ANSWER SCHEME MID YEAR ICT FORM 4 SECTION A

ANSWER THE FOLLOWING QUESTIONS IN SUPPLIED “ANSWER SHEETS”
DEATH DYING & BEREAVEMENT ANSWERS (16) 1
ENGAGING IN INDUSTRY PROJECTS QUESTIONNAIRE PLEASE ANSWER

QUESTION & ANSWER (Q&A) MATRIX ON IMPLEMENTATION OF
VIDEO TRAINING PRESSURE ULCER PREVENTION ANSWERS (15)
(C) 2011 LANTERNFISH ESL AT WWWBOGGLESWORLDESLCOM ANSWER KEY WHAT

ANSWER SCHEME

ANSWER SCHEME

MID YEAR ICT FORM 4

SECTION A

NAME


IC NO


Form


Question No

Candidate’s Answer

Skor

1


B


1

2


B


2

3


True


3

4

i)

Hand Geometry Scanning


4


ii)

Facial Recognition


5

5


D


6

6


B


7

7


D


8

8

i)

B


9


ii)

D


10


iii)

C


11

9


True


12

10


D


13

11

i)

False


14


ii)

True


15

12

i)

220 or 1048576 (choose either one only)


16


ii)

Bit


17

13

i)

A


18


ii)

B


19


iii)

D


20

14


C


21

15


B


22

16

i)

D


23


ii)

C


24


iii)

A


25

17


C


26

18


False


27

19


Blue-ray disc


28

20


False


29

21


C


30

22


Managing data and programs


31

23

i)

K


32


ii)

L


33


iii)

N


34

24


A


35

25


B


36

TOTAL MARKS




QUES

NO

QUESTIONS

ANSWER

SCORES

26

a.

Based on statement above, list TWO controversial contents from the impact of ICT on society.


Pornography

1 m

1 m

Slander

b.

State TWO impacts of one controversial contents in (a) to Malaysian society.


Pornography


Can lead criminal acts

1 m


1 m








1 m


1 m

Can lead sexual addiction/Can lead sexual addiction/perversion

Can develop low moral value towards other man, women, children

Can erode good religious, cultural and social beliefs and behaviour

OR

Slander

Can develop into society that disregards honesty and truth.

Can develop bad habit of spreading untruths and rumours

Can lead to unnecessary argument

Can cause people to have negative attitudes towards another person


(choose either TWO impacts from Pornography OR TWO impact from Slander. One answer carry ONE mark)

27

a.

Name and explain the type of computer crime that Shen has committed.


Copyright Infringement.

1 m

Involves illegal copy or reproduction of copyrights materials by the black market group

1 m

b.

What was happened to Shen’s computer? How can Shen prevent his computer from the problem?


Computer virus.

1 m

Install anti-virus software/ scan files for viruses before downloading.

1 m










28

a.

Describe why does Mohan encrypt the report?


To secure the information

1 m

To make sure only the authorized person can read the information

1 m



b.

What is the term given to the encrypted text in the report?


Encryption key and decryption key

1 m

Cipher text

1 m



29

a.

What is R? Explain the function of R?



Output.

1 m

Output is data that has been processed into a useful form called information

1 m



b.

R have four types. State TWO types of R.



Texts, graphics, audio, video

2 m

(choose any two answer)




30

a.

Name types of user interface for X and Y.


X- Command line

1 m

Y- Graphical User Interface

1 m

b.

State TWO differences between X and Y.


X

Y

User have to memories all the syntax to issues command



User have not to memories all the syntax to issue command

Difficult to use


Easy to use.

Not user friendly

User friendly.


(choose two differences ONLY and compare the answer in same aspect )


1 m





1 m


1 m















31

a.

Proposed ONE of the latest technology that can be use by Cikgu Rose to conduct her lesson although she is attending the course.


Video conferencing or Voice Over Internet Protocol (VOIP) or any related answer

1 m



ability to meet with people in remote locations without incurring travel expenses or other expenses associated with face to face communication

1 m

easily accessed and contacted using video conferencing

1 m

can stimulate better brainstorming, knowledge sharing and information gathering


( or any related answers)

1 m

b.

Identify TWO input devices and ONE output device that you justify in (a).


Input devices : Web cam, microphone

2 m

Output devices : Speaker, monitor

(choose either one for output devices)

1 m

32

a.

Name X, Y, and Z


X: Mobile users

1 m

Y: SOHO users

1 m

Z: Power users

1 m



b.

Explain how users in Y works.




i)

use desktop or notebook computers as well as telephone, hand phones and PDAs in completing their tasks and communicating


1 m

ii)

work in a small company or work as an individual at home


1 m

iii)

They advertise their products and services through websites

1 m

iv)

SOHO also have their own basic business software such as word processing and spreadsheet software to assist them in documents preparation and their financial tasks.


1 m








33

a.

Explain the TWO function of ASCII and describe the ASCII working process in the computer system.


Function of ASCII


ASCII was established to achieve compatibility between various types of data processing equipment making it possible for the components to communicate with each other successfully.

1 m

ASCII enables manufactures to produce components that are assured to operate correctly in a computer.

1 m



ASCII working process:


Every character is converted to its corresponding binary form. The computer processes the letter as a byte, which actually a series of on and off of electrical states. When the computer is finished processing the byte, the software installed in the system convert the byte back which is then displayed in the screen.

2 m

b.

Explain the relationship of data representation for bit, byte and character.



A bit is the smallest unit of data and represented by the number 1 and 0.


Byte is a unit of information built from bits. One byte equals to 8 bits.


One byte represents one character such as A,7,9 and +


1 m



1 m



1 m



(το Answer key Ετοιμάστηκε από Τους Καθηγητές του Φροντιστηρίου
(THE ANSWERS ARE AT THE END OF THE DOCUMENT)
04%20Answer%20Key


Tags: answer scheme, related answer, answer, section, scheme