You are on page 1of 10

CONFIDENTIAL

3765/1
Information and
Communications
Technology
August 2010

KOLEJ TUN DATU TUANKU HAJI BUJANG


PROGRESSIVE TEST 3
YEAR 2010

INFORMATION AND COMMUNICATIONS TECHNOLOGY


Form Four

Name : __________________________________ Form : ________ Mark :

Instructions to candidates:
1.

This paper consists of 3 sections; Section A, Section B, and Section C .

2.

Answer ALL questions in Section A.

3.

Answer ALL questions in Section B.

4.

Answer ALL questions in Section C.

[Turn over

CONFIDENTIAL

70

CONFIDENTIAL

SECTION A [ 36 marks ]
Instruction: Answer ALL questions.
1) __________ is a fourth generation computer scientist.
A Steve Jobs
B John Bardeen
C William Mauch
D Blaise Pascal
2) What is a computer system?
A A set of customised software used for accounting.
B A set of computer components on the motherboard.
C A personal computer is not an example of a computer system.
D A set of hardware and software which processes data in a
meaningful way.
3) What is ethics?
I. A study about moral principles.
II. A custom that guides human behaviour.
III. A regulation that must be obeyed by the public.
IV. A knowledge about what is good and what is bad.
A
B
C
D

I, II and III
I, II and IV
I, III and IV
II, III and IV

4) Trademark can be any _____________, __________, __________ or


device, or any combination of these items.
A word, name, patent
B word, name, design
C word, name, symbol
D word, name, copyright
5) This question is based on the following diagram:

X is best described as
A Spam
B Cookies
C Spyware
D Electronic profile
2

CONFIDENTIAL

CONFIDENTIAL

6) The filtering software is used to ________________


A filter viruses.
B increase growth in Malaysia.
C control the access to the Internet.
D speed up the access to the Internet.
7) Ah Meng wants to sell his laptop. He has used it for two months. He
advertised his laptop online with a statement Brand new lap top for
sale. He is _______________________.
A violating consumer right
B using computer to gain profit
C committing computer fraud
D modifying information on the Internet
8) An example of network security is ____________.
A Firewall
B Padlock
C key lock
D serial number
9) __________ is a type of malicious code that goes off in a specified
condition.
A Trapdoor
B Time bomb
C Trojan horse
D Malicious code
10) Examples of application software include _______________.
A word processing, spreadsheets and databases
B accounting, games and programming language
C Internet browser, desktop publishing, and BIOS program
D word processing, accounting and programming languages
11) Which of the following is not a process carried out by the CPU?
A Displays output
B Executes command
C Controls other hardware
D Processes data to information
12) Which one of the following is the correct information processing
cycle for the control unit operations?
A Fetching Decoding Executing Storing
B Decoding Fetching Executing Storing
C Executing Fetching Storing Decoding
D Storing Fetching Decoding Executing

CONFIDENTIAL

CONFIDENTIAL

13) Number 9 is represented by the binary code as ___________ .


A 00000111
B 00001001
C 00010110
D 00000110
14) One Terabyte (TB) equals to _____ bytes.
A 230 bytes
B 210 bytes
C 240 bytes
D 220 bytes
15) A port is the point which a device attaches to the system unit so that
the device can______
A be used as a peripheral device
B be attached to the motherboard
C send data to or received information from the computer
D send electricity through the circuits of the port and connectors
16) The _____where the computer memory is placed into on the computer
motherboard.
A Ports
B RAM slot
C Motherboard
D Expansion card
17) A ____is previously called an IEEE 1394 port.
A USB Port
B Serial Port
C Parallel Port
D FireWire Port
18) A user is turning on a computer that has been completely powered off.
The user is performing a ___________.
A reboot ___________.
B hot boot
C cold boot
D warm boot
19) Microsoft Excel has a protection feature that allows users to protect
the worksheet from
A viruses.
B changes.
C illegal copies.
D being corrupts.

CONFIDENTIAL

CONFIDENTIAL

20) Why is proprietary software popular among users?


A The software can support any problems.
B It can detect and correct certain types of common problems on hard
disks.
C The software offers a stable system support if the software fails or
malfunctions.
D The software offers an automatic correction if the software fails or
malfunctions.
For questions 21 to 25, state TRUE or False.
21) Proprietary software requires fees to make improvements.

______

22) Open source software usually comes without warranty and support should the
software fail or malfunction.

______

______

23) Each computer has only one application software.


24) A computer cannot operate without secondary storage.

______

25) Proprietary software requires fees to make improvements.

______

For questions 26 to 30, fill in the blanks with appropriate terms


26) _________________________ is the main circuit board of the circuit unit which
consists of some electronic components attached to it and others built into it.
27) _________________________ is a special high-speed parallel port used to attach
peripheral devices such as disk drives and printers.
28) _________________________ is unsolicited email messages, advertisements or
newsgroup postings sent to many recipients at once.
29) _________________________ is a device used to capture or copy image or text
from a magazine into a computer.
30) _________________________ is used to connect devices that are capable of
transferring more than one bit at a time.

CONFIDENTIAL

CONFIDENTIAL

For questions 31 to 36, match the descriptions according to the appropriate aspects

Word Processing

Aspect

Spreadsheet

Main use

Document
type

calculation

CONFIDENTIAL

CONFIDENTIAL

SECTION B [ 26 marks ]
Instruction: Answer ALL questions in this section.
1) Figures below show different types of software.
WindowsXP
XP
Windows
MS
Office
MS Office 2003
AdobePhotoshop
Photoshop
Adobe
Norton
Antivirus
Norton Antivirus
Solaris
Solaris

Windows
XP
Linux
Redhat
MS Office
OpenOffice.org
Adobe Photoshop
GIMP
Norton
Antivirus
Open
LDAP
Solaris
Tiny OS

Figure 1

Figure 2

Write the name for the two types of software listed in Figure 1 and Figure 2.
Then, state four differences between these software.
[10 marks]
Figure 1

Figure 2

__________________________

___________________________

i)
ii)
iii)
iv)
2) The following is a statement on information privacy.
Information privacy refers to the right of individuals and organisations to
deny or restrict the collection and use the information about them
Based on the statement, list four ways of making personal data more private.[4
marks]
i) _________________________________________________________________
ii) _________________________________________________________________
iii) ________________________________________________________________
iv) ________________________________________________________________
7

CONFIDENTIAL

CONFIDENTIAL

3) Figure below shows one type of biometric device.

Based on the figure:


(i)
State the name of the device.

[ 1 marks ]

___________________________________________________________
_
(ii)

State the function of the device.

[ 1 marks ]

___________________________________________________________
_
___________________________________________________________
_
4) Figure below shows example devices of types of storage.

RAM

Based on the figure,


(a) Identify and give ONE function of U.

[2 marks]

________________________________________________________________
________________________________________________________________
(b) State FOUR differences between types of RAM and U.

[8 marks]

CONFIDENTIAL

CONFIDENTIAL

________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

CONFIDENTIAL

CONFIDENTIAL

SECTION C [ 8 marks ]
Instruction : Answer ALL questions in this section.
1) As a Computer lab coordinator, Mrs. Mei Lee bought Antivirus software to enhance
proficiency in computer security. That software is used for all computer related
activities. Mrs. Mei Lee needs to ensure effective usage of that software. Figure
below shows several activities done by Mrs. Mei Lee.

2)
3)
4)
5)
6)
7)
8)
9)
(a)

TrojanSpy.Win32
Worm
Secret.exe
Mellisa
I Love U
All Virus has been
deleted

Give 2 examples of antivirus software.

[2 marks]

___________________________________________________________
___________________________________________________________
(b)

What are the activities carried out by Mrs.Mei Lee?

[3 marks]

___________________________________________________________
___________________________________________________________
___________________________________________________________
(c)

Explain THREE symtoms of the threats in the Figure.

[3 marks]

___________________________________________________________
___________________________________________________________
___________________________________________________________

- END OF PAPER -

10

CONFIDENTIAL

You might also like