Вы находитесь на странице: 1из 12

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

Name: 5S2 Section (Mark): A


(40)

Class/Teacher Agnes Lim 5S3 Cyrene Assessment


(18)

Mukit Nyua Sia Ai Ling Total


(100)

B
(28)

C
(14)

INFORMATION AND COMMUNICATION TECHNOLOGY FORM 5 (2 HOURS) MAIN INSTRUCTION


Read the instruction in each section carefully. Lost of marks due to carelessness won t be entertained. Pass up the ANSWER SHEET and your answers at the end of the examination. SECTION A: (40 MARKS) Instruction: Answer all questions. Write your answers in the space provided in Answer Sheet at page 6. Each correct answer carries one mark.

1.

Figure 1 below shows several computer devices.

Figure 1 Based on Figure 1, match the devices with the following statements by writing P, Q, R, or S. (i) Device that visually conveys texts, graphics and video information. (ii) Device that is used to record voice, speech or other sounds. 2. Figure 2 shows a motherboard. X

Y Z

Figure 2 X, Y and Z are some of the parts found on motherboard. Based on Figure 2, write X, Y or Z for: (i) Part is used to attach peripherals to the system unit. (ii) Part is used to insert adapter cards. 1

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

3. Figure 3 shows the Information Processing Cycle.


A B C

Figure 3 Choose A, B, C or D for each of the following function: (i) Display processed data. (ii) Store data, instructions and information for future use. 4. Which of the following are output devices? I. Printer II. Monitor III. Joystick IV. Plotter V. Microphone A. I, II and III B. I, II and IV C. II, III and V D. III, IV and V 5. The clock speed of a computer is the number of cycles the clock makes per second. One cycle per second is called _______________. 6. Figure 4 is the hierarchy of the units of data measurement.
Bit P Kilobyte Q Gigabyte

Figure 4 Based on Figure 4, name (i) P (ii) Q 7. The protocol that sets the communication rules between these computers to ensure the delivery of information packets is ____________.

8. There are three types of network, namely Local Area Network, M and N. Write in full name about the network: (i) (ii) M N : ______________ : ______________ 2

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

9. Figure 5 shows network topology A and B.

A Figure 5 Based on Figure 5, name the topology of: (i) (ii) A B : ______________ : ______________

10. The following Table 1 shows a part of the differences between two network architecture. S The server has the control ability while the client doesnt. Installs software only in the server while the clients share the software. Table 1 Based on Table 1, identify the network architecture S and R. (i) (ii) S R : ____________________ : ____________________ Install software to every computer. R All computers have equal ability.

11. Write True or False for the following statements. (i) Computer networks are important for sharing data, files and devices. (ii) SMTP used to access, send and receive Hypertext Markup Languages files on the internet. 12. P is a network communication technology. It is a private network that uses Internet protocols to securely share part of a businesss information. P is ____________________.

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

13. Table 2 shows two programming approaches.  Refers to a special type of programming approach that combines data X with functions to create objects  Often uses a top-down design model where developers map out the Y overall program structure into separate subsections from top to bottom. Table 2 State programming approaches: (i) X (ii) Y 14. Figure 6 shows several symbols commonly used in flow chart.

Terminator

Process

Figure 6 Name the symbol: (i) A (ii) B 15. AND, OR and NOT operator are known as ______________________ operators. 16. Arrange the programming languages given below from the earliest generation to the latest. I FORTRAN II Prolog III SQL A. I, II, III B. I, III, II C. II, I, III D. II, III, I 17. Write the word that would complete the following statement: (i) To convert an assembly language source code into machine language, programmer use a program called a(n) ____________. (ii) A(n) _____________ translates and executes one statement at a time. 18. In testing and debugging phase, errors are tested. __(i)__ error happens when the expected output and actual output do not match for any set of data while __(i)__ error caused by wrong spelling or wrong words in command. 19.

A processed data, that is valuable, it is organized, meaningful and useful to specific user. Statement 1

Statement 1 refers to ______________ A. Data B. Hardware C. Software D. Information 4

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

20. Table 3 shows a sample data file. Index No. A111 A112 A120 A128 Name Aminah binti Ahmad Bong Chai Yen Wong Sing Siung Zamri bin Saharuddin Gender F F F M Class 5S1 5S1 5S1 5S1

Table 3 Based on Table 3, state what (ii) (i) and represent.

21. Which of the following is the benefit of using database?


A. Low maintenance cost B. Data can be hacked by others C. Minimizes data redundancy D. The data is valid 22. Statement 2 shows a type of information system.

It provides regular information about the daily activities of a business to the manager.

Statement 2 Which type of information system given in Statement 2? A. Decision Support Systems B. Management Information System C. Transaction Processing Systems D. Executive Information System
23. Y is a type of data manipulation which is used to correct inaccurate data and to change old data with new data. Y refers to ______________________. 24. Table 4 shows the object bar in Ms Access. Match the object bar with following statements. State whether P, Q, R or S. P- Query Q- Report R- Form S- Table

Table 4 (i) Used to view specific data from table and delete record from table. (ii) As interface to enter information such as students detail in a database. 25. Figure 7 shows interrelation between information system components. Hardware Data Y

Software Figure 7 Based on Figure 7, name: (i) X (ii) Y

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

Name: 5S2 Section (Mark):


QUESTION (i) 1 (ii) (i) 2 (ii) (i) 3 (ii) 4 5 (i) 6 (ii) 7 (i) 8 (ii) (i) 9 (ii) (i) 10 (ii) (i) 11 (ii) 12 (i) 13 (ii) (i) 14 (ii) 15 16 (i) 17 (ii) (i) 18 (ii) 19 (i) 20 (ii) 21 22 23 (i) 24 (ii) (i) 25 (ii)

Class/Teacher Agnes Lim 5S3 Cyrene Assessment


(18)

Mukit Nyua Sia Ai Ling Total


(100)

A
(40)

B
(28)

C
(14)

SECTION A: ANSWER SHEET


CANDIDATES ANSWER MARKS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

SECTION B: (28 MARKS) Instruction: This section consists of 7 questions. Answer all questions. Write your answers in your own answer paper. Marks for each section are shown in brackets.

26. An operating system (OS) is a set of programs containing instructions that coordinate all the activities among computer hardware resources.

(a) (b)

Give two examples of Operating System. State two functions of Operating System.

(2 marks) (2 marks)

27. Your friends are still confused about the operating system and utility program. As an ICTs student, you are responsible to explain the computer system for their understanding. (a) List one difference between the operating system and utility program. (2 marks) (b) Your friends, Muthu and Ahmad are given two types of software as Figure 8 shown below. MS Office Adobe Photoshop Muthus Figure 8 Differentiate between types of software between Muthus and Ahmads. 28. Figure 9 shows topology of computer network. (2 marks) Open Office.org GIMP Ahmads

Topology A Figure 9 (a) (b) (c)

Topology B (2 marks) (1 mark) (1 mark) 7

Based on Figure 9 above, give two advantages of Topology A over B. In Topology B, what will happen if one of the nodes fails to function? How to overcome the failure in question 28(b)?

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

29. The following is a Statement 3 on network communication technology for a company. Swiss Chemical Company (SCC) has approximately 15,000 employees in more than 30
countries. SCC uses three types of network communication technology: X, Y and the Internet, to provide network connectivity as well as to ensure the organizations information security for its employees and business partners. Employees use X to access company information, using assigned userID and password. Authorized business partners of SCC use Y to access and share transaction information from different locations worldwide.

Statement 3 Based on the Statement 3: (a) What type of computer network used for that company for network communication technology X, Y and Internet. (1 mark) (b) Name X. Then, give one difference between X and the Internet. (3marks) 30. Figure 10(i) and 10(ii) below show flowchart segments.

