Ujian Online Produktif Tkj Kelas Xi Smk Tewrpadu Al Anwar Durenan

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Supriadi
S
Supriadi
Community Contributor
Quizzes Created: 2 | Total Attempts: 2,132
Questions: 50 | Attempts: 127

SettingsSettingsSettings
Ujian Online Produktif Tkj Kelas Xi Smk Tewrpadu Al Anwar Durenan - Quiz

Kerjakan soal dengan sungguh sungguh ** SMK TERPADU AL ANWAR BISA **


Questions and Answers
  • 1. 

    Bila antar komputer berhubungan serta mengatur sumber-sumber yang ada disebut :

    • A.

      Network

    • B.

      Networking

    • C.

      Standalone

    • D.

      Workstation

    • E.

      Source

    Correct Answer
    A. Network
    Explanation
    The correct answer is "Network." This is because when computers are connected and able to share resources, it is referred to as a network. The term "networking" is closely related to this concept, as it involves the process of setting up and managing these connections. "Standalone" refers to a computer that is not connected to a network. "Workstation" refers to a computer that is part of a network and is used for specific tasks. "Source" does not accurately describe the scenario of computers being connected and sharing resources.

    Rate this question:

  • 2. 

    Bila suatu jaringan saling berhubungan dari satu lokasi ke lokasi lain yang relatif jauh (misalkan antarkota) disebut :

    • A.

      LAN

    • B.

      MAN

    • C.

      WAN

    • D.

      Internet

    • E.

      Intranet

    Correct Answer
    B. MAN
    Explanation
    A network that connects multiple locations that are relatively far apart, such as between cities, is called a Metropolitan Area Network (MAN). This type of network covers a larger geographic area than a Local Area Network (LAN) but is smaller than a Wide Area Network (WAN). The Internet and Intranet are different types of networks that can connect multiple locations, but they are not specifically designed for connecting locations that are relatively far apart.

    Rate this question:

  • 3. 

    Di bawah ini fungsi jaringan komputer, kecuali :

    • A.

      E-mail

    • B.

      File sharing

    • C.

      Detection

    • D.

      Mailing list

    • E.

      Teleconference

    Correct Answer
    C. Detection
    Explanation
    The given options are all functions of computer networks except for "detection." Detection is not typically considered a function of computer networks. The other options, such as e-mail, file sharing, mailing list, and teleconference, are all common functions that computer networks are used for.

    Rate this question:

  • 4. 

    Setiap PC dapat membuat account user serta berbagi sumber (sharing) sehingga masing-masing dapat bertindak sebagai client ataupun server termasuk tipe jaringan :

    • A.

      Pear to Pear

    • B.

      Client-server

    • C.

      Domain-server

    • D.

      Workstation

    • E.

      Shared Ethernet.

    Correct Answer
    A. Pear to Pear
    Explanation
    The correct answer is Peer to Peer. In a Peer to Peer network, each computer can create user accounts and share resources, allowing each computer to act as both a client and a server. This type of network does not rely on a central server for communication and resource sharing, as each computer can directly communicate and share resources with other computers in the network.

    Rate this question:

  • 5. 

    Berikut ini ciri-ciri topologi bus, kecuali :

    • A.

      Satu jalur umum yang berbentuk suatu garis lurus

    • B.

      Daisy Chain

    • C.

      Tidak membentuk jalur tertutup

    • D.

      Memiliki kabel yang langsung terhubung kecentral node

    • E.

      Berupa bentangan satu kabel yang kedua ujungnya ditutup oleh terminator dan terdapat node-node sepanjang kabel.

    Correct Answer
    C. Tidak membentuk jalur tertutup
    Explanation
    The correct answer is "tidak membentuk jalur tertutup". This is because all the other options describe characteristics of a bus topology, such as having a single common line, daisy chain configuration, direct connection to a central node, and a single cable with terminators at both ends and nodes along the cable. However, a bus topology does not form a closed loop, which means it does not create a closed circuit.

    Rate this question:

  • 6. 

    Apabila dalam jaringan jika salah satu segmen kabel putus, tidak akan mempengaruhi jaringan yang lain adalah ciri dari topologi :

    • A.

      Bus

    • B.

      Star

    • C.

      Ring

    • D.

      Bus-Star

    • E.

