0% found this document useful (0 votes)
31 views

Past Year Questions

This document contains past year questions from 2013 to 2021 related to information and communication technology. It includes 9 questions from Section A and 2 questions from Section B, covering topics such as communication networks, computer hardware, software, applications, security issues, and the impact of technology convergence. The questions test a range of skills from explaining concepts to drawing diagrams to comparing technologies.

Uploaded by

Ong HZ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Past Year Questions

This document contains past year questions from 2013 to 2021 related to information and communication technology. It includes 9 questions from Section A and 2 questions from Section B, covering topics such as communication networks, computer hardware, software, applications, security issues, and the impact of technology convergence. The questions test a range of skills from explaining concepts to drawing diagrams to comparing technologies.

Uploaded by

Ong HZ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Past Year Question

Chapter 1
Section A

1. State two examples of each of the following communications media and arrange all
the given examples in ascending order of their transmission distances. (2013)
(i) Wired communcation media
(ii) Wireless communication media
[6 marks]

2. You are required to develop a school Web page. Describe how each of the following
Web development tools could be used to create the Web page. (2014)
(i) Mark-up language
[2 marks]
(ii) Programming language
[2 marks]
(iii) Scripting language
[2 marks]

3. A small medium enterprise company appoints a computer vendor to install a network


based on star topology. The devices to be included in the network are twoprinters, five
computers and a server. (2015)
(a) Draw the architecture of the network.
[3 marks]
(b) Explain why the company chooses the star topology to be used in its office.
[4 marks]

4. (a) A company has used an intranet in all its offices and intends to establish extranet to
Pos Malaysia. (2016)
(i) State the difference between intranet and extranet.

(ii) State two benefits of using extranet for customers of Pos Malaysia.

(b) A local area network (LAN) which was set up at a school computer laboratory is
shown in the diagram below.

(i) What does “10” in the IP address represent?


[1 mark]
(ii) Name devide X.

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

[1 mark]
(iii) Name device Y.
[1 mark]
(iv) Identify device Z which connects mobile users to the Internet.
[1 mark]

5. A computer network used by WXY Group is shown in the diagram below. (2017)

(a) Based on the diagram above, state thecategory of computer network between:
(i) The Accounting Department and the Human Resource Department at WXY
Bhd.,
[1 mark]
(ii) WXY Bhd. and WXY Pte. Ltd.
[1 mark]
(b) Differentiate the network characteristics between (a)(i) and (a)(ii).
[4 marks]

6. Two types ofcomputer storages, X and Y, are shown in the diagrams below. (2018)

(a) Name Xand Y. State the types ofstorage for X and Y.


[4 marks]
(b) Compare two characteristics between Xand Y.
[4 marks]

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

7. An accounting student decides to buy a computer for his personal use. In order to save
cost, he needs to buy the computer components and assembles them himself. After he
successfully assembles the computer, the student needs to proceed with the following
steps: (2019)
Step 1- Formatting the hard disk
Step 2- Installing software Z

Upon completing the installation of software Z, the student installs three other
softwares as follows:
• Software A- Word processor
• Software B- Electronic spreadsheet
• Software C- Presentation

(a) Name the type ofsoftware Zand states three main functions ofthe software.
[4 marks]
(b) State two purposes of installing software B and software C if the student is to
complete his accounting assignment.
[4 marks]

8. An entrepreneur that intends to participate in international business communities ni


telecommunications is required to have basic Information and Communications
Technology (ICT) infrastructure. (2020 & 2019/U)
(a) Explain the ICT infrastructure and its components that are needed by the
entrepreneur.
[5 marks]
(b) Name three common applications that enable communications between the
entrepreneur and the international business communities.
[3 marks]

9. (2021 & 2020/U)


(a) Name two basic components of system software.
[2 marks]
(b) Describe each of the components named in (a)
[2 marks]

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

Section B

1. Three communication network technologies with their corresponding receivers are


shown in the diagram below. (2013)

(a) Redraw and explain the above diagram to show the concept of convergence of
technology.
[6 marks]
(b) Describe the characteristics oftechnological convergence with reference to smart
phone.
[3 marks]
(c) Discuss three positive impacts of convergence of technology towards e-learning
applications.
[6 marks]

2. Asmart phone has ICT convergence features. (2015)

(a) Define the concept of ICT convergence.


[2 marks]
(b) State three convergence functions which are required in the smart phone.
[3 marks]
(c) State one technology that supports each of your answer in (b).
[3 marks]
(d) State the example of devices on the smart phone which have similar function with
the computer system in terms of input, process, output, and storage.
[4 marks]
(e) Explain the process involved in capturing, editing, and sharing a photo using
smart phone in terms of input, process, and output.
[3 marks]

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

Chapter 2
Section A

1. Personal information stored in MyKad can be read using a biometricdevice knownas


fingerprint reader. (2013)
(a) Explain how the fingerprint reader works in the above example.
[3 marks]
(b) Discuss two advantages and two disadvantages of using biometric devices as an
alternative method to that of username andpassword.
[8 marks]

2. Describe three areas of multimedia application usage, and state one example of each
of the application. (2013)
[6 marks]

3. The Internet banking and mobile banking usage percentages between the year 2003 to
2009 are shown in the graph below. (2014)

(a) State two examples for each of the data and information given in the above graph.
[4 marks]
(b) Describe the knowledge that can be obtained from the above graph.
[4 marks]

4. (a) What is meant by a computer virus? (2014)


[2 marks]
(c) State three damages that can be caused by the computer virus.
[3 marks]

5. An example of cyberstalking and cyberbullying messages in the Internet chat room


is shown below. (2015)

