SlideShare a Scribd company logo
1 of 7
SET6 ICT QUESTION 2007
     Section A (36 scores)
     Instruction: Answer ALL questions.                                        Question 6 is based on Figure 2.
1.     1.Puan Zalila obtained the exclusive legal rights for the
       distribution and sale of the CD-ROM. This associated with               6. Figure 2 shows a computer network.
       A         piracy       B privacy rights
       C         copyright           D     patent

2.    Question 2 is based on Figure 1.
      Figure 1shows an example of Operating System interface.

                                              Figure 1                                                    Figure 2

                                                                                        Identify the network in Figure 2.
                                                                                                         Network A           Network B
                                                                                                A Peer to peer              Peer – server
                                                                                                B Client – server           Peer to peer
                                                                                                C Peer to peer              Client –
                                                                                                                            server
      2.The interface are difficult to use because they require exact spelling, grammar and punctuation. Name the interface.
          A. Graphical user interfaces                                                         D Peer – server              Peer to peer
          B. B. Menu-driven interfaces
          C. C. Command-line interfaces                                      7. Haziq browsed http://webopedia.com to retrieve information
          D. D.All the above                                                    of networking. After that, he saves and prints the file of the
                                                                                document. Haziq intends to revisit to that web page.
3.    3.A ________________ is a small program that tells the operating system how to communicate with a in the correct sequence.
                                                                                Arrange the features used specific device.
          A. Buffer               B.device                                   I Bookmark II Navigation button III Save file IV Print
          C. performance monitor D. driver                                   A I, II, III, IV B II, III, IV, I  C III, IV, I, II D IV, I, II, III

4.    4. The following are examples of programming languages.                  8.The following are steps involved in the development of
      Choose the correct pair.                                                   multimedia materials. At which stage would an error be detected
                      Generation            Example of                           and rectified?
                                           programming                         A        Analyzing problem        B Developing storyboard
                                             language                          C        Testing and debugging D Documenting
              A First                   SQL Language
                                                                               9. The statements below explain about computer network.
              B Second                  Assembly Language
                                                                                  The above explanations refer to …………
              C Third                   Machine Language
                                                                                     • It is the largest network connecting computers
              D Fourth                  C Language
                                                                                          worldwide.
                                                                                     • All data transmissions or message exchanges are
5.    Table 1(a) shows the records of a group of students.
                                                                                          based on a TCP/IP standard protocol.
      Table 1(b) is the result of rearranging the records in Table 1(a)
                                                                                     • The main service provider in Malaysia is Jaring and
       Student ID        Name of Student            Date of Birth
                                                                                          TMNet.
       P001              Syamin Binti Zaidi         13.10.1990
                                                                                    A. Intranet B. Telnet C. Extranet D.Internet
       P002              Adriana Binti Hamizan      12.10.1990
       P003              Amirah Binti Zaid          15.11.1990
                                                                        10.    10. The following are activities in the development of
       P004              Zikri Bin Zafri            14.10.1990
                                                                                    an information system. The activities in the problem
      Table 1(a)                                                                                                        Title
                                                                                    analysis phase are
       Student ID        Name of Student            Date of Birth              I         Collecting relevant data
       P002              Adriana Binti Hamizan      12.10.1990                  II       Writing a report on the current information system 1 1
                                                                                                                              Text for picture
                                                                                                                                             Picture
       P001              Syamin Binti Zaidi         13.10.1990                 III       Identifying the needs for the new information system
       P004              Zikri Bin Zafri            14.10.1990                 IV        Convincing users that the new information system 2 2
                                                                                                                              Text for picture
                                                                                                                                             Picture
       P003              Amirah Binti Zaid          15.11.1990                 has better security features
      Table 1(b)                                                               AI, III   B        II, III  C         III, IV  D        I, IV Audio
                                                                                                                                              Exit
      5. The above change is a result of                                                                                                      button
           A. a single field sort B.a multiple field sort
           B. C. a single field indexing D. a multiple field indexing
14.    14.Hamizan wants to send a file to Zanariah using
                                                                                   electronic mail services. He ensures that the file
                                                                                    is virus-free before it is sent.
                                                                                           (i)       Hamizan uses a utility software to ensures
                                                                                                                                                  T
                                                                                                                                                  F
 11. Figure 3 is one of the steps in a multimedia development.                                      the file is virus-free before it is sent.
                                                                                           (ii)     Communication between Hamizan and
                              Title                                                                 Zanariah is ext-based.                        T
                                                                                                                                                  F

