Kota tinggi-scheme

232 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
232
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Kota tinggi-scheme

  1. 1. No. KadPengenalanAngkaGiliran :Question No.No. SoalanCandidate’s AnswerJawapanCalonMarksMarkah1 Third Generation/GenerasiKetiga 12 D 23(i) Bit/Bit 3(ii) Character/Aksaraor Byte/Bait 44(i) R 5(ii) Q 65 Network Operating System/SistemPengoperasianRangkaian 76 Spreadsheet Software/PerisianHamparanElektronik 87 C 98 T E-Banking/PerbankanElektronik 109(i) LAN/Local Area Network/RangkaianKawasanSetempat 11(ii) Client-Server/Pelayan-Pelanggan 1210 Transmission Control Protocol/Internet Protocol 1311 M Bus Topology/Topologi Bas 1412 A 1513(i) Programmer/Pengaturcara 16(ii) Implementation Phase/FasaPelaksanaan 1714(i) True/Benar 18(ii) True/Benar 1915(i) Q 20(ii) P 2116 D 2217(i) True/Benar 23(ii) True /Benar 2418(i) L 25(ii) K 2619 B 2720A Relational Operator/OperasiHubungan 28B Logical Operator/OperasiLogik 2921i False/Palsu 30ii True/Benar 3122 X E-Business/PerniagaanElektronik 3223 Z Software/Perisian 3324 P A 3425(i) Table/Jadual 35(ii) Registration Number/NomborPendaftaran 36SULITAnswer SheetHelaianJawapanSULIT3765/1 © 2011 HakCipta SMKSemenchu
  2. 2. Answer SchemeSection B(20 Marks)26.a)i. The internet filtering method used is Site blocking. [1m]ii. Keyword Blocking/Web rating System [1m]-choose any related answer-b) Keyword Blocking- List of banned words or objectionable terms. [1m]Web Rating System- Browser set to only accept pages with certain levels of ratings. [1m]- Rating done either by the web page author or by the independent bureau. [1m]-choose any related answer-27.a)i. X : Operating System [1m]ii. Z : Proprietary Software [1m]b) Function of X :- Starting a computer- Managing data and programs- Managing memory- Configuring devices-choose any two related answer- [2m]28.a) Star Topology [1m]: because the system has switch [1m]b) Differences between star topology and ring topologyStar Topology Ring TopologyStructure There is a central hostand all nodes connect toit.All computers and otherdevices are connected in acircle.Host existence Yes Depends on networkneeds.Connection betweennodesNo YesNode failure Network can still run Network will fail1 mark for any correct pair. Answer must be in pair form. Answer could be in table form orparagraph. Choose any two related answer. [2m]
  3. 3. 29.a)i. Text-based [1m]ii. WYSIWYG [1m]b)- User friendly –does not require any HTML knowledge- It is easier for an average computer user- Easy to insert a specific tag- Can visualize the design-choose any two related answer- [2m]30.a)i. X : Compiler [1m]ii. Y : Interpreter [1m]b) Differences between X and YX (Compiler) Y (Interpreter)Translate statement line by line and execute itimmediately.Translate entire programming statement atone time and executes.Store machine language as object code on thedisk.No object code is created or saved.1 mark for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph.[2m]
  4. 4. Answer SchemeSection C(14 marks)31.a)i. Create two tablesBOOK SUPPLIERBook IDBook TitlePriceSupplier Registration NumberBook IDSupplier NameSupplier Address[1m] [1m]-Students can get 1 mark if fields in both tables are not same as above-ii. Table for book : BOOK [1m]Table for supplier : SUPPLIER [1m]-It could be any name of table but must according the answer in a(i)-b)i. Primary key for book table : Book IDPrimary key for supplier table : Supplier Registration Number-Students must state the primary key for each table to get 1 mark- [1m]ii. Create relationship between the tables and state the type of relationship.BOOK SUPPLIERBook IDBook TitlePriceSupplier Registration NumberBook IDSupplier NameSupplier AddressType of relationship : one-to-many-The answer must according answer in (a)- [2m]Create relationship between the tables and state the type of relationship.b. ii)SUPPLIER BOOKSupplier Registration NumberSupplier NameSupplier AddressBook IDBook TitlePriceSupplier Registration NumberType of relationship : one-to-many
  5. 5. 32.a)i. L is information processing cycle. [1m]ii. Y are RAM, ROM, hardisk, pendrive, CD, DVD, removable disk-Choose any two answer- [2m]b) Explain process L- An Input device feed raw data to the processor. [1m]- X processes raw data and turns it into useful information. [1m]- Y keeps or stores both process and unprocess data for later usage. [1m]- An output device shows or display the processed data. [1m]
  6. 6. 33.a) Type of network communication technology used between Central Site and Customer Site :- Extranet [1m]b) Type of network communication technology Z use in Central Site :- Z – Intranet [1m]- It’s a private network that limited for employee onlyOr- It’s an internal network that uses Internet technologies and it is a small version of the Internet thatexists within an organisation.-Choose any related answer- [1m]c) Two differences between network communication technologies Z and network communication technologiesbetween Central site and Customer siteTechnologies Z [ Intranet ] ExtranetIs used for organization and employeesonly.Is used for supplier, customer and businesspartner.Security level is high. Security level is high and it used VirtualPrivate Network to communicate.-2 marks for any correct pair. Answer must be in pair form. Answer could be in table form orparagraph.- [4m]
  7. 7. 33.a) Type of network communication technology used between Central Site and Customer Site :- Extranet [1m]b) Type of network communication technology Z use in Central Site :- Z – Intranet [1m]- It’s a private network that limited for employee onlyOr- It’s an internal network that uses Internet technologies and it is a small version of the Internet thatexists within an organisation.-Choose any related answer- [1m]c) Two differences between network communication technologies Z and network communication technologiesbetween Central site and Customer siteTechnologies Z [ Intranet ] ExtranetIs used for organization and employeesonly.Is used for supplier, customer and businesspartner.Security level is high. Security level is high and it used VirtualPrivate Network to communicate.-2 marks for any correct pair. Answer must be in pair form. Answer could be in table form orparagraph.- [4m]

×