Upload
sn-nazihah
View
227
Download
0
Embed Size (px)
Citation preview
8/4/2019 CSC133_134
1/12
CONFIDENTIAL< ^ m >
CS/SEP 2010/CSC133/134
UNIVERSITI TEKNOLOGI MARAFINAL EXAMINATION
COURSECOURSE CODEEXAMINATIONTIME
COMPUTER AND INFORMATION PROCESSINGCSC133/134SEPTEMBER 20102 HOURS
INSTRUCTIONS TO CA NDIDATES1 . This question paper consists of three (3) parts : PART A (40 Q uestions)PART B (9 Questions)PART C (3 Questions)2. Answer ALL questions from PART A and PART B, and ONLY TWO (2) questions fromPART C.
i) Answ er PART A in the Objective Answer Sheet.ii) Answ er PART B and PART C in the Answer Booklet. Start each answer on a newpage.3. Do not bring any material into the exam ination room unless permission is given by theinvigilator.4. Please check to m ake sure that this examination pack consists o f:
i) the Qu estion Paperii) an Ans wer Booklet - provided by the Facultyiii) an Objec tive Ans wer Sheet - provided by the Faculty
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SOThis examination paper consists of 12 printed pages
Hak Cipta Universit i Teknologi MARA C O N F ID E N T IA L
8/4/2019 CSC133_134
2/12
CONFIDENTIAL 2 CS/SEP 2010/CSC133/134
PART A (40 MA RKS)Answer ALL questions1 . is a collection of unprocessed items, such as text, numbers, images, audio and
video.A. dataB. informationC. processD. program
2. The series of input, process, output, and storage some times is referred as .A. Computer programmingB. Information processingC. Data enteringD. Web browsing
3. Wh ich of the following is an example of connectivity?A. power cordB. storageC. InternetD. data
4. The electronic component in system unit that controls and manipulates data in order toproduce information is called the .A. portB. central processing unitC. memoryD. chipQuestion 5, 6 and 7 refer to the following F igure 1 .
ittp://www.uitm.edu.my/uitm/index.php
Figure 1
5. Figure 1 is the examp le of _A. domain nameB. uniform resource locatorC. internet protocolD. domain code
Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L
http://www.uitm.edu.my/uitm/index.phphttp://www.uitm.edu.my/uitm/index.php8/4/2019 CSC133_134
3/12
CONFIDENTIAL 3 CS/SEP 2010/CSC133/134
6. The word edu in Figure 1 is referred as .A. domain nameB. uniform resource locatorC. internet protocolD. domain code
7. X in Figure 1 is referred as .A. domain nameB. uniform resource locatorC. communications protocolD. doma in code
8. Instant me ssag ing (IM) is a(n) .A. programs that use a variety of different approaches to identify and eliminate spam.B. form of real-time communication that allows two or more people to contact eachother.C. group of e-mail name s and addresses given in single name.D. internet standard that permits the process of file uploading and downloading withother computer.
9. A (n) is a program that provides access to W eb resources.A. webB. browserC. ISPD. URL
1 0. electronic commerce occurs when one individuals sells directly to anotherindividuals su ch as online auction.A. business to businessB. business to consu me rC. consumer to consumerD. customer to custom er
1 1 . Application software is available in several forms such as .A. Packaged softwareB. FreewareC. Open source softwareD. All the above
1 2. Mac OS X is an exam ple of a (an) .A. application softwareB. operating systemC. utility programD. browser
Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L
8/4/2019 CSC133_134
4/12
CONFIDENTIAL 4 CS/SEP 2010/CSC133/134
13. Wha t are the correct steps to develop a multimedia presentation?i. Designii. Supportiii. Plan and Analyzeiv. CreateA. i, ii, iii, ivB. iii, i, iv, iiC. i, iii, iv, iiD. iii, i, ii, iv
1 4. The binary coding schem e that uses1 6 - bit code in the comp uter is .A. ASCIIB. UnicodeC. EBCDICD. No available answe r
1 5. "Each row, called a , contains data about a given person, product, object,or event and each colum n, called a , contains specific category of datawithin the record".A. database, fieldB. field, recordC. record, fieldD. record, database
1 6. A is a collection of separa te application softwa re of related functionalitybundled together and sold as a group.A. programsB. software suiteC. integrated packagesD. software collections
17. What contaminant on hard disk surface could cause a head crash and make the harddisk unusable?A. A hairB. DustC. SmokeD. All of the above
18. A(n) is typically used to upload and download files with other computers onthe Internet.A. FTP SoftwareB. BrowserC. Email softwareD. Application Software
Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L
8/4/2019 CSC133_134
5/12
CONFIDENTIAL 5 CS/SEP 2010/CSC133/134
19. The system board is also known as .A. motherboardB. system unitC. central processing unitD. No available answer
20. Below are examples of stand-alone and network operating systems, EXCEPTA. Windows VistaB. SolarisC. Windows NTD. Windows CE
21 . "This Y bus is part of motherboard and used to connect the processor or CPU to mainmemory". The Y bus is referring to .A. I/O busB. System busC. Expansion busD. No available answer
22. In satellite telecomm unication, a is the link from satellite down to one ormore ground stations or receivers.A. downloadB. downlinkC. down satelliteD. No available answer
23. The term "programmer" is used to describe people who .A. write software for computer.B. last to use a computer or the information from the computer.C. repair the computer.D. no available answ er.
