Sunteți pe pagina 1din 8

2007-CE

CIT MOCK EXAMINATION 2007


PAPER 1A

COMPUTER AND INFORMATION TECHNOLOGY


PAPER 1 (SECTION A)
8.30 am - 10.30 am (2 hours)

1. Read carefully the instructions on the Answer Sheet and insert the information required in the
spaces provided.

2. When told to open this book, you should check that all the questions are there. Look for the
words ‘END OF PAPER’ after the last question.

3. All questions carry equal marks.

4. ANSWER ALL QUESTIONS. You should mark all your answers on the Answer Sheet.

5. You should mark only ONE answer for each question. If you mark more than one answer, you
will receive NO MARKS for that question.

6. No marks will be deducted for wrong answers.

2007-CE-MOCK-CIT-1A-1 –1–
There are 40 questions in this section. Choose the most suitable answer for each question.

1. Which of the following hardware devices can be connected to a computer via a USB port?
(1) keyboard
(2) monitor
(3) printer
A. (1) and (2) only
B. (2) and (3) only
C. (1) and (3) only
D. (1), (2) and (3)

2. While using the merge printing feature of a word processor, the source of data cannot be stored in a
A. word processing file.
B. database file.
C. spreadsheet file.
D. presentation file.

3. ‘Check digit’ may be used to validate


A. a mobile phone number.
B. a bank account number.
C. an IP address.
D. an email address.

4. Robots are commonly used in


(1) deactivating bombs.
(2) car manufacturing.
(3) program compilation.
A. (1) and (2) only
B. (2) and (3) only
C. (1) and (3) only
D. (1), (2) and (3)

5. Real-time processing is required in


A. application of a smart ID card.
B. clearance of cheques in a bank.
C. reservation of books in a web-based bookstore.
D. on-line ticket reservation of a cinema.

6. What is the minimum number of bits to represent the ten digits ‘0’, ‘1’, …, ‘9’?
A. 1
B. 4
C. 5
D. 10

2007-CE-MOCK-CIT-1A-2 –2–
7. Many banks in Hong Kong adopt ‘two-factor authentication’ in Internet banking. In addition to user ID and
password, it uses something a user has (e.g. digital certificate) to verify the user’s identity.
Using user ID and password cannot verify a user’s identity because
A. user ID and password are not enough to form a primary key.
B. there may be another user who has the same user ID and password.
C. the user’s user ID and password may be known by another person.
D. the user may forget his/her user ID and password.

8. You run a company which accept customers’ orders through emails. Wai Yan is one of your customers. His
email address is waiyan1889@pcbroadband.com, which is obtained from an ISP. One day, you received an
email which indicated the sender was ‘waiyan1889@pcbroadband.com’. You could have a chance to check
whether the email was really sent by Wai Yan only when
A. the email was received at a web-based email account.
B. the email was encrypted.
C. a digital signature was added to the email.
D. Wai Yan’s HKID card number was attached at the end of the email.

9. Compared with using a low level programming language, a programmer can use a high level programming
language
A. to produce an object program.
B. to write a program which takes fewer memory spaces.
C. to write a program which handles multimedia more efficiently.
D. to write a source program which is more readable.

10. Which of the following is a violation of copyright?


A. Make a copy of a licensed software package for backup purpose
B. Produce a soft copy of an HKCEE past paper and upload it to the Internet
C. Send an email to your friend with a freeware attached to the email
D. Download the source code of a public-domain software package and modify it

11. The backbone of a school network should be


A. hub-based using UTP cable.
B. switch-based using UTP cable.
C. hub-based using fiber-optic cable.
D. switch-based using fiber-optic cable.

12. Which of the following about IP addresses is true?


A. No two computers in this world will have the same IP address, no matter whether it is an internal or
external address.
B. The global IP address of a computer will never change.
C. The internal IP address of a computer is different from its external IP address.
D. The length of IP address varies from one computer to the other.

13. The service that allows users to control a remote computer is


A. newsgroup.
B. FTP.
C. DNS
D. telnet.

2007-CE-MOCK-CIT-1A-3 –3–
14. A is a small text file that a Web server stores on a user's computer.
A. worm
B. spam
C. cookie
D. payload

15. Given that cell A1 of a spreadsheet file stores 15, find the result of the following formula.
= IF(A1>20,IF(A1>40,1,2),IF(A1<10,3,4))
A. 1
B. 2
C. 3
D. 4

16. Which of the following spreadsheet functions should be used to find the position of each student in a class
according to the scores they achieved in an examination?
A. AVERAGE
B. MAX
C. RANK
D. COUNTIF

17. ‘7200 rpm’ refers to


A. the rotational speed of a hard disk.
B. the data transmission speed of a communication channel.
C. the clock rate of a CPU.
D. the data access speed of ROM.

