Worksheet complete set 180111


Published on

Published in: Education, Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Worksheet complete set 180111

  1. 1. Panitia ICT SMK Kanowit 2011 Learning Area One – ICT and Society1.1 – Introduction to ICT.1.1.1 – Overview of ICT. – Define ICT ICT is defined as Information is defined as Communication is defined as Technology is defined as1.1.1.2 – Describe the brief evolution of computers First Generation (1940-1956) Second Generation (1956 - 1963) Technology: Technology: Problems: Advantages: Scientists: Scientists: Example: Scientist: Third Generation (1964-1971) Technology: Advantages: 1
  2. 2. Panitia ICT SMK Kanowit 2011 Fourth Generation (1971 - present) Fifth Generation (Present & beyond) Technology: Technology: Advantages: Scientists: Example:1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce1.1.2.1 – List the usage of ICT in everyday life. Education Industry1. Students can use computer as references tool and 1. browse internet for information 2.2. Banking Commerce1. 1.2. – State the differences between computerised and non-computerised systems. Field Non- Computerised Computerised 1. Students listen mainly to 1. Students can use internet to teacher explanation. search for information and do not rely mainly on teacher. Education 2. 2. 2
  3. 3. Panitia ICT SMK Kanowit 2011 1. 1. Banking 2. 2. 1. 1. Industry 2. 2. 1. 1. Commerce 2. – State the impact of ICT on society. Positive Impact Negative Impact 3
  4. 4. Panitia ICT SMK Kanowit 20111.2 – Computer Ethics and Legal Issues1.2.1 – Definition1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law. Computer Ethics is a Definition: Code of Good examples: Bad examples: Ethics: 1. 1. 2. 2. Computer Crimes Intellectual property refers to __________________________________ __________________________________ Any criminal activity ________________________ __________________________________ _________________________________________ _________________________________. _________________________________________ These works are ____________________ There are 4 types of computer crimes: __________________________________  __________________________________    Privacy in IT refers to Information privacy is described as Cyber law refers to 4
  5. 5. Panitia ICT SMK Kanowit 20111.2.1.2 – Differentiate between ethics and law. Definition of Ethics Definition of Law 1. Similarity between ethics and law 2. Ethics Law Keywords Explanations Keywords Explanations As a rule to control Moral standards computer users Computer users are free to follow or ignore the codes of ethics Must follow Depends on country and state where the crime is committed Universals Crime1. 1. Examples2. 2. 5
  6. 6. Panitia ICT SMK Kanowit 20111.2.1.3 – State the need for Intellectual property laws Why do we need intellectual property law???1.2.2 – Privacy1.2.2.1 – List ways to protect privacy. Privacy is threatened through … Ways to protect privacy 6
  7. 7. Panitia ICT SMK Kanowit 20111.2.2.2 – State authentication and verification methods / technologies Authentication is a process Methods Pictures Name Functions / Explanation Analyses the features that exist in the coloured tissue surrounding the pupil. Biometric Devices Scanning of retina and analyzing the layer of blood vessels at the back of the eye. This method is commonly used in bank operation and business transactions. 7
  8. 8. Panitia ICT SMK Kanowit 2011 Verification is the act of Methods of verification Examples1.2.3 – Controversial Contents and Control1.2.3.1 – List the effects of controversial content on society (pornography & slander) Pornography Slander Impacts???? Examples1.2.3.2 – Describe the process of filtering to control access to controversial contents. Methods Website / site blocking Uses lists of banned Rated by RSACI for the words. content of the website. If filter search found any Browser is set to accept How??? words listed, it will stop pages with certain levels downloading and block of ratings. the page. 8
  9. 9. Panitia ICT SMK Kanowit 20111.2.4 – Computer Crimes1.2.4.1 – Explain the need for Cyber Law. For: Needs for For: Cyber Law For: For: For: – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks. Computer Crimes Definition Example1.3 – Computer security1.3.1 – Definition1.3.1.1 – Define computer security Computer security means 9
  10. 10. Panitia ICT SMK Kanowit 2011 Types of computer security1.3.2 – Security Threats1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster, theft. Security Threats Malicious Code Hacking Natural Disaster Theft Definition: Definition: Definition: Definition: Examples: Examples: Examples: Flood Fire Earthquakes1.3.3 – Security Measures1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup, human aspectIdentify and write the appropriate security procedures in the SECURITY column and the security threats in theTHREATS column. Situation THREATS SECURITYAhmad’s has asked his secretary,Minah, to send an email to hisbusiness partner in Japan. Minahtries to read Ahmad’s email.Every two weeks Harry would savea copy of his files from his laptop tohis external hard disk in case hiscomputer breaks down. 10
  11. 11. Panitia ICT SMK Kanowit 2011One day, Karim found out his fileshas been corrupted. He needs toscan using appropriate utility.While using the internet, Florafounds out that some of her privateinformation showed up in anunknown browser.Daisy is a software engineer. Oneday, she found out that on hercomputer pops out a message thatwrites “An unknown source istrying to by-pass your securitysystem”Bank safe vault is one of therestricted areas in the office. Onlyauthorized personal are allow toenter. Questions1. Copyright infringement is defined as a violation of the rights secured by Copyright Act. a. Give two examples of copyright infringement. b. Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats for: i. Data lost ii. Hiding information.2. Which of the following are biometric devices? I. Hand geometry II. Callback System III. Retinal Scanning IV. Signature Verification System A. I, II and III B. I, II and IV C. I, III and IV D. II, III and IV 11
  12. 12. Panitia ICT SMK Kanowit 2011 Learning Area Two – Computer System.2.1 – System Concept2.1.1 – Overview of computer systems2.1.1.1 – Define computer systems2.1.1.2 – State the meaning of input, processor, output and storage. COMPUTER SYSTEM PROCESS STORAGE OUTPUT INPUT2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage. Description of Information Processing Cycle 12
  13. 13. Panitia ICT SMK Kanowit 2011 Fetch MACHINE CYCLE2.1.2 – Data Representation2.1.2.1 – State the relationship of data representation: Bit, byte, and character. _______ bits 1 byte _______ character2.1.3 – Introductory to binary coding2.1.3.1 – Explain the function of ASCII code ASCII: American _______________________________________________________________________ ____________________________________________________________________________________Functions: 1. 2. 13
  14. 14. Panitia ICT SMK Kanowit 2011 Criteria ASCII EBCDIC Unicode Number of bits in a byte Usage Supported languages Example2.1.4 – Data measurement2.1.4.1 – State the units of data measurement. Term Abbreviation Approx. size Exact Amount Index power Bit -- -- -- -- Byte -- -- -- -- KB Megabyte GB Terabyte2.1.5 – Clock Speed Measurement2.1.5.2 – State the units of clock speed measurement.Unit used : __________________________________ = ____________ cycle per second Term Abbreviation Cycle per second Megahertz Gigahertz GHz2.2 – Hardware Types of hardware Motherboard 14
  15. 15. Panitia ICT SMK Kanowit 20112.2.1 – Input Devices2.2.1.1 – Identify the input devices used for text, graphics, audio and video Types Picture Name Other examples 1. Text 2. 1. Graphics 2. 1. Audio 2. 1. Video – Output devices2.2.2.1 – Identify the output devices used for text, graphics, audio and video Output Device Text graphics audio video Monitor    Speaker 15
  16. 16. Panitia ICT SMK Kanowit 20112.2.3 – Motherboard2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot,ports and connectors on the motherboard. Ports 16
  17. 17. Panitia ICT SMK Kanowit 20112.2.4 – Storage2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic medium, optical medium, flash memory)Primary storage is located at _______________________________________________What is ROM?____________ Only Memory: memory whose contents can be accessed and read but ______________ bechanged. The memory of a ROM is ________________________ which means the program and data will not be__________________.Types of ROM: PROM EPROM EEPROMWhat is RAM?Random _____________________ Memory: memory whose contents can be _________________, read and______________. The memory of a RAM is ________________________ which means the program and datawill be __________________.2.3.1 – Operating System (OS) – State the various types of OS used on different platforms. OS Platform Example Example Example 17
  18. 18. Panitia ICT SMK Kanowit 20112.3.1.2 – State the functions of OS Functions of OS2.3.1.3 – State the different interfaces of OS 18
  19. 19. Panitia ICT SMK Kanowit 20112.3.2 – Application Software2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic) – Describe the uses of application software. Types Examples Functions / UsagesWord processor Microsoft Excel Corel Quattpro Pro Sun StarOffice Calc Provides pre-defined presentation format Applying special effects to the slide transition. Enhance text, charts and graphical images. Edit digital non-text information such as photo and drawings Draw pictures using various tools such as brush and pen Modifying contrast and brightness Adding special effects2.3.3 – Utility program2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and file compression) Types Examples Functions / Usages 1. 1.File managements 2. 2. 1. 1.Diagnostics 2. 2. 1. 1.File Compression 2. 2. 19
