You are on page 1of 14

SULIT 3765/1

Name : …………………………………………… Class : …………


…………..
CONFIDENTIAL
3765/1
ICT 1
2½ Hours

EXAMINATION
FORM 5

INFORMATION AND COMMUNICATION TECHNOLOGY


3765/1

2 ½ HOURS

READ THE INSTRUCTION CAREFULLY

1. Section A consists of 25 questions. Answer ALL questions in answer sheet A1.

2. Section B consists of 5 questions. Answer ALL the questions in the space provided.

3. Section C consists of 3 questions. Answer two questions. Question 1 is compulsory. You can choose to
answer Question 2 or Question 3. Answer in the space provided.

This paper consists of 12 printed pages.


CONFIDENTIAL

3765/1 1 SULIT
SULIT 3765/1

SECTION A (36 scores)

This section consists of 25 questions. Answer ALL questions.

Learning Area 1 (ICT and Society)

1. Based on Diagram 1, X is best described as

Diagram 1
A spam
B cookies
C spyware
D electronic profile

2. Bit is the smallest unit of data a computer can process. Byte is unit of information built from bits. One
byte is equal to _____________ bit.

3. Computer crimes include computer fraud, computer infringement, computer theft and computer attack.
State the name of crime activity for situation 1.

Raju received an e-mail inviting him to invest in a “Skim Cepat Kaya” investment. Raju took action
as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
100,000.00 in two weeks, but after two weeks, nothing happened.

Situation 1
Computer crime for this case is _______________________________

4. Match the invention according to the right computer generations by write P, Q, or R in spaces provided
in Answer Sheet 1A .

i Mobile Computing P First Generation


ii Vacuum Tube Q Third Generation
iii Integrated Circuit R Fifth Generation

i _______________
ii ______________
iii ______________

3765/1 2 SULIT
SULIT 3765/1

5. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A based on statement below.
Pornography can lead to criminal acts such as exploitation of women and children. _____

Learning Area 2 ( Computer System)

6. Windows XP, Macintosh OS X, and Linux Suse are examples of


A Application Software
B Web Browser
C Operating Systems
D Shareware program

7. To convert conventional images to digital images, _____________ are used.


A s
c 8. Speaker and headphones are classified as ______________ devices while
a joysticks and trackballs are classified as ______________ devices.
n
n
e 9. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement
r below.
s i Jamal wants to send a file to Wong using electronic mail services. He
B c must ensure that the file is free from virus before it is sent. Jamal
a uses application software to ensure the file is virus-free before it is
m sent. ______
e
r ii Wong downloads and save that file in secondary storage like flash
a drive. ______
s
C p
ri
10. Figure below shows the motherboard of a computer. Name J and K.
n
t
e
r J : _________
s
D a
u
d
i
o
d K: ________
e
v
i
11. Table 1 shows several terms in a computer system.
c
A Inpute Device
s
B Command-Line User Interface
C Word Processing Software
TABLE 1

Based on Table 1, write A, B, or C for the following question in the spaces provided in Answer Sheet 1A.
a. Shalini wants to create and manipulate documents containing text and graphics. What type of
program should Shalini use?

3765/1 3 SULIT
SULIT 3765/1

b. “Type commands or press special keys on the keyboard to enter data and instructions that instruct
the operating system what to do. It has to be typed one line at a time.” These statements refer to…….
Learning Area 3 (Computer Network & Communication)

12. A _____________ is a high-speed network that connects networks in an area such as a city or town
and handles the bulk of communications activity across that region.

A local area network (LAN)


B metropolitan area network (MAN)
C wide area network (WAN)
D variable area network (VAN)

13. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.

i All computers in peer-to-peer network have equal responsibilities and capabilities to use the
resources available on the network. _____

ii Extranet is a private network that uses internet technology to share information with authorized
parties. _____

14. Ali connects three computers in his office through hub and server. The type of network that he used is
called a ____________. Ali’s customer, David who lives in Singapore connects his computer to Ali’s
new networks. This type of network is called a __________________ .

15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces provided in
Answer Sheet 1A .
Item Statement

P Converts digital signals to analog signals and vice versa.


Commonly used to connect signal of a LAN contains multiple
Q
ports.
R Adapter card that enables computer or device to access network.
S Connects networks that use the same protocol.
Connects networks and transmits data to correct destination on
T
network.

