SlideShare a Scribd company logo
1 of 16
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
3
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Complete the following statement.
Table 1 is about the usage of ICT.
 All transactions can be done by computers or mobile computing devices
 Transaction can be done anytime and anyplace
 Example of transactions is electronic funds transfer to merchants
Table 1
Based on Table 1, the usage of ICT is referred to ………………………………
sector.
2. Figure 1 show technologies used in two different generations of computers.
A B
Figure 1
Based on the Figure 1, identify the computer generation for
(i) A
(ii) B
3. Read the following statement.
Statement above is regarding ……………………….. system.
Production was slow because everything was done manually and totally
depended on human labour.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
4
4. Figure 2 shows examples on two types of authentication methods.
Figure 2
Based on Figure 2, state the type of authentication method used for:
(i) P
(ii) Q
5. Figure 3 shows the display of an internet filtering software.
Figure 3
Based on Figure 3, state the method used.
Authentication methods
P Q
FILTERING SETTINGS
Restricted List
http://www.seperti.com
http://www.jalan.com
ADD REMOVE EXIT
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
5
6. Figure 4 shows a computer security threat.
Figure 4
Based on Figure 4,
(i) state the type of computer threat, and
(ii) identify security measure that can be used to prevent the threat in Question
6(i).
7. Table 2 shows security measures to protect our computer system.
(i) It is a process of hiding information by
altering the actual information into
different representation.
(ii) Prevent portability by restricting the
hardware from being moved.
Table 2
Based on Table 2, match the statements with the correct security measures by writing
A, B, C or D.
A Anti-virus
B Human aspects
C Cryptography
D Firewall
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
6
8. Table 3 shows terms of computer ethics and legal issues.
Intelletual Property Privacy Computer Crime
A B C
Table 3
Based on Table 3, write A, B or C to match the following statement.
(i) The right of individuals and companies to deny or restrict the collection and use
of data and information about them.
(ii) Protect ideas, inventions, unique names, business models, industrial processes,
computer program codes and more.
9. ICT has brought many positive impacts on society.
Figure 5
Based on Figure 5, state any positive impact of ICT on society.
I Lower communication cost because people can save time and resources
II Inappropriate online communication with unknown person through the Internet
III Effective sharing of information and opinions
IV Effective sharing false content
A I and II
B I and III
C II and IV
D III and IV
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
7
10. Figure 6(a) and Figure 6(b) show two hardware in a system unit.
Figure 6(a) Figure 6(b)
Based on Figure 6(a) and 6(b),
(i) state the name of component in Figure 6(a), and
(ii) determine the location of component 6(a) should be placed onto the
motherboard by writing X or Y.
11. Figure 7 shows a computer specification.
Figure 7
Based on Figure 7, state the clock rate for this computer.
X
Y
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
8
12. Figure 8 shows three examples of computer storage.
A B C
Figure 8
Based on Figure 8, write A, B or C to match the following statement:
(i) Holds data permanently until the users delete it.
(ii) The contents can be accessed and read but cannot be changed.
13. State whether the following statement is True or False.
1 GHz equivalent to 1000 kHz.
14. Which of the following is NOT a function of operating system?
A Starting a computer
B Providing a user interface
C Managing data and program
D Perform specific tasks for user
15. Drop cap is a feature which available in ………………….. application software.
A word processing
B spreadsheet
C presentation
D graphic editing
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
9
16. Figure 9 shows the information processing cycle.
Figure 9
Based on Figure 9,
(i) identify D, and
(ii) state a function of D
17. Table 4 shows three types of software.
A Operating system
B Utility Program
C Application software
Table 4
Based on Table 4, match the types of software with the appropriate statements by
writing A, B or C.
(i) Madam Anne asks her ICT students to scan and defragment the computers
before she begins her lesson.
