Professional Documents
Culture Documents
Tingkatan 2
14 Oktober 2008
1 jam
ICTL
TINGKATAN 2
1 jam
Instruction:
Answer all questions in this question paper.
1. Data inside a table of database is arranged by column name _______ and row
named ________.
A. Record, field
B. Field, record
C. Record, form
D. Field, bar
3. Suppose you'd like to set up a table in Microsoft Access to monitor your growing
collection of DVDs. In that table, each DVD will be entered as a:
A. record.
B. long integer.
C. Column
D. field
C. Double
D. Boolean
5. Rosnah want to store the name, address and telephone number of all my friends. What
type of application program should Rosnah use?
A. Database
B. Word Processor
C. Graphics Program
D. Browser
Figure 1
9. Based on the network illustrated in Figure 1, the central device that provides a
common connection point for nodes in the network is called ___________________ .
A. hub
B. printer
C. file server
D. personal computer
A. I, II, III
B. I, II, IV
C. II, III, IV
D. All of the above
C. devices attached or detached at any point on the bus disrupt the rest of the
network
D. all of the above statements are true about risk to a bus network
12. A _____ is a high-speed network that connects networks in an area such as a
city or town and handles the bulk of communications activity across that region.
A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Metropolitan Area Network (MAN)
D. Variable Area Network (VAN)
14. Each electronic document on the Web is called a _____________ which can contain
text, graphics, audio and video.
A. World Wide Web
B. Unified Resource Locator
C. Web page
D. Web browser
X consists of all computers and other devices that are connected in a loop.
In X network each node directly connects to two neighboring nodes.
X network can be found in Local Area Networks.
C. Ring
D. Hybrid
16. From the list below, which elements are required to form complete address or
Uniform Resource Locator (URL)?
I. Hypertext Markup Language
II. Protocol
III. Domain
IV. Directory
V. Document name
19. Identify which types of application software that enables users to create, edit, format
and print textual documents.
A. Graphic
7
B. Presentation
C. Spreadsheet
D. Word Processing
20. You want to get connected to the Internet. Which component that will allow you to
so?
A. Random Access Memory
B. Network Interface Card
C. Digital Versatile Disk
D. Chipset
SECTION B
Write True (T) or False (F) for the following statements
(Question 21 – 25) 10 marks
21. We need computer ethics and laws to guide users from misusing the computer.
Selling pirated software to a friend is an example of law breaking conduct. ________
22. A network links two or more computers together to enable data and resource
exchange. __________
23. User can send e-mail to friends in other countries using LAN. ___________
24. Netiquette is internet etiquette which someone will show bad behavior while using
internet. __________
25. Using search engines required us to spend much time to find the information that we
need. __________
8
SECTION C
Match the picture of network hardware component to their correct names below.
(Question 26) 10 marks
Modem/Switch/Hub
Network Cable
Wireless Access
Point
Network Interface
Card
9
Wireless Network
Interface Card
SECTION D
Fill in the blanks with the suitable answer.
(Question 27 – 37) 40 marks
27. Ali connects three computers in his office. The type of network that he used is called
a _______________________________. Ali’s customer, David who lives in
Singapore connects his computer to Ali’s new networks. This type of network is
called ______________________________ .
28. ____________________ refers to any laws relating to protecting the Internet and
other online communication technologies.
c) Coding
d) _______________________
e) Documentation
Figure 2
Name
the
topology.
a) A - ____________________________
b) B - ____________________________
c) ___________________________