Вы находитесь на странице: 1из 43

SET 1 ICT 07

SECTION A (36 MARKS)

8. Gaining the attention of the audience is important


in a multimedia presentation. This can be
achieved by
A. using colourful texts
B. inserting a lot of graphics
C. displaying all the content in one page
D. keeping your message as simple as possible

Questions 1 - 10
For each of the questions, read the question first
and choose the best answer. Write A, B, C or D in
the spaces provided in Answer Sheet 1A.
1. Which of the following helps people
to protect privacy?
A. Use authentic software.
B. Use public computer.
C. Use pirated software.
D. Use shared program.

9. Choose the correct hierarchy of data


A. bit, byte, field, record, database
B. bit, field, record, byte, database
C. bit, byte, record, field, database
D. bit, record, byte, field, database
10. Which of the following are types of
information system
I. Decision Support System (DSS)
II. Executive Information System (EIS)
III. Transaction Processing System (TPS)
IV. Manager and Staff Information System
(MSIS)

-Act of stealing computer equipment


-Act of stealing or illegally copying software
2. The activities above are categorized as
A. computer theft
B. computer fraud
C. computer attacks
D. copyright infringement

A. I and II
B. I, II and
III

3. Organizations create tables with


arithmetic
function to calculate the average of sales
per annum by using this type of software
A. graphics
B. presentation
C. spreadsheet
D. word processing

Questions 11 to Question 12 are given in


the form of statements. Write True or False
in the spaces provided in Answer Sheet 1A.
11.
i) Authentication is important in order to
safeguard against unauthorised access and
use.
ii) RAM is a non-volatile storage.

4. A computer network must contain at least


computers.
A. on
e
C. twenty

B. two

iii) ROM chips hold the program and data that the
CPU is presently processing.

D. hundred

5. Which of the following connection methods


would not be used to connect devices between
two different offices?
A. infrared
B. fiber-optics
C. twisted pairs
D. coaxial cables

12.
i) Communication systems are electronic systems
that transmit data from one location to another.
ii) A computer program is a set of instructions that
directs computer to perform tasks.
iii) High Level Language is machine-dependent
and runs on one type of computer only.

6.
A.
B.
C.

Object-oriented programming
is a type of machine language
is a type of assembler language
converts source code into machine
code
D. allows you to interact with objects
when coding software

13. Table 1 shows several terms of computer crime


Match the statement with the given answers.
A.

7. Authoring tools uses the


following concepts.
I. Card concept
II. Icon concept
III. Multiple concept
IV. Time frame
concept
8. I and II
9. I and III
10. I, II and III
11. I, II and IV

C.. I, and II and III


D. I, II, III and IV

Theft
B.
C.

Hacking
TABLE 1
Maliciou
s code
D. Natural
disaster
i) Someone tries to access a computer or
network illegally.
ii) Floods and earthquakes can contribute to
computer systems destruction.
1

iii) A program with intention


to prohibit a normal
routine of a computer
system.

SET 1 ICT 07
14. Table 2 shows several application software.
Match the statement with the given
answers.
A. Spreadsheet
B. Presentation
TABLE 2
C. Word Processing
i)

Salesmen use this software to demonstrate


products and encourage customers to
make purchases.
ii) This software is designed to enable users to
create and print textual documents.
15. Match the statement with the given answers.
A. Problem Analysis
B. Program Design
C. Coding
i)
translates pseudo codes
or flowcharts into programming
language.
ii)
to identifies input, output
and processing requirements.
16. Match the various fields in Multimedia with
the statements below.
A. Entertainment
B. computer
Medical games and develop
i) Produce
C.
Engineering
special effects
ii) View the design from many aspects and
improve
on it before production
Questions 17 - Question 25
Write your answers in the spaces provided in
Answer Sheet 1A.
17.

18.

refers to rights of
individuals and companies to restrict collection
and use of information about them.
refers to any laws relating to protecting
the Internet and other online
communication technologies.

19. Speakers and headphones are classified as


devices while joysticks and trackballs are
classified as
devices.
20. The standard protocol for the Internet is
21.

is an expansion card that


2.
connects a computer to a network.

22. Multimedia applications can be delivered


through
and
.
23. Adobe Photoshop is application software which
can be used to edit
.
24. Data manipulation in a database management
system consists of basic operations such as
.

SECTION B (20 MARKS)


BAHAGIAN B (20 MARKAH)
Answer all questions.
Jawab semua soalan.
1.

Ahmad likes to access the internet. One day, while


surfing the internet, his computer starts to run a little
weird. He noticed that the modem LEDs were blinking
even after he has stopped surfing. His system seemed to
get slow and suddenly reboots. Ahmad is sure that
somebody has logged onto his computer.

FIGURE 1
Ahmad gemar melayari internet. Pada suatu
hari,
semasa Ahmad sedang melayari internet, beliau
mendapati komputer beliau tidak laju seperti biasa.
Beliau juga mendapati bahawa LED pada modem
berkelip walaupun beliau tidak lagi melayari internet.
Komputer beliau juga reboot. Ahmad pasti terdapat
pengguna lain yang telah memasuki sistem komputernya.

RAJAH 1
Based on Figure 1, answer the following question:
Berdasarkan Rajah 1, jawab soalan-soalan berikut:
(a) State what kind of computer threat is mentioned
in the situation above?
Nyatakan jenis ancaman komputer
(1 mark)
yang disebutkan dalam situasi di
atas.
(b) Give ONE effect of the threat in (a) to Ahmads
data..
Berikan SATU kesan akibat ancaman yang di
(a) kepada data Ahmad

(1 mark)
(c) State TWO things that Ahmad can do to enhance
the security of his data while accessing the
Internet.
Nyatakan DUA perkara yang boleh dilakukan
oleh Ahmad untuk
meningkatkan lagi keselamatan data beliau s
emasa melayari internet.
i.
ii
(2 mark)
Ali works as a clerk in a school. He uses a keyboard
to key-in all the schools data into the computer. He
saves all the data as a backup in Device X. At the
end of every month, he will send a printed report to
the school principal.
Ali bekerja sebagai kerani di sebuah sekolah.
Ketika menggunakan komputer,beliau
menggunakan papan kekunci untuk memasukkan
semua data berkenaan sekolah tersebut . Beliau
membuat data sandaran ke dalam peranti X. Pada
setiap hujung bulan beliau akan menghantar
laporan bercetak kepada pengetua.

25. In database management system,


is a request for specific data from a database.

SET 1 ICT 07
Based on the situation given, answer the following
4.
question:
As a project
manager in EZ Creative Production Company, Ashraf has been assigned to develop a multimedia production to advertis
Berdasarkan situasi yang diberi, jawab soalan-soalan
berikut: projek di Syarikat EZ Creative, Ashraf ditugaskan untuk membangunkan produksi multimedia untuk mengiklankan
Sebagai pengurus
(a) Based on the situation above, name the input
device and output device that Ali used.
Berdasarkan situasi di atas, apakah peranti
inputdan peranti output yg digunakan oleh Ali.
i) Input device :
Peranti input :
ii) Output device:
Peranti output :
(b) Give two examples of Device X.
Berikan dua contoh peranti X.

(2 marks)
(2 mark)
(2 mark)

(2 marks)
3.
As a information technology coordinator in Samudera
Smart School, Samsun has been told to submit a
project paper on Digital Resource Center. The project
will be implemented in his school soon. The project
paper will show the phases and features in information
systems development. It will help his principal have the
overview of the whole project.
Sebagai penyelaras teknologi maklumat di Sekolah
Bestari Samudera, Samsun ditugaskan untuk
menghantar satu kertas kerja mengenai Pusat Sumber
Digital. Projek tersebut akan
dilaksanakan
di
sekolahnya dalam masa terdekat. Kertas kerja itu akan
menunjukan fasa-fasa dan fitur-fitur di dalam
pembangunan sistem pengurusan pusat tersebut. Hasil
penulisannya akan membantu pengetua sekolahnya
mendapat pandangan awal keseluruhan projek.

Based on the situation given, answer the


following question:

Based on the situation given, answer the following


question:
Berdasarkan situasi yang diberi, jawab soalan-soalan
berikut:
(a) i.
Name a team member that
Ashraf did not include in his multimedia
development team. Namakan ahli yang
tidak dilibatkan oleh Ashraf di dalam
kumpulan pembangun
multimedia tersebut.
(1 mark)
a.
b.
ii.

State the role of the team member you


stated in (i)
Nyatakan peranan ahli yang anda nyatakan
dalam (i)
(1 mark)
a.
b.

