Você está na página 1de 8

PANITIA TEKNOLOGI MAKLUMAT DAN KOMUNIKASI

PEPERIKSAAN
PERTENGAHAN TAHUN 2011
3765/1
INFORMATION AND COMMUNICATION TECHNOLOGY
Kertas 1

2 ½ JAM

TINGKATAN 4

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C.

2. Jawapan untuk Bahagian A, Bahagian B dan Bahagian C hendaklah ditulis di ruang yang disediakan pada Kertas
Soalan ini.

3. Anda dikehendaki menghantar Kertas Jawapan/Soalan ini pada akhir masa peperiksaan.

NAMA: ........................................................................................................................................

TINGKATAN : ...........................................................................................................................

SECTION A SECTION B SECTION C

TOTAL MARKS

___________________________________________________________________________

Kertas soalan ini mengandungi 8 halaman bercetak termasuk kulit


SECTION A
Circle the correct answers. (40 marks)
C. embedded computer
1. A scientist named ____________ invented a D. mainframe computer
calculating machine called the Pascaline in
1653. 9. ____________ uses computers to experiment new
A. John Napier graphic designs with possible interiors.
B. Michael Dell A. An artist
C. Blaise Pascal B. A scientist
D. Charles Babbage C. An architect
D. A researcher
2. PDA stands for ________________.
A. primary digital assistant 10. Customers benefit from Electronic Banking in
B. processor digital addon terms of:
C. personal digital assistant I. 24 hours service
D. protocol disk administrator II. Electronic Fund Transfer
III. Electronic Cash Deposits
3. _____________ was one of the first generation IV. Electronic Loan Application
computer scientists. A. I, II, and III
A. Bill Gates B. I, II, and IV
B. Steve Jobs C. I, III, and IV
C. John Napier D. I, II, III, and IV
D. Presper Eckert
11. Teachers benefit from the use of computers in
4. The first computer that was delivered to the client schools because computers…
was ___________. I. weaken learning
A. Mark 1 II. can enhance interactive learning
B. IBM 360 III. can be used as an effective teaching aids
C. UNIVAC IV. can strengthen cognitive development
D. CDC2600 A. I and III
B. II and III
5. _______________ was invented to provide C. II, III, and IV
memory. D. I, II, III, and IV
A. The vacuum tube
B. The punched card 12. Which of the following activities depend on
C. The magnetic tape computer technology?
D. The magnetic core A. Going to school.
B. Finishing our home work.
6. Charles Babbage invented the Mechanical C. Buying a bus ticket at a main station.
Calculator Machine in ________. D. Withdraw money from the ATM machine.
A. 1673
B. 1801 13. What is a computer system?
C. 1823 A. A set of customised software used for accounting.
D. 1941 B. A set of computer components on the motherboard.
C. A personal computer is not an example of a
7. Which of these is CORRECT? computer system.
A. Child pornography is legal in Malaysia. D. A set of hardware and software which processes
B. Pornography is easily accessible on the Internet data in a meaningful way.
C. Books, film and music do not contain controversial
content. 14. Ecommerce plays an important role in the
D. Pornography is easily accessible in book format in economic scene. It includes distribution,
Malaysia. __________, __________, and servicing
products that are done electronically.
8. A bank clerk transfers money into your account. A. buying, selling
This transaction is stored in the _____________. B. drawing, sketching
A. workstation C. monitoring, discussing
B. supercomputer D. neglecting, empowering
D. The list can characterize unacceptable material in
15. Education can be improved by _______________. websites.
A. students being taught by using computers
B. being teachercentred and students are spoon fed 21. How can we block access to a specific website?
C. having a small number of students in a classroom A. Surf the Internet more often.
so that the students can pay attention B. Do not access misleading material on the Internet.
D. students surfing the Net to gather more information C. Websites would be expected to rate their content
more than what was given in the textbook along several dimensions.
D. All of the above.
A I and III
B I and IV 22. “It is a fairly straight forward procedure and is
C I, II, and IV surprisingly accurate. Though it requires a
D I, III, and IV special hardware to use, it can be easily integrated into
other devices or systems.”
16. Several aspects have been considered as the The above description is for:
advantages of the computerised system. They are: A. Retinal Scanning.
I. Time B. Voice Recognition.
II. Profit C. Hand Geometry Scanning.
III. Productivity D. Signature Verification System.
IV. Job opportunity
A. I and III 23. The _____________ is attached to a computer and
B. I and IV takes the information from the scanner
C. I, II, and III and sends it to the database. The data received is
D. I, III, and IV compared to the information stored within
the database. The user is usually required to leave his
17. Why is it important to limit the access to finger on the reader for less than 5
websites? seconds during which time the identification or
A. To avoid from gaining new information. verification takes place.
B. To avoid computer from being corrupted. A. iris scanner
C. To avoid other users from accessing your B. fingerprint reader
computer. C. hand geometry scanner
D. To avoid nonsuitable websites (e.g. porn, slander) D. signature verification machine
from being accessed.
24. The _______________ and the
18. The filtering software is used to ________________ are the two commonly use
________________ authentication methods used to identify the true user.
A. filter viruses. A. biometric device, possessed objects
B. increase growth in Malaysia. B. biometric device, callback system
C. control the access to the Internet. C. callback system, remembered information
D. speed up the access to the Internet. D. possessed objects, remembered information