  20. 20. Panitia ICT SMK Kanowit 20112.3.4 – Proprietary and Open Source Software. - Differentiate between proprietary and open source Criteria Proprietary Open Source 1. 1. It is Free 2. 2. 3. Advantages 3. 1. User need to buy the product 1. key (license key) in order to use 2. Disadvantages 3. 1. Microsoft Office 2010 1. Example for application 2. software 2. 1. 1. Ubuntu 2. Example for OS 2. 20
  21. 21. Panitia ICT SMK Kanowit 2011 Learning Area 3 – Computer Network and Communications3.1 – Basic Concepts of Computer Networks and Communications3.1.1 – Definition3.1.1.1 – Define computer networks3.1.1.2 – Define communication Computer network is Communication is3.1.2 – Importance of Computer Network. – State two importance of computer networks and communication in the following fields Education E-Business E-Commerce E-Banking3.1.3 – Types of Network3.1.3.1 - Define types of Computer network. LAN a. ______________ Area __________________. b. __________________ network compare to ___________ and WAN. c. Operated within a limited _________________________________________. d. Devices connected usually are less than ____________________________. e. Hardware used: ______________________________, ________________________________, ________________________________, _____________________________________. f. Transmit data at a very _______________ speed. a. ___________________ Area _________________________. MAN b. Located at ____________________ cities such as _________________________. c. Used ____________________________________ as transmission media. d. Can be collections of ______________. 21
  22. 22. Panitia ICT SMK Kanowit 2011 a. ________________________ Area __________________________. WAN b. ______________________ network of all. An example is __________________________. c. Generally it covers large ______________________ such as a state, ________________ or ___________________. d. A group of _____________ or ____________ or a mixture of ____________. e. Uses transmission media such as _________________________________________________. f. Need ___________________ to connect two or more network. – Differentiate between the three types of computer network. Criteria LAN MAN WANNetwork sizeNumber of computersTransmission media typesSpeedCost3.1.4 – Network Architecture3.1.4.1 – Define two types of network architecture.Network Architecture Client/Server Peer-to-PeerDefinitionCabling costNetwork usageEase to manageSoftware needed 22
  23. 23. Panitia ICT SMK Kanowit 20113.1.5 – Network Topology. – State three types of network topologies: Bus, Ring, Star Definition: structure or configuration of ______________________ for ____________________. Topology Diagram3.1.5.2 - Differentiate between the three types of network topology Aspect Ring Topology Star Topology Bus TopologyHost failureNode FailureStructureEase of adding/removingnodesEase of troubleshootingNumber of nodes whenextending networkConnection betweennodesHost existence 23
  24. 24. Panitia ICT SMK Kanowit 20113.1.6 - Protocol3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitatecommunication over computer network. Definition: Protocol is ……….. Importance of protocol: TCP/IP:3.1.7 – Internet, Intranet, Extranet. – Describe the types of network communications technology (Internet, Intranet, Extranet) Criteria Internet Intranet ExtranetDefinitionUsageServicesAccessibilitySecurity 24
  25. 25. Panitia ICT SMK Kanowit 20113.2 – Hardware Requirements3.2.1 – Devices3.2.1.1 – Identify the function of the devices needed in computer network communication. – State the function of the devices needed in computer network communication. Diagram Device Name Function Diagram Device Name Function From router To MODEM 25
  26. 26. Panitia ICT SMK Kanowit 20113.2.2 – Medium3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP),Coaxial and Fibre Optic Cable. – Identify various types of wireless transmission media. 1 2 3 43.3 – Software Requirements.3.3.1 – Server Software3.3.1.1 – Define Network Operating System.  Network Operating System or known as __________ allows to ____________________ computers and peripheral to a ______________________________.  Most frequently used with ______________ and ____________________ but also have application to larger _____________________________________________.  It is not the same as the ____________________________________________ provided by some existing __________________________________________.  It is specifically written to keep __________________________ running at __________________________________________________. 26