(b)

nt
not
Berdasarkan situasi yang diberi, jawab soalan-soalan
berikut:
(a)
Name second phase in developing the
project
above.
(1 mark)
Namakan fasa kedua dalam membangunkan
projek dinyatakan di
atas.
(b)

(c)

included in the above production.


Namakan elemen multimedia yang
tidak dimasukkan di dalam produksi di
atas.

State two database objects or tools that


should be stated in the project
(2 mark)
above.
Nyatakan dua objek atau alat pangkalan data
yang seharusnya dinyatakan di dalam projek
di atas.
i)
ii)

5.

Give one benefit of implementing the


project above.
Berikan satu kelebihan perlaksanaan projek
di atas.

(1 mark)

(1 mark)

ii) Give one example of hardware that can be


used to in (b)(i).
Berikan satu contoh perkakasan yang
boleh digunakan untuk (b)
(1 mark)
(i).
Davidson is the manager of DMart, a sports equipment
shop in Kota Tinggi. To increase the sale for the month of
September, he has decided to offer a discount of 10 percent
to all his customers who spend more than RM 100 on an
item. Davidson needs a program to calculate the total sale
for the customers after deducting the offered discount. As
an ICT student, you are asked to develop the program and
create users manual in Phase X.
Davidson adalah pengurus DMart iaitu kedai barangan
sukan di Kota Tinggi. Bagi meningkatkan jualan pada bulan
September, Davidson bercadang untuk
memberikan
diskaun ke atas mana-mana barang yang bernilai lebih dari
RM 100 bagi satu item. Beliau memerlukan satu program
untuk membantu beliau mengira jumlah harga barangan
yang dibeli setelah ditolak diskaun. Sebagai pelajar ICT,
anda diminta membangunkan program tersebut dan
menghasilkan manual pengguna di dalam fasa X.

SET 1 ICT 07
Based on the situation given, answer the following
question:
Berdasarkan situasi yang diberi, jawab soalansoalan berikut:
(a)
What is the problem statement for the
above situation?
Apakah pernyataan masalah bagi situasi di
a tas?

Setempat (LAN): LAN A dan LAN B yang merupakan


sebahagian daripada Sistem Rangkaian Luas (WAN) bank
tersebut. Pihak bank baru melaksanakan dua komunikasi
rangkaian. Selain dari Internet, pihak bank juga mempunyai
intranet untuk komunikasi peringkat dalaman. Mereka
merancang untuk membangunkan extranet sebagai
komunikasi rangkaian ketiga dalam jangka waktu terdekat.
Based on Figure 1,
Berdasarkan Rajah 1,

(1 mark)
(b)

(c)

(a) Explain two differences between the two


computer network types of the bank.
Jelaskan dua perbezaan di antara dua
jenis rangkaian komputer bank tersebut.

State the items for the program that you


are going to develop.
Nyatakan item yang terkandung
dalam program anda.
i)
Input Item
:
Item input
ii)
Output item
:
Item output
(2 marks)

(2 marks)

State phase X.
Nyatakan fasa X.

(b) Explain two differences between LAN A topology


and LAN B topology.
Jelaskan dua perbezaan di antara topologi LAN
A dan topologi LAN B.

(1 mark)
SECTION C (14 MARKS)
BAHAGIAN C (14
MARKAH)
Answer Question 1.
Jawab Soalan 1.

(2 marks)
(c) Explain two differences between two
current network communications in the
bank.
Jelaskan dua perbezaan di antara dua
komunikasi rangkaian yang sedang digunakan di
bank sekarang.
(2 mark)

1.

(d) Use a specific example to explain the proposed


network communication.
Gunakan contoh khusus untuk menjelaskan
komunikasi rangkaian yang dirancang di atas.
FIGURE 1
RAJAH 1
Figure 1 shows a computer network at Cyclone Bank. The
network consists of two Local Area Network (LANs): LAN A
and LAN B which are part of the bank Wide Area Network
(WAN). Currently the bank implements two network
communications. Apart from the Internet, the bank also has
its own intranet to facilitate their internal communications.
They are looking to set up extranet as the third form of
network communication in the near future.

Rajah 1
menunjukkan
rangkaian

(1 mark)

komputer di Bank Cyclone. Rangkaian ini mengandungi


dua Sistem Rangkaian

SET 1 ICT 07
2. Figure 2 shows five components that support
Salary Payment Information System (SPIS)
of Green Technology Company
Rajah 2 menunjukkan lima komponen yang
menyokong Sistem Maklumat Pembayaran
Gaji (SMPG) bagi Green Technology Company.
User
Pengguna

Hardware
Perisian

Rajah 3 menunjukkan sebahagian


daripada komponen sistem komputer

Data
Data

Software SMPG User Manual Manual Pengguna SMPG


Perisian
FIGURE 2
RAJAH 2
2 Based on Figure above,
Berdasarkan Rajah di atas,
(a) Explain the relationship between user
and hardware.
Terangkan hubungan antara pengguna dengan
perkakasan.
(1 mark)

(b) Describe two benefits of SMPG to


Syarikat Maju Berhad.
Jelaskan dua faedah SMPG kepada
Syarikat Maju Berhad.

(2 mark)

(c) State two possible threats on the security


of SMPG.
Nyatakan sekurang-kurangnya dua perkara yang boleh
mengancam keselamatan SMPG.

(2 mark)

(d) Explain two effects of the security threats


as stated in (c)
Terangkan dua kesan ancaman
keselamatan yang dinyatakan dalam (c)

(2 mark)

3. Figure 3 shows the some of the components of


a computer system.
5

Based on Figure 3, answer the following questions.


Berdasarkan Rajah 3, jawab soalan-soalan yang
berikut.
a) Draw a block diagram to illustrate the
information processing cycle and give a brief
description.
Lukis gambarajah blok untuk
menggambarkan kitaran
pemprosessan
maklumat dan
berikan
penerangan ringkas mengenainya.
(2 mark)

_
_

SET 1 ICT 07

_
_

(2 mark)

a) Explain two differences between M and N.


Terangkan dua perbezaan di antara M dan N.
M
_
_
_
_
N
_
_
_
_

(2 mark)

b) Explain the difference between O and P.


Terangkan perbezaan di antara O dan P.
O
_
_
_
_
P
_
_
_
_

(1 mark)
END OF QUESTION
SOALAN TAMAT.

b) Explain two differences between G and H.


Terangkan dua perbezaan di antara G dan H.
G
_
_
_
_
H

SET2 ICT 2007


SECTION A

8. Computer Networks is a
.. A special set of rules
to connect devices
B system of interconnected computers and peripheral devices
C system that change analog signal to digital signal
D system that transmits information in form of data through a
physical medium

Question 1 to 10
1. Information refers to
A. An act of transmitting messages
B. the knowledge obtained from reading, investigation, study
or research.
C. the use of scientific knowledge, experience and resources
to create processes and products that fulfill human needs
D. the technology required for information processing, in
particular, the use of electronic computers,
communication devices and software applications to
convert, store, protect, process, transmit and retrieve
information from anywhere, anytime

9. Which is from the following statements is not true


about networks ?
A People in various places can be connected using a network.
B Networking technology allows banking to be done everywhere
and at any time.
C We cannot do a long distance communication using a network
D A network links two or more computers together to enable
data
and resource exchange.

2. Charles Babbage invented the


A. Abacus
C. Weaving Loom

.
B.Napiers Bone
D. Mechanical Calculator Machine

10.

3. Which of the followings are the similarities between ethics and


law?
I. to prevent any crime
II.as a rule to control computer users III.to
guide user from misusing computers
IV. to create a healthy computer society, so that computers are
used to contribute to a better life
A. I, II and III
B.II, III and IV
C. I, III and IV
D.All above

-Cover a small region of


spaces Meliputi kawasan
kecil
-The range of speed is between 10mbps to 100mbps
Kadar kelajuan adalah diantara 10mbps hingga 100mbps

The statements above refers to.


A LAN
B.MAN
C. WAN

Write T for true statements and F for false statements.

4. Verification is
.
A.The act of proving or disproving the correctness of a system
with respect to a certain formal specification
B.Process where users verify that they are who they say they are
C.The scanning of retina and analysing the layer of blood vessels
at the back of the eye
D.The measurement and analysis of the shape of ones hand

11.

A WAN is a network that covers a large


geographic area using a communication
channel that combines many types of
transmission media such as telephone lines,
cables and radio waves.

12.

6. The three main types of secondary storage are .


A. CD, DVD and DVDRW
B. ROM, RAM and hard drive
C. hard disk, floppy disk and pen drive
D. magnetic medium, optical medium and flash memory

A computer can function properly without


application software.