19. Below are the examples on how to control the 25. Retinal biometric involves the scanning of
access to controversial content: __________ and analysing the layer of
I. Install antivirus __________ at the back of the eye.
II. Referred to by URLs A. retina, pupil
III. Use filtering software B. retina, eye ball
IV. Rate the content of websites C. retina, blood type
A. I and II D. retina, blood vessels
B. I, II and IV
C. II, III and IV 26. Which of the followings is the correct example of
D. All at the above. authentication process?
I. Buys books from the Internet
20. How does the list of English keywords control the II. Pays petrol with a credit card
access to controversial contents? III. Sends flowers from a website
A. The computer understands English. IV. Buys groceries from the grocery shop
B. English is an international language. A. I, II, and III
C. All Controversial contents are in English. B. I, II, and IV
C. II, II, and IV
D. I, II, III, and IV 34. Assembly language is the _____ generation
programming language.
27. ______________ is a set of commands or A. first
instructions which directs a computer in doing a task. B. third
A. Program C. fourth
B. Language D. second
C. Programmer
D. Programming Language 35. __________ language programmers write
instructions using mnemonic instruction codes.
28. The commands or instructions of C language A. Natural
programming were written in _________language. B. Machine
A. Tamil C. Assembly
B. Malay D. Procedural
C. English
D. Mandarin 36. ________ is an example of high-level
programming language.
29. Human communicates with computer using A. PASCAL
__________ language. B. Machine language
A. sign C. Artificial Intelligent
B. English D. Assembly language
C. Machine
D. Programming 37. __________is an example of a fourth generation
programming language.
30. The commands or instructions of a program will A. Basic
be __________ before executing. B. COBOL
A. running C. Intellect
B. transfer D. FORTRAN
C. compiled
D. changing 38. Programs written in a ___________ programming
language must be translated into machine language by
31. Programming language is a language used to a compiler or interpreter.
________ computer programs. A. natural
A. draw B. low-level
B. write C. high-level
C. read D. very high-level
D. listen
39. The ________programming language provides a
32.___________is one of the programming languages. visual or graphical interface for creating source code.
A. Greek A. natural
B. France B. low-level
C. PASCAL C. high-level
D. Swedish D. very high-level

33. Machine language is the 40. _________ is an example of fifth generation


_______________________ . programming languages.
A. natural language A. C++
B. low-level programming language B. Prolog
C. high-level programming language C. Visual Basic
D. very high-level programming language D. Query Language
SECTION B
1. Decide whether the statements are TRUE or FALSE. (14 marks)

1. The most powerful personal computers are known as supercomputers. ( )


2. There are 8 generations in the development of computers. ( )
3. UNIVAC stands for Universal Automatic Computer. ( )
4. Magnetic cores were first used in the first generation computers. ( )
5. Privacy in computing refers to information privacy. ( )
6. Computers influence our lives in every aspect except career. ( )
7. Authentication is a process where users verify that they are who they say they are. ( )
8. A fingerprint is an imprint made by the pattern of the skin on the pad of a human finger. ( )
9. Hand Scanning involves the measurement and analysis of the shape of one's hand. ( )
10. ICT stands for Institute of Communication Technology. ( )
11. Information and Communication Technology (ICT) is the technology that people use to improve their life. ( )
12. Computers are the only modern communication technology. ( )
13. We need to learn about ICT if we do not want to be left behind. ( )
14. There are two types of programming approaches, which are structured and object-oriented programming. ( )

2. Match(draw a line) the security threats with the correct security measures. (16 marks)

3. Fill in the blanks with the options given. (10 marks)

1. How does computer technology invade our privacy?


A. ___________
B. ___________
C. ___________

2. Why do we need data privacy?


A. ___________
B. ___________

3. How can privacy be protected?


A. ___________
B. ___________

4. The information in electronic profile includes very personals detail such as?
A. ___________
B. ___________

SECTION C (Answer all questions)

1. Complete the diagram/box below with correct answer base on the word given. (10 marks)

Main Program ~ Read book_loan ~ Read student_record ~ Print Report ~ Input

2. Figure X and Y show different ways in teaching and learning process.


FIGURE X FIGURE Y

Based on Figure X and Y,

a) State two differences between the teaching and learning process in the figures above. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

b) State two advantages of teaching and learning process in Figure 5b compared to Figure 5a. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

c) Give two other uses of ICT in education. (2 marks)

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

3. Every year the school coop will give dividend to its members. Aidel is given a task to build a
program to calculate it. He uses Microsoft Visual Basic programming language to complete his task.

a) Give the difference between the structured programming approached and the programming language that
Aidel used. (2 marks)
…………………………………………………………………………………………………….…………

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

b) Describe the translation method(s) of programming language used above. ( 2 marks )

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

~End of the Question~

Prepared By, Checked By,

…………………………………………….. ……………………………………………….

( Mr.Taufik Hidayat b. Hamid) (Miss. Faiza bt Mohamed)

Form 4 ICT Teacher Head of ICT Department

Verified by,

……………………………………………….

( Mr.Henry Ho)

Head of Vocational & Technical

Você também pode gostar