  27. 27. Panitia ICT SMK Kanowit 20113.3.1.2 – Name various Network Operating System Software. 1. Window NT 2. N 3. O S – Client Software3.3.2.1 – State the functions of various client software. Client Software Function Example 1. 1. Internet Explorer (IE) 2. 2.Web Browser 3. 3. 1. 1. Outlook ExpressE-mail client 2. 1. 1. PingNetwork Utilities 2. 2. 1. 1. Network NeighbourhoodNetwork File Manager 2. 2. 27
  28. 28. Panitia ICT SMK Kanowit 20113.4 – Setting Network Facilities3.4.1 – Installation of Network Interface Cards (NIC) This is a Step 1a: Place your ___________________________________ in the PCI of your computer Step 1b: Window will ____________________ that it has found new hardware Step 1c: The “Found New Hardware Wizard” will then ___________________. Click __________ to continue Step 2a: Select “CD-ROM Drives” and click “Next” to ________________. Window will find suitable _____________ for your device. 28
  29. 29. Panitia ICT SMK Kanowit 2011 Step 2b: The NIC driver is now properly installed. __________________ the computer to complete the installation. – Install drivers for NIC (for WinXP) Step 1: Windows will indicate a new hardware found after the NIC has been inserted into its slot. Click Next to continue. Step 2: Select “Search for the best driver for my device (recommended)” and click “________________” to continue Step 3: Select “CD-ROM Drives” and click “Next” to continue. Windows will now search for the best driver for your device. 29
  30. 30. Panitia ICT SMK Kanowit 2011 Step 4: Windows will locate the correct driver for your device and indicate that it is now ready to install the driver. Click “Next” to continue. Step 4: The NIC driver is now properly __________________________.3.4.2 – Cable Crimping and Testing3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable). 2 types From PC to PC From PC to hub/switch/router TOOLS 30
  31. 31. Panitia ICT SMK Kanowit 20113.4.3 – Configuration and Testing Network. – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Testthe network connection. IP is _________________________________________________________. Subnet mask specifies __________________________________ of the network. _________________________________ are used to connect other network and the _____________________________________________3.4.3.2 - Steps to test a network connection: 1. 2. 3. Share Data3.4.4.1 – Create a share folder. 1. 2. 3. 4. 31
  32. 32. Panitia ICT SMK Kanowit 2011 Questions1. Figure 1 shows a network configuration. INTERNET PC 1 IP address: PC 2 Subnet Mask: IP address: Gateway: Subnet Mask: Gateway: ADSL MODEM IP address: Subnet Mask: Figure 1 a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other. [4 marks] b. Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then filled the table below for the new configuration. Computer IP address Subnet Mask PC 1 PC 22. Computer A Computer B Computer C ADSL MODEM IP address: IP address: IP address: IP address: Subnet Mask: Subnet Mask: Subnet Mask: Subnet Mask: Gateway: Gateway: Gateway: Figure 2 a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the computers that able to communicate with each other. Justify your answer. [ 3 marks] 32
  33. 33. Panitia ICT SMK Kanowit 2011 b. There is one computer that unable to communicate with the other computer in the network. Identify that computer. Then identify the problem and re-configure the computer so that it can communicate with the other computers in the network. [3 marks]3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1. 20 desktops 1 modem 1 switch 1 router Table 1 LAN cables A server Based on Table 1, answer the following questions. a. As the school network administrator, you are asked to suggest a suitable network topology to Pn. Malsiah, the school principal. Justify your answer. [4 marks] b. You are also asked to suggest a suitable network architecture. Justify your answer. [3 marks]4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to set up in his company. a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks] b. Give 2 services, with the examples, provided by the internet to Mr. Ali. [ 4 marks] 33
  34. 34. Panitia ICT SMK Kanowit 2011 Learning Area Four – Multimedia4.1 – Multimedia Concepts4.1.1 – Definition of Multimedia4.1.1.1 – Define multimedia Multimedia is a4.1.2 – Multimedia in various of fields4.1.2.1 – Identify the use of multimedia in various fields Fields Example UsageEducationBusinessArtMedicine4.1.3 – Interactivity of multimedia4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia. Interactivity refers toTypes File format ExampleText Notepad, Microsoft WordsAudioVideo *.mov, *.aviAnimationsGraphics Paint, Photoshop 34
