Académique Documents
Professionnel Documents
Culture Documents
FORM :……………………………………………………………………
ICT F4
MONTHLY TEST
SEPTEMBER 2009
Subject :
INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT) FORM 4
Time Period:
09.50-10.30am (40 Minutes)
Date :
08.09.2009 (Tuesday)
REMINDER :
DON’T OPEN THE PAPER UNTIL YOU
HAVE BEEN ASK TO DO SO
Answer all the questions
Advantages Disadvantages
Effective sharing of information Social problems
- Information can be - Individualistic and Introvert
1__________________________ - Identity theft
_ - Fraud
___________________________ - Pornography
_ - 2______________
- Exchange opinions, news and etc - Online Gambling
through email, discussion groups
and many more channels.
Lower cost communication Health problems
- Internet is cost effective - 3______________
- Cheap connection - Eyestrain
- Physical and mental health
4_____________ of communication
- Information can be accessed and
retrieved anytime, anywhere.
- But GIGO applies
(Garbage In, Garbage Out)
Paperless environment
- Information can be stored and
retrieved from harddisk or CD-
Rom (digital medium)
5________________ communication
- Anyone can be reach with the right
technologies
(10 Marks)
Question 2 - Write the correct example for each blank below
3___________
1___________ 2______________ Environment
_
Advantage
Reliability Speed Borderless
4__________ 5__________
___________ ___________ Disadvantages
_ _
(10 Marks)
Question 3 - Write the correct example for each blank below
COMPUTER LAW
Law is a 1_____________________________________________ that govern the affairs
of a community by a political authority. Law differs from one country to another. In the era
of technology, computer law is needed to clarify goods or actions that fall under the
computer law. (2 Marks)
Ethics Law
Using the office computer to Sending a 3________________ to
2__________________________ other people computer
Reading 4___________________ 5_______________ into other
without permission computers
(12 Marks)
AUTHENTICATION
Authentication is a process where users verify that they say are who they say they are. The user
who attempts to perform functions in a system is in fact the user who is authorised to do so.
Authentication is important in order to safeguard against unauthorised access and use.
DATA REPRESENTATION
- Computer uses binary system to communicate with all the devices it is connected to.
- Binary system consist of 2 digits – 0 and 1, with “0” being OFF and “1” being ON.
- Each 0 and 1 is called bit. Bit is short for _________________.(1).
DATA MEASUREMENT
The capacities of storage devices are stated in terms of the number of bytes they can store. The
capacity of most current storage devices are in terms of megabytes and gigabytes.
Unit Capacity
1 KiloByte (KB) 210 = ________________ Bytes (1)
1 MegaByte (MB) 220 = ________________ Bytes (2)
1 __________________ (GB) (3) 230 ≈ about 1 billion Bytes
1 __________________ (TB) (4) 240 ≈ about 1 trillion Bytes
(12 Marks)
(24 Marks)
Question 5 - Instruction: Circle the correct answer.
2. Of the three types of network, the _____________ covers the smallest area.
LAN
A. MAN
B. WAN
C. Internet
B.
C. D.
Question 6 - Draw any two type of computer network topologies and write also the type name and
its 2 advanteges
(14 Marks)
**** END OF QUESTION ****
Prepared by;
……………………………….…….
MR. TAUFIK HIDAYAT BIN HAMID
(ICT Form 4 Teacher)
Head of ICT Department, SMKLutong