     Picture 1                        Text for picture 1                 15.    15. The statement below refers to programming language.
                                                                                          (i)     A programming language consists T  of           F
     Picture 2                        Text for picture 2                                         code collections, symbols, text, diagrams
                                                                                                 and charts.                         T            F
     Audio                                                                                (ii)    The machine language can only be written
                                                           Exit                                  using 1s and 0s digit.
                                                           butt
            Figure 3                                                                   •    Performs functions such as copying,
 identify the step :                                                                        renaming, deleting and moving files
A. Coding                  B. Documenting                                              •    Image viewer displays contents of
C. Analyzing problem       D. Developing a storyboard                                       graphics file when you double click on it

 12. Question 12 is based on Figure 4.
                                                                               16. statements above refer to …………………………………
         Unknown                Idea can be
          author               misunderstood




                                                                               17.
                         X

   X is one of the issues in computer ethics. X may be
   __________________________.
        A. software theft         B. unauthorized use
        B. C. authorized access D.information accuracy

   For Question 13 until 15, state whether each statement is True
   (T) or False (F).
   Figure 5 shows a code written a particular programming
   language.

   13.
             (i)     If Zikri scores 67 marks, he is eligible to get a
                     “B” grade.
             (ii)    Variable named ‘gred’ is declared as ‘Integer’.



                                                                               Question 17 is based on Figure 6.

                                                                               Based on Figure 6, X is a combination of presentation involving
                                                                               texts, A, video, graphic and animation elements.

                                                                                (i)    X is a ……………………………………… (ii) The hardware used
                                                                                        to produce A is ………………………
18. Syamin received a message from Zaidi through Internet           22.Figure 9 shows the features of an Internet browser.
        services S. Zaidi asked Syamin to send the minutes of
        the meeting using feature T of the same services.                                                                     Q          Q
        (i)      Name S                         (ii) Name T
                                                                                                                              M
    19.Figure 7 and Figure 8 are two methods of executing a
       program.
                                                                            (i)      Name feature Q.        (ii)       State one
            Sour                  X            Object           Resul                advantage of feature M
            ce                                  code             t
            code                                                        23.Alfi has listed a number of things to complete a multimedia
                                                    Dat                    project entitled “ Visit Malaysia Year 2007”
                                                     a                     as shown in Table 3.
                                   Figure 7                                 1. Collect pictures of Malacca, Putrajaya and
                                                                                 Kuala Lumpur.
            Sourc
                                                                            2. Orientate the “Visit Malaysia Year 2007” logo
            e code
                                                                                 so that it is animated.
                                          Y                Result           3. Record the “Cuti-Cuti Malaysia” song.
                                                                            4. Insert the Visit Malaysia themes; insert
            Da                                                                   Malacca, Putrajaya and Kuala Lumpur history
            ta                                                                   into different screens.
                                                                        Note : The files to be used are malacca.jpg,
                                                                        putrajaya.bmp, logoVM.gif and CCM.wav.
                                   Figure 8                                            (i)       What is the multimedia element that is
            (i)         Name X        (ii) Name Y                                                not used by Azli?
                                                                                       (ii)      What is the name of the animation file in
    20.Match the situation (i), (ii) and (iii) with the most                                     Table 3?
       suitable software in Table 2.


   A Norton Anti Virus B Winzip
   C Power Point
   D Internet Relay Chat (IRC)
   E. Paint Brush

                                   Table 2
     (i)          During Parent Teacher Association
                  meeting, Haziq as the presiden of the
                  computer club has been asked to give an
                  annual report on the club’s activities in a
                  more interesting and effective way.

     (ii)         Amira has a cousin studying overseas.
                  Instead of conversing through the
                  telephone, she can use text through the
                  Internet to communication.