  35. 35. Panitia ICT SMK Kanowit 2011 Linear Criteria/Characteristics Non-Linear User interaction with application User control over the application Application flow / arrangement Example4.1.4 – Medium of delivery4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications. Medium of delivery Application Quality Production Time Production Cost Up-to-Date4.1.5. – Multimedia Elements4.1.5.1 – Identify the multimedia elements 35
  36. 36. Panitia ICT SMK Kanowit 20114.2 – Hardware and software4.2.1 – Hardware4.2.1.1 – Identify the hardware that can be used to produce multimedia products.4.2.2 – Editing Software4.2.2.1 – Identify editing software that can be used to be produce multimedia elements Example: Text editor Example: Graphics and image editor Example: Audio editor Example: Video and animation editor4.2.3 – Authoring Tools4.2.3.1 – Define the various concepts in authoring toolsCriteria Time Frame Concepts Icon Concepts Card ConceptsConcepts Uses visual icon in a structural frameworkWay of presentation Uses frames that represents the timeSpecial features Pages are arranged like stack of cardsExamples Adobe flash 36
  37. 37. Panitia ICT SMK Kanowit 20114.2.4 - Web editor4.2.4.1 – Describe and give examples of web editors Text-based: Example: What You See Is What You Get (WYSIWYG): Example:4.3 – Multimedia development4.3.1 – User interface Principles4.3.1.1 – State the user interface principles4.3.1.2 – Apply suitable user interface principles in a project Match the user interface principles with the correct statementsConsistency Can move around the system: menus, helpClarity Enable user to search keyword or glossaryContext Make their own personal learningNavigation Harmony and same applies to all screenSearch Clearness of labels on all iconsPersonalisation Provides support system / help filesLearnability Can navigate through all sections without limitationFlexibility Each part should be relevant to the title4.3.2 – Development Team4.3.2.1 – State the role of each member in a development team. Multimedia Production Team 37
  38. 38. Panitia ICT SMK Kanowit 2011 Multimedia Specialise in Scope of work Production TeamProject Manager Leading the multimedia team Research on the content of a multimedia program Graphics editingAudio-videotechnician Educational strategies and planning Writes program codes (scripting) Combines the multimedia elements4.3.3 – Multimedia production phase4.3.3.1 – Describe the phases in multimedia productions 38
  39. 39. Panitia ICT SMK Kanowit 2011Multimedia production Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Ali uses flow chart draft the flow of his multimedia application. Ali uses storyboard to sketch the interface of the page.Implementation phase A checklist is used to test the multimedia program. It is also to fix any error found. James chooses a group of selected users to evaluate and give feedback to his multimedia program using Evaluation Form. Publishing phase Match the screen design principles with the correct statement Contrast Usage of different types of multimedia elements Simplicity Arrangement of the elements Proximity Simple and easy way of presentation Repetition Concept of grouping similar elements Alignment Create a focus point on the screen Emphasis Concept of repetition the same texture, colour, size and font 39
  40. 40. Panitia ICT SMK Kanowit 2011 Questions1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as shown in Table 1. He uses authoring tool software to make his project more effective and interesting. Collect pictures of the school, hostels, classes, field and canteen. Modify the school badge image so that it can be animated. Record the school anthem. Insert the school objectives, motto and school history into different screens. Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3 Table 1 Based on Table 1, I. What is the name of the animated file used by Halim? II. Halim wants to record his voice as background narration. Give one suitable device to carry out this task. III. Name two missing multimedia element that is not in the files used by Halim. IV. From your answer in 1 (c), give one suitable file extension for each elements you have mentioned.2. Study the following table carefully. Then answer the questions based on Table 2. Phase Description The multimedia developers interview the client to find out their needs and write the X problem statement and a proposal. Y The multimedia developers will design a flow chart and storyboard. The multimedia developers will use a checklist to test the multimedia program. If there are Z errors, he will fix the program. Table 2 a) Identify phase X, Y and Z. b) From your answer in 2 (a), what are the missing phases? c) State one example activity for each of the missing phases from your answer in 2 (b).3. User interface principles are: I. Clarity II. Colourful III. Consistency IV. Wide screen A. I and II B. II and IV C. I and III D. III and IV 40
