You are on page 1of 11

ICTL

Tingkatan 2
14 Oktober 2008
1 jam

SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH


TELOK MAS, 75460 MELAKA

FINAL EXAM – 2008

ICTL
TINGKATAN 2
1 jam

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO

Instruction:
Answer all questions in this question paper.

Prepared by: Checked by: Authorised by:

……………… ……………… ………………


(Murnizah Mokhtaruddin) (Hj. Abdul Aziz Mohd Yunos)
2

This paper consist 10 printed pages


SECTION A
Circle the best answer
(Question 1 – 20) 40 marks

1. Data inside a table of database is arranged by column name _______ and row
named ________.

A. Record, field

B. Field, record

C. Record, form

D. Field, bar

2. A database is made up of all the following components EXCEPT:


A. tables
B. Queries
C. Forms
D. formula bars

3. Suppose you'd like to set up a table in Microsoft Access to monitor your growing
collection of DVDs. In that table, each DVD will be entered as a:
A. record.
B. long integer.
C. Column
D. field

4. The number 487.52 should have a field type of:


A. String
B. Integer
3

C. Double
D. Boolean

5. Rosnah want to store the name, address and telephone number of all my friends. What
type of application program should Rosnah use?
A. Database
B. Word Processor
C. Graphics Program
D. Browser

6. Choose the correct hierarchy of data


A. bit, byte, field, record, database
B. bit, field, record, byte, database
C. bit, byte, record, field, database
D. bit, record, byte, field, database

7. A computer network must contain at least ________ computers.


A. one
B. two
C. twenty
D. hundred

8. Al-Fariq is a student at International Islamic University, Malaysia. He wants to


contact his parent in Dubai via electronic mail. Which type of network is involved in
the above communication?
A. Local Area Network
B. Metropolitan Area Network
C. Wide Area Network
D. College Area Network
4

Figure 1
9. Based on the network illustrated in Figure 1, the central device that provides a
common connection point for nodes in the network is called ___________________ .
A. hub
B. printer
C. file server
D. personal computer

10. Which hardware components are required for computer network?


I. Hub
II. UTP Cable
III. Crimping Tool
IV. Network Interface Card

A. I, II, III
B. I, II, IV
C. II, III, IV
D. All of the above

11. The risk to a bus network is that ____


A. the bus itself might become inoperable
B. the failure of one device usually affects the rest of the network
5

C. devices attached or detached at any point on the bus disrupt the rest of the
network
D. all of the above statements are true about risk to a bus network
12. A _____ is a high-speed network that connects networks in an area such as a
city or town and handles the bulk of communications activity across that region.
A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Metropolitan Area Network (MAN)
D. Variable Area Network (VAN)

13. Computer Networks is a __________________


A. special set of rules to connect devices
B. system of interconnected computers and peripheral devices
C. system that change analog signal to digital signal
D. system that transmits information in form of data through a
physical medium

14. Each electronic document on the Web is called a _____________ which can contain
text, graphics, audio and video.
A. World Wide Web
B. Unified Resource Locator
C. Web page
D. Web browser

X consists of all computers and other devices that are connected in a loop.
In X network each node directly connects to two neighboring nodes.
X network can be found in Local Area Networks.

15. ‘X’ is a description of a network topology. ‘X’ refers to:


A. Bus
B. Star
6

C. Ring
D. Hybrid

16. From the list below, which elements are required to form complete address or
Uniform Resource Locator (URL)?
I. Hypertext Markup Language
II. Protocol
III. Domain
IV. Directory
V. Document name

A. I, II, III and IV


B. I, II, IV and V
C. I, III, IV and V
D. II, III, IV and V

17. NETIQUETTE often include avoid these all things EXCEPT ….


A. Cross-posting
B. Using simple electronic signatures
C. Communicate to other people in chat room
D. Technique used to minimize the effort required to read a post

18. An example of output device is the ______________


A. mouse
B. monitor
C. scanner
D. keyboard

19. Identify which types of application software that enables users to create, edit, format
and print textual documents.
A. Graphic
7

B. Presentation
C. Spreadsheet
D. Word Processing
20. You want to get connected to the Internet. Which component that will allow you to
so?
A. Random Access Memory
B. Network Interface Card
C. Digital Versatile Disk
D. Chipset

SECTION B
Write True (T) or False (F) for the following statements
(Question 21 – 25) 10 marks

21. We need computer ethics and laws to guide users from misusing the computer.
Selling pirated software to a friend is an example of law breaking conduct. ________
22. A network links two or more computers together to enable data and resource
exchange. __________
23. User can send e-mail to friends in other countries using LAN. ___________
24. Netiquette is internet etiquette which someone will show bad behavior while using
internet. __________
25. Using search engines required us to spend much time to find the information that we
need. __________
8

SECTION C
Match the picture of network hardware component to their correct names below.
(Question 26) 10 marks

Modem/Switch/Hub

Network Cable

Wireless Access
Point

Network Interface
Card
9

Wireless Network
Interface Card

SECTION D
Fill in the blanks with the suitable answer.
(Question 27 – 37) 40 marks

27. Ali connects three computers in his office. The type of network that he used is called
a _______________________________. Ali’s customer, David who lives in
Singapore connects his computer to Ali’s new networks. This type of network is
called ______________________________ .

28. ____________________ refers to any laws relating to protecting the Internet and
other online communication technologies.

29. The ______________________________________ is formed by the protocol,


domain, directory and the document name.

30. HTML is stand for : ___________________________________________________

31. ASCII is stand for : ___________________________________________________

32. COBOL is stand for : __________________________________________________

33. There are 5 steps in programme development. Complete the steps:


a) _______________________
b) Design
10

c) Coding
d) _______________________
e) Documentation

34. Figure 2 shows network topology A and B.

Figure 2
Name
the

topology.
a) A - ____________________________
b) B - ____________________________

35. Give 3 examples of Search Engines.


a) ___________________________
b) ___________________________
c) ___________________________

36. Forum is an example of Internet Communication forms. Give another 3 examples of


Internet Communication forms.
a) ___________________________
b) ___________________________
c) ___________________________

37. Give 3 important peripherals that we use in Internet Communication.


a) ___________________________
b) ___________________________
11

c) ___________________________