Download - Ujian ICT
SULIT 3765/1
CONFIDENTIAL3765/1ICT 12½ Hours
EXAMINATION FORM 5
INFORMATION AND COMMUNICATION TECHNOLOGY3765/1
2 ½ HOURS
READ THE INSTRUCTION CAREFULLY
1. Section A consists of 25 questions. Answer ALL questions in answer sheet A1.
2. Section B consists of 5 questions. Answer ALL the questions in the space provided.
3. Section C consists of 3 questions. Answer two questions. Question 1 is compulsory. You can
choose to answer Question 2 or Question 3. Answer in the space provided.
This paper consists of 12 printed pages.CONFIDENTIAL
3765/1 SULIT1
Name : …………………………………………… Class : ……………………..
SULIT 3765/1
SECTION A (36 scores)
This section consists of 25 questions. Answer ALL questions.
Learning Area 1 (ICT and Society)
1. Based on Diagram 1, X is best described as
Diagram 1A spamB cookiesC spywareD electronic profile
2. Bit is the smallest unit of data a computer can process. Byte is unit of information built from bits. One byte is equal to _____________ bit.
3. Computer crimes include computer fraud, computer infringement, computer theft and computer attack. State the name of crime activity for situation 1.
Raju received an e-mail inviting him to invest in a “Skim Cepat Kaya” investment. Raju took action
as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
100,000.00 in two weeks, but after two weeks, nothing happened.
Situation 1
Computer crime for this case is _______________________________
4. Match the invention according to the right computer generations by write P, Q, or R in spaces provided in Answer Sheet 1A .
i Mobile Computing P First Generationii Vacuum Tube Q Third Generation
iii Integrated Circuit R Fifth Generation
i _______________ii ______________
iii ______________
5. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A based on statement below.Pornography can lead to criminal acts such as exploitation of women and children. _____
3765/1 SULIT2
SULIT 3765/1
Learning Area 2 ( Computer System)
6. Windows XP, Macintosh OS X, and Linux Suse are examples ofA Application SoftwareB Web BrowserC Operating SystemsD Shareware program
7. To convert conventional images to digital images, _____________ are used.
8. Speaker and headphones are classified as ______________ devices while joysticks and trackballs are classified as ______________ devices.
9. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.i Jamal wants to send a file to Wong using electronic mail services. He must ensure that the
file is free from virus before it is sent. Jamal uses application software to ensure the file is virus-free before it is sent. ______
ii Wong downloads and save that file in secondary storage like flash drive. ______
10. Figure below shows the motherboard of a computer. Name J and K.
11. Table 1 shows several terms in a computer system.
A Input Device
B Command-Line User Interface
C Word Processing Software
TABLE 1
Based on Table 1, write A, B, or C for the following question in the spaces provided in Answer Sheet 1A.
a. Shalini wants to create and manipulate documents containing text and graphics. What type of
program should Shalini use?
3765/1 SULIT
A scannersB camerasC printersD audio devices
3
J : _________
K: ________
SULIT 3765/1
b. “Type commands or press special keys on the keyboard to enter data and instructions that instruct
the operating system what to do. It has to be typed one line at a time.” These statements refer to…….
Learning Area 3 (Computer Network & Communication)
12. A _____________ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
A local area network (LAN)B metropolitan area network (MAN) C wide area network (WAN)D variable area network (VAN)
13. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.
i All computers in peer-to-peer network have equal responsibilities and capabilities to use the resources available on the network. _____
ii Extranet is a private network that uses internet technology to share information with authorized parties. _____
14. Ali connects three computers in his office through hub and server. The type of network that he used is called a ____________. Ali’s customer, David who lives in Singapore connects his computer to Ali’s new networks. This type of network is called a __________________ .
15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces provided in Answer Sheet 1A .
Item Statement
P Converts digital signals to analog signals and vice versa.
QCommonly used to connect signal of a LAN contains multiple ports.
R Adapter card that enables computer or device to access network.
S Connects networks that use the same protocol.
TConnects networks and transmits data to correct destination on network.
TABLE 2
Match the correct items that represent the statement that best describe the hardwares given below.
i Modem : _________
ii Router : _________
iii Network Interface Card : _______
3765/1 SULIT4
SULIT 3765/1
Learning Area 4 (Multimedia)
16. A movie that combines audio, graphics and animation is still considered as a __________ multimedia content since the user is a passive receiver of the content.
A linear B graphicC animationD non-linear
17.I ImplementationII EvaluationIII Design and Develop IV Testing V Analysis VI Publishing
The correct sequence in multimedia development isA. III, II, IV, IV, I, VB. I, II, III, IV, V, IVC. V, III, I, IV, II, VID. II, IV, III, I, V, IV
18. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.i Linear interactivity allows the user to interact with the content according to what the user wants.
19. Table 3 shows the multimedia development phase, based on the description given identify phases Y and Z, write the answer in spaces provided in Answer Sheet 1A.
Phase Description
Y The multimedia developer will design a flow chart and storyboard.
Z The multimedia developer will use a checklist to test the multimedia program. If there are errors, he will fix the program.
TABLE 3
Y:_______________________ Z: _______________________
3765/1 SULIT5
SULIT 3765/1
Learning Area 5 (Programming)
20. Arrange the programming languages given below from the earliest generation to the latest.A FORTRAN, Prolog, SQLB FORTRAN, SQL, PrologC SQL, FORTRAN, PrologD Prolog, SQL, FORTRAN
21. There are two types of programming approaches, which are ____________________ programming.I. objectII. designIII. structuredIV. object-oriented
A I and IIB I and IIIC II and IIID III and IV
22. Which of the following describes sequence control structure?
I. Implement decision making process in the program.II. Execute different statements for different conditions.III. Execute the code line by line regardless of the condition.IV. Executes statements one by one in linear or consecutive order.
A. I and IIB. I and IIIC. II and IVD. III and IV
23. The following are examples of programming languages. Choose the correct pair.
Generation Example of programming languageA First SQL Language
B Second Assembly Language
C Third Machine LanguageD Fourth C Language
24. A ______________________ is a set of words, symbols and codes that enables human to communicate with computers.
25. A(an) _______________ translates and executes each line of code one at a time in a programming.
3765/1 SULIT6
SULIT 3765/1
SECTION B (20 scores)This section consists of FIVE questions. Answer ALL questions.
Question 1
a. Malaysian Government has passed several cyber laws to control the Internet abuse. Four cyber law acts in Malaysia are
Digital Signature Act 1997 (i) ___________________________________
(ii) ___________________________________ Communication and Multimedia Act 1997
[2 scores]
b. Lee, a bank officer, has hacked his client’s account to get information for his own use. He can be convicted under _____________________ Act 1997. Computer crime for this case ________________
[2 scores]
Question 2
Table 1 shows the examples of computer software.
a. Based on the table 1, choose one example for suitable task given.Task 1: Coordinates all the activities among the computer hardware devices. _________________
Task 2: Protects a computer against viruses by identifying and removing any computer virus found in a memory or storage media or in incoming files. _______________________
[2 scores]
b. State two differences between proprietary and open source software. ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ [2 scores]
Question 31. Figure 2 shows topology of computer network.
School A School B
3765/1 SULIT7
Internet Explorer Microsoft ExcelAVG AntiVirus Linux
Topology A Topology B
hub
Table 1
SULIT 3765/1
Students from School A can communicate and share data with students in school B because they are connected to a Local Area Network (LAN).
a) Differentiate between Topology A and Topology B in terms of structure.__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[4 scores]
Question 4
a. Project Manager is one of important member in multimedia developments team. State the role of project manager.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[2 scores]
b. Multimedia development consists of six phases. Describe the analysis phase.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[2 scores]
Question 5
a. Based on the diagram below, complete the program development phases. [2 scores]
b. State two importance of Documentation phase in program development process._________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[2 scores]
3765/1 SULIT8
Analysis
Design
W
X
Documentation
X :________________
W :________________
SULIT 3765/1
SECTION C (14 scores)
This section consists of THREE questions. Answer two questions. You MUST answer QUESTION 1 and you can choose to answer question 2 OR 3.
Question 1Based on the following situation, answer questions.
a. Based on the situation given, draw a storyboard for your first slide in the box below. [4 scores]
b. What type of interactivity in multimedia suitable for your multimedia project and differentiate between the characteristic of linear and non linear multimedia. [3 scores]
___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
3765/1 SULIT
Situation:Your school is going to have a new intake for the Form 1 students. As a ICT student, you are given the responsibility by your principal to produce a multimedia project which will include all the information about your school for the parents and the new students. Your first slide should have your school name, school badge, and school song as background music. Your multimedia project must be both informative and interactive with suitable linking button to allow user choose their interest information.
9
SULIT 3765/1
Question 2
Based on the case study and pseudo code below, answer the following questions.
a. Identify the input, process and output of the program. [3 scores]
Input : ______________________________Process : _____________________________Output : ______________________________
b. Based on the Pseudo code given, draw a suitable flow chart to show the flow of program. [4 scores]
3765/1 SULIT
Case Study
Your school needs a registration program to computerize the registration of Curriculum Unit. Any student in the school should have all his/her data like name, class and IC number keyed into the Curriculum Unit registration program. After the program verifies the student data and all fields are filled, they will notified of his/her Curriculum Unit for the coming academic year.
Pseudo Code
BEGINKey in students’ data (verify data)
If all fields filled thenPrint curriculum unit
ElsePrint error message
End ifEND
10
SULIT 3765/1
Question 3
1. Figure 1 shows CMA Company computer network.
a) Name the topology of Network A. Give two advantages for topology in Network A.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[3 scores]
b) State two computer security threats that will be faced by CMA Company through its computer network and explain one of the security measures that can be applied to avoid the security threats. ___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
[4 scores]
END OF QUESTION PAPER
3765/1 SULIT
Figure 1
Network ANetwork B
Server
Modem
M0dem
Internet
11
SULIT 3765/1
ANSWER SHEET A1
NO. ANSWER SCORE1234 (i) (ii) (iii)5678 (i) (ii)9 (i) (ii)10 (i) (ii)11 (i) (ii)1213 (i) (ii)14 (i) (ii)15 (i) (ii) (iii)16171819 (i) (ii)202122232425
3765/1 SULIT
Name : ………………………………… Class : ……………………..
12
SULIT 3765/1
SCHEME
SECTION ANO. ANSWER SCORE1 C2 83 COMPUTER FRAUD4 (i) R (ii) P (iii) Q5 TRUE6 C7 A8 (i) OUTPUT (ii) INPUT9 (i) FALSE (ii) TRUE10 (i) EXPANSION SLOT (ii) PROCESSOR SLOT11 (i) C (ii) B12 B13 (i) TRUE (ii) TRUE14 (i) LAN / LOCAL AREA NETWORK (ii) WAN / WIDE AREA NETWORK15 (i) P (ii) S (iii) R16 A17 C18 FALSE19 (i) DESIGN AND DEVELOP (ii) TESTING20 B21 D22 D23 B24 PROGRAMMING LANGUAGE25 COMPILER
3765/1 SULIT13
SULIT 3765/1
SECTION B
1. a. (i) computer crimes act 1997 (ii) Telemedicine Act 1997b. (i) computer crimes act 1997 (ii) computer theft
2. a. Task 1 : Linux task 2 : AVG Anti virusb. Differences between proprietary and open source
Proprietary Open source1.2.
3. Bla…bla…bla…bla
4. a. Role of project manager : b. Analysis phase : ……………………bla…bla…bla
5. a. W : coding X : testing and debuggingb. importance of documentation phase:
1…..2…..
SECTION C
Question 1a. )
Question 2
a)
Question 3
a.)
3765/1 SULIT14