      Mesh

    Correct Answer
    E. Mesh
    Explanation
    The correct answer is Mesh. In a mesh topology, each device is connected to every other device in the network. This means that if one segment of the cable is cut, the network can still function because there are alternative paths for the data to travel. This redundancy ensures that the failure of one cable does not impact the connectivity of the rest of the network.

    Rate this question:

  • 7. 

    Berikut ini perangkat atau hardware dari jaringan, kecuali :

    • A.

      Hub

    • B.

      NIC

    • C.

      Terminator

    • D.

      Linux

    • E.

      Coaxial

    Correct Answer
    D. Linux
    Explanation
    The given options are all network devices or hardware components except for Linux. Hub, NIC (Network Interface Card), Terminator, and Coaxial are all examples of network equipment. Linux, on the other hand, is an operating system commonly used in networking environments but is not a physical hardware component.

    Rate this question:

  • 8. 

    Berikut ini adalah ciri kabel UTP, kecuali :

    • A.

      Kecepatan transfer data 10 – 100 Mbps

    • B.

      Konektor yang digunakan adalah RJ-45.

    • C.

      Panjang kabel maksimum 500 m

    • D.

      Digunakan dalam topologi star

    • E.

      Biaya per node lebih murah

    Correct Answer
    E. Biaya per node lebih murah
    Explanation
    The given options describe the characteristics of UTP cables. The options mention the speed of data transfer, the type of connector used, the maximum cable length, and the topology in which it is used. However, the option "Biaya per node lebih murah" (cheaper cost per node) does not describe a characteristic of UTP cables. Therefore, it is the correct answer as it is the only option that does not belong to the given list of UTP cable characteristics.

    Rate this question:

  • 9. 

    Jenis kabel berikut adalah sering digunakan dalam topologi Bus :

    • A.

      UTP

    • B.

      STP

    • C.

      Coaxial

    • D.

      Fiber Optic

    • E.

      Salah semua

    Correct Answer
    C. Coaxial
    Explanation
    Coaxial cables are commonly used in a bus topology. In this topology, all devices are connected to a single cable, forming a linear network. Coaxial cables are suitable for this topology because they can transmit data over long distances without significant loss of signal quality. They have a central conductor surrounded by a layer of insulation, a metallic shield, and an outer protective jacket. This design helps minimize interference and maintain signal integrity, making coaxial cables a reliable choice for bus topologies.

    Rate this question:

  • 10. 

    Protocol Ethernet sejauh ini adalah yang paling banyak digunakan, Ethernet menggunakan metode akses yang disebut :

    • A.

      FDDI

    • B.

      OSI

    • C.

      CSMA/CD

    • D.

      Token Ring

    • E.

      Arcnet

    Correct Answer
    C. CSMA/CD
    Explanation
    Ethernet menggunakan metode akses yang disebut CSMA/CD. CSMA/CD adalah singkatan dari Carrier Sense Multiple Access with Collision Detection. Metode ini digunakan untuk mengatur akses ke media transmisi yang bersama-sama digunakan oleh beberapa perangkat dalam jaringan Ethernet. Dalam metode ini, setiap perangkat akan mendengarkan apakah ada transmisi yang sedang berlangsung di media tersebut sebelum mulai mengirim data. Jika terjadi tabrakan (collision) antara dua perangkat yang ingin mengirim data secara bersamaan, maka perangkat-perangkat tersebut akan mendeteksi tabrakan tersebut dan akan menunggu waktu yang acak sebelum mencoba mengirim data kembali.

    Rate this question:

  • 11. 

    Urutan nama komponen di atas (1-3):

    • A.

      STP-UTP- RJ45

    • B.

      UTP-STP-RJ45

    • C.

      RJ45-UTP-STP

    • D.

      RJ45-UTP-STP

    • E.

      STP-RJ45-UTP

    Correct Answer
    B. UTP-STP-RJ45
    Explanation
    The correct answer is UTP-STP-RJ45. The given options are different combinations of three components: STP, UTP, and RJ45. The correct order is UTP-STP-RJ45, meaning that UTP comes first, followed by STP, and finally RJ45.

    Rate this question:

  • 12. 

    Berikut ini ciri-ciri dari ethernet card jenis 10base2, kecuali :

    • A.

      Kecepatan transfer maksimum 10-100 Mbps

    • B.

      Menggunakan topologi bus

    • C.

      Menggunakan thin coax

    • D.

      Maksimum panjang kabel per segmen 185 m

    • E.

      Baseban

    Correct Answer
    A. Kecepatan transfer maksimum 10-100 Mbps
    Explanation
    Ethernet card jenis 10base2 memiliki kecepatan transfer maksimum 10-100 Mbps, menggunakan topologi bus, menggunakan thin coax, dan maksimum panjang kabel per segmen 185 m. Oleh karena itu, semua pernyataan tersebut adalah ciri-ciri dari ethernet card jenis 10base2.

    Rate this question:

  • 13. 

    Kelemahan protokol ini adalah tidak dapat di-routing sehingga hanya dapat bekerja di satu jaringan lokal :

    • A.

      Net Beui

    • B.

      IPX/SPX

    • C.

      OSI/ISO

    • D.

      TCP/IP

    • E.

      AppleTalk

    Correct Answer
    A. Net Beui
    Explanation
    NetBEUI (NetBIOS Extended User Interface) is a network protocol that is primarily used in older versions of Windows operating systems. One of the weaknesses of this protocol is that it does not support routing, meaning it can only function within a single local network. This limitation restricts its use to small, local networks and makes it unsuitable for larger networks or connecting different networks together.

    Rate this question:

  • 14. 

    Protokol TCP/IP berhubungan dengan pengguna aplikasi yang berguna untuk terminal maya jarak jauh :

    • A.

      HTTP

    • B.

      FTP

    • C.

      SMTP

    • D.

      TELNET

    • E.

      UDP

    Correct Answer
    D. TELNET
    Explanation
    The correct answer is TELNET. TELNET is a protocol in the TCP/IP suite that allows for remote terminal access to a computer or device over a network. It enables users to log in to a remote system and perform tasks as if they were physically present at the machine. TELNET provides a virtual terminal connection, allowing users to access resources and run applications on a remote system. It is commonly used for remote administration and troubleshooting purposes.

    Rate this question:

  • 15. 

    UDP (User Datagram Protocol) adalah protocol sejenis dengan TCP yang :

    • A.

      Connectionless

    • B.

      Authorities

    • C.

      Oriented

    • D.

      Connectionpass

    • E.

      Dynamic Host

    Correct Answer
    A. Connectionless
    Explanation
    UDP (User Datagram Protocol) is a protocol similar to TCP but it is connectionless. Unlike TCP, which establishes a connection between the sender and receiver before data transmission, UDP does not establish a connection. This means that UDP does not guarantee the delivery of packets and does not provide error checking or retransmission of lost packets. UDP is often used for applications that require low latency and can tolerate some packet loss, such as streaming media or online gaming.

    Rate this question:

  • 16. 

    ID jaringan tidak dapat berupa angka 127 karena nomor ini berfungsi sebagai :

    • A.

      Router

    • B.

      Loopback

    • C.

      Gateway

    • D.

      Network

    • E.

      Default

    Correct Answer
    B. Loopback
    Explanation
    The network ID cannot be the number 127 because this number is reserved for loopback addresses. Loopback addresses are used to test the network interface of a device without sending data over a physical network. They allow a device to send and receive data to itself, making it useful for troubleshooting and testing network connectivity. Therefore, using 127 as a network ID would conflict with its designated purpose as a loopback address.

    Rate this question:

  • 17. 

    Alamat IP untuk kelas B memiliki struktur sebagai berikut :

    • A.

      Dimulai dari no 127 dengan subnet mask 255.0.0.0

    • B.

      Dimulai dari no 128 dengan subnet mask 255.0.0.0

    • C.

      Dimulai dari no 127 dengan subnet mask 255.255.0.0

    • D.

      Dimulai dari no 128 dengan subnet mask 255.255.0.0

    • E.

      Dimulai dari no 126 dengan subnet mask 255.255.0.0

    Correct Answer
    D. Dimulai dari no 128 dengan subnet mask 255.255.0.0
    Explanation
    The correct answer is "dimulai dari no 128 dengan subnet mask 255.255.0.0" because for Class B IP addresses, the range starts from 128 and the subnet mask 255.255.0.0 allows for a larger number of available IP addresses within the network. The subnet mask 255.255.0.0 means that the first two octets (16 bits) are used to identify the network, while the last two octets (16 bits) are available for host addresses.

