0% found this document useful (0 votes)
11 views

Text

Uploaded by

yuanting0407
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Text

Uploaded by

yuanting0407
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Can you help me to set some questions follow the below and give me the model answer

showing how should my answer steps be like.


In my model answer there may have a “1” after them, which is meaning the mark
Section A
There are 20 questions in this section. Choose the best answer for each question.
1. Which of the following involves the conversion between analog and digital data?
A. Editing a word document.
B. Retrieving data from a database.
C. Printing out a document.
D. Copying a file from hard disk to a USB flash drive.
2. Jeff is inputting data into a database. He misread O5 as 05. Which type of error
is this?
A. Data source error.
B. Transcription error.
C. Transposition error.
D. Logic error.
3. A database receives data through a form. A field “SEX” only contains two values,
“M” and “F”. Given that the field
must not (1) (2) (3)
A. (1)
B. (2)
C. (1)
be empty, which of the following validation checks should be used? Fixed value
check
Consistency check
Presence check
only
only
and (3) only
D. (1), (2) and (3)
4. A shop has to represent 70000 products. At least how many bytes are required to
represent all of the different products?
A. 2 B. 3 C. 4 D. 5
2023-24-S4 1st term test-ICT 1A
2

5. A company uses a database to store product records. In each record, 10 bytes are
used to store the product name
and 2 bytes are used to store the product ID. How many different records can the
database support?
A. 210
B. 212
C. 216
D. 296
6. Which of error?
(1) (2) (3)
A. (1)
B. (2)
C. (1)
D. (2)
7. Which of
(1) (2) (3)
A. (2)
B. (3)
C. (1)
D. (1)
the following operations of numbers in 8-bit two’s complement representation will
result in an overflow
1001 0101 + 1110 1011 0110 1101 + 0011 0111 0010 1011 + 1010 0101
only
only
and (3) only and (3) only
the following character encoding scheme is/are used in the text file below?
ASCII Big-5 code GB code
only
only
and (2) only and (3) only
Information and Communication Technology
資訊及通訊科技
8. Tom has 4 files of the same file size. He compresses them to ZIP files. Which of
the following compressed files has the least difference in file size from the
original file?
Original file
A. A.avi
B. B.bmp
C. C.wav
D. D. jpg
Compressed file
A.zip B.zip C.zip D.zip
2023-24-S4 1st term test-ICT 1A
3

9. A parity check is used when transferring data. Which of the following received
codes is invalid?
A. 0010 1011
B. 1011 0111
C. 0110 1011
D. 1000 0001
10. The following shows a way to input the due date for a homework set in a Google
Classroom.
What are (1) (2) (3)
A. (1)
B. (1)
C. (2)
the benefits of using this way to input the due date? It can prevent invalid date
input.
The input data can be error-free.
It can simplify the user input.
and (2) only. and (3) only. and (3) only.
D. (1), (2) and (3).
11. Peter is transferring his video files to a hard disk. Which of the following
file formats should he use for the videos such that he can store as many videos as
he can?
A. AVI
B. MP3
C. BMP
D. MP4
12. Which of the following will affect the quality of a video file?
(1) (2) (3)
Frame size Colour depth Frame rate
A. (1)
B. (2)
C. (1)
D. (1), (2) and (3)
only
only
and (3) only
2023-24-S4 1st term test-ICT 1A
4

13. Which of the following statements about images is correct?


A. JPG uses lossless compression.
B. GIF can support up to 8-bit colour depth.
C. BMP supports animation.
D. AI is a file format of bitmap graphics.
14. Which of the following are typical functions provided by an operating system?
(1) File management
(2) Process management
(3) Hardware management
(4) Virus detection
A. (1), (2) and (3) only
B. (1), (2) and (4) only
C. (1), (3) and (4) only
D. (2), (3) and (4) only
15. Which of the following statements about Unicode is correct?
A. It does not support emojis.
B. The size of a character in Unicode must be 4 bytes.
C. It supports traditional Chinese.
D. It does not support simplified Chinese.
16. A spreadsheet uses 64 bits to store an integer and 1 byte to store a character.
How many bytes are needed to store the string “30 eggs!”?
A. 7
B. 8
C. 13
D. 21
2023-24-S4 1st term test-ICT 1A
5

