CSC133_134

Embed Size (px)

Citation preview

  • 8/4/2019 CSC133_134

    1/12

    CONFIDENTIAL< ^ m >

    CS/SEP 2010/CSC133/134

    UNIVERSITI TEKNOLOGI MARAFINAL EXAMINATION

    COURSECOURSE CODEEXAMINATIONTIME

    COMPUTER AND INFORMATION PROCESSINGCSC133/134SEPTEMBER 20102 HOURS

    INSTRUCTIONS TO CA NDIDATES1 . This question paper consists of three (3) parts : PART A (40 Q uestions)PART B (9 Questions)PART C (3 Questions)2. Answer ALL questions from PART A and PART B, and ONLY TWO (2) questions fromPART C.

    i) Answ er PART A in the Objective Answer Sheet.ii) Answ er PART B and PART C in the Answer Booklet. Start each answer on a newpage.3. Do not bring any material into the exam ination room unless permission is given by theinvigilator.4. Please check to m ake sure that this examination pack consists o f:

    i) the Qu estion Paperii) an Ans wer Booklet - provided by the Facultyiii) an Objec tive Ans wer Sheet - provided by the Faculty

    DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SOThis examination paper consists of 12 printed pages

    Hak Cipta Universit i Teknologi MARA C O N F ID E N T IA L

  • 8/4/2019 CSC133_134

    2/12

    CONFIDENTIAL 2 CS/SEP 2010/CSC133/134

    PART A (40 MA RKS)Answer ALL questions1 . is a collection of unprocessed items, such as text, numbers, images, audio and

    video.A. dataB. informationC. processD. program

    2. The series of input, process, output, and storage some times is referred as .A. Computer programmingB. Information processingC. Data enteringD. Web browsing

    3. Wh ich of the following is an example of connectivity?A. power cordB. storageC. InternetD. data

    4. The electronic component in system unit that controls and manipulates data in order toproduce information is called the .A. portB. central processing unitC. memoryD. chipQuestion 5, 6 and 7 refer to the following F igure 1 .

    ittp://www.uitm.edu.my/uitm/index.php

    Figure 1

    5. Figure 1 is the examp le of _A. domain nameB. uniform resource locatorC. internet protocolD. domain code

    Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L

    http://www.uitm.edu.my/uitm/index.phphttp://www.uitm.edu.my/uitm/index.php
  • 8/4/2019 CSC133_134

    3/12

    CONFIDENTIAL 3 CS/SEP 2010/CSC133/134

    6. The word edu in Figure 1 is referred as .A. domain nameB. uniform resource locatorC. internet protocolD. domain code

    7. X in Figure 1 is referred as .A. domain nameB. uniform resource locatorC. communications protocolD. doma in code

    8. Instant me ssag ing (IM) is a(n) .A. programs that use a variety of different approaches to identify and eliminate spam.B. form of real-time communication that allows two or more people to contact eachother.C. group of e-mail name s and addresses given in single name.D. internet standard that permits the process of file uploading and downloading withother computer.

    9. A (n) is a program that provides access to W eb resources.A. webB. browserC. ISPD. URL

    1 0. electronic commerce occurs when one individuals sells directly to anotherindividuals su ch as online auction.A. business to businessB. business to consu me rC. consumer to consumerD. customer to custom er

    1 1 . Application software is available in several forms such as .A. Packaged softwareB. FreewareC. Open source softwareD. All the above

    1 2. Mac OS X is an exam ple of a (an) .A. application softwareB. operating systemC. utility programD. browser

    Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L

  • 8/4/2019 CSC133_134

    4/12

    CONFIDENTIAL 4 CS/SEP 2010/CSC133/134

    13. Wha t are the correct steps to develop a multimedia presentation?i. Designii. Supportiii. Plan and Analyzeiv. CreateA. i, ii, iii, ivB. iii, i, iv, iiC. i, iii, iv, iiD. iii, i, ii, iv

    1 4. The binary coding schem e that uses1 6 - bit code in the comp uter is .A. ASCIIB. UnicodeC. EBCDICD. No available answe r

    1 5. "Each row, called a , contains data about a given person, product, object,or event and each colum n, called a , contains specific category of datawithin the record".A. database, fieldB. field, recordC. record, fieldD. record, database

    1 6. A is a collection of separa te application softwa re of related functionalitybundled together and sold as a group.A. programsB. software suiteC. integrated packagesD. software collections

    17. What contaminant on hard disk surface could cause a head crash and make the harddisk unusable?A. A hairB. DustC. SmokeD. All of the above

    18. A(n) is typically used to upload and download files with other computers onthe Internet.A. FTP SoftwareB. BrowserC. Email softwareD. Application Software

    Hak Cipta Universiti Teknologi MARA C O N F ID E N T IA L

  • 8/4/2019 CSC133_134

    5/12

    CONFIDENTIAL 5 CS/SEP 2010/CSC133/134

    19. The system board is also known as .A. motherboardB. system unitC. central processing unitD. No available answer

    20. Below are examples of stand-alone and network operating systems, EXCEPTA. Windows VistaB. SolarisC. Windows NTD. Windows CE

    21 . "This Y bus is part of motherboard and used to connect the processor or CPU to mainmemory". The Y bus is referring to .A. I/O busB. System busC. Expansion busD. No available answer

    22. In satellite telecomm unication, a is the link from satellite down to one ormore ground stations or receivers.A. downloadB. downlinkC. down satelliteD. No available answer

    23. The term "programmer" is used to describe people who .A. write software for computer.B. last to use a computer or the information from the computer.C. repair the computer.D. no available answ er.

    24. Real-time processing is also known as .A. online processingB. data collectorC. databaseD. file

    25. CASE stands for .A. computer aided software engineeringB. computer apple software equalC. computer admin soft enoughD. no available answer

    Hak Cipta Universiti Teknologi M ARA CONFIDENTIAL

  • 8/4/2019 CSC133_134

    6/12

    CONFIDENTIAL 6 CS/SEP 2010/CSC133/134

    26. Media P layer is able to do the following fuctions EXCEPT

    A. Allowing user to view images and animationsB. Allowing user to listen to audio and watch video files on co mputerC. Capable to organize media filesD. Writing text, graphics, audio and video files on a recordable or rewriteable CD andDVD27. This printer can generate images by pushing heated ink against heat-sensitive paper.The basic type of this printer is inexpensive, but the print quality is low and the imagestend to fade over time. The statements best describe a(an) .

    A. Ink-jet printerB. Laser printerC. Thermal printerD. Dot-matrix printer

    28. User used this software to create and manipulate documents containing mostly text andsometimes graphics. Million of people used this software to develop document such asreports, news letter and web pages. This software is referred to .A. spreadsheet softwareB. note taking softwareC. web authoring softwareD. word processing software

    29. is the process of accessing file from the disk.A. ReadingB. WritingC. PrintingD. Caching

    30. The internal floppy disk is typically referred to as the drive.A. AB. BC. CD. Main

    31 . use satellite to determine geographic locations.A. TCP/IPB. OSIC. GPSD. NOS

    Hak Cipta Universiti Teknologi MAR A CONFIDENTIAL

  • 8/4/2019 CSC133_134

    7/12

    CONFIDENTIAL 7 CS/SEP 2010/CSC133/134

    32 . The ethical issue that relates to the responsibility of those who collect data to ensure thatthe data is correct is known as .A. privacyB. accuracyC. propertyD. access

    33 . Wh ich of the following best describe Encryption?A. code all the messag e that send over the networkB. limit access to authorized person using such measures as password, dial-backsystem, and firewallsC. prepare for disaster by ensuring physical security and data security through adisaster recovery planD. routinely copy data and store it at a remote location