    Rate this question:

  • 18. 

    Diketahui IP komputer Mr. Adhiet 191.1.67.5, berapa NetID dan HostID komputer tersebut?

    • A.

      Net ID 1.67.5, host ID 191

    • B.

      Net ID 191.1, host ID 67.5

    • C.

      Net ID 191.1.67, host ID 5

    • D.

      Net ID 191, host ID 1.67.5

    • E.

      Net ID 67.5, host ID 191.1

    Correct Answer
    B. Net ID 191.1, host ID 67.5
    Explanation
    The given IP address is 191.1.67.5. In an IP address, the Net ID represents the network portion of the address, while the Host ID represents the host or device within that network. In this case, the Net ID is 191.1, which means that the first two numbers (191.1) represent the network. The Host ID is 67.5, which means that the last two numbers (67.5) represent the host or device within that network. Therefore, the correct answer is "Net ID 191.1, host ID 67.5."

    Rate this question:

  • 19. 

    Sama dengan soal 18 berapakah Broadcast address IP tersebut?

    • A.

      191.0.0.0

    • B.

      191.1.0.0

    • C.

      191.255.255.255

    • D.

      191.1.255.255

    • E.

      255.255.0.0

    Correct Answer
    D. 191.1.255.255
    Explanation
    The broadcast address is the highest address in a network and is used to send data to all devices on that network. In this question, the given IP address range is 191.0.0.0 to 191.255.255.255. The broadcast address for this range would be the highest address, which is 191.255.255.255. However, the correct answer is 191.1.255.255, which is not the highest address in the given range. Therefore, the correct answer seems to be incorrect or there may be a mistake in the question.

    Rate this question:

  • 20. 

    Sama dengan soal 18 berapakah Network address address IP tersebut?

    • A.

      191.0.0.0

    • B.

      191.1.0.0

    • C.

      191.255.255.255

    • D.

      191.1.255.255

    • E.

      255.255.0.0

    Correct Answer
    B. 191.1.0.0
    Explanation
    The network address IP in question is 191.1.0.0. This is because the network address is the first IP address in a given network range. In this case, the given IP addresses are in the same network range, but the network address is the one with all zeros in the host portion of the IP address. Therefore, 191.1.0.0 is the correct network address.

    Rate this question:

  • 21. 

    Sama dengan soal 18 berapakah Subnet Mask IP tersebut :

    • A.

      255.0.0.0

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      191.1.0.0

    • E.

      191.1.255.255

    Correct Answer
    B. 255.255.0.0
    Explanation
    The subnet mask is used to determine the network and host portions of an IP address. In this case, the correct answer is 255.255.0.0. This subnet mask indicates that the first two octets (255.255) represent the network portion of the IP address, while the last two octets (0.0) represent the host portion. This means that any IP address that has the same first two octets will be on the same network, and the last two octets can be used to identify individual hosts within that network.

    Rate this question:

  • 22. 

    Bit ID host dan bit ID jaringan tidak dapat seluruhnya berbentuk 0. Bila semua bit diatur menjadi 0, maka alamat ditafsirkan sebagai :

    • A.

      Hanya jaringan ini

    • B.

      Siaran

    • C.

      Router

    • D.

      Gateway

    • E.

      Router

    Correct Answer
    A. Hanya jaringan ini
    Explanation
    When all the bits in the host and network ID are set to 0, the address is interpreted as "hanya jaringan ini" which means "only this network". This indicates that the address belongs to the specific network and not to any other network or host.

    Rate this question:

  • 23. 

    Kolom isian no.1,2,3 secara urut adalah:

    • A.

      IP address-subnet mask-default gateway

    • B.

      IP address-subnet mask-gateway

    • C.

      IP address-gateway-subnet mask

    • D.

      IP address-default gateway-subnet mask

    • E.

      IP address-default subnet mask-default gateway

    Correct Answer
    A. IP address-subnet mask-default gateway
    Explanation
    The correct answer is "IP address-subnet mask-default gateway". In a network configuration, the IP address is the unique identifier assigned to a device, the subnet mask determines the network portion of the IP address, and the default gateway is the IP address of the router that connects the local network to other networks. Therefore, the correct order is to first specify the IP address, then the subnet mask, and finally the default gateway.

