Post on 14-Dec-2014
description
SULIT 3765/1
Answer Sheet Section A
NameIC No Form:Question No.
Candidate’s Answer Marks
1. i. 1ii. 2iii. 3
2. 43. 54. 65. 76. 87. 98. 109. 1110. 1211. 1312. 1413. 1514. i. 16
ii. 17iii. 18iv. 19v. 20
15. 2122
16. 2317. 2418. 25
2627
19. 2820. 29
3031
21. 3222. 3323. 3424. 3525. 36
TOTAL MARKS
3765/1 2 SULIT
SULIT 3765/1
Section A [ 36 marks ]
Answer all the questions.Jawab semua soalan.
1. Figure 1 shows statements of security measures.
A A copy of all or a part of a file to assist in re-establishing a lost file.
B Refer to the user and also the intruder of the system
C A program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media or incoming files.
Figure 1
Based on Table 1, write A, B or C for the following security measures.
i) Antivirus : ________________
ii) Data backup : ________________
iii) Human aspects : ________________
2. The smallest unit of information is called a ______________.
3. When we talk about ethics, we are concerned about __________.A. human privacyB. human educationC. human personalityD. human communication
4. Which of the following statements shows a good code of ethics in schools?A. Sending an email during school time to friends.B. Using the school equipment for students’ personal use.C. Using own hand phone to call a friend during lunch break.D. Doing an English assignment in the computer lab during Science period.
5. Text, audio and graphic is entered into the computer using ___________.A. a CPUB. peripherals C. input devicesD. output devices
3765/1 3 SULIT
SULIT 3765/1
6. Which of these is an impact of slander towards society?A. Closer relationship.B. Trust among people.C. Higher moral behaviour.D. Bad reputation of people
7. What are the benefits of Electronic Banking to bank customers? I 24-hour serviceII Electronic Fund TransferIII Electronic Cash DepositsIV Electronic Loan Application
A. I, II, and III B. I, II, and IV C. I, III, and IV D. I, II, III, and IV
8.
The above statement refers to A. Cyber Law B. Code of Ethics C. Computer CrimeD. Computer Ethics
9. Rearrange the steps in scanning antivirus below: I. Scan the selected file.II. Choose an antivirus program. III. Wait while the program is scanning and the result is produced. IV. Select file that need to be scanned.
A. I, II, III and IVB. I, II, IV and IIIC. I, III, II and IVD. II, IV, I and III
10. Which of the following is antivirus software? A. Microsoft Office B. McAfee Virus Scan C. Windows XP D. Microsoft Word
11. Which of the following refers to a spyware program?
3765/1 4 SULIT
In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. So we need to protect the Internet and other online communication technologies.
SULIT 3765/1
A. It lets you secretly read other people's e-mail. B. It blocks advertisements from popping up while you surf the Internet. C. It performs tasks on your computer without your consent and control. D. It performs scheduled tasks on your computer.
12. The symptoms if spyware infected your computer except:A. Unusual slowness in your computer system. B. System stability. C. Your settings have changed (for example, your browser default home page) and
you cannot change them back to the way they were. D. All of the above.
13. Hacker isA. Someone who has the same intent as a cracker but does not have the technical
skills and knowledge. They are often teenagersB. Someone who uses e-mail as a vehicle for extortion or libeling.C. Someone who uses the Internet or network to destroy or damage computers for
political reasonsD. None of the above
14. Figure 1 shows a personal computer.
Figure 2
Match A, B, C or D with the following situations
(i) Input Device : _______________
(ii) Input Device : _______________
(iii) Output Device : _______________
(iv) Output Device : _______________
(v) Central Processor Unit : _______________
15. Shamala is an ICT teacher. She is presenting a lesson using multimedia teaching aids. She needs several output devices such as monitor, __________________ and ___________________.
3765/1 5 SULIT
A
C
E
D
B
SULIT 3765/1
16. A processed raw input is also known as ________________.
17. A collection of 8 bits is called _______________.
18. Three types of system software are _________________________,
_________________________ and ____________________________.
19. RAM is used as _____________________storage.
20. Figure 3 shows types of software.
Types of software ExamplesD Corel WordPerfect, Microsoft Word,
and Sun StarOffice WriterE Corel Presentations, Microsoft PowerPoint,
Sun StarOffice ImpressF Adobe Photoshop, CorelDraw,
and The GIMP
Figure 3
Based on Figure 3, name the type of software:
i) D : __________________
ii) E : __________________
iii) F : __________________
Questions 21 to Questions 25 are in the statements form.
