Scheme Answer Midyear2009

7
ANSWER SCHEME MID YEAR ICT FORM 4 SECTION A NAME IC NO Form Question No Candidate’s Answer Skor 1 B 1 2 B 2 3 True 3 4 i) Hand Geometry Scanning 4 ii) Facial Recognition 5 5 D 6 6 B 7 7 D 8 8 i) B 9 ii) D 10 iii ) C 11 9 True 12 10 D 13 11 i) False 14 ii) True 15 12 i) 2 20 or 1048576 (choose either one only) 16 ii) Bit 17 13 i) A 18 ii) B 19 iii ) D 20 14 C 21 15 B 22 16 i) D 23 ii) C 24 iii ) A 25 17 C 26 18 False 27

Transcript of Scheme Answer Midyear2009

Page 1: Scheme Answer Midyear2009

ANSWER SCHEMEMID YEAR ICT FORM 4

SECTION ANAMEIC NO Form

Question No Candidate’s Answer Skor1 B 12 B 23 True 34 i) Hand Geometry Scanning 4

ii) Facial Recognition 55 D 66 B 77 D 88 i) B 9

ii) D 10iii) C 11

9 True 1210 D 1311 i) False 14

ii) True 1512 i) 220 or 1048576 (choose either one only) 16

ii) Bit 1713 i) A 18

ii) B 19iii) D 20

14 C 2115 B 2216 i) D 23

ii) C 24iii) A 25

17 C 2618 False 2719 Blue-ray disc 2820 False 2921 C 3022 Managing data and programs 3123 i) K 32

ii) L 33iii) N 34

24 A 3525 B 36

TOTAL MARKS

Page 2: Scheme Answer Midyear2009

QUESNO

QUESTIONS ANSWER SCORES

26 a.Based on statement above, list TWO controversial contents from the impact of ICT on society.

Pornography 1 m1 mSlander

b.State TWO impacts of one controversial contents in (a) to Malaysian society.

PornographyCan lead criminal acts 1 m

1 m

1 m

1 m

Can lead sexual addiction/Can lead sexual addiction/perversionCan develop low moral value towards other man, women, childrenCan erode good religious, cultural and social beliefs and behaviour

ORSlander Can develop into society that disregards honesty and truth.Can develop bad habit of spreading untruths and rumoursCan lead to unnecessary argumentCan cause people to have negative attitudes towards another person

(choose either TWO impacts from Pornography OR TWO impact from Slander. One answer carry ONE mark)

27 a.Name and explain the type of computer crime that Shen has committed.

Copyright Infringement. 1 mInvolves illegal copy or reproduction of copyrights materials by the black market group

1 m

b.What was happened to Shen’s computer? How can Shen prevent his computer from the problem?

Computer virus. 1 mInstall anti-virus software/ scan files for viruses before downloading.

1 m

Page 3: Scheme Answer Midyear2009

28 a.Describe why does Mohan encrypt the report?

To secure the information 1 mTo make sure only the authorized person can read the information

1 m

b.What is the term given to the encrypted text in the report?

Encryption key and decryption key 1 mCipher text 1 m

29 a.What is R? Explain the function of R?

Output. 1 mOutput is data that has been processed into a useful form called information

1 m

b.R have four types. State TWO types of R.

Texts, graphics, audio, video 2 m (choose any two answer)

30 a.Name types of user interface for X and Y.

X- Command line 1 mY- Graphical User Interface 1 m

b.State TWO differences between X and Y.

X YUser have to memories all the syntax to issues command

User have not to memories all the syntax to issue command

Difficult to use Easy to use.

Not user friendly User friendly.

(choose two differences ONLY and compare the answer in same aspect )

1 m

1 m

1 m

Page 4: Scheme Answer Midyear2009

31 a.Proposed ONE of the latest technology that can be use by Cikgu Rose to conduct her lesson although she is attending the course.

Video conferencing or Voice Over Internet Protocol (VOIP) or any related answer

1 m

ability to meet with people in remote locations without incurring travel expenses or other expenses associated with face to face communication

1 m

easily accessed and contacted using video conferencing

1 m

can stimulate better brainstorming, knowledge sharing and information gathering

( or any related answers)

1 m

b.Identify TWO input devices and ONE output device that you justify in (a).

Input devices : Web cam, microphone 2 mOutput devices : Speaker, monitor(choose either one for output devices)

1 m

32 a.Name X, Y, and Z

X: Mobile users 1 mY: SOHO users 1 mZ: Power users 1 m

b.Explain how users in Y works.

i) use desktop or notebook computers as well as telephone, hand phones and PDAs in completing their tasks and communicating

1 m

ii) work in a small company or work as an individual at home

1 m

iii) They advertise their products and services through websites

1 m

iv) SOHO also have their own basic business software such as word processing and spreadsheet software to assist them in documents preparation and their financial tasks.

1 m

Page 5: Scheme Answer Midyear2009

33 a.Explain the TWO function of ASCII and describe the ASCII working process in the computer system.

Function of ASCIIASCII was established to achieve compatibility between various types of data processing equipment making it possible for the components to communicate with each other successfully.

1 m

ASCII enables manufactures to produce components that are assured to operate correctly in a computer.

1 m

ASCII working process:Every character is converted to its corresponding binary form. The computer processes the letter as a byte, which actually a series of on and off of electrical states. When the computer is finished processing the byte, the software installed in the system convert the byte back which is then displayed in the screen.

2 m

b.Explain the relationship of data representation for bit, byte and character.

A bit is the smallest unit of data and represented by the number 1 and 0.

Byte is a unit of information built from bits. One byte equals to 8 bits.

One byte represents one character such as A,7,9 and +

1 m

1 m

1 m