Atp Ict Mock 4 2-1a

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

2024-MOCK-S2

ICT
PAPER 1 @youtubeatp_ict
(SECT A)
HONG KONG DIPLOMA OF SECONDARY EDUCATION EXAMINATION 2024

INFORMATION AND COMMUNICATION TECHNOLOGY PAPER 1


2024 Mock (Set 2)

8:30 am – 10:30 am (2 hours)


This paper must be answered in English

GENERAL INSTRUCTIONS

1. There are two sections, A and B, in this Paper.

2. Section A consists of multiple-choice questions in this question paper. Section B contains


conventional questions printed separately in the Question-Answer Book.

3. Answers to Section A should be marked on the Multiple-choice Answer Sheet. Answers to Section
B should be written in the spaces provided in the Question-Answer Book. The Answer Sheet for
Section A and the Question-Answer Book for Section B must be handed in separately at the
end of the examination.

INSTRUCTIONS FOR SECTION A (MULTIPLE-CHOICE QUESTIONS)

1. Read carefully the instructions on the Answer Sheet. After the announcement of the start of the
examination, you should first stick a barcode label and insert the information required in the spaces
provided. No extra time will be given for sticking on the barcode label after the ‘Time is up’
announcement.

2. When told to open this book, you should check that all the questions are there. Look for the words
‘END OF SECTION A’ after the last question.

3. All questions carry equal marks.

4. ANSWER ALL QUESTIONS. You are advised to use an HB pencil to mark all the answers on the
Answer Sheet, so that wrong marks can be completely erased with a clean rubber. You must mark
the answers clearly; otherwise you will lose marks if the answers cannot be captured.

5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.

6. No marks will be deducted for wrong answers.

 Yo uT ub e AT P 保留版權 Not to be taken away before the


YouTubeATP end of the examination session
All Rights Reserved 2024

2024-MOCK-S2-ICT 1A−1 1
There are 40 questions in this paper. Choose the most suitable answers.

1. A toy company provides an online service for customers to pre-order toys and pay deposit via credit card.
What information should customers input?

(1) Customers’ credit card information


(2) Customers’ bank account number
(3) Details of toy to pre-order
(4) Date on which the toy is released

A. (1) and (2) only


B. (1) and (3) only
C. (2), (3) and (4) only
D. (1), (2), (3) and (4)

2. What is the maximum number of devices that MAC addresses can represent?

A. 212
B. 216
C. 1612
D. 1616

3. Refer to the pseudocode snippet below. Which of the following data validation methods is this most likely
the algorithm of? (Assume x is a non-null integer variable.)

if (x = 2) OR (x = 3) then

A. Type check
B. Fixed value check
C. Range check
D. Format check

4. Which of the following image file formats can contain multiple images in one file?

(1) PNG
(2) JPG
(3) TIFF
(4) PDF

A. (3) only
B. (4) only
C. (3) and (4) only
D. (1), (2) and (3) only

5. Which of the following statement(s) about the parity check is/are correct?

(1) Parity checks can detect any type of error.


(2) Parity checks can correct errors of up to one corrupted bit.
(3) If a parity bit is incorrect, it must indicate that the data bits are corrupted.

A. (3) only
B. (1) and (2) only
C. (2) and (3) only
D. None of the above

2024-MOCK-S2-ICT 1A−2 2
6. The following statements are known to be true.

• If Cherry fails her ICT test, she did not study.


• If Cherry loses the CTF competition or studies, she will be sad.
• If Cherry wins the CTF competition, she did not study.

Which of the following statements must also be true?

(1) If Cherry passes her ICT test, she studied.


(2) Cherry can pass her ICT test and win the CTF competition at the same time.
(3) If Cherry fails her ICT test, she is not sad.

A. (1) only
B. (1) and (2) only
C. (1), (2) and (3)
D. None of the above

7. A school has 10 550 students. Because of layout limitations, the length of the student ID should not exceed
4 characters. The school principal also wants the student ID to take up as little storage as possible. Which
of the following sets of characters should the student ID use?
(You do not need to account for any potential expansion of the school.)

A. The uppercase English alphabets


B. The digits from 0 to 9
C. ASCII characters
D. Characters in UTF-8

8. Which of the following statements about the 9-bit two’s complement representation is/are correct?

(1) The decimal number +256 cannot be represented, as the representation has already been taken by
the decimal number −256.
(2) The range of decimal numbers that can be represented is from −256 to +255.
(3) The operation 1 1100 0110 – 1 0011 1000 (both numbers in 9-bit two’s complement
representation) results in an overflow error.

A. (1) only
B. (2) only
C. (3) only
D. (1), (2) and (3)

2024-MOCK-S2-ICT 1A−3 3 Go on to the next page


9. Consider the database table ORDERS for a school’s charity one-off sale. Each student may only make
one order. Part of its records are shown below.

ORDERS
CLASS CLASSNO CNAME ENAME QUANTITY
6B 32 曾大明 Tsang Tai Ming 400
4A 10 王堅心 Kinsum Huang 260
4A 6 陳大文 Chan Tai Man 100
3B 15 黃一心 Wong Yat Sum 280

Which of the following can be (a) possible primary key(s) for ORDERS?

(1) ENAME
(2) CLASS + CLASSNO
(3) CLASS + CLASSNO + ENAME + QUANTITY

A. (1) only
B. (2) only
C. (2) and (3) only
D. (1), (2) and (3)

10. Which of the following spreadsheet formulae cannot return a string?

A. VLOOKUP
B. FIND
C. LEFT
D. MID

11. Consider the text below:

世上無難事

The above text (as Unicode) has to be sent every 5 seconds. What is the minimum data transmission rate
required?

A. 8 bps
B. 16 bps
C. 32 bps
D. 64 bps

12. Which of the following are common specifications for a home-use all-in-one printer?

(1) RJ-45 slot


(2) Automatic duplex printing (printing on both sides of a sheet of paper)
(3) 4 800 × 1 200 dpi

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2024-MOCK-S2-ICT 1A−4 4
13. Which of the following are descriptions of information literate people?

(1) They can use information ethically and legally.


(2) They question the source of their information.
(3) They create new knowledge by transmitting data.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

14. Which of the following statements about Artificial Intelligence (AI) are correct?

(1) AI can perform data analysis.


(2) AI can write credible essays.
(3) AI can provide personalised advice.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

15. Which of the following statements about file access modes are correct?

(1) Direct access must be faster than sequential access.


(2) Direct access is commonly used in optical discs.
(3) Both file access modes involve the organisation of memory.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

16. In Object Linking and Embedding (OLE), which of the following events will not cause a linked object to
fail?

A. The target file is moved.


B. The object file is moved along with the target file.
C. The file extension of the object file is changed.
D. The object file is removed.

2024-MOCK-S2-ICT 1A−5 5 Go on to the next page


17. Anson created the following budget for a competition:

$
宣傳成本(線上、線下) 1,500
薪資(3 名職員) 36,000
會計服務、行政支出 500
15% 應急儲備 9,300
運輸成本 3,000
應用程式伺服器維護成本 1,500
購入波卡西 200 公斤 4,500
廚餘處理成本 6,000

每月支出 62,300

Which of the following word processing functions can help Anson produce the above budget?

(1) Tables
(2) Tab stops
(3) Borders

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

18. Albert uses MP4 format instead of AVI format when recording video for a school’s open day. What are the
benefits of this?

(1) MP4 supports streaming.


(2) MP4 is an uncompressed format.
(3) MP4 supports subtitles.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

19. Which of the following is the main disadvantage of distributed processing systems?

A. Adds burden to traffic among computers


B. Less efficient resource management
C. Lower computation performance than an individual computer
D. Less fault-tolerant

2024-MOCK-S2-ICT 1A−6 6
20. Which of the following can be the attributes of a typical font face?

(1) Strikethrough
(2) Kerning (space between characters)
(3) Bold
(4) Color

A. (2) and (3) only


B. (3) and (4) only
C. (2), (3) and (4) only
D. (1), (2), (3) and (4)

21. Which of the following statements about the MIDI format are correct?

(1) For the same recording, a MIDI file must take up less storage space than an MP3 file.
(2) MIDI files can store vocals (a part of a piece of music that is sung).
(3) MIDI files are suitable for music composers, as the instruments can be changed.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

22. Which of the following concerning computer components to upgrade is an incorrect match?

Situation Component to upgrade


A. The computer cannot run a graphic-intensive game smoothly. GPU
B. Algorithms to compute the sum of an array run slowly. CPU
C. The computer cannot run many programs simultaneously. RAM
D. The computer stutters when watching videos online only. GPU

23. Which of the following statements are correct?

(1) The Internet can be classified as a WAN.


(2) IPv6 has not completely replaced IPv4.
(3) If one loses access to a DNS server, they lose Internet connectivity.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

24. Which of the following statements about the LAN are correct?

(1) LANs must contain at least one router.


(2) A LAN must be contained in the same geographical area.
(3) WiFi is a common connection method seen in LANs.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2024-MOCK-S2-ICT 1A−7 7 Go on to the next page


25. Albert visits a science web site through a web browser. Which of the following protocols must be
involved?

(1) HTTP / HTTPS


(2) IP
(3) DNS

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

26. In a computer in which all memory addresses and data are 8-bit, the statement ‘A  A + B’ can be
represented by the assembly instruction ADD 1000 0000, 1000 0001 where the contents of A
and B are stored in the memory addresses 1000 0000 and 1000 0001 respectively.

