1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober

JABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober 2 ½ jam 3765...
1 downloads 2 Views 1023KB Size
JABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING

SIJIL PELAJARAN MALAYSIA 2009

INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober 2 ½ jam

3765/1

Dua jam tiga puluh minit

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1.

Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dan semua buku jawapan.

2.

Kertas soalan in adalah dalam dwibahasa.

3.

Anda boleh menjawab kertas soalan ini dalam bahasa Melayu dan bahasa Inggeris sepenuhnya atau sebahagian dalam Bahasa Melayu dan sebahagian dalam bahasa Inggeris.

4.

Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C.

5.

Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan.

6.

Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan.

7.

Anda dikehendaki menceraikan Helaian Jawapan dan menyerahkannya kepada Ketua Pengawas bersama-sama dengan buku jawapan anda.

Kertas soalan ini mengandungi 17 halaman bercetak dan 1 halaman tidak bercetak

SULIT

2

3765/1

Nama Calon: No. Kad Pengenalan

-

Angka Giliran Question No. No. Soalan

Candidate’s Answer Jawapan Calon

(i) (ii) (i) (ii) (i) (ii)

12

(i)

13

(ii)

14

4 5 6 7 8

Marks Markah 1 2 3 4 5 6 7 8 9 10 11

(i) (ii) (i) (ii)

3

Answer Sheet Helaian Jawapan

1 2

-

9

15

10

16

11

17

12

18

13

19

14

(i)

20

(ii)

21

15 16

22 (i)

23

(ii)

24

17 18

25 (i)

26

(ii)

27

19

28

20

29

21

30

22 23

(i)

31

(ii)

32

(i)

33

(ii)

34

24

35

25

36

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

3

3765/1

Section A [36 marks] Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. Each answer carries one mark. 1

A system of moral standards or values used as a guideline for computer users is known as A. B. C. D.

2

cyber laws code of ethics cryptographies computer securities

State whether the following statements are True or False. (i)

We can control access to pornography by turning on the firewall in the computer.

(ii) A firewall is a hardware or software that is used to protect your computer against people or programs that try to connect to your computer without invitation. 3

Figure 1 shows the process of cryptography. Plaintext

X

Ciphertext

Y

Plaintext

Figure 1 Based on Figure 1, identify (i) X (ii) Y 4

Statement 1 describes a type of security threat.   

It is typically carried out by e-mail or instant messaging. It is an example of social engineering techniques used to fool users. It often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Statement 1 Based on statement 1, identify the threat. A. B. C. D.

Hacking Phishing Spyware Malicious code

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

5

4

3765/1

Figure 2 shows the examples of input and output devices.

A

B

C

D Figure 2

Based on Figure 2, write A, B, C or D to indicate the output device used for (i) (ii) 6

graphics audio

Figure 3 shows a computer motherboard. M

N

Figure 3 Based on Figure 3, name (i) (ii)

M N

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

7

5

3765/1

Figure 4 shows the interface of application software R and S.

R

S Figure 4

Based on Figure 4, identify the type of application software used in (i) (ii) 8

R S

Figure 5 shows the computer network used by Yu Seng Sdn Bhd and Harmony Sdn Bhd.

Yu Seng Sdn Bhd

Harmony Sdn Bhd Figure 5

Based on Figure 5, name the computer network type for (i) (ii) 9

Yu Seng Sdn Bhd Harmony Sdn Bhd

State whether the following statement is True or False. Local area networks are designed to share data and resources among several computers within a building.

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

6

3765/1

10

The network architecture where all computers have equal status and share resources is known as ………………..

11

Statement 2 describes a network topology. -

It is easy to implement, only add nodes to the host. The failure of a node does not affect the entire LAN. Every node must connect to the host in order to communicate. The host will control the flow of communication in the network. Statement 2

The network topology is ………………………. 12

Which of the following are communication devices: I.

Router

II. Hub/Switch III. Coaxial Cable IV. Internal Modem

13

A.

I, II and III

B.

I, II and IV

C.

I, III and IV

D.

II, III and IV

Figure 6 shows part of the multimedia courseware.

Figure 6 In terms of interactivity, Figure 6 is an example of …………………multimedia.

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

14

7

3765/1

Figure 7 show two hardware used to produce multimedia products.

A

B Figure 7

Based on Figure 7, name (i) (ii) 15

A B.

Figure 8 shows software X used to produce a multimedia element.

Figure 8 Based on Figure 8, identify the software type for X. A. B. C. D.

Audio editor Video editor Animation editor Graphics and image editor

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

16

8

3765/1

Table 1 shows the roles of some members in a multimedia development team. Member

Roles

X

Do research on the content of the multimedia program. Provide access to source materials and reference items.

Y

Write the program code lines or scripts using the authoring tool. Develop the rapid prototype, upon which the final product is based.

Z

Define the scope of a project and discuss with the client. Search for financial resources, equipment and facilities

Table 1 Based on Table 1, identify the member who holds the following position. Write X, Y or Z. (i) (ii)

Project manager Subject matter expert

17

A set of words, symbols and codes that enables human to communicate with computers is known as _________________________ .

18

State whether the following statements are True or False. (i)

An assembly language programmer writes instructions using symbolic instruction codes that are meaningful abbreviations or mnemonics.

(ii) A structured programming approach is a programming approach that break big problems into smaller problems, then further break those into still smaller problems, and so on, until a level of such simplicity is reached. 19

LOAD R1 5 LOAD R2 5 ADD R0 R1 R2 SAVE R0 6 HALT

translate

1000000100100101 1000000101000101 1010000100000110 1000001000000110 1111111111111111 (b)

(a) Figure 9

Based on Figure 9, a program that translates the language in (a) to the language in (b) is called ____________. 20

Which of the following is a logical operator? A. B. C. D.

