You are on page 1of 14
There are 40 questions in this paper. Choose the most suitable answers. 1 3. Peter sends a file in Word document (,docx) format to John. He finds that the layout is different from the original document when John opens and views the file in his computer. Which of the following can solve the problem for Peter? A. Peter should save the Word file as PDF format, then send it to John. B. Peter should save the Word file as RTF format, then send it to John. C. Peter should upload the file to the cloud storage, then share the shared link to John. D. Peter should first make sure that John is using the same Operating System as his. A school has 4 branches. Bach branch has no more than 1000 students and each student has his own student number. What is the minimum number of bits required to represent the student numbers? A. 10 B. 12 Cc 20 D. 4000 Mary is a manager of a chain convenience store. She takes each branch as a unit and records the information of the products in each branch in different worksheets of a spreadsheet program. ‘Mary wants to know the stock of masks in each branch. Which spreadsheet feature should she use? A. AutoSum B, Sorting and Filtering C. Pivot table D. ‘What-if” analysis 4, Recently, more and more people use the Electronic Fund Transfer (EFT) service. Which of the following are the reasons for this? (1) Saves the trouble of cash changing. 2) Saves the time to queue at banks, (2) Keeps the information of fund depositors and receivers confidential. (1) and (2) only. (1) and (3) only. (2) and (3) only. (1), @) and (3). pomp 5, Adatabase table STU stores students’ personal information, as shown below. STU CHAN YaT | 00101 2A 2 BLUE What is the data type of STD? A. Boolean B. Integer C. Real D. Character 6. Amy is trying to login to @ website but she forgets her password. She has to apply for password resetting. During the resetting process, which of the following is an exemple of data verification? Passing the CAPTCHA process. Inputting the new password twice, Answering two security questions set during registration. Entering the registered email address and backup email address. poBPp 7. Which of the following 8-bits number(s) involving two’s complement representation will generate an overflow error during calculation? (1) 1000 1000 + 0111 0111 @) 1010 1010 + 1101 0101 @) 0101 0101 - 1010 1010 @) only, ) only. (2) and (2) only. (2) and (3) only. pop 8. Peter compresses 100 source files with a total file size of $00 MB into one single compressed file, After the compression, the size of the compressed file is stil close to 500 MB. Which of the following is/are the possible reason(s)? (1) The source files that Peter compresses have already been compressed before. (2) The compression software that Peter uses is free, so the effect is not significant. (3) The number of files involved is too large, which affects the compression performance. (1) only. (2) only. (1) and (3) only. (2) and (3) only. pop> 9. Eva buys a mechanical combination lock. It has buttons for numbers 0 - 9. The password consists of 5 digits. What is the maximum number of password combinations for this lock? 10 32, 252 1024 gs ou> 10, John wishes to publish his creation. He is now evaluating the effect on the sales profit with different selling prices and sales. What spreadsheet feature can facilitate his evaluation process? A. Pivot table B. ‘What-if analysis C. Sorting af D. Filtering 11, Which of the following is an example of converting digital signal into analog signal? Taking scenery photos using tablet computers. Copying audio files from computer to external hard disk. Watching live broadcasts of ball games over the Intemet. Connecting computers to a network through Wi-Fi signal, pope 12. Internet Protocol version 6 (IPv6) uses 128-bits addressing. If an address is represented by hexadecimal digits, how many hexadecimal digits are there in the address? A 16 B. 32 c. 128 D. 3.4x10%8 13. Which of the following are the functions of an operating system? (1) Configuring devices which connected to the computer. Q) Providing protection against viruses. (3) Memory management. A. (1) and @) only B. (1) and (3) only C. @)and @) only D. (0), @) and G) 14. Which of the following are the advantages of using a Point-of-Sale terminal system in a 15. 