You are on page 1of 4

Nama :.......................

Tingkatan: 5A

3765/1
ICT
Kertas 1
May 2016
2 jam

SMK TUNG HUA


SIBU, SARAWAK

PEPERIKSAAN SEMESTER I 2016


TINGKATAN 5

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)


Kertas 1
Dua jam
JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU
1
2
3
4
5

Kertas soalan ini mengandungi 33 soalan.


Kertas soalan in mengandungi tiga bahagian:
Bahagian A, Bahagian B dan Bahagian C.
Jawapan untuk Bahagian A hendaklah ditulis di ruang
yang disediakan pada Helaian Jawapan.
Jawapan untuk Bahagian B dan Bahagian C
hendaklah ditulis di dalam kertas esei.
Anda dibenarkan menggunakan kalkulator saintifik.

Kegunaan Pemeriksa
Bahagian

Markah
Penuh

A
36
B
20
C
14
JUMLAH

Kertas soalan ini mengandungi 20 halaman bercetak

3765/1 May 2016 HKL, SMK Tung Hua

Markah

ICT Form 5

SMK Tung Hua

May 2016

Answer Sheet for Section A (36%)


Question
No.
1
2
(i)
3
(ii)
4
(i)
5
(ii)
6
7
(i)
8
(ii)
(i)
9
(ii)
10
11
12
13
(i)
14
(ii)
(i)
15
(ii)
16
17
(i)
18
(ii)
19
(i)
20
(ii)
21
22
(i)
23
(ii)
(i)
24
(ii)
(i)
25
(ii)

Candidates Answer
Fifth generation
Fingerprint recognition
Phishing
Install antivirus/anti-spyware
C
C
A
Read-Only Memory (ROM)
B
Redhat Linux
The GIMP
Metropolitan Area Network (MAN)
Local Area Network (LAN)
Client/Server
ping 192.168.1.20
Shielded twisted pair cable (STP)
Page concept
Text
Graphic
Project manager
Subject matter expect
Testing
Third generation
Object-oriented programming approach
Interpreter/compiler
Double
Program design phase
Selection control structure
Software
B
Executive Information System (EIS)
Expert System (ES)/Artificial Intelligent (AI)
Field/Attribute
File/Table/Relation
7 records
Query

Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

ICT Form 5

SMK Tung Hua

May 2016

Answers
A: Verification
B: Authentication
To protect our personal banking information and against the
unauthorized access by intruder/hacker. OR
To prevent unauthorized online transaction and protect confidential
banking information from being leak out.

%
2
2

Proprietary OS: Mac OS X El Capitan


Open Source OS: Redhat Linux
Two differences:

Section B (20%)
Q
26

27

(a)
(b)

(a)
(b)

Proprietary software
Source code is not available to
the user.

Open source software


User can download the source
code from the web or get it from
the vendor.
Can be customized according to
the personal needs.

Cannot be customized.

28

(a)
(b)

Radio waves
Radio waves can travel for long distance and it is not obstructed by
hilly surface of earth. This is due to its low frequency range from 3
kHz to 1 GHz.

1
3

29

(a)
(b)

Relational operators: >, <=; Logical operator: And


Grade C. It is because 60 marks still in the range of Grade C from 51
to 60 marks.

2
2

30

(a)
(b)

Multiple-field primary key


Primary key in STUDENT_INFO table: Student_ID
Primary key in COCU_REG table: COCU_ID, STUDENT_ID,
COCU_YEAR
Foreign key: Student_ID

1
2

(c)

ICT Form 5

SMK Tung Hua

May 2016

Section C (14%)
Q
31

Answers
(a)
(b)

(c)

(i) A: String
B: Double
Field A is used to describe an item. So, we need to use text for
describing purpose.
Field B is used to display the total price of an item. So, we need to
use floating point number to represent it.
Pseudocode:

%
2
2

BEGIN
Request Quantity and Price
Calculate Total Price (Total Price = Quantity x Price)
Print Total Price
End
32

Network layout:

PC01

Printer

PC02

UTP cable
Switch

Router
PC04

PC03
Internet

33

Two Tables:
EMPLOYEE_INF
O
Employee_ID
Employee_Name
Employee_Address
Employee_DOB

7
SALARY

1
1

Salary_ID
Employee_ID
Salary_Year
Salary_Month
Monthly_Salary

You might also like