SlideShare a Scribd company logo
2
Most read
SET2 ICT 2007
SECTION A                                                                      A special set of rules to connect devices
                                                                               B system of interconnected computers and peripheral devices
Question 1 to 10
                                                                               C system that change analog signal to digital signal
1.       Information refers to                                                 D system that transmits information in form of data through a
     ___________________________________                                       physical medium
     A. An act of transmitting messages
     B. the knowledge obtained from reading, investigation, study        9. Which is from the following statements is not true about
         or research.                                                        networks ?
     C. the use of scientific knowledge, experience and resources        A People in various places can be connected using a network.
         to create processes and products that fulfill human needs       B Networking technology allows banking to be done everywhere
     D. the technology required for information processing, in              and at any time.
         particular, the use of electronic computers,                    C We cannot do a long distance communication using a network
         communication devices and software applications to              D A network links two or more computers together to enable data
         convert, store, protect, process, transmit and retrieve            and resource exchange.
         information from anywhere, anytime

2. Charles Babbage invented the
                                                                         10.     -Cover a small region of spaces
_________________________.                                                        Meliputi kawasan kecil
A. Abacus              B.Napier’s Bone
C. Weaving Loom        D. Mechanical Calculator Machine
                                                                                 -The range of speed is between 10mbps to 100mbps
3. Which of the followings are the similarities between ethics and                Kadar kelajuan adalah diantara 10mbps hingga 100mbps
law?
I. to prevent any crime
II. as a rule to control computer users                                        The statements above refers to…………….
III.to guide user from misusing computers                                        A          LAN    B.MAN         C. WAN                  D.
IV. to create a healthy computer society, so that computers are                  Intranet
used to contribute to a better life
                A. I, II and III      B.II, III and IV                   Write ‘T’ for true statements and ‘F’ for false statements.
                 C. I, III and IV     D.All above

4.Verification is _____________________________.                         11.    A WAN is a network that covers a large
A.The act of proving or disproving the correctness of a system                  geographic area using a communication
  with respect to a certain formal specification                                channel that combines many types of
B.Process where users verify that they are who they say they are                transmission media such as telephone lines,
C.The scanning of retina and analysing the layer of blood vessels               cables and radio waves.
   at the back of the eye
D.The measurement and analysis of the shape of one’s hand
                                                                         12.    A computer can function properly without
5.A headphone is a/an ___________ device.                                       application software.
A. input         B. output      C. storage             D. process

6. The three main types of secondary storage are .                       13.    A compressed file must be unzipped or restored
     A. CD, DVD and DVDRW                                                       to its original form before being used.
     B. ROM, RAM and hard drive
     C. hard disk, floppy disk and pen drive
     D. magnetic medium, optical medium and flash memory                 14.    Trademark Law is a protection of a company’s
                                                                                logos and brand name.
7. An operating system is____________ .

     A. a program designed to assist users with                          15.    Changing computer programming codes with
        personal task                                                           permission is unethical.
     B. a program that allows a user to perform
        maintenance type task
     C. a program that control or maintain the
        operations of a computer and its device
     D. a set of programs that coordinates all the
        data transmissions among computer in a
        network




8. Computer Networks is a ………………………..

                                                                     1
SET2 ICT 2007
Match the picture with the correct statement.                              functions and applications in one or more dedicated file servers.
                                                                           ______________________
              Technology                               Year
16.                                                                        II.Serves extended enterprise, including defined sets of customers
                                                (A)                        or suppliers or other partners.
                                                In 1925, television
                                                was made known             _____________________
                                                to public.                 SECTION B
                                                                           QUESTION 1
17.                                                                        Look at the picture below and answer the questions that follow.
                                                (B)
                                                In 1941, the
                                                computer was
                                                created.



