SMK KEPONG INFORMATION COMMUNICATION AND TECHNOLOGY (ICT) TEST 1 : MARCH (40 marks) DURATION : 1 hour and 15 minutes FORM 4

wanderooswarrenΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

114 εμφανίσεις

1


2011

TEST 1 MARCH: FORM 4


SMK
KEPONG

INFORMATION COMMUNICATION AND TECHNOLOGY (ICT)

TEST 1 : MARCH (40 marks)

DURATION : 1 hour and 15 minutes

FORM 4


Answer all question
s
. Use your own paper.


1.

What is the Information and Communication
Technology (
ICT)?

A

Any communication and application facilities based on computer.

B

Technical means people use to improve their surroundings. It is also
knowledge

of using tools
and machines to do tasks efficiently.

C

Intercourse by words, letters or messages; interchange of thoughts or opinions, by conference
or other means; conference; correspondence.

D

Includes any communication or application facilities such
as radio, cellular

phones, computer,
software and so on as well as the various services and applications associated with them.


2.

Read statement 1.
Name the technology used for this generation of computers.






Statement 1


3.

Figure 1 shows several components of computer technolog
y generations.


Figure 1

Match
A
,
B
, or
C

with the following generation of computer technology.

i.

2
nd

Generation Computer


ii.

4
th

Generation Computer





A

B

C

The computers for this generation use
magnetic drums as storage media and are large in size,
taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often
the cause of malfunctions.

2


2011

TEST 1 MARCH: FORM 4



4.

Table 1 shows three different fields and Figure 2 shows the use of ICT in two
different fields.

Industry

Banking

Education

Table 1





(A)


(B)

Figure 2

Based on Figure 2, match the use of ICT with the fields given in Table 1.

i.

A
-

______


ii.

B
-

______


5.

Study the statement 2 below carefully.




Statement 2

Statement 2 above regarding to _________________ system.


6.

Figure 3 shows the impact of ICT on society.












Figure 3

Based on figure 3,

i.

State two
advantages of ICT on society.

ii.

State two disadvantages of ICT on society.




Production

was slow because everything was done manually and totally depended on human
labour.

3


2011

TEST 1 MARCH: FORM 4



7.

Creative writing such as lyrics and song compositions can be protected under the __________ law.

A

P
atent

B

D
esign

C

C
opyright

D

T
rademark


8.

A system of moral standards or values as a guideline for computer users is known as

A

cyber laws

B

cryptography

C

code of ethics

D

computer
ethics


9.

The following is a statement 3 on information privacy





Statement 3

Based on the statement 3, list
four

ways of making personal data more private.



10.

Figure 4 shows one type of verification
methods.













Figure 4

Based on figure 4, state the method used.


11.

State whether the statement 4 is True or False. Write T for True or F for False.



Statement 4



“Information privacy refers to the right of
i湤ivi摵慬猠慮搠潲g慮az慴i潮猠t漠摥ny 潲 r敳tri捴 t桥
collection and use the information about them.”

卨敬lyⰠ㈰〶

A畴桥htic慴i潮oi猠im灯pt慮t⁩渠潲摥d⁴漠獡f敧畡u摳d慧慩湳n t桥⁵湡nt桯hiz敤⁡c捥s猠慮搠畳攮

4


2011

TEST 1 MARCH: FORM 4


12.

Figure 5
below
shows the example
s

of biometric devices.













Figure 5

i.

List another
two

examples that you have learnt.

ii.

State the need of authentication.


13.

Based on the Statement 5, answer
the following question.






Statement 5

i.

List
two

controversial contents that stated in Statement 5.

ii.

State
one

impact of controversial content in soci
ety from 13(i).


14.

State whether the following statement is True or False
.

i.

Web filtering software is a program that restricts access to specified Web Sites.


15.

Figure 6 shows the part or an algorithm for a web page filter.

















Figure6

i.

State the
filtering method used in the algorithm.



Fingerprint Recognition

Iris Scanning

See Yi Poi

has received an e
-
mail stating that his favourite soda drinks “Soda Moda” uses
f潯o

c潬潵ri湧⁴桡h i猠s潴 a摶i獡扬e⁢ ⁔桥⁍i湩獴ry ⁈敡lt栮⁈e⁤潥猠湯s湯n⁴桥htrut栠
潦⁴he

e
-
m慩l⁢ t⁨攠 慳 f潲w慲摥搠t桥he
-
m慩l⁴o

㔰5潦 桩猠fri敮e献⁓潤愠䵯M愠aab敬⁡l獯⁨慳
扥bn

m慮a灵l慴敤ei湴漠愠aict畲e⁴h慴 t敮e猠so⁥硰l潩t⁷潭敮⁩渠愠摩獴a獴敦ul慮湥r.

5


2011

TEST 1 MARCH: FORM 4


16.

Figure 7 shows the Malaysian Cyber Law.

A

Copyright Act 1987

B

Communications and Multimedia Act 1998

C

Digital Signature Act 1997

D

Computer Crimes 1997

E

Telemedicine Act 1997

Figure 7

i.

__________________
secures electronic communications especially on the Internet.

ii.

__________________ gives protection against the misuses of computers and computer criminal
activities such as unauthorized use of programmes, illegal transmission of data or messages over
comput
ers and hacking and cracking of computers systems and networks.

iii.

__________________ ensures that only qualified medical prac
ti
t
ioners can practice
telemedicine and that their patient’s rights and interests are protected.

iv.

The implementation of ______________
_________ ensures that information is secure, the
network is reliable and the service is affordable all over Malaysia.


17.

Table 2 shows the activities of computer crime.

P

Computer Attack

Q

Computer Theft

R

Copyright Infringement

S

Computer Fraud

Table 2

Based on Table 2, write
P
,
Q
,
R

or
S

for the following
statement:

i.

Chua Ban Ling transfer his company profit to his own account.


ii.

Chan Kar Yan downloaded an assignment from t
he internet and claimed it is her
.



18.

Which of the following is NOT the example of
computer fraud?

A

E
-
mail hoaxes

B

Programmed fraud

C

Investment schemes by Internet

D

Diverts good to the wrong destinations


19.

Table 3 shows different types of computer threats.

Computer threat

Description

P

Unauthorized access into a computer system.

R

A program that attaches itself to another program and can
destroy or co
-
exists with the program.


Table 3



Name the computer threats:

i.

P = ________

ii.

R = ________



**************************************END OF
QUESTIONS*********************************************


Prepared by
:



…………………………….

(
KRISHNA KUMARI A/P LETCHUMANAN
)

ICT Teacher

Checked by
:



……………………
……….

(
KAMARIAH BT BAHARI
)

Head of
ICT

Panel


Approved by
:



……………………………..

(
RAHIMAH BT MOHD SAID
)

S. Assistance of Curriculum