SlideShare a Scribd company logo
1 of 16
Download to read offline
CONFIDENTIAL
3765/1
ICT
SEPT 2010

2 HOURS 30 MINUTES


                           JABATAN PELAJARAN MELAKA




                INFORMATION AND COMMUNICATIONS TECHNOLOGY
                                        (ICT)


                            PEPERIKSAAN PERCUBAAN
                         SIJIL PELAJARAN MALAYSIA 2010




           DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO




THIS QUESTION PAPER CONSISTS OF :


a). Section A     : 25 Questions
b). Section B     :   5 Questions
c). Section C     :   3 Questions
                      (Question 1 is Compulsory and
                      choose either Question 2 or Question 3)




                      THIS QUESTION PAPER CONSISTS OF 16 PAGES

                                          1
SECTION A


      In the recent years, many concerns and issues were raised on the integrity and
      security of information, legal status of online transactions, privacy and
      confidentiality of information, intellectual property rights and security of
      government data placed on the Internet. So we need to protect the Internet and
      other online communication technologies.

      Beberapa tahun kebelakangan, banyak pertikaian dan isu dibangkitkan
      tentang keselamatan dan integriti maklumat, status perundangan bagi
      transaksi atas talian, kebersendirian dan kerahsiaan maklumat, hak harta
      intelek dan keselamatan data kerajaan di Internet. Jadi, kita perlu melindungi
      Internet dan teknologi atas talian yang lain.


1.   This statement refer to
     Kenyataan ini merujuk kepada

     A.      Cyber Law
             Undang-undang Siber

     B.      Code of Ethics
             Kod Etika

     C.      Computer Crime
             Jenayah Komputer

     D.      Computer Ethics
             Etika Komputer


2.   This operating system is an example of an open source program.
     Sistem pengoperasian ini adalah contoh atur cara sumber terbuka.

     A.      Linux
     B.      Windows XP
     C.      Macintosh
     D.      Mac OS


3.   Which of the following are output devices?
     Yang manakah di antara berikut adalah peranti output?

      I.     Printer pencetak
      II.    Monitor monitor
      III.   Joystick kayu ria
      IV.    Plotter pemplot
      V.     Microphone mikrofon


                                            2
A.      I,II and III
           B.      I,II and IV
           C.      II,III and V
           D.      III, IV and V


4.        Which of the following are biometric devices?
          Yang manakah di antara berikut merupakan peranti biometrik?


                        I. Hand geometry
                       II. Callback System
                      III. Retinal Scanning
                      IV. Signature Verification System


          A.       I, II and III
          B.       I, II and IV
          C.       I, III and IV
          D.       II, III and IV


5.        All of the following devices are pointing devices EXCEPT...
          Semua peranti di bawah merupakan peranti penunjuk, KECUALI…
          A.       Mouse
                   Tetikus
          B.       Touchpad
                   Pad sentuh
          C.       Keyboard
                   Papan Kekunci
          D.       Joystick
                   Kayu Ria


State whether the following statement is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu.

6.   a)        Animation is the creation of the illusion of movement by displaying a series of still
               images in sequence.                                            TRUE / FALSE

     b)    ASCII stands for American Standard Code for International Interchange.
                                                                              TRUE / FALSE

                                                   3
c)     A display device is an output device that visually conveys text        TRUE / FALSE
     d)     LCD stands for Layout Crystal Display                                  TRUE / FALSE
     e)     The primary storage of a computer holds data temporarily.              TRUE / FALSE
     f)     If any node of star topology failed, the network of the topology will fail also.
                                                                                   TRUE / FALSE

7.          Which of the following is the example of operating system?
            Manakah antara berikut merupakan contoh sistem pengendalian?
            A.     Windows XP
            B.     Visual Basic
            C.     Norton Antivirus
            D.     Microsoft Office


8         Suhana spreads a rumor that a Minister is receiving bribes. Suhana’s conduct is called
          Suhana menyebarkan khabar angin bahawa seorang Menteri menerima rasuah.
          Perbuatan Suhana dikenali sebagai

          A Hijacker
            Perampas

          B Slander
            Fitnah

          C Cracker
            Memecah kata laluan

          D Hacker
            Penggodam

9.        What is data?
          Apa itu data?

          A.       The facts of the information.
                   Fakta maklumat

          B.       The collection of information
                   Koleksi maklumat

          C.       The collection of raw unprocessed facts, figures and symbols.
                   Koleksi data-data, rajah-rajah dan symbol-simbol yang belum diproses.

          D.       The information which had been processed as something meaningful.
                   Maklumat yang telah diproses dan menjadi bermakna.



