1.
Secara umum jaringan komputer terdiri dari di bawah ini kecuali...
Correct Answer
C. Radio Area Network
Explanation
A radio area network is not a commonly known or recognized type of computer network. The other options listed - Local Area Network, Metropolitan Area Network, Wide Area Network, and Internet - are all well-known types of computer networks.
2.
Beberapa teknologi WAN antara lain di bawah ini, kecuali...
Correct Answer
E. Buffer
Explanation
The given options are all examples of WAN technologies, except for "Buffer." A buffer is a temporary storage area that is used to hold data while it is being transferred from one place to another. It is not a specific WAN technology like the other options mentioned.
3.
Ada dua jenis routing yaitu...
Correct Answer
A. Routing langsung dan tidak langsung
Explanation
The correct answer is "Routing langsung dan tidak langsung" because it accurately describes the two types of routing. "Routing langsung" refers to direct routing, where data packets are sent directly from the source to the destination without passing through any intermediate nodes. On the other hand, "Routing tidak langsung" refers to indirect routing, where data packets are sent through multiple intermediate nodes before reaching the destination.
4.
Antara yang memancar ke segala arah (360 derajat) disebut...
Correct Answer
B. Omni Directional
Explanation
The term "omni" in "omni directional" refers to "all" or "every" direction. Therefore, an antenna that radiates in all directions, or 360 degrees, is called an omni directional antenna. This type of antenna is designed to provide equal signal strength in all directions, making it suitable for applications where the signal needs to reach multiple locations or devices from a central point.
5.
Bagian-bagian dari kabel serat optik adalah seperti di bawah ini, kecuali…..
Correct Answer
D. Tracker
Explanation
The given options list the components of an optical fiber cable. The core, cladding, buffer, and outer jacket are all essential parts of a fiber optic cable. However, "tracker" is not a recognized component of a fiber optic cable. Therefore, the correct answer is "tracker."
6.
Alat yang digunakan untuk mengetahui spektrum frekuensi yang telah digunakan oleh jaringan WaveLAN lainnya disebut…..
Correct Answer
A. Spectrum Analyzer
Explanation
A Spectrum Analyzer is a tool used to analyze and measure the frequency spectrum of signals. It is commonly used in wireless communication to detect and analyze the frequencies used by other WaveLAN networks. The Spectrum Analyzer can display the frequency spectrum in a graphical form, allowing users to identify and avoid frequency interference. It is a specialized instrument designed for precise frequency analysis and is the most suitable tool for this purpose compared to the other options listed.
7.
Alat yang digunakan untuk menghitung kehilangan energi yang didapat dari serat optik adalah...
Correct Answer
A. Loss Power Meter
Explanation
A Loss Power Meter is used to measure the amount of energy loss obtained from an optical fiber. This device is specifically designed to accurately calculate the power loss in the fiber optic system. It helps in determining the efficiency and performance of the optical network by measuring the power loss at different points along the fiber. The Loss Power Meter is an essential tool for technicians and engineers working with fiber optic systems to ensure the quality and reliability of the network.
8.
Server yang dapat membuat sistem berbasis Unix (seperti Linux) untuk melakukan sharing resource dengan sistem berbasis Windows adalah…..
Correct Answer
A. Samba
Explanation
Samba is the correct answer because it is a software suite that allows Unix-based systems, such as Linux, to share resources with Windows-based systems. It provides file and print services, allowing Windows clients to access files and printers on the Unix server. Samba uses the SMB/CIFS protocol to facilitate this communication between different operating systems.
9.
Proxy server yang populer saat ini adalah…..
Correct Answer
C. Squid
Explanation
Squid is the popular proxy server currently used. It is a widely used caching and forwarding HTTP web proxy. Squid is known for its high-performance and ability to handle a large number of simultaneous connections. It provides various features like access control, authentication, and content filtering, making it a preferred choice for many organizations and internet service providers.
10.
Untuk mengakses komputer lain, SSH lebih aman dibandingkan telnet karena data yang akan dikirim…
Correct Answer
D. Diacak dulu
Explanation
SSH (Secure Shell) is more secure than Telnet because it encrypts the data that will be sent. By encrypting the data, it becomes more difficult for unauthorized individuals to intercept and understand the information being transmitted. By randomizing or scrambling the data before sending it, SSH further enhances its security measures, making it even more difficult for attackers to decipher the information. This ensures the confidentiality and integrity of the data during transmission.
