You are on page 1of 11
CONFIDENTIAL CSIMAR 2016/CSC133/134 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE : COMPUTER AND INFORMATION PROCESSING COURSE CODE : CSC133/134 EXAMINATION : MARCH 2016 TIME : 2HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (40 Questions) PART B (6 Questions) PART C (2 Questions) 2 ‘Answer ALL questions from all three (3) parts i) Answer PART A in the Objective Answer Sheet. ii) Answer PART B and PART C in the Answer Booklet. Start each answer on a new Page. 3. Do not bring any material into the examination room unless permission is given by the invigilator. 4 Please check to make sure that this examination pack consists of i) the Question Paper il) an Answer Booklet - provided by the Faculty iii) an Objective Answer Sheet - provided by the Faculty 5. ‘Answer ALL question in English DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 11 printed pages (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 2 CSIMAR 2016/CSC133/134 PART A (40 MARKS) 1. ALAn is a special-purpose computer that functions as a component in a larger product, for example for automobiles, home automation devices and robotics. ‘A. Supercomputer B. Green Computing C. Embedded Computer D. Mainframe 2. — Two categories of computer software include and ‘A. System Software and Utility Program B. Operating System and System Software C. Utility Program and Operating System D. System Software and Application Software 3. Identify which device would you buy if you wanted the following features: personal information management, send and receive e-mail messages, send and receive text messages, portable media player, and camera. Netbook Computer E-book Reader Smart Phone Server pop> 4, Identify the component of the system unit that converts the wall outlet AC power into the DC power a computer needs. Power supply Power surge Energy spotter Electricity changer pom> 5. When your friend opened the case containing the electronic components of his computer, he saw the main circuit board for the computer. This circuit board is called as . ‘Command board Control board Motherboard Electronic circuit primary board pom> (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL, 3 CSIMAR 2016/CSC133/134 10. "1. is device that plugs into a USB port on the system unit and contains multiple USB ports in which you can plug cables from USB devices. A. USB Connector B. USB Hub C. USB Bus D. USB Replicator Select a type of item that found at the end of a cable to connect the cable to the system unit. Port Connector HDMI Serial enabler gom> Choose which of the following devices is NOT refer to input devices. Stylus Keyboard RFID Wireless mouse gom> The following is refer to biometric devices EXCEPT Iris recognition Voice recognition Signature verification Magnetic-ink character recognition pom> Game controller such as joystick and gamepads for video games is categorize as Storage Expansion cards Input device Display device pom> The technology which use liquid compound to present information on monitor is Liquid crystal display Laser beam Liquid ink Cathode ray tube pom> (© Hak Cipta Universiti Teknolog! MARA, CONFIDENTIAL, CONFIDENTIAL, 4 CSIMAR 2016/CSC133/134 12. Architects, mapmakers, designers, artists, and home users create drawings and sketches by using a pressure-sensitive pen on A. Keypad B. Monitor C. Graphic tablet D. Scanner 13. Hand-drawn marks such as small circles normally found in test answer sheet or questionnaire answer sheet are types of input data which can be read by a device Optical character recognition Optical mark recognition Bar code Radio frequency identification gom> 14 is a type of system software that allows a user to perform jaintenance-type tasks. system software operating system utility programs server pom> a> 15. Select which process that saves any open documents and programs to a hard disk before removing power from the computer. A. Cold boot B. Hibernate C. Warm boot D. Sleep mode 16. Windows Phone 7, Palm OS, iPhone OS are among the examples of PC Operating System Stand Alone Operating System Embedded Operating System Server Operating System pomp 17. According to manufacturing of media, has the longest guaranteed life expectancy. ‘A. Magnetic Disk B. Solid State Drive C. Microfilm D. Optical Dises (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL CONFIDENTIAL, 5 CSIMAR 2016/CSC133/134 18. 19. 20. 21. Choose the FALSE statement which describe about Optical Discs. Written and read by a laser. Consists of a flat, round, magnetically coated ribbon of plastic, and lacquer. Typically store software, data, digital photos, movies, and music. Read only and rewritable. pom> Access time is measured by | the amount of time it takes a storage device to locate an item on a storage medium. Il the number of bytes a storage medium can hold. Il the time required to deliver an item from memory to the processor. IV the amount of data to be readiwrites on the surface in a second, A Ll B. Ill c. Hill D. ILIV Application software also known as A. systems software B. program C. browser D. utility is an application software that is copyrighted and distributed without cost for a trial period. Shareware Freeware Limited trial Open source pom> allows users to organize data in row, column and perform calculations. Document management software Application software Spreadsheet software Reference software gom> (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL 6 CSIMAR 2016/CSC133/134 23, 24, 25. 