  41. 41. Panitia ICT SMK Kanowit 2011 Learning Area Five – Programming.5.1 – Basic programming concepts5.1.1 – Define program and programming language5.1.1.1 – State the definition of program A computer program is5.1.1.2 – State the definition of programming language A programming language is5.1.2 – Levels and generations of programming language Level of programming language Low-level programming language Example: Example: High-level programming language Example: Example: Example: 41
  42. 42. Panitia ICT SMK Kanowit 20115.1.3 – Programming Language Approaches5.1.3.1 – Define structured approach in programming Approach: Programs are drawn in Structured approach ____________________ Smaller sections of each A program may have a Example of structured programming languages: program are known as __________________ or several _____________________ ________________________ Beneficial for: – Define object-oriented approach in programming Approach: The object have Object-oriented approach _____________________ with one another Beneficial for: Combines ____________ Example of structured with functions to create programming languages: ____________________5.1.3.3 – Differentiate between structured approach and object oriented approach in programming Structured approach Differences Object-oriented approach Uses Emphasize Suitable for 42
  43. 43. Panitia ICT SMK Kanowit 20115.1.4 – Translator5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler Translator Is a computer program that Example of assembler: Assembler Translator method: It is interpreted and executed in Interpreter ______________________ when the user execute it Execute ____________ by _________ Example: until the end of the program. Weakness: Translator methods: Compiler Advantages: Example: 43
  44. 44. Panitia ICT SMK Kanowit 20115.1.5 – Basic elements in programming Basic Elements5.1.5.1 – Differentiate between constants and variables Constant Differences Variable The value may change at any time Characteristics during the course of the program Usage1. Const Pi = 3.142 1. Dim Speed as Integer2. Const Speed = 30 2. Example3. (declaration in Visual Basic 6) – Differentiate between data types: Boolean, integer, double, strings and dateData types Description ExampleInteger Any number value that may and could contain a fractional part. “Kuala Lumpur” “23 is larger than 20” “Today is Monday” Consists of a TRUE or FALSE value. It is usually used to store status Contains date and time value 44
  45. 45. Panitia ICT SMK Kanowit 20115.1.5.3 – Differentiate between mathematical and logical (Boolean) operators.Operators Functions Operators ExampleMathematical +, -, , Logical operators perform logical operations such as checking the condition of two Boolean valuesExtra:Operators Description Operator Example A>B C >= D5.1.5.4 – Differentiate between sequence control and selection control Identify the types control structure below. BEGIN BEGIN END END Differences Execution flow Usage Symbols difference 45
  46. 46. Panitia ICT SMK Kanowit 20115.2 – Program Development5.2.1 – Program Development phases5.2.1.1 – Describe the five main phases in program developmentPhases of Program Development Coding Multimedia production Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Coding Phase 46
  47. 47. Panitia ICT SMK Kanowit 2011 Questions1. Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an entertainment park or not. The following are the source code. if height_boy > 162 then enter = TRUE if height_girl > 155 then enter = TRUE else, enter = FALSE Figure 1 Based on the programming above, answer the following questions. a. (i) Can height_boy and height_girl be declared as constant? (ii) Justify your answer. [3 marks] b. (i) Identify the data types used (ii) Give one difference for the data types you have mentioned in b(i). [4 marks]2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program. Private Sub CommandCheck_Click() Dim marks As Double, response As String marks = TextMark.Text If (marks >= 50) Then response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”) Else response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”) End If End Sub Figure2(a) Begin Request marks No >= 50? Print “You have fail your ICT examination.” Yes Print “You have pass your ICT examination.” End Figure 2 (b) 47
