ictl form 2 final08
TRANSCRIPT
ICTLTingkatan 214 Oktober 20081 jam
SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH
TELOK MAS, 75460 MELAKA
FINAL EXAM – 2008
ICTL
TINGKATAN 2
1 jam
DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO
Instruction:
Answer all questions in this question paper.
Prepared by: Checked by: Authorised by:
……………… ……………… ………………
(Murnizah Mokhtaruddin) (Hj. Abdul Aziz Mohd Yunos)
This paper consist 10 printed pages
SECTION A
Circle the best answer
(Question 1 – 20) 40 marks
1. Data inside a table of database is arranged by column name _______ and row named
________.
A. Record, field
B. Field, record
C. Record, form
D. Field, bar
2. A database is made up of all the following components EXCEPT:
A. tables
B. Queries
C. Forms
D. formula bars
3. Suppose you'd like to set up a table in Microsoft Access to monitor your growing
collection of DVDs. In that table, each DVD will be entered as a:
A. record.
B. long integer.
C. Column
D. field
4. The number 487.52 should have a field type of:
A. String
B. Integer
C. Double
D. Boolean
2
5. Rosnah want to store the name, address and telephone number of all my friends. What
type of application program should Rosnah use?
A. Database
B. Word Processor
C. Graphics Program
D. Browser
6. Choose the correct hierarchy of data
A. bit, byte, field, record, database
B. bit, field, record, byte, database
C. bit, byte, record, field, database
D. bit, record, byte, field, database
7. A computer network must contain at least ________ computers.
A. one
B. two
C. twenty
D. hundred
8. Al-Fariq is a student at International Islamic University, Malaysia. He wants to
contact his parent in Dubai via electronic mail. Which type of network is involved in
the above communication?
A. Local Area Network
B. Metropolitan Area Network
C. Wide Area Network
D. College Area Network
3
Figure 1
9. Based on the network illustrated in Figure 1, the central device that provides a
common connection point for nodes in the network is called ___________________ .
A. hub
B. printer
C. file server
D. personal computer
10. Which hardware components are required for computer network?
I. Hub
II. UTP Cable
III. Crimping Tool
IV. Network Interface Card
A. I, II, III
B. I, II, IV
C. II, III, IV
D. All of the above
11. The risk to a bus network is that ____
A. the bus itself might become inoperable
B. the failure of one device usually affects the rest of the network
C. devices attached or detached at any point on the bus disrupt the rest of the
network
D. all of the above statements are true about risk to a bus network
4
12. A _____ is a high-speed network that connects networks in an area such as a city or
town and handles the bulk of communications activity across that region.
A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Metropolitan Area Network (MAN)
D. Variable Area Network (VAN)
13. Computer Networks is a __________________
A. special set of rules to connect devices
B. system of interconnected computers and peripheral devices
C. system that change analog signal to digital signal
D. system that transmits information in form of data through a physical medium
14. Each electronic document on the Web is called a _____________ which can contain
text, graphics, audio and video.
A. World Wide Web
B. Unified Resource Locator
C. Web page
D. Web browser
X consists of all computers and other devices that are connected in a loop.
In X network each node directly connects to two neighboring nodes.
X network can be found in Local Area Networks.
15. ‘X’ is a description of a network topology. ‘X’ refers to:
A. Bus
B. Star
C. Ring
D. Hybrid
5
16. From the list below, which elements are required to form complete address or
Uniform Resource Locator (URL)?
I. Hypertext Markup Language
II. Protocol
III. Domain
IV. Directory
V. Document name
A. I, II, III and IV
B. I, II, IV and V
C. I, III, IV and V
D. II, III, IV and V
17. NETIQUETTE often include avoid these all things EXCEPT ….
A. Cross-posting
B. Using simple electronic signatures
C. Communicate to other people in chat room
D. Technique used to minimize the effort required to read a post
18. An example of output device is the ______________
A. mouse
B. monitor
C. scanner
D. keyboard
19. Identify which types of application software that enables users to create, edit, format
and print textual documents.
A. Graphic
B. Presentation
C. Spreadsheet
D. Word Processing
6
20. You want to get connected to the Internet. Which component that will allow you to
so?
A. Random Access Memory
B. Network Interface Card
C. Digital Versatile Disk
D. Chipset
SECTION B
Write True (T) or False (F) for the following statements
(Question 21 – 25) 10 marks
21. We need computer ethics and laws to guide users from misusing the computer.
Selling pirated software to a friend is an example of law breaking conduct. ________
22. A network links two or more computers together to enable data and resource
exchange. __________
23. User can send e-mail to friends in other countries using LAN. ___________
24. Netiquette is internet etiquette which someone will show bad behavior while using
internet. __________
25. Using search engines required us to spend much time to find the information that we
need. __________
7
SECTION C
Match the picture of network hardware component to their correct names below.
(Question 26) 10 marks
8
Network Cable
Wireless Access Point
Network Interface Card
Modem/Switch/Hub
SECTION D
Fill in the blanks with the suitable answer.
(Question 27 – 37) 40 marks
27. Ali connects three computers in his office. The type of network that he used is called
a _______________________________. Ali’s customer, David who lives in
Singapore connects his computer to Ali’s new networks. This type of network is
called ______________________________ .
28. ____________________ refers to any laws relating to protecting the Internet and
other online communication technologies.
29. The ______________________________________ is formed by the protocol,
domain, directory and the document name.
30. HTML is stand for : ___________________________________________________
31. ASCII is stand for : ___________________________________________________
32. COBOL is stand for : __________________________________________________
33. There are 5 steps in programme development. Complete the steps:
a) _______________________
b) Design
9
Wireless Network Interface Card
c) Coding
d) _______________________
e) Documentation
34. Figure 2 shows network topology A and B.
Figure 2
Name the topology.
a) A - ____________________________
b) B - ____________________________
35. Give 3 examples of Search Engines.
a) ___________________________
b) ___________________________
c) ___________________________
36. Forum is an example of Internet Communication forms. Give another 3 examples of
Internet Communication forms.
a) ___________________________
b) ___________________________
c) ___________________________
37. Give 3 important peripherals that we use in Internet Communication.
a) ___________________________
10
b) ___________________________
c) ___________________________
11