ict form 4 may 2015 test paper

27
SULIT F4 May 2015 3765/1 Section A [36 marks] Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. 1. Complete the following statement. Table 1 is about the usage of ICT. All transactions can be done by computers or mobile computing devices Transaction can be done anytime and anyplace Example of transactions is electronic funds transfer to merchants Table 1 Based on Table 1, the usage of ICT is referred to ……………………………… sector. 2. Figure 1 show technologies used in two different generations of computers. A B Figure 1 Based on the Figure 1, identify the computer generation for (i) A (ii) B 3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT 3

Upload: kwongliik

Post on 18-Aug-2015

44 views

Category:

Education


0 download

TRANSCRIPT

Page 1: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

Section A[36 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each

answer carries one mark.

1. Complete the following statement.

Table 1 is about the usage of ICT.

All transactions can be done by computers or mobile computing devices

Transaction can be done anytime and anyplace

Example of transactions is electronic funds transfer to merchants

Table 1Based on Table 1, the usage of ICT is referred to ……………………………… sector.

2. Figure 1 show technologies used in two different generations of computers.

A B

Figure 1

Based on the Figure 1, identify the computer generation for

(i) A

(ii) B

3. Read the following statement.

Statement above is regarding ……………………….. system.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

Production was slow because everything was done manually and totally depended on human labour.

3

Page 2: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

4. Figure 2 shows examples on two types of authentication methods.

Figure 2

Based on Figure 2, state the type of authentication method used for:

(i) P

(ii) Q

5. Figure 3 shows the display of an internet filtering software.

Figure 3

Based on Figure 3, state the method used.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

QP

Authentication methods

FILTERING SETTINGS

Restricted List

http://www.seperti.com http://www.jalan.com

ADD REMOVE EXIT

4

Page 3: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

6. Figure 4 shows a computer security threat.

Figure 4

Based on Figure 4,

(i) state the type of computer threat, and

(ii) identify security measure that can be used to prevent the threat in Question

6(i).

7. Table 2 shows security measures to protect our computer system.

(i) It is a process of hiding information by

altering the actual information into

different representation.

(ii) Prevent portability by restricting the

hardware from being moved.

Table 2

Based on Table 2, match the statements with the correct security measures by writing

A, B, C or D.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

5

A Anti-virusB Human aspectsC CryptographyD Firewall

Page 4: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

8. Table 3 shows terms of computer ethics and legal issues.

Intelletual Property Privacy Computer CrimeA B C

Table 3

Based on Table 3, write A, B or C to match the following statement.

(i) The right of individuals and companies to deny or restrict the collection and use

of data and information about them.

(ii) Protect ideas, inventions, unique names, business models, industrial processes,

computer program codes and more.

9. ICT has brought many positive impacts on society.

Figure 5

Based on Figure 5, state any positive impact of ICT on society.

I Lower communication cost because people can save time and resources

II Inappropriate online communication with unknown person through the Internet

III Effective sharing of information and opinions

IV Effective sharing false content

A I and II

B I and III

C II and IV

D III and IV

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

6

Page 5: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

10. Figure 6(a) and Figure 6(b) show two hardware in a system unit.

Figure 6(a) Figure 6(b)

Based on Figure 6(a) and 6(b),

(i) state the name of component in Figure 6(a), and

(ii) determine the location of component 6(a) should be placed onto the

motherboard by writing X or Y.

11. Figure 7 shows a computer specification.

Figure 7

Based on Figure 7, state the clock rate for this computer.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

X

Y

7

Page 6: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

12. Figure 8 shows three examples of computer storage.

A B C

Figure 8

Based on Figure 8, write A, B or C to match the following statement:

(i) Holds data permanently until the users delete it.

(ii) The contents can be accessed and read but cannot be changed.

13. State whether the following statement is True or False.

1 GHz equivalent to 1000 kHz.

14. Which of the following is NOT a function of operating system?

A Starting a computer

B Providing a user interface

C Managing data and program

D Perform specific tasks for user

15. Drop cap is a feature which available in ………………….. application software.

A word processing

B spreadsheet

C presentation

D graphic editing

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

8

Page 7: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

16. Figure 9 shows the information processing cycle.

Figure 9

Based on Figure 9,

(i) identify D, and

(ii) state a function of D

17. Table 4 shows three types of software.

A Operating systemB Utility ProgramC Application software

Table 4

Based on Table 4, match the types of software with the appropriate statements by

writing A, B or C.

