ANSWER SCHEME
MID YEAR ICT FORM 4
SECTION A
NAME |
|
||||||||||||||
IC NO |
|
Form |
|
||||||||||||
Question No |
Candidate’s Answer |
Skor |
|||||||||||||
1 |
|
B |
|
1 |
|||||||||||
2 |
|
B |
|
2 |
|||||||||||
3 |
|
True |
|
3 |
|||||||||||
4 |
i) |
Hand Geometry Scanning |
|
4 |
|||||||||||
|
ii) |
Facial Recognition |
|
5 |
|||||||||||
5 |
|
D |
|
6 |
|||||||||||
6 |
|
B |
|
7 |
|||||||||||
7 |
|
D |
|
8 |
|||||||||||
8 |
i) |
B |
|
9 |
|||||||||||
|
ii) |
D |
|
10 |
|||||||||||
|
iii) |
C |
|
11 |
|||||||||||
9 |
|
True |
|
12 |
|||||||||||
10 |
|
D |
|
13 |
|||||||||||
11 |
i) |
False |
|
14 |
|||||||||||
|
ii) |
True |
|
15 |
|||||||||||
12 |
i) |
220 or 1048576 (choose either one only) |
|
16 |
|||||||||||
|
ii) |
Bit |
|
17 |
|||||||||||
13 |
i) |
A |
|
18 |
|||||||||||
|
ii) |
B |
|
19 |
|||||||||||
|
iii) |
D |
|
20 |
|||||||||||
14 |
|
C |
|
21 |
|||||||||||
15 |
|
B |
|
22 |
|||||||||||
16 |
i) |
D |
|
23 |
|||||||||||
|
ii) |
C |
|
24 |
|||||||||||
|
iii) |
A |
|
25 |
|||||||||||
17 |
|
C |
|
26 |
|||||||||||
18 |
|
False |
|
27 |
|||||||||||
19 |
|
Blue-ray disc |
|
28 |
|||||||||||
20 |
|
False |
|
29 |
|||||||||||
21 |
|
C |
|
30 |
|||||||||||
22 |
|
Managing data and programs |
|
31 |
|||||||||||
23 |
i) |
K |
|
32 |
|||||||||||
|
ii) |
L |
|
33 |
|||||||||||
|
iii) |
N |
|
34 |
|||||||||||
24 |
|
A |
|
35 |
|||||||||||
25 |
|
B |
|
36 |
|||||||||||
TOTAL MARKS
|
|
||||||||||||||
QUES NO |
QUESTIONS |
ANSWER |
SCORES |
||||||||||||
26 |
a. Based on statement above, list TWO controversial contents from the impact of ICT on society.
|
Pornography |
1 m 1 m |
||||||||||||
Slander |
|||||||||||||||
b. State TWO impacts of one controversial contents in (a) to Malaysian society.
|
Pornography |
|
|||||||||||||
Can lead criminal acts |
1 m
1 m
1 m
1 m |
||||||||||||||
Can lead sexual addiction/Can lead sexual addiction/perversion |
|||||||||||||||
Can develop low moral value towards other man, women, children |
|||||||||||||||
Can erode good religious, cultural and social beliefs and behaviour |
|||||||||||||||
OR |
|||||||||||||||
Slander |
|||||||||||||||
Can develop into society that disregards honesty and truth. |
|||||||||||||||
Can develop bad habit of spreading untruths and rumours |
|||||||||||||||
Can lead to unnecessary argument |
|||||||||||||||
Can cause people to have negative attitudes towards another person
(choose either TWO impacts from Pornography OR TWO impact from Slander. One answer carry ONE mark) |
|||||||||||||||
27 |
a. Name and explain the type of computer crime that Shen has committed.
|
Copyright Infringement. |
1 m |
||||||||||||
Involves illegal copy or reproduction of copyrights materials by the black market group |
1 m |
||||||||||||||
b. What was happened to Shen’s computer? How can Shen prevent his computer from the problem?
