SECTION A
ANSWER ALL QUESTIONS
1. The Phoenicians developed __________ in 1500 BC.
A. internet
B. telephone
C. alphabet writing
D. cuneiform writing
2. Before the invention of computer, several counting machines were invented. In 1823, Charles Babbage invented _______________ .
A. Mark1
B. Weaving Lom
C. Napier’s Bones
D. Mechanical Calculator Machine
3. ENIAC VACUUM TUBE MARK1 UNIVAC
All the above are related to the computer invented during the
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
4. Which of these is an example of slander?
A. Telling your mother via e-mail that your brother has a girlfriend.
B. Forwarding a spam e-mail that says Mc Donald’s Malaysia uses contaminated meat in their burgers.
C. E-mail a letter to the newspaper that a public official accepting bribery and you have proof that it is true.
D. Broadcasting a story that a housing developer has started building houses in a prime “Malay Reserved” land.
5. X is the fastest and most powerful computers. It may weighs over 100 tons. X may refers to
A. Supercomputers
B. Mobile computers
C. Mainframe computers
D. Midrange computers
6. Unknown author Idea can be misunderstood
1. The Phoenicians developed __________ in 1500 BC.
A. internet
B. telephone
C. alphabet writing
D. cuneiform writing
2. Before the invention of computer, several counting machines were invented. In 1823, Charles Babbage invented _______________ .
A. Mark1
B. Weaving Lom
C. Napier’s Bones
D. Mechanical Calculator Machine
3. ENIAC VACUUM TUBE MARK1 UNIVAC
All the above are related to the computer invented during the
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
4. Which of these is an example of slander?
A. Telling your mother via e-mail that your brother has a girlfriend.
B. Forwarding a spam e-mail that says Mc Donald’s Malaysia uses contaminated meat in their burgers.
C. E-mail a letter to the newspaper that a public official accepting bribery and you have proof that it is true.
D. Broadcasting a story that a housing developer has started building houses in a prime “Malay Reserved” land.
5. X is the fastest and most powerful computers. It may weighs over 100 tons. X may refers to
A. Supercomputers
B. Mobile computers
C. Mainframe computers
D. Midrange computers
6. Unknown author Idea can be misunderstood
X
X is one of the issues in computer ethics. X may be __________.
A. software theft
B. unauthorized use
C. authorized access
D. information accuracy
7. ___________ was one of the first generation computer scientists.
A. Bill Gates
B. Steve Jobs
C. John Napier
D. Presper Eckert
8. When we talk about privacy in computing, we know that _________.
A. We have the right to use our belongings
B. We have the right to protect our property
C. We have the right to hide in secret place
D. We have the right to disclose our personal details
9. Controversial content is dangerous because it causes ________ among people of different religious, social and cultural beliefs.
A. peace
B. dispute
C. harmony
D. high moral
10. The term _________, originally a complimentary word for computer authorisation, now refers to someone who tries to access a computer or network illegally.
A. pirate
B. hacker
C. firewall
D. cracker
11. The right to use software is called
A. copyright
B. product activation
C. license agreement
D. acceptable use policy (AUP)
12. Teachers can benefit from the use of computers in schools because computers:
I. weaken learning
II. can enhance interactive learning
III. can be used as effective teaching aids
IV. can strengthen cognitive development
A. I and III
B. II and III
C. II, III and IV
D. I, II, III and IV
13. Which of the following was used to store data during the First Generation?
I. Diskets
II. Punched Card
III. Magnetic Tape
IV. Flash Drive
A. I and II
B. II and III
C. III and IV
D. I, II, III and IV
14. Customers benefit from Electronic Banking in terms of:
I. 24 Hour Service
II. Electronic Cash Deposits
III. Electronic Funds Transfer
IV. Electronic Loan Applications
A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV
15. Which of the following is the impact of ICT on the society?
I. Sharing
II. Reliability
III. Expensive
IV. Globalization
A. II and IV
B. I, II and III
C. I, II, and IV
D. I, II, III and IV
16. Which of the following statements is related to the impact of ICT on society?
I. Information travels borderless through the Internet.
II. People can receive information faster by using ICT.
III. Using computers frequently and for long hours is harmful to health.
IV. Today the younger generation prefers to sit infront of the computer than socialize with other.
A. I and II
B. II and IV
C. II, III and IV
D. I, II, III and IV
17. Which of the following statements show the impact of using a company’s computer without authorization?
I. Decreasing the company’s expense.
II. Increasing the company’s expense
III. Improvement in terms of staff personal skill
IV. Creating an unhealthy relationship between employer and worker.
A. I and II
B. II and III
C. II and IV
D. III and IV
18. The diagram below shows the evolution of communication.
I Pigeon
II X
III Cordless Phone
IV Y
V Mobile Phone
VI PDA
VII Z
X : __________________________________
Y : __________________________________
Z : __________________________________
19. Write TRUE or FALSE for the following statements.
i. In 3500 BC, the Sumerians developed alphabet writing.
ii. The first internet known as ARPANET was introduced in 1969.
iii. Tsui Lin invented Chinese Abacus in 105 BC.
iv. ICT comprises three major elements which are computer, networking and internet.
v. We need information to make decisions and to predict the future.
vi. Information is knowledge and helps us tol fulfil our daily task.
vii. Vacuum tubes was invented to replace the transistors during the Second Generation Computer.
20.
i. The knowledge obtained through reading, investigation, study or research.
X is one of the issues in computer ethics. X may be __________.
A. software theft
B. unauthorized use
C. authorized access
D. information accuracy
7. ___________ was one of the first generation computer scientists.
A. Bill Gates
B. Steve Jobs
C. John Napier
D. Presper Eckert
8. When we talk about privacy in computing, we know that _________.
A. We have the right to use our belongings
B. We have the right to protect our property
C. We have the right to hide in secret place
D. We have the right to disclose our personal details
9. Controversial content is dangerous because it causes ________ among people of different religious, social and cultural beliefs.
A. peace
B. dispute
C. harmony
D. high moral
10. The term _________, originally a complimentary word for computer authorisation, now refers to someone who tries to access a computer or network illegally.
A. pirate
B. hacker
C. firewall
D. cracker
11. The right to use software is called
A. copyright
B. product activation
C. license agreement
D. acceptable use policy (AUP)
12. Teachers can benefit from the use of computers in schools because computers:
I. weaken learning
II. can enhance interactive learning
III. can be used as effective teaching aids
IV. can strengthen cognitive development
A. I and III
B. II and III
C. II, III and IV
D. I, II, III and IV
13. Which of the following was used to store data during the First Generation?
I. Diskets
II. Punched Card
III. Magnetic Tape
IV. Flash Drive
A. I and II
B. II and III
C. III and IV
D. I, II, III and IV
14. Customers benefit from Electronic Banking in terms of:
I. 24 Hour Service
II. Electronic Cash Deposits
III. Electronic Funds Transfer
IV. Electronic Loan Applications
A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV
15. Which of the following is the impact of ICT on the society?
I. Sharing
II. Reliability
III. Expensive
IV. Globalization
A. II and IV
B. I, II and III
C. I, II, and IV
D. I, II, III and IV
16. Which of the following statements is related to the impact of ICT on society?
I. Information travels borderless through the Internet.
II. People can receive information faster by using ICT.
III. Using computers frequently and for long hours is harmful to health.
IV. Today the younger generation prefers to sit infront of the computer than socialize with other.
A. I and II
B. II and IV
C. II, III and IV
D. I, II, III and IV
17. Which of the following statements show the impact of using a company’s computer without authorization?
I. Decreasing the company’s expense.
II. Increasing the company’s expense
III. Improvement in terms of staff personal skill
IV. Creating an unhealthy relationship between employer and worker.
A. I and II
B. II and III
C. II and IV
D. III and IV
18. The diagram below shows the evolution of communication.
I Pigeon
II X
III Cordless Phone
IV Y
V Mobile Phone
VI PDA
VII Z
X : __________________________________
Y : __________________________________
Z : __________________________________
19. Write TRUE or FALSE for the following statements.
i. In 3500 BC, the Sumerians developed alphabet writing.
ii. The first internet known as ARPANET was introduced in 1969.
iii. Tsui Lin invented Chinese Abacus in 105 BC.
iv. ICT comprises three major elements which are computer, networking and internet.
v. We need information to make decisions and to predict the future.
vi. Information is knowledge and helps us tol fulfil our daily task.
vii. Vacuum tubes was invented to replace the transistors during the Second Generation Computer.
20.
i. The knowledge obtained through reading, investigation, study or research.
The above statement refers to _____________.
ii. An act of transmitting messages between individuals using verbal interaction, symbols or signs. It is important to gain knowledge.
The above statement refers to ______________.
iii. Unique and original works such as ideas, inventions, writing and art of an individual.
The above statement refers to _____________.
ii. An act of transmitting messages between individuals using verbal interaction, symbols or signs. It is important to gain knowledge.
The above statement refers to ______________.
iii. Unique and original works such as ideas, inventions, writing and art of an individual.
The above statement refers to _____________.
SECTION B
ANSWER ALL QUESTIONS
1. Define Information and Communication Technology
2. Identify and explain two differences between computer ethics and law.
3. Explain the concept of privacy in computer usage and list ways to protect privacy in computing.
1. Define Information and Communication Technology
2. Identify and explain two differences between computer ethics and law.
3. Explain the concept of privacy in computer usage and list ways to protect privacy in computing.
No comments:
Post a Comment