SULIT 3765/1
Section A
[36 marks]
Answer all the questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. Study the statement below carefully.
Statement 1
Statement 1 above is regarding to ______________________ systems.
2. Statement below is about controversial issue.
Statement 2
Based on Statement 2 above,
(i) Azman has convicted ______________________
(ii) List another effect of controversial content
3. Figure 1 shows the examples of input and output devices.
A B C
Figure 1
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
“Production was slow because everything was done manually and totally
depended on human labour.”
Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.
2
SULIT 3765/1
Based on Figure 1, write A, B or C to indicate the input device used for audio.
A Can only hold the data temporarily
B Can store the data permanently until it is deleted or removed
Table 1
4. Based on Table 1 above, identify the types of storage for:
a) A
b) B
5. Write True or False for the following statement:
a) A computer that operates at 933 MHz (megahertz) has 933 million clock cycles in
one second (hertz)
6. Figure 2 below shows a networking device
Figure 2
Identify the device in Figure 2.
7. Figure 3 shows wired transmission medium.
W X
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
3
SULIT 3765/1
Y Z
Figure 3
By using W, X, Y and Z in Figure 4, identify the following transmission medium.
a) Fibre – optic cable
b) Shielded Twisted Pair
8. Figure 4 show how cryptography works by using cipher substitution.
Figure 4
Based on Figure 1, state process X and process Y.
X : ____________________
Y : ____________________
9. State whether the following statement is True or False.
i. Users can distribute proprietary software freely.
ii. Proprietary software offers a stable system support if it fails or malfunctions.
10. The statement in Table 2 is about a type of computer network.
X is a type of computer network that links computers in Malaysia and Korea.
Table 2
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
C H I E F C H I E FS Y A H L
Process X Process Y
4
SULIT 3765/1
Based on Table 2, X refers to
A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Personal Area Network (PAN)
D. Metropolitan Area Network (MAN)
11. State whether the following statement is True or False.
Internet networking allows a group of computer users with the same networking program
to connect with each other and directly access files from each other’s hard drives.
12. Table 3 shows communication devices. Based on Table 3, select A, B, C or D for the
following statement.
Wireless Network
Interface CardRouter
Network Interface
Card
Wireless Access
Point
A B C D
Table 3
A central communication device that allows computers to transfer data and information to
other wireless devices or a wired network.
13. Which of the following wireless transmission media is used for short-range communication?
A. Infrared
B. Satellite
C. Microwave
D. Radio Wave
14. Table 4 is about a popular internet service among the internet users.
This internet service is a popular service among the internet users. This service allows
the internet users to share thoughts and experiences with other internet users. The
internet users does not need to login in order to read the thoughts and experience.
Table 4
Based on table 4, state the internet service.
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
5
SULIT 3765/1
15. Which is the suitable device to convert conventional images, texts, drawings and photos into
digital form?
16. Words, names, symbols, device and images that represent products, goods or services can
be protected under the ________________.
A. Patent
B. Design
C. Copyright
D. Trademark
17. Table 5 refers to types of computer threats.
Mr. Ali is the server manager at SMK Seri Jaya. One day he found out that certain data in
the server was missing.
Table 5
Based on the statement in table 5, identify the type of computer threat stated.
18. Write the correct word to complete the following statement:
_______________________ is a malicious code on a computer to gather information.
19. Figure 5(a) and Figure 5(b) show biometric authentication methods.
Figure 5(a) Figure 5(b)
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
6
SULIT 3765/1
Based on Figure 5(a), and Figure 5 (b) states the methods used.
(i) Figure 5(a)
(ii) Figure 5(b)
20. Figure 6 shows the technology used in the evolution of computers.
Figure 6
Based on Figure 6, state the name of component:
(i) X
(ii) Y
21. The following statement refers to the positive impact of ICT to society. State whether it is
True or False.
i. People could share and exchange ideas, news and information easier through video
conference.
ii. People became more individualistic and introvert.
22. Table 6 shows several output devices.
Table 6
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
7
...capture images from photographic prints, poster or magazine pages into the computer...
