Sunteți pe pagina 1din 12

SULIT

3
3765/1

F4 August 2015

Section A
[36 marks]
Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each
answer carries one mark.
1. State whether the following statement is True or False.
Using materials from websites as a resource for assignment without giving credit to
the original author is considered unethical.
2. Table 1 shows the threats to computer security.
K

Worm

Hacking

Nature disaster

Theft
Table 1

Based on Table 1, write K, L, M or N to match the following statement:


(i)

A program that can pass on the malicious code to other programs by modifying
them.

(ii)

Use computer to steal goods and information.

3. Alex has downloaded copyrighted songs and movies from the Internet. Then, he
burned all these downloaded material into CDs and sold them.
(i)

Name the computer crime that Alex has committed.

(ii)

State a cyber law that governs this kind of criminal act.

4. Karen has stored some confidential data in her mobile phone. Most of the time, she
turn on her mobile phones wifi.
(i)

State one threat to Karens data.

(ii)

State one security measure to overcome the threat mentioned in Question 4(i).

5. ICT has brought positive impacts to society. An example of ICT usage is email
application. State one benefit of using email.
6. How to safeguard children when they are surf online?
I

Install filtering software

II Configure web browser setting


III Install anti-virus software

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

4
3765/1

F4 August 2015

IV Install anti-spyware software


A I & II
B I, II & III
C I, II & IV
D I, II, III & IV
7. Stella wants to send confidential information through email to her friend. She used a
security method shown in Figure 1.

Figure 1
Based on Figure 1, name the security method used.
8. Adam owns an ATM card as shown in Figure 2.

Figure 2

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

5
3765/1

F4 August 2015

Based on Figure 2, name the verification method used when inserting ATM card into
ATM machine to withdraw money.
I

Processed object

II Callback system
III User identification
IV Biometric detection
A I & II
B I & III
C II & III
D III & IV
9. Machine cycle involves two components of a processor.
Name two components involved based on the following statement:
(i)

Perform mathematical calculations and logical operations:

(ii)

Direct operations of a processor:

10. Shameela uses email application as shown in Figure 3

Figure 3
Based on Figure 3, give one security feature that is used by Yahoo Mail to prevent
unauthorized access to her email account.

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

6
3765/1

F4 August 2015

11. Table 2 shows the binary digit for alphabet L, O and V.


Alphabet
L
O
V

Binary
01001100
01001111
01010110
Table 2

Based on Table 2, write the binary digit for the word VLO.
12. Figure 4(a) and Figure 4(b) shows the wireless network interface card (NIC) and
motherboard respectively.

Figure 4(a)
Wireless NIC

Figure 4(b)
Motherboard

Label and name the location accurately where wireless NIC should be placed on
Figure 4(b).

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

7
3765/1

F4 August 2015

13. Study Figure 5 and answer the following questions.

Mouse

Keyboard

Computer

Monitor

Hard disk

Figure 5
(i)

Name an input device for A where we can scan photos/documents.

(ii)

Name an output device for B where we can print documents.

14. Choose the following words to complete the sentences.


Hard disk

(i)

RAM

ROM

.. is a memory that keeps its contents when the computer is


switch off.

(ii)

.. is a memory that loses its contents when the computer is


switch off.

15. Swan Travel Agency has deployed computer network in its business. State the type of
network communication technology used based on the following purpose:
(i)

Deal with clients and suppliers for payment and traveling information.

(ii)

Promote business worldwide through companys website.

16. Which unit is the most suitable used for hard disk capacity?
A MHz
B GHz
C kB
D GB

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

8
3765/1

F4 August 2015

17. 512 Gigabytes data is equivalent to


A 512 x 210 Bytes
B 512 x 220 Bytes
C 512 x 230 Bytes
D 512 x 240 Bytes
18. David has added removable storage to a computer using cable connector as shown in
Figure 6.

Figure 6
Based on Figure 6, name the cable connector used.
19. Table 3 shows four computers with their respective specifications.
Computer

Network connectivity

Processor

Ethernet

700 MHz

Ethernet/ WiFi

1.2 GHz

None

260 MHz

WiFi/ Bluetooth

1.6 GHz

Table 3
Based on Table 3, write A, B, C or D to answer the following questions:
(i) Which one of these computers can only use wired network connection?
(ii) Which one of these computers has the fastest processor?
20. Which device is used to convert digital signal to analog signal and vice versa in order
to transmit data along a phone line?
A Hub
B Router
C Switch
D Modem

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

9
3765/1

F4 August 2015

21. Figure 7 shows a mobile phone tethering its internet connection to 5 other devices.

Figure 7
Based on Figure 7, name the technology specification used by the mobile phone to
provide tethering Internet connection.
A 3G
B 4G LTE
C GSM
D Bluetooth
22. Taylor Co. Ltd. has deployed a dedicated server to store applications that could be
used by its employee within a building.
(i)

State the network architecture used.

(ii)

State the type of network used.

23. Bluetooth operates at frequencies between 2.4 GHz to 2.4835 GHz. State the wireless
transmission medium used by Bluetooth.
A Infrared
B Microwave
C Radio wave
D Ultraviolet (UV) Rays

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

10
3765/1

F4 August 2015

24. Figure 8 shows the logo of Windows NT.

Figure 8
Based on Figure 8,
(i) name the type of operating system it belongs to.
(ii) state a main function of this operating system.
25. Figure 9 shows a client/server network architecture

Figure 9
Based on Figure 9,
(i) give one example of client/server software used to transfer files among the
computers.
(ii) state one benefit of using client/server network.

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

11
3765/1

F4 August 2015

Section B
[20 marks]
This section consists of five questions. You are required to answer all questions.
26. Joshua uses a computer with a monitor.
(a) State one possible effect on health from the use of monitor for long hours.
[1 mark]
(b) List three things that Joshua could do to the monitor to minimize the risks to the
health and safety.
[3 marks]
27. Westland International School is paying online for an online application called
School Management System (SMS).
(a) State two payment methods that the school could use when online.
[2 marks]
(b) Give two advantages of using online SMS.
[2 marks]
28. Steve has bought a computer installed with open source operating system.
(a)

Describe the meaning of open source.


[3 marks]

(b)

State one example of open source operating system.


[1 mark]

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

12
3765/1

F4 August 2015

29. National Bank has implemented ring topology of computer network as shown in
Figure 10.

Figure 10
Based on Figure 10,
(a) state two disadvantages of using ring topology.
[2 marks]
(b) state two physical transmission mediums that can be used to connect the
computers in the network.
[2 marks]
30. Unshielded Twisted Pair (UTP) cable can be configured to become crossover cable
where it can be used for PC to PC connection.
(a) Draw the wiring schematic for crossover cable and label its colour coding for
T568A and T568B respectively.
[3 marks]
(b) Write the wire numberings that are used for data transmission based on the
drawing in Question 30(a).
[1 marks]

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

13
3765/1

F4 August 2015

Section C
[14 marks]
This section consists of two questions. You are required to answer all questions.
31. Figure 11 shows a suspicious email forwarded by Suncorp Bank.

Figure 11

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

SULIT

14
3765/1

F4 August 2015

Based on Figure 11,


(a) give a specific name for this kind of computer threat.
[1 mark]
(b) explain how it can become a security threat to the email receiver.
[2 marks]
(c) suggest two security measures to tackle the problem mentioned in Question 31(a).
Justify your answer.
[4 marks]
32. John has bought four computers and would like to set up a local area network
(LAN) at his house. The LAN needs to be connected to the Internet.
(a)

Based on the statement above, design and sketch the network connection to
the Internet using modem, router and switch.
[4 marks]

(b)

Name the network topology used in Question 32(a). Explain your choice for
the network topology stated.
[3 marks]

END OF QUESTION PAPER


Prepared by Mr. Hu Kwong Liik
Counter-checked by Mr. Voon Suk Foo

3765/1

August 2015 Hak Cipta SMK Tung Hua

SULIT

S-ar putea să vă placă și