2024.01.20 UAS Pendidikan Bahasa Asing II BC223

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 10

UJIAN AKHIR SEMESTER

SEMESTER GANJIL 2023/2024

Mata Kuliah : Pendidikan Bahasa Asing II Waktu : 90 MENIT


Dosen : Dr. Dian Rahmani Putri, S.S., M.Hum. Sifat Ujian : CLOSE - ONLINE
Kelas : BC 223 Program Studi : Sistem Informasi

Nama : Komang Wahyu Selamat Suranadi Candra


NIM : 220030569

Petunjuk Pengerjaan :
1. Lengkapi identitas pada lembar jawaban.
2. Bacalah soal dengan teliti.
3. Jawab sesuai dengan setiap petunjuk yang diberikan.
4. Periksa kembali jawaban sebelum mengumpulkan lembar soal dan lembar jawaban. Pastikan semua telah terisi lengkap.

I. Please restructure the random words into a sentence

1. system - a system - that - Open - can is - many - use - different - of machines - types.

2. is - the use - of machines - Automation - to perform - without - human - tasks - assistence.

3. technology - Telecommute - is - to work - an office - away - from - using.

4. theft – is - stealing - Identity - another’s - information - personal.

5. is - someone - who - without - accesses - a system - permission - Hacker.

II. Choose the right answers among options: a, b, c, or d

1. .................. is to gain unauthorized access to a computer system by using the owner’s connection.
a. hacker c. host
b. overwriting d. piggyback
2. ............... is a person who illegally exploits computer hardware and software.
a. hacker c. host
b. overwriting d. piggyback
3. ................ is a computer system that has a virus attached to it.
a. hacker c. host
b. overwriting d. piggyback
4. ................... virus is a virus that coppies its code over and destroys the files of the original data.
a. hacker c. host
b. overwriting d. piggyback
5. ......................... is a virus that attacks anti-virus software.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
6. ............................. is an add-on that makes a computer virus part of the host computer’s operating
system.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
7. ..................... is a virus that attacks anti-virus software.
a. Anti-virus virus c. virus
b. Resident extension d. hosting
8. Malicious software is .............
a. Trojan horses c. Identity theft
b. Malware d. Phising
9. ......................... is a malicious virus that seems beneficial.
a. Trojan horses c. Identity theft
b. Malware d. Phising
10. ............... is tricking people into giving information through email.
a. Trojan horses c. Identity theft
b. Malware d. Phising
11. .................... is stealing another’s personal information.
a. Trojan horses c. Identity theft
b. Malware d. Phising
12. ....................... is a program that gathers personal information.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
13. ...................... is capturing stored on cards.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
14. .................. is using a legitimate-looking website to trick people.
a. Card scanning c. Pretexting
b. Pharming d. Spyware
15. The man on the phone was part of a ................ scam.
a. Card scanning c. Pretexting
b. Pharming d. Spyware

III. Translate the text into Indonesian Bahasa


Due to the highly computerized environment we are now working in, companies across the globe
are connected about their security. In the past, only a computer expert could hack into a computer,
unlike today where there are readily available tools to make it much easier. A company can lose
millions of dollars if confidential data is stolen or destroyed by a virus. Employers are also worried
about internal threats from employees. Although it is illegal, staff members often steal customer and
contact lists, proposals and product information to take to a new job. Disgruntled workers may even
plant unauthorized programs destroying important documents.

IV. Collective Assignment – Composing a Company Profile

Please submit your group assignment by copying and pasting the slides of the Company Profile
into this paper. The complete company profile maximum in 8 pages.

- Selamat Mengerjakan –
I. Restructure the random words into a sentence
1. Open system is a system that can use many different types of machines.
2. Automation is the use of machines to perform tasks without human assistance
3. Telecommute is using technology to work away from an office.
4. Identity theft is stealing another's personal information.
5. A hacker is someone who accesses a system without permission.
II. Choose the right answers among options: a, b, c, or d
1. d. Piggyback
2. a. Hacker
3. c. Host
4. b. Overwriting
5. a. Anti-virus virus
6. b. Resident extension
7. a. Anti-virus virus
8. b. Malware
9. a. Trojan horses
10. d. Phising
11. c. Identity thef
12. d. Spywere
13. a. Card scanning
14. b. Pharmming
15. c. Pretexting

III. Translate the text into Indonesian Bahasa

Karena lingkungan yang sangat terkomputerisasi tempat kita bekerja,


perusahaan di seluruh dunia saling terhubung mengenai keamanan mereka. Di
masa lalu, hanya seorang ahli komputer yang dapat meretas komputer, tidak
seperti saat ini di mana ada alat yang tersedia untuk membuatnya lebih
mudah. Sebuah perusahaan bisa kehilangan jutaan dolar jika data rahasia
dicuri atau dihancurkan oleh virus. Perusahaan juga khawatir dengan ancaman
internal dari karyawan. Meskipun ilegal, anggota staf sering mencuri daftar
pelanggan dan kontak, proposal, dan informasi produk untuk dibawa ke
pekerjaan baru. Pekerja yang tidak puas bahkan mungkin memasang program
tidak sah yang merusak dokumen penting.
IV. Collective Assignment – Composing a Company Profile

You might also like