21
JABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober 2 ½ jam Dua jam tiga puluh minit JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dan semua buku jawapan. 2. Kertas soalan in adalah dalam dwibahasa. 3. Anda boleh menjawab kertas soalan ini dalam bahasa Melayu dan bahasa Inggeris sepenuhnya atau sebahagian dalam Bahasa Melayu dan sebahagian dalam bahasa Inggeris. 4. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C. 5. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan. 6. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan.

Section A - smksgruan.files.wordpress.com  · Web viewkad pengenalan . dan . ... you are given the task by your principal to produce a multimedia presentation which will introduce

  • Upload
    dinhnhi

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Section A

PAGE

17

SULIT

3765/1

JABATAN PELAJARAN NEGERI SARAWAK

ZON A KUCHING

SIJIL PELAJARAN MALAYSIA 2009

3765/1

INFORMATION AND COMMUNICATION TECHNOLOGY

Kertas 1

Oktober

2 jam

Dua jam tiga puluh minit

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dan semua buku jawapan.

2. Kertas soalan in adalah dalam dwibahasa.

3. Anda boleh menjawab kertas soalan ini dalam bahasa Melayu dan bahasa Inggeris sepenuhnya atau sebahagian dalam Bahasa Melayu dan sebahagian dalam bahasa Inggeris.

4. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C.

5. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan.

6. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan.

7. Anda dikehendaki menceraikan Helaian Jawapan dan menyerahkannya kepada Ketua Pengawas bersama-sama dengan buku jawapan anda.

Kertas soalan ini mengandungi 17 halaman bercetak dan 1 halaman tidak bercetak

Nama Calon:

No. Kad Pengenalan

-

-

Answer Sheet

Angka Giliran

Helaian Jawapan

Question No. No. Soalan

Candidates Answer

Jawapan Calon

Marks

Markah

1

1

2

(i)

2

(ii)

3

3

(i)

4

(ii)

5

4

6

5

(i)

7

(ii)

8

6

(i)

9

(ii)

10

7

(i)

11

(ii)

12

8

(i)

13

(ii)

14

9

15

10

16

11

17

12

18

13

19

14

(i)

20

(ii)

21

15

22

16

(i)

23

(ii)

24

17

25

18

(i)

26

(ii)

27

19

28

20

29

21

30

22

(i)

31

(ii)

32

23

(i)

33

(ii)

34

24

35

25

36

Section A

[36 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark.

Each answer carries one mark.

1

A system of moral standards or values used as a guideline for computer users is known as

A. cyber laws

B. code of ethics

C. cryptographies

D. computer securities

2

State whether the following statements are True or False.

(i) We can control access to pornography by turning on the firewall in the computer.

(ii) A firewall is a hardware or software that is used to protect your computer against people or programs that try to connect to your computer without invitation.

3

Figure 1 shows the process of cryptography.

Figure 1

Based on Figure 1, identify

(i) X

(ii) Y

4

Statement 1 describes a type of security threat.

It is typically carried out by e-mail or instant messaging.

It is an example of social engineering techniques used to fool users.

It often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Statement 1

Based on statement 1, identify the threat.

A. Hacking

B. Phishing

C. Spyware

D. Malicious code

5

Figure 2 shows the examples of input and output devices.

A

B

C

D

Figure 2

Based on Figure 2, write A, B, C or D to indicate the output device used for

(i) graphics

(ii) audio

6

Figure 3 shows a computer motherboard.

SHAPE \* MERGEFORMAT

Figure 3

Based on Figure 3, name

(i) M

(ii) N

7

Figure 4 shows the interface of application software R and S.

R

S

Figure 4

Based on Figure 4, identify the type of application software used in

(i) R

(ii) S

8

Figure 5 shows the computer network used by Yu Seng Sdn Bhd and Harmony Sdn Bhd.

Yu Seng Sdn Bhd

Harmony Sdn Bhd

Figure 5

Based on Figure 5, name the computer network type for

(i) Yu Seng Sdn Bhd

(ii) Harmony Sdn Bhd

9

State whether the following statement is True or False.

