Universiti Teknologi Mara Final Examination: Confidential CS/SEP 2011/CSC133/134
Universiti Teknologi Mara Final Examination: Confidential CS/SEP 2011/CSC133/134
CS/SEP 2011/CSC133/134
INSTRUCTIONS TO CANDIDATES 1. This question paper consists of three (3) parts PART A (40 Questions) PART B (9 Questions) PART C (3 Questions)
2.
Answer ALL questions from PART A and PART B and TWO (2) questions from PART C: i) ii) Answer PART A in the Objective Answer Sheet. Answer PART B and PART C in the Answer Booklet. Start each answer on a new page.
3. 4.
Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of: i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty
CONFIDENTIAL
CS/SEP 2011/CSC133/134
1. The four steps of information system are A. B. C. D. Input -> Process -> Outputs Storage Data collection -> Output -> Input -> Process Process -> Input -> Output -^Storage Input -> Storage Output ^Retrieve
2. Below are categories of computers EXCEPT A. B. C. D. 3. Game Consoles Embedded Computer Supercomputer Server
is a series of related instructions, organized for a common purpose to tell the computer what task to perform. A. B. C. D. Data Information Software Peripheral
4. Which of the following is NOT the aspect of computer literacy? A. B. C. D. 5. A. B. C. D. Computer Computer Computer Computer
:
definition application usage language is a case that contains electronic components used to process data.
6. The component of the processor that directs and coordinates most of the operations in the computer is A. B. C. D. Arithmetic logic unit Control unit Input device Memory
CONFIDENTIAL
CONFIDENTIAL
CS/SEP 2011/CSC133/134
7. Below are the basic operations of a processor in machine cycle EXCEPT A. B. C. D. Fetching Storing Decoding Deleting
8. The processor relies on a small quartz crystal circuit called A. B. C. D. System circuit Digital clock Computer chip System clock
9. Which of the following statement is TRUE? A. B. C. D. 10. A. B. C. D. Most computers are analog Binary system is a number system that has three unique digits The smallest unit of data the computer can process is called bit The digit 0 represents the electronic state of ON refers to memory chips storing permanent instructions. ROM (Read Only Memory) Flash Memory RAM (Random Access Memory) Cache .
11. Two examples of input devices are A. B. C. D. Keyboard, Printer Printer, Mouse Scanner, Monitor Joystick, Scanner
12. Mobile computers and mobile device often have built in A. B. C. D. CRT LCD LED Plasma
screens.
13. Which of the following description of printer is NOT TRUE? A. A printer is an output device that produces text and graphics on physical medium. B. A nonimpact printer forms character and graphics on a piece of paper without actually striking the paper. C. Printer resolution is measured by the number of kilobytes per second. D. Photo printer is a colour printer that produces photo lab quality pictures.
CONFIDENTIAL
CONFIDENTIAL
CS/SEP 2011/CSC133/134
14. Arrange the following steps on how a hard disk works in correct orders. i. Head of actuator positions the read/write head arms over the correct location on the platter to read/write data ii. A small monitor spins the platter while the computer is running iii. Read/write heads determine the current or new location when software request disk access iv. Circuit board controls the movement of the head actuator and a small motor A. B. C. D. 15. A. B. C. D. 16. CD-R CD-ROM CD-RW DVD-ROM i,ii, iii, iv ii, iii, iv, i iv, ii, iii, i iii, ii, i, iv is an erasable multisession disc, which you can write on it multiple times.
is a credit card, entertainment card, bank card or other similar card with a stripe that can contain information identifying you and the card. A. B. C. D. Microfiche Digital High Capacity Card (SDHC) Smart card Magnetic stripe card indicates how much a particular medium can hold data and
18. The operating system that a computer uses sometimes is called the A. B. C. D. System software User interface Software platform Application software
19. When turning on a computer that has been powered off completely, you are performing
A. B. C. D.
CONFIDENTIAL
5 .
CS/SEP 2011/CSC133/134
20. Network Attached Storage (NAS) is A. B. C. D. 21. of its input". A. B. C. D. Bad data, Bad info (BDBI) Nothing ventured, Nothing gained (NVNG) Garbage in, Garbage out (GIGO) What you see is what you get (WYSIWYG)
a group of two or more integrated hard disk. a server connected to a network with a sole purpose of providing storage. separate hard disk that connect with a cable to a USB port or wirelessly. internet service that provides hard disk storage to computer users. refers to "the accuracy of a computer's output depends on the accuracy
22. Compared with relational databases, object-oriented databases A. B. C. D. can store more types of data access data faster allow programmers to reuse objects all of the above .
23. A byte corresponds to A. 4 bits B. 8 bits C. 16 bits D. 32 bits 24. A computer processes is defined as A. B. C. D. data to information information to data data to instruction instruction to data
25. All of the following are advantages of using computers EXCEPT A. B. C. D. speed impact on labor force communication consistency .