TABLE 2

Match the correct items that represent the statement that best describe the hardwares given below.
i Modem : _________
ii Router : _________
iii Network Interface Card : _______

3765/1 4 SULIT
SULIT 3765/1

Learning Area 4 (Multimedia)

16. A movie that combines audio, graphics and animation is still considered as a __________ multimedia
content since the user is a passive receiver of the content.

A linear
B graphic
C animation
D non-linear

17.
I Implementation
II Evaluation
III Design and Develop
IV Testing
V Analysis
VI Publishing

The correct sequence in multimedia development is


A. III, II, IV, IV, I, V
B. I, II, III, IV, V, IV
C. V, III, I, IV, II, VI
D. II, IV, III, I, V, IV

18. Write ‘true’ or ‘false’ in the spaces provided in Answer Sheet 1A for statement below.
i Linear interactivity allows the user to interact with the content according to what the user wants.

19. Table 3 shows the multimedia development phase, based on the description given identify phases Y
and Z, write the answer in spaces provided in Answer Sheet 1A.
Phase Description

Y The multimedia developer will design a flow chart and storyboard.


The multimedia developer will use a checklist to test the multimedia
Z program. If there are errors, he will fix the program.

TABLE 3

Y:_______________________ Z: _______________________

3765/1 5 SULIT
SULIT 3765/1

Learning Area 5 (Programming)

20. Arrange the programming languages given below from the earliest generation to the latest.
A FORTRAN, Prolog, SQL
B FORTRAN, SQL, Prolog
C SQL, FORTRAN, Prolog
D Prolog, SQL, FORTRAN

21. There are two types of programming approaches, which are ____________________ programming.
I. object
II. design
III. structured
IV. object-oriented

A I and II
B I and III
C II and III
D III and IV

22. Which of the following describes sequence control structure?

I. Implement decision making process in the program.


II. Execute different statements for different conditions.
III. Execute the code line by line regardless of the condition.
IV. Executes statements one by one in linear or consecutive order.

A. I and II
B. I and III
C. II and IV
D. III and IV

23. The following are examples of programming languages. Choose the correct pair.

Generation Example of programming language


A First SQL Language
B Second Assembly Language
C Third Machine Language
D Fourth C Language

24. A ______________________ is a set of words, symbols and codes that enables human to
communicate with computers.

25. A(an) _______________ translates and executes each line of code one at a time in a programming.

3765/1 6 SULIT
SULIT 3765/1

SECTION B (20 scores)


This section consists of FIVE questions. Answer ALL questions.

Question 1

a. Malaysian Government has passed several cyber laws to control the Internet abuse. Four cyber law
acts in Malaysia are
Digital Signature Act 1997 (i) ___________________________________

(ii) ___________________________________ Communication and Multimedia Act 1997


[2 scores]

b. Lee, a bank officer, has hacked his client’s account to get information for his own use. He can be
convicted under _____________________ Act 1997. Computer crime for this case ________________
[2 scores]

Question 2

Table 1 shows the examples of computer software.


Table 1
Internet Explorer AVG AntiVirus Microsoft Excel Linux

a. Based on the table 1, choose one example for suitable task given.
Task 1: Coordinates all the activities among the computer hardware devices. _________________

Task 2: Protects a computer against viruses by identifying and removing any computer virus found
in a memory or storage media or in incoming files. _______________________
[2 scores]

b. State two differences between proprietary and open source software.


_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_________________________________________________________ [2
scores]

Question 3
1. Figure 2 shows topology of computer network.

hub

Topology A Topology B

3765/1 7 SULIT
SULIT 3765/1

School A School B
Students from School A can communicate and share data with students in school B because they are
connected to a Local Area Network (LAN).

a) Differentiate between Topology A and Topology B in terms of structure.


_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
[4 scores]

Question 4

a. Project Manager is one of important member in multimedia developments team. State the role of
project manager.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
[2 scores]

b. Multimedia development consists of six phases. Describe the analysis phase.


_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
[2 scores]

Question 5

a. Based on the diagram below, complete the program development phases. [2 scores]

Analysis

Design

W W :________________

X :________________
X

Documentation

b. State two importance of Documentation phase in program development process.