Local area networks are designed to share data and resources among several computers within a building.

10

The network architecture where all computers have equal status and share resources is known as ..

11

Statement 2 describes a network topology.

It is easy to implement, only add nodes to the host.

The failure of a node does not affect the entire LAN.

Every node must connect to the host in order to communicate.

The host will control the flow of communication in the network.

Statement 2

The network topology is .

12

Which of the following are communication devices:

I. Router

II. Hub/Switch

III. Coaxial Cable

IV. Internal Modem

A. I, II and III

B. I, II and IV

C. I, III and IV

D. II, III and IV

13

Figure 6 shows part of the multimedia courseware.

Figure 6

In terms of interactivity, Figure 6 is an example of multimedia.

14

Figure 7 show two hardware used to produce multimedia products.

A

B

Figure 7

Based on Figure 7, name

(i) A

(ii) B.

15

Figure 8 shows software X used to produce a multimedia element.

Figure 8

Based on Figure 8, identify the software type for X.

A. Audio editor

B. Video editor

C. Animation editor

D. Graphics and image editor

16

Table 1 shows the roles of some members in a multimedia development team.

Member

Roles

X

Do research on the content of the multimedia program.

Provide access to source materials and reference items.

Y

Write the program code lines or scripts using the authoring tool.

Develop the rapid prototype, upon which the final product is based.

Z

Define the scope of a project and discuss with the client.

Search for financial resources, equipment and facilities

Table 1

Based on Table 1, identify the member who holds the following position. Write X, Y or Z.

(i) Project manager

(ii) Subject matter expert

17

A set of words, symbols and codes that enables human to communicate with computers is known as _________________________ .

18

State whether the following statements are True or False.

(i) An assembly language programmer writes instructions using symbolic instruction codes that are meaningful abbreviations or mnemonics.

(ii) A structured programming approach is a programming approach that break big problems into smaller problems, then further break those into still smaller problems, and so on, until a level of such simplicity is reached.

19

Figure 9

Based on Figure 9, a program that translates the language in (a) to the language in (b) is called ____________.

20

Which of the following is a logical operator?

A. OR

B. MINUS

C. DIVIDE

D. CONSTANT

21

Figure 10 shows the flowchart for a program

Figure 10

Based on Figure 10, the flowchart uses

A. selection control structure.

B. sequence control structure.

C. repetition control structure.

D. consecutive control structure.

22

Figure 11 shows the five components of an information system.

Figure 11

Based on Figure 11, name component

(i) X

(ii) Y

23

Column A of Table 2 describes information system P and Q. Column B lists four types of information system.

A

B

P

often tied to other systems

serves the most elementary day-to-day activities of an organisation

usually has high volumes of input and output

DSS

ES

Q

contain acquired expert knowledge

usually contain two components: a knowledge base and an inference engine program

built with decision-making rules

MIS

TPS

Table 2

Based on Table 2, identify the type of information described in

(i) P

(ii) Q

24

State whether the following statement is True or False.

A database management system is a collection of programs which allow data to be stored, retrieved, and updated. Information can be generated through queries and reports.

25

During phase P in the development of SMS Information System, the following activities are carried out.

receive request for modification due to system failure and to enhance part of the system

fix failure and enhance system

deliver new version

What is phase P?

SECTION B

[20 marks]

This section consists of five questions. Answer all questions.

26 Figure 12 shows two different types of computer storage.

X

Y

Figure 12

Based on Figure 12,

(a) State two differences between X and Y.

[2 marks]

(b) State two reasons why Y is required by the computer user. [2 marks]

27 Figure 13(a) shows the network configuration and Figure 13(b) and 13(c) shows the two ping result from a computer with IP address 10.188.192.50.

(a)

Figure 13

(b)

(c)

Figure 13

Based on Figure 13,

(a) Explain the ping result shown in (b).

[2 marks]

(b) Assume that all network connections and NIC are in good condition, explain why the ping result returns Destination Host Unreachable in (c). [2 marks]

28 Figure 14 shows an interface of a multimedia product.

Figure 14

Based on Figure 14,

(a) Identify one CASPER design principle that is not applied. Justify your answer.

