You are on page 1of 12
CONFIDENTIAL =| CSIOCT 2016/68C133/134 a) Ss UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE COMPUTER AND INFORMATION PROCESSING COURSE CODE CSC133/134 EXAMINATION OCTOBER 2016 TIME 2 HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (40 Questions) PART B (7 Questions) PART C (2 Questions) 2 ‘Answer ALL questions from all three (3) parts i) Answer PART A in the Objective Answer Sheet. ji) Answer PART B and PART C in the Answer Booklet. Start each answer on a new page. 3 Do not bring any material into the examination room unless permission is given by the invigitator. 4, Please check to make sure that this examination pack consists of : i) the Question Paper ii) an Answer Booklet ~ provided by the Faculty iil) an Objective Answer Sheet — provided by the Faculty 5 ‘Answer ALL questions in English. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 12 printed pages (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 2 CSIOCT 2016/68C133/134 PART A (40 MARKS) 1. Which of the following conveys meaning and is useful to users? Data Information Input Output gom> Which of the following style of tablet does not contain a physical keyboard? A. Power B. Virtual C. Convertible D. Slate 3. The technology that allows mobile phone to take and store photos, play and view digital camera is called , A. digital bridge B. digital assimilation C. digital device convergence D. digital device interconnection 4. When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by the app store. On what type of device is the credit card number kept by the app store? Communication Storage Memory Input gom> 5. _ Which of the followings manages the resources on a network? A. Client B. Server C. Bluetooth D. Modem (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 3 CSIOCT 2016/CSC133/134 10. 1. includes basic calculations such as addition, subtraction, multiplication, and division. A. Arithmetic operations B. Machine cycles C. Comparison operation D. Transistor Identify the correct steps in a machine cycle. gop Fetch + Decode — Execute — Store Fetch + Execute —+ Decode — Store Execute — Fetch —» Decode — Store Execute — Decode — Fetch — Store Which type of cache built directly on a processor chip? pom> L1 cache L2 cache L3 cache L4 cache Which of the following user interface is NOT using mouse as it input devices when entering data or instruction to the computer? pomp Command-ine interface Graphical user interface Menus-driven interface Text-based user interface What is the most common type of system software? pom> Operating system Application system ‘Communication system Word-processing software Which of the following utility program that can make an operating system access data faster? A. Disk cleanup B. Disk defragmenter C. Restore utility D. Backup utility (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 4 CSIOCT 2016/C8C133/134 12, 13. 14. 15. 16. 47. ‘What kind of interface is use in moder operating system such as windows and OS X? pom> Text-based Menu-driven Graphical user Command driven What is the name of software that allows users to create and manipulate text and graphics? A. Word processing software B. Spreadsheet software C. Database software D. Presentations graphics software Which is NOT an advantage of using a software suite? com> ‘The cost is cheaper than buying programs individually The programs provide for better integration ‘The programs integrate easily with programs from other software suites The programs share common features such as toolbars Which of the following is the disadvantage of Web-based training? pom> Reduced technical support Collaborative and exploratory learning environment Student assessment and feedback is limited Access is controllable Siti works as a secretary in a public listed company. She needs software that can assist her in managing her e-mail, time, contact lists and her daily task. Based on this information, what software can you suggest to Siti? A B. c. D. Personal Information Software Note-taking Software Project Management Software Document Management Software A program that extends the capability of a Web browser known as, pop> plug-in readers Pop-up ActiveX Control (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 5 CSIOCT 2016/C8C133/134 18. 19. 20. 21. In http:/www.google.com, which of the following is the top-level domain? http www google com gom> 197.169.7363 is an example of a (n) A. domain name B. IP Address C. DNS server D. web browser E-commerce that involves businesses buying and selling goods and services to other businesses is called A B2D B. B2C Cc. B2B D. c2c Multimedia refers to any application that combines text with each of the following EXCEPT . streaming video document graphics MP3 music files pom> Which of the following is NOT a browser? A. Safari B. Firefox C. Windows Explorer D. Google Chrome (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL CONFIDENTIAL 6 CSIOCT 2016/CSC133/134 23, 24, 25. 26. “Khairul uses an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network. The victim computer network slows down considerably and eventually becomes unresponsive or unavailable.” What types of internet and network attacks that jeopardize the computer security related to the statement given? A. Malware B. Botnets C. DoS Attacks D. Spoofing “A program that hides in a computer and allow someone from a remote location to take full control of the computer or device” Which of the followings is an appropriate type of common malware according to the statement given? A. Virus B. Worm C. Trojan horse D. Rootkit A is a combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources. A. passphrase B. private key C. passcode D. encryption algorithm A (n) is hardware and/or software that protect a network's resources from intrusion. A. firewall B. antivirus Cc. malware D. adware (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL 7 CSIOCT 2016/68C133/134 27. Unlike other viruses, are viruses that can run independently of host file, execution and are much more active in spreading themselves. boot-sector viruses time bombs trojan horses worms pomp 28. Computers use the language consisting of Os and 1s. A. symbol B. binary Cc. byte D. system 29. The most common way to connect devices to a computer is to use the port. A. Universal serial bus (USB) B. FireWire 400 C. FireWire 800 