yuen long lutheran secondary school€¦  · web viewwhich of the following ways can reduce the...

24
The ELCHK Yuen Long Lutheran Secondary School S6 Information and Communication Technology (I) 2012-2013 Mock Exam Time allowed: 2hrs Section A: Multiple Choices 1. Tom finds that including graphic in a word document increases the file size of the word document. Which of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink to linkup the graphic. (2) Reduce the graphic size by dragging a corner of the graphic in the word document. (3) Reduce the text font size from 12 points to 8 points in the word document. A. (1) only B. (3) only C. (1) and (2) only D. (1) and (3) only 2. Which of the following is the signed representation of -91 in 8 bits two’s complement format? A. 11011011 B. 10100100 C. 10100101 D. 00100101 3. Which of the following statement about digitize sound wave in a computer is / are correct? (1) Sound wave is in analog format. (2)MIDI is a sound format in digital format. (3) Mp3 is a compressed sound wave in analog format. A. (1) and (2) only B. (1) and (3) only C. (2) and (3) only D. (1), (2) and (3) 4. If a formula “=A1/(B$3-$C1)+ $D$6” is stored in the cell B6, which of the following statement(s) is / are CORRECT? (1) If the cell is copied from B6 to E5, an error message will be shown. (2) If the cell is copied from B6 to D6, an error message will be shown. (3) If the cell is copied from B6 to C8, an error message will be shown. A. (1) and (2) only B. (1) and (3) only C. (2) and (3) only D. (1), (2) and (3) With respect to the files structure below, answer the following 2 questions. 1

Upload: others

Post on 10-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

The ELCHK Yuen Long Lutheran Secondary SchoolS6 Information and Communication Technology (I) 2012-2013 Mock Exam

Time allowed: 2hrsSection A: Multiple Choices1. Tom finds that including graphic in a word

document increases the file size of the word document. Which of the following ways can reduce the file size of the word document?(1) Store the graphic in a file and use hyperlink

to linkup the graphic.(2) Reduce the graphic size by dragging a

corner of the graphic in the word document.(3) Reduce the text font size from 12 points to 8

points in the word document.A. (1) only B. (3) onlyC. (1) and (2) only D. (1) and (3) only

2. Which of the following is the signed representation of -91 in 8 bits two’s complement format?

A. 11011011 B. 10100100C. 10100101 D. 00100101

3. Which of the following statement about digitize sound wave in a computer is / are correct?

(1) Sound wave is in analog format.(2) MIDI is a sound format in digital format. (3) Mp3 is a compressed sound wave in analog

format.A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

4. If a formula “=A1/(B$3-$C1)+ $D$6” is stored in the cell B6, which of the following statement(s) is / are CORRECT?(1) If the cell is copied from B6 to E5, an error

message will be shown.(2) If the cell is copied from B6 to D6, an error

message will be shown.(3) If the cell is copied from B6 to C8, an error

message will be shown.A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

With respect to the files structure below, answer the following 2 questions.

5. The URL http://www.abc.com/ refers to the position at the folder “web”. In the folder “ict”, it has a web page called “ict.htm”. There is an image “photo1.jpg” stored in the folder “pictures” which is under the folder “web”. Which of the following HTML in the web page “ict.htm” can successfully show the image?(1) <img src=”../photo1.jpg”>(2) <img src=”pictures/photo1.jpg”>(3) <img src=”/pictures/photo1.jpg”>

A. (1) only B. (3) onlyC. (1) and (2) only D. (1) and (3) only

6. Suppose a user can successfully can browse an image by the following URL:http://www.abc.com/ict/photo/01.jpg”Which of the following statement(s) is / are true?(1) The protocol used for communication is

HyperText Transfer Protocol(2) The port number for communication in the

web server is by default 80.(3) ‘photo’ is a virtual directory.

A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

1

Page 2: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

7. Which of the following statement about RGB display is NOT correct?

(1) If it is 24 bits, then, the number of choice of different color for each pixel is 224.

(2) It represents the different color level for Red, Green and Blue.

(3) For these 3 colors, Red, Green and Blue, each will have 1/3 of different levels of 224 (i.e. 16777216)

A. (1) only B. (3) onlyC. (1) and (2) only D. (1) and (3) only

8. For a database, a SQL is executed to perform a number of operations. Which of the following statement about performing SQL on a database is correct?

(1) A SQL may create a new table with fields of suitable data types by the command CREATE TABLE.

(2) When updating a database by a SQL, it will first create a temporary transaction file which stores updating data, then, it will update the database and finally it will delete the temporary file after the updating processing is successfully done. This operation is performed in order to protect data.

(3) When deleting data in a database by SQL will not require a temporary transaction file.

A. (1) only B. (2) onlyC. (1) and (2) only D. (1), (2) and (3)

9. A user may insert a video media file into a presentation file. Which of the following statement(s) is / are correct?

(1) The file size will inevitably significantly be increased after the video file is inserted.

(2) The video file in the presentation file cannot be set that it automatically start playing during the presentation.

(3) The presentation file can be saved in a form of web page which can solve the problem of different platforms.

A. (1) only B. (3) only

C. (1) and (2) only D. (1) and (3) only

10. In some cases, the widths of columns in a spreadsheet are so wide as shown in the figure below:

Which of the following feature can help improving the outlook?

A. Word wrap B. Row heightC. Column Width D. Font size

11. Ms Lee is a teacher, she uses a spreadsheet program to input the tests score of her students. The passing mark is set to 50 and the scores are supposed to be within the range of 0 to 100. To avoid making inputting mistakes, she uses a built-in feature of spreadsheet as shown below:

The feature will spot those marks less than the passing marks. Which of the following features has been used?

A. Filtering B. Conditional FormattingC. Validation D. Pivot table

12. The education department will keep contact with primary schools and secondary schools. The associated data is stored in a database in the education department server. Which of the following can be set as the primary key for the database?

(1) School Name (2) Principal Name(3) School Telephone numberA. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

13. The teaching staff ID number / student ID number of a school is in the following format:

2

Page 3: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

C d1 d2 d3 d4

The first character C will either be ‘S’ or ‘T’, S represents ‘student’ and T represents ‘teacher’. And d4 is the check digit. The formula for the check digit is shown below:d4 = the remainder of (d1+d2+d3) divided by 6Which of the following statements is / are false?

(1) the check digit can detect error if ‘S’ is changed into ‘T’.

(2) the check digit can correct error if d1 is changed from ‘5’ to ‘7’.

(3) the divider of formula for the check digit should be changed into 10 to enhance reliability

A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

14. John uses a word processor to create a document, the whole document occupies more than 20 pages. Which of the following features will effectively decrease the number of pages of the document?

(1) Columns (2) Margins(3) JustificationA. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

15. Which of the following are the development trends of IT technology?

(1) the capacity of USB drive is getting larger.(2) the transmission rate of WiFi is getting faster.(3) the power consumption of smart phones is

getting smaller.A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

16. John has three different brands tablet PC, say, A, B and C. Tablet A and tablet B can install the same app D (one of famous application program), however, tablet C cannot install this app. What may not be true?

(1) the OS of tablet A and B are the same.(2) the OS of tablet A and C are different.

(3) the app D is not compatible with the OS for the tablet C.

A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

17. Which of the following statements about tablet PC is / are true?

(1) tablet PC has to use SSD (solid state disk).(2) tablet PC has to provide WiFi.(3) tablet PC has to virtual keyboard.A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

18. For mobile devices, battery duration is always a problem. Compared with notebook PC and table PC, which of the following statement is true?

(1) Tablet PC can provide a longer usage when compared with notebook PC.

(2) The batteries capacity of the tablet PC is larger when compared with notebook PC.

(3) Both tablet PC and notebook PC would effectively make use of save mode to reduce power consumption.

A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

19. Which of the following statements about firewall is/are true?

(1) A firewall protects the resources of one network from users of other networks.

(2) A firewall can be set to stop the access to some web sites.

(3) A firewall can stop virus from entering a network.

A. (1) only B. (2) onlyC. (1) and (2) only D. (1) and (3) only

20. If "202.43.220.99" is the IP address for the host of Yahoo Hong Kong, with domain name "hk.yahoo.com", which of the following

3

Page 4: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

statement are correct?(1) The top level domain of "hk.yahoo.com" is "hk"(2) The domain name server translates

"202.43.220.99" into "hk.yahoo.com".(3) The browser can locate the host if

"202.43.220.99" is typed as the URL.A. (1) only B. (3) onlyC. (1) and (3) only D. (2) and (3) only

21. What are the results of the following algorithm?X 1Y -1X Y * XY X / Y

X YA. 1-1B. 11C. -1 -1D. -1 1

22. April has sent an email to May, June and July. The

email is shown below:

Which of the following is NOT correct?A. July can see that the email is sent to JuneB. May cannot see that the email is sent to JulyC. June can see that the email is sent to MayD. April cannot see the email is sent to July

23. Which of the following system is/are the major broadband systems currently used by domestic users?

(1) ADSL (2) MSDN (3) Cable modemA. (1) only B. (2) onlyC. (1) and (2) only D. (1) and (3) only

24. Which of the following does not contribute to high compression ratio in JPEG?

(1) Reduction in colour depth(2) Reduction in image dimension

(3) Elimination in redundant informationA. (1) only B. (2) onlyC. (3) only D. (1) and (2) only

25. A CGI program is a server-side program, which of the following statement(s) is / are true?

(1) It is often used in constructing guest books and discussion forums.

(2) It processes data submitted from a form(3) It resides on the web serverA. (1) only B. (1) and (2) onlyC. (1) and (3) only D. (1), (2) and (3)

26. Which of the following are the factors that affect the bit rate of a video?

(1) Codec (2) Frame size(3) Frame rateA. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

27. Which of the following statements about developing a solution by a team of programmers is/are true?

(1) The algorithm should be carefully written before programming starts.

(2) Programmers should never make syntax errors.(3) Different programmers use different

programming languages.A. (1) only B. (2) onlyC. (1) and (2) only D. (2) and (3) only

28. Which of the following errors are usually discovered the earliest in program development?

A. Syntax errors B. Logical errorsC. Runtime errors D. Data errors

29. Given that p and q are Boolean variables storing TRUE and FALSE respectively. Which of the following expressions is FALSE?

A. P or q B. (not p) and qC. P or (not q) D. (not p) or (not q)

4

To: [email protected] Cc: [email protected] Bcc: [email protected] Subject: Have Tea Now!!

Let’s go to ABC Restaurant to have tea now!

Page 5: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

30. Which of the following is the correct order of capacity storage?

A. CPU Cache < 2G-Thumb drive < CD-RW < DVD-DL

B. Floppy Disk < 8MB-ROM < 2G-Thumb drive < DVD-DL

C. CD-ROM < DVD+R < 32GB Solid-state Disk < 100MB tape

D. 1G-MS-DUO < 16MB CF card < DVD+/-RW < 8G SCSI drive

31. Which of the following about the URL below is NOT correct?http://www.forum.net/fc/msg.jsp?id=14

A. The protocol is HyperText Transfer ProtocolB. The path to the web page is /msg.jspC. The domain name is www.forum.netD. The extra information passed to the server is

id=1432. Which of the following is/are the advantages of

using WYSIWYG web authoring tools?(I) They provide immediate preview of a web

document(II) We do not need to memorize the HTML tags(III)They provide visual helps such as buttons and

menus to help editing of web pagesA. (I) and (II) only B. (I) and (III) onlyC. (II) and (III) only D. (I), (II) and (III)

33. What does the ‘lock’ shown in the bottom right corner of the browser represents?

A. SAT has been used in the web page.B. SSL has been used in the web page.C. PGP has been used in the web page.D. The web site has been blocked by filtering

software.

With reference to the following flowchart, answer the following two questions.

34. How many time(s) will the following process box be executed?

A. 2 B. 3C. 4 D. 5

35. What would be the output of the above flowchart?

A. 2 B. 3C. 5 D. 7

36. An e-mail is sent requesting that the recipient to access a fraud bank web site and enter their login ID and password. Such an act is known as

A. Hacking B. SpammingC. Fishing D. Phishing

37. A digital certificate(1) identifies a person or an organization on the

Internet(2) can only be obtained from a trusted certificate

authority(3) should always be put up in the office of a

5

Y = Y + 2

Page 6: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

companyA. (1) only B. (2) onlyC. (1) and (2) only D. (2) and (3) only

With respect to the following spreadsheet, answer the following 2 questions:

38. If a formula “=A1/(B$3-$C1)+ $D$6” is stored in the cell B6, which of the following statement(s) is / are CORRECT?(1) If the cell is copied from B6 to E5, an error

message will be shown.(2) If the cell is copied from B6 to D6, an error

message will be shown.(3) If the cell is copied from B6 to C8, an error

message will be shown.

A. (1) and (2) only B. (1) and (3) onlyC. (2) and (3) only D. (1), (2) and (3)

39. If a formula “=SUMIF(B1:B10,”<7”,A1:A10)” is stored in the cell A12, then, the value displayed in this cell would be

A. 28 B. 34C. 38 D. 42

40. Which of the following statements is NOT true?A. A message encrypted with a user's public key

cannot be decrypted by anyone except the user possessing the corresponding private key

B. A message signed with a user's private key can be verified by anyone who has access to the user's public key.

C. "Public key cryptography" is used in digital signature.

D. To achieve a one to one secret communication, a document should first be encrypted by the receiver's public key and then the sender's private key.

<End of Section A>

6

Page 7: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

Section B: Conventional Questions1. The Astronomy Club uses database to store various data, such as information of members. Each

member is assigned a member ID. The Astronomy Club also sells stationery.a) Suggest a validation rule for detecting the errors in the following examples: (4 marks)

Field Mistyped text Validation Rule

Member ID (original: 23411) 24311

Name of member 3mily Chan

Date of birth (dd/mm/yyyy) 4/23/1991

Telephone (missing)

b) Any student can register to be a member of the club through a form on the web. Suggest a suitable verification method of each of the following user-input data: (2 marks)i. Password:

ii. Email address:

c) When Peter browses the web site of Astronomy Club, he finds that the page is full of scrambled characters:

Suggest a possible reason and a corresponding solution for the problem. (2 marks)

d) John, the secretary, finds that he has made some mistakes in the minute of a meeting. In order to correct the mistakes, he has to change all “his” to “her”.i. Is it possible to replace all “is” to “er”? Explain briefly. (2 marks)

ii. Suggest how he can use the search-and-replace function safely. (1 mark)

7

Page 8: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

e) Cindy, the chairperson, wanted to hold a seminar in the coming summer. So, she tried to send each member a personalized invitational letters. Describe how office automation tools can help her finish the job. (1 mark)

2. IR, ACC, MAR, MDR are registers in a CPU. The number is this CPU is represented in two’s complement representation.The following shows some program instructions of the CPU:Instruction code Instruction code in

Binary formatExample Description

LOA 001 LOA 10001 Load the content of the memory address 10001 into ACC

INP 010 INP Input an integer into ACCSTO 011 STO 10001 Store the content of the ACC into the

memory address 10001ADD 100 ADD 10001 Add the content of the ACC with the

content of the memory address 10001OUT 101 OUT Output the content of the ACC to the

VDUThe word size of CPU is 8 bits. 3 bits are for the operation code like INP, STO etc. a) How many memory addresses should be available for the memory? (1 mark)

b) The following instructions are to be performed:000 INP001 STO 11001010 INP011 ADD 11001100 OUT

The following integers are being inputted into the above program:67 91

(i) How the first input integer ‘67’ is represented in binary format inside the CPU? (Note: the word size of the CPU is 8 bits only.) (1 mark)

(ii) What would be the content of following registers and memory address right after the execution of line 011? (5 marks)

Register Content in binary format

8

Page 9: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

IR

ACC

MAR

MDR

Memory address 11001

(iii) What is the output of the above program segment? Is it the expected outcome? If no, give reasons please in detail. (3 marks)

Output:

Expected outcome? Yes / No. (Circle the appropriate answer in this part.)

Reason:

(iv)Which of the following set(s) of inputs will give unexpected outputs? (2 marks)Inputs Output (Circle the appropriate answer in this part.)–161 105 Expected / Unexpected

–102 118 Expected / Unexpected

3. Mark has bought a new computer to build a server. He is choosing an operating system to install.a) Figure 1 and 2 show the interfaces of Operating System A (OS-A) and Operating System B (OS-B)

respectively.. (2 marks)

i. What kind of interface is OS-B using?

ii. State one advantage of OS-A over OS-B.

9

Figure 1: OS-A Figure 2: OS-B

Page 10: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

b) Operating system (OS) and utility programs are important software for a computer. Which of the following are the jobs of an OS? (Put a tick “” the correct answer.) (3 marks)

Job of OS Job of utility

program

Not related to OS or

utility program

Saving a document into a hard disk.Converting a mpeg-I video file into mpeg-4 format.Installing a driver into a computer system.

c) Mark has bought a new scanner, which is labeled “Plug-and-Play”. However, when he connects the scanner to the computer, the scanner does not work. Suggest TWO possible software reasons for the problem. (2 marks)

d) Mark wants to convert a word processing document into plaintext file. Can he do so by renaming the file “report.doc” to be “report.txt”? If yes, give reason. If no, suggest a way to do it.

(1 mark)

e) Finally, Mark applied a domain name “mark.com.hk”, and the web server is named as “www.mark.com.hk”. After that, he set 210.24.33.71 as the IP address for the server and also he set “1010” as the port number for HTTP services. (4 marks)(i) Should the IP address static or dynamic? Explain please.

(ii) If he put a document “report.doc” in the folder “report” under the HTTP root of the

web server. State the URL to locate this file.

(iii) Which of the following requires him to apply another domain? (Circle the correct answer.)

10

Page 11: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

Another domain required?hk.mark.com Yes / Nowww.mark.com.hk/hk/ Yes / Noreport.www.mark.hk/ Yes / No

4. Ken wants to develop a simple guess-the-number game. The following flowchart illustrate his design:

a) Write down a suitable condition in decision box (#). (1 mark)

b) There is a mistake in the flowchart.

i. Put a cross on the wrong part and correct it. (1 mark)ii. What problem will this mistake lead to if it is not corrected? (1 mark)

iii. If the mistake is not corrected and written into program code, will it be detected during

compilation? Explain briefly. (2 marks)

c) Ken wants to share his program with others. He uses a compiler to convert the program into a single executable file. It is known that no extra system file is required to run the program.i. Betty has downloaded his program, but she cannot run it on her computer. Suggest ONE

possible reason for her problem. (1 mark)

11

Start

Input X

End

Output “Right!”

(#)

G 17

Output “Wrong!”

Yes

No

Page 12: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

ii. Suggest TWO ways that Ken may help solving the problem. (2 marks)

d) Susan suggests that Ken should limit the number of guesses to 3 times or else a user may guess

forever. Redraw the flowchart for Ken. (3 marks)

e) After writing the program, Ken inserts some comment statements.i. What does the content of the comment statements relate to? (1 mark)

ii. Will the comment statements affect the execution of the program? (1 mark)

f) Ken needs to write two document manuals for the program. What are they? Who should read

them? (2 marks)

