SET4 ICT 2007SECTION A (36 MARKS)BAHAGIAN A (36 MARKAH)Answer all questions.Jawab semua soalan.For Question 1 to Question ...
SET4 ICT 2007(ii) Communication between James and Wong is text-based.Komunikasi antara James dan Wong adalah berasaskan te...
SET4 ICT 2007Penghantaran maklumat dan data adalah dengan mengunakandua jenis isyarat iaitu _______________ dan___________...
SET4 ICT 20074. Study Figure 2 carefully and answer the following questions.FIGURE 2 RAJAH 2a. Name device C.Namakan peran...
SET4 ICT 2007Answer either Question 2 or Question 3.Jawab sama ada Soalan 2 atau Soalan 3.2. Figure 5 shows the phases of ...
SET4 ICT 2007
SET4 ICT 2007
Upcoming SlideShare
Loading in …5
×

Set4 ict-question

321 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
321
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Set4 ict-question

  1. 1. SET4 ICT 2007SECTION A (36 MARKS)BAHAGIAN A (36 MARKAH)Answer all questions.Jawab semua soalan.For Question 1 to Question 10, each question is followed by anumber of options. Choose the best answer and write A, B, C orD in the spaces provided in Answer Sheet 1A.Bagi Soalan 1 hingga Soalan 10, tiap-tiap soalan diikuti olehbeberapa pilihan jawapan. Pilih jawapan terbaik dan tulis A, B,C atau D di ruang yang disediakan pada Helaian Jawapan 1A.1 Cik Masita obtained the exclusive legal rights for thedistribution and sale of the CD-ROM. This is associated withCik Masita mendapat hak eksklusif yang sah di sisi undang-undang untuk mengedar dan menjual CD-ROM. Perkara inidikaitkan dengan,,,A piracy cetak rompak B privacy rights hak kebersendirianC copyright hak cipta D patent Paten2 Suhana spreads a rumor that a Minister is receiving bribes.Suhana’s conduct is calledSuhana menyebarkan khabar angin bahawa seorang Menterimenerima rasuah. PerbuatanSuhana dikenali sebagaiA Hijacker Perampas B Slander FitnahC Cracker Memecah kata laluan D Hacker Penggodam3 Al-Fariq is a student at International Islamic University,Malaysia. He wants to contact his parent in Dubai via electronicmail. Which type of network is involved in the abovecommunication?Al-Fariq merupakan seorang pelajar di Universiti IslamAntabangsa, Malaysia. Dia ingin menghubungi keluarganya diDubai melalui mel elektronik. Jenis rangkaian yang manakahterlibat dalam komunikasi di atas?A Local Area Network Rangkaian Kawasan SetempatB Metropolitan Area Network Rangkaian Kawasan MetropolitanC Wide Area Network Rangkaian Kawasan LuasD College Area Network Rangkaian Kawasan Kolej4 What is data? Apa itu data?A The facts of the information. Fakta maklumatB The collection of information Koleksi maklumatC The collection of raw unprocessed facts, figures and symbols.Koleksi data-data, rajah-rajah dan symbol-simbol yang belumdiproses.D The information which had been processed as somethingmeaningful.Maklumat yang telah diproses dan menjadi bermakna.5 Windows XP, Macintosh OS X, and Linux are examples ofWindows XP.Macintosh OS X dan Linux adalah contoh-contoh bagiA Application software Perisian aplikasiB Web browsers Penggelintar InternetC Operating systems Sistem pengoperasianD Shareware program Perisian Kongsi6 A communication system connecting two or more computersis calledSistem komunikasi yang menghubungkan dua atau lebihkomputer dikenali sebagaiA Multitasking Pelbagai tugas B Network RangkaianC System unit Unit Sistem D Protocols Protokol7 Why do we need to backup our data ?Mengapakah kita perlu membuat salinan data ?I To ensure that our data can still be used if the original iscorruptedUntuk memastikan data kita boleh digunakan jika berlakusesuatu terhadap data asal.II To ensure our files, program or disk that can be used if theoriginal source is lost, damaged or destroyed.Boleh menggunakan fail, program atau cakera yang telahdisalin jika sumber asal rosak hilang atau musnah.III To prevent our files or program from malicious softwareMenghalang fail atau program daripada perisian yang tidakdikehendaki.IV To protect our files from viruses .Menghalang fail daripada virus.A I and II B I and IIIC I, II and III D I, II and IV8 Below are steps for scanning viruses. Arrange the steps insequence.Berikut merupakan langkah-langkah untuk mengimbas virus.Susun langkah mengimbas mengikut urutan yang betul.I Scan the selected file Imbas fail yang telah dipilihII Choose an antivirus program Pilih program antivirusIII Wait until the scanning process is finished and the result isdisplayed Tunggu proses pengimbasan sehingga selesaiIV Select files or folders that need to be scannedPilih fail atau folder yang hendak diimbasA IV, II, I and III B III, I, II and IIIC II, IV, I and III D I, II, III and IV9 Mail merge allows users to create personalizedCantuman mel membenarkan pengguna menghasilkanI Letters Surat II Labels LabelIII Voices Suara IV Envelopes EnvelopA. I, II, III B. I, II, IVC. II, III, IV D. All the above10 Which hardware components are required for computernetwork?Komponen perkakasan yang manakah diperlukan dalamrangkaian komputer?I Hub Hab II UTP Cable Kabel UTPIII Crimping Tool Peralatan CrimpIV Network Interface Card Kad Antaramuka RangkaianA I, II, III B I, II, IVC II, III, IV D All of the aboveQuestion 11 to Question 13 are given in the form ofstatements. Write ‘true’ or ‘false’ in the spaces provided inAnswer Sheet 1A.Soalan 11 hingga Soalan 13 diberi dalam bentuk pernyataan.Tulis ‘benar’ atau ‘palsu’ di ruang yang disediakan padaHelaian Jawapan 1A.11 James wants to send a file to Wong using electronic mailservices. He must ensure that the file is free from virus before itis sent.James ingin menghantar fail kepada Wong denganmenggunakan perkhidmatan mel elektronik. Dia mestimemastikan bahawa fail itu bebas daripada virus sebelumdihantar.(i) James uses an application software to ensure the file is virus-free before it is sent.James menggunakan perisian applikasi untuk memastikan failitu bebas daripada virus sebelum dihantar.
  2. 2. SET4 ICT 2007(ii) Communication between James and Wong is text-based.Komunikasi antara James dan Wong adalah berasaskan teks.12 Salimah learns to use HTML scripting to develop web pages.Salimah belajar menggunakan skrip HTML untukmembangunkan laman web.(i) She uses a text-based web editor.Dia menggunakan editor laman web berasaskan teks.(ii) She uses hyperlinks to link other pages in the website.Dia menggunakan hyperlink untuk menghubungkan laman-laman lain pada tapak web tersebut.13 The following statements refer to computer generations.Berikut adalah pernyataan merujuk kepada generasi computer.(i) Vacuum tube is used in second generation computer.Tiub vakum digunakan dalam komputer generasi kedua.(ii) Artificial Intelligence is one of the technologies that is beingused in fifth generationcomputer.Kecerdikan Buatan adalah salah satu teknologi yang digunakandalam komputer generasi kelima.14 Table 1 shows several terms in a computer system.Jadual 1 menunjukkan beberapa terminologi dalam sistemkomputer.A Input Device Peranti InputB Secondary Storage DevicePeranti Storan SekunderC Command-Line User InterfaceAntaramuka Arahan BarisD Word Processing SoftwarePerisian Pemproses PerkataanTABLE 1 JADUAL 1Based on Table 1, write A, B, C or D for the following question.Berdasarkan Jadual, tuliskan A, B, C atau D untuk soalanberikut.(i) Ali wants to continue his assignment later. He wants to savehis assignment. What device should Ali use? Ali hendakmenyambung tugasannya kemudian. Dia hendak menyimpantugasannya.. Apakah peranti yang akan digunakan oleh Ali?(ii) Shalini wants to create and manipulate documentscontaining text and graphics. What type of program shouldShalini use? Shalini hendak menghasilkan dan manipulasidokumen mengandungi teks dan grafik. Program apakah yangpatut digunakan olehnya?(iii) ‘Type commands or press special keys on the keyboard toenter data and instructions that instruct the operating systemwhat to do. It has to be typed one line at a time.”These statements refer to?“Taip arahan atau tekan kekuncikhas untuk memasukkan data dan arahanyang akanmengarahkan sistem pengoperasian. Ia perlu ditaip satu demisatu baris pada satu masa.” Pernyataan ini merujuk kepada?15 Table 2 shows several terms of computer crime. Jadual 2menunjukkan beberapa terminologi dalam jenayah computer.Match the statements with the given answers.Padankan pernyataan dengan jawapan yang diberi.TABLE 2 JADUAL 216 The pictures below show the types of user-interface. Matchthe pictures with the correct name given.Gambar berikut menunjukkan jenis-jenis antaramukapengguna. Padankan gambar dengan nama yang betul.iIiIiiFor Questions 17 to Question 25, write your answers in thespaces provided in Answer Sheet 1A.Bagi Soalan 17 hingga Soalan 25, tulis jawapan anda di ruangyang disediakan pada Helaian Jawapan 1A.17 Antivirus is a _____________ software that detects______________ in your computer memory, storage media andincoming files. Antivirus adalah perisian ____________ yangmengesan ____________ dalam memori komputer, mediapenyimpanan dan fail18 We transmit information or data by using two types ofsignals, namely ____________ and ______________ .I Unauthorised use of anotherperson’s property.Penggunaan tanpa kebenaran keatas milikan orang lainIi Any criminal activity that isrelated to the use of computers.Sebarang aktiviti jenayah yangberkaitan dengan penggunaankomputer.iii Any activities taken to disrupt theequipment of computer systemsSebarang aktiviti yang diambiluntuk menggangu peralatansistem computerA Computer CrimeJenayahKomputerB CopyrightInfringementPelanggaran HakCiptaC Computer AttackPencerobohanKomputerD Computer TheftPencurianKomputerA Graphical User InterfaceAntaramuka GrafikB Command-LineArahan BarisC Menu-DrivenPerintah berasaskan menu