13.

A compressed file must be unzipped or restored


to its original form before being used.

7. An operating system is

14.

Trademark Law is a protection of a companys


logos and brand name.

15.

Changing computer programming codes with


permission is unethical.

5.A headphone is a/an


A. input
B. output

device.
C. storage

D. process

A. a program designed to assist users with


personal task
B. a program that allows a user to perform
maintenance type task
C. a program that control or maintain the
operations of a computer and its device
D. a set of programs that coordinates all the
data transmissions among computer in a
network
Match the picture with the correct statement.
Technology

D. Intranet

Year

1
2

SET2 ICT 2007


16.
(A)
In 1925, television
was made known
to public.

25. Answer statements A and B according to situation below.


I.Operating systems that allow the network to centralise
functions and applications in one or more dedicated file servers.

II.Serves extended enterprise, including defined sets of


customers or suppliers or other partners.

17.
(B)
In 1941, the
computer was
created.

SECTION B
QUESTION
1
Look at the picture below and answer the questions that follow.

18.
(C)
In 3500 BC, the
Sumerians
developed
cuneiform writing.

19.
In 1876, the first
telephone was
introduced.
(D)

Define pornography

(2 scores)

I.

20.

II. Give two impacts of pornography on Malaysian society.


a.

In 1500 BC, the


Phoenicians
developed the
alphabet.
(E)

b.
QUESTION 2

Computer Security

I. Complete the diagram below


Fill in the blanks.
21. Give five common type of network communications channels
:
I.
II.
III.
IV.
V.
22. Controversial content is information that causes
among people who have different
, moral and
23. Retinal

biometrics
involves
of
retina
and
analyzing
the
at the back of the eye.

the
layer

a.
.

Software and Data

b.

of

24. A computer system requires four main aspects of data handling to


function properly which are input,
,
and
II.Give two examples of computer threats.
a.
b. (2 scores)

Rearrange the steps in scanning antivirus below.


A.scan the selected file
B. choose an antivirus program
C. wait while the program is scanning and the result is produced
D.select file that need to be scanned

QUESTION 3

1
3

SET2 ICT 2007


QUESTION 5

Based on figure below, answer the following questions.


I. Name the types of computer networks below.

( 4 scores )

b.

a.

QUESTION 4
I. Define computer
system

( 2 scores )

II.Give two differences between above computer networks.


a.
b.
( 2 scores )
SECTION C
Instruction : Question 1 is compulsory AND answer
either Question 2 or Question 3.

( 2 scores )
II. Draw a block diagram and describe the information processing
cycle which includes input, process, output and storage.

Question 1 (COMPULSORY)
An Audio-Visual Room has been equipped with 10 computers
and a hub. As an ICT coordinator, you are required to set up a
small network in the room. ( 2 scores)
a) Sketch the topology for the room.

b)

Give three advantages of using a networking rather


than a stand-alone pc. ( 3 scores)
I.

II.
III
BLOCK DIAGRAM
( 2 scores )

c)

Define the network communication technology of


Extranet.
[2 scores]

Question 2
Figure 1 shows some of the components of a computer
system.
Figure
1

1
4

SET2 ICT 2007


C) Give two sub components in a central processing unit
I.
II

[2 scores]

D)Give two differences between I and J.


Primary storages

Aspects

Secondary storage

I.

II.

[2 scores]
Question 3
Maria just won a set of personal computer. The personal computer
is without any system software.
1.

What is the most importance system software, so that


the personal computer can be used.
[1
score]

2.

[1
score]

Based on Figure 1, answer the following questions.

a)

Virus can be scanned using antivirus software. What


type of system software used.

3.

State the meaning of input

List three popular operating system platforms.


(a)
(b)
(c)

[3 scores]
4.

State two differences between operating systems


and utility programs.
Operating system
Utility program

[1 score]
b)

List two type of output. [2 scores]


I.
II.

[2 scores]

1
5

SET2 ICT 2007


~ END OF QUESTION PAPER ~

1
6

SET3 ICT 2007


SECTION A - ANSWER ALL THE QUESTIONS.(36 marks)
Instruction : Circle the correct answer ( No 1 12)
1.

is any data or instruction you enter into the memory of a


computer.
A. Input B. Output
C. Process
D. Storage

2. The spreadsheet feature that blocks users from modifying or


erasing information in a worksheet is called
A lock. B shield.
C blocker.
D protection.
3. When you press a key on a board, the electronic signal is
converted into a binary form that the computer can process and
stored in?
A. Memory
B. Character code
C. Computer code
D. Morse
4. Camcorders and other video equipments use a to transmit
data onto a computer.
A. USB Port
B. Serial Port
C. Parallel Port
D. FireWire Port
5. A is designed to connect the system unit to a musical
instrument, such as an electronic keyboard.
A. MIDI port
B. IrDA port
C. SCSI port
D. FireWire Port
6. For wireless devices to transmit signals to a computer, both the
computer and the device must have a
A. MIDI port
B. IrDA port
C. SCSI port
D. FireWire Port
7.

can transfer information between their mobile devices to


another computer.
A. SOHO users
B. Power users
C. Mobile users
D. Large business users

8. What is the function of Macro?


A Returning a value from the same table.
B Solving tasks that contain lengthy lists.
C Making use of shortcut keys.
D Automating complex tasks and reducing the number of steps
required to complete tasks that are performed frequently.

12. The Central Processing Unit (CPU) controls the operation


of the computer. It .
A. connects the cable to the ports
B. carries out the basic hardware function
C. interprets and carries out the basic instructions that operate a
computer
D. is the socket, where the circuit boards or the adapter cards
can be inserted into the motherboard
Fill in the blank with the correct answer. (No.13 17)
13. Computer fraud is defined as the use of computer with
to get advantage or causing loss to other
people mainly on monetary basis.
14
can transfer information between their mobile
devices to another computer.
15. A computer system requires four main aspects of data handling
to function properly which are input devices, processor,
, and storage devices.
16. The CPU is an example of a
importance as the brain to human beings.

17. A is defined as combination of components designed to


process data and store files.
Instruction: Match the correct answer. (No.18 21)

18.

11. An audio output device can produce


I. music
II. image
III.speech
A. I and II
B. II and III
C. III and IV
D. I, III and IV

A.
Fetch

B.

19.
Execute

20.

Stores the results in an


internal register (a temporary
storage location or in
memory).

C.

Determines what the program


is telling the computer to do.

21.

D.
program FALSE
STATEMENT Retrieves the nextTRUE
Decode
instruction from the computers
22. An extranet is a private network
memory.that
uses Internet technology and the
Instruction:
Choose either True
or False.
public telecommunications
system.
23.

With e-banking, most of the


transactions can be done at home or

IV. sounds

from the office only during banking


hours.
24.

LAN is an acronym for Large Area


Network.

Performs the requested instruction,


such as adding two numbers or
deciding which one of them is
larger.

Store

9. What are the codes used by computers to send and receive


information?
A. Binary code
B. Baudot code
C. Input and output
D. Character code
10.
Selvi is having a video conference with her colleagues
in India. The most suitable input devices are ..
I. monitor
II. Speaker
III. webcam
IV. microphone
A. I & II
B. II & IV
C. II, III & IV
D. All the above

. It has the same

25. A server
needed in a peer-to-peer
Question
2 ( 4 ismarks)
Instruction:
network.
Label the diagram correctly
26.

For communications across the


Internet, we need to have
protocols to demonstrate how data
should be packaged and sent.

27.

ROM and Hard disk are examples of


secondary storage.

28.

RAM is non-volatile.

29.

Microsoft Windows is an example of


application software.

30.

Open source software usually comes


without warranty and support should
the software fail or malfunction.

31.

Computer threats can come in many

Question 3 (Students Copy)

ways either from human or natural


disasters such as fire, flood,

A
gives authors and artists exclusive rights
to duplicate, publish or sell their materials.

earthquakes, storms and tornados.


32.

Proxy gateway is one of the types of


Data Backup program.

33.

are capable of disabling filters and gateway


software of computer system.

Virus signature and inoculate a


program file are the techniques that
are used to identify a virus.

34.

A
includes any activities taken to disrupt the
equipment of computer systems, change processing control, or
corrupt stored data.

A computer system is only referring to


the monitor, keyboard, mouse and
central processing unit (CPU).

35.

Hidden writing, the practice of using password to conceal text.

Microprocessor speeds are


determined by their clock speed.

36.

Paedophiles are people who exploit


children for sexual pleasure.

