Atp Ict Mock 4 2-1a
Atp Ict Mock 4 2-1a
Atp Ict Mock 4 2-1a
ICT
PAPER 1 @youtubeatp_ict
(SECT A)
HONG KONG DIPLOMA OF SECONDARY EDUCATION EXAMINATION 2024
GENERAL INSTRUCTIONS
3. Answers to Section A should be marked on the Multiple-choice Answer Sheet. Answers to Section
B should be written in the spaces provided in the Question-Answer Book. The Answer Sheet for
Section A and the Question-Answer Book for Section B must be handed in separately at the
end of the examination.
1. Read carefully the instructions on the Answer Sheet. After the announcement of the start of the
examination, you should first stick a barcode label and insert the information required in the spaces
provided. No extra time will be given for sticking on the barcode label after the ‘Time is up’
announcement.
2. When told to open this book, you should check that all the questions are there. Look for the words
‘END OF SECTION A’ after the last question.
4. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the
Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You must mark
the answers clearly; otherwise you will lose marks if the answers cannot be captured.
5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.
2024-MOCK-S2-ICT 1A−1 1
There are 40 questions in this paper. Choose the most suitable answers.
1. A toy company provides an online service for customers to pre-order toys and pay deposit via credit card.
What information should customers input?
2. What is the maximum number of devices that MAC addresses can represent?
A. 212
B. 216
C. 1612
D. 1616
3. Refer to the pseudocode snippet below. Which of the following data validation methods is this most likely
the algorithm of? (Assume x is a non-null integer variable.)
if (x = 2) OR (x = 3) then
A. Type check
B. Fixed value check
C. Range check
D. Format check
4. Which of the following image file formats can contain multiple images in one file?
(1) PNG
(2) JPG
(3) TIFF
(4) PDF
A. (3) only
B. (4) only
C. (3) and (4) only
D. (1), (2) and (3) only
5. Which of the following statement(s) about the parity check is/are correct?
A. (3) only
B. (1) and (2) only
C. (2) and (3) only
D. None of the above
2024-MOCK-S2-ICT 1A−2 2
6. The following statements are known to be true.
A. (1) only
B. (1) and (2) only
C. (1), (2) and (3)
D. None of the above
7. A school has 10 550 students. Because of layout limitations, the length of the student ID should not exceed
4 characters. The school principal also wants the student ID to take up as little storage as possible. Which
of the following sets of characters should the student ID use?
(You do not need to account for any potential expansion of the school.)
8. Which of the following statements about the 9-bit two’s complement representation is/are correct?
(1) The decimal number +256 cannot be represented, as the representation has already been taken by
the decimal number −256.
(2) The range of decimal numbers that can be represented is from −256 to +255.
(3) The operation 1 1100 0110 – 1 0011 1000 (both numbers in 9-bit two’s complement
representation) results in an overflow error.
A. (1) only
B. (2) only
C. (3) only
D. (1), (2) and (3)
ORDERS
CLASS CLASSNO CNAME ENAME QUANTITY
6B 32 曾大明 Tsang Tai Ming 400
4A 10 王堅心 Kinsum Huang 260
4A 6 陳大文 Chan Tai Man 100
3B 15 黃一心 Wong Yat Sum 280
Which of the following can be (a) possible primary key(s) for ORDERS?
(1) ENAME
(2) CLASS + CLASSNO
(3) CLASS + CLASSNO + ENAME + QUANTITY
A. (1) only
B. (2) only
C. (2) and (3) only
D. (1), (2) and (3)
A. VLOOKUP
B. FIND
C. LEFT
D. MID
世上無難事
The above text (as Unicode) has to be sent every 5 seconds. What is the minimum data transmission rate
required?
A. 8 bps
B. 16 bps
C. 32 bps
D. 64 bps
12. Which of the following are common specifications for a home-use all-in-one printer?
2024-MOCK-S2-ICT 1A−4 4
13. Which of the following are descriptions of information literate people?
14. Which of the following statements about Artificial Intelligence (AI) are correct?
15. Which of the following statements about file access modes are correct?
16. In Object Linking and Embedding (OLE), which of the following events will not cause a linked object to
fail?