21. Question 21 is referring to situation below.

  Encik Abdullah needs to give information to
  audiences about his company. To spend
  money and time he wants to use software
  that suitable to create attractive presentation.

Give the name for software above: ………………………………….
24. Complete the flow chart. Choose your answer from the box           SECTION B
   Provided
                                                                       QUESTION 1
A. Decision this      B This student      C. Output on
student is not        is qualified        student’s                    Look at the picture below and answer the questions that follow.
qualified to          to receive the      qualification
receive the           scholarship
scholarship
D. Decision on        E. Input on         F.This student is
student’s             student’s           not qualified to
qualification         qualification       receive the
                                          scholarship




                           BEGIN
                                                                           I.   Define pornography

                                             FALSE                         ________________________________________________
                                                                           ___________________
                            (i)                                            ________________________________________________
                                                                           _____________________
                                   TRUE
                                                     (ii)                  (2 scores)

                                                                         II. Give two impacts of pornography on Malaysian society.
                       B                                                    a.
                                                                       ____________________________________________________
                                                                       ____________
                                                                            b.
                           END
                                                                       ____________________________________________________
                                                                       ______________

                                                                                                                                         scores



25.Students fill biodata forms and submit to the class teacher.
    All the submitted forms will be filed according to classes and
   stored in the cupboard in a private room. In order to change
   the student’s data, the forms must be taken out from the
   class file to be updated and restored. The school clerk will
   refer to the files to prepare reports needed by the school.
        (i)    The file collection in the private room is …………….
          (ii)     Phase X is one of the phases in the Information
                   System development.
                 Below are some of the implemented activities:
                        • To measure the system’s level of
                                                                                         Computer Security
                             accomplishment.
                        • To get feedback from users about
                             the new system performance.
                        • To perform on going system
                             modification.
Phase X is ……………………                                                    QUESTION 2
Section B (20 scores)
Instruction : Answer ALL Questions.                                    I. Complete the diagram below

                                                                                                                                             (2
                                                                         a.                Software and               b.
                                                                     __________                Data              __________
                                                                      ________               Security              _______
__________                                  __________
                                                                     _______                                     _______
                                                                     II. Draw a block diagram and describe the information
                                                                     processing cycle which includes input, process, output and
                                                                     storage.
II. Give two examples of computer threats.
    a..
____________________________________________________
    b.
____________________________________________________

(4 scores)
QUESTION 3
Rearrange the steps in scanning antivirus below.

    A. scan the selected file
    B. choose an antivirus program
    C. wait while the program is scanning and the result is
       produced
    D. select file that need to be scanned


                                                                                            BLOCK DIAGRAM

                                                                                                                          ( 2 scores )

                                                    ( 4 scores )




                                                                     QUESTION 5
QUESTION 4
                                                                     Based on figure below, answer the following questions.
I. Define computer system
____________________________________________________                     I.   Name the types of computer networks below.
____________________________________________________
____________________________________________________
( 2 scores )
b) State two functions of E                   (2 scores)
   a. _________________             b. __________________
                                                                              _____________________________________________
                                                  ( 2 scores )
                                                                              _____________________________________________
    II. Give two differences between above computer
    networks.                                                            c)   State two differences between the characteristics of I
                                                                              and J storage.                      (2 scores)
        a.
                                                                              _____________________________________________
    ________________________________________________
                                                                              _____________________________________________
        b.
    ________________________________________________                 d)Give one advantage of using O in preparing a report and one
                                                                     advantage of using P in accounting.(2 scores)
                                                      ( 2 scores )   ____________________________________________________
                                                                     ____________________________________________________
                                                                     ____________________________________________________
                                                                     Instruction : Answer either Question 2 or 3
                                                                     2. En. Zaidi divides his ICT students into two groups to complete
                                                                         a multimedia project entitled “Sekolah Saya”. Group A are
                                                                         asked to deliver their multimedia contents through web-
                                                                         based and Group B through CD-based.(7 scores)




                                                                               GROUP A                 GROUP B




                                                                     a) Give two differences in delivering multimedia contents by
                                                                     Group A and Group B.        (2 scores)
Section C (14 scores)
Answer Question 1
1. Figure 13 shows the some of the components of a computer
system. (7 scores)