16, restaurant? pomp (1). Data accuracy is higher. (2) Data transmission speed is faster. (3) System's setup cost is lower. (1) and (2) only (1) and (3) only (2) and (3) only (1), @) and @) ‘Which of the following specifications will significantly affect the performance of video conferencing? pomp (1). Storage space of hard disk. 2) Use of HDMI interface. (3). Network transmission speed. (1) and Q) only (1) and 3) only 2) and (3) only (1), @) and @) Peter is using a speech-to-text function to send text messages to his friend through instant messaging software, He finds that the accuracy of the text recognized by the software is very low. Which of the following is/are the possible reason(s)? powp (2) The speech language used in the software is different from that of Peter. (2) Peter did not install an Optical Character Recognition (OCR) program. @) Peter did not install a suitable driver program, (1) only (1) and (2) only Q) and (3) only (1), @ and (3) 17. The following is the pseudocode of part of a program: 18. 19. Input i If i > 0 then While j < 10 jeje ‘When executing the above instructions, which of the following CPU register(s) will be involved? (2) Accumulator 2) Memory Address Register @) Status Register A. ()only. B. (J)and 2) only. C. @)and (3) only. D. ), 2) and 3) During a computer lesson, a teacher teaches students the use of photo editing software. A student finds that he can open the software smoothly, but when he mistakenly input the image file setting from 75 pixels per inch to 750 pixels per inch, the software cannot execute the photo editing commands smoothly, Which statement can explain this? ‘A. Because the operation performance of the CPU is not enough to handle photo editing commands. B, Because the computer does not have a SSD as its secondary storage deviee. C. Because the word sizes of the CPU, buses and operating system are not consistent. D. Because the main memory of the computer system is not enough. Without setting up a print server, which of the following is the most important factor for a network printer that performs network printing for multiple users? a print speed of 10 ppm. an ability to print an image of A3 size, a built-in 4 MB cache memory. BOD > scanning function. 20. Which part of the following URL represents the top-level domain? Which part represents the second-level domain? -ttps://wwvrhkddu.com/document/eng/list-htm! Top-ievel domain Second level domain A list ten! eng B. eng document c documentleng wwwihkddu.com D, com hkddu 21, Below is a network diagram of a network. Which of these is the most appropriate combination? Device A Device B A. Modem Switch B. Switch Modem C. Router Modem D. Modem Router 22, Which of the following can be found in a HTML document? (1) Text @ Audio @ Images Animation (1) only (1) and (2) only (1), @) and 3) All of the above pope 23. Greg successfully finds the URL of the website of ICT club, http://vww.hkict.org.hk, by searching the keyword “HKICT” in a search engine. This is because: 24, 25. pow the search engine uses an algorithm to deduce the URL. the search engine finds the URL on the internet immediately, the search engine finds the URL ine database system. the search engine uses artificial intelligence to analyze Greg's behavior. John has set up a domain name system for his school, Which of the following description(s) about the system is/are correct? you @Q) Domain name system can translate domain names into IP addresses. @) Domain name system can translate IP addresses into domain names. 3) Domain name system stores all the domain names on the internet. (1) only. (1) and (2) only. (@) and (3) only. All of the above. As more and more electronic devices are interconnected, which of the following problem(s) is/are being solved by the technology sector? Sowp (1) As the current IP addresses are not enough for use, the IP address standard has to shift to a new generation. @)_Asthe current intemet architecture is outdated, countries should work together to build a new Intemet of Things (loT). (3) Develop standard protocols for the communication of different electronic devices. (W) only. (1) and (2) only, (1) end (3) only. All of the above. 26. The government has been encouraging people to use electronic payment for shopping these years Which of the following is/are the benefit(s) of electronic payment? (1) More convenient. (2) Higher privacy. @) More discounts. (2) only. (1) and 2) only. (2) and (3) only. (2), (2) and (3). paopPr 27. Suppose thatX = 4and¥ = 2. Which of the following Boolean expression is ‘true’? A (xX <= ¥) AND ( (Y¥>4) OR(K>3)) B. (X<=¥) OR( (¥>4) AND (X>3)) CG ( (x <=¥) AND (Y>4)) OR (K>3) D ((X<=¥) OR (¥>4)) AND (K>3) 28. Mark isan array. What is the output of the following algorithm? Mark[5] + 10 For x from § to 1 do Mark{x-1} Preirciae der ‘The following segment of a flow chart is used to represent a task in a coin-operated vending machine for drinks. No Yes Drak Which of the following task is most unlikely to be the purpose of the machine? A. Check if the amount is enough. B, Check if there is remaining balance. Check if a drink is chosen. Cheek if the user will buy another drink, yo n 31. 