SainsPulauPinang Skema

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

ANSWER SHEET

1 D
2 D
3 A
4 A
5 B
6 B
7 A
8 A
9 A
10 C
a T
11
b T
aF
12
bF
a theft
13
b malicious code
a interpreter
14
b compiler
a CPU
15
b RAM Slot
aS
16
bT
aC
17
bA
18
Notepad, word pad.. (any relevant answer)
19
Ms movie maker, Ulead video editor (or any relevant answer)
20 Input
21 Program
2, 3rd generation /High-level
22

Hardware
23 people
data (ignore order)

24 Record
Collection of field
25
CONFIDENTIAL 3765/1

SECTION B
Answer ALL questions in this section. Write your Answer in Question Paper

a. Define ‘computer theft’ and give an example of an activity that reflects computer
theft. [2 marks]

any activity that steal money, goods, information and computer resources or
the actual stealing of computers, especially notebooks and PDAs

b. Hacking is a source of threat to security in computer. Define ‘hacking’ and


give an example of hacking activity. [2
marks]
unauthorised access to the computer system by a hacker. Hackers are persons who
learn about the computer system in detail. They write program referred to as hacks.
Hackers may use a modem or cable to hack the targeted computers.

a. Define ‘Client’ and ‘Server’ in a client/server network.


[2 marks]
Client :
A computer user that uses computer in the network

Server :
A server is a computer that shares information and resources with other computers
on a network. A client is a computer which requests services or files from a server
computer.

b. Explain what a peer-to-peer network is. [2


marks]

Peer-to-peer or P2P network is a network with all the nodes acting as both servers
and clients. A PC can access files located on another PC and can also provide files to
other PCs.

2. There are two types of interactivity in multimedia. State the difference between
linear and non linear interactivity. Give an example of each type.
[4 marks]

Linear Interactivity Non-Linear Interactivity

Interactive
Difference Non-interactive

Example Video Power point Slide show

3. Define
a) Primary Key [2
marks]
A primary key is the field that uniquely represents each record in a table.

3765/1 2 [Next Page


CONFIDENTIAL
CONFIDENTIAL 3765/1

b) Foreign Key [2
marks]
A foreign key is the field that matches the primary key in another table.
Or
A foreign key contains the same data as those of the primary key in the other table.

4. Figure 1 shows the five main phases in program development.


Name the phases : [2
marks]
i. M : Analyze
ii. N : Coding
b. Explain two activities involved in phase: Documentation [2
marks]
1. Write a use manual on how to handle the program. It includes a detailed
description of the program, clear layouts of input and output records, and a
program listing.

2. Collect detailed problem definition, the program plan (flow chart or pseudo code),
comments within the source program and testing procedures. It may reduces the
amount of time a new programmer spends in learning about the existing
programs.

SECTION C
QUESTION 1 (Must Answer)

A pictorial representation of some process or model of a complex system is called block


diagram. A block diagram is a useful tool both in designing new processes and in improving
existing processes.

a. Complete the block diagram of the information processing cycle below.


[3marks]

INPUT OUTPUT
PROCESS
. .

STORAGE
.

b. State the meaning of input and give an example of input device. [2


marks]

Input is any data or instruction that you enter into the memory of a computer.
Example mouse.

c. Give two differences between Primary storage and Secondary storage. [2


marks]
Primary storage Secondary storage
Not portable Portable

3765/1 3 [Next Page


CONFIDENTIAL
CONFIDENTIAL 3765/1

Store data permanently (ROM) / Store data semi-permanent.


Store data temporarily (RAM)

Any relevant answer- Differentiation


must be ralative

QUESTION 2
These programming languages are more abstract, easier to use, and
more portable across platforms.
STATEMENT 1

a) State the level of programming language mentioned in Statement 1.


[1 mark]
A high-level programming language

b) State two of the generations under this level of programming languages.


[2 marks]
1. 3rd generation Language 2. 4th generation Language 3. 5th generation
Language
Any two (2)

3765/1 4 [Next Page


CONFIDENTIAL
CONFIDENTIAL 3765/1

c) Explain the two generations mentioned in (b) and give an example of a programming
language for each.
[4 marks]

1. The third generation of programming language, 3GL, or procedural language


uses a series of English-like words, that are closer to human language,
to write instructions. (1)
Or
The third generation of programming languages make complex programming
simpler and easier to read, write and maintain.Programs written in a high-level
programming language must be translated into machine language by a
compiler or interpreter. (1)

+ Give one example PASCAL, FORTRAN, BASIC, COBOL, C and C++ (1)

2. The fourth generation programming language or nonprocedural language, often


abbreviated as 4GL, enables users to access data in a database. (1)

Or
Often referred to as goal-oriented programming language because it is usually
limited to a very specific application and it might use syntax that is never used
in other programming languages. (1)

+ Give one example SQL, NOMAD and FOCUS(1)

QUESTION 3
Figure 2 shows computer network topologies.

Topology A Topology B Topology C

FIGURE 2

a) Name Topology A, Topology B and Topology C. [3


marks]
Ring, Star, bus

b) State one possible reason that causes a network using Topology A fail to function.
[1 mark ]
one of the Node is malfunction OR the line is broken

c) Give two disadvantages of Topology B. [2


mark]
1. If the host fails, the entire LAN will be affected.
2. Network speed decreases when the number of nodes increases.

3765/1 5 [Next Page


CONFIDENTIAL
CONFIDENTIAL 3765/1

3. Troubleshooting is difficult when one of the nodes fails.


4. A host must be installed to control the network.
Any two (2)

d) Give one advantage of Topology C. [1


mark]

1. Easy implementation. New devices can be added to the backbone or to


2. the existing nodes.
3. Failure of a node doesn't affect the entire LAN.
4. No disruptions to the network when connecting or removing devices.
5. Network can easily be extended, by adding new devices to the
6. backbone or existing nodes.

Any one (1)


~ END OF QUESTION

3765/1 6 [Next Page


CONFIDENTIAL

You might also like