Based on Figure 13, answer the following questions.
    a)   Draw a block diagram of the computer system using
         the components C, D, E and F. (1 scores)




                                                                                         (i)                              (ii)
Figure 14


    a)    Web editor is a program that we use to create Web
          page. Name Figure 2 (i) and Figure 2 (ii). State one
          characteristic of (i) and (ii).
                                           (3 scores)




          Ahmad, a form 4 Alpha student                          4 i) Define the problem En. Kevin faces in his company.
          is     using     network  and                                                       (1 score)
          telecommunication      in ICT
          computer lab. He explores web
                                                                 ____________________________________________________
          page http://www.wikipedia.com
                                                                 _____________________
          to do his assignment.
                                                                    ii) Identify the necessary output En. Kevin sees in his manual
c) Explain two importances of facilities in the Ahmad’s          system                 (1 score)
computer lab.                    (2 scores)
   _________________________________________________
                                                                 ____________________________________________________
   _________________________________________________             _____________________
   _________________________________________________
                                                                   iii) Draw your design user interface, based on the input.
                                                                                              (2 scores)
3.
  a) The following text is a statement.



     En. Ali developed Employee
     Information System (EIS) for his
     client, Saujana Holding. He used
     software that could create
                                                                            Design user interface for Input
     database without writing long
     programs. He trained a data
     entry clerk to enter data into
     EIS.



    i)        Sketch the relationship between elements
              involved in developing EIS.

    ii)       State two uses of information system.
                                       (2 scores)


          _____________________________________________
            _____________________________________________
     Situation
     Encik Kevin is the manager of Sona
            _____________________________________________
             Car Enterprise. He asks you to
             develop
b) Based on situation below, answer the following questions.
     a system to calculate the monthly
     installment for every potential customer.
     When his customer decides to buy a car,
     he will get the customer’s details and
     fill it in a form. The problem is, he have to
     calculate the monthly installment

More Related Content

Similar to SET6 ICT QUESTION 2007 SECTION A

Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combinedGary Tsang
 
Unit 1 sample test
Unit 1 sample testUnit 1 sample test
Unit 1 sample testsalam2
 
Revision week
Revision weekRevision week
Revision weekfizahPhd
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010dean36
 
Revision week 2
Revision week 2Revision week 2
Revision week 2fizahPhd
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2bluejayjunior
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdfwondimagegndesta
 
Revision week 2
Revision week 2Revision week 2
Revision week 2fizahPhd
 
Ict networking exercise short questions
Ict networking exercise short questionsIct networking exercise short questions
Ict networking exercise short questionsGary Tsang
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docxcorbing9ttj
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxsleeperharwell
 
Info. and Com. Tech. 2013 exmas
Info. and Com. Tech. 2013 exmasInfo. and Com. Tech. 2013 exmas
Info. and Com. Tech. 2013 exmasquecy4us
 

Similar to SET6 ICT QUESTION 2007 SECTION A (20)

Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
 
Soalan bab 3
Soalan bab 3Soalan bab 3
Soalan bab 3
 
Unit 1 sample test
Unit 1 sample testUnit 1 sample test
Unit 1 sample test
 
Revision week
Revision weekRevision week
Revision week
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
 
Set2 ict-question
Set2 ict-questionSet2 ict-question
Set2 ict-question
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
 
exam2
exam2exam2
exam2
 
Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Ict networking exercise short questions
Ict networking exercise short questionsIct networking exercise short questions
Ict networking exercise short questions
 
Com Ed 8 Prelim
Com Ed 8 PrelimCom Ed 8 Prelim
Com Ed 8 Prelim
 
Computer aptitude
Computer aptitudeComputer aptitude
Computer aptitude
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
 
Cs 75
Cs 75Cs 75
Cs 75
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
 
Info. and Com. Tech. 2013 exmas
Info. and Com. Tech. 2013 exmasInfo. and Com. Tech. 2013 exmas
Info. and Com. Tech. 2013 exmas
 

More from Azmiah Mahmud (20)

