Вы находитесь на странице: 1из 12

2009-CE CIT

PAPER 1
(SECT A)

HONG KONG EXAMINATIONS AND ASSESSMENT AUTHORITY HONG KONG CERTIFICATE OF EDUCATION EXAMINATION 2009

COMPUTER AND INFORMATION TECHNOLOGY PAPER 1 (SECTION A)


8.30 am 10.30 am (2 hours)

Subject Code 212

1.

Read carefully the instructions on the Answer Sheet. required in the spaces provided.

Stick a barcode label and insert the information

2.

When told to open this book, you should check that all the questions are there. Look for the words END OF PAPER after the last question. All questions carry equal marks. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You should mark only ONE answer for each question. If you mark more than one answer, you will receive NO MARKS for that question. No marks will be deducted for wrong answers.

3. 4.

5.

6.

Hong Kong Examinations and Assessment Authority All Rights Reserved 2009
2009-CE-CIT 1A1

Not to be taken away before the end of the examination session

There are 40 questions in this paper. 1.

Choose the most suitable answer.

Peter uses Table 1 to produce Table 2. Travel agent Moon Tours Monday Travel Happy Tours Table 1 Phone number 26663666 51115111 38884888 Travel agent Happy Tours Monday Travel Moon Tours Table 2 Phone number 38884888 51115111 26663666

Which of the following ways of processing information is involved in the above action? A. B. C. D. Communication Reorganisation Validation Conversion

2.

Public hospitals widely use patient wristbands as part of a Unique Patient Identification System. Multiple identical 2D bar codes are printed on a wristband. Which of the following statements is/are correct?

(1) All data can be read completely despite dirt on one of the bar codes. (2) The bar codes can represent both patients ID card number and name. (3) The bar codes should be scanned horizontally. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

3.

John uses image editing software to edit Figure 1 into Figure 2.

Figure 1

Figure 2

Which of the following sequences of steps correctly describes this editing process? A. B. C. D. colour filling image grouping 180 rotation 180 rotation

vertically inverted vertically inverted colour filling image cutting

image cutting colour filling image cutting colour filling

2009-CE-CIT 1A2

4.

Which of the following validation methods is not applicable to Hong Kong Identity Card numbers? A. B. C. D. Check digit Type check Parity check Completeness check

5.

Peter wants to construct a simple web page for the following part of a document. Dear Dr

Wong

On behalf of the Board of the University, we would like to express our sincere appreciation and congratulations to you for successfully completing the Doctor Programme and being awarded the Excellent Performance Award 2008. This Which of the following formatting features cannot be simply done by the use of HTML? A. B. C. D. Italic Bold Large font Full justification

6.

When 1-bit is set as the colour depth of a scanner, A. B. C. D. the scanned image can contain 256 different colours. the original image source is a colour photo. the scanned image will be black and white. the scanned image should be printed by a colour printer.

7.

In the following spreadsheet, what operator and function should be used? A 1 2 3 4 5 (1) (2) (3) (4) A. B. C. D. + * SUM COUNT Item Butter Orange juice Bread B Unit Price 15.4 12.5 5.0 C Quantity 2 4 8 Total D Sub-total 30.8 50.0 40.0 120.8

(1) and (3) only (2) and (3) only (1) and (4) only (2) and (4) only

2009-CE-CIT 1A3

Go on to the next page

9.

There are two tables, Table 1 and Table 2, in a database. Parts of the tables are shown below: Table 1 Name Gigi Peter Mary . . . Table 3 Name Gigi Peter Mary . . . Table 2 Employee ID 4083 1568 1268 . . . Department IT Finance Finance . . .

Employee ID 4083 1568 1268 . . . Employee ID 4083 1568 1268 . . .

Why should the above tables be combined into Table 3? (1) It saves storage space. (2) The time to search the department of a given name is shorter. (3) A key can be used. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

10.

Which of the following are common practices when producing a presentation file? (1) (2) (3) (4) A. B. C. D. Insert hyperlinks. Consider font size. Insert page break. Consider font colour.

(3) and (4) only (2) and (3) only (1), (2) and (3) only (1), (2) and (4) only

2009-CE-CIT 1A4

A. B. C. D.

The BIG5 code is the same as the BIG5 code for 3. The first byte of the BIG5 code is the ASCII code for 3. The value of the BIG5 code is three times that for the Chinese character The BIG5 code is 16 bits long.

