scheme answer ICT F5 May2016
description
Transcript of scheme answer ICT F5 May2016
Nama :………………………………………....................... Tingkatan: 5A
3765/1ICTKertas 1May 20162 jam
SMK TUNG HUASIBU, SARAWAK
PEPERIKSAAN SEMESTER I 2016TINGKATAN 5
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Kertas 1
Dua jam
JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU
Kertas soalan ini mengandungi 20 halaman bercetak
3765/1 © May 2016 HKL, SMK Tung Hua
Kegunaan Pemeriksa
Bahagian MarkahPenuh
Markah
A 36B 20C 14JUMLAH
1 Kertas soalan ini mengandungi 33 soalan.2 Kertas soalan in mengandungi tiga bahagian:
Bahagian A, Bahagian B dan Bahagian C.3 Jawapan untuk Bahagian A hendaklah ditulis di ruang
yang disediakan pada Helaian Jawapan.4 Jawapan untuk Bahagian B dan Bahagian C
hendaklah ditulis di dalam kertas esei.5 Anda dibenarkan menggunakan kalkulator saintifik.
ICT Form 5 SMK Tung Hua May 2016
Answer Sheet for Section A (36%)
Question No. Candidate’s Answer Marks1 Fifth generation 12 Fingerprint recognition 2
3(i) Phishing 3(ii) Install antivirus/anti-spyware 4
4 C 5
5(i) C 6(ii) A 7
6 Read-Only Memory (ROM) 87 B 9
8(i) Redhat Linux 10(ii) The GIMP 11
9(i) Metropolitan Area Network (MAN) 12(ii) Local Area Network (LAN) 13
10 Client/Server 1411 ping 192.168.1.20 1512 Shielded twisted pair cable (STP) 1613 Page concept 17
14(i) Text 18(ii) Graphic 19
15(i) Project manager 20(ii) Subject matter expect 21
16 Testing 2217 Third generation 23
18(i) Object-oriented programming approach 24(ii) Interpreter/compiler 25
19 Double 26
20(i) Program design phase 27(ii) Selection control structure 28
21 Software 2922 B 30
23(i) Executive Information System (EIS) 31(ii) Expert System (ES)/Artificial Intelligent (AI) 32
24(i) Field/Attribute 33(ii) File/Table/Relation 34
25(i) 7 records 35(ii) Query 36
2
ICT Form 5 SMK Tung Hua May 2016
Section B (20%)
Q Answers %26 (a) A: Verification B: Authentication 2
(b) To protect our personal banking information and against the unauthorized access by intruder/hacker. ORTo prevent unauthorized online transaction and protect confidential banking information from being leak out.
2
27 (a) Proprietary OS: Mac OS X El CapitanOpen Source OS: Redhat Linux
2
(b) Two differences:
Proprietary software Open source softwareSource code is not available to the user.
User can download the source code from the web or get it from the vendor.
Cannot be customized. Can be customized according to the personal needs.
2
28 (a) Radio waves 1(b) Radio waves can travel for long distance and it is not obstructed by
hilly surface of earth. This is due to its low frequency range from 3 kHz to 1 GHz.
3
29 (a) Relational operators: “>”, “<=”; Logical operator: “And” 2(b) Grade C. It is because 60 marks still in the range of Grade C from 51
to 60 marks.2
30 (a) Multiple-field primary key 1(b) Primary key in STUDENT_INFO table: Student_ID
Primary key in COCU_REG table: COCU_ID, STUDENT_ID, COCU_YEAR
2
(c) Foreign key: Student_ID 1
3
11
ICT Form 5 SMK Tung Hua May 2016
Section C (14%)
Q Answers %31 (a) (i) A: String B: Double 2
(b) Field A is used to describe an item. So, we need to use text for describing purpose.Field B is used to display the total price of an item. So, we need to use floating point number to represent it.
2
(c) Pseudocode:
BEGIN Request Quantity and Price Calculate Total Price (Total Price = Quantity x Price) Print Total PriceEnd
3
32 Network layout: 7
33 Two Tables:
EMPLOYEE_INFO SALARY Employee_ID Salary_IDEmployee_Name Employee_IDEmployee_Address Salary_YearEmployee_DOB Salary_Month
Monthly_Salary
7
4
UTP cable
PC01 Printer PC02
PC04 PC03
Switch
Router
Internet