                                                       4
10.         Table below shows examples of operator symbols that being used in programming.
            Jadual di bawah menunjukkan contoh simbol-simbol operator yang digunakan dalam
            pengaturcaraan.

                                         S   ‘ OR ‘ ‘ AND’

                                         T   ‘*‘   ‘+‘

                                         U   ‘<‘       ‘>‘


Based on table above, write S, T or U for the following operator types.
Berdasarkan jadual di atas, tuliskan S, T atau U bagi jenis-jenis operator berikut:


      i.         Logical Operator
                 Operator Logik


      ii.        Mathematical Operator
                 Operator Matematik


11.         Which of the following programming languages are categorized as high-level?
            Yang manakah diantara bahasa-bahasa pengaturcaraan berikut merupakan bahasa
            aras-tinggi?


                   I         ASSEMBLY
                   II        PASCAL
                   III       SQL
                   IV        MERCURY

            A.      I, II and III

            B.      I, II and IV

            C.      I, III and IV

            D.      II, III and IV


12.         Table below shows the differences between Structured Programming and Object
            Oriented Programming.



                                                   5
Jadual di bawah menunjukkan perbezaan antara Pengaturcaraan Berorientasikan
      Objek dan Pengaturcaraan Berstruktur

                              P                                    Q
       It often uses a top-down design          It uses combinations of objects.
       model.
                                                Ia menggunakan kombinasi objek
       Ia selalunya menggunakan model
       rekabentuk atas bawah
       Examples - Ada, Pascal and Fortran.      Examples - Smalltalk, Java, Visual
       Contoh - Ada, Pascal and Fortran.        Basic and C++.
                                                Contoh - Smalltalk, Java, Visual Basic
                                                and C++.

Based on table above, name P and Q.
Berdasarkan jadual di atas, namakan P dan Q.

      P        : __________________________
      Q        : __________________________


13.   Choose the best answer according to the data types.
      Pilih jawapan terbaik berdasarkan jenis data.
                                  Integer              Double
                                  Boolean               String

      a. _________ data type contains any whole number value that does not have any
           fractional part.
           _________ jenis data yang mengandungi keseluruhan nilai nombor kecuali nombor
           pecahan.


      b.       Any value that contains a sequence of characters and decimal is refer to
            ____________
           Sebarang nilai yang mengandungi jujukan aksara dan perpuluhan adalah merujuk
           kepada____________




                                               6
14.         Which of the following are network operating systems?
            Antara yang berikut manakah system pengendali rangkaian


                     I    Windows NT
                     II   Windows XP
                     III Novell
                     IV UNIX

      A.    I , II, and III
      B.    I, II, and IV
      C.    I, III and IV
      D.    II, III and IV


15.    Mail merge allows users to create personalized
       Cantuman mel membenarkan pengguna menghasilkan

       I             Letters
                     Surat

       II            Labels
                     Label

       III           Voices
                     Suara

       IV            Envelopes
                     Envelop

       A. I, II, III

       B. I, II, IV

       C. II, III, IV

       D. All the above




16.         Table below shows several terms of computer crime.
            Jadual di bawah menunjukkan beberapa terminologi dalam jenayah computer.


            Match the statements with the given answers.
            Padankan pernyataan dengan jawapan yang diberi.


                                                  7
Unauthorised use of another person’s                  A     Computer Crime
             property.                                                   Jenayah Komputer
      i.     Penggunaan tanpa kebenaran ke atas
             milikan orang lain
                                                                   B     Copyright Infringement
                                                                         Pelanggaran Hak Cipta
             Any criminal activity that is related to the
      ii.    use of computers.
             Sebarang aktiviti jenayah yang berkaitan              C     Computer Attack
             dengan penggunaan komputer.                                 Pencerobohan Komputer

             Any activities taken to disrupt the
             equipment of computer systems                         D     Computer Theft
      iii                                                                Pencurian Komputer
       .     Sebarang aktiviti yang diambil untuk
             menggangu peralatan sistem computer.



17.         Five types of Information System are Decision Support System (DSS), Management
            Information System (MIS), and Expert System (ES), Executive Information System (EIS)
            and _____________________
            Lima jenis Sistem Maklumat ialah Sistem Sokongan Keputusan (DSS), Sistem
            Pengurusan Maklumat (MIS), Sistem Pakar (ES), Sistem Maklumat Eksekutif (EIS) and
            ________________________
            A.     Transaction Processing System (TPS)
                   Sistem Pemprosesan Transaksi (TPS)
            B.     Executive Assistant System (EAS)
                   Sistem Bantuan Eksekutif (EAS)
            C.     Decision Information System (DIS)
                   Sistem Maklumat Keputusan
            D.     Expert Information System (EIS)
                   Sistem Maklumat Pakar

18.         What is the set of rules used for information exchange between computers in a
            network?
            A.     Router
            B.     Protocol
            C.     ISDN
            D.     Streamyx

                                                      8
19.   Figure 2 shows the device and cables used in networking.
      Rajah 2 menunjukkan peranti dan kabel yang digunakan dalam rangkaian
      komputer.