11.
Untuk merubah hak akses file pada linux menggunakan perintah…..
Correct Answer
A. Chmod
Explanation
The correct answer is "Chmod." Chmod is a command used in Linux to change the permissions of a file or directory. It allows the user to modify the read, write, and execute permissions for the owner, group, and others. By using the Chmod command, the user can control who can access and manipulate the file or directory.
12.
IP address terdiri atas dua bagian yaitu…..
Correct Answer
E. Network ID dan host ID
Explanation
The correct answer is network ID and host ID. An IP address is divided into two parts: the network ID and the host ID. The network ID identifies the network to which the device belongs, while the host ID identifies the specific device within that network. This division allows for efficient routing of data packets on the internet.
13.
IP address kelas A diberikan untuk jaringan dengan jumlah host…
Correct Answer
B. Sangat besar
Explanation
Kelas A IP address diberikan untuk jaringan dengan jumlah host yang sangat besar. Kelas A memiliki jangkauan alamat IP yang sangat luas, dengan 8 bit pertama digunakan untuk mengidentifikasi jaringan dan 24 bit sisanya untuk mengidentifikasi host. Dengan demikian, kelas A dapat mendukung hingga 16.777.214 host dalam satu jaringan. Hal ini membuatnya cocok untuk digunakan dalam jaringan yang membutuhkan kapasitas besar, seperti perusahaan besar atau ISP.
14.
Cara membaca IP Address kelas A, misalnya 113.46.5.6 adalah…..
Correct Answer
A. Network ID = 113 Host ID = 46.5.6
Explanation
The correct answer is network ID = 113 Host ID = 46.5.6. In an IP address, the network ID refers to the portion of the address that identifies the network, while the host ID refers to the portion that identifies a specific device on that network. In this case, the network ID is 113, which is the first octet of the IP address. The host ID is 46.5.6, which includes the remaining three octets of the address.
15.
Host ID untuk IP Address kelas C adalah…..
Correct Answer
D. 8 bit terakhir
Explanation
The host ID for a Class C IP address is determined by the last 8 bits of the address. In a Class C network, the first 24 bits are reserved for the network ID, leaving the remaining 8 bits for the host ID. These 8 bits can be used to identify individual hosts within the network.
16.
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau internet ditranslasikan menjadi…..
Correct Answer
C. IP address
Explanation
DNS (Domain Name System) is a system that translates the names of hosts on a computer network or the internet into their corresponding IP addresses. It acts as a directory that allows users to access websites and other resources using easy-to-remember domain names instead of complex numerical IP addresses. Therefore, the correct answer is IP address.
17.
Berikut yang bukan merupakan jenis kabel untuk jaringan komputer adalah…..
Correct Answer
A. BNC
Explanation
BNC (Bayonet Neill-Concelman) is not a type of cable for computer networks. It is a type of connector used to connect coaxial cables. Coaxial cable, UTP (Unshielded Twisted Pair), fiber optic, and STP (Shielded Twisted Pair) are all types of cables commonly used in computer networks.
18.
Untuk melihat indikasi pada konfigurasi IP yang terpasang pada Komputer dengan sistem operasi windows dengan perintah…..
Correct Answer
B. Ipconfig
Explanation
The correct answer is "ipconfig". Ipconfig is a command used in Windows operating systems to display the IP configuration settings of a computer. This command shows information such as the IP address, subnet mask, default gateway, and DNS servers. By using ipconfig, users can easily view the network details of their computer and troubleshoot any connectivity issues.
19.
Untuk mendeteksi apakah hubungan komputer dengan jaringan sudah berjalan dengan baik, utilitas yang digunakan adalah…..
Correct Answer
E. Ping
Explanation
Ping is a utility used to test the connectivity between a computer and a network. It sends a small packet of data to a specific IP address or domain name and measures the time it takes for the packet to travel back to the sender. If the packet successfully returns, it indicates that the computer is connected to the network and the connection is functioning properly. Therefore, Ping is the correct utility to use for detecting whether the computer's connection to the network is working well.