17. Which of the following can be the specification(s) of a scanner?


(1) (2) (3)
1GB DDR4 Memory 802.11ac Wi-Fi
3840 x 2160 resolution
A. (1)
B. (1)
C. (2)
D. (1), (2) and (3)
and (2) only and (3) only and (3) only
18. Compare the specification of two printers below.
Type Printing Speed Colour Print Resolution
Printer A
Ink Jet 14 ppm Full Colour 1200 dpi
Printer B
Laser
30 ppm Monochrome 600 dpi
Which printer should be used in each of the following scenarios?
(1) (2) (3)
A. (1): A
B. (1): B
C. (1): B
D. (1): A
Printing image on glossy photo paper Printing exam papers for 200 students Printing
contracts in a law firm
2023-24-S4 1st term test-ICT 1A
6
(2): A (2): B (2): A (2): B
(3): B (3): A (3): B (3): B
19. Look at the specification of two computer systems below.
AB
CPU
Memory Graphics Unit Storage
2.8 GHz Dual Core
8GB DDR4
Graphics Card with 4GB GDDR6 Video Memory 1TB GB SSD
2.4 GHz Quad Core 2 X 16GB DDR4 Integrated GPU 1TB Hard Drive
Which computer system is more suitable in each of the following use
cases?
(1) (2) (3)
A. (1): A
B. (1): B
C. (1): A
D. (1): B
Running 3D Animation Program
Opening 150 tabs in a browser at the same time
Transferring large number of photos and videos from external storage device
2023-24-S4 1st term test-ICT 1A
7
(2): B (2): B (2): A (2): A
(3): A (3): A (3): B (3): B
20. Which of the following statements about software is correct?
A. Disk defragmenter can release storage space after reorganizing the fragmented
files.
B. Firewall is an example of application software.
C. There is no driver program for commonly used hardware such as mouse and
keyboard.
D. Operating system manages the memory in a computer.

1 2 3 4 5 6 7 8 9 10 CBCBC AADCB
11 12 13 14 15 16 17 18 19 20 DDBAC BADAD

Answer all questions. Write your answers in the spaces provided.


1.
Peter wants to log in to his online forum account, but he has forgotten his
password.
(a) To reset his password, Peter must enter the email address he used to register
his account. The system will then send an email to Peter so he can continue the
process. Suggest two validation checks required for the input of the email and
describe briefly.
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)
(b) When Peter resets his password, the following message is shown:
(i) Apart from presence check, suggest a validation check used in the field
“Confirm new password” and describe briefly.
_______________________________________________________________________________
_______________________________________________________________________________ (1
mark)
(ii) What is the data verification method used for the passwords?
_______________________________________________________________________________
(1 mark)

2. Nelson is producing music on his own.


(a) He records his voice with a microphone. Suggest two attributes that will affect
the clearness of the audio.
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)
(b) Refer to the following attributes and estimate the file size of Nelson’s music.
Bit depth
Number of channel(s) Sampling rate Duration
24 bits
1
48000 Hz 3 minutes

___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)

3. Sam is designing an interface for a ticketing kiosk in the town hall. It allows
users to purchase tickets for different art performances. The customers can select
the art performance, such as music concert and Chinese opera. It must include:
● Selection of different art performances
● Inputting number of tickets
● Displaying the total price required to be purchased
Design the user interface of the ticketing kiosk.

4. Donald opened a text file from Jimmy and saw the following message. It is given
that the message is written in Japanese and English.