SECTION B (20 marks)


Question 1 (4 marks)
Below is a list of step which shows how a BIOS works.
a)
b)
c)
d)
e)

Turn

the PC
read instructions from BIOS.
Instructions in BIOS tell the computer how to access
the
Instructions in BIOS tell the computer for to find the
operating system.
Load the operating system to

SET4 ICT 2007


SECTION A (36 MARKS)
BAHAGIAN A (36 MARKAH)
Answer all questions.Jawab semua soalan.
For Question 1 to Question 10, each question is followed by a
number of options. Choose the best answer and write A, B, C or
D in the spaces provided in Answer Sheet 1A.
Bagi Soalan 1 hingga Soalan 10, tiap-tiap soalan diikuti oleh
beberapa pilihan jawapan. Pilih jawapan terbaik dan tulis A, B,
C atau D di ruang yang disediakan pada Helaian Jawapan 1A.
1 Cik Masita obtained the exclusive legal rights for the
distribution and sale of the CD-ROM. This is associated with
Cik Masita mendapat hak eksklusif yang sah di sisi undangundang untuk mengedar dan menjual CD-ROM. Perkara ini
dikaitkan dengan,,,
A piracy cetak rompak
B privacy rights hak kebersendirian
C copyright hak cipta
D patent Paten
2 Suhana spreads a rumor that a Minister is receiving bribes.
Suhanas conduct is called
Suhana menyebarkan khabar angin bahawa seorang Menteri
menerima rasuah. PerbuatanSuhana dikenali sebagai
A Hijacker Perampas
B Slander Fitnah
C Cracker Memecah kata laluan D Hacker Penggodam
3 Al-Fariq is a student at International Islamic University,
Malaysia. He wants to contact his parent in Dubai via electronic
mail. Which type of network is involved in the above
communication?
Al-Fariq merupakan seorang pelajar di Universiti Islam
Antabangsa, Malaysia. Dia ingin menghubungi keluarganya di
Dubai melalui mel elektronik. Jenis rangkaian yang manakah
terlibat dalam komunikasi di atas?
A Local Area Network Rangkaian Kawasan Setempat
B Metropolitan Area Network Rangkaian Kawasan Metropolitan
C Wide Area Network
Rangkaian Kawasan Luas
D College Area Network Rangkaian Kawasan Kolej

7 Why do we need to backup our data ?


Mengapakah kita perlu membuat salinan data ?
I To ensure that our data can still be used if the original is
corrupted
Untuk memastikan data kita boleh digunakan jika berlaku
sesuatu terhadap data asal.
IITo ensure our files, program or disk that can be used if the
original source is lost, damaged or destroyed.
Boleh menggunakan fail, program atau cakera yang telah
disalin jika sumber asal rosak hilang atau musnah.
III To prevent our files or program from malicious software
Menghalang fail atau program daripada perisian yang
tidak dikehendaki.
IV To protect our files from viruses .
Menghalang fail daripada virus.
A I and II
B I and III
C I, II and III
D I, II and IV
8 Below are steps for scanning viruses. Arrange the steps in
sequence.
Berikut merupakan langkah-langkah untuk mengimbas virus.
Susun langkah mengimbas mengikut urutan yang betul.
I Scan the selected
file Imbas fail yang telah dipilih
IIChoose an antivirus program
Pilih program antivirus
III Wait until the scanning process is finished and the result is
displayed Tunggu proses pengimbasan sehingga selesai
IV Select files or folders that need to be scanned
Pilih fail atau folder yang hendak diimbas
A IV, II, I and III B III, I, II and III
C II, IV, I and III D I, II, III and IV
9 Mail merge allows users to create personalized
Cantuman mel membenarkan pengguna
menghasilkan I Letters
Surat II Labels Label
III Voices Suara
IV Envelopes Envelop
A. I, II, III
B. I, II, IV
C. II, III, IV
D. All the above

4 What is data? Apa itu data?


A The facts of the information.
Fakta maklumat
B The collection of information
Koleksi maklumat
C The collection of raw unprocessed facts, figures and symbols.
Koleksi data-data, rajah-rajah dan symbol-simbol yang belum
diproses.
D The information which had been processed as something
meaningful.
Maklumat yang telah diproses dan menjadi bermakna.

10 Which hardware components are required for computer


network?
Komponen perkakasan yang manakah diperlukan dalam
rangkaian komputer?
I Hub
Hab
II UTP Cable
Kabel UTP
III Crimping Tool
Peralatan Crimp
IV Network Interface Card Kad Antaramuka Rangkaian
A I, II, III
B I, II, IV
C II, III, IV
D All of the above

5 Windows XP, Macintosh OS X, and Linux are examples of


Windows XP.
Macintosh OS X dan Linux adalah contoh-contoh bagi
A Application software
Perisian aplikasi
B Web browsers
Penggelintar Internet
C Operating systems
Sistem
pengoperasian D Shareware program
Perisian Kongsi

Question 11 to Question 13 are given in the form of


statements. Write true or false in the spaces provided in
Answer Sheet 1A.
Soalan 11 hingga Soalan 13 diberi dalam bentuk pernyataan.
Tulis benar atau palsu di ruang yang disediakan pada
Helaian Jawapan 1A.
11 James wants to send a file to Wong using electronic mail
services. He must ensure that the file is free from virus before it
is sent.
James ingin menghantar fail kepada Wong dengan
menggunakan perkhidmatan mel elektronik. Dia mesti
memastikan bahawa fail itu bebas daripada virus sebelum
dihantar.

6 A communication system connecting two or more computers


is called
Sistem komunikasi yang menghubungkan dua atau lebih
komputer dikenali sebagai
A Multitasking
Pelbagai tugas B Network Rangkaian
C System unit
Unit Sistem
D Protocols Protokol

(i) James uses an application software to ensure the file is virusfree before it is sent.
James menggunakan perisian applikasi untuk memastikan fail
itu bebas daripada virus sebelum dihantar.
(ii)Communication between James and Wong is text-based.
Komunikasi antara James dan Wong adalah berasaskan teks.

SET4 ICT 2007


12
Salimah learns to use HTML scripting to develop web pages.
Salimah belajar menggunakan skrip HTML untuk
membangunkan laman web.
(i) She uses a text-based web editor.
Dia menggunakan editor laman web berasaskan teks.
(ii)She uses hyperlinks to link other pages in the website. Dia
menggunakan hyperlink untuk menghubungkan lamanlaman lain pada tapak web tersebut.

16
The pictures below show the types of user-interface.
Match the pictures with the correct name given.
Gambar berikut menunjukkan jenis-jenis antaramuka pengguna.
Padankan gambar dengan nama yang betul.
i

13

The following statements refer to computer generations.


Berikut adalah pernyataan merujuk kepada generasi computer.
(i) Vacuum tube is used in second generation computer.
Tiub vakum digunakan dalam komputer generasi kedua.
(ii)Artificial Intelligence is one of the technologies that is being
used in fifth generationcomputer.
Kecerdikan Buatan adalah salah satu teknologi yang digunakan
dalam komputer generasi kelima.
Ii

14
Table 1 shows several terms in a computer system.
Jadual 1 menunjukkan beberapa terminologi dalam sistem
komputer.
A
Input Device Peranti Input
B
Secondary Storage Device
Peranti Storan Sekunder
C
Command-Line User Interface
Antaramuka Arahan Baris
D
Word Processing Software
Perisian Pemproses Perkataan
TABLE 1
JADUAL 1
Based on Table 1, write A, B, C or D for the following question.
Berdasarkan Jadual, tuliskan A, B, C atau D untuk soalan
berikut.
(i) Ali wants to continue his assignment later. He wants to save
his assignment. What device should Ali use? Ali hendak
menyambung tugasannya kemudian. Dia hendak menyimpan
tugasannya.. Apakah peranti yang akan digunakan oleh Ali?
(ii)Shalini wants to create and manipulate documents containing
text and graphics. What type of program should Shalini use?
Shalini hendak menghasilkan dan manipulasi dokumen
mengandungi teks dan grafik. Program apakah yang patut
digunakan olehnya?
(iii) Type commands or press special keys on the keyboard to
enter data and instructions that instruct the operating system
what to do. It has to be typed one line at a time.
These statements refer to?Taip arahan atau tekan kekunci
khas untuk memasukkan data dan arahanyang akan
mengarahkan sistem pengoperasian. Ia perlu ditaip satu demi
satu baris pada satu masa. Pernyataan ini merujuk kepada?

