Sie sind auf Seite 1von 18

SULIT

F5 May 2016

3765/1
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Figure 1 shows an Intel processor.

Figure 1
Based on Figure 1, state the generation of computer using Intel Core i7 processor.
2. Figure 2 shows an authentication feature used in iphone 6S.

Figure 2
Based on Figure 2, identify the authentication method used.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1
3. Figure 3 shows an e-mail received by a students parents.

Figure 3
(i)
(ii)

Based on Figure 3:
Identify the possible security threat being faced.
State a method to overcome security threat mentioned in Question 3(i).

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1
4. Figure 4(a) and Figure 4(b) shows three hardware and information processing cycle
respectively.

A
X

B
Figure 4(a)

Process

Output

Storage
Figure 4(b)
Based on Figure 4(a), identify hardware for X by writing A, B or C.
5. Figure 5 shows a motherboard.

B
C

Figure
5
Based
on

Figure

5, write A, B or C to indicate the location of


(i)
RAM slot
(ii)
PCI expansion slot
6. Figure 6 shows a storage medium used in electronic device.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1

Figure 6
Based on Figure 6, name the storage medium.
7. Table 1 shows three different operating system (OS) platforms.
PC platform
A

Apple Platform
Cross-platform
B
C
Table 1
Based on Table 1, identify OS platform for Mac OS X by writing A, B or C.
8. Table 2 shows a list of software.
Windows 10
Microsoft Office 2013
Adobe Photoshop

Redhat Linux
CorelDRAW Graphic Suite X8
The GIMP

Table 2
Based on Table 2, identify software which is
(i) open source operating system
(ii) open source application software

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1
9. Figure 7 shows two types of network.

Figure 7
Based on Figure 7, state the type of network for
(i) A
(ii) B
10. Figure 8 shows a computer network.

Figure 8
Based on Figure 8, identify the network architecture used.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1
11. Figure 9 shows TCP/IP configuration on computer Y.

Figure 9
Based on Figure 9, write a command to test connection to computer Y.
12. Figure 10 shows a transmission medium for data communication.

Figure 10
Based on Figure 10, name the transmission medium.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

F5 May 2016

3765/1
13. Figure 11 shows a ToolBook 10.5 interface.

Figure 11
Based on Figure 11, name the authoring tool concept used by ToolBook.
14. Figure 12 shows a multimedia program interface.

Figure 12
Based on Figure 12, identify multimedia element
(i)
A
(ii) B

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

10

F5 May 2016

3765/1
15. Table 3 shows the tasks of multimedia production team.
Personne
l
A

Tasks

Define the scope of the project and discuss with the clients.
Responsible to find financial resources, equipment and facilities.
Coordinate the production teams work.
B
Do research on the content of the multimedia program.
Provide content for the multimedia program.
Table 3
Based on Table 3, identify the multimedia production team for
(i) A
(ii) B
16. Figure 13 shows a simple checklist used by end-user to test a multimedia program.

Figure 13
Based on Figure 13, name the multimedia production phase involved.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

11

F5 May 2016

3765/1
17. Figure 14 shows a sample of COBOL programming language source code.

Figure 14
Based on Figure 14, identify the generation of programming language for COBOL.
18. Figure 15 shows the Visual Basic 6.0 interface.

Figure 15
Based on Figure 15,
(i) state the programming approach used in Visual Basic 6.0.
(ii) state the translator used in Visual Basic 6.0.
19. Figure 16 shows the Visual Basic source code.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

12

F5 May 2016

3765/1
Private Sub cmdCalculate_Click()
Dim R, H, V As Double
Const pi As Double = 22 / 7
R = Val(txtRadius.Text)
H = Val(txtHeight.Text)
V = (1 / 3) * pi * (R ^ 2) * H
MsgBox "Volume of cone = " & V & " cm3", 0, "Volume of cone"
End Sub
Figure 16
Based on Figure 16, identify the data type being declared for variables.
20. Figure 17 shows a flowchart for a program to print the result of examination.
True

False

Print Fail

END

Figure 17
Based on Figure 17,
(i) identify the program development phase involved.
(ii) state the control structure used in the program.
21. Read the following statement:
Microsoft Access is used to create database.
State the component of information system that Microsoft Access belongs to.
22. A .. enables relationship to be built among two or more tables
in a database.
A primary key
B foreign key
C single-field primary key
D multiple-field primary key
23. Table 4 shows different functions performed by different types of information system.
Information System
A

3765/1

May 2016 SMK Tung Hua

Functions
To assist top-level management to plan strategies and

SULIT

SULIT

13

F5 May 2016

3765/1
forecast future trends.
To store knowledge and make logical suggestion for the

users.
Table 4
Based on Table 4, identify
(i) A
(ii) B
24. Figure 18 shows the hierarchy of data used in information system.
Bit

