Você está na página 1de 10

CONFIDENTIAL

CS/APR 2011/CSC133/134/434

UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION

COURSE COURSE CODE EXAMINATION TIME

COMPUTER AND INFORMATION PROCESSING / COMPUTER ESSENTIALS AND APPLICATIONS CSC133/134/434 APRIL 2011 2 HOURS

INSTRUCTIONS TO CANDIDATES 1. This question paper consists of three (3) parts PART A (40 Questions) PART B (7 Questions) PART C (3 Questions)

2.

Answer ALL questions from PART A, PART B and TWO (2) questions from PART C: i) ii) Answer PART A in the Objective Answer Sheet. Answer PART B and PART C in the Answer Booklet. Start each answer on a new page.

3. 4.

Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of: i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


This examination paper consists of 10 printed pages
Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL PART A (40 MARKS)

CS/APR 2011/CSC133/134/434

1.

consists of electronic components that store temporary instructions to be executed by the processor, data needed by those instructions, and the results of processing the data(information). A. B. C. D. memory bus bit port .

2.

Below are the types of buses, EXCEPT A. B. C. D. digital bus backside bus system bus expansion bus

3.

A case that contains electronic components of the computer that are used to process data is referred as . A. B. C. D. processor memory CPU system unit .

4.

Below are the types of adapter cards EXCEPT A. B. C. D. Digital MIDI Network Modem

5.

A(n) is an opening inside the system unit in which you can install additional component. A. B. C. D. bay bus port slot

6.

An electronic component in the system unit that used to process data is referred as

A. B. C. D.

processor memory CPU system unit

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC133/134/434

7.

A(n) is someone who develops software or writes the instructions that direct the computer to process data into information. A. B. C. D. system analyst programmer designer manager is a socket on the motherboard that can hold an adapter card.

8.

A(n) A. B. C. D. peripheral expansion slot port bay

9.

A small piece of semiconducting material, usually silicon, on which integrated circuits are fixed also known as . A. B. C. D. chip memory bus motherboard

10.

Which of the following is NOT a storage media? A. B. C. D. hard disks memory cards keyboard optical Discs

11.

The benefits from using computers are possible because computers have the advantages of the followings EXCEPT . A. B. C. D. speed consistency storage health risk

12.

A special type of notebook computer that allows you to write or draw on the screen using a digital pen is also known as . A. B. C. D. tablet PCs smart phones netbook handheld computer

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 13.

CS/APR 2011/CSC133/134/434

Which of the following is NOT an example of graphic software? A. B. C. D. Adobe Photoshop Microsoft Visio AutoCAD Microsoft Excel

14.

A is a widely used type of application software that relates to communications. It allows users with an Internet connection to access Web pages. A. B. C. D. Web browser word processing software database software spreadsheet software .

15.

A link or hyperlink is a(n) A. B. C. D.

tabbed browsing where the top of browser display a tab a built-in connection to another related web page or part of a web page activity of using link to explore the web search engine that allows user to find web sites, web pages, web images and other information. .

16.

Open source software A. B. C. D.

is provided for use, modification, and redistribution has no restrictions from the copyright holder usually can be downloaded from the Web at no cost All of the above

17.

To safely and remove a program from your computer, you might want to use what type of utility? A. B. C. D. Backup program File compression program Troubleshooting program Uninstall program restricts access to specified Web sites. pop-up blocker spyware remover anti-spam program Web filter for future use.

18.

A A. B. C. D.

19.

Storage holds A. B. C. D. data instructions information All of the above

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 20. A(n) A. B. C. D. 21. CD-ROM CD-R DVD-ROM DVD+RW

CS/APR 2011/CSC133/134/434

disc can be read, written to, and erased.

A(n) is a portable storage device that has much greater storage capabilities than a floppy disk, but is small and lightweight enough to be transported on a keychain or in a pocket. A. B. C. D. zip disk hard disk USB flash drive DVD stores data on a thin microprocessor embedded in the card. A. B. C. D. Magnetic stripe card Smart card Tape Microfilm .

22.

23.

