Professional Documents
Culture Documents
3. Which of the followings are the similarities between ethics and -The range of speed is between 10mbps to 100mbps
law?
I. to prevent any crime
Kadar kelajuan adalah diantara 10mbps hingga 100mbps
II. as a rule to control computer users
III.to guide user from misusing computers The statements above refers to.
IV. to create a healthy computer society, so that computers are A LAN B.MAN C. WAN D. Intranet
used to contribute to a better life
A. I, II and III B.II, III and IV Write T for true statements and F for false statements.
C. I, III and IV D.All above
6. The three main types of secondary storage are . 13. A compressed file must be unzipped or restored
A. CD, DVD and DVDRW to its original form before being used.
B. ROM, RAM and hard drive
C. hard disk, floppy disk and pen drive
D. magnetic medium, optical medium and flash memory 14. Trademark Law is a protection of a companys
logos and brand name.
7. An operating system is____________ .
A. a program designed to assist users with 15. Changing computer programming codes with
personal task permission is unethical.
B. a program that allows a user to perform
maintenance type task
C. a program that control or maintain the
operations of a computer and its device
D. a set of programs that coordinates all the
data transmissions among computer in a
network
1
SET2 ICT 2007
Match the picture with the correct statement. 25. Answer statements A and B according to situation below.
I.Operating systems that allow the network to centralise
Technology Year
functions and applications in one or more dedicated file servers.
16.
(A) ______________________
In 1925, television II.Serves extended enterprise, including defined sets of customers
was made known
to public. or suppliers or other partners.
_____________________
SECTION B
17.
(B) QUESTION 1
In 1941, the
Look at the picture below and answer the questions that follow.
computer was
created.
18.
(C)
In 3500 BC, the
Sumerians
developed
cuneiform writing.
Define pornography (2 scores)
I.____________________________________________________
19. ____________________________________________
In 1876, the first
telephone was II. Give two impacts of pornography on Malaysian society.
introduced. a.___________________________________________________
(D) ___________________________________________
b.___________________________________________________
___________________________________________
20.
QUESTION 2
In 1500 BC, the
Phoenicians I. Complete the diagram below
developed the
alphabet. Computer
(E) Security
2
SET2 ICT 2007
II. Give two examples of computer threats.
a.___________________________________________________ QUESTION 5
b.___________________________________________________ Based on figure below, answer the following questions.
I. Name the types of computer networks below.
(2 scores)
QUESTION 3
Rearrange the steps in scanning antivirus below.
A.scan the selected file
B.choose an antivirus program
C.wait while the program is scanning and the result is produced
D.select file that need to be scanned
( 4 scores )
QUESTION 4 a. _________________ b. __________________
I. Define computer system ( 2 scores )
_____________________________________________________
II. Give two differences between above computer networks.
_____________________________________________________
a.________________________________________________
_____________________________________________________ ______________
b.________________________________________________
_____________________________________________________
______________
_____________________________________________________ ( 2 scores )
_____________________________________________________
SECTION C
( 2 scores ) Instruction : Question 1 is compulsory AND answer either
Question 2 or Question 3.
II. Draw a block diagram and describe the information processing
cycle which includes input, process, output and storage. Question 1 (COMPULSORY)
( 2 scores )
c) Define the network communication technology of
Extranet.
______________________________________
_______________________________________
[2 scores]
3
SET2 ICT 2007
Question 2 C) Give two sub components in a central processing unit
II.
[2 scores]
Question 3
[2 scores]