You are on page 1of 16

CONFIDENTIAL

ICT
3765/1
AUGUST
2013
1

hours

INFORMATION AND COMMUNICATION TECHNOLOGY


FORM 4
Second Mid Term Examination
2 HOUR AND 30 MINUTES

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO


Instructions:
1. This question paper consists of three sections :
Section A: 36 marks, answer ALL questions
Section B: 20 marks, answer ALL questions
Section C: 14 marks, answer TWO (2) questions. (Question 31 is compulsory)
2. Answer all questions in section A on the answer sheets been provided while section B and C on your
own paper.
3. You only need to send in the answer sheet and your answer for Section B and Section C.

Prepared by:

..
(MAS LIARNA MANSOR)
ICT Teacher
SMK Oya

Checked by:

(BENEDICT YEO HUI PING)


Head of Technique and Vocational Department
SMK Oya

ANSWER SHEET
NAME :
TEACHER'S NAME:
CLASS :
SECTION A
1
2
3
4

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

i
ii

5
6

i
ii

7
8
9
10
11

i
ii
i
ii

12
13
14
15
16

i
ii

17
18
19
20
21
22

i
ii

23
24
25
i
ii
i
27
ii
TOTAL
26

36

Section A
[36 marks]
Answer all questions. Write your answer in the space provided on the Answer Sheet. Each answer carries
one mark.
1. Choose the correct statement to define Information and Communication Technology (ICT).
Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).
A. Information and Communication Technology is composed of three main components of a computer,
Internet and networking.
Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer,
internet dan rangkaian.
B. Information and Communication Technology (ICT) is a technology used by people to improve their
lives.
Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk
meningkatkan kehidupan mereka.
C. Information and Communication Technology (ICT) is a technology that is needed to process the
information using electronic equipment and software applications to transfer, store, send and
receive data.
Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk
memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah,
menyimpan, menghantar dan menerima data.
D. Information and Communication Technology (ICT) is any communication facilities and computerbased applications.
Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi
berasaskan komputer.
2. Information may come in various forms such as ________.
Maklumat diperoleh dari pelbagai bentuk seperti ________
I Reading /Bacaan
III Study / Tinjauan
A.
C.

I and II
II, III and IV

II Investigation / Penyiasatan
IV Research / Kajian
B. II and III
D. All the above

3. Write True of False for the following statements


Tulis Benar atau Palsu berdasarkan pernyataan di bawah.
The speed in performing certain task is the most outstanding differences between computerized
and non computerized system
Kelajuan dalam melaksanakan tugas-tugas tertentu adalah perbezaan yang paling menonjol antara
sistem komputerisasi dan bukan komputerisasi.
4. Complete the following statement: / Lengkapkan pernyataan berikut:
Computers in . Generation use transistor to transfer electronic signals across
resister.
Komputer Generasi . menggunakan transistor untuk menghantar isyarat elektronik
melalui perintang.
5. Figure 1shows the computer security threat / Rajah 1 menunjukkan ancaman keselamatan komputer.

Based on Figure 1, / Berdasarkan Rajah 1,


(i) State the type of computer threat. / Nyatakan jenis ancaman komputer.
(ii) Identify the type of security measure that can be done to prevent the threat in (i).
Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i)
6. Information refers to / Maklumat merujuk
A. an act of transmitting messages
suatu tindakan menghantar mesej
B. the knowledge obtained from reading, investigation, study or research.
pengetahuan yang diperolehi dari membaca, kajian penyiasatan, atau penyelidikan
C. the use of scientific knowledge, experience and resources to create processes and products that
fulfill human needs
penggunaan sains, pengalaman, pengetahuan dan sumber daya untuk mencipta proses dan
produk yang memenuhi keperluan manusia
D. the technology required for information processing, in particular, the use of electronic computers,
communication devices and software applications to convert, store, protect, process, transmit and
retrieve information from anywhere, anytime
teknologi yang diperlukan untuk memproses maklumat, khususnya, penggunaan komputer
elektronik,peranti komunikasi dan aplikasi perisian untuk menukar, menyimpan, melindungi,
proses, menghantar dan mengambil maklumat dari mana saja, bila-bila masa sahaja
7. Match the various fields in Multimedia with the statements below.
Padankan pelbagai bidang Multimedia dengan kenyataan di bawah

A. Entertainment / Hiburan
i)

ii)

B. Medical / Perubatan

C. Engineering / Kejuruteraan

Produce computer games and develop animations and special effects.


Penghasilan permainan komputer dan pembangunan animasi dan kesan khas.

View the design from many aspects and improve on it before production
Memaparkan rekabentuk dari banyak aspek dan memperbaikinya sebelum dipasarkan
8. Which of the followings are TRUE about computer ethics?
Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?

I As a guideline to computer users. / Sebagai garis panduan kepada pengguna komputer.


