0% found this document useful (0 votes)
11 views5 pages

F2 Final Exam Revision Exercise (Answer)

The document is a revision exercise for a Form 2 final exam covering advanced word processing, spreadsheets, computer networks, 3D design, virtual and augmented reality, and artificial intelligence. It includes tables for functions and usages, formulas for spreadsheet calculations, hardware names, internet security threats, and attributes of big data. The content is structured by chapters, each focusing on different technical concepts and applications.

Uploaded by

charlotte cheung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

F2 Final Exam Revision Exercise (Answer)

The document is a revision exercise for a Form 2 final exam covering advanced word processing, spreadsheets, computer networks, 3D design, virtual and augmented reality, and artificial intelligence. It includes tables for functions and usages, formulas for spreadsheet calculations, hardware names, internet security threats, and attributes of big data. The content is structured by chapters, each focusing on different technical concepts and applications.

Uploaded by

charlotte cheung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Form 2 Final Exam Revision Exercise

Chapter 1 Advanced Word Processing

Fill in the following table.


Function Usage

Tab Add empty space in front of a word or character.

Header / Headers appear at the top margin of the page while footers appear at the
footer bottom margin to provide additional information for a document.

Page Number To keep count of the number of pages in a document. Usually located in
the footer or header.

Footnote For inserting remarks at the bottom of a page.

Headings and Setting text as “heading” in style allows the headings to be included
Table of automatically when the “table of content” function is used.
Contents

Chapter 2 Advanced Spreadsheet

Complete the questions with reference to the following spreadsheet on students Chinese exam
marks.

1. Write the formula for cell C2 so that AutoFill could be used to fill C3 to C7. Students with
50 marks or above are considered as passing.
=if(B2>=50,"Yes","No")
2. Write a formula that could count the total number of students who are taking the exam.
=count(B2:B7) it only counts numbers
3. Write a formula that could count the number of students who are passing the exam.
=countif(C2:C7,"Yes")

"
=countif(B2:B7, >=50 ) " =countif(B2:B7, ‘>=50’) (zero mark)

4. Complete the following table with the formulas needed to find the corresponding
statistics.
Statistic to be found Formula needed

Highest mark =max(B2:B7)


Lowest mark =min(B2:B7)
Average mark =average(B2:B7)

5. Write the formula for cell D2 so that AutoFill could be used to fill D3 to D7. The grade
reference could be found in column F and column G.
=vlookup(B2,F$2:G$7,2,True)

Chapter 3 Computer Network


1. Complete the following table with the appropriate hardware names.
Hardware Usage

Twisted Pair Cable Connect computers or devices to form a LAN


(LAN cable)

Optical Fibre Connect LANs to WAN or the Internet. Used for long
distance communication.

Access Point Transmit Wi-Fi Signal for wireless connection between


devices and network.

2. What are the usual frequencies that are used in Wi-Fi?


2.4GHz and 5GHz

3. What is responsible for transmitting signal for a cellular network?


Base station

4. What is IOT(Internet of things)?


The Internet of things is a large network composed of physical
objects connected by either wired or wireless communication
networks

5. What technology advancements are most related to the growth of IOT?


Wireless communication, sensors, machine learning and cloud
computing.

6. Name four applications of IOT.


Smart home, IP camera, autonomous driving and smart city.

7. Complete the following table with the purposes of the corresponding Internet security
threats.
Threat Purpose

Malware Damage computer functions, steal user data or attack


networks
Phishing Send out emails or messages to a huge amount of Internet
users and wait for any potential victims to respond
DDoS Make servers unavailable to provide services to intended
users
8. What can we do to improve Internet security?
Install and update anti-virus software/do not click links in
messages/do not visit suspicious websites/do not enter sensitive
information while using public network

Chapter 4 3D Design
1. Name three common actions that can be done on objects in a 3D design software.
Scale (resize/transform), rotate, translate (move)

Chapter 5 Virtual Reality and Augmented Reality


1. What is VR (virtual reality)?
VR is a technology that immerses users in a simulated,
computer-generated environment.

2. What is AR (augmented reality)?


AR is a technology that overlays digital information onto the real
world in real-time.
3. Complete the following table.
Technology Common hardware needed

VR VR headset, controller
AR Camera, accelerometer, gyroscope, depth sensor
4. Complete the following table.
Technology Applications

VR Training and Simulations, entertainment, virtual tour


AR Entertainment, retail and e-commerce, learning and
education
5. Name four ways an object in CoSpace Edu may move in.
Forward / backward / left / right / up / down

Chapter 6 Artificial Intelligence


1. What is AI (artificial intelligence)?
AI is the technology that enables computers or machines to simulate
human intelligence.

2. Name three applications of AI.


Self driving, movie / song recommendation, search engine

3. What is the empowering basis of AI?


Big data, machine learning, cloud computing

4. What is needed for the training and testing of AI?


Big data

5. Complete the following table.


Attributes of big data Meaning

Volume The amount of data

Velocity The speed of creating or collecting data

Variety The different types and forms of data

Veracity The quality, accuracy and reliability of data

Value The useful information get from data

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy