CONFIDENTIAL

CS/APR 2011/CSC133/134/434

UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION

COURSE COURSE CODE EXAMINATION TIME

COMPUTER AND INFORMATION PROCESSING / COMPUTER ESSENTIALS AND APPLICATIONS CSC133/134/434 APRIL 2011 2 HOURS

INSTRUCTIONS TO CANDIDATES 1. This question paper consists of three (3) parts PART A (40 Questions) PART B (7 Questions) PART C (3 Questions)

2.

Answer ALL questions from PART A, PART B and TWO (2) questions from PART C: i) ii) Answer PART A in the Objective Answer Sheet. Answer PART B and PART C in the Answer Booklet. Start each answer on a new page.

3. 4.

Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of: i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 10 printed pages
© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

bay bus port slot 6. C. D. Below are the types of buses. D. Below are the types of adapter cards EXCEPT A. processor memory CPU system unit . A. digital bus backside bus system bus expansion bus 3. A. Digital MIDI Network Modem 5. B. C. D. D. A case that contains electronic components of the computer that are used to process data is referred as . B.CONFIDENTIAL PART A (40 MARKS) 2 CS/APR 2011/CSC133/134/434 1. 2. C. C. A(n) is an opening inside the system unit in which you can install additional component. memory bus bit port . consists of electronic components that store temporary instructions to be executed by the processor. C. 4. B. B. D. B. processor memory CPU system unit © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . C. B. EXCEPT A. data needed by those instructions. D. An electronic component in the system unit that used to process data is referred as A. A. and the results of processing the data(information).

speed consistency storage health risk 12. B. C. Which of the following is NOT a storage media? A. on which integrated circuits are fixed also known as . system analyst programmer designer manager is a socket on the motherboard that can hold an adapter card. C. usually silicon. A. A. A(n) A. C. peripheral expansion slot port bay 9. D. hard disks memory cards keyboard optical Discs 11. C. B. D. D. 8. B.CONFIDENTIAL 3 CS/APR 2011/CSC133/134/434 7. A special type of notebook computer that allows you to write or draw on the screen using a digital pen is also known as . C. A. B. chip memory bus motherboard 10. C. tablet PCs smart phones netbook handheld computer © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . D. A. D. D. A(n) is someone who develops software or writes the instructions that direct the computer to process data into information. B. The benefits from using computers are possible because computers have the advantages of the followings EXCEPT . B. A small piece of semiconducting material.

Web browser word processing software database software spreadsheet software . D. D. web images and other information. C. A. C. B. Adobe Photoshop Microsoft Visio AutoCAD Microsoft Excel 14. B. Storage holds A. A A. . 18. 16. C. D. D. B. and redistribution has no restrictions from the copyright holder usually can be downloaded from the Web at no cost All of the above 17. Open source software A. D. B. C. C. 19. web pages. tabbed browsing where the top of browser display a tab a built-in connection to another related web page or part of a web page activity of using link to explore the web search engine that allows user to find web sites. B.CONFIDENTIAL 13. D. is provided for use. you might want to use what type of utility? A. pop-up blocker spyware remover anti-spam program Web filter for future use. C. A link or hyperlink is a(n) A. B. modification. B. data instructions information All of the above © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . It allows users with an Internet connection to access Web pages. 4 CS/APR 2011/CSC133/134/434 Which of the following is NOT an example of graphic software? A. D. 15. To safely and remove a program from your computer. C. A is a widely used type of application software that relates to communications. Backup program File compression program Troubleshooting program Uninstall program restricts access to specified Web sites.

and erased. D. C. B.CONFIDENTIAL 20. B. measures the amount of time it takes by a storage device to locate an item on a storage medium. it causes A. D. 22. A. A(n) A. B. C. 21. C. zip disk hard disk USB flash drive DVD stores data on a thin microprocessor embedded in the card. A. 23. Latency Tracking Access time Resolution is the phrase that refers to the activity of using links to explore the Web. © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . C. A. a hard-disk controller crash the disk is demagnetized the data on the disk is scrambled a head crash 24. C. D. CD-ROM CD-R DVD-ROM DVD+RW 5 CS/APR 2011/CSC133/134/434 disc can be read. If a read/write head touches the surface of a hard disk. D. D. A(n) is a portable storage device that has much greater storage capabilities than a floppy disk. written to. B. B. Strolling the Web Weaving the Web Surfing the Web Wandering the Web 25. but is small and lightweight enough to be transported on a keychain or in a pocket. D. C. A. B. Magnetic stripe card Smart card Tape Microfilm .