Department IT Finance Finance . . .

8.

Which of the following statements about the BIG5 code for the Chinese character

is correct?

11.

Mary creates index.html using application software under an operating system. Which of the following statements is/are correct? (1) The file can be opened by a web browser. (2) The file cannot be used under another operating system. (3) The application software should be developed using C language. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

12.

Which of the following components still keep(s) stored data even after shutting down a computer? (1) ROM (2) RAM (3) Cache memory A. B. C. D. (1) only (2) only (1) and (3) only (2) and (3) only

13.

What does a bus system mainly affect? A. B. C. D. The storage size of ROM The cache size of a CPU The storage capacity of a hard disk The data transfer rate between hardware components

14.

Which of the following statements about secondary storage is/are correct? (1) It is volatile. (2) It can be used for backup. (3) Hard disk is a kind of secondary storage. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

15.

Which of the following is an I/O device that can perform both data input and data output? A. B. C. D. Speaker Scanner Touch screen Wireless keyboard

2009-CE-CIT 1A5

Go on to the next page

16.

When Mary buys a scanner, she needs to install a driver program on the computer. This is because A. B. C. D. the program is free. the scanner can read bar codes. the program is application software. the operating system of the computer does not consist of the driver.

Use the following two network diagrams to answer Question 17 and 18: ... ... Printer Switch Server Network 1 Printer Hub Network 2

17.

In general, companies prefer Network 1. Why? A. B. C. D. TCP/IP protocol can be used. Files can be shared. The network security level is higher. The printer can be shared.

18.

Some companies prefer Network 2. Why? A. B. C. D. More printers can be installed. Some computers are shut down. The hub can be replaced by a switch. Less technical knowledge is required for maintenance.

19.

Peter designs a network of ten workstations with Internet access in an office. Which types of connections should he use? (1) (2) (3) (4) A. B. C. D. Metropolitan area network Broadband WiFi Leased line

(1) and (3) only (2) and (3) only (1) and (4) only (2) and (4) only

2009-CE-CIT 1A6

(1) (2) (3) (4) A. B. C. D.

Public buses Public libraries Community halls Beaches

(2) and (3) only (1) and (4) only (1), (2) and (3) only (1), (3) and (4) only

21.

The length of IP addresses will be changed from 32 bits to 128 bits. What is the major reason for this change? A. B. C. D. More IP addresses can be used. More web content can be surfed. Less computational power is required of web servers. It is more difficult to hack networked computers.

22.

The following example shows the use of a common search engine. Why should the search words be quoted? Web Search: Images News More
Advanced Search

"Yellowstone national park"

A. B. C. D.

The search words are in English, not in Chinese. The search engine will correct any spelling mistakes in the search words. The web pages in the search results should contain text only. The web pages in the search results should contain this exact wording.

23.

Ms Wong suggests that her students use the Discussion Forum on the school e-Learning platform frequently because (1) she does not want to do discussion during the lessons. (2) her students know how to use video conferencing. (3) she wants to promote the exchange of ideas and information among the students for learning purposes. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

2009-CE-CIT 1A7

20.

WiFi is a Government programme that provides free wireless Internet access GovWiFi services to all Hong Kong citizens. Where can we enjoy the services?

Go on to the next page

24.

Which of the following HTML codes must be contained in a simple HTML web page? (1) <P> (2) <HTML> (3) <IMG> A. B. C. D. (1) only (2) only (1) and (3) only (2) and (3) only

25.

When a browser opens a web page with the following HTML codes, what will happen? <A HREF="hkpark.jpg">Hong Kong Park</A> A. B. C. D. hkpark.jpg will be automatically downloaded and shown on the screen. hkpark.jpg will be automatically downloaded and will not be shown on the screen. When the words Hong Kong Park are clicked, hkpark.jpg will be downloaded. When the words Hong Kong Park are clicked, the words will be shown on hkpark.jpg.

26.

Ms Wong wants to register a new web site for her company. (1) Choose a domain name that is easy to remember. (2) Choose an IP address that is easy to remember. (3) Set up a file server. A. B. C. D. (1) only (3) only (1) and (2) only (2) and (3) only

What should she do?

