Answer Sheet 1A .com



SET4 ICT ANSWER

1.C 2.B 3.C 4.C 5.C 6.B 7.A 8.C

9.B 10.B 11.(i) F(ii) T 12 (i) T (ii T

13 (i) F (ii) T 14 (i) B (ii) D (iii) C

15 (i) D (ii) A (iii) C 16 (i) B (ii) C (iii) A

17 utility /virus 18 analogue / digital

19 control unit / arithmetic logic unit

20 computer security 21 operating system

22 computer network 23 graphical user interface

24 spam 25 macro

SECTION B (20 MARKS)1.

1. a Namakan

i) X System software / Operating System (1 mark)

ii) Y Application Software(1 mark)

b. Give an example of :

i) P : DOS, OS/2, Windows,Linux. (Any

version) (1 mark)

Q: MSOffice n anything other than utility

s/wares (1 mark

2. a) State two differences between primary storage and secondary storage. Nyatakan dua perbezaan di antara storan primer dan storan sekunder.

|characteristic |Primary storage |Secondary storage |

|volatile |volatile when the power |non-volatile and almost |

| |is off (ROM excluded), |permanent |

| |all contents of RAM are | |

| |lost. | |

|Access time. |It takes lesser time |It takes more time |

| |(few nanoseconds) for |(several milliseconds) for|

| |the CPU to access RAM |CPU to access secondary |

| | |storage |

|Cost. |Secondary storage is cheaper than RAM in terms of |

| |cost per unit of data. |

(2 marks)

b) Give one example of: Berikan contoh bagi:

i. primary storage : RAM, ROM

ii.secondary storage : Hard Disk, Diskette/Floppy Disk, Zip Disk, CD, DVD, Pen/Thumb Drive/Flash Memory, Memory Stick, Smart Chip

3. Based on the given situation, answer the questions.

a.Name the type of computer crime that David has committed.Namakan jenis kesalahan yang dilakukan oleh David.

Copyright Infringement (1 mark)

b.What has happened to David’s computer?

Apakah yang telah terjadi kepada komputer David?

computer virus / worm attack (1 mark)

cHow can David prevent his computer from the problem in (b) in the future? Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi

di (b) pada masa akan datang?

install antivirus / scan files for viruses before downloading (1 mark)

d.Other than the threat you mentioned in (b), give another computer threat that could affect David’s computer.Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi ancaman lain yang mungkin berlaku kepada komputer David.

spyware/hackers (1 mark)

4. Study Figure 2 carefully and answer the following questions.

a. Name device C.Namakan peranti C.

modem/router (1 mark)

b. State the function of device C.

Nyatakan fungsi peranti C.

Modem - converts digital signals into analog and back again into digital signals

router - computer networking device that buffers and forwards data packets across an internetwork toward their destinations. through a process known as routing (1 mark)

c.Name 2 types of network in Figure 2.

Namakan 2 jenis rangkaian yang terdapat di Rajah 2

LAN , WAN (2 marks)

5. Figure 3 refers to two different network topologies. Rajah 3 menunjukkan 2 jenis topologi rangkaian yang berbeza.

a.Name :Namakan

i) Topology A : Bus

ii) Topology B :Ring / Token ring (2 marks)

b.Name the network architecture for:

Namakan rekabentuk rangkaian bagi :

i) Topology A :Client-Server

ii) Topology B :Peer To Peer/ P2P (2 marks)

SECTION C (14 MARKS)

Answer Question 1.

Jawab Soalan 1.

1. a) Based on Figure 4a, 4b, 4c and 4d, draw a block diagram of the information processing cycle.

Berdasarkan Rajah 4a, 4b, 4c dan 4d, lukis rajah blok kitaran pemprosesan maklumat.

2 marks)

b). Give one example of a device other than shown in Figure 4a. Berikan satu contoh peranti bagi komponen yang ditunjukkan dalam rajah 4a .

cd, dvd, thumbdrive, pendrive, flash memory, external hdd (1 mark)

c). State two functions of the component in Figure 4c. Nyatakan dua fungsi komponen dalam Rajah 4c.

