ICT 2014

21
SULIT 3765/1 CONFIDENTIAL 3765/1 ICT SEPTEMBER 2009 2 HOURS 30 MINUTES JABATAN PELAJARAN MELAKA INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) PERCUBAAN SIJIL PELAJARAN MALAYSIA 2009 DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO THIS QUESTION PAPER CONSISTS OF : a. Section A : 25 Questions b. Section B : 5 Questions c. Section C : 3 Questions 3765/1 [Lihat Sebelah SULIT

description

ICT EXAM 2014

Transcript of ICT 2014

Section A

SULIT 3765/1

CONFIDENTIAL

3765/1

ICT

SEPTEMBER

2009

2 HOURS 30 MINUTESJABATAN PELAJARAN MELAKA

INFORMATION AND COMMUNICATIONS TECHNOLOGY

(ICT)

PERCUBAAN SIJIL PELAJARAN MALAYSIA 2009

DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO

THIS QUESTION PAPER CONSISTS OF :

a. Section A

: 25 Questions

b. Section B

: 5 Questions

c. Section C

: 3 Questions

(Question 1 is Compulsory and

choose either Question 2 or Question 3)

THIS QUESTION PAPER CONSISTS OF 14 PAGES

Section A

[51 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet.

Each answer carries one mark.

1. Which of the following is the example of verification method ?

A. Identification card B. Facial Recognition

C. Iris Scanning D. Hand Geometry Scanning

Write True or False for the following statement.

2. An anti-spyware application program sometime called tracking software or a spybot.

Question 3 (i) and 3(ii)

Fill in the blank with the appropriate answer.

Figure 1

3. (i) Figure 1 is computer hardware technology used in computer models which were

invented in ______________ generation .

(ii)

The above statement is an example of _____________________ .

4. Figure 2 shows security measures to overcome computer threats.

X : Firewall Y : Cryptography

Z : Data Backup

Based on Figure 2, match the security measures with the following statements by

writing X, Y or Z. (i) A piece of hardware or software which functions in a networked environment

to prevent some communications forbidden by the security policy.

(ii) A process of hiding information by altering the actual information into different representation.Question 5Write True or False for the following statement.

5. Control Units main function is to perform all arithmetic and logical operations.

6. What is the main reason for using ASCII ?

A. To process textual data

B. To process graphic data

C. To achieve compatibility between various types of data processing

D. To purchase components that are compatible with their computer configuration.

Question 7Fill in the blank with the appropriate answer.

7. ROM is _____________________ which means it holds the programs and data even when the computer is turned off.

8. Figure 3(a) and 3(b) show operating system platforms. Match the operating system platforms with the figure by writing the operating system

platforms given in the box below.

Figure 3(a) Figure 3(b)

(i) Figure 3(a)

(ii) Figure 3(b) Figure 4 shows the famous computer scientists in 3 computer generations era.

Label the correct computer generation era for each computer scientists .

FIRST GENERATION

SECOND GENERATION

FOURTH GENERATION

Figure 4

Question 10Fill in the blank with the answers given in the boxes below.

It is essential that you install antivirus software. Antivirus software is a ______________ program that scan the hard disks, floppy disks and memory to detect viruses. Examples of antivirus software are Norton Antivirus and McAfees VirusScan.

Antivirus softwares normally look for virus signatures to identify a virus. Users of antivirus softwares must update the _____________________ files as often as possible to ensure that such files contain patterns for newly discovered viruses.

If an antivirus programs cannot remove the virus, it often ________________ the infected file in a separate area of a hard disk until the virus can be removed. Most antivirus programs can create a recovery disk to remove or repair infected programs and files. In extreme cases, a hardisk may need to be reformatted to remove a virus.11. What is the set of rules used for information exchange between computers in

a network?

A. Router

B. Protocol

C. ISDN

D. Streamyx

Question 12 (i) and 12 (ii)

Write True or False for the following statement.12. (i) WAN is a network that covers a large geographical area such as city,

country, or the world. In other words, it is called Internet.12. (ii) Microwave is a type of wireless transmission media.

