soalan f5 ppt 2010 by Ei7wPM6x

VIEWS: 0 PAGES: 9

									NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

SULIT
3765/1
ICT 1
Mei 2010
2 ½ Jam


                      SMK SERI TANJONG KUALA SELANGOR



                   PEPERIKSAAN PERTENGAHAN TAHUN 2010
                              TINGKATAN 5




           INFORMATION AND COMMUNICATION TECHNOLOGY

                                        Kertas 1

                                        2 ½ Jam



JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Jawab semua soalan BAHAGIAN A, BAHAGIAN B dan 2 soalan BAHAGIAN C.

2. Kertas soalan dan jawapan ini hendaklah diserahkan pada akhir peperiksaan.


 Disediakan oleh:                                          Disahkan oleh:




 ZULKIFLI BIN OTHMAN                                       JUMRI BIN RAMLI
 Ketua Panitia ICT                                         Guru Kanan MP Teknik & Vokasional
 SMK Seri Tanjong, Kuala Selangor.                         SMK Seri Tanjong, Kuala Selangor.

                    Kertas soalan ini mengandungi 9 halaman bercetak


                                                                                 [Lihat
                                                                                Sebelah
SULIT
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….


Question                          Answer     Score
1            B                                        1
2            False                                    2
3            True                                     3
      (i)    Encryption                               4
4    (ii)    Decrypyion                               5
     (iii)   D                                        6
5            B                                        7
6            D                                        8
7            C                                        9
     (i)     A                                       10
8
     (ii)    Parallel Port                           11
     (i)     Expansion Slot                          12
9
     (ii)    CPU Socket                              13
     (i)     RAM Slot                                14
10
     (ii)    A                                       15
     (i)     C                                       16
11
     (ii)    True                                    17
12           True                                    18
     (i)     C                                       19
13
     (ii)    C                                       20
     (i)     copyright infringement                  21
14
     (ii)    byte                                    22
     (i)     B                                       23
15   (ii)    Executing                               24
     (iii)   B                                       25
16           False                                   26
17           True                                    27
18           Keyword Blocking                        28
     (i)     D                                       29
19
     (i)     80 GB                                   30
20           512 MB                                  31
21           1.86 GHz                                32
22           RAM                                     33
23           ROM                                     34
24           Optical                                 35
25           Flash Memory                            36

                                       -2-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

                                     Section A
                                    [36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Based on Diagram, X is best described as




                                                     Diagram
              A   spam
              B   cookies
              C   spyware
              D   electronic profile

2. Bit is the smallest unit of data a computer can process. Byte is unit of information built
   from bits. One byte is equal to _____________ bit.

3. Computer crimes include computer fraud, computer infringement, computer theft and
   computer attack. State the name of crime activity for Situation.

      Raju received an e-mail inviting him to invest in a “Skim Cepat Kaya” investment. Raju took action
      as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
      100,000.00 in two weeks, but after two weeks, nothing happened.

                                                Situation
        Computer crime for this case is _______________________________


4. Match the invention according to the right computer generations by write P, Q, or R in
   spaces provided in Answer Sheet.

        i         Mobile Computing                    P     First Generation
        ii        Vacuum Tube                         Q     Third Generation
        iii       Integrated Circuit                  R     Fifth Generation

        i _______________
       ii ______________
      iii ______________



5. Write ‘True’ or ‘False’ in the spaces provided in Answer Sheet based on statement below.
   Pornography can lead to criminal acts such as exploitation of women and children. _____



                                               -3-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

6. Windows XP, Macintosh OS X, and Linux Suse are examples of
         A Application Software
         B Web Browser
         C Operating Systems
         D Shareware program

7. To convert conventional images to digital images, _____________ are used.
          A scanners
          B cameras
          C printers
          D audio devices

8. Speaker and headphones are classified as ______________ devices while joysticks and
   trackballs are classified as ______________ devices.

