Anda di halaman 1dari 20

SULIT CONFIDENTIAL 3765/1 ICT MAY 2010 2 HOURS 30 MINUTES SMK SERI TANJONG, TG KLING, MELAKA

3765/1

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) MID YEAR EXAMINATION 2010 FORM 5

DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO

THIS QUESTION PAPER CONSISTS OF : a. Section A b. Section B c. Section C : 33 Questions (46 marks) : : 5 Questions (20 marks) 3 Questions (14 marks)

SULIT
Section A [46 marks]

3765/1

Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark.

1.

Which of the following does not help people to protect privacy ? A B C D Use pirated software Use private computer Use web filtering software Use anti spyware program

2 Write True or False for the following statement . a) Privacy means that we have the right not to disclose our personal details. _____________ b) Computer ethics is a guideline for computer users. _________ Question 3 a) and 3 b) Fill in the blank with the appropriate answer.

Figure 1 3. a) Figure 1 is computer hardware technology used in computer models which were invented in ______________ generation . b) Jalal is a muslim. One day, he received a spam e-mail stating that his favourite soda drink Soda Moda Cola uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 30 of his friends.

SULIT

3765/1

The above statement is an example of _____________________ . 4. Figure 2 shows security measures to overcome computer threats.

X : Firewall

Y : Cryptography

Z : Data Backup

Based on Figure 2, match the security measures with the following statements by writing X, Y or Z. a) A piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy. _________ b) A process of hiding information by altering the actual information into different representation. _____________

Question 5 Write True or False for the following statement.

5.

Low level language is machine-dependent is machine-dependent and runs on one type of computer only. _________________ Authoring tools use the following concepts I) Card concept II) Icon concept III) Multiple concept

6.

SULIT
IV) A. I, II and III B. I, II and IV C. I, III and IV D. II, III and IV Time frame concept

3765/1

Question 7 Fill in the blank with the appropriate answer. 7. ROM is _____________________ which means it holds the programs and data even when the computer is turned off.

8.

Figure 3(a) and 3(b) show operating system platforms. Match the operating system platforms with the figure by writing the operating system platforms given in the box below. PC Platform Apple Platform Cross- Platform

Figure 3a)

Figure 3(b)

Figure 3b)

a) Figure 3(a) b) Figure 3(b)

_____________________ ________________________

9 A _________________________ consists of four major hardware components; input, devices, processor, storage devices and output devices.

10

Below are basic elements in programming except

SULIT
A. B. C. D. Constant and variables Sequence control structures Operators Flow chart

3765/1

11. What is the set of rules used for information exchange between computers in a network? A. Router B. Protocol C. ISDN D. Streamyx 12. Fill in the blank with correct answer A __________________________________ level programming language is more easier to use and allows more people to interact with computers. 13. In Multimedia, a _____________________ interactivity allows the user to control the progress of the content. 14. Table 1 shows three types of network topology. Topology configuration P Q R

Table 1 Based on Table 1 match the topology with the following statement by writing P,Q, or R. In this topology, if one node fails, the entire network will fail to function. Answer : __________________ 15. Which of he following programs can be used to generate graphic? A. Microsoft Power Point B. Microsoft Word

SULIT
C. Adobe Photoshop D. Adobe Audition 16. Usage Advantage File format Basic media for many multimedia system Small file size .rtf, .txt, .doc Table 2

3765/1

Based on Table 2 above, the statement refers to ___________ A. Text B. Graphic C. Audio D. Video Question 17 Write True or False for the following statement 17. Navigation means the user cannot move around the menus or other screen in a system. _____________ Question 18(i) and 18(ii) Fill in the blank with the appropriate answer. 18. a) Multimedia products can be delivered by CD based and ________________ b) A _________________________ web editor is an editor where you use HTML tags to create web page.

19. Choose the best answer to fill in the blanks. P . Bus Topology Q. Ring Topology R. Star Topology

SULIT a) b)

3765/1
This network consists of a single central cable to which all computers and devices are A network links two or more computers together normally connect in loop to enable data

connected. _________________ and resource exchange. ____________________ 20. _________________ is a set of commands or instructions which directs a computer in doing a task. A. Program B. Language C. Programmer D. Programming Language 21 . The interfaces principles (CASPER) applied in designing multimedia project are Contrast, Alignment, _______________, Proximity, Emphasis and Repetition.
. 22 . State the flow for developing program phases from the first to the last phase. I Testing and Debugging Phase II Documentation Phase III Program Design Phase IV Problem Analysis Phase V Coding Phase

A. I, II, III, IV and V B. IV, II, III, V, and I C. IV, III, V, I and II D. I, III, IV, V and II

23. In program design phase, there are 3 popular tools which are I Flow chart II Pseudo code III Top-down design model IV Bottom-up design model A B C D I,II and III I,II and IV I,III and IV II,III and IV

24. Table 3 shows authoring tools in multimedia production

SULIT

3765/1

Table 3 Based on table 3 , match the authoring tools with the following statement by writing A,B,C or D. a) This software uses card concept to develop production. __________

b) This software uses icon concept to develop production. ___________ Question 25 a) and 25 b) State True or False for the following statements. 25 a) Information can be stored and retrieved through the digital medium instead of paper b) Computer attack is defined as the unauthorized use of another persons property . 26 Based on Figure 5, select the multimedia devices that suit the statements below.