_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

3765/1 8 SULIT
SULIT 3765/1

_____________________________________________________________________________
[2 scores]

SECTION C (14 scores)

This section consists of THREE questions. Answer two questions. You MUST answer QUESTION 1 and
you can choose to answer question 2 OR 3.

Question 1
Based on the following situation, answer questions.

Situation:
Your school is going to have a new intake for the Form 1 students. As a
ICT student, you are given the responsibility by your principal to
produce a multimedia project which will include all the information
about your school for the parents and the new students. Your first slide
should have your school name, school badge, and school song as
background music. Your multimedia project must be both informative
and interactive with suitable linking button to allow user choose their

a. Based on the situation given, draw a storyboard for your first slide in the box below. [4 scores]

b. What type of interactivity in multimedia suitable for your multimedia project and differentiate between
the characteristic of linear and non linear multimedia. [3 scores]

_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

3765/1 9 SULIT
SULIT 3765/1

Question 2

Based on the case study and pseudo code below, answer the following questions.
Case Study
Your school needs a registration program to computerize the
registration of Curriculum Unit. Any student in the school should
have all his/her data like name, class and IC number keyed into
the Curriculum Unit registration program. After the program
verifies the student data and all fields are filled, they will notified

Pseudo Code

BEGIN
Key in students’ data
(verify data)
If all fields filled then
Print curriculum unit
Else
Print error message
End if
END

a. Identify the input, process and output of the program. [3 scores]


Input : ______________________________
Process : _____________________________
Output : ______________________________

b. Based on the Pseudo code given, draw a suitable flow chart to show the flow of program.
[4 scores]

3765/1 10 SULIT
SULIT 3765/1

Question 3

1. Figure 1 shows CMA Company computer network.

Network B
Network A
Server

Modem

Intern
et
Figure 1

a) Name the topology of Network A. Give two advantages for topology in Network A.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
________________________________________________________
[3 scores]

b) State two computer security threats that will be faced by CMA Company through its
computer network and explain one of the security measures that can be applied to avoid
the security threats.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
______________________________________________________
[4 scores]

END OF QUESTION PAPER

3765/1 11 SULIT
SULIT 3765/1
Name : ………………………………… Class : …………
…………..
ANSWER SHEET A1

NO. ANSWER SCORE


1
2
3
4 (i)
(ii)
(iii)
5
6
7
8 (i)
(ii)
9 (i)
(ii)
10 (i)
(ii)
11 (i)
(ii)
12
13 (i)
(ii)
14 (i)
(ii)
15 (i)
(ii)
(iii)
16
17
18
19 (i)
(ii)
20
21
22
23
24
25

3765/1 12 SULIT
SULIT 3765/1

SCHEME

SECTION A
NO. ANSWER SCORE
1 C
2 8
3 COMPUTER FRAUD
4 (i) R
(ii) P
(iii) Q
5 TRUE
6 C
7 A
8 (i) OUTPUT
(ii) INPUT
9 (i) FALSE
(ii) TRUE
10 (i) EXPANSION SLOT
(ii) PROCESSOR SLOT
11 (i) C
(ii) B
12 B
13 (i) TRUE
(ii) TRUE
14 (i) LAN / LOCAL AREA NETWORK
(ii) WAN / WIDE AREA NETWORK
15 (i) P
(ii) S
(iii) R
16 A
17 C
18 FALSE
19 (i) DESIGN AND DEVELOP
(ii) TESTING
20 B
21 D
22 D
23 B
24 PROGRAMMING LANGUAGE
25 COMPILER

3765/1 13 SULIT
SULIT 3765/1

SECTION B

1. a. (i) computer crimes act 1997 (ii) Telemedicine Act 1997


b. (i) computer crimes act 1997 (ii) computer theft

2. a. Task 1 : Linux task 2 : AVG Anti virus


b. Differences between proprietary and open source
Proprietary Open source
1.
2.

3. Bla…bla…bla…bla

4. a. Role of project manager :


b. Analysis phase : ……………………bla…bla…bla

5. a. W : coding X : testing and debugging


b. importance of documentation phase:
1…..
2…..

SECTION C

Question 1
a. )

Question 2

a)

Question 3

a.)

3765/1 14 SULIT