OR MINUS DIVIDE CONSTANT

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

21

9

3765/1

Figure 10 shows the flowchart for a program START

READ Mark

Mark >=35?

Yes

PRINT “Pass”

No PRINT “Fail”

STOP Figure 10 Based on Figure 10, the flowchart uses A. B. C. D. 22

selection control structure. sequence control structure. repetition control structure. consecutive control structure.

Figure 11 shows the five components of an information system.

X Y

Figure 11

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

10

3765/1

Based on Figure 11, name component (i) (ii) 23

X Y

Column A of Table 2 describes information system P and Q. Column B lists four types of information system. A P

-

Q

-

B

often tied to other systems serves the most elementary day-to-day activities of an organisation usually has high volumes of input and output contain acquired expert knowledge usually contain two components: a knowledge base and an inference engine program built with decision-making rules

DSS ES MIS TPS

Table 2 Based on Table 2, identify the type of information described in (i) (ii) 24

P Q

State whether the following statement is True or False. A database management system is a collection of programs which allow data to be stored, retrieved, and updated. Information can be generated through queries and reports.

25

During phase P in the development of SMS Information System, the following activities are carried out. -

receive request for modification due to system failure and to enhance part of the system fix failure and enhance system deliver new version

What is phase P?

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

11

3765/1

SECTION B [20 marks] This section consists of five questions. Answer all questions. 26

Figure 12 shows two different types of computer storage.

X

Y Figure 12

Based on Figure 12, (a) State two differences between X and Y.

[2 marks]

(b) State two reasons why Y is required by the computer user.

[2 marks]

27 Figure 13(a) shows the network configuration and Figure 13(b) and 13(c) shows the two ping result from a computer with IP address 10.188.192.50.

IP: 10.188.192.50 Subnet mask : 255.255.255.0 IP: 10.188.192.29 Subnet mask : 255.255.255.0 IP: 10.188.195.18 Subnet mask : 255.255.255.0 (a) Figure 13

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

12

3765/1

(b)

(c) Figure 13 Based on Figure 13, (a) Explain the ping result shown in (b).

[2 marks]

(b) Assume that all network connections and NIC are in good condition, explain why the ping result returns Destination Host Unreachable in (c). [2 marks] 28 Figure 14 shows an interface of a multimedia product.

X

Figure 14 3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

13

3765/1

Based on Figure 14, (a) Identify one CASPER design principle that is not applied. Justify your answer. [2 marks] (b) Identify a hardware used to produce element X. Justify your answer. [2 marks] 29

Figure 15(a) shows part of the code used and Figure 15(b) shows an error message displayed during a program execution. Private Sub cmdCalculate_Click() Dim dblWeight As Double, dblHeight As Double, dblBMI As Double Const strMSG As String dblWeight = Val(txtWeight.Text) dblHeight = Val(txtHeight.Text) strMSG = "Your BMI is " dblBIM = dblWeight / (dblHeight * dblHeight) lblDisplay.Caption = strMSG & FormatNumber(dblBMI, 2) End Sub

(a)

(b) Figure 15 Base on Figure 15, (a) Identify the type of error uncovered during the program execution and write the correct code for the mentioned error. [2 marks] (b) State two differences between strMSG and dblBMI. [2 marks]

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

14

3765/1

30 Figure 16 shows part of the Inventory Information System of SMK Batu Karang.

Figure 16 Based on Figure 16, (a)

State the relationship between STAFF_INFO table and STAFF_REQUEST_STATIONERY table. Justify your answer. [2 marks]

(b)

Design the form for STAFF_RECORD_STATIONERY table. [2 marks]

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

3765/1

15

SECTION C [14 marks] This section consists of three questions. You are required to answer two questions only:

31

(i)

Question 31 is compulsory, and

(ii)

Either Question 32 or Question 33.

A group of teachers from a neighbouring country is visiting your school, SMK Cemerlang. As the school head prefect, you are given the task by your principal to produce a multimedia presentation which will introduce your school prefect board to them. Your multimedia presentation must be informative, interactive and include the organisation chart, history, objective and a video clip showing some activities of your board. Based on the information given,

32

(a)

Write a suitable problem statement which includes project title, objective and target audience. [3 marks]

(b)

Design the interface for the main page.

[4 marks]

Figure 17 (a) shows the program interface and the output of the program to find the result of an ICT mark. Figure 17 (b) shows part of the program code.

(a) Private Sub cmdCheck_Click() Dim Mark As Integer Mark = Val(txtMark.Text) If Mark >= 40 Then MsgBox "Congratulation, you PASS the ICT test.", vbInformation, "Pass" Else MsgBox "Sorry, you FAIL the ICT test.", vbInformation, "Fail" End If End Sub

(b) Figure 17

3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

3765/1

16

Based on Figure 1, (a)

create a flowchart

[5 marks]

(b)

complete the table below

[2 marks]

Input

Output

40 15

33

Figure 18 (a) and Figure 18 (b) shows the online reservation form for Hotel Selesa.

Hotel Selesa Guest Particulars Guest Name: Gender: Passport No: Address: Contact No: Email Add: (a) Reservation Info

Reservation ID Date Check-in: Date Check-out: Arrival Time: Departure Time: Room Type: Method of Payment: (b) Figure 18 3765/1 © Zon A Kuching, SARAWAK

SULIT

SULIT

17

3765/1

Based on Figure 18, (a)

Design two tables to store the data in (a) and (b). State the fields and the primary key for each table. Show the relationship between the two tables. [4 marks]

(b)

Describe a query to list the guest checking in on the 10 October 2009. The query should include the following: Guest Name Date of Check-in Room Type Method of Payment [3 marks]

3765/1 © Zon A Kuching, SARAWAK

SULIT