18.
                                                (C)
                                                In 3500 BC, the
                                                Sumerians
                                                developed                       Define pornography (2 scores)
                                                cuneiform writing.         I.____________________________________________________
                                                                           ____________________________________________

19.                                                                        II. Give two impacts of pornography on Malaysian society.
                                                In 1876, the first         a.___________________________________________________
                                                telephone was              ___________________________________________
                                                introduced.                b.___________________________________________________
                                                (D)                        ___________________________________________

                                                                           QUESTION 2
20.
                                                                           I. Complete the diagram below
                                                In 1500 BC, the
                                                Phoenicians                                        Computer
                                                                                                   Security
                                                developed the
                                                alphabet.
                                                (E)                            a.                                              b.
                                                                          ___________                                     ___________
                                                                            _______                                          ______
Fill in the blanks.
21. Give five common type of network communications channels :
        I. ________________________________
       II. ________________________________                               ___________                                     ___________
      III. ________________________________                                  ______
      IV. ________________________________                                                                                   ______
       V. ________________________________

22. Controversial content is information that causes                                           Software and
___________________ among people who have different                                                  Data
____________________ , moral and _____________________.                    II. Give two examples of computer threats.
                                                                                                  Security
                                                                           a.___________________________________________________
23. Retinal biometrics involves the _________________________              b.___________________________________________________
of retina and analyzing the layer of _________________________
at the back of the eye.                                                    (2 scores)

24. A computer system requires four main aspects of data handling          QUESTION 3
to function properly which are input, _______________,                     Rearrange the steps in scanning antivirus below.
______________ and ______________                                          A.scan the selected file
                                                                           B.choose an antivirus program
                                                                           C.wait while the program is scanning and the result is produced
                                                                           D.select file that need to be scanned
25. Answer statements A and B according to situation below.
I.Operating systems that allow the network to centralise

                                                                      2
SET2 ICT 2007
                                            ( 4 scores )                    a. _________________               b. __________________
QUESTION 4                                                                                                                     ( 2 scores )
I. Define computer system
_____________________________________________________                       II. Give two differences between above computer networks.
                                                                                 a.________________________________________________
_____________________________________________________
                                                                                 ______________
_____________________________________________________                            b.________________________________________________
                                                                                 ______________
_____________________________________________________
                                                                                                                                ( 2 scores )
_____________________________________________________
                                                                            SECTION C
_____________________________________________________
                                                                            Instruction : Question 1 is compulsory AND answer either
( 2 scores )                                                                Question 2 or Question 3.

II. Draw a block diagram and describe the information processing            Question 1 (COMPULSORY)
cycle which includes input, process, output and storage.
                                                                            An Audio-Visual Room has been equipped with 10 computers and
                                                                            a hub. As an ICT coordinator, you are required to set up a small
                                                                            network in the room. ( 2 scores)
                                                                                a) Sketch the topology for the room.




                                                                                     [2 scores]

                                                                                b)   Give three advantages of using a networking rather than
                                                                                     a stand-alone pc. ( 3 scores)
                                                                                     I.______________________________________
                                                                                     _______________________________________
                                                                                     II. ______________________________________
                                                                                     _______________________________________
                                                                                     III______________________________________
                       BLOCK DIAGRAM                                                 _______________________________________

                                                         ( 2 scores )
                                                                                c)   Define the network communication technology of
                                                                                     Extranet.
                                                                                     ______________________________________
                                                                                     _______________________________________
                                                                                                                                  [2 scores]

                                                                            Question 2
QUESTION 5
Based on figure below, answer the following questions.                      Figure 1 shows some of the components of a computer system.
    I. Name the types of computer networks below.                                                       Figure 1




                                                                        3
SET2 ICT 2007
                                                               C) Give two sub components in a central processing unit
                                                               I._____________________________
                                                               II_____________________________[2 scores]


                                                               D)Give two differences between I and J.
                                                               Primary storages      Aspects               Secondary storage
                                                                                     I.




                                                                                     II.




                                                               [2 scores]
                                                               Question 3

                                                               Maria just won a set of personal computer. The personal computer
                                                               is without any system software.

                                                               1.       What is the most importance system software, so that the
                                                                        personal computer can be used.
                                                                        ____________________________
                                                                                          [1 score]

                                                               2.       Virus can be scanned using antivirus software. What type
                                                                        of system software used.
                                                                        ____________________________
                                                                                         [1 score]

                                                   Based       3.       List three popular operating system platforms.
on Figure 1, answer the following questions.                            (a)_______________________
                                                                        (b)_______________________
                                                                        (c)_______________________
                                                                                 [3 scores]
a)        State the meaning of input
           ______________________________________________      4.      State two differences between operating systems and
          [1 score]                                                    utility programs.