                                                      Cable Y
                                                      Kabel Y



       Device X                                       Cable Z
       Peranti X                                      Kabel Z




      Which of the following statements are TRUE?
      Manakah di antara yang berikut adalah pernyataan yang BENAR?

       I.     Device X is inserted into the PCI slot of computer.
              Peranti X dimasukkan ke dalam slot PCI komputer
       II.    Cable Z is twisted pair cable.
              Kabel Z ialah kabel pasangan terpiuh
       III.   Cable Z is fiber optics cable.
              Kabel Z ialah kabel gentian optik
       IV.    Both cables use electrical pulse to transmit data.
              Kedua-dua kabel menggunakan denyutan elektrikal untuk menghantar data

       A.     I and II
       B.     I, II, and III
       C.     I, II, and IV
       D.     II, III, and IV


20.   Customers benefit from Electronic Banking in terms of :
      Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks:

        i.    24 hours service
              Perkhidmatan 24 jam
        ii.   Electronic Fund Transfer
              Pemindahan Tabung secara elektronik
       iii.   Electronic Cash Deposits
              Deposit Tunai Elektronik
       iv.    Electronic Loan Application
              Aplikasi Pinjaman Elektronik



                                           9
A.   i , ii     and iii
           B.   i , ii     and iv
           C.   i , iii    and iv
           D.   ii , iii   and iv


21.        Which of he following programs can be used to generate graphic?


           A. Microsoft Power Point
           B. Microsoft Word
           C. Adobe Photoshop
           D. Adobe Audition



22. Which of the following combination of multimedia elements and its standard format
    file is correct?
    Yang mana berikut, gabungan elemen multimedia dan format fail piawai yang betul?

                Multimedia elements                  Standard File Format
       A        Graphics                             .avi
                Grafik
       B        Audio                                .midi
                Audio
       C        Video                                .au
                Video
       D        Text                                 .gif
                Teks


 23.       The _______________reader is attached to a computer and takes information
           from the scanner and sends it to the database. The data received is compared to the
           information stored within the database. The user is usually required to leave his finger on
           the reader for less than 5 seconds during which time the identification or verification
           takes place.


 24.       a)      State the name of the first generation computer
                      Nyatakan nama computer generasi pertama.

           b)         The multimedia element that makes objects move is called_________________.

 25.       _________________ is a set of commands or instructions which directs a computer in
           doing a task.




                                                    10
A.      Program
            B.      Language
            C.      Programmer
            D.      Programming Language
 .


                                              SECTION B

1. State the second phase and the fifth phase of program development.
   Nyatakan fasa kedua dan fasa kelima pembangunan atur cara.

     (i)            Second phase          : ________________

     ( ii )         Fifth phase           : ________________

     iii)           100011100101010 2 = _______________       16


     iv)            2BAD 16 = _________________________       2
                                                                                              (4 m)

2.          Based on the situation below, answer the following questions.


                 David always spends his leisure time surfing the Internet. He usually downloads
                 proprietary software and MP3 songs and sells them to his friends. He uses his ICT
                 knowledge to get the unauthorized serial number for the software. One day, he
                 finds that his computer is getting slow and keeps on duplicating files.

                 David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering
                 memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-
                 rakannya. David menggunakan kepakarannya dalam bidang ICT untuk
                 mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah
                 dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering
                 membuat salinan fail tertentu secara berulang.

            a. Name the type of computer crime that David has committed.
                 Namakan jenis jenayah komputer yang dilakukan oleh David.
                 ______________________________________________________

            b. What has happened to David’s computer?
                 Apakah yang telah terjadi kepada komputer David?
                 ___________________________________________________________



                                                    11
c. How can David prevent his computer from the problem in (b) in the future?
              Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi
              di (b) pada masa akan datang?
              ___________________________________________________________


           d. Other than the threat you mentioned in (b), give another computer threat
              that could affect David’s computer.
              Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi
              ancaman lain yang mungkin berlaku kepada komputer David.
              _______________________________________
                                                                                             (4 m)

3.         Firgure (a) and (b) show two different control structures.
           Rajah (a) dan (b) menunjukkan dua struktur kawalan yang berbeza


                                                          BEGIN
                     BEGIN

                                                         Statement 1
                   Statement 1
                                                                               False
                                                           Request
                   Statement 2
                                                          condition

