I. A network was set up in an audio-visual room with 10 computers connected to a hub. This allows people in the room to share resources and communicate over the local network.
II. Key advantages of a network include people being able to share files, printers and other peripherals. It also improves communication and collaboration.
III. An extranet is a network that uses internet technology to link a company to suppliers, vendors and customers, allowing restricted access to parts of a company's internal network.
1. SET2 ICT 2007
SECTION A A special set of rules to connect devices
B system of interconnected computers and peripheral devices
Question 1 to 10
C system that change analog signal to digital signal
1. Information refers to D system that transmits information in form of data through a
___________________________________ physical medium
A. An act of transmitting messages
B. the knowledge obtained from reading, investigation, study 9. Which is from the following statements is not true about
or research. networks ?
C. the use of scientific knowledge, experience and resources A People in various places can be connected using a network.
to create processes and products that fulfill human needs B Networking technology allows banking to be done everywhere
D. the technology required for information processing, in and at any time.
particular, the use of electronic computers, C We cannot do a long distance communication using a network
communication devices and software applications to D A network links two or more computers together to enable data
convert, store, protect, process, transmit and retrieve and resource exchange.
information from anywhere, anytime
2. Charles Babbage invented the
10. -Cover a small region of spaces
_________________________. Meliputi kawasan kecil
A. Abacus B.Napier’s Bone
C. Weaving Loom D. Mechanical Calculator Machine
-The range of speed is between 10mbps to 100mbps
3. Which of the followings are the similarities between ethics and Kadar kelajuan adalah diantara 10mbps hingga 100mbps
law?
I. to prevent any crime
II. as a rule to control computer users The statements above refers to…………….
III.to guide user from misusing computers A LAN B.MAN C. WAN D.
IV. to create a healthy computer society, so that computers are Intranet
used to contribute to a better life
A. I, II and III B.II, III and IV Write ‘T’ for true statements and ‘F’ for false statements.
C. I, III and IV D.All above
4.Verification is _____________________________. 11. A WAN is a network that covers a large
A.The act of proving or disproving the correctness of a system geographic area using a communication
with respect to a certain formal specification channel that combines many types of
B.Process where users verify that they are who they say they are transmission media such as telephone lines,
C.The scanning of retina and analysing the layer of blood vessels cables and radio waves.
at the back of the eye
D.The measurement and analysis of the shape of one’s hand
12. A computer can function properly without
5.A headphone is a/an ___________ device. application software.
A. input B. output C. storage D. process
6. The three main types of secondary storage are . 13. A compressed file must be unzipped or restored
A. CD, DVD and DVDRW to its original form before being used.
B. ROM, RAM and hard drive
C. hard disk, floppy disk and pen drive
D. magnetic medium, optical medium and flash memory 14. Trademark Law is a protection of a company’s
logos and brand name.
7. An operating system is____________ .
A. a program designed to assist users with 15. Changing computer programming codes with
personal task permission is unethical.
B. a program that allows a user to perform
maintenance type task
C. a program that control or maintain the
operations of a computer and its device
D. a set of programs that coordinates all the
data transmissions among computer in a
network
8. Computer Networks is a ………………………..
1
2. SET2 ICT 2007
Match the picture with the correct statement. functions and applications in one or more dedicated file servers.
______________________
Technology Year
16. II.Serves extended enterprise, including defined sets of customers
(A) or suppliers or other partners.
In 1925, television
was made known _____________________
to public. SECTION B
QUESTION 1
17. Look at the picture below and answer the questions that follow.
(B)
In 1941, the
computer was
created.
18.
(C)
In 3500 BC, the
Sumerians
developed Define pornography (2 scores)
cuneiform writing. I.____________________________________________________
____________________________________________
19. II. Give two impacts of pornography on Malaysian society.
In 1876, the first a.___________________________________________________
telephone was ___________________________________________
introduced. b.___________________________________________________
(D) ___________________________________________
QUESTION 2
20.
I. Complete the diagram below
In 1500 BC, the
Phoenicians Computer
Security
developed the
alphabet.
(E) a. b.
___________ ___________
_______ ______
Fill in the blanks.
21. Give five common type of network communications channels :
I. ________________________________
II. ________________________________ ___________ ___________
III. ________________________________ ______
IV. ________________________________ ______
V. ________________________________
22. Controversial content is information that causes Software and
___________________ among people who have different Data
____________________ , moral and _____________________. II. Give two examples of computer threats.
Security
a.___________________________________________________
23. Retinal biometrics involves the _________________________ b.___________________________________________________
of retina and analyzing the layer of _________________________
at the back of the eye. (2 scores)
24. A computer system requires four main aspects of data handling QUESTION 3
to function properly which are input, _______________, Rearrange the steps in scanning antivirus below.
______________ and ______________ A.scan the selected file
B.choose an antivirus program
C.wait while the program is scanning and the result is produced
D.select file that need to be scanned
25. Answer statements A and B according to situation below.
I.Operating systems that allow the network to centralise
2
3. SET2 ICT 2007
( 4 scores ) a. _________________ b. __________________
QUESTION 4 ( 2 scores )
I. Define computer system
_____________________________________________________ II. Give two differences between above computer networks.
a.________________________________________________
_____________________________________________________
______________
_____________________________________________________ b.________________________________________________
______________
_____________________________________________________
( 2 scores )
_____________________________________________________
SECTION C
_____________________________________________________
Instruction : Question 1 is compulsory AND answer either
( 2 scores ) Question 2 or Question 3.
II. Draw a block diagram and describe the information processing Question 1 (COMPULSORY)
cycle which includes input, process, output and storage.
An Audio-Visual Room has been equipped with 10 computers and
a hub. As an ICT coordinator, you are required to set up a small
network in the room. ( 2 scores)
a) Sketch the topology for the room.
[2 scores]
b) Give three advantages of using a networking rather than
a stand-alone pc. ( 3 scores)
I.______________________________________
_______________________________________
II. ______________________________________
_______________________________________
III______________________________________
BLOCK DIAGRAM _______________________________________
( 2 scores )
c) Define the network communication technology of
Extranet.
______________________________________
_______________________________________
[2 scores]
Question 2
QUESTION 5
Based on figure below, answer the following questions. Figure 1 shows some of the components of a computer system.
I. Name the types of computer networks below. Figure 1
3
4. SET2 ICT 2007
C) Give two sub components in a central processing unit
I._____________________________
II_____________________________[2 scores]
D)Give two differences between I and J.
Primary storages Aspects Secondary storage
I.
II.
[2 scores]
Question 3
Maria just won a set of personal computer. The personal computer
is without any system software.
1. What is the most importance system software, so that the
personal computer can be used.
____________________________
[1 score]
2. Virus can be scanned using antivirus software. What type
of system software used.
____________________________
[1 score]
Based 3. List three popular operating system platforms.
on Figure 1, answer the following questions. (a)_______________________
(b)_______________________
(c)_______________________
[3 scores]
a) State the meaning of input
______________________________________________ 4. State two differences between operating systems and
[1 score] utility programs.
Operating system Utility program
b) List two type of output. [2 scores]
I. _____________________________
II. _____________________________
[2 scores]
~ END OF QUESTION PAPER ~
4