…input of motion images capture into the computer by special input device. T
S
SULIT 3765/1
Based on Table 6, match the output devices with the following statements by writing X, Y or Z.
i. The device that can be used to convey texts, graphics and video information as visual
output
ii. The device that can be used to convey text, graphics on a physical medium.
23. Figure 7 shows a computer network.
Figure 7
Name P.
24. Figure 8 shows example of input devices.
Figure 8
Based on Figure 8, state S and T.
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
8
X
SULIT 3765/1
25. Based on the figure below, which of following can be slotted in X.
A. RAM B. CPU
C. Memory card D. NIC
26. Based on figure below, state whether the following statement is True or False
Fetch and decode is in the execution cycle whereas execute and store is in the
instruction cycle.
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
9
SULIT 3765/1
Section B
[20 marks]
This section consists of five questions. Answer all questions.
27. Figure 9 shows two types of computer storages.
Figure 9
(a) Name storage
i. A
ii. B (2 marks)
(b) Give one difference in function between storage A and B. (2 marks)
28. Figure 10 shows students of SK Kota are using Thinkquest portal in the computer lab.
Figure 10
(a) Based on figure 10, state the type of network in that computer lab. (1 mark)
(b) State three importances of computer networks and communications. (3 marks)
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
10
Types of software
Operating System Software X
D. Graphic Editor
A. Word Processing
B. Spreadsheet
C. Database
SULIT 3765/1
29. Figure 11 shows two types of software.
Figure 11
Based on Figure 11
(a) Identify X and state one function of it.
(b) Give one example of open source software and proprietary software
for Operating System.
[ 2 marks]
[ 2 marks]
30. Ali works as a clerk in a school. He uses a keyboard to key-in all the school’s data into the
computer. He saves all the data as a backup in Device X. At the end of every month, he will
send a printed report to the school principal.
(a) Based on the situation above, name the input device and output device that Ali used.
i) Input device : ______________
ii) Output device: ______________ (2 Marks)
(b) Give two examples of Device X. (2 Marks)
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
11
SULIT 3765/1
31.
Based on figure above:
(a) State types of Cable A and Cable B. [2 marks]
(b) Give one function of Cable A and Cable B. [2 marks]
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
CABLE A CABLE B
SULIT 3765/1
Section C
[14 marks]
This section consists of three questions. Answer two questions only:
(i) Question 31 is compulsory, and
(ii) Choose Either Question 32 or Question 33.
Situation 1
32. Based on the Situation 1 above,
a) (i) Draw a block diagram of Information Processing Cycle which consists of all main
elements below.
[2 marks]
(ii) State the meaning of ‘Machine Cycle’ in one of the component of Information Processing
Cycle and give one function of CPU. [2 marks]
b) (i) State the types of application software used by Student A and Student B. [2 marks]
(ii) Give one function for each type of application software as in (i). [2 marks]
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
“Student A needs to complete an assignment to calculate and managing marks of all the
students in his class. Whereas Student B has to prepare an assignment that need to be
presented in his class soon. Both students choose to make use of computer system
involving four main elements in Information Processing Cycle.”
13
David always spends his leisure time surfing the Internet. He usually downloads proprietary
software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get
the unauthorized serial number for the software.
SULIT 3765/1
33. Based on the situation 2 below, answer the following questions.
Situation 2
a) Explain the type of computer crime that David has committed and give another example.
[3 marks]
b) (i) State the way computer crime can be prevented? [1 mark]
(ii) List two needs of using the way used in (i) to prevent computer crime. [2 marks]
34. PC 1 in Figure 12 can access computers in two different types of computer networks.
Based on Figure 12 above:
a) Name the two types of computer network. [2 marks]
b) Give two (2) differences between the two types of computer networks. [4 marks]
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT
14
SULIT 3765/1
END OF QUESTION PAPER
3765/1 © 2011 Panitia ICT SMK Tinggi Perempuan Melaka [Lihat SebelahSULIT