|
Computer virus. |
1 m |
|||||||||||||
Install anti-virus software/ scan files for viruses before downloading. |
1 m
|
||||||||||||||
28 |
a. Describe why does Mohan encrypt the report?
|
To secure the information |
1 m |
||||||||||||
To make sure only the authorized person can read the information |
1 m |
||||||||||||||
|
|
||||||||||||||
b. What is the term given to the encrypted text in the report?
|
Encryption key and decryption key |
1 m |
|||||||||||||
Cipher text |
1 m |
||||||||||||||
|
|
||||||||||||||
29 |
a. What is R? Explain the function of R?
|
Output. |
1 m |
||||||||||||
Output is data that has been processed into a useful form called information |
1 m |
||||||||||||||
|
|
||||||||||||||
b. R have four types. State TWO types of R.
|
Texts, graphics, audio, video |
2 m |
|||||||||||||
(choose any two answer) |
|
||||||||||||||
|
|
||||||||||||||
30 |
a. Name types of user interface for X and Y.
|
X- Command line |
1 m |
||||||||||||
Y- Graphical User Interface |
1 m |
||||||||||||||
b. State TWO differences between X and Y.
|
(choose two differences ONLY and compare the answer in same aspect ) |
1 m
1 m
1 m
|
|||||||||||||
31 |
a. Proposed ONE of the latest technology that can be use by Cikgu Rose to conduct her lesson although she is attending the course.
|
Video conferencing or Voice Over Internet Protocol (VOIP) or any related answer |
1 m |
||||||||||||
|
|
||||||||||||||
ability to meet with people in remote locations without incurring travel expenses or other expenses associated with face to face communication |
1 m |
||||||||||||||
easily accessed and contacted using video conferencing |
1 m |
||||||||||||||
can stimulate better brainstorming, knowledge sharing and information gathering
( or any related answers) |
1 m |
||||||||||||||
b. Identify TWO input devices and ONE output device that you justify in (a).
|
Input devices : Web cam, microphone |
2 m |
|||||||||||||
Output devices : Speaker, monitor (choose either one for output devices) |
1 m |
||||||||||||||
32 |
a. Name X, Y, and Z
|
X: Mobile users |
1 m |
||||||||||||
Y: SOHO users |
1 m |
||||||||||||||
Z: Power users |
1 m |
||||||||||||||
|
|
||||||||||||||
b. Explain how users in Y works.
|
|
||||||||||||||
i) |
use desktop or notebook computers as well as telephone, hand phones and PDAs in completing their tasks and communicating
|
1 m |
|||||||||||||
ii) |
work in a small company or work as an individual at home
|
1 m |
|||||||||||||
iii) |
They advertise their products and services through websites |
1 m |
|||||||||||||
iv) |
SOHO also have their own basic business software such as word processing and spreadsheet software to assist them in documents preparation and their financial tasks.
|
1 m
|
|||||||||||||
33 |
a. Explain the TWO function of ASCII and describe the ASCII working process in the computer system.
|
Function of ASCII |
|
||||||||||||
ASCII was established to achieve compatibility between various types of data processing equipment making it possible for the components to communicate with each other successfully. |
1 m |
||||||||||||||
ASCII enables manufactures to produce components that are assured to operate correctly in a computer. |
1 m |
||||||||||||||
|
|
||||||||||||||
ASCII working process: |
|
||||||||||||||
Every character is converted to its corresponding binary form. The computer processes the letter as a byte, which actually a series of on and off of electrical states. When the computer is finished processing the byte, the software installed in the system convert the byte back which is then displayed in the screen. |
2 m |
||||||||||||||
b. Explain the relationship of data representation for bit, byte and character.
|
A bit is the smallest unit of data and represented by the number 1 and 0.
Byte is a unit of information built from bits. One byte equals to 8 bits.
One byte represents one character such as A,7,9 and + |
1 m
1 m
1 m |
(το Answer key Ετοιμάστηκε από Τους Καθηγητές του Φροντιστηρίου
(THE ANSWERS ARE AT THE END OF THE DOCUMENT)
04%20Answer%20Key
Tags: answer scheme, related answer, answer, section, scheme