(ii) Madam Jennifer is using a software to convert numeric data into charts.
Input
Process D
Output
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
10
18. Figure 10 shows two example of input devices.
X Y
Figure 10
Based on the Figure 10, state the type of input for
(i) X
(ii) Y
19. Figure 11 shows some storage devices.
A B C
Figure 11
Based on Figure 11, write A, B or C to match the following statement:
(i) This storage device loses the stored data when the computer is shut down.
(ii) Content in this storage media is written and read by a laser.
20. State whether the following statement is True or False.
Open source software is lack of offering stable system supports if the software
malfunctions.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
11
21. Figure 12 shows a new DVD player that is bought by Mr. Ahmad. He has downloaded
several movies in his computer and wanted to be played on the DVD player.
Figure 12
Based on Figure 12, state a type of secondary storage medium that can be used by Mr.
Ahmad.
22. Figure 13 shows a MacBook Air.
Figure 13
Based on Figure 13, name the platform of this operating system.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
12
23. Figure 14 shows an application software.
Figure 14
Based on Figure 14, name the type of the application software.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
13
24. Identify the video capture card by writing A, B, C or D.
A C
B D
25. Figure 15 shows several computer ports.
A C
B D
Figure 15
Based on Figure 15, write A, B, C or D to indicate a firewire port.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
14
Section B
[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Figure 16 shows two scenarios in education system.
A B
Figure 16
Based on Figure 16,
(a) Name the type of system used in A and B.
[2 marks]
(b) State two differences between system A and B.
[2 marks]
27. Read the following statement.
Based on the above statement,
(a) explain a computer threat that David has probably faced.
[2 marks]
(b) describe a solution that David could take to solve the computer threat in Question
27(a).
[2 marks]
David always spends his leisure time surfing the Internet and downloads suspicious
software from unsecure websites. After he had installed the software, his computer
displayed a weird message at startup and become slower in processing speed.
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
15
28. Figure 17 shows two types of software.
A
B
Figure 17
Based on Figure 17,
(a) name the type of software A and B, and
[2 marks]
(b) state two differences between software A and B.
[2 marks]
29. Figure 18 shows the machine cycle of a processor.
Figure 18
Based on Figure 18, explain the sequence of machine cycle.
[4 marks]
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
16
30. Figure 19 shows two types of user interface of operating system (OS).
A
B
Figure 19
Based on Figure 19,
(a) name user interface A and B, and
[2 marks]
(b) describe two differences between interface A and B.
[2 marks]
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
17
Section C
[14 marks]
This section consists of two questions. You are required to answer all questions.
31. The following is a text on computer crime in television station broadcasting.
Nora works as a video editor in a private television broadcaster company in
Malaysia. She uses her expertise in ICT for editing the television programs in order
to preserve the quality before they were broadcasted to the nation. Without
company’s permission, Nora has made copies of the television programs and sells
them via the Internet.
Based on the text:
(a) State the computer crime that Nora has been committed.
[1 marks]
(b) Explain why cyber laws are important for television broadcaster company.
[2 marks]
(c) Explain two ways from the point of human aspect to prevent the above crime.
[4 marks]
SULIT
F4 May 2015 3765/1
3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT
18
32. Read the following statement.
Based on the statement above,
(a) state the type of application software that could be used by Ali and Joanne and
explain their functions, and
[4 marks]
(b) give an example of open source application software that Ali could use and
describe two advantages of using it.
[3 marks]
END OF QUESTION PAPER
Prepared by Mr. Hu Kwong Liik
Counter-checked by Mr. Voon Suk Foo
Ali needs to complete an assignment to calculate and managing marks of all
the students in his class. Whereas, Joanne has to prepare an assignment that
need to be presented in her class soon.

