soalan ict-form-4-midterm-2011-3

17
SULIT 3765/1 Answer Sheet Section A Name IC No Form: Question No. Candidate’s Answer Marks 1. i . 1 i i . 2 i i i . 3 2. 4 3. 5 4. 6 5. 7 6. 8 7. 9 8. 10 9. 11 10. 12 11. 13 12. 14 13. 15 14. i . 16 i i . 17 i i i . 18 i v . 19 3765/1 2 SULIT

Upload: siti-salmiah

Post on 14-Dec-2014

796 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

Answer Sheet Section A

NameIC No Form:Question No.

Candidate’s Answer Marks

1. i. 1ii. 2iii. 3

2. 43. 54. 65. 76. 87. 98. 109. 1110. 1211. 1312. 1413. 1514. i. 16

ii. 17iii. 18iv. 19v. 20

15. 2122

16. 2317. 2418. 25

2627

19. 2820. 29

3031

21. 3222. 3323. 3424. 3525. 36

TOTAL MARKS

3765/1 2 SULIT

Page 2: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

Section A [ 36 marks ]

Answer all the questions.Jawab semua soalan.

1. Figure 1 shows statements of security measures.

A A copy of all or a part of a file to assist in re-establishing a lost file.

B Refer to the user and also the intruder of the system

C A program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media or incoming files.

Figure 1

Based on Table 1, write A, B or C for the following security measures.

i) Antivirus : ________________

ii) Data backup : ________________

iii) Human aspects : ________________

2. The smallest unit of information is called a ______________.

3. When we talk about ethics, we are concerned about __________.A. human privacyB. human educationC. human personalityD. human communication

4. Which of the following statements shows a good code of ethics in schools?A. Sending an email during school time to friends.B. Using the school equipment for students’ personal use.C. Using own hand phone to call a friend during lunch break.D. Doing an English assignment in the computer lab during Science period.

5. Text, audio and graphic is entered into the computer using ___________.A. a CPUB. peripherals C. input devicesD. output devices

3765/1 3 SULIT

Page 3: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

6. Which of these is an impact of slander towards society?A. Closer relationship.B. Trust among people.C. Higher moral behaviour.D. Bad reputation of people

7. What are the benefits of Electronic Banking to bank customers? I 24-hour serviceII Electronic Fund TransferIII Electronic Cash DepositsIV Electronic Loan Application

A. I, II, and III B. I, II, and IV C. I, III, and IV D. I, II, III, and IV

8.

The above statement refers to A. Cyber Law B. Code of Ethics C. Computer CrimeD. Computer Ethics

9. Rearrange the steps in scanning antivirus below: I. Scan the selected file.II. Choose an antivirus program. III. Wait while the program is scanning and the result is produced. IV. Select file that need to be scanned.

A. I, II, III and IVB. I, II, IV and IIIC. I, III, II and IVD. II, IV, I and III

10. Which of the following is antivirus software? A. Microsoft Office B. McAfee Virus Scan C. Windows XP D. Microsoft Word

11. Which of the following refers to a spyware program?

3765/1 4 SULIT

In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. So we need to protect the Internet and other online communication technologies.

Page 4: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

A. It lets you secretly read other people's e-mail. B. It blocks advertisements from popping up while you surf the Internet. C. It performs tasks on your computer without your consent and control. D. It performs scheduled tasks on your computer.

12. The symptoms if spyware infected your computer except:A. Unusual slowness in your computer system. B. System stability. C. Your settings have changed (for example, your browser default home page) and

you cannot change them back to the way they were. D. All of the above.

13. Hacker isA. Someone who has the same intent as a cracker but does not have the technical

skills and knowledge. They are often teenagersB. Someone who uses e-mail as a vehicle for extortion or libeling.C. Someone who uses the Internet or network to destroy or damage computers for

political reasonsD. None of the above

14. Figure 1 shows a personal computer.

Figure 2

Match A, B, C or D with the following situations

(i) Input Device : _______________

(ii) Input Device : _______________

(iii) Output Device : _______________

(iv) Output Device : _______________

(v) Central Processor Unit : _______________

15. Shamala is an ICT teacher. She is presenting a lesson using multimedia teaching aids. She needs several output devices such as monitor, __________________ and ___________________.

