0% found this document useful (0 votes)
71 views11 pages

Atp Ict Mock 4 1-1a

Uploaded by

enzosou68
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views11 pages

Atp Ict Mock 4 1-1a

Uploaded by

enzosou68
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

2024-MOCK-S1

ICT
PAPER 1 @youtubeatp_ict
(SECT A)
HONG KONG DIPLOMA OF SECONDARY EDUCATION EXAMINATION 2024

INFORMATION AND COMMUNICATION TECHNOLOGY PAPER 1


2024 Mock (Set 1)

8:30 am – 10:30 am (2 hours)


This paper must be answered in English

GENERAL INSTRUCTIONS

1. There are two sections, A and B, in this Paper.

2. Section A consists of multiple-choice questions in this question paper. Section B contains


conventional questions printed separately in the Question-Answer Book.

3. Answers to Section A should be marked on the Multiple-choice Answer Sheet. Answers to Section
B should be written in the spaces provided in the Question-Answer Book. The Answer Sheet for
Section A and the Question-Answer Book for Section B must be handed in separately at the
end of the examination.

INSTRUCTIONS FOR SECTION A (MULTIPLE-CHOICE QUESTIONS)

1. Read carefully the instructions on the Answer Sheet. After the announcement of the start of the
examination, you should first stick a barcode label and insert the information required in the spaces
provided. No extra time will be given for sticking on the barcode label after the ‘Time is up’
announcement.

2. When told to open this book, you should check that all the questions are there. Look for the words
‘END OF SECTION A’ after the last question.

3. All questions carry equal marks.

4. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the
Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You must mark
the answers clearly; otherwise you will lose marks if the answers cannot be captured.

5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.

6. No marks will be deducted for wrong answers.

 Yo uT ub e AT P 保留版權 Not to be taken away before the


YouTubeATP end of the examination session
All Rights Reserved 2024

2024-MOCK-S1-ICT 1A−1 1
There are 40 questions in this paper. Choose the most suitable answers.

1. An enterprise has 234 589 employees. Each employee is given a unique identifier. What is the minimum
number of bytes needed to store this identifier?

A. 2
B. 3
C. 17
D. 18

2. Assume that X = 5 and Y = 1. Which of the following Boolean expressions returns TRUE?

A. ((Y > X) AND (X > 4)) OR (1 > X)


B. ((Y < X) AND (X > 4)) OR (1 > Y)
C. ((Y > X) AND (X < 4)) OR (1 > X)
D. ((Y < X) AND (X < 4)) OR (1 > Y)

3. Which of the following operations of numbers in 8-bit two’s complement representation will result in an
overflow error?

A. 0111 1111 + 0000 0001


B. 1000 0000 - 1000 0000
C. 0100 0000 - 0010 0000
D. 1111 1111 + 1111 1111

4. A computer receives five data sequences, shown below. Each sequence includes a parity bit. Three of the
sequences are found to be corrupted during transmission.

(1) 0101 0110


(2) 1100 0001
(3) 1110 1000
(4) 1111 0000
(5) 1000 0000

Which of the following best describes the situation?

Corrupted data sequences Parity check


A. (1), (2) and (5) Even
B. (1), (2) and (5) Odd
C. (1), (3) and (4) Even
D. (1), (3) and (4) Odd

5. In an image generation platform, users input prompts for the image they want to generate and send them to
a network of servers. Immediately, users see the generation result and can download the image. Which of
the following systems is/are most likely being implemented?

(1) Distributed processing system


(2) Real-time system
(3) Batch processing system

A. (1) only
B. (2) only
C. (1) and (2) only
D. (1) and (3) only

2024-MOCK-S1-ICT 1A−2 2
6. In Hong Kong, a small and medium enterprise (SME) is defined to have less than 50 members, except for
manufacturing firms, which are considered SMEs if they have less than 100 members.

Assume N is the number of members and T is the type of the firm. Which of the following algorithms
can successfully find all SMEs based on the definition?

(1) IF (T <> "manufacturing") AND (N < 50)


THEN OUTPUT "Yes"
ELSE OUTPUT "No"

(2) IF (T <> "manufacturing") AND (N < 50)


THEN OUTPUT "Yes"
ELSE IF (N < 100)
THEN OUTPUT "Yes"
ELSE OUTPUT "No"

(3) IF (T <> "manufacturing") THEN


IF (N < 50)
THEN OUTPUT "Yes"
ELSE OUTPUT "No"
IF (T = "manufacturing") THEN
IF (N < 100)
THEN OUTPUT "Yes"
ELSE OUTPUT "No"

A. (2) only
B. (1) and (2) only
C. (2) and (3) only
D. (1), (2) and (3)

7. Which of the following are applications of communication technologies?

(1) Pigeon post (carrying mail by pigeons, a kind of bird)


(2) Traffic lights
(3) e-Learning

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

8. Which of the following are cross-platform file formats?

(1) RTF
(2) DOCX
(3) PDF

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2024-MOCK-S1-ICT 1A−3 3 Go on to the next page


9. Ada transmits a file of 2 036 b to Betty. A start bit and a stop bit are added to form each byte required. What
is the minimum number of bytes needed for the file to be transmitted to Betty?

A. 339
B. 340
C. 341
D. 342

10. The basic concept of the “Input-Process-Output” cycle for a DNS server is illustrated in the following chart.
What are X and Y?

X Y
A. Process DNS
B. IP address DNS
C. Process IP address
D. DNS IP address

11. Which of the following is not a tool available in most pieces of word processing software?

A. Chart generation
B. Mail merge
C. Thesaurus
D. AutoCorrect

12. Which of the following clauses should be used in a SELECT SQL command for displaying information
where AVG(Class_Mark) is greater than 80 in ascending order of AVG(Class_Mark), grouped by
Class?

A. WHERE AVG(Class_Mark) > 80 GROUP BY Class ORDER BY AVG(Class_Mark)


B. GROUP BY Class HAVING AVG(Class_Mark) > 80 ORDER BY AVG(Class_Mark)
C. WHERE AVG(Class_Mark) > 80 AND GROUP BY Class AND ORDER BY
AVG(Class_Mark)
D. GROUP BY Class AND HAVING AVG(Class_Mark) > 80 AND ORDER BY
AVG(Class_Mark)

13. When entering formulas in a spreadsheet, which of the following results is incorrect?

Formula Result
A. FIND("i", "invoice", FIND("i", "invoice", 1)) 5
B. UPPER(LOWER("invoice")) INVOICE
C. TRIM(" invoice ") invoice
D. LEN("invoice") 7

2024-MOCK-S1-ICT 1A−4 4
14. The spreadsheet formula below is used to generate a random number x where a ≤ x < b. What are
the missing parts of the formula?

=a(i)a()*(b-a)a(ii)a

(i) (ii)
A. RAND +1
B. RAND +a
C. RANDBETWEEN +1
D. RANDBETWEEN +a

15. A blended space in Mixed Reality (MR) refers to the deliberate integration of physical and virtual
environments. Compared to Virtual Reality (VR), which of the following are advantages of blended
spaces?

(1) Users can integrate virtual designs into physical spaces.


(2) Users can interact with virtual elements while being aware of the real-world environment.
(3) Blended spaces can host more immersive video games.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

16. E ink (electronic ink) technology powers a lot of e-book-reading devices, which are increasingly popular
today. Which of the following are the possible reasons that consumers choose to purchase E ink devices,
over tablets with conventional backlit screens?

(1) E ink screens give less strain to the eyes.


(2) E ink devices support notetaking with a stylus.
(3) E ink devices are almost always much more power-efficient.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

17. For a CPU with the specification of 4 cores, 4 GHz and a 15 MB cache, which of the following statements
are correct?

(1) The CPU can at most execute 4 000 machine cycles per second.
(2) The maximum number of programs that the CPU can execute at once is 4.
(3) The CPU accesses data in the register faster than that in the cache memory.

A. (1) only
B. (2) only
C. (3) only
D. (1), (2) and (3)

2024-MOCK-S1-ICT 1A−5 5 Go on to the next page


18. Consider the following pseudocode for checking a normal bank direct debit transaction:

IF (TRANSACTION > 0) THEN


OUTPUT "NORMAL"
ELSE
OUTPUT "ABNORMAL"

Which of the following sets of test values is appropriate?

A. -10 30 40
B. 10 25 45
C. 0 1 2
D. -25 0 20

19. Which of the following are common specifications for a home-use scanner?

(1) 802.11ax
(2) 24-bit color depth
(3) 1 200 ppi

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

20. Consider the following steps in the information life cycle:

(1) Transmission
(2) Data collection
(3) Processing
(4) Analysis
(5) Presentation
(6) Storage
(7) Organisation

Which of the following is the correct order of the steps?

A. (2)  (7)  (6)  (3)  (4)  (1)  (5)


B. (2)  (6)  (7)  (3)  (4)  (1)  (5)
C. (2)  (7)  (6)  (3)  (4)  (5)  (1)
D. (2)  (6)  (7)  (3)  (4)  (5)  (1)

21. Chika mistakenly entered the alphabet “O” as the number “0”. Which of the following errors occurred?

A. Data source
B. Transcription
C. Transposition
D. None of the above

22. Which of the following concerning the fields in an email is an incorrect match?

Field Description
A. To Recipients in this field are expected to read the email.
B. cc Recipients in this field are expected to read the email.
C. bcc Recipients in this field are expected to reply to the email.
D. From The email address of the sender is contained in this field.

2024-MOCK-S1-ICT 1A−6 6
23. Which of the following can be shared in a network environment?

(1) Data
(2) Licenses for software
(3) RAM

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

24. Which of the following HTML tags is not involved in the creation of a table?

A. <TABLE>
B. <TT>
C. <TH>
D. <TD>

25. Which of the following are functions of a wireless router?

(1) To provide wired connections to devices.


(2) To provide wireless connections to devices.
(3) To break all files in its LAN into packets.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

26. Greg is playing an online video game. Which of the following protocols is/are most likely involved?

(1) FTP
(2) HTTPS
(3) SMTP

A. (1) only
B. (2) and (3) only
C. (1), (2) and (3)
D. None of the above

27. Which of the following statements about the OSI model are correct?

(1) The application layer is the topmost layer of the OSI model.
(2) Data transmitted by the data link layer are called frames.
(3) As data travels up the layers of the OSI model, headers are added onto it.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2024-MOCK-S1-ICT 1A−7 7 Go on to the next page


28. Dry run the following algorithm. How many “#” are output?

FOR i FROM 1 TO 10 DO
IF (the remainder of (i / 2) = 0) THEN
OUTPUT "#"
ELSE
OUTPUT "@"

A. 0
B. 4
C. 5
D. 6

29. What is the output of the following algorithm?

A  1
FOR i FROM 1 TO 10 DO
A  A * 3
A  6
OUTPUT A

A. 1
B. 6
C. 9
D. 59049

30. Y is an array. What is the output of the following algorithm?

Y[0]  3
Y[1]  0
Y[2]  2
FOR K FROM 3 TO 6 DO
Y[K]  Y[K-2] + Y[K-3]
OUTPUT Y[6]

A. 5
B. 7
C. 10
D. 12

31. NUM is an integer array with N values. What is the purpose of the following algorithm?

i  1
X  NUM[i]
REPEAT
IF NUM[i] < X THEN
X  NUM[i]
i  i + 1
UNTIL (i = (N+1))
OUTPUT X

A. To count the number of values in NUM.


B. To calculate the sum of values in NUM.
C. To find the maximum value in NUM.
D. To find the minimum value in NUM.

2024-MOCK-S1-ICT 1A−8 8
32. The final values of A in the following two algorithms are the same.

Algorithm 1 Algorithm 2
A  0 A  0
FOR i FROM 20 DOWN TO 1 DO i  20
A  A + i WHILE aMissing part 1a DO
A  A + i
aMissing part 2a

Which of the following pairs of missing parts is correct?

Missing part 1 Missing part 2


A. i > 0 i  i + 1
B. i >= 0 i  i + 1
C. i > 0 i  i - 1
D. i >= 0 i  i – 1

33. The following two algorithms always produce the same result.

ALG1 ALG2
INPUT TARGET INPUT TARGET
FOUND  -1 FOUND  -1
FOR i FROM 1 TO N DO i  1
IF (TARGET = A[i]) WHILE (i <= N) AND (FOUND = -1) DO
FOUND  i IF (TARGET = A[i])
FOUND  i
i  i + 1

It was found that ALG2 is more efficient than ALG1. Which of the following is the correct explanation?

A. The use of arrays, namely A in ALG2’s implementation, speeds up the algorithm.


B. ALG2 does not need to go through all elements in A.
C. There is a larger number of comparisons in ALG2; the computer can make a smarter decision.
D. FOR-loops, which are used in ALG1 but not ALG2, are slower in nature.

34. The final values of P and Q in the following two algorithms are the same.

Algorithm 1 Algorithm 2
P  3 P  3
Q  -2 Q  -2
REPEAT DO
P  P * P P  P * P
Q  Q - 1 Q  Q - 1
UNTIL (P > 40) AND (Q <= -30) WHILE aMissing parta

What is the missing part in Algorithm 2?

A. (P > 40) AND (Q <= -30)


B. (P > 40) OR (Q <= -30)
C. (P <= 40) AND (Q > -30)
D. (P <= 40) OR (Q > -30)

2024-MOCK-S1-ICT 1A−9 9 Go on to the next page


Answer Questions 35, 36 and 37 with reference to the following flowchart.

35. Which of the following control structures are included in the above flowchart?

(1) Selection
(2) Iteration
(3) Batch
(4) Sequence

A. (1), (2) and (3) only


B. (1), (2) and (4) only
C. (2), (3) and (4) only
D. (1), (2), (3) and (4)

36. If the input is 6, what is the final value of X?

A. 24
B. 120
C. 696
D. 720

37. If the input is 8, what is the output?

A. 39600
B. 40200
C. 40296
D. 40320

2024-MOCK-S1-ICT 1A−10 10
38. Which of the following are advantages of using the modular approach when designing algorithms?

(1) The execution time of an algorithm is shorter.


(2) Different people can work on different modules at the same time.
(3) Some redundant code segments are eliminated.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

39. Which of the following Internet activities are probably infringement of copyright?

(1) Downloading a file in the public domain with BitTorrent (BT)


(2) Sharing an own-made copyrighted study note to friends using peer-to-peer (P2P) software
(3) Downloading a lecture video from a tutorial course web site and uploading it to the Internet

A. (1) only
B. (3) only
C. (1) and (3) only
D. (1), (2) and (3)

40. When Willy opens a piece of software, the following prompt is shown:

Your trial has expired!


Purchase a license to continue using your favourite tools.

Which of the following kinds of software can the piece of software be?

(1) Public domain software


(2) Commercial software
(3) Shareware

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

END OF SECTION A

2024-MOCK-S1-ICT 1A−11 11

You might also like