20.
Jika nomor IP tidak dikenal dalam jaringan, maka akan muncul pesan…..
Correct Answer
A. Request Time Out
Explanation
When a network does not recognize an IP address, it will result in a "Request Time Out" message. This means that the network was unable to establish a connection or receive a response from the IP address in question.
21.
Batasan waktu agar paket data tidak mengambang di jaringan disebut…..
Correct Answer
B. Time to Live
Explanation
The correct answer is "Time to Live". Time to Live (TTL) is a value in an IP packet that specifies the maximum amount of time the packet can remain in the network before it is discarded. This is used to prevent packets from circulating indefinitely in the network and helps in managing network congestion.
22.
Menurut referensi OSI, layer/lapisan protokol berjumlah…..
Correct Answer
E. 7
Explanation
According to the OSI reference model, there are a total of 7 layers in the protocol stack. Each layer has a specific function and is responsible for handling a specific aspect of the communication process. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer interacts with the layer above and below it to ensure reliable and efficient communication between devices on a network.
23.
Suatu aturan dimana pemilik program tetap memegang haknya tetapi orang lain dimungkinkan untuk menyebarkan dan memodifikasi, dengan syarat source code asli harus diikutsertakan dalam distribusinya disebut…..
Correct Answer
A. GPL (General Public License)
Explanation
The correct answer is GPL (General Public License). This license allows the owner of a program to retain their rights while allowing others to distribute and modify it, as long as the original source code is included in the distribution.
24.
Yang bukan merupakan varian sistem operasi jaringan berbasis GUI yang menggunakan basis Linux adalah…..
Correct Answer
E. Fortran
Explanation
Fortran is not a variant of GUI-based network operating systems that use the Linux base. Fortran is a programming language used for scientific and engineering calculations, and it is not an operating system. Redhat, Mandrake, Caldera, and Debian, on the other hand, are all variants of Linux-based network operating systems that have a graphical user interface.
25.
Dua software yang digunakan untuk boot loader adalah…..
Correct Answer
C. GRUB dan LILO
Explanation
GRUB (Grand Unified Bootloader) and LILO (LInux LOader) are two software programs used for boot loading. They are responsible for loading the operating system into the computer's memory during the boot process. GRUB is a widely used bootloader in Linux systems, known for its flexibility and ability to handle multiple operating systems. LILO, on the other hand, is an older bootloader that was commonly used in older versions of Linux distributions. Both GRUB and LILO are capable of loading the operating system from the hard disk into memory, allowing the computer to start up properly.
26.
Database server yang umum digunakan adalah…..
Correct Answer
B. MySQL
Explanation
MySQL is a commonly used database server. It is an open-source relational database management system that is known for its reliability, scalability, and ease of use. It is widely used in web applications and is compatible with various operating systems. MySQL is known for its fast performance and ability to handle large amounts of data efficiently. It offers advanced features such as replication, clustering, and partitioning, making it a popular choice for businesses and developers.
27.
Jenis-jenis sistem operasi jaringan yang dapat digunakan sebagai server dalam jaringan adalah sebagai berikut, kecuali…..
Correct Answer
D. Star Bugs
Explanation
The given options list different types of network operating systems that can be used as servers in a network. Windows NT, Redhat, Debian, and San Solaris are all well-known operating systems that can be used as servers. However, "Star Bugs" is not a recognized network operating system, making it the exception in the list.
28.
Berikut ini yang bukan termasuk topologi fisik jaringan adalah…..
Correct Answer
E. Sun
Explanation
The term "Sun" does not belong to the category of physical network topologies. The other options listed (Bus, Star, Tree, and Ring) are all examples of physical network topologies commonly used in computer networking. The "Sun" is not a valid option as it does not represent a physical arrangement of network devices or connections.
29.
Suatu jaringan dimana setiap komputer dapat berfungsi sebagai server artinya user komputer yang ada dalam jaringan tersebut dapat menjadi seorang administrator diistilahkan…..
Correct Answer
A. Jaringan peer to peer
Explanation
In a peer-to-peer network, each computer can function as both a client and a server. This means that users on the network can act as administrators and have control over their own resources and data. In this type of network, there is no central server that controls the network, instead, each computer has equal authority and can share files and resources directly with other computers on the network.
