E-SP-ICT-1A
E-SP-ICT-1A
ICT
PAPER 1 HONG KONG SKIBIDI SIGMA AND OHIO RIZZLER AUTHORITY
(SECT A)
HONG KONG DIPLOMA OF FANUM TAXING EXAMINATION
GENERAL INSTRUCTIONS
1. Read carefully the instructions on the Answer Sheet. After the announcement of the start of the
examination, you should first stick a barcode label and insert the information required in the spaces
provided. No extra time will be given for sticking on the barcode label after the ‘Time is up’
announcement.
2. When told to open this book, you should check that all the questions are there. Look for the words
‘END OF SECTION A’ after the last question.
4. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the
Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You must mark
the answers clearly; otherwise you will lose marks if the answers cannot be captured.
5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.
DFT-ICT1A1 1
There are 40 questions in this paper. Choose the most suitable answers.
1. Bob is recording a podcast programme on his laptop. When he replayed the audio, he could only hear the
audio from the right speaker of the laptop. Which of the following is the least possible explanation?
2. In a device, 8 and 16 bits are used to store a character and an integer respectively. How many bytes are
required to store the string 'SKIBIDI1145'?
A. 10 bytes
B. 11 bytes
C. 69 bytes
D. 80 bytes
NEED CHANGE
3. When creating an online email account, the following step needs to be completed.
A. Data collection
B. Data verification
C. Data organisation
D. Data validation
A. 254
B. 2452
C. 3457
D. 4875
5. 1111 1111 is an 8-bit number using two’s complement representation. What is its decimal value?
A. -1
B. 0
C. 1
D. 255
Assume that Unicode (UTF-8) is adopted. Which of the following comparative statements about the file
sizes is correct?
7. In general, which of the following conversion will decrease the file size significantly?
(1) AI SVG
(2) FLAC MP3
(3) BMP JPG
8. For a chain convenience store, in which of the following examples should ‘what-if’ scenarios in
spreadsheets be used? CHANGE
A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only
A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only
11. Peter wants to upgrade the SATA SSD to M.2 NVMe SSD in his computer. Which of the following
features should be mostly considered?
12. Which of the following is not a possible outcome of overclocking the CPU?
A. The arithmetic and logic unit (ALU) is used to perform arithmetic operations.
B. The accumulator is a register that stores arithmetic and logic results.
C. The data transfer rate of registers is higher than that of the main memory.
D. Data buses are used to transfer control signals between the main board and input/output devices.
A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only
A. Real-time system
B. Batch processing system
C. Distributed processing system
D. Parallel processing system
A. 0.0.25.6
B. 5C1B::
C. 114.514.191.98
D. 256:256::256:256
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only
CHANGE
19. Which of the following applications rely on cloud computing technology?
A. ftp://skibidi-sigma.co/fanum/tax/
B. https://114.51.4.191/skibidi%20toilet
C. http://www.skibidi.hk:65535/sigma
D. http://ohio.sk!b!d!.com/rizz
A. To encrypt data using a single key for both encryption and decryption.
B. To allow the exchange of a symmetric encryption key for faster encryption.
C. To provide faster encryption speeds compared to symmetric encryption.
D. To eliminate the need for any form of encryption key.
A. (1) only
B. (1) and (2) only
C. (1) and (3) only
D. (2) and (3) only
(1) Phishing emails are a type of advertisement that a company sends out to target recipients.
(2) Phishing emails are typically carried out by sending target recipients an email with a fake web site
to acquire their personal information.
(3) Target recipients will not be able to use their computers for a few days after a phishing attack.
A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only
(1) She can break down the problem into sub-problems effectively.
(2) She can use a truth table to illustrate the solution.
(3) She can ignore the boundary cases when testing the algorithm.
A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only
N ← 20
count ← 0
while N > 0
N ← integral part of N / 2
count ← count + 1
A. 4
B. 5
C. 6
D. 7
sum ← 0
For i from 1 to N
If remainder of AR[i] / 2 = 0 then
sum ← sum × AR[i] × AR[i]
A. 0
B. 9216
C. 116
D. 326
After executing the following algorithm, which element in DAT stores ‘Carol’?
P ← 4
While P > 2
DAT[P] ← DAT[P-1]
P ← P - 1
A. DAT[1]
B. DAT[2]
C. DAT[3]
D. DAT[4]
AVE = (N1+N2+N3)/3
Output AVE
End
A. The IPO cycle illustrates the data type and data structure.
B. The problem shown is to find the average of three numbers.
C. The IPO cycle illustrates a solution to the problem.
D. The control structure of the flowchart shown in the ‘Process’ is a sequence.
Input P
K P
While K <= N-1 do
A[K] A[K+1]
K K+1
N N-1
i 0
n 0
No i < 5?
Yes
No P[i] <= 7? i i + 1
Yes
Yes
Output P[i] = 7?
i and n
No
End n n + 1
A. 2
B. 3
C. 4
D. 5
A. 1
B. 2
C. 3
D. 4
Input A
If A > 5
Then B 10
Else B 20
Output A, B
(1) 5
(2) 6
(3) 10
(4) 20
38. Which of the following are potential concerns regarding the use of pretrained artificial intelligence (AI)?
A. (1) only
B. (2) only
C. (1), (2) and (3) only
D. (1), (3) and (4) only
END OF SECTION A
SP-DSE-ICT1A12 12