[2 marks]

(b) Identify a hardware used to produce element X. Justify your answer.

[2 marks]

29 Figure 15(a) shows part of the code used and Figure 15(b) shows an error message displayed during a program execution.

Private Sub cmdCalculate_Click()

Dim dblWeight As Double, dblHeight As Double, dblBMI As Double

Const strMSG As String

dblWeight = Val(txtWeight.Text)

dblHeight = Val(txtHeight.Text)

strMSG = "Your BMI is "

dblBIM = dblWeight / (dblHeight * dblHeight)

lblDisplay.Caption = strMSG & FormatNumber(dblBMI, 2)

End Sub

(a)

(b)

Figure 15

Base on Figure 15,

(a) Identify the type of error uncovered during the program execution and write the correct code for the mentioned error.

[2 marks]

(b) State two differences between strMSG and dblBMI.

[2 marks]

30 Figure 16 shows part of the Inventory Information System of SMK Batu Karang.

Figure 16

Based on Figure 16,

(a) State the relationship between STAFF_INFO table and STAFF_REQUEST_STATIONERY table. Justify your answer.

[2 marks]

(b) Design the form for STAFF_RECORD_STATIONERY table.

[2 marks]

SECTION C

[14 marks]

This section consists of three questions. You are required to answer two questions only:

(i) Question 31 is compulsory, and

(ii) Either Question 32 or Question 33.

31

A group of teachers from a neighbouring country is visiting your school, SMK Cemerlang. As the school head prefect, you are given the task by your principal to produce a multimedia presentation which will introduce your school prefect board to them. Your multimedia presentation must be informative, interactive and include the organisation chart, history, objective and a video clip showing some activities of your board.

Based on the information given,

(a)

Write a suitable problem statement which includes project title, objective and target audience. [3 marks]

(b)

Design the interface for the main page. [4 marks]

32

Figure 17 (a) shows the program interface and the output of the program to find the result of an ICT mark. Figure 17 (b) shows part of the program code.

(a)

SHAPE \* MERGEFORMAT

(b)

Figure 17

Based on Figure 1,

(a)

create a flowchart [5 marks]

(b)

complete the table below [2 marks]

Input

Output

40

15

33

Figure 18 (a) and Figure 18 (b) shows the online reservation form for Hotel Selesa.

(a)

(b)

Figure 18

Based on Figure 18,

(a)

Design two tables to store the data in (a) and (b). State the fields and the primary key for each table. Show the relationship between the two tables.

[4 marks]

(b)

Describe a query to list the guest checking in on the 10 October 2009. The query should include the following:

Guest Name

Date of Check-in

Room Type

Method of Payment

[3 marks]

Y

X

Plaintext

(b)

(a)

Subnet mask : 255.255.255.0

X

N

M

Ciphertext

Plaintext

Yes

PRINT

Pass

Mark >=35?

translate

1000000100100101

1000000101000101

1010000100000110

1000001000000110

1111111111111111

LOAD R1 5

LOAD R2 5

ADD R0 R1 R2

SAVE R0 6

HALT

STOP

PRINT

Fail

READ

Mark

START

No

Y

IP: 10.188.192.29

Subnet mask : 255.255.255.0

IP: 10.188.192.50

Subnet mask : 255.255.255.0

IP: 10.188.195.18

X

EMBED PBrush

Private Sub cmdCheck_Click()

Dim Mark As Integer

Mark = Val(txtMark.Text)

If Mark >= 40 Then

MsgBox "Congratulation, you PASS the ICT test.", vbInformation, "Pass"

Else

MsgBox "Sorry, you FAIL the ICT test.", vbInformation, "Fail"

End If

End Sub

Hotel Selesa

Guest Particulars

Guest Name:

Gender:

Passport No:

Address:

Contact No:

Email Add:

Reservation Info

Reservation ID

Date Check-in:

Date Check-out:

Arrival Time:

Departure Time:

Room Type:

Method of Payment:

3765/1 Zon A Kuching, SARAWAK

SULIT