0% found this document useful (0 votes)
27 views

E-SP-ICT-1A

This document outlines the structure and instructions for the Information and Communication Technology Paper 1 examination for the Hong Kong Diploma of Fanum Taxing Examination. It includes general instructions for answering multiple-choice questions, marking answers, and specific guidelines for the examination process. The paper consists of 40 questions covering various ICT topics, requiring candidates to select the most suitable answers.

Uploaded by

yangandi.ya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

E-SP-ICT-1A

This document outlines the structure and instructions for the Information and Communication Technology Paper 1 examination for the Hong Kong Diploma of Fanum Taxing Examination. It includes general instructions for answering multiple-choice questions, marking answers, and specific guidelines for the examination process. The paper consists of 40 questions covering various ICT topics, requiring candidates to select the most suitable answers.

Uploaded by

yangandi.ya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

DFT

ICT
PAPER 1 HONG KONG SKIBIDI SIGMA AND OHIO RIZZLER AUTHORITY
(SECT A)
HONG KONG DIPLOMA OF FANUM TAXING EXAMINATION

INFORMATION AND COMMUNICATION TECHNOLOGY PAPER 1

8:30 am – 9:30 am (1 hour)


This paper must be answered in English

GENERAL INSTRUCTIONS

1. There are one section, A, in this Paper.

2. Section A consists of multiple-choice questions in this question paper.

3. Answers to Section A should be marked on the Multiple-choice Answer Sheet.

INSTRUCTIONS FOR SECTION A (MULTIPLE-CHOICE QUESTIONS)

1. Read carefully the instructions on the Answer Sheet. After the announcement of the start of the
examination, you should first stick a barcode label and insert the information required in the spaces
provided. No extra time will be given for sticking on the barcode label after the ‘Time is up’
announcement.

2. When told to open this book, you should check that all the questions are there. Look for the words
‘END OF SECTION A’ after the last question.

3. All questions carry equal marks.

4. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the
Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You must mark
the answers clearly; otherwise you will lose marks if the answers cannot be captured.

5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.

6. No marks will be deducted for wrong answers.

 斯基比迪西格瑪 保留版權 Not to be taken away before the


Hong Kong Skibidi Sigma and Ohio Rizzler Authority end of the examination session
All Rights Reserved 2025

DFT-ICT1A1 1
There are 40 questions in this paper. Choose the most suitable answers.

1. Bob is recording a podcast programme on his laptop. When he replayed the audio, he could only hear the
audio from the right speaker of the laptop. Which of the following is the least possible explanation?

A. The left speaker of his laptop is faulty.


B. He used a microphone with a asymmetric audio pickup pattern that favours the right side.
C. The audio recording software is set to only record the right audio channel of his microphone.
D. Bob has adjusted the input volume settings to mute the left channel.

2. In a device, 8 and 16 bits are used to store a character and an integer respectively. How many bytes are
required to store the string 'SKIBIDI1145'?

A. 10 bytes
B. 11 bytes
C. 69 bytes
D. 80 bytes

NEED CHANGE
3. When creating an online email account, the following step needs to be completed.

Enter password: ********

Re-enter password: ********

What is the purpose of re-entering the password?

A. Data collection
B. Data verification
C. Data organisation
D. Data validation

4. What is the PPI of a 3660x3220 1.41-inch screen. (correct to nearest integer)

A. 254
B. 2452
C. 3457
D. 4875

5. 1111 1111 is an 8-bit number using two’s complement representation. What is its decimal value?

A. -1
B. 0
C. 1
D. 255

DFT-ICT1A2 22 Go on to the next


2 page
6. Three plaintext files contain some characters, as shown below: NEED CHANGE

2017. JULY. 二零一七。

(1) (2) (3)

Assume that Unicode (UTF-8) is adopted. Which of the following comparative statements about the file
sizes is correct?

A. (1) > (3)


B. (2) > (1)
C. (2) > (3)
D. (3) > (2)

7. In general, which of the following conversion will decrease the file size significantly?

(1) AI  SVG
(2) FLAC  MP3
(3) BMP  JPG

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

8. For a chain convenience store, in which of the following examples should ‘what-if’ scenarios in
spreadsheets be used? CHANGE

(1) Estimates monthly expenses by changing different parameters.


(2) Produces monthly sales analysis.
(3) Compares sales data from different branches.

A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only

[2012 DSE ICT1A Q.5] CHANGE


9. Peter and Mary share a database file X and execute database queries, T1 and T2, respectively. Which of
the following activities should the database management system not do?

(1) When T1 is reading X, T2 is reading X.


(2) When T1 is writing records in X, T2 is writing records in X.
(3) When T1 is deleting records in X, T2 is reading X.

A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only

DFT-ICT1A3 33 Go on to the next


3 page
10. In a DBMS, a database designer designs a form for users to input data. What is a major benefit of
designing a form?