Figure 10(ii) Figure 10(i) (a) Identify the control structure used in: (i) Figure 10(i) (ii) Figure 10(ii) (b) Give one difference between control structure in question 30 (a). 31. Figure 11 shows an interface of an automated library system SMK Indah.

(2 marks) (2 marks)

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

Figure 11 Based on the Figure 11, answer the following questions: (a) In which phases, the interface will be drawn like Figure 11 above? (b) Which one is the primary key? (c) Define the primary key and foreign key. (1 mark) (1 mark) (2 marks)

32. Figure 12 shows the phases of program development process.

Program Design Phase Testing and Debugging Phase


Compiling, testing and debugging program

Problem Analysis Phase


Identify problem, identify input and output

Phase Q
Private Sub cmdcheck_Click() If txtname = "" Or txtnowork = "" Then MsgBox "Your Particulars are Incompleted " txtname.SetFocus Else If cbosales = "RM5000 and above" And cboattendance = "Excellent" And cbocreativity = "Creative" Then lblcheck = "This worker is AN EXCELLENT WORKER" Else lblcheck = "This worker is NOT AN EXCELLENT WORKER" End Sub

Phase P

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

Figure 12 Based on the Figure 12, answer the following questions. (a) Name Phase P and Phase Q. (b) List two activities involved in Phase P. (2 marks) (2 marks)

SECTION C: (14 MARKS) Instruction: This section consists of 3 questions. Answer two questions only. (i) Question 33 is compulsory (ii) Choose Question 34 or Question 35. Write your answers in your own answer paper. Marks for each section are shown in brackets.

33. Figure 13 shows four computers connected through a school Local Area Network in a computer lab. These computers are named PC 01, PC 02, PC 03, and PC 04.

Figure 13 Based on Figure 13, (a) Identify the computers that are able to communicate with others. Justify your answer. (3 marks) 10

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

(b) There is one computer that are unable in communicate with the other computer in the network. Identify that computer. Then identify the problem and re-configure the computer so that it can communicate with other computers in the network. (4 marks) 34. Figure 14 shows development of a program. Case Study
Your school needs a registration program to computerize the registration of Curriculum Unit. Any student in the school should have all his/her data like name, class and IC number keyed into the Curriculum Unit registration program. After the program verifies the student data and all fields are filled, they will be notified of his/her Curriculum Unit for the coming academic year.

Pseudo Code
BEGIN Key in students data (verify data) If all fields filled then Print curriculum unit Else Print error message End if END

Figure 14 Based on the case study and Pseudo Code at Figure 14: (a) Identify the input, process and output of the program. (3 marks)

(b) Based on the Pseudo Code given, draw a suitable flow chart to show the flow of program. (4 marks)

35. Mr. Mustafa has launched a garage sale for second hand cars for one month. He is an experience person in car business and offers special discount for his customer for any national cars they buy. In order to make his work easier he keeps all his business transactions data in a database, as shown in Figure 15 below.

Brand

Model

Colour

Registeration Number

Price

Audi BMW BMW Exora

A4 318 SE 520 SE ESI

Green Blue Green Black

S7772 FGS M223 BMW TIS5 GHB NCC 2345

RM 150,490 RM100,000 RM250,495 RM 65,000

Figure 15 Based on Figure 15: (a) Which field is primary key? Justify your answer (b) Design data entry form that relates to the contents of the table. (3 marks) (4 marks) 11

SEKOLAH MENENGAH KEBANGSAAN KANOWIT PEPERIKSAAN PERTENGAHAN SEMESTER 1 TAHUN 2011 ICT (FORM 5) (2HOURS)

3765/1

END OF QUESTION PAPER

Prepared by,

Checked by,

Verified by,

Ms. Sia Ai Ling

Mr. Mukit Nyua

Ms. Trinka Slan

12

Вам также может понравиться