R
Figure 5

SULIT

3765/1

a)

This device can store images on disks or on film. ___________ This device is used to read data or information.

b)

Question 27 Write True or False for the following statement. 27. Protocol is a set of rules for exchange of data between a terminal and computer or between two computers. 28. Information is

A. Collection of unprocessed items which include text, numbers, images, audio and video.
B. Processed data; that is organized ,meaningful and useful

C. Collection of data organized in a meaningful manner that allows a user to access,retrieve and use
the data. D. Hardware,software,data,people and procedures that work together to produce quality information. 29. Table 4(a) and 4(b) show a statement about programming

Table 4(a)

SULIT

3765/1

Table 4(b) Based on the table above, match Table 4(a) with Table 4(b)

a) b)

M = ____________ N = _____________

Question 30 : a) and b) Write True or False for the following statement. 30 a) b) A record is a collection of files logically related to one another. A Transaction Processing System(TPS) is an information system that captures and processes data day to day business activities.

31._______________________ is one example of data manipulation where one or more records can be listed using certain condition.

Question 32 a) and b) Figure 6 shows about Database

10

SULIT

3765/1

Figure 6 Based on Figure 6, match with and write J,K,L or M for statement below.

32 a) A window on the screen that provides area for entering or changing data in a database. __________________ b) A field in a table that must match with a primary key in a another table in order to enable both tables to have relationship for the record. ___________

11

SULIT
33 Figure 7 shows a hierarchy of data.

3765/1

Bit Byte M Record N Database


Figure 7 Based on the figure, name M and N.

a) M = _____________ b) N = ______________

12

SULIT SECTION B (20 MARKS)

3765/1

34. Computer security means protecting our computer systems and the information they contain
against unwanted access, damage, destruction or modification. ( a ) Give Two types of computer security [ 2 Marks ]

( b ) Security measures are precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats: ( i ) Data Backup ( ii ) Cryptography [ 1 Mark ] [ 1 Mark ]

35. A system software is a program that controls or maintains the operations of a computer and its
devices. A system software also serves as the interface between the user, the application software and the computers hardware. Two types of system software is utility program and operating system. ( a ) Define operating system and give an example of operating system.

[ 2 Marks ] ( b ) State two differences between operating system and utility program. [ 2 Marks ]
36. As an ICT student, you are given a task to develop a multimedia project. In order to do this project, you need some hardware and editing software. (a) List two examples of hardware needed to develop a multimedia production. i. ii. b) _______________________ _______________________ [2m] State two editing software that can be used to enhance the multimedia elements. i. ii. _______________________ _______________________ [2m]

13

SULIT 37

3765/1

Yusoff is the manager of Koperasi SMK Seri Utama. To increase the sale for the month of September, he has decided to offer a discount of 10% to all his students who spend more than RM10 on the items in a receipt. Yusoff needs a program to calculate the total sale for the students after deducting the offered discount. As an ICT student, you asked to develop the program and create a user manual in phase X.
a) State the items for the program that you are going to develop i) ii) b) Input Item : ______________________ [2m]

Output Item : ____________________ Write the data type of each following i) Discount : _________________________

ii)

Total sale : _______________________

[2m]

38.

Match the translation method with its description and example. [ 4 marks] Description A computer program for translating assembly language-essentially, a mnemonic representation of machine language into machine language. Example : MACRO-80 A computer program (or set of programs) that transforms source code written in a computer language (the source language) into another computer language (the target language, often having a binary form known as object code). The most common reason for wanting to transform source code is to create an executable program. Examples : _________________________ ________________________ _

Translation Method

_____________ _______

14

SULIT
Interpreter

3765/1

Example : BASIC

15

SULIT
SECTION C [14 Marks]

3765/1

This section consists of three questions. You are required to answer two questions only. 39. Based on situation given, answer the following questions.

Puan Norisa, the Senior Assistant of Curriculum SMK Tanjung, has a problem in preparing a report of students who are taking part in Annual Excellent Day Events based on their class and subject. She has problems in collecting and processing data such as student name, IC number, class, subject and subject grade. As an ICT student, you are asked by Puan Norisa to develop Annual Excellent Day Events Information System to assist her in preparing the report.

a) b)

Draw two table and name the tables as STUDENT and SUBJECT. The tables of database should store relevant fields and data. [4 marks] Based on Annual Excellent Day Events Information System, give three benefits of using that system. 40. Case Study

SMK Seri Maju librarys needs a computerized registration program for their books registration process. As a librarian, you are given the responsibility by your teacher to develop a computer program. Please study the below pseudocode. Pseudocode BEGIN Request book_title, author, publisher from user Check input If any field empty Print Please complete the data Else Print Book registered Endif END

16

SULIT

3765/1
a) Based on the pseudocode given, draw a suitable flow chart to show the flow of the program. [4 marks] b) To develop the program, you decided to use the high level programming language. Decribe one translation method used in this level. [3 marks]

Samira uses her computer every day but now she faces some system problem on her computer. Some of her files on the computer duplicating itself and it may cause by viruses. She need to solve this problem by installing the antivirus software on her computer. 41. Read the situation below and answer the following questions.

a) State three effects to a computer that is infected by viruses other than the one mentioned above. [3 marks] b) State the action taken on how to prevent a computer from being infected by viruses. [4 marks]

END OF QUESTION PAPER

17

SULIT Mid Year Examination ICT Form 5 Answer Sheet Name : _________________________

3765/1

Class : ____________

18

SULIT
a)___________________ _______ b)___________________ ______ a)___________________ _______ b)___________________ ______ a)___________________ _______ b)___________________ ______

3765/1
a)__________________ _____ b)__________________ _____ a)__________________ _____ b)__________________ _____ a)__________________ _____ b)__________________ ____

a)___________________ _______ b)___________________ ______ a)___________________ _______ b)___________________ ______ a)___________________ _______ b)___________________ ______ a)___________________ _______ b)___________________ ______

a)__________________ _____ b)__________________ _____ a)__________________ ______ b)__________________ ______

a)__________________ ______ b)__________________ ______ a)__________________ 19 ______ b)__________________ ______

SULIT

3765/1

20

Anda mungkin juga menyukai