Iii

A Graphical User Interface


B
C

15
Table 2 shows several terms of computer crime. Jadual 2
menunjukkan beberapa terminologi dalam jenayah computer.
Match the statements with the given answers.
Padankan pernyataan dengan jawapan yang diberi.

I
Ii

iii

Unauthorised use of another


persons property.
Penggunaan tanpa kebenaran ke
atas milikan orang lain
Any criminal activity that is
related to the use of computers.
Sebarang aktiviti jenayah yang
berkaitan dengan penggunaan
komputer.
Any activities taken to disrupt the
equipment of computer systems
Sebarang aktiviti yang diambil
untuk menggangu peralatan
sistem computer

TABLE 2 JADUAL 2

For Questions 17 to Question 25, write your answers in the


spaces provided in Answer Sheet 1A.
Bagi Soalan 17 hingga Soalan 25, tulis jawapan anda di ruang
yang disediakan pada Helaian Jawapan 1A.

A Computer Crime
B

C
D

Jenayah
Komputer
Copyright
Infringement
Pelanggaran
Hak Cipta
Computer Attack
Pencerobohan
Komputer
Computer Theft
Pencurian
Komputer

Antaramuka Grafik
Command-Line
Arahan Baris
Menu-Driven
Perintah berasaskan menu

17

Antivirus is a

software that detects


in your computer memory, storage media and
incoming files. Antivirus adalah perisian
yang
mengesan
dalam memori komputer, media
penyimpanan dan fail

18
We transmit information or data by using two types of
signals, namely
and
.
Penghantaran maklumat dan data adalah dengan mengunakan
dua jenis isyarat iaitu
dan
.

SET4 ICT 2007


19 Two subcomponents of CPU are
and
.
Dua komponen utama CPU ialah
dan
.

2. a) State two differences between primary storage and


secondary storage.
Nyatakan dua perbezaan di antara storan primer dan storan
sekunder. (2 marks)

20
means protecting our computer
systems and the information they contain against unwanted
access, damage, destruction or modification.
bermaksud menghalang sistem
computer dan maklumat daripada diceroboh, rosak atau
diubah suai.
21 An
is a set of program that
coordinates all the activities among the computer hardware
devices.
ialah satu set arahan yang
mengawal semua aktiviti di atara peranti-peranti computer.
22 A
is a system of interconnected
computers and peripheral devices.
ialah system yang
menghubungkan beberapa buah computer dan perantiperantinya.
23
makes use of graphics capabilities
of a computer to make the operating system and programs
easier to use, which is also called user-friendly.
menghasilkan kebolehan grafik
pada computer yang membolehkan system pengoperasian
mudah digunakan dan dikenali sebagai mesra pengguna.
24
is unsolicited e-mail messages,
advertisements or newsgroup postings sent to many recipients
at once.
ialah mesej e-mel yang tidak dikehendaki,
iklan atau kumpulan berita yang dihantar kepada ramai pada
satu- satu masa.
25
is a sequence of keystrokes and
instructions that are recorded and saved.
ialah turutan kekunci dan arahan yang
direkod dan disimpan.
SECTION B (20 MARKS)
BAHAGIAN B (20 MARKAH)
Answer all questions.Jawab semua soalan.

b) Give one example of:


Berikan 1 contoh bagi:
i) primary storage :
Storan primer
ii)secondary storage :
Storan sekunder
(2 marks)
3. Based on the situation below, answer the following questions.
David always spends his leisure time surfing the Internet. He
usually downloads proprietary software and MP3 songs and
sells them to his friends. He uses his ICT knowledge to get the
unauthorized serial number for the software. One day, he finds
that his computer is getting slow and keeps on duplicating files.
David selalu meluangkan masa lapangnya untuk melayari
Internet. Dia sering memuat turun perisian hakcipta dan lagulagu MP3 untuk dijual kepada rakan-rakannya. David
menggunakan kepakarannya dalam bidang ICT untuk
mendapatkan nombor siri yang tidak sah untuk mengaktifkan
perisian yang telah dimuat turun. Pada suatu hari komputer
David menjadi perlahan dan sering membuat salinan fail
tertentu secara berulang.
a. Name the type of computer crime that David has committed.
Namakan jenis jenayah komputer yang dilakukan oleh David.
(1 mark)
b. What has happened to Davids computer?
Apakah yang telah terjadi kepada komputer David?
(1 mark)
c. How can David prevent his computer from the problem in (b) in
the future?
Bagaimanakah David dapat mengatasi masalah komputer yang
dihadapi
di (b) pada masa akan datang?
(1 mark)

Berdasarkan Rajah 1 di atas:


a. Name :
Namakan
i) X
(1 mark)
ii)Y
(1 mark)
b. P and Q are other examples of X and Y respectively. Name:
P dan Q adalah contoh lain bagi X dan Y. Namakan:
i) P :
(1 mark)
ii)Q:
(1 mark)

d. Other than the threat you mentioned in (b), give another


computer threat that could affect Davids computer.
Selain daripada ancaman yang dinyatakan di(b), berikan satu
lagiancaman lain yang mungkin berlaku kepada komputer
David.
(1 mark)

SET4 ICT 2007


4. Study Figure 2 carefully and answer the following questions.
FIGURE 2 RAJAH 2

a. Name device C.
Namakan peranti C.

(2 marks)
SECTION C (14 MARKS)
BAHAGIAN C (14 MARKAH)
Answer Question 1.
Jawab Soalan 1.
1. Figure 4 shows the components and devices of a computer
system.Rajah 4 menunjukkan komponen dan peranti sistem
komputer.

a) Based on Figure 4a, 4b, 4c and 4d, draw a block diagram of


the information processing cycle.
Berdasarkan Rajah 4a, 4b, 4c dan 4d, lukis rajah blok kitaran
pemprosesan maklumat.(2 marks)

(1 mark)
b. State the function of device C.
Nyatakan fungsi peranti C.
(1 mark)
c. Name 2 types of network in Figure 2.
Namakan 2 jenis rangkaian yang terdapat di Rajah 2
(2 marks)
5. Figure 3 refers to two different network topologies.
Rajah 3 menunjukkan 2 jenis topologi rangkaian yang berbeza.

b). Give one example of a device other than shown in Figure 4a.
Berikan satu contoh peranti selain daripada yang ditunjukkan
dalam rajah 4a .
(1 mark)
c). State two functions of the component in Figure 4c.
Nyatakan dua fungsi komponen dalam Rajah 4c.
(2 marks)
d). All the devices in Figure 4 are coordinated by an Operating
System. Explain two functions of the mentioned system.
Semua peranti dalam Rajah 4 dikoordinasi oleh Sistem
Pengendalian. Terangkan dua fungsi sistem tersebut.

a. Name :
Namakan
i) Topology A :
ii)Topology B :
(2 marks)
b. Name the network architecture for:
Namakan asas rekabentuk rangkaian bagi :
i) Topology A :
ii)Topology B :

(2 marks)

Answer either Question 2 or Question 3.


Jawab sama ada Soalan 2 atau Soalan 3.
2. Figure 5 shows the phases of program development process.
Based on the figure, answer the following questions.
Rajah 5 di bawah menunjukkan fasa dalam proses
pembangunan aturcara. Berdasarkan Rajah tersebut,
jawab soalan-soalan berikut.

3. Based on the situation below, answer the following questions. A


group of foreign students are visiting your school. As the
president of your school Multimedia Club, you are asked to form
a team to develop a project of an interactive multimedia
presentation to introduce your school to the visitors and other
schools in your state in future. You should include text, graphics
and audio in your presentation.
Sekumpulan pelajar dari luar negarai akan melawat sekolah
anda. Sebagai pengerusi Kelab Multimedia sekolah , anda
diminta untuk menubuhkan satu pasukan bagi tujuan
membangunkan persembahan multimedia interaktif untuk
memperkenalkan sekolah anda kepada pelajar-pelajar tersebut
dan juga kepada sekolah-sekolah lain dinegeri anda. Anda
dikehendakki menggabungkan elemen teks, grafik dan audio
dalam persembahan anda
a). Identify the file format for each multimedia element in your
presentation.
Kenal pasti format fail bagi setiap elemen multimedia dalam
persembahan anda.
(1 mark)
b). Describe the first phase that you are going to do in
developing the stated project.
Terangkan fasa pertama yang akan anda lalui semasa
membangunkanprojek multimedia di atas.
(2 marks)
c). Explain the role of graphics artist in your team.
Jelaskan peranan pereka grafik dalam pasukan anda.