    34 . Com munications software consists of programs that do all the following EXCEPTA. Help user establish a connection to another compu ter or networkB. Manage the transm issions of data, instructions and informationC. Provide interface to the users to communicate with one ano therD. Convert a compu ter's analog signal into digital signals for transmission

    35 . To convert the entire source program such as C++ into a machine language,programmers can use a program called a (an) .A. debuggerB. assemblerC. compilerD. interpreter

    36 . Checklist, grid charts, decision table, and system flowcharts are part of thephase.A. analysisB. designC. preliminary investigationD. development

    37 . Which of the following is NOT an optical storage m edia?A. CDB. HD-DVDC. DVDD. Hard disks

    Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

  • 8/4/2019 CSC133_134

    8/12

    CONFIDENTIAL 8 CS/SEP 2010/CSC133/134

    38 . Many businesses networke d their computers together to .A. facilitate com mun icationB. share hardware, software, data and informationC. transfer fund sD. all the above

    39 . The man ages and controls the budget and schedule of a project.A. Project teamB. System develope rC. Project leaderD. Steering com mittee

    40 . A (An) is a notice that guarantees a user or web site is legitimate.A. Trusted sourceB. Digital certificateC. Surge protectorD. End-user license agreem ent

    Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

  • 8/4/2019 CSC133_134

    9/12

    CONFIDENTIAL 9 CS/SEP

    PART B (30 MA RKS)Answer ALL questions

    QUESTION 1What is a computer? Define computer literacy.

    (2 marks)

    QUESTION 2List FOUR (4) elements in an URL.

    (4 marks)

    QUESTION 3List THREE (3) basic components in an e-mail message.

    (3 marks)

    QUESTION 4Briefly describe the following term s:a) Netiquetteb) Spoofingc) Object emb edded

    (3 marks)

    QUESTION 5List THREE (3) areas of Artificial Intelligence. (3 marks)

    Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

  • 8/4/2019 CSC133_134

    10/12

    CONFIDENTIAL 10 CS/SEP 2010/CSC133/134

    QUESTION 6Give TW O (2) reasons why computer systems required maintenance?

    (4 marks)

    QUESTION 7What is the main difference between primary storage and secondary storage?

    (4 marks)

    QUESTION 8List THREE (3) types of scanning devices.

    (3 marks)

    QUESTION 9List FOUR (4) categories of Application Software.

    (4 marks)

    Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

  • 8/4/2019 CSC133_134

    11/12

    CONFIDENTIAL 11 CS/SEP 2010/CSC133/134

    PART C (30 MAR KS)Answer any TW O (2) questions.

    QUESTION 1Without proper software, a computer is a useless tool. Software allows users to accomplishdifferent types of tas ks.a) Define software . Briefly desc ribe the TW O (2) main categories of software. (6 marks)b) Describe some advantages of word processing software over the old-fashionedtypewriter. (6 marks)c) Give THREE (3) examples of utility programs. (3 marks)

    QUESTION 2Information system supports different levels of operations and management of anorganization.a) Sketch out the pyramids of operations and managements supported by informationsystems. (4 marks)

    b) List THREE (3) types of reports generated from Transaction P rocessing System (TPS).(3 marks)

    c) Give FOUR (4) benefits of using information system. (8 marks)

    Hak Cipta Universiti Teknologi MAR A CONFIDENTIAL

  • 8/4/2019 CSC133_134

    12/12

    CONFIDENTIAL 12 CS/SEP 2010/CSC133/134

    QUESTION 3There are two categories of transmission media in communication, namely the physicalconnection and wireless connection.a) Explain the differences between the physical transmission media and wirelesstransmission media. Give examples for each category. (6 marks)b) Explain about LAN , WA N and MAN . (6 marks)c) Wh at comp onents are required for successful comm unications? (3 marks)

    END OF QUESTION PAPER

    Hak Cipta Universiti Teknologi MA RA CONFIDENTIAL