    Rate this question:

  • 24. 

    Berapa nilai desimal dari binner ini 011010101 :

    • A.

      75

    • B.

      213

    • C.

      85

    • D.

      95

    • E.

      96

    Correct Answer
    B. 213
    Explanation
    The given binary number is 011010101. To convert it to decimal, we need to multiply each digit by the corresponding power of 2 and then sum them up. Starting from the rightmost digit, the powers of 2 are 2^0, 2^1, 2^2, 2^3, 2^4, 2^5, 2^6, 2^7, and 2^8. By multiplying the digits with their corresponding powers of 2 and adding them up, we get the decimal value of 213.

    Rate this question:

  • 25. 

    Berfungsi untuk membedakan network ID dengan host ID :

    • A.

      Host ID

    • B.

      Network ID

    • C.

      Subnet Mask

    • D.

      Broadcast Address

    • E.

      Network Address

    Correct Answer
    C. Subnet Mask
    Explanation
    The subnet mask is used to differentiate between the network ID and the host ID. It helps determine which part of the IP address belongs to the network and which part belongs to the host. By using the subnet mask, devices can identify the network they belong to and communicate with other devices within the same network.

    Rate this question:

  • 26. 

    Data tidak terpusat, terutama untuk penyimpanan dan aplikasi adalah ciri dari model jaringan :

    • A.

      Pear to pear

    • B.

      Client/server

    • C.

      File server

    • D.

      Hop to hop

    • E.

      Point to poin

    Correct Answer
    A. Pear to pear
    Explanation
    The correct answer is peer to peer. In a peer to peer network model, data is not centralized and is instead distributed across multiple devices. Each device in the network can act as both a client and a server, allowing for direct communication and sharing of resources between peers. This decentralized approach offers benefits such as increased scalability, fault tolerance, and reduced reliance on a single point of failure.

    Rate this question:

  • 27. 

    Apabila suatu paket data bertabrakan dalam pengiriman data dinamakan :

    • A.

      Drop

    • B.

      Collision

    • C.

      Hop

    • D.

      Tree way handshake

    • E.

      Short

    Correct Answer
    B. Collision
    Explanation
    When a data packet collides with another packet during data transmission, it is referred to as a "collision". This can occur when multiple devices on a network attempt to transmit data at the same time, leading to interference and disruption in the communication process. The collision causes the data packets to be corrupted and dropped, requiring retransmission.

    Rate this question:

  • 28. 

    Lapisan ini mengatur hubungan antara pengirim dan penerima sedemikian rupa sehingga keduanya saling mengenal dan berhubungan :

    • A.

      Aplikasi

    • B.

      Session

    • C.

      Transport

    • D.

      Network

    • E.

      Datalink

    Correct Answer
    E. Datalink
    Explanation
    The correct answer is Datalink. The datalink layer is responsible for organizing and controlling the flow of data between the sender and receiver. It ensures that the data is transmitted error-free and in the correct sequence. This layer also handles the addressing of devices and establishes a connection between them.

    Rate this question:

  • 29. 

    Lapisan ini mengatur bagaimana data atau informasi itu dibawa ke tempat tujuan termasuk juga menjaga kualitas dari service pengiriman data tersebut :

    • A.

      Aplikasi

    • B.

      Session

    • C.

      Transport

    • D.

      Network

    • E.

      Datalink

    Correct Answer
    C. Transport
    Explanation
    The transport layer is responsible for ensuring the reliable delivery of data or information to its destination. It establishes a connection between the source and destination devices and manages the flow control, error detection, and error correction mechanisms. It also handles the segmentation and reassembly of data packets and provides end-to-end communication services. The transport layer plays a crucial role in maintaining the quality of the data delivery service by ensuring that data is delivered accurately and efficiently.

    Rate this question:

  • 30. 

    Lapisan yang mengatur segala sesuatu yang berhubungan dengan pertukaran data atau informasi antara pemakai, perangkat lunak aplikasi atau peralatan suatu sistem komputer :

    • A.

      Aplikasi

    • B.

      Session

    • C.

      Transport

    • D.

      Network

    • E.