18. Which of the following is/are utility program(s)?


(1) a disk defragmentation program
(2) a web authoring program
(3) a backup program
A. (1) only
B. (1) and (2) only
C. (1) and (3) only
D. (1), (2) and (3)

19. Which of the following file format is designed to be cross-platform?


(1) PDF
(2) HTML
(3) DOC
A. (1) only
B. (2) only
C. (1) and (2) only
D. (1), (2) and (3)

20. The main reason of representing information using hexadecimal numbers instead of binary numbers in most
computer system is
A. under a given number of digits, hexadecimal system can represent more information.
B. computer hardware store information in hexadecimal format and hence no conversion is needed before
showing the information.
C. the hexadecimal system may contain alphanumeric data while the binary system may not.
D. it is faster to process information in hexadecimal system.

2007-CE-MOCK-CIT-1A-4 –4–
21. A fraudulent online bank
(1) misleads others to its web site by email.
(2) steals others’ logon information to a genuine web site.
(3) has the same URL but different IP address as the genuine web site.
A. (1) only
B. (1) and (2) only
C. (1) and (3) only
D. (1), (2) and (3)

22. A computer system adds an extra odd parity bit to all of its data storing to its main memory. Which of the
following bytes retrieved back from the main memory is invalid?
A. 0100 1011 1
B. 0000 0000 1
C. 1010 1010 0
D. Cannot be determined without the pattern of the original data

23. Which of the following tasks is most likely processed by a desktop publishing software?
A. printing a financial report with statistical charts
B. printing the student academic report card
C. printing a regional newspaper
D. printing 8R photos

24. Which of the following is/are system software?


(1) computer virus
(2) Java compiler
(3) text editor
A. (2) only
B. (1) and (2) only
C. (2) and (3) only
D. (1), (2) and (3)

25. The whole implementation of the Java platform includes the concepts of using
(1) compilers.
(2) interpreters.
(3) assemblers.
A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

26. Repetitive Strain Injuries (RSI) may be caused by


(1) prolonged use of computers.
(2) improper positions of keyboards.
(3) using a CRT monitor instead of an LCD monitor.
A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2007-CE-MOCK-CIT-1A-5 –5–
Read the following program flowchart and answer questions 27 to 29.

27. How many iterative loop(s) is/are formed in the above program flowchart?
A. None
B. 1
C. 3
D. 6

28. At the start of the program, if the current TX record is 1 and current MF record is 2, which of the following
statement will be executed?
A. MF_AMT = MF_AMT + TX_AMT
B. Print Error Message
C. Read Next MF Record
D. Stop

2007-CE-MOCK-CIT-1A-6 –6–
29. If there are 2 TX records with values {3, 5} in sequence and 4 MF records with values {1, 3, 5, 7} in
sequence, how many times will the statement “Write to New MF records” will be executed before program
ends?
A. 1
B. 2
C. 4
D. 6

30. Which of the following statement about IBM deep blue computer is NOT correct?
A. IBM deep blue was the first machine to win a chess game against a reigning world champion under
regular time controls.
B. It is a supercomputer with hundreds special purpose VLSI microprocessor chips.
C. It is a human like robot with AI system.
D. Its chess playing program was written in C and ran under a kind of unix operating system.

31. Which of the following storage media can be overwritten?


A. CD-ROM
B. CD-R
C. CD-RW
D. DVD+R

32. X sends a digitally signed document to Y. The digital signature is generated with
A. X’s private key.
B. X’s public key.
C. Y’s private key.
D. Y’s public key.

33. Which of the following files CANNOT be embedded with a graphic?


A. an HTML file
B. a word processing document
C. a spreadsheet file
D. an executable file

34. An IP address may identify


(1) a computer in a LAN.
(2) a web server on the Internet.
(3) a user on the Internet.
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only

35. Which of the following can be reduce the number of keystrokes in creating text?
(1) short-cut key
(2) OCR
(3) text formatting
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only

2007-CE-MOCK-CIT-1A-7 –7–
36. Which of the following is/are the characteristic(s) of command line interface?
(1) easy to learn
(2) fast for experienced users
(3) not designed for ordinary users
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only

37. Which of the following can be shared in a wireless LAN?


(1) printer
(2) files stored in a PDA
(3) cordless mouse
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only

38. Bidding through an online agent is a ____ activity.


A. B2B
B. B2C
C. C2B
D. C2C

39. Which of the following stores HTML files and delivers them on request?
A. client browser
B. web server
C. Internet
D. World Wide Web

40. Which of the following input devices is associated with transcription errors?
A. keyboard
B. smart card reader
C. bar code reader
D. OCR reader

END OF PAPER

2007-CE-MOCK-CIT-1A-8 –8–

S-ar putea să vă placă și