More Related Content Similar to ICT Form 4 MAY 2015 test paper (20) ICT Form 4 MAY 2015 test paper1. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
3
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Complete the following statement.
Table 1 is about the usage of ICT.
All transactions can be done by computers or mobile computing devices
Transaction can be done anytime and anyplace
Example of transactions is electronic funds transfer to merchants
Table 1
Based on Table 1, the usage of ICT is referred to ………………………………
sector.
2. Figure 1 show technologies used in two different generations of computers.
A B
Figure 1
Based on the Figure 1, identify the computer generation for
(i) A
(ii) B
3. Read the following statement.
Statement above is regarding ……………………….. system.
Production was slow because everything was done manually and totally
depended on human labour.
2. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
4
4. Figure 2 shows examples on two types of authentication methods.
Figure 2
Based on Figure 2, state the type of authentication method used for:
(i) P
(ii) Q
5. Figure 3 shows the display of an internet filtering software.
Figure 3
Based on Figure 3, state the method used.
Authentication methods
P Q
FILTERING SETTINGS
Restricted List
http://www.seperti.com
http://www.jalan.com
ADD REMOVE EXIT
3. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
5
6. Figure 4 shows a computer security threat.
Figure 4
Based on Figure 4,
(i) state the type of computer threat, and
(ii) identify security measure that can be used to prevent the threat in Question
6(i).
7. Table 2 shows security measures to protect our computer system.
(i) It is a process of hiding information by
altering the actual information into
different representation.
(ii) Prevent portability by restricting the
hardware from being moved.
Table 2
Based on Table 2, match the statements with the correct security measures by writing
A, B, C or D.
A Anti-virus
B Human aspects
C Cryptography
D Firewall
4. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
6
8. Table 3 shows terms of computer ethics and legal issues.
Intelletual Property Privacy Computer Crime
A B C
Table 3
Based on Table 3, write A, B or C to match the following statement.
(i) The right of individuals and companies to deny or restrict the collection and use
of data and information about them.
(ii) Protect ideas, inventions, unique names, business models, industrial processes,
computer program codes and more.
9. ICT has brought many positive impacts on society.
Figure 5
Based on Figure 5, state any positive impact of ICT on society.
I Lower communication cost because people can save time and resources
II Inappropriate online communication with unknown person through the Internet
III Effective sharing of information and opinions
IV Effective sharing false content
A I and II
B I and III
C II and IV
D III and IV
5. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
7
10. Figure 6(a) and Figure 6(b) show two hardware in a system unit.
Figure 6(a) Figure 6(b)
Based on Figure 6(a) and 6(b),
(i) state the name of component in Figure 6(a), and
(ii) determine the location of component 6(a) should be placed onto the
motherboard by writing X or Y.
11. Figure 7 shows a computer specification.
Figure 7
Based on Figure 7, state the clock rate for this computer.
X
Y
6. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
8
12. Figure 8 shows three examples of computer storage.
A B C
Figure 8
Based on Figure 8, write A, B or C to match the following statement:
(i) Holds data permanently until the users delete it.
(ii) The contents can be accessed and read but cannot be changed.
13. State whether the following statement is True or False.
1 GHz equivalent to 1000 kHz.
14. Which of the following is NOT a function of operating system?
A Starting a computer
B Providing a user interface
C Managing data and program
D Perform specific tasks for user
15. Drop cap is a feature which available in ………………….. application software.
A word processing
B spreadsheet
C presentation
D graphic editing
7. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
9
16. Figure 9 shows the information processing cycle.
Figure 9
Based on Figure 9,
(i) identify D, and
(ii) state a function of D
17. Table 4 shows three types of software.
A Operating system
B Utility Program
C Application software
Table 4
Based on Table 4, match the types of software with the appropriate statements by
writing A, B or C.
(i) Madam Anne asks her ICT students to scan and defragment the computers
before she begins her lesson.
(ii) Madam Jennifer is using a software to convert numeric data into charts.
Input
Process D
Output
8. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
10
18. Figure 10 shows two example of input devices.
X Y
Figure 10
Based on the Figure 10, state the type of input for
(i) X
(ii) Y
19. Figure 11 shows some storage devices.
A B C
Figure 11
Based on Figure 11, write A, B or C to match the following statement:
(i) This storage device loses the stored data when the computer is shut down.
(ii) Content in this storage media is written and read by a laser.
20. State whether the following statement is True or False.
Open source software is lack of offering stable system supports if the software
malfunctions.
9. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
11
21. Figure 12 shows a new DVD player that is bought by Mr. Ahmad. He has downloaded
several movies in his computer and wanted to be played on the DVD player.
Figure 12
Based on Figure 12, state a type of secondary storage medium that can be used by Mr.
Ahmad.
22. Figure 13 shows a MacBook Air.
Figure 13
Based on Figure 13, name the platform of this operating system.
10. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
12
23. Figure 14 shows an application software.
Figure 14
Based on Figure 14, name the type of the application software.
11. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
13
24. Identify the video capture card by writing A, B, C or D.
A C
B D
25. Figure 15 shows several computer ports.
A C
B D
Figure 15
Based on Figure 15, write A, B, C or D to indicate a firewire port.
12. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
14
Section B
[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Figure 16 shows two scenarios in education system.
A B
Figure 16
Based on Figure 16,
(a) Name the type of system used in A and B.
[2 marks]
(b) State two differences between system A and B.
[2 marks]
27. Read the following statement.
Based on the above statement,
(a) explain a computer threat that David has probably faced.
[2 marks]
(b) describe a solution that David could take to solve the computer threat in Question
27(a).
[2 marks]
David always spends his leisure time surfing the Internet and downloads suspicious
software from unsecure websites. After he had installed the software, his computer
displayed a weird message at startup and become slower in processing speed.
13. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
15
28. Figure 17 shows two types of software.
A
B
Figure 17
Based on Figure 17,
(a) name the type of software A and B, and
[2 marks]
(b) state two differences between software A and B.
[2 marks]
29. Figure 18 shows the machine cycle of a processor.
Figure 18
Based on Figure 18, explain the sequence of machine cycle.
[4 marks]
14. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
16
30. Figure 19 shows two types of user interface of operating system (OS).
A
B
Figure 19
Based on Figure 19,
(a) name user interface A and B, and
[2 marks]
(b) describe two differences between interface A and B.
[2 marks]
15. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
17
Section C
[14 marks]
This section consists of two questions. You are required to answer all questions.
31. The following is a text on computer crime in television station broadcasting.
Nora works as a video editor in a private television broadcaster company in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcasted to the nation. Without
company’s permission, Nora has made copies of the television programs and sells
them via the Internet.
Based on the text:
(a) State the computer crime that Nora has been committed.
[1 marks]
(b) Explain why cyber laws are important for television broadcaster company.
[2 marks]
(c) Explain two ways from the point of human aspect to prevent the above crime.
[4 marks]
16. SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
18
32. Read the following statement.
Based on the statement above,
(a) state the type of application software that could be used by Ali and Joanne and
explain their functions, and
[4 marks]
(b) give an example of open source application software that Ali could use and
describe two advantages of using it.
[3 marks]
END OF QUESTION PAPER
Prepared by Mr. Hu Kwong Liik
Counter-checked by Mr. Voon Suk Foo
Ali needs to complete an assignment to calculate and managing marks of all
the students in his class. Whereas, Joanne has to prepare an assignment that
need to be presented in her class soon.