2024.01.20 UAS Pendidikan Bahasa Asing II BC223
2024.01.20 UAS Pendidikan Bahasa Asing II BC223
2024.01.20 UAS Pendidikan Bahasa Asing II BC223
Petunjuk Pengerjaan :
1. Lengkapi identitas pada lembar jawaban.
2. Bacalah soal dengan teliti.
3. Jawab sesuai dengan setiap petunjuk yang diberikan.
4. Periksa kembali jawaban sebelum mengumpulkan lembar soal dan lembar jawaban. Pastikan semua telah terisi lengkap.
1. system - a system - that - Open - can is - many - use - different - of machines - types.
1. .................. is to gain unauthorized access to a computer system by using the owner’s connection.
a. hacker c. host
b. overwriting d. piggyback
2. ............... is a person who illegally exploits computer hardware and software.
a. hacker c. host
b. overwriting d. piggyback
3. ................ is a computer system that has a virus attached to it.
a. hacker c. host
b. overwriting d. piggyback
4. ................... virus is a virus that coppies its code over and destroys the files of the original data.
a. hacker c. host
b. overwriting d. piggyback
5. ......................... is a virus that attacks anti-virus software.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
6. ............................. is an add-on that makes a computer virus part of the host computer’s operating
system.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
7. ..................... is a virus that attacks anti-virus software.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
8. Malicious software is .............
a. Trojan horses c. Identity theft
b. Malware d. Phising
9. ......................... is a malicious virus that seems beneficial.
a. Trojan horses c. Identity theft
b. Malware d. Phising
10. ............... is tricking people into giving information through email.
a. Trojan horses c. Identity theft
b. Malware d. Phising
11. .................... is stealing another’s personal information.
a. Trojan horses c. Identity theft
b. Malware d. Phising
12. ....................... is a program that gathers personal information.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
13. ...................... is capturing stored on cards.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
14. .................. is using a legitimate-looking website to trick people.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
15. The man on the phone was part of a ................ scam.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
Please submit your group assignment by copying and pasting the slides of the Company Profile
into this paper. The complete company profile maximum in 8 pages.
- Selamat Mengerjakan –
I. Restructure the random words into a sentence
1. Open system is a system that can use many different types of machines.
2. Automation is the use of machines to perform tasks without human assistance
3. Telecommute is using technology to work away from an office.
4. Identity theft is stealing another's personal information.
5. A hacker is someone who accesses a system without permission.
II. Choose the right answers among options: a, b, c, or d
1. d. Piggyback
2. a. Hacker
3. c. Host
4. b. Overwriting
5. a. Anti-virus virus
6. b. Resident extension
7. a. Anti-virus virus
8. b. Malware
9. a. Trojan horses
10. d. Phising
11. c. Identity thef
12. d. Spywere
13. a. Card scanning
14. b. Pharmming
15. c. Pretexting