CPU/Processor

- utilises the computer memory to accomplish tasks.

- execute instructions from the application software and accomplish a task.

- controls all activities within the computer system

(2 marks)

d). All the devices in Figure 4 are coordinated by an Operating System. Explain two functions of the mentioned system.Semua peranti dalam Rajah 4 dikoordinasi oleh Sistem Pengendalian.Terangkan dua fungsi sistem tersebut.

- controlls and allocates memory

- set up memory boundaries for types of software and for individual applications.

- prioritize system requests .

- controlls input and output devices

- facilitate networking and manage file systems.

(2 marks)

Answer either Question 2 or Question 3.

Jawab sama ada Soalan 2 atau Soalan 3.

2. Figure 5 shows the phases of program development process. Based on the figure, answer the following questions.

Rajah 5 di bawah menunjukkan fasa dalam proses pembangunan aturcara. Berdasarkan Rajah tersebut, jawab soalan-soalan berikut.

a). Name Phase P and Phase Q.

Namakan Fasa P dan Fasa Q.

P : Documentation Phase

Q : Coding Phase (2 marks)

b). Arrange the phases in correct sequence.

Susun fasa tersebut mengikut urutan.

1. Problem Analysis Phase,

2. Program Design Phase,

3. Coding Phase,

4. Testing and Debugging Phase,

5. Documentation Phase (1 mark)

c). State two importance of Phase P in program development processNyatakan 2 kepentingan fasa P dalam proses pembangunan.

1. Documentation enables new programmer to understand the flow of the program.

2. For future reference in case the program needs changes.

3. Guide for the users (2 marks)

d). Describe any translation method used in Phase Q.Jelaskan mana-mana kaedah pelaksanaan aturcara dalam Fasa Q.

Intrepreter :

Interpret and execute program directly from its source without compiling it first. The source code of an interpreted language is interpreted and executed in real time when the user executes it. The interpreter will read each code and convert it to machine code and execute it line by line until the end of the program.

Compiler : Translates source code text which is written in a high-level programming language into lower-level language and will create an executable file. The source code will be converted into machine code that can be executed on a computer. If the compiler encounters any errors, it records them in the program-listing file. (2 marks)

3. Based on the situation below, answer the following questions.

a). Identify the file format for each multimedia element in your presentation.

Kenal pasti format fail bagi setiap elemen multimedia dalam persembahan anda.

text - .txt/doc, graphic – gif/tiff,jpg,jpeg, bmp, audio – mid, wav,mp3, (1 mark)

b). Describe the first phase that you are going to do in developing the stated project.

Terangkan fasa pertama yang akan anda lalui semasa membangunkan projek multimedia di atas.

Analysis phase is the first phase in multimedia production. In this phase, the problem will be defined and the possible solution will be determined. Preliminary investigation will also be carried out. In this case, the problem is introducing the school to the visitors and the solution would be developing an interactive multimedia presentation. Interview the principle to identify what are the aspects to be included in the presentation. (2 marks)

c). Explain the role of graphics artist in your team.

Jelaskan peranan pereka grafik dalam pasukan anda.

Accountable for producing and editing appropriate graphics and animation for the proposed multimedia presentation.

(2 marks)

d). What medium of delivery would you use to distribute your presentation to other schools in your state? Give your reason. Apakah bentuk media penyampaian yang akan anda gunakan untuk

mengedarkan bahan persembahan anda kepada sekolah-sekolah lain dalam negeri anda?Berikan alasan anda.

CD.

1. The multimedia presentation is complex and large. CD allows faster access compared to Web.( Speed)

2. A CD is cross platform since it employs universal programming languages and file types to deliver content. ( Compatibility)

3. The MM presentation does not have constant changes to be delivered using Web.

(vice versa for Web)

(2 marks)

KERTAS SOALAN TAMAT

-----------------------

Phase Q

4a - Storage

4d - Input

4c – Process/

Processor

4b - output

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download