A. Videos can be imported.


B. It simplifies the user interface.
C. Eliminates the need of data validation.
D. The form uses less system resources.

11. Peter wants to upgrade the SATA SSD to M.2 NVMe SSD in his computer. Which of the following
features should be mostly considered?

A. Presence of heatsink on SSD


B. CPU computational power
C. Power consumption
D. Motherboard design

12. Which of the following is not a possible outcome of overclocking the CPU?

A. The CPU consumes more electricity.


B. Better support for high-end graphics card.
C. The CPU may access RAM at a higher data transfer rate.
D. More frequent computer hangs.

[2020 DSE ICT1A Q.22]


13. Which of the following statements about the components in a computer is not correct?

A. The arithmetic and logic unit (ALU) is used to perform arithmetic operations.
B. The accumulator is a register that stores arithmetic and logic results.
C. The data transfer rate of registers is higher than that of the main memory.
D. Data buses are used to transfer control signals between the main board and input/output devices.

14. Read the configuration of a desktop computer below:

 AMD® RyzenTM R9 9950X3D


 64GB DDR5 RAM
 1TB M.2 PCIe 5.0 NVMe SSD
 802.11be Wi-Fi

What information can be found out from the configuration?

(1) The cache size of the CPU


(2) The maximum data transfer rate of a wireless network
(3) The data transfer rate of RAM

A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only

DFT-ICT1A4 44 Go on to the next


4 page
[2016 DSE ICT1A Q.17] CHANGE
15. A booking system consists of several booking counters in different locations in a city. Customers can buy
tickets for theatres through one of the booking counters. Which of the following best describes the booking
system?

A. Real-time system
B. Batch processing system
C. Distributed processing system
D. Parallel processing system

[2017 DSE ICT1A Q.19] CHANGE


16. What information is usually provided by the system monitoring software in an operating system?

(1) Current processes


(2) Memory usage
(3) Network traffic

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

17. Which of the following is an invalid IP address?

A. 0.0.25.6
B. 5C1B::
C. 114.514.191.98
D. 256:256::256:256

[New question] CHANGE


18. TCP has which of the following functions?

(1) Splitting and reassembling data


(2) Adding sequence numbers to data packets
(3) Routing the data to the destination

A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only

CHANGE
19. Which of the following applications rely on cloud computing technology?

(1) Hosting large-scale web applications.


(2) Real-time data analytics for IoT systems.
(3) Offline storage of personal files.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2), and (3)

DFT-ICT1A5 55 Go on to the next


5 page
20. What is a main function of the Transmission Control Protocol (TCP)?

A. To monitor network performance and detect congestion.


B. To ensure data integrity.
C. To synchronize audio and video streams in multimedia applications.
D. To route data packets across networks.

21. Which of the following statements about TCP/IP is true?

A. It uses a hierarchical addressing system with country codes.


B. It is only used for wired communication.
C. It can operate over various types of physical networks.
D. It does not support network security features.

22. Which of the following URLs is not valid?

A. ftp://skibidi-sigma.co/fanum/tax/
B. https://114.51.4.191/skibidi%20toilet
C. http://www.skibidi.hk:65535/sigma
D. http://ohio.sk!b!d!.com/rizz

23. What is one of the many purposes of public key encryption?

A. To encrypt data using a single key for both encryption and decryption.
B. To allow the exchange of a symmetric encryption key for faster encryption.
C. To provide faster encryption speeds compared to symmetric encryption.
D. To eliminate the need for any form of encryption key.

DFT-ICT1A6 66 Go on to the next


6 page
[2014 DSE ICT1A Q.12] CHANGE
24. Which of the following is/are best practice when using online banking systems?

(1) Create an uncommon login name.


(2) Use a combination of letters and numbers for the passwords and change them regularly.
(3) Avoid using a wired network when a wireless network is available.

A. (1) only
B. (1) and (2) only
C. (1) and (3) only
D. (2) and (3) only

[2015 DSE ICT1A Q.38] CHANGE


25. Which of the following statements about phishing emails is/are correct?

(1) Phishing emails are a type of advertisement that a company sends out to target recipients.
(2) Phishing emails are typically carried out by sending target recipients an email with a fake web site
to acquire their personal information.
(3) Target recipients will not be able to use their computers for a few days after a phishing attack.

A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only

[2015 DSE ICT1A Q.33] CHANGE


26. When solving a problem in a project, Mary needs to define the scope of the problem precisely. What is/are
the major reason(s) for doing this?

(1) She can break down the problem into sub-problems effectively.
(2) She can use a truth table to illustrate the solution.
(3) She can ignore the boundary cases when testing the algorithm.

A. (1) only
B. (2) only
C. (1) and (3) only
D. (2) and (3) only

[2018 DSE ICT1A Q.33] CHANGE


27. Suppose that X = 1, Y = 2 and Z = 3. Which of the following Boolean expressions is ‘true’?

A. ((X = 1) AND (Y > -2)) AND (Z > 3)


B. ((X = 1) AND (Y > -2)) OR (Z > 3)
C. ((X = 1) OR (Y > -2)) AND (Z > 3)
D. (X = 1) AND ((Y > -2) AND (Z > 3))

[2014 DSE ICT1A Q.30] CHANGE


28. The sales department of an insurance company wants to improve service to its clients. It asks the IT project
manager to establish some web pages for the clients. What should the IT project manager do first?