                   Statement 3                                   True

                                                    Program’s response
                      BEGIN
                                                           BEGIN

                        (a)                                              (b)

     i.       Name the control structure in figure (a) and (b)
              Namakan struktur kawalan dalam rajah (a) dan (b)
                                                                                            [2m]

     ii.      Differentiate between control structure in figure (a) and (b).
              Bezakan struktur kawalan di antara struktur kawalan dalam rajah (a) dan (b)

                                                                                            [2m]

                                                    12
4.     a) Based on the figure below,

             X
                          1
            1                                          Y
                              0



                         X        = ……………….
                         Y        = ………………..
                                                                                  (2m)
       b)

                A                                      B
                                  A

Based on figure above, name the physical transmission media of A and B that is used in
network communications.

                A : ________________________

                B : ________________________
                                                                                  (2m)


5. Figure below shows variety of data types.


                 23               3.14         False            Pahang

                1.23              Samad        True             909


       a) Based on figure above, pick the examples and fill in the boxes below.


                       Data types                          2 Examples
                        Double

                        Boolean
                                                                                  (2 m)


       b) Define PROGRAM.
            ………………………………………………………………………………………… (2 m)

                                                 13
SECTION C

This section consists of 3 questions. You are required to answer 2 questions only. Question 1 is
compulsory.
Bahagian ini mengandungi 3 soalan. Anda dikehendaki menjawab 2 soalan sahaja. Soalan 1
adalah wajib.

Question 1
Figure below shows some of the components of a computer system.

                                     Computer System




           Hardware                                                 Software




 Input           Process         Storage           Output           Open         Proprietary
                                                                   Source




                  Primary        Secondary          System                     Application


                                                            L         Word Processing
             M                  N

                                                        Utility         Spreadsheet



                                                      Translator        Presentation


Based on Figure above, answer the fsollowing questions.


   a) Draw a block diagram to illustrate the information processing cycle.               [2m]
   b) Identify and state the function of L                                               [2m]
   c) Identify and differentiate between M and N                                         [3m]


                                              14
Question 2

      Ahmad’s School bought Antivirus software to enhance proficiency in computer security.
      That software is used for all computer related activities. Ahmad needs to ensure
      effective usage of that software. Figure below shows several activities by Ahmad.

      Sekolah Ahmad membeli perisian Antivirus bagi meningkat tahap keselamatan komputer
      di sekolahnya. Perisian tersebut telah digunakan untuk sebarang aktiviti yang
      melibatkan penggunaan komputer. Ahmad telah ditugaskan untuk memastikan
      penggunaan perisian tersebut secara berkesan. Rajah di bawah menunjukkan
      sebahagian aktiviti yang dibuat oleh beliau.



                                                      Virus Found !!
                                                          Brontok…
                                                          Work.32
                                                          Trojan-Spy.Win32



                                                      All Virus has been deleted




      (a)    What are the activities carried out by Ahmad?
             Apakah aktiviti-aktiviti telah dilakukan oleh Ahmad ?                   [3m]


      (b)    Explain TWO impacts of the threats in figure above.
             Terangkan DUA kesan ancaman yang telah disebut dalam rajah di atas.     [4 m]




Question 3

   Mr. Tan is the manager of IBC Corporation. He wishes to computerize the management in
   his company. He employs Mr. Kamal to develop a Management Information System.


   a. State ONE usage of Management Information System that will be used by Mr. Tan. [1m]




                                             15
b.
                                         Analysis


                                          Design


                                      Implementation


                                          Testing


                                            X


                                       Maintenance

     Mr. Kamal will go through several phases to develop the system as shown in Figure
     above. Describe phase X.               e
                                                                                    [2m]

c.     When the information system is implemented in IBC Corporation, it will involve five
     components, namely people, hardware, software, procedure and data. Show the
     interrelation between information systems components using a diagram.        [2m]


d.


     X



     Y




Figure above shows X is a field, Y is a record in a table. Define X and Y.         [2m]




                                           END




                                            16

More Related Content

Similar to ICT Melaka 2010

Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combinedGary Tsang
 
Building Interpretable & Secure AI Systems using PyTorch
Building Interpretable & Secure AI Systems using PyTorchBuilding Interpretable & Secure AI Systems using PyTorch
Building Interpretable & Secure AI Systems using PyTorchgeetachauhan
 
CBSE XI COMPUTER SCIENCE
CBSE XI COMPUTER SCIENCECBSE XI COMPUTER SCIENCE
CBSE XI COMPUTER SCIENCEGautham Rajesh
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 FarhanAhmade
 
information practices cbse based paper.docx
information practices cbse based paper.docxinformation practices cbse based paper.docx
information practices cbse based paper.docxKapilSidhpuria3
 
