Sie sind auf Seite 1von 15

SULIT

2
Section A [36 marks]

3765/1

Answer all the questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. 1. Study the statement below carefully. Production was slow because everything was done manually and totally depended on human labour. Statement 1 Statement 1 above is regarding to ______________________ systems. 2. Statement below is about controversial issue. Azman is a Muslim. One day, he received a spam e-mail stating that his favourite drink Power-B uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends. Statement 2 Based on Statement 2 above, (i) (ii) Azman has convicted ______________________ List another effect of controversial content

1. Figure 1 shows the examples of input and output devices.

3 B Figure 1

Based on Figure 1, write A, B or C to indicate the input device used for audio.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

A Can only hold the data temporarily B Can store the data permanently until it is deleted or removed Table 1 2. Based on Table 1 above, identify the types of storage for: a) A b) B 3. Write True or False for the following statement: a) A computer that operates at 933 MHz (megahertz) has 933 million clock cycles in one second (hertz) 4. Figure 2 below shows a networking device

Figure 2 Identify the device in Figure 2. 5. Figure 3 shows wired transmission medium.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

Y Figure 3

By using W, X, Y and Z in Figure 4, identify the following transmission medium. a) Fibre optic cable b) Shielded Twisted Pair

6. Figure 4 show how cryptography works by using cipher substitution.


Process X C H I E S Y A Figure 4 Based on Figure 1, state process X and process Y. X : ____________________ Y : ____________________ Process Y C H I E

7. State whether the following statement is True or False.


i. Users can distribute proprietary software freely. ii. Proprietary software offers a stable system support if it fails or malfunctions. 1. The statement in Table 2 is about a type of computer network. X is a type of computer network that links computers in Malaysia and Korea.

5 Table 2
Based on Table 2, X refers to 3765/1
2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT A. Local Area Network (LAN) B. Wide Area Network (WAN) C. Personal Area Network (PAN) D. Metropolitan Area Network (MAN)

3765/1

11. State whether the following statement is True or False.


Internet networking allows a group of computer users with the same networking program to connect with each other and directly access files from each others hard drives. 12.Table 3 shows communication devices. Based on Table 3, select A, B, C or D for the following statement. Wireless Network Interface Card A Network Interface Card C Table 3 A central communication device that allows computers to transfer data and information to other wireless devices or a wired network. 13. Which of the following wireless transmission media is used for short-range communication? A. B. Infrared C. Satellite D. Microwave E. Radio Wave Wireless Access Point D

Router

11. Table 4 is about a popular internet service among the internet users. This internet service is a popular service among the internet users. This service allows the internet users to share thoughts and experiences with other internet users. The internet users does not need to login in order to read the thoughts and experience. Table 4

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

Based on table 4, state the internet service. 12. Which is the suitable device to convert conventional images, texts, drawings and photos into digital form?

13. Words, names, symbols, device and images that represent products, goods or services can be protected under the ________________. A. B. Patent C. Design D. Copyright E. Trademark

11.Table 5 refers to types of computer threats. Mr. Ali is the server manager at SMK Seri Jaya. One day he found out that certain data in the server was missing. Table 5 Based on the statement in table 5, identify the type of computer threat stated. 12. Write the correct word to complete the following statement: _______________________ is a malicious code on a computer to gather information. 13.Figure 5(a) and Figure 5(b) show biometric authentication methods.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

7
Figure 5(a) (i) Figure 5(a) (ii) Figure 5(b) 14. Figure 6 shows the technology used in the evolution of computers. Figure 5(b)

Based on Figure 5(a), and Figure 5 (b) states the methods used.

Figure 6 Based on Figure 6, state the name of component: (i) X (ii) Y 15.The following statement refers to the positive impact of ICT to society. State whether it is True or False. i. People could share and exchange ideas, news and information easier through video conference. ii. People became more individualistic and introvert. 11.Table 6 shows several output devices. 3765/1
2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

8
Table 6 Based on Table 6, match the output devices with the following statements by writing X, Y or Z. i. The device that can be used to convey texts, graphics and video information as visual output ii. The device that can be used to convey text, graphics on a physical medium. 11.Figure 7 shows a computer network.

Figure 7 Name P. 24.Figure 8 shows example of input devices.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

pture images from photographic prints, postercomputer by special into the computer... input of motion images capture into the or magazine pages input device.

S T

Figure 8 Based on Figure 8, state S and T.

25. Based on the figure below, which of following can be slotted in X.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

A. C.

RAM Memory card

B. CPU D. NIC

24.Based on figure below, state whether the following statement is True or False

Fetch and decode is in the execution cycle whereas execute and store is in the instruction cycle.

10
Section B [20 marks] 3765/1 [Lihat Sebelah SULIT

2011 Panitia ICT SMK Tinggi Perempuan Melaka

SULIT

3765/1

This section consists of five questions. Answer all questions.

27. Figure 9 shows two types of computer storages.

Figure 9

(a) Name storage


i. A (2 marks) (2 marks)

ii. B (a) Give one difference in function between storage A and B.

27. Figure 10 shows students of SK Kota are using Thinkquest portal in the computer lab.

Figure 10

(a) Based on figure 10, state the type of network in that computer lab. (b) State three importances of computer 11 networks and communications.
27.Figure 11 shows two types of software.

(1 mark) (3 marks)

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT C. Database B. Word Processing A.Operating Editor D.Software X software Spreadsheet Graphic System Types of

3765/1

Figure 11 Based on Figure 11 (a) Identify X and state one function of it. (b) Give one example of open source software and proprietary software for Operating System. [ 2 marks] [ 2 marks]

27.Ali works as a clerk in a school. He uses a keyboard to key-in all the schools data into the 3765/1
2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

computer. He saves all the data as a backup in Device X. At the end of every month, he will send a printed report to the school principal. (a) Based on the situation above, name the input device and output device that Ali used. i) Input device : ______________ (2 Marks) (2 ii) Output device: ______________ (b) Give two examples of Device X.

Marks)

31.

CABLE A
Based on figure above: (a) State types of Cable A and Cable B. (b) Give one function of Cable A and Cable B.

CABLE B

[2 marks] [2 marks]

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

13
Section C [14 marks] This section consists of three questions. Answer two questions only: (i) (ii) Question 31 is compulsory, and Choose Either Question 32 or Question 33.

Student A needs to complete an assignment to calculate and managing marks of all the students in his class. Whereas Student B has to prepare an assignment that need to be presented in his class soon. Both students choose to make use of computer system involving four main elements in Information Processing Cycle. Situation 1 32. Based on the Situation 1 above, a) (i) Draw a block diagram of Information Processing Cycle which consists of all main elements below.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

[2 marks] (ii) State the meaning of Machine Cycle in one of the component of Information Processing Cycle and give one function of CPU. (ii) Give one function for each type of application software as in (i). 33. Based on the situation 2 below, answer the following questions. [2 marks] [2 marks]

14 b) (i) State the types of application software used by Student A and Student B. [2 marks]

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. Situation 2 a) Explain the type of computer crime that David has committed and give another example. [3 marks] b) (i) State the way computer crime can be prevented? (ii) List two needs of using the way used in (i) to prevent computer crime. [1 mark] [2 marks]

34. PC 1 in Figure 12 can access computers in two different types of computer networks.

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

SULIT

3765/1

Based on Figure 12 above: a) Name the two types of computer network. b) Give two (2) differences between the two types of computer networks. [2 marks] [4 marks]

END OF QUESTION PAPER

3765/1

2011 Panitia ICT SMK Tinggi Perempuan Melaka

[Lihat Sebelah SULIT

Das könnte Ihnen auch gefallen