Soalan Ict Form4
Transcript of Soalan Ict Form4
-
8/14/2019 Soalan Ict Form4
1/5
NAME :
FORM :
ICT F4
MONTHLY TESTSEPTEMBER 2009
SEKOLAH MENENGAH KEBANGSAAN LUTONG, MIRI
MONTHLY TEST (SEPTEMBER)YEAR 2009
Subject :
INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT) FORM 4
Time Period:09.50-10.30am (40 Minutes)
Date :
08.09.2009 (Tuesday)
REMINDER :
DONT OPEN THE PAPER UNTIL YOUHAVE BEEN ASK TO DO SO
Answer all the questions
The questions consist of 5 pages of printed paper including cover
CONFIDENTIAL
-
8/14/2019 Soalan Ict Form4
2/5
Question 1 - Write the correct example for each blank below
Advantages Disadvantages
Effective sharing of information- Information can be
1___________________________
____________________________
- Exchange opinions, news and etcthrough email, discussion groupsand many more channels.
Social problems- Individualistic and Introvert- Identity theft- Fraud
- Pornography- 2______________- Online Gambling
Lower cost communication- Internet is cost effective- Cheap connection
Health problems- 3______________- Eyestrain- Physical and mental health
4_____________ of communication
- Information can be accessed andretrieved anytime, anywhere.
- But GIGO applies(Garbage In, Garbage Out)
Paperless environment- Information can be stored and
retrieved from harddiskorCD-Rom (digital medium)
5________________ communication- Anyone can be reach with the right
technologies
Question 2 - Write the correct example for each blank below
The Impact of ICTon Society
Reliability
3____________
2______________ Environment
Borderless
4__________
___________
_
5__________
___________
_
Speed
1___________
Advanta e
Disadvanta es
(10 Marks)
(10 Marks)
-
8/14/2019 Soalan Ict Form4
3/5
Question 3 - Write the correct example for each blank belowCOMPUTER LAW
Law is a 1_____________________________________________ that govern the affairs
of a community by a political authority. Law differs from one country to another. In the era
of technology, computer law is needed to clarify goods or actions that fall under the
computer law.
Ethics Law
Using the office computer to
2__________________________
Sending a 3________________ toother people computer
Reading 4___________________
without permission
5_______________ into othercomputers
Plagiarising and using materials from
the Internet without giving credit tothe author.
Selling
6__________________________
AUTHENTICATIONAuthentication is a process where users verify that they say are who they say they are. The userwho attempts to perform functions in a system is in fact the user who is authorised to do so.Authentication is important in order to safeguard against unauthorised access and use.
1___________________________ Callback System
A device that translates personal
characteristics into a digital codethat is compared with a digital codestored in the database.
Refers to the checking2
____________________________________.It is commonly used in the bank operation andbusiness transaction.
Examples:Fingerprint Recognition, FacialRecognition, Hand Geometry, IrisScanning, Retinal Scanning, VoiceRecognition, Signature VerificationSystem.
Examples:The bank/company will call back to confirm theservice required.
CYBER LAWS
Cyber laws refer to any laws relating to protecting the Internet and other onlinecommunication technologies.
Question 4 - Write the correct example for each blank below
Digital SignatureAct 1997
2_____________
______________
1____________________________
Communication andMultimedia Act 1998
4 types ofCyber laws in
Malaysiainclude:-
(2 Marks)
(12 Marks)
(4 Marks)
(4 Marks)
-
8/14/2019 Soalan Ict Form4
4/5
SECURITY THREATS
Computer threats can come from many ways either from human or natural disasters.
Computer threats includes 5 types of:i.Malicious codes, ii. 1______________,iii. Natural & Environmental Threats and iv. 2______________.
DATA REPRESENTATION
- Computer uses binary system to communicate with all the devices it is connected to.- Binary system consist of 2 digits 0 and 1, with 0 being OFF and 1 being ON.- Each 0 and 1 is called bit. Bit is short for _________________.(1).
DATA MEASUREMENT
The capacities of storage devices are stated in terms of the number of bytes they can store. Thecapacity of most current storage devices are in terms of megabytes and gigabytes.
Unit Capacity
1 KiloByte (KB) 210 = ________________ Bytes (1)
1 MegaByte (MB) 220 = ________________ Bytes (2)
1 __________________ (GB) (3) 230 about 1 billion Bytes
1 __________________(TB) (4) 240 about 1 trillion Bytes
Question 5 - Instruction: Circle the correct answer.
1. A node on a network can be a ______________AVR
A. ComputerB. User
C. Router
2. Of the three types of network, the _____________ covers the smallest area.LAN
A. MANB. WAN
C. Internet
3. In your school computer lab, __________________ is commonly shared.A. Hard disk
B. ProcessorC. RAM
D. Software
4. Which of the following is used as the connector for twisted-pair cable?A. SC
B. RJ-45
5. In a ring topology data is transmitted in ____________direction(s).
8 bits = 1_____________(2) = 1 character
(4 Marks)
(4 Marks)
(12 Marks)
(24 Marks)
C. BNC-T
D. MT-RJ
-
8/14/2019 Soalan Ict Form4
5/5
A. OneB. Two
C. ThreeD. Four
6. Choose the correct diagram that shows star topology.
B.
C. D.
Question 6 - Draw any two type of computer network topologies and write also the type name andits 2 advanteges
**** END OF QUESTION ****
(14 Marks)
Prepared by;
..MR. TAUFIK HIDAYAT BIN HAMID(ICT Form 4 Teacher)Head of ICT Department, SMKLu
Topology Advantages ;-
1._________________________________
2._________________________________
Topology Advantages ;-
1._________________________________
2._________________________________