32. Study the following algorithm. x<5 Yeu While (¥ < 10 ANDX>1) do Yoyr+2 XOX Output “Hello” How many "Hello" will be output? yom ees Study the following algorithm: Input X If X > 20 And X <= 30 Then x= xX +10 Else x=0 Output X If X is an integer, which of the following are boundary cases of the algorithm? @o 2) 20 @) 21 (30 (2) and (2) only (2) and (3) only (2) end (4) only 2), (3) and (4) only pop> 2 33. If $ and 7 are integers, which of the following must produce the same result? () Nor (s < 3 oR T > 25) Q $ >= 3 AND T <= 25 @) S> 3 AND? < 25 (1) and (2) only (i) and (3) only (2) end 3) only (1), @) and (3) pop> 34, Facial recognition systems are getting more popular today. A commercial building intends to use such a system fo collect data on all personnel entering the building. Which of the following should be considered? Collect too much data, causing an overload of the server. Data collected may involve inftingement of personal privacy, The stability of the network and the size of bandwidth while installing the devices. The installation cost of the whole system. vom 35. John works with his desktop computer. To protect his eyes, he uses an anti-glate monitor. After working for an hour, his eyes get tired. Which of the following is/are the possible reason(s)? (1) He does not use an anti-reflecting monitor. @) He works in an environment without sufficient light. B) He does not take rest while working, A. (only B. @)only C. (1) and @) only D. @) and 3) only 36. 37. 38, ‘Amy isan artist. She designed a collection of badges and uploaded their image files to her personal ‘website, such that others could give comments for improvement. A month later, she finds that the collection of badges is displayed on another website. What should she do? She can seek help from the Hong Kong Copyright Center. She can start a civil action to sue the inftinger. She should apply for a patent for the collection of badges. She should delete all the image files on her website to avoid being stolen by others. powP Peter is the IT department head of a company. In order to reduce the impact of ransomware, what should he do for the company's database? (1) Backup the database regularly 2) Update the system regularly. G) Export the reports regularly. A. (2) and (2) only B. (1) and (3) only C. @)and (3) only D. (1), 2) and @) In recent years, the HK government has been actively aiding schools to promote the ‘Bring Your Own Device’ program. It also subsidizes needy students to purchase tablet computers and internet services. Which issue(s) is/are the HK government dealing with? (1) E-learning. Q) E-government. @) Digital divide. A. (i) only B. Q)only ©. (1) and (3) only D. @)and (3) only 39, Betty installed an app for electronic payment. Once she finishes shopping, she only needs to open the app and show a QR code to the cashier desk to complete the payment process. In order to enhance the security, she gives advice to the app developer company. Which of the following statement(s) is/are reasonable? you (1) The system should verify the user's identity (password, facial recognition or fingerprint authentication) before each transaction, Q) After each transaction, the system should send a message to the user. Immediate action can be taken if any problem is found. (3) If the transaction amount is relati ly Jarge, the system should send a confirmation email to the user. (only @ only (2) and (3) only (2) and (3) only 40, Peter recently received an email, saying that the information given was not completed when registering for the consumption voucher. It directed him to another website and needed him to fill in the information again. What should Peter do? Follow the instructions to enter his personal information and forward the email to others. Follow the instructions to enter his personal information to avoid losing the consumption vouchers. Put the sender of the email into the whitelist, to avoid receiving similar emails. Ignore the email. END OF SECTION A

You might also like