Buku Panduan-HEM-2016
Buku Panduan-HEM-2016Buku Panduan-HEM-2016
Buku Panduan-HEM-2016
 
Notacd01
Notacd01Notacd01
Notacd01
 
Notacd05
Notacd05Notacd05
Notacd05
 
Notacd04
Notacd04Notacd04
Notacd04
 
Notacd03
Notacd03Notacd03
Notacd03
 
Notacd02
Notacd02Notacd02
Notacd02
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bab 2 sistem komputer
Bab 2 sistem komputerBab 2 sistem komputer
Bab 2 sistem komputer
 
Notacd01
Notacd01Notacd01
Notacd01
 
Notacd12
Notacd12Notacd12
Notacd12
 
Notacd11
Notacd11Notacd11
Notacd11
 
Notacd10
Notacd10Notacd10
Notacd10
 
Notacd09
Notacd09Notacd09
Notacd09
 
Notacd08
Notacd08Notacd08
Notacd08
 
Nota programming
Nota programmingNota programming
Nota programming
 
Nota program development
Nota program developmentNota program development
Nota program development
 
Nota multimedia
Nota multimediaNota multimedia
Nota multimedia
 
Nota multimedia production team
Nota multimedia production teamNota multimedia production team
Nota multimedia production team
 

SET6 ICT QUESTION 2007 SECTION A

  • 1. SET6 ICT QUESTION 2007 Section A (36 scores) Instruction: Answer ALL questions. Question 6 is based on Figure 2. 1. 1.Puan Zalila obtained the exclusive legal rights for the distribution and sale of the CD-ROM. This associated with 6. Figure 2 shows a computer network. A piracy B privacy rights C copyright D patent 2. Question 2 is based on Figure 1. Figure 1shows an example of Operating System interface. Figure 1 Figure 2 Identify the network in Figure 2. Network A Network B A Peer to peer Peer – server B Client – server Peer to peer C Peer to peer Client – server 2.The interface are difficult to use because they require exact spelling, grammar and punctuation. Name the interface. A. Graphical user interfaces D Peer – server Peer to peer B. B. Menu-driven interfaces C. C. Command-line interfaces 7. Haziq browsed http://webopedia.com to retrieve information D. D.All the above of networking. After that, he saves and prints the file of the document. Haziq intends to revisit to that web page. 3. 3.A ________________ is a small program that tells the operating system how to communicate with a in the correct sequence. Arrange the features used specific device. A. Buffer B.device I Bookmark II Navigation button III Save file IV Print C. performance monitor D. driver A I, II, III, IV B II, III, IV, I C III, IV, I, II D IV, I, II, III 4. 4. The following are examples of programming languages. 8.The following are steps involved in the development of Choose the correct pair. multimedia materials. At which stage would an error be detected Generation Example of and rectified? programming A Analyzing problem B Developing storyboard language C Testing and debugging D Documenting A First SQL Language 9. The statements below explain about computer network. B Second Assembly Language The above explanations refer to ………… C Third Machine Language • It is the largest network connecting computers D Fourth C Language worldwide. • All data transmissions or message exchanges are 5. Table 1(a) shows the records of a group of students. based on a TCP/IP standard protocol. Table 1(b) is the result of rearranging the records in Table 1(a) • The main service provider in Malaysia is Jaring and Student ID Name of Student Date of Birth TMNet. P001 Syamin Binti Zaidi 13.10.1990 A. Intranet B. Telnet C. Extranet D.Internet P002 Adriana Binti Hamizan 12.10.1990 P003 Amirah Binti Zaid 15.11.1990 10. 10. The following are activities in the development of P004 Zikri Bin Zafri 14.10.1990 an information system. The activities in the problem Table 1(a) Title analysis phase are Student ID Name of Student Date of Birth I Collecting relevant data P002 Adriana Binti Hamizan 12.10.1990 II Writing a report on the current information system 1 1 Text for picture Picture P001 Syamin Binti Zaidi 13.10.1990 III Identifying the needs for the new information system P004 Zikri Bin Zafri 14.10.1990 IV Convincing users that the new information system 2 2 Text for picture Picture P003 Amirah Binti Zaid 15.11.1990 has better security features Table 1(b) AI, III B II, III C III, IV D I, IV Audio Exit 5. The above change is a result of button A. a single field sort B.a multiple field sort B. C. a single field indexing D. a multiple field indexing
