Sie sind auf Seite 1von 16

SULIT

3765/1

CONFIDENTIAL
3765/1
ICT
SEPTEMBER
2009
2 HOURS 30 MINUTES
JABATAN PELAJARAN MELAKA

INFORMATION AND COMMUNICATIONS TECHNOLOGY


(ICT)
PERCUBAAN SIJIL PELAJARAN MALAYSIA 2009

DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO

THIS QUESTION PAPER CONSISTS OF :


a. Section A

: 25 Questions

b. Section B

5 Questions

c. Section C

3 Questions
(Question 1 is Compulsory and
choose either Question 2 or Question 3)

THIS QUESTION PAPER CONSISTS OF 14 PAGES


3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1
Section A
[51 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Which of the following is the example of verification method ?

A. Identification card

C. Iris Scanning

B. Facial Recognition

D. Hand Geometry Scanning

Write True or False for the following statement.


2. An anti-spyware application program sometime called tracking software or a spybot.

Question 3 (i) and 3(ii)

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Fill in the blank with the appropriate answer.

Figure 1
3. (i) Figure 1 is computer hardware technology used in computer models which were
invented in ______________ generation .

(ii)
Fariz is a muslim. One day, he received a spam e-mail
stating that his favourite soda drink Soda Mooda Moody
uses non-halal food colouring, but he does not know if the
source of the content is credible or true. He decides to
forward the e-mail to 30 of his friends.

The above statement is an example of _____________________ .

4. Figure 2 shows security measures to overcome computer threats.

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

X : Firewall
Y : Cryptography

Z : Data Backup

Based on Figure 2, match the security measures with the following statements by
writing X, Y or Z.
(i) A piece of hardware or software which functions in a networked environment
to prevent some communications forbidden by the security policy.
(ii) A process of hiding information by altering the actual information into different
representation.

Question 5
Write True or False for the following statement.
5. Control Units main function is to perform all arithmetic and logical operations.

6. What is the main reason for using ASCII ?

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

A. To process textual data


B. To process graphic data
C. To achieve compatibility between various types of data processing
D. To purchase components that are compatible with their computer configuration.

Question 7
Fill in the blank with the appropriate answer.
7. ROM is _____________________ which means it holds the programs and data even
when the computer is turned off.

8. Figure 3(a) and 3(b) show operating system platforms.


Match the operating system platforms with the figure by writing the operating system
platforms given in the box below.

PC Platform

Figure 3(a)
(i)

Apple Platform

Cross- Platform

Figure 3(b)

Figure 3(a)

(ii) Figure 3(b)

Figure 4 shows the famous computer scientists in 3 computer generations era.

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Label the correct computer generation era for each computer scientists .
FIRST
P
GENERATIO
N

Steve Jobs
Figure 4

SECOND
Q
GENERATION

FOURTH
R
GENERATION

Presper Eckert

Question 10
Fill in the blank with the answers given in the boxes below.
application

quarantines

utility

virus
definition

recovery disk

It is essential that you install antivirus software. Antivirus software is a ______________


program that scan the hard disks, floppy disks and memory to detect viruses. Examples
of antivirus software are Norton Antivirus and McAfees VirusScan.
Antivirus softwares normally look for virus signatures to identify a virus. Users of
antivirus softwares must update the _____________________ files as often as possible
to ensure that such files contain patterns for newly discovered viruses.
If an antivirus programs cannot remove the virus, it often ________________ the
infected file in a separate area of a hard disk until the virus can be removed. Most
antivirus programs can create a recovery disk to remove or repair infected programs
and files. In extreme cases, a hardisk may need to be reformatted to remove a virus.

11. What is the set of rules used for information exchange between computers in
a network?
A. Router
B. Protocol
C. ISDN
D. Streamyx
Question 12 (i) and 12 (ii)

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Write True or False for the following statement.


