ICT Form 4 MAY 2015 test paper
Transcript of ICT Form 4 MAY 2015 test paper
SULITF4 May 2015 3765/1
Section A[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Complete the following statement.
Table 1 is about the usage of ICT.
All transactions can be done by computers or mobile computing devices
Transaction can be done anytime and anyplace
Example of transactions is electronic funds transfer to merchants
Table 1Based on Table 1, the usage of ICT is referred to ……………………………… sector.
2. Figure 1 show technologies used in two different generations of computers.
A B
Figure 1
Based on the Figure 1, identify the computer generation for
(i) A
(ii) B
3. Read the following statement.
Statement above is regarding ……………………….. system.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
Production was slow because everything was done manually and totally depended on human labour.
3
SULITF4 May 2015 3765/1
4. Figure 2 shows examples on two types of authentication methods.
Figure 2
Based on Figure 2, state the type of authentication method used for:
(i) P
(ii) Q
5. Figure 3 shows the display of an internet filtering software.
Figure 3
Based on Figure 3, state the method used.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
QP
Authentication methods
FILTERING SETTINGS
Restricted List
http://www.seperti.com http://www.jalan.com
ADD REMOVE EXIT
4
SULITF4 May 2015 3765/1
6. Figure 4 shows a computer security threat.
Figure 4
Based on Figure 4,
(i) state the type of computer threat, and
(ii) identify security measure that can be used to prevent the threat in Question
6(i).
7. Table 2 shows security measures to protect our computer system.
(i) It is a process of hiding information by
altering the actual information into
different representation.
(ii) Prevent portability by restricting the
hardware from being moved.
Table 2
Based on Table 2, match the statements with the correct security measures by writing
A, B, C or D.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
5
A Anti-virusB Human aspectsC CryptographyD Firewall
SULITF4 May 2015 3765/1
8. Table 3 shows terms of computer ethics and legal issues.
Intelletual Property Privacy Computer CrimeA B C
Table 3
Based on Table 3, write A, B or C to match the following statement.
(i) The right of individuals and companies to deny or restrict the collection and use
of data and information about them.
(ii) Protect ideas, inventions, unique names, business models, industrial processes,
computer program codes and more.
9. ICT has brought many positive impacts on society.
Figure 5
Based on Figure 5, state any positive impact of ICT on society.
I Lower communication cost because people can save time and resources
II Inappropriate online communication with unknown person through the Internet
III Effective sharing of information and opinions
IV Effective sharing false content
A I and II
B I and III
C II and IV
D III and IV
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
6
SULITF4 May 2015 3765/1
10. Figure 6(a) and Figure 6(b) show two hardware in a system unit.
Figure 6(a) Figure 6(b)
Based on Figure 6(a) and 6(b),
(i) state the name of component in Figure 6(a), and
(ii) determine the location of component 6(a) should be placed onto the
motherboard by writing X or Y.
11. Figure 7 shows a computer specification.
Figure 7
Based on Figure 7, state the clock rate for this computer.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
X
Y
7
SULITF4 May 2015 3765/1
12. Figure 8 shows three examples of computer storage.
A B C
Figure 8
Based on Figure 8, write A, B or C to match the following statement:
(i) Holds data permanently until the users delete it.
(ii) The contents can be accessed and read but cannot be changed.
13. State whether the following statement is True or False.
1 GHz equivalent to 1000 kHz.
14. Which of the following is NOT a function of operating system?
A Starting a computer
B Providing a user interface
C Managing data and program
D Perform specific tasks for user
15. Drop cap is a feature which available in ………………….. application software.
A word processing
B spreadsheet
C presentation
D graphic editing
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
8
SULITF4 May 2015 3765/1
16. Figure 9 shows the information processing cycle.
Figure 9
Based on Figure 9,
(i) identify D, and
(ii) state a function of D
17. Table 4 shows three types of software.
A Operating systemB Utility ProgramC Application software
Table 4
Based on Table 4, match the types of software with the appropriate statements by
writing A, B or C.
