ICT Form 4 August2015

12
SULIT F4 August 2015 3765/1 3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT 3 Section A [36 marks] Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. 1. State whether the following statement is True or False. Using materials from websites as a resource for assignment without giving credit to the original author is considered unethical. 2. Table 1 shows the threats to computer security. K Worm L Hacking M Nature disaster N Theft Table 1 Based on Table 1, write K, L, M or N to match the following statement: (i) A program that can pass on the malicious code to other programs by modifying them. (ii) Use computer to steal goods and information. 3. Alex has downloaded copyrighted songs and movies from the Internet. Then, he burned all these downloaded material into CDs and sold them. (i) Name the computer crime that Alex has committed. (ii) State a cyber law that governs this kind of criminal act. 4. Karen has stored some confidential data in her mobile phone. Most of the time, she turn on her mobile phone’s wifi. (i) State one threat to Karen’s data. (ii) State one security measure to overcome the threat mentioned in Question 4(i). 5. ICT has brought positive impacts to society. An example of ICT usage is email application. State one benefit of using email. 6. How to safeguard children when they are surf online? I Install filtering software II Configure web browser setting III Install anti-virus software

description

Exam paper

Transcript of ICT Form 4 August2015

Page 1: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

3

Section A

[36 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each

answer carries one mark.

1. State whether the following statement is True or False.

Using materials from websites as a resource for assignment without giving credit to

the original author is considered unethical.

2. Table 1 shows the threats to computer security.

K Worm

L Hacking

M Nature disaster

N Theft

Table 1

Based on Table 1, write K, L, M or N to match the following statement:

(i) A program that can pass on the malicious code to other programs by modifying

them.

(ii) Use computer to steal goods and information.

3. Alex has downloaded copyrighted songs and movies from the Internet. Then, he

burned all these downloaded material into CDs and sold them.

(i) Name the computer crime that Alex has committed.

(ii) State a cyber law that governs this kind of criminal act.

4. Karen has stored some confidential data in her mobile phone. Most of the time, she

turn on her mobile phone’s wifi.

(i) State one threat to Karen’s data.

(ii) State one security measure to overcome the threat mentioned in Question 4(i).

5. ICT has brought positive impacts to society. An example of ICT usage is email

application. State one benefit of using email.

6. How to safeguard children when they are surf online?

I Install filtering software

II Configure web browser setting

III Install anti-virus software

Page 2: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

4

IV Install anti-spyware software

A I & II

B I, II & III

C I, II & IV

D I, II, III & IV

7. Stella wants to send confidential information through email to her friend. She used a

security method shown in Figure 1.

Figure 1

Based on Figure 1, name the security method used.

8. Adam owns an ATM card as shown in Figure 2.

Figure 2

Page 3: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

5

Based on Figure 2, name the verification method used when inserting ATM card into

ATM machine to withdraw money.

I Processed object

II Callback system

III User identification

IV Biometric detection

A I & II

B I & III

C II & III

D III & IV

9. Machine cycle involves two components of a processor.

Name two components involved based on the following statement:

(i) Perform mathematical calculations and logical operations: ……………………

(ii) Direct operations of a processor: ………………………………

10. Shameela uses email application as shown in Figure 3

Figure 3

Based on Figure 3, give one security feature that is used by Yahoo Mail to prevent

unauthorized access to her email account.

Page 4: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

6

11. Table 2 shows the binary digit for alphabet L, O and V.

Alphabet Binary

L 01001100

O 01001111

V 01010110

Table 2

Based on Table 2, write the binary digit for the word “VLO”.

12. Figure 4(a) and Figure 4(b) shows the wireless network interface card (NIC) and

motherboard respectively.

Figure 4(a)

Wireless NIC

Figure 4(b)

Motherboard

Label and name the location accurately where wireless NIC should be placed on

Figure 4(b).

Page 5: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

7

13. Study Figure 5 and answer the following questions.

Figure 5

(i) Name an input device for A where we can scan photos/documents.

(ii) Name an output device for B where we can print documents.

14. Choose the following words to complete the sentences.

Hard disk RAM ROM

(i) …………………….. is a memory that keeps its contents when the computer is

switch off.

(ii) …………………….. is a memory that loses its contents when the computer is

switch off.

15. Swan Travel Agency has deployed computer network in its business. State the type of

network communication technology used based on the following purpose:

(i) Deal with clients and suppliers for payment and traveling information.

(ii) Promote business worldwide through company’s website.