A. Define the scope of the service.


B. Evaluate the IT equipment needed.
C. Estimate the project completion date.
D. Set up a project team and recruit programmers.

DFT-ICT1A7 77 Go on to the next


7 page
29. Dry run the following algorithm.

N ← 20
count ← 0
while N > 0
N ← integral part of N / 2
count ← count + 1

What is the value of count ?

A. 4
B. 5
C. 6
D. 7

30. In the following algorithm, suppose AR is an array [2, 5, 6, 8, 7, 9] with size N.

sum ← 0
For i from 1 to N
If remainder of AR[i] / 2 = 0 then
sum ← sum × AR[i] × AR[i]

What is the value of sum after executing the algorithm?

A. 0
B. 9216
C. 116
D. 326

[2015 DSE ICT1A Q.30] CHANGE


31. An array DAT stores English names as shown below.

Amy Bob Carol Dave


DAT[1] DAT[2] DAT[3] DAT[4]

After executing the following algorithm, which element in DAT stores ‘Carol’?

P ← 4
While P > 2
DAT[P] ← DAT[P-1]
P ← P - 1

A. DAT[1]
B. DAT[2]
C. DAT[3]
D. DAT[4]

DFT-ICT1A8 88 Go on to the next


8 page
[2016 DSE ICT1A Q.33] CHANGE
32. Study the problem shown in the Input-Process-Output (IPO) cycle below.

Input Process Output

N1 AVE = (N1 + N2 + N3) / 3 AVE


N2
N3
Start

Input N1, N2,


N3

AVE = (N1+N2+N3)/3

Output AVE

End

Which of the following statements is not correct?

A. The IPO cycle illustrates the data type and data structure.
B. The problem shown is to find the average of three numbers.
C. The IPO cycle illustrates a solution to the problem.
D. The control structure of the flowchart shown in the ‘Process’ is a sequence.

[2017 DSE ICT1A Q.33] CHANGE


33. A is an array with A[1], A[2] , ... , A[N] storing N non-zero values. What is the purpose of the
following algorithm?

Input P
K  P
While K <= N-1 do
A[K]  A[K+1]
K  K+1
N  N-1

A. Removes the P-th value in A.


B. Increases the value of P by 1.
C. Swaps the values of A[K] and A[K+1] for K <= N-1.
D. Calculates the sum of the values in A.

DFT-ICT1A9 99 Go on to the next


9 page
[2020 DSE ICT1A Q.29-30] CHANGE
Answer Questions 34 and 35 with reference to the following segment of a flowchart. The initial
values of P[0], P[1], P[2], P[3] and P[4] are 7, 7, 6, 7 and 9 respectively.

i 0
n 0

No i < 5?

Yes

No P[i] <= 7? i i + 1

Yes

Yes
Output P[i] = 7?
i and n
No

End n n + 1

34. What is the output value of i?

A. 2
B. 3
C. 4
D. 5

35. What is the output value of n?

A. 1
B. 2
C. 3
D. 4

DFT-ICT1A10 1010 Go on to the next


10 page
[2019 DSE ICT1A Q.28] CHANGE
36. What are the boundary cases for testing in the following segment of an algorithm?

Input A
If A > 5
Then B  10
Else B  20
Output A, B

(1) 5
(2) 6
(3) 10
(4) 20

A. (1) and (2) only


B. (3) and (4) only
C. (2), (3) and (4) only
D. (1), (2), (3) and (4)

37. What is a key challenge when designing IoT devices?

A. Lack of wireless communication standards.


B. High power consumption.
C. Limited availability of IPv4 addresses.
D. Difficulty in integrating sensors.

38. Which of the following are potential concerns regarding the use of pretrained artificial intelligence (AI)?

(1) Increased world energy consumption


(2) Lack of transparency in decision-making
(3) Slow adoption in industries.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

DFT-ICT1A11 1111 Go on to the next


11 page
39. Which of the following is true when describing VR technology?

(1) Users are unaware of their surroundings when using VR.


(2) VR technology may possess privacy issues when motion data is collected from motion sensors.
(3) Users may develop eye dryness in a prolonged period of use of VR.
(4) A VR Headset must be connected externally to a computer to be used.

A. (1) only
B. (2) only
C. (1), (2) and (3) only
D. (1), (3) and (4) only

[2020 DSE ICT1A Q.40] CHANGE


40. The picture below illustrates good ergonomic practices for using a computer.

Which of the following settings are necessary?

(1) The angle of the armrest at P should be adjustable.


(2) The angle of the display unit at Q should be adjustable.
(3) The height of the table at R should be adjustable.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

END OF SECTION A

SP-DSE-ICT1A12 12

You might also like