12

Start

G 17

End

Page 13: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

5. Mandy need to declare her income for taxing purpose. This year she chooses to use the Internet service, iTax, provided by the government. When she access the iTax service through a web browser, a padlock icon is displayed in the address bar as show below:

a) The URL shows “https://itax.gov.hk/”. What is “https”? What is the purpose of using “https”? (2 marks)

b) When Mandy clicks on the padlock icon, a dialog box appears:

i. What is the purpose of this certificate? (1 mark)

ii. What is the role of “HongKongPost e-Cert CA”? (1 mark)

c) There are two ways to login the iTax platform: by using digital certificate or using login- password

pair.i. The login-password method is less secure. Give ONE reason for this. (1 mark)

ii. However, people tend to use login-password rather than digital certificate. Give TWO reasons

why people are reluctant to use personal digital certificate. (2 marks)

13

https://itax.gov.hk/

Digital Certificate

Information of Certificate

Issue To: itax.gov.hkAuthority: HongKongPost e-Cert CAEffective from 2009/12/15 to 2011/12/27

X

Page 14: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

d) Mandy wants to send an email to Nancy securely. Nancy suggests that she can employs the PKI (Public-Key Infrastructure) to protect the content of email. Describe how the email is sent by Mandy and read by Nancy. (3 marks)

e) Nancy has installed an anti-virus program, but she one day finds that her computer is infected with

virus. Suggest TWO possible reasons for this. (2 marks)

f) Nancy wants to buy a new computer. Mandy advises her not to throw away her old computer to

landfills as it may cause environmental problems.i. Give ONE reason to support Mandy’s advice. (1 mark)

ii. Suggest ONE way how Mandy can treat her old computer if she really wants to buy a new

computer. (1 mark)

iii. Give ONE security measure that Nancy should carry out before she gives up her old computer.(1 mark)

6. Nowadays, many people will use smart phones to get the Internet. They may either use mobile phone service companies or WiFi to get to the Internet.Joan is a student and she has set a wireless router (or an AP, Access Point) at home so that she can easily use her smart phone or her desktop computer to browse web pages.a) Joan will use her uses her smart phone to browse two web sites, they are:

URL1: www.orangestore.comURL2: hk.yahoo.com

14

Page 15: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

Joan finds that URL1 will look the same in her smart phone or her desktop computer, however, URL2 will be in different layout formats in her smart phone and her desktop computer. As a matter of fact the layout formats in URL2 is designed to facilitate the browsing in these two devices. The two layouts are shown below:

Figure-1 Figure-2

(i) Why the design of URL2 is designed to have two different layout formats for these two devices? Briefly explain please. (1 mark)

(ii) How does the web server determine which layout should be given to the users? (2 marks)

(iii) The mainstream of OS of smart phones is either iOS or Android, the default browser for iOS and Android are safari and chrome respectively. To browse a web page from a web server in a smart phone, is it necessary for the OS of the smart phone and the web server be compatible? Give a brief explanation. What would be the most important factor that a smart phone can successfully browse a web page from a web server? (2 marks)

b) To set her wireless router at home, Joan has to decide several data before the setting. The data include: SSID, key, Encryption method etc.(i) Finally, she decided to hide the SSID to increase security. Apart from the length of SSID

15

Page 16: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

should not be too short or SSID should contain both letters and numbers. Give two other suggestions to Joan to enforce the security. (2 marks)

(ii) What is the difference between SSID and the key? (1 mark)

c) Joan sometimes will use her smart phone to the WiFi service from the government. That is, she can use the AP provided by the government to get to the Internet. There are two different kinds of connections provided by the government. They are freegovwifi and freegovwifi-e.