  • 2. 14. 14.Hamizan wants to send a file to Zanariah using electronic mail services. He ensures that the file is virus-free before it is sent. (i) Hamizan uses a utility software to ensures T F 11. Figure 3 is one of the steps in a multimedia development. the file is virus-free before it is sent. (ii) Communication between Hamizan and Title Zanariah is ext-based. T F Picture 1 Text for picture 1 15. 15. The statement below refers to programming language. (i) A programming language consists T of F Picture 2 Text for picture 2 code collections, symbols, text, diagrams and charts. T F Audio (ii) The machine language can only be written Exit using 1s and 0s digit. butt Figure 3 • Performs functions such as copying, identify the step : renaming, deleting and moving files A. Coding B. Documenting • Image viewer displays contents of C. Analyzing problem D. Developing a storyboard graphics file when you double click on it 12. Question 12 is based on Figure 4. 16. statements above refer to ………………………………… Unknown Idea can be author misunderstood 17. X X is one of the issues in computer ethics. X may be __________________________. A. software theft B. unauthorized use B. C. authorized access D.information accuracy For Question 13 until 15, state whether each statement is True (T) or False (F). Figure 5 shows a code written a particular programming language. 13. (i) If Zikri scores 67 marks, he is eligible to get a “B” grade. (ii) Variable named ‘gred’ is declared as ‘Integer’. Question 17 is based on Figure 6. Based on Figure 6, X is a combination of presentation involving texts, A, video, graphic and animation elements. (i) X is a ……………………………………… (ii) The hardware used to produce A is ………………………
  • 3. 18. Syamin received a message from Zaidi through Internet 22.Figure 9 shows the features of an Internet browser. services S. Zaidi asked Syamin to send the minutes of the meeting using feature T of the same services. Q Q (i) Name S (ii) Name T M 19.Figure 7 and Figure 8 are two methods of executing a program. (i) Name feature Q. (ii) State one Sour X Object Resul advantage of feature M ce code t code 23.Alfi has listed a number of things to complete a multimedia Dat project entitled “ Visit Malaysia Year 2007” a as shown in Table 3. Figure 7 1. Collect pictures of Malacca, Putrajaya and Kuala Lumpur. Sourc 2. Orientate the “Visit Malaysia Year 2007” logo e code so that it is animated. Y Result 3. Record the “Cuti-Cuti Malaysia” song. 4. Insert the Visit Malaysia themes; insert Da Malacca, Putrajaya and Kuala Lumpur history ta into different screens. Note : The files to be used are malacca.jpg, putrajaya.bmp, logoVM.gif and CCM.wav. Figure 8 (i) What is the multimedia element that is (i) Name X (ii) Name Y not used by Azli? (ii) What is the name of the animation file in 20.Match the situation (i), (ii) and (iii) with the most Table 3? suitable software in Table 2. A Norton Anti Virus B Winzip C Power Point D Internet Relay Chat (IRC) E. Paint Brush Table 2 (i) During Parent Teacher Association meeting, Haziq as the presiden of the computer club has been asked to give an annual report on the club’s activities in a more interesting and effective way. (ii) Amira has a cousin studying overseas. Instead of conversing through the telephone, she can use text through the Internet to communication. 21. Question 21 is referring to situation below. Encik Abdullah needs to give information to audiences about his company. To spend money and time he wants to use software that suitable to create attractive presentation. Give the name for software above: ………………………………….
  • 4. 24. Complete the flow chart. Choose your answer from the box SECTION B Provided QUESTION 1 A. Decision this B This student C. Output on student is not is qualified student’s Look at the picture below and answer the questions that follow. qualified to to receive the qualification receive the scholarship scholarship D. Decision on E. Input on F.This student is student’s student’s not qualified to qualification qualification receive the scholarship BEGIN I. Define pornography FALSE ________________________________________________ ___________________ (i) ________________________________________________ _____________________ TRUE (ii) (2 scores) II. Give two impacts of pornography on Malaysian society. B a. ____________________________________________________ ____________ b. END ____________________________________________________ ______________ scores 25.Students fill biodata forms and submit to the class teacher. All the submitted forms will be filed according to classes and stored in the cupboard in a private room. In order to change the student’s data, the forms must be taken out from the class file to be updated and restored. The school clerk will refer to the files to prepare reports needed by the school. (i) The file collection in the private room is ……………. (ii) Phase X is one of the phases in the Information System development. Below are some of the implemented activities: • To measure the system’s level of Computer Security accomplishment. • To get feedback from users about the new system performance. • To perform on going system modification. Phase X is …………………… QUESTION 2 Section B (20 scores) Instruction : Answer ALL Questions. I. Complete the diagram below (2 a. Software and b. __________ Data __________ ________ Security _______
