Você está na página 1de 10

NAMA: .NO.

KP:

TINGKATAN : .

SULIT
3765/1
ICT 1
Mei 2010
2 Jam

SMK SERI TANJONG KUALA SELANGOR

PEPERIKSAAN PERTENGAHAN TAHUN 2010


TINGKATAN 5

INFORMATION AND COMMUNICATION TECHNOLOGY

Kertas 1

2 Jam

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Jawab semua soalan BAHAGIAN A, BAHAGIAN B dan 2 soalan BAHAGIAN

C.

2. Kertas soalan dan jawapan ini hendaklah diserahkan pada akhir peperiksaan.

Disediakan oleh: Disahkan oleh:

ZULKIFLI BIN OTHMAN JUMRI BIN RAMLI


Ketua Panitia ICT Guru Kanan MP Teknik & Vokasional
SMK Seri Tanjong, Kuala Selangor. SMK Seri Tanjong, Kuala Selangor.

Kertas soalan ini mengandungi 9 halaman bercetak

[Lihat
Sebelah
SULIT
NAMA: .NO. KP:

TINGKATAN : .

Question Answer Score


1 B 1
2 False 2
3 True 3
(i) Encryption 4
4 (ii) Decrypyion 5
(iii) D 6
5 B 7
6 D 8
7 C 9
(i) A 10
8
(ii) Parallel Port 11
(i) Expansion Slot 12
9
(ii) CPU Socket 13
(i) RAM Slot 14
10
(ii) A 15
(i) C 16
11
(ii) True 17
12 True 18
(i) C 19
13
(ii) C 20
(i) copyright infringement 21
14
(ii) byte 22
(i) B 23
15 (ii) Executing 24
(iii) B 25
16 False 26
17 True 27
18 Keyword Blocking 28
(i) D 29
19
(i) 80 GB 30
20 512 MB 31
21 1.86 GHz 32
22 RAM 33
23 ROM 34
24 Optical 35
25 Flash Memory 36

-2-
NAMA: .NO. KP:

TINGKATAN : .

Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark.
1. Based on Diagram, X is best described as

Diagram
A spam
B cookies
C spyware
D electronic profile

2. Bit is the smallest unit of data a computer can process. Byte is unit of information built
from bits. One byte is equal to _____________ bit.

3. Computer crimes include computer fraud, computer infringement, computer theft and
computer attack. State the name of crime activity for Situation.

Raju received an e-mail inviting him to invest in a Skim Cepat Kaya investment. Raju took action
as instructed in the web site to invest RM 1,000.00 in an anonymous account so that he can get RM
100,000.00 in two weeks, but after two weeks, nothing happened.

Situation
Computer crime for this case is _______________________________

4. Match the invention according to the right computer generations by write P, Q, or R in


spaces provided in Answer Sheet.

i Mobile Computing P First Generation


ii Vacuum Tube Q Third Generation
iii Integrated Circuit R Fifth Generation

i _______________
ii ______________
iii ______________

5. Write True or False in the spaces provided in Answer Sheet based on statement below.
Pornography can lead to criminal acts such as exploitation of women and children. _____
NAMA: .NO. KP:

TINGKATAN : .

-3-
6. Windows XP, Macintosh OS X, and Linux Suse are examples of
A Application Software
B Web Browser
C Operating Systems
D Shareware program

7. To convert conventional images to digital images, _____________ are used.


A s
c
a
n
n
e
r
s
B c
a
m
e
r
a
s
C p
ri
n
t
e
r
s
D a
u
d
i
o
d
e
v
i
c
e
s
8. Speaker and headphones are classified as ______________ devices while joysticks and
trackballs are classified as ______________ devices.

9. Write True or False in the spaces provided in Answer Sheet for statement below.
i Jamal wants to send a file to Wong using electronic mail services. He must
ensure that the file is free from virus before it is sent. Jamal uses application
software to ensure the file is virus-free before it is sent. ______

ii Wong downloads and save that file in secondary storage like flash drive. ______

10. Figure below shows the motherboard of a computer. Name J and K.


NAMA: .NO. KP:

TINGKATAN : .

J : _________

K: ________

11. Table shows several terms in a computer system.


A Input Device
B Command-Line User Interface
C Word Processing Software
TABLE
Based on Table, write A, B, C, or D for the following question in the spaces provided in
Answer Sheet.
a. Shalini wants to create and manipulate documents containing text and graphics. What
type of program should Shalini use?

b. Type commands or press special keys on the keyboard to enter data and instructions
that instruct the operating system what to do. It has to be typed one line at a time.
These statements refer to _____________.
-4- connects networks in an area such as a
12. A _____________ is a high-speed network that
city or town and handles the bulk of communications activity across that region.

A local area network (LAN)


B metropolitan area network (MAN)
C wide area network (WAN)
D variable area network (VAN)

13. Write true or false in the spaces provided in Answer Sheet for statement below.

i All computers in peer-to-peer network have equal responsibilities and capabilities to


use the resources available on the network. _____

ii Extranet is a private network that uses internet technology to share information with
authorized parties. _____

14. Ali connects three computers in his office through hub and server. The type of network
that he used is called a ____________. Alis customer, David who lives in Singapore
connects his computer to Alis new networks. This type of network is called a
__________________ .

15. Table 2 shows a list of statement for suitable hardware by write P, Q, R, S or T in spaces
provided in Answer Sheet.
NAMA: .NO. KP:

TINGKATAN : .

Item Statement

P Converts digital signals to analog signals and vice versa.


Commonly used to connect signal of a LAN contains multiple
Q
ports.
Adapter card that enables computer or device to access
R
network.
S Connects networks that use the same protocol.
Connects networks and transmits data to correct destination on
T
network.

TABLE

Match the correct items that represent the statement that best describe the hardwares
given below.
i Modem : _________
ii Router : _________
iii Network Interface Card : _______

16. A movie that combines audio, graphics and animation is still considered as a __________
multimedia content since the user is a passive receiver of the content.

A linear
B graphic
C animation
D non-linear

-5-
17.
I Implementation
II Evaluation
III Design and Develop
IV Testing
V Analysis
VI Publishing

The correct sequence in multimedia development is


A. III, II, IV, IV, I, V
B. I, II, III, IV, V, IV
C. V, III, I, IV, II, VI
D. II, IV, III, I, V, IV

18. Write True or False in the spaces provided in Answer Sheet for statement below.

Linear interactivity allows the user to interact with the content according to what the user
wants.

19. Table shows the multimedia development phase, based on the description given identify
phases Y and Z, write the answer in spaces provided in Answer Sheet .
Phase Description
NAMA: .NO. KP:

TINGKATAN : .

Y The multimedia developer will design a flow chart and storyboard.


The multimedia developer will use a checklist to test the multimedia
Z program. If there are errors, he will fix the program.

TABLE

Y:_______________________ Z: _______________________

20. A _______________________Web editor is an editor where you use HTML tags to


create a Web page.

21. The multimedia element that makes objects move is called_________________.

22. A ______________interactivity allows the user to control the progress of the content.

23. Give an example of editing software that can be used to produce multimedia presentation
using text editor.

24. Give an example of editing software that can be used to produce multimedia presentation
using video editor.

25. The advantages of CD-based multimedia programs are


I. they can be changed
II. they can be updated easily
III. they can store high end video
IV. they can be permanently stored

A. I and II
B. II and III
C. III and IV
D. II, III and IV

-6-

Section B
[20 Marks]

This section consists of five questions. You are required to answer all questions.

26 Based on Situation, answer the following question:


Haziq likes to access the internet. One day, while surfing the internet, his computer starts
to run a little weird. He noticed that the modem LEDs were blinking even after he has
stopped surfing. His system seemed to get slow and suddenly reboots. Haziq is sure that
somebody has logged onto his computer.

Haziq gemar melayari internet. Pada suatu hari, semasa Haziq sedang melayari internet, beliau
mendapati komputer beliau tidak laju seperti biasa. Beliau juga mendapati bahawa LED pada
modem berkelip walaupun beliau tidak lagi melayari internet. Komputer beliau juga reboot.
Haziq pasti terdapat pengguna lain yang telah memasuki sistem komputernya.

a. List two examples of computer threat is mentioned in the situation above?


[2 marks]
NAMA: .NO. KP:

TINGKATAN : .

b. State two things that Haziq can do to enhance the security of his data while
accessing the Internet.
[2 marks]

27 Figure shows the information processing cycle.

INPUT B OUTPUT

a. Component B contains the control unit and arithmetic and logic unit. State
one function for each of the component.
[2 marks]

b. Component D can be classified into two categories. State two the differences
between two of categories.
[2 marks]

-7-
28 Based on Situation, answer the following question:

Julia has purchased a commercial application software and she uploads the
software to her web site for others to download it.
Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik perisian itu ke
laman webnya bagi membolehkan orang lain memuat turunnya.

Johan has downloaded an open source application software from the Internet. He
then duplicates the software and distributes to his friends.
Johan telah memuat turun perisian aplikasi sumber terbuka dari Internet. Kemudian, dia
membuat salinan perisian tersebut dan mengedarkan kepada rakan-rakannya.
(a) Who has committed in computer crime? State the type of computer crime
he/she has committed.
[2 marks]
(b) State two reasons why do we need Cyber Law.
[2 marks]

29 Answer the questions below about cyber laws.

(a) Malaysian Government has passed several cyber laws to control the Internet
abuse. Four cyber law acts in Malaysia are
NAMA: .NO. KP:

TINGKATAN : .

Digital Signature Act 1997 (i) ___________________________________

(ii) ___________________________________ Communication and Multimedia Act 1997


[2 marks]

(b) Lee, a bank officer, has hacked his clients account to get information for his
own use. He can be convicted under _____________________ Act 1997.
Computer crime for this case ________________
[2 marks]

30 Table shows the examples of computer software.

Internet Explorer AVG AntiVirus Microsoft Excel Linux

(a) Based on the table 1, choose one example for suitable task given.
Task 1: Coordinates all the activities among the computer hardware devices.

Task 2: Protects a computer against viruses by identifying and removing any


computer virus found in a memory or storage media or in incoming
files.
[2 marks]

(b) State two differences between proprietary and open source software.
[2 marks]

-8-
NAMA: .NO. KP:

TINGKATAN : .

Section C
[14 marks]
This section consists of 3 questions. You are required to answer 2 questions.

31 Answer questions based on the given situation.

Situation:
Your school is going to have a new intake for the Form 1 students. As a ICT student, you are given
the responsibility by your principal to produce a multimedia project which will include all the
information about your school for the parents and the new students. Your first slide should have your
school name, batch, and school song as background music. Your multimedia project must be both
informative and interactive with suitable linking button to allow user choose their interest information.

Draw a storyboard for your slide.


[7 marks]

32 Answer questions based on the given situation.

Figure shows CMA Company computer network.

Network B
Network A Server

Modem

Intern
et
Figure

Name the topology of Network A. Give two advantages for topology in Network A.
M0dem
State two computer security threats that will be faced by CMA Company through its
computer network and explain one of the security measures that can be applied to avoid
the security threats.
[7 marks]
33 Answer questions based on the given situation.
Prizes won by Ahmad in a contest is a computer. The computer does not have any
software. Explain what to do by Ahmad to enable him to use the computer.

[7 marks]

~ End Of Questions ~
-9-

Você também pode gostar