26. 27. is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet. A. Portal B. Explorer C. Web Application D. Window Identify the CORRECT format from the following e-mail address. A. www.domain.com user.domain.com user@domain.com http: //domain.com/user poe is an Internet standard protocol for transferring files. HTTP FTP Telnet SSH pom> The “http” protocol for website refer to HTML Transfer Technology Process Hyperspace Terms and Technology Protocol Hyper Text Transfer Protocol Hyperspace Techniques and Technology Progress pom> The categories of Internet access providers are as follows EXCEPT A. ISP B. wisp c. OSP D. ASP © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 7 CS/MAR 2016/CSC133/134 28. 29. 30. 31. 32, 33, Choose the CORRECT communication technology for telephone network. Ethernet Powerline Cable Network Integrated Services Digital Network (ISDN) Phone line Network gom> is an internal network which uses Internet technologies accessible to ‘employee and facilities working in groups. Office on The Go Group works Extranet Intranet pom> A consists of a single central cable, to which all computers and other devices connect. bus network cellular radio wireless access point radio frequency identification (RFID) gomp> Choose the INCORRECT telephone network for digital dial-up lines. Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Asynchronous Transfer Mode (ATM) Broadcast radio pop> Microwave stations often located on the top of buildings, towers or mountains because ‘A. to reduce installation cost B. to avoid possible obstructions C. to strengthen signal strength D. to enable integration with cellular radio network Cable television (CATV) network wiring often uses cable because it can be cabled over longer distances than twisted-pair cable. A. Ethemet B. fiber-optic ©. phone line D. coaxial (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 8 CSIMAR 2016/CSC133/134 35, 37. 38. Network topology refers to ‘A. the layout of the computers and devices in a communications network B. a collection of computers and devices connected together via communications devices and transmission media C. a process in which two or more computers or devices transfer data, instructions, and information D. digital signals to analog signals and analog signals to digital signals conversion The following in below are the types of security risks EXCEPT Hardware theft ‘System failure Software copyright Information theft pomp is a malicious program that hides within or looks like a legitimate program. Virus ‘Worm Trojan Horse Denial-of-service attack An irrelevant or inappropriate messages sent on the Internet to a large number of recipients at once is called spyware adware cookies spam gom> Identify which of the following defines a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network. A. Worm B. Virus C. Trojan horse D. Rootkit (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL, CONFIDENTIAL, 9 CSIMAR 2016/CSC133/134 39. is a technique intruders use to make the network or Internet transmission appear legitimate to gain access Botnet Denial-of-service attack Back door Spoofing pom> 40. Identify the following devices use to protect our computer against sudden increase in electrical power. Anti-spike Electrical manipulator ‘Surge protector Voltage regulator pom> (© Hak Cipta Universiti Teknolog! MARA, CONFIDENTIAL, CONFIDENTIAL, 10 CSIMAR 2016/CSC133/134 PART B (30 MARKS) QUESTION 1 @) Define about green computing. (1 mark) b) Describe any TWO (2) Components of a Computer. (4 marks QUESTION 2 a) Identify any TWO (2) example of adapter cards and its purposes. (2marks) b) The system unit has contains two types of memory. State the differences between the two types. (3 marks) QUESTION 3 a) List any THREE (3) types of Flash Memory. (3 marks) b) Define term of head crash” in hard disk drive. (2 marks) QUESTION 4 Give any FIVE (5) examples of Utility Programs. (5 marks) QUESTION 5 a) State any THREE (3) application software that is use for business. (3 marks) b) Describe a search engine which has been widely used in Internet. - (2 marks) QUESTION 6 8) Give THREE (3) advantages of fibers-optic cable compared to twisted-pair and coaxial cables. (3 marks) b) Describe Local Area Network (LAN). (2 marks) (© Hak Cipta Universiti Teknologl MARA, CONFIDENTIAL, CONFIDENTIAL, " CSIMAR 2016/CSC133/134 PART C (30 MARKS) QUESTION 1 ‘An output device is any type of hardware component that conveys information to one or more peoples. Commonly used output devices include display devices (monitor), printers, speakers and many others. a) Give TWO (2) types of display devices (monitor) with TWO (2) characteristics for each of them: (7 marks) b) Briefly describe any FOUR (4) characteristic of non-impact printers. (8 marks) QUESTION 2 A data breach is commonly defined as the unlawful and unauthorized acquisition of personal information that compromises the security, confidentiality, or integrity of personal information. Protecting user data against the growing number of threats in IT Security. Discuss in details FIVE (5) safeguard or precautions that can be used to protect user data or information on the Internet. (15 marks) END OF QUESTION PAPER © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

You might also like