$
宣傳成本(線上、線下) 1,500
薪資(3 名職員) 36,000
會計服務、行政支出 500
15% 應急儲備 9,300
運輸成本 3,000
應用程式伺服器維護成本 1,500
購入波卡西 200 公斤 4,500
廚餘處理成本 6,000
每月支出 62,300
Which of the following word processing functions can help Anson produce the above budget?
(1) Tables
(2) Tab stops
(3) Borders
18. Albert uses MP4 format instead of AVI format when recording video for a school’s open day. What are the
benefits of this?
19. Which of the following is the main disadvantage of distributed processing systems?
2024-MOCK-S2-ICT 1A−6 6
20. Which of the following can be the attributes of a typical font face?
(1) Strikethrough
(2) Kerning (space between characters)
(3) Bold
(4) Color
21. Which of the following statements about the MIDI format are correct?
(1) For the same recording, a MIDI file must take up less storage space than an MP3 file.
(2) MIDI files can store vocals (a part of a piece of music that is sung).
(3) MIDI files are suitable for music composers, as the instruments can be changed.
22. Which of the following concerning computer components to upgrade is an incorrect match?
24. Which of the following statements about the LAN are correct?
26. In a computer in which all memory addresses and data are 8-bit, the statement ‘A A + B’ can be
represented by the assembly instruction ADD 1000 0000, 1000 0001 where the contents of A
and B are stored in the memory addresses 1000 0000 and 1000 0001 respectively.
Which of the following CPU components will be involved when executing the assembly instruction ADD?
(1) AX (accumulator)
(2) ALU (arithmetic logic unit)
(3) PC (program counter)
27. NUM is an integer array with N values. What is the purpose of the following algorithm?
A 0
B 0
FOR i FROM 1 TO N DO
IF NUM[i] > B then
B NUM[i]
IF B > A then
A A + B
B A – B
A A – B
OUTPUT A, B
2024-MOCK-S2-ICT 1A−8 8
28. NUM is an integer array with n values. What is the purpose of the following algorithm?
INPUT T, i
a i + 1
WHILE (NUM[a - 1] is not empty) AND (a <= n) DO
NUM[a] NUM[a - 1]
a a + 1
NUM[i] T
29. NUM is an integer array sorted in ascending order with N values. An array A is also used. X represents
the number of elements in A. What is the purpose of the following algorithm?
TEMP 0
C 0
FOR I FROM 1 TO N DO
IF NUM[I] <> TEMP THEN
C 0
TEMP NUM[I]
C C + 1
A[C] NUM[I]
OUTPUT A[X]
INPUT X
A 3
B 0
C 2
D 0
E 3
WHILE (E <= X) DO
D A + B
A B
B C
C D
E E + 1
OUTPUT C
A. 5
B. 7
C. 10
D. 12
INPUT A
FOR I FROM 1 TO A DO
IF (remainder of (I / 3) = 0) AND (remainder of (I / 5) = 0) THEN
OUTPUT "FUZZ"
IF (remainder of (I / 3) = 0) THEN
OUTPUT "FIZZ"
IF (remainder of (I / 5) = 0) THEN
OUTPUT "BUZZ"
A. 13
B. 14
C. 15
D. 16
2024-MOCK-S2-ICT 1A−10 10
Answer Questions 34, 35 and 36 with reference to the following algorithm, where A is a positive integer variable.
INPUT A
WHILE (A > 0) DO
IF (A is an odd number) THEN
A A * 3 + 1
ELSE
A A / 2
OUTPUT A
A. 67
B. 101
C. 202
D. 304
35. Which of the following statements regarding the algorithm are correct?
36. If A is only guaranteed to be any string variable, and will be converted to a positive integer afterwards,
which of the following data validation methods may be used to best ensure no runtime error occurs?
37. Which of the following could be legal consequences of copyright infringement in Hong Kong?
(1) Fine
(2) Suspension / termination of online account(s)
(3) Imprisonment
(1) Private modes of most web browsers cannot be used with VPNs.
(2) One can still log into their personal accounts in private mode.
(3) Even in private mode, your Internet Service Provider (ISP) still has access to your information.
39. Which of the following practices can have a long-term positive effect on health?
END OF SECTION A
2024-MOCK-S2-ICT 1A−12 12