set3 ict-question

3
SET3 ICT 2007 SECTION A - ANSWER ALL THE QUESTIONS.(36 marks) Instruction : Circle the correct answer ( No 1 – 12) 1. ______________is any data or instruction you enter into the memory of a computer. A. Input B. Output C. Process D. Storage 2. The spreadsheet feature that blocks users from modifying or erasing information in a worksheet is called A lock. B shield. C blocker. D protection. 3. When you press a key on a board, the electronic signal is converted into a binary form that the computer can process and stored in? A. Memory B. Character code C. Computer code D. Morse 4. Camcorders and other video equipments use a to transmit data onto a computer. A. USB Port B. Serial Port C. Parallel Port D. FireWire Port 5. A _______________is designed to connect the system unit to a musical instrument, such as an electronic keyboard. A. MIDI port B. IrDA port C. SCSI port D. FireWire Port 6. For wireless devices to transmit signals to a computer, both the computer and the device must have a _________________ A. MIDI port B. IrDA port C. SCSI port D. FireWire Port 7. _________ can transfer information between their mobile devices to another computer. A. SOHO users B. Power users C. Mobile users D. Large business users 8. What is the function of Macro? A Returning a value from the same table. B Solving tasks that contain lengthy lists. C Making use of shortcut keys. D Automating complex tasks and reducing the number of steps required to complete tasks that are performed frequently. 9. What are the codes used by computers to send and receive information? A. Binary code B. Baudot code C. Input and output D. Character code 10. Selvi is having a video conference with her colleagues in India. The most suitable input devices are ………….. I. monitor II. Speaker III. webcam IV. microphone A. I & II B. II & IV C. II, III & IV D. All the above 11.An audio output device can produce …… I. music II. image III.speech IV. sounds A. I and II B. II and III C. III and IV D. I, III and IV 12.The Central Processing Unit (CPU) controls the operation of the computer. It …. A. connects the cable to the ports B. carries out the basic hardware function C. interprets and carries out the basic instructions that operate a computer D. is the socket, where the circuit boards or the adapter cards can be inserted into the motherboard Fill in the blank with the correct answer. (No.13 – 17) 13.Computer fraud is defined as the use of computer with _______________ to get advantage or causing loss to other people mainly on monetary basis. 14_________ can transfer information between their mobile devices to another computer. 15. A computer system requires four main aspects of data handling to function properly which are input devices, processor, ___________, and storage devices. 16. The CPU is an example of a___________. It has the same importance as the brain to human beings. 17. A _____________is defined as combination of components designed to process data and store files. Instruction: Match the correct answer. (No.18 – 21) 1

Upload: azmiah-mahmud

Post on 17-May-2015

90 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Set3 ict-question

SET3 ICT 2007

SECTION A - ANSWER ALL THE QUESTIONS.(36 marks)

Instruction : Circle the correct answer ( No 1 – 12)

1. ______________is any data or instruction you enter into the memory of a computer. A. Input B. Output C. Process D. Storage

2. The spreadsheet feature that blocks users from modifying or erasing information in a worksheet is called A lock. B shield. C blocker. D protection.

3. When you press a key on a board, the electronic signal is converted into a binary form that the computer can process and stored in? A. Memory B. Character code C. Computer code D. Morse

4. Camcorders and other video equipments use a to transmit data onto a computer. A. USB Port B. Serial Port C. Parallel Port D. FireWire Port

5. A _______________is designed to connect the system unit to a musical instrument, such as an electronic keyboard. A. MIDI port B. IrDA port C. SCSI port D. FireWire Port

6. For wireless devices to transmit signals to a computer, both the computer and the device must have a _________________A. MIDI port B. IrDA port C. SCSI port D. FireWire Port

7. _________ can transfer information between their mobile devices to another computer.A. SOHO users B. Power users C. Mobile users D. Large business users

8. What is the function of Macro?A Returning a value from the same table. B Solving tasks that contain lengthy lists. C Making use of shortcut keys. D Automating complex tasks and reducing the number of steps required to complete tasks that are performed frequently.

9. What are the codes used by computers to send and receive information? A. Binary code B. Baudot code C. Input and output D. Character code

10. Selvi is having a video conference with her colleagues in India. The most suitable input devices are …………..I. monitor II. Speaker III. webcam IV. microphone A. I & II B. II & IV C. II, III & IV D. All the above

11.An audio output device can produce ……I. music II. image III.speech IV. sounds A. I and II B. II and III C. III and IV D. I, III and IV

12.The Central Processing Unit (CPU) controls the operation of the computer. It …. A. connects the cable to the ports B. carries out the basic hardware function C. interprets and carries out the basic instructions that operate a computer D. is the socket, where the circuit boards or the adapter cards can be inserted into the motherboard

Fill in the blank with the correct answer. (No.13 – 17)13.Computer fraud is defined as the use of computer with _______________ to get advantage or causing loss to other people mainly on monetary basis.

14_________ can transfer information between their mobile devices to another computer.

15. A computer system requires four main aspects of data handling to function properly which are input devices, processor, ___________, and storage devices.

16. The CPU is an example of a___________. It has the same importance as the brain to human beings.

17. A _____________is defined as combination of components designed to process data and store files.

Instruction: Match the correct answer. (No.18 – 21)

Instruction: Choose either ‘True’ or ‘False’.

STATEMENT TRUE FALSE

22. An extranet is a private network that

uses Internet technology and the

public telecommunications system.

23. With e-banking, most of the

transactions can be done at home or

from the office only during banking

hours.

24. LAN is an acronym for Large Area

Network.

1

18.

19.

20.

21.

FetchPerforms the requested instruction, such as adding two numbers or deciding which one of them is larger.

ExecuteStores the results in an internal register (a temporary storage location or in memory).

Store Determines what the program is telling the computer to do.

DecodeRetrieves the next program instruction from the computer’s memory.

A.

B.

C.

D.

Page 2: Set3 ict-question

25. A server is needed in a peer-to-peer

network.

26. For communications across the

Internet, we need to have

protocols to demonstrate how data

should be packaged and sent.

27. ROM and Hard disk are examples of

secondary storage.

28. RAM is non-volatile.

29. Microsoft Windows is an example of

application software.

30. Open source software usually comes

without warranty and support should

the software fail or malfunction.

31. Computer threats can come in many

ways either from human or natural

disasters such as fire, flood,

earthquakes, storms and tornados.

32. Proxy gateway is one of the types of

Data Backup program.

33. Virus signature and inoculate a

program file are the techniques that

are used to identify a virus.

34. A computer system is only referring to

the monitor, keyboard, mouse and

central processing unit (CPU).

35. Microprocessor speeds are

determined by their clock speed.

36. Paedophiles are people who exploit

children for sexual pleasure.

SECTION B (20 marks)

Question 1 (4 marks)

Below is a list of step which shows how a BIOS works.

a) Turn ________________ the PCb) ___________ read instructions from BIOS.c) Instructions in BIOS tell the computer how to access

the _____________________d) Instructions in BIOS tell the computer for to find the

operating system.e) Load the operating system to ________________

Question 2 ( 4 marks)Instruction: Label the diagram correctly

Question 3 (Student’s Copy)

A _________________ gives authors and artists exclusive rights to duplicate, publish or sell their materials.

______________ are capable of disabling filters and gateway software of computer system.

A _____________ includes any activities taken to disrupt the equipment of computer systems, change processing control, or corrupt stored data.

Hidden writing, the practice of using password to conceal text.

2