9. Write ‘True’ or ‘False’ in the spaces provided in Answer Sheet for statement below.
           i Jamal wants to send a file to Wong using electronic mail services. He must
             ensure that the file is free from virus before it is sent. Jamal uses application
             software to ensure the file is virus-free before it is sent. ______

           ii Wong downloads and save that file in secondary storage like flash drive. ______


10. Figure below shows the motherboard of a computer. Name J and K.




                                                                                  J : _________




                                                                       K: ________


11. Table shows several terms in a computer system.
       A         Input Device
       B         Command-Line User Interface
       C         Word Processing Software
                         TABLE
Based on Table, write A, B, C, or D for the following question in the spaces provided in
Answer Sheet.
  a. Shalini wants to create and manipulate documents containing text and graphics. What
      type of program should Shalini use?


  b. “Type commands or press special keys on the keyboard to enter data and instructions
      that instruct the operating system what to do. It has to be typed one line at a time.”
      These statements refer to _____________.
                                                 -4-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

12. A _____________ is a high-speed network that connects networks in an area such as a
    city or town and handles the bulk of communications activity across that region.

        A       local area network (LAN)
        B       metropolitan area network (MAN)
        C       wide area network (WAN)
        D       variable area network (VAN)


13. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet for statement below.

     i All computers in peer-to-peer network have equal responsibilities and capabilities to
       use the resources available on the network. _____

     ii Extranet is a private network that uses internet technology to share information with
        authorized parties. _____

14. Ali connects three computers in his office through hub and server. The type of network
    that he used is called a ____________. Ali’s customer, David who lives in Singapore
    connects his computer to Ali’s new networks. This type of network is called a
    __________________ .

15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces
    provided in Answer Sheet.
                  Item                                   Statement

                    P         Converts digital signals to analog signals and vice versa.
                              Commonly used to connect signal of a LAN contains multiple
                    Q
                              ports.
                              Adapter card that enables computer or device to access
                    R
                              network.
                    S         Connects networks that use the same protocol.
                              Connects networks and transmits data to correct destination on
                    T
                              network.

                                           TABLE

    Match the correct items that represent the statement that best describe the hardwares
    given below.
         i Modem : _________
         ii Router : _________
        iii Network Interface Card : _______


16. A movie that combines audio, graphics and animation is still considered as a __________
    multimedia content since the user is a passive receiver of the content.

                        A   linear
                        B   graphic
                        C   animation
                        D   non-linear


                                              -5-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

17.
           I        Implementation
           II       Evaluation
           III      Design and Develop
           IV       Testing
           V        Analysis
           VI       Publishing

           The correct sequence in multimedia development is
                    A. III, II, IV, IV, I, V
                    B. I, II, III, IV, V, IV
                    C. V, III, I, IV, II, VI
                    D. II, IV, III, I, V, IV

18. Write ‘True’ or ‘False’ in the spaces provided in Answer Sheet for statement below.

      Linear interactivity allows the user to interact with the content according to what the user
      wants.

19. Table shows the multimedia development phase, based on the description given identify
    phases Y and Z, write the answer in spaces provided in Answer Sheet.
                      Phase                                 Description
                            Y   The multimedia developer will design a flow chart and storyboard.
                                The multimedia developer will use a checklist to test the multimedia
                            Z
                                program. If there are errors, he will fix the program.

                                                    TABLE

           Y:_______________________                              Z: _______________________

20. A _______________________Web editor is an editor where you use HTML tags to
    create a Web page.

21. The multimedia element that makes objects move is called_________________.


22. A ______________interactivity allows the user to control the progress of the content.

23. Give an example of editing software that can be used to produce multimedia presentation
    using text editor.

24. Give an example of editing software that can be used to produce multimedia presentation
    using video editor.

25. The advantages of CD-based multimedia programs are
    I. they can be changed
    II. they can be updated easily
    III. they can store high end video
    IV. they can be permanently stored

      A.   I and II
      B.   II and III
      C.   III and IV
      D.   II, III and IV


                                                 -6-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….


                                      Section B
                                      [20 Marks]

This section consists of five questions. You are required to answer all questions.

26 Based on Situation, answer the following question:
     Haziq likes to access the internet. One day, while surfing the internet, his computer starts
     to run a little weird. He noticed that the modem LEDs were blinking even after he has
     stopped surfing. His system seemed to get slow and suddenly reboots. Haziq is sure that
     somebody has logged onto his computer.

