Professional Documents
Culture Documents
3765/1
OCT 2015
2 HOURS
SENIOR 4
INSTRUCTIONS
Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark
Edited by:
Checked by:
Verified by:
____________________
MISS.KOGILAVANI.J
Head of Technique
and Vocational Department
____________________
MR.LIM BOON SERN
________________
PN.SANAM.K
Academic Secretary
Principal
A. I, II, III
B. I, II, IV
C. I, III, IV
D. II, III, IV
6.
A. Computer Fraud
B. Computer Theft
C. Computer Attack
8.
To ensure that our data can still be used if the original is corrupted
II. To ensure our files, program or disk that can be used if the original source is
Column A
i. Can lead to criminal acts
such as exploitation of
women.
ii. Refers to the right of
individuals and companies to
deny or restrict the collection
and use of information about
them.
Column B
Privacy
Pornography
Virus Signature
13.
Operating System A
Figure 1
The Operating System A in Figure 1 refers to
A. Linux Operating System
B. Unix Operating System
C. Windows XP Operating System
D. Mac Operating System
14.
A.
B.
C.
D.
Input Device
Secondary Storage Device
Command Line User Interface
Word Processing Software
Table 2
Ali wants to continue his assignment later. He wants to save his assignment. What
device should Ali use?
ii
Shalini wants to create and manipulate documents containing text and graphics. What
type of program should Shalini use?
iii Type commands or press special keys on the keyboard to enter data and instructions
that instruct the operating system what to do. It has to be typed one line at a time.
This statement refers to?
15. The pictures below show the types of user interface. Match the pictures with the correct
name given.
Command- Line
Menu - Driven
(i)____________________
(ii)____________________
A. I, II, III
B. I, III, IV
C. II, III, IV
D. I, II, III, IV
A.
B.
C.
D.
Closer relationship.
Trust among people.
Higher moral behaviour.
Bad reputation of people
Hub
II
UTP Cable
A.
B.
C.
D.
Bus
Ring
Star
Client - Server
Table 3
In this network, a cable forms a closed loop with all computers and devices arranged
along the ring. Data transmitted in one direction.
ii
In this network, all of the computers and devices (node) on the network connect to
central device. Data are transmitted to another node through the hub in both directions
iii In this network, the network consists of a single central cable, to which all computers and
other devices connect. Data is transmitted in both directions.
Question
No
1
2
3
a
b
4
5
i.
ii.
7
8
9
i
ii
iii
10
11
12
i
ii
13
i
ii
iii
i
ii
14
15
16
17
Candidates Answer
Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
18
19
20
21
22
23
24
27
28
29
30
31
32
33
34
35
36
i
ii
iii
25
NAME
CLASS
IC NO
: _____________________________
: _____________________________
: _____________________________
SECTION B [20 MARKS]
This section consists of five questions. You are required to answer all questions.
Question 26
Amira writes a computer program that interacts with the operating
system. The program randomly erases files and displays weird
messages, she plan to distribute the program via e-mail.
Based on statement above, answer question below:
a) Explain the kind of computer threat that Amira has created?
[2 marks]
b) State two ways to avoid this threat from spreading into your computer?
[2 marks]
Question 27
Figure 2 shows two types of user interface of an operating system (OS).
10
Interface X
Interface Y
Figure 2
[2
marks]
b) Give one difference between interfaces X and Y.
[2
marks]
Question 28
Remy has just bought a Free-DOS notebook. He wants to format the
notebook himself. He doesnt know whether to choose a proprietary
operating system or an open source operating system.
Based on statement above, answer question below:
a) Give two advantages of selecting a proprietary operating system to Remy. [2 marks]
b) Give two advantages of selecting an open source operating system to Remy. [2 marks]
Question 29
Figure 3 shows a type of network communication technology X. X is used in Melati Company
and its branches. Employees use X to access company information, using assigned userID and
password.
11
Figure 3
Based on Figure 3,
a) State the name of X and explain it briefly.
[2 marks]
[2 marks]
Question 30
a) Figure 4 shows two types of schematic. Name the colors of wire X and wire Y. [2 marks]
Figure 4
b) Figure 5 shows two personal computers which connected using cable S. Name the type and
usage of cable S.
[2 marks]
12
Cable S
Figure 5
[3marks]
PROCESS
.
13
Diagram 1
b) State the meaning of input and output give an example of input device and output device.
[4 marks]
Question 32
Figure 6(a) and 6(b) show computer storages.
Figure 6(a)
Figure 6(a)
a) State the type and function of the computer storages shown in Figure 6(a) and 6(b).
[4 marks]
b) State the differences between computer storages shown in Figure 6(a) and 6(b).
[3 marks]
Question 33
Figure 7 shows computer network topologies.
Topology A
Topology B
Topology C
Figure 7
a) Name Topology A, Topology B and Topology C.
[3 marks]
[4 marks]
14
Prepared by:
_____________________
MS.SRI NITHIYA JAYKODY
ICT Teacher
15