FIGURE 5
RAJAH 5
a). Name Phase P and Phase Q.
Namakan Fasa P dan Fasa Q.
(2 marks)
b). Arrange the phases in correct sequence.
Susun fasa tersebut mengikut urutan.
(1
mark) c). State two importance of Phase P in program
development process
Nyatakan 2 kepentingan fasa P dalam proses pembangunan
aturcara.
(2 marks)
d). Describe any translation method used in Phase Q.
Jelaskan mana-mana kaedah pelaksanaan aturcara
dalam Fasa Q.

(2 marks)

(2 marks)
d). What medium of delivery would you use to distribute your
presentation
to other schools in your state? Give your reason.
Apakah bentuk media penyampaian yang akan anda gunakan
untuk mengedarkan bahan persembahan anda kepada sekolahsekolah lain dalam negeri anda? Berikan alasan anda.
(2 marks)
KERTAS SOALAN TAMAT

SET5 ICT 2007


SECTION A
ANSWER ALL QUESTIONS.
1. Communication is an act of transmitting
A.Messages B.Information C.Knowledge
2.

A/An _
is the result of raw input
data that has been processed by the Central Processing
Unit into meaningful information.
A.input B.output C.Storage D.processor

3.
is

touch screen graphic tablet


trackball DIAGRAM 1
Pointing B.Indicator C.Input D.Output

A.

Modem stands for


_
_.
A.Motivator/ Demotivator B.Modulator/ Demodulator
C.Modelling/ Demodelling D.Modes/ Demonstrations

5. It is a radio standard and communications protocol


primarily designed for low power consumption, within a
short range. It is also known as IEEE 802.15.1.
A.Bluetooth
B.Wireless Access Point
C. Satellite
D.Infrared
6.

10.

The similarity of example devices in Diagram 1 below


device.

mouse

4.

_.
D.Data

8. The things that work together in an information system


are called the
A.Data B Computer C. ComponentsWorking D. Parts
9.All of the following are parts of the information system
except.
A.Buildings housing the computer.
B.Instuctions to the computer
C,Facts stored in the computer
D.People who operate the computers

I.
II.

As a rule to control computer users.


Depends on country and state where
the crime is committed.
III.
As a guideline to computer users.
IV.
Must be followed by the user.
A.I, II, III B.I, II, IV C.I, III, IV D.II, III, IV
11.In ASCII code 00110000 equal to 0 and 01000001
equal to A. What is the ASCII code for number E3?
A.00110011 01000101 B.00110101 00110011
C,01000101 00110011 D.01000101 01000101
12.

The three main types of secondary storage are


_.
I. pen drive
II. magnetic medium
III. optical medium
IV.flash memory
A. I, II and III B.I, II and IV C.I, III and IV D.II, III and IV

13.

The implementation phase in multimedia production


tasks consists of:
i.
Creating texts and changing objects attributes
ii.
Identify the problem
iii.
Inserting animation graphics
iv.
Inserting audio objects
A.i, ii, iii B.i, ii, iv C.i, iii, iv D.ii, iii, iv

is the first phase in multimedia production.


A.Analysis B.Design C.Evaluation D.Implementation

7. What is the outcome of this flow chart if days equals


to 6 ?
Start

Request number of days,


RM12.50 each day
Calculate total salary(days multiply RM12.50)

Display total salary

End

A.
B.
C.
D.

RM55.00
RM65.00
RM75.00
RM99.00

Which statement below arecorrect about computer law

14.

Which type of control structure is represented by the


following pseudo code?
BEGIN
Request ID
If ID is equal to AK73G4J Then
print You are allow to access the
data base
Else
print Sorry, your ID is not correct
End If
END
A.
B.
C.
D.

Request control structure


Repetition control structure
Sequence control structure
Selection control structure

a)

b)

15.

Rearrange the pseudo code statement given to


represent a program that calculates a users result from
mid year examination.
The program will first request users identity card
numbers. And then the system will Greet Welcome with
the users name . Then, the program will request users
enter type of the examination. After calculating, the
program will display the result.
I. Print users result
II. Print Welcome with the users name
III. Request users identity card numbers
IV. Request users type of examination
V. Calculate users total mark
A. V, II, III, IV, I
B. V,I,II,III,IV
C,. III, II, V ,I, IV
D. III,II,IV,V,I

16.

Question below according to programming language.


Choose the correct answer according to the table
below.
Final
Result of ICT
Name
Pass
Student
Average
ID
Marks
Rosita
98502
72.50
True
Kok
98512
52.55
True
Keong
Mohan
98342
31.70
False
Zamri
98126
38.20
False
Data
X
Integer
Double
Y
Type :

Define what data type for X ?


A.String B.Integer C.Double

D.Boolean

This data type is important to declare statement True or


False. What data type for Y. A.String
B.
Integer C.Double D.Boolean
Instruction: Determine whether the answer is true or
false
17.

The transistor is used to transfer electronic signal


across the resistor. True / False ]

18.

A WAN is a network that covers a large geographic


area using a communication channel that combines
many types of transmission media such as telephone
lines, cables and radio waves.
[ True / False ]

24.Computer crime is defined as any criminal activity


that is related to the use of computers.[ True / False ]
Fill in the blanks with suitable correct answer
terminology.
25.

a.One function of
is to store
program and data for later use. (Storage)
b. software helps computer to manage the computer
system. (Utilities)
26._
is one of the Internet
technologies that allow users to make telephone
calls using a broadband Internet connection.
27. Answer statements A and B according to
situation below.
a.
Operating systems that allow the network to
centralise functions and applications in one or more
dedicated file servers.
b.
Serves extended enterprise, including defined
sets of customers or suppliers or other partners.
_
28. _
_is the collection and
summarization of data and information. It includes
report, diagrams, programs, or any other
deliverables generated during the system
development cycle.
29. Multimedia elements consists of graphics, texts,
sounds, _ and _
30. The user interface principles applied in
designing multimedia project are Contrast,
Alignment,
, Proximity, Emphasis and Repetition.
SECTION B ( 20 marks) Answer all the question.

1. State two types of application software and give an


example of each.

19.

( 4 marks )

Types of application software

Example

The terminator in a flow chart shows the beginning or


end of a program.[True / False]
2. (a)

20.

Multimedia presentations involve two or more media


[ True / False ]

21.

People can use information systems on their jobs with


little knowledge and understanding on how they function.
[ True / False ]

22.

Data is information that is meaningful to someone or


some say processed information. [ True / False ]

23.

ICT technology has created the term paperless


environment which means information can be stored

What is computer ethics?

_
and retrieved through the digital medium instead of
paper.
[ True / False ]

_(2 marks)

(b)

State a difference between ethics and law.


( 2 marks
Ethics

Law

3. As an ICT student, you are given a task to develop a


multimedia project. In order to do this project, you

Question 1 :Figure 1 shows the some of the components


of a computer system.(figure 1 at the end of question)

need some hardware and editing software.


(a)

List two examples of hardware to develop

Based on Figure 1, answer the following questions.

multimedia. 2 marks )
i

a) Draw a block diagram to illustrate the information


processing cycle and give a brief description.
_

(b)

SECTION C

ii

State two editing software that can be used to

produce multimedia elements.( 2 marks )


i

b) Explain two functions of K

ii

4. (a) Give the meaning of Information Systems.


( 2 marks)
_

c) Explain two differences between M and N.

_
_
(b) State two types of Information Systems.( 2 marks )

d) Explain the difference between G and H.


i.

_ ii_

5 (a) List three types of translators.

_
Question 2 :

( 3 marks )

i.
ii.

__ iii

_
(b)

Give a programming language that using


compiler as translator.
(1 marks)
_
_

6. Star Topology is one types of network topologies. Give


two advantages of the usage of this topology in your
computer lab.
( 4 marks )
i. ii_

Figure 2

Base from the Figure 2 give the definition of multimedia.

-----------------------------------------------------------------------------.

Question 3 :

c) Define the network communication technology of


Extranet.
[2 marks]

Question 6
Figure 5 shows two different control structures used in
programming languages.
Figure 3
Base from the Figure 3 give 2 differences between Textbased editor and WYSIWYG editor.
_
__

_
__

Begin

Request mark
from program

Question 4 :

Mark >=50?

Print Dont
give up!

Print
Congratulations

Figure 4
Figure 4 desribe about medium of multimedia delivery.
Desribe 2 differences between cd-based and web-based
multimedia.
_

End
Structure A

1. Define programming language and give one


example of low level programming language.

Question 5 :
An Audio-Visual Room has been equipped with 10
computers and a hub. As an ICT coordinator, you are
required to set up a small network in the room.
a) Sketch the topology for the room.
[2 marks]

2. Base on figure 5 , explain the difference between


structure A and structure B

b) Give two advantages of using a


networking rather than a stand-alone pc.
[2 marks]

3. There are two types of programming approaches.


Differentiate between structured approaches and
object-oriented in programming.

