ictl form 2 final08

13
ICTL Tingkatan 2 14 Oktober 2008 1 jam SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH TELOK MAS, 75460 MELAKA FINAL EXAM – 2008 ICTL TINGKATAN 2 1 jam DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO Instruction: Answer all questions in this question paper. Prepared by: Checked by: Authorised by:

Upload: tycoon96

Post on 03-Apr-2015

1.283 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Ictl Form 2 Final08

ICTLTingkatan 214 Oktober 20081 jam

SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH

TELOK MAS, 75460 MELAKA

FINAL EXAM – 2008

ICTL

TINGKATAN 2

1 jam

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO

Instruction:

Answer all questions in this question paper.

Prepared by: Checked by: Authorised by:

……………… ……………… ………………

(Murnizah Mokhtaruddin) (Hj. Abdul Aziz Mohd Yunos)

This paper consist 10 printed pages

Page 2: Ictl Form 2 Final08

SECTION A

Circle the best answer

(Question 1 – 20) 40 marks

1. Data inside a table of database is arranged by column name _______ and row named

________.

A. Record, field

B. Field, record

C. Record, form

D. Field, bar

2. A database is made up of all the following components EXCEPT:

A. tables

B. Queries

C. Forms

D. formula bars

3. Suppose you'd like to set up a table in Microsoft Access to monitor your growing

collection of DVDs. In that table, each DVD will be entered as a:

A. record.

B. long integer.

C. Column

D. field

4. The number 487.52 should have a field type of:

A. String

B. Integer

C. Double

D. Boolean

2

Page 3: Ictl Form 2 Final08

5. Rosnah want to store the name, address and telephone number of all my friends. What

type of application program should Rosnah use?

A. Database

B. Word Processor

C. Graphics Program

D. Browser

6. Choose the correct hierarchy of data

A. bit, byte, field, record, database

B. bit, field, record, byte, database

C. bit, byte, record, field, database

D. bit, record, byte, field, database

7. A computer network must contain at least ________ computers.

A. one

B. two

C. twenty

D. hundred

8. Al-Fariq is a student at International Islamic University, Malaysia. He wants to

contact his parent in Dubai via electronic mail. Which type of network is involved in

the above communication?

A. Local Area Network

B. Metropolitan Area Network

C. Wide Area Network

D. College Area Network

3

Page 4: Ictl Form 2 Final08

Figure 1

9. Based on the network illustrated in Figure 1, the central device that provides a

common connection point for nodes in the network is called ___________________ .

A. hub

B. printer

C. file server

D. personal computer

10. Which hardware components are required for computer network?

I. Hub

II. UTP Cable

III. Crimping Tool

IV. Network Interface Card

A. I, II, III

B. I, II, IV

C. II, III, IV

D. All of the above

11. The risk to a bus network is that ____

A. the bus itself might become inoperable

B. the failure of one device usually affects the rest of the network

C. devices attached or detached at any point on the bus disrupt the rest of the

network

D. all of the above statements are true about risk to a bus network

4

Page 5: Ictl Form 2 Final08

12. A _____ is a high-speed network that connects networks in an area such as a city or

town and handles the bulk of communications activity across that region.

A. Local Area Network (LAN)

B. Wide Area Network (WAN)

C. Metropolitan Area Network (MAN)

D. Variable Area Network (VAN)

13. Computer Networks is a __________________

A. special set of rules to connect devices

B. system of interconnected computers and peripheral devices

C. system that change analog signal to digital signal

D. system that transmits information in form of data through a physical medium

14. Each electronic document on the Web is called a _____________ which can contain

text, graphics, audio and video.

A. World Wide Web

B. Unified Resource Locator

C. Web page

D. Web browser

X consists of all computers and other devices that are connected in a loop.

In X network each node directly connects to two neighboring nodes.

X network can be found in Local Area Networks.

15. ‘X’ is a description of a network topology. ‘X’ refers to:

A. Bus

B. Star

C. Ring

D. Hybrid

5

Page 6: Ictl Form 2 Final08

16. From the list below, which elements are required to form complete address or

Uniform Resource Locator (URL)?

I. Hypertext Markup Language

II. Protocol

III. Domain

IV. Directory

V. Document name

A. I, II, III and IV

B. I, II, IV and V

C. I, III, IV and V

D. II, III, IV and V

17. NETIQUETTE often include avoid these all things EXCEPT ….

A. Cross-posting

B. Using simple electronic signatures

C. Communicate to other people in chat room

D. Technique used to minimize the effort required to read a post

18. An example of output device is the ______________

A. mouse

B. monitor

C. scanner

D. keyboard

19. Identify which types of application software that enables users to create, edit, format

and print textual documents.

A. Graphic

B. Presentation

C. Spreadsheet

D. Word Processing

6

Page 7: Ictl Form 2 Final08

20. You want to get connected to the Internet. Which component that will allow you to

so?

A. Random Access Memory

B. Network Interface Card

C. Digital Versatile Disk

D. Chipset

SECTION B

Write True (T) or False (F) for the following statements

(Question 21 – 25) 10 marks

21. We need computer ethics and laws to guide users from misusing the computer.

Selling pirated software to a friend is an example of law breaking conduct. ________

22. A network links two or more computers together to enable data and resource

exchange. __________

23. User can send e-mail to friends in other countries using LAN. ___________

24. Netiquette is internet etiquette which someone will show bad behavior while using

internet. __________

25. Using search engines required us to spend much time to find the information that we

need. __________

7

Page 8: Ictl Form 2 Final08

SECTION C

Match the picture of network hardware component to their correct names below.

(Question 26) 10 marks

8

Network Cable

Wireless Access Point

Network Interface Card

Modem/Switch/Hub

Page 9: Ictl Form 2 Final08

SECTION D

Fill in the blanks with the suitable answer.

(Question 27 – 37) 40 marks

27. Ali connects three computers in his office. The type of network that he used is called

a _______________________________. Ali’s customer, David who lives in

Singapore connects his computer to Ali’s new networks. This type of network is

called ______________________________ .

28. ____________________ refers to any laws relating to protecting the Internet and

other online communication technologies.

29. The ______________________________________ is formed by the protocol,

domain, directory and the document name.

30. HTML is stand for : ___________________________________________________

31. ASCII is stand for : ___________________________________________________

32. COBOL is stand for : __________________________________________________

33. There are 5 steps in programme development. Complete the steps:

a) _______________________

b) Design

9

Wireless Network Interface Card

Page 10: Ictl Form 2 Final08

c) Coding

d) _______________________

e) Documentation

34. Figure 2 shows network topology A and B.

Figure 2

Name the topology.

a) A - ____________________________

b) B - ____________________________

35. Give 3 examples of Search Engines.

a) ___________________________

b) ___________________________

c) ___________________________

36. Forum is an example of Internet Communication forms. Give another 3 examples of

Internet Communication forms.

a) ___________________________

b) ___________________________

c) ___________________________

37. Give 3 important peripherals that we use in Internet Communication.

a) ___________________________

10

Page 11: Ictl Form 2 Final08

b) ___________________________

c) ___________________________

11