  3. 3. SET4 ICT 2007Penghantaran maklumat dan data adalah dengan mengunakandua jenis isyarat iaitu _______________ dan______________.19 Two subcomponents of CPU are ___________________and __________________.Dua komponen utama CPU ialah ________________________dan_______________________.20 ____________________ means protecting our computersystems and the information they contain against unwantedaccess, damage, destruction or modification._______________ bermaksud menghalang sistem computerdan maklumat daripada diceroboh, rosak atau diubah suai.21 An ___________________ is a set of program thatcoordinates all the activities among the computer hardwaredevices._________________ ialah satu set arahan yang mengawalsemua aktiviti di atara peranti-peranti computer.22 A ____________________ is a system of interconnectedcomputers and peripheral devices.______________________ ialah system yang menghubungkanbeberapa buah computer dan peranti-perantinya.23 ___________________ makes use of graphics capabilitiesof a computer to make the operating system and programseasier to use, which is also called ‘user-friendly’.___________________ menghasilkan kebolehan grafik padacomputer yang membolehkan system pengoperasian mudahdigunakan dan dikenali sebagai ‘mesra pengguna’.24 _____________ is unsolicited e-mail messages,advertisements or newsgroup postings sent to many recipientsat once._____________ ialah mesej e-mel yang tidak dikehendaki,iklan atau kumpulan berita yang dihantar kepada ramai padasatu-satu masa.25 _____________ is a sequence of keystrokes andinstructions that are recorded and saved._____________ ialah turutan kekunci dan arahan yang direkoddan disimpan.SECTION B (20 MARKS)BAHAGIAN B (20 MARKAH)Answer all questions.Jawab semua soalan.Berdasarkan Rajah 1 di atas:a. Name :Namakani) X ________________________________________ (1 mark)ii) Y ________________________________________ (1 mark)b. P and Q are other examples of X and Y respectively. Name:P dan Q adalah contoh lain bagi X dan Y. Namakan:i) P : _______________________________________ (1 mark)ii) Q: _______________________________________ (1 mark)2. a) State two differences between primary storage andsecondary storage.Nyatakan dua perbezaan di antara storan primer dan storansekunder. (2 marks)b) Give one example of:Berikan 1 contoh bagi:i) primary storage : ________________________________Storan primerii) secondary storage : ________________________________Storan sekunder(2 marks)3. Based on the situation below, answer the following questions.David always spends his leisure time surfing the Internet. Heusually downloads proprietary software and MP3 songs andsells them to his friends. He uses his ICT knowledge to get theunauthorized serial number for the software. One day, he findsthat his computer is getting slow and keeps on duplicating files.David selalu meluangkan masa lapangnya untuk melayariInternet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. Davidmenggunakan kepakarannya dalam bidang ICT untukmendapatkan nombor siri yang tidak sah untuk mengaktifkanperisian yang telah dimuat turun. Pada suatu hari komputerDavid menjadi perlahan dan sering membuat salinan failtertentu secara berulang.a. Name the type of computer crime that David has committed.Namakan jenis jenayah komputer yang dilakukan oleh David.___________________________________________________________ (1 mark)b. What has happened to David’s computer?Apakah yang telah terjadi kepada komputer David?___________________________________________________________(1 mark)c. How can David prevent his computer from the problem in (b)in the future?Bagaimanakah David dapat mengatasi masalah komputer yangdihadapidi (b) pada masa akan datang?___________________________________________________________(1 mark)d. Other than the threat you mentioned in (b), give anothercomputer threat that could affect David’s computer.Selain daripada ancaman yang dinyatakan di(b), berikan satulagiancaman lain yang mungkin berlaku kepada komputerDavid.___________________________________________________________(1 mark)
  4. 4. SET4 ICT 20074. Study Figure 2 carefully and answer the following questions.FIGURE 2 RAJAH 2a. Name device C.Namakan peranti C.___________________________________________________________(1 mark)b. State the function of device C.Nyatakan fungsi peranti C.___________________________________________________________(1 mark)c. Name 2 types of network in Figure 2.Namakan 2 jenis rangkaian yang terdapat di Rajah 2_____________________________________________________________________________________________________________________(2 marks)5. Figure 3 refers to two different network topologies.Rajah 3 menunjukkan 2 jenis topologi rangkaian yang berbeza.a. Name :Namakani) Topology A :____________________________________ii) Topology B :____________________________________(2 marks)b. Name the network architecture for:Namakan asas rekabentuk rangkaian bagi :i) Topology A :____________________________________ii) Topology B :____________________________________(2 marks)SECTION C (14 MARKS)BAHAGIAN C (14 MARKAH)Answer Question 1.Jawab Soalan 1.1. Figure 4 shows the components and devices of a computersystem.Rajah 4 menunjukkan komponen dan peranti sistemkomputer.a) Based on Figure 4a, 4b, 4c and 4d, draw a block diagram ofthe information processing cycle.Berdasarkan Rajah 4a, 4b, 4c dan 4d, lukis rajah blok kitaranpemprosesan maklumat.(2 marks)b). Give one example of a device other than shown in Figure 4a.Berikan satu contoh peranti selain daripada yang ditunjukkandalam rajah 4a .___________________________________________________________(1 mark)c). State two functions of the component in Figure 4c.Nyatakan dua fungsi komponen dalam Rajah 4c.______________________________________________________________________________________________________________(2 marks)d). All the devices in Figure 4 are coordinated by an OperatingSystem. Explain two functions of the mentioned system.Semua peranti dalam Rajah 4 dikoordinasi oleh SistemPengendalian. Terangkan dua fungsi sistem tersebut.______________________________________________________________________________________________________________(2 marks)
  5. 5. SET4 ICT 2007Answer either Question 2 or Question 3.Jawab sama ada Soalan 2 atau Soalan 3.2. Figure 5 shows the phases of program development process.Based on the figure, answer the following questions.Rajah 5 di bawah menunjukkan fasa dalam prosespembangunan aturcara. Berdasarkan Rajah tersebut, jawabsoalan-soalan berikut.FIGURE 5 RAJAH 5a). Name Phase P and Phase Q.Namakan Fasa P dan Fasa Q.___________________________________________________________(2 marks)b). Arrange the phases in correct sequence.Susun fasa tersebut mengikut urutan.___________________________________________(1 mark)c). State two importance of Phase P in program developmentprocessNyatakan 2 kepentingan fasa P dalam proses pembangunanaturcara.______________________________________________________________________________________________________________(2 marks)d). Describe any translation method used in Phase Q.Jelaskan mana-mana kaedah pelaksanaan aturcara dalamFasa Q._____________________________________________________________________________________________________________(2 marks)3. Based on the situation below, answer the following questions.A group of foreign students are visiting your school. As thepresident of your school Multimedia Club, you are asked to forma team to develop a project of an interactive multimediapresentation to introduce your school to the visitors and otherschools in your state in future. You should include text, graphicsand audio in your presentation.Sekumpulan pelajar dari luar negarai akan melawat sekolahanda. Sebagai pengerusi Kelab Multimedia sekolah , andadiminta untuk menubuhkan satu pasukan bagi tujuanmembangunkan persembahan multimedia interaktif untukmemperkenalkan sekolah anda kepada pelajar-pelajar tersebutdan juga kepada sekolah-sekolah lain dinegeri anda. Andadikehendakki menggabungkan elemen teks, grafik dan audiodalam persembahan andaa). Identify the file format for each multimedia element in yourpresentation.Kenal pasti format fail bagi setiap elemen multimedia dalampersembahan anda.___________________________________________________________(1 mark)b). Describe the first phase that you are going to do indeveloping the stated project.Terangkan fasa pertama yang akan anda lalui semasamembangunkanprojek multimedia di atas.______________________________________________________________________________________________________________(2 marks)c). Explain the role of graphics artist in your team.Jelaskan peranan pereka grafik dalam pasukan anda.______________________________________________________________________________________________________________(2 marks)d). What medium of delivery would you use to distribute yourpresentationto other schools in your state? Give your reason.Apakah bentuk media penyampaian yang akan anda gunakanuntuk mengedarkan bahan persembahan anda kepadasekolah-sekolah lain dalam negeri anda? Berikan alasan anda.______________________________________________________________________________________________________________(2 marks)KERTAS SOALAN TAMAT
  6. 6. SET4 ICT 2007
  7. 7. SET4 ICT 2007

×