You are on page 1of 15

ICT

3765/1
OCT 2015
2 HOURS

BEACONHOUSE SRI LETHIA


FINAL EXAMINATION
2015

SENIOR 4

INFORMATION AND COMMUNICATION TECHNOLOGY


3765/1

INSTRUCTIONS

Answer all questions. Write your answers in the spaces provided in Answer Sheet.
Each answer carries one mark

Edited by:

Checked by:

Verified by:

____________________
MISS.KOGILAVANI.J
Head of Technique
and Vocational Department

____________________
MR.LIM BOON SERN

________________
PN.SANAM.K

Academic Secretary

Principal

SECTION A [36 MARKS]


Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Rahim likes to listen to music, but he has no money to buy the CD. He downloads
songs from the internet and shares these friends. The action is referred to as
A. Theft
B. Fraud
C. Crime
D. Copyright Infringement
2. State the name of the components use in the third generation computer and the fourth
generation computer.
3. Match the statements (a) and (b) with the terminologies in Table 1.
Malicious code
Theft
Table 1
a) ____________ is the illegal taking of another person's property without that person's
freely-given.
b) ____________ is any code in any part of a software or script that is intended to
cause undesired effects, security breaches or damage to a system.
4. Which of these is an impact of slander towards society?
A. Closer relationship.
B. Trust among people.
C. Higher moral behaviour.
D. Bad reputation of people
5. Which statement below is correct about computer law?
I. As a rule to control computer users.
II. Depends on country and state where the crime is committed.
III. As a guideline to computer users.
IV. Must be followed by the user.

A. I, II, III
B. I, II, IV
C. I, III, IV
D. II, III, IV

6.

A. Computer Fraud

B. Computer Theft

C. Computer Attack

Based on the table, writes A, B or C to categories the following activities:


i. Email hoaxes, false claims of expertise on certain fields.____________
ii. Tap into the data transmission lines and intentionally transfer the payments to
wrong account.________________
7.

Which of the following are biometric devices?


I. Hand Geometry
II. Callback System
III. Retinal Scanning
IV Signature Verification System
A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV

8.

Suhaimi spreads a rumour that a Minister is receiving bribes. Suhaimis conduct is


called
A. Hijacker
B. Slander
C. Cracker
D. Hacker

9. Why do we need to backup our data?


I.

To ensure that our data can still be used if the original is corrupted

II. To ensure our files, program or disk that can be used if the original source is

lost, damaged or destroyed.


III. To prevent our files or program from malicious software
IV. To protect our files from viruses
A. I and II
B. I and III
C. I, II and III
D. I, II and IV
10. Match the statements below and write the answer in the space provided.

Column A
i. Can lead to criminal acts
such as exploitation of
women.
ii. Refers to the right of
individuals and companies to
deny or restrict the collection
and use of information about
them.

Column B
Privacy
Pornography
Virus Signature

iii. Specific pattern of virus


code. Also called virus
definition

11. State whether the following statement is true or false.


A disk defragmenter is a utility program that reorganizes files and unused space on a
computer hard disk.
12. Complete the following statements by filling in the blanks.
i. We transmit information or data by using two types of signals, namely ___________
and digital
ii. Two subcomponents of CPU are _________________ and arithmetic logic unit

PC platform and IBM compatible

13.

Operating System A

Use Graphical User Interface


Closed source software

Figure 1
The Operating System A in Figure 1 refers to
A. Linux Operating System
B. Unix Operating System
C. Windows XP Operating System
D. Mac Operating System

14.
A.
B.
C.
D.

Input Device
Secondary Storage Device
Command Line User Interface
Word Processing Software
Table 2

Based on Table 2, write A, B, C or D for the following question.


i

Ali wants to continue his assignment later. He wants to save his assignment. What
device should Ali use?

ii

Shalini wants to create and manipulate documents containing text and graphics. What
type of program should Shalini use?

iii Type commands or press special keys on the keyboard to enter data and instructions
that instruct the operating system what to do. It has to be typed one line at a time.
This statement refers to?
15. The pictures below show the types of user interface. Match the pictures with the correct
name given.

Command- Line

Menu - Driven

Graphical User Interface

(i)____________________

(ii)____________________

16. State whether the following statement is true or false.


The central processing unit consists of two parts that is the control unit (CU) and the
arithmetic logic unit (ALU).
17. The functions of Operating System are
I. Providing User Interface
II. Configuring Device
III. Managing Memory
IV. Managing Data

A. I, II, III
B. I, III, IV
C. II, III, IV
D. I, II, III, IV

18. State whether the following statement is true or false.


Command Line Interface makes use of the computers graphic capabilities to make the
operating system and the programs easier to use, which is also called user-friendly.

