ICT 2014
-
Upload
dewi-chinta -
Category
Documents
-
view
6 -
download
0
description
Transcript of ICT 2014
Section A
SULIT 3765/1
CONFIDENTIAL
3765/1
ICT
SEPTEMBER
2009
2 HOURS 30 MINUTESJABATAN PELAJARAN MELAKA
INFORMATION AND COMMUNICATIONS TECHNOLOGY
(ICT)
PERCUBAAN SIJIL PELAJARAN MALAYSIA 2009
DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO
THIS QUESTION PAPER CONSISTS OF :
a. Section A
: 25 Questions
b. Section B
: 5 Questions
c. Section C
: 3 Questions
(Question 1 is Compulsory and
choose either Question 2 or Question 3)
THIS QUESTION PAPER CONSISTS OF 14 PAGES
Section A
[51 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Which of the following is the example of verification method ?
A. Identification card B. Facial Recognition
C. Iris Scanning D. Hand Geometry Scanning
Write True or False for the following statement.
2. An anti-spyware application program sometime called tracking software or a spybot.
Question 3 (i) and 3(ii)
Fill in the blank with the appropriate answer.
Figure 1
3. (i) Figure 1 is computer hardware technology used in computer models which were
invented in ______________ generation .
(ii)
The above statement is an example of _____________________ .
4. Figure 2 shows security measures to overcome computer threats.
X : Firewall Y : Cryptography
Z : Data Backup
Based on Figure 2, match the security measures with the following statements by
writing X, Y or Z. (i) A piece of hardware or software which functions in a networked environment
to prevent some communications forbidden by the security policy.
(ii) A process of hiding information by altering the actual information into different representation.Question 5Write True or False for the following statement.
5. Control Units main function is to perform all arithmetic and logical operations.
6. What is the main reason for using ASCII ?
A. To process textual data
B. To process graphic data
C. To achieve compatibility between various types of data processing
D. To purchase components that are compatible with their computer configuration.
Question 7Fill in the blank with the appropriate answer.
7. ROM is _____________________ which means it holds the programs and data even when the computer is turned off.
8. Figure 3(a) and 3(b) show operating system platforms. Match the operating system platforms with the figure by writing the operating system
platforms given in the box below.
Figure 3(a) Figure 3(b)
(i) Figure 3(a)
(ii) Figure 3(b) Figure 4 shows the famous computer scientists in 3 computer generations era.
Label the correct computer generation era for each computer scientists .
FIRST GENERATION
SECOND GENERATION
FOURTH GENERATION
Figure 4
Question 10Fill in the blank with the answers given in the boxes below.
It is essential that you install antivirus software. Antivirus software is a ______________ program that scan the hard disks, floppy disks and memory to detect viruses. Examples of antivirus software are Norton Antivirus and McAfees VirusScan.
Antivirus softwares normally look for virus signatures to identify a virus. Users of antivirus softwares must update the _____________________ files as often as possible to ensure that such files contain patterns for newly discovered viruses.
If an antivirus programs cannot remove the virus, it often ________________ the infected file in a separate area of a hard disk until the virus can be removed. Most antivirus programs can create a recovery disk to remove or repair infected programs and files. In extreme cases, a hardisk may need to be reformatted to remove a virus.11. What is the set of rules used for information exchange between computers in
a network?
A. Router
B. Protocol
C. ISDN
D. Streamyx
Question 12 (i) and 12 (ii)
Write True or False for the following statement.12. (i) WAN is a network that covers a large geographical area such as city,
country, or the world. In other words, it is called Internet.12. (ii) Microwave is a type of wireless transmission media.
Question 13(i) and 13(ii) Fill in the blank with appropriate answer.13. (i) Windows NT is an example of ___________________________ software.13. (ii) _____________ is a communication device that connects multiple computers
and transmits data to its correct destination on network.
14. Table 1 shows three types of network topology.
TopologyPQR
configuration
Table 1 Based on Table 1 match the topology with the following statement by
writing P,Q, or R.
In this topology, if one node fails, the entire network will fail to function.
15. Which of he following programs can be used to generate graphic?
A. Microsoft Power Point
B. Microsoft Word
C. Adobe Photoshop
D. Adobe Audition
16.
UsageBasic media for many multimedia system
AdvantageSmall file size
File format.rtf,txt
Table 2 Based on Table 3 above, the statement refers to ___________ A. Text
B. Graphic
C. Audio
D. Video
Question 17
Write True or False for the following statement17. Navigation means the user cannot move around the menus or other screen in
a system.Question 18(i) and 18(ii)Fill in the blank with the appropriate answer.18.(i) Multimedia products can be delivered by CD based and ________________ (ii) The ______________ is to write the program code lines or scripts using
authoring tool.19. (i) This network consists of a single central cable to which all computers and devices are connected. (ii) A network links two or more computers together normally connect in loop to enable data and resource exchange.20. Based on Figure 5, select the multimedia devices that suit the statements below. A B C
(i)This device can store images on disks or on film.(ii)This device is used to read data or information.21 . A ______________________web editor is an editor where you use HTML tags to
create a web page.. 22 . The multimedia element that makes objects move is called_________________.23. Table 3 shows authoring tools in multimedia production
Based on table 3 , match the authoring tools with the following statement by writing A,B,C or D.(i) This software uses card concept to develop production.(ii) This software uses icon concept to develop production.24. In program design phase, there are 3 popular tools which are
I Flow chart
IIPseudo code
III Top-down design model
IVBottom-up design model
AI,II and III
BI,II and IV
CI,III and IV
DII,III and IV
Question 25(i) and 25 (ii)
25 (i) There are five basic elements in programming that are: constants,data
types,variable,___________________ and control structures.
(ii) There are two programming approaches which are____________________ and object oriented programming.
26. _________________ is a set of commands or instructions which directs a computer in doing a task.
A. Program
B. Language
C. Programmer
D. Programming LanguageQuestion 27Write True or False for the following statement.27. Control structures can be divided into approach control and selection control.28. Table 4(a) and 4(b) show a statement about programming
Based on the table above, match Table 4(a) with Table 4(b)
(i) M =
(ii) N =
29. Information is
A. Collection of unprocessed items which include text, numbers, images, audio and video.
B. Processed data; that is organized ,meaningful and useful
C. Collection of data organized in a meaningful manner that allows a user to access,retrieve and use the data.D. Hardware,software,data,people and procedures that work together to produce quality information.
Question 30(i) and 30 (ii)
Write True or False for the following statement.30 (i)A record is a collection of files logically related to one another.30 (ii)A Transaction Processing System(TPS) is an information system that captures and processes data day to day business activities.
31._______________________ is one example of data manipulation where one or more records can be listed using certain condition.
Question 32(i) and 32 (ii)
Figure 6 shows about Database
Based on Figure 6, match with and write J,K,L or M for statement below.
32 (i)A window on the screen that provides area for entering or changing data in a database.32 (ii)A field in a table that must match with a primary key in a another table in order to enable both tables to have relationship for the record.33
Figure 7 shows a hierarchy of data.
Figure 7Based on the figure, name M and N.
END OF QUESTION PAPERFariz is a muslim. One day, he received a spam e-mail stating that his favourite soda drink Soda Mooda Moody uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 30 of his friends.
PC Platform
Apple Platform
Cross- Platform
application
quarantines
utility
virus
definition
recovery disk
R
Figure 5
Presper Eckert
Bit
Byte
Steve Jobs
Q
P
M
Record
N
Database
Table 3
Table 4(a)
Table 4(b)
Figure 6
3765/1 [Lihat Sebelah
SULIT