II No punishment for anyone who violates ethics.
Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.
III Depends on country and state where the crime is committed.
Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.
IV Computer users are free to follow or ignore the code of ethics.
Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.
A I, II and III
C I, III and IV

B I, II and IV
D II, III and IV

9. Which of the following statements shows a good code of ethics in schools?


Manakah dari pernyataan berikut menunjukkan kod etika yang baik di sekolah?
P

Computer Attack / Serangan Komputer

Computer Theft / Kecurian Komputer

Copyright Infringement / Pencabulan


Hakcipta

Computer Fraud / Penipuan Komputer

A. Sending an email during school time to


friends.
Menghantar e-melkepada rakan semasa
waktu sekolah
B. Using the school equipment for students
personal use.
Menggunakan peralatan sekolah untuk

kegunaan peribadi pelajar.


C. Using own hand phone to call a friend during lunch break.
Menggunakan telefon bimbit sendiri untuk menghubungi rakan semasa waktu makan tengahari.
D. Doing an English assignment in the computer lab during Science period.
Melakukan tugas Bahasa Inggeris di makmal komputer semasa waktu pelajaran sains

10. Table 2 shows the activities of computer crime. / Jadual 2 menunjukkan aktiviti jenayah komputer

Table 1 / Jadual 1
Based on Table 1, write P, Q, R or S for the following statement:
Berdasarkan Jadual 1, tuliskan P, Q, R atau S bagi pernyataan berikut:
i.

ii.

Nazre transfer his company profit to his own account.


Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya

Kamal downloaded an assignment from the internet and claimed it is his.


Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanya

Human aspects
Aspek kemanusiaan

X
Y

Firewall
Firewall

Cryptography
Kriptografi

11. Table 2 shows security measures to overcome computer


threats
Jadual 2 menunjukkan langkah keselamatan untuk
mengatasi ancaman komputer

Table 2 / Jadual 2
Based on Table 2, match the security measures with the following statements by writing X , Y or Z
Berdasarkan Jadual 2, padankan langkah keselamatan dengan pernyataan berikut dengan
menulis X , Y atau Z
(i)

(ii)

To function in a network environment to prohibit unauthorized access to your computer via


the Internet.
Berfungsi dalam rangkaian bagi menghalang capaian kepada komputer melalui Internet
secara tidak sah.
As a security measure, make sure a computer room is always locked.
Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunci

12. State whether the following statement is True or False.


Nyatakan sama ada pernyataan berikut Benar atau Palsu.
Anti-spyware is a software that we use to protect the computers from spyware.
Anti-spyware ialah perisian yang kita gunakan untuk melindungi komputer daripada spyware.
13. State whether the following statements is True or False
Nyatakan sama ada pernyataan berikut Benar atau Palsu.
A storage medium is the physical material in the computer that keeps data, instruction and
information.
Medium storan adalah material fizikal dalam komputer yang menyimpan data, arahan dan
maklumat.
Question 14 to 15 based on Table 3. Match the correct answer. / Padankan jawapan yang betul
A
A byte

B
Store

C
A bit
Table 3/ jadual 3

14. Consists of eight bits and represents a character. .................


15. The smallest unit of data stored in the computer. .................

D
Decode

E
Memory

Binary Digit
Digit Binari
1
0
Table 4 / Jadual 4
16. Based on Table 4, state whether the following statements are True or False.
Berdasarkan Jadual 4, nyatakan sama ada pernyataan berikut Benar atau Palsu.
(i)

All analog data used the binary system to process the information. This information includes
letters, digits or special characters.
Semua data analog menggunakan sistem binari untuk memproses maklumat. Maklumat ini
termasuk huruf, digit atau aksara tertentu.
False / True
ASCII is the most widely used binary code for microcomputers (personal computer).
ASCII ialah satu kod binari yang diguna secara meluas untuk komputer mikro (komputer
peribadi).
False / True

(ii)

17. Shamala is an ICT teacher. She is presenting a lesson using multimedia teaching aids. She needs
several output devices such as monitor, .. and ..
Shamala adalah seorang guru ICT. Dia menyampaikan pelajaran dengan menggunakan alat bantu
multimedia. Dia memerlukan beberapa peranti output seperti monitor, .. dan
..
18. Software that boots up a computer, provides a user interface, manages data and programs,
manages memory and configure devices. The statement refer to :
Perisian yang menghidupkan computer, menyadiakan antaramuka pengguna, menguruskan data
dan program, menguruskan ingatan dan peranti. Pernyataan di atas merujuk kepada :
A. Open source software
Perisian sumber terbuka

B. Operating system
Sistem pengoperasian

C. Application software
Perisian aplikasi

D. Utility program
Program Utiliti

19. Which of the following are network operating system? / Manakah yang berikut adalah sistem
pengoperasian rangkaian ?
I.
III.

