Download - Soalan ICT F4 2011
-
8/3/2019 Soalan ICT F4 2011
1/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
1
NAME :
FORM :
ICT F4
FINAL YEAR EXAM
SEPTEMBER 2011
SEKOLAH MENENGAH KEBANGSAAN LUTONG, MIRI
FINAL YEAR EXAM (OCTOBER)
YEAR 2011
Subject :
INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT) FORM 4
REMINDER :
DONT OPEN THE PAPER UNTIL YOU
HAVE BEEN ASK TO DO SO
Answer all the questions from Section A, Section B
and answer 2 question from Section C.
The questions consist of 13 pages of printed paper including cover
CONFIDENTIAL
Disediakan oleh:
EN. TAUFIK HIDAYAT BIN HAMIDGuru ICT Ting. 4SMK Lutong. Miri.
Disahkan oleh:
EN. HENRY HOGuru Kanan MP Teknik & VokasionalSMK Lutong. Miri.
Disemak oleh:
CIK FAIZA BT MOHAMEDKetua Panitia ICTSMK Lutong. Miri.
-
8/3/2019 Soalan ICT F4 2011
2/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
2
NO KAD PENGENALAN
ANGKA GILIRAN Answer Sheet
Helaian Jawapan
Question No.
No. Soalan
Candidates Answer
Jawapan Calon
Marks
Markah1. (a) 1
(b) 2
2. (a) 3
(b) 4
3. 5
4. (a) 6
(b) 7
5. (a) 8
(b) 9
6. (a) 10
(b) 11
7. (a) 12
(b) 13
8. 14
9. 15
10. 16
11. 17
12. 18
13. 19
14. 20
15. (a) 21
(b) 22
16. (a) 23
(b) 24
17. 25
18. 2619. (a) 27
(b) 28
20. 29
21. 30
22. 31
23. 32
24. (a) 33
(b) 34
25. 35
26. (a) 36
(b) 37
-
8/3/2019 Soalan ICT F4 2011
3/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
3
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1 Choose whether the statements below are True or False.
(a) Privacy can be protected by utilities software such as firewall.
(b) Cyber law is a way to protect data privacy.
2Match each of the devices below to the correct statement. Write the name of the device.
Microphone Scanner Digital Camera
(a)The device that is used to transform conventional images into digital images.
(b)The device that is used to record analog sound.
3 Write whether the statement below is True or False.
The functions of application software are starting a computer, providing a user interface,
managing memory and configuring devices.
4Match each of the items below to the correct statement.
Bit
Bit
Byte
Bait
Word
Perkataan
(a) The smallestunit of computer data.
(b) Equals to eightbit.
5 Match the application software in Table 1 to the statement below. Write A, B or C.
Spreadsheet
Hamparan Elektronik
Presentation Software
Perisian Persembahan
Word Processor
Pemproses Perkataan
A B C
TABLE 1
(a) A marketing manager uses this software to demonstrate products and encourage
customers to make purchase.(b) A clerk uses this software to create and print textual documents such as letters and paper
work.
-
8/3/2019 Soalan ICT F4 2011
4/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
4
6 Figure 2 shows two types of transmission medium.
X Y
FIGURE 2
State whats the type or its name for : (answer in Answer Sheet provided)
(a) X (b) Y
7 i) Statement 1 shows a characteristics of a network type.
All computers act as both servers and clients
All computers have equal responsibilities and capabilities to use the resources
available on the network.
STATEMENT 1
Statement 1 best describes:
A. Bus topologyB. Ring topologyC. Peer-to-peer networkD. Client-Server network
ii). In a ring topology data is transmitted in ____________direction(s).
A. OneB. TwoC. ThreeD. Four
8 . .. is afounder and developed the apple macintosh.A. William MauchB. John BardeenC. Steve JobsD. Blaise Pascal
-
8/3/2019 Soalan ICT F4 2011
5/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
5
9 .. refers to the use of computers to assist healthcare professionals in differentlocations to conduct live conference using the computer.
A. Robotic
B. Telemedicine
C. Neural network
D. Computer aided manufacturing
10 Which of the following is a low-level programming language?
A. Natural Language
B. Assembly Language
C. Non-Procedural Language
D. Procedural Language
11 A computer programming technique in which the program is divided into modules like
function, sub-routine and procedure is defined as a ____________________.
12 It is a programming approach. Decompose the main program into a number of entities. Build data and functions around these entities. Bound data closely to the functions.
The statement above refers to which type of control structure ? ..
13 Figure 3 shows a flowchart.
The control structure used in Figure 3 is.
14 The following are activities carried out during program development.
I Code the program using a programming language
FIGURE 3
-
8/3/2019 Soalan ICT F4 2011
6/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
6
II Meets users to understand the purpose and the requirements.
III Test the program and make sure it is error free
IV Prepare a flowcart or pseudocode to solve the problem.
Arrange the above activities in the correct order.
15 Figure 4shows a portion of a programming code.
FIGURE 4
State one :
(a) Constant
(b) Variable
16Choose the best answer according to the data types below.
Integer Boolean Double String
(a) Data type that contains any whole number value that does not have any fractional part.
(a) Any value that contains a sequence of characters.
17 The following statements describe the characteristics of a compiler and interpreter.
P Translate code on the fly; no object file is stored in secondary storage.
Q Convert all the source code into machine code.
R Create an executable file.
S Translate and then execute one line of code at a time.
T Translate the code each time it is run.
Choose the characteristic(s) of a compiler. Write the letter(s) (P,Q,R,S,T) in the space
provided.
18 NIC (Network Interface Card), enables a computer or device to access a wired __________.
-
8/3/2019 Soalan ICT F4 2011
7/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
7
23 Write True or False for the following statement below.
The control unit consists of CPU and the ALU.
24 Modem enables a computer to transmit data over telephone or cable line. Modemconverts
____(a)____ signals from computer into ____(b)____ signals to send over the phone lines
and converts the phones analog signals into digital signal for the computer.
25 Interpreter and ______________ are programs that translate high level language into
machine language.
26 Boolean (Logical Value) data type contains either a ____(a)____ or ____(b)____ value.
19 Write two example thedisadvantages of ICT in daily life. ________(a)________ and_______(b)_______.
20 _____________ type contains a sequence of character, for examples - Abu Hassan, Jalan
Bahagia.
21 Cyber law is defined as _____________________.
A. any laws relating to electronic and technology industry.
B. any laws relating to industry and the Internet communications.
C. any laws relating to technology and the Internet communications.
D. any laws relating to protecting the internet and other online communication technology
22 Choose which isnot a network communication devices from below list ;A. NIC ( Network Interface Card)B. ModemC. Hub/ SwitchD. Compiler
-
8/3/2019 Soalan ICT F4 2011
8/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
8
Section B
[20 marks]
This section consists of3 questions.Answer all questions.
27 Figure 6 shows the information processing cycle.
FIGURE 6
Based on Figure 6 :
(a) State the name and give the meaning of P.
Name -
Meaning-
..
..
[ 2 marks]
(b) State the function of R.
.
[ 2 marks]
PROCESSP S
STORAGE
Q R
ROM
-
8/3/2019 Soalan ICT F4 2011
9/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
9
28 Figure 7 shows the operators used in programming development.
Figure 7 (i) Figure 7 (ii)
FIGURE 7
Based on Figure 7 :
(a) Identify the operator used in Figure 7(i) and 7(ii).
[ 2 marks]
(b) Based on your answer in ( a ) differentiate between operator in 7( i ) and
7( ii ).
[ 2 marks]
-
8/3/2019 Soalan ICT F4 2011
10/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
10
29 Figure 8 shows how a car is assembled in a Proton factory.
Figure 8
Based on Figure 8 :
(a) State two difference between assembling a car manually and the process
shown in Figure 8.
.
[ 2 mark]
(b) Give two positive impact using technology in Figure 8 to the society.
...
[ 4 marks]
30. Below are the hardware needed while setting network facilities. Name them.
Hardware Name
i.
-
8/3/2019 Soalan ICT F4 2011
11/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
11
ii.
iii.
( 6 marks )
Section C
[14 marks]
This section consists ofthree questions. Answer two questions.
a. Question 31, AND
b. Question 32 OR Question 33
31 Statement 2 below explains the task that you need to complete.
STATEMENT 2
Based on Statement 2 :
(a) (i) Identify two communication devices that are required to set up the
network.
Kenal pastiduaperanti komunikasi yang diperlukan untuk
menyediakan rangkaian.
..
[ 2 marks]
You are given a responsibility by the Head of Department to setup a network for 10
computers in the office. You need some network devices to setup these networking.
Ahmad is given 2 weeks to complete the task.
Anda telah diberi tanggung jawab oleh Ketua Jabatan untuk membuat rangkaian bagi
10 komputer peribadi di pejabat. Anda memerlukan beberapa peranti rangkaian
untuk membuat rangkaian tersebut.. Anda diberi masa selama 2 minggu untuk
menyelesaikan tugasan tersebut.
-
8/3/2019 Soalan ICT F4 2011
12/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
12
(ii) Explain the function of the two devices you mentioned in (a)(i).
Terangkan fungsi kedua-dua peranti rangkaian yang anda
nyatakan di (a)(i).
[ 2 marks]
(b) Explain the type of network architecture used in the network.Jelaskan jenis rekabentuk rangkaian yang digunakan dalam
rangkaian tersebut.
.
.
.
[ 3 marks]
32 Write the correct example answer of the impact of ICT on society
The Impact of ICTon Society
Reliability
3_____n2______________ Environment
Borderless
4__________
___________
Speed
1___________
Advanta e
Disadvanta es5__________
___________
1. .
2. .
3. . [ 3 marks]
4..
[ 2 marks]
5. ......
..
. [ 2 marks]
-
8/3/2019 Soalan ICT F4 2011
13/13
SULIT 3765/1
3765/1 2011 ICT@SMKLTG SULIT
13
33 Statement 4 below explains a program that Ahmad needs to build to calculate the marksand grades.
STATEMENT 4
Based on Statement 4 :
(a) State two translation method of programming language used by
Ahmad.i.
ii....
[ 2 marks]
(b) Explain one of the translation methods in (a).
...
[ 1 mark]
(c) Differentiate between the translation method of programming
language used in (a).
.
.
.
.
[ 4 marks ]
END OF QUESTION PAPER
Every year, the co-curriculum unit will give marks and grades to all SPM
students. Ahmad is an ICT teacher and given a task to build a program to
calculate the marks. He uses Microsoft Visual Basic programming language tocomplete his task.