  • 5. __________ __________ _______ _______ II. Draw a block diagram and describe the information processing cycle which includes input, process, output and storage. II. Give two examples of computer threats. a.. ____________________________________________________ b. ____________________________________________________ (4 scores) QUESTION 3 Rearrange the steps in scanning antivirus below. A. scan the selected file B. choose an antivirus program C. wait while the program is scanning and the result is produced D. select file that need to be scanned BLOCK DIAGRAM ( 2 scores ) ( 4 scores ) QUESTION 5 QUESTION 4 Based on figure below, answer the following questions. I. Define computer system ____________________________________________________ I. Name the types of computer networks below. ____________________________________________________ ____________________________________________________ ( 2 scores )
  • 6. b) State two functions of E (2 scores) a. _________________ b. __________________ _____________________________________________ ( 2 scores ) _____________________________________________ II. Give two differences between above computer networks. c) State two differences between the characteristics of I and J storage. (2 scores) a. _____________________________________________ ________________________________________________ _____________________________________________ b. ________________________________________________ d)Give one advantage of using O in preparing a report and one advantage of using P in accounting.(2 scores) ( 2 scores ) ____________________________________________________ ____________________________________________________ ____________________________________________________ Instruction : Answer either Question 2 or 3 2. En. Zaidi divides his ICT students into two groups to complete a multimedia project entitled “Sekolah Saya”. Group A are asked to deliver their multimedia contents through web- based and Group B through CD-based.(7 scores) GROUP A GROUP B a) Give two differences in delivering multimedia contents by Group A and Group B. (2 scores) Section C (14 scores) Answer Question 1 1. Figure 13 shows the some of the components of a computer system. (7 scores) Based on Figure 13, answer the following questions. a) Draw a block diagram of the computer system using the components C, D, E and F. (1 scores) (i) (ii)
  • 7. Figure 14 a) Web editor is a program that we use to create Web page. Name Figure 2 (i) and Figure 2 (ii). State one characteristic of (i) and (ii). (3 scores) Ahmad, a form 4 Alpha student 4 i) Define the problem En. Kevin faces in his company. is using network and (1 score) telecommunication in ICT computer lab. He explores web ____________________________________________________ page http://www.wikipedia.com _____________________ to do his assignment. ii) Identify the necessary output En. Kevin sees in his manual c) Explain two importances of facilities in the Ahmad’s system (1 score) computer lab. (2 scores) _________________________________________________ ____________________________________________________ _________________________________________________ _____________________ _________________________________________________ iii) Draw your design user interface, based on the input. (2 scores) 3. a) The following text is a statement. En. Ali developed Employee Information System (EIS) for his client, Saujana Holding. He used software that could create Design user interface for Input database without writing long programs. He trained a data entry clerk to enter data into EIS. i) Sketch the relationship between elements involved in developing EIS. ii) State two uses of information system. (2 scores) _____________________________________________ _____________________________________________ Situation Encik Kevin is the manager of Sona _____________________________________________ Car Enterprise. He asks you to develop b) Based on situation below, answer the following questions. a system to calculate the monthly installment for every potential customer. When his customer decides to buy a car, he will get the customer’s details and fill it in a form. The problem is, he have to calculate the monthly installment