More Related Content

What's hot

10 css week 2 hardware and-software-ipos_
10 css week 2 hardware and-software-ipos_10 css week 2 hardware and-software-ipos_
10 css week 2 hardware and-software-ipos_
AronPaul5
 

What's hot (20)

SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)
 
Functions of motherboard
Functions of motherboardFunctions of motherboard
Functions of motherboard
 
How to prepare a portable bootable devices
How to prepare a portable bootable devicesHow to prepare a portable bootable devices
How to prepare a portable bootable devices
 
ICT Model Questions
ICT Model Questions ICT Model Questions
ICT Model Questions
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2
 
Basic Computer Skills Seminar
Basic Computer Skills Seminar Basic Computer Skills Seminar
Basic Computer Skills Seminar
 
Computer Mouse
 Computer Mouse Computer Mouse
Computer Mouse
 
Computer basics
Computer basicsComputer basics
Computer basics
 
RPP TIK KELAS IX SEMESTER 1
RPP TIK KELAS IX SEMESTER 1 RPP TIK KELAS IX SEMESTER 1
RPP TIK KELAS IX SEMESTER 1
 
Introduction to binary
Introduction to binaryIntroduction to binary
Introduction to binary
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
MS word worksheet for class 4th
MS word worksheet for class 4th MS word worksheet for class 4th
MS word worksheet for class 4th
 
Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
 
JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
 
10 css week 2 hardware and-software-ipos_
10 css week 2 hardware and-software-ipos_10 css week 2 hardware and-software-ipos_
10 css week 2 hardware and-software-ipos_
 
class One computer worksheet
class  One computer worksheetclass  One computer worksheet
class One computer worksheet
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
MS WORD Introduction ppt
MS WORD Introduction pptMS WORD Introduction ppt
MS WORD Introduction ppt
 
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMSBASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
 

Viewers also liked

ICT FINAL EXAM
ICT FINAL EXAM ICT FINAL EXAM
ICT FINAL EXAM
Anna Molly
 
Powerpoint past papers s10 qp 31 ICT
Powerpoint past papers s10 qp 31 ICT Powerpoint past papers s10 qp 31 ICT
Powerpoint past papers s10 qp 31 ICT
Neill121
 
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan OrganisasiKertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Mohd Abdul Nasir
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
smkengkilili2011
 
Chemistry paper 1
Chemistry paper 1Chemistry paper 1
Chemistry paper 1
Ina Amalina
 
Factors which affect the speed of internet computer studies lesson
Factors which affect the speed of internet computer studies lessonFactors which affect the speed of internet computer studies lesson
Factors which affect the speed of internet computer studies lesson
Mukalele Rogers
 

Viewers also liked (20)

Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
 
Set2 ict-question
Set2 ict-questionSet2 ict-question
Set2 ict-question
 
ICT FINAL EXAM
ICT FINAL EXAM ICT FINAL EXAM
ICT FINAL EXAM
 
Input computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTInput computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICT
 
Ict topic 6
Ict topic 6Ict topic 6
Ict topic 6
 
Set7 ict-question
Set7 ict-questionSet7 ict-question
Set7 ict-question
 
Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Powerpoint past papers s10 qp 31 ICT
Powerpoint past papers s10 qp 31 ICT Powerpoint past papers s10 qp 31 ICT
Powerpoint past papers s10 qp 31 ICT
 
2007
20072007
2007
 
Ict applied to english teaching form
Ict applied to english teaching  formIct applied to english teaching  form
Ict applied to english teaching form
 
ICT SPM 2013
ICT SPM 2013ICT SPM 2013
ICT SPM 2013
 
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan OrganisasiKertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Chemistry paper 1
Chemistry paper 1Chemistry paper 1
Chemistry paper 1
 
Mathematics Previous year Question Paper
Mathematics Previous year Question PaperMathematics Previous year Question Paper
Mathematics Previous year Question Paper
 
Factors which affect the speed of internet computer studies lesson
Factors which affect the speed of internet computer studies lessonFactors which affect the speed of internet computer studies lesson
Factors which affect the speed of internet computer studies lesson
 
Web designing and publishing computer studies theory lesson
Web designing and publishing computer studies theory lessonWeb designing and publishing computer studies theory lesson
Web designing and publishing computer studies theory lesson
 
Microsoft Office Package: Practical Questions
Microsoft Office Package: Practical QuestionsMicrosoft Office Package: Practical Questions
Microsoft Office Package: Practical Questions
 
MCQ on Computer and ICT
MCQ on Computer and ICTMCQ on Computer and ICT
MCQ on Computer and ICT
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 

Similar to ICT Form 4 MAY 2015 test paper

Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
Siti Salmiah
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
fizahPhd
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
fizahPhd
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
Gary Tsang
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
AyuMohamad
 

Similar to ICT Form 4 MAY 2015 test paper (20)

Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
 
2009
20092009
2009
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
 
Soalan ictl bi
Soalan ictl biSoalan ictl bi
Soalan ictl bi
 
Johor trial-09-c
Johor trial-09-cJohor trial-09-c
Johor trial-09-c
 
Exam question sample IT
Exam question sample ITExam question sample IT
Exam question sample IT
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
 
IRJET - Media-Processing for Structural Failure Assessment
IRJET - Media-Processing for Structural Failure AssessmentIRJET - Media-Processing for Structural Failure Assessment
IRJET - Media-Processing for Structural Failure Assessment
 
F4 learning-area-1-ict
F4 learning-area-1-ictF4 learning-area-1-ict
F4 learning-area-1-ict
 
2011
20112011
2011
 
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
 
Computing 9691 Test paper Paper 1 for May / June 2007 Cambridge
Computing 9691 Test paper Paper 1 for May / June 2007 CambridgeComputing 9691 Test paper Paper 1 for May / June 2007 Cambridge
Computing 9691 Test paper Paper 1 for May / June 2007 Cambridge
 
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using  Raspberry PiIOT based Industrial Automation using  Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
 
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

ICT Form 4 MAY 2015 test paper

  • 1. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 3 Section A [36 marks] Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. 1. Complete the following statement. Table 1 is about the usage of ICT.  All transactions can be done by computers or mobile computing devices  Transaction can be done anytime and anyplace  Example of transactions is electronic funds transfer to merchants Table 1 Based on Table 1, the usage of ICT is referred to ……………………………… sector. 2. Figure 1 show technologies used in two different generations of computers. A B Figure 1 Based on the Figure 1, identify the computer generation for (i) A (ii) B 3. Read the following statement. Statement above is regarding ……………………….. system. Production was slow because everything was done manually and totally depended on human labour.
  • 2. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 4 4. Figure 2 shows examples on two types of authentication methods. Figure 2 Based on Figure 2, state the type of authentication method used for: (i) P (ii) Q 5. Figure 3 shows the display of an internet filtering software. Figure 3 Based on Figure 3, state the method used. Authentication methods P Q FILTERING SETTINGS Restricted List http://www.seperti.com http://www.jalan.com ADD REMOVE EXIT
  • 3. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 5 6. Figure 4 shows a computer security threat. Figure 4 Based on Figure 4, (i) state the type of computer threat, and (ii) identify security measure that can be used to prevent the threat in Question 6(i). 7. Table 2 shows security measures to protect our computer system. (i) It is a process of hiding information by altering the actual information into different representation. (ii) Prevent portability by restricting the hardware from being moved. Table 2 Based on Table 2, match the statements with the correct security measures by writing A, B, C or D. A Anti-virus B Human aspects C Cryptography D Firewall
  • 4. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 6 8. Table 3 shows terms of computer ethics and legal issues. Intelletual Property Privacy Computer Crime A B C Table 3 Based on Table 3, write A, B or C to match the following statement. (i) The right of individuals and companies to deny or restrict the collection and use of data and information about them. (ii) Protect ideas, inventions, unique names, business models, industrial processes, computer program codes and more. 9. ICT has brought many positive impacts on society. Figure 5 Based on Figure 5, state any positive impact of ICT on society. I Lower communication cost because people can save time and resources II Inappropriate online communication with unknown person through the Internet III Effective sharing of information and opinions IV Effective sharing false content A I and II B I and III C II and IV D III and IV
  • 5. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 7 10. Figure 6(a) and Figure 6(b) show two hardware in a system unit. Figure 6(a) Figure 6(b) Based on Figure 6(a) and 6(b), (i) state the name of component in Figure 6(a), and (ii) determine the location of component 6(a) should be placed onto the motherboard by writing X or Y. 11. Figure 7 shows a computer specification. Figure 7 Based on Figure 7, state the clock rate for this computer. X Y
  • 6. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 8 12. Figure 8 shows three examples of computer storage. A B C Figure 8 Based on Figure 8, write A, B or C to match the following statement: (i) Holds data permanently until the users delete it. (ii) The contents can be accessed and read but cannot be changed. 13. State whether the following statement is True or False. 1 GHz equivalent to 1000 kHz. 14. Which of the following is NOT a function of operating system? A Starting a computer B Providing a user interface C Managing data and program D Perform specific tasks for user 15. Drop cap is a feature which available in ………………….. application software. A word processing B spreadsheet C presentation D graphic editing
  • 7. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 9 16. Figure 9 shows the information processing cycle. Figure 9 Based on Figure 9, (i) identify D, and (ii) state a function of D 17. Table 4 shows three types of software. A Operating system B Utility Program C Application software Table 4 Based on Table 4, match the types of software with the appropriate statements by writing A, B or C. (i) Madam Anne asks her ICT students to scan and defragment the computers before she begins her lesson. (ii) Madam Jennifer is using a software to convert numeric data into charts. Input Process D Output
  • 8. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 10 18. Figure 10 shows two example of input devices. X Y Figure 10 Based on the Figure 10, state the type of input for (i) X (ii) Y 19. Figure 11 shows some storage devices. A B C Figure 11 Based on Figure 11, write A, B or C to match the following statement: (i) This storage device loses the stored data when the computer is shut down. (ii) Content in this storage media is written and read by a laser. 20. State whether the following statement is True or False. Open source software is lack of offering stable system supports if the software malfunctions.
  • 9. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 11 21. Figure 12 shows a new DVD player that is bought by Mr. Ahmad. He has downloaded several movies in his computer and wanted to be played on the DVD player. Figure 12 Based on Figure 12, state a type of secondary storage medium that can be used by Mr. Ahmad. 22. Figure 13 shows a MacBook Air. Figure 13 Based on Figure 13, name the platform of this operating system.
  • 10. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 12 23. Figure 14 shows an application software. Figure 14 Based on Figure 14, name the type of the application software.
  • 11. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 13 24. Identify the video capture card by writing A, B, C or D. A C B D 25. Figure 15 shows several computer ports. A C B D Figure 15 Based on Figure 15, write A, B, C or D to indicate a firewire port.
  • 12. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 14 Section B [20 marks] This section consists of five questions. You are required to answer all questions. 26. Figure 16 shows two scenarios in education system. A B Figure 16 Based on Figure 16, (a) Name the type of system used in A and B. [2 marks] (b) State two differences between system A and B. [2 marks] 27. Read the following statement. Based on the above statement, (a) explain a computer threat that David has probably faced. [2 marks] (b) describe a solution that David could take to solve the computer threat in Question 27(a). [2 marks] David always spends his leisure time surfing the Internet and downloads suspicious software from unsecure websites. After he had installed the software, his computer displayed a weird message at startup and become slower in processing speed.
  • 13. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 15 28. Figure 17 shows two types of software. A B Figure 17 Based on Figure 17, (a) name the type of software A and B, and [2 marks] (b) state two differences between software A and B. [2 marks] 29. Figure 18 shows the machine cycle of a processor. Figure 18 Based on Figure 18, explain the sequence of machine cycle. [4 marks]
  • 14. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 16 30. Figure 19 shows two types of user interface of operating system (OS). A B Figure 19 Based on Figure 19, (a) name user interface A and B, and [2 marks] (b) describe two differences between interface A and B. [2 marks]
  • 15. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 17 Section C [14 marks] This section consists of two questions. You are required to answer all questions. 31. The following is a text on computer crime in television station broadcasting. Nora works as a video editor in a private television broadcaster company in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcasted to the nation. Without company’s permission, Nora has made copies of the television programs and sells them via the Internet. Based on the text: (a) State the computer crime that Nora has been committed. [1 marks] (b) Explain why cyber laws are important for television broadcaster company. [2 marks] (c) Explain two ways from the point of human aspect to prevent the above crime. [4 marks]
  • 16. SULIT F4 May 2015 3765/1 3765/1 © May 2015 Hak Cipta SMKTung Hua SULIT 18 32. Read the following statement. Based on the statement above, (a) state the type of application software that could be used by Ali and Joanne and explain their functions, and [4 marks] (b) give an example of open source application software that Ali could use and describe two advantages of using it. [3 marks] END OF QUESTION PAPER Prepared by Mr. Hu Kwong Liik Counter-checked by Mr. Voon Suk Foo Ali needs to complete an assignment to calculate and managing marks of all the students in his class. Whereas, Joanne has to prepare an assignment that need to be presented in her class soon.