ujian ict

21
SULIT 3765/1 CONFIDENTIAL 3765/1 ICT 1 2½ Hours EXAMINATION FORM 5 INFORMATION AND COMMUNICATION TECHNOLOGY 3765/1 2 ½ HOURS READ THE INSTRUCTION CAREFULLY 1. Section A consists of 25 questions. Answer ALL questions in answer sheet A1. 2. Section B consists of 5 questions. Answer ALL the questions in the space provided. 3. Section C consists of 3 questions. Answer two questions. Question 1 is compulsory. You can choose to answer Question 2 or Question 3. Answer in the space provided. 3765/1 SULIT 1 Name : …………………………………………… Class : ……………………..

Upload: afizaex

Post on 10-Apr-2015

4.907 views

Category:

Documents


0 download

DESCRIPTION

Ujian Soalan ICT SPM

TRANSCRIPT

Page 1: Ujian ICT

SULIT 3765/1

CONFIDENTIAL3765/1ICT 12½ Hours

EXAMINATION FORM 5

INFORMATION AND COMMUNICATION TECHNOLOGY3765/1

2 ½ HOURS

READ THE INSTRUCTION CAREFULLY

1. Section A consists of 25 questions. Answer ALL questions in answer sheet A1.

2. Section B consists of 5 questions. Answer ALL the questions in the space provided.

3. Section C consists of 3 questions. Answer two questions. Question 1 is compulsory. You can

choose to answer Question 2 or Question 3. Answer in the space provided.

This paper consists of 12 printed pages.CONFIDENTIAL

3765/1 SULIT1

Name : …………………………………………… Class : ……………………..

Page 2: Ujian ICT

SULIT 3765/1

SECTION A (36 scores)

This section consists of 25 questions. Answer ALL questions.

Learning Area 1 (ICT and Society)

1. Based on Diagram 1, X is best described as

Diagram 1A spamB cookiesC spywareD electronic profile

2. Bit is the smallest unit of data a computer can process. Byte is unit of information built from bits. One byte is equal to _____________ bit.

3. Computer crimes include computer fraud, computer infringement, computer theft and computer attack. State the name of crime activity for situation 1.

Raju received an e-mail inviting him to invest in a “Skim Cepat Kaya” investment. Raju took action

as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM

100,000.00 in two weeks, but after two weeks, nothing happened.

Situation 1

Computer crime for this case is _______________________________

4. Match the invention according to the right computer generations by write P, Q, or R in spaces provided in Answer Sheet 1A .

i Mobile Computing P First Generationii Vacuum Tube Q Third Generation

iii Integrated Circuit R Fifth Generation

i _______________ii ______________

iii ______________

5. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A based on statement below.Pornography can lead to criminal acts such as exploitation of women and children. _____

3765/1 SULIT2

Page 3: Ujian ICT

SULIT 3765/1

Learning Area 2 ( Computer System)

6. Windows XP, Macintosh OS X, and Linux Suse are examples ofA Application SoftwareB Web BrowserC Operating SystemsD Shareware program

7. To convert conventional images to digital images, _____________ are used.

8. Speaker and headphones are classified as ______________ devices while joysticks and trackballs are classified as ______________ devices.

9. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.i Jamal wants to send a file to Wong using electronic mail services. He must ensure that the

file is free from virus before it is sent. Jamal uses application software to ensure the file is virus-free before it is sent. ______

ii Wong downloads and save that file in secondary storage like flash drive. ______

10. Figure below shows the motherboard of a computer. Name J and K.

11. Table 1 shows several terms in a computer system.

A Input Device

B Command-Line User Interface

C Word Processing Software

TABLE 1

Based on Table 1, write A, B, or C for the following question in the spaces provided in Answer Sheet 1A.

a. Shalini wants to create and manipulate documents containing text and graphics. What type of

program should Shalini use?

3765/1 SULIT

A scannersB camerasC printersD audio devices

3

J : _________

K: ________

Page 4: Ujian ICT

SULIT 3765/1

b. “Type commands or press special keys on the keyboard to enter data and instructions that instruct

the operating system what to do. It has to be typed one line at a time.” These statements refer to…….

Learning Area 3 (Computer Network & Communication)

12. A _____________ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.

A local area network (LAN)B metropolitan area network (MAN) C wide area network (WAN)D variable area network (VAN)

13. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.

i All computers in peer-to-peer network have equal responsibilities and capabilities to use the resources available on the network. _____

ii Extranet is a private network that uses internet technology to share information with authorized parties. _____

14. Ali connects three computers in his office through hub and server. The type of network that he used is called a ____________. Ali’s customer, David who lives in Singapore connects his computer to Ali’s new networks. This type of network is called a __________________ .

15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces provided in Answer Sheet 1A .

Item Statement

P Converts digital signals to analog signals and vice versa.

QCommonly used to connect signal of a LAN contains multiple ports.

R Adapter card that enables computer or device to access network.

S Connects networks that use the same protocol.

TConnects networks and transmits data to correct destination on network.

TABLE 2

Match the correct items that represent the statement that best describe the hardwares given below.

i Modem : _________

ii Router : _________

iii Network Interface Card : _______

3765/1 SULIT4

Page 5: Ujian ICT

SULIT 3765/1

Learning Area 4 (Multimedia)

16. A movie that combines audio, graphics and animation is still considered as a __________ multimedia content since the user is a passive receiver of the content.

A linear B graphicC animationD non-linear

17.I ImplementationII EvaluationIII Design and Develop IV Testing V Analysis VI Publishing

The correct sequence in multimedia development isA. III, II, IV, IV, I, VB. I, II, III, IV, V, IVC. V, III, I, IV, II, VID. II, IV, III, I, V, IV

18. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.i Linear interactivity allows the user to interact with the content according to what the user wants.

19. Table 3 shows the multimedia development phase, based on the description given identify phases Y and Z, write the answer in spaces provided in Answer Sheet 1A.

Phase Description

Y The multimedia developer will design a flow chart and storyboard.

Z The multimedia developer will use a checklist to test the multimedia program. If there are errors, he will fix the program.

TABLE 3

Y:_______________________ Z: _______________________

3765/1 SULIT5

Page 6: Ujian ICT

SULIT 3765/1

Learning Area 5 (Programming)

20. Arrange the programming languages given below from the earliest generation to the latest.A FORTRAN, Prolog, SQLB FORTRAN, SQL, PrologC SQL, FORTRAN, PrologD Prolog, SQL, FORTRAN

21. There are two types of programming approaches, which are ____________________ programming.I. objectII. designIII. structuredIV. object-oriented

A I and IIB I and IIIC II and IIID III and IV

22. Which of the following describes sequence control structure?

I. Implement decision making process in the program.II. Execute different statements for different conditions.III. Execute the code line by line regardless of the condition.IV. Executes statements one by one in linear or consecutive order.

A. I and IIB. I and IIIC. II and IVD. III and IV

23. The following are examples of programming languages. Choose the correct pair.

Generation Example of programming languageA First SQL Language

B Second Assembly Language

C Third Machine LanguageD Fourth C Language

24. A ______________________ is a set of words, symbols and codes that enables human to communicate with computers.

25. A(an) _______________ translates and executes each line of code one at a time in a programming.

3765/1 SULIT6

Page 7: Ujian ICT

SULIT 3765/1

SECTION B (20 scores)This section consists of FIVE questions. Answer ALL questions.

Question 1

a. Malaysian Government has passed several cyber laws to control the Internet abuse. Four cyber law acts in Malaysia are

Digital Signature Act 1997 (i) ___________________________________

(ii) ___________________________________ Communication and Multimedia Act 1997

[2 scores]

b. Lee, a bank officer, has hacked his client’s account to get information for his own use. He can be convicted under _____________________ Act 1997. Computer crime for this case ________________

[2 scores]

Question 2

Table 1 shows the examples of computer software.

a. Based on the table 1, choose one example for suitable task given.Task 1: Coordinates all the activities among the computer hardware devices. _________________

Task 2: Protects a computer against viruses by identifying and removing any computer virus found in a memory or storage media or in incoming files. _______________________

[2 scores]

b. State two differences between proprietary and open source software. ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ [2 scores]

Question 31. Figure 2 shows topology of computer network.

School A School B

3765/1 SULIT7

Internet Explorer Microsoft ExcelAVG AntiVirus Linux

Topology A Topology B

hub

Table 1

Page 8: Ujian ICT

SULIT 3765/1

Students from School A can communicate and share data with students in school B because they are connected to a Local Area Network (LAN).

a) Differentiate between Topology A and Topology B in terms of structure.__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[4 scores]

Question 4

a. Project Manager is one of important member in multimedia developments team. State the role of project manager.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[2 scores]

b. Multimedia development consists of six phases. Describe the analysis phase.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[2 scores]

Question 5

a. Based on the diagram below, complete the program development phases. [2 scores]

b. State two importance of Documentation phase in program development process._________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[2 scores]

3765/1 SULIT8

Analysis

Design

W

X

Documentation

X :________________

W :________________

Page 9: Ujian ICT

SULIT 3765/1

SECTION C (14 scores)

This section consists of THREE questions. Answer two questions. You MUST answer QUESTION 1 and you can choose to answer question 2 OR 3.

Question 1Based on the following situation, answer questions.

a. Based on the situation given, draw a storyboard for your first slide in the box below. [4 scores]

b. What type of interactivity in multimedia suitable for your multimedia project and differentiate between the characteristic of linear and non linear multimedia. [3 scores]

___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

3765/1 SULIT

Situation:Your school is going to have a new intake for the Form 1 students. As a ICT student, you are given the responsibility by your principal to produce a multimedia project which will include all the information about your school for the parents and the new students. Your first slide should have your school name, school badge, and school song as background music. Your multimedia project must be both informative and interactive with suitable linking button to allow user choose their interest information.

9

Page 10: Ujian ICT

SULIT 3765/1

Question 2

Based on the case study and pseudo code below, answer the following questions.

a. Identify the input, process and output of the program. [3 scores]

Input : ______________________________Process : _____________________________Output : ______________________________

b. Based on the Pseudo code given, draw a suitable flow chart to show the flow of program. [4 scores]

3765/1 SULIT

Case Study

Your school needs a registration program to computerize the registration of Curriculum Unit. Any student in the school should have all his/her data like name, class and IC number keyed into the Curriculum Unit registration program. After the program verifies the student data and all fields are filled, they will notified of his/her Curriculum Unit for the coming academic year.

Pseudo Code

BEGINKey in students’ data (verify data)

If all fields filled thenPrint curriculum unit

ElsePrint error message

End ifEND

10

Page 11: Ujian ICT

SULIT 3765/1

Question 3

1. Figure 1 shows CMA Company computer network.

a) Name the topology of Network A. Give two advantages for topology in Network A.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[3 scores]

b) State two computer security threats that will be faced by CMA Company through its computer network and explain one of the security measures that can be applied to avoid the security threats. ___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

[4 scores]

END OF QUESTION PAPER

3765/1 SULIT

Figure 1

Network ANetwork B

Server

Modem

M0dem

Internet

11

Page 12: Ujian ICT

SULIT 3765/1

ANSWER SHEET A1

NO. ANSWER SCORE1234 (i) (ii) (iii)5678 (i) (ii)9 (i) (ii)10 (i) (ii)11 (i) (ii)1213 (i) (ii)14 (i) (ii)15 (i) (ii) (iii)16171819 (i) (ii)202122232425

3765/1 SULIT

Name : ………………………………… Class : ……………………..

12

Page 13: Ujian ICT

SULIT 3765/1

SCHEME

SECTION ANO. ANSWER SCORE1 C2 83 COMPUTER FRAUD4 (i) R (ii) P (iii) Q5 TRUE6 C7 A8 (i) OUTPUT (ii) INPUT9 (i) FALSE (ii) TRUE10 (i) EXPANSION SLOT (ii) PROCESSOR SLOT11 (i) C (ii) B12 B13 (i) TRUE (ii) TRUE14 (i) LAN / LOCAL AREA NETWORK (ii) WAN / WIDE AREA NETWORK15 (i) P (ii) S (iii) R16 A17 C18 FALSE19 (i) DESIGN AND DEVELOP (ii) TESTING20 B21 D22 D23 B24 PROGRAMMING LANGUAGE25 COMPILER

3765/1 SULIT13

Page 14: Ujian ICT

SULIT 3765/1

SECTION B

1. a. (i) computer crimes act 1997 (ii) Telemedicine Act 1997b. (i) computer crimes act 1997 (ii) computer theft

2. a. Task 1 : Linux task 2 : AVG Anti virusb. Differences between proprietary and open source

Proprietary Open source1.2.

3. Bla…bla…bla…bla

4. a. Role of project manager : b. Analysis phase : ……………………bla…bla…bla

5. a. W : coding X : testing and debuggingb. importance of documentation phase:

1…..2…..

SECTION C

Question 1a. )

Question 2

a)

Question 3

a.)

3765/1 SULIT14