Você está na página 1de 4

ICT TEST FORM5 APRIL 2010

ANSWER ALL QUESTION. 1. __________ is a guideline for computer users. A. Computer Ethics B. Cyber law C. Moral philosophy D. Ethics 2. Which of the following statements shows an example of good ethics? A. Copying software without permission. B. Copying an original VCD for own use. C. Making copies of an original VCD for friends. D. Copying information from the Internet with the permission from the owner. 3. The cyber laws in Malaysia are include in these act & rule, which is wrong: A. Digital Signature Act 1997 B. Computer Crimes Act 1997 C. Telemedicine Act 1997 D. Multimedia Public Act 2010 4. Computer.is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. A. crimes B. fraud C. ethics D. attack 5. A teleprinter uses a ______ Bardout codes. A. 3bit B. 5bit C. 7bit D. 5 byte 6. What are the codes used by computers to send and receive information? A. Binary code B. Baudot code C. Input and output D. Morse code 7. ___________ was known as the first computation tool. A. Mark 1 B. Abacus C. Weaving Loom D. Apple Macintosh

8. In 1976, Steve Jobs built the first ________ computer. A. IBM B. Dell C. Microsoft D. Apple Macintosh 1 9. The microprocessor was invented during the __________ computer era. A. first generation B. third generation C. fourth generation D. second generation 10. Silicone chips were manufactured in ______ at the Silicone Valley. A. 1823 B. 1988 C. 1961 D. 1974 11. The latest invention in the new era of computers is: A. IBM B. Weaving Loom C. Apple Macintosh D. Robotic computers 12. Which is false? A. 1941 Mark 1 B. 200AD Abacus C. 1876 Pascaline D. 1620 Napiers Bone 13. __________ is the founder and the developer of apple macintosh. A. Steve Jobs B. John Bardeen C. William Mauch D. Blaise Pascal 14. Rechner was invented by_______. A. John Napier B. Charles Babbage C. Joseph Marie Jacquard D. Gottfried Wilhelm Von Leibniz 15. Charles Babbage invented __________. A. Abacus B. Napiers Bone C. Weaving Loom D. Mechanical Calculator Machine the

16. In ________, Eckert and Mauchly built the UNIVAC which could calculate at the rate of 10,000 additions per second. A. 1895 B. 1961 C. 1944 D. 1939

industrial processors, computer codes. A. Intellectual Property Right B. Copyright Act C. Trademark Law

program

17. Work created by inventors, authors and artists. Any product of human intellect that is unique and unobvious with some value in the market place. A. Intellectual Property Right B. Intellectual Property C. Copyright Act D. Trademark Law 18. Laws that covers ideas, inventions, literary creations, unique names, business models, D. Intellectual Property Law

24. Exclusive rights of authors and artists to duplicate, publish, and sell their material, protecting any tangible form of expression. A. Intellectual Property Right B. Intellectual Property C. Copyright Act D. Trademark Law 25. Protection of a companys logos and brand names. A. Intellectual Property Right B. Intellectual Property C. Copyright Act D. Trademark Law

19. This Act provides the environment for the future development and delivery of healthcare in Malaysia. A. Digital Signature Act 1997 B. Computer Crime Act 1997 C. Telemedicine Act 1997 D. Computer Hackers 1997 20. Which of the following is not in the Malaysias Cyber Laws? A. Digital Signature Act 1997 B. Computer Crime Act 1995 C. Telemedicine Act 1997 D. Computer Hackers Act 1997 21. The Electronic Government Bill is drafted to enforce electronic dealings between the government and the public. A. TRUE B. FALSE 22. The _________ is needed to secure electronic communications especially on the Internet. A. Digital Signature Act 1997 B. Computer Crime Act 1997 C. Communications and Multimedia Act 1998 D. Digital Mobile Act 1997

23. Transmitting data or messages illegally over computers is one of the common computer crimes existing on the Internet. A. TRUE B. FALSE 26. A node on a network can be a ______________ AVR A. Computer B. User C. Router D. Mouse 27. Of the three types of network, the _____________ covers the smallest area. LAN A. MAN B. WAN C. Internet D. TAN 28. In your school computer lab, __________________ is commonly shared. A. Hard disk B. Processor C. RAM D. Software

29. ____________ refers to the way a network is laid out. A. Access method B. Addressing C. Formatting D. Topology

B. the switch, hub, scanner and cables C. the modem, mouse, keyboard and printer D. the router, hub, server and network software 35. Which of the following is an example of physical transmission medium? C. Antenna A. Air D. Twisted-pair B. Vacuum 36. ________ refers to the use of computers to assist healthcare professionals in different locations to conduct live conference using the computer. A. Robotic B. Telemedicine C. Neural network D. Computeraided manufacturing 37. An example of network ____________. A. firewall B. padlock C. key lock D. serial number security is

30. Choose the correct diagram that shows star topology. . A. C.

B.

D.

31. In a ring topology data is transmitted in ____________direction(s). A. One B. Two C. Three D. Four 32. In a ______________ , computers can exchange and share information and resources. A. office B. network C. restaurant D. organisation 33. Modem stands for . A. Motivator/ Demotivator B. Modelling/ Demodelling C. Modulator/ Demodulator D. Modes/ Demonstrations 34. Other hardware components that are required for communications to work on a network are networking devices, such as A. the hub, switch, router and modem

38. _________ is a feature in a program by which someone can access the program other than by the obvious, direct call, perhaps with special privileges. A. Trapdoor B. Time bomb C. Trojan horse D. Malicious code 39. It is a program that spreads copies of itself through a network. A. Worm B. Trapdoor C. Time bomb D. Malicious code 40. For which of the following do we depend on computer technology? A. Checking our bank balance sheet B. Making our travel plan faster and easier C. Keeping our car system running properly D. All of the above

41. _________ means hidden writing, the practice of using to conceal text. A. Antivirus B. Data backup C. Anti Spyware D. Cryptography

46. ________ is able to damage a program and infects the way the computer works. A. A sudo B. A virus C. A system D. A libwrap 47. ________ uses two bytes (16 bits) to represent one character. A. APA B. ASCII C. EBCDIC D. Unicode 48. People go to government websites for the following purposes, EXCEPT to ___________ A. read online newspaper. B. check for MyKad status. C. check information on taxes. D. register online for IPTA/IPTS application. 49. Which one of these is similar to a byte? A. 8 bits B. 1 Megabyte(MB) C. 1 Terabyte (TB) D. 1 Gigabyte(GB) 50. A user is turning on a computer that has been completely powered off. The user is performing a_________________ . A reboot B hot boot C cold boot D warm boot

42. Most ________ programs also protects against worms and Trojan horses. A. firewall B. antivirus C. antispyware D. data backup 3 43. Data Backup is ___________________ A. used to store files. B. a programme of file duplication. C. a computer virus found on storage media. D. a copy of information that helps in losing a file.

44. In the process of installing new software, the installation automatically restarts the computer after prompting the user. This is called______________________ . A cold boot B install boot C warm boot D software boot 45. An antivirus program protects a computer against viruses by _________________________. A. reading the operating system and modifies it. B. installing a new virus through the data received. C. communicating and passing the information to the outsider. D. identifying and removing any computer viruses found on storage media, in the computer memory or incoming email files. Prepared by;

ALL THE BEST STUDENT

Checked by; . MISS FAIZA MOHAMED (ICT Form 4 Teacher)

. MR. TAUFIK HIDAYAT BIN HAMID (ICT Form 5 Teacher) Head of ICT Department

Você também pode gostar