Byte

Record

Database

Figure 18
Based on Figure 18, name
(i) X
(ii) Y

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

14

F5 May 2016

3765/1
25. Figure 19 shows a table of students co-curriculum registration list in a database.
Student_Name
Gordon Hwang
Grace Wong
John Hii
Janice Tiong
Mathew Chong
Clement Sim
Rose Pang

Cocu_ID
Scout
Scout
BB
GB
BB
BB
GB

Cocu_Year
2015
2015
2016
2016
2016
2016
2016
Figure 19

Cocu_Position
Secretary
Treasurer
President
Vice Secretary
Vice President
Treasurer
President

Based on Figure 19:


(i)
Identify the number of records in the table.
(ii)
A query is performed to search student name list who have joined BB and GB.
Identify the database object being used.

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

15

F5 May 2016

3765/1
Section B
[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Figure 20 shows the login page for CIMB Clicks website.

B
Figure 20

(a)

Based on Figure 20:


Identify A and B either as verification or authentication respectively.
[2 marks]
Explain the importance of verification and authentication when we login to our

(b)

bank account online.


[2 marks]
27. Table 5 shows four software.
GNOME Linux
Mozilla Firefox

OpenOffice.org
Mac OS X El Capitan

Table 5
(a) Identify software belongs to proprietary OS and open source OS.
[2 marks]
(b) State two differences between proprietary software and open source software.
[2 marks]

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

16

F5 May 2016

3765/1
28. Read the following scenario.
A telecommunication company wants to set up a data communication network in
remote rural village where there is no road access and hilly surface at surrounding. As
a network engineer, you are required to give advises to the company on how to set up
the network.
Based on the above scenario:
(a) Identify a suitable transmission medium used to set up the network.
[1 mark]
(b) Give reason on your choice of the transmission medium mentioned in Question
28(a) with its specifications.
[3 marks]
29. Figure 21 shows an excerpt of Visual Basic source code.
ElseIf Marks > 50 And Marks <= 60 Then
lblGrade.Caption = "C"
ElseIf

Figure

21
Based on Figure 21:
(a) Identify the relational operators and logical operator used in the source code.
[2 marks]
(b) If a student obtained 60 marks, what will be the output of the program? Justify
your answer.
[2 marks]

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

17

F5 May 2016

3765/1
30. Figure 22 shows the relationship between two tables.

Figure 22
Based on Figure 22:
(a) State the type of primary key used in the COCU_REG table.
[1 mark]
(b) State the primary keys for STUDENT_INFO table and COCU_REG table.
[2 marks]
(c) State the foreign key for the relationship.
[1 mark]

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

18

F5 May 2016

3765/1
Section C
[14 marks]
Answer two questions only.
(i) Question 31 and
(ii)either Question 32 or Question 33.
31. Figure 23 shows a design of input screen.

ORDER FORM
Product ID
A

Description
Customer ID

Price

Quantity
B

Total Price

Figure 23
Based on Figure
(i) State the

(a)

item A

Calculate Total Price


23:
most suitable data type for
and B.

[2 marks]
(ii) Give reason why data type for item A is different
from item B.
[2 marks]
(b) Write a pseudocode for the program.
[3 marks]

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

19

F5 May 2016

3765/1
32. Figure 24 shows four computers and a network-enable printer in a staff room.
Each computer and printer has a built-in network card with RJ-45 port.
Staff Room

Figure 24
Based on Figure 24,

the

school wishes to
connect all the
computers in the staff room so that all the teachers are able to share files, information,
internet connection and printer for their daily work.
Based on the statement:
(a) Draw a diagram to show network layout.
[4 marks]
(b) Label the devices and cable used in the network.
[3 marks]

3765/1

May 2016 SMK Tung Hua

SULIT

SULIT

20

F5 May 2016

3765/1
33. As an information system developer, you are requested by your company to develop
an information system to keep track of employee payroll. Data collected will include
Employee ID, Name, Monthly Salary, Salary ID, Salary Month, Salary Year, Address
and Date of Birth.
Based on the statement, design the following system:
(a) Two tables with attributes.
[4 marks]
(b) Primary key for each table.
[2 marks]
(c) Draw a line to show the relationship between the two tables.
[1 mark]

END OF QUESTION PAPER


Prepared by Mr. Hu Kwong Liik
Counter-checked by Mr. Voon Suk Foo

3765/1

May 2016 SMK Tung Hua

SULIT

Das könnte Ihnen auch gefallen