You are on page 1of 5

ANSWER SCHEME

MID YEAR ICT FORM 4


SECTION A
NAME
IC NO
Question No
1
2
3
4
i)
ii)
5
6
7
8
i)
ii)
iii)
9
10
11
i)
ii)
12
i)
ii)
13
i)
ii)
iii)
14
15
16
i)
ii)
iii)
17
18
19
20
21
22
23
i)
ii)
iii)
24
25

Form
Candidates Answer
B
B
True
Hand Geometry Scanning
Facial Recognition
D
B
D
B
D
C
True
D
False
True
220 or 1048576 (choose either one only)
Bit
A
B
D
C
B
D
C
A
C
False
Blue-ray disc
False
C
Managing data and programs
K
L
N
A
B
TOTAL MARKS

Skor
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

QUES
QUESTIONS
NO
26
a.
Based on statement above,
list TWO controversial
contents from the impact
of ICT on society.
b.
State TWO impacts of one
controversial contents in
(a) to Malaysian society.

27

a.
Name and explain the type
of computer crime that
Shen has committed.
b.
What was happened to
Shens computer? How
can Shen prevent his
computer from the
problem?

ANSWER
Pornography
Slander

Pornography
Can lead criminal acts
Can lead sexual addiction/Can lead
sexual addiction/perversion
Can develop low moral value towards
other man, women, children
Can erode good religious, cultural and
social beliefs and behaviour
OR
Slander
Can develop into society that
disregards honesty and truth.
Can develop bad habit of spreading
untruths and rumours
Can lead to unnecessary argument
Can cause people to have negative
attitudes towards another person
(choose either TWO impacts from
Pornography OR TWO impact from
Slander. One answer carry ONE
mark)
Copyright Infringement.
Involves illegal copy or reproduction
of copyrights materials by the black
market group
Computer virus.
Install anti-virus software/ scan files
for viruses before downloading.

SCORES
1m
1m

1m
1m

1m
1m

1m
1m

1m
1m

28

29

30

a.
Describe why does Mohan
encrypt the report?

To secure the information


To make sure only the authorized
person can read the information

1m
1m

b.
What is the term given to
the encrypted text in the
report?

Encryption key and decryption key


Cipher text

1m
1m

a.
What is R? Explain the
function of R?

Output.
Output is data that has been processed
into a useful form called information

1m
1m

b.
R have four types. State
TWO types of R.

Texts, graphics, audio, video


(choose any two answer)

2m

a.
Name types of user
interface for X and Y.

X- Command line
Y- Graphical User Interface

1m
1m

b.
State TWO differences
between X and Y.

X
User have to
memories all the
syntax to issues
command

Y
User have not to
memories all the
syntax to issue
command

1m

1m
Difficult to use

Easy to use.

Not user friendly User friendly.


(choose two differences ONLY and
compare the answer in same aspect )

1m

31

a.
Proposed ONE of the
latest technology that can
be use by Cikgu Rose to
conduct her lesson
although she is attending
the course.

b.
Identify TWO input
devices and ONE output
device that you justify in
(a).
32

a.
Name X, Y, and Z

Video conferencing or Voice Over


Internet Protocol (VOIP) or any
related answer

1m

ability to meet with people in remote


locations without incurring travel
expenses or other expenses associated
with face to face communication
easily accessed and contacted using
video conferencing
can stimulate better brainstorming,
knowledge sharing and information
gathering

1m

1m
1m

( or any related answers)


Input devices : Web cam, microphone
Output devices : Speaker, monitor
(choose either one for output devices)

2m
1m

X: Mobile users
Y: SOHO users
Z: Power users

1m
1m
1m

b.
Explain how users in Y works.
i)

use desktop or notebook computers as


well as telephone, hand phones and
PDAs in completing their tasks and
communicating

1m

ii)

work in a small company or work as


an individual at home

1m

iii)

They advertise their products and


services through websites
SOHO also have their own basic
business software such as word
processing and spreadsheet software
to assist them in documents
preparation and their financial tasks.

1m

iv)

1m

33

a.
Explain the TWO function
of ASCII and describe the
ASCII working process in
the computer system.

Function of ASCII
ASCII was established to achieve
1m
compatibility between various types of
data processing equipment making it
possible for the components to
communicate with each other
successfully.
ASCII enables manufactures to
1m
produce components that are assured
to operate correctly in a computer.
ASCII working process:
Every character is converted to its
corresponding binary form. The
computer processes the letter as a
byte, which actually a series of on and
off of electrical states. When the
computer is finished processing the
byte, the software installed in the
system convert the byte back which is
then displayed in the screen.

b.
Explain the relationship of
data representation for bit,
byte and character.

2m

A bit is the smallest unit of data and


represented by the number 1 and 0.

1m

Byte is a unit of information built


from bits. One byte equals to 8 bits.

1m

One byte represents one character


such as A,7,9 and +

1m

You might also like