      Datalink

    Correct Answer
    A. Aplikasi
    Explanation
    The correct answer is "Aplikasi". Aplikasi refers to the layer that governs everything related to data or information exchange between users, application software, or equipment in a computer system. This layer is responsible for managing user interfaces, file transfers, and network communication.

    Rate this question:

  • 31. 

    Given the IP address 192.168.21.12 from the class C address range your network needs addresses for 28 small offices. Each office uses its own subnet. The network designs specify that you configure for 5 bits of subnetting when you configure the Cisco IOS software. Which subnet mask should you use?

    • A.

      255.255.0.28

    • B.

      255.255.255.0

    • C.

      255.255.255.28

    • D.

      255.255.255.248

    • E.

      255.255.255.252

    Correct Answer
    D. 255.255.255.248
    Explanation
    The correct subnet mask to use in this scenario is 255.255.255.248. This is because the question states that each small office requires its own subnet, and there are a total of 28 small offices. To accommodate 28 subnets, we need at least 5 bits of subnetting. A subnet mask of 255.255.255.248 provides 8 subnets (2^3) with 6 usable host addresses per subnet (2^3 - 2).

    Rate this question:

  • 32. 

    Which the commands allow you to verify address configuration in your network?

    • A.

      Ping

    • B.

      Verify

    • C.

      Iptest

    • D.

      Ipecho

    • E.

      Ipconfig

    Correct Answer
    E. Ipconfig
    Explanation
    The correct answer is "ipconfig". The ipconfig command is used to verify the address configuration in a network. It displays the IP address, subnet mask, default gateway, and other network configuration details of a computer. By using this command, network administrators can ensure that the network settings are correctly configured and troubleshoot any connectivity issues.

    Rate this question:

  • 33. 

    Which network mask should you place on a class C address to accommodate a user requirement for five networks with a maximum of 17 hosts on each network?

    • A.

      255.255.255.192

    • B.

      255.255.255.224

    • C.

      255.255.255.240

    • D.

      255.255.255.248

    • E.

      255.255.255.128

    Correct Answer
    B. 255.255.255.224
    Explanation
    The correct answer is 255.255.255.224. This subnet mask allows for 5 networks and a maximum of 30 hosts on each network. The subnet mask 255.255.255.192 would only allow for 4 networks and the subnet mask 255.255.255.240 would only allow for 8 networks, both of which do not meet the user's requirement. The subnet mask 255.255.255.248 would only allow for 6 hosts on each network, which is less than the required 17 hosts. The subnet mask 255.255.255.128 would allow for 2 networks, which is also less than the required 5 networks.

    Rate this question:

  • 34. 

    What is the maximum length of the fast Ethernet cable 100BaseTx standard?

    • A.

      10 m

    • B.

      50 m

    • C.

      100 m

    • D.

      500 m

    • E.

      1000 m

    Correct Answer
    C. 100 m
    Explanation
    The maximum length of the fast Ethernet cable for the 100BaseTx standard is 100 meters. This standard specifies that the cable length should not exceed 100 meters in order to maintain optimal signal quality and minimize data loss. Going beyond this length can result in signal degradation and slower transmission speeds. Therefore, the correct answer is 100 m.

    Rate this question:

  • 35. 

    Which network mask should you place on a Class C address to accommodate a user requirement of two sub networks with a maximum of 35 hosts on each network?

    • A.

      255.255.255.192

    • B.

      255.255.255.224

    • C.

      255.255.255.240

    • D.

      255.255.255.248

    • E.

      255.255.255.128

    Correct Answer
    A. 255.255.255.192
    Explanation
    The correct answer is 255.255.255.192. This network mask allows for two sub networks with a maximum of 62 hosts on each network. It provides a total of 64 IP addresses, with 62 usable addresses for hosts and 2 reserved addresses for network and broadcast addresses.

    Rate this question:

  • 36. 

    Which IP address range is allowable given an IP address of 172.37.2.56 and 12-bit subnetting?

    • A.

      172.37.2.48 to 172.37.2.63

    • B.

      172.37.2.48 to 172.37.2.62

    • C.

      172.37.2.49 to 172.37.2.62

    • D.

      172.37.2.49 to 172.37.2.62

    • E.

      172.37.2.55 to 172.37.2.126

    Correct Answer
    D. 172.37.2.49 to 172.37.2.62
  • 37. 

