Penang Chinese Girls High School

Penang Chinese Girls High School

1

Student No. : ______Name: ______Class: ______

PENANG CHINESE GIRLS’ HIGH SCHOOL

TrialExamination 2008

Form 5

Information and Communication Technology

Time: 2 ½ hours

INSTRUCTIONS

  1. This question paper consists of three sections: Section A, Section B and Section C.
  2. Answer all questions in Section A and Section B.
  3. Answer Question 31 and either Question32 or Question 33 in Section C.
  4. Write your answers for Section A in the spaces provided in Answer Sheet.

SECTION A [36 marks]

1. /
Name the technology used for this generation of computers.
2. / The following statements are related to ethics and law.
P / Judge behaviourbased on moral standards.
Q / Universal, can be applied anywhere, all over the world.
R / Prevent misuse of computers.
S / As a rule to control computer users.
T / Computer users must follow the regulations.
Choose the statement that is related to law by writing the letter(s) in the space provided.
3. / Choose the correct answer.
Copyright / Intellectual Property / Privacy
The right of individuals to control the collection and use of information about themselves refers to the right of ______.
4. / FIGURE 1 shows some storage devices.

A B C D

E F
FIGURE 1
Choose the devicesthat use magnetic particles to store data by writing the letters in the space provided.
5. / FIGURE 2 shows the connectors and cable used to connect the electronics components of a system unit.

Connector A Connector B Connector C

Cable X
FIGURE 2
(a) / Which connector is used to connect IDE CD Drive and hard disk drive?
(b) / Which device is connected to the motherboard using cable X?
6. / When we install device X onto the motherboard, firstly we have to match the notch with the notch on the motherboard's slot. Then we apply equal pressure to both sides of device X itself until the retention clipssnap into place. To remove device X from the motherboard, we just push the two retention clips to the side outwards and device X will just pop out.
The text above describes the installation of device X.
State device X.
7. / Software P: / Lies between application software and hardware and controls access to other hardware and software resources.
Software Q: / Allows users to design slides that contain a combination of text, numbers, charts, clip art or pictures.
Name
(a) / Software P
(b) / Software Q
8. /

(a) / The first description refers to the process of ______.
(b) / The network technology mentioned in the second description refers to ______.
9. / FIGURE 3
Based on FIGURE 3, identify
(a) / device X
(b) / type of network
10. / Figure 4 shows the device and cables used in networking.

FIGURE 4
Which of the following statements are TRUE?
I. / Device X is inserted into the PCI slot of computer.
II. / Cable Z is twisted pair cable.
III. / Cable Z is fiber optics cable.
IV. / Both cables use electrical pulse to transmit data.
A. / I, II
B. / I, II, III
C. / I, II, IV
D. / II, III, IV
11. / All the computers in SMJK Chung Xian are networked. Each computer is connected to two others, ultimately forming a loop. Data are passed in one direction only, being received by each node and then transferred to the next node. Access is achieved by a token, passed from one node to the other.
Name the network topology.
12. / Write True/False to the following statements.
(a) / User must have HTML knowledge to use WYSIWYG web editor
(b) / Icon-based authoring tools display the sequence of the media elements such as graphics and text by adjusting their frames’ duration.
13. / Element / Hardware / Software
X / Scanner
Digital camera / GIMP
Adobe Image Styler
Table 1
The software and hardware listed in Table 1 can be used to produce element X for the development of a multimedia title. Element X is ______.
14. / Pn Wan Azizah has prepared a presentation on how to install Vista operating system. Figure 5 shows some slides of the presentation.

Slide 1 Slide 2

Slide 3 Slide 4
FIGURE 5
The presentation prepared by Pn Wan Azizah is a ______presentation.
A. / linear
B. / non-linear
C. / symmetrical
D. / navigation
15. / The following are the activities that are carried out during Phase Xand Phase Y in multimedia development process.
Phase X:
  • conduct assessment to see the effectiveness of a multimedia product.
  • review the multimedia product by experienced developers from within the industry, and also by academic experts on multimedia development.
Phase Y:
  • capture or create and convert graphics
  • capture, edit and convert audio and video
  • authoring and programming

Name
(a) / Phase X
(b) / Phase Y
16. /
The statements above best describe ______.
17. / The following statements describe the characteristics of compiler and interpreter.
P / Translate code on the fly; no object file is stored in secondary storage.
Q / Convert all the source code into machine code.
R / Create an executable file.
S / Translate and then execute one line of code at a time.
T / Translate the code each time it is run.
Choose the characteristic(s) of compiler by writing the letter(s) in the space provided.
18. /
The statements above best describe ______.
19. / The following are the activities that are carried out during program development.
I.Send the report that includes charts, solution algorithm, test data and program code to system analyst.
II.Draw an input, process and output chart.
III.Prepare a graphical or written description of the steps to solve the problem.
IV.Correct the codes that violate the syntax of the programming language.
V.Meets the users to understand the purpose of the requirements.
VI.Code the program using a programming language.
Arrange the activities involved in the correct order.
20. / Hamzah is asked to develop a program to calculate the average marks of a set of ICT assignments for his class. The variables of this program are identified below:

State an appropriate data type for each of the following variables.
(a) / Identity card number
(b) / Average
21. / The following terms are related to information system.
A / Database management system
B / Decision Support System
C / Executive Information System
D / Management Information System
E / Information System
F / Information
G / Data
Match the following definitions with the terms given by writing A, B, C, D, E, F or G.
(a) / A system which is used by senior managers to address strategic long-term planning and objectives.
(b) / A set of hardware, software, people, data and procedures that work together to process data.
22. / A collection of information that is organized so that it can easily be accessed, managed, and updated is known as ______.
23. / The following shows six main phases in system development.
Problem analysis  Program Design Phase X  Testing  Documentation  Phase Y
State
(a) / Phase X
(b) / Phase Y
24. / The following are the basic operations of data manipulation.
Update / Insert / Sort / Search / Filter
Table 2 and Table 3 shows the results manipulated from Table 1.
Table 1
Index Number / Name / Gender
A0063001 / Mohd Zukri / Male
A0063002 / Azmin Ahmad / Male
A0063003 / Hamidah Ali / Female
A0063004 / Azimah Kasim / Female
Table 2
Index Number / Name / Gender
A0063004 / Azimah Kasim / Female
A0063002 / Azmin Ahmad / Male
A0063003 / Hamidah Ali / Female
A0063001 / Mohd Zukri / Male
Table 3
Index Number / Name / Gender
A0063001 / Mohd Zukri / Male
A0063002 / Azmin Ahmad / Male
Choose the operations used to obtain the results as shown in Table 2 and Table 3.
Table / Operation
(a) / Table 2
(b) / Table 3
25. / The following terms are related to database.
File / Record / Field / Byte / Bit

Title: Discovering Computers 2008
Author: Shelly Cashman Vermaat
Publisher: Thomson Course Technology
Title: Programming With C
Author: Byron S. Gottfried
Publisher: McGraw-Hill
Title: Multimedia Concept
Author: Jim Shuman
Publisher: Thomson Course Technology
FIGURE 6
(a) / The individual element Y is known as ______.
(b) / X is known as ______.

SECTION B

Question 26

(a)Who has committed in computer crime? State the type of computer crime he/she has committed. Justify you answer. [2 marks]

(b)Explain two differences between the software used by Samantha and Faiz.

[2 marks]

Question 27

Nowadays, online marketers can place an electronic cookie on a consumer’s hard drive so that they can recognize the customer when he or she returns to a web site. It can also be used to store information about the person. Marketers employ personalization software to analyze browsing habits to deduce personal interests.Some personalization software may even display unwanted or intrusive advertisement windows. The use of cookie and personalization software is controversial because it enables companies to find out information about customers and to potentially share it with other companies without customer’s permission.

Explain 2 ways for customers to overcome the problems mentioned above. [4 marks]

Question 28

You are asked to develop a program that will determine the weekly gross pay for each employee of a company. The gross pay of each employee is calculated by the following formula:

weekly gross pay = number of hours worked per week hourly rate + incentive bonus.

The hourly rate for all the employees is RM 10 and the company will pay an incentive bonus of RM 100 for the employees who work for more than 40 hours per week.

(a) Identify a constant and a variable to be used. Give reasons to your answer.

[2 marks]

(b) Which control structure is to be used to calculate the weekly gross pay of each employee? Justify your answer. [2 marks]

Question 29

FIGURE 7 shows three database tables of an information system.

FIGURE 7

(a) Redraw and complete the following query design to showall the instructors and courses offered by School of Engineering. [4 marks]

Question 30

FIGURE 8shows a network.

(a) Explain why PC1 and PC2 are not able to communicate with each other. [2 marks]

(b) Redraw the table below and write the configuration of network connectionfor PC1 and PC2 so that both computers are able to communicate with each other. [2 marks]

Computer / IP address / Subnet Mask
PC1
PC2

SECTION C

Question 31

You have been asked to create an interactive multimedia movie that will become part of a series highlighting places of interest in Malaysia. This movie will include an introductory screen that, when the user clicks on the start button, will be converted to four images of places of interest. The user can click on each image to know about the selected place in detail.

The interactive multimedia should exhibit the following two characteristics:

  • user-controlled, nonlinear navigation using computer technology, and
  • the combination of sound, text, graphics, animation, and video elements that the user manipulates to control the order of the movie.

(a)Explain the rolesfor ANY TWO of the following members in the development of the project above.

  • Project manager
  • Subject matter expert
  • Instructional designer[4 marks]

(b) Draw a storyboard for the first three scenes mentioned above. [3 marks]

Question 32

SMK La Salle uses a computerised grading system to record each student’s co-curricular performance. Every student receives a grade for each co-curricular activity involved at the end of each year.

Figure 9(a) shows three database tables in the grading system.

Figure 9(b) shows a query design of the system

(a)Describe the interrelation between ANY three components of the grading system.

[3 marks]

(b)Explain the importance of the relationship between the Student_Id in STUDENT table and the Student_Id in ACTIVITY table. [2 marks]

(c)Based on the query in Figure 9(b), draw a table to show the query results.[2 marks]

Question 33

A small company with two departments has recently installed peer-to-peer networks in each department. The peer-to-peer networks are not connected to each other. A user in one department must make a diskette of the information to be loaded on the next network. Six employees in one department are working on a project. Each person has a different set of responsibilities, and each produces documentation for a different part of the project. Employees have each made the hard drive on their own computers available to everyone else on the project.

As the project grows, each user produces more documents and questions arise about which employee last revised a given document. Also, employees outside the department who have an interest in the project are asking to see some of the completed materials.

Figure 10 shows the existing network layout of the company.

(a)Identify one weakness of the network in the company. Suggest a network solution to overcome the problems faced by the company. Give reasons to support your suggestion. [3 marks]

(b)Explain two differences between the network topology in Department A and Department B. [4 marks]

Prepared by OLPApproved by: