Professional Documents
Culture Documents
Final Exam F4ict Answer
Final Exam F4ict Answer
Name
IC No
Question
No.
1.
2.
3.
4.
5
6
7
8
9
10
11
12
13 i )
ii )
iii )
14 i)
ii)
15 i)
ii)
iii)
16 i)
ii)
17 i )
ii )
18 i)
ii)
iii)
19. i )
ii)
iii )
20
21
22
23
24
25
Form:
Candidates Answer
B
D
D
A
B
B
C
B
C
C
A
A
S
R
Q
Iris scanning
Fingerprint recognition
Q
S
R
R
S
R
T
RJ45 connector
Network Interface Card/NIC
Cable stripper
radio waves
Microwaves
Infrared
False
True
True
False
True
True
TOTAL MARKS
Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
23
25
26
27
28
29
30
31
32
33
34
35
36
Scheme Section B
1. a)
Copyright infringement is defined as a violation of the rights secured by
Copyright Act.
Pelanggaran hakcipta bermaksud pencabulan ke atas hak-hak yang
dilindungi oleh Akta Hakcipta..
Give TWO examples of copyright infringement
Berikan DUA contoh pelanggaran hakcipta
i.
ii.
Mark
(1 mark for each correct answer)
b) i. Hand geometry scanning
ii. Iris scanning
Mark
(1 mark for each correct answer)
2.
Mark
(Define 1 mark, Example 1 mark)
b.
3.
a. X = Network Card , Y = Hub/Switch/Router
Mark
(1 mark for each correct answer)
b.
Mark
(1 mark for each correct answer)
4.
i)
Dimensio
n
Graphical-User
Interface
A way to
enter data
Not user-friendly
Difficult to use because
they require exact spelling,
grammar
Userfriendly
User friendly
Easy to use user
can choose the
command by
clicking a mouse
Mark
(1 mark for each correct answer)
ii)
Presentation
Graphic
Mark
(1 mark for the software name and any one type of it, 1 mark for the function of the
software type stated)
5.
a) Reason:
PC1 and PC2 have the same IP address, 192.168.1.5 and therefore the network has
IP conflict. All the computers in a network must have different IP addresses so
that they are able to communicate with each other.
OR
The subnet masks for both PCs have been configured incorrectly. The subnet
mask used for both PCs is invalid. It should be 255.255.255.0
Mark (2 mark for correct answer)
b)
Computer
IP address
(any 192.168.1.x
except 192.168.1.1)
Subnet Mask
PC1
192.168.1.2
255.255.255.0
PC2
192.168.1.3
255.255.255.0
Scheme Section C
Question 31
(a)
(b) - Interprets and carries out basic instructions that operate a computer
- Control unit directs and coordinates operations in computer
- Arithmetic logic unit (ALU) performs arithmetic, comparison and logical operations
(c)
Component B
Any machine that feeds data into a
computer.
Examples : keyboard, webcam, mouse
Allow user to enter raw data into a
computer
Provides communication between the user
and the computer
Capable of converting data into a form
which can be recognized by the computer
Component C
A piece of hardware uses to present
information to the user.
Example : monitor, speaker, printer.
Capable of delivering or showing
information to user.
Serves as an interface between the
computer and the user
Takes machine coded output results from
the processor and convert them into a form
that can be used by human beings.
(d)
- Speaker
- Liquid Crystal Display (LCD) Projector
Question 32
(a)
i . Ring Topology
ii. Star Topology
iii. Bus Topology
(b)
- A star network generally requires more cable
- If the hub fails, the entire network also fails
- Bottlenecks can occur because all data must pass through the hub
- Expensive to install
- Network speed decreases when the number of nodes fails.
- Troubleshooting is difficult when one of the nodes fails
- A host must be installed to control the network.
(c)
Types
Structure
Topology A (Ring)
All computer and other
devices are connected in a
circle.
Yes
Network will fail
Network will fail
Depends on backbones
Difficult
Topology C (Bus)
Consist a single central
cable (backbone) and all
computers and other devices
connect it
No
Network can still run
Network can still run
Difficult
Easy
Limited
Many
Question 33
(a)
Application software is a computer program or a suite of computer programs that
performs a particular function for the user.
Example: Word star, Dbase, Microsoft Excel, Microsoft Access.
(b)
System Software
Enables the computer to function properly
Compulsory each computer must have a
system software to function
Each computer only needs one system
software
Independent system software can
function without an application software
Provides the environment in which the
application run
Application Software
Enables users to work efficiently with
documentation such as letters, accounting
reports and presentations
Optional depends on usage and needs.
Without an application software, the
computer is still able to function.
Each computer can have more than one
application software
Dependent application software cannot
work without system software
Provides the environment to enable users to
accomplish specific tasks.
(c)
- The AVG Antivirus in Computer X is an antivirus program, will protects computer X
against viruses by identifying and removing any computer viruses found in the computer
memory, on storage media or incoming e-mail files.