Documente Academic
Documente Profesional
Documente Cultură
3
3765/1
F4 August 2015
Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. State whether the following statement is True or False.
Using materials from websites as a resource for assignment without giving credit to
the original author is considered unethical.
2. Table 1 shows the threats to computer security.
K
Worm
Hacking
Nature disaster
Theft
Table 1
A program that can pass on the malicious code to other programs by modifying
them.
(ii)
3. Alex has downloaded copyrighted songs and movies from the Internet. Then, he
burned all these downloaded material into CDs and sold them.
(i)
(ii)
4. Karen has stored some confidential data in her mobile phone. Most of the time, she
turn on her mobile phones wifi.
(i)
(ii)
State one security measure to overcome the threat mentioned in Question 4(i).
5. ICT has brought positive impacts to society. An example of ICT usage is email
application. State one benefit of using email.
6. How to safeguard children when they are surf online?
I
3765/1
SULIT
SULIT
4
3765/1
F4 August 2015
Figure 1
Based on Figure 1, name the security method used.
8. Adam owns an ATM card as shown in Figure 2.
Figure 2
3765/1
SULIT
SULIT
5
3765/1
F4 August 2015
Based on Figure 2, name the verification method used when inserting ATM card into
ATM machine to withdraw money.
I
Processed object
II Callback system
III User identification
IV Biometric detection
A I & II
B I & III
C II & III
D III & IV
9. Machine cycle involves two components of a processor.
Name two components involved based on the following statement:
(i)
(ii)
Figure 3
Based on Figure 3, give one security feature that is used by Yahoo Mail to prevent
unauthorized access to her email account.
3765/1
SULIT
SULIT
6
3765/1
F4 August 2015
Binary
01001100
01001111
01010110
Table 2
Based on Table 2, write the binary digit for the word VLO.
12. Figure 4(a) and Figure 4(b) shows the wireless network interface card (NIC) and
motherboard respectively.
Figure 4(a)
Wireless NIC
Figure 4(b)
Motherboard
Label and name the location accurately where wireless NIC should be placed on
Figure 4(b).
3765/1
SULIT
SULIT
7
3765/1
F4 August 2015
Mouse
Keyboard
Computer
Monitor
Hard disk
Figure 5
(i)
(ii)
(i)
RAM
ROM
(ii)
15. Swan Travel Agency has deployed computer network in its business. State the type of
network communication technology used based on the following purpose:
(i)
Deal with clients and suppliers for payment and traveling information.
(ii)
16. Which unit is the most suitable used for hard disk capacity?
A MHz
B GHz
C kB
D GB
3765/1
SULIT
SULIT
8
3765/1
F4 August 2015
Figure 6
Based on Figure 6, name the cable connector used.
19. Table 3 shows four computers with their respective specifications.
Computer
Network connectivity
Processor
Ethernet
700 MHz
Ethernet/ WiFi
1.2 GHz
None
260 MHz
WiFi/ Bluetooth
1.6 GHz
Table 3
Based on Table 3, write A, B, C or D to answer the following questions:
(i) Which one of these computers can only use wired network connection?
(ii) Which one of these computers has the fastest processor?
20. Which device is used to convert digital signal to analog signal and vice versa in order
to transmit data along a phone line?
A Hub
B Router
C Switch
D Modem
3765/1
SULIT
SULIT
9
3765/1
F4 August 2015
21. Figure 7 shows a mobile phone tethering its internet connection to 5 other devices.
Figure 7
Based on Figure 7, name the technology specification used by the mobile phone to
provide tethering Internet connection.
A 3G
B 4G LTE
C GSM
D Bluetooth
22. Taylor Co. Ltd. has deployed a dedicated server to store applications that could be
used by its employee within a building.
(i)
(ii)
23. Bluetooth operates at frequencies between 2.4 GHz to 2.4835 GHz. State the wireless
transmission medium used by Bluetooth.
A Infrared
B Microwave
C Radio wave
D Ultraviolet (UV) Rays
3765/1
SULIT
SULIT
10
3765/1
F4 August 2015
Figure 8
Based on Figure 8,
(i) name the type of operating system it belongs to.
(ii) state a main function of this operating system.
25. Figure 9 shows a client/server network architecture
Figure 9
Based on Figure 9,
(i) give one example of client/server software used to transfer files among the
computers.
(ii) state one benefit of using client/server network.
3765/1
SULIT
SULIT
11
3765/1
F4 August 2015
Section B
[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Joshua uses a computer with a monitor.
(a) State one possible effect on health from the use of monitor for long hours.
[1 mark]
(b) List three things that Joshua could do to the monitor to minimize the risks to the
health and safety.
[3 marks]
27. Westland International School is paying online for an online application called
School Management System (SMS).
(a) State two payment methods that the school could use when online.
[2 marks]
(b) Give two advantages of using online SMS.
[2 marks]
28. Steve has bought a computer installed with open source operating system.
(a)
(b)
3765/1
SULIT
SULIT
12
3765/1
F4 August 2015
29. National Bank has implemented ring topology of computer network as shown in
Figure 10.
Figure 10
Based on Figure 10,
(a) state two disadvantages of using ring topology.
[2 marks]
(b) state two physical transmission mediums that can be used to connect the
computers in the network.
[2 marks]
30. Unshielded Twisted Pair (UTP) cable can be configured to become crossover cable
where it can be used for PC to PC connection.
(a) Draw the wiring schematic for crossover cable and label its colour coding for
T568A and T568B respectively.
[3 marks]
(b) Write the wire numberings that are used for data transmission based on the
drawing in Question 30(a).
[1 marks]
3765/1
SULIT
SULIT
13
3765/1
F4 August 2015
Section C
[14 marks]
This section consists of two questions. You are required to answer all questions.
31. Figure 11 shows a suspicious email forwarded by Suncorp Bank.
Figure 11
3765/1
SULIT
SULIT
14
3765/1
F4 August 2015
Based on the statement above, design and sketch the network connection to
the Internet using modem, router and switch.
[4 marks]
(b)
Name the network topology used in Question 32(a). Explain your choice for
the network topology stated.
[3 marks]
3765/1
SULIT