16. Which unit is the most suitable used for hard disk capacity?

A MHz

B GHz

C kB

D GB

Computer Mouse

Keyboard

A

Hard disk

Monitor

B

Page 6: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

8

17. 512 Gigabytes data is equivalent to …………………

A 512 x 210

Bytes

B 512 x 220

Bytes

C 512 x 230

Bytes

D 512 x 240

Bytes

18. David has added removable storage to a computer using cable connector as shown in

Figure 6.

Figure 6

Based on Figure 6, name the cable connector used.

19. Table 3 shows four computers with their respective specifications.

Computer Network connectivity Processor

A Ethernet 700 MHz

B Ethernet/ WiFi 1.2 GHz

C None 260 MHz

D WiFi/ Bluetooth 1.6 GHz

Table 3

Based on Table 3, write A, B, C or D to answer the following questions:

(i) Which one of these computers can only use wired network connection?

(ii) Which one of these computers has the fastest processor?

20. Which device is used to convert digital signal to analog signal and vice versa in order

to transmit data along a phone line?

A Hub

B Router

C Switch

D Modem

Page 7: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

9

21. Figure 7 shows a mobile phone tethering its internet connection to 5 other devices.

Figure 7

Based on Figure 7, name the technology specification used by the mobile phone to

provide tethering Internet connection.

A 3G

B 4G LTE

C GSM

D Bluetooth

22. Taylor Co. Ltd. has deployed a dedicated server to store applications that could be

used by its employee within a building.

(i) State the network architecture used.

(ii) State the type of network used.

23. Bluetooth operates at frequencies between 2.4 GHz to 2.4835 GHz. State the wireless

transmission medium used by Bluetooth.

A Infrared

B Microwave

C Radio wave

D Ultraviolet (UV) Rays

Page 8: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

10

24. Figure 8 shows the logo of Windows NT.

Figure 8

Based on Figure 8,

(i) name the type of operating system it belongs to.

(ii) state a main function of this operating system.

25. Figure 9 shows a client/server network architecture

Figure 9

Based on Figure 9,

(i) give one example of client/server software used to transfer files among the

computers.

(ii) state one benefit of using client/server network.

Page 9: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

11

Section B [20 marks]

This section consists of five questions. You are required to answer all questions.

26. Joshua uses a computer with a monitor.

(a) State one possible effect on health from the use of monitor for long hours.

[1 mark]

(b) List three things that Joshua could do to the monitor to minimize the risks to the

health and safety.

[3 marks]

27. Westland International School is paying online for an online application called

School Management System (SMS).

(a) State two payment methods that the school could use when online.

[2 marks]

(b) Give two advantages of using online SMS.

[2 marks]

28. Steve has bought a computer installed with open source operating system.

(a) Describe the meaning of open source.

[3 marks]

(b) State one example of open source operating system.

[1 mark]

Page 10: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

12

29. National Bank has implemented ring topology of computer network as shown in

Figure 10.

Figure 10

Based on Figure 10,

(a) state two disadvantages of using ring topology.

[2 marks]

(b) state two physical transmission mediums that can be used to connect the

computers in the network.

[2 marks]

30. Unshielded Twisted Pair (UTP) cable can be configured to become crossover cable

where it can be used for PC to PC connection.

(a) Draw the wiring schematic for crossover cable and label its colour coding for

T568A and T568B respectively.

[3 marks]

(b) Write the wire numberings that are used for data transmission based on the

drawing in Question 30(a).

[1 marks]

Page 11: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

13

Section C

[14 marks]

This section consists of two questions. You are required to answer all questions.

31. Figure 11 shows a suspicious email forwarded by Suncorp Bank.

Figure 11

Page 12: ICT Form 4 August2015

SULIT

F4 August 2015 3765/1

3765/1 © August 2015 Hak Cipta SMK Tung Hua SULIT

14

Based on Figure 11,

(a) give a specific name for this kind of computer threat.

[1 mark]

(b) explain how it can become a security threat to the email receiver.

[2 marks]

(c) suggest two security measures to tackle the problem mentioned in Question 31(a).

Justify your answer.

[4 marks]

32. John has bought four computers and would like to set up a local area network

(LAN) at his house. The LAN needs to be connected to the Internet.

(a) Based on the statement above, design and sketch the network connection to

the Internet using modem, router and switch.

[4 marks]

(b) Name the network topology used in Question 32(a). Explain your choice for

the network topology stated.

[3 marks]

END OF QUESTION PAPER

Prepared by Mr. Hu Kwong Liik

Counter-checked by Mr. Voon Suk Foo