Question 13(i) and 13(ii) Fill in the blank with appropriate answer.13. (i) Windows NT is an example of ___________________________ software.13. (ii) _____________ is a communication device that connects multiple computers

and transmits data to its correct destination on network.

14. Table 1 shows three types of network topology.

TopologyPQR

configuration

Table 1 Based on Table 1 match the topology with the following statement by

writing P,Q, or R.

In this topology, if one node fails, the entire network will fail to function.

15. Which of he following programs can be used to generate graphic?

A. Microsoft Power Point

B. Microsoft Word

C. Adobe Photoshop

D. Adobe Audition

16.

UsageBasic media for many multimedia system

AdvantageSmall file size

File format.rtf,txt

Table 2 Based on Table 3 above, the statement refers to ___________ A. Text

B. Graphic

C. Audio

D. Video

Question 17

Write True or False for the following statement17. Navigation means the user cannot move around the menus or other screen in

a system.Question 18(i) and 18(ii)Fill in the blank with the appropriate answer.18.(i) Multimedia products can be delivered by CD based and ________________ (ii) The ______________ is to write the program code lines or scripts using

authoring tool.19. (i) This network consists of a single central cable to which all computers and devices are connected. (ii) A network links two or more computers together normally connect in loop to enable data and resource exchange.20. Based on Figure 5, select the multimedia devices that suit the statements below. A B C

(i)This device can store images on disks or on film.(ii)This device is used to read data or information.21 . A ______________________web editor is an editor where you use HTML tags to

create a web page.. 22 . The multimedia element that makes objects move is called_________________.23. Table 3 shows authoring tools in multimedia production

Based on table 3 , match the authoring tools with the following statement by writing A,B,C or D.(i) This software uses card concept to develop production.(ii) This software uses icon concept to develop production.24. In program design phase, there are 3 popular tools which are

I Flow chart

IIPseudo code

III Top-down design model

IVBottom-up design model

AI,II and III

BI,II and IV

CI,III and IV

DII,III and IV

Question 25(i) and 25 (ii)

25 (i) There are five basic elements in programming that are: constants,data

types,variable,___________________ and control structures.

(ii) There are two programming approaches which are____________________ and object oriented programming.

26. _________________ is a set of commands or instructions which directs a computer in doing a task.

A. Program

B. Language

C. Programmer

D. Programming LanguageQuestion 27Write True or False for the following statement.27. Control structures can be divided into approach control and selection control.28. Table 4(a) and 4(b) show a statement about programming

Based on the table above, match Table 4(a) with Table 4(b)

(i) M =

(ii) N =

29. Information is

A. Collection of unprocessed items which include text, numbers, images, audio and video.

B. Processed data; that is organized ,meaningful and useful

C. Collection of data organized in a meaningful manner that allows a user to access,retrieve and use the data.D. Hardware,software,data,people and procedures that work together to produce quality information.

Question 30(i) and 30 (ii)

Write True or False for the following statement.30 (i)A record is a collection of files logically related to one another.30 (ii)A Transaction Processing System(TPS) is an information system that captures and processes data day to day business activities.

31._______________________ is one example of data manipulation where one or more records can be listed using certain condition.

Question 32(i) and 32 (ii)

Figure 6 shows about Database

Based on Figure 6, match with and write J,K,L or M for statement below.

32 (i)A window on the screen that provides area for entering or changing data in a database.32 (ii)A field in a table that must match with a primary key in a another table in order to enable both tables to have relationship for the record.33

Figure 7 shows a hierarchy of data.

Figure 7Based on the figure, name M and N.

END OF QUESTION PAPERFariz is a muslim. One day, he received a spam e-mail stating that his favourite soda drink Soda Mooda Moody uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 30 of his friends.

PC Platform

Apple Platform

Cross- Platform

application

quarantines

utility

virus

definition

recovery disk

R

Figure 5

Presper Eckert

Bit

Byte

Steve Jobs

Q

P

M

Record

N

Database

Table 3

Table 4(a)

Table 4(b)

Figure 6

3765/1 [Lihat Sebelah

SULIT