19. Which of these is an impact of slander towards society?

A.
B.
C.
D.

Closer relationship.
Trust among people.
Higher moral behaviour.
Bad reputation of people

20. State whether the following statement is True or False.


Intranet, extranet and internet is an example of Network Communication Technologies.

21. Which hardware components are required for computer network?


I

Hub

II

UTP Cable

III Crimping Tool


IV Network Interface Card

A. I, II, and III


B. I, II, and IV
C. II, III, and IV
D. All of the above
22. A private network that use internet protocol in sharing information with vendors, suppliers
and customers is called
A. Internet
B. Extranet
C. Local Area Network
D. Metropolitan Area Network
23. Al -Fariq is a student at International Islamic University, Malaysia. He wants to contact
his parent in Dubai via Electronic Email. Which type of network is involved in the above
communication?
A. Local Area Network
B. Metropolitan Area Network
C. Wide Area Network
D. College Area Network

24. State whether the following statement is true or false.


There are two types of Transmission media that is Physical Transmission Media and
Wireless Transmission Media.
25.

A.
B.
C.
D.

Bus
Ring
Star
Client - Server
Table 3

Based on Table 3, write A, B, C or D for the following question.


i

In this network, a cable forms a closed loop with all computers and devices arranged
along the ring. Data transmitted in one direction.

ii

In this network, all of the computers and devices (node) on the network connect to
central device. Data are transmitted to another node through the hub in both directions

iii In this network, the network consists of a single central cable, to which all computers and
other devices connect. Data is transmitted in both directions.

ANSWER SHEET SECTION A

Question
No
1
2
3

a
b
4
5

i.
ii.
7
8
9
i
ii
iii

10
11
12

i
ii
13
i
ii
iii
i
ii

14
15
16
17

Candidates Answer

Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26

18
19
20
21
22
23
24

27
28
29
30
31
32
33
34
35
36

i
ii
iii

25
NAME
CLASS
IC NO

: _____________________________
: _____________________________
: _____________________________
SECTION B [20 MARKS]

This section consists of five questions. You are required to answer all questions.
Question 26
Amira writes a computer program that interacts with the operating
system. The program randomly erases files and displays weird
messages, she plan to distribute the program via e-mail.
Based on statement above, answer question below:
a) Explain the kind of computer threat that Amira has created?

[2 marks]

b) State two ways to avoid this threat from spreading into your computer?

[2 marks]

Question 27
Figure 2 shows two types of user interface of an operating system (OS).

10

Interface X

Interface Y
Figure 2

a) Name interface X and interface Y shown in Figure.

[2

marks]
b) Give one difference between interfaces X and Y.

[2

marks]

Question 28
Remy has just bought a Free-DOS notebook. He wants to format the
notebook himself. He doesnt know whether to choose a proprietary
operating system or an open source operating system.
Based on statement above, answer question below:
a) Give two advantages of selecting a proprietary operating system to Remy. [2 marks]
b) Give two advantages of selecting an open source operating system to Remy. [2 marks]

Question 29
Figure 3 shows a type of network communication technology X. X is used in Melati Company
and its branches. Employees use X to access company information, using assigned userID and
password.

11

Figure 3
Based on Figure 3,
a) State the name of X and explain it briefly.

[2 marks]

b) Give two differences between X and the internet.

[2 marks]

Question 30
a) Figure 4 shows two types of schematic. Name the colors of wire X and wire Y. [2 marks]

Figure 4
b) Figure 5 shows two personal computers which connected using cable S. Name the type and
usage of cable S.
[2 marks]

12

Cable S

Figure 5

SECTION C [14 MARKS]


This section consists of three questions. You are required to answer two questions only.
Answer Question 32 and either Question 31 or Question 32.
Question 31
A pictorial representation of some process or model of a complex system is called
block diagram. A block diagram is a useful tool both in designing new processes and
in improving existing processes.
a) Complete the block diagram of the information processing cycle below.

[3marks]

PROCESS

.
13

Diagram 1
b) State the meaning of input and output give an example of input device and output device.
[4 marks]
Question 32
Figure 6(a) and 6(b) show computer storages.

Figure 6(a)

Figure 6(a)

a) State the type and function of the computer storages shown in Figure 6(a) and 6(b).
[4 marks]
b) State the differences between computer storages shown in Figure 6(a) and 6(b).
[3 marks]
Question 33
Figure 7 shows computer network topologies.

Topology A

Topology B

Topology C

Figure 7
a) Name Topology A, Topology B and Topology C.

[3 marks]

b) Differentiate between Topology A and Topology B.

[4 marks]

14

END OF QUESTIONS PAPER

Prepared by:
_____________________
MS.SRI NITHIYA JAYKODY
ICT Teacher

15

You might also like