     Haziq gemar melayari internet. Pada suatu hari, semasa Haziq sedang melayari internet, beliau
     mendapati komputer beliau tidak laju seperti biasa. Beliau juga mendapati bahawa ‘LED’ pada
     modem berkelip walaupun beliau tidak lagi melayari internet. Komputer beliau juga ‘reboot’.
     Haziq pasti terdapat pengguna lain yang telah memasuki sistem komputernya.


     a. List two examples of computer threat is mentioned in the situation above?
                                                                           [2 marks]

     b. State two things that Haziq can do to enhance the security of his data while
        accessing the Internet.
                                                                           [2 marks]

27 Figure shows the information processing cycle.

             INPUT                                B                             OUTPUT



                                                  D

   a. Component B contains the control unit and arithmetic and logic unit. State
      one function for each of the component.
                                                                      [2 marks]

   b. Component D can be classified into two categories. State two the differences
      between two of categories.
                                                                          [2 marks]




                                          -7-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

28 Based on Situation, answer the following question:

 Julia has purchased a commercial application software and she uploads the
 software to her web site for others to download it.
 Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik perisian itu ke
 laman webnya bagi membolehkan orang lain memuat turunnya.

 Johan has downloaded an open source application software from the Internet.
 He then duplicates the software and distributes to his friends.
 Johan telah memuat turun perisian aplikasi sumber terbuka dari Internet. Kemudian, dia
 membuat salinan perisian tersebut dan mengedarkan kepada rakan-rakannya.

   (a) Who has committed in computer crime? State the type of computer crime
       he/she has committed.
                                                                        [2 marks]
   (b) State two reasons why do we need Cyber Law.
                                                                        [2 marks]

29 Answer the questions below about cyber laws.

   (a) Malaysian Government has passed several cyber laws to control the Internet
       abuse. Four cyber law acts in Malaysia are

        Digital Signature Act 1997                        (i) ___________________________________

       (ii) ___________________________________           Communication and Multimedia Act 1997

                                                                                  [2 marks]

   (b) Lee, a bank officer, has hacked his client’s account to get information for his
       own use. He can be convicted under _____________________ Act 1997.
       Computer crime for this case ________________
                                                                              [2 marks]

30 Table shows the examples of computer software.

      Internet Explorer        AVG AntiVirus           Microsoft Excel              Linux

   (a) Based on the table 1, choose one example for suitable task given.
       Task 1: Coordinates all the activities among the computer hardware devices.

       Task 2: Protects a computer against viruses by identifying and removing any
               computer virus found in a memory or storage media or in incoming
               files.
                                                                         [2 marks]

   (b) State two differences between proprietary and open source software.
                                                                         [2 marks]


                                            -8-
NAMA: ………………………………………….NO. KP: ……………………………

TINGKATAN : ………………………………….

                                       Section C
                                           [14 marks]
This section consists of 3 questions. You are required to answer 2 questions.

31 Answer questions based on the given situation.


      Situation:
      Your school is going to have a new intake for the Form 1 students. As a ICT student, you are given
      the responsibility by your principal to produce a multimedia project which will include all the
      information about your school for the parents and the new students. Your first slide should have
      your school name, batch, and school song as background music. Your multimedia project must be
      both informative and interactive with suitable linking button to allow user choose their interest
      information.


       Draw a storyboard for your slide.
                                                                                   [7 marks]

32 Answer questions based on the given situation.

   Figure shows CMA Company computer network.

                                                                    Network B
           Network A                        Server




                                                                 Modem

                                                      Internet

                                   Figure


   Name the topology of Network A. Give two advantages for topology in Network A.
                                                        M0dem
   State two computer security threats that will be faced by CMA Company through its
   computer network and explain one of the security measures that can be applied to avoid
   the security threats.
                                                                                   [7 marks]
33 Answer questions based on the given situation.
     Prizes won by Ahmad in a contest is a computer. The computer does not have any
     software. Explain what to do by Ahmad to enable him to use the computer.

                                                                                   [7 marks]

                                  ~ End Of Questions ~

                                                     -9-

								
To top