12. (i) WAN is a network that covers a large geographical area such as city,
country, or the world. In other words, it is called Internet.
12. (ii) Microwave is a type of wireless transmission media.
Question 13(i) and 13(ii)
Fill in the blank with appropriate answer.
13. (i) Windows NT is an example of ___________________________ software.
13. (ii) _____________ is a communication device that connects multiple computers
and transmits data to its correct destination on network.
14. Table 1 shows three types of network topology.
Topology

configuration

Table 1
Based on Table 1 match the topology with the following statement by
writing P,Q, or R.
In this topology, if one node fails, the entire network will fail to function.
15. Which of he following programs can be used to generate graphic?
A. Microsoft Power Point
B. Microsoft Word
C. Adobe Photoshop
D. Adobe Audition
16.
Usage

3765/1

Basic media for many multimedia

[Lihat Sebelah
SULIT

SULIT

3765/1
system
Small file size
.rtf,txt

Advantage
File format

Table 2
Based on Table 3 above, the statement refers to ___________
A. Text
B. Graphic
C. Audio
D. Video
Question 17
Write True or False for the following statement
17. Navigation means the user cannot move around the menus or other screen in
a system.
Question 18(i) and 18(ii)
Fill in the blank with the appropriate answer.
18.(i) Multimedia products can be delivered by CD based and ________________
(ii) The ______________ is to write the program code lines or scripts using
authoring tool.

19. (i) This network consists of a single central cable to which all computers
and
devices are connected.
(ii) A network links two or more computers together normally connect in loop
to enable data and resource exchange.

20.
Based on Figure 5, select the multimedia devices that suit the statements
below.

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Figure 5
(i)

This device can store images on disks or on film.

(ii)

This device is used to read data or information.

21 . A ______________________web editor is an editor where you use HTML tags to


create a web page.
.
22 . The multimedia element that makes objects move is called_________________.

23. Table 3 shows authoring tools in multimedia production

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Table 3
Based on table 3 , match the authoring tools with the following statement by writing
A,B,C or D.
(i)

This software uses card concept to develop production.

(ii)

This software uses icon concept to develop production.

24. In program design phase, there are 3 popular tools which are
I Flow chart
II
Pseudo code
III Top-down design model
IV
Bottom-up design model
A
B
C
D

I,II and III


I,II and IV
I,III and IV
II,III and IV

Question 25(i) and 25 (ii)


25 (i) There are five basic elements in programming that are: constants,data
types,variable,___________________ and control structures.

(ii) There are two programming approaches which


are____________________ and object oriented programming.
26. _________________ is a set of commands or instructions which directs a computer
in doing a task.

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

A. Program
B. Language
C. Programmer
D. Programming Language

Question 27
Write True or False for the following statement.
27. Control structures can be divided into approach control and selection control.
28. Table 4(a) and 4(b) show a statement about programming

Table 4(a)

Table 4(b)
Based on the table above, match Table 4(a) with Table 4(b)
(i)
M=
(ii)

N=

29. Information is

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

A. Collection of unprocessed items which include text, numbers, images, audio and
video.
B. Processed data; that is organized ,meaningful and useful
C. Collection of data organized in a meaningful manner that allows a user to
access,retrieve and use the data.
D. Hardware,software,data,people and procedures that work together to produce
quality information.

Question 30(i) and 30 (ii)


Write True or False for the following statement.
30 (i) A record is a collection of files logically related to one another.
30 (ii) A Transaction Processing System(TPS) is an information system that captures
and processes data day to day business activities.

31._______________________ is one example of data manipulation where one or more


records can be listed using certain condition.

Question 32(i) and 32 (ii)

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

Figure 6 shows about Database

Figure 6
Based on Figure 6, match with and write J,K,L or M for statement below.
32 (i) A window on the screen that provides area for entering or changing data
in a database.
32 (ii) A field in a table that must match with a primary key in a another table in
order to enable both tables to have relationship for the record.

3765/1

[Lihat Sebelah
SULIT

SULIT
33

3765/1

Figure 7 shows a hierarchy of data.

Bit
Byte
M
Record
N
Database
Figure 7
Based on the figure, name M and N.

END OF QUESTION PAPER

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

3765/1

[Lihat Sebelah
SULIT

SULIT

3765/1

3765/1

[Lihat Sebelah
SULIT

Das könnte Ihnen auch gefallen