Windows NT
LINUX

II.
IV.

Windows XP
UNIX

A.
C.

I, II and III
I, III and IV

B.
D.

I, II and IV
II, III and IV

20. Figure 2 shows the device and cables used in networking.


Rajah 2 menunjukkan peranti dan kabel yang digunakan dalam rangkaian komputer.
Cable Y
Kabel Y

Device X
Peranti X

Cable Z
Kabel Z

Which of the following statements are TRUE?


Manakah di antara yang berikut adalah pernyataan yang BENAR?
I.

Device X is inserted into the PCI slot of computer.


Peranti X dimasukkan ke dalam slot PCI komputer
Cable Z is twisted pair cable.
Kabel Z ialah kabel pasangan terpiuh
Cable Z is fiber optics cable.
Kabel Z ialah kabel gentian optik
Both cables use electrical pulse to transmit data.
Kedua-dua kabel menggunakan denyutan elektrikal untuk menghantar data

II.
III.
IV.

A.
B.
C.
D.

I and II
I, II, and III
I, II, and IV
II, III, and IV

21. State whether the following statement is True or False./ Nyatakan sama ada pernyataan berikut
Benar atau Palsu.
Proprietary software offers a stable system support if it fails or malfunction.
Perisian hak milik menawarkan satu sistem sokongan yang stabil jika ia gagal atau tidak berfungsi.
22. State whether the following statement is True or False. / Nyatakan sama ada pernyataan berikut
Benar atau Palsu.
i.
ii.

Unix is an example of cross platform operating system. Unix adalah contoh sistem operasi
rentas-pelantar
.(

Users do not need to memorise all the syntax to issue command in Graphical User Interface.
Pengguna tidak perlu mengingati semua sintaks untuk memberi arahan dalam antaramuka
pengguna bergrafik.
(
)

23. This software is designed to combine animation, sound and video.


Perisian ini direkabentuk untuk menggabungkan animasi, bunyi dan video.

A.
B.
C.
D.

Spreadsheet / Hamparan elektronik


Presentation / Persembahan
Word Processing / Pemproses perkataan
Graphics Editor / Penyunting grafik

24. Write True or False for the following statements :


Tuliskan Benar atau Palsu pada pernyataan berikut:
A network links two or more computers together to enable data and resource exchange.
Sebuah rangkaian menghubungkan dua atau lebih komputer untuk membolehkan pertukaran data
dan sumber.
25. Table 5 shows a statement about a type of computer network.
Jadual 5 menunjukkan pernyataan tentang sejenis rangkaian komputer.
X is a type of computer network that links computer networks at different sites within a city.
X ialah sejenis rangkaian komputer yang menghubungkan beberapa rangkaian
komputer di lokasi yang berbeza dalam sebuah bandar.
Table 5 / Jadual 5
Based on Table 5, X refers to / Berdasarkan Jadual 5, X merujuk kepada
A.
B.
C.
D.

Wide Area Network (WAN) / Rangkaian Kawasan Luas (WAN)


Local Area Network (LAN) / Rangkaian Kawasan Setempat (LAN)
Metropolitan Area Network (MAN) / Rangkaian Kawasan Metropolitan (MAN)
Personal Area Network (PAN) / Rangkaian Kawasan Peribadi (PAN)
26. Figure 3 shows the computer network used by ABC Company.
Rajah 3 menunjukkan rangkaian computer yang digunakan oleh Syarikat ABC.

Figure 3 / Rajah 3
Based on Figure 3, state the type of computer network that connects

Berdasarkan Rajah 3, nyatakan jenis rangkaian komputer yang menghubungkan


i.

Account Department with Human Resource Department in Glokal Companys Head Office,
Alor Setar.
Jabatan Akaun dengan Jabatan Sumber Manusia di Ibu Pejabat Syarikat Glokal, Alor Setar

ii.

Glokal Companys Head Office in Alor Setar with Glokal Companys Branch Office in Sydney.
Ibu Pejabat Syarikat Glokal di Alor Setar dengan Pejabat Cawangan Syarikat Glokal di
Sydney.

27. Figure 4 shows three types of network topologies.


Rajah 4 menunjukkan tiga jenis topologi rangkaian.

Figure 4/ Rajah 4
Based on Figure 4, write P, Q or R to match the following :
Berdasarkan Rajah 4, tulis P, Q atau R untuk memadankan yang berikut:
(i)

All data transfers from one node to another passes through the central device.
Semua data dipindah dari satu nod ke nod yang lain melalui peranti pusat.

(ii)

Each node directly connects to two neighbouring nodes.


Setiap nod disambung terus kepada ke dua dua nod bersebelahan dengannya

Section B
[20 marks]

This section consists of five questions. Answer all questions


28.