  48. 48. Panitia ICT SMK Kanowit 2011 Based on Figure 2(a) and 2(b), answer the following questions: i. States which phase comes after the process in Figure 2(a). ii. Design the output interface for both of the outcomes. [7 marks]2. Find the correct pair of data types. A. Const Height = 123.8 (Integer) B. Const Members = 34233 (Double) C. Const Input_Status = TRUE (Currency) D. Const Address = “Kuala Lumpur” (String)3. Study the flow chart below carefully. Begin Request numbers of working days. Calculate total salary: (RM 12.50 x number of working days) Print total salary End Diagram 3 Based on Diagram 3, answer the following questions: i. There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol. [2 marks] ii. What is the outcome of the salary if: a. The number of working days is six (6) days? [1 mark] b. The salary is now RM 15 and the working days are five (5) days? [1 mark] 48
  49. 49. Panitia ICT SMK Kanowit 2011 Learning Area Six – Information Systems6.1 – Concepts of Information Systems6.1.1 – Definition6.1.1.1 – Give the meaning of data, information and information systems. Data Information Information System Definition Definition Definition6.1.2 – Usage of information systems in various fields6.1.2.1 – State the usage of information system in education, business and management. Fields 1. Education 2. 1. Business 2. 1. Management – Information System Components6.1.3.1 – List the Information System components6.1.3.2 – Define each of the Information System components Hardware Procedure End users who uses the system and information system personnel who creates the system. 49
  50. 50. Panitia ICT SMK Kanowit 20116.1.3.3 – Describe the interrelation between information system components using a diagram. Software Description:6.1.4 – Types of Information Systems6.1.4.1 – List five types of Information systems6.1.4.2 – State the usage of each types of information system. Usage: Usage: Types of Usage: Information System Usage: Usage: 50
  51. 51. Panitia ICT SMK Kanowit 20116.1.5 – Hierarchy of Data6.1.5.1 – Define bit, byte, field, record and file Bit Byte Field Record6.1.5.2 – State the hierarchy of data Fields6.2.1 – Definition6.2.1.1 – Define database and Database Management System (DBMS) Database 51
  52. 52. Panitia ICT SMK Kanowit 2011 Provides an interface between the database and the user Database Management System6.2.1.2 – List the benefits of using database Benefits of using database6.2.2 – Features6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file) Field Specific category of information in a table. Record File Name Age Class Amirullah 13 1A Sarah 15 3C Chai Leng 16 4S1 52
  53. 53. Panitia ICT SMK Kanowit 20116.2.2.2 – Define the primary key and foreign key The field that ___________________________________________________ Primary key??? It must not have __________________ value. Each table must have at least ____________ primary key. It is also known as ___________________________. The field that ___________________________________________________ Foreign key??? It can have __________________ value. It is ______________________________________ in other tables. It is also known as ___________________________. – State the importance of the primary key. – Differentiate between the primary key and foreign key. Primary key Property Foreign key Usage Null value Duplicate6.2.2.5 – State the importance of the relationship between the primary key and foreign key.6.2.3 – Database Objects6.2.3.1 – Define the following database objects / tools: Table, form, query, reportDatabase Object Definition Table Form Query 53
  54. 54. Panitia ICT SMK Kanowit 2011 Report6.2.4 – Data Manipulation6.2.4.1 – List the basic operations of data manipulation6.2.4.2 – State the usage of basic operations in data manipulation Basic operation of data Usage manipulation Sort To remove record(s) from the database Filter6.3 – Database Development6.3.1 – Phases of System Development6.3.1.1 – Describe the phases of System Development System Development Descriptions Example of activity phase Interview clients to find out their needs Write problem statement and proposal Ali chooses the data he has collected during his interview. Ali draft out the table contains necessary data. 54
  55. 55. Panitia ICT SMK Kanowit 2011Implementation phase It involves the system developer and users It is to ensure the quality of a database. James documents all the information from source code to user manual to troubleshooting information. Involves three types of maintenance: o o Maintenance phase o 55
  56. 56. Panitia ICT SMK Kanowit 2011 QuestionsTable 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a SimpleQuery Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria. Table 1 Figure2 Figure 3 a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view the grades of the co curriculum activities for each student. Justify your answer. [3 marks] b) Based on the query design in Figure 10, complete the query result below to show the information obtained. [ 3 marks] Class Stu_ID Name Position CoCu c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify your answer. [3 marks] 56