                                                                        Operating system                  Utility program


     b)      List two type of output. [2 scores]
             I.       _____________________________
             II.      _____________________________




                                                                                           [2 scores]



                                                                               ~ END OF QUESTION PAPER ~




                                                           4

More Related Content

What's hot (20)

PPTX
Basic computer configuration setup
Rachel Espino
 
PPT
Brain gate
Mayank Garg
 
PPTX
Types of components and objects to be measured_Presentation
Bryan Corpuz
 
PPTX
Internet safety and security
DjTechs
 
PPTX
Touchless Touchscreen Technology
Akshay Vasava
 
PPTX
1 introduction multimedia
poonam yadav
 
PPTX
E paper slides
Raju Gangannavar
 
PPTX
TUTORIAL ON PHOTOSHOP
Anamika Chauhan
 
PPT
Monitors
Krazzy Kanhaiya
 
PPTX
Output devices Computer Computer Application in Business
Nethan P
 
PDF
Neuralink: A Platform That Integrates Brain-Machine Interfaces.
IRJET Journal
 
PPTX
Biometric security system
Mithun Paul
 
PPTX
Mobile Media
Samantha Lyn
 
PPTX
Raster and random scan display types of input devices
Mani Kanth
 
PPTX
16. graphics and multimedia software
Zambales National High School
 
PPTX
COMPUTER ERROR BEEPS SOUND
Man Mat
 
PDF
Basics of Computer for Students
vethics
 
PPTX
-Working with Text in Corel Draw
SanthiNivas
 
PPTX
Multimedia System & Design Ch 8 delivering
Badar Waseer
 
DOCX
Input and output devices
Priya Saluja
 
Basic computer configuration setup
Rachel Espino
 
Brain gate
Mayank Garg
 
Types of components and objects to be measured_Presentation
Bryan Corpuz
 
Internet safety and security
DjTechs
 
Touchless Touchscreen Technology
Akshay Vasava
 
1 introduction multimedia
poonam yadav
 
E paper slides
Raju Gangannavar
 
TUTORIAL ON PHOTOSHOP
Anamika Chauhan
 
Monitors
Krazzy Kanhaiya
 
Output devices Computer Computer Application in Business
Nethan P
 
Neuralink: A Platform That Integrates Brain-Machine Interfaces.
IRJET Journal
 
Biometric security system
Mithun Paul
 
Mobile Media
Samantha Lyn
 
Raster and random scan display types of input devices
Mani Kanth
 
16. graphics and multimedia software
Zambales National High School
 
COMPUTER ERROR BEEPS SOUND
Man Mat
 
Basics of Computer for Students
vethics
 
-Working with Text in Corel Draw
SanthiNivas
 
Multimedia System & Design Ch 8 delivering
Badar Waseer
 
Input and output devices
Priya Saluja
 

Viewers also liked (20)

PDF
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Joseph Wafuba
 
DOCX
ICT Form 4 MAY 2015 test paper
kwongliik
 
DOCX
ICT FINAL EXAM
Anna Molly
 
PPT
Web designing and publishing computer studies theory lesson
Mukalele Rogers
 
PPT
Input computer hardware notes for UCEand UACE ICT
Mukalele Rogers
 
PDF
Mathematics Previous year Question Paper
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
PDF
MCQ on Computer and ICT
Md. Gias Uddin
 
DOC
Set5 ict-question
Azmiah Mahmud
 
DOC
Set7 ict-question
Azmiah Mahmud
 
PPTX
Powerpoint past papers s10 qp 31 ICT
Neill121
 
PPTX
Technology based distribution channels / networks in financial industry
Mukalele Rogers
 
PPT
Over view of internet computer studies lesson
Mukalele Rogers
 
PPTX
IT Security and Risk Mitigation
Mukalele Rogers
 
PPTX
NORMALIZATION - BIS 1204: Data and Information Management I
Mukalele Rogers
 
PPTX
Patterns of organization of speech, and how to lead discussions and seminars
Mukalele Rogers
 
PPT
102 Evolution of computers
Mukalele Rogers
 
PDF
Microsoft Office Package: Practical Questions
Makaha Rutendo
 
PPT
Evolution Of The Computers
panitiaict
 
PPS
The evolution of computers
Sharat Chandu
 
PPSX
EVOLUTION OF COMPUTER
fhemrosacia
 
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Joseph Wafuba
 
ICT Form 4 MAY 2015 test paper
kwongliik
 
ICT FINAL EXAM
Anna Molly
 
Web designing and publishing computer studies theory lesson
Mukalele Rogers
 
Input computer hardware notes for UCEand UACE ICT
Mukalele Rogers
 
Mathematics Previous year Question Paper
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
MCQ on Computer and ICT
Md. Gias Uddin
 
Set5 ict-question
Azmiah Mahmud
 
Set7 ict-question
Azmiah Mahmud
 
Powerpoint past papers s10 qp 31 ICT
Neill121
 
Technology based distribution channels / networks in financial industry
Mukalele Rogers
 
Over view of internet computer studies lesson
Mukalele Rogers
 
IT Security and Risk Mitigation
Mukalele Rogers
 
NORMALIZATION - BIS 1204: Data and Information Management I
Mukalele Rogers
 
Patterns of organization of speech, and how to lead discussions and seminars
Mukalele Rogers
 
102 Evolution of computers
Mukalele Rogers
 
Microsoft Office Package: Practical Questions
Makaha Rutendo
 
Evolution Of The Computers
panitiaict
 
The evolution of computers
Sharat Chandu
 
EVOLUTION OF COMPUTER
fhemrosacia
 
Ad

Similar to Set2 ict-question (20)

DOC
Ict assessment 1 2013
Sri Jaykody
 
PDF
CCNA Introducing Networks Questions
Dsunte Wilson
 
DOC
Ict prelim
Chrissy Ustaris
 
PDF
Final exam review_questions
CarmenLamdegil
 
DOC
Set1 ict-question
Azmiah Mahmud
 
DOC
Mcq for final
sazzadulbarihridoy
 
DOCX
Concepts and Applications of Information Technology IFSM.docx
maxinesmith73660
 
DOC
Cd ict-worksheet-la3-form-4
cikgushaharizan
 
PDF
Bank clerk computer_exam_tailieuso.com.vn
Hạnh Ngọc
 
DOC
Cd ict-worksheet-la1-form-4
cikgushaharizan
 
PDF
Download full ebook of E instant download pdf
vasilejumri
 
DOC
Cd ict-worksheet-la4-form-5
cikgushaharizan
 
PDF
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
juttachamudn
 
DOC
Hystory of educatonal technology (FORM)
JessicaEsnaola
 
DOC
Assessment 1: Form
gi_cersosimo
 
PDF
CCNA Network Devices Questions
Dsunte Wilson
 
PDF
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
fainazmansor
 
DOCX
Bis 219 final exam 1 2 3
enersivard
 
DOCX
Assignment #3 – Foundations of Computer TechnologyDue on B.docx
davezstarr61655
 
PDF
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
maihanqingyu
 
Ict assessment 1 2013
Sri Jaykody
 
CCNA Introducing Networks Questions
Dsunte Wilson
 
Ict prelim
Chrissy Ustaris
 
Final exam review_questions
CarmenLamdegil
 
Set1 ict-question
Azmiah Mahmud
 
Mcq for final
sazzadulbarihridoy
 
Concepts and Applications of Information Technology IFSM.docx
maxinesmith73660
 
Cd ict-worksheet-la3-form-4
cikgushaharizan
 
Bank clerk computer_exam_tailieuso.com.vn
Hạnh Ngọc
 
Cd ict-worksheet-la1-form-4
cikgushaharizan
 
Download full ebook of E instant download pdf
vasilejumri
 
Cd ict-worksheet-la4-form-5
cikgushaharizan
 
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
juttachamudn
 
Hystory of educatonal technology (FORM)
JessicaEsnaola
 
Assessment 1: Form
gi_cersosimo
 
CCNA Network Devices Questions
Dsunte Wilson
 
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
fainazmansor
 
Bis 219 final exam 1 2 3
enersivard
 
Assignment #3 – Foundations of Computer TechnologyDue on B.docx
davezstarr61655
 
Test Bank for Visualizing Technology, 2nd Edition : Geoghan
maihanqingyu
 
Ad

More from Azmiah Mahmud (20)

DOCX
Buku Panduan-HEM-2016
Azmiah Mahmud
 
DOC
Notacd01
Azmiah Mahmud
 
DOC
Notacd05
Azmiah Mahmud
 
DOC
Notacd04
Azmiah Mahmud
 
DOC
Notacd03
Azmiah Mahmud
 
DOC
Notacd02
Azmiah Mahmud
 
PDF
La3 ict-topic-3-computer-networks
Azmiah Mahmud
 
PDF
La2 ict-topic-2-computer-systems
Azmiah Mahmud
 
PDF
La1 ict-topic-1-ict-and-society
Azmiah Mahmud
 
DOC
Bab 2 sistem komputer
Azmiah Mahmud
 
DOC
Notacd01
Azmiah Mahmud
 
DOC
Notacd12
Azmiah Mahmud
 
DOC
Notacd11
Azmiah Mahmud
 
DOC
Notacd10
Azmiah Mahmud
 
DOC
Notacd09
Azmiah Mahmud
 
DOC
Notacd08
Azmiah Mahmud
 
DOC
Nota programming
Azmiah Mahmud
 
DOC
Nota program development
Azmiah Mahmud
 
DOC
Nota multimedia
Azmiah Mahmud
 
DOC
Nota multimedia production team
Azmiah Mahmud
 
Buku Panduan-HEM-2016
Azmiah Mahmud
 
Notacd01
Azmiah Mahmud
 
Notacd05
Azmiah Mahmud
 
Notacd04
Azmiah Mahmud
 
Notacd03
Azmiah Mahmud
 
Notacd02
Azmiah Mahmud
 
La3 ict-topic-3-computer-networks
Azmiah Mahmud
 
La2 ict-topic-2-computer-systems
Azmiah Mahmud
 
La1 ict-topic-1-ict-and-society
Azmiah Mahmud
 
Bab 2 sistem komputer
Azmiah Mahmud
 
Notacd01
Azmiah Mahmud
 
Notacd12
Azmiah Mahmud
 
Notacd11
Azmiah Mahmud
 
Notacd10
Azmiah Mahmud
 
Notacd09
Azmiah Mahmud
 
Notacd08
Azmiah Mahmud
 
Nota programming
Azmiah Mahmud
 
Nota program development
Azmiah Mahmud
 
Nota multimedia
Azmiah Mahmud
 
Nota multimedia production team
Azmiah Mahmud
 

Set2 ict-question

  • 1. SET2 ICT 2007 SECTION A A special set of rules to connect devices B system of interconnected computers and peripheral devices Question 1 to 10 C system that change analog signal to digital signal 1. Information refers to D system that transmits information in form of data through a ___________________________________ physical medium A. An act of transmitting messages B. the knowledge obtained from reading, investigation, study 9. Which is from the following statements is not true about or research. networks ? C. the use of scientific knowledge, experience and resources A People in various places can be connected using a network. to create processes and products that fulfill human needs B Networking technology allows banking to be done everywhere D. the technology required for information processing, in and at any time. particular, the use of electronic computers, C We cannot do a long distance communication using a network communication devices and software applications to D A network links two or more computers together to enable data convert, store, protect, process, transmit and retrieve and resource exchange. information from anywhere, anytime 2. Charles Babbage invented the 10. -Cover a small region of spaces _________________________. Meliputi kawasan kecil A. Abacus B.Napier’s Bone C. Weaving Loom D. Mechanical Calculator Machine -The range of speed is between 10mbps to 100mbps 3. Which of the followings are the similarities between ethics and Kadar kelajuan adalah diantara 10mbps hingga 100mbps law? I. to prevent any crime II. as a rule to control computer users The statements above refers to……………. III.to guide user from misusing computers A LAN B.MAN C. WAN D. IV. to create a healthy computer society, so that computers are Intranet used to contribute to a better life A. I, II and III B.II, III and IV Write ‘T’ for true statements and ‘F’ for false statements. C. I, III and IV D.All above 4.Verification is _____________________________. 11. A WAN is a network that covers a large A.The act of proving or disproving the correctness of a system geographic area using a communication with respect to a certain formal specification channel that combines many types of B.Process where users verify that they are who they say they are transmission media such as telephone lines, C.The scanning of retina and analysing the layer of blood vessels cables and radio waves. at the back of the eye D.The measurement and analysis of the shape of one’s hand 12. A computer can function properly without 5.A headphone is a/an ___________ device. application software. A. input B. output C. storage D. process 6. The three main types of secondary storage are . 13. A compressed file must be unzipped or restored A. CD, DVD and DVDRW to its original form before being used. B. ROM, RAM and hard drive C. hard disk, floppy disk and pen drive D. magnetic medium, optical medium and flash memory 14. Trademark Law is a protection of a company’s logos and brand name. 7. An operating system is____________ . A. a program designed to assist users with 15. Changing computer programming codes with personal task permission is unethical. B. a program that allows a user to perform maintenance type task C. a program that control or maintain the operations of a computer and its device D. a set of programs that coordinates all the data transmissions among computer in a network 8. Computer Networks is a ……………………….. 1