MEMORY

Fingerprint Recognition

Iris Scanning

Store

a. The above pictures show the examples of biometric device. List another TWO examples of
biometric devices that you have learnt.
ALU
Y
Gambar-gambar di atas menunjukkan contoh-contoh peranti biometrik. Senarai DUA contoh
peranti biometrik lain yang telah dipelajari.
[2 marks]
b. State the need of authentication.
Nyatakan keperluan pengesahan

[2 marks]

29. Figure 5 shows a machine cycle. / Rajah 5 menunjukkan satu kitaran mesin.

Decode

Execut
e
MEMORY

X
Figure 5 / Rajah 5
Based on Figure 5 / Berdasarkan Rajah 5,
(a)

Name :/ Namakan :
(i) X =

(b)
30.

(ii) Y =

State two functions of X / Nyatakan dua fungsi X.

Figure 6 shows two types of user interface of an operating system (OS).


Rajah 6 menunjukkan dua jenis antaramuka pengguna sistem pengoperasian (OS)

[2 marks]
[2 marks]

Interface X

Figure 6
Rajah 6

Interface Y

(a)

Name interface X and interface Y shown in Figure 6.


Namakan antaramuka X dan antaramuka Y dalam Rajah 6 diatas

[2 marks]

(b)

Give one difference between interfaces X and Y.


Berikan satu perbezaan antaramuka X dan Y

[2 marks]

31. Figure 7 shows a sketch of a Computer Laboratory.


Rajah 7 menunjukkan lakaran sebuah makmal komputer.

Figure 12
Rajah

12

Based on Figure 7 / Berdasarkan Rajah 7,


(a)

Identify the topology used and give a reason. / Kenalpasti topologi yang digunakan dan
beri alasan.
[2 marks]

(b)

State two differences between the topology above with the ring topology.
Nyatakan dua perbezaan antara topologi di atas dengan topologi cincin.

32. Figure 8 shows the link between computers through device M.


Rajah 8 menunjukkan perhubungan diantara peranti M dengan komputer

[2 marks]

Figure 8
Rajah 8
Based on Figure 8 above. Answer the following questions.
Jawab soalan berikut berdasarkan kepada rajah 8 di atas
a) Name Device M. / Namakan peranti M

[1 mark]

b) State the function of M. / Nyatakan fungsi peranti M

[1 mark]

c) To change this wired network to wireless network, name two possible device that need to be
installed
Untuk menukar rangkaian berwayar ke rangkaian tanpa wayar, namakan peranti yang perlu
dimasukkan ke dalam setiap computer.
i.
ii.

Personal computer / Komputer peribadi


Laptop / Komputer riba

Section C
[14 marks]
This section consists of three questions. Answer two questions only:
Question 33 is compulsory and choose either Question 34 or Question 35.
33.

Figure below shows symptoms of a computer problem.

[1 mark]
[1 mark]

Screen displays unusual messages


Files become corrupted
Files mysteriously appear

Based on Figure above: / Berdasarkan Rajah diatas:


(a)
i)
Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
[1 mark]
ii)

(b)

State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
[2 mark]

Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
[4 mark]

34. Figure 9 shows a network configuration in Makmal SMK Oya.

Figure 9
(a) Identify Device X and explain it function.
Kenal pasti Peranti X dan terangkan fungsinya.
[2marks]
(b) Identify computers that fails to communicate with other computers. Explain briefly the reason of
the failure.
Kenal pasti komputer yang gagal berkomunikasi dengan komputer yang lain. Berikan alasan
kegagalan berkenaan
(c) Give one solution to overcome this problem.
Berikan satu cadangan untuk mengatasi masalah ini.

35. Figure 7 shows the components and devices of a computer system.

[4marks]
[1 mark]

7(a)

7(b)

7(c)

7(d)

Figure 7

(i)

Based on Figure 7(a), 7(b), 7(c) and 7(d), draw a block diagram of the
information processing cycle.
Berdasarkan Rajah 7 (a), 7 (b), 7 (c) dan 7 (d), lukis rajah blok kitaran
pemprosesan maklumat.
[2 marks]

(ii)

Give another example of a device other than shown in Figure 7(a).


Berikan satu contoh peranti lain, selain yang ditunjukkan dalam Rajah
7 (a).
[1 marks]
State two functions of the component in Figure 7(c).
Nyatakan dua fungsi komponen dalam Rajah 7 (c).

(iii)

(iv)

[2 marks]
All the devices in Figure 7 are coordinated by an Operating System.
Explain two functions of the mentioned system.

Semua peranti dalam Rajah 7 diselaraskan oleh Sistem Operasi. Terangkan


dua fungsi sistem
tersebut.

[2 marks]

END OF QUESTION PAPER


SOALAN TAMAT

You might also like