Вы находитесь на странице: 1из 13

SULIT 3765/1

Section A
(36 marks)
Question 1 to Question 10
Instruction: For these questions, you are given four choices which are A, B, C and D.
Choose the best answers.
1. Most companies use __________________________ to protect network resources from
outsiders and to restrict employees access to sensitive data such as payroll or
personnel records.
A. firewall
B. antivirus
C. antispyware
D. cryptography
. An e!ample of output device is the __________________________ .
A. mouse
B. monitor
C. scanner
D. key"oard
#. $hich application software that ena"les users to create% edit% format and print te!tual
documents.
A. &raphic
B. 'resentation
C. (preadsheet
D. $ord 'rocessing
).
FIGURE 1
Based on the network illustrated in *igure 1% the central device that provides a
common connection point for nodes in the network is called _____________________ .
A. hu"
B. printer
C. file server
D. personal computer
+. A movie that com"ines audio% graphics and animation is still considered as a __________
______________ multimedia content since the user is a passive receiver of the content.
A. linear
B. graphic
C. animation
D. non,linear
3765/1 - 1 , SULIT
SULIT 3765/1
-. $hich of the following statement shows the result of practicing computer ethics.
A. &ood relationship "etween human "eings.
B. Motivating professional to steal others ideas.
C. Contri"uting to society with his or her knowledge.
D. 'roducing a wealthy professional with personal profit.
/. Marina spreads news that a foot"aller is receiving "ri"es "y using her "log we"site.
Marinas conduct is called _____________________________ .
A. 0acking
B. Cracking
C. &ossiping
D. (landering
1. Malicious software 2Malware3 is a term that can "e used to descri"e
4. $orms
44. (pyware
444. Backdoors
45. 6ro7ans
A. 4 and 44
B. 4 and 444
C. 4% 44 and 444
D. 4% 44% 444 and 45
8. Arrange the programming languages given "elow from the earliest generation to the
latest.
A. *9:6:A;% 'rolog% (<=
B *9:6:A;% (<=% 'rolog
C (<=% *9:6:A;% 'rolog
D 'rolog% (<=% *9:6:A;
1>. :amu wants to create a patient data"ase for a clinic. $hat are the fields re?uired for the
data"ase.
4. 'atient 4D
44. @ohn
444. Address
45. Cancer
A. 4 and 44
B. 4 and 444
C. 44 and 444
D. 444 and 45
Question 11 to Question 17
Instruction: Fill in the blank with the correct answers.
11. A criminal activity that is related to the use of computers is defined as ______________ .
1. Data that has "een processed and organiAed in a way that people find meaningful and
useful is called ______________________ .
1#. _______________________ is a collection of data organiAed in a manner that allows the
user to access% retrieve and use the data.
3765/1 - , SULIT
SULIT 3765/1
1). A ______________________ is a set of words% sym"ols and codes that ena"les human
to communicate with computers.
1+. Ali connects three computers in his office. 6he type of network that he used is called a
__________________ . Alis customer% David who lives in (ingapore connects his
computer to Alis new networks. 6his type of network is called a __________________ .
1-. A collection of __________ "its is called a "yte. A "yte represents a single ___________
in the computer.
1/. (oftware is a program which consists of a set of instructions that tells the computer how
to perform an operation. 6he two types of software are __________ and____________ .
Question 18 to Question 22
Instruction: Decide whether the given statements are True or False.
11. 'rivacy means that we have the right not to disclose our personal details. 2 3
18. 6he authentication technology using "iometric for e!ample 0and (canning involves the
measurement and analysis of the fingerprint. 2 3
>. An information system is a set of hardware% software% data% people and procedures that
works together to produce information. 2 3
1.
i. Bhairol must have a modem to access his email. 2 3
ii. Bhairol uses application software to ensure the file is virus free. 2 3
.
i. Artificial 4ntelligent is one of the technology that had "een introduced in fourth
generation. 2 3
ii. 0ardware technology such as silicon chips% microprocessor and storage devices
were invented during that evolution. 2 3
3765/1 - # , SULIT
Bhairol received an email with an attachment file from his friend who lives in
=ondon. 0e must ensure that the file is free from virus "efore he opens it.
(ince 18)1% it took a"out #> years for the first generation of computer to evolve to
the fourth generation. 6he growth of the computer industry has helped the
inventions of new computer technologies.
SULIT 3765/1
Question 23 to Question 2
Instruction: atch the following statements to the list or !ictures given.
#.
A ! "
# E
Match the statements "elow to the pictures given.
i. 6he device used to transform conventional images to the digital images. 2 3
ii. 6he device used to record voice. 2 3
iii. 6he device used to capture digital image. 2 3
).
Item $ro%rammin% &an%ua%e
' CCC
< @ava
: 'rolog
( Machine =anguage
6 Assem"ly =anguage
'A!&E 1
'a()e 1 shows a list of programming language. Match the item of the correct
programming language to the given statements "elow.
i. 6he source code is written in "inary. 2 3
ii. 6he programming language that inherits o"7ects. 2 3
iii. 6he programming language that makes computer thinks like human. 2 3
3765/1 - ) , SULIT
SULIT 3765/1
+.
Item Statement
'
Converts digital signals to analog signals and vice
versa.
<
Commonly used to connect signal of a =A;
contains multiple ports.
:
Adapter card that ena"les computer or device to
access network.
( Connects networks that use the same protocol.
6
Connects networks and transmits data to correct
destination on network.
'A!&E 2
'a()e 2 shows a list of hardwares. Match the correct items that represent the statement
that "est descri"e the hardwares given "elow.
i. Modem D ______________________________________
ii. :outer D ______________________________________
iii. ;etwork 4nterface Card D _________________________
3765/1 - + , SULIT
SULIT 3765/1
Section !
(20 *arks)
Instruction: "ection B consists of # questions. Answer all questions.
Question 1


