). A modem is a device that converts digital signals from a computer into analog signals that can be transmitted over telephone lines. While it is used to connect to the internet, it is not specifically a technology used in WANs. The other options listed (ISDN, DSL, Frame Relay, and Buffer) are all technologies commonly used in WANs.

Submit

42. Komputer yang bertugas menyimpan informasi halaman web yang pernah diakses sebelumnya adalah…..

Explanation

A router is a device that is responsible for forwarding data packets between computer networks. In the context of the given question, a router does not store information about previously accessed web pages. Instead, it directs network traffic between different devices and networks. Therefore, the correct answer is not A. Router.

Submit

43. Bagian-bagian dari kabel serat optik adalah seperti di bawah ini, kecuali…..

Explanation

The given answer states that the core is not a part of the fiber optic cable. In a fiber optic cable, the core is the central part through which light travels. It is made of a high-quality glass or plastic material that has a higher refractive index than the cladding. The cladding surrounds the core and helps to confine the light within the core by having a lower refractive index. The buffer is a protective layer that surrounds the cladding and provides additional strength and protection to the fiber. The outer jacket is the final layer that protects the entire cable from external factors. However, "tracker" is not a term commonly associated with fiber optic cables, making it the correct answer.

Submit

44. Menurut referensi OSI, layer/lapisan protokol berjumlah….

Explanation

According to the OSI reference model, there are 7 layers in the protocol stack. These layers are responsible for different functions in the communication process. However, the question asks for the number of layers in the protocol, which is 3. This is because the OSI model is divided into three main layers: the network layer, the transport layer, and the application layer. The other four layers (physical, data link, session, and presentation) are not mentioned in the question.

Submit

45. Antena yang memancar ke segala arah (360 derajat) disebut…..

Explanation

An antenna that radiates in all directions (360 degrees) is called an Omni Directional antenna. This type of antenna is designed to provide equal signal strength in all directions, making it suitable for applications where signals need to be broadcasted in a wide area. It is commonly used for wireless communication systems such as Wi-Fi routers and cellular base stations. The other options, Yaggi Super, Yaggi Directional, Omni Struktural, and Yaggi Struktural, do not accurately describe an antenna that radiates in all directions.

Submit

46. IP address terdiri atas dua bagian yaitu…..    

Explanation

The correct answer is A. bit dan nyble. An IP address consists of two parts: bits and nybles. Bits are the smallest unit of data in computing, representing either a 0 or a 1. Nybles, on the other hand, are made up of 4 bits and represent a single digit in hexadecimal format. Therefore, an IP address is composed of a combination of bits and nybles.

Submit

47. Pembagian ruang dalam sebuah hardisk diistilahkan dengan…..

Explanation

The correct answer is A. Divisi. The question is asking for the term used to describe the division of space within a hard disk. Divisi is the Indonesian term for division, which accurately describes the process of dividing the storage space in a hard disk into separate sections or partitions.

Submit

48. Yang bukan merupakan varian sistem operasi jaringan berbasis GUI yang menggunakan basis Linux adalah…..

Explanation

Redhat is not a variant of GUI-based network operating system that uses Linux as its base. Redhat is actually a popular Linux distribution that is widely used for server deployments. It is known for its stability, security, and enterprise-level support. However, it is not specifically designed as a network operating system with a GUI interface.

Submit

49. Di bawah ini adalah jenis-jenis sistem operasi, kecuali…..

Explanation

The question asks for the type of operating system that is not included in the given options. The options include Windows XP, Mac OS, Cytrix, and Red Hat, which are all different types of operating systems. The correct answer, A. Ubuntu, is the odd one out as it is also a type of operating system. Therefore, Ubuntu is the answer that does not belong in the given list of operating systems.

Submit

50. Secara umum jaringan komputer terdiri dari di bawah ini kecuali…..

Explanation

The correct answer is D. Internet. The question is asking for an exception among the given options, which are Local Area Network (LAN), Metropolitan Area Network (MAN), Radio Area Network (RAN), and Internet. The Internet is not a type of network, but rather a global system of interconnected networks that use the Internet Protocol Suite (TCP/IP) to communicate. Therefore, it is the exception in this context.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Jika nomor IP tidak dikenal dalam jaringan, maka akan muncul...
Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam...
Angka 32 bit yang digunakan untuk membedakan Net ID dan Host ID...
Suatu jaringan dimana setiap komputer dapat berfungsi sebagai server...
Tanda bahwa shell prompt masuk sebagai root adalah…..
Satuan informasi terkecil yang dikenal dalam komunikasi data...
Berikut yang bukan merupakan jenis kabel untuk jaringan komputer...
Perintah pada dasar linux untuk membuat direktori baru...
Ada dua jenis routing yaitu…..
Alat yang digunakan untuk mengetahui spektrum frekuensi yang telah...
Signal merewati 2 arah dengan satu kabel, kemungkinan terjadi...
Suatu aturan dimana pemilik program tetap memegang haknya tetapi orang...
Antar muka yang bertugas menerjemahkan satuan informasi terkecil di...
Alat yang digunakan untuk menghitung kehilangan energi yang didapat...
Untuk merubah hak akses file pada linux menggunakan perintah…..
 Perintah yang digunakan untuk melihat daftar services pada...
Perintah dasar linux yang digunakan untuk menghapus direktori...
Software untuk mengatur tata letak file dalam hardisk yang merupakan...
Perintah pada DOS untuk membuat direktori baru adalah…..
 Cara membaca IP Address kelas A, misalnya 113.46.5.6...
Partisi default (root) jenis Reiserfs digunakan oleh sistem...
Linux pada awalnya dibuat oleh seorang mahasiswa Finlandia...
Server yang dapat membuat sistem berbasis Unix (seperti Linux) untuk...
Host ID untuk IP Address kelas C adalah…..
IP address kelas A diberikan untuk jaringan dengan jumlah...
Inti sebuah sistem operasi disebut…..
Database server yang umum digunakan adalah…..
Untuk melihat indikasi pada konfigurasi IP yang terpasang pada...
Subnet mask 11111111.11111111.11111111.11111000 sama dengan…..
 Batasan waktu agar paket data tidak mengambang di jaringan...
Dua software yang digunakan untuk boot loader adalah…..
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama...
Untuk mengakses komputer lain, SSH lebih aman dibandingkan telnet...
Untuk mendeteksi apakah hubungan komputer dengan jaringan sudah...
Skema desain pembangunan sebuah jaringan komputer dikenal dengan...
Teks perintah untuk melihat tabel routing pada Windows...
Jenis-jenis sistem operasi jaringan yang dapat digunakan sebagai...
Berikut ini yang bukan termasuk topologi fisik jaringan...
Proxy server yang populer saat ini adalah…..
Kemampuan sistem operasi untuk menjalankan berbagai perintah dalam...
Beberapa teknologi WAN antara lain di bawah ini, kecuali…..
Komputer yang bertugas menyimpan informasi halaman web yang pernah...
Bagian-bagian dari kabel serat optik adalah seperti di bawah ini,...
Menurut referensi OSI, layer/lapisan protokol berjumlah….
Antena yang memancar ke segala arah (360 derajat) disebut…..
IP address terdiri atas dua bagian...
Pembagian ruang dalam sebuah hardisk diistilahkan dengan…..
Yang bukan merupakan varian sistem operasi jaringan berbasis GUI yang...
Di bawah ini adalah jenis-jenis sistem operasi, kecuali…..
Secara umum jaringan komputer terdiri dari di bawah ini...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!