D. Ethernet 30, _____is the applied science concerned with designing and arranging machines ‘and furniture so that people use so that the people using them aren't subjected to an uncomfortable or unsafe experience. ‘A. Ergonomics B. Positioning C. Occupational Safety D. _ Repetitive strain prevention 31. The process of transferring items from memory to a storage medium is called as A. reading B. connecting C. troubleshooting D. writing (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL CONFIDENTIAL 8 CSIOCT 2016/C8C133/134 32, Alll the following mobile and peripheral devices using the flash memory, EXCEPT printer digital camera automotive device optical mouse pom> 33, are usually installed in internal bays. DVD drives Floppy disk drives Hard disk drives Zip disk drives gom> 34, All the following storage term represent the exact number of bytes, EXCEPT ‘A. Megabyte (MB) = 2° B. Kilobyte (KB) = 2"? C. Gigabyte (GB) = 2° D. Terabyte (TB) = 2° 35. “Ifa drive fails, a duplicate of the requested data is available elsewhere within the array of drives". ‘What kind of the storage technology can be used according to the statement given? A. Hard Disks B. Solid State Drive C. Flash memory D. RAID 36. Kamal is a computer's trainer. He uses an optical disc as a storage medium to store his teaching material. When he found a new teaching material from internet, he will update it by using the same optical disc. ‘What types of optical disc that suitable for Kamal’s task? A. CD-ROM B. CDR Cc. CD-RW D. Bluray Disc (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 9 CSIOCT 2016/CSC133/134 37. Which of the following is NOT true about Wi-Fi network? ‘A. Many home users set them up. B. AW-Fi's Internet service can be dial-up access. C. WiFi networks send signals to a communications device that is connected to a high-speed Internet service. D. Many public locations are Wi-Fi hot spots. 38. Which of the following is a technology that provides high-speed Internet connection using the telephone network? A DSL B. ISP c. CMOS D. OsP 39. Whatis a receiving device? Device that initiates an instruction to transmit data, instructions, or information Device that connects to a communications channel Device on which data, instructions, and information travel Device that accepts the transmission of data, instructions, or information vom> 40. What term describes the process in which two or more computers or devices transfer data, instructions, and information? A. Digital cybering B. Digital communication C. Digital channeling D. Digital connecting (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL CONFIDENTIAL, 10 csiOcT 2016/¢8C133/134 PART B (30 MARKS) QUESTION 1 a) Whats pointing device? (2 marks) b) Give THREE (3) example of pointing devices. (3 marks) QUESTION 2 Identify the similarity between the following storage: a) Hard disk and solid state drive (SSD) b) Solid state drive(SSD) and thumb drive c) Thumb drive and external hard disk (3 marks) QUESTION 3 Define the following terms and give an example for each a) Web Browser b) Web 2.0 (4 marks) QUESTION 4 List THREE (3) examples of utility program. (3 marks) QUESTION 5 Compare between Random Access Memory (RAM) and Read Only Memory (ROM) by stating TWO (2) differences each. (3 marks) (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL " CSIOCT 2016/CSC133/134 QUESTION 6 a) The processor, also called the central processing unit (CPU) contains a control unit (CU) and an arithmetic logic unit (ALU). What is the difference between CU and ALU? (3 marks) b) The system unit is a case that contains electronic components of the computer used to process data. List TWO (2) components inside the system unit of a desktop personal ‘computer. (2 marks) QUESTION 7 a) Describe TWO (2) types of network topology. (3 marks) b) Mazian’s company uses firewall to protect a network's resources from intrusion by users on another network, such as Internet. The firewall also used to restrict employees’ access to sensitive data, such as payroll or personnel records. Design a firewall diagram that protect from intrusion by users on another internet network. (4 marks) (© Hak Cipta Universiti Toknolog! MARA CONFIDENTIAL CONFIDENTIAL, 12 CSIOCT 2016/CSC133/134 PART C (30 MARKS) QUESTION 4 a) A school decided to gather telephone numbers of all their teachers and parents. The decided not to use the web site but choose to burnt all handphone numbers in Compact Disc(CD) and distribute the CDs to all the parents in the school. Is CD considered as a primary or secondary storage device? Why? (2 marks) b) Syarikat Maju Jaya wanted to change their old punch card system to a biometric attendance system. Explain FOUR (4) advantages the new biometric system over the old punch card system. (10 marks) ©) Most biometric devices use various sizes of Liquid Crystal Display (LCD) monitor to display the inputs. LCD uses a liquid compound to present information on a display device. It contain fluorescent tubes that emit light waves toward the liquid-crystal cells, which are sandwiched between two sheets of material. Explain what does the quality of an LCD monitor or LCD screen depends primarily on? (3 marks) QUESTION 2 @) One of the operating system functions is called booting. There are TWO (2) types of booting. List each one of them. (2 marks) b) As a training manager in a training centre, you need to design new courses for customer who wants to enhance their skill in. using business application, Describe THREE (3) suitable application software that you might choose as new courses and stated the skill that customer will acquire after attend the courses. (9 marks) c) Clerks at big companies usually suffer from Repetitive Stress Injury (RSI) due to excessive typing of documents using word processors. RSI occurs when muscle groups are forced through repetitive actions. ‘The most common kind of computer- related RSI is carpal tunnel syndrome (CTS), in which pressure on the median nerve through the wrist’s bony structure produces pain. Symptoms of carpal tunnel syndrome include numbness, shooting pain, inability to grasp objects, and tingling. Millions of workers have been diagnosed with carpal tunnel syndrome. State TWO (2) actions that could reduce RSI injuries. (4 marks) END OF QUESTION PAPER (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL

You might also like