30.
Subnet mask 11111111.11111111.11111111.11111000 sama dengan…..
Correct Answer
E. 255.255.255.248
Explanation
The subnet mask 11111111.11111111.11111111.11111000 is equivalent to 255.255.255.248. This is because in a subnet mask, each "1" represents a network bit and each "0" represents a host bit. In this subnet mask, the first 29 bits are network bits and the last 3 bits are host bits. Therefore, the subnet mask is 255.255.255.248.
31.
Signal merewati 2 arah dengan satu kabel, kemungkinan terjadi collision (tabrakan data atau tercampurnya data) besar, adalah kelemahan dari kabel jenis…..
Correct Answer
A. Coaxial
Explanation
Coaxial cables are known for their ability to transmit signals in both directions using a single cable. However, this also means that there is a higher chance of data collisions or data mixing occurring, as signals can interfere with each other. This is a weakness of coaxial cables compared to other cable types such as UTP, STP, Twisted, and Unshielded cables, which are designed to minimize data collisions.
32.
Skema desain pembangunan sebuah jaringan komputer dikenal dengan istilah…..
Correct Answer
B. Topologi
Explanation
The correct answer is "Topologi". Topologi refers to the layout or structure of a computer network, including how devices are connected and the arrangement of nodes and links. It determines how data flows within the network and can be categorized into different types such as bus, star, ring, mesh, etc. Understanding the topologi is crucial for designing and managing a computer network effectively.
33.
Pembagian ruang dalam sebuah hardisk diistilahkan dengan…..
Correct Answer
B. Partisi
Explanation
The correct answer is "Partisi" because it is the term used to describe the division of space within a hard disk. A hard disk can be divided into multiple partitions, each of which can be used to store different files and data. This division helps in organizing and managing the storage space effectively.
34.
Kemampuan sistem operasi untuk menjalankan berbagai perintah dalam waktu bersamaan disebut…..
Correct Answer
D. Multitasking
Explanation
Multitasking refers to the ability of an operating system to execute multiple tasks simultaneously. It allows the system to switch between different tasks quickly, giving the illusion of parallel execution. This enables users to run multiple applications or perform multiple tasks concurrently without any noticeable delay or interference. Therefore, multitasking is the correct answer as it accurately describes the capability of an operating system to run various commands simultaneously.
35.
Inti sebuah sistem operasi disebut…..
Correct Answer
A. Core
Explanation
The correct answer is "Core." The term "core" refers to the central or essential part of something. In the context of a computer operating system, the core refers to the central component that manages system resources and provides essential services. It is responsible for tasks such as memory management, process scheduling, and device drivers. Therefore, "core" is the most appropriate term to describe the main or central part of a system operating system.
36.
Teks perintah untuk melihat tabel routing pada Windows adalah…..
Correct Answer
E. Route -t
Explanation
The correct answer is "route -t". This command is used to view the routing table on Windows. The "-t" option is used to display the IPv4 routing table.
37.
Komputer yang bertugas menyimpan informasi halaman web yang pernah diakses sebelumnya adalah…..
Correct Answer
C. Proxy server
Explanation
A proxy server is a computer that stores information about previously accessed web pages. When a user requests a web page, the proxy server checks if it has a cached copy of the page. If it does, it retrieves the page from its cache instead of going to the original web server. This helps to improve the speed and efficiency of accessing web pages, as the proxy server can serve the cached copy directly to the user. Therefore, a proxy server is responsible for storing and retrieving previously accessed web pages.
38.
Antar muka yang bertugas menerjemahkan satuan informasi terkecil di layer fisik adalah…..
Correct Answer
A. LAN Card
Explanation
The LAN card is responsible for translating the smallest unit of information in the physical layer. It is a hardware component that connects a computer to a local area network (LAN). The LAN card receives and transmits data packets between the computer and the network, converting the digital signals into analog signals that can be transmitted over the network.
39.
Satuan informasi terkecil yang dikenal dalam komunikasi data adalah…..
