SECTION A Question 1 to 10 1. Information refers to ___________________________________ A. An act of transmitting messages B. the knowledge obtained from reading, investigation, study or research. C. the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs D. the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime 2. Charles Babbage invented the _________________________. A. Abacus B.Napiers Bone C. Weaving Loom D. Mechanical Calculator Machine 3. Which of the followings are the similarities between ethics and law? I. to prevent any crime II. as a rule to control computer users III.to guide user from misusing computers IV. to create a healthy computer society, so that computers are used to contribute to a better life A. I, II and III B.II, III and IV C. I, III and IV D.All above 4.Verification is _____________________________. A.The act of proving or disproving the correctness of a system with respect to a certain formal specification B.Process where users verify that they are who they say they are C.The scanning of retina and analysing the layer of blood vessels at the back of the eye D.The measurement and analysis of the shape of ones hand 5.A headphone is a/an ___________ device. A. input B. output C. storage D. process 13. A special set of rules to connect devices B system of interconnected computers and peripheral devices C system that change analog signal to digital signal D system that transmits information in form of data through a physical medium 9. Which is from the following statements is not true about networks ? A People in various places can be connected using a network. B Networking technology allows banking to be done everywhere and at any time. C We cannot do a long distance communication using a network D A network links two or more computers together to enable data and resource exchange. 10.
-C o v e r a s m a l l r e g i o n o f s p a c e s M e lip u ti k a w a s a n k e c il
-T h e r a n g e o f s p e e d i s b e t w e e n 1 0 m b p s t o K a d a r k e la ju a n a d a la h d ia n ta r a 1 0 m b p s h
The statements above refers to. A LAN B.MAN C. WAN Intranet Write T for true statements and F for false statements. 11. A WAN is a network that covers a large geographic area using a communication channel that combines many types of transmission media such as telephone lines, cables and radio waves. A computer can function properly without application software. A compressed file must be unzipped or restored to its original form before being used. Trademark Law is a protection of a companys logos and brand name. Changing computer programming codes with permission is unethical. D.
12.
6. The three main types of secondary storage are . A. CD, DVD and DVDRW B. ROM, RAM and hard drive C. hard disk, floppy disk and pen drive D. magnetic medium, optical medium and flash memory 7. An operating system is____________ . A. a program designed to assist users with personal task B. a program that allows a user to perform maintenance type task C. a program that control or maintain the operations of a computer and its device D. a set of programs that coordinates all the data transmissions among computer in a network
14.
15.
8. Computer Networks is a ..
Define pornography (2 scores) I.____________________________________________________ ____________________________________________ II. Give two impacts of pornography on Malaysian society. a.___________________________________________________ ___________________________________________ b.___________________________________________________ ___________________________________________ QUESTION 2
19. In 1876, the first telephone was introduced. (D) 20. In 1500 BC, the Phoenicians developed the alphabet. (E)
Computer Security
Fill in the blanks. 21. Give five common type of network communications channels : I. ________________________________ II. ________________________________ III. ________________________________ IV. ________________________________ V. ________________________________ 22. Controversial content is information that causes ___________________ among people who have different ____________________ , moral and _____________________. 23. Retinal biometrics involves the _________________________ of retina and analyzing the layer of _________________________ at the back of the eye. 24. A computer system requires four main aspects of data handling to function properly which are input, _______________, ______________ and ______________
II. Give two examples of computer threats. a.___________________________________________________ b.___________________________________________________ (2 scores) QUESTION 3 Rearrange the steps in scanning antivirus below. A.scan the selected file B.choose an antivirus program C.wait while the program is scanning and the result is produced D.select file that need to be scanned
25. Answer statements A and B according to situation below. I.Operating systems that allow the network to centralise
II. Give two differences between above computer networks. a.________________________________________________ ______________ b.________________________________________________ ______________ ( 2 scores )
[2 scores]
b)
Give three advantages of using a networking rather than a stand-alone pc. ( 3 scores) I.______________________________________ _______________________________________ II. ______________________________________ _______________________________________ III______________________________________ _______________________________________
c)
QUESTION 5 Based on figure below, answer the following questions. I. Name the types of computer networks below.
D)Give two differences between I and J. Primary storages Aspects I. Secondary storage
II.
[2 scores] Question 3 Maria just won a set of personal computer. The personal computer is without any system software. 1. What is the most importance system software, so that the personal computer can be used. ____________________________ [1 score] Virus can be scanned using antivirus software. What type of system software used. ____________________________ [1 score] List three popular operating system platforms. (a)_______________________ (b)_______________________ (c)_______________________ [3 scores] State two differences between operating systems and utility programs. Operating system Utility program
2.
b)
[2 scores]