    Peralatan apa yang digunakan untuk menghubungkan ke jaringan internet adalah:

    • A.

      Modem

    • B.

      LAN Card

    • C.

      Switch

    • D.

      Router

    • E.

      Hub

    Correct Answer
    A. Modem
    Explanation
    A modem is the equipment used to connect to the internet. It converts digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines. The modem also receives analog signals from the internet and converts them back into digital signals that can be understood by the computer. Therefore, a modem is necessary to establish a connection to the internet.

    Rate this question:

  • 38. 

    What are the default subnet mask for TCP/IP Class B address?

    • A.

      /24

    • B.

      255.0.0.0

    • C.

      /16

    • D.

      255.255.255.0

    • E.

      /8

    Correct Answer
    C. /16
    Explanation
    The default subnet mask for TCP/IP Class B address is /16, which is represented by 255.255.0.0. This subnet mask allows for a larger number of host addresses compared to /24 or /8. It divides the IP address into a network portion and a host portion, with the first 16 bits representing the network and the remaining 16 bits representing the host. This allows for up to 65,536 host addresses within the network.

    Rate this question:

  • 39. 

    What are the default subnet mask for TCP/IP Class A address?

    • A.

      /24

    • B.

      255.255.0.0

    • C.

      /16

    • D.

      255.255.255.0

    • E.

      /8

    Correct Answer
    E. /8
    Explanation
    The default subnet mask for TCP/IP Class A address is /8. This means that the first 8 bits of the IP address are reserved for the network address, while the remaining bits are used for the host address. This allows for a large number of hosts to be connected to the network, making it suitable for organizations with a large number of devices.

    Rate this question:

  • 40. 

    Which IP Address Classes is used for testing?

    • A.

      Class B

    • B.

      Class C

    • C.

      Class D

    • D.

      Class E

    • E.

      Class F

    Correct Answer
    C. Class D
    Explanation
    Class D is the correct answer because it is the IP address class used for multicasting. Multicasting is a method of sending data packets to a group of destination computers simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast group addresses. These addresses are not assigned to individual devices but are used for broadcasting data to a specific group of devices that have joined the multicast group.

    Rate this question:

  • 41. 

    Which IP Address Classes is used for multicast?

    • A.

      Class B

    • B.

      Class C

    • C.

      Class E

    • D.

      Class F

    • E.

      Class A

    Correct Answer
    C. Class E
    Explanation
    Class E IP addresses are reserved for multicast addressing. Multicast is a communication method where a single packet can be sent to multiple recipients simultaneously. Class E addresses range from 240.0.0.0 to 255.255.255.255 and are not used for regular unicast or broadcast communication.

    Rate this question:

  • 42. 

    You are given the folllowing address and mask : 157.89.8.64, 255.255.0.0. Which part is the host portion?

    • A.

      157

    • B.

      8.64

    • C.

      157.89

    • D.

      89

    • E.

      89.8

    Correct Answer
    B. 8.64
    Explanation
    The host portion in the given address and mask is "8.64". In an IP address, the network portion is determined by the subnet mask, which in this case is "255.255.0.0". The network portion is the part of the address that is used to identify the network. The remaining part of the address is the host portion, which is used to identify individual hosts within the network. In this case, the host portion is "8.64".

    Rate this question:

  • 43. 

    Jika kita mempunyai IP class B, dengan subnet mask 255.255.255.0, berapa jumlah subnetingnya?

    • A.

      24

    • B.

      62

    • C.

      126

    • D.

      254

    • E.

      510

    Correct Answer
    C. 126
    Explanation
    The given subnet mask 255.255.255.0 indicates that the network portion of the IP address is 24 bits long. In a class B IP address, the network portion is 16 bits long. To calculate the number of subnets, we subtract the network bits (16) from the total bits (24), which gives us 8. The formula to calculate the number of subnets is 2^n, where n is the number of subnet bits. Therefore, 2^8 equals 256 subnets. However, since the question asks for the number of subnets excluding the network and broadcast addresses, we subtract 2 from 256, which gives us the correct answer of 254 subnets.

    Rate this question:

  • 44. 

    Jika kita mempunyai IP class C, dengan subnet mask 255.255.255.192, berapa jumlah subnetingnya?

    • A.

      192

    • B.

      255

    • C.

      2

    • D.

      62

    • E.

      510

    Correct Answer
    C. 2
    Explanation
    The given subnet mask 255.255.255.192 indicates that the last two bits in the IP address are used for subnetting. Since there are 2 bits, the number of possible subnets is 2^2 = 4. Therefore, the correct answer is 2.

    Rate this question:

  • 45. 

    Jika kita mempunyai IP class C, dengan subnet mask 255.255.255.224, berapa jumlah host per subnetingnya?

    • A.

      224

    • B.

      62

    • C.

      30

    • D.

      6

    • E.

      2

    Correct Answer
    C. 30
    Explanation
    The given subnet mask 255.255.255.224 indicates that the last 5 bits of the IP address are used for subnetting. With 5 bits, we can have 2^5 = 32 possible combinations. However, 2 of these combinations are reserved for network address and broadcast address, leaving us with 30 usable host addresses per subnet. Therefore, the correct answer is 30.

    Rate this question:

  • 46. 

    Jika kita mempunyai IP class B, dengan subnet mask 255.255.254.0, berapa jumlah host per subnetingnya?

    • A.

      1022

    • B.

      510

    • C.

      254

    • D.

      126

    • E.

      62

    Correct Answer
    B. 510
    Explanation
    Dalam subnetting, jumlah host per subnet dapat dihitung dengan menggunakan rumus 2^n - 2, di mana n adalah jumlah bit host yang tersedia setelah subnet mask. Dalam kasus ini, subnet mask 255.255.254.0 memiliki 9 bit host yang tersedia setelah subnet mask. Jadi, menggunakan rumus tersebut, jumlah host per subnet adalah 2^9 - 2 = 510.

    Rate this question:

  • 47. 

    Yang mana dari nomor IP berikut ini yang termasuk Private Class B?

    • A.

      172.31.0.0

    • B.

      172.32.0.0

    • C.

      172.33.0.0

    • D.

      172.34.0.0

    • E.

      172.35.0.0

    Correct Answer
    B. 172.32.0.0
    Explanation
    The correct answer is 172.32.0.0. This is because the private Class B IP address range is from 172.16.0.0 to 172.31.255.255. Therefore, any IP address within this range, including 172.32.0.0, is considered a private Class B IP address.

    Rate this question:

  • 48. 

    Urutan kabel dengan aturan 358-A:

    • A.

      1-7-2-5-6-4-3-8

    • B.

      2-6-1-5-4-7-3-8

    • C.

      1-7-2-5-4-6-3-8

    • D.

      2-6-1-4-5-7-3-8

    • E.

      1-2-7-5-4-6-3-8

    Correct Answer
    B. 2-6-1-5-4-7-3-8
    Explanation
    The correct answer is the sequence 2-6-1-5-4-7-3-8. This is because it follows the given rule of 358-A, where the numbers are arranged in a specific order. The other sequences do not follow this rule, as they have different numbers in different positions.

    Rate this question:

  • 49. 

    Perintah untuk mendapatkan no.IP secara otomatis dari DHCP server adalah:

    • A.

      Ipconfig

    • B.

      Ipconfig /all

    • C.

      Ipconfig /renew

    • D.

      Ipconfig /release

    • E.

      Ipconfig /flushdns

    Correct Answer
    C. Ipconfig /renew
    Explanation
    The correct answer is "ipconfig /renew" because this command is used to renew the IP address configuration of a computer that is obtained from a DHCP server. By running this command, the computer sends a request to the DHCP server to renew its IP address lease. This is useful when the computer's IP address lease is about to expire or if there are any changes in the network configuration.

    Rate this question:

  • 50. 

    Diantara user-user di bawah ini, mana yang tidak ada di Windows 2000/XP?1.Administrators2.Backup Operators3.Debugger Users4.Guests5.Duplicator6.HelpServicesGroup7.Network Configuration Operators8.Power Users9. Remote Desktop Users10. Replicator11. Users

    • A.

      No.2&7

    • B.

      B.no.3&9

    • C.

      No.5&8

    • D.

      No.4&6

    • E.

      No.10&11

    Correct Answer
    C. No.5&8
    Explanation
    The correct answer is no.5&8. The question asks which users are not present in Windows 2000/XP. Users no.5 (Duplicator) and no.8 (Power Users) are not present in Windows 2000/XP.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.