Anda di halaman 1dari 4

SET2 ICT 2007

SECTION A Question 1 to 10 1. Information refers to ___________________________________ A. An act of transmitting messages B. the knowledge obtained from reading, investigation, study or research. C. the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs D. the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime 2. Charles Babbage invented the _________________________. A. Abacus B.Napiers Bone C. Weaving Loom D. Mechanical Calculator Machine 3. Which of the followings are the similarities between ethics and law? I. to prevent any crime II. as a rule to control computer users III.to guide user from misusing computers IV. to create a healthy computer society, so that computers are used to contribute to a better life A. I, II and III B.II, III and IV C. I, III and IV D.All above 4.Verification is _____________________________. A.The act of proving or disproving the correctness of a system with respect to a certain formal specification B.Process where users verify that they are who they say they are C.The scanning of retina and analysing the layer of blood vessels at the back of the eye D.The measurement and analysis of the shape of ones hand 5.A headphone is a/an ___________ device. A. input B. output C. storage D. process 13. A special set of rules to connect devices B system of interconnected computers and peripheral devices C system that change analog signal to digital signal D system that transmits information in form of data through a physical medium 9. Which is from the following statements is not true about networks ? A People in various places can be connected using a network. B Networking technology allows banking to be done everywhere and at any time. C We cannot do a long distance communication using a network D A network links two or more computers together to enable data and resource exchange. 10.

-C o v e r a s m a l l r e g i o n o f s p a c e s M e lip u ti k a w a s a n k e c il

-T h e r a n g e o f s p e e d i s b e t w e e n 1 0 m b p s t o K a d a r k e la ju a n a d a la h d ia n ta r a 1 0 m b p s h
The statements above refers to. A LAN B.MAN C. WAN Intranet Write T for true statements and F for false statements. 11. A WAN is a network that covers a large geographic area using a communication channel that combines many types of transmission media such as telephone lines, cables and radio waves. A computer can function properly without application software. A compressed file must be unzipped or restored to its original form before being used. Trademark Law is a protection of a companys logos and brand name. Changing computer programming codes with permission is unethical. D.

12.

6. The three main types of secondary storage are . A. CD, DVD and DVDRW B. ROM, RAM and hard drive C. hard disk, floppy disk and pen drive D. magnetic medium, optical medium and flash memory 7. An operating system is____________ . A. a program designed to assist users with personal task B. a program that allows a user to perform maintenance type task C. a program that control or maintain the operations of a computer and its device D. a set of programs that coordinates all the data transmissions among computer in a network

14.

15.

8. Computer Networks is a ..

SET2 ICT 2007


Match the picture with the correct statement. Technology 16. (A) In 1925, television was made known to public. Year functions and applications in one or more dedicated file servers. ______________________ II.Serves extended enterprise, including defined sets of customers or suppliers or other partners. _____________________ SECTION B QUESTION 1 17. (B) In 1941, the computer was created. Look at the picture below and answer the questions that follow.

18. (C) In 3500 BC, the Sumerians developed cuneiform writing.

Define pornography (2 scores) I.____________________________________________________ ____________________________________________ II. Give two impacts of pornography on Malaysian society. a.___________________________________________________ ___________________________________________ b.___________________________________________________ ___________________________________________ QUESTION 2

19. In 1876, the first telephone was introduced. (D) 20. In 1500 BC, the Phoenicians developed the alphabet. (E)

I. Complete the diagram below

a. ___________ _______ ___________ ______

Computer Security

b. ___________ ______ ___________ ______

Fill in the blanks. 21. Give five common type of network communications channels : I. ________________________________ II. ________________________________ III. ________________________________ IV. ________________________________ V. ________________________________ 22. Controversial content is information that causes ___________________ among people who have different ____________________ , moral and _____________________. 23. Retinal biometrics involves the _________________________ of retina and analyzing the layer of _________________________ at the back of the eye. 24. A computer system requires four main aspects of data handling to function properly which are input, _______________, ______________ and ______________

II. Give two examples of computer threats. a.___________________________________________________ b.___________________________________________________ (2 scores) QUESTION 3 Rearrange the steps in scanning antivirus below. A.scan the selected file B.choose an antivirus program C.wait while the program is scanning and the result is produced D.select file that need to be scanned

Software and Data Security

25. Answer statements A and B according to situation below. I.Operating systems that allow the network to centralise

SET2 ICT 2007


( 4 scores ) QUESTION 4 I. Define computer system _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________ ( 2 scores ) II. Draw a block diagram and describe the information processing cycle which includes input, process, output and storage. SECTION C Instruction : Question 1 is compulsory AND answer either Question 2 or Question 3. Question 1 (COMPULSORY) An Audio-Visual Room has been equipped with 10 computers and a hub. As an ICT coordinator, you are required to set up a small network in the room. ( 2 scores) a) Sketch the topology for the room. a. _________________ b. __________________ ( 2 scores )

II. Give two differences between above computer networks. a.________________________________________________ ______________ b.________________________________________________ ______________ ( 2 scores )

[2 scores]

b)

BLOCK DIAGRAM ( 2 scores )

Give three advantages of using a networking rather than a stand-alone pc. ( 3 scores) I.______________________________________ _______________________________________ II. ______________________________________ _______________________________________ III______________________________________ _______________________________________

c)

Define the network communication technology of Extranet. ______________________________________ _______________________________________ [2 scores]

QUESTION 5 Based on figure below, answer the following questions. I. Name the types of computer networks below.

Question 2 Figure 1 shows some of the components of a computer system. Figure 1

SET2 ICT 2007


C) Give two sub components in a central processing unit I._____________________________ II_____________________________[2 scores]

D)Give two differences between I and J. Primary storages Aspects I. Secondary storage

II.

[2 scores] Question 3 Maria just won a set of personal computer. The personal computer is without any system software. 1. What is the most importance system software, so that the personal computer can be used. ____________________________ [1 score] Virus can be scanned using antivirus software. What type of system software used. ____________________________ [1 score] List three popular operating system platforms. (a)_______________________ (b)_______________________ (c)_______________________ [3 scores] State two differences between operating systems and utility programs. Operating system Utility program

2.

Based on Figure 1, answer the following questions. 3.

a) State the meaning of input ______________________________________________ [1 score] 4.

b)

List two type of output. [2 scores] I. II. _____________________________ _____________________________

[2 scores]

~ END OF QUESTION PAPER ~

Anda mungkin juga menyukai