Which of the following CPU components will be involved when executing the assembly instruction ADD?

(1) AX (accumulator)
(2) ALU (arithmetic logic unit)
(3) PC (program counter)

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

27. NUM is an integer array with N values. What is the purpose of the following algorithm?

A  0
B  0
FOR i FROM 1 TO N DO
IF NUM[i] > B then
B  NUM[i]
IF B > A then
A  A + B
B  A – B
A  A – B
OUTPUT A, B

A. To find the largest value in NUM.


B. To find the largest two values in NUM.
C. To sort the values in NUM in ascending order.
D. To sort the values in NUM in descending order.

2024-MOCK-S2-ICT 1A−8 8
28. NUM is an integer array with n values. What is the purpose of the following algorithm?

INPUT T, i
a  i + 1
WHILE (NUM[a - 1] is not empty) AND (a <= n) DO
NUM[a]  NUM[a - 1]
a  a + 1
NUM[i]  T

A. To insert T into NUM in index i.


B. To insert i into NUM in index T.
C. To remove NUM[T] and store it in i.
D. To remove NUM[i] and store it in T.

29. NUM is an integer array sorted in ascending order with N values. An array A is also used. X represents
the number of elements in A. What is the purpose of the following algorithm?

TEMP  0
C  0
FOR I FROM 1 TO N DO
IF NUM[I] <> TEMP THEN
C  0
TEMP  NUM[I]
C  C + 1
A[C]  NUM[I]
OUTPUT A[X]

A. To find the mean in NUM.


B. To find the mode in NUM.
C. To find the median in NUM.
D. To find the maximum in NUM.

30. If the input is 6, what is the output of the following algorithm?

INPUT X
A  3
B  0
C  2
D  0
E  3
WHILE (E <= X) DO
D  A + B
A  B
B  C
C  D
E  E + 1
OUTPUT C

A. 5
B. 7
C. 10
D. 12

2024-MOCK-S2-ICT 1A−9 9 Go on to the next page


31. If the input is 46, how many “FIZZ” will be output?

INPUT A
FOR I FROM 1 TO A DO
IF (remainder of (I / 3) = 0) AND (remainder of (I / 5) = 0) THEN
OUTPUT "FUZZ"
IF (remainder of (I / 3) = 0) THEN
OUTPUT "FIZZ"
IF (remainder of (I / 5) = 0) THEN
OUTPUT "BUZZ"

A. 13
B. 14
C. 15
D. 16

32. Which of the following are human errors?

(1) Transcription error


(2) Runtime error
(3) Logic error

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

33. Which of the following pairs of worst-case time complexities is correct?

Bubble sort Binary search


A. O(1) O(1)
B. O(n 2 ) O(log n)
C. O(n )2
O(n)
D. O(n )2
O(1)

2024-MOCK-S2-ICT 1A−10 10
Answer Questions 34, 35 and 36 with reference to the following algorithm, where A is a positive integer variable.

INPUT A
WHILE (A > 0) DO
IF (A is an odd number) THEN
A  A * 3 + 1
ELSE
A  A / 2
OUTPUT A

34. If the input is 67, what is the third output?

A. 67
B. 101
C. 202
D. 304

35. Which of the following statements regarding the algorithm are correct?

(1) The algorithm must result in an infinite loop.


(2) The algorithm should not be rewritten using a FOR-loop.
(3) For some input values of A, a runtime error may occur.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

36. If A is only guaranteed to be any string variable, and will be converted to a positive integer afterwards,
which of the following data validation methods may be used to best ensure no runtime error occurs?

A. Fixed value check


B. Range check
C. Format check
D. Presence check

37. Which of the following could be legal consequences of copyright infringement in Hong Kong?

(1) Fine
(2) Suspension / termination of online account(s)
(3) Imprisonment

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

2024-MOCK-S2-ICT 1A−11 11 Go on to the next page


38. Which of the following are reasons why a web browser’s private mode does not make one anonymous
online?

(1) Private modes of most web browsers cannot be used with VPNs.
(2) One can still log into their personal accounts in private mode.
(3) Even in private mode, your Internet Service Provider (ISP) still has access to your information.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

39. Which of the following practices can have a long-term positive effect on health?

(1) Switch from a normal desk to a standing desk.


(2) Take breaks regularly.
(3) Use an ergonomic chair.

A. (1) and (2) only


B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)

40. Which of the following statements about types of software is incorrect?

A. Open-source software have copyright.


B. Open-source software can be more secure as the public can seek out vulnerabilities in the code.
C. Paid software must be closed-source.
D. Restarting the trial period of a piece of shareware is not an infringement on copyright.

END OF SECTION A

2024-MOCK-S2-ICT 1A−12 12

You might also like