From the promotion information from the government, the freegovwifi does not require users to provide any key or password. However, the freegovwifi-e will require a user to provide a key “GoWifiHK” which is announced to the public and everybody can know this key.(i) If you are using the smart phone to do ordinary web pages browsing, which service,

freegovwifi or freegovwifi-e should be used? Give an explanation please. (1 mark)

(ii) Briefly describe how it is done so that a key like “GoWifiHK” which is known by everybody but still it can provide a secure connection for the users like Joan. (2 marks)

<End of Paper>

16

Page 17: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

Suggested Answer:1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20A C D D B D C C B A B B A A A A D B C B

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40D C D D D D A A B B B D B B D D C D B D

1 a) Check digit 1Type check 1Range check 1Presence / Completeness check 1

b) (i) Ask the user to type it twice. 1(ii) Send an email to the address and ask the user to reply. 1

c) The character encoding (character set) is not correct. 1He should try to change the character encoding of the web browser, such as Big5 or UTF-8. (“language” acceptable but not recommended)

1

d) (i) No, all words containing “is” will be replaced by “er”. 1E.g.“this” will be replaced with “ther”; or “history” with “hertory” 1(ii) Replace “his” with “her”, and set “whole word match”. 1

e) Mail merge 1

2. a) 25 (32) 1b) (i) 01000011 1

(ii) IR: 10011001 1ACC:10011110 1MAR:11001MDR:01000011Memory address:01000011

111

(iii) -98 1NO, it is because of data overflow error. 1+1

(iv) UnexpectedExpected

11

3. a) (i) Graphical User Interface. 1(ii) Lower system requirement / Uses less system resources / Faster processing 1if the user is familiar with the commands / etc. 1

b) Job of OSNot related to OS or utility programJob of OS

111

c) The OS does not support Plug-and-Play. 1The device driver (driver program) is not 1

17

Page 18: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

The OS does not support the hardware. (any two)d) No. Changing the file extension does not change the file content (format). 2

e) (i) Server should use static IP address so users can get access to it easily. 1

(ii) http://www.mark.com.hk:1010/report/report.doc 1

(iii) Yes

No

Yes

4. a) X = G? 1b) (i) Arrow should be pointed to the position before “Input X”. 1

(ii) Infinite looping 1(iii) No, compilation can only detect syntax error but now, it is just a logical error.

1+1

c) (i) Compatibility 1(ii) Use a cross-platform language to re-write the program.

Use a suitable compiler to compile the source code again.11

d) 3

e (i) To give description to the program. 1(ii) No, the compiler will ignore the comment. 1

f) User manual for ordinary users with general instructions and problem solving. 1Program manual for maintenance and programmers for further development. 1

5. a) Secure HyperText Transfer Protocol. It encrypts data before sending. 1+1b) (i) It provides the key for data encryption. 1

(ii) It authenticates the creditability of the digital certificate. 1c) (i) Data is not encrypted.

(ii) Personal digital certificate is not popular. 1

18

X=G or C = 3?

Input X

Output “Wrong!”

No

Output “Right!”

Yes

Counter 0

C C+1

Page 19: Yuen Long Lutheran Secondary School€¦  · Web viewWhich of the following ways can reduce the file size of the word document? (1) Store the graphic in a file and use hyperlink

Users has to pay to enjoy the services provided by the CA. 1d) Step 1: Mandy has the public key of Nance.

Step 2: Mandy encrypts the mail with the public key.Step 3: The encrypted file is sent to Nancy.Step 4: Nancy decrypt the file with her own private key

1

11

e) Virus definition is not up-to-date.The anti-virus program has not disabled.

11

f) (i) Computer will pollute the environment as it contains heavy metal. 1(ii) Give to some NGO for re-use. 1(iii) Delete all her personal information. 1

6. a) (i) The resolution / screen size is significantly different. 1(ii) Server can detect the client’s resolution, the browser version, the OS, etc. to choose the best layout to the clients.

1+1

(iii) The OS of the web server and the client web browser need not to be compatible. All they need is to use the same protocol.

11

b) (i) No personal info.Update regularly.

11

(ii) SSID is the name or the ID for identification of the wireless router (AP). Where key is the binary string for data encryption. So, key is more significant for data security.

1

c) (i) Freegovwifi should be used because the speed is faster. 1(ii) The key “GoWifiHK” is publicly known will not make it less secure. It is because it is just the public key. That is, it is just for the data encryption only. And so, anyone with the encrypted data will have no use unless he has the private key to decrypt data.

1+11

19