sijil pelajaran malaysia 2011 3765/1 - kim's ict · sijil pelajaran malaysia 2011 3765/1 ......

18
SEKOLAH-SEKOLAH ZON A KUCHING SARAWAK SIJIL PELAJARAN MALAYSIA 2011 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober 2 ス jam Dua jam tiga puluh minit JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dan semua buku jawapan. 2. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam bahasa Melayu atau bahasa Inggeris. 3. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C. 4. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan. 5. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan. 6. Helaian Jawapan hendaklah diceraikan dan diserahkan bersama-sama dengan buku jawapan. Kertas soalan ini mengandungi 18 halaman bercetak dan 0 halaman tidak bercetak

Upload: vanduong

Post on 25-Apr-2019

230 views

Category:

Documents


0 download

TRANSCRIPT

SEKOLAH-SEKOLAH ZON A KUCHINGSARAWAK

SIJIL PELAJARAN MALAYSIA 2011 3765/1INFORMATION AND COMMUNICATION TECHNOLOGYKertas 1Oktober

2 ½ jam Dua jam tiga puluh minit

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakandan semua buku jawapan.

2. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalambahasa Melayu atau bahasa Inggeris.

3. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B danBahagian C.

4. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada HelaianJawapan.

5. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yangdibekalkan.

6. Helaian Jawapan hendaklah diceraikan dan diserahkan bersama-sama dengan bukujawapan.

Kertas soalan ini mengandungi 18 halaman bercetak dan 0 halaman tidak bercetak

2

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Section A[36 marks]

Answer all questions. Write your answers in the spaces provided in the Answer Sheet. Eachanswer carries one mark.

1 Table 1 shows a list of computer technologies and computer generations.

Computer Technology Computer Generation

(i) TransistorA First

B Second

(ii) MicroprocessorC Third

D Fourth

Table 1

Based on Table 1, write A, B, C or D to match the computer technology to the computergeneration.

2 Figure 1 shows the outcome of a scan using an antivirus.

Figure 1

Based on Figure 1, which of the following action can be used to label X?I healII deleteIII back upIV move to vault

A I, II and IIIB I, II and IVC I, III and IVD II, III and IV

X CANCEL

3

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

3 Figure 2 shows an encryption process.

Figure 2

Based on Figure 2, name W.

4 Figure 3 shows examples of input and output devices.

I II III IV

Figure 3

Based on Table 2, identify the output devices.

A I and II

B I and III

C II and IV

D III and IV

5 Complete the following statements.

(i) The clock speed is measured in ……… which is one cycle per second.

(ii) One kilobyte is equal to ………. bytes.

W

4

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

6 Figure 4 shows a computer motherboard.

Figure 4

Based on Figure 4, name:

(i) P(ii) Q

7 State whether the following statement is True or False.

The hardware components of a computer system are input devices, output devices andprocessor only.

8 State whether the following statement is True or False.

Figure 5 shows the logical view of a type of network architecture.

Figure 5

All computers in Figure 5 have equal responsibilities and capabilities to use the resourcesavailable on the network.

Q

P

5

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

9 Complete the following statement.

A set of communication rules between computers which breaks the data into packets beforethey are sent and then reassembles the packets when they reach a destination is known as____________.

10 Table 2 shows the descriptions of network communication technology.

Description Network CommunicationTechnology

(i)

- private network- uses TCP/IP to facilitate communication- provide information to suppliers, customer

and business partner

A Internet

B Intranet

C Extranet(ii)

- public network- uses TCP/IP to facilitate communication- provide information to the public

Table 2

Based on Table 2, write A, B or C to match the description with its appropriate networkcommunication technology.

11 Table 3 describes a type of operating system.

connects all the devices on a network so that the resources can be sharedefficiently and files can be transferred

provides administrative, security and management functions

Table 3

Based on Table 3, name the type of operating system.

6

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

12 Figure 6 shows the process of crimping and testing a UTP cable.

M N O

P Q

Figure 6

Based on Figure 6:

(i) write M, N, O, P or Q to arrange the steps in sequence

(ii) name the tool used in M

13 State whether the following statement is True or False.

Multimedia is the presentation of information using a combination of text, audio, graphic,video and animation.

14 Figure 7 shows the examples of application of multimedia in a particular field.

Figure 7

Based on Figure 7, state the field.

7

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

15 Table 4 shows the list of multimedia production team members and the role of two teammembers.

Member Role

Programmer

X Decide on the best educational strategiesand practices to present the information.Instructional Designer

Audio-Video Technician

Project Manager

Y Research and provide the content for themultimedia application.Subject Matter Expert

Graphic Artist

Table 4

Based on Table 4, match the multimedia production team members with

(i) X(ii) Y

16 Table 5 shows the characteristics of an authoring tool.

multimedia elements or events are organised in a structured framework

users can present visually a logical flow of events by dragging from the toolbox

Table 5

Based on Table 5, the authoring tool uses

A card concept

B flow concept

C icon concept

D time frame concept

17 Write the word that would complete the following statement:

A set of words, symbols, and codes that enables human to communicate with computers isknown as a / an ________________________.

8

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

18 Which of the following is a logical operator?

A +

B >

C AND

D EQUAL

19 Figure 8 shows two user interfaces from a multimedia teaching and learning courseware.

Figure 8

Based on Figure 8, identify the user interface principle applied indicated by:

(i) X

(ii) Y

20 Table 6 shows some activities carried out during the program development phases.

Activity Phase

(i) write program objective identify input, process and output meet users

A Problem analysis

B Program design

C Coding

D Documentation(ii) draw flowchart create user interface

Table 6

Based on Table 6, write A, B, C or D to match the activities with the appropriate phase.

Y

X X

9

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

21 Figure 9 shows the components of system S.

Figure 9

Based on Figure 9, what is S?

22 Table 7 describes a type of information system.

- acquires data from routine transactions

- analyses and extracts meaningful information

- narrows down the range of choices by applying rules

- provides “what if” analysis but does not replace human judgment

Table 7

Table 7 describes a/an

A Decision Support System

B Executive Information System

C Management Information System

D Transaction Processing System

S

10

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

23 Figure 10 shows the hierarchy of data.

Figure 10

Based on Figure 10, identify

(i) W

(ii) X

24 Figure 11 shows part of a database.

Figure 11

Based on Figure 11, identify the

(i) primary key in PAYMENT table

(ii) foreign key in ROOM table

W

X X X

11

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

25 Figure 12 shows two database objects.

P

Q

Figure 12

Based on Figure 12, name the database objects:

(i) P

(ii) Q

12

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Section B[20 Marks]

This section consists of five questions. Answer all questions.

26 Figure 13 (a) shows a student surfing the Internet in the school. Figure 1 (b) shows part ofthe web browser screen display when he tries to access the URL in Figure 1 (a).

(a) (b)

Figure 13

Based on Figure 13,

(a) explain the type of filtering used [2 marks ]

(b) state two negative effects on the student if he is able to access the web site [2 marks]

27 Figure 14 shows examples of computer hardware used in the information processing cycle.

A B

C D

Figure 14

http://www.nakedlady.com

13

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Based on Figure 14,

(a) State the function of component B and give one example. [2 marks]

(b) Draw a block diagram to represent the information processing cycle. Label A, B, C andD. [2 marks]

28 Figure 15 shows the network communication technology used in Company A and CompanyB.

Figure 15

Based on Figure 15, name and give one function of

(a) device X [2 marks]

(b) device Z [2 marks]

14

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

29 Figure 16 shows two types of instrument used during two different phases in multimediaproduction.

Phase S Phase T

Figure 16

Based on Figure 16,

(a) state phase S and phase T [ 2 mark ]

(b) describe the phase before phase S [ 2 marks ]

30 Figure 17 shows the flow charts of program P and program Q.

P Q

Figure 17

Y = Y +4

STOP

START

YesY > 12

READ Y

PRINT Y

Y = Y * 2

No

Y = Y + 4

READ Y

PRINT Y

START

STOP

15

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Based on Figure 17,

(a) write output for P and Q when the input is 10 for both programs [2marks]

(b) explain the control structure used in program Q [2marks]

16

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Section C

[14 Marks]

Answer two questions only.

(i) Question 31, and

(ii) Either Question 32 or Question 33

31 Figure 18 shows the database design of KESUMA Resort Information System(KRIS). Figure 18(a) shows the design of one of the queries used in KRIS. Figure18(b) shows the output when the query in (a) is run. Figure18(c) shows modificationsto the same query.

(a)

(b)

(c)Figure 18

17

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Based on Figure 18,

(a) Draw a table to show the outcome if the query in Figure 18 (c) is run. [3 marks]

(b) Design the report for the query in Figure 18 (c). [4 marks]

32 Figure 19 shows part of the program code to find the area of a rectangle.

Figure 19

Based on Figure 19,

(a) draw the flowchart for the program [5 marks](b) copy and complete the Table 8 [2 marks]

Input Outputlength width4 26 3

Table 8

33 Figure 20 shows two users doing banking transactions.

(a) (b)

Figure 20

Based on Figure 20,

(a) explain the difference in the authentication method used in (a) and (b) in order forthem to complete the transaction [3 marks]

(b) explain one transaction that can be carried out only in (a) [2 marks](c) explain one advantage of using (b) compared to (a) [2 marks]

Private Sub cmdCalculate_Click()

Dim length As IntegerDim width As IntegerDim area As Integer

length = Val(txtLength.Text)width = Val(txtWidth.Text)

area = length*widthtxtArea.Text = area

End Sub

18

` [Lihat halaman sebelah3765/1 @ 2011 Hak Cipta Zon A Kuching, Sarawak SULIT

Nama Calon:No. Kad Pengenalan - -Angka GiliranQuestion Answer Score

1(i) 1(ii) 2

2(ii)

33 44(i)

5

5(i) 6(ii) 7

6(i) 8(ii) 9

7(i)

108 119 12

10(i) 13(ii) 14

11 15

12(i) 16(ii) 17

13 1814 19

15(i) 20(ii) 21

16 2217(i)

2318 24

19(i) 25(ii) 26

20(i) 27(ii) 28

21(i)

2922 30

23(i) 31(ii) 32

24(i) 33(ii) 34

25(i) 35(ii) 36