1. Name :
Quiz 1 Form 5
Learning Area 1,2,3
LA 1-ICT & SOCIETY,
LA 2-COMPUTER SYSTEMS,
LA 3-COMPUTER NETWORKS AND COMMUNICATIONS
Answer all question.
1. Figure 1 shows methods of Internet Filtering. Complete the figure 2.
Internet Filtering
Keyword Blocking
X: _____________
Web Rating System
Figure 1
2. Table 1 shows types of computer crimes.
A: Computer fraud
B: Computer theft
C: Computer attack
Table 1
Based on Table 1, write A, B, or C to categories the following activities:
i) Email hoaxes, false claims of expertise on certain fields. ____________
ii) Tap into the data transmission lines and intentional transfer of payments to the wrong
account. ______________
3. Give 2 examples of
i) magnetic medium: ___________________________________________
ii) optical medium : ____________________________________________
iii) flash memory.: _____________________________________________
4. A network that spans a city is called a _____________________________.
5. Table 2 shows different types of software.
A
B
Windows XP
Linux Redhat
MS Office
Open Office.org
Solaris
Open LDAP
State four differences between types of software list in A and B.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_________________