Addition of fractions addition of fractions with like denominators addition of fractions with unlike denominators What kind of technique does Peter use? A. B. C. D. Branching Divide-and-conquer Comment Debugging

2009-CE-CIT 1A8

. +

27.

Peter writes down the following statements before writing a program to add fractions like

28.

Which of the following statements about algorithm design is/are correct? (1) An algorithm design will be done after program coding. (2) An algorithm design can be represented by a flowchart. (3) An algorithm can be described by using sequence, selection and iteration structures. A. B. C. D. (1) only (1) and (2) only (2) and (3) only (3) only

29.

Which of the following pseudocodes is/are logically correct? (1) x = 'Hello' + 5 (2) x = 20 / y (3) y = y + 1 A. B. C. D. (1) only (1) and (2) only (2) and (3) only (2) only

30.

What is the purpose of the following flowchart for Y > 0? Start

Input Y

Y = 0 No

A. B. C. D.

Find Find Find Find

(1+2+3+...+Y). (123...Y). (PY). Y(Y-1)/2.

31.

Two variables, Y and M, store the year and the month of todays date respectively. Which of the following Boolean expressions can validate the date? A. B. C. D. (12 (12 (12 (12 >= >= >= >= M M M M or 1 <= M) or (Y = and 1 <= M) and (Y or 1 >= M) or (Y = and 1 >= M) and (Y 2009) = 2009) 2009) = 2009)

2009-CE-CIT 1A9

P Y

Yes

Output P

P Y Y - 1

End

Go on to the next page

32.

A high-level assembler is an assembler that includes some features in high level languages. Which of the following statements about a high-level assembler is/are correct? (1) It translates an assembly language into machine codes. (2) It translates a high level language into machine codes. (3) It translates and executes a command statement at the same time. A. B. C. D. (1) only (2) only (1) and (3) only (2) and (3) only

33.

Which of the following statements about C/Pascal language is/are correct? (1) Programmers can control computers using the language. (2) Programmers should draw a flowchart after writing a C/Pascal program for problem analysis. (3) Programmers should follow some predefined syntax in the language to write programs. A. B. C. D. (1) only (2) only (1) and (3) only (2) and (3) only

34.

Dry run the following pseudocodes. What is the final result of s? 1 i s 0 While (i <= 4) s s + i i i + 1 A. B. C. D. 0 5 6 10

35.

Which of the following is/are good programming habit(s)? (1) Use a computer server to write programs. (2) Use meaningful variable names. (3) Try to use fewer subprograms. A. B. C. D. (1) only (2) only (1) and (3) only (2) and (3) only

2009-CE-CIT 1A10

10

36.

In order to respect for Intellectual Property Rights in school, which of the following actions should be done? (1) Update the latest OS patch. (2) Use video cameras to record the activities in computer rooms 24 hours a day. (3) Uninstall expired shareware. A. B. C. D. (2) only (3) only (1) and (2) only (1) and (3) only

37.

Which of the following Internet activities has the highest risk of infection from computer viruses? A. B. C. D. Download anonymous files through peer-to-peer file sharing software. Update the service pack of the operating system. Send email with executable files to friends. Conduct video-conferencing.

38.

Which of the following is not an action to develop Hong Kong into a knowledge-based society? A. B. C. D. Provide broadband connectivity for citizens. Put a tax on computers to be disposed of. Support companies to use information and communication technology in business. Allow students to access information and communication technology facilities to support learning.

39.

Which of the following cannot effectively prevent ergonomic and stress issues related to using a mouse? A. B. C. D. Use a wireless mouse. Use a left-handed mouse when necessary. Keep your hand relaxed and do not bend your wrist. Click the mouse using a light touch.

40.

Which of the following descriptions of smart home technology is not correct? A. B. C. D. The technology is helpful for the elderly and disabled in daily life. Home appliances can be controlled via a phone. The technology can be applied to home security. A web server must be installed at home.

END OF PAPER

2009-CE-CIT 1A11

11

2009 CE Computer & Information Technology Paper 1A Answer Key

Question No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

Key B C A C D C B D C D A A D D C D C D B A

Question No. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40.

Key A D B B C A B C C B B A C D B B A B A D