26. Two categories of software are A. B. C. D. operating system and system software system software and utility programs utility programs and operating system system software and application software
CONFIDENTIAL
CONFIDENTIAL 27. For a large computing network, the A. B. C. D. bus star ring hub
CS/SEP 2011/CSC133/134
28. Computer converts all types of data to A. B. C. D. 29. A. B. C. D. letters numbers from 0 to 9 letters, digit and symbols zeros and ones
before processing.
is the main component of system software. Device drivers Application software Utility programs Operating system
30. Specialized software that allows input and output devices to communicate with the computer system is the . A. B. C. D. utility programs defragmentation software service programs device drivers
31. This kind of wire channel consists of dozens or hundreds of thin strands of glass or plastic that transmits pulsating beams of light. A. B. C. D. Fiber-optic Twisted-pair Coaxial Broadband
32. Which of the following symptoms is NOT shown by a computer that has been infected by virus and worm? A. B. C. D. Operating system run much slower than usual Available memory is much than expected System properties change Disk defragmentation and virus scan starts randomly.
33. Which of the following is used as safeguards against information theft? A. B. C. D. Physical access controls such as locked doors and windows. Username and password Encryption process Surge protector CONFIDENTIAL
CONFIDENTIAL
CS/SEP 2011/CSC133/134
34. The following are true statements that describe a router EXCEPT A. B. C. D. A router can be used on any size of network A router is a communication device that connects multiple computers Routers are protected by hardware firewall A router for computers and devices is in the form of a USB network adapter
35. Which of the following is NOT the type of memory card? A. B. C. D. Compact Flash (CF) Secure Digital High Capacity (SDHC) Memory stick Solid State Card (SSC)
36. Which type of printers uses heat elements to produce images on heat-sensitive paper? A. B. C. D. Laser printer Ink-jet printer Thermal printer Dot-matrix printer
37. The quality of an LCD monitor depends on the following factors EXCEPT A. B. C. D. 38. A. B. C. D. Screen Radiation Screen Resolution Brightness Pixel Pitch develops and maintains Web sites and Web resources. Webmaster Crytographer Software engineer System analyst .
A. send data one bit at one time and often used to connect mouse and keyboard to the system unit B. send data one bit at a time and often used to connect printers to the system unit C. send data eight bits simultaneously and often used to connect mouse and keyboard to the system unit D. send data eight bits simultaneously and often used to printers to the system unit 40. Which of the following is NOT one of the features of a spreadsheet software? A. B. C. D. Formulas Query Labels or text entries Functions CONFIDENTIAL
CS/SEP 2011/CSC133/134
QUESTION 1 Briefly explain TWO (2) differences between midrange computer and supercomputer. (4 marks)
QUESTION 3 There are several categories of application software. Some software companies allow you to download their software from the Internet, install in your computer, and run it for an initial period without having to pay for it. Define the type of software application mention above and list any advantage of having the type of software. (4 marks)
QUESTION 5 Define TWO (2) characteristics to distinguish between primary storage and secondary storage. (4 marks)
QUESTION 6 Productivity software is designed to make people more effective and efficient while performing daily activities. Briefly explain the function for each of the following software application. a) b) c) d) e) Word processing Spreadsheet Database Presentation graphic Project management (10 marks) CONFIDENTIAL
CONFIDENTIAL
CS/SEP 2011/CSC133/134
QUESTION 9 Briefly describe any THREE (3) types of Operating System. (6 marks)
CONFIDENTIAL
10
CS/SEP 2011/CSC133/134
Choose only TWO (2) questions and answer in the answer booklet provided.
QUESTION 1 From January 1, 2009 to December 31, 2009 the Internet Crime Complaint Center (IC3) Web site received 336,655 complaint submissions. This was a 22.3% increase as compared to 2008 when 275,284 complaints were received. Of the 336,655 complaints submitted to IC3, 146,663 were referred to local, state, and federal law enforcement agencies around the country for further consideration. The vast majority of referred cases contained elements of fraud and involved a financial loss by the complainant. It is not safe to use the Internet if you are not aware of potential problems and don't take preventative measures. Discuss in detail on how to protect your data and information on the Internet. (10 marks) QUESTION 2 The computer does its primary work in a control center that converts data input to information output. This control center is called central processing unit (CPU). By using a diagram, explain how the CPU processes data. (10 marks)
QUESTION 3 An information system is being purposely-designed for the Association. It will be used to manage a very large amount of members, so that information about members can be added, any TWO (2) database models that can be implemented for the Malaysian Underwater Surf data about the association's deleted and edited. Discuss information system. (10 marks)
CONFIDENTIAL