  • 2. SET2 ICT 2007 Match the picture with the correct statement. functions and applications in one or more dedicated file servers. ______________________ Technology Year 16. II.Serves extended enterprise, including defined sets of customers (A) or suppliers or other partners. In 1925, television was made known _____________________ to public. SECTION B QUESTION 1 17. Look at the picture below and answer the questions that follow. (B) In 1941, the computer was created. 18. (C) In 3500 BC, the Sumerians developed Define pornography (2 scores) cuneiform writing. I.____________________________________________________ ____________________________________________ 19. II. Give two impacts of pornography on Malaysian society. In 1876, the first a.___________________________________________________ telephone was ___________________________________________ introduced. b.___________________________________________________ (D) ___________________________________________ QUESTION 2 20. I. Complete the diagram below In 1500 BC, the Phoenicians Computer Security developed the alphabet. (E) a. b. ___________ ___________ _______ ______ Fill in the blanks. 21. Give five common type of network communications channels : I. ________________________________ II. ________________________________ ___________ ___________ III. ________________________________ ______ IV. ________________________________ ______ V. ________________________________ 22. Controversial content is information that causes Software and ___________________ among people who have different Data ____________________ , moral and _____________________. II. Give two examples of computer threats. Security a.___________________________________________________ 23. Retinal biometrics involves the _________________________ b.___________________________________________________ of retina and analyzing the layer of _________________________ at the back of the eye. (2 scores) 24. A computer system requires four main aspects of data handling QUESTION 3 to function properly which are input, _______________, Rearrange the steps in scanning antivirus below. ______________ and ______________ A.scan the selected file B.choose an antivirus program C.wait while the program is scanning and the result is produced D.select file that need to be scanned 25. Answer statements A and B according to situation below. I.Operating systems that allow the network to centralise 2
  • 3. SET2 ICT 2007 ( 4 scores ) a. _________________ b. __________________ QUESTION 4 ( 2 scores ) I. Define computer system _____________________________________________________ II. Give two differences between above computer networks. a.________________________________________________ _____________________________________________________ ______________ _____________________________________________________ b.________________________________________________ ______________ _____________________________________________________ ( 2 scores ) _____________________________________________________ SECTION C _____________________________________________________ Instruction : Question 1 is compulsory AND answer either ( 2 scores ) Question 2 or Question 3. II. Draw a block diagram and describe the information processing Question 1 (COMPULSORY) cycle which includes input, process, output and storage. An Audio-Visual Room has been equipped with 10 computers and a hub. As an ICT coordinator, you are required to set up a small network in the room. ( 2 scores) a) Sketch the topology for the room. [2 scores] b) Give three advantages of using a networking rather than a stand-alone pc. ( 3 scores) I.______________________________________ _______________________________________ II. ______________________________________ _______________________________________ III______________________________________ BLOCK DIAGRAM _______________________________________ ( 2 scores ) c) Define the network communication technology of Extranet. ______________________________________ _______________________________________ [2 scores] Question 2 QUESTION 5 Based on figure below, answer the following questions. Figure 1 shows some of the components of a computer system. I. Name the types of computer networks below. Figure 1 3
  • 4. SET2 ICT 2007 C) Give two sub components in a central processing unit I._____________________________ II_____________________________[2 scores] D)Give two differences between I and J. Primary storages Aspects Secondary storage I. II. [2 scores] Question 3 Maria just won a set of personal computer. The personal computer is without any system software. 1. What is the most importance system software, so that the personal computer can be used. ____________________________ [1 score] 2. Virus can be scanned using antivirus software. What type of system software used. ____________________________ [1 score] Based 3. List three popular operating system platforms. on Figure 1, answer the following questions. (a)_______________________ (b)_______________________ (c)_______________________ [3 scores] a) State the meaning of input ______________________________________________ 4. State two differences between operating systems and [1 score] utility programs. Operating system Utility program b) List two type of output. [2 scores] I. _____________________________ II. _____________________________ [2 scores] ~ END OF QUESTION PAPER ~ 4