Top Banner
SULIT 3765/1 Section A [36 marks] Answer all the questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. 1. Study the statement below carefully. Statement 1 Statement 1 above is regarding to ______________________ systems. 2. Statement below is about controversial issue. Statement 2 Based on Statement 2 above, (i) Azman has convicted ______________________ (ii) List another effect of controversial content 3. Figure 1 shows the examples of input and output devices. 3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat Sebelah SULIT “Production was slow because everything was done manually and totally depended on human labour.” Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his 2
18

Ujian Akhir Tahun Ict f4

Oct 16, 2014

Download

Documents

Farrah Waheda
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Section A

[36 marks]

Answer all the questions. Write your answers in the spaces provided in Answer Sheet. Each

answer carries one mark.

1. Study the statement below carefully.

Statement 1

Statement 1 above is regarding to ______________________ systems.

2. Statement below is about controversial issue.

Statement 2

Based on Statement 2 above,

(i) Azman has convicted ______________________

(ii) List another effect of controversial content

3. Figure 1 shows the examples of input and output devices.

A B C

Figure 1

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

“Production was slow because everything was done manually and totally

depended on human labour.”

Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.

2

Page 2: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Based on Figure 1, write A, B or C to indicate the input device used for audio.

A Can only hold the data temporarily

B Can store the data permanently until it is deleted or removed

Table 1

4. Based on Table 1 above, identify the types of storage for:

a) A

b) B

5. Write True or False for the following statement:

a) A computer that operates at 933 MHz (megahertz) has 933 million clock cycles in

one second (hertz)

6. Figure 2 below shows a networking device

Figure 2

Identify the device in Figure 2.

7. Figure 3 shows wired transmission medium.

W X

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

3

Page 3: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Y Z

Figure 3

By using W, X, Y and Z in Figure 4, identify the following transmission medium.

a) Fibre – optic cable

b) Shielded Twisted Pair

8. Figure 4 show how cryptography works by using cipher substitution.

Figure 4

Based on Figure 1, state process X and process Y.

X : ____________________

Y : ____________________

9. State whether the following statement is True or False.

i. Users can distribute proprietary software freely.

ii. Proprietary software offers a stable system support if it fails or malfunctions.

10. The statement in Table 2 is about a type of computer network.

X is a type of computer network that links computers in Malaysia and Korea.

Table 2

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

C H I E F C H I E FS Y A H L

Process X Process Y

4

Page 4: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Based on Table 2, X refers to

A. Local Area Network (LAN)

B. Wide Area Network (WAN)

C. Personal Area Network (PAN)

D. Metropolitan Area Network (MAN)

11. State whether the following statement is True or False.

Internet networking allows a group of computer users with the same networking program

to connect with each other and directly access files from each other’s hard drives.

12. Table 3 shows communication devices. Based on Table 3, select A, B, C or D for the

following statement.

Wireless Network

Interface CardRouter

Network Interface

Card

Wireless Access

Point

A B C D

Table 3

A central communication device that allows computers to transfer data and information to

other wireless devices or a wired network.

13. Which of the following wireless transmission media is used for short-range communication?

A. Infrared

B. Satellite

C. Microwave

D. Radio Wave

14. Table 4 is about a popular internet service among the internet users.

This internet service is a popular service among the internet users. This service allows

the internet users to share thoughts and experiences with other internet users. The

internet users does not need to login in order to read the thoughts and experience.

Table 4

Based on table 4, state the internet service.

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

5

Page 5: Ujian Akhir Tahun Ict f4

SULIT 3765/1

15. Which is the suitable device to convert conventional images, texts, drawings and photos into

digital form?

16. Words, names, symbols, device and images that represent products, goods or services can

be protected under the ________________.

A. Patent

B. Design

C. Copyright

D. Trademark

17. Table 5 refers to types of computer threats.

Mr. Ali is the server manager at SMK Seri Jaya. One day he found out that certain data in

the server was missing.

Table 5

Based on the statement in table 5, identify the type of computer threat stated.

18. Write the correct word to complete the following statement:

_______________________ is a malicious code on a computer to gather information.

19. Figure 5(a) and Figure 5(b) show biometric authentication methods.

Figure 5(a) Figure 5(b)

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

6

Page 6: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Based on Figure 5(a), and Figure 5 (b) states the methods used.

(i) Figure 5(a)

(ii) Figure 5(b)

20. Figure 6 shows the technology used in the evolution of computers.

Figure 6

Based on Figure 6, state the name of component:

(i) X

(ii) Y

21. The following statement refers to the positive impact of ICT to society. State whether it is

True or False.

i. People could share and exchange ideas, news and information easier through video

conference.

ii. People became more individualistic and introvert.

22. Table 6 shows several output devices.

Table 6

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

7

Page 7: Ujian Akhir Tahun Ict f4

...capture images from photographic prints, poster or magazine pages into the computer...

…input of motion images capture into the computer by special input device. T

S

SULIT 3765/1

Based on Table 6, match the output devices with the following statements by writing X, Y or Z.

i. The device that can be used to convey texts, graphics and video information as visual

output

ii. The device that can be used to convey text, graphics on a physical medium.

23. Figure 7 shows a computer network.

Figure 7

Name P.

24. Figure 8 shows example of input devices.

Figure 8

Based on Figure 8, state S and T.

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

8

Page 8: Ujian Akhir Tahun Ict f4

X

SULIT 3765/1

25. Based on the figure below, which of following can be slotted in X.

A. RAM B. CPU

C. Memory card D. NIC

26. Based on figure below, state whether the following statement is True or False

Fetch and decode is in the execution cycle whereas execute and store is in the

instruction cycle.

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

9

Page 9: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Section B

[20 marks]

This section consists of five questions. Answer all questions.

27. Figure 9 shows two types of computer storages.

Figure 9

(a) Name storage

i. A

ii. B (2 marks)

(b) Give one difference in function between storage A and B. (2 marks)

28. Figure 10 shows students of SK Kota are using Thinkquest portal in the computer lab.

Figure 10

(a) Based on figure 10, state the type of network in that computer lab. (1 mark)

(b) State three importances of computer networks and communications. (3 marks)

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

10

Page 10: Ujian Akhir Tahun Ict f4

Types of software

Operating System Software X

D. Graphic Editor

A. Word Processing

B. Spreadsheet

C. Database

SULIT 3765/1

29. Figure 11 shows two types of software.

Figure 11

Based on Figure 11

(a) Identify X and state one function of it.

(b) Give one example of open source software and proprietary software

for Operating System.

[ 2 marks]

[ 2 marks]

30. Ali works as a clerk in a school. He uses a keyboard to key-in all the school’s data into the

computer. He saves all the data as a backup in Device X. At the end of every month, he will

send a printed report to the school principal.

(a) Based on the situation above, name the input device and output device that Ali used.

i) Input device : ______________

ii) Output device: ______________ (2 Marks)

(b) Give two examples of Device X. (2 Marks)

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

11

Page 11: Ujian Akhir Tahun Ict f4

SULIT 3765/1

31.

Based on figure above:

(a) State types of Cable A and Cable B. [2 marks]

(b) Give one function of Cable A and Cable B. [2 marks]

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

CABLE A CABLE B

Page 12: Ujian Akhir Tahun Ict f4

SULIT 3765/1

Section C

[14 marks]

This section consists of three questions. Answer two questions only:

(i) Question 31 is compulsory, and

(ii) Choose Either Question 32 or Question 33.

Situation 1

32. Based on the Situation 1 above,

a) (i) Draw a block diagram of Information Processing Cycle which consists of all main

elements below.

[2 marks]

(ii) State the meaning of ‘Machine Cycle’ in one of the component of Information Processing

Cycle and give one function of CPU. [2 marks]

b) (i) State the types of application software used by Student A and Student B. [2 marks]

(ii) Give one function for each type of application software as in (i). [2 marks]

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

“Student A needs to complete an assignment to calculate and managing marks of all the

students in his class. Whereas Student B has to prepare an assignment that need to be

presented in his class soon. Both students choose to make use of computer system

involving four main elements in Information Processing Cycle.”

13

Page 13: Ujian Akhir Tahun Ict f4

David always spends his leisure time surfing the Internet. He usually downloads proprietary

software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get

the unauthorized serial number for the software.

SULIT 3765/1

33. Based on the situation 2 below, answer the following questions.

Situation 2

a) Explain the type of computer crime that David has committed and give another example.

[3 marks]

b) (i) State the way computer crime can be prevented? [1 mark]

(ii) List two needs of using the way used in (i) to prevent computer crime. [2 marks]

34. PC 1 in Figure 12 can access computers in two different types of computer networks.

Based on Figure 12 above:

a) Name the two types of computer network. [2 marks]

b) Give two (2) differences between the two types of computer networks. [4 marks]

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT

14

Page 14: Ujian Akhir Tahun Ict f4

SULIT 3765/1

END OF QUESTION PAPER

3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT