Vous êtes sur la page 1sur 5

NAME :……………………………………………………………………

FORM :……………………………………………………………………
ICT F4
MONTHLY TEST
SEPTEMBER 2009

SEKOLAH MENENGAH KEBANGSAAN LUTONG, MIRI

MONTHLY TEST (SEPTEMBER)


YEAR 2009

Subject :
INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT) FORM 4

Time Period:
09.50-10.30am (40 Minutes)

Date :
08.09.2009 (Tuesday)

REMINDER :
DON’T OPEN THE PAPER UNTIL YOU
HAVE BEEN ASK TO DO SO
Answer all the questions

The questions consist of 5 pages of printed paper including cover


CONFIDENTIAL
Question 1 - Write the correct example for each blank below

Advantages Disadvantages
Effective sharing of information Social problems
- Information can be - Individualistic and Introvert
1__________________________ - Identity theft
_ - Fraud
___________________________ - Pornography
_ - 2______________
- Exchange opinions, news and etc - Online Gambling
through email, discussion groups
and many more channels.
Lower cost communication Health problems
- Internet is cost effective - 3______________
- Cheap connection - Eyestrain
- Physical and mental health
4_____________ of communication
- Information can be accessed and
retrieved anytime, anywhere.
- But GIGO applies
(Garbage In, Garbage Out)
Paperless environment
- Information can be stored and
retrieved from harddisk or CD-
Rom (digital medium)
5________________ communication
- Anyone can be reach with the right
technologies

(10 Marks)
Question 2 - Write the correct example for each blank below

3___________
1___________ 2______________ Environment
_

Advantage
Reliability Speed Borderless

The Impact of ICT


on Society

4__________ 5__________
___________ ___________ Disadvantages
_ _

(10 Marks)
Question 3 - Write the correct example for each blank below
COMPUTER LAW
Law is a 1_____________________________________________ that govern the affairs
of a community by a political authority. Law differs from one country to another. In the era
of technology, computer law is needed to clarify goods or actions that fall under the
computer law. (2 Marks)

Ethics Law
Using the office computer to Sending a 3________________ to
2__________________________ other people computer
Reading 4___________________ 5_______________ into other
without permission computers

Plagiarising and using materials from


Selling
the Internet without giving credit to
6__________________________
the author.

(12 Marks)
AUTHENTICATION
Authentication is a process where users verify that they say are who they say they are. The user
who attempts to perform functions in a system is in fact the user who is authorised to do so.
Authentication is important in order to safeguard against unauthorised access and use.

1___________________________ Callback System


A device that translates personal Refers to the checking
characteristics into a digital code 2____________________________________.
that is compared with a digital code It is commonly used in the bank operation and
stored in the database. business transaction.
Examples:
Examples:
Fingerprint Recognition, Facial
The bank/company will call back to confirm the
Recognition, Hand Geometry, Iris
service required.
Scanning, Retinal Scanning, Voice
Recognition, Signature Verification
System.
(4 Marks)
CYBER LAWS
Cyber laws refer to any laws relating to protecting the Internet and other online
communication technologies.

Digital Signature 4 types of 2_____________


Act 1997 Cyber laws in ______________
Malaysia _
include:-
1_____________ Communication and
_______________ Multimedia Act 1998
__
Question 4 - Write the correct example for each blank below (4 Marks)
SECURITY THREATS
Computer threats can come from many ways either from human or natural disasters.

Computer threats includes 5 types of:


i.Malicious codes, ii. 1______________,
iii. Natural & Environmental Threats and iv. 2______________.
(4 Marks)

DATA REPRESENTATION
- Computer uses binary system to communicate with all the devices it is connected to.
- Binary system consist of 2 digits – 0 and 1, with “0” being OFF and “1” being ON.
- Each 0 and 1 is called bit. Bit is short for _________________.(1).

8 bits = 1_____________(2) = 1 character


(4 Marks)

DATA MEASUREMENT
The capacities of storage devices are stated in terms of the number of bytes they can store. The
capacity of most current storage devices are in terms of megabytes and gigabytes.
Unit Capacity
1 KiloByte (KB) 210 = ________________ Bytes (1)
1 MegaByte (MB) 220 = ________________ Bytes (2)
1 __________________ (GB) (3) 230 ≈ about 1 billion Bytes
1 __________________ (TB) (4) 240 ≈ about 1 trillion Bytes
(12 Marks)

(24 Marks)
Question 5 - Instruction: Circle the correct answer.

1. A node on a network can be a ______________


AVR
A. Computer
B. User
C. Router

2. Of the three types of network, the _____________ covers the smallest area.
LAN
A. MAN
B. WAN
C. Internet

3. In your school computer lab, __________________ is commonly shared.


A. Hard disk
B. Processor
C. RAM
D. Software

4. Which of the following is used as the connector for twisted-pair cable?


A. SC C. BNC-T
B. RJ-45 D. MT-RJ

5. In a ring topology data is transmitted in ____________direction(s).


A. One
B. Two
C. Three
D. Four

6. Choose the correct diagram that shows star topology.

B.

C. D.

Question 6 - Draw any two type of computer network topologies and write also the type name and
its 2 advanteges

Topology Advantages ;- Topology Advantages ;-


1._________________________________ 1._________________________________
2._________________________________ 2._________________________________

(14 Marks)
**** END OF QUESTION ****
Prepared by;

……………………………….…….
MR. TAUFIK HIDAYAT BIN HAMID
(ICT Form 4 Teacher)
Head of ICT Department, SMKLutong

Vous aimerez peut-être aussi