R05010106 C P R O G R A M M I N G A N D D A T A S T R U C T U R E S
R05010106  C  P R O G R A M M I N G   A N D   D A T A  S T R U C T U R E SR05010106  C  P R O G R A M M I N G   A N D   D A T A  S T R U C T U R E S
R05010106 C P R O G R A M M I N G A N D D A T A S T R U C T U R E Sguestd436758
 
Exam question sample IT
Exam question sample ITExam question sample IT
Exam question sample ITNoor Fazilah
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Siti Salmiah
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfssuserade1a1
 
9th_Computer Full Exercise
9th_Computer Full Exercise 9th_Computer Full Exercise
9th_Computer Full Exercise Naeem Mughal
 
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxBTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxAASTHA76
 
F4 learning-area-2-computer-system
F4 learning-area-2-computer-systemF4 learning-area-2-computer-system
F4 learning-area-2-computer-systemNasran Syahiran
 

Similar to ICT Melaka 2010 (20)

Latihan
LatihanLatihan
Latihan
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
 
Building Interpretable & Secure AI Systems using PyTorch
Building Interpretable & Secure AI Systems using PyTorchBuilding Interpretable & Secure AI Systems using PyTorch
Building Interpretable & Secure AI Systems using PyTorch
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
CBSE XI COMPUTER SCIENCE
CBSE XI COMPUTER SCIENCECBSE XI COMPUTER SCIENCE
CBSE XI COMPUTER SCIENCE
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021
 
information practices cbse based paper.docx
information practices cbse based paper.docxinformation practices cbse based paper.docx
information practices cbse based paper.docx
 
Cocoa Trivia
Cocoa TriviaCocoa Trivia
Cocoa Trivia
 
Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Set6 ict-question
Set6 ict-questionSet6 ict-question
Set6 ict-question
 
R05010106 C P R O G R A M M I N G A N D D A T A S T R U C T U R E S
R05010106  C  P R O G R A M M I N G   A N D   D A T A  S T R U C T U R E SR05010106  C  P R O G R A M M I N G   A N D   D A T A  S T R U C T U R E S
R05010106 C P R O G R A M M I N G A N D D A T A S T R U C T U R E S
 
Exam question sample IT
Exam question sample ITExam question sample IT
Exam question sample IT
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdf
 
Nt1320 Unit 6
Nt1320 Unit 6Nt1320 Unit 6
Nt1320 Unit 6
 
9th_Computer Full Exercise
9th_Computer Full Exercise 9th_Computer Full Exercise
9th_Computer Full Exercise
 
faizal
faizalfaizal
faizal
 
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxBTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
 
F4 learning-area-2-computer-system
F4 learning-area-2-computer-systemF4 learning-area-2-computer-system
F4 learning-area-2-computer-system
 

More from dean36

ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010dean36
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010dean36
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010dean36
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010dean36
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010dean36
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010dean36
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010dean36
 
ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010dean36
 
ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010dean36
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010dean36
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010dean36
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010dean36
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010dean36
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010dean36
 
Latihan 7
Latihan 7Latihan 7
Latihan 7dean36
 
Latihan 6
Latihan 6Latihan 6
Latihan 6dean36
 
Latihan 3
Latihan 3Latihan 3
Latihan 3dean36
 
Latihan 2
Latihan 2Latihan 2
Latihan 2dean36
 
Jawapan 3
Jawapan 3Jawapan 3
Jawapan 3dean36
 
Jawapan 2
Jawapan 2Jawapan 2
Jawapan 2dean36
 

More from dean36 (20)

ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010
 
ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010
 
ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010
 
Latihan 7
Latihan 7Latihan 7
Latihan 7
 
Latihan 6
Latihan 6Latihan 6
Latihan 6
 
Latihan 3
Latihan 3Latihan 3
Latihan 3
 
Latihan 2
Latihan 2Latihan 2
Latihan 2
 
Jawapan 3
Jawapan 3Jawapan 3
Jawapan 3
 
Jawapan 2
Jawapan 2Jawapan 2
Jawapan 2
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

ICT Melaka 2010

  • 1. CONFIDENTIAL 3765/1 ICT SEPT 2010 2 HOURS 30 MINUTES JABATAN PELAJARAN MELAKA INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA 2010 DO NOT OPEN THIS BOOKLET UNTIL YOU ARE ASKED TO DO SO THIS QUESTION PAPER CONSISTS OF : a). Section A : 25 Questions b). Section B : 5 Questions c). Section C : 3 Questions (Question 1 is Compulsory and choose either Question 2 or Question 3) THIS QUESTION PAPER CONSISTS OF 16 PAGES 1
  • 2. SECTION A In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. So we need to protect the Internet and other online communication technologies. Beberapa tahun kebelakangan, banyak pertikaian dan isu dibangkitkan tentang keselamatan dan integriti maklumat, status perundangan bagi transaksi atas talian, kebersendirian dan kerahsiaan maklumat, hak harta intelek dan keselamatan data kerajaan di Internet. Jadi, kita perlu melindungi Internet dan teknologi atas talian yang lain. 1. This statement refer to Kenyataan ini merujuk kepada A. Cyber Law Undang-undang Siber B. Code of Ethics Kod Etika C. Computer Crime Jenayah Komputer D. Computer Ethics Etika Komputer 2. This operating system is an example of an open source program. Sistem pengoperasian ini adalah contoh atur cara sumber terbuka. A. Linux B. Windows XP C. Macintosh D. Mac OS 3. Which of the following are output devices? Yang manakah di antara berikut adalah peranti output? I. Printer pencetak II. Monitor monitor III. Joystick kayu ria IV. Plotter pemplot V. Microphone mikrofon 2
  • 3. A. I,II and III B. I,II and IV C. II,III and V D. III, IV and V 4. Which of the following are biometric devices? Yang manakah di antara berikut merupakan peranti biometrik? I. Hand geometry II. Callback System III. Retinal Scanning IV. Signature Verification System A. I, II and III B. I, II and IV C. I, III and IV D. II, III and IV 5. All of the following devices are pointing devices EXCEPT... Semua peranti di bawah merupakan peranti penunjuk, KECUALI… A. Mouse Tetikus B. Touchpad Pad sentuh C. Keyboard Papan Kekunci D. Joystick Kayu Ria State whether the following statement is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. 6. a) Animation is the creation of the illusion of movement by displaying a series of still images in sequence. TRUE / FALSE b) ASCII stands for American Standard Code for International Interchange. TRUE / FALSE 3
  • 4. c) A display device is an output device that visually conveys text TRUE / FALSE d) LCD stands for Layout Crystal Display TRUE / FALSE e) The primary storage of a computer holds data temporarily. TRUE / FALSE f) If any node of star topology failed, the network of the topology will fail also. TRUE / FALSE 7. Which of the following is the example of operating system? Manakah antara berikut merupakan contoh sistem pengendalian? A. Windows XP B. Visual Basic C. Norton Antivirus D. Microsoft Office 8 Suhana spreads a rumor that a Minister is receiving bribes. Suhana’s conduct is called Suhana menyebarkan khabar angin bahawa seorang Menteri menerima rasuah. Perbuatan Suhana dikenali sebagai A Hijacker Perampas B Slander Fitnah C Cracker Memecah kata laluan D Hacker Penggodam 9. What is data? Apa itu data? A. The facts of the information. Fakta maklumat B. The collection of information Koleksi maklumat C. The collection of raw unprocessed facts, figures and symbols. Koleksi data-data, rajah-rajah dan symbol-simbol yang belum diproses. D. The information which had been processed as something meaningful. Maklumat yang telah diproses dan menjadi bermakna. 4
  • 5. 10. Table below shows examples of operator symbols that being used in programming. Jadual di bawah menunjukkan contoh simbol-simbol operator yang digunakan dalam pengaturcaraan. S ‘ OR ‘ ‘ AND’ T ‘*‘ ‘+‘ U ‘<‘ ‘>‘ Based on table above, write S, T or U for the following operator types. Berdasarkan jadual di atas, tuliskan S, T atau U bagi jenis-jenis operator berikut: i. Logical Operator Operator Logik ii. Mathematical Operator Operator Matematik 11. Which of the following programming languages are categorized as high-level? Yang manakah diantara bahasa-bahasa pengaturcaraan berikut merupakan bahasa aras-tinggi? I ASSEMBLY II PASCAL III SQL IV MERCURY A. I, II and III B. I, II and IV C. I, III and IV D. II, III and IV 12. Table below shows the differences between Structured Programming and Object Oriented Programming. 5
  • 6. Jadual di bawah menunjukkan perbezaan antara Pengaturcaraan Berorientasikan Objek dan Pengaturcaraan Berstruktur P Q It often uses a top-down design It uses combinations of objects. model. Ia menggunakan kombinasi objek Ia selalunya menggunakan model rekabentuk atas bawah Examples - Ada, Pascal and Fortran. Examples - Smalltalk, Java, Visual Contoh - Ada, Pascal and Fortran. Basic and C++. Contoh - Smalltalk, Java, Visual Basic and C++. Based on table above, name P and Q. Berdasarkan jadual di atas, namakan P dan Q. P : __________________________ Q : __________________________ 13. Choose the best answer according to the data types. Pilih jawapan terbaik berdasarkan jenis data. Integer Double Boolean String a. _________ data type contains any whole number value that does not have any fractional part. _________ jenis data yang mengandungi keseluruhan nilai nombor kecuali nombor pecahan. b. Any value that contains a sequence of characters and decimal is refer to ____________ Sebarang nilai yang mengandungi jujukan aksara dan perpuluhan adalah merujuk kepada____________ 6
  • 7. 14. Which of the following are network operating systems? Antara yang berikut manakah system pengendali rangkaian I Windows NT II Windows XP III Novell IV UNIX A. I , II, and III B. I, II, and IV C. I, III and IV D. II, III and IV 15. Mail merge allows users to create personalized Cantuman mel membenarkan pengguna menghasilkan I Letters Surat II Labels Label III Voices Suara IV Envelopes Envelop A. I, II, III B. I, II, IV C. II, III, IV D. All the above 16. Table below shows several terms of computer crime. Jadual di bawah menunjukkan beberapa terminologi dalam jenayah computer. Match the statements with the given answers. Padankan pernyataan dengan jawapan yang diberi. 7
  • 8. Unauthorised use of another person’s A Computer Crime property. Jenayah Komputer i. Penggunaan tanpa kebenaran ke atas milikan orang lain B Copyright Infringement Pelanggaran Hak Cipta Any criminal activity that is related to the ii. use of computers. Sebarang aktiviti jenayah yang berkaitan C Computer Attack dengan penggunaan komputer. Pencerobohan Komputer Any activities taken to disrupt the equipment of computer systems D Computer Theft iii Pencurian Komputer . Sebarang aktiviti yang diambil untuk menggangu peralatan sistem computer. 17. Five types of Information System are Decision Support System (DSS), Management Information System (MIS), and Expert System (ES), Executive Information System (EIS) and _____________________ Lima jenis Sistem Maklumat ialah Sistem Sokongan Keputusan (DSS), Sistem Pengurusan Maklumat (MIS), Sistem Pakar (ES), Sistem Maklumat Eksekutif (EIS) and ________________________ A. Transaction Processing System (TPS) Sistem Pemprosesan Transaksi (TPS) B. Executive Assistant System (EAS) Sistem Bantuan Eksekutif (EAS) C. Decision Information System (DIS) Sistem Maklumat Keputusan D. Expert Information System (EIS) Sistem Maklumat Pakar 18. What is the set of rules used for information exchange between computers in a network? A. Router B. Protocol C. ISDN D. Streamyx 8
  • 9. 19. Figure 2 shows the device and cables used in networking. Rajah 2 menunjukkan peranti dan kabel yang digunakan dalam rangkaian komputer. Cable Y Kabel Y Device X Cable Z Peranti X Kabel Z Which of the following statements are TRUE? Manakah di antara yang berikut adalah pernyataan yang BENAR? I. Device X is inserted into the PCI slot of computer. Peranti X dimasukkan ke dalam slot PCI komputer II. Cable Z is twisted pair cable. Kabel Z ialah kabel pasangan terpiuh III. Cable Z is fiber optics cable. Kabel Z ialah kabel gentian optik IV. Both cables use electrical pulse to transmit data. Kedua-dua kabel menggunakan denyutan elektrikal untuk menghantar data A. I and II B. I, II, and III C. I, II, and IV D. II, III, and IV 20. Customers benefit from Electronic Banking in terms of : Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks: i. 24 hours service Perkhidmatan 24 jam ii. Electronic Fund Transfer Pemindahan Tabung secara elektronik iii. Electronic Cash Deposits Deposit Tunai Elektronik iv. Electronic Loan Application Aplikasi Pinjaman Elektronik 9
  • 10. A. i , ii and iii B. i , ii and iv C. i , iii and iv D. ii , iii and iv 21. Which of he following programs can be used to generate graphic? A. Microsoft Power Point B. Microsoft Word C. Adobe Photoshop D. Adobe Audition 22. Which of the following combination of multimedia elements and its standard format file is correct? Yang mana berikut, gabungan elemen multimedia dan format fail piawai yang betul? Multimedia elements Standard File Format A Graphics .avi Grafik B Audio .midi Audio C Video .au Video D Text .gif Teks 23. The _______________reader is attached to a computer and takes information from the scanner and sends it to the database. The data received is compared to the information stored within the database. The user is usually required to leave his finger on the reader for less than 5 seconds during which time the identification or verification takes place. 24. a) State the name of the first generation computer Nyatakan nama computer generasi pertama. b) The multimedia element that makes objects move is called_________________. 25. _________________ is a set of commands or instructions which directs a computer in doing a task. 10