Write True or False for the following statements.
21. Storage has two types; primary storage and secondary storage. (______)
22. Calc, Excel, and Quattro Pro are examples of spreadsheet software. (______)
23. Decoding refers the process of translating a program instruction into signals that the computer can execute. (______)
24. A computer cannot operate without secondary storage. (______)
25. Diskette is an example of magnetic disc. (______)
Section B
[ 20 marks ]
3765/1 6 SULIT
SULIT 3765/1
This section consists of five questions. You are required to answer all the questions .Bahagian ini terdiri daripada lima soalan. Anda dikehendaki menjawab semua soalan.
26. a. Define ‘computer theft’ and give an example of an activity that reflects computer theft. [2 marks]
___________________________________________________________________
___________________________________________________________________
b. Hacking is a source of threat to security in computer. Define ‘hacking’ and give an example of hacking activity. [2 marks]
___________________________________________________________________
___________________________________________________________________
27. Figure 4 shows various kinds of malicious code.
Figure 4
a. Explain any two of malicious code in figure 2. [2 marks]
___________________________________________________________________
___________________________________________________________________
b. Give two ways to protect data in the computer. [2 marks]
___________________________________________________________________
___________________________________________________________________28. a. Copyright infringement is defined as a violation of the rights secured by Copyright
Act. Give TWO examples of copyright infringement [2 marks]
___________________________________________________________________
3765/1 7 SULIT
SULIT 3765/1
___________________________________________________________________
b. Security measures mean the precautionary measures taken towards possible dangers or damages. There are 6 types of security measures. State the appropriate security measures to overcome the identified computer threats:
i. Data Lost : _________________________________________ [1 mark]
ii. Hiding Information : _________________________________________ [1 mark]
29. Figure 5 shows the machine cycle.
Figure 5
Explain all the operation in machine cycle. [4 marks]
a. Fetching : ______________________________________________________
______________________________________________________
b. Decoding : ______________________________________________________
______________________________________________________
c. Executing : ______________________________________________________
______________________________________________________
d. Storing : ______________________________________________________
______________________________________________________30.
3765/1 8 SULIT
Computer Software
X Y
Examples:Windows XPP
Examples:Adobe PhotoshopQ
Utility Program
SULIT 3765/1
Figure 6
Based on Figure 6,
a. Name i) X - ____________________________ [1 mark]
ii) Y - ____________________________ [1 mark]
b. P and Q are other examples of X and Y respectively. Name
i) P : ____________________________ [1 mark]
ii) Q : ____________________________ [1 Mark]
Section C
[ 14 marks ]
Answer Question 31 and either Question 32 or Question 33.
3765/1 9 SULIT
SULIT 3765/1
Jawab Soalan 31 dan salah satu daripada Soalan 32 atau Soalan 33
31. Ahmad has been asked to describe a block diagram of the computer hardware as shown in Figure 7.
Figure 7
a. Name Q and W [2 marks]_________________________________________________________________________
_________________________________________________________________________
b. State two functions of W [2 marks]_________________________________________________________________________
_________________________________________________________________________
c. Component Q is divided into two parts; R and T. Name R and explain its function. [3 marks]
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________32.
3765/1 10 SULIT
W
Q
R T
Ali works as a clerk in a school. He uses a keyboard to key-in all the school’s data into the computer. He saves all the data as a backup in Device X. At the end of every month, he will send a printed report to the school principal.
SULIT 3765/1
Based on the situation given, answer the following questions:
a. Name the one input device and one output device used by Ali. [2 marks]
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
b. Give two examples of Device X. [2 marks]
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
c. Explain two security measures that should be considered by Ali in order to protect his data from lost or damaged.
[3 marks]_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
33. A pictorial representation of some process or model of a complex system is called block diagram. A block diagram is a useful tool both in designing new processes and in improving existing processes.
a. Complete the block diagram of the information processing cycle below. [3 marks]
3765/1 11 SULIT
SULIT 3765/1
b. State the meaning of input and give an example of input device. [2 marks]_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
c. Give two differences between Primary storage and Secondary storage. [2 marks]_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
~~ End of Question ~~
3765/1 12 SULIT
INPUT
.
.