You are on page 1of 5
ANSWER SCHEME 2 CSIJUN2019/CSC134/TEST2 PART A (20 MARKS) Answer ALL questions, 1. Select the CORRECT category of application software such as word processors, spreadsheets, databases and presentation graphics. Specialized applications Mobile apps general purpose applications ‘communications applications onmp 2. Select the CORRECT purpose of recalculation feature in spreadsheet software. depict the data in a spreadsheet in graphical form enter labels to identify worksheet data and organize the worksheet review the spelling of individual words and sections of a worksheet change values in a spreadsheet to identify the effects of those changes pom 3. Identify the INCORRECT example of mobile apps. A. Gmail B. Microsoft Office C._ Dictionary.com D. Google Docs 4, Select the CORRECT types of e-commerce A. B2C, C2C, B2B B. B2C, D2D, C26 C. B2B, 02D, 82D D. B2C, B2B, C2B 5. Determine the term use to describe sequence of numbers that uniquely identifies each computer or device connected to the internet. A. Hypertext B. IP address C. Hyperlink D. Internet protocol 6. Identify the communication which is NOT occurred over the telephone network? A. Dial-up Lines B. Digital Subscriber Line (DSL) C. Bluetooth D. Asynchronous Transfer Mode (ATM) © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL ANSWER SCHEME 3 CSIJUN2019/CSC134/TEST2 7. Identify a physical transmission media that is made from a single copper wire surrounded by at least three layers of material. A. Infrared B. Fiber optic cable C. Twisted pair cable D. Coaxial cable 8. Identify y. y ‘An assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. A. Botnets B. Backdoors C. Denial of Service (DoS) attacks D. Zombie 9. Choose the INCORRECT statement for health concerns of computer use. A. Factors that would cause CVS include prolonged typing, prolonged mouse usage or continual shifting between the mouse and the keyboard. B. Lower back pain sometimes is caused from poor posture. C. CTS is inflammation of the nerve that connects the forearm to the palm of the wrist. D. Techniques to ease eyestrain are use large fonts and adjust the lighting. 10. Determine the measures to be taken to protect computer security EXCEPT A. Use biometric devices to restrict access B. Find entry to any computer and leave messages C. Create password using a password manager software D. Use RAID as a backup storage PART A (20 MARKS) Tc 6 [Cc 2._D 7. | D 3._B 8. | c 4A 9. A 5. B 10.| B (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL ANSWER SCHEME 4 CSIJUN2019/CSC134/TEST2 PART B (15 MARKS) Answer ALL questions in the space provided below. QUESTION 1 Software Suites @ Describe software suites. “SGueckegete’ ~— A-software suite is a collection of application program bundles roa gros together and sold as a group. b. List ONE (1) example of a software suite. FOUR (4) types of suites (any one or other examples is for ONE mark) QUESTION 2 a. Give TWO (2) reasons why you need to observe netiquette when you want to send an e-mail? + Itis a good/proper way to establish a communication between 2 persons. + Itis to avoid any misunderstanding whene friends. you sending messages to + It is not to hurt anybody feeling whenever you are writing any messages. + It is a way to properly use any email service as to get the maximum benefit from it. (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL ANSWER SCHEME 5 CSIJUN2019/CSC134/TEST2 b. List THREE (3) elements in Uniform Resource Locator (URL). (3 marks) QUESTION 3 a. Explain any ONE (1) primary wireless technology. (2 marks) (any ONE for two marks) QUESTION 4 a, Define cookie Cookies are small data files that are deposited on your hard disk from web sites you have visited b. List THREE (3) dangerous malwares. Three dangerous malwares are VIRUS, WORM and TROJAN HORSE. (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL ANSWER SCHEME 8 CSIJUN2019/CSC134/TEST2 PART C (15 MARKS) QUESTION 1 With the advancement of technology and smart devices, generation Y is close with the term live and sleep with the gadgets’. It has affected their lives so much. a. Identify ONE (1) popular application that support the above statements. (1 mark) Examples of apps can be WA, facebook, ML, PUBG, instagram and others. (any ONE apps for ONE mark) b. Discuss any FOUR (4) negative impacts that may happen for the generation Y due too much technology and smart devices. (8 marks) Negative impact can be the issues of COMPUTER ADDICTION, SPENDING TOO MUCH TIME ONLINE, SPREADING OF FALSE NEWS, CYBERBULLYING, LACK OF SLEEP, RADIATION OF SIGNAL FROM MOBILE DEVICES, WASTE OF MONEY AND ETC. (You have to elaborate more on the point. Each point will contribute TWO marks) c. Based from the stated negative impacts, choose and discuss any THREE (3) remedies (the actions to be taken to avoid/correct it), (6 marks) Remedies for the above negative impacts are: + Computer users should be more selective in viewing and spreading news from the internet. * Users should also have a healthier lifestyle which they should more time with friends and do outdoor activities * Users can also set limit to their viewing time using specific apps to monitor time being spent online + [fusers do have computer addiction problem, they should consult counselor or any responsible adults for advice and help. * Report any inappropriate internet activities to the authority to block any negative contents of the internet. (any ONE point for TWO marks) END OF QUESTION PAPER © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

You might also like