Soalan Ict Form4

download Soalan Ict Form4

of 5

Transcript of Soalan Ict Form4

  • 8/14/2019 Soalan Ict Form4

    1/5

    NAME :

    FORM :

    ICT F4

    MONTHLY TESTSEPTEMBER 2009

    SEKOLAH MENENGAH KEBANGSAAN LUTONG, MIRI

    MONTHLY TEST (SEPTEMBER)YEAR 2009

    Subject :

    INFORMATION AND COMMUNICATION

    TECHNOLOGY (ICT) FORM 4

    Time Period:09.50-10.30am (40 Minutes)

    Date :

    08.09.2009 (Tuesday)

    REMINDER :

    DONT OPEN THE PAPER UNTIL YOUHAVE BEEN ASK TO DO SO

    Answer all the questions

    The questions consist of 5 pages of printed paper including cover

    CONFIDENTIAL

  • 8/14/2019 Soalan Ict Form4

    2/5

    Question 1 - Write the correct example for each blank below

    Advantages Disadvantages

    Effective sharing of information- Information can be

    1___________________________

    ____________________________

    - Exchange opinions, news and etcthrough email, discussion groupsand many more channels.

    Social problems- Individualistic and Introvert- Identity theft- Fraud

    - Pornography- 2______________- Online Gambling

    Lower cost communication- Internet is cost effective- Cheap connection

    Health problems- 3______________- Eyestrain- Physical and mental health

    4_____________ of communication

    - Information can be accessed andretrieved anytime, anywhere.

    - But GIGO applies(Garbage In, Garbage Out)

    Paperless environment- Information can be stored and

    retrieved from harddiskorCD-Rom (digital medium)

    5________________ communication- Anyone can be reach with the right

    technologies

    Question 2 - Write the correct example for each blank below

    The Impact of ICTon Society

    Reliability

    3____________

    2______________ Environment

    Borderless

    4__________

    ___________

    _

    5__________

    ___________

    _

    Speed

    1___________

    Advanta e

    Disadvanta es

    (10 Marks)

    (10 Marks)

  • 8/14/2019 Soalan Ict Form4

    3/5

    Question 3 - Write the correct example for each blank belowCOMPUTER LAW

    Law is a 1_____________________________________________ that govern the affairs

    of a community by a political authority. Law differs from one country to another. In the era

    of technology, computer law is needed to clarify goods or actions that fall under the

    computer law.

    Ethics Law

    Using the office computer to

    2__________________________

    Sending a 3________________ toother people computer

    Reading 4___________________

    without permission

    5_______________ into othercomputers

    Plagiarising and using materials from

    the Internet without giving credit tothe author.

    Selling

    6__________________________

    AUTHENTICATIONAuthentication is a process where users verify that they say are who they say they are. The userwho attempts to perform functions in a system is in fact the user who is authorised to do so.Authentication is important in order to safeguard against unauthorised access and use.

    1___________________________ Callback System

    A device that translates personal

    characteristics into a digital codethat is compared with a digital codestored in the database.

    Refers to the checking2

    ____________________________________.It is commonly used in the bank operation andbusiness transaction.

    Examples:Fingerprint Recognition, FacialRecognition, Hand Geometry, IrisScanning, Retinal Scanning, VoiceRecognition, Signature VerificationSystem.

    Examples:The bank/company will call back to confirm theservice required.

    CYBER LAWS

    Cyber laws refer to any laws relating to protecting the Internet and other onlinecommunication technologies.

    Question 4 - Write the correct example for each blank below

    Digital SignatureAct 1997

    2_____________

    ______________

    1____________________________

    Communication andMultimedia Act 1998

    4 types ofCyber laws in

    Malaysiainclude:-

    (2 Marks)

    (12 Marks)

    (4 Marks)

    (4 Marks)

  • 8/14/2019 Soalan Ict Form4

    4/5

    SECURITY THREATS

    Computer threats can come from many ways either from human or natural disasters.

    Computer threats includes 5 types of:i.Malicious codes, ii. 1______________,iii. Natural & Environmental Threats and iv. 2______________.

    DATA REPRESENTATION

    - Computer uses binary system to communicate with all the devices it is connected to.- Binary system consist of 2 digits 0 and 1, with 0 being OFF and 1 being ON.- Each 0 and 1 is called bit. Bit is short for _________________.(1).

    DATA MEASUREMENT

    The capacities of storage devices are stated in terms of the number of bytes they can store. Thecapacity of most current storage devices are in terms of megabytes and gigabytes.

    Unit Capacity

    1 KiloByte (KB) 210 = ________________ Bytes (1)

    1 MegaByte (MB) 220 = ________________ Bytes (2)

    1 __________________ (GB) (3) 230 about 1 billion Bytes

    1 __________________(TB) (4) 240 about 1 trillion Bytes

    Question 5 - Instruction: Circle the correct answer.

    1. A node on a network can be a ______________AVR

    A. ComputerB. User

    C. Router

    2. Of the three types of network, the _____________ covers the smallest area.LAN

    A. MANB. WAN

    C. Internet

    3. In your school computer lab, __________________ is commonly shared.A. Hard disk

    B. ProcessorC. RAM

    D. Software

    4. Which of the following is used as the connector for twisted-pair cable?A. SC

    B. RJ-45

    5. In a ring topology data is transmitted in ____________direction(s).

    8 bits = 1_____________(2) = 1 character

    (4 Marks)

    (4 Marks)

    (12 Marks)

    (24 Marks)

    C. BNC-T

    D. MT-RJ

  • 8/14/2019 Soalan Ict Form4

    5/5

    A. OneB. Two

    C. ThreeD. Four

    6. Choose the correct diagram that shows star topology.

    B.

    C. D.

    Question 6 - Draw any two type of computer network topologies and write also the type name andits 2 advanteges

    **** END OF QUESTION ****

    (14 Marks)

    Prepared by;

    ..MR. TAUFIK HIDAYAT BIN HAMID(ICT Form 4 Teacher)Head of ICT Department, SMKLu

    Topology Advantages ;-

    1._________________________________

    2._________________________________

    Topology Advantages ;-

    1._________________________________

    2._________________________________