Professional Documents
Culture Documents
Ict Exam ppt2
Ict Exam ppt2
ICT
3765/1
AUGUST
2013
1
hours
Prepared by:
..
(MAS LIARNA MANSOR)
ICT Teacher
SMK Oya
Checked by:
ANSWER SHEET
NAME :
TEACHER'S NAME:
CLASS :
SECTION A
1
2
3
4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
i
ii
5
6
i
ii
7
8
9
10
11
i
ii
i
ii
12
13
14
15
16
i
ii
17
18
19
20
21
22
i
ii
23
24
25
i
ii
i
27
ii
TOTAL
26
36
Section A
[36 marks]
Answer all questions. Write your answer in the space provided on the Answer Sheet. Each answer carries
one mark.
1. Choose the correct statement to define Information and Communication Technology (ICT).
Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).
A. Information and Communication Technology is composed of three main components of a computer,
Internet and networking.
Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer,
internet dan rangkaian.
B. Information and Communication Technology (ICT) is a technology used by people to improve their
lives.
Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk
meningkatkan kehidupan mereka.
C. Information and Communication Technology (ICT) is a technology that is needed to process the
information using electronic equipment and software applications to transfer, store, send and
receive data.
Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk
memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah,
menyimpan, menghantar dan menerima data.
D. Information and Communication Technology (ICT) is any communication facilities and computerbased applications.
Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi
berasaskan komputer.
2. Information may come in various forms such as ________.
Maklumat diperoleh dari pelbagai bentuk seperti ________
I Reading /Bacaan
III Study / Tinjauan
A.
C.
I and II
II, III and IV
II Investigation / Penyiasatan
IV Research / Kajian
B. II and III
D. All the above
A. Entertainment / Hiburan
i)
ii)
B. Medical / Perubatan
C. Engineering / Kejuruteraan
View the design from many aspects and improve on it before production
Memaparkan rekabentuk dari banyak aspek dan memperbaikinya sebelum dipasarkan
8. Which of the followings are TRUE about computer ethics?
Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?
B I, II and IV
D II, III and IV
10. Table 2 shows the activities of computer crime. / Jadual 2 menunjukkan aktiviti jenayah komputer
Table 1 / Jadual 1
Based on Table 1, write P, Q, R or S for the following statement:
Berdasarkan Jadual 1, tuliskan P, Q, R atau S bagi pernyataan berikut:
i.
ii.
Human aspects
Aspek kemanusiaan
X
Y
Firewall
Firewall
Cryptography
Kriptografi
Table 2 / Jadual 2
Based on Table 2, match the security measures with the following statements by writing X , Y or Z
Berdasarkan Jadual 2, padankan langkah keselamatan dengan pernyataan berikut dengan
menulis X , Y atau Z
(i)
(ii)
B
Store
C
A bit
Table 3/ jadual 3
D
Decode
E
Memory
Binary Digit
Digit Binari
1
0
Table 4 / Jadual 4
16. Based on Table 4, state whether the following statements are True or False.
Berdasarkan Jadual 4, nyatakan sama ada pernyataan berikut Benar atau Palsu.
(i)
All analog data used the binary system to process the information. This information includes
letters, digits or special characters.
Semua data analog menggunakan sistem binari untuk memproses maklumat. Maklumat ini
termasuk huruf, digit atau aksara tertentu.
False / True
ASCII is the most widely used binary code for microcomputers (personal computer).
ASCII ialah satu kod binari yang diguna secara meluas untuk komputer mikro (komputer
peribadi).
False / True
(ii)
17. Shamala is an ICT teacher. She is presenting a lesson using multimedia teaching aids. She needs
several output devices such as monitor, .. and ..
Shamala adalah seorang guru ICT. Dia menyampaikan pelajaran dengan menggunakan alat bantu
multimedia. Dia memerlukan beberapa peranti output seperti monitor, .. dan
..
18. Software that boots up a computer, provides a user interface, manages data and programs,
manages memory and configure devices. The statement refer to :
Perisian yang menghidupkan computer, menyadiakan antaramuka pengguna, menguruskan data
dan program, menguruskan ingatan dan peranti. Pernyataan di atas merujuk kepada :
A. Open source software
Perisian sumber terbuka
B. Operating system
Sistem pengoperasian
C. Application software
Perisian aplikasi
D. Utility program
Program Utiliti
19. Which of the following are network operating system? / Manakah yang berikut adalah sistem
pengoperasian rangkaian ?
I.
III.
Windows NT
LINUX
II.
IV.
Windows XP
UNIX
A.
C.
I, II and III
I, III and IV
B.
D.
I, II and IV
II, III and IV
Device X
Peranti X
Cable Z
Kabel Z
II.
III.
IV.
A.
B.
C.