3765/1 5 SULIT

A

C

E

D

B

Page 5: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

16. A processed raw input is also known as ________________.

17. A collection of 8 bits is called _______________.

18. Three types of system software are _________________________,

_________________________ and ____________________________.

19. RAM is used as _____________________storage.

20. Figure 3 shows types of software.

Types of software ExamplesD Corel WordPerfect, Microsoft Word,

and Sun StarOffice WriterE Corel Presentations, Microsoft PowerPoint,

Sun StarOffice ImpressF Adobe Photoshop, CorelDraw,

and The GIMP

Figure 3

Based on Figure 3, name the type of software:

i) D : __________________

ii) E : __________________

iii) F : __________________

Questions 21 to Questions 25 are in the statements form.

Write True or False for the following statements.

21. Storage has two types; primary storage and secondary storage. (______)

22. Calc, Excel, and Quattro Pro are examples of spreadsheet software. (______)

23. Decoding refers the process of translating a program instruction into signals that the computer can execute. (______)

24. A computer cannot operate without secondary storage. (______)

25. Diskette is an example of magnetic disc. (______)

Section B

[ 20 marks ]

3765/1 6 SULIT

Page 6: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

This section consists of five questions. You are required to answer all the questions .Bahagian ini terdiri daripada lima soalan. Anda dikehendaki menjawab semua soalan.

26. a. Define ‘computer theft’ and give an example of an activity that reflects computer theft. [2 marks]

___________________________________________________________________

___________________________________________________________________

b. Hacking is a source of threat to security in computer. Define ‘hacking’ and give an example of hacking activity. [2 marks]

___________________________________________________________________

___________________________________________________________________

27. Figure 4 shows various kinds of malicious code.

Figure 4

a. Explain any two of malicious code in figure 2. [2 marks]

___________________________________________________________________

___________________________________________________________________

b. Give two ways to protect data in the computer. [2 marks]

___________________________________________________________________

___________________________________________________________________28. a. Copyright infringement is defined as a violation of the rights secured by Copyright

Act. Give TWO examples of copyright infringement [2 marks]

___________________________________________________________________

3765/1 7 SULIT

Page 7: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

___________________________________________________________________

b. Security measures mean the precautionary measures taken towards possible dangers or damages. There are 6 types of security measures. State the appropriate security measures to overcome the identified computer threats:

i. Data Lost : _________________________________________ [1 mark]

ii. Hiding Information : _________________________________________ [1 mark]

29. Figure 5 shows the machine cycle.

Figure 5

Explain all the operation in machine cycle. [4 marks]

a. Fetching : ______________________________________________________

______________________________________________________

b. Decoding : ______________________________________________________

______________________________________________________

c. Executing : ______________________________________________________

______________________________________________________

d. Storing : ______________________________________________________

______________________________________________________30.

3765/1 8 SULIT

Computer Software

X Y

Examples:Windows XPP

Examples:Adobe PhotoshopQ

Utility Program

Page 8: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

Figure 6

Based on Figure 6,

a. Name i) X - ____________________________ [1 mark]

ii) Y - ____________________________ [1 mark]

b. P and Q are other examples of X and Y respectively. Name

i) P : ____________________________ [1 mark]

ii) Q : ____________________________ [1 Mark]

Section C

[ 14 marks ]

Answer Question 31 and either Question 32 or Question 33.

3765/1 9 SULIT

Page 9: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

Jawab Soalan 31 dan salah satu daripada Soalan 32 atau Soalan 33

31. Ahmad has been asked to describe a block diagram of the computer hardware as shown in Figure 7.

Figure 7

a. Name Q and W [2 marks]_________________________________________________________________________

_________________________________________________________________________

b. State two functions of W [2 marks]_________________________________________________________________________

_________________________________________________________________________

c. Component Q is divided into two parts; R and T. Name R and explain its function. [3 marks]

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________32.

3765/1 10 SULIT

W

Q

R T

Ali works as a clerk in a school. He uses a keyboard to key-in all the school’s data into the computer. He saves all the data as a backup in Device X. At the end of every month, he will send a printed report to the school principal.

Page 10: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

Based on the situation given, answer the following questions:

a. Name the one input device and one output device used by Ali. [2 marks]

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

b. Give two examples of Device X. [2 marks]

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

c. Explain two security measures that should be considered by Ali in order to protect his data from lost or damaged.

[3 marks]_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

33. A pictorial representation of some process or model of a complex system is called block diagram. A block diagram is a useful tool both in designing new processes and in improving existing processes.

a. Complete the block diagram of the information processing cycle below. [3 marks]

3765/1 11 SULIT

Page 11: Soalan ict-form-4-midterm-2011-3

SULIT 3765/1

b. State the meaning of input and give an example of input device. [2 marks]_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

c. Give two differences between Primary storage and Secondary storage. [2 marks]_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

~~ End of Question ~~

3765/1 12 SULIT

INPUT

.

.