You are on page 1of 4

SET2 ICT 2007

SECTION A 8. Computer Networks is a ..


A special set of rules to connect devices
Question 1 to 10
B system of interconnected computers and peripheral devices
1. Information refers to C system that change analog signal to digital signal
___________________________________ D system that transmits information in form of data through a
A. An act of transmitting messages physical medium
B. the knowledge obtained from reading, investigation, study
or research. 9. Which is from the following statements is not true about
C. the use of scientific knowledge, experience and resources networks ?
to create processes and products that fulfill human needs A People in various places can be connected using a network.
D. the technology required for information processing, in B Networking technology allows banking to be done everywhere
particular, the use of electronic computers, and at any time.
communication devices and software applications to C We cannot do a long distance communication using a network
convert, store, protect, process, transmit and retrieve D A network links two or more computers together to enable data
information from anywhere, anytime and resource exchange.

2. Charles Babbage invented the 10.


_________________________. -Cover a small region of spaces
A. Abacus B.Napiers Bone Meliputi kawasan kecil
C. Weaving Loom D. Mechanical Calculator Machine

3. Which of the followings are the similarities between ethics and -The range of speed is between 10mbps to 100mbps
law?
I. to prevent any crime
Kadar kelajuan adalah diantara 10mbps hingga 100mbps
II. as a rule to control computer users
III.to guide user from misusing computers The statements above refers to.
IV. to create a healthy computer society, so that computers are A LAN B.MAN C. WAN D. Intranet
used to contribute to a better life
A. I, II and III B.II, III and IV Write T for true statements and F for false statements.
C. I, III and IV D.All above

4.Verification is _____________________________. 11. A WAN is a network that covers a large


A.The act of proving or disproving the correctness of a system geographic area using a communication
with respect to a certain formal specification channel that combines many types of
B.Process where users verify that they are who they say they are transmission media such as telephone lines,
C.The scanning of retina and analysing the layer of blood vessels cables and radio waves.
at the back of the eye
D.The measurement and analysis of the shape of ones hand
12. A computer can function properly without
5.A headphone is a/an ___________ device. application software.
A. input B. output C. storage D. process

6. The three main types of secondary storage are . 13. A compressed file must be unzipped or restored
A. CD, DVD and DVDRW to its original form before being used.
B. ROM, RAM and hard drive
C. hard disk, floppy disk and pen drive
D. magnetic medium, optical medium and flash memory 14. Trademark Law is a protection of a companys
logos and brand name.
7. An operating system is____________ .

A. a program designed to assist users with 15. Changing computer programming codes with
personal task permission is unethical.
B. a program that allows a user to perform
maintenance type task
C. a program that control or maintain the
operations of a computer and its device
D. a set of programs that coordinates all the
data transmissions among computer in a
network

1
SET2 ICT 2007
Match the picture with the correct statement. 25. Answer statements A and B according to situation below.
I.Operating systems that allow the network to centralise
Technology Year
functions and applications in one or more dedicated file servers.
16.
(A) ______________________
In 1925, television II.Serves extended enterprise, including defined sets of customers
was made known
to public. or suppliers or other partners.
_____________________
SECTION B
17.
(B) QUESTION 1
In 1941, the
Look at the picture below and answer the questions that follow.
computer was
created.

18.
(C)
In 3500 BC, the
Sumerians
developed
cuneiform writing.
Define pornography (2 scores)
I.____________________________________________________
19. ____________________________________________
In 1876, the first
telephone was II. Give two impacts of pornography on Malaysian society.
introduced. a.___________________________________________________
(D) ___________________________________________
b.___________________________________________________
___________________________________________
20.
QUESTION 2
In 1500 BC, the
Phoenicians I. Complete the diagram below
developed the
alphabet. Computer
(E) Security

Fill in the blanks.


21. Give five common type of network communications channels :
I. ________________________________
II. ________________________________
III. ________________________________
IV. ________________________________
V. ________________________________

22. Controversial content is information that causes


___________________ among people who have different a. b.
____________________ , moral and _____________________. ___________ Software and ___________
_______ Data ______
23. Retinal biometrics involves the _________________________
of retina and analyzing the layer of _________________________ Security
at the back of the eye.
___________ ___________
24. A computer system requires four main aspects of data handling
to function properly which are input, _______________, ______ ______
______________ and ______________

2
SET2 ICT 2007
II. Give two examples of computer threats.
a.___________________________________________________ QUESTION 5
b.___________________________________________________ Based on figure below, answer the following questions.
I. Name the types of computer networks below.
(2 scores)

QUESTION 3
Rearrange the steps in scanning antivirus below.
A.scan the selected file
B.choose an antivirus program
C.wait while the program is scanning and the result is produced
D.select file that need to be scanned

( 4 scores )
QUESTION 4 a. _________________ b. __________________
I. Define computer system ( 2 scores )
_____________________________________________________
II. Give two differences between above computer networks.
_____________________________________________________
a.________________________________________________
_____________________________________________________ ______________
b.________________________________________________
_____________________________________________________
______________
_____________________________________________________ ( 2 scores )
_____________________________________________________
SECTION C
( 2 scores ) Instruction : Question 1 is compulsory AND answer either
Question 2 or Question 3.
II. Draw a block diagram and describe the information processing
cycle which includes input, process, output and storage. Question 1 (COMPULSORY)

An Audio-Visual Room has been equipped with 10 computers and


a hub. As an ICT coordinator, you are required to set up a small
network in the room. ( 2 scores)
a) Sketch the topology for the room.

b) Give three advantages of using a networking rather than


a stand-alone pc. ( 3 scores)
I.______________________________________
_______________________________________
II. ______________________________________
_______________________________________
III______________________________________
BLOCK DIAGRAM _______________________________________

( 2 scores )
c) Define the network communication technology of
Extranet.
______________________________________
_______________________________________
[2 scores]

3
SET2 ICT 2007
Question 2 C) Give two sub components in a central processing unit

Figure 1 shows some of the components of a computer system. I._____________________________


Figure 1 II_____________________________[2 scores]

D)Give two differences between I and J.


Primary storages Aspects Secondary storage
I.

II.

[2 scores]
Question 3

Maria just won a set of personal computer. The personal computer


is without any system software.

1. What is the most importance system software, so that the


personal computer can be used.
____________________________
[1 score]

2. Virus can be scanned using antivirus software. What type


of system software used.
____________________________
[1 score]

3. List three popular operating system platforms.


(a)_______________________
(b)_______________________
(c)_______________________
[3 scores]
Based on Figure 1, answer the following questions.
4. State two differences between operating systems and
utility programs.
a) State the meaning of input
______________________________________________ Operating system Utility program
[1 score]
b) List two type of output. [2 scores]
I. _____________________________
II. _____________________________

[2 scores]

~ END OF QUESTION PAPER ~

You might also like