(i) Madam Anne asks her ICT students to scan and defragment the computers

before she begins her lesson.

(ii) Madam Jennifer is using a software to convert numeric data into charts.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

Input

Process D

Output

9

Page 8: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

18. Figure 10 shows two example of input devices.

X Y

Figure 10

Based on the Figure 10, state the type of input for

(i) X

(ii) Y

19. Figure 11 shows some storage devices.

A B CFigure 11

Based on Figure 11, write A, B or C to match the following statement:

(i) This storage device loses the stored data when the computer is shut down.

(ii) Content in this storage media is written and read by a laser.

20. State whether the following statement is True or False.

Open source software is lack of offering stable system supports if the software

malfunctions.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

10

Page 9: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

21. Figure 12 shows a new DVD player that is bought by Mr. Ahmad. He has downloaded several movies in his computer and wanted to be played on the DVD player.

Figure 12

Based on Figure 12, state a type of secondary storage medium that can be used by Mr.

Ahmad.

22. Figure 13 shows a MacBook Air.

Figure 13

Based on Figure 13, name the platform of this operating system.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

11

Page 10: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

23. Figure 14 shows an application software.

Figure 14

Based on Figure 14, name the type of the application software.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

12

Page 11: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

24. Identify the video capture card by writing A, B, C or D.

A C

B D

25. Figure 15 shows several computer ports.

A C

B D

Figure 15

Based on Figure 15, write A, B, C or D to indicate a firewire port.26.

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

13

Page 12: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

Section B[20 marks]

This section consists of five questions. You are required to answer all questions.

26. Figure 16 shows two scenarios in education system.

A BFigure 16

Based on Figure 16,

(a) Name the type of system used in A and B. [2 marks]

(b) State two differences between system A and B.[2 marks]

27. Read the following statement.

Based on the above statement,

(a) explain a computer threat that David has probably faced.

[2 marks]

(b) describe a solution that David could take to solve the computer threat in Question

27(a).

[2 marks]

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

David always spends his leisure time surfing the Internet and downloads suspicious

software from unsecure websites. After he had installed the software, his computer

displayed a weird message at startup and become slower in processing speed.

14

Page 13: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

28. Figure 17 shows two types of software.

A

B

Figure 17

Based on Figure 17,

(a) name the type of software A and B, and

[2 marks]

(b) state two differences between software A and B.

[2 marks]

29. Figure 18 shows the machine cycle of a processor.

Figure 18

Based on Figure 18, explain the sequence of machine cycle.[4 marks]

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

15

Page 14: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

30. Figure 19 shows two types of user interface of operating system (OS).

A

B

Figure 19

Based on Figure 19,

(a) name user interface A and B, and

[2 marks]

(b) describe two differences between interface A and B.

[2 marks]

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

16

Page 15: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

Section C[14 marks]

This section consists of two questions. You are required to answer all questions.

31. The following is a text on computer crime in television station broadcasting.

Nora works as a video editor in a private television broadcaster company in

Malaysia. She uses her expertise in ICT for editing the television programs in order

to preserve the quality before they were broadcasted to the nation. Without

company’s permission, Nora has made copies of the television programs and sells

them via the Internet.

Based on the text:

(a) State the computer crime that Nora has been committed.

[1 marks]

(b) Explain why cyber laws are important for television broadcaster company.

[2 marks]

(c) Explain two ways from the point of human aspect to prevent the above crime.

[4 marks]

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

17

Page 16: ICT Form 4 MAY 2015 test paper

SULITF4 May 2015 3765/1

32. Read the following statement.

Based on the statement above,

(a) state the type of application software that could be used by Ali and Joanne and

explain their functions, and

[4 marks]

(b) give an example of open source application software that Ali could use and

describe two advantages of using it.

[3 marks]

END OF QUESTION PAPER

Prepared by Mr. Hu Kwong LiikCounter-checked by Mr. Voon Suk Foo

3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT

Ali needs to complete an assignment to calculate and managing marks of all

the students in his class. Whereas, Joanne has to prepare an assignment that

need to be presented in her class soon.

18