Beruflich Dokumente
Kultur Dokumente
3765/1
CONFIDENTIAL
3765/1
ICT
SEPTEMBER
2009
2 HOURS 30 MINUTES
JABATAN PELAJARAN MELAKA
: 25 Questions
b. Section B
5 Questions
c. Section C
3 Questions
(Question 1 is Compulsory and
choose either Question 2 or Question 3)
[Lihat Sebelah
SULIT
SULIT
3765/1
Section A
[51 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Which of the following is the example of verification method ?
A. Identification card
C. Iris Scanning
B. Facial Recognition
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Figure 1
3. (i) Figure 1 is computer hardware technology used in computer models which were
invented in ______________ generation .
(ii)
Fariz is a muslim. One day, he received a spam e-mail
stating that his favourite soda drink Soda Mooda Moody
uses non-halal food colouring, but he does not know if the
source of the content is credible or true. He decides to
forward the e-mail to 30 of his friends.
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
X : Firewall
Y : Cryptography
Z : Data Backup
Based on Figure 2, match the security measures with the following statements by
writing X, Y or Z.
(i) A piece of hardware or software which functions in a networked environment
to prevent some communications forbidden by the security policy.
(ii) A process of hiding information by altering the actual information into different
representation.
Question 5
Write True or False for the following statement.
5. Control Units main function is to perform all arithmetic and logical operations.
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Question 7
Fill in the blank with the appropriate answer.
7. ROM is _____________________ which means it holds the programs and data even
when the computer is turned off.
PC Platform
Figure 3(a)
(i)
Apple Platform
Cross- Platform
Figure 3(b)
Figure 3(a)
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Label the correct computer generation era for each computer scientists .
FIRST
P
GENERATIO
N
Steve Jobs
Figure 4
SECOND
Q
GENERATION
FOURTH
R
GENERATION
Presper Eckert
Question 10
Fill in the blank with the answers given in the boxes below.
application
quarantines
utility
virus
definition
recovery disk
11. What is the set of rules used for information exchange between computers in
a network?
A. Router
B. Protocol
C. ISDN
D. Streamyx
Question 12 (i) and 12 (ii)
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
configuration
Table 1
Based on Table 1 match the topology with the following statement by
writing P,Q, or R.
In this topology, if one node fails, the entire network will fail to function.
15. Which of he following programs can be used to generate graphic?
A. Microsoft Power Point
B. Microsoft Word
C. Adobe Photoshop
D. Adobe Audition
16.
Usage
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
system
Small file size
.rtf,txt
Advantage
File format
Table 2
Based on Table 3 above, the statement refers to ___________
A. Text
B. Graphic
C. Audio
D. Video
Question 17
Write True or False for the following statement
17. Navigation means the user cannot move around the menus or other screen in
a system.
Question 18(i) and 18(ii)
Fill in the blank with the appropriate answer.
18.(i) Multimedia products can be delivered by CD based and ________________
(ii) The ______________ is to write the program code lines or scripts using
authoring tool.
19. (i) This network consists of a single central cable to which all computers
and
devices are connected.
(ii) A network links two or more computers together normally connect in loop
to enable data and resource exchange.
20.
Based on Figure 5, select the multimedia devices that suit the statements
below.
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Figure 5
(i)
(ii)
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Table 3
Based on table 3 , match the authoring tools with the following statement by writing
A,B,C or D.
(i)
(ii)
24. In program design phase, there are 3 popular tools which are
I Flow chart
II
Pseudo code
III Top-down design model
IV
Bottom-up design model
A
B
C
D
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
A. Program
B. Language
C. Programmer
D. Programming Language
Question 27
Write True or False for the following statement.
27. Control structures can be divided into approach control and selection control.
28. Table 4(a) and 4(b) show a statement about programming
Table 4(a)
Table 4(b)
Based on the table above, match Table 4(a) with Table 4(b)
(i)
M=
(ii)
N=
29. Information is
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
A. Collection of unprocessed items which include text, numbers, images, audio and
video.
B. Processed data; that is organized ,meaningful and useful
C. Collection of data organized in a meaningful manner that allows a user to
access,retrieve and use the data.
D. Hardware,software,data,people and procedures that work together to produce
quality information.
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
Figure 6
Based on Figure 6, match with and write J,K,L or M for statement below.
32 (i) A window on the screen that provides area for entering or changing data
in a database.
32 (ii) A field in a table that must match with a primary key in a another table in
order to enable both tables to have relationship for the record.
3765/1
[Lihat Sebelah
SULIT
SULIT
33
3765/1
Bit
Byte
M
Record
N
Database
Figure 7
Based on the figure, name M and N.
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
3765/1
[Lihat Sebelah
SULIT
SULIT
3765/1
3765/1
[Lihat Sebelah
SULIT