SET6 ICT QUESTION 2007


Section A (36 scores)
Instruction: Answer ALL questions.
1.Puan Zalila obtained the exclusive legal
rights for the distribution and sale of the CDROM. This associated with A piracy B
privacy rights
C
copyright
D
patent
Question 2 is based on Figure 1.
Figure 1shows an example of Operating
System interface.
Figure 1

6.

Question 6 is based on Figure 2.


6. Figure 2 shows a computer network.

Figure 2
Identify the network in Figure 2.
Network A
A Peer to peer
Client server
B Peer to peer

Network B
Peer
server
Peer
to
peer
Client

C Peer server
serve
Peer to
2.
The interface are difficult to use because they require exact spelling, grammar and punctuation.
peer Name the
interface.
D
A. Graphical user
interfaces
7. Haziq browsed http://webopedia.com to retrieve
B. B. Menu-driven
information
interfaces
7.
of networking. After that, he saves and prints
C. C. Command-line
the file of the document. Haziq intends to
interfaces
revisit to that web page.
D. D.All the above
.
3.A
is a small program that tells the operating system hoAwrratongceomthme
ufenaictuarteeswuistheda isnptehceificcodrreevcict es.equence.
A. Buffer
B.device
P004
Zikri Bin Zafri
14.10.1990
C. performance monitor D. driver
P003
Amirah Binti Zaid
15.11.1990
Table 1(b)
.
4. The following are examples of programming
languages.
Choose the correct pair.
Example
Generation
of
program
ming
A First
SQL Language
Second
Assembly
B Third
Language
Machine
Language
Fourth
C Language
C
D
.
Table 1(a) shows the records of a group of
students.
Table 1(b) is the result of rearranging the records in Table
1(a)
Student
Name of Student Date of
ID
Birth
P001
Syamin Binti Zaidi
13.10.1990
P002
Adriana Binti
12.10.1990
HamizanBinti Zaid
P003
Amirah
15.11.1990
P004
Zikri Bin Zafri
14.10.1990
Table 1(a)
Student
P002
P001

Name of Student
Adriana Binti
Hamizan
Syamin Binti Zaidi

Date of
12.10.1990
13.10.1990

I Bookmark II Navigation button


A I, II, III, IV B II, III, IV, I
IV, I, II, III

III Save file


IV Print
C III, IV, I, II
D

8.

8.The following are steps involved


in the development of multimedia
materials. At which stage would an
error be detected and rectified?
A
Analyzing problem B Developing
storyboard C
Testing and
debugging D Documenting
9.

9. The statements below


explain about computer
network. The above
explanations refer to

It is the largest network


connecting computers
worldwide.

A.
10.

I
II

All data transmissions or message


exchanges are based on a TCP/IP
standard protocol.
The main service provider in Malaysia is
Jaring and TMNet.
Intranet B. Telnet C. Extranet D.Internet

10. The following are activities


in the development of an
information system. The
activities in the problem
analysis phase are
Collecting relevant data
Writing a report on the current information
system III
Identifying the needs for the new
information system IV
Convincing users that
the new information system has better security
features
AI, III B
II, III C
III, IV D
I, IV

5.The above change is a result of


A. a single field sort
B.a multiple field sort
B. C. a single field indexing
D. a multiple field indexing

11.

14.

14.Hamizan wants to send a file to


Zanariah using electronic mail
services. He ensures that the file is
virus-free before it is sent.
(i)
Hamizan uses a utility software to
ensures the file is virus-free
before it is sent.
(ii)
Communication between
Hamizan and Zanariah is extbased.

15.

15. The statement below refers to programming


language.
(i)
A programming language
consists of code collections,
symbols, text, diagrams and
charts.
(ii)
The machine language can only
be written using 1s and 0s digit.

Figure 3 is one of the steps in


a multimedia development.
Title

Picture 1

Text for picture 1

Picture 2

Text for picture 2

Audio

Exit

Figure 3
identify the step :
A. Coding
B.
Documenting
C. Analyzing problemD. Developing a storyboard
12. Question 12 is based on Figure 4.

Unknown Idea
author
can be misunderstood

Performs functions such as


copying, renaming, deleting and
moving files
Image viewer displays contents of
graphics file when you double click on

16. statements above refer to

17.

X is one of the issues in computer ethics. X may be


.
A. software theft
B. unauthorized use
B. C. authorized access D.information
accuracy
For Question 13 until 15, state whether each
statement is True
(T)
or False (F).
Figure 5 shows a code written a particular
programming language.
13.

(i)
(ii)

If Zikri scores 67 marks, he is


eligible to get a B grade.
Variable named gred is declared as
Integer.
Question 17 is based on Figure 6.
Based on Figure 6, X is a combination of
presentation involving texts, A, video, graphic and
animation elements.

(i)

X is a (ii) The
hardware used to produce A is

18.
Syamin received a message from
Zaidi through Internet services S. Zaidi
asked Syamin to send the minutes of the
meeting using feature T of the same
services.
(i)
Name S
(ii) Name T

22.
Figure 9 shows the features of an Internet
browser.

Q
M

19.
Figure 7 and Figure 8 are two
methods of executing a program.
(i)
Source
code

Resu

Object
code

Figure
7

Dat

Source code
Y

Result

Da ta

(i)

Figure
8
Name X
(ii) Name Y

20.
Match the situation (i), (ii) and
(iii) with the most suitable software in
Table 2.

(ii)

21.

State one

23.
Alfi has listed a number of things to
complete a multimedia project entitled Visit
Malaysia Year 2007
as shown in Table 3.
1. Collect pictures of Malacca,
Putrajaya and Kuala Lumpur.
2. Orientate the Visit Malaysia Year
2007 logo so that it is animated.
3. Record the Cuti-Cuti Malaysia song.
4. Insert the Visit Malaysia themes;
insert Malacca, Putrajaya and Kuala
Lumpur history into different
screens.
Note : The files to be used are malacca.jpg,
putrajaya.bmp, logoVM.gif and CCM.wav.
(i)
What is the multimedia
element that is not used by
Azli?
(ii)
What is the name of the
animation file in Table 3?

A Norton Anti Virus B


Winzip C Power Point
D Internet Relay Chat (IRC)
E. Paint Brush

(i)

Name feature Q.
(ii)
advantage of feature M

Table 2
During Parent Teacher Association
meeting, Haziq as the presiden
of the computer club has been
asked to give an annual report
on the clubs activities in a more
interesting and effective way.
Amira has a cousin studying
overseas. Instead of conversing
through the telephone, she can
use text through the Internet to
communication.
Question 21 is referring to situation below.

Encik Abdullah needs to give information to


audiences about his company. To spend
money and time he wants to use software
that suitable to create attractive presentation.
Give the name for software above: .

24. Complete the flow chart. Choose your answer


from the box Provided
A. Decision
this student
is not
qualified to
receive the
scholarship
D. Decision
on
students
qualificatio
n

B This
student is
qualified
to receive
the
scholarshi
E. Input
on
students
qualificati
on

C. Output
on
students
qualificati
on
F.This
student is
not qualified
to receive
the

SECTION B
QUESTION
1
Look at the picture below and answer the questions
that follow.

I.

BEGIN

FALSE

(i)

_
TRUE

(ii)

(2 scores)
II. Give two impacts of pornography on
Malaysian society. a.

END

b.

25. Students fill biodata forms and submit to the


class teacher. All the submitted forms will be
filed according to classes and stored in the
cupboard in a private room. In order to change
the students data, the forms must be taken out
from the class file to be updated and restored.
The school clerk will refer to the files to prepare
reports needed by the school.
(i) The file collection in the private room is .
(ii) Phase X is one of the phases in the
Information System development.
Below are some of the implemented activities:
To measure the systems
level of accomplishment.

D
fi
e
p
r
o
r
p
y

To get feedback from users


about the new system
performance.
To perform on going
system modification.
Phase X is
Section B (20 scores)
Instruction : Answer ALL Questions.

QUESTION 2
I.

Complete the diagram below


QUESTION 4

Computer Security

(
I. Define compu2ter system
s
c
_o_
r
( 2 scores ) e
s
)

a.

Software and Data

b.