Vdwakj!dbIAWd&bDHwa!HJKABwd@jKbdKJAWbDy2uBd23I&@ dbIWDaDadjaHbdak!!
ABwd@jKbdKJAWbDy2uBd23I12 dbIAWd&bDHwdwaesfwAwaDy2uBd23I&

(a) Why is the message displayed as garbled text?


___________________________________________________________________________________
___________________________________________________________________________________
(1 mark)
(b) Suggest a character encoding system that supports the languages.
___________________________________________________________________________________
(1 mark)
(c) Suggest a method that Jimmy can use to display the content without having
Donald install the character encoding system suggested in (b).
___________________________________________________________________________________
___________________________________________________________________________________
(1 mark)
5. Mathew is participating in a video-shooting competition. His video has the
following attributes:
Colour depth 24 bits Resolution 1920 × 1080 Frame rate 60 fps Duration 10 minutes
(a) Assuming the file size of the audio is negligible, estimate the size of the
video.
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)
(b) The competition only accepts submission of videos under 50 GB. Suggest two ways
for Matthew to reduce the file size of his video.
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)

6. (a)
Complete the following table.
–103
Denary number
8-bit two’s complement representation
1100 0111
0101 0011
(b) Find the check digit for the HKID F453278 by using Modulo-11 approach.
(Show your steps clearly.)

Answer all questions. Write your answers in the spaces provided.


7.
Kevin is an IT technician at a school. He is helping the school purchase new
computers for the computer room.
(a) The school wants to install a printer for all students to use. Should a laser
or inkjet printer be installed? Give one reason to support your choice.
Laser printer / inkjet printer (circle the correct one)
___________________________________________________________________________________
___________________________________________________________________________________
(2 marks)
(b) The computers will be mostly for web browsing and text editing. The
manufacturer presented THREE upgrade options for the computers. Which upgrade is
suitable for the school’s use? Justify your choice.
(1) Quad-core CPU→Octa-core (8 cores) CPU suitable / unsuitable (circle the correct
one)
_______________________________________________________________________________
_______________________________________________________________________________
(2) Integrated Graphics→Discrete graphics card
suitable / unsuitable (circle the correct one)
_______________________________________________________________________________
_______________________________________________________________________________
(3) 1GB RAM→8GB RAM
suitable / unsuitable (circle the correct one)
_______________________________________________________________________________
_______________________________________________________________________________
(3 marks)
(c) The manufacturer also suggested installing a 256GB Solid-state drive (SSD)
instead of 1TB hard drive. Give an advantage and a disadvantage for adopting this
suggestion.
advantage: disadvantage:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________ (2 marks)
END OF PAPER

Section B 1. (a)
Format check: the input must consist of an “@”. 1
Presence check. 1
(b) (i) length check: the length of the input must be the same as the input in “new
password”. 1
(ii) Input data twice 1
2. (a)
(b) 24X48000X1X3X60 1
sampling rate and sample size. 1+1
= 24.7 MB
3. display layout 1
Input method 1
Submit / reset button 1
4. (a) the character set used does not match. 1
(b) the character set Unicode. 1
(c) use image to represent the content of the message. 1
5. (a) 24 X 1920 X 1080 X 60 X 10 X 60 = 208.6 GB
(b) reduce the frame rate / reduce the resolution / compress the video. 1+1
6. (a) 57 1
10011001 1
83 1
(b)6 X 8+4 X 7+5 X 6+3 X 5+2 X 4+7 X 3+8 X 2 1
= 166
166 /11 = 15...9
Check digit=11−9=2 1

7. (a) Laser printer. 1


The printing cost is lower. / The printing speed is faster. 1

(b) (1) unsuitable.


The tasks do not require a high processing power CPU. 1
(2) unsuitable.
The tasks do not require to process a high quality of image or video. 1
(3) suitable.
It may enhance the speed of processing when handling tasks. 1
(c) advantage: The access time is shorter and hence the processing speed in opening
some files is faster. 1
disadvantage: The cost per byte is higher. 1

You might also like