(i) Madam Anne asks her ICT students to scan and defragment the computers
before she begins her lesson.
(ii) Madam Jennifer is using a software to convert numeric data into charts.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
Input
Process D
Output
9
SULITF4 May 2015 3765/1
18. Figure 10 shows two example of input devices.
X Y
Figure 10
Based on the Figure 10, state the type of input for
(i) X
(ii) Y
19. Figure 11 shows some storage devices.
A B CFigure 11
Based on Figure 11, write A, B or C to match the following statement:
(i) This storage device loses the stored data when the computer is shut down.
(ii) Content in this storage media is written and read by a laser.
20. State whether the following statement is True or False.
Open source software is lack of offering stable system supports if the software
malfunctions.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
10
SULITF4 May 2015 3765/1
21. Figure 12 shows a new DVD player that is bought by Mr. Ahmad. He has downloaded several movies in his computer and wanted to be played on the DVD player.
Figure 12
Based on Figure 12, state a type of secondary storage medium that can be used by Mr.
Ahmad.
22. Figure 13 shows a MacBook Air.
Figure 13
Based on Figure 13, name the platform of this operating system.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
11
SULITF4 May 2015 3765/1
23. Figure 14 shows an application software.
Figure 14
Based on Figure 14, name the type of the application software.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
12
SULITF4 May 2015 3765/1
24. Identify the video capture card by writing A, B, C or D.
A C
B D
25. Figure 15 shows several computer ports.
A C
B D
Figure 15
Based on Figure 15, write A, B, C or D to indicate a firewire port.26.
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
13
SULITF4 May 2015 3765/1
Section B[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Figure 16 shows two scenarios in education system.
A BFigure 16
Based on Figure 16,
(a) Name the type of system used in A and B. [2 marks]
(b) State two differences between system A and B.[2 marks]
27. Read the following statement.
Based on the above statement,
(a) explain a computer threat that David has probably faced.
[2 marks]
(b) describe a solution that David could take to solve the computer threat in Question
27(a).
[2 marks]
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
David always spends his leisure time surfing the Internet and downloads suspicious
software from unsecure websites. After he had installed the software, his computer
displayed a weird message at startup and become slower in processing speed.
14
SULITF4 May 2015 3765/1
28. Figure 17 shows two types of software.
A
B
Figure 17
Based on Figure 17,
(a) name the type of software A and B, and
[2 marks]
(b) state two differences between software A and B.
[2 marks]
29. Figure 18 shows the machine cycle of a processor.
Figure 18
Based on Figure 18, explain the sequence of machine cycle.[4 marks]
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
15
SULITF4 May 2015 3765/1
30. Figure 19 shows two types of user interface of operating system (OS).
A
B
Figure 19
Based on Figure 19,
(a) name user interface A and B, and
[2 marks]
(b) describe two differences between interface A and B.
[2 marks]
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
16
SULITF4 May 2015 3765/1
Section C[14 marks]
This section consists of two questions. You are required to answer all questions.
31. The following is a text on computer crime in television station broadcasting.
Nora works as a video editor in a private television broadcaster company in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcasted to the nation. Without
company’s permission, Nora has made copies of the television programs and sells
them via the Internet.
Based on the text:
(a) State the computer crime that Nora has been committed.
[1 marks]
(b) Explain why cyber laws are important for television broadcaster company.
[2 marks]
(c) Explain two ways from the point of human aspect to prevent the above crime.
[4 marks]
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
17
SULITF4 May 2015 3765/1
32. Read the following statement.
Based on the statement above,
(a) state the type of application software that could be used by Ali and Joanne and
explain their functions, and
[4 marks]
(b) give an example of open source application software that Ali could use and
describe two advantages of using it.
[3 marks]
END OF QUESTION PAPER
Prepared by Mr. Hu Kwong LiikCounter-checked by Mr. Voon Suk Foo
3765/1 © May 2015 Hak Cipta SMK Tung Hua SULIT
Ali needs to complete an assignment to calculate and managing marks of all
the students in his class. Whereas, Joanne has to prepare an assignment that
need to be presented in her class soon.
18