II. Draw a block diagram and describe the


information processing cycle which includes
input, process, output and storage.
II. G
i
v
e
t
w
o
e
x
a
m
p
l
e
s
o
f
c
o
m
p
u
t
e
r
t
h
r
e
a
t
s
.
a
.
.

b.
(4 scores)
QUESTION 3
Rearrange the steps in scanning antivirus below.
A. scan the selected file
B. choose an antivirus program
C. wait while the program is scanning and
the result is produced
D. select file that need to be scanned

BLOCK DIAGRAM
( 2 scores )

( 4 scores )

QUESTION 5
Based on figure below, answer the following
questions.
I.

Section C (14 scores)


Answer Question 1
1.Figure 13 shows the some of the components of a
computer system. (7 scores)

Name the types of computer networks below.

Based on Figure 13, answer the following questions.


a) Draw a block diagram of the computer
system using the components C, D, E and F.
(1 scores)

b) State two functions of E


a.

b.

(2 scores)

_
_ ( 2 scores )

II. Give two differences between above


computer networks.

c) State two differences between the


characteristics of I and J storage. (2 scores)

a.

_
_

b.
( 2 scores )

d) Give one advantage of using O in preparing a


report and one
advantage of using P in accounting.(2 scores)

Instruction : Answer either Question 2 or 3


2.En. Zaidi divides his ICT students into two groups to complete a multimedia project entitled Sekolah Saya.
Group A are asked to deliver their multimedia contents through web- based and Group B through CD-based.(7
scores)

GROUP A

GROUP B

a) Give two differences in delivering multimedia


contents by Group A and Group B. (2 scores)

i)

Sketch the relationship between


elements involved in developing
EIS.

ii)

State two uses of information system.


(2 scores)
_
_
_

b) Based on situation below, answer the


following questions.

(i)

(ii)
Figure 14

a) Web editor is a program that we use to


create Web page. Name Figure 2 (i) and
Figure 2 (ii). State one characteristic of (i)
and (ii).
(3 scores)

Situation
Encik Kevin is the manager of Sona
Car Enterprise. He asks you to develop
a system to calculate the
monthly installment for every potential
customer.
When his customer decides to buy a car,
he will get the customers details and
fill it in a form. The problem is, he have to
calculate the monthly installment
manually.

4 i) Define the problem En. Kevin faces in his


company.
(1 score)

Ahmad, a form 4 Alpha student is


and
usingnetwork
telecommunicationin
ICT
computer lab. He explores web
page to do his assignment.

_
ii) Identify the necessary output En. Kevin sees
in his manual system
(1 score)

c) Explain two importances of


facilities in the Ahmads computer
lab.
(2 scores)
_

_
_

iii) Draw your design user interface, based on the

input.
(2 scores)
3.
a) The following text is a statement.

En.AlidevelopedEmployee
Information System (EIS) for his client, Saujana Holding. He used
software
that couldcreate
without writing long
database programs.
He trained a data
entry clerk to enter data into EIS.

Design user interface for Input

SET 7ICT 2007


SECTION A (40 MARKS)

C. I, III, and IV

12.What is a bit?
A. A bit is the largest unit of information.
B. A bit is the biggest unit of information.
C. A bit is the longest unit of information.
D. A bit is the smallest unit of information.

1. A user refers to a person who uses a computer for the


purposes of
.
I. playing games
II. communication
III. doing homework
IV. business advertisement
A. I, II, and III
B. I, II, and IV
C. II, III, and IV
D. I, II, III, and IV
2. Storage devices include
I. keyboard
III. hard drives
A. I, II, and III
C. II, III, and IV

13.There are three character codes to represent characters,


which are
,
, and
.
A. ASCII, EBCDIC, APA B. ASCII, EBCDIC, ADA
C. ASCII, EBCDIC, Units D. ASCII, EBCDIC, Unicode

.
II. DVD drives
IV. floppy disk drives
B. I, II, and IV
D. I, II, III, and IV

14.16 bits is equivalent to


A. 2
B. 3
C. 8

3. Output devices
.
A. are used for data storage
B. act as the brain of the computer
C. shows people the processed data or information
D. accept data or commands in a form that the computer can
use

QUESTION 16-25STATE FALSE OR TRUE


16 The primary storage of a computer holds data
temporarily.

is a set of programs that lies between


applications software and the computer hardware.
A. BIOS program
B. Utility program
C. Operating system
D. Operating environment

6. Examples of application software include


A. word processing, spreadsheets and databases
B. accounting, games and programming language
C. internet browser, desktop publishing and BIOS program
D. word processing, accounting and programming languages

17 Random Access Memory (RAM) is the primary


storage in the computer system.
.

20 Music, speech or any other sounds are examples of


video information.

will loose its content when the power is interrupted or


turned off.
A. ROM
B. RAM
C. A Diskette
D. A Hard disk

21 Software can have various functions including


performing computation, communicate with other
software and human interaction.
22 Output devices shows people the processed data or
information.

9. Music, speech, or any other sounds are examples of


information.
A. text B. video
C. audio
D. graphic

23 Central processing unit (CPU) executes computer


instructions.

10.Which one of the following cycles is the correct information


processing cycle for the control unit operations?
A. Fetching Decoding Executing Storing
B. Decoding Fetching Executing Storing
C. Executing Fetching Storing Decoding
D. Storing Fetching Decoding Executing
11.Information processing cycle comprises of
I. input II. Output
III. Storage
IV. process
A. I and II
B. I, II, and III

18 The CPU utilities the computer memory to execute


instructions from the user such as editing a letter,
drawing a picture and sorting numbers.
19 A storage medium is the physical material in the
computer that keeps data, instruction and information.

7. A CPU comprises of CU and


.
A. ALU
B. processor
C. input devices
D. output devices
8.

bytes.
D. 218

15.Below are the features of Megahertz.


I. 1000 MHz = 0.1 GHz
II. One MHz represents one million cycles per second.
III. The speeds of buses and interfaces are also measured in
MHz.
IV. A onemegahertz clock (1MHz) means some number of bits
(16, 32, 64, etc.)are manipulated one million times per second.
A. I, II and III
B. I, III and IV
C. II, III and IV
D. All of the above

4. Central processing unit (CPU)


.
A. executes computer instructions
B. show people the processed data
C. hold data and programme temporarily
D. send the data or commands to the processing unit
5.

D. I, II, III, and IV

24 Utility program is a set of programs that lies between


applications software and the computer hardware.
25 A processed raw input is also known as information.
.

QUESTION 26 30: Fill in the blanks with the


correct answer.
topology

local area
network ( LAN
)

network

star

SECTION B : 30 MARKS
cable

26. A is a collection of computers and devices connected


together via communication devices and transmission
media.
27. A is a network that connects computers and devices in a
limited geographical area such as a home, school computer
laboratory, office building or closely positioned group of
building.
28. A bus network consists of a single central
to which
all
computers and other devices connect.
29. A network
refers to the layout of the computers
and devices
in a communication network.
30. On a
network, if one node fails, only
that node is affected.
The other nodes continue to operate normally.
QUESTION 31 40 : Look at the pictures below. Then, write
the number in the correct box to match with the correct
devices.

THIS SECTION CONSIST 3 QUESTIONS ANSWER ALL


THE QUESTION
QUESTION 1 (10 MARKS)
Fill in the blanks the differences between computerized and
non-computerized system into the appropriate column based on
the aspects given.
Production was slow since everything was
done manually.
Need to be done by an expert.

Slower need a few hours to complete

Multimedia can be combined easily to


attract audience.
More time, more people, less products.

Increases productivity in a short period.

Boring. Need to take more time and many people


to produce interesting
Less time, less manpower, more products.

Faster a few seconds to complete several jobs

Can be accomplished even by a layman

Computerised

Aspect
Task
Time
Interesting
Productivity
Profit

Non-computerised

QUESTION 2.

b) Describe star network topology.

a) Define computer
system

( 4 marks)
c) Name device A as shown
in the

( 2 marks )
b) State
the
meanin
g of
input,
process
or,
output
and
storage.

( 2 marks)
d) Name the most suitable network cable that could avoid the
interference of electromagnetic signal in
Figure above.
( 2 marks)
( 4 marks )
c) Draw a block diagram and describe the information
processing cycle which includes input, process,
output and storage.

SECTION C : 10 MARKS
Answer ALL questions in the answer sheet provided.
QUESTION 1 (:10 MARKS)
You are to in charge of the computer systems of a company.
What do you know about the computer security system?
a)

Describe briefly the types of security systems you


have to consider in managing
the system.

b) Briefly describe by giving examples of security


measures used to protect your
system.

BLOCK DIAGRAM
( 4 marks )

QUESTION 3.
Figure below shown three types of network topologies.
a) Name the network topology in the box below.( 2 marks)