  • 11. A. Program B. Language C. Programmer D. Programming Language . SECTION B 1. State the second phase and the fifth phase of program development. Nyatakan fasa kedua dan fasa kelima pembangunan atur cara. (i) Second phase : ________________ ( ii ) Fifth phase : ________________ iii) 100011100101010 2 = _______________ 16 iv) 2BAD 16 = _________________________ 2 (4 m) 2. Based on the situation below, answer the following questions. David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files. David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan- rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang. a. Name the type of computer crime that David has committed. Namakan jenis jenayah komputer yang dilakukan oleh David. ______________________________________________________ b. What has happened to David’s computer? Apakah yang telah terjadi kepada komputer David? ___________________________________________________________ 11
  • 12. c. How can David prevent his computer from the problem in (b) in the future? Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi di (b) pada masa akan datang? ___________________________________________________________ d. Other than the threat you mentioned in (b), give another computer threat that could affect David’s computer. Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi ancaman lain yang mungkin berlaku kepada komputer David. _______________________________________ (4 m) 3. Firgure (a) and (b) show two different control structures. Rajah (a) dan (b) menunjukkan dua struktur kawalan yang berbeza BEGIN BEGIN Statement 1 Statement 1 False Request Statement 2 condition Statement 3 True Program’s response BEGIN BEGIN (a) (b) i. Name the control structure in figure (a) and (b) Namakan struktur kawalan dalam rajah (a) dan (b) [2m] ii. Differentiate between control structure in figure (a) and (b). Bezakan struktur kawalan di antara struktur kawalan dalam rajah (a) dan (b) [2m] 12
  • 13. 4. a) Based on the figure below, X 1 1 Y 0 X = ………………. Y = ……………….. (2m) b) A B A Based on figure above, name the physical transmission media of A and B that is used in network communications. A : ________________________ B : ________________________ (2m) 5. Figure below shows variety of data types. 23 3.14 False Pahang 1.23 Samad True 909 a) Based on figure above, pick the examples and fill in the boxes below. Data types 2 Examples Double Boolean (2 m) b) Define PROGRAM. ………………………………………………………………………………………… (2 m) 13
  • 14. SECTION C This section consists of 3 questions. You are required to answer 2 questions only. Question 1 is compulsory. Bahagian ini mengandungi 3 soalan. Anda dikehendaki menjawab 2 soalan sahaja. Soalan 1 adalah wajib. Question 1 Figure below shows some of the components of a computer system. Computer System Hardware Software Input Process Storage Output Open Proprietary Source Primary Secondary System Application L Word Processing M N Utility Spreadsheet Translator Presentation Based on Figure above, answer the fsollowing questions. a) Draw a block diagram to illustrate the information processing cycle. [2m] b) Identify and state the function of L [2m] c) Identify and differentiate between M and N [3m] 14
  • 15. Question 2 Ahmad’s School bought Antivirus software to enhance proficiency in computer security. That software is used for all computer related activities. Ahmad needs to ensure effective usage of that software. Figure below shows several activities by Ahmad. Sekolah Ahmad membeli perisian Antivirus bagi meningkat tahap keselamatan komputer di sekolahnya. Perisian tersebut telah digunakan untuk sebarang aktiviti yang melibatkan penggunaan komputer. Ahmad telah ditugaskan untuk memastikan penggunaan perisian tersebut secara berkesan. Rajah di bawah menunjukkan sebahagian aktiviti yang dibuat oleh beliau. Virus Found !! Brontok… Work.32 Trojan-Spy.Win32 All Virus has been deleted (a) What are the activities carried out by Ahmad? Apakah aktiviti-aktiviti telah dilakukan oleh Ahmad ? [3m] (b) Explain TWO impacts of the threats in figure above. Terangkan DUA kesan ancaman yang telah disebut dalam rajah di atas. [4 m] Question 3 Mr. Tan is the manager of IBC Corporation. He wishes to computerize the management in his company. He employs Mr. Kamal to develop a Management Information System. a. State ONE usage of Management Information System that will be used by Mr. Tan. [1m] 15
  • 16. b. Analysis Design Implementation Testing X Maintenance Mr. Kamal will go through several phases to develop the system as shown in Figure above. Describe phase X. e [2m] c. When the information system is implemented in IBC Corporation, it will involve five components, namely people, hardware, software, procedure and data. Show the interrelation between information systems components using a diagram. [2m] d. X Y Figure above shows X is a field, Y is a record in a table. Define X and Y. [2m] END 16