Correct Answer
A. Bit
Explanation
A bit is the smallest unit of information in data communication. It represents a binary digit, which can have a value of either 0 or 1. In data transmission, information is encoded into bits, which are then transmitted over a network. A bit is the fundamental building block of digital communication and is used to represent and transmit data in various forms, such as text, images, and videos.
40.
Angka 32 bit yang digunakan untuk membedakan Net ID dan Host ID disebut…..
Correct Answer
A. Subnet Mask
Explanation
A 32-bit number is used to differentiate between the Net ID and Host ID in an IP address. This number is called the subnet mask. The subnet mask is used to determine the network portion of an IP address and the host portion of the IP address. It helps in dividing the IP address into network and host addresses, allowing for efficient routing and management of network resources.
41.
Partisi default (root) jenis Reiserfs digunakan oleh sistem operasi…..
Correct Answer
D. Linux Suse
Explanation
The default root partition type used by the operating system Linux Suse is Reiserfs.
42.
Linux pada awalnya dibuat oleh seorang mahasiswa Finlandia bernama…..
Correct Answer
C. Linus Torvalds
Explanation
The correct answer is Linus Torvalds. Linux was initially created by Linus Torvalds, a Finnish student.
43.
Perintah pada DOS untuk membuat direktori baru adalah…..
Correct Answer
E. Md
Explanation
The correct answer is "md". In DOS, the "md" command is used to create a new directory or folder.
44.
Perintah pada dasar linux untuk membuat direktori baru adalah…..
Correct Answer
A. Mkdir
Explanation
The correct answer is "mkdir". This command is used in Linux to create a new directory.
45.
Perintah yang digunakan untuk melihat daftar services pada Windows XP adalah…..
Correct Answer
E. Services.msc
Explanation
The correct answer is services.msc. This is because the .msc file extension is commonly used in Windows XP to represent Microsoft Management Console (MMC) snap-in files. The services.msc file specifically allows users to view and manage the services running on their Windows XP system. By opening services.msc, users can access a list of all the services installed on their computer and make changes to their settings or start/stop them as needed.
46.
Tanda bahwa shell prompt masuk sebagai root adalah…..
Correct Answer
A. #
Explanation
The correct answer is "#". In Linux systems, the "#" symbol is used as the shell prompt when logged in as the root user. The root user has full administrative privileges and can perform any action on the system. The "#" symbol indicates that the user has the highest level of access and control over the system.
47.
Perintah dasar linux yang digunakan untuk menghapus direktori adalah…..
Correct Answer
B. Rmdir
Explanation
The correct answer is "rmdir". The "rmdir" command is a basic Linux command used to remove or delete a directory. It is specifically designed to remove empty directories. If the directory is not empty, the command will not work and an error message will be displayed.
48.
Software untuk mengatur tata letak file dalam hardisk yang merupakan bawaan dari Windows XP adalah…..
Correct Answer
A. Disk defragmenter
Explanation
The correct answer is disk defragmenter. Disk defragmenter is a software tool that is built-in to Windows XP and is used to organize and optimize the layout of files on the hard disk. It rearranges fragmented files and unused space on the disk, making the computer run more efficiently and improving overall system performance. This tool helps to reduce file access time and improve the speed of file retrieval and system startup.
49.
Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam sistem pada saat bersamaan, diistilahkan…..
Correct Answer
A. Multiuser
Explanation
Linux dapat digunakan oleh lebih dari satu pemakai yang masuk ke dalam sistem pada saat bersamaan. Ini berarti bahwa sistem operasi Linux mendukung mode multiuser di mana beberapa pengguna dapat mengakses dan menggunakan sistem secara bersamaan. Dalam mode multiuser, setiap pengguna memiliki akun dan hak akses yang berbeda, sehingga mereka dapat bekerja secara independen dan aman dalam lingkungan yang sama.
50.
Di bawah ini adalah jenis-jenis sistem operasi, kecuali…..
Correct Answer
D. Cytrix
Explanation
The given list consists of different operating systems, such as Ubuntu, Windows XP, Mac OS, Red Hat, and Cytrix. The correct answer is "Cytrix" because it is not a recognized operating system. The other options, Ubuntu, Windows XP, Mac OS, and Red Hat, are well-known operating systems used by individuals and organizations.