ICT_F5_May2016_2
description
Transcript of ICT_F5_May2016_2
SULITF5 May 2016
3765/1Section A[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Figure 1 shows an Intel processor.
Figure 1
Based on Figure 1, state the generation of computer using Intel Core i7 processor.
2. Figure 2 shows an authentication feature used in iphone 6S.
Figure 2
Based on Figure 2, identify the authentication method used.
3765/1 © May 2016 SMK Tung Hua SULIT
3
SULITF5 May 2016
3765/13. Figure 3 shows an e-mail received by a student’s parents.
Figure 3
Based on Figure 3:
(i) Identify the possible security threat being faced.
(ii) State a method to overcome security threat mentioned in Question 3(i).
3765/1 © May 2016 SMK Tung Hua SULIT
4
SULITF5 May 2016
3765/14. Figure 4(a) and Figure 4(b) shows three hardware and information processing cycle
respectively.
A B C
Figure 4(a)
Figure 4(b)
Based on Figure 4(a), identify hardware for X by writing A, B or C.
5. Figure 5 shows a motherboard.
Figure 5
3765/1 © May 2016 SMK Tung Hua SULIT
C
X Process Output
Storage
AB
5
SULITF5 May 2016
3765/1Based on Figure 5, write A, B or C to indicate the location of
(i) RAM slot
(ii) PCI expansion slot
6. Figure 6 shows a storage medium used in electronic device.
Figure 6
Based on Figure 6, name the storage medium.
7. Table 1 shows three different operating system (OS) platforms.
PC platform Apple Platform Cross-platform
A B C
Table 1
Based on Table 1, identify OS platform for Mac OS X by writing A, B or C.
8. Table 2 shows a list of software.
Windows 10 Redhat Linux
Microsoft Office 2013 CorelDRAW Graphic Suite X8
Adobe Photoshop The GIMP
Table 2
Based on Table 2, identify software which is
(i) open source operating system
(ii) open source application software
3765/1 © May 2016 SMK Tung Hua SULIT
6
SULITF5 May 2016
3765/19. Figure 7 shows two types of network.
A B
Figure 7
Based on Figure 7, state the type of network for
(i) A
(ii) B
10. Figure 8 shows a computer network.
Figure 8
Based on Figure 8, identify the network architecture used.
3765/1 © May 2016 SMK Tung Hua SULIT
7
SULITF5 May 2016
3765/111. Figure 9 shows TCP/IP configuration on computer Y.
Figure 9
Based on Figure 9, write a command to test connection to computer Y.
12. Figure 10 shows a transmission medium for data communication.
Figure 10
Based on Figure 10, name the transmission medium.
3765/1 © May 2016 SMK Tung Hua SULIT
8
SULITF5 May 2016
3765/113. Figure 11 shows a ToolBook 10.5 interface.
Figure 11
Based on Figure 11, name the authoring tool concept used by ToolBook.
14. Figure 12 shows a multimedia program interface.
Figure 12
Based on Figure 12, identify multimedia element
(i) A (ii) B
3765/1 © May 2016 SMK Tung Hua SULIT
A
B
9
SULITF5 May 2016
3765/115. Table 3 shows the tasks of multimedia production team.
Personne
l
Tasks
A Define the scope of the project and discuss with the clients.
Responsible to find financial resources, equipment and facilities.
Coordinate the production team’s work.
B Do research on the content of the multimedia program.
Provide content for the multimedia program.
Table 3
Based on Table 3, identify the multimedia production team for
(i) A
(ii) B
16. Figure 13 shows a simple checklist used by end-user to test a multimedia program.
Figure 13
Based on Figure 13, name the multimedia production phase involved.
3765/1 © May 2016 SMK Tung Hua SULIT
10
SULITF5 May 2016
3765/117. Figure 14 shows a sample of COBOL programming language source code.
Figure 14
Based on Figure 14, identify the generation of programming language for COBOL.
18. Figure 15 shows the Visual Basic 6.0 interface.
Figure 15
Based on Figure 15,
(i) state the programming approach used in Visual Basic 6.0.
(ii) state the translator used in Visual Basic 6.0.
3765/1 © May 2016 SMK Tung Hua SULIT
11
SULITF5 May 2016
3765/119. Figure 16 shows the Visual Basic source code.
Figure 16Based on Figure 16, identify the data type being declared for variables.
20. Figure 17 shows a flowchart for a program to print the result of examination.
Figure 17
Based on Figure 17,
(i) identify the program development phase involved.
(ii) state the control structure used in the program.
3765/1 © May 2016 SMK Tung Hua SULIT
Private Sub cmdCalculate_Click()Dim R, H, V As DoubleConst pi As Double = 22 / 7R = Val(txtRadius.Text)H = Val(txtHeight.Text)V = (1 / 3) * pi * (R ^ 2) * HMsgBox "Volume of cone = " & V & " cm3", 0, "Volume of cone"
End Sub
False
True
END
Print “Fail”
Print “Pass”Marks > = 50?
Request exam marks
BEGIN
12
SULITF5 May 2016
3765/121. Read the following statement:
Microsoft Access is used to create database.
State the component of information system that Microsoft Access belongs to.
22. A ……………………….. enables relationship to be built among two or more tables
in a database.
A primary key
B foreign key
C single-field primary key
D multiple-field primary key
23. Table 4 shows different functions performed by different types of information system.
Information System Functions
A To assist top-level management to plan strategies and
forecast future trends.
B To store knowledge and make logical suggestion for the
users.
Table 4
Based on Table 4, identify
(i) A
(ii) B
24. Figure 18 shows the hierarchy of data used in information system.
Figure 18
Based on Figure 18, name
(i) X
(ii) Y
3765/1 © May 2016 SMK Tung Hua SULIT
Bit Byte X Record Y Database
13
SULITF5 May 2016
3765/125. Figure 19 shows a table of students’ co-curriculum registration list in a database.
Student_Name Cocu_ID Cocu_Year Cocu_Position
Gordon Hwang Scout 2015 Secretary
Grace Wong Scout 2015 Treasurer
John Hii BB 2016 President
Janice Tiong GB 2016 Vice Secretary
Mathew Chong BB 2016 Vice President
Clement Sim BB 2016 Treasurer
Rose Pang GB 2016 President
Figure 19
Based on Figure 19:
(i) Identify the number of records in the table.
(ii) A query is performed to search student name list who have joined BB and GB.
Identify the database object being used.
3765/1 © May 2016 SMK Tung Hua SULIT
14
SULITF5 May 2016
3765/1Section B[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Figure 20 shows the login page for CIMB Clicks website.
A B
Figure 20
Based on Figure 20:
(a) Identify A and B either as verification or authentication respectively.
[2 marks]
(b) Explain the importance of verification and authentication when we login to our
bank account online.
[2 marks]
27. Table 5 shows four software.
GNOME Linux OpenOffice.org
Mozilla Firefox Mac OS X El Capitan
Table 5
(a) Identify software belongs to proprietary OS and open source OS.
[2 marks]
(b) State two differences between proprietary software and open source software.
[2 marks]
3765/1 © May 2016 SMK Tung Hua SULIT
15
SULITF5 May 2016
3765/128. Read the following scenario.
A telecommunication company wants to set up a data communication network in
remote rural village where there is no road access and hilly surface at surrounding. As
a network engineer, you are required to give advises to the company on how to set up
the network.
Based on the above scenario:
(a) Identify a suitable transmission medium used to set up the network.
[1 mark]
(b) Give reason on your choice of the transmission medium mentioned in Question
28(a) with its specifications.
[3 marks]
29. Figure 21 shows an excerpt of Visual Basic source code.
Figure 21
Based on Figure 21:
(a) Identify the relational operators and logical operator used in the source code.
[2 marks]
(b) If a student obtained 60 marks, what will be the output of the program? Justify
your answer.
[2 marks]
3765/1 © May 2016 SMK Tung Hua SULIT
ElseIf Marks > 50 And Marks <= 60 ThenlblGrade.Caption = "C"ElseIf …
16
SULITF5 May 2016
3765/130. Figure 22 shows the relationship between two tables.
Figure 22
Based on Figure 22:
(a) State the type of primary key used in the COCU_REG table.
[1 mark]
(b) State the primary keys for STUDENT_INFO table and COCU_REG table.
[2 marks]
(c) State the foreign key for the relationship.
[1 mark]
3765/1 © May 2016 SMK Tung Hua SULIT
17
SULITF5 May 2016
3765/1Section C[14 marks]
Answer two questions only.
(i) Question 31 and
(ii) either Question 32 or Question 33.
31. Figure 23 shows a design of input screen.
Figure 23
Based on Figure 23:
(a) (i) State the most suitable data type for item A and B.
[2 marks]
(ii) Give reason why data type for item A is different from item B.
[2 marks]
(b) Write a pseudocode for the program.
[3 marks]
3765/1 © May 2016 SMK Tung Hua SULIT
A
B
ORDER FORM
Product ID
Description
Customer ID
Quantity Price
Total PriceCalculate Total Price
18
SULITF5 May 2016
3765/132. Figure 24 shows four computers and a network-enable printer in a staff room.
Each computer and printer has a built-in network card with RJ-45 port.
Figure 24
Based on Figure 24, the school wishes to connect all the computers in the staff room
so that all the teachers are able to share files, information, internet connection and
printer for their daily work.
Based on the statement:
(a) Draw a diagram to show network layout.
[4 marks]
(b) Label the devices and cable used in the network.
[3 marks]
3765/1 © May 2016 SMK Tung Hua SULIT
Staff Room
19
SULITF5 May 2016
3765/133. As an information system developer, you are requested by your company to develop
an information system to keep track of employee payroll. Data collected will include
Employee ID, Name, Monthly Salary, Salary ID, Salary Month, Salary Year, Address
and Date of Birth.
Based on the statement, design the following system:
(a) Two tables with attributes.
[4 marks]
(b) Primary key for each table.
[2 marks]
(c) Draw a line to show the relationship between the two tables.
[1 mark]
END OF QUESTION PAPER
Prepared by Mr. Hu Kwong LiikCounter-checked by Mr. Voon Suk Foo
3765/1 © May 2016 SMK Tung Hua SULIT
20