D.
I and II
I, II, and III
I, II, and IV
II, III, and IV
21. State whether the following statement is True or False./ Nyatakan sama ada pernyataan berikut
Benar atau Palsu.
Proprietary software offers a stable system support if it fails or malfunction.
Perisian hak milik menawarkan satu sistem sokongan yang stabil jika ia gagal atau tidak berfungsi.
22. State whether the following statement is True or False. / Nyatakan sama ada pernyataan berikut
Benar atau Palsu.
i.
ii.
Unix is an example of cross platform operating system. Unix adalah contoh sistem operasi
rentas-pelantar
.(
Users do not need to memorise all the syntax to issue command in Graphical User Interface.
Pengguna tidak perlu mengingati semua sintaks untuk memberi arahan dalam antaramuka
pengguna bergrafik.
(
)
A.
B.
C.
D.
Figure 3 / Rajah 3
Based on Figure 3, state the type of computer network that connects
Account Department with Human Resource Department in Glokal Companys Head Office,
Alor Setar.
Jabatan Akaun dengan Jabatan Sumber Manusia di Ibu Pejabat Syarikat Glokal, Alor Setar
ii.
Glokal Companys Head Office in Alor Setar with Glokal Companys Branch Office in Sydney.
Ibu Pejabat Syarikat Glokal di Alor Setar dengan Pejabat Cawangan Syarikat Glokal di
Sydney.
Figure 4/ Rajah 4
Based on Figure 4, write P, Q or R to match the following :
Berdasarkan Rajah 4, tulis P, Q atau R untuk memadankan yang berikut:
(i)
All data transfers from one node to another passes through the central device.
Semua data dipindah dari satu nod ke nod yang lain melalui peranti pusat.
(ii)
Section B
[20 marks]
MEMORY
Fingerprint Recognition
Iris Scanning
Store
a. The above pictures show the examples of biometric device. List another TWO examples of
biometric devices that you have learnt.
ALU
Y
Gambar-gambar di atas menunjukkan contoh-contoh peranti biometrik. Senarai DUA contoh
peranti biometrik lain yang telah dipelajari.
[2 marks]
b. State the need of authentication.
Nyatakan keperluan pengesahan
[2 marks]
29. Figure 5 shows a machine cycle. / Rajah 5 menunjukkan satu kitaran mesin.
Decode
Execut
e
MEMORY
X
Figure 5 / Rajah 5
Based on Figure 5 / Berdasarkan Rajah 5,
(a)
Name :/ Namakan :
(i) X =
(b)
30.
(ii) Y =
[2 marks]
[2 marks]
Interface X
Figure 6
Rajah 6
Interface Y
(a)
[2 marks]
(b)
[2 marks]
Figure 12
Rajah
12
Identify the topology used and give a reason. / Kenalpasti topologi yang digunakan dan
beri alasan.
[2 marks]
(b)
State two differences between the topology above with the ring topology.
Nyatakan dua perbezaan antara topologi di atas dengan topologi cincin.
[2 marks]
Figure 8
Rajah 8
Based on Figure 8 above. Answer the following questions.
Jawab soalan berikut berdasarkan kepada rajah 8 di atas
a) Name Device M. / Namakan peranti M
[1 mark]
[1 mark]
c) To change this wired network to wireless network, name two possible device that need to be
installed
Untuk menukar rangkaian berwayar ke rangkaian tanpa wayar, namakan peranti yang perlu
dimasukkan ke dalam setiap computer.
i.
ii.
Section C
[14 marks]
This section consists of three questions. Answer two questions only:
Question 33 is compulsory and choose either Question 34 or Question 35.
33.
[1 mark]
[1 mark]
(b)
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
[2 mark]
Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
[4 mark]
Figure 9
(a) Identify Device X and explain it function.
Kenal pasti Peranti X dan terangkan fungsinya.
[2marks]
(b) Identify computers that fails to communicate with other computers. Explain briefly the reason of
the failure.
Kenal pasti komputer yang gagal berkomunikasi dengan komputer yang lain. Berikan alasan
kegagalan berkenaan
(c) Give one solution to overcome this problem.
Berikan satu cadangan untuk mengatasi masalah ini.
[4marks]
[1 mark]
7(a)
7(b)
7(c)
7(d)
Figure 7
(i)
Based on Figure 7(a), 7(b), 7(c) and 7(d), draw a block diagram of the
information processing cycle.
Berdasarkan Rajah 7 (a), 7 (b), 7 (c) dan 7 (d), lukis rajah blok kitaran
pemprosesan maklumat.
[2 marks]
(ii)
(iii)
(iv)
[2 marks]
All the devices in Figure 7 are coordinated by an Operating System.
Explain two functions of the mentioned system.
[2 marks]