C. Physical transmission media used in communications include A. address book. The steps in web publishing are: A. A. The transmission media on which the data.CONFIDENTIAL 6 CS/APR 2011 /CSC 133/134/434 26. Some computers and devices use the wirelessly to each other via infrared light waves. instructions. D. B. C. C. WAP IrDA RFID Wi-Fi 31. A. twisted-pair fiber-optic coaxial all of the above cable. or information travel is called as a . The following are types of web sites EXCEPT: A. Planning and maintaining the Web site Analyzing and designing the Web site Creating and deploying the Web site All of the above 27. Portal Advocacy Wiki Multimedia 28. B. D. C. B. and a notepad. D. sending device receiving device communications Chanel Copper wire 29. B. A(n) provides functions such as an electronic appointment calendar. © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . D. B. ATM PIM WAP P2P specification to transmit data 30. B. C. A. D. C. D.

• CONFIDENTIAL 7 CS/APR 2011/CSC133/134/434 32. is a type of network that is simple. D. inexpensive and typically connect fewer than 10 computers. An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called . All of the above. D. D. Peer-to-Peer Client/server Bus network Token ring 33. Communication software consist of program that: A. B. A. In its simplest form. a(n) decrypt cipher text. D. 34. Manage transmission of data. B. C. Help user establish a connection to other computer or network. C. instructions. C. D. A virus hoax often is in the form of a(n) A. B. A. D. A. B. Cracker worm Trojan horse Virus 35. Spyware adware Spam Cookies . 36. C. B. and information. Plaintext encryption key firewall digital signature is a programmed formula that is used to © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . a computer negatively by altering the way the computer works without the user's knowledge or permission. C. photo attachment newsletter advertisement chain letter 37. A. is a potentially damaging computer program that affects. Provide an interface for users to communicate with one another. or infects. B. C.

and . D. C. for example in memory or in a network. 8 CS/APR 2011/CSC133/134/434 A person breaking into a computer laboratory and smashing computers is an example of . a possessed object. A.CONFIDENTIAL 38. C. a memory card a license agreement a biometric device an adapter card © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . D. piracy hardware vandalism software theft information theft 39. B. B. In order to access controls to digital resources. A(n) is a program that copies itself repeatedly. D. C. B. Safeguard worm Encryption Virus 40. using up resources and possibly shutting down the computer or network. we need to have a user name and password. A. A.

Memory. (6 marks) © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . (3 marks) QUESTION 4 List THREE (3) types of Operating System. (6 marks) QUESTION 6 Define what hard disk is and list any TWO (2) characteristics of hard disk.CONFIDENTIAL PART B (40 MARKS) 9 CS/APR 2011/CSC133/134/434 QUESTION 1 Define the following : a) b) c) d) e) f) Touch screen. (3 marks) QUESTION 5 Briefly explain the differences between Local Area Network (LAN). Briefly explain any THREE(3) types of web sites. Metropolitan Area Network (MAN) and Wide Area Network (WAN). • (4 marks) QUESTION 7 There are thirteen types of Website. Digital literacy Packaged software Custom software Global positioning device (GPS) (12 marks) QUESTION 2 Briefly describe the following game controllers: a) b) c) gamepads light guns dance pad (6 marks) QUESTION 3 Define any THREE (3) ways for the proper care of an optical disc.

Briefly explain the following categories of users: a home user. (10 marks) QUESTION 2 Application software is a computer software designed to help user to perform singular or multiple related specific tasks. Describe any FIVE (5) applications software that suits your need as a university student. Suggest FIVE (5) safeguard or precautions which he can apply to prevent the situation from happening again. QUESTION 1 Faris has considered himself as a victim of unauthorized access and use of computer and devices. It helps user to solve problems in the real world. a power user. he suspected that someone has used his computer while he is out of the office. his computer Web browser's history had shown that its listing sites are the sites that he never visited before.CONFIDENTIAL PART C (20 MARKS) 10 CS/APR 2011/CSC133/134/434 Choose only TWO (2) questions and answer in the answer booklet provided. A computer allows them to accomplish many tasks needed. a mobile user. a small office/home office user. When he arrived to work one day. he noticed that his keyboard and mouse have been moved from the location he left in the previous day. (10 marks) END OF QUESTION PAPER © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL . Therefore. (10 marks) QUESTION 3 People uses computer mostly on their daily basis life. Besides. and an enterprise user.

Sign up to vote on this title
UsefulNot useful