If a read/write head touches the surface of a hard disk, it causes A. B. C. D. a hard-disk controller crash the disk is demagnetized the data on the disk is scrambled a head crash

24.

measures the amount of time it takes by a storage device to locate an item on a storage medium. A. B. C. D. Latency Tracking Access time Resolution is the phrase that refers to the activity of using links to explore the Web. A. B. C. D. Strolling the Web Weaving the Web Surfing the Web Wandering the Web

25.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011 /CSC 133/134/434

26.

The steps in web publishing are: A. B. C. D. Planning and maintaining the Web site Analyzing and designing the Web site Creating and deploying the Web site All of the above

27.

The following are types of web sites EXCEPT: A. B. C. D. Portal Advocacy Wiki Multimedia

28.

The transmission media on which the data, instructions, or information travel is called as a . A. B. C. D. sending device receiving device communications Chanel Copper wire

29.

A(n) provides functions such as an electronic appointment calendar, address book, and a notepad. A. B. C. D. ATM PIM WAP P2P specification to transmit data

30.

Some computers and devices use the wirelessly to each other via infrared light waves. A. B. C. D. WAP IrDA RFID Wi-Fi

31.

Physical transmission media used in communications include A. B. C. D. twisted-pair fiber-optic coaxial all of the above

cable.

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC133/134/434

32.

is a type of network that is simple, inexpensive and typically connect fewer than 10 computers. A. B. C. D. Peer-to-Peer Client/server Bus network Token ring

33.

Communication software consist of program that: A. B. C. D. Help user establish a connection to other computer or network. Manage transmission of data, instructions, and information. Provide an interface for users to communicate with one another. All of the above.

34.

is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. A. B. C. D. Cracker worm Trojan horse Virus

35.

An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called . A. B. C. D. Spyware adware Spam Cookies .

36.

A virus hoax often is in the form of a(n) A. B. C. D. photo attachment newsletter advertisement chain letter

37.

In its simplest form, a(n) decrypt cipher text. A. B. C. D. Plaintext encryption key firewall digital signature

is a programmed formula that is used to

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 38.

CS/APR 2011/CSC133/134/434

A person breaking into a computer laboratory and smashing computers is an example of . A. B. C. D. piracy hardware vandalism software theft information theft

39.

A(n) is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network. A. B. C. D. Safeguard worm Encryption Virus

40.

In order to access controls to digital resources, we need to have a user name and password, a possessed object, and . A. B. C. D. a memory card a license agreement a biometric device an adapter card

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL PART B (40 MARKS)

CS/APR 2011/CSC133/134/434

QUESTION 1 Define the following : a) b) c) d) e) f) Touch screen. Memory. Digital literacy Packaged software Custom software Global positioning device (GPS) (12 marks) QUESTION 2 Briefly describe the following game controllers: a) b) c) gamepads light guns dance pad (6 marks) QUESTION 3 Define any THREE (3) ways for the proper care of an optical disc. (3 marks) QUESTION 4 List THREE (3) types of Operating System. (3 marks) QUESTION 5 Briefly explain the differences between Local Area Network (LAN), Metropolitan Area Network (MAN) and Wide Area Network (WAN). (6 marks) QUESTION 6 Define what hard disk is and list any TWO (2) characteristics of hard disk. (4 marks) QUESTION 7 There are thirteen types of Website. Briefly explain any THREE(3) types of web sites. (6 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL PART C (20 MARKS)

10

CS/APR 2011/CSC133/134/434

Choose only TWO (2) questions and answer in the answer booklet provided.

QUESTION 1 Faris has considered himself as a victim of unauthorized access and use of computer and devices. When he arrived to work one day, he noticed that his keyboard and mouse have been moved from the location he left in the previous day. Besides, his computer Web browser's history had shown that its listing sites are the sites that he never visited before. Therefore, he suspected that someone has used his computer while he is out of the office. Suggest FIVE (5) safeguard or precautions which he can apply to prevent the situation from happening again. (10 marks)

QUESTION 2 Application software is a computer software designed to help user to perform singular or multiple related specific tasks. It helps user to solve problems in the real world. Describe any FIVE (5) applications software that suits your need as a university student. (10 marks)

QUESTION 3 People uses computer mostly on their daily basis life. A computer allows them to accomplish many tasks needed. Briefly explain the following categories of users: a home user, a small office/home office user, a mobile user, a power user, and an enterprise user. (10 marks)

END OF QUESTION PAPER

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

Você também pode gostar