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

(a) State three actions that O should take to avoid being the victim of cyberstalking
and cyberbullying.
[3 marks]
(b) Explain three technical methods to control Internet threats.
[6 marks]

6. Explain three advantages of online learning to students in their learning process.


(2016)
[6 marks]

7. A student uses a social network application to upload other people’s personal


information. (2016)
(a) Describe four possibilities of computer ethics infringement with examples made
by the student.
[8 marks]
(b) State the Malaysian Cyber Act which could be used to deal with the computer
ethics infringement.
[1 mark]

8. MyKad and electronic wallets are two examples of smart cards. (2017)
(a) State three applications that can be embedded in MyKad.
[3 marks]
(b) List three advantages of using MyKad as a smart card.
[3 marks]
(c) Describe the benefits of electronic wallets in daily life.
[2 marks]

9. The Malaysian National Strategic Framework of Bridging Digital Divide outlines


three key issues to reduce the gaps of digital divide namely target, source and the
value of using ICT. Two digital divide initiatives that have been implemented are as
follows: (2018 & 2017/U)
Initiative I:

Jejak IT: An online IT learning centre conducted by the State Library of Selangor. The
centre offers TI related e-books and learning packages. Users can subscribe and make
payment online for the services.

Initiative 2:

E-Melaka: The state government utilised cyber cafes as training centres to educate the
rural citizen about ICT literacy. Approximately, 25,000 rural citizens were trained at the
cyber cafes.

Give the analysis of the initiatives above, then copy the table below and complete it.

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

[4 marks]

10. The privacy of users' personal information is very important to be protected from
data intrusion in cyberspace. (2019 & 2018/U)
(a) Describe two ways users can safeguard the privacy of their personal information
from being trespassed.
[2 marks]
(b) Explain three effects to the users if data intrusion occurs.
[6 marks]

11. Aconceptual illustrations of malicious codes attack types is shown in the diagram
below. (2020 & 2019/U)

X Y
(a) Explain the types of malicious codes for X and Y.
[4 marks]
(b) Explain one effect of malicious code in Ytowards the computer.
[2 marks]

12. The example of an email received by a user is shown in the diagram below.
(2021 & 2020/U)

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

(a) State the type of the email received by the user.


[1 mark]
(b) Suggested three actions that should be done by the user when he received the
email.
[3 marks]
(c) State two impacts of the abovve email to the user.
[2 marks]

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

Section B

1.
(a) Ethics involving the use of computers are referred to as computer ethics. (2014)

(i) Define computer ethics.


[2 marks]
(ii) State four reasons why the awareness of computer ethics is important to
users. Explain your answer.
[8 marks]

(b) Acollege student has logged in a library information system using a librarian's ID
and password. He then altered the return date of the book that he had borrowed.

(i) State three offences committed by the student.


[3 marks]
(ii) State the Malaysian Cyberlaws Act where the offences had been committed.
Explain the purpose of the act.
[2 marks]

2. An e-commerce application is one of the effective methods in the selling and buying
of products. (2016)
(a) What is the meant by e-commerce?
[2 marks]
(b) State three types of e-commerce models that could be offered to customers in the
selling and buying of products.
[3 marks]
(c) Sketch a diagram to describe the hardware and communication devices required
to set up the e-commerce.
[4 marks]
(d) Discuss the advantages of having e-commerce for each of the following:
(i) Organisation
(ii) Consumer
[6 marks]

3. (2017)
(a) Encryption is a technique to protect information which is transmitted via the Internet.
Explain two implications if the information is transmitted without encryption.
[4 marks]
(b) Malicious usage and malicious software could cause threats to computer
systems.
(i) Differentiate between malicious usage and malicious software.
[4 marks]
(ii) Give three examples of malicious software.
[3 marks]
(iii) State four measures to protect computer systems from malicious software.
[4 marks]

Information and Communication Technology


Arranged by: Ong HZ
Past Year Question

4. Young graduatesnowadays prefer to venture into online business using e-commerce


application that contributes towards socio-economic development. (2018 & 2017/U)
(a) Describe the e-commerce process from advertising to delivery of product by
using a product as an example.
[10 marks]
(b) State three information technology related jobs created based on your answer in
(a).
[3 marks]
(c) Explain the responsibility for one of the jobs mentioned in (b).
[2 marks]

5. A smartphone has Internet capability which increases productivity and makes our life
easier. (2020 & 2019/U)
(d) State two input and two output components of a smartphone.
[4 marks]
(e) Describe three pre-installed applications or Internet capability of a smartphone.
[6 marks]
(f) Asmartphone could be used as an enabler in the agriculture industry.
(i) Describe one application on how to market local fruits in terms of data to be
input, processed, output, and communicated using a smartphone.
[4 marks]
(ii) State one impact ofthe described application.
[1 mark]

6. (2021 & 2020/U)

(a) The computers at a school library are connected with a bus topology. The school is
considering to provide a new multimedia computer lab using a star topology. As a
networking consultant, you are required to prepare a network architecture diagram for
the connection between the library and the multimedia lab networks by using the
following information:
Location Number of nodes Additional peripheral
Library 5 units 1 unit of printer
1 unit of printer
Multimedia Lab 10 units 1 unit of scanner 1 unit of database 1 unit of router
1 unit of switch
Draw and label a new architecture that connects both network.
[6 marks]
(b) A multimedia company has been awarded a project to develop a corporate video.
(i) Name three factors that could affect the video quality of the corporate video.
[2 marks]
(ii) Describe a protocol that may be used to upload the 7 GB video to a client's office
located in Toronto, Canada.
[2 marks]
(iii) Describe two ethical issues that need to be considered in developing the corporate
video.
[4 marks]

Information and Communication Technology


Arranged by: Ong HZ

You might also like