3765/1 - - , SULIT
S
' U
$ Q R
E!ample
E!ample
SULIT 3765/1
FIGURE 2
a. *igure shows the "lock diagram of information processing cycle.
i. 4dentify : 21 mark3
ii. &ive +,E function of 6. 21 mark3

". 6he estract a"ove is a definition of 9perating (ystem. =ist '-+ e!amples of
9perating (ystem. 2 marks3
3765/1 - / , SULIT
9perating (ystem is a set of program that schedules tasks%
allocates storage and presents a default interface to the user
"etween applications.
SULIT 3765/1
Question 2
#IAGRA* 1
Diagram 1 shows how a computer runs a program. 4n this process% the codes are
translated into machine language "efore the program is e!ecuted.
a. &ive one e!ample of low,level programming language. 21 mark3
". (tate how . e!ecutes a program. 2# marks3
Question 3


FIGURE 3
Ahmadi is setting up a network in computer la" as shown in *igure #.

a. =ist two devices needed to set up the computer network. 2 marks3
". &ive the usages of a straight ca"le and a crossed ca"le. 2 marks3

3765/1 - 1 , SULIT
(ource Code
.
9"7ect 'rogram
2"inary machine
code3
SULIT 3765/1
Question /
Adam works as a manager in a finance company. 0e wants to send a top secret report
to Maria who is working in another "ranch. Adam asks =ina% his secretary% to send this
report to Maria. $hen =ina tries to read the report% she finds out that the report has
"een encrypted.
a. $hy does Adam encrypt the report. 21 mark3
". $hat is the term given to the encrypted te!t in the report. 21 mark3
c. $hat do Adam and Maria need to have in order to create and read the report.
2 marks3
Question
A group of foreign students are visiting your school. As the president of your school
Multimedia Clu"% you are asked to form a team to develop a pro7ect of an interactive
multimedia presentation to introduce your school to the visitors and other schools in your
state in future.
a. $hat is multimedia. 21 mark3
".
$0ase #escri1tion
F
6he multimedia developers interview the clients to find out their needs
and writes the pro"lem statement and a proposal.
G 6he multimedia developer will design a flow chart and story"oard.
H
6he multimedia developer will use a checklist to test the multimedia
program. 4f there are errors% he will fi! the program.
'A!&E 3
6a"le # shows the phases of multimedia development. 4dentify phases F% G%
and H "ased on the description given. 2# marks3
3765/1 - 8 , SULIT
Adam =ina Maria
'ro"lem Analysis
.
Coding
6esting and de"ugging
Documentation
SULIT 3765/1
SE"'I+, "
(1/ marks)
Instruction: $his section consists of three questions. Answer only TWO questions. %uestion
& is com!ulsory. Choose either %uestion ' or %uestion (.
Question 1

FIGURE /
*igure ) shows the five phases involved in program development. Based on the figure
a"ove% answer the following ?uestions.
a. (tate phase F. 21 mark3
". Descri"e +,E of the program development phases. 2 marks3
c. i. (tate +,E programming language other than 5isual Basic.
ii. ;ame +,E of the tools availa"le in 5isual Basic. 2 marks3
d. Draw a flowchart to show how a program calculates the area of a rectangle.
2 marks3
Question 2
:ead the situation "elow% then answer the ?uestions given.
(teven uses his computer daily. =ately he faces some system pro"lem. (ome of his files
keep on duplicating itself. 4t is pro"a"ly caused "y viruses. 4n order to solve this pro"lem%
he needs to install an antivirus software.
a. $hat is an antivirus software. 2 marks3
". &ive +,E e!ample of antivirus software. 21 mark3
c. (tate '-+ effects if a computer is infected "y viruses other than the one
mentioned a"ove. 2 marks3
d. (uggest '-+ ways to prevent a computer from "eing infected "y viruses. 2 marks3
3765/1 - 1> , SULIT
SULIT 3765/1
Question 3
Mr. 6an is the manager of 4BC Corporation. 0e wishes to computeriAe the management
in his company. 0e employs Mr. Bamal to develop a Management 4nformation (ystem.
a. (tate +,E usage of Management 4nformation (ystem that will "e used "y Mr. 6an.
21 mark3
".
FIGURE
Mr. Bamal will go through several phases to develop the system as shown in *igure
+. Descri"e phase F. 2 marks3
c. $hen the information system is implemented in 4BC Corporation% it will involve five
components% namely people% hardware% software% procedure and data. (how the
interrelation "etween information systems components using a diagram. 2 marks3
d.
FIGURE 6
*igure ) shows F is a field% G is a record in a ta"le. Define F and G. 2 marks3
3765/1 - 11 , SULIT
Design
4mplementation
6esting
F
Maintenance
Analysis
X
Y
SULIT 3765/1
Nama Calon:
3765/1 - 1 , SULIT
SULIT 3765/1
No. Kad Pengenalan - -
Angka Giliran
Question Answer Score
1 1

! !
" "
# #
$ $
% %
& &
' '
1( 1(
11 11
1 1
1! 1!
1" 1"
1# )i* 1#
)ii* 1$
1$ )i* 1%
)ii* 1&
1% )i* 1'
)ii* (
1& 1
1'
( !
1 )i* "
)ii* #
)i* $
)ii* %
! )i* &
)ii* '
)iii
*
!(
" )i* !1
)ii* !
)iii
*
!!
# )i* !"
)ii* !#
)iii
*
!$
3765/1 - 1# , SULIT

Вам также может понравиться