24. Real-time processing is also known as .A. online processingB. data collectorC. databaseD. file
25. CASE stands for .A. computer aided software engineeringB. computer apple software equalC. computer admin soft enoughD. no available answer
Hak Cipta Universiti Teknologi M ARA CONFIDENTIAL
8/4/2019 CSC133_134
6/12
CONFIDENTIAL 6 CS/SEP 2010/CSC133/134
26. Media P layer is able to do the following fuctions EXCEPT
A. Allowing user to view images and animationsB. Allowing user to listen to audio and watch video files on co mputerC. Capable to organize media filesD. Writing text, graphics, audio and video files on a recordable or rewriteable CD andDVD27. This printer can generate images by pushing heated ink against heat-sensitive paper.The basic type of this printer is inexpensive, but the print quality is low and the imagestend to fade over time. The statements best describe a(an) .
A. Ink-jet printerB. Laser printerC. Thermal printerD. Dot-matrix printer
28. User used this software to create and manipulate documents containing mostly text andsometimes graphics. Million of people used this software to develop document such asreports, news letter and web pages. This software is referred to .A. spreadsheet softwareB. note taking softwareC. web authoring softwareD. word processing software
29. is the process of accessing file from the disk.A. ReadingB. WritingC. PrintingD. Caching
30. The internal floppy disk is typically referred to as the drive.A. AB. BC. CD. Main
31 . use satellite to determine geographic locations.A. TCP/IPB. OSIC. GPSD. NOS
Hak Cipta Universiti Teknologi MAR A CONFIDENTIAL
8/4/2019 CSC133_134
7/12
CONFIDENTIAL 7 CS/SEP 2010/CSC133/134
32 . The ethical issue that relates to the responsibility of those who collect data to ensure thatthe data is correct is known as .A. privacyB. accuracyC. propertyD. access
33 . Wh ich of the following best describe Encryption?A. code all the messag e that send over the networkB. limit access to authorized person using such measures as password, dial-backsystem, and firewallsC. prepare for disaster by ensuring physical security and data security through adisaster recovery planD. routinely copy data and store it at a remote location
34 . Com munications software consists of programs that do all the following EXCEPTA. Help user establish a connection to another compu ter or networkB. Manage the transm issions of data, instructions and informationC. Provide interface to the users to communicate with one ano therD. Convert a compu ter's analog signal into digital signals for transmission
35 . To convert the entire source program such as C++ into a machine language,programmers can use a program called a (an) .A. debuggerB. assemblerC. compilerD. interpreter
36 . Checklist, grid charts, decision table, and system flowcharts are part of thephase.A. analysisB. designC. preliminary investigationD. development
37 . Which of the following is NOT an optical storage m edia?A. CDB. HD-DVDC. DVDD. Hard disks
Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
8/4/2019 CSC133_134
8/12
CONFIDENTIAL 8 CS/SEP 2010/CSC133/134
38 . Many businesses networke d their computers together to .A. facilitate com mun icationB. share hardware, software, data and informationC. transfer fund sD. all the above
39 . The man ages and controls the budget and schedule of a project.A. Project teamB. System develope rC. Project leaderD. Steering com mittee
40 . A (An) is a notice that guarantees a user or web site is legitimate.A. Trusted sourceB. Digital certificateC. Surge protectorD. End-user license agreem ent
Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
8/4/2019 CSC133_134
9/12
CONFIDENTIAL 9 CS/SEP
PART B (30 MA RKS)Answer ALL questions
QUESTION 1What is a computer? Define computer literacy.
(2 marks)
QUESTION 2List FOUR (4) elements in an URL.
(4 marks)
QUESTION 3List THREE (3) basic components in an e-mail message.
(3 marks)
QUESTION 4Briefly describe the following term s:a) Netiquetteb) Spoofingc) Object emb edded
(3 marks)
QUESTION 5List THREE (3) areas of Artificial Intelligence. (3 marks)
Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
8/4/2019 CSC133_134
10/12
CONFIDENTIAL 10 CS/SEP 2010/CSC133/134
QUESTION 6Give TW O (2) reasons why computer systems required maintenance?
(4 marks)
QUESTION 7What is the main difference between primary storage and secondary storage?
(4 marks)
QUESTION 8List THREE (3) types of scanning devices.
(3 marks)
QUESTION 9List FOUR (4) categories of Application Software.
(4 marks)
Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
8/4/2019 CSC133_134
11/12
CONFIDENTIAL 11 CS/SEP 2010/CSC133/134
PART C (30 MAR KS)Answer any TW O (2) questions.
QUESTION 1Without proper software, a computer is a useless tool. Software allows users to accomplishdifferent types of tas ks.a) Define software . Briefly desc ribe the TW O (2) main categories of software. (6 marks)b) Describe some advantages of word processing software over the old-fashionedtypewriter. (6 marks)c) Give THREE (3) examples of utility programs. (3 marks)
QUESTION 2Information system supports different levels of operations and management of anorganization.a) Sketch out the pyramids of operations and managements supported by informationsystems. (4 marks)
b) List THREE (3) types of reports generated from Transaction P rocessing System (TPS).(3 marks)
c) Give FOUR (4) benefits of using information system. (8 marks)
Hak Cipta Universiti Teknologi MAR A CONFIDENTIAL
8/4/2019 CSC133_134
12/12
CONFIDENTIAL 12 CS/SEP 2010/CSC133/134
QUESTION 3There are two categories of transmission media in communication, namely the physicalconnection and wireless connection.a) Explain the differences between the physical transmission media and wirelesstransmission media. Give examples for each category. (6 marks)b) Explain about LAN , WA N and MAN . (6 marks)c) Wh at comp onents are